foreman/test/unit/host_test.rb @ e54016da
2f077f63 | Ohad Levy | require 'test_helper'
|
|
class HostTest < ActiveSupport::TestCase
|
|||
9fd7478e | Paul Kelly | setup do
|
|
a6f4f5f7 | Ohad Levy | disable_orchestration
|
|
e07f9a12 | Dominic Cleal | User.current = users :admin
|
|
01302dc5 | Greg Sutcliffe | Setting[:token_duration] = 0
|
|
4cbb4a26 | Tom Caspy | Foreman::Model::EC2.any_instance.stubs(:image_exists?).returns(true)
|
|
9fd7478e | Paul Kelly | end
|
|
c22d6db2 | Ohad Levy | test "should not save without a hostname" do
|
|
host = Host.new
|
|||
4bae5ced | Stephen Benjamin | host.valid?
|
|
dbaa47b7 | Dominic Cleal | assert host.errors[:name].include?("can't be blank")
|
|
4bae5ced | Stephen Benjamin | end
|
|
test "should not save with invalid hostname" do
|
|||
host = Host.new :name => "invalid_hostname"
|
|||
host.valid?
|
|||
assert_equal "is invalid", host.errors[:name].first
|
|||
end
|
|||
test "should not save hostname with periods in shortname" do
|
|||
host = Host.new :name => "my.host", :domain => Domain.find_or_create_by_name("mydomain.net"), :managed => true
|
|||
host.valid?
|
|||
assert_equal "must not include periods", host.errors[:name].first
|
|||
end
|
|||
test "should make hostname lowercase" do
|
|||
43c4bd72 | Marek Hulan | host = FactoryGirl.build(:host, :hostname => "MYHOST", :domain => FactoryGirl.create(:domain, :name => "mydomainlowercase.net"))
|
|
4bae5ced | Stephen Benjamin | host.valid?
|
|
43c4bd72 | Marek Hulan | assert_equal "myhost.mydomainlowercase.net", host.name
|
|
4bae5ced | Stephen Benjamin | end
|
|
test "should update name when domain is changed" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
refute_equal "#{host.shortname}.yourdomain.net", host.name
|
|||
4bae5ced | Stephen Benjamin | host.domain_name = "yourdomain.net"
|
|
host.save!
|
|||
e14b5758 | Greg Sutcliffe | assert_equal "#{host.shortname}.yourdomain.net", host.name
|
|
c22d6db2 | Ohad Levy | end
|
|
43c4bd72 | Marek Hulan | test "host should not save without primary interface" do
|
|
host = FactoryGirl.build(:host, :managed)
|
|||
host.interfaces = []
|
|||
refute host.save
|
|||
assert_includes host.errors.keys, :interfaces
|
|||
5440d482 | Greg Sutcliffe | host.interfaces = [ FactoryGirl.build(:nic_managed, :primary => true, :host => host,
|
|
:domain => FactoryGirl.create(:domain)) ]
|
|||
assert host.save
|
|||
end
|
|||
test "existing interface can be assigned as host primary interface" do
|
|||
host = FactoryGirl.build(:host, :managed)
|
|||
host.interfaces = [] # remove existing primary interface
|
|||
43c4bd72 | Marek Hulan | host.interfaces = [ FactoryGirl.create(:nic_managed, :primary => true, :host => host,
|
|
:domain => FactoryGirl.create(:domain)) ]
|
|||
assert host.save
|
|||
end
|
|||
d42d1f52 | Tomas Strachota | test "should fix mac address hyphens" do
|
|
host = Host.create :name => "myhost", :mac => "aa-bb-cc-dd-ee-ff"
|
|||
assert_equal "aa:bb:cc:dd:ee:ff", host.mac
|
|||
end
|
|||
c22d6db2 | Ohad Levy | test "should fix mac address" do
|
|
host = Host.create :name => "myhost", :mac => "aabbccddeeff"
|
|||
assert_equal "aa:bb:cc:dd:ee:ff", host.mac
|
|||
end
|
|||
d42d1f52 | Tomas Strachota | test "should keep valid mac address" do
|
|
host = Host.create :name => "myhost", :mac => "aa:bb:cc:dd:ee:ff"
|
|||
assert_equal "aa:bb:cc:dd:ee:ff", host.mac
|
|||
end
|
|||
e42aa400 | Trey Dockendorf | test "should fix 64-bit mac address hyphens" do
|
|
host = Host.create :name => "myhost", :mac => "aa-bb-cc-dd-ee-ff-00-11-22-33-44-55-66-77-88-99-aa-bb-cc-dd"
|
|||
assert_equal "aa:bb:cc:dd:ee:ff:00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd", host.mac
|
|||
end
|
|||
test "should fix 64-bit mac address" do
|
|||
host = Host.create :name => "myhost", :mac => "aabbccddeeff00112233445566778899aabbccdd"
|
|||
assert_equal "aa:bb:cc:dd:ee:ff:00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd", host.mac
|
|||
end
|
|||
test "should keep valid 64-bit mac address" do
|
|||
host = Host.create :name => "myhost", :mac => "aa:bb:cc:dd:ee:ff:00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd"
|
|||
assert_equal "aa:bb:cc:dd:ee:ff:00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd", host.mac
|
|||
end
|
|||
test "should be valid using 64-bit mac address" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
e42aa400 | Trey Dockendorf | host.mac = "aa:bb:cc:dd:ee:ff:00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd"
|
|
host.save!
|
|||
assert_equal true, host.valid?
|
|||
end
|
|||
c22d6db2 | Ohad Levy | test "should fix ip address if a leading zero is used" do
|
|
host = Host.create :name => "myhost", :mac => "aabbccddeeff", :ip => "123.01.02.03"
|
|||
assert_equal "123.1.2.3", host.ip
|
|||
2f077f63 | Ohad Levy | end
|
|
410fb097 | Ohad Levy | ||
test "should add domain name to hostname" do
|
|||
host = Host.create :name => "myhost", :mac => "aabbccddeeff", :ip => "123.01.02.03",
|
|||
:domain => Domain.find_or_create_by_name("company.com")
|
|||
assert_equal "myhost.company.com", host.name
|
|||
end
|
|||
bff742ab | Ohad Levy | ||
99f00455 | Frank Sweetser | test "should not add domain name to hostname if it already include it" do
|
|
4bae5ced | Stephen Benjamin | host = Host.create :name => "myhost.company.com", :mac => "aabbccddeeff", :ip => "123.1.2.3",
|
|
99f00455 | Frank Sweetser | :domain => Domain.find_or_create_by_name("company.com")
|
|
4bae5ced | Stephen Benjamin | assert_equal "myhost.company.com", host.name
|
|
99f00455 | Frank Sweetser | end
|
|
61dc8cee | mattmoran76@gmail.com | test "should add hostname if it contains domain name" do
|
|
host = Host.create :name => "myhost.company.com", :mac => "aabbccddeeff", :ip => "123.01.02.03",
|
|||
:domain => Domain.find_or_create_by_name("company.com")
|
|||
assert_equal "myhost.company.com", host.name
|
|||
end
|
|||
ede6d4ea | Marek Hulan | test "should not append domainname to fqdn for unmanaged host" do
|
|
0c8f532e | Mikael Fridh | host = Host.create :name => "myhost.sub.comp.net", :mac => "aabbccddeeff", :ip => "123.01.02.03",
|
|
:domain => Domain.find_or_create_by_name("company.com"),
|
|||
:certname => "myhost.sub.comp.net",
|
|||
:managed => false
|
|||
assert_equal "myhost.sub.comp.net", host.name
|
|||
end
|
|||
99f00455 | Frank Sweetser | test "should save hosts with full stop in their name" do
|
|
61dc8cee | mattmoran76@gmail.com | host = Host.create :name => "my.host.company.com", :mac => "aabbccddeeff", :ip => "123.01.02.03",
|
|
:domain => Domain.find_or_create_by_name("company.com")
|
|||
assert_equal "my.host.company.com", host.name
|
|||
end
|
|||
b6ad9fc9 | Dmitri Dolguikh | test "sets compute attributes on create" do
|
|
Host.any_instance.expects(:set_compute_attributes).once.returns(true)
|
|||
Host.create! :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.3",
|
|||
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :medium => media(:one),
|
|||
8f695d94 | Shimon Shtein | :subnet => subnets(:two), :architecture => architectures(:x86_64), :puppet_proxy => smart_proxies(:puppetmaster),
|
|
b6ad9fc9 | Dmitri Dolguikh | :environment => environments(:production), :disk => "empty partition"
|
|
end
|
|||
test "doesn't set compute attributes on update" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
b6ad9fc9 | Dmitri Dolguikh | Host.any_instance.expects(:set_compute_attributes).never
|
|
host.update_attributes!(:mac => "52:54:00:dd:ee:ff")
|
|||
end
|
|||
7e8bfe82 | Walter Huf | test "can fetch vm compute attributes" do
|
|
4269abbd | Tomas Strachota | host = FactoryGirl.create(:host, :compute_resource => compute_resources(:ec2))
|
|
7e8bfe82 | Walter Huf | ComputeResource.any_instance.stubs(:vm_compute_attributes_for).returns({:cpus => 4})
|
|
assert_equal host.vm_compute_attributes, :cpus => 4
|
|||
end
|
|||
test "fetches nil vm compute attributes for bare metal" do
|
|||
host = FactoryGirl.create(:host)
|
|||
assert_equal host.vm_compute_attributes, nil
|
|||
end
|
|||
014c9ab5 | Greg Sutcliffe | context "when unattended is false" do
|
|
def setup
|
|||
SETTINGS[:unattended] = false
|
|||
end
|
|||
def teardown
|
|||
SETTINGS[:unattended] = true
|
|||
end
|
|||
test "should be able to save hosts with full domain" do
|
|||
host = Host.create :name => "myhost.foo", :mac => "aabbccddeeff", :ip => "123.01.02.03"
|
|||
assert_equal "myhost.foo", host.fqdn
|
|||
end
|
|||
test "should be able to save hosts with no domain" do
|
|||
host = Host.create :name => "myhost", :mac => "aabbccddeeff", :ip => "123.01.02.03"
|
|||
assert_equal "myhost", host.fqdn
|
|||
end
|
|||
end
|
|||
61dc8cee | mattmoran76@gmail.com | ||
bff742ab | Ohad Levy | test "should be able to save host" do
|
|
90b83222 | Ohad Levy | host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.3",
|
|
6568415c | Joseph Magen | :domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :medium => media(:one),
|
|
8f695d94 | Shimon Shtein | :subnet => subnets(:two), :architecture => architectures(:x86_64), :puppet_proxy => smart_proxies(:puppetmaster),
|
|
f1ff5404 | Ohad Levy | :environment => environments(:production), :disk => "empty partition"
|
|
bff742ab | Ohad Levy | assert host.valid?
|
|
9fd7478e | Paul Kelly | assert !host.new_record?
