mirror of
https://github.com/inspec/inspec
synced 2024-11-14 00:47:10 +00:00
07dc5e3192
3 files left to go, and they're behaving oddly so I'm leaving them out in this pass. Looks like 21 deprecations left. Signed-off-by: Ryan Davis <zenspider@chef.io>
735 lines
26 KiB
Ruby
735 lines
26 KiB
Ruby
require "helper"
|
|
require "stringio"
|
|
|
|
require "inspec/config"
|
|
require "plugins/inspec-compliance/lib/inspec-compliance/api"
|
|
require "thor" # For Thor::CoreExt::HashWithIndifferentAccess
|
|
|
|
describe "Inspec::Config" do
|
|
|
|
# ========================================================================== #
|
|
# Constructor
|
|
# ========================================================================== #
|
|
describe "the constructor" do
|
|
describe "when no args are provided" do
|
|
it "should initialize properly" do
|
|
cfg = Inspec::Config.new
|
|
_(cfg).must_respond_to :final_options
|
|
end
|
|
end
|
|
|
|
describe "when CLI args are provided" do
|
|
it "should initialize properly" do
|
|
cfg = Inspec::Config.new({ color: true, log_level: "warn" })
|
|
_(cfg).must_respond_to :final_options
|
|
end
|
|
end
|
|
|
|
# TODO: add test for reading from default config path
|
|
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Global Caching
|
|
# ========================================================================== #
|
|
|
|
describe "caching" do
|
|
# Note that since unit tests are randomized, we have no idea what is in
|
|
# the cache. We just want to validate that we get the same thing.
|
|
it "should cache the config object" do
|
|
Inspec::Config.new # in the unlikely event we are the first unit test
|
|
|
|
# Type check
|
|
cfg_cached = Inspec::Config.cached
|
|
_(cfg_cached).must_be_kind_of Inspec::Config
|
|
|
|
# Multiple calls to cached should return the same thing
|
|
cfg_2 = Inspec::Config.cached
|
|
_(cfg_2).must_equal cfg_cached
|
|
|
|
# Cached value unaffected by later instance creation
|
|
Inspec::Config.new(shoe_size: 9)
|
|
cfg_4 = Inspec::Config.cached
|
|
_(cfg_4).must_equal cfg_cached
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# File Validation
|
|
# ========================================================================== #
|
|
describe "when validating a file" do
|
|
let(:cfg) { Inspec::Config.new({}, cfg_io) }
|
|
let(:cfg_io) { StringIO.new(ConfigTestHelper.fixture(fixture_name)) }
|
|
let(:seen_fields) { cfg.final_options.keys.sort }
|
|
|
|
describe "when the file is a legacy file" do
|
|
let(:fixture_name) { "legacy" }
|
|
it "should read the file successfully" do
|
|
expected = %w{color reporter target_id type}.sort
|
|
_(seen_fields).must_equal expected
|
|
end
|
|
end
|
|
|
|
describe "when the file is a valid v1.1 file" do
|
|
let(:fixture_name) { "basic" }
|
|
it "should read the file successfully" do
|
|
expected = %w{create_lockfile reporter type}.sort
|
|
_(seen_fields).must_equal expected
|
|
end
|
|
end
|
|
|
|
describe "when the file is a valid v1.2 file" do
|
|
let(:fixture_name) { "basic_1_2" }
|
|
it "should read the file successfully" do
|
|
expected = %w{create_lockfile reporter type}.sort # No new top-level key - API only
|
|
_(seen_fields).must_equal expected
|
|
end
|
|
end
|
|
|
|
describe "when the file is minimal" do
|
|
let(:fixture_name) { "minimal" }
|
|
it "should read the file successfully" do
|
|
expected = %w{reporter type}.sort
|
|
_(seen_fields).must_equal expected
|
|
end
|
|
end
|
|
|
|
describe "when the file has malformed json" do
|
|
let(:fixture_name) { "malformed_json" }
|
|
it "should throw an exception" do
|
|
