1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128
|
#
# Author:: Matt Wrock (<matt@mattwrock.com>)
# Copyright:: Copyright (c) Chef Software Inc.
# License:: Apache License, Version 2.0
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
require "chef-config/fips"
require "spec_helper"
begin
require "win32/registry" unless defined?(Win32::Registry)
rescue LoadError
# not on unix
end
RSpec.describe "ChefConfig.fips?" do
let(:enabled) { "0" }
context "on *nix" do
let(:fips_path) { "/proc/sys/crypto/fips_enabled" }
before(:each) do
allow(ChefUtils).to receive(:windows?).and_return(false)
allow(::File).to receive(:exist?).with(fips_path).and_return(true)
allow(::File).to receive(:read).with(fips_path).and_return(enabled)
end
context "fips file is present and contains 1" do
let(:enabled) { "1" }
it "returns true" do
expect(ChefConfig.fips?).to be(true)
end
end
context "fips file does not contain 1" do
let(:enabled) { "0" }
it "returns false" do
expect(ChefConfig.fips?).to be(false)
end
end
context "fips file is not present" do
before do
allow(::File).to receive(:exist?).with(fips_path).and_return(false)
end
it "returns false" do
expect(ChefConfig.fips?).to be(false)
end
end
end
context "on windows", :windows_only do
let(:fips_key) { 'System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy' }
let(:win_reg_entry) { { "Enabled" => enabled } }
before(:each) do
allow(ChefUtils).to receive(:windows?).and_return(true)
allow(Win32::Registry::HKEY_LOCAL_MACHINE).to receive(:open).with(fips_key, arch).and_yield(win_reg_entry)
end
shared_examples "fips_detection" do
context "fips enabled key is set to 1" do
let(:enabled) { 1 }
it "returns true" do
expect(ChefConfig.fips?).to be(true)
end
end
context "fips enabled key is set to 0" do
let(:enabled) { 0 }
it "returns false" do
expect(ChefConfig.fips?).to be(false)
end
end
context "fips key does not exist" do
before do
allow(Win32::Registry::HKEY_LOCAL_MACHINE).to receive(:open).and_raise(Win32::Registry::Error, 50)
end
it "returns false" do
expect(ChefConfig.fips?).to be(false)
end
end
end
context "on 32 bit ruby" do
let(:arch) { Win32::Registry::KEY_READ | 0x100 }
before { stub_const("::RbConfig::CONFIG", { "target_cpu" => "i386" } ) }
it_behaves_like "fips_detection"
end
context "on 64 bit ruby" do
let(:arch) { Win32::Registry::KEY_READ | 0x200 }
before { stub_const("::RbConfig::CONFIG", { "target_cpu" => "x86_64" } ) }
it_behaves_like "fips_detection"
end
context "on unknown ruby" do
let(:arch) { Win32::Registry::KEY_READ }
before { stub_const("::RbConfig::CONFIG", { "target_cpu" => nil } ) }
it_behaves_like "fips_detection"
end
end
end
|