f3e79ddcd5
Tests in the new style produces the following documentation output: abs should not eq nil should run abs() and raise an Puppet::ParseError should run abs(-34) and return 34 should run abs("-34") and return 34 should run abs(34) and return 34 should run abs("34") and return 34
69 lines
4.3 KiB
Ruby
69 lines
4.3 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe 'pw_hash' do
|
|
|
|
it { is_expected.not_to eq(nil) }
|
|
|
|
context 'when there are less than 3 arguments' do
|
|
it { is_expected.to run.with_params().and_raise_error(ArgumentError, /wrong number of arguments/i) }
|
|
it { is_expected.to run.with_params('password').and_raise_error(ArgumentError, /wrong number of arguments/i) }
|
|
it { is_expected.to run.with_params('password', 'sha-256').and_raise_error(ArgumentError, /wrong number of arguments/i) }
|
|
end
|
|
|
|
context 'when there are more than 3 arguments' do
|
|
it { is_expected.to run.with_params('password', 'sha-256', 'salt', 'extra').and_raise_error(ArgumentError, /wrong number of arguments/i) }
|
|
it { is_expected.to run.with_params('password', 'sha-256', 'salt', 'extra', 'extra').and_raise_error(ArgumentError, /wrong number of arguments/i) }
|
|
end
|
|
|
|
context 'when the first argument is not a string' do
|
|
it { is_expected.to run.with_params([], 'sha-256', 'salt').and_raise_error(ArgumentError, /first argument must be a string/) }
|
|
it { is_expected.to run.with_params({}, 'sha-256', 'salt').and_raise_error(ArgumentError, /first argument must be a string/) }
|
|
it { is_expected.to run.with_params(1, 'sha-256', 'salt').and_raise_error(ArgumentError, /first argument must be a string/) }
|
|
it { is_expected.to run.with_params(true, 'sha-256', 'salt').and_raise_error(ArgumentError, /first argument must be a string/) }
|
|
end
|
|
|
|
context 'when the first argument is undefined' do
|
|
it { is_expected.to run.with_params('', 'sha-256', 'salt').and_return(nil) }
|
|
it { is_expected.to run.with_params(nil, 'sha-256', 'salt').and_return(nil) }
|
|
end
|
|
|
|
context 'when the second argument is not a string' do
|
|
it { is_expected.to run.with_params('password', [], 'salt').and_raise_error(ArgumentError, /second argument must be a string/) }
|
|
it { is_expected.to run.with_params('password', {}, 'salt').and_raise_error(ArgumentError, /second argument must be a string/) }
|
|
it { is_expected.to run.with_params('password', 1, 'salt').and_raise_error(ArgumentError, /second argument must be a string/) }
|
|
it { is_expected.to run.with_params('password', true, 'salt').and_raise_error(ArgumentError, /second argument must be a string/) }
|
|
end
|
|
|
|
context 'when the second argument is not one of the supported hashing algorithms' do
|
|
it { is_expected.to run.with_params('password', 'no such algo', 'salt').and_raise_error(ArgumentError, /is not a valid hash type/) }
|
|
end
|
|
|
|
context 'when the third argument is not a string' do
|
|
it { is_expected.to run.with_params('password', 'sha-256', []).and_raise_error(ArgumentError, /third argument must be a string/) }
|
|
it { is_expected.to run.with_params('password', 'sha-256', {}).and_raise_error(ArgumentError, /third argument must be a string/) }
|
|
it { is_expected.to run.with_params('password', 'sha-256', 1).and_raise_error(ArgumentError, /third argument must be a string/) }
|
|
it { is_expected.to run.with_params('password', 'sha-256', true).and_raise_error(ArgumentError, /third argument must be a string/) }
|
|
end
|
|
|
|
context 'when the third argument is empty' do
|
|
it { is_expected.to run.with_params('password', 'sha-512', '').and_raise_error(ArgumentError, /third argument must not be empty/) }
|
|
end
|
|
|
|
context 'when the third argument contains invalid characters' do
|
|
it { is_expected.to run.with_params('password', 'sha-512', 'one%').and_raise_error(ArgumentError, /characters in salt must be in the set/) }
|
|
end
|
|
|
|
context 'when running on a platform with a weak String#crypt implementation' do
|
|
before(:each) { allow_any_instance_of(String).to receive(:crypt).with('$1$1').and_return('a bad hash') }
|
|
|
|
it { is_expected.to run.with_params('password', 'sha-512', 'salt').and_raise_error(Puppet::ParseError, /system does not support enhanced salts/) }
|
|
end
|
|
|
|
if RUBY_PLATFORM == 'java' or 'test'.crypt('$1$1') == '$1$1$Bp8CU9Oujr9SSEw53WV6G.'
|
|
describe "on systems with enhanced salts support" do
|
|
it { is_expected.to run.with_params('password', 'md5', 'salt').and_return('$1$salt$qJH7.N4xYta3aEG/dfqo/0') }
|
|
it { is_expected.to run.with_params('password', 'sha-256', 'salt').and_return('$5$salt$Gcm6FsVtF/Qa77ZKD.iwsJlCVPY0XSMgLJL0Hnww/c1') }
|
|
it { is_expected.to run.with_params('password', 'sha-512', 'salt').and_return('$6$salt$IxDD3jeSOb5eB1CX5LBsqZFVkJdido3OUILO5Ifz5iwMuTS4XMS130MTSuDDl3aCI6WouIL9AjRbLCelDCy.g.') }
|
|
end
|
|
end
|
|
end
|