Project

General

Profile

Download (37.7 KB) Statistics
| Branch: | Tag: | Revision:
require 'test_helper'

class HostTest < ActiveSupport::TestCase
setup do
disable_orchestration
User.current = User.find_by_login "admin"
Setting[:token_duration] = 0
end

test "should not save without a hostname" do
host = Host.new
host.valid?
assert host.errors[:name].include?("can't be blank")
end

test "should not save with invalid hostname" do
host = Host.new :name => "invalid_hostname"
host.valid?
assert_equal "is invalid", host.errors[:name].first
end

test "should not save hostname with periods in shortname" do
host = Host.new :name => "my.host", :domain => Domain.find_or_create_by_name("mydomain.net"), :managed => true
host.valid?
assert_equal "must not include periods", host.errors[:name].first
end

test "should make hostname lowercase" do
host = Host.new :name => "MYHOST", :domain => Domain.find_or_create_by_name("mydomain.net")
host.valid?
assert_equal "myhost.mydomain.net", host.name
end

test "should update name when domain is changed" do
host = hosts(:one)
host.domain_name = "yourdomain.net"
host.save!
assert_equal "my5name.yourdomain.net", host.name
end

test "should fix mac address hyphens" do
host = Host.create :name => "myhost", :mac => "aa-bb-cc-dd-ee-ff"
assert_equal "aa:bb:cc:dd:ee:ff", host.mac
end

test "should fix mac address" do
host = Host.create :name => "myhost", :mac => "aabbccddeeff"
assert_equal "aa:bb:cc:dd:ee:ff", host.mac
end

test "should keep valid mac address" do
host = Host.create :name => "myhost", :mac => "aa:bb:cc:dd:ee:ff"
assert_equal "aa:bb:cc:dd:ee:ff", host.mac
end

test "should fix ip address if a leading zero is used" do
host = Host.create :name => "myhost", :mac => "aabbccddeeff", :ip => "123.01.02.03"
assert_equal "123.1.2.3", host.ip
end

test "should add domain name to hostname" do
host = Host.create :name => "myhost", :mac => "aabbccddeeff", :ip => "123.01.02.03",
:domain => Domain.find_or_create_by_name("company.com")
assert_equal "myhost.company.com", host.name
end

test "should not add domain name to hostname if it already include it" do
host = Host.create :name => "myhost.company.com", :mac => "aabbccddeeff", :ip => "123.1.2.3",
:domain => Domain.find_or_create_by_name("company.com")
assert_equal "myhost.company.com", host.name
end

test "should add hostname if it contains domain name" do
host = Host.create :name => "myhost.company.com", :mac => "aabbccddeeff", :ip => "123.01.02.03",
:domain => Domain.find_or_create_by_name("company.com")
assert_equal "myhost.company.com", host.name
end

test "should not append domainname to fqdn" do
host = Host.create :name => "myhost.sub.comp.net", :mac => "aabbccddeeff", :ip => "123.01.02.03",
:domain => Domain.find_or_create_by_name("company.com"),
:certname => "myhost.sub.comp.net",
:managed => false
assert_equal "myhost.sub.comp.net", host.name
end

test "should save hosts with full stop in their name" do
host = Host.create :name => "my.host.company.com", :mac => "aabbccddeeff", :ip => "123.01.02.03",
:domain => Domain.find_or_create_by_name("company.com")
assert_equal "my.host.company.com", host.name
end


test "should be able to save host" do
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.3",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :puppet_proxy => smart_proxies(:puppetmaster),
:environment => environments(:production), :disk => "empty partition"
assert host.valid?
assert !host.new_record?
end

test "non-admin user should be able to create host with new lookup value" do
User.current = users(:one)
User.current.roles << [roles(:manager)]
assert_difference('LookupValue.count') do
assert Host.create! :name => "abc.mydomain.net", :mac => "aabbecddeeff", :ip => "2.3.4.3",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :puppet_proxy => smart_proxies(:puppetmaster),
:environment => environments(:production), :disk => "empty partition",
:lookup_values_attributes => {"new_123456" => {"lookup_key_id" => lookup_keys(:complex).id, "value"=>"some_value", "match" => "fqdn=abc.mydomain.net"}}
end
end