ex = _ { cfg }.must_raise(Inspec::ConfigError::MalformedJson)
|
|
# Failed to load JSON configuration: 765: unexpected token at '{ "hot_garbage": "a", "version": "1.1",
|
|
# '
|
|
# Config was: "{ \"hot_garbage\": \"a\", \"version\": \"1.1\", \n"
|
|
_(ex.message).must_include "Failed to load JSON config" # The message
|
|
_(ex.message).must_include "unexpected token" # The specific parser error
|
|
_(ex.message).must_include "hot_garbage" # A sample of the unacceptable contents
|
|
end
|
|
end
|
|
|
|
describe "when the file has a bad file version" do
|
|
let(:fixture_name) { "bad_version" }
|
|
it "should throw an exception" do
|
|
ex = _ { cfg }.must_raise(Inspec::ConfigError::Invalid)
|
|
_(ex.message).must_include "Unsupported config file version"
|
|
_(ex.message).must_include "99.99"
|
|
_(ex.message).must_include "1.1"
|
|
end
|
|
end
|
|
|
|
describe "when a 1.1 file has an invalid top-level entry" do
|
|
let(:fixture_name) { "bad_top_level" }
|
|
it "should throw an exception" do
|
|
ex = _ { cfg }.must_raise(Inspec::ConfigError::Invalid)
|
|
_(ex.message).must_include "Unrecognized top-level"
|
|
_(ex.message).must_include "unsupported_field"
|
|
_(ex.message).must_include "compliance"
|
|
end
|
|
end
|
|
|
|
describe "when a 1.2 file has an array for the plugins list" do
|
|
let(:fixture_name) { "bad_1_2_array" }
|
|
it "should complain about the array" do
|
|
ex = _ { cfg }.must_raise(Inspec::ConfigError::Invalid)
|
|
_(ex.message).must_include "'plugin' field"
|
|
_(ex.message).must_include "must be a hash"
|
|
end
|
|
end
|
|
|
|
describe "when a 1.2 file has an invalid name for a plugin" do
|
|
let(:fixture_name) { "bad_1_2_bad_name" }
|
|
it "should complain about the bad plugin name" do
|
|
ex = _ { cfg }.must_raise(Inspec::ConfigError::Invalid)
|
|
_(ex.message).must_include "names must begin with"
|
|
_(ex.message).must_include "inspec- or train-"
|
|
end
|
|
end
|
|
|
|
describe "when a 1.2 file has a bad value for a setting tree" do
|
|
let(:fixture_name) { "bad_1_2_bad_value" }
|
|
it "should complain about the bad plugin value" do
|
|
ex = _ { cfg }.must_raise(Inspec::ConfigError::Invalid)
|
|
_(ex.message).must_include "should be a Hash"
|
|
_(ex.message).must_include "inspec-test-bad-settings"
|
|
end
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Defaults
|
|
# ========================================================================== #
|
|
describe "reading defaults" do
|
|
let(:cfg) { Inspec::Config.new({}, nil, command) }
|
|
let(:final_options) { cfg.final_options }
|
|
let(:seen_fields) { cfg.final_options.keys.sort }
|
|
|
|
describe "when the exec command is used" do
|
|
let(:command) { :exec }
|
|
it "should have the correct defaults" do
|
|
expected = %w{color create_lockfile backend_cache reporter show_progress type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(final_options["reporter"]).must_be_kind_of Hash
|
|
_(final_options["reporter"].count).must_equal 1
|
|
_(final_options["reporter"].keys).must_include "cli"
|
|
_(final_options["show_progress"]).must_equal false
|
|
_(final_options["color"]).must_equal true
|
|
_(final_options["create_lockfile"]).must_equal true
|
|
_(final_options["backend_cache"]).must_equal true
|
|
end
|
|
end
|
|
|
|
describe "when the shell command is used" do
|
|
let(:command) { :shell }
|
|
it "should have the correct defaults" do
|
|
expected = %w{reporter type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(final_options["reporter"]).must_be_kind_of Hash
|
|
_(final_options["reporter"].count).must_equal 1
|
|
_(final_options["reporter"].keys).must_include "cli"
