|
require 'test_helper'
|
|
|
|
class UnattendedControllerTest < ActionController::TestCase
|
|
setup do
|
|
Host::Managed.any_instance.stubs(:handle_ca).returns(true)
|
|
as_admin do
|
|
disable_orchestration # avoids dns errors
|
|
@rh_host = FactoryGirl.create(:host, :managed, :with_dhcp_orchestration, :build => true,
|
|
:operatingsystem => operatingsystems(:redhat),
|
|
:ptable => ptables(:one),
|
|
:medium => media(:one),
|
|
:architecture => architectures(:x86_64)
|
|
)
|
|
@ub_host = FactoryGirl.create(:host, :managed, :with_dhcp_orchestration, :build => true,
|
|
:operatingsystem => operatingsystems(:ubuntu1010),
|
|
:ptable => ptables(:ubuntu),
|
|
:medium => media(:ubuntu),
|
|
:architecture => architectures(:x86_64)
|
|
)
|
|
@host_with_template_subnet = FactoryGirl.create(:host, :managed, :with_dhcp_orchestration, :with_tftp_subnet, :build => true,
|
|
:operatingsystem => operatingsystems(:ubuntu1010),
|
|
:ptable => ptables(:ubuntu),
|
|
:medium => media(:ubuntu),
|
|
:architecture => architectures(:x86_64)
|
|
)
|
|
end
|
|
end
|
|
|
|
test "should get a kickstart" do
|
|
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
|
|
get :provision
|
|
assert_response :success
|
|
end
|
|
|
|
test "should get a kickstart even if not using the first NIC" do
|
|
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "unused NIC"
|
|
@request.env["HTTP_X_RHN_PROVISIONING_MAC_3"] = "eth4 #{@rh_host.mac}"
|
|
get :provision
|
|
assert_response :success
|
|
end
|
|
|
|
test "should get a kickstart even if we are behind a loadbalancer" do
|
|
@request.env["HTTP_X_FORWARDED_FOR"] = @rh_host.ip
|
|
@request.env["REMOTE_ADDR"] = "127.0.0.1"
|
|
get :provision
|
|
assert_response :success
|
|
end
|
|
|
|
test "should get a template from the provision interface" do
|
|
os = FactoryGirl.create(:debian7_0, :with_provision, :with_associations)
|
|
host = FactoryGirl.create(:host, :managed, :build => true, :operatingsystem => os,
|
|
:interfaces => [
|
|
FactoryGirl.build(:nic_managed, :primary => true),
|
|
FactoryGirl.build(:nic_managed, :provision => true)
|
|
])
|
|
|
|
@request.env["REMOTE_ADDR"] = host.provision_interface.ip
|
|
get :provision
|
|
assert_response :success
|
|
end
|
|
|
|
test "should get a preseed finish script" do
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
get :finish
|
|
assert_response :success
|
|
end
|
|
|
|
test "should get a preseed finish script with multiple ips in the request header" do
|
|
@request.env["REMOTE_ADDR"] = [@ub_host.ip, '1.2.3.4']
|
|
get :finish
|
|
assert_response :success
|
|
end
|
|
|
|
test "should get a preseed" do
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
get :provision
|
|
assert_response :success
|
|
end
|
|
|
|
test "unattended files content type should be text/plain" do
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
get :provision
|
|
assert_response :success
|
|
assert @response.headers["Content-Type"].match("text/plain")
|
|
end
|
|
|
|
test "should set @static when requested" do
|
|
Setting[:safemode_render]=false
|
|
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
|
|
get(:provision, 'static' => 'true')
|
|
assert_match(%r{static:true}, @response.body)
|
|
end
|
|
|
|
test "should support spoof" do
|
|
get :provision, {:spoof => @ub_host.ip}, set_session_user
|
|
assert_response :success
|
|
end
|
|
|
|
test "should not render spoof when user is not logged in" do
|
|
get :provision, {:spoof => @ub_host.ip}
|
|
assert_response :redirect
|
|
end
|
|
|
|
test "should not render hostname spoof when user is not logged in" do
|
|
get :provision, {:hostname => @ub_host.fqdn}
|
|
assert_response :redirect
|
|
end
|
|
|
|
test "should not render hostname spoof when hostname is empty" do
|
|
get :provision, {:hostname => nil}, set_session_user
|
|
assert_response 404
|
|
end
|
|
|
|
test "should not render hostname spoof when spoof is empty" do
|
|
get :provision, {:spoof => nil}, set_session_user
|
|
assert_response 404
|
|
end
|
|
|
|
test "should support spoof using hostname" do
|
|
get :provision, {:hostname => @ub_host.name}, set_session_user
|
|
assert_response :success
|
|
assert_equal @ub_host.name, assigns(:host).name
|
|
end
|
|
|
|
test "should provide pxe config for redhat" do
|
|
get :PXELinux, {:spoof => @rh_host.ip}, set_session_user
|
|
assert_response :success
|
|
end
|
|
|
|
test "should provide pxe config for debian" do
|
|
