summaryrefslogtreecommitdiff
path: root/spec/unit/knife/data_bag_edit_spec.rb
blob: 6f19b5e63e75a35c0a3e45e302232592546846d6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
#
# Author:: Seth Falcon (<seth@opscode.com>)
# Copyright:: Copyright 2010 Opscode, Inc.
# License:: Apache License, Version 2.0
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#

require 'spec_helper'
require 'tempfile'

describe Chef::Knife::DataBagEdit do
  before do
    Chef::Config[:node_name] = "webmonkey.example.com"
    knife.name_args = [bag_name, item_name]
    allow(knife).to receive(:config).and_return(config)
  end

  let(:knife) do
    k = Chef::Knife::DataBagEdit.new
    allow(k).to receive(:rest).and_return(rest)
    allow(k.ui).to receive(:stdout).and_return(stdout)
    k
  end

  let(:raw_hash) { {"login_name" => "alphaomega", "id" => "item_name"} }
  let(:db) { Chef::DataBagItem.from_hash(raw_hash)}
  let(:raw_edited_hash) { {"login_name" => "rho", "id" => "item_name", "new_key" => "new_value"} }

  let(:rest) { double("Chef::REST") }
  let(:stdout) { StringIO.new }

  let(:bag_name) { "sudoing_admins" }
  let(:item_name) { "ME" }

  let(:secret) { "abc123SECRET" }

  let(:config) { {} }

  let(:is_encrypted?) { false }
  let(:transmitted_hash) { raw_edited_hash }
  let(:data_to_edit) { db }

  shared_examples_for "editing a data bag" do
    it "correctly edits then uploads the data bag" do
      expect(Chef::DataBagItem).to receive(:load).with(bag_name, item_name).and_return(db)
      expect(knife).to receive(:encrypted?).with(db.raw_data).and_return(is_encrypted?)
      expect(knife).to receive(:edit_data).with(data_to_edit).and_return(raw_edited_hash)
      expect(rest).to receive(:put_rest).with("data/#{bag_name}/#{item_name}", transmitted_hash).ordered

      knife.run
    end
  end

  it "requires data bag and item arguments" do
    knife.name_args = []
    expect(stdout).to receive(:puts).twice.with(anything)
    expect {knife.run}.to exit_with_code(1)
    expect(stdout.string).to eq("")
  end

  context "when no secret is provided" do
    include_examples "editing a data bag"
  end

  context "when config[:print_after] is set" do
    let(:config) { {:print_after => true} }
    before do
      expect(knife.ui).to receive(:output).with(raw_edited_hash)
    end

    include_examples "editing a data bag"
  end

  context "when a secret is provided" do
    let!(:enc_raw_hash) { Chef::EncryptedDataBagItem.encrypt_data_bag_item(raw_hash, secret) }
    let!(:enc_edited_hash) { Chef::EncryptedDataBagItem.encrypt_data_bag_item(raw_edited_hash, secret) }
    let(:transmitted_hash) { enc_edited_hash }

    before(:each) do
      expect(knife).to receive(:read_secret).at_least(1).times.and_return(secret)
      expect(Chef::EncryptedDataBagItem).to receive(:encrypt_data_bag_item).with(raw_edited_hash, secret).and_return(enc_edited_hash)
    end

    context "the data bag starts encrypted" do
      let(:is_encrypted?) { true }
      let(:db) { Chef::DataBagItem.from_hash(enc_raw_hash) }
      # If the data bag is encrypted, it gets passed to `edit` as a hash.  Otherwise, it gets passed as a DataBag
      let (:data_to_edit) { raw_hash }

      before(:each) do
        expect(knife).to receive(:encryption_secret_provided_ignore_encrypt_flag?).and_return(true)
      end

      include_examples "editing a data bag"
    end

    context "the data bag starts unencrypted" do
      before(:each) do
        expect(knife).to receive(:encryption_secret_provided_ignore_encrypt_flag?).exactly(0).times
        expect(knife).to receive(:encryption_secret_provided?).and_return(true)
      end

      include_examples "editing a data bag"
    end
  end

  it "fails to edit an encrypted data bag if the secret is missing" do
    expect(Chef::DataBagItem).to receive(:load).with(bag_name, item_name).and_return(db)
    expect(knife).to receive(:encrypted?).with(db.raw_data).and_return(true)
    expect(knife).to receive(:encryption_secret_provided_ignore_encrypt_flag?).and_return(false)

    expect(knife.ui).to receive(:fatal).with("You cannot edit an encrypted data bag without providing the secret.")
    expect {knife.run}.to exit_with_code(1)
  end

end