view modules/common/spec/classes/mkuser_use_cases_spec.rb @ 388:750d36241580

Add missing dependency modules Probably required by SSH, but not obviously listed
author IBBoard <dev@ibboard.co.uk>
date Mon, 03 Jan 2022 17:15:14 +0000
parents
children
line wrap: on
line source

require 'spec_helper'

clientversion = `facter puppetversion`

describe 'common' do
  let(:facts) do
    { :osfamily      => 'RedHat',
      :puppetversion => clientversion,
    }
  end

  context 'one user with default values' do
    let(:facts) do
      { :osfamily      => 'RedHat',
        :puppetversion => clientversion,
      }
    end
    let(:params) do
      { :users => {
          'alice' => {
            'uid' => 1000,
          }
        }
      }
    end

    it {
      should contain_user('alice').with({
        'uid'        => '1000',
        'gid'        => '1000',
        'shell'      => '/bin/bash',
        'home'       => '/home/alice',
        'ensure'     => 'present',
        'groups'     => 'alice',
        'password'   => '!!',
        'managehome' => 'true',
        'comment'    => 'created via puppet',
      })
    }

    it {
      should contain_file('/home/alice').with({
        'owner'   => 'alice',
        'mode'    => '0700',
        'require' => 'Common::Mkdir_p[/home/alice]',
      })
    }

    it {
      should contain_file('/home/alice/.ssh').with({
        'ensure'  => 'directory',
        'mode'    => '0700',
        'owner'   => 'alice',
        'group'   => 'alice',
        'require' => 'User[alice]',
      })
    }

    it { should contain_common__mkdir_p('/home/alice') }

    it {
      should contain_group('alice').with({
        'ensure' => 'present',
        'gid'    => 1000,
        'name'   => 'alice',
      })
    }

    it { should_not contain_ssh_authorized_key('alice') }
  end

  context 'one user with custom values' do
    let(:facts) do
      { :osfamily      => 'RedHat',
        :puppetversion => clientversion,
      }
    end
    let(:params) do
      { :users =>  {
          'myuser' => {
            'uid'      => 2000,
            'group'    => 'superusers',
            'gid'      => 2000,
            'shell'    => '/bin/zsh',
            'home'     => '/home/superu',
            'groups'   => ['superusers', 'development', 'admins'],
            'password' => 'puppet',
            'mode'     => '0701',
            'comment'  => 'a puppet master',
          }
        }
      }
    end

    it {
      should contain_user('myuser').with({
        'uid'      => '2000',
        'gid'      => '2000',
        'shell'    => '/bin/zsh',
        'home'     => '/home/superu',
        'groups'   => ['superusers', 'development', 'admins'],
        'password' => 'puppet',
        'comment'  => 'a puppet master',
      })
    }

    it {
      should contain_file('/home/superu').with({
        'owner'   => 'myuser',
        'mode'    => '0701',
        'require' => 'Common::Mkdir_p[/home/superu]',
      })
    }

    it {
      should contain_file('/home/superu/.ssh').with({
        'ensure'  => 'directory',
        'mode'    => '0700',
        'owner'   => 'myuser',
        'group'   => 'myuser',
        'require' => 'User[myuser]',
      })
    }

    it { should contain_common__mkdir_p('/home/superu') }

    it { should_not contain_ssh_authorized_key('myuser') }
  end

  context 'two users with default values' do
    let(:facts) do
      { :osfamily      => 'RedHat',
        :puppetversion => clientversion,
      }
    end
    let(:params) do
      { :users => {
         'alice' => {
           'uid' => 1000,
         },
         'bob' => {
           'uid' => 1001,
         }
        }
      }
    end

    it {
      should contain_user('alice').with({
        'uid'        => 1000,
        'gid'        => 1000,
        'shell'      => '/bin/bash',
        'home'       => '/home/alice',
        'ensure'     => 'present',
        'managehome' => true,
        'groups'     => 'alice',
        'password'   => '!!',
        'comment'    => 'created via puppet',
      })
    }

    it {
      should contain_user('bob').with({
        'uid'        => 1001,
        'gid'        => 1001,
        'shell'      => '/bin/bash',
        'home'       => '/home/bob',
        'ensure'     => 'present',
        'managehome' => true,
        'groups'     => 'bob',
        'password'   => '!!',
        'comment'    => 'created via puppet',
      })
    }

    it { should contain_common__mkdir_p('/home/alice') }
    it { should contain_common__mkdir_p('/home/bob') }

    it {
      should contain_file('/home/alice').with({
        'owner'   => 'alice',
        'mode'    => '0700',
        'require' => 'Common::Mkdir_p[/home/alice]',
      })
    }

    it {
      should contain_file('/home/bob').with({
        'owner'   => 'bob',
        'mode'    => '0700',
        'require' => 'Common::Mkdir_p[/home/bob]',
      })
    }

    it {
      should contain_file('/home/alice/.ssh').with({
        'ensure'  => 'directory',
        'mode'    => '0700',
        'owner'   => 'alice',
        'group'   => 'alice',
        'require' => 'User[alice]',
      })
    }

    it {
      should contain_file('/home/bob/.ssh').with({
        'ensure'  => 'directory',
        'mode'    => '0700',
        'owner'   => 'bob',
        'group'   => 'bob',
        'require' => 'User[bob]',
      })
    }

    it {
      should contain_group('alice').with({
        'ensure' => 'present',
        'gid'    => 1000,
        'name'   => 'alice',
      })
    }

    it {
      should contain_group('bob').with({
        'ensure' => 'present',
        'gid'    => 1001,
        'name'   => 'bob',
      })
    }

