2016-02-21 03:00:52 +00:00
|
|
|
# author: Dominik Richter
|
|
|
|
# author: Christoph Hartmann
|
|
|
|
require 'helper'
|
|
|
|
|
|
|
|
describe Fetchers::Url do
|
|
|
|
it 'registers with the fetchers registry' do
|
|
|
|
reg = Inspec::Fetcher.registry
|
2017-06-15 16:10:47 +00:00
|
|
|
_(reg['url']).must_equal Fetchers::Url
|
2016-02-21 03:00:52 +00:00
|
|
|
end
|
|
|
|
|
2016-02-21 20:32:56 +00:00
|
|
|
describe 'testing different urls' do
|
2016-09-20 10:36:23 +00:00
|
|
|
# We don't use the MockLoader here becuase it produces tarballs
|
|
|
|
# with different sha's on each run
|
|
|
|
let(:expected_shasum) { "98b1ae45059b004178a8eee0c1f6179dcea139c0fd8a69ee47a6f02d97af1f17" }
|
|
|
|
let(:mock_open) {
|
|
|
|
m = Minitest::Mock.new
|
|
|
|
m.expect :meta, {'content-type' => 'application/gzip'}
|
|
|
|
m.expect :read, "fake content"
|
|
|
|
m
|
|
|
|
}
|
|
|
|
|
2019-02-22 07:20:00 +00:00
|
|
|
def expect_url_transform
|
|
|
|
@mock_logger = Minitest::Mock.new
|
|
|
|
@mock_logger.expect(:warn, nil, [/URL target.*transformed/])
|
|
|
|
|
|
|
|
Inspec::Log.stub :warn, proc { |message| @mock_logger.warn(message) } do
|
|
|
|
yield
|
|
|
|
end
|
|
|
|
|
|
|
|
@mock_logger.verify
|
|
|
|
end
|
|
|
|
|
2016-02-21 20:32:56 +00:00
|
|
|
it 'handles a http url' do
|
2016-02-22 10:11:54 +00:00
|
|
|
url = 'http://chef.io/some.tar.gz'
|
2017-06-15 16:10:47 +00:00
|
|
|
res = Fetchers::Url.resolve(url)
|
2016-09-20 10:36:23 +00:00
|
|
|
res.expects(:open).returns(mock_open)
|
2016-09-08 09:11:44 +00:00
|
|
|
_(res).must_be_kind_of Fetchers::Url
|
2016-09-21 09:15:00 +00:00
|
|
|
_(res.resolved_source).must_equal({url: 'http://chef.io/some.tar.gz', sha256: expected_shasum})
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'handles a https url' do
|
2016-02-22 10:11:54 +00:00
|
|
|
url = 'https://chef.io/some.tar.gz'
|
2017-06-15 16:10:47 +00:00
|
|
|
res = Fetchers::Url.resolve(url)
|
2016-09-20 10:36:23 +00:00
|
|
|
res.expects(:open).returns(mock_open)
|
2016-09-08 09:11:44 +00:00
|
|
|
_(res).must_be_kind_of Fetchers::Url
|
2016-09-21 09:15:00 +00:00
|
|
|
_(res.resolved_source).must_equal({url: 'https://chef.io/some.tar.gz', sha256: expected_shasum})
|
2018-12-12 18:05:51 +00:00
|
|
|
end
|
2016-09-08 09:11:44 +00:00
|
|
|
|
2018-12-12 18:05:51 +00:00
|
|
|
it 'handles an https URI' do
|
|
|
|
uri = URI.parse('https://chef.io/some.tar.gz')
|
|
|
|
res = Fetchers::Url.resolve(uri)
|
|
|
|
res.expects(:open).returns(mock_open)
|
|
|
|
_(res).must_be_kind_of Fetchers::Url
|
|
|
|
_(res.resolved_source).must_equal({url: 'https://chef.io/some.tar.gz', sha256: expected_shasum})
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'doesnt handle other schemas' do
|
2017-06-15 16:10:47 +00:00
|
|
|
Fetchers::Url.resolve('gopher://chef.io/some.tar.gz').must_be_nil
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'only handles URLs' do
|
2017-06-15 16:10:47 +00:00
|
|
|
Fetchers::Url.resolve(__FILE__).must_be_nil
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
%w{https://github.com/chef/inspec
|
|
|
|
https://github.com/chef/inspec.git
|
|
|
|
https://www.github.com/chef/inspec.git
|
|
|
|
http://github.com/chef/inspec
|
|
|
|
http://github.com/chef/inspec.git
|
|
|
|
http://www.github.com/chef/inspec.git}.each do |github|
|
|
|
|
it "resolves a github url #{github}" do
|
2019-02-22 07:20:00 +00:00
|
|
|
expect_url_transform do
|
|
|
|
res = Fetchers::Url.resolve(github)
|
|
|
|
res.expects(:open).returns(mock_open)
|
|
|
|
_(res).wont_be_nil
|
|
|
|
_(res.resolved_source).must_equal({url: 'https://github.com/chef/inspec/archive/master.tar.gz', sha256: expected_shasum})
