1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61
|
require 'spec_helper'
require 'puppet/ssl/certificate_request_attributes'
describe Puppet::SSL::CertificateRequestAttributes do
let(:expected) do
{
"custom_attributes" => {
"1.3.6.1.4.1.34380.2.2"=>[3232235521, 3232235777], # system IPs in hex
"1.3.6.1.4.1.34380.2.0"=>"hostname.domain.com",
}
}
end
let(:csr_attributes_hash) { expected.dup }
let(:csr_attributes_path) { '/some/where/csr_attributes.yaml' }
let(:csr_attributes) { Puppet::SSL::CertificateRequestAttributes.new(csr_attributes_path) }
it "initializes with a path" do
expect(csr_attributes.path).to eq(csr_attributes_path)
end
describe "loading" do
it "returns nil when loading from a non-existent file" do
expect(csr_attributes.load).to be_falsey
end
context "with an available attributes file" do
before do
Puppet::FileSystem.expects(:exist?).with(csr_attributes_path).returns(true)
Puppet::Util::Yaml.expects(:load_file).with(csr_attributes_path, {}).returns(csr_attributes_hash)
end
it "loads csr attributes from a file when the file is present" do
expect(csr_attributes.load).to be_truthy
end
it "exposes custom_attributes" do
csr_attributes.load
expect(csr_attributes.custom_attributes).to eq(expected['custom_attributes'])
end
it "returns an empty hash if custom_attributes points to nil" do
csr_attributes_hash["custom_attributes"] = nil
csr_attributes.load
expect(csr_attributes.custom_attributes).to eq({})
end
it "returns an empty hash if custom_attributes key is not present" do
csr_attributes_hash.delete("custom_attributes")
csr_attributes.load
expect(csr_attributes.custom_attributes).to eq({})
end
it "raise a Puppet::Error if an unexpected root key is defined" do
csr_attributes_hash['unintentional'] = 'data'
expect { csr_attributes.load }.to raise_error(Puppet::Error, /unexpected attributes.*unintentional/)
end
end
end
end
|