|
|
bff742ab | Ohad Levy | end
|
|
06909647 | Joseph Mitchell Magen | test "non-admin user should be able to create host with new lookup value" do
|
|
User.current = users(:one)
|
|||
User.current.roles << [roles(:manager)]
|
|||
assert_difference('LookupValue.count') do
|
|||
bd48d5c9 | Joseph Magen | assert Host.create! :name => "abc.mydomain.net", :mac => "aabbecddeeff", :ip => "2.3.4.3",
|
|
8f695d94 | Shimon Shtein | :domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat),
|
|
:subnet => subnets(:two), :architecture => architectures(:x86_64), :puppet_proxy => smart_proxies(:puppetmaster), :medium => media(:one),
|
|||
:environment => environments(:production), :disk => "empty partition",
|
|||
:lookup_values_attributes => {"new_123456" => {"lookup_key_id" => lookup_keys(:complex).id, "value"=>"some_value", "match" => "fqdn=abc.mydomain.net"}}
|
|||
06909647 | Joseph Mitchell Magen | end
|
|
end
|
|||
130f301a | Stephen Benjamin | test "lookup value has right matcher for a host" do
|
|
assert_difference('LookupValue.where(:lookup_key_id => lookup_keys(:five).id, :match => "fqdn=abc.mydomain.net").count') do
|
|||
2312cccf | Daniel Lobato | Host.create! :name => "abc", :mac => "aabbecddeeff", :ip => "2.3.4.3",
|
|
6568415c | Joseph Magen | :domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :medium => media(:one),
|
|
8f695d94 | Shimon Shtein | :subnet => subnets(:two), :architecture => architectures(:x86_64), :puppet_proxy => smart_proxies(:puppetmaster),
|
|
130f301a | Stephen Benjamin | :environment => environments(:production), :disk => "empty partition",
|
|
:lookup_values_attributes => {"new_123456" => {"lookup_key_id" => lookup_keys(:five).id, "value"=>"some_value"}}
|
|||
end
|
|||
end
|
|||
ba8cff29 | Joseph Magen | test "should be able to add new lookup value on update_attributes" do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
ba8cff29 | Joseph Magen | lookup_key = lookup_keys(:three)
|
|
assert_difference('LookupValue.count') do
|
|||
assert host.update_attributes!(:lookup_values_attributes => {:new_123456 =>
|
|||
afe02d30 | Daniel Lobato | {:lookup_key_id => lookup_key.id, :value => true, :match => "fqdn=#{host.fqdn}",
|
|
:_destroy => 'false'}})
|
|||
ba8cff29 | Joseph Magen | end
|
|
end
|
|||
test "should be able to delete existing lookup value on update_attributes" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
6b4b489f | Ori Rabin | lookup_key = FactoryGirl.create(:puppetclass_lookup_key)
|
|
e14b5758 | Greg Sutcliffe | lookup_value = FactoryGirl.create(:lookup_value, :lookup_key_id => lookup_key.id,
|
|
:match => "fqdn=#{host.fqdn}", :value => '8080')
|
|||
host.reload
|
|||
ba8cff29 | Joseph Magen | assert_difference('LookupValue.count', -1) do
|
|
assert host.update_attributes!(:lookup_values_attributes => {'0' =>
|
|||
afe02d30 | Daniel Lobato | {:lookup_key_id => lookup_key.id, :value => '8080', :match => "fqdn=#{host.fqdn}",
|
|
:id => lookup_value.id, :_destroy => 'true'}})
|
|||
ba8cff29 | Joseph Magen | end
|
|
end
|
|||
test "should be able to update lookup value on update_attributes" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
6b4b489f | Ori Rabin | lookup_key = FactoryGirl.create(:puppetclass_lookup_key)
|
|
e14b5758 | Greg Sutcliffe | lookup_value = FactoryGirl.create(:lookup_value, :lookup_key_id => lookup_key.id,
|
|
:match => "fqdn=#{host.fqdn}", :value => '8080')
|
|||
host.reload
|
|||
ba8cff29 | Joseph Magen | assert_difference('LookupValue.count', 0) do
|
|
assert host.update_attributes!(:lookup_values_attributes => {'0' =>
|
|||
afe02d30 | Daniel Lobato | {:lookup_key_id => lookup_key.id, :value => '80', :match => "fqdn=#{host.fqdn}",
|
|
:id => lookup_value.id, :_destroy => 'false'}})
|
|||
ba8cff29 | Joseph Magen | end
|
|
lookup_value.reload
|
|||
e14b5758 | Greg Sutcliffe | assert_equal '80', lookup_value.value
|
|
ba8cff29 | Joseph Magen | end
|
|
01055e77 | Greg Sutcliffe | test "should import facts from json stream" do
|
|
e22af92d | Ohad Levy | h=Host.new(:name => "sinn1636.lan")
|
|
ea4fd101 | Ohad Levy | h.disk = "!" # workaround for now
|
|
e88536b2 | Daniel Lobato | assert h.import_facts(JSON.parse(File.read(File.expand_path(File.dirname(__FILE__) + "/facts.json")))['facts'])
|
|
e22af92d | Ohad Levy | end
|
|
ea4fd101 | Ohad Levy | ||
ad22248d | Marek Hulan | test "should populate primary interface attributes even without existing interface" do
|
|
host = FactoryGirl.create(:host, :managed => false)
|
|||
host.interfaces = []
|
|||
host.populate_fields_from_facts(:domain => 'example.com',
|
|||
:operatingsystem => 'RedHat',
|
|||
:operatingsystemrelease => '6.2',
|
|||
:macaddress_eth0 => '00:00:11:22:11:22',
|
|||
:ipaddress_eth0 => '192.168.0.1',
|
|||
:interfaces => 'eth0')
|
|||
assert_equal 'example.com', host.domain.name
|
|||
refute host.primary_interface.managed?
|
|||
end
|
|||
e88536b2 | Daniel Lobato | context 'import host and facts' do
|
|
test 'should import facts from json of a new host when certname is not specified' do
|
|||
refute Host.find_by_name('sinn1636.lan')
|
|||
raw = parse_json_fixture('/facts.json')
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'])
|
|||
assert Host.find_by_name('sinn1636.lan')
|
|||
end
|
|||
a380bc92 | Greg Sutcliffe | ||
e88536b2 | Daniel Lobato | test 'should downcase hostname parameter from json of a new host' do
|
|
raw = parse_json_fixture('/facts_with_caps.json')
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'])
|
|||
assert Host.find_by_name('sinn1636.lan')
|
|||
end
|
|||
3d6c46e5 | Ash Caire | ||
25a647eb | Joey D | test 'should downcase domain parameter from json of a new host' do
|
|
raw = parse_json_fixture('/facts_with_caps.json')
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'])
|
|||
assert_equal raw['facts']['domain'].downcase, Host.find_by_name('sinn1636.lan').facts_hash['domain']
|
|||
end
|
|||
e88536b2 | Daniel Lobato | test 'should import facts idempotently' do
|
|
raw = parse_json_fixture('/facts_with_caps.json')
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'])
|
|||
value_ids = Host.find_by_name('sinn1636.lan').fact_values.map(&:id)
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'])
|
|||
assert_equal value_ids.sort, Host.find_by_name('sinn1636.lan').fact_values.map(&:id).sort
|
|||
end
|
|||
01055e77 | Greg Sutcliffe | ||
e88536b2 | Daniel Lobato | test 'should find a host by certname not fqdn when provided' do
|
|
43c4bd72 | Marek Hulan | Host.new(:name => 'sinn1636.fail', :certname => 'sinn1636.lan.cert', :mac => 'e4:1f:13:cc:36:58').save(:validate => false)
|
|
e88536b2 | Daniel Lobato | assert Host.find_by_name('sinn1636.fail').ip.nil?
|
|
# hostname in the json is sinn1636.lan, so if the facts have been updated for
|
|||
# this host, it's a successful identification by certname
|
|||
raw = parse_json_fixture('/facts_with_certname.json')
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'], raw['certname'])
|
|||
43c4bd72 | Marek Hulan | host = Host.find_by_name('sinn1636.fail')
|
|
assert_equal '10.35.27.2', host.interfaces.find_by_identifier('br180').ip
|
|||
assert_equal nil, host.primary_interface.ip # eth0 does not have ip address among facts
|
|||
e88536b2 | Daniel Lobato | end
|
|
01055e77 | Greg Sutcliffe | ||
e88536b2 | Daniel Lobato | test 'should update certname when host is found by hostname and certname is provided' do
|
|
Host.new(:name => 'sinn1636.lan', :certname => 'sinn1636.cert.fail').save(:validate => false)
|
|||
assert_equal 'sinn1636.cert.fail', Host.find_by_name('sinn1636.lan').certname
|
|||
raw = parse_json_fixture('/facts_with_certname.json')
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'], raw['certname'])
|
|||
assert_equal 'sinn1636.lan.cert', Host.find_by_name('sinn1636.lan').certname
|
|||
end
|
|||
6dffd64b | Dominic Cleal | ||
e88536b2 | Daniel Lobato | test 'host is created when uploading facts if setting is true' do
|
|
assert_difference 'Host.count' do
|
|||
Setting[:create_new_host_when_facts_are_uploaded] = true
|
|||
raw = parse_json_fixture('/facts_with_certname.json')
|
|||
Host.import_host_and_facts(raw['name'], raw['facts'], raw['certname'])
|
|||
assert Host.find_by_name('sinn1636.lan')
|
|||
Setting[:create_new_host_when_facts_are_uploaded] =
|
|||
Setting.find_by_name('create_new_host_when_facts_are_uploaded').default
|
|||
end
|
|||
end
|
|||
test 'host is not created when uploading facts if setting is false' do
|
|||
Setting[:create_new_host_when_facts_are_uploaded] = false
|
|||
assert_equal false, Setting[:create_new_host_when_facts_are_uploaded]
|
|||
4bae5ced | Stephen Benjamin | raw = parse_json_fixture('/facts_with_certname.json')
|
|
e88536b2 | Daniel Lobato | assert Host.import_host_and_facts(raw['name'], raw['facts'], raw['certname'])
|
|
host = Host.find_by_name('sinn1636.lan')
|
|||
4bae5ced | Stephen Benjamin | Setting[:create_new_host_when_facts_are_uploaded] =
|
|
e88536b2 | Daniel Lobato | Setting.find_by_name('create_new_host_when_facts_are_uploaded').default
|
|
assert_nil host
|
|||
4bae5ced | Stephen Benjamin | end
|
|
e88536b2 | Daniel Lobato | test 'host taxonomies are set to a default when uploading facts' do
|
|
Setting[:create_new_host_when_facts_are_uploaded] = true
|
|||
raw = parse_json_fixture('/facts.json')
|
|||
Host.import_host_and_facts(raw['name'], raw['facts'])
|
|||
assert_equal Setting[:default_location], Host.find_by_name('sinn1636.lan').location.title
|
|||
assert_equal Setting[:default_organization], Host.find_by_name('sinn1636.lan').organization.title
|
|||
end
|
|||
test 'host taxonomies are set to setting[taxonomy_fact] if it exists' do
|
|||
Setting[:create_new_host_when_facts_are_uploaded] = true
|
|||
ea450c06 | Stephen Benjamin | Setting[:location_fact] = "foreman_location"
|
|