|
|
end
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Reading CLI Options
|
|
# ========================================================================== #
|
|
# The config facility supports passing in CLI options in the constructor, so
|
|
# that it can handle merging internally. That is tested here.
|
|
#
|
|
# This is different than storing options
|
|
# in the config file with the same name as the CLI options, which is
|
|
# tested under 'CLI Options Stored in File'
|
|
describe "reading CLI options" do
|
|
let(:cfg) { Inspec::Config.new(cli_opts) }
|
|
let(:final_options) { cfg.final_options }
|
|
let(:seen_fields) { cfg.final_options.keys.sort }
|
|
|
|
describe "when the CLI opts are present" do
|
|
let(:cli_opts) do
|
|
{
|
|
color: true,
|
|
"string_key" => "string_value",
|
|
array_value: [1, 2, 3],
|
|
}
|
|
end
|
|
|
|
it "should transparently round-trip the options" do
|
|
expected = %w{color array_value reporter string_key type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(final_options[:color]).must_equal true
|
|
_(final_options["color"]).must_equal true
|
|
_(final_options["string_key"]).must_equal "string_value"
|
|
_(final_options[:string_key]).must_equal "string_value"
|
|
_(final_options["array_value"]).must_equal [1, 2, 3]
|
|
_(final_options[:array_value]).must_equal [1, 2, 3]
|
|
end
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# CLI Options Stored in File
|
|
# ========================================================================== #
|
|
describe "reading CLI options stored in the config file" do
|
|
let(:cfg) { Inspec::Config.new({}, cfg_io) }
|
|
let(:final_options) { cfg.final_options }
|
|
let(:cfg_io) { StringIO.new(ConfigTestHelper.fixture(fixture_name)) }
|
|
let(:seen_fields) { cfg.final_options.keys.sort }
|
|
|
|
# These two test cases have the same options but in different file versions.
|
|
describe "when the CLI opts are present in a 1.1 file" do
|
|
let(:fixture_name) { :like_legacy }
|
|
it "should read the options" do
|
|
expected = %w{color reporter target_id type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(final_options["color"]).must_equal "true" # Dubious - should this be String or TrueClass?
|
|
_(final_options["target_id"]).must_equal "mynode"
|
|
end
|
|
end
|
|
|
|
describe "when the CLI opts are present in a legacy file" do
|
|
let(:fixture_name) { :legacy }
|
|
it "should read the options" do
|
|
expected = %w{color reporter target_id type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(final_options["color"]).must_equal "true" # Dubious - should this be String or TrueClass?
|
|
_(final_options["target_id"]).must_equal "mynode"
|
|
end
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Parsing and Validating Reporters
|
|
# ========================================================================== #
|
|
|
|
# TODO: this should be moved into plugins for the reporters
|
|
describe "when parsing reporters" do
|
|
let(:cfg) { Inspec::Config.new(cli_opts) }
|
|
let(:seen_reporters) { cfg["reporter"] }
|
|
|
|
describe "when paring CLI reporter" do
|
|
let(:cli_opts) { { "reporter" => ["cli"] } }
|
|
it "parse cli reporters" do
|
|
expected_value = { "cli" => { "stdout" => true } }
|
|
_(seen_reporters).must_equal expected_value
|
|
end
|
|
end
|
|
|
|
describe "when paring CLI reporter" do
|
|
let(:cli_opts) { { "reporter" => ["cli"], "target_id" => "1d3e399f-4d71-4863-ac54-84d437fbc444" } }
|
|
it "parses cli report and attaches target_id" do
|
|
expected_value = { "cli" => { "stdout" => true, "target_id" => "1d3e399f-4d71-4863-ac54-84d437fbc444" } }
|
|
_(seen_reporters).must_equal expected_value
|
|
end
|
|
end
|
|
end
|
|
|
|
describe "when validating reporters" do
|
|
# validate_reporters is private, so we use .send
|
|
let(:cfg) { Inspec::Config.new }
|
|