test "lookup value has right matcher for a host" do
assert_difference('LookupValue.where(:lookup_key_id => lookup_keys(:five).id, :match => "fqdn=abc.mydomain.net").count') do
h = Host.create! :name => "abc", :mac => "aabbecddeeff", :ip => "2.3.4.3",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :puppet_proxy => smart_proxies(:puppetmaster),
:environment => environments(:production), :disk => "empty partition",
:lookup_values_attributes => {"new_123456" => {"lookup_key_id" => lookup_keys(:five).id, "value"=>"some_value"}}
end
end

test "should be able to add new lookup value on update_attributes" do
host = hosts(:redhat) #temp01.yourdomain.net
lookup_key = lookup_keys(:three)
assert_difference('LookupValue.count') do
assert host.update_attributes!(:lookup_values_attributes => {:new_123456 =>
{:lookup_key_id => lookup_key.id, :value => true, :match => "fqdn=temp01.yourdomain.net",
:_destroy => 'false'}})
end
end

test "should be able to delete existing lookup value on update_attributes" do
#in fixtures lookup_keys.yml, lookup_values(:one) has hosts(:one) and lookup_keys(:one)
host = hosts(:one)
lookup_key = lookup_keys(:one)
lookup_value = lookup_values(:one)
assert_difference('LookupValue.count', -1) do
assert host.update_attributes!(:lookup_values_attributes => {'0' =>
{:lookup_key_id => lookup_key.id, :value => '8080', :match => "fqdn=temp01.yourdomain.net",
:id => lookup_values(:one).id, :_destroy => 'true'}})
end
end

test "should be able to update lookup value on update_attributes" do
#in fixtures lookup_keys.yml, lookup_values(:one) has hosts(:one) and lookup_keys(:one)
host = hosts(:one)
lookup_key = lookup_keys(:one)
lookup_value = lookup_values(:one)
assert_difference('LookupValue.count', 0) do
assert host.update_attributes!(:lookup_values_attributes => {'0' =>
{:lookup_key_id => lookup_key.id, :value => '80', :match => "fqdn=temp01.yourdomain.net",
:id => lookup_values(:one).id, :_destroy => 'false'}})
end
lookup_value.reload
assert_equal 80, lookup_value.value
end

test "should import facts from json stream" do
h=Host.new(:name => "sinn1636.lan")
h.disk = "!" # workaround for now
assert h.importFacts(JSON.parse(File.read(File.expand_path(File.dirname(__FILE__) + "/facts.json")))['facts'])
end

test "should import facts from json of a new host when certname is not specified" do
refute Host.find_by_name('sinn1636.lan')
raw = parse_json_fixture('/facts.json')
assert Host.importHostAndFacts(raw['name'], raw['facts'])
assert Host.find_by_name('sinn1636.lan')
end

test "should downcase hostname parameter from json of a new host" do
raw = parse_json_fixture('/facts_with_caps.json')
assert Host.importHostAndFacts(raw['name'], raw['facts'])
assert Host.find_by_name('sinn1636.lan')
end

test "should import facts idempotently" do
raw = parse_json_fixture('/facts_with_caps.json')
assert Host.importHostAndFacts(raw['name'], raw['facts'])
value_ids = Host.find_by_name('sinn1636.lan').fact_values.map(&:id)
assert Host.importHostAndFacts(raw['name'], raw['facts'])
assert_equal value_ids.sort, Host.find_by_name('sinn1636.lan').fact_values.map(&:id).sort
end

test "should find a host by certname not fqdn when provided" do
Host.new(:name => 'sinn1636.fail', :certname => 'sinn1636.lan.cert').save(:validate => false)
assert Host.find_by_name('sinn1636.fail').ip.nil?
# hostname in the json is sinn1636.lan, so if the facts have been updated for
# this host, it's a successful identification by certname
raw = parse_json_fixture('/facts_with_certname.json')
assert Host.importHostAndFacts(raw['name'], raw['facts'], raw['certname'])
assert_equal '10.35.27.2', Host.find_by_name('sinn1636.fail').ip
end

test "should update certname when host is found by hostname and certname is provided" do
Host.new(:name => 'sinn1636.lan', :certname => 'sinn1636.cert.fail').save(:validate => false)
assert_equal 'sinn1636.cert.fail', Host.find_by_name('sinn1636.lan').certname
raw = parse_json_fixture('/facts_with_certname.json')
assert Host.importHostAndFacts(raw['name'], raw['facts'], raw['certname'])
assert_equal 'sinn1636.lan.cert', Host.find_by_name('sinn1636.lan').certname
end