Setting[:organization_fact] = "foreman_organization"
|
|||
e88536b2 | Daniel Lobato | raw = parse_json_fixture('/facts.json')
|
|
ea450c06 | Stephen Benjamin | raw['facts']['foreman_location'] = 'Location 2'
|
|
raw['facts']['foreman_organization'] = 'Organization 2'
|
|||
e88536b2 | Daniel Lobato | Host.import_host_and_facts(raw['name'], raw['facts'])
|
|
assert_equal 'Location 2', Host.find_by_name('sinn1636.lan').location.title
|
|||
assert_equal 'Organization 2', Host.find_by_name('sinn1636.lan').organization.title
|
|||
end
|
|||
test 'default taxonomies are not assigned to hosts with taxonomies' do
|
|||
Setting[:default_location] = taxonomies(:location1).title
|
|||
raw = parse_json_fixture('/facts.json')
|
|||
Host.import_host_and_facts(raw['name'], raw['facts'])
|
|||
Host.find_by_name('sinn1636.lan').update_attribute(:location, taxonomies(:location2))
|
|||
Host.find_by_name('sinn1636.lan').import_facts(raw['facts'])
|
|||
assert_equal taxonomies(:location2), Host.find_by_name('sinn1636.lan').location
|
|||
end
|
|||
test 'taxonomies from facts override already existing taxonomies in hosts' do
|
|||
Setting[:create_new_host_when_facts_are_uploaded] = true
|
|||
ea450c06 | Stephen Benjamin | Setting[:location_fact] = "foreman_location"
|
|
Setting[:organization_fact] = "foreman_organization"
|
|||
e88536b2 | Daniel Lobato | raw = parse_json_fixture('/facts.json')
|
|
ea450c06 | Stephen Benjamin | raw['facts']['foreman_location'] = 'Location 2'
|
|
e88536b2 | Daniel Lobato | Host.import_host_and_facts(raw['name'], raw['facts'])
|
|
ea450c06 | Stephen Benjamin | ||
e88536b2 | Daniel Lobato | Host.find_by_name('sinn1636.lan').update_attribute(:location, taxonomies(:location1))
|
|
Host.find_by_name('sinn1636.lan').import_facts(raw['facts'])
|
|||
assert_equal taxonomies(:location2), Host.find_by_name('sinn1636.lan').location
|
|||
end
|
|||
554be427 | Nacho Barrientos | end
|
|
4bae5ced | Stephen Benjamin | test "host is created when receiving a report if setting is true" do
|
|
assert_difference 'Host.count' do
|
|||
Setting[:create_new_host_when_report_is_uploaded] = true
|
|||
Report.import parse_json_fixture("/../fixtures/report-no-logs.json")
|
|||
assert Host.find_by_name('builder.fm.example.net')
|
|||
Setting[:create_new_host_when_report_is_uploaded] =
|
|||
Setting.find_by_name("create_new_host_when_facts_are_uploaded").default
|
|||
end
|
|||
end
|
|||
4ab0b55c | Martin Matuska | test "host is not created when receiving a report if setting is false" do
|
|
Setting[:create_new_host_when_report_is_uploaded] = false
|
|||
assert_equal false, Setting[:create_new_host_when_report_is_uploaded]
|
|||
Report.import parse_json_fixture("/../fixtures/report-no-logs.json")
|
|||
host = Host.find_by_name('builder.fm.example.net')
|
|||
Setting[:create_new_host_when_report_is_uploaded] =
|
|||
afe02d30 | Daniel Lobato | Setting.find_by_name("create_new_host_when_facts_are_uploaded").default
|
|
4ab0b55c | Martin Matuska | assert_nil host
|
|
end
|
|||
e54016da | Marek Hulan | test 'host #refresh_global_status defaults to OK' do
|
|
host = FactoryGirl.build(:host)
|
|||
assert_empty host.host_statuses
|
|||
host.refresh_global_status
|
|||
assert_equal HostStatus::Global::OK, host.global_status
|
|||
end
|
|||
test 'host #get_status(type) builds a new status if there is none yet and returns existing one otherwise' do
|
|||
host = FactoryGirl.build(:host)
|
|||
status = host.get_status(HostStatus::BuildStatus)
|
|||
assert status.new_record?
|
|||
assert_equal host, status.host
|
|||
status.refresh!
|
|||
new_status = host.get_status(HostStatus::BuildStatus)
|
|||
assert_equal status, new_status
|
|||
end
|
|||
test 'host #refresh_statuses saves all relevant statuses and refreshes global status' do
|
|||
host = FactoryGirl.build(:host)
|
|||
host.global_status = 1
|
|||
host.refresh_statuses
|
|||
assert_equal 0, host.global_status
|
|||
refute_empty host.host_statuses
|
|||
assert host.get_status(HostStatus::BuildStatus).new_record? # BuildStatus was not #relevant? for unmanaged host
|
|||
refute host.get_status(HostStatus::ConfigurationStatus).new_record?
|
|||
end
|
|||
test 'build status is updated on host validation' do
|
|||
host = FactoryGirl.build(:host)
|
|||
host.build = false
|
|||
host.valid?
|
|||
original_status = host.get_status(HostStatus::BuildStatus).to_status
|
|||
host.build = true
|
|||
host.valid?
|
|||
new_status = host.get_status(HostStatus::BuildStatus).to_status
|
|||
refute_equal original_status, new_status
|
|||
end
|
|||
160e24ea | Joseph Magen | test "assign a host to a location" do
|
|
host = Host.create :name => "host 1", :mac => "aabbecddeeff", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
|
|||
location = Location.create :name => "New York"
|
|||
host.location_id = location.id
|
|||
assert host.save!
|
|||
end
|
|||
test "update a host's location" do
|
|||
ee1f56de | Marek Hulan | host = Host.create :name => "host 1", :mac => "aabbccddeeff", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
|
|
160e24ea | Joseph Magen | original_location = Location.create :name => "New York"
|
|
host.location_id = original_location.id
|
|||
assert host.save!
|
|||
assert host.location_id = original_location.id
|
|||
new_location = Location.create :name => "Los Angeles"
|
|||
host.location_id = new_location.id
|
|||
assert host.save!
|
|||
assert host.location_id = new_location.id
|
|||
end
|
|||
test "assign a host to an organization" do
|
|||
host = Host.create :name => "host 1", :mac => "aabbecddeeff", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
|
|||
organization = Organization.create :name => "Hosting client 1"
|
|||
host.organization_id = organization.id
|
|||
assert host.save!
|
|||
end
|
|||
test "assign a host to both a location and an organization" do
|
|||
host = Host.create :name => "host 1", :mac => "aabbccddeeff", :ip => "5.5.5.5", :hostgroup => hostgroups(:common), :managed => false
|
|||
location = Location.create :name => "Tel Aviv"
|
|||
organization = Organization.create :name => "Hosting client 1"
|
|||
host.location_id = location.id
|
|||
host.organization_id = organization.id
|
|||
assert host.save!
|
|||
end
|
|||
abe910f2 | Marek Hulan | test 'host can be searched in multiple taxonomies' do
|
|
org1 = FactoryGirl.create(:organization)
|
|||
org2 = FactoryGirl.create(:organization)
|
|||
org3 = FactoryGirl.create(:organization)
|
|||
user = FactoryGirl.create(:user, :organizations => [org1, org2])
|
|||
host1 = FactoryGirl.create(:host, :organization => org1)
|
|||
host2 = FactoryGirl.create(:host, :organization => org2)
|
|||
host3 = FactoryGirl.create(:host, :organization => org3)
|
|||
hosts = nil
|
|||
assert_nil Organization.current
|
|||
as_user(user) do
|
|||
hosts = Host::Managed.all
|
|||
end
|
|||
assert_includes hosts, host1
|
|||
assert_includes hosts, host2
|
|||
refute_includes hosts, host3
|
|||
as_user(:one) do
|
|||
hosts = Host::Managed.all
|
|||
end
|
|||
assert_includes hosts, host1
|
|||
assert_includes hosts, host2
|
|||
assert_includes hosts, host3
|
|||
end
|
|||
afe02d30 | Daniel Lobato | context "location or organizations are not enabled" do
|
|
before do
|
|||
SETTINGS[:locations_enabled] = false
|
|||
SETTINGS[:organizations_enabled] = false
|
|||
end
|
|||
160e24ea | Joseph Magen | ||
afe02d30 | Daniel Lobato | after do
|
|
SETTINGS[:locations_enabled] = true
|
|||
SETTINGS[:organizations_enabled] = true
|
|||
end
|
|||
160e24ea | Joseph Magen | ||
aea52e15 | Christine Fouant | test "should save if root password is undefined when the host is managed and in build mode" do
|
|
afe02d30 | Daniel Lobato | Setting[:root_pass] = ''
|
|
aea52e15 | Christine Fouant | host = Host.new :name => "myfullhost", :managed => true, :build => false
|
|
host.valid?
|
|||
445dd7ab | Daniel Lobato | refute host.errors[:root_pass].present?
|
|
afe02d30 | Daniel Lobato | end
|
|
c4bfd47f | Stephen Benjamin | ||
aea52e15 | Christine Fouant | test "should save if root password is undefined when the compute resource is image capable and in build mode" do
|
|
host = Host.new :name => "myfullhost", :managed => true, :build => true, :compute_resource_id => compute_resources(:openstack).id
|
|||
afe02d30 | Daniel Lobato | host.valid?
|
|
refute host.errors[:root_pass].any?
|
|||
end
|
|||
c4bfd47f | Stephen Benjamin | ||
aea52e15 | Christine Fouant | test "should not save if root password is undefined when the host is managed and in build mode" do
|
|
Setting[:root_pass] = ''
|
|||
host = Host.new :name => "myfullhost", :managed => true, :build => true
|
|||
refute host.valid?
|
|||
445dd7ab | Daniel Lobato | assert host.errors[:root_pass].present?
|
|
aea52e15 | Christine Fouant | end
|
|
afe02d30 | Daniel Lobato | test "should not save if neither ptable or disk are defined when the host is managed" do
|
|
if unattended?
|
|||
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.4.4.03",
|
|||
8f695d94 | Shimon Shtein | :domain => domains(:mydomain), :operatingsystem => Operatingsystem.first, :subnet => subnets(:two), :medium => media(:one),
|
|
afe02d30 | Daniel Lobato | :architecture => Architecture.first, :environment => Environment.first, :managed => true
|
|
assert !host.valid?
|
|||
end
|
|||
e895706f | Paul Kelly | end
|
|
90b83222 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should save if neither ptable or disk are defined when the host is not managed" do
|
|
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03", :medium => media(:one),
|
|||
8f695d94 | Shimon Shtein | :domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:two), :puppet_proxy => smart_proxies(:puppetmaster),
|
|
:subnet => subnets(:two), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => false
|
|||
afe02d30 | Daniel Lobato | assert host.valid?