it "valid reporter" do
|
|
reporters = { "json" => { "stdout" => true } }
|
|
cfg.send(:validate_reporters!, reporters)
|
|
end
|
|
|
|
it "invalid reporter type" do
|
|
reporters = %w{json magenta}
|
|
_(proc { cfg.send(:validate_reporters!, reporters) }).must_raise NotImplementedError
|
|
end
|
|
|
|
it "two reporters outputting to stdout" do
|
|
stdout = { "stdout" => true }
|
|
reporters = { "json" => stdout, "cli" => stdout }
|
|
_(proc { cfg.send(:validate_reporters!, reporters) }).must_raise ArgumentError
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Miscellaneous Option Finalization
|
|
# ========================================================================== #
|
|
|
|
describe "option finalization" do
|
|
it "raises if `--password/--sudo-password` are used without value" do
|
|
# When you invoke `inspec shell --password` (with no value for password,
|
|
# though it is setup to expect a string) Thor will set the key with value -1
|
|
ex = _ { Inspec::Config.new("sudo_password" => -1) }.must_raise(ArgumentError)
|
|
_(ex.message).must_match(/Please provide a value for --sudo-password/)
|
|
end
|
|
|
|
it "assumes `--sudo` if `--sudo-password` is used without it" do
|
|
@mock_logger = Minitest::Mock.new
|
|
@mock_logger.expect(:warn, nil, [/Adding `--sudo`./])
|
|
Inspec::Log.stub(:warn, proc { |message| @mock_logger.warn(message) }) do
|
|
cfg = Inspec::Config.new("sudo_password" => "somepass")
|
|
_(cfg.key?("sudo")).must_equal true
|
|
end
|
|
@mock_logger.verify
|
|
end
|
|
|
|
it "calls `Compliance::API.login` if `opts[:compliance] is passed`" do
|
|
InspecPlugins::Compliance::API.expects(:login)
|
|
cfg_io = StringIO.new(ConfigTestHelper.fixture("with_compliance"))
|
|
Inspec::Config.new({ backend: "mock" }, cfg_io)
|
|
end
|
|
end
|
|
# ========================================================================== #
|
|
# Fetching Credentials
|
|
# ========================================================================== #
|
|
describe "when fetching creds" do
|
|
let(:cfg) { Inspec::Config.new(cli_opts, cfg_io) }
|
|
let(:cfg_io) { StringIO.new(ConfigTestHelper.fixture(file_fixture_name)) }
|
|
let(:seen_fields) { creds.keys.sort }
|
|
let(:creds) { cfg.unpack_train_credentials }
|
|
|
|
describe "when generic creds are present on the cli" do
|
|
let(:cfg_io) { nil }
|
|
let(:cli_opts) { { sudo: true, 'shell_command': "ksh" } }
|
|
it "should pass the credentials as-is" do
|
|
expected = %i{backend sudo shell_command}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(creds[:sudo]).must_equal true
|
|
_(creds[:shell_command]).must_equal "ksh"
|
|
_(creds[:backend]).must_equal "local" # Checking for default
|
|
end
|
|
end
|
|
|
|
describe "when creds are specified on the CLI with a backend and transport prefixes" do
|
|
let(:cfg_io) { nil }
|
|
let(:cli_opts) { { backend: "ssh", ssh_host: "example.com", ssh_key_files: "mykey" } }
|
|
it "should read the backend and strip prefixes" do
|
|
expected = %i{backend host key_files}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(creds[:backend]).must_equal "ssh"
|
|
_(creds[:host]).must_equal "example.com"
|
|
_(creds[:key_files]).must_equal "mykey"
|
|
end
|
|
end
|
|
|
|
describe "when creds are specified with a credset target_uri in a 1.1 file without transport prefixes" do
|
|
let(:file_fixture_name) { :basic }
|
|
let(:cli_opts) { { target: "ssh://set1" } }
|
|
it "should use the credset to lookup the creds in the file" do
|
|
expected = %i{backend host user}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(creds[:backend]).must_equal "ssh"
|
|
_(creds[:host]).must_equal "some.host"
|
|
_(creds[:user]).must_equal "some_user"
|
|
end
|
|
end
|
|
|
|
describe "when creds are specified with a credset that contains odd characters" do
|
|
let(:file_fixture_name) { :match_checks_in_credset_names }