|
|
|
|
end
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "resolves a github branch url" do
|
2019-02-22 07:20:00 +00:00
|
|
|
expect_url_transform do
|
|
|
|
github = 'https://github.com/hardening-io/tests-os-hardening/tree/2.0'
|
|
|
|
res = Fetchers::Url.resolve(github)
|
|
|
|
res.expects(:open).returns(mock_open)
|
|
|
|
_(res).wont_be_nil
|
|
|
|
_(res.resolved_source).must_equal({url: 'https://github.com/hardening-io/tests-os-hardening/archive/2.0.tar.gz', sha256: expected_shasum})
|
|
|
|
end
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it "resolves a github commit url" do
|
2019-02-22 07:20:00 +00:00
|
|
|
expect_url_transform do
|
|
|
|
github = 'https://github.com/hardening-io/tests-os-hardening/tree/48bd4388ddffde68badd83aefa654e7af3231876'
|
|
|
|
res = Fetchers::Url.resolve(github)
|
|
|
|
res.expects(:open).returns(mock_open)
|
|
|
|
_(res).wont_be_nil
|
|
|
|
_(res.resolved_source).must_equal({url: 'https://github.com/hardening-io/tests-os-hardening/archive/48bd4388ddffde68badd83aefa654e7af3231876.tar.gz',
|
|
|
|
sha256: expected_shasum})
|
|
|
|
end
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
2017-06-05 14:02:56 +00:00
|
|
|
|
|
|
|
%w{https://bitbucket.org/chef/inspec
|
|
|
|
https://bitbucket.org/chef/inspec.git
|
|
|
|
https://www.bitbucket.org/chef/inspec.git
|
|
|
|
http://bitbucket.org/chef/inspec
|
|
|
|
http://bitbucket.org/chef/inspec.git
|
|
|
|
http://www.bitbucket.org/chef/inspec.git}.each do |bitbucket|
|
|
|
|
it "resolves a bitbucket url #{bitbucket}" do
|
2019-02-22 07:20:00 +00:00
|
|
|
expect_url_transform do
|
|
|
|
res = Fetchers::Url.resolve(bitbucket)
|
|
|
|
res.expects(:open).returns(mock_open)
|
|
|
|
_(res).wont_be_nil
|
|
|
|
_(res.resolved_source).must_equal({url: 'https://bitbucket.org/chef/inspec/get/master.tar.gz', sha256: expected_shasum})
|
|
|
|
end
|
2017-06-05 14:02:56 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "resolves a bitbucket branch url" do
|
2019-02-22 07:20:00 +00:00
|
|
|
expect_url_transform do
|
|
|
|
bitbucket = 'https://bitbucket.org/chef/inspec/branch/newbranch'
|
|
|
|
res = Fetchers::Url.resolve(bitbucket)
|
|
|
|
res.expects(:open).returns(mock_open)
|
|
|
|
_(res).wont_be_nil
|
|
|
|
_(res.resolved_source).must_equal({url: 'https://bitbucket.org/chef/inspec/get/newbranch.tar.gz', sha256: expected_shasum})
|
|
|
|
end
|
2017-06-05 14:02:56 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it "resolves a bitbucket commit url" do
|
2019-02-22 07:20:00 +00:00
|
|
|
expect_url_transform do
|
|
|
|
bitbucket = 'https://bitbucket.org/chef/inspec/commits/48bd4388ddffde68badd83aefa654e7af3231876'
|
|
|
|
res = Fetchers::Url.resolve(bitbucket)
|
|
|
|
res.expects(:open).returns(mock_open)
|
|
|
|
_(res).wont_be_nil
|
|
|
|
_(res.resolved_source).must_equal({url: 'https://bitbucket.org/chef/inspec/get/48bd4388ddffde68badd83aefa654e7af3231876.tar.gz', sha256: expected_shasum})
|
|
|
|
end
|
2017-06-05 14:02:56 +00:00
|
|
|
end
|
|
|
|
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
|
2018-05-03 18:07:38 +00:00
|
|
|
describe 'download_automate2_archive_to_temp' do
|
|
|
|
let(:target) { 'https://myurl/file.tar.gz' }
|
|
|
|
let(:options) do
|
|
|
|
{
|
|
|
|
'automate' => {
|
|
|
|
'ent' => 'automate',
|
|
|
|
'token_type' => 'dctoken',
|
|
|
|
},
|
|
|
|
'token' => '1234abcd',
|
|
|
|
'server_type' => 'automate2',
|
|
|
|
'profile' => ['admin', 'ssh-baseline', '2.0']
|
|
|
|
}
|
|
|
|
end
|
|
|
|
let(:subject) { Fetchers::Url.resolve(target, options) }
|
|
|
|
|
|
|
|
it "downloads tar to tmp file" do
|
|
|
|
mock = Object.new
|
|
|
