1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
|
require 'spec_helper'
require 'puppet/http'
describe Puppet::HTTP::Factory do
before(:all) do
ENV['http_proxy'] = nil
ENV['HTTP_PROXY'] = nil
end
let(:site) { Puppet::HTTP::Site.new('https', 'www.example.com', 443) }
def create_connection(site)
factory = described_class.new
factory.create_connection(site)
end
it 'creates a connection for the site' do
conn = create_connection(site)
expect(conn.use_ssl?).to be_truthy
expect(conn.address).to eq(site.host)
expect(conn.port).to eq(site.port)
end
it 'creates a connection that has not yet been started' do
conn = create_connection(site)
expect(conn).to_not be_started
end
it 'creates a connection supporting at least HTTP 1.1' do
conn = create_connection(site)
expect(conn.class.version_1_1? || conn.class.version_1_2?).to be_truthy
end
context "proxy settings" do
let(:proxy_host) { 'myhost' }
let(:proxy_port) { 432 }
let(:proxy_user) { 'mo' }
let(:proxy_pass) { 'password' }
it "should not set a proxy if the http_proxy_host setting is 'none'" do
Puppet[:http_proxy_host] = 'none'
conn = create_connection(site)
expect(conn.proxy_address).to be_nil
end
it 'should not set a proxy if a no_proxy env var matches the destination' do
Puppet[:http_proxy_host] = proxy_host
Puppet[:http_proxy_port] = proxy_port
Puppet::Util.withenv('NO_PROXY' => site.host) do
conn = create_connection(site)
expect(conn.proxy_address).to be_nil
expect(conn.proxy_port).to be_nil
end
end
it 'should not set a proxy if the no_proxy setting matches the destination' do
Puppet[:http_proxy_host] = proxy_host
Puppet[:http_proxy_port] = proxy_port
Puppet[:no_proxy] = site.host
conn = create_connection(site)
expect(conn.proxy_address).to be_nil
expect(conn.proxy_port).to be_nil
end
it 'sets proxy_address' do
Puppet[:http_proxy_host] = proxy_host
conn = create_connection(site)
expect(conn.proxy_address).to eq(proxy_host)
end
it 'sets proxy address and port' do
Puppet[:http_proxy_host] = proxy_host
Puppet[:http_proxy_port] = proxy_port
conn = create_connection(site)
expect(conn.proxy_port).to eq(proxy_port)
end
it 'sets proxy user and password' do
Puppet[:http_proxy_host] = proxy_host
Puppet[:http_proxy_port] = proxy_port
Puppet[:http_proxy_user] = proxy_user
Puppet[:http_proxy_password] = proxy_pass
conn = create_connection(site)
expect(conn.proxy_user).to eq(proxy_user)
expect(conn.proxy_pass).to eq(proxy_pass)
end
end
context 'socket timeouts' do
it 'sets open timeout' do
Puppet[:http_connect_timeout] = "10s"
conn = create_connection(site)
expect(conn.open_timeout).to eq(10)
end
it 'sets read timeout' do
Puppet[:http_read_timeout] = "2m"
conn = create_connection(site)
expect(conn.read_timeout).to eq(120)
end
end
it "disables ruby's http_keepalive_timeout" do
conn = create_connection(site)
expect(conn.keep_alive_timeout).to eq(2147483647)
end
it "disables ruby's max retry" do
conn = create_connection(site)
expect(conn.max_retries).to eq(0)
end
context 'source address' do
it 'defaults to system-defined' do
conn = create_connection(site)
expect(conn.local_host).to be(nil)
end
it 'sets the local_host address' do
Puppet[:sourceaddress] = "127.0.0.1"
conn = create_connection(site)
expect(conn.local_host).to eq('127.0.0.1')
end
end
context 'tls' do
it "sets the minimum version to TLS 1.0", if: RUBY_VERSION.to_f >= 2.5 do
conn = create_connection(site)
expect(conn.min_version).to eq(OpenSSL::SSL::TLS1_VERSION)
end
it "defaults to ciphersuites providing 128 bits of security or greater" do
conn = create_connection(site)
expect(conn.ciphers).to eq("ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256")
end
it "can be restricted to TLSv1.3 ciphers" do
tls13_ciphers = "TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"
Puppet[:ciphers] = tls13_ciphers
conn = create_connection(site)
expect(conn.ciphers).to eq(tls13_ciphers)
end
end
end
|