|
|
end
|
|||
ea4fd101 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should save if ptable is defined" do
|
|
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
|
|||
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :puppet_proxy => smart_proxies(:puppetmaster), :medium => media(:one),
|
|||
8f695d94 | Shimon Shtein | :subnet => subnets(:two), :architecture => architectures(:x86_64), :environment => environments(:production), :ptable => Ptable.first
|
|
afe02d30 | Daniel Lobato | assert !host.new_record?
|
|
end
|
|||
ea4fd101 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should save if disk is defined" do
|
|
host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "2.3.4.03",
|
|||
8f695d94 | Shimon Shtein | :domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:two), :medium => media(:one),
|
|
afe02d30 | Daniel Lobato | :architecture => architectures(:x86_64), :environment => environments(:production), :disk => "aaa", :puppet_proxy => smart_proxies(:puppetmaster)
|
|
assert !host.new_record?
|
|||
end
|
|||
ea4fd101 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should not save if IP is not in the right subnet" do
|
|
if unattended?
|
|||
510d53cd | Marek Hulan | host = Host.create :name => "myfullhost", :mac => "aabbecddeeff", :ip => "123.05.02.03", :ptable => FactoryGirl.create(:ptable),
|
|
8f695d94 | Shimon Shtein | :domain => domains(:mydomain), :operatingsystem => Operatingsystem.first, :subnet => subnets(:two), :managed => true, :medium => media(:one),
|
|
afe02d30 | Daniel Lobato | :architecture => Architecture.first, :environment => Environment.first, :ptable => Ptable.first, :puppet_proxy => smart_proxies(:puppetmaster)
|
|
assert !host.valid?
|
|||
end
|
|||
end
|
|||
test "should save if owner_type is User or Usergroup" do
|
|||
510d53cd | Marek Hulan | host = Host.new :name => "myfullhost", :mac => "aabbecddeeff", :ip => "3.3.4.03",
|
|
:ptable => FactoryGirl.create(:ptable, :operatingsystem_ids => [operatingsystems(:redhat).id]), :medium => media(:one),
|
|||
8f695d94 | Shimon Shtein | :domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:two), :puppet_proxy => smart_proxies(:puppetmaster),
|
|
:subnet => subnets(:two), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => true,
|
|||
afe02d30 | Daniel Lobato | :owner_type => "User", :root_pass => "xybxa6JUkz63w"
|
|
assert host.valid?
|
|||
end
|
|||
test "should not save if owner_type is not User or Usergroup" do
|
|||
8f695d94 | Shimon Shtein | host = Host.new :name => "myfullhost", :mac => "aabbecddeeff", :ip => "3.3.4.03", :medium => media(:one),
|
|
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:two), :puppet_proxy => smart_proxies(:puppetmaster),
|
|||
:subnet => subnets(:two), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => true,
|
|||
afe02d30 | Daniel Lobato | :owner_type => "UserGr(up" # should be Usergroup
|
|
e895706f | Paul Kelly | assert !host.valid?
|
|
end
|
|||
90b83222 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should not save if installation media is missing" do
|
|
510d53cd | Marek Hulan | host = Host.new :name => "myfullhost", :mac => "aabbecddeeff", :ip => "3.3.4.03", :ptable => FactoryGirl.create(:ptable),
|
|
8f695d94 | Shimon Shtein | :domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:two), :puppet_proxy => smart_proxies(:puppetmaster),
|
|
:subnet => subnets(:two), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => true, :build => true,
|
|||
afe02d30 | Daniel Lobato | :owner_type => "User", :root_pass => "xybxa6JUkz63w"
|
|
refute host.valid?
|
|||
assert_equal "can't be blank", host.errors[:medium_id][0]
|
|||
end
|
|||
7fcb314e | Daniel Lobato | ||
afe02d30 | Daniel Lobato | test "should save if owner_type is empty and Host is unmanaged" do
|
|
8f695d94 | Shimon Shtein | host = Host.new :name => "myfullhost", :mac => "aabbecddeeff", :ip => "3.3.4.03", :medium => media(:one),
|
|
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:two), :puppet_proxy => smart_proxies(:puppetmaster),
|
|||
:subnet => subnets(:two), :architecture => architectures(:x86_64), :environment => environments(:production), :managed => false
|
|||
afe02d30 | Daniel Lobato | assert host.valid?
|
|
end
|
|||
7fcb314e | Daniel Lobato | ||
afe02d30 | Daniel Lobato | test "should import from external nodes output" do
|
|
Setting[:Parametrized_Classes_in_ENC] = true
|
|||
Setting[:Enable_Smart_Variables_in_ENC] = true
|
|||
# create a dummy node
|
|||
Parameter.destroy_all
|
|||
8f695d94 | Shimon Shtein | host = Host.create :name => "myfullhost", :mac => "aabbacddeeff", :ip => "3.3.4.12", :medium => media(:one),
|
|
:domain => domains(:mydomain), :operatingsystem => operatingsystems(:redhat), :subnet => subnets(:two),
|
|||
afe02d30 | Daniel Lobato | :architecture => architectures(:x86_64), :environment => environments(:production), :disk => "aaa",
|
|
:puppet_proxy => smart_proxies(:puppetmaster)
|
|||
# dummy external node info
|
|||
nodeinfo = {"environment" => "production",
|
|||
"parameters"=> {"puppetmaster"=>"puppet", "MYVAR"=>"value", "port" => "80",
|
|||
"ssl_port" => "443", "foreman_env"=> "production", "owner_name"=>"Admin User",
|
|||
"root_pw"=>"xybxa6JUkz63w", "owner_email"=>"admin@someware.com",
|
|||
"foreman_subnets"=>
|
|||
8f695d94 | Shimon Shtein | [{"network"=>"3.3.4.0",
|
|
"name"=>"two",
|
|||
afe02d30 | Daniel Lobato | "gateway"=>nil,
|
|
"mask"=>"255.255.255.0",
|
|||
"dns_primary"=>nil,
|
|||
"dns_secondary"=>nil,
|
|||
"from"=>nil,
|
|||
"to"=>nil,
|
|||
9e5fad81 | Marek Hulan | "boot_mode"=>"DHCP",
|
|
a899d971 | Marek Hulan | "vlanid" => "41",
|
|
afe02d30 | Daniel Lobato | "ipam"=>"DHCP"}],
|
|
"foreman_interfaces"=>
|
|||
[{"mac"=>"aa:bb:ac:dd:ee:ff",
|
|||
8f695d94 | Shimon Shtein | "ip"=>"3.3.4.12",
|
|
afe02d30 | Daniel Lobato | "type"=>"Interface",
|
|
"name"=>'myfullhost.mydomain.net',
|
|||
"attrs"=>{},
|
|||
"virtual"=>false,
|
|||
"link"=>true,
|
|||
"identifier"=>nil,
|
|||
"managed"=>true,
|
|||
"primary"=>true,
|
|||
"provision"=>true,
|
|||
8f695d94 | Shimon Shtein | "subnet"=> {"network"=>"3.3.4.0",
|
|
afe02d30 | Daniel Lobato | "mask"=>"255.255.255.0",
|
|
8f695d94 | Shimon Shtein | "name"=>"two",
|
|
afe02d30 | Daniel Lobato | "gateway"=>nil,
|
|
"dns_primary"=>nil,
|
|||
"dns_secondary"=>nil,
|
|||
"from"=>nil,
|
|||
"to"=>nil,
|
|||
9e5fad81 | Marek Hulan | "boot_mode"=>"DHCP",
|
|
a899d971 | Marek Hulan | "vlanid" => "41",
|
|
afe02d30 | Daniel Lobato | "ipam"=>"DHCP"}}]},
|
|
"classes"=>{"apache"=>{"custom_class_param"=>"abcdef"}, "base"=>{"cluster"=>"secret"}} }
|
|||
host.importNode nodeinfo
|
|||
nodeinfo["parameters"]["special_info"] = "secret" # smart variable on apache
|
|||
e24c3fbb | Marek Hulan | info = host.info
|
|
assert_includes info.keys, 'environment'
|
|||
assert_equal 'production', host.environment.name
|
|||
assert_includes info.keys, 'parameters'
|
|||
assert_includes info.keys, 'classes'
|
|||
assert_equal({ 'apache' => { 'custom_class_param' => 'abcdef' }, 'base' => { 'cluster' => 'secret' } }, info['classes'])
|
|||
parameters = info['parameters']
|
|||
assert_equal 'puppet', parameters['puppetmaster']
|
|||
assert_equal 'xybxa6JUkz63w', parameters['root_pw']
|
|||
assert_includes parameters.keys, 'foreman_subnets'
|
|||
assert_includes parameters.keys, 'foreman_interfaces'
|
|||
7678cac5 | Daniel Lobato | assert_equal '3.3.4.12', parameters['foreman_interfaces'].first['ip']
|
|
afe02d30 | Daniel Lobato | end
|
|
6568415c | Joseph Magen | ||
afe02d30 | Daniel Lobato | test "show be enabled by default" do
|
|
host = Host.create :name => "myhost", :mac => "aabbccddeeff"
|
|||
assert host.enabled?
|
|||
end
|
|||
7fcb314e | Daniel Lobato | ||
afe02d30 | Daniel Lobato | test "host can be disabled" do
|
|
host = Host.create :name => "myhost", :mac => "aabbccddeeff"
|
|||
host.enabled = false
|
|||
host.save
|
|||
assert host.disabled?
|
|||
end
|
|||
5aee7268 | Eric Shamow | ||
afe02d30 | Daniel Lobato | test "a fqdn Host should be assigned to a domain if such domain exists" do
|
|
domain = domains(:mydomain)
|
|||
host = Host.create :name => "host.mydomain.net", :mac => "aabbccddeaff", :ip => "2.3.04.03",
|
|||
:operatingsystem => operatingsystems(:redhat), :subnet => subnets(:one), :medium => media(:one),
|
|||
:architecture => architectures(:x86_64), :environment => environments(:production), :disk => "aaa"
|
|||
host.valid?
