summaryrefslogtreecommitdiffstats
path: root/spec/unit/indirector/key/file_spec.rb
blob: bf9b293d86640b427c262619dcbaea03f16acfbc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
#!/usr/bin/env rspec
#
#  Created by Luke Kanies on 2008-3-7.
#  Copyright (c) 2007. All rights reserved.

require 'spec_helper'

require 'puppet/indirector/key/file'

describe Puppet::SSL::Key::File do
  it "should have documentation" do
    Puppet::SSL::Key::File.doc.should be_instance_of(String)
  end

  it "should use the :privatekeydir as the collection directory" do
    Puppet.settings.expects(:value).with(:privatekeydir).returns "/key/dir"
    Puppet::SSL::Key::File.collection_directory.should == "/key/dir"
  end

  it "should store the ca key at the :cakey location" do
    Puppet.settings.stubs(:use)
    Puppet.settings.stubs(:value).returns "whatever"
    Puppet.settings.stubs(:value).with(:cakey).returns "/ca/key"
    file = Puppet::SSL::Key::File.new
    file.stubs(:ca?).returns true
    file.path("whatever").should == "/ca/key"
  end

  describe "when choosing the path for the public key" do
    it "should use the :capub setting location if the key is for the certificate authority" do
      Puppet.settings.stubs(:value).returns "/fake/dir"
      Puppet.settings.stubs(:value).with(:capub).returns "/ca/pubkey"
      Puppet.settings.stubs(:use)

      @searcher = Puppet::SSL::Key::File.new
      @searcher.stubs(:ca?).returns true
      @searcher.public_key_path("whatever").should == "/ca/pubkey"
    end

    it "should use the host name plus '.pem' in :publickeydir for normal hosts" do
      Puppet.settings.stubs(:value).with(:privatekeydir).returns "/private/key/dir"
      Puppet.settings.stubs(:value).with(:publickeydir).returns "/public/key/dir"
      Puppet.settings.stubs(:use)

      @searcher = Puppet::SSL::Key::File.new
      @searcher.stubs(:ca?).returns false
      @searcher.public_key_path("whatever").should == "/public/key/dir/whatever.pem"
    end
  end

  describe "when managing private keys" do
    before do
      @searcher = Puppet::SSL::Key::File.new

      @private_key_path = File.join("/fake/key/path")
      @public_key_path = File.join("/other/fake/key/path")

      @searcher.stubs(:public_key_path).returns @public_key_path
      @searcher.stubs(:path).returns @private_key_path

      FileTest.stubs(:directory?).returns true
      FileTest.stubs(:writable?).returns true

      @public_key = stub 'public_key'
      @real_key = stub 'sslkey', :public_key => @public_key

      @key = stub 'key', :name => "myname", :content => @real_key

      @request = stub 'request', :key => "myname", :instance => @key
    end

    it "should save the public key when saving the private key" do
      Puppet.settings.stubs(:writesub)

      fh = mock 'filehandle'

      Puppet.settings.expects(:writesub).with(:publickeydir, @public_key_path).yields fh
      @public_key.expects(:to_pem).returns "my pem"

      fh.expects(:print).with "my pem"

      @searcher.save(@request)
    end

    it "should destroy the public key when destroying the private key" do
      File.stubs(:unlink).with(@private_key_path)
      FileTest.stubs(:exist?).with(@private_key_path).returns true
      FileTest.expects(:exist?).with(@public_key_path).returns true
      File.expects(:unlink).with(@public_key_path)

      @searcher.destroy(@request)
    end

    it "should not fail if the public key does not exist when deleting the private key" do
      File.stubs(:unlink).with(@private_key_path)

      FileTest.stubs(:exist?).with(@private_key_path).returns true
      FileTest.expects(:exist?).with(@public_key_path).returns false
      File.expects(:unlink).with(@public_key_path).never

      @searcher.destroy(@request)
    end
  end
end