get :PXELinux, {:spoof => @ub_host.ip}, set_session_user
|
|
assert_response :success
|
|
end
|
|
|
|
test "should render spoof pxelinux for a host" do
|
|
get :PXELinux, {:spoof => @rh_host.ip}, set_session_user
|
|
assert assigns(:initrd)
|
|
assert assigns(:kernel)
|
|
assert_response :success
|
|
end
|
|
|
|
test "should render spoof pxegrub for a host" do
|
|
get :PXEGrub, {:spoof => @rh_host.ip}, set_session_user
|
|
assert assigns(:initrd)
|
|
assert assigns(:kernel)
|
|
assert_response :success
|
|
end
|
|
|
|
test "should render spoof iPXE for a host" do
|
|
get :iPXE, {:spoof => @rh_host.ip}, set_session_user
|
|
assert assigns(:initrd)
|
|
assert assigns(:kernel)
|
|
assert_response :success
|
|
end
|
|
|
|
test "should render spoof gpxe for a host" do
|
|
get :gPXE, {:spoof => @rh_host.ip}, set_session_user
|
|
assert assigns(:initrd)
|
|
assert assigns(:kernel)
|
|
assert_response :success
|
|
end
|
|
|
|
test "should accept built notifications" do
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
get :built
|
|
assert_response :created
|
|
host = Host.find_by_ip(@ub_host.ip)
|
|
assert_equal host.build,false
|
|
end
|
|
|
|
test "should not provide unattened files to hosts which are not in built state" do
|
|
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
|
|
@request.env['REMOTE_ADDR'] = '10.0.1.2'
|
|
get :built
|
|
assert_response :created
|
|
get :provision
|
|
assert_response :method_not_allowed
|
|
end
|
|
|
|
test "should not provide unattended files to hosts which we don't know about" do
|
|
get :provision
|
|
assert_response :not_found
|
|
end
|
|
|
|
test "should not provide unattended files to hosts which don't have an assign os" do
|
|
setup_users
|
|
|
|
@rh_host.update_attribute(:operatingsystem_id, nil)
|
|
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
|
|
get :provision
|
|
assert_response :conflict
|
|
end
|
|
|
|
test "template with hostgroup should be rendered" do
|
|
get :template, {:id => "MyString", :hostgroup => "Common"}
|
|
assert_response :success
|
|
end
|
|
|
|
test "template with hostgroup should be identified as hostgroup provisioning" do
|
|
ConfigTemplate.any_instance.stubs(:template).returns("type:<%= @provisioning_type %>")
|
|
get :template, {:id => "MyString2", :hostgroup => "Common"}
|
|
assert_response :success
|
|
assert_match(%r{type:hostgroup}, @response.body)
|
|
end
|
|
|
|
test "template with host should be identified as host provisioning" do
|
|
ConfigTemplate.any_instance.stubs(:template).returns("type:<%= @provisioning_type %>")
|
|
get :provision, {:hostname => @ub_host.name}, set_session_user
|
|
assert_response :success
|
|
assert_match(%r{type:host\z}, @response.body)
|
|
end
|
|
|
|
test "template with hostgroup should be rendered even if both have periods in their names" do
|
|
config_templates(:mystring).update_attributes(:name => 'My.String')
|
|
hostgroups(:common).update_attributes(:name => 'Com.mon')
|
|
assert_routing '/unattended/template/My.String/Com.mon', {:controller => 'unattended', :action => 'template', :id => "My.String", :hostgroup => "Com.mon"}
|
|
get :template, {:id => "My.String", :hostgroup => "Com.mon"}
|
|
assert_response :success
|
|
end
|
|
|
|
test "template with non-existant hostgroup should not be rendered" do
|
|
get :template, {:id => "MyString2", :hostgroup => "NotArealHostgroup"}
|
|
assert_response :not_found
|
|
end
|
|
|
|
test "requesting a template that does not exist should fail" do
|
|
get :template, {:id => "kdsfjlkasjdfkl", :hostgroup => "Common"}
|
|
assert_response :not_found
|
|
end
|
|
|
|
# All the following tests exercise the renderer, and should probably be reviewed
|
|
# once the refactoring of foreman_url is complete
|
|
test "template should contain tokens when tokens enabled and present for the host" do
|
|
token = "mytoken"
|
|
Setting[:token_duration] = 30
|
|
Setting[:unattended_url] = "https://test.host"
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
@ub_host.create_token(:value => token, :expires => Time.now + 5.minutes)
|
|
get :provision, {'token' => @ub_host.token.value }
|
|
assert @response.body.include?("#{Setting[:unattended_url]}:443/unattended/finish?token=#{token}")
|
|
end
|
|
|
|
test "hosts with unknown ip and valid token should render a template" do
|
|
Setting[:token_duration] = 30
|
|
@request.env["REMOTE_ADDR"] = '127.0.0.1'
|
|
@ub_host.create_token(:value => "aaaaaa", :expires => Time.now + 5.minutes)
