summaryrefslogtreecommitdiff
path: root/spec
Commit message (Collapse)AuthorAgeFilesLines
* Replace all Opscode copyrights with Chef Software.Noah Kantrowitz2016-02-02344-350/+350
| | | Created via git ls-files | xargs perl -pi -e "s/(Copyright.*?), Opscode(,)? Inc(\.)?/\\1, Chef Software Inc./gi"
* Manual fix ups for things that didn't follow the usual pattern.Noah Kantrowitz2016-02-022-2/+2
|
* Copyright year update for 2016 and massive cleanup.Noah Kantrowitz2016-02-02576-593/+593
| | | Generated via git ls-files | xargs perl -pi -e "s/[Cc]opyright (?:\([Cc]\) )?((?\!$(date +%Y))\\d{4})(-\\d{4})?([, ][ \d]+)*(,|(?= ))/Copyright \\1-$(date +%Y),/g"
* Make windows event log tests fasterJay Mundrawala2016-02-021-4/+9
| | | | | Using SecureRandom is slow if it is not initialized. Random is good enough for this test.
* Mark windows_service_spec as brokenJay Mundrawala2016-02-021-1/+2
| | | | | This test is causing the rspec tests in appveyor to exit with 116
* Use OHAI_SYSTEM where possibleJay Mundrawala2016-02-0210-40/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Rerunning ohai wastes a lot of time. This should get us back to within our time limits in appveyor even with the perf regression in Ohai. Don't rerun ohai for unit/regsitry_helper_spec Ohai is slow. We don't need to rerun this, it's already run in our spec_helper. Don't keep rerunning ohai for reboot_pending_spec Running Ohai is slow. This should know almost 2 mins off the runtime of the tests. Don't need to run ohai for registry_spec crypto_spec does not need its own ohai cmdlet_spec does not need its own ohai functional registry_helper_spec does not need its own ohai Use spec ohai system for knife configure_spec Use OHAI_SYSTEM for dsc_script_spec use OHAI_SYSTEM for dsc_resource_spec
* Don't rerun ohai for ohai_spec when not neededjdm/ohai-func-specJay Mundrawala2016-02-011-3/+1
| | | | Running ohai is slow
* Add missing acl_entry backwards compatibility "require"John Keiser2016-02-011-0/+34
|
* Fix defaults on property_typeJohn Keiser2016-02-011-0/+15
|
* Fix /acls/data_bags local mode pathJohn Keiser2016-02-011-1/+1
|
* Adjust tests for ACLsJohn Keiser2016-02-013-2/+57
|
* add spec helperLamont Granquist2016-01-291-1/+2
| | | | tests won't run in isolation with it.
* Merge pull request #4472 from chef/jdm/fix-fips-filterJay Mundrawala2016-01-272-2/+2
|\ | | | | Fix inverted filter logic for not_fips rspec filter
| * Rename not_fips rspec filter to no_supported_under_fipsjdm/fix-fips-filterJay Mundrawala2016-01-272-2/+2
| |
| * Fix inverted filter logic for not_fips rspec filterJay Mundrawala2016-01-271-1/+1
| |
* | Fix config load expectations for windowsdanielsdeleo2016-01-272-2/+2
| |
* | Reorganize application tests to catch fatalsdanielsdeleo2016-01-271-146/+158
| |
* | Force config file setting to absolute path in chef-clientdanielsdeleo2016-01-271-22/+53
| |
* | Fix nil with properties:John Keiser2016-01-275-158/+187
| | | | | | | | | | | | 1. Warn when default values are invalid. 2. Never validate nil (on set or get) if there is no default. 3. Emit "will be invalid in Chef 13" warning when setting an invalid nil value.
