Project

General

Profile

Download (13.4 KB) Statistics
| Branch: | Tag: | Revision:
require 'test_helper'

class UnattendedControllerTest < ActionController::TestCase
setup do
Host::Managed.any_instance.stubs(:handle_ca).returns(true)
as_admin do
disable_orchestration # avoids dns errors
@rh_host = FactoryGirl.create(:host, :managed, :with_dhcp_orchestration, :build => true,
:operatingsystem => operatingsystems(:redhat),
:ptable => ptables(:one),
:medium => media(:one),
:architecture => architectures(:x86_64)
)
@ub_host = FactoryGirl.create(:host, :managed, :with_dhcp_orchestration, :build => true,
:operatingsystem => operatingsystems(:ubuntu1010),
:ptable => ptables(:ubuntu),
:medium => media(:ubuntu),
:architecture => architectures(:x86_64)
)
@host_with_template_subnet = FactoryGirl.create(:host, :managed, :with_dhcp_orchestration, :with_tftp_subnet, :build => true,
:operatingsystem => operatingsystems(:ubuntu1010),
:ptable => ptables(:ubuntu),
:medium => media(:ubuntu),
:architecture => architectures(:x86_64)
)
end
end

test "should get a kickstart" do
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
get :provision
assert_response :success
end

test "should get a kickstart even if not using the first NIC" do
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "unused NIC"
@request.env["HTTP_X_RHN_PROVISIONING_MAC_3"] = "eth4 #{@rh_host.mac}"
get :provision
assert_response :success
end

test "should get a kickstart even if we are behind a loadbalancer" do
@request.env["HTTP_X_FORWARDED_FOR"] = @rh_host.ip
@request.env["REMOTE_ADDR"] = "127.0.0.1"
get :provision
assert_response :success
end

test "should get a template from the provision interface" do
os = FactoryGirl.create(:debian7_0, :with_provision, :with_associations)
host = FactoryGirl.create(:host, :managed, :build => true, :operatingsystem => os,
:interfaces => [
FactoryGirl.build(:nic_managed, :primary => true),
FactoryGirl.build(:nic_managed, :provision => true)
])

@request.env["REMOTE_ADDR"] = host.provision_interface.ip
get :provision
assert_response :success
end

test "should get a preseed finish script" do
@request.env["REMOTE_ADDR"] = @ub_host.ip
get :finish
assert_response :success
end

test "should get a preseed finish script with multiple ips in the request header" do
@request.env["REMOTE_ADDR"] = [@ub_host.ip, '1.2.3.4']
get :finish
assert_response :success
end

test "should get a preseed" do
@request.env["REMOTE_ADDR"] = @ub_host.ip
get :provision
assert_response :success
end

test "unattended files content type should be text/plain" do
@request.env["REMOTE_ADDR"] = @ub_host.ip
get :provision
assert_response :success
assert @response.headers["Content-Type"].match("text/plain")
end

test "should set @static when requested" do
Setting[:safemode_render]=false
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
get(:provision, 'static' => 'true')
assert_match(%r{static:true}, @response.body)
end

test "should support spoof" do
get :provision, {:spoof => @ub_host.ip}, set_session_user
assert_response :success
end

test "should not render spoof when user is not logged in" do
get :provision, {:spoof => @ub_host.ip}
assert_response :redirect
end

test "should not render hostname spoof when user is not logged in" do
get :provision, {:hostname => @ub_host.fqdn}
assert_response :redirect
end

test "should not render hostname spoof when hostname is empty" do
get :provision, {:hostname => nil}, set_session_user
assert_response 404
end

test "should not render hostname spoof when spoof is empty" do
get :provision, {:spoof => nil}, set_session_user
assert_response 404
end

test "should support spoof using hostname" do
get :provision, {:hostname => @ub_host.name}, set_session_user
assert_response :success
assert_equal @ub_host.name, assigns(:host).name
end

test "should provide pxe config for redhat" do
get :PXELinux, {:spoof => @rh_host.ip}, set_session_user
assert_response :success
end

test "should provide pxe config for debian" do
get :PXELinux, {:spoof => @ub_host.ip}, set_session_user
assert_response :success
end