|
mock.stubs(:body).returns('this is the body')
|
|
|
|
Net::HTTP.expects(:start)
|
|
|
|
.returns(mock)
|
|
|
|
|
|
|
|
path = subject.send(:download_automate2_archive_to_temp)
|
|
|
|
File.read(path).must_equal 'this is the body'
|
|
|
|
end
|
|
|
|
|
|
|
|
it "sets default http options" do
|
|
|
|
mock = Object.new
|
|
|
|
mock.stubs(:body).returns('this is the body')
|
|
|
|
opts = {"chef-delivery-enterprise"=>"automate", "x-data-collector-token"=>"1234abcd", :use_ssl=>true, :verify_mode=>1}
|
|
|
|
Net::HTTP.expects(:start)
|
|
|
|
.with('myurl', 443, opts)
|
|
|
|
.returns(mock)
|
|
|
|
|
|
|
|
subject.send(:download_automate2_archive_to_temp)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "sets insecure http options" do
|
|
|
|
options['insecure'] = true
|
|
|
|
mock = Object.new
|
|
|
|
mock.stubs(:body).returns('this is the body')
|
|
|
|
opts = {:ssl_verify_mode => 0, "chef-delivery-enterprise"=>"automate", "x-data-collector-token"=>"1234abcd", :use_ssl=>true, :verify_mode=>0}
|
|
|
|
Net::HTTP.expects(:start)
|
|
|
|
.with('myurl', 443, opts)
|
|
|
|
.returns(mock)
|
|
|
|
|
|
|
|
subject.send(:download_automate2_archive_to_temp)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-02-21 03:00:52 +00:00
|
|
|
describe 'applied to a valid url (mocked tar.gz)' do
|
2016-02-21 20:32:56 +00:00
|
|
|
let(:mock_file) { MockLoader.profile_tgz('complete-profile') }
|
2016-02-21 03:00:52 +00:00
|
|
|
let(:target) { 'http://myurl/file.tar.gz' }
|
2017-06-15 16:10:47 +00:00
|
|
|
let(:subject) { Fetchers::Url.resolve(target) }
|
2016-09-08 09:11:44 +00:00
|
|
|
let(:mock_open) {
|
|
|
|
m = Minitest::Mock.new
|
|
|
|
m.expect :meta, {'content-type' => 'application/gzip'}
|
|
|
|
m.expect :read, File.open(mock_file, 'rb').read
|
|
|
|
m
|
2016-02-21 03:00:52 +00:00
|
|
|
}
|
|
|
|
|
2016-09-08 09:11:44 +00:00
|
|
|
let(:mock_dest) {
|
|
|
|
f = Tempfile.new("url-fetch-test")
|
|
|
|
f.path
|
2016-02-21 03:00:52 +00:00
|
|
|
}
|
|
|
|
|
2016-09-08 09:11:44 +00:00
|
|
|
it 'tries to fetch the file' do
|
|
|
|
subject.expects(:open).returns(mock_open)
|
|
|
|
subject.fetch(mock_dest)
|
2016-02-21 03:00:52 +00:00
|
|
|
end
|
|
|
|
|
2016-09-08 09:11:44 +00:00
|
|
|
it "returns the resolved_source hash" do
|
2016-09-20 10:36:23 +00:00
|
|
|
subject.expects(:open).returns(mock_open)
|
|
|
|
subject.resolved_source[:url].must_equal(target)
|
2016-02-21 20:32:56 +00:00
|
|
|
end
|
|
|
|
end
|
2017-06-22 00:09:13 +00:00
|
|
|
|
|
|
|
describe '#http_opts' do
|
|
|
|
let(:subject) { Fetchers::Url.new('fake_url', config) }
|
|
|
|
|
2018-08-30 16:57:50 +00:00
|
|
|
describe 'when username and password is specified' do
|
|
|
|
let(:config) { { :username => 'dummy', :password => 'dummy' } }
|
|
|
|
it 'returns a hash containing http_basic_authentication setting' do
|
|
|
|
subject.send(:http_opts)[:http_basic_authentication].must_equal ["dummy", "dummy"]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when only password is specified' do
|
|
|
|
let(:config) { { :password => 'dummy'} }
|
|
|
|
it 'returns a hash containing http_basic_authentication setting as nil' do
|
2019-01-12 05:22:30 +00:00
|
|
|
subject.send(:http_opts)[:http_basic_authentication].must_be_nil
|
2018-08-30 16:57:50 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-06-22 00:09:13 +00:00
|
|
|
describe 'when insecure is specified' do
|
|
|
|
let(:config) { { 'insecure' => true } }
|
|
|
|
it 'returns a hash containing an ssl_verify_mode setting' do
|
|
|
|
subject.send(:http_opts)[:ssl_verify_mode].must_equal OpenSSL::SSL::VERIFY_NONE
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when insecure is not specific' do