|
|||
assert_equal domain, host.domain
|
|||
end
|
|||
5aee7268 | Eric Shamow | ||
afe02d30 | Daniel Lobato | context 'associated config templates' do
|
|
setup do
|
|||
@host = Host.create(:name => "host.mydomain.net", :mac => "aabbccddeaff",
|
|||
:ip => "2.3.04.03", :medium => media(:one),
|
|||
:operatingsystem => Operatingsystem.find_by_name("Redhat"),
|
|||
:subnet => subnets(:one), :hostgroup => Hostgroup.find_by_name("common"),
|
|||
:architecture => Architecture.first, :disk => "aaa",
|
|||
:environment => Environment.find_by_name("production"))
|
|||
end
|
|||
test "retrieves iPXE template if associated to the correct env and host group" do
|
|||
510d53cd | Marek Hulan | assert_equal ProvisioningTemplate.find_by_name("MyString"), @host.provisioning_template({:kind => "iPXE"})
|
|
afe02d30 | Daniel Lobato | end
|
|
test "retrieves provision template if associated to the correct host group only" do
|
|||
510d53cd | Marek Hulan | assert_equal ProvisioningTemplate.find_by_name("MyString2"), @host.provisioning_template({:kind => "provision"})
|
|
afe02d30 | Daniel Lobato | end
|
|
test "retrieves script template if associated to the correct OS only" do
|
|||
510d53cd | Marek Hulan | assert_equal ProvisioningTemplate.find_by_name("MyScript"), @host.provisioning_template({:kind => "script"})
|
|
afe02d30 | Daniel Lobato | end
|
|
test "retrieves finish template if associated to the correct environment only" do
|
|||
510d53cd | Marek Hulan | assert_equal ProvisioningTemplate.find_by_name("MyFinish"), @host.provisioning_template({:kind => "finish"})
|
|
afe02d30 | Daniel Lobato | end
|
|
test "available_template_kinds finds templates for a PXE host" do
|
|||
445dd7ab | Daniel Lobato | os_dt = FactoryGirl.create(:os_default_template,
|
|
:template_kind=> TemplateKind.find('finish'))
|
|||
afe02d30 | Daniel Lobato | host = FactoryGirl.create(:host, :operatingsystem => os_dt.operatingsystem)
|
|
510d53cd | Marek Hulan | assert_equal [os_dt.provisioning_template], host.available_template_kinds('build')
|
|
afe02d30 | Daniel Lobato | end
|
|
3af5f2e6 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "available_template_kinds finds templates for an image host" do
|
|
445dd7ab | Daniel Lobato | os_dt = FactoryGirl.create(:os_default_template,
|
|
:template_kind=> TemplateKind.find('finish'))
|
|||
afe02d30 | Daniel Lobato | host = FactoryGirl.create(:host, :on_compute_resource,
|
|
:operatingsystem => os_dt.operatingsystem)
|
|||
FactoryGirl.create(:image, :uuid => 'abcde',
|
|||
:compute_resource => host.compute_resource)
|
|||
host.compute_attributes = {:image_id => 'abcde'}
|
|||
510d53cd | Marek Hulan | assert_equal [os_dt.provisioning_template], host.available_template_kinds('image')
|
|
afe02d30 | Daniel Lobato | end
|
|
96144a47 | Daniel Lobato | end
|
|
ef5cbe9b | Justin Sherrill | ||
afe02d30 | Daniel Lobato | test "handle_ca must not perform actions when the manage_puppetca setting is false" do
|
|
h = FactoryGirl.create(:host)
|
|||
Setting[:manage_puppetca] = false
|
|||
h.expects(:initialize_puppetca).never
|
|||
h.expects(:setAutosign).never
|
|||
assert h.handle_ca
|
|||
96144a47 | Daniel Lobato | end
|
|
ef5cbe9b | Justin Sherrill | ||
afe02d30 | Daniel Lobato | test "handle_ca must not perform actions when no Puppet CA proxy is associated even if associated with hostgroup" do
|
|
hostgroup = FactoryGirl.create(:hostgroup, :with_puppet_orchestration)
|
|||
3dce1589 | Justin Sherrill | h = FactoryGirl.create(:host, :managed, :with_environment, :hostgroup => hostgroup)
|
|
afe02d30 | Daniel Lobato | Setting[:manage_puppetca] = true
|
|
h.puppet_proxy_id = h.puppet_ca_proxy_id = nil
|
|||
h.save
|
|||
refute h.puppetca?
|
|||
h.expects(:initialize_puppetca).never
|
|||
assert h.handle_ca
|
|||
96144a47 | Daniel Lobato | end
|
|
ef5cbe9b | Justin Sherrill | ||
afe02d30 | Daniel Lobato | test "handle_ca must not perform actions when no Puppet CA proxy is associated" do
|
|
h = FactoryGirl.create(:host)
|
|||
Setting[:manage_puppetca] = true
|
|||
refute h.puppetca?
|
|||
h.expects(:initialize_puppetca).never
|
|||
assert h.handle_ca
|
|||
96144a47 | Daniel Lobato | end
|
|
ef5cbe9b | Justin Sherrill | ||
afe02d30 | Daniel Lobato | test "handle_ca must call initialize, delete cert and add autosign methods" do
|
|
h = FactoryGirl.create(:host, :with_puppet_orchestration)
|
|||
Setting[:manage_puppetca] = true
|
|||
assert h.puppetca?
|
|||
h.expects(:initialize_puppetca).returns(true)
|
|||
h.expects(:delCertificate).returns(true)
|
|||
h.expects(:setAutosign).returns(true)
|
|||
assert h.handle_ca
|
|||
96144a47 | Daniel Lobato | end
|
|
bde3e87f | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "if the user toggles off the use_uuid_for_certificates option, revoke the UUID and autosign the hostname" do
|
|
h = FactoryGirl.create(:host, :with_puppet_orchestration)
|
|||
Setting[:manage_puppetca] = true
|
|||
assert h.puppetca?
|
|||
bde3e87f | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | Setting[:use_uuid_for_certificates] = false
|
|
some_uuid = Foreman.uuid
|
|||
h.certname = some_uuid
|
|||
bde3e87f | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | h.expects(:initialize_puppetca).returns(true)
|
|
mock_puppetca = Object.new
|
|||
mock_puppetca.expects(:del_certificate).with(some_uuid).returns(true)
|
|||
mock_puppetca.expects(:set_autosign).with(h.name).returns(true)
|
|||
h.instance_variable_set("@puppetca", mock_puppetca)
|
|||
bde3e87f | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | assert h.handle_ca
|
|
assert_equal h.certname, h.name
|
|||
bde3e87f | Greg Sutcliffe | end
|
|
5e1f3b71 | Tom Caspy | ||
afe02d30 | Daniel Lobato | test "if the user changes a hostname in non-use_uuid_for_cetificates mode, revoke the old hostname and autosign the new hostname" do
|
|
Setting[:use_uuid_for_certificates] = false
|
|||
Setting[:manage_puppetca] = true
|
|||
5e1f3b71 | Tom Caspy | ||
afe02d30 | Daniel Lobato | h = FactoryGirl.create(:host, :with_puppet_orchestration)
|
|
assert h.puppetca?
|
|||
5e1f3b71 | Tom Caspy | ||
afe02d30 | Daniel Lobato | old_name = 'oldhostname'
|
|
h.certname = old_name
|
|||
5e1f3b71 | Tom Caspy | ||
afe02d30 | Daniel Lobato | h.expects(:initialize_puppetca).returns(true)
|
|
mock_puppetca = Object.new
|
|||
mock_puppetca.expects(:del_certificate).with(old_name).returns(true)
|
|||
mock_puppetca.expects(:set_autosign).with(h.name).returns(true)
|
|||
h.instance_variable_set("@puppetca", mock_puppetca)
|
|||
f09d61de | Dominic Cleal | ||
afe02d30 | Daniel Lobato | assert h.handle_ca
|
|
assert_equal h.certname, h.name
|
|||
end
|
|||
f09d61de | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "custom_disk_partition_with_erb" do
|
|
h = FactoryGirl.create(:host)
|
|||
h.disk = "<%= 1 + 1 %>"
|
|||
assert h.save
|
|||
assert h.disk.present?
|
|||
assert_equal "2", h.diskLayout
|
|||
end
|
|||
f09d61de | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "models are updated when host.model has no value" do
|
|
h = FactoryGirl.create(:host)
|
|||
FactoryGirl.create(:fact_value, :value => 'superbox',:host => h,
|
|||
:fact_name => FactoryGirl.create(:fact_name, :name => 'kernelversion'))
|
|||
assert_difference('Model.count') do
|
|||
facts = JSON.parse(File.read(File.expand_path(File.dirname(__FILE__) + "/facts.json")))
|
|||
h.populate_fields_from_facts facts['facts']
|
|||
end
|
|||
end
|
|||
89e506f7 | Aaron Stone | ||
afe02d30 | Daniel Lobato | test "hostgroup should set default values when none exists" do
|
|
# should set os, but not arch
|
|||
hg = hostgroups(:common)
|
|||
h = Host.new
|
|||
h.hostgroup = hg
|
|||
h.architecture = architectures(:sparc)
|
|||
assert !h.valid?
|
|||
assert_equal hg.operatingsystem, h.operatingsystem
|
|||
assert_not_equal hg.architecture, h.architecture
|
|||
assert_equal h.architecture, architectures(:sparc)
|
|||
end
|
|||
89e506f7 | Aaron Stone | ||
afe02d30 | Daniel Lobato | test "host os attributes must be associated with the host os" do
|
|
h = FactoryGirl.create(:host, :managed)
|
|||
h.architecture = architectures(:sparc)
|
|||
assert !h.os.architectures.include?(h.arch)
|
|||
assert !h.valid?
|
|||
assert_equal ["#{h.architecture} does not belong to #{h.os} operating system"], h.errors[:architecture_id]
|
|||
end
|
|||
89e506f7 | Aaron Stone | ||
afe02d30 | Daniel Lobato | test "host puppet classes must belong to the host environment" do
|
|
3dce1589 | Justin Sherrill | h = FactoryGirl.create(:host, :with_environment)
|
|
89e506f7 | Aaron Stone | ||
afe02d30 | Daniel Lobato | pc = puppetclasses(:three)
|
|
h.puppetclasses << pc
|
|||
assert !h.environment.puppetclasses.map(&:id).include?(pc.id)
|
|||
assert !h.valid?
|
|||
assert_equal ["#{pc} does not belong to the #{h.environment} environment"], h.errors[:puppetclasses]
|
|||
end
|
|||
d2823e35 | Aaron Stone | ||
afe02d30 | Daniel Lobato | test "when changing host environment, its puppet classes should be verified" do
|
|
h = FactoryGirl.create(:host, :environment => environments(:production))
|
|||
pc = puppetclasses(:one)
|
|||
h.puppetclasses << pc
|
|||
assert h.save
|
|||
h.environment = environments(:testing)
|
|||
assert !h.save
|
|||
assert_equal ["#{pc} does not belong to the #{h.environment} environment"], h.errors[:puppetclasses]
|
|||
end
|
|||
d2823e35 | Aaron Stone | ||
3dce1589 | Justin Sherrill | test "when setting host environment to nil, its puppet classes should be removed" do
|
|
h = FactoryGirl.create(:host, :environment => environments(:production))
|
|||
pc = puppetclasses(:one)
|
|||
h.puppetclasses << pc
|
|||
assert h.save
|
|||
h.environment = nil
|
|||
h.save!
|
|||
assert_empty h.puppetclasses
|
|||
end
|
|||
test "when setting host environment to nil, its config groups should be removed" do
|
|||
h = FactoryGirl.create(:host, :environment => environments(:production))
|
|||
pc = config_groups(:one)
|
|||
h.config_groups << pc
|
|||
assert h.save
|
|||
h.environment = nil
|
|||
h.save!
|
|||
assert_empty h.config_groups
|
|||
end
|
|||
test "when saving a host, do not require a puppet environment" do
|
|||
h = FactoryGirl.build(:host, :environment => environments(:production), :puppet_proxy => nil)
|
|||
h.environment = nil
|
|||
assert h.valid?
