Mercurial > repos > other > Puppet
view modules/firewall/spec/acceptance/firewall_uid_spec.rb @ 39:d6f2a0ee45c0 puppet-3.6
Add "Firewall" module
author | IBBoard <dev@ibboard.co.uk> |
---|---|
date | Sat, 14 Mar 2015 20:58:03 +0000 |
parents | |
children |
line wrap: on
line source
require 'spec_helper_acceptance' describe 'firewall type', :unless => UNSUPPORTED_PLATFORMS.include?(fact('osfamily')) do describe 'reset' do it 'deletes all rules' do shell('iptables --flush; iptables -t nat --flush; iptables -t mangle --flush') end it 'deletes all ip6tables rules' do shell('ip6tables --flush; ip6tables -t nat --flush; ip6tables -t mangle --flush') end end describe "uid tests" do context 'uid set to root' do it 'applies' do pp = <<-EOS class { '::firewall': } firewall { '801 - test': chain => 'OUTPUT', action => accept, uid => 'root', proto => 'all', } EOS apply_manifest(pp, :catch_failures => true) unless fact('selinux') == 'true' apply_manifest(pp, :catch_changes => true) end end it 'should contain the rule' do shell('iptables-save') do |r| expect(r.stdout).to match(/-A OUTPUT -m owner --uid-owner (0|root) -m comment --comment "801 - test" -j ACCEPT/) end end end context 'uid set to !root' do it 'applies' do pp = <<-EOS class { '::firewall': } firewall { '802 - test': chain => 'OUTPUT', action => accept, uid => '!root', proto => 'all', } EOS apply_manifest(pp, :catch_failures => true) unless fact('selinux') == 'true' apply_manifest(pp, :catch_changes => true) end end it 'should contain the rule' do shell('iptables-save') do |r| expect(r.stdout).to match(/-A OUTPUT -m owner ! --uid-owner (0|root) -m comment --comment "802 - test" -j ACCEPT/) end end end context 'uid set to 0' do it 'applies' do pp = <<-EOS class { '::firewall': } firewall { '803 - test': chain => 'OUTPUT', action => accept, uid => '0', proto => 'all', } EOS apply_manifest(pp, :catch_failures => true) unless fact('selinux') == 'true' apply_manifest(pp, :catch_changes => true) end end it 'should contain the rule' do shell('iptables-save') do |r| expect(r.stdout).to match(/-A OUTPUT -m owner --uid-owner (0|root) -m comment --comment "803 - test" -j ACCEPT/) end end end context 'uid set to !0' do it 'applies' do pp = <<-EOS class { '::firewall': } firewall { '804 - test': chain => 'OUTPUT', action => accept, uid => '!0', proto => 'all', } EOS apply_manifest(pp, :catch_failures => true) unless fact('selinux') == 'true' apply_manifest(pp, :catch_changes => true) end end it 'should contain the rule' do shell('iptables-save') do |r| expect(r.stdout).to match(/-A OUTPUT -m owner ! --uid-owner (0|root) -m comment --comment "804 - test" -j ACCEPT/) end end end end end