test "host is created when uploading facts if setting is true" do
assert_difference 'Host.count' do
Setting[:create_new_host_when_facts_are_uploaded] = true
raw = parse_json_fixture('/facts_with_certname.json')
Host.importHostAndFacts(raw['name'], raw['facts'], raw['certname'])
assert Host.find_by_name('sinn1636.lan')
Setting[:create_new_host_when_facts_are_uploaded] =
Setting.find_by_name("create_new_host_when_facts_are_uploaded").default
end
end

test "host is not created when uploading facts if setting is false" do
Setting[:create_new_host_when_facts_are_uploaded] = false
assert_equal false, Setting[:create_new_host_when_facts_are_uploaded]
raw = parse_json_fixture('/facts_with_certname.json')
assert Host.importHostAndFacts(raw['name'], raw['facts'], raw['certname'])
host = Host.find_by_name('sinn1636.lan')
Setting[:create_new_host_when_facts_are_uploaded] =
Setting.find_by_name("create_new_host_when_facts_are_uploaded").default
assert_nil host
end

test "host is created when receiving a report if setting is true" do
assert_difference 'Host.count' do
Setting[:create_new_host_when_report_is_uploaded] = true
Report.import parse_json_fixture("/../fixtures/report-no-logs.json")
assert Host.find_by_name('builder.fm.example.net')
Setting[:create_new_host_when_report_is_uploaded] =
Setting.find_by_name("create_new_host_when_facts_are_uploaded").default
end
end

test "host is not created when receiving a report if setting is false" do
Setting[:create_new_host_when_report_is_uploaded] = false
assert_equal false, Setting[:create_new_host_when_report_is_uploaded]
Report.import parse_json_fixture("/../fixtures/report-no-logs.json")
host = Host.find_by_name('builder.fm.example.net')
Setting[:create_new_host_when_report_is_uploaded] =
Setting.find_by_name("create_new_host_when_facts_are_uploaded").default
assert_nil host
end

test "should not save if root password is undefined when the host is managed" do
host = Host.new :name => "myfullhost", :managed => true
assert !host.valid?
assert host.errors[:root_pass].any?
end

test "should save if root password is undefined when the compute resource is image capable" do
host = Host.new :name => "myfullhost", :managed => true, :compute_resource_id => compute_resources(:openstack).id
host.valid?
refute host.errors[:root_pass].any?
end

test "should not save if neither ptable or disk are defined when the host is managed" do
if unattended?
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.4.4.03",
:domain => domains(:mydomain), :operatingsystem => Operatingsystem.first, :subnet => subnets(:one),
:architecture => Architecture.first, :environment => Environment.first, :managed => true
assert !host.valid?
end
end

test "should save if neither ptable or disk are defined when the host is not managed" do
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one), :puppet_proxy => smart_proxies(:puppetmaster),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => false
assert host.valid?
end

test "should save if ptable is defined" do
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :puppet_proxy => smart_proxies(:puppetmaster),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :environment => environments(:production), :ptable => Ptable.first
assert !host.new_record?
end

test "should save if disk is defined" do
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one),
:architecture => architectures(:x86_64), :environment => environments(:production), :disk => "aaa", :puppet_proxy => smart_proxies(:puppetmaster)
assert !host.new_record?
end

test "should not save if IP is not in the right subnet" do
if unattended?
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "123.05.02.03",
:domain => domains(:mydomain), :operatingsystem => Operatingsystem.first, :subnet => subnets(:one), :managed => true,
:architecture => Architecture.first, :environment => Environment.first, :ptable => Ptable.first, :puppet_proxy => smart_proxies(:puppetmaster)
assert !host.valid?
end
end

test "should save if owner_type is User or Usergroup" do
host = Host.new :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one), :puppet_proxy => smart_proxies(:puppetmaster),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => true,
:owner_type => "User", :root_pass => "xybxa6JUkz63w"
assert host.valid?
end

test "should not save if owner_type is not User or Usergroup" do
host = Host.new :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one), :puppet_proxy => smart_proxies(:puppetmaster),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => true,
:owner_type => "UserGr(up" # should be Usergroup
assert !host.valid?
end

test "should save if owner_type is empty and Host is unmanaged" do
host = Host.new :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one), :puppet_proxy => smart_proxies(:puppetmaster),
:subnet => subnets(:one), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => false
assert host.valid?
end

test "should import from external nodes output" do
# create a dummy node
Parameter.destroy_all
host = Host.create :name => "myfullhost", :mac => "aabbacddeeff", :ip => "2.3.4.12",
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one),
:architecture => architectures(:x86_64), :environment => environments(:global_puppetmaster), :disk => "aaa",
:puppet_proxy => smart_proxies(:puppetmaster)