test "should render spoof pxelinux for a host" do
get :PXELinux, {:spoof => @rh_host.ip}, set_session_user
assert assigns(:initrd)
assert assigns(:kernel)
assert_response :success
end

test "should render spoof pxegrub for a host" do
get :PXEGrub, {:spoof => @rh_host.ip}, set_session_user
assert assigns(:initrd)
assert assigns(:kernel)
assert_response :success
end

test "should render spoof iPXE for a host" do
get :iPXE, {:spoof => @rh_host.ip}, set_session_user
assert assigns(:initrd)
assert assigns(:kernel)
assert_response :success
end

test "should render spoof gpxe for a host" do
get :gPXE, {:spoof => @rh_host.ip}, set_session_user
assert assigns(:initrd)
assert assigns(:kernel)
assert_response :success
end

test "should accept built notifications" do
@request.env["REMOTE_ADDR"] = @ub_host.ip
get :built
assert_response :created
host = Host.find_by_ip(@ub_host.ip)
assert_equal host.build,false
end

test "should not provide unattened files to hosts which are not in built state" do
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
@request.env['REMOTE_ADDR'] = '10.0.1.2'
get :built
assert_response :created
get :provision
assert_response :method_not_allowed
end

test "should not provide unattended files to hosts which we don't know about" do
get :provision
assert_response :not_found
end

test "should not provide unattended files to hosts which don't have an assign os" do
setup_users

@rh_host.update_attribute(:operatingsystem_id, nil)
@request.env["HTTP_X_RHN_PROVISIONING_MAC_0"] = "eth0 #{@rh_host.mac}"
get :provision
assert_response :conflict
end

test "template with hostgroup should be rendered" do
get :template, {:id => "MyString", :hostgroup => "Common"}
assert_response :success
end

test "template with hostgroup should be identified as hostgroup provisioning" do
ConfigTemplate.any_instance.stubs(:template).returns("type:<%= @provisioning_type %>")
get :template, {:id => "MyString2", :hostgroup => "Common"}
assert_response :success
assert_match(%r{type:hostgroup}, @response.body)
end

test "template with host should be identified as host provisioning" do
ConfigTemplate.any_instance.stubs(:template).returns("type:<%= @provisioning_type %>")
get :provision, {:hostname => @ub_host.name}, set_session_user
assert_response :success
assert_match(%r{type:host\z}, @response.body)
end

test "template with hostgroup should be rendered even if both have periods in their names" do
config_templates(:mystring).update_attributes(:name => 'My.String')
hostgroups(:common).update_attributes(:name => 'Com.mon')
assert_routing '/unattended/template/My.String/Com.mon', {:controller => 'unattended', :action => 'template', :id => "My.String", :hostgroup => "Com.mon"}
get :template, {:id => "My.String", :hostgroup => "Com.mon"}
assert_response :success
end

test "template with non-existant hostgroup should not be rendered" do
get :template, {:id => "MyString2", :hostgroup => "NotArealHostgroup"}
assert_response :not_found
end

test "requesting a template that does not exist should fail" do
get :template, {:id => "kdsfjlkasjdfkl", :hostgroup => "Common"}
assert_response :not_found
end

# All the following tests exercise the renderer, and should probably be reviewed
# once the refactoring of foreman_url is complete
test "template should contain tokens when tokens enabled and present for the host" do
token = "mytoken"
Setting[:token_duration] = 30
Setting[:unattended_url] = "https://test.host"
@request.env["REMOTE_ADDR"] = @ub_host.ip
@ub_host.create_token(:value => token, :expires => Time.now + 5.minutes)
get :provision, {'token' => @ub_host.token.value }
assert @response.body.include?("#{Setting[:unattended_url]}:443/unattended/finish?token=#{token}")
end

test "hosts with unknown ip and valid token should render a template" do
Setting[:token_duration] = 30
@request.env["REMOTE_ADDR"] = '127.0.0.1'
@ub_host.create_token(:value => "aaaaaa", :expires => Time.now + 5.minutes)
get :provision, {'token' => @ub_host.token.value }
assert_response :success
end

context "location or organizations are not enabled" do
before do
SETTINGS[:locations_enabled] = false
SETTINGS[:organizations_enabled] = false
end