|
|
[
|
|
"ssh://TitleCase",
|
|
"ssh://snake_case",
|
|
"ssh://conta1nsnumeral5",
|
|
].each do |target_uri|
|
|
it "should be able to unpack #{target_uri}" do
|
|
# let() caching breaks things here
|
|
cfg_io = StringIO.new(ConfigTestHelper.fixture(file_fixture_name))
|
|
cfg = Inspec::Config.new({ target: target_uri }, cfg_io)
|
|
creds = cfg.unpack_train_credentials
|
|
_(creds.count).must_equal 2
|
|
_(creds[:backend]).must_equal "ssh"
|
|
_(creds[:found]).must_equal "yes"
|
|
end
|
|
end
|
|
|
|
[
|
|
"ssh://contains.dots",
|
|
].each do |target_uri|
|
|
it "should handoff unpacking #{target_uri} to train" do
|
|
# let() caching breaks things here
|
|
cfg_io = StringIO.new(ConfigTestHelper.fixture(file_fixture_name))
|
|
cfg = Inspec::Config.new({ target: target_uri }, cfg_io)
|
|
creds = cfg.unpack_train_credentials
|
|
|
|
_(creds.count).must_equal 2
|
|
_(creds[:backend]).must_equal "ssh"
|
|
_(creds[:host]).must_equal "contains.dots"
|
|
end
|
|
end
|
|
|
|
[
|
|
"ssh://contains spaces",
|
|
].each do |target_uri|
|
|
it "should be not able to unpack #{target_uri}" do
|
|
# let() caching breaks things here
|
|
cfg_io = StringIO.new(ConfigTestHelper.fixture(file_fixture_name))
|
|
cfg = Inspec::Config.new({ target: target_uri }, cfg_io)
|
|
|
|
assert_raises(Train::UserError) { cfg.unpack_train_credentials }
|
|
end
|
|
end
|
|
end
|
|
|
|
describe "when creds are specified with a credset target_uri in a 1.1 file and a prefixed override on the CLI" do
|
|
let(:file_fixture_name) { :basic }
|
|
let(:cli_opts) { { target: "ssh://set1", ssh_user: "bob" } }
|
|
it "should use the credset to lookup the creds in the file then override the single value" do
|
|
expected = %i{backend host user}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(creds[:backend]).must_equal "ssh"
|
|
_(creds[:host]).must_equal "some.host"
|
|
_(creds[:user]).must_equal "bob"
|
|
end
|
|
end
|
|
|
|
describe "when creds are specified with a non-credset target_uri" do
|
|
let(:cfg_io) { nil }
|
|
let(:cli_opts) { { target: "ssh://bob@somehost" } }
|
|
it "should unpack the options using the URI parser" do
|
|
expected = %i{backend host user}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(creds[:backend]).must_equal "ssh"
|
|
_(creds[:host]).must_equal "somehost"
|
|
_(creds[:user]).must_equal "bob"
|
|
end
|
|
end
|
|
|
|
describe "when backcompat creds are specified on the CLI without a transport prefix" do
|
|
let(:cfg_io) { nil }
|
|
let(:cli_opts) { { target: "ssh://some.host", user: "bob" } }
|
|
it "should assign the options correctly" do
|
|
expected = %i{backend host user}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(creds[:backend]).must_equal "ssh"
|
|
_(creds[:host]).must_equal "some.host"
|
|
_(creds[:user]).must_equal "bob"
|
|
end
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Fetching Plugin Config
|
|
# ========================================================================== #
|
|
describe "when fetching plugin config" do
|
|
let(:cfg) { Inspec::Config.new({}, cfg_io) }
|
|
let(:cfg_io) { StringIO.new(ConfigTestHelper.fixture(fixture_name)) }
|
|
let(:fixture_name) { "basic_1_2" }
|
|
|
|
describe "when fetching a plugin config that is absent" do
|
|
let(:fixture_name) { "basic_1_2" }
|
|
|
|
it "returns an empty hash with indifferent access" do
|
|
settings = cfg.fetch_plugin_config("inspec-test-not-present")
|
|
assert_kind_of Thor::CoreExt::HashWithIndifferentAccess, settings
|
|
assert_empty settings
|
|
end
|
|
end
|
|
|
|
describe "when fetching a plugin config that is present" do
|
|
let(:fixture_name) { "basic_1_2" }
|
|
|
|
it "returns the settings as a hash with indifferent access" do
|
|
settings = cfg.fetch_plugin_config("inspec-test-plugin")
|
|
refute_nil settings
|
|
refute settings.empty?