# dummy external node info
nodeinfo = {"environment" => "global_puppetmaster",
"parameters"=> {"puppetmaster"=>"puppet", "MYVAR"=>"value", "port" => "80",
"ssl_port" => "443", "foreman_env"=> "global_puppetmaster", "owner_name"=>"Admin User",
"root_pw"=>"xybxa6JUkz63w", "owner_email"=>"admin@someware.com"},
"classes"=>["apache", "base"]}

host.importNode nodeinfo

assert_equal host.info, nodeinfo
end

test "show be enabled by default" do
host = Host.create :name => "myhost", :mac => "aabbccddeeff"
assert host.enabled?
end

test "host can be disabled" do
host = Host.create :name => "myhost", :mac => "aabbccddeeff"
host.enabled = false
host.save
assert host.disabled?
end

test "a fqdn Host should be assigned to a domain if such domain exists" do
domain = domains(:mydomain)
host = Host.create :name => "host.mydomain.net", :mac => "aabbccddeaff", :ip => "2.3.04.03",
:operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one),
:architecture => architectures(:x86_64), :environment => environments(:production), :disk => "aaa"
host.valid?
assert_equal domain, host.domain
end

test "a system should retrieve its iPXE template if it is associated to the correct env and host group" do
host = Host.create :name => "host.mydomain.net", :mac => "aabbccddeaff", :ip => "2.3.04.03",
:operatingsystem => Operatingsystem.find_by_name("Redhat"), :subnet => subnets(:one), :hostgroup => Hostgroup.find_by_name("common"),
:architecture => Architecture.first, :environment => Environment.find_by_name("production"), :disk => "aaa"

assert_equal ConfigTemplate.find_by_name("MyString"), host.configTemplate({:kind => "iPXE"})
end

test "a system should retrieve its provision template if it is associated to the correct host group only" do
host = Host.create :name => "host.mydomain.net", :mac => "aabbccddeaff", :ip => "2.3.04.03",
:operatingsystem => Operatingsystem.find_by_name("Redhat"), :subnet => subnets(:one), :hostgroup => Hostgroup.find_by_name("common"),
:architecture => Architecture.first, :environment => Environment.find_by_name("production"), :disk => "aaa"

assert_equal ConfigTemplate.find_by_name("MyString2"), host.configTemplate({:kind => "provision"})
end

test "a system should retrieve its script template if it is associated to the correct OS only" do
host = Host.create :name => "host.mydomain.net", :mac => "aabbccddeaff", :ip => "2.3.04.03",
:operatingsystem => Operatingsystem.find_by_name("Redhat"), :subnet => subnets(:one), :hostgroup => Hostgroup.find_by_name("common"),
:architecture => Architecture.first, :environment => Environment.find_by_name("production"), :disk => "aaa"

assert_equal ConfigTemplate.find_by_name("MyScript"), host.configTemplate({:kind => "script"})
end

test "a system should retrieve its finish template if it is associated to the correct environment only" do
host = Host.create :name => "host.mydomain.net", :mac => "aabbccddeaff", :ip => "2.3.04.03",
:operatingsystem => Operatingsystem.find_by_name("Redhat"), :subnet => subnets(:one), :hostgroup => Hostgroup.find_by_name("common"),
:architecture => Architecture.first, :environment => Environment.find_by_name("production"), :disk => "aaa"

assert_equal ConfigTemplate.find_by_name("MyFinish"), host.configTemplate({:kind => "finish"})
end

test "handle_ca must not perform actions when the manage_puppetca setting is false" do
h = hosts(:one)
Setting[:manage_puppetca] = false
h.expects(:initialize_puppetca).never()
h.expects(:setAutosign).never()
assert h.handle_ca
end

test "handle_ca must not perform actions when no Puppet CA proxy is associated" do
h = hosts(:one)
Setting[:manage_puppetca] = true
refute h.puppetca?
h.expects(:initialize_puppetca).never()
assert h.handle_ca
end

test "handle_ca must call initialize, delete cert and add autosign methods" do
h = hosts(:dhcp)
Setting[:manage_puppetca] = true
assert h.puppetca?
h.expects(:initialize_puppetca).returns(true)
h.expects(:delCertificate).returns(true)
h.expects(:setAutosign).returns(true)
assert h.handle_ca
end

test "if the user toggles off the use_uuid_for_certificates option, revoke the UUID and autosign the hostname" do
h = hosts(:dhcp)
Setting[:manage_puppetca] = true
assert h.puppetca?