after do
SETTINGS[:locations_enabled] = true
SETTINGS[:organizations_enabled] = true
end

test "hosts with mismatched ip and update_ip=false should have the old ip" do
disable_orchestration # avoids dns errors
Setting[:token_duration] = 30
Setting[:update_ip_from_built_request] = false
@request.env["REMOTE_ADDR"] = '127.0.0.1'
h=@ub_host
h.create_token(:value => "aaaaaa", :expires => Time.now + 5.minutes)
get :built, {'token' => h.token.value }
h_new=Host.find_by_name(h.name)

assert_response :success
assert_equal h.ip, h_new.ip
end

test "hosts with mismatched ip and update_ip true should have the new ip" do
disable_orchestration # avoids dns errors
Setting[:token_duration] = 30
Setting[:update_ip_from_built_request] = true
h=@ub_host
new_ip = h.subnet.network.gsub(/\.0$/,'.100') # Must be in the subnet, which isn't fixed
@request.env["REMOTE_ADDR"] = new_ip
refute_equal new_ip, h.ip
h.create_token(:value => "aaaaab", :expires => Time.now + 5.minutes)
get :built, {'token' => h.token.value }
h_new=Host.find_by_name(h.reload.name)
assert_response :success
assert_equal new_ip, h_new.ip
end

test "hosts with mismatched ip and update_ip true and a duplicate ip should succeed with no ip update" do
disable_orchestration # avoids dns errors
Setting[:token_duration] = 30
Setting[:update_ip_from_built_request] = true
@request.env["REMOTE_ADDR"] = @rh_host.ip
h=@ub_host
h.create_token(:value => "aaaaac", :expires => Time.now + 5.minutes)
get :built, {'token' => h.token.value }
assert_response :success
h_new=Host.find_by_name(h.reload.name)
assert_equal h.ip, h_new.ip
end

# Should this test be moved into renderer_test, as it excercises foreman_url() functionality?
test "template should contain tokens when tokens enabled and present for the host" do
Setting[:token_duration] = 30
Setting[:unattended_url] = "http://test.host"
@request.env["REMOTE_ADDR"] = @ub_host.ip
@ub_host.create_token(:value => "aaaaaa", :expires => Time.now + 5.minutes)
get :provision
assert @response.body.include?("http://test.host:80/unattended/finish?token=aaaaaa")
end
end # end of context "location or organizations are not enabled"

test "hosts with a template proxy which supplies a templateServer should use it" do
template_server_from_proxy = 'https://someproxy:8443'
ProxyAPI::Template.any_instance.stubs(:template_url).returns(template_server_from_proxy)
@request.env["REMOTE_ADDR"] = '127.0.0.1'
@host_with_template_subnet.create_token(:value => "aaaaad", :expires => Time.now + 5.minutes)
get :provision, {'token' => @host_with_template_subnet.token.value }
assert @response.body.include?("#{template_server_from_proxy}/unattended/finish?token=aaaaad")
end

test "hosts with a template proxy with no templateServer should use the proxy name" do
Setting[:token_duration] = 30
Setting[:unattended_url] = "http://test.host"
@request.env["REMOTE_ADDR"] = '127.0.0.1'
@host_with_template_subnet.create_token(:value => "aaaaae", :expires => Time.now + 5.minutes)
get :provision, {'token' => @host_with_template_subnet.token.value }
assert @response.body.include?("#{@host_with_template_subnet.subnet.tftp.url}/unattended/finish?token=aaaaae")
end

# Should this test be moved into renderer_test, as it excercises foreman_url() functionality?
test "template should not contain https when ssl enabled" do
@request.env["HTTPS"] = "on"
@request.env["REMOTE_ADDR"] = @ub_host.ip
get :provision
assert_match(%r{http://}, @response.body)
assert_no_match(%r{https://}, @response.body)
end

test "should return and log error when template not found" do
@request.env["REMOTE_ADDR"] = @ub_host.ip
Host::Managed.any_instance.expects(:configTemplate).returns(nil)
Rails.logger.expects(:error).with(regexp_matches(/unable to find provision template/))
get :provision
assert_response :not_found
end
end
(42-42/44)