From 1b0da9c71c766e82705b1548125965d959d8840c Mon Sep 17 00:00:00 2001 From: Nathan Williams Date: Fri, 11 Mar 2016 18:11:49 -0800 Subject: add systemd_unit resource/provider --- spec/unit/provider/systemd_unit_spec.rb | 797 ++++++++++++++++++++++++++++++++ spec/unit/resource/systemd_unit_spec.rb | 133 ++++++ 2 files changed, 930 insertions(+) create mode 100644 spec/unit/provider/systemd_unit_spec.rb create mode 100644 spec/unit/resource/systemd_unit_spec.rb (limited to 'spec') diff --git a/spec/unit/provider/systemd_unit_spec.rb b/spec/unit/provider/systemd_unit_spec.rb new file mode 100644 index 0000000000..e71885f32d --- /dev/null +++ b/spec/unit/provider/systemd_unit_spec.rb @@ -0,0 +1,797 @@ +# +# Author:: Nathan Williams () +# Copyright:: Copyright (c), Nathan Williams +# License:: Apache License, Version 2.0 +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +require "spec_helper" + +describe Chef::Provider::SystemdUnit do + let(:node) do + Chef::Node.new.tap do |n| + n.default["etc"] = {} + n.default["etc"]["passwd"] = { + "joe" => { + "uid" => 1_000, + }, + } + end + end + + let(:events) { Chef::EventDispatch::Dispatcher.new } + let(:run_context) { Chef::RunContext.new(node, {}, events) } + let(:unit_name) { "sysstat-collect.timer" } + let(:user_name) { "joe" } + let(:current_resource) { Chef::Resource::SystemdUnit.new(unit_name) } + let(:new_resource) { Chef::Resource::SystemdUnit.new(unit_name) } + let(:provider) { Chef::Provider::SystemdUnit.new(new_resource, run_context) } + let(:unit_path_system) { "/etc/systemd/system/sysstat-collect.timer" } + let(:unit_path_user) { "/etc/systemd/user/sysstat-collect.timer" } + let(:unit_content_string) { "[Unit]\nDescription=Run system activity accounting tool every 10 minutes\n\n[Timer]\nOnCalendar=*:00/10\n\n[Install]\nWantedBy=sysstat.service" } + + let(:unit_content_hash) do + { + "Unit" => { + "Description" => "Run system activity accounting tool every 10 minutes", + }, + "Timer" => { + "OnCalendar" => "*:00/10", + }, + "Install" => { + "WantedBy" => "sysstat.service", + }, + } + end + + let(:user_cmd_opts) do + { + "user" => "joe", + "environment" => { + "DBUS_SESSION_BUS_ADDRESS" => "unix:path=/run/user/1000/bus", + }, + } + end + + let(:shell_out_success) do + double("shell_out_with_systems_locale", :exitstatus => 0, :error? => false) + end + + let(:shell_out_failure) do + double("shell_out_with_systems_locale", :exitstatus => 1, :error? => true) + end + + let(:shell_out_masked) do + double("shell_out_with_systems_locale", :exit_status => 0, :error? => false, :stdout => "masked") + end + + let(:shell_out_static) do + double("shell_out_with_systems_locale", :exit_status => 0, :error? => false, :stdout => "static") + end + + before(:each) do + allow(Chef::Resource::SystemdUnit).to receive(:new) + .with(unit_name) + .and_return(current_resource) + end + + describe "load_current_resource" do + before(:each) do + allow(provider).to receive(:active?).and_return(false) + allow(provider).to receive(:enabled?).and_return(false) + allow(provider).to receive(:masked?).and_return(false) + allow(provider).to receive(:static?).and_return(false) + end + + it "should create a current resource with the name of the new resource" do + expect(Chef::Resource::SystemdUnit).to receive(:new) + .with(unit_name) + .and_return(current_resource) + provider.load_current_resource + end + + it "should check if the unit is active" do + expect(provider).to receive(:active?) + provider.load_current_resource + end + + it "sets the active property to true if the unit is active" do + allow(provider).to receive(:active?).and_return(true) + provider.load_current_resource + expect(current_resource.active).to be true + end + + it "sets the active property to false if the unit is not active" do + allow(provider).to receive(:active?).and_return(false) + provider.load_current_resource + expect(current_resource.active).to be false + end + + it "should check if the unit is enabled" do + expect(provider).to receive(:enabled?) + provider.load_current_resource + end + + it "sets the enabled property to true if the unit is enabled" do + allow(provider).to receive(:enabled?).and_return(true) + provider.load_current_resource + expect(current_resource.enabled).to be true + end + + it "sets the enabled property to false if the unit is not enabled" do + allow(provider).to receive(:enabled?).and_return(false) + provider.load_current_resource + expect(current_resource.enabled).to be false + end + + it "should check if the unit is masked" do + expect(provider).to receive(:masked?) + provider.load_current_resource + end + + it "sets the masked property to true if the unit is masked" do + allow(provider).to receive(:masked?).and_return(true) + provider.load_current_resource + expect(current_resource.masked).to be true + end + + it "sets the masked property to false if the unit is masked" do + allow(provider).to receive(:masked?).and_return(false) + provider.load_current_resource + expect(current_resource.masked).to be false + end + + it "should check if the unit is static" do + expect(provider).to receive(:static?) + provider.load_current_resource + end + + it "sets the static property to true if the unit is static" do + allow(provider).to receive(:static?).and_return(true) + provider.load_current_resource + expect(current_resource.static).to be true + end + + it "sets the static property to false if the unit is not static" do + allow(provider).to receive(:static?).and_return(false) + provider.load_current_resource + expect(current_resource.static).to be false + end + + it "loads the system unit content if the file exists and user is not set" do + allow(File).to receive(:exist?) + .with(unit_path_system) + .and_return(true) + allow(File).to receive(:read) + .with(unit_path_system) + .and_return(unit_content_string) + + expect(File).to receive(:exist?) + .with(unit_path_system) + expect(File).to receive(:read) + .with(unit_path_system) + provider.load_current_resource + expect(current_resource.content).to eq(unit_content_string) + end + + it "does not load the system unit content if the unit file is not present and the user is not set" do + allow(File).to receive(:exist?) + .with(unit_path_system) + .and_return(false) + expect(File).to_not receive(:read) + .with(unit_path_system) + provider.load_current_resource + expect(current_resource.content).to eq(nil) + end + + it "loads the user unit content if the file exists and user is set" do + new_resource.user("joe") + allow(File).to receive(:exist?) + .with(unit_path_user) + .and_return(true) + allow(File).to receive(:read) + .with(unit_path_user) + .and_return(unit_content_string) + expect(File).to receive(:exist?) + .with(unit_path_user) + expect(File).to receive(:read) + .with(unit_path_user) + provider.load_current_resource + expect(current_resource.content).to eq(unit_content_string) + end + + it "does not load the user unit if the file does not exist and user is set" do + new_resource.user("joe") + allow(File).to receive(:exist?) + .with(unit_path_user) + .and_return(false) + expect(File).to_not receive(:read) + .with(unit_path_user) + provider.load_current_resource + expect(current_resource.content).to eq(nil) + end + end + + %w{/bin/systemctl /usr/bin/systemctl}.each do |systemctl_path| + describe "when systemctl path is #{systemctl_path}" do + before(:each) do + provider.current_resource = current_resource + allow(provider).to receive(:which) + .with("systemctl") + .and_return(systemctl_path) + end + + describe "creates/deletes the unit" do + it "creates the unit file when it does not exist" do + allow(provider).to receive(:manage_unit_file) + .with(:create) + .and_return(true) + allow(provider).to receive(:daemon_reload) + .and_return(true) + expect(provider).to receive(:manage_unit_file).with(:create) + provider.action_create + end + + it "creates the file when the unit content is different" do + allow(provider).to receive(:manage_unit_file) + .with(:create) + .and_return(true) + allow(provider).to receive(:daemon_reload) + .and_return(true) + expect(provider).to receive(:manage_unit_file).with(:create) + provider.action_create + end + + it "does not create the unit file when the content is the same" do + current_resource.content(unit_content_string) + allow(provider).to receive(:manage_unit_file).with(:create) + allow(provider).to receive(:daemon_reload) + .and_return(true) + expect(provider).to_not receive(:manage_unit_file) + provider.action_create + end + + it "triggers a daemon-reload when creating a unit with triggers_reload" do + allow(provider).to receive(:manage_unit_file).with(:create) + expect(new_resource.triggers_reload).to eq true + allow(provider).to receive(:shell_out_with_systems_locale!) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} daemon-reload") + provider.action_create + end + + it "triggers a daemon-reload when deleting a unit with triggers_reload" do + allow(File).to receive(:exist?) + .with(unit_path_system) + .and_return(true) + allow(provider).to receive(:manage_unit_file).with(:delete) + expect(new_resource.triggers_reload).to eq true + allow(provider).to receive(:shell_out_with_systems_locale!) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} daemon-reload") + provider.action_delete + end + + it "does not trigger a daemon-reload when creating a unit without triggers_reload" do + new_resource.triggers_reload(false) + allow(provider).to receive(:manage_unit_file).with(:create) + allow(provider).to receive(:shell_out_with_systems_locale!) + expect(provider).to_not receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} daemon-reload") + provider.action_create + end + + it "does not trigger a daemon-reload when deleting a unit without triggers_reload" do + new_resource.triggers_reload(false) + allow(File).to receive(:exist?) + .with(unit_path_system) + .and_return(true) + allow(provider).to receive(:manage_unit_file).with(:delete) + allow(provider).to receive(:shell_out_with_systems_locale!) + expect(provider).to_not receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} daemon-reload") + provider.action_delete + end + + context "when a user is specified" do + it "deletes the file when it exists" do + new_resource.user("joe") + allow(File).to receive(:exist?) + .with(unit_path_user) + .and_return(true) + allow(provider).to receive(:manage_unit_file) + .with(:delete) + .and_return(true) + allow(provider).to receive(:daemon_reload) + expect(provider).to receive(:manage_unit_file).with(:delete) + provider.action_delete + end + + it "does not delete the file when it is absent" do + new_resource.user("joe") + allow(File).to receive(:exist?) + .with(unit_path_user) + .and_return(false) + allow(provider).to receive(:manage_unit_file).with(:delete) + expect(provider).to_not receive(:manage_unit_file) + provider.action_delete + end + end + + context "when no user is specified" do + it "deletes the file when it exists" do + allow(File).to receive(:exist?) + .with(unit_path_system) + .and_return(true) + allow(provider).to receive(:manage_unit_file) + .with(:delete) + allow(provider).to receive(:daemon_reload) + expect(provider).to receive(:manage_unit_file).with(:delete) + provider.action_delete + end + + it "does not delete the file when it is absent" do + allow(File).to receive(:exist?) + .with(unit_path_system) + .and_return(false) + allow(provider).to receive(:manage_unit_file).with(:delete) + allow(provider).to receive(:daemon_reload) + expect(provider).to_not receive(:manage_unit_file) + provider.action_delete + end + end + end + + describe "enables/disables the unit" do + context "when a user is specified" do + it "enables the unit when it is disabled" do + current_resource.user(user_name) + current_resource.enabled(false) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user enable #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_enable + end + + it "does not enable the unit when it is enabled" do + current_resource.user(user_name) + current_resource.enabled(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_enable + end + + it "does not enable the unit when it is static" do + current_resource.user(user_name) + current_resource.static(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_enable + end + + it "disables the unit when it is enabled" do + current_resource.user(user_name) + current_resource.enabled(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user disable #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_disable + end + + it "does not disable the unit when it is disabled" do + current_resource.user(user_name) + current_resource.enabled(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_disable + end + + it "does not disable the unit when it is static" do + current_resource.user(user_name) + current_resource.static(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_disable + end + end + + context "when no user is specified" do + it "enables the unit when it is disabled" do + current_resource.enabled(false) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system enable #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_enable + end + + it "does not enable the unit when it is enabled" do + current_resource.enabled(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_enable + end + + it "does not enable the unit when it is static" do + current_resource.static(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_enable + end + + it "disables the unit when it is enabled" do + current_resource.enabled(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system disable #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_disable + end + + it "does not disable the unit when it is disabled" do + current_resource.enabled(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_disable + end + + it "does not disable the unit