Setting[:use_uuid_for_certificates] = false
some_uuid = Foreman.uuid
h.certname = some_uuid

h.expects(:initialize_puppetca).returns(true)
mock_puppetca = Object.new
mock_puppetca.expects(:del_certificate).with(some_uuid).returns(true)
mock_puppetca.expects(:set_autosign).with(h.name).returns(true)
h.instance_variable_set("@puppetca", mock_puppetca)

assert h.handle_ca
assert_equal h.certname, h.name
end

test "custom_disk_partition_with_erb" do
h = hosts(:one)
h.disk = "<%= 1 + 1 %>"
assert h.save
assert h.disk.present?
assert_equal "2", h.diskLayout
end

test "models are updated when host.model has no value" do
h = hosts(:one)
f = fact_names(:kernelversion)
as_admin do
fact_value = FactValue.where(:fact_name_id => f.id).first
fact_value.update_attributes!(:value => "superbox")
end
assert_difference('Model.count') do
facts = JSON.parse(File.read(File.expand_path(File.dirname(__FILE__) + "/facts.json")))
h.populateFieldsFromFacts facts['facts']
end
end

test "hostgroup should set default values when none exists" do
# should set os, but not arch
hg = hostgroups(:common)
h = Host.new
h.hostgroup = hg
h.architecture = architectures(:sparc)
assert !h.valid?
assert_equal hg.operatingsystem, h.operatingsystem
assert_not_equal hg.architecture , h.architecture
assert_equal h.architecture, architectures(:sparc)
end

test "host os attributes must be associated with the host os" do
h = hosts(:one)
h.managed = true
h.architecture = architectures(:sparc)
assert !h.os.architectures.include?(h.arch)
assert !h.valid?
assert_equal ["#{h.architecture} does not belong to #{h.os} operating system"], h.errors[:architecture_id]
end

test "host puppet classes must belong to the host environment" do
h = hosts(:one)

pc = puppetclasses(:three)
h.puppetclasses << pc
assert !h.environment.puppetclasses.map(&:id).include?(pc.id)
assert !h.valid?
assert_equal ["#{pc} does not belong to the #{h.environment} environment"], h.errors[:puppetclasses]
end

test "when changing host environment, its puppet classes should be verified" do
h = hosts(:two)
pc = puppetclasses(:one)
h.puppetclasses << pc
assert h.save
h.environment = environments(:testing)
assert !h.save
assert_equal ["#{pc} does not belong to the #{h.environment} environment"], h.errors[:puppetclasses]
end

test "should not allow short root passwords for managed host" do
h = hosts(:one)
h.root_pass = "2short"
h.valid?
assert h.errors[:root_pass].include?("should be 8 characters or more")
end

test "should allow to save root pw" do
h = hosts(:one)
pw = h.root_pass
h.root_pass = "12345678"
h.hostgroup = nil
assert h.save!
assert_not_equal pw, h.root_pass
end

test "should allow to revert to default root pw" do
Setting[:root_pass] = "$1$default$hCkak1kaJPQILNmYbUXhD0"
h = hosts(:one)
h.root_pass = "xybxa6JUkz63w"
assert h.save
h.root_pass = nil
assert h.save!
assert_equal h.root_pass, Setting.root_pass
end

test "should generate a random salt when saving root pw" do
h = hosts(:one)
pw = h.root_pass
h.hostgroup = nil
h.root_pass = "xybxa6JUkz63w"
assert h.save!
first = h.root_pass

# Check it's a $.$....$...... enhanced style password
assert_equal 4, first.split('$').count
assert first.split('$')[2].size >= 8