* | Merge pull request #4409 from chef/lcg/suppress-reporter-failuresLamont Granquist2016-01-272-1/+7
|\ \ | |/ |/| Lcg/suppress reporter failures
| * suppress reporter failures by using validate_utf8=falselcg/suppress-reporter-failuresLamont Granquist2016-01-262-1/+7
| | | | | | | | | | | | | | - doesn't turn off the utf8 validation in the rest of the rest API - has to use a different rest object because we have to pass options in the constructor - the handling of Chef::Config in Chef::Client is just awful
* | Merge pull request #4434 from chef/lcg/better-eof-errorsLamont Granquist2016-01-271-3/+26
|\ \ | | | | | | adds EOFError message to handlers
| * | explicit specs for EOFErrorslcg/better-eof-errorsLamont Granquist2016-01-261-3/+26
| | |
* | | Merge pull request #4422 from chef/tm/apt_updateThom May2016-01-272-0/+151
|\ \ \ | | | | | | | | Add an apt_update resource
| * | | fix style nittm/apt_updateThom May2016-01-221-1/+1
| | | |
| * | | respond to review commentsThom May2016-01-222-0/+28
| | | |
| * | | Dependency inject file locationsThom May2016-01-211-3/+33
| | | |
| * | | Add periodic action as the defaultThom May2016-01-201-0/+20
| | | |
| * | | Add an apt_update resourceThom May2016-01-202-0/+73
| | | |
* | | | Enable Chef 12 mode for local mode by defaultdanielsdeleo2016-01-261-233/+406
| | | |
* | | | Fix ambiguous argument warningsdanielsdeleo2016-01-261-2/+2
| | | |
* | | | Merge pull request #4287 from chef/jdm/1.3-fipsJay Mundrawala2016-01-2610-44/+53
|\ \ \ \ | |_|_|/ |/| | | Default Chef with FIPS OpenSSL to use sign v1.3
| * | | Fix client_specjdm/1.3-fipsJay Mundrawala2016-01-261-2/+6
| | | |
| * | | Do openssl initialization in chef-fips test pipelineJay Mundrawala2016-01-251-0/+4
| | | |
| * | | Modify registration_spec to work when fips is enabled in opensslJay Mundrawala2016-01-251-6/+6
| | | | | | | | | | | | | | | | | | | | | | | | We need to ask openssl for the pem whenever we have a private key so that it returns the same format of key (PKCS#1 vs PKCS#8) that openssl generates
| * | | Skip Version0 encrypted databag tests when in fips modeJay Mundrawala2016-01-254-2/+7
| | | | | | | | | | | | | | | | | | | | | | | | aes-256-cbc does not seem to work when openssl is in fips mode. The only other reference I could find to this was: https://access.redhat.com/solutions/176633
| * | | Don't check the key for auth_credentials_specJay Mundrawala2016-01-251-32/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The AuthCredentials class does not do anything special with regards to the key. We should only need to check that the one we passed in, not that it's pem representation. The reason for removing this extra (unneeded) check is because it breaks when openssl is in fips mode. When in that mode, openssl with generate a PKCS#8 pem representation, while the thing that we checked against was a PKCS#1 pem representation.
| * | | Rename openssl-fips to fips and add messagesJay Mundrawala2016-01-252-3/+3
| | | |
| * | | Do openssl initialization from applicationsJay Mundrawala2016-01-252-1/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Some notes: * Add module overrides for fips We need to use the SHA1 module under OpenSSL because the openssl functions called by Digest::SHA1 cause openssl to crash the process. We use the Digest::MD5 over the OpenSSL::MD5 module because md5 is not allowed when in fips mode and causes the process to crash. While we work through these issues, we're going to allow it to pass by compiling the ruby md5 implementation. * Use OpenSSL::Digest::SHA256 instead of Digest::SHA256 Digest::SHA256 is broken in fips mode because it uses unapproved APIs. They cause the process to terminate.
| * | | Use sign v1.3 when fips mode is selectedJay Mundrawala2016-01-251-2/+17
| | | |
| * | | Pass headers to mixlib-authenticationJay Mundrawala2016-01-251-1/+3
| | | |
* | | | Set range of system user/group id to max of 200Jay Mundrawala2016-01-261-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | According to https://abcofaix.wordpress.com/tag/usermod/, the value can be up to 200. We were seeing tests on our aix testers fail with ``` 1) Chef::Provider::User::Useradd action :create when the user does not exist beforehand when a system user is specified ensures the user has the properties of a system user Failure/Error: expect(pw_entry.uid.to_i).to be < uid_min.to_i expected: < 100 got: 101 # ./spec/functional/resource/user/useradd_spec.rb:306:in `block (5 levels) in <top (required)>' ```
* | | | Merge pull request #4231 from chef/lcg/zypper-multipackageLamont Granquist2016-01-251-34/+44
|\ \ \ \ | | | | | | | | | | zypper multipackage patch
| * | | | zypper multipackage patchLamont Granquist2016-01-251-52/+26
| | | | |
| * | | | Added support for Zypper to install multiple packages at onceYorgos Saslis2016-01-251-0/+36
| |/ / / | | | | | | | | | | | | See #3570
* | | | Merge pull request #4455 from chef/tball/nexus7_more_failuresTyler Ball2016-01-251-1/+1
|\ \ \ \ | | | | | | | | | | Seeing a useradd failuer in Nexus7 functional tests
| * | | | wrlinux is a derivative of RHEL and as such the default creation of user ↵tball/nexus7_more_failurestyler-ball2016-01-251-1/+1
| |/ / / | | | | | | | | | | | | home directory is expected
* | | | Fix single-quoted stringsjk/4334John Keiser2016-01-251-22/+22
| | | |
* | | | Fix #4334: don't warn about ambiguous property usageJohn Keiser2016-01-221-0/+28
|/ / / | | | | | | | | | unless using properties on the resource
* | | Using random names in the group_spec so we don't blow away a real accounttyler-ball2016-01-211-3/+3
| | |