inspec/test/unit/resources/ssl_test.rb

55 lines
2.2 KiB
Ruby
Raw Normal View History

require "helper"
require "inspec/resources/ssl"
require "sslshake"
describe "Inspec::Resources::SSL" do
it "verify cipher enabled" do
SSLShake.expects(:hello).at_least_once.returns({ "cipher_suite" => "TLS_RSA_WITH_AES_128_CBC_SHA", "success" => true })
resource = load_resource("ssl", host: "localhost").ciphers(/rsa/i)
_(resource.enabled?).must_equal true
end
it "verify cipher disabled" do
SSLShake.expects(:hello).at_least_once.returns({ "error" => "SSL Alert." })
resource = load_resource("ssl", host: "localhost").ciphers(/rc4/i)
_(resource.enabled?).must_equal false
end
it "verify protocol enabled" do
SSLShake.expects(:hello).at_least_once.returns({ "version" => "tls1.2", "success" => true })
resource = load_resource("ssl", host: "localhost").protocols("tls1.2")
_(resource.enabled?).must_equal true
end
it "verify protocol disabled" do
SSLShake.expects(:hello).at_least_once.returns({ "error" => "Failed to parse response. Cannot handle SSLv2 responses" })
resource = load_resource("ssl", host: "localhost").protocols("ssl2")
_(resource.enabled?).must_equal false
end
it "verify host reachable" do
SSLShake.expects(:hello).at_least_once.returns({ "success" => true })
resource = load_resource("ssl", host: "localhost")
_(resource.enabled?).must_equal true
end
it "verify host unreachable" do
SSLShake.expects(:hello).at_least_once.returns({ "error" => "Connection error Errno::ECONNREFUSED, can't connect to localhost:443." })
resource = load_resource("ssl", host: "localhost")
_(resource.enabled?).must_equal false
end
it "error with nil host" do
resource = load_resource("ssl", host: nil)
err = _ { resource.enabled? }.must_raise(RuntimeError)
_(err.message).must_equal "Cannot determine host for SSL test. Please specify it or use a different target."
end
it "verify sslshake resources" do
resource = load_resource("ssl", host: "localhost")
_(resource.protocols.uniq).must_equal ["ssl2", "ssl3", "tls1.0", "tls1.1", "tls1.2"]
_(resource.ciphers.include?("TLS_RSA_WITH_AES_128_CBC_SHA256")).must_equal true
_([681, 993]).must_include(resource.ciphers.count)
end
end