# Check it changes
h.root_pass = "12345678"
assert h.save
assert_not_equal first.split('$')[2], h.root_pass.split('$')[2]
end

test "should pass through existing salt when saving root pw" do
h = hosts(:one)
pass = "$1$jmUiJ3NW$bT6CdeWZ3a6gIOio5qW0f1"
h.root_pass = pass
h.hostgroup = nil
assert h.save
assert_equal pass, h.root_pass
end

test "should use hostgroup root password" do
h = hosts(:one)
h.root_pass = nil
h.hostgroup = hostgroups(:common)
assert h.save
h.hostgroup.update_attribute(:root_pass, "abc")
assert h.root_pass.present? && h.root_pass != Setting[:root_pass]
end

test "should use a nested hostgroup parent root password" do
h = hosts(:one)
h.root_pass = nil
h.hostgroup = hg = hostgroups(:common)
assert h.save
hg.parent = hostgroups(:unusual)
hg.root_pass = nil
hg.parent.update_attribute(:root_pass, "abc")
hg.save
assert h.root_pass.present? && h.root_pass != Setting[:root_pass]
end

test "should use settings root password" do
Setting[:root_pass] = "$1$default$hCkak1kaJPQILNmYbUXhD0"
h = hosts(:one)
h.root_pass = nil
h.hostgroup = nil
assert h.save
assert h.root_pass.present? && h.root_pass == Setting[:root_pass]
end


test "should save uuid on managed hosts" do
Setting[:use_uuid_for_certificates] = true
host = Host.create :name => "myhost1", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => true
assert host.valid?
assert !host.new_record?
assert_not_nil host.certname
assert_not_equal host.name, host.certname
end

test "should not save uuid on non managed hosts" do
Setting[:use_uuid_for_certificates] = true
host = Host.create :name => "myhost1", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => false
assert host.valid?
assert !host.new_record?
assert_equal host.name, host.certname
end

test "should not save uuid when settings disable it" do
Setting[:use_uuid_for_certificates] = false
host = Host.create :name => "myhost1", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => false
assert host.valid?
assert !host.new_record?
assert_equal host.name, host.certname
end

test "all whitespace should be removed from hostname" do
host = Host.create :name => "my host 1 ", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => false
assert host.valid?
assert !host.new_record?
assert_equal "myhost1.mydomain.net", host.name
end

test "assign a host to a location" do
host = Host.create :name => "host 1", :mac => "aabbecddeeff", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
location = Location.create :name => "New York"

host.location_id = location.id
assert host.save!
end

test "update a host's location" do
host = Host.create :name => "host 1", :mac => "aabbccddee", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
original_location = Location.create :name => "New York"

host.location_id = original_location.id
assert host.save!
assert host.location_id = original_location.id

new_location = Location.create :name => "Los Angeles"
host.location_id = new_location.id
assert host.save!
assert host.location_id = new_location.id
end

test "assign a host to an organization" do
host = Host.create :name => "host 1", :mac => "aabbecddeeff", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
organization = Organization.create :name => "Hosting client 1"

host.organization_id = organization.id
assert host.save!
end

test "assign a host to both a location and an organization" do
host = Host.create :name => "host 1", :mac => "aabbccddeeff", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
location = Location.create :name => "Tel Aviv"
organization = Organization.create :name => "Hosting client 1"

host.location_id = location.id
host.organization_id = organization.id

assert host.save!
end


test "should have only one bootable interface" do
h = hosts(:redhat)
assert_equal 0, h.interfaces.count
bootable = Nic::Bootable.create! :host => h, :name => "dummy-bootable", :ip => "2.3.4.102", :mac => "aa:bb:cd:cd:ee:ff",
:subnet => h.subnet, :type => 'Nic::Bootable', :domain => h.domain
assert_equal 1, h.interfaces.count
h.interfaces_attributes = [{:name => "dummy-bootable2", :ip => "2.3.4.103", :mac => "aa:bb:cd:cd:ee:ff",
:subnet_id => h.subnet_id, :type => 'Nic::Bootable', :domain_id => h.domain_id }]
assert !h.valid?
assert_equal "Only one bootable interface is allowed", h.errors['interfaces.type'][0]
assert_equal 1, h.interfaces.count
end

