summaryrefslogtreecommitdiff
path: root/chef-config/spec/unit/fips_spec.rb
blob: d53096cead2cfd0de115e71ad39457f6dfcf6f26 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
#
# Author:: Matt Wrock (<matt@mattwrock.com>)
# Copyright:: Copyright (c) 2016-2017, Chef Software Inc.
# License:: Apache License, Version 2.0
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#

require "chef-config/fips"
require "spec_helper"

begin
  require "win32/registry"
rescue LoadError
  # not on unix
end

RSpec.describe "ChefConfig.fips?" do
  let(:enabled) { "0" }

  context "on *nix" do
    let(:fips_path) { "/proc/sys/crypto/fips_enabled" }

    before(:each) do
      allow(ChefConfig).to receive(:windows?).and_return(false)
      allow(::File).to receive(:exist?).with(fips_path).and_return(true)
      allow(::File).to receive(:read).with(fips_path).and_return(enabled)
    end

    context "fips file is present and contains 1" do
      let(:enabled) { "1" }

      it "returns true" do
        expect(ChefConfig.fips?).to be(true)
      end
    end

    context "fips file does not contain 1" do
      let(:enabled) { "0" }

      it "returns false" do
        expect(ChefConfig.fips?).to be(false)
      end
    end

    context "fips file is not present" do
      before do
        allow(::File).to receive(:exist?).with(fips_path).and_return(false)
      end

      it "returns false" do
        expect(ChefConfig.fips?).to be(false)
      end
    end
  end

  context "on windows", :windows_only do
    let(:fips_key) { 'System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy' }
    let(:win_reg_entry) { { "Enabled" => enabled } }

    before(:each) do
      allow(ChefConfig).to receive(:windows?).and_return(true)
      allow(Win32::Registry::HKEY_LOCAL_MACHINE).to receive(:open).with(fips_key, arch).and_yield(win_reg_entry)
    end

    shared_examples "fips_detection" do
      context "fips enabled key is set to 1" do
        let(:enabled) { 1 }

        it "returns true" do
          expect(ChefConfig.fips?).to be(true)
        end
      end

      context "fips enabled key is set to 0" do
        let(:enabled) { 0 }

        it "returns false" do
          expect(ChefConfig.fips?).to be(false)
        end
      end

      context "fips key does not exist" do
        before do
          allow(Win32::Registry::HKEY_LOCAL_MACHINE).to receive(:open).and_raise(Win32::Registry::Error, 50)
        end

        it "returns false" do
          expect(ChefConfig.fips?).to be(false)
        end
      end
    end

    context "on 32 bit ruby" do
      let(:arch) { Win32::Registry::KEY_READ | 0x100 }

      before { stub_const("::RbConfig::CONFIG", { "target_cpu" => "i386" } ) }

      it_behaves_like "fips_detection"
    end

    context "on 64 bit ruby" do
      let(:arch) { Win32::Registry::KEY_READ | 0x200 }

      before { stub_const("::RbConfig::CONFIG", { "target_cpu" => "x86_64" } ) }

      it_behaves_like "fips_detection"
    end

    context "on unknown ruby" do
      let(:arch) { Win32::Registry::KEY_READ }

      before { stub_const("::RbConfig::CONFIG", { "target_cpu" => nil } ) }

      it_behaves_like "fips_detection"
    end
  end
end