|
|
assert_kind_of Thor::CoreExt::HashWithIndifferentAccess, settings
|
|
assert_equal "test_value_01", settings[:test_key_01]
|
|
assert_equal "test_value_01", settings["test_key_01"]
|
|
end
|
|
end
|
|
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Merging Options
|
|
# ========================================================================== #
|
|
describe "when merging options" do
|
|
let(:cfg) { Inspec::Config.new(cli_opts, cfg_io, command) }
|
|
let(:cfg_io) { StringIO.new(ConfigTestHelper.fixture(file_fixture_name)) }
|
|
let(:seen_fields) { cfg.final_options.keys.sort }
|
|
let(:command) { nil }
|
|
|
|
describe "when there is both a default and a config file setting" do
|
|
let(:file_fixture_name) { :override_check }
|
|
let(:cli_opts) { {} }
|
|
it "the config file setting should prevail" do
|
|
Inspec::Config::Defaults.stubs(:default_for_command).returns("target_id" => "value_from_default")
|
|
expected = %w{reporter target_id type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(cfg.final_options["target_id"]).must_equal "value_from_config_file"
|
|
_(cfg.final_options[:target_id]).must_equal "value_from_config_file"
|
|
end
|
|
end
|
|
|
|
describe "when there is both a default and a CLI option" do
|
|
let(:cli_opts) { { target_id: "value_from_cli_opts" } }
|
|
let(:cfg_io) { nil }
|
|
it "the CLI option should prevail" do
|
|
Inspec::Config::Defaults.stubs(:default_for_command).returns("target_id" => "value_from_default")
|
|
expected = %w{reporter target_id type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(cfg.final_options["target_id"]).must_equal "value_from_cli_opts"
|
|
_(cfg.final_options[:target_id]).must_equal "value_from_cli_opts"
|
|
end
|
|
end
|
|
|
|
describe "when there is both a config file setting and a CLI option" do
|
|
let(:file_fixture_name) { :override_check }
|
|
let(:cli_opts) { { target_id: "value_from_cli_opts" } }
|
|
it "the CLI option should prevail" do
|
|
expected = %w{reporter target_id type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(cfg.final_options["target_id"]).must_equal "value_from_cli_opts"
|
|
_(cfg.final_options[:target_id]).must_equal "value_from_cli_opts"
|
|
end
|
|
end
|
|
|
|
describe 'specifically check default vs config file override for "reporter" setting' do
|
|
let(:cli_opts) { {} }
|
|
let(:command) { :shell } # shell default is [ :cli ]
|
|
let(:file_fixture_name) { :override_check } # This fixture sets the cfg file contents to request a json reporter
|
|
it "the config file setting should prevail" do
|
|
expected = %w{reporter target_id type}.sort
|
|
_(seen_fields).must_equal expected
|
|
_(cfg.final_options["reporter"]).must_be_kind_of Hash
|
|
_(cfg.final_options["reporter"].keys).must_equal ["json"]
|
|
_(cfg.final_options["reporter"]["json"]["path"]).must_equal "path/from/config/file"
|
|
_(cfg.final_options[:reporter]).must_be_kind_of Hash
|
|
_(cfg.final_options[:reporter].keys).must_equal ["json"]
|
|
_(cfg.final_options[:reporter]["json"]["path"]).must_equal "path/from/config/file"
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
# ========================================================================== #
|
|
# Test Fixtures
|
|
# ========================================================================== #
|