# Token tests

test "built should clean tokens" do
Setting[:token_duration] = 30
h = hosts(:one)
h.create_token(:value => "aaaaaa", :expires => Time.now)
assert_equal Token.all.size, 1
h.expire_token
assert_equal Token.all.size, 0
end

test "built should clean tokens even when tokens are disabled" do
Setting[:token_duration] = 0
h = hosts(:one)
h.create_token(:value => "aaaaaa", :expires => Time.now)
assert_equal Token.all.size, 1
h.expire_token
assert_equal Token.all.size, 0
end

test "hosts should be able to retrieve their token if one exists" do
Setting[:token_duration] = 30
h = hosts(:one)
assert_equal Token.first, h.token
end

test "token should return false when tokens are disabled or invalid" do
Setting[:token_duration] = 0
h = hosts(:one)
assert_equal h.token, nil
Setting[:token_duration] = 30
h = hosts(:one)
assert_equal h.token, nil
end

test "a token can be matched to a host" do
h = hosts(:one)
h.create_token(:value => "aaaaaa", :expires => Time.now + 1.minutes)
assert_equal h, Host.for_token("aaaaaa").first
end

test "a token cannot be matched to a host when expired" do
h = hosts(:one)
h.create_token(:value => "aaaaaa", :expires => 1.minutes.ago)
refute Host.for_token("aaaaaa").first
end

test "deleting an host with an expired token does not cause a Foreign Key error" do
h=hosts(:one)
h.create_token(:value => "aaaaaa", :expires => 5.minutes.ago)
assert_nothing_raised(ActiveRecord::InvalidForeignKey) {h.reload.destroy}
end

test "can search hosts by hostgroup" do
#setup - add parent to hostgroup :common (not in fixtures, since no field parent_id)
hostgroup = hostgroups(:db)
parent_hostgroup = hostgroups(:common)
hostgroup.parent_id = parent_hostgroup.id
assert hostgroup.save!

# search hosts by hostgroup label
hosts = Host.search_for("hostgroup_title = #{hostgroup.title}")
assert_equal hosts.count, 1 #host_db in hosts.yml
assert_equal hosts.first.hostgroup_id, hostgroup.id
end

test "non-admin user with edit_hosts permission can update interface" do
@one = users(:one)
# add permission for user :one
as_admin do
filter = FactoryGirl.build(:filter)
filter.permissions = [ Permission.find_by_name('edit_hosts') ]
filter.save!
role = Role.find_or_create_by_name :name => "testing_role"
role.filters = [ filter ]
role.save!
@one.roles = [ role ]
@one.save!
end
h = hosts(:one)
assert h.interfaces.create :mac => "cabbccddeeff", :host => hosts(:one), :type => 'Nic::BMC',
:provider => "IPMI", :username => "root", :password => "secret", :ip => "10.35.19.35"
as_user :one do
assert h.update_attributes!("interfaces_attributes" => {"0" => {"mac"=>"59:52:10:1e:45:16"}})
end
end

test "can auto-complete searches by host name" do
as_admin do
completions = Host::Managed.complete_for("name =")
Host::Managed.all.each do |h|
assert completions.include?("name = #{h.name}"), "completion missing: #{h}"
end
end
end

test "can auto-complete searches by facts" do
as_admin do
completions = Host::Managed.complete_for("facts.")
FactName.order(:name).each do |fact|
assert completions.include?(" facts.#{fact.name} "), "completion missing: #{fact}"
end
end
end

test "#rundeck returns hash" do
h = hosts(:one)
rundeck = h.rundeck
assert_kind_of Hash, rundeck
assert_equal ['my5name.mydomain.net'], rundeck.keys
assert_kind_of Hash, rundeck[h.name]
assert_equal 'my5name.mydomain.net', rundeck[h.name]['hostname']
assert_equal ['class=base'], rundeck[h.name]['tags']
end

test "#rundeck returns extra facts as tags" do
h = hosts(:one)
h.params['rundeckfacts'] = "kernelversion, ipaddress\n"
h.save!

rundeck = h.rundeck
assert rundeck[h.name]['tags'].include?('class=base'), 'puppet class missing'
assert rundeck[h.name]['tags'].include?('kernelversion=2.6.9'), 'kernelversion fact missing'
assert rundeck[h.name]['tags'].include?('ipaddress=10.0.19.33'), 'ipaddress fact missing'
end

test "should accept lookup_values_attributes" do
h = hosts(:redhat)
as_admin do
assert_difference "LookupValue.count" do
assert h.update_attributes(:lookup_values_attributes => {"0" => {:lookup_key_id => lookup_keys(:one).id, :value => "8080" }})
end
end
end

test "can search hosts by params" do
parameter = parameters(:host)
hosts = Host.search_for("params.host1 = host1")
assert_equal hosts.count, 1
assert_equal hosts.first.params['host1'], 'host1'
end