|
|||
end
|
|||
test "when saving a host, require puppet environment if puppet master is set" do
|
|||
h = FactoryGirl.build(:host, :environment => environments(:production), :puppet_proxy => smart_proxies(:puppetmaster))
|
|||
h.environment = nil
|
|||
refute h.valid?
|
|||
end
|
|||
aea52e15 | Christine Fouant | test "should not allow short root passwords for managed host in build mode" do
|
|
afe02d30 | Daniel Lobato | h = FactoryGirl.create(:host, :managed)
|
|
aea52e15 | Christine Fouant | h.build = true
|
|
afe02d30 | Daniel Lobato | h.root_pass = "2short"
|
|
h.valid?
|
|||
assert h.errors[:root_pass].include?("should be 8 characters or more")
|
|||
end
|
|||
d2823e35 | Aaron Stone | ||
afe02d30 | Daniel Lobato | test "should allow to save root pw" do
|
|
h = FactoryGirl.create(:host, :managed)
|
|||
pw = h.root_pass
|
|||
h.root_pass = "12345678"
|
|||
h.hostgroup = nil
|
|||
assert h.save!
|
|||
assert_not_equal pw, h.root_pass
|
|||
end
|
|||
d2823e35 | Aaron Stone | ||
afe02d30 | Daniel Lobato | test "should allow to revert to default root pw" do
|
|
Setting[:root_pass] = "$1$default$hCkak1kaJPQILNmYbUXhD0"
|
|||
h = FactoryGirl.create(:host, :managed)
|
|||
h.root_pass = "xybxa6JUkz63w"
|
|||
assert h.save
|
|||
h.root_pass = nil
|
|||
assert h.save!
|
|||
assert_equal h.root_pass, Setting.root_pass
|
|||
end
|
|||
d2823e35 | Aaron Stone | ||
afe02d30 | Daniel Lobato | test "should crypt the password and update it in the database" do
|
|
unencrypted_password = "xybxa6JUkz63w"
|
|||
host = FactoryGirl.create(:host, :managed)
|
|||
host.hostgroup = nil
|
|||
host.root_pass = unencrypted_password
|
|||
assert host.save!
|
|||
first_password = host.root_pass
|
|||
# Make sure that the password gets encrypted in the DB, we don't care how it does that
|
|||
refute first_password.include?(unencrypted_password)
|
|||
# Check it changes
|
|||
host.root_pass = "12345678"
|
|||
assert host.save
|
|||
assert_not_equal first_password, host.root_pass
|
|||
88e2f778 | Lukas Zapletal | # Encrypted passwords should have UTF-8 encoding
|
|
assert_equal Encoding::UTF_8, host.root_pass.encoding
|
|||
afe02d30 | Daniel Lobato | end
|
|
9cd25bde | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should pass through existing salt when saving root pw" do
|
|
h = FactoryGirl.create(:host, :managed)
|
|||
pass = "$1$jmUiJ3NW$bT6CdeWZ3a6gIOio5qW0f1"
|
|||
h.root_pass = pass
|
|||
h.hostgroup = nil
|
|||
assert h.save
|
|||
assert_equal pass, h.root_pass
|
|||
672f931d | Paul Kelly | end
|
|
331ff165 | William Hefter | test "should base64-encode the root password and update it in the database" do
|
|
unencrypted_password = "xybxa6JUkz63w"
|
|||
host = FactoryGirl.create(:host, :managed)
|
|||
host.hostgroup = nil
|
|||
host.operatingsystem.password_hash = 'Base64'
|
|||
host.root_pass = unencrypted_password
|
|||
assert host.save!
|
|||
assert_equal host.root_pass, 'eHlieGE2SlVrejYzdw=='
|
|||
88e2f778 | Lukas Zapletal | # Encrypted passwords should have UTF-8 encoding
|
|
assert_equal Encoding::UTF_8, host.root_pass.encoding
|
|||
331ff165 | William Hefter | end
|
|
afe02d30 | Daniel Lobato | test "should use hostgroup root password" do
|
|
Setting[:root_pass] = "$1$default$hCkak1kaJPQILNmYbUXhD0"
|
|||
h = FactoryGirl.create(:host, :managed, :with_hostgroup)
|
|||
h.hostgroup.update_attribute(:root_pass, "abc")
|
|||
h.root_pass = nil
|
|||
assert h.save
|
|||
assert h.root_pass.present?
|
|||
assert_equal h.hostgroup.root_pass, h.root_pass
|
|||
assert_equal h.hostgroup.root_pass, h.read_attribute(:root_pass), 'should copy root_pass to host'
|
|||
end
|
|||
b4c2016a | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should use a nested hostgroup parent root password" do
|
|
Setting[:root_pass] = "$1$default$hCkak1kaJPQILNmYbUXhD0"
|
|||
h = FactoryGirl.create(:host, :managed, :with_hostgroup)
|
|||
g = h.hostgroup
|
|||
p = FactoryGirl.create(:hostgroup, :environment => h.environment)
|
|||
p.update_attribute(:root_pass, "abc")
|
|||
h.root_pass = nil
|
|||
g.root_pass = nil
|
|||
g.parent = p
|
|||
g.save
|
|||
assert h.save
|
|||
445dd7ab | Daniel Lobato | assert h.root_pass.present?
|
|
afe02d30 | Daniel Lobato | assert_equal p.root_pass, h.root_pass
|
|
assert_equal p.root_pass, h.read_attribute(:root_pass), 'should copy root_pass to host'
|
|||
end
|
|||
f1ff5404 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should use settings root password" do
|
|
Setting[:root_pass] = "$1$default$hCkak1kaJPQILNmYbUXhD0"
|
|||
h = FactoryGirl.create(:host, :managed)
|
|||
h.root_pass = nil
|
|||
assert h.save
|
|||
445dd7ab | Daniel Lobato | assert h.root_pass.present?
|
|
afe02d30 | Daniel Lobato | assert_equal Setting[:root_pass], h.root_pass
|
|
assert_equal Setting[:root_pass], h.read_attribute(:root_pass), 'should copy root_pass to host'
|
|||
end
|
|||
d0e91cb5 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should use settings root password when hostgroup has empty root password" do
|
|
Setting[:root_pass] = "$1$default$hCkak1kaJPQILNmYbUXhD0"
|
|||
g = FactoryGirl.create(:hostgroup, :root_pass => "")
|
|||
h = FactoryGirl.create(:host, :managed, :hostgroup => g)
|
|||
h.root_pass = ""
|
|||
h.save
|
|||
assert_valid h
|
|||
445dd7ab | Daniel Lobato | assert h.root_pass.present?
|
|
afe02d30 | Daniel Lobato | assert_equal Setting[:root_pass], h.root_pass
|
|
assert_equal Setting[:root_pass], h.read_attribute(:root_pass), 'should copy root_pass to host'
|
|||
end
|
|||
d0e91cb5 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should save uuid on managed hosts" do
|
|
Setting[:use_uuid_for_certificates] = true
|
|||
host = Host.create :name => "myhost1", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => true
|
|||
assert host.valid?
|
|||
assert !host.new_record?
|
|||
assert_not_nil host.certname
|
|||
assert_not_equal host.name, host.certname
|
|||
end
|
|||
d0e91cb5 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should not save uuid on non managed hosts" do
|
|
Setting[:use_uuid_for_certificates] = true
|
|||
host = Host.create :name => "myhost1", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => false
|
|||
assert host.valid?
|
|||
assert !host.new_record?
|
|||
assert_equal host.name, host.certname
|
|||
end
|
|||
c4bfd47f | Stephen Benjamin | ||
afe02d30 | Daniel Lobato | test "should not save uuid when settings disable it" do
|
|
Setting[:use_uuid_for_certificates] = false
|
|||
host = Host.create :name => "myhost1", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => false
|
|||
assert host.valid?
|
|||
assert !host.new_record?
|
|||
assert_equal host.name, host.certname
|
|||
end
|
|||
779d180c | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "all whitespace should be removed from hostname" do
|
|
host = Host.create :name => "my host 1 ", :mac => "aabbecddeeff", :ip => "2.3.4.3", :hostgroup => hostgroups(:common), :managed => false
|
|||
assert host.valid?
|
|||
assert !host.new_record?
|
|||
assert_equal "myhost1.mydomain.net", host.name
|
|||
end
|
|||
779d180c | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "should have only one bootable interface" do
|
|
8f695d94 | Shimon Shtein | organization = FactoryGirl.create(:organization)
|
|
location = FactoryGirl.create(:location)
|
|||
subnet = FactoryGirl.create(:subnet, :organizations => [organization], :locations => [location])
|
|||
h = FactoryGirl.create(:host, :managed,
|
|||
:organization => organization,
|
|||
:location => location,
|
|||
:subnet => subnet,
|
|||
:ip => subnet.network.succ)
|
|||
afe02d30 | Daniel Lobato | assert_equal 1, h.interfaces.count # we already have primary interface
|
|
Nic::Bootable.create! :host => h, :name => "dummy-bootable", :ip => "2.3.4.102", :mac => "aa:bb:cd:cd:ee:ff",
|
|||
8f695d94 | Shimon Shtein | :subnet => h.subnet, :type => 'Nic::Bootable', :domain => h.domain, :managed => false
|
|
afe02d30 | Daniel Lobato | assert_equal 2, h.interfaces.count
|
|
h.interfaces_attributes = [{:name => "dummy-bootable2", :ip => "2.3.4.103", :mac => "aa:bb:cd:cd:ee:ff",
|
|||
:subnet_id => h.subnet_id, :type => 'Nic::Bootable', :domain_id => h.domain_id,
|
|||
:managed => false }]
|
|||
refute h.valid?