|
|
|
|
let(:config) { {} }
|
|
|
|
it 'returns a hash that does not contain an ssl_verify_mode setting' do
|
|
|
|
subject.send(:http_opts).key?(:ssl_verify_mode).must_equal false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when the server is an automate server using dctoken' do
|
|
|
|
describe 'when the config is properly populated' do
|
|
|
|
let(:config) do
|
|
|
|
{
|
|
|
|
'server_type' => 'automate',
|
|
|
|
'automate' => {
|
|
|
|
'ent' => 'my_ent',
|
|
|
|
'token_type' => 'dctoken',
|
|
|
|
},
|
|
|
|
'token' => 'my_token',
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a properly formatted headers hash' do
|
|
|
|
headers = subject.send(:http_opts)
|
|
|
|
headers['chef-delivery-enterprise'].must_equal 'my_ent'
|
|
|
|
headers['x-data-collector-token'].must_equal 'my_token'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when the enterprise is not supplied' do
|
|
|
|
it 'raises an exception' do
|
|
|
|
proc {
|
|
|
|
config = {
|
|
|
|
'server_type' => 'automate',
|
|
|
|
'automate' => { 'token_type' => 'dctoken' },
|
|
|
|
'token' => 'my_token',
|
|
|
|
}
|
|
|
|
|
|
|
|
Fetchers::Url.new('fake_url', config).send(:http_opts)
|
|
|
|
}.must_raise RuntimeError
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when the token is not supplied' do
|
|
|
|
it 'raises an exception' do
|
|
|
|
proc {
|
|
|
|
config = {
|
|
|
|
'server_type' => 'automate',
|
|
|
|
'automate' => {
|
|
|
|
'ent' => 'my_ent',
|
|
|
|
'token_type' => 'dctoken',
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
Fetchers::Url.new('fake_url', config).send(:http_opts)
|
|
|
|
}.must_raise RuntimeError
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when the server is an automate server not using dctoken' do
|
|
|
|
describe 'when the config is properly populated' do
|
|
|
|
let(:config) do
|
|
|
|
{
|
|
|
|
'server_type' => 'automate',
|
|
|
|
'automate' => {
|
|
|
|
'ent' => 'my_ent',
|
|
|
|
'token_type' => 'usertoken',
|
|
|
|
},
|
|
|
|
'user' => 'my_user',
|
|
|
|
'token' => 'my_token',
|
|
|
|
}
|
|
|
|
end
|
|
|
|
it 'returns a properly formatted headers hash' do
|
|
|
|
headers = subject.send(:http_opts)
|
|
|
|
headers['chef-delivery-enterprise'].must_equal 'my_ent'
|
|
|
|
headers['chef-delivery-user'].must_equal 'my_user'
|
|
|
|
headers['chef-delivery-token'].must_equal 'my_token'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when the user is not supplied' do
|
|
|
|
it 'raises an exception' do
|
|
|
|
proc {
|
|
|
|
config = {
|
|
|
|
'server_type' => 'automate',
|
|
|
|
'automate' => {
|
|
|
|
'ent' => 'my_ent',
|
|
|
|
'token_type' => 'usertoken',
|
|
|
|
},
|
|
|
|
'token' => 'my_token',
|
|
|
|
}
|
|
|
|
|
|
|
|
Fetchers::Url.new('fake_url', config).send(:http_opts)
|
|
|
|
}.must_raise RuntimeError
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when the token is not supplied' do
|
|
|
|
it 'raises an exception' do
|
|
|
|
proc {
|
|
|
|
config = {
|
|
|
|
'server_type' => 'automate',
|
|
|
|
'automate' => {
|
|
|
|
'ent' => 'my_ent',
|
|
|
|
'token_type' => 'usertoken',
|
|
|
|
},
|
|
|
|
'user' => 'my_user',
|
|
|
|
}
|
|
|
|
|
|
|
|
Fetchers::Url.new('fake_url', config).send(:http_opts)
|
|
|
|
}.must_raise RuntimeError
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when only a token is supplied' do
|
|
|
|
let(:config) { { 'token' => 'my_token' } }
|
|
|
|
it 'returns a hash containing an Authorization header' do
|
|
|
|
subject.send(:http_opts)['Authorization'].must_equal "Bearer my_token"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-02-21 03:00:52 +00:00
|
|
|
end
|