when it is static" do + current_resource.user(user_name) + current_resource.static(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_disable + end + end + end + + describe "masks/unmasks the unit" do + context "when a user is specified" do + it "masks the unit when it is unmasked" do + current_resource.user(user_name) + current_resource.masked(false) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user mask #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_mask + end + + it "does not mask the unit when it is masked" do + current_resource.user(user_name) + current_resource.masked(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_mask + end + + it "unmasks the unit when it is masked" do + current_resource.user(user_name) + current_resource.masked(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user unmask #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_unmask + end + + it "does not unmask the unit when it is unmasked" do + current_resource.user(user_name) + current_resource.masked(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_unmask + end + end + + context "when no user is specified" do + it "masks the unit when it is unmasked" do + current_resource.masked(false) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system mask #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_mask + end + + it "does not mask the unit when it is masked" do + current_resource.masked(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_mask + end + + it "unmasks the unit when it is masked" do + current_resource.masked(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system unmask #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_unmask + end + + it "does not unmask the unit when it is unmasked" do + current_resource.masked(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_unmask + end + end + end + + describe "starts/stops the unit" do + context "when a user is specified" do + it "starts the unit when it is inactive" do + current_resource.user(user_name) + current_resource.active(false) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user start #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_start + end + + it "does not start the unit when it is active" do + current_resource.user(user_name) + current_resource.active(true) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_start + end + + it "stops the unit when it is active" do + current_resource.user(user_name) + current_resource.active(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user stop #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_stop + end + + it "does not stop the unit when it is inactive" do + current_resource.user(user_name) + current_resource.active(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_stop + end + end + + context "when no user is specified" do + it "starts the unit when it is inactive" do + current_resource.active(false) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system start #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_start + end + + it "does not start the unit when it is active" do + current_resource.active(true) + expect(provider).to_not receive(:shell_out_with_systems_locale!) + provider.action_start + end + + it "stops the unit when it is active" do + current_resource.active(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system stop #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_stop + end + + it "does not stop the unit when it is inactive" do + current_resource.active(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_stop + end + end + end + + describe "restarts/reloads the unit" do + context "when a user is specified" do + it "restarts the unit" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user restart #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_restart + end + + it "reloads the unit if active" do + current_resource.user(user_name) + current_resource.active(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --user reload #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + provider.action_reload + end + + it "does not reload if the unit is inactive" do + current_resource.user(user_name) + current_resource.active(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_reload + end + end + + context "when no user is specified" do + it "restarts the unit" do + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system restart #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_restart + end + + it "reloads the unit if active" do + current_resource.active(true) + expect(provider).to