|
|
|
module ConfigTestHelper
|
|
def fixture(fixture_name)
|
|
case fixture_name.to_sym
|
|
when :legacy
|
|
# TODO - this is dubious, but based on https://www.inspec.io/docs/reference/reporters/#automate-reporter
|
|
# Things that have 'compliance' as a toplevel have also been seen
|
|
<<~EOJ1
|
|
{
|
|
"color": "true",
|
|
"target_id": "mynode",
|
|
"reporter": {
|
|
"automate" : {
|
|
"url" : "https://YOUR_A2_URL/data-collector/v0/",
|
|
"token" : "YOUR_A2_ADMIN_TOKEN"
|
|
}
|
|
}
|
|
}
|
|
EOJ1
|
|
when :basic
|
|
<<~EOJ2
|
|
{
|
|
"version": "1.1",
|
|
"cli_options": {
|
|
"create_lockfile": "false"
|
|
},
|
|
"reporter": {
|
|
"automate" : {
|
|
"url": "http://some.where",
|
|
"token" : "YOUR_A2_ADMIN_TOKEN"
|
|
}
|
|
},
|
|
"credentials": {
|
|
"ssh": {
|
|
"set1": {
|
|
"host": "some.host",
|
|
"user": "some_user"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
EOJ2
|
|
when :like_legacy
|
|
<<~EOJ3
|
|
{
|
|
"version": "1.1",
|
|
"cli_options": {
|
|
"color": "true",
|
|
"target_id": "mynode"
|
|
},
|
|
"reporter": {
|
|
"automate" : {
|
|
"url" : "https://YOUR_A2_URL/data-collector/v0/",
|
|
"token" : "YOUR_A2_ADMIN_TOKEN"
|
|
}
|
|
}
|
|
}
|
|
EOJ3
|
|
when :override_check
|
|
<<~EOJ4
|
|
{
|
|
"version": "1.1",
|
|
"cli_options": {
|
|
"target_id": "value_from_config_file"
|
|
},
|
|
"reporter": {
|
|
"json": {
|
|
"path": "path/from/config/file"
|
|
}
|
|
}
|
|
}
|
|
EOJ4
|
|
when :minimal
|
|
'{ "version": "1.1" }'
|
|
when :bad_version
|
|
'{ "version": "99.99" }'
|
|
when :bad_top_level
|
|
'{ "version": "1.1", "unsupported_field": "some_value" }'
|
|
when :malformed_json
|
|
'{ "hot_garbage": "a", "version": "1.1", '
|
|
when :with_compliance
|
|
# TODO - this is dubious, need to verify
|
|
<<~EOJ5
|
|
{
|
|
"compliance": {
|
|
"server":"https://some.host",
|
|
"user":"someuser"
|
|
}
|
|
}
|
|
EOJ5
|
|
when :match_checks_in_credset_names
|
|
<<~EOJ6
|
|
{
|
|
"version": "1.1",
|
|
"credentials": {
|
|
"ssh": {
|
|
"TitleCase": {
|
|
"found": "yes"
|
|
},
|
|
"snake_case": {
|
|
"found": "yes"
|
|
},
|
|
"conta1nsnumeral5": {
|
|
"found": "yes"
|
|
},
|
|
"contains.dots": {
|
|
"found": "no"
|
|
},
|
|
"contains spaces": {
|
|
"found": "no"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
EOJ6
|
|
when :basic_1_2
|
|
<<~EOJ7
|
|
{
|
|
"version": "1.2",
|
|
"cli_options": {
|
|
"create_lockfile": "false"
|
|
},
|
|
"reporter": {
|
|
"automate" : {
|
|
"url": "http://some.where",
|
|
"token" : "YOUR_A2_ADMIN_TOKEN"
|
|
}
|
|
},
|
|
"credentials": {
|
|
"ssh": {
|
|
"set1": {
|
|
"host": "some.host",
|
|
"user": "some_user"
|
|
}
|
|
}
|
|
},
|
|
"plugins": {
|
|
"inspec-test-plugin": {
|
|
"test_key_01":"test_value_01"
|
|
}
|
|
}
|
|
}
|
|
EOJ7
|
|
when :bad_1_2_array
|
|
<<~EOJ8
|
|
{
|
|
"version": "1.2",
|
|
"plugins": [
|
|
"inspec-test-plugin1",
|
|
"inspec-test-plugin2"
|
|
]
|
|
}
|
|
EOJ8
|
|
when :bad_1_2_bad_name
|
|
<<~EOJ9
|
|
{
|
|
"version": "1.2",
|
|
"plugins": {
|
|
"spectacles-banana-peeler": {
|
|
}
|
|
}
|
|
}
|
|
EOJ9
|
|
when :bad_1_2_bad_value
|
|
<<~EOJ10
|
|
{
|
|
"version": "1.2",
|
|
"plugins": {
|
|
"inspec-test-bad-settings": 42
|
|
}
|
|
}
|
|
EOJ10
|
|
end
|
|
end
|
|
module_function :fixture
|
|
end
|