|
|
get :provision, {'token' => @ub_host.token.value }
|
|
assert_response :success
|
|
end
|
|
|
|
context "location or organizations are not enabled" do
|
|
before do
|
|
SETTINGS[:locations_enabled] = false
|
|
SETTINGS[:organizations_enabled] = false
|
|
end
|
|
|
|
after do
|
|
SETTINGS[:locations_enabled] = true
|
|
SETTINGS[:organizations_enabled] = true
|
|
end
|
|
|
|
test "hosts with mismatched ip and update_ip=false should have the old ip" do
|
|
disable_orchestration # avoids dns errors
|
|
Setting[:token_duration] = 30
|
|
Setting[:update_ip_from_built_request] = false
|
|
@request.env["REMOTE_ADDR"] = '127.0.0.1'
|
|
h=@ub_host
|
|
h.create_token(:value => "aaaaaa", :expires => Time.now + 5.minutes)
|
|
get :built, {'token' => h.token.value }
|
|
h_new=Host.find_by_name(h.name)
|
|
|
|
assert_response :success
|
|
assert_equal h.ip, h_new.ip
|
|
end
|
|
|
|
test "hosts with mismatched ip and update_ip true should have the new ip" do
|
|
disable_orchestration # avoids dns errors
|
|
Setting[:token_duration] = 30
|
|
Setting[:update_ip_from_built_request] = true
|
|
h=@ub_host
|
|
new_ip = h.subnet.network.gsub(/\.0$/,'.100') # Must be in the subnet, which isn't fixed
|
|
@request.env["REMOTE_ADDR"] = new_ip
|
|
refute_equal new_ip, h.ip
|
|
h.create_token(:value => "aaaaab", :expires => Time.now + 5.minutes)
|
|
get :built, {'token' => h.token.value }
|
|
h_new=Host.find_by_name(h.reload.name)
|
|
assert_response :success
|
|
assert_equal new_ip, h_new.ip
|
|
end
|
|
|
|
test "hosts with mismatched ip and update_ip true and a duplicate ip should succeed with no ip update" do
|
|
disable_orchestration # avoids dns errors
|
|
Setting[:token_duration] = 30
|
|
Setting[:update_ip_from_built_request] = true
|
|
@request.env["REMOTE_ADDR"] = @rh_host.ip
|
|
h=@ub_host
|
|
h.create_token(:value => "aaaaac", :expires => Time.now + 5.minutes)
|
|
get :built, {'token' => h.token.value }
|
|
assert_response :success
|
|
h_new=Host.find_by_name(h.reload.name)
|
|
assert_equal h.ip, h_new.ip
|
|
end
|
|
|
|
# Should this test be moved into renderer_test, as it excercises foreman_url() functionality?
|
|
test "template should contain tokens when tokens enabled and present for the host" do
|
|
Setting[:token_duration] = 30
|
|
Setting[:unattended_url] = "http://test.host"
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
@ub_host.create_token(:value => "aaaaaa", :expires => Time.now + 5.minutes)
|
|
get :provision
|
|
assert @response.body.include?("http://test.host:80/unattended/finish?token=aaaaaa")
|
|
end
|
|
end # end of context "location or organizations are not enabled"
|
|
|
|
test "hosts with a template proxy which supplies a templateServer should use it" do
|
|
template_server_from_proxy = 'https://someproxy:8443'
|
|
ProxyAPI::Template.any_instance.stubs(:template_url).returns(template_server_from_proxy)
|
|
@request.env["REMOTE_ADDR"] = '127.0.0.1'
|
|
@host_with_template_subnet.create_token(:value => "aaaaad", :expires => Time.now + 5.minutes)
|
|
get :provision, {'token' => @host_with_template_subnet.token.value }
|
|
assert @response.body.include?("#{template_server_from_proxy}/unattended/finish?token=aaaaad")
|
|
end
|
|
|
|
test "hosts with a template proxy with no templateServer should use the proxy name" do
|
|
Setting[:token_duration] = 30
|
|
Setting[:unattended_url] = "http://test.host"
|
|
@request.env["REMOTE_ADDR"] = '127.0.0.1'
|
|
@host_with_template_subnet.create_token(:value => "aaaaae", :expires => Time.now + 5.minutes)
|
|
get :provision, {'token' => @host_with_template_subnet.token.value }
|
|
assert @response.body.include?("#{@host_with_template_subnet.subnet.tftp.url}/unattended/finish?token=aaaaae")
|
|
end
|
|
|
|
# Should this test be moved into renderer_test, as it excercises foreman_url() functionality?
|
|
test "template should not contain https when ssl enabled" do
|
|
@request.env["HTTPS"] = "on"
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
get :provision
|
|
assert_match(%r{http://}, @response.body)
|
|
assert_no_match(%r{https://}, @response.body)
|
|
end
|
|
|
|
test "should return and log error when template not found" do
|
|
@request.env["REMOTE_ADDR"] = @ub_host.ip
|
|
Host::Managed.any_instance.expects(:configTemplate).returns(nil)
|
|
Rails.logger.expects(:error).with(regexp_matches(/unable to find provision template/))
|
|
get :provision
|
|
assert_response :not_found
|
|
end
|
|
end
|