|
|||
assert_equal "Only one bootable interface is allowed", h.errors['interfaces.type'][0]
|
|||
assert_equal 2, h.interfaces.count
|
|||
end
|
|||
31b7d5de | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "#set_interfaces updates primary physical interface" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :virtual => false, :ipaddress => '10.0.0.200', :identifier => 'eth1'})
|
|||
host.update_attribute :mac, '00:00:00:11:22:33'
|
|||
host.update_attribute :ip, '10.0.0.100'
|
|||
host.primary_interface.update_attribute :identifier, 'eth0'
|
|||
refute_nil host.primary_interface
|
|||
assert_equal '10.0.0.100', host.ip
|
|||
# physical NICs with same MAC are skipped
|
|||
assert_no_difference 'Nic::Base.count' do
|
|||
host.set_interfaces(parser)
|
|||
end
|
|||
assert_equal '10.0.0.200', host.ip
|
|||
assert_equal 'eth1', host.primary_interface.identifier
|
|||
end
|
|||
31b7d5de | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "#set_interfaces updates existing physical interface" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :virtual => false, :ipaddress => '10.0.0.200', :link => false})
|
|||
FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :ip => '10.10.0.1', :link => true)
|
|||
assert_no_difference 'Nic::Base.count' do
|
|||
host.set_interfaces(parser)
|
|||
end
|
|||
assert_equal '10.0.0.200', host.interfaces.where(:mac => '00:00:00:11:22:33').first.ip
|
|||
refute host.interfaces.where(:mac => '00:00:00:11:22:33').first.link
|
|||
end
|
|||
370a7ac7 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "#set_interfaces creates new physical interface" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :virtual => false, :ipaddress => '10.10.0.1'})
|
|||
370a7ac7 | Ohad Levy | ||
afe02d30 | Daniel Lobato | # primary already existed so it's updated
|
|
assert_no_difference 'host.interfaces(true).count' do
|
|||
host.set_interfaces(parser)
|
|||
end
|
|||
assert_equal '10.10.0.1', host.interfaces.where(:mac => '00:00:00:11:22:33').first.ip
|
|||
end
|
|||
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "#set_interfaces creates new interface with link up if no link fact specified" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :virtual => false, :ipaddress => '10.10.0.1'})
|
|||
d455f32c | Marek Hulan | host.set_interfaces(parser)
|
|
afe02d30 | Daniel Lobato | assert host.interfaces.where(:mac => '00:00:00:11:22:33').first.link
|
|
d455f32c | Marek Hulan | end
|
|
afe02d30 | Daniel Lobato | test "#set_interfaces creates new interface even if primary interface has same MAC" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :virtual => true, :ipaddress => '10.10.0.1', :attached_to => 'eth0', :identifier => 'eth0_0'})
|
|||
host.update_attribute :mac, '00:00:00:11:22:33'
|
|||
host.update_attribute :ip, '10.0.0.100'
|
|||
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | assert_difference 'host.interfaces(true).count' do
|
|
host.set_interfaces(parser)
|
|||
end
|
|||
assert_equal '10.0.0.100', host.ip
|
|||
d455f32c | Marek Hulan | end
|
|
afe02d30 | Daniel Lobato | test "#set_interfaces creates new interface even if another virtual interface has same MAC but another identifier" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :virtual => true, :ipaddress => '10.10.0.2', :identifier => 'eth0_1', :attached_to => 'eth0'})
|
|||
FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :ip => '10.10.0.1', :virtual => true, :identifier => 'eth0_0', :attached_to => 'eth0')
|
|||
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | assert_difference 'host.interfaces(true).count' do
|
|
host.set_interfaces(parser)
|
|||
end
|
|||
d455f32c | Marek Hulan | end
|
|
afe02d30 | Daniel Lobato | test "#set_interfaces updates existing virtual interface only if it has same MAC and identifier" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :virtual => true, :ipaddress => '10.10.0.1', :attached_to => 'eth0', :identifier => 'eth0_0'})
|
|||
host.primary_interface.update_attribute :identifier, 'eth0'
|
|||
FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :ip => '10.10.0.200', :virtual => true, :attached_to => 'eth0', :identifier => 'eth0_0')
|
|||
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | assert_no_difference 'host.interfaces(true).count' do
|
|
host.set_interfaces(parser)
|
|||
end
|
|||
assert_equal '10.10.0.1', host.interfaces.where(:identifier => 'eth0_0').first.ip
|
|||
end
|
|||
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "#set_interfaces creates IPMI device if parameters are found" do
|
|
host, parser = setup_host_with_ipmi_parser({:ipaddress => '192.168.0.1', :macaddress => '00:00:00:11:33:55'})
|
|||
assert_difference 'host.interfaces(true).count' do
|
|||
host.set_interfaces(parser)
|
|||
end
|
|||
bmc = host.interfaces.where(:type => 'Nic::BMC').first
|
|||
assert_equal '192.168.0.1', bmc.ip
|
|||
assert_equal '00:00:00:11:33:55', bmc.mac
|
|||
end
|
|||
test "#set_interfaces updates IPMI device if parameters are found and there's existing IPMI with same MAC" do
|
|||
host, parser = setup_host_with_ipmi_parser({:ipaddress => '192.168.0.1', :macaddress => '00:00:00:11:33:55'})
|
|||
FactoryGirl.create(:nic_bmc, :host => host, :mac => '00:00:00:11:33:55', :ip => '10.10.0.200', :virtual => false)
|
|||
assert_no_difference 'host.interfaces(true).count' do
|
|||
host.set_interfaces(parser)
|
|||
end
|
|||
bmcs = host.interfaces.where(:type => 'Nic::BMC')
|
|||
assert_equal 1, bmcs.count
|
|||
assert_equal '192.168.0.1', bmcs.first.ip
|
|||
d455f32c | Marek Hulan | end
|
|
afe02d30 | Daniel Lobato | test "#set_interfaces updates associated virtuals identifier on identifier change" do
|
|
# eth4 was renamed to eth5 (same MAC)
|
|||
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :ipaddress => '10.10.0.1', :virtual => false, :identifier => 'eth5'})
|
|||
FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :ip => '10.10.0.1', :identifier => 'eth4')
|
|||
virtual = FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :virtual => true, :ip => '10.10.0.2', :identifier => 'eth4.1', :attached_to => 'eth4')
|
|||
d455f32c | Marek Hulan | ||
host.set_interfaces(parser)
|
|||
afe02d30 | Daniel Lobato | virtual.reload
|
|
assert_equal 'eth5.1', virtual.identifier
|
|||
assert_equal 'eth5', virtual.attached_to
|
|||
d455f32c | Marek Hulan | end
|
|
db6d6b8b | Marek Hulan | test "#set_interfaces does not update unassociated virtuals identifier on identifier change if original identifier was blank" do
|
|
# interface with empty identifier was renamed to eth5 (same MAC)
|
|||
host = FactoryGirl.create(:host, :hostgroup => FactoryGirl.create(:hostgroup), :mac => '00:00:00:11:22:33')
|
|||
host.primary_interface.update_attribute :identifier, ''
|
|||
hash = { :bond0 => {:macaddress => '00:00:00:44:55:66', :ipaddress => '10.10.0.2', :virtual => true},
|
|||
:eth5 => {:macaddress => '00:00:00:11:22:33', :ipaddress => '10.10.0.1', :virtual => false, :identifier => 'eth5'},
|
|||
}.with_indifferent_access
|
|||
parser = stub(:interfaces => hash, :ipmi_interface => {}, :suggested_primary_interface => hash.to_a.first)
|
|||
bond0 = FactoryGirl.create(:nic_bond, :host => host, :mac => '00:00:00:44:55:66', :ip => '10.10.0.2', :identifier => 'bond0', :attached_to => '')
|
|||
host.set_interfaces(parser)
|
|||
bond0.reload
|
|||
assert_equal 'bond0', bond0.identifier
|
|||
assert_equal '', bond0.attached_to
|
|||
end
|
|||
afe02d30 | Daniel Lobato | test "set_interfaces updates associated virtuals identifier even on primary interface" do
|
|
host, parser = setup_host_with_nic_parser({:macaddress => '00:00:00:11:22:33', :ipaddress => '10.10.0.1', :virtual => false, :identifier => 'eth1'})
|
|||
host.primary_interface.update_attribute :identifier, 'eth0'
|
|||
host.primary_interface.update_attribute :mac, '00:00:00:11:22:33'
|
|||
virtual = FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :virtual => true, :ip => '10.10.0.2', :identifier => 'eth0.1', :attached_to => 'eth0')
|
|||
d455f32c | Marek Hulan | ||
host.set_interfaces(parser)
|
|||
afe02d30 | Daniel Lobato | virtual.reload
|
|
assert_equal 'eth1.1', virtual.identifier
|
|||
assert_equal 'eth1', virtual.attached_to
|
|||
d455f32c | Marek Hulan | end
|
|
7be20b24 | Marek Hulan | test "#set_interfaces matches bonds based on identifier and even updates its mac" do
|
|
# interface with empty identifier was renamed to eth5 (same MAC)
|
|||
host = FactoryGirl.create(:host, :hostgroup => FactoryGirl.create(:hostgroup), :mac => '00:00:00:11:22:33')
|
|||
hash = { :bond0 => {:macaddress => 'aa:bb:cc:44:55:66', :ipaddress => '10.10.0.3', :virtual => true},
|
|||
:eth5 => {:macaddress => '00:00:00:11:22:33', :ipaddress => '10.10.0.1', :virtual => false, :identifier => 'eth5'},
|
|||
}.with_indifferent_access
|
|||
parser = stub(:interfaces => hash, :ipmi_interface => {}, :suggested_primary_interface => hash.to_a.first)
|
|||
bond0 = FactoryGirl.create(:nic_bond, :host => host, :mac => '00:00:00:44:55:66', :ip => '10.10.0.2', :identifier => 'bond0')
|
|||
host.set_interfaces(parser)
|
|||
host.interfaces.reload
|
|||
assert_equal 1, host.interfaces.bonds.size
|
|||
bond0.reload
|
|||
assert_equal 'aa:bb:cc:44:55:66', bond0.mac
|
|||
assert_equal '10.10.0.3', bond0.ip
|
|||
end
|
|||
afe02d30 | Daniel Lobato | test "#set_interfaces updates associated virtuals identifier on identifier change mutualy exclusively" do
|
|
# eth4 was renamed to eth5 and eth5 renamed to eth4
|
|||
host = FactoryGirl.create(:host, :hostgroup => FactoryGirl.create(:hostgroup))
|
|||
hash = { :eth5 => {:macaddress => '00:00:00:11:22:33', :ipaddress => '10.10.0.1', :virtual => false},
|
|||
:eth4 => {:macaddress => '00:00:00:44:55:66', :ipaddress => '10.10.0.2', :virtual => false},
|
|||
}.with_indifferent_access
|
|||
parser = stub(:interfaces => hash, :ipmi_interface => {}, :suggested_primary_interface => hash.to_a.first)
|
|||
physical4 = FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :ip => '10.10.0.1', :identifier => 'eth4')
|
|||
physical5 = FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:44:55:66', :ip => '10.10.0.2', :identifier => 'eth5')
|
|||
virtual4 = FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:11:22:33', :virtual => true, :ip => '10.10.0.10', :identifier => 'eth4.1', :attached_to => 'eth4')
|
|||
virtual5 = FactoryGirl.create(:nic_managed, :host => host, :mac => '00:00:00:44:55:66', :virtual => true, :ip => '10.10.0.20', :identifier => 'eth5.1', :attached_to => 'eth5')
|
|||
d455f32c | Marek Hulan | ||
host.set_interfaces(parser)
|
|||
afe02d30 | Daniel Lobato | physical4.reload
|
|
physical5.reload
|
|||
virtual4.reload
|
|||
virtual5.reload
|
|||
assert_equal 'eth5', physical4.identifier
|
|||
assert_equal 'eth4', physical5.identifier
|
|||
assert_equal 'eth5.1', virtual4.identifier
|
|||
assert_equal 'eth4.1', virtual5.identifier
|
|||
assert_equal 'eth5', virtual4.attached_to
|
|||
assert_equal 'eth4', virtual5.attached_to
|
|||
d455f32c | Marek Hulan | end
|
|
afe02d30 | Daniel Lobato | test "#set_interfaces does not allow two physical devices with same IP, it ignores the second" do
|
|
host = FactoryGirl.create(:host, :hostgroup => FactoryGirl.create(:hostgroup))
|
|||
hash = { :eth0 => {:macaddress => '00:00:00:55:66:77', :ipaddress => '10.10.0.1', :virtual => false },
|
|||
:eth1 => {:macaddress => '00:00:00:11:22:33', :ipaddress => '10.10.0.1', :virtual => false },
|
|||
:eth2 => {:macaddress => '00:00:00:44:55:66', :ipaddress => '10.10.0.2', :virtual => false },
|
|||
}.with_indifferent_access
|
|||
parser = stub(:interfaces => hash, :ipmi_interface => {}, :suggested_primary_interface => hash.to_a.first)
|
|||
d455f32c | Marek Hulan | ||
host.set_interfaces(parser)
|
|||
afe02d30 | Daniel Lobato | host.reload
|
|
assert_includes host.interfaces.map(&:identifier), 'eth2'
|
|||
assert_includes host.interfaces, host.primary_interface
|
|||
refute_includes host.interfaces.map(&:identifier), 'eth1'
|
|||
assert_equal 2, host.interfaces.size
|
|||
d455f32c | Marek Hulan | end
|
|
afe02d30 | Daniel Lobato | test "#set_interfaces creates bond interfaces according to identifier" do
|
|
host = FactoryGirl.create(:host, :hostgroup => FactoryGirl.create(:hostgroup))
|
|||
hash = {
|
|||
:eth1 => {:macaddress => '00:00:00:11:22:33', :ipaddress => '', :virtual => false},
|
|||
:bond0 => {:macaddress => '00:00:00:11:22:33', :ipaddress => '10.10.0.1', :virtual => true},
|
|||
}.with_indifferent_access
|
|||
parser = stub(:interfaces => hash, :ipmi_interface => {}, :suggested_primary_interface => hash.to_a.first)
|
|||
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | host.set_interfaces(parser)
|
|
host.reload
|
|||
assert_includes host.interfaces.map(&:identifier), 'eth1'
|
|||
assert_includes host.interfaces.map(&:identifier), 'bond0'
|
|||
assert_equal 2, host.interfaces.size
|
|||
assert_kind_of Nic::Bond, host.interfaces.find_by_identifier('bond0')
|
|||
assert_kind_of Nic::Managed, host.interfaces.find_by_identifier('eth1')
|
|||
end
|
|||
d455f32c | Marek Hulan | ||
f2d5f955 | Marek Hulan | test "host can't have more interfaces with the same identifier" do
|
|
host = FactoryGirl.build(:host, :managed)
|
|||
host.primary_interface.identifier = 'eth0'
|
|||
nic = host.interfaces.build(:identifier => 'eth0')
|
|||
refute host.valid?