    ['alice','bob'].each do |name|
      it { should_not contain_ssh_authorized_key(name) }
    end
  end

  context 'do not manage home' do
    let(:facts) do
      { :osfamily      => 'RedHat',
        :puppetversion => clientversion,
      }
    end
    let(:params) do
      { :users => {
          'alice' => {
            'uid'        => 1000,
            'managehome' => false
          }
        }
      }
    end

    it { should_not contain_file('/home/alice') }

    it { should_not contain_common__mkdir_p('/home/alice') }

    it { should contain_user('alice').with_managehome(false) }
  end

  context 'do not manage dotssh' do
    let(:facts) do
      { :osfamily      => 'RedHat',
        :puppetversion => clientversion,
      }
    end
    let(:params) do
      { :users => {
        'alice' => {
          'uid'           => 1000,
          'manage_dotssh' => false
        }
      }
    }
    end

    it { should_not contain_file('/home/alice/.ssh') }

    it { should_not contain_ssh_authorized_key('alice') }
  end

  describe 'with ssh_auth_key parameter specified' do
    context 'with defaults for ssh_auth_key_type parameter' do
      let(:facts) do
        { :osfamily      => 'RedHat',
          :puppetversion => clientversion,
        }
      end
      let(:params) do
        {
          :users => {
            'alice' => {
              'uid'          => 1000,
              'ssh_auth_key' => 'AAAB3NzaC1yc2EAAAABIwAAAQEArGElx46pD6NNnlxVaTbp0ZJMgBKCmbTCT3RaeCk0ZUJtQ8wkcwTtqIXmmiuFsynUT0DFSd8UIodnBOPqitimmooAVAiAi30TtJVzADfPScMiUnBJKZajIBkEMkwUcqsfh630jyBvLPE/kyQcxbEeGtbu1DG3monkeymanOBW1AKc5o+cJLXcInLnbowMG7NXzujT3BRYn/9s5vtT1V9cuZJs4XLRXQ50NluxJI7sVfRPVvQI9EMbTS4AFBXUej3yfgaLSV+nPZC/lmJ2gR4t/tKvMFF9m16f8IcZKK7o0rK7v81G/tREbOT5YhcKLK+0wBfR6RsmHzwy4EddZloyLQ==',
            }
          }
        }
      end

      it {
        should contain_ssh_authorized_key('alice').with({
          'ensure'  => 'present',
          'user'    => 'alice',
          'key'     => 'AAAB3NzaC1yc2EAAAABIwAAAQEArGElx46pD6NNnlxVaTbp0ZJMgBKCmbTCT3RaeCk0ZUJtQ8wkcwTtqIXmmiuFsynUT0DFSd8UIodnBOPqitimmooAVAiAi30TtJVzADfPScMiUnBJKZajIBkEMkwUcqsfh630jyBvLPE/kyQcxbEeGtbu1DG3monkeymanOBW1AKc5o+cJLXcInLnbowMG7NXzujT3BRYn/9s5vtT1V9cuZJs4XLRXQ50NluxJI7sVfRPVvQI9EMbTS4AFBXUej3yfgaLSV+nPZC/lmJ2gR4t/tKvMFF9m16f8IcZKK7o0rK7v81G/tREbOT5YhcKLK+0wBfR6RsmHzwy4EddZloyLQ==',
          'type'    => 'ssh-dss',
          'require' => 'File[/home/alice/.ssh]',
        })
      }
    end

    context 'with ssh_auth_key_type parameter specified' do
      let(:facts) do
        { :osfamily      => 'RedHat',
          :puppetversion => clientversion,
        }
      end
      let(:params) do
        {
          :users => {
            'alice' => {
              'uid'               => 1000,
              'ssh_auth_key'      => 'AAAB3NzaC1yc2EAAAABIwAAAQEArGElx46pD6NNnlxVaTbp0ZJMgBKCmbTCT3RaeCk0ZUJtQ8wkcwTtqIXmmiuFsynUT0DFSd8UIodnBOPqitimmooAVAiAi30TtJVzADfPScMiUnBJKZajIBkEMkwUcqsfh630jyBvLPE/kyQcxbEeGtbu1DG3monkeymanOBW1AKc5o+cJLXcInLnbowMG7NXzujT3BRYn/9s5vtT1V9cuZJs4XLRXQ50NluxJI7sVfRPVvQI9EMbTS4AFBXUej3yfgaLSV+nPZC/lmJ2gR4t/tKvMFF9m16f8IcZKK7o0rK7v81G/tREbOT5YhcKLK+0wBfR6RsmHzwy4EddZloyLQ==',
              'ssh_auth_key_type' => 'ssh-rsa',
            }
          }
        }
      end

      it {
        should contain_ssh_authorized_key('alice').with({
          'ensure'  => 'present',
          'user'    => 'alice',
          'key'     => 'AAAB3NzaC1yc2EAAAABIwAAAQEArGElx46pD6NNnlxVaTbp0ZJMgBKCmbTCT3RaeCk0ZUJtQ8wkcwTtqIXmmiuFsynUT0DFSd8UIodnBOPqitimmooAVAiAi30TtJVzADfPScMiUnBJKZajIBkEMkwUcqsfh630jyBvLPE/kyQcxbEeGtbu1DG3monkeymanOBW1AKc5o+cJLXcInLnbowMG7NXzujT3BRYn/9s5vtT1V9cuZJs4XLRXQ50NluxJI7sVfRPVvQI9EMbTS4AFBXUej3yfgaLSV+nPZC/lmJ2gR4t/tKvMFF9m16f8IcZKK7o0rK7v81G/tREbOT5YhcKLK+0wBfR6RsmHzwy4EddZloyLQ==',
          'type'    => 'ssh-rsa',
          'require' => 'File[/home/alice/.ssh]',
        })
      }
    end
  end
end