test "can search hosts by inherited params from a hostgroup" do
host = hosts(:one)
host.update_attribute(:hostgroup, hostgroups(:inherited))
GroupParameter.create( { :name => 'foo', :value => 'bar', :hostgroup => host.hostgroup.parent } )
hosts = Host.search_for("params.foo = bar")
assert_equal hosts.count, 1
assert_equal hosts.first.params['foo'], 'bar'
end

test "should update puppet_proxy_id to the id of the validated proxy" do
sp = smart_proxies(:puppetmaster)
raw = parse_json_fixture('/facts_with_caps.json')
Host.importHostAndFacts(raw['name'], raw['facts'], nil, sp.id)
assert_equal sp.id, Host.find_by_name('sinn1636.lan').puppet_proxy_id
end

test "shouldn't update puppet_proxy_id if it has been set" do
Host.new(:name => 'sinn1636.lan', :puppet_proxy_id => smart_proxies(:puppetmaster).id).save(:validate => false)
sp = smart_proxies(:puppetmaster)
raw = parse_json_fixture('/facts_with_certname.json')
assert Host.importHostAndFacts(raw['name'], raw['facts'], nil, sp.id)
assert_equal smart_proxies(:puppetmaster).id, Host.find_by_name('sinn1636.lan').puppet_proxy_id
end

# Ip validations
test "unmanaged hosts don't require an IP" do
h=Host.new
refute h.require_ip_validation?
end

test "CRs without IP attribute don't require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the CR
h=Host.new :managed => true,
:compute_resource => compute_resources(:one),
:compute_attributes => {:fake => "data"}
refute h.require_ip_validation?
end

test "CRs with IP attribute and a DNS-enabled domain do not require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the CR
h=Host.new :managed => true,
:compute_resource => compute_resources(:openstack),
:compute_attributes => {:fake => "data"},
:domain => domains(:mydomain)
refute h.require_ip_validation?
end

test "hosts with a DNS-enabled Domain do require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the domain
h=Host.new :managed => true, :domain => domains(:mydomain)
assert h.require_ip_validation?
end

test "hosts without a DNS-enabled Domain don't require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the domain
h=Host.new :managed => true, :domain => domains(:useless)
refute h.require_ip_validation?
end

test "hosts with a DNS-enabled Subnet do require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
h=Host.new :managed => true, :subnet => subnets(:one)
assert h.require_ip_validation?
end

test "hosts without a DNS-enabled Subnet don't require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
h=Host.new :managed => true, :subnet => subnets(:four)
refute h.require_ip_validation?
end

test "hosts with a DHCP-enabled Subnet do require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
h=Host.new :managed => true, :subnet => subnets(:two)
assert h.require_ip_validation?
end

test "hosts without a DHCP-enabled Subnet don't require an IP" do
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
h=Host.new :managed => true, :subnet => subnets(:four)
refute h.require_ip_validation?
end

test "with tokens enabled hosts don't require an IP" do
Setting[:token_duration] = 30
h=Host.new :managed => true
refute h.require_ip_validation?
end

test "with tokens disabled hosts do require an IP" do
h=Host.new :managed => true
assert h.require_ip_validation?
end

test "tokens disabled doesn't require an IP for image hosts" do
h=Host.new :managed => true
h.stubs(:capabilities).returns([:image])
refute h.require_ip_validation?
end

test "compute attributes are populated by hardware profile from hostgroup" do
# hostgroups(:common) fixture has compute_profiles(:one)
host = Host.create :name => "myhost", :mac => "aa-bb-cc-dd-ee-ff", :hostgroup_id => hostgroups(:common).id, :compute_resource_id => compute_resources(:ec2).id
assert_equal compute_attributes(:one).vm_attrs, host.compute_attributes
end

test "compute attributes are populated by hardware profile passed to host" do
# hostgroups(:one) fixture has compute_profiles(:common)
host = Host.create :name => "myhost", :mac => "aa-bb-cc-dd-ee-ff", :compute_resource_id => compute_resources(:ec2).id, :compute_profile_id => compute_profiles(:two).id
assert_equal compute_attributes(:three).vm_attrs, host.compute_attributes
end

private

def parse_json_fixture(relative_path)
return JSON.parse(File.read(File.expand_path(File.dirname(__FILE__) + relative_path)))
end
end
(35-35/91)