receive(:shell_out_with_systems_locale!) + .with("#{systemctl_path} --system reload #{unit_name}", {}) + .and_return(shell_out_success) + provider.action_reload + end + + it "does not reload the unit if inactive" do + current_resource.active(false) + expect(provider).not_to receive(:shell_out_with_systems_locale!) + provider.action_reload + end + end + end + + describe "#active?" do + before(:each) do + provider.current_resource = current_resource + allow(provider).to receive(:which).with("systemctl").and_return("#{systemctl_path}") + end + + context "when a user is specified" do + it "returns true when unit is active" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user is-active #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + expect(provider.active?).to be true + end + + it "returns false when unit is inactive" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user is-active #{unit_name}", user_cmd_opts) + .and_return(shell_out_failure) + expect(provider.active?).to be false + end + end + + context "when no user is specified" do + it "returns true when unit is active" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system is-active #{unit_name}", {}) + .and_return(shell_out_success) + expect(provider.active?).to be true + end + + it "returns false when unit is not active" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system is-active #{unit_name}", {}) + .and_return(shell_out_failure) + expect(provider.active?).to be false + end + end + end + + describe "#enabled?" do + before(:each) do + provider.current_resource = current_resource + allow(provider).to receive(:which).with("systemctl").and_return("#{systemctl_path}") + end + + context "when a user is specified" do + it "returns true when unit is enabled" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts) + .and_return(shell_out_success) + expect(provider.enabled?).to be true + end + + it "returns false when unit is not enabled" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts) + .and_return(shell_out_failure) + expect(provider.enabled?).to be false + end + end + + context "when no user is specified" do + it "returns true when unit is enabled" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system is-enabled #{unit_name}", {}) + .and_return(shell_out_success) + expect(provider.enabled?).to be true + end + + it "returns false when unit is not enabled" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system is-enabled #{unit_name}", {}) + .and_return(shell_out_failure) + expect(provider.enabled?).to be false + end + end + end + + describe "#masked?" do + before(:each) do + provider.current_resource = current_resource + allow(provider).to receive(:which).with("systemctl").and_return("#{systemctl_path}") + end + + context "when a user is specified" do + it "returns true when the unit is masked" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user status #{unit_name}", user_cmd_opts) + .and_return(shell_out_masked) + expect(provider.masked?).to be true + end + + it "returns false when the unit is not masked" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user status #{unit_name}", user_cmd_opts) + .and_return(shell_out_static) + expect(provider.masked?).to be false + end + end + + context "when no user is specified" do + it "returns true when the unit is masked" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system status #{unit_name}", {}) + .and_return(shell_out_masked) + expect(provider.masked?).to be true + end + + it "returns false when the unit is not masked" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system status #{unit_name}", {}) + .and_return(shell_out_static) + expect(provider.masked?).to be false + end + end + end + + describe "#static?" do + before(:each) do + provider.current_resource = current_resource + allow(provider).to receive(:which).with("systemctl").and_return("#{systemctl_path}") + end + + context "when a user is specified" do + it "returns true when the unit is static" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts) + .and_return(shell_out_static) + expect(provider.static?).to be true + end + + it "returns false when the unit is not static" do + current_resource.user(user_name) + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts) + .and_return(shell_out_masked) + expect(provider.static?).to be false + end + end + + context "when no user is specified" do + it "returns true when the unit is static" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system is-enabled #{unit_name}", {}) + .and_return(shell_out_static) + expect(provider.static?).to be true + end + + it "returns false when the unit is not static" do + expect(provider).to receive(:shell_out) + .with("#{systemctl_path} --system is-enabled #{unit_name}", {}) + .and_return(shell_out_masked) + expect(provider.static?).to be false + end + end + end + end + end +end diff --git a/spec/unit/resource/systemd_unit_spec.rb b/spec/unit/resource/systemd_unit_spec.rb new file mode 100644 index 0000000000..7e46872525 --- /dev/null +++ b/spec/unit/resource/systemd_unit_spec.rb @@ -0,0 +1,133 @@ +# +# Author:: Nathan Williams () +# Copyright:: Copyright 2016, Nathan Williams +# License:: Apache License, Version 2.0 +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +require "spec_helper" + +describe Chef::Resource::SystemdUnit do + before(:each) do + @resource = Chef::Resource::SystemdUnit.new("sysstat-collect.timer") + end + + let(:unit_content_string) { "[Unit]\nDescription = Run system activity accounting tool every 10 minutes\n\n[Timer]\nOnCalendar = *:00/10\n\n[Install]\nWantedBy = sysstat.service\n" } + + let(:unit_content_hash) do + { + "Unit" => { + "Description" => "Run system activity accounting tool every 10 minutes", + }, + "Timer" => { + "OnCalendar" => "*:00/10", + }, + "Install" => { + "WantedBy" => "sysstat.service", + }, + } + end + + it "creates a new Chef::Resource::SystemdUnit" do + expect(@resource).to be_a_kind_of(Chef::Resource) + expect(@resource).to be_a_kind_of(Chef::Resource::SystemdUnit) + end + + it "should have a name" do + expect(@resource.name).to eql("sysstat-collect.timer") + end + + it "has a default action of nothing" do + expect(@resource.action).to eql([:nothing]) + end + + it "supports appropriate unit actions" do + expect { @resource.action :create }.not_to raise_error + expect { @resource.action :delete }.not_to raise_error + expect { @resource.action :enable }.not_to raise_error + expect { @resource.action :disable }.not_to raise_error + expect { @resource.action :mask }.not_to raise_error + expect { @resource.action :unmask }.not_to raise_error + expect { @resource.action :start }.not_to raise_error + expect { @resource.action :stop }.not_to raise_error + expect { @resource.action :restart }.not_to raise_error + expect { @resource.action :reload }.not_to raise_error + expect { @resource.action :wrong }.to raise_error(ArgumentError) + end + + it "accepts boolean state properties" do + expect { @resource.active false }.not_to raise_error + expect { @resource.active true }.not_to raise_error + expect { @resource.active "yes" }.to raise_error(ArgumentError) + + expect { @resource.enabled true }.not_to raise_error + expect { @resource.enabled false }.not_to raise_error + expect { @resource.enabled "no" }.to raise_error(ArgumentError) + + expect { @resource.masked true }.not_to raise_error + expect { @resource.masked false }.not_to raise_error + expect { @resource.masked :nope }.to raise_error(ArgumentError) + + expect { @resource.static true }.not_to raise_error + expect { @resource.static false }.not_to raise_error + expect { @resource.static "yep" }.to raise_error(ArgumentError) + end + + it "accepts the content property" do + expect { @resource.content nil }.not_to raise_error + expect { @resource.content "test" }.not_to raise_error + expect { @resource.content({}) }.not_to raise_error + expect { @resource.content 5 }.to raise_error(ArgumentError) + end + + it "accepts the user property" do + expect { @resource.user nil }.not_to raise_error + expect { @resource.user "deploy" }.not_to raise_error + expect { @resource.user 5 }.to raise_error(ArgumentError) + end + + it "accepts the triggers_reload property" do + expect { @resource.triggers_reload true }.not_to raise_error + expect { @resource.triggers_reload false }.not_to raise_error + expect { @resource.triggers_reload "no" }.to raise_error(ArgumentError) + end + + it "reports its state" do + @resource.active true + @resource.enabled true + @resource.masked false + @resource.static false + @resource.content "test" + state = @resource.state + expect(state[:active]).to eq(true) + expect(state[:enabled]).to eq(true) + expect(state[:masked]).to eq(false) + expect(state[:static]).to eq(false) + expect(state[:content]).to eq("test") + end + + it "returns the unit name as its identity" do + expect(@resource.identity).to eq("sysstat-collect.timer") + end + + it "serializes to ini with a string-formatted content property" do + @resource.content(unit_content_string) + expect(@resource.to_ini).to eq unit_content_string + end + + it "serializes to ini with a hash-formatted content property" do + @resource.content(unit_content_hash) + expect(@resource.to_ini).to eq unit_content_string + end +end -- cgit v1.2.1