|
|||
445dd7ab | Daniel Lobato | assert nic.errors[:identifier].present?
|
|
assert host.errors[:interfaces].present?
|
|||
f2d5f955 | Marek Hulan | nic.identifier = 'eth1'
|
|
host.valid?
|
|||
refute_includes nic.errors.keys, :identifier
|
|||
refute_includes host.errors.keys, :interfaces
|
|||
end
|
|||
afe02d30 | Daniel Lobato | # Token tests
|
|
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "built should clean tokens" do
|
|
Setting[:token_duration] = 30
|
|||
h = FactoryGirl.create(:host, :managed)
|
|||
h.create_token(:value => "aaaaaa", :expires => Time.now)
|
|||
assert_equal Token.all.size, 1
|
|||
h.expire_token
|
|||
assert_equal Token.all.size, 0
|
|||
end
|
|||
d455f32c | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "built should clean tokens even when tokens are disabled" do
|
|
Setting[:token_duration] = 0
|
|||
h = FactoryGirl.create(:host, :managed)
|
|||
h.create_token(:value => "aaaaaa", :expires => Time.now)
|
|||
assert_equal Token.all.size, 1
|
|||
h.expire_token
|
|||
assert_equal Token.all.size, 0
|
|||
end
|
|||
7106fab4 | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "hosts should be able to retrieve their token if one exists" do
|
|
Setting[:token_duration] = 30
|
|||
h = FactoryGirl.create(:host, :managed)
|
|||
assert_equal Token.first, h.token
|
|||
end
|
|||
7106fab4 | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "token should return false when tokens are disabled or invalid" do
|
|
Setting[:token_duration] = 0
|
|||
h = FactoryGirl.create(:host, :managed)
|
|||
assert_equal h.token, nil
|
|||
Setting[:token_duration] = 30
|
|||
h.reload
|
|||
assert_equal h.token, nil
|
|||
end
|
|||
356b2e69 | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "a token can be matched to a host" do
|
|
h = FactoryGirl.create(:host, :managed)
|
|||
h.create_token(:value => "aaaaaa", :expires => Time.now + 1.minutes)
|
|||
assert_equal h, Host.for_token("aaaaaa").first
|
|||
end
|
|||
356b2e69 | Marek Hulan | ||
afe02d30 | Daniel Lobato | test "a token cannot be matched to a host when expired" do
|
|
h = FactoryGirl.create(:host, :managed)
|
|||
h.create_token(:value => "aaaaaa", :expires => 1.minutes.ago)
|
|||
refute Host.for_token("aaaaaa").first
|
|||
end
|
|||
8838eb42 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "deleting an host with an expired token does not cause a Foreign Key error" do
|
|
h = FactoryGirl.create(:host, :managed)
|
|||
h.create_token(:value => "aaaaaa", :expires => 5.minutes.ago)
|
|||
assert_nothing_raised(ActiveRecord::InvalidForeignKey) {h.reload.destroy}
|
|||
end
|
|||
81159d4b | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "can search hosts by hostgroup" do
|
|
#setup - add parent to hostgroup :common (not in fixtures, since no field parent_id)
|
|||
hostgroup = hostgroups(:db)
|
|||
parent_hostgroup = hostgroups(:common)
|
|||
hostgroup.parent_id = parent_hostgroup.id
|
|||
assert hostgroup.save!
|
|||
FactoryGirl.create(:host, :hostgroup => hostgroup)
|
|||
# search hosts by hostgroup label
|
|||
hosts = Host.search_for("hostgroup_title = #{hostgroup.title}")
|
|||
assert_equal 1, hosts.count
|
|||
assert_equal hosts.first.hostgroup_id, hostgroup.id
|
|||
end
|
|||
81159d4b | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "can search hosts by parent hostgroup and its descendants" do
|
|
#setup - add parent to hostgroup :common (not in fixtures, since no field parent_id)
|
|||
hostgroup = hostgroups(:db)
|
|||
parent_hostgroup = hostgroups(:common)
|
|||
hostgroup.parent_id = parent_hostgroup.id
|
|||
assert hostgroup.save!
|
|||
FactoryGirl.create(:host, :hostgroup => hostgroup)
|
|||
FactoryGirl.create(:host, :hostgroup => parent_hostgroup)
|
|||
# search hosts by parent hostgroup label
|
|||
hosts = Host::Managed.search_for("parent_hostgroup = Common")
|
|||
assert_equal hosts.count, 2
|
|||
assert_equal ["Common", "Common/db"].sort, hosts.map { |h| h.hostgroup.title }.sort
|
|||
end
|
|||
81159d4b | Greg Sutcliffe | ||
3f8e6c33 | imriz | test "can search hosts by numeric and string facts" do
|
|
host = FactoryGirl.create(:host, :hostname => 'num001.example.com')
|
|||
host.import_facts({:architecture => "x86_64", :interfaces => 'eth0', :operatingsystem => 'RedHat-test', :operatingsystemrelease => '6.2',:memory_mb => "64498",:custom_fact => "find_me"})
|
|||
hosts = Host::Managed.search_for("facts.memory_mb > 112889")
|
|||
assert_equal hosts.count, 0
|
|||
hosts = Host::Managed.search_for("facts.memory_mb > 6544")
|
|||
assert_equal hosts.count, 1
|
|||
assert_equal ["num001.example.com"], hosts.map { |h| h.name }.sort
|
|||
8658fa37 | imriz | ||
hosts = Host::Managed.search_for("facts.memory_mb ~ 64498")
|
|||
assert_equal hosts.count, 1
|
|||
assert_equal ["num001.example.com"], hosts.map { |h| h.name }.sort
|
|||
3f8e6c33 | imriz | ||
hosts = Host::Managed.search_for("facts.custom_fact = find_me")
|
|||
assert_equal hosts.count, 1
|
|||
assert_equal ["num001.example.com"], hosts.map { |h| h.name }.sort
|
|||
end
|
|||
afe02d30 | Daniel Lobato | test "non-admin user with edit_hosts permission can update interface" do
|
|
@one = users(:one)
|
|||
# add permission for user :one
|
|||
as_admin do
|
|||
filter = FactoryGirl.build(:filter)
|
|||
filter.permissions = [ Permission.find_by_name('edit_hosts') ]
|
|||
filter.save!
|
|||
role = Role.find_or_create_by_name :name => "testing_role"
|
|||
role.filters = [ filter ]
|
|||
role.save!
|
|||
@one.roles = [ role ]
|
|||
@one.save!
|
|||
end
|
|||
h = FactoryGirl.create(:host, :managed)
|
|||
assert h.interfaces.create :mac => "cabbccddeeff", :host => h, :type => 'Nic::BMC',
|
|||
f2d5f955 | Marek Hulan | :provider => "IPMI", :username => "root", :password => "secret", :ip => "10.35.19.35",
|
|
:identifier => 'eth2'
|
|||
afe02d30 | Daniel Lobato | as_user :one do
|
|
assert h.update_attributes!("interfaces_attributes" => {"0" => {"mac"=>"59:52:10:1e:45:16"}})
|
|||
bae0bea9 | Dominic Cleal | end
|
|
end
|
|||
1ef36c07 | Stephen Benjamin | test "built should send host built mail" do
|
|
ActionMailer::Base.deliveries = []
|
|||
User.current.mail_notifications << MailNotification[:host_built]
|
|||
host = FactoryGirl.create(:host, :managed, :owner => User.current)
|
|||
host.built
|
|||
email = ActionMailer::Base.deliveries.detect { |mail| mail.subject =~ /Host #{host} is built/ }
|
|||
assert email
|
|||
assert_match /Your host has finished/, email.body.encoded
|
|||
end
|
|||
afe02d30 | Daniel Lobato | test "can auto-complete searches by host name" do
|
|
as_admin do
|
|||
completions = Host::Managed.complete_for("name =")
|
|||
Host::Managed.all.each do |h|
|
|||
assert completions.include?("name = #{h.name}"), "completion missing: #{h}"
|
|||
end
|
|||
end
|
|||
end
|
|||
test "can auto-complete searches by facts" do
|
|||
as_admin do
|
|||
completions = Host::Managed.complete_for("facts.")
|
|||
FactName.order(:name).each do |fact|
|
|||
assert completions.include?(" facts.#{fact.name} "), "completion missing: #{fact}"
|
|||
end
|
|||
60e2072a | Joseph Mitchell Magen | end
|
|
end
|
|||
afe02d30 | Daniel Lobato | test "can auto-complete user searches by current_user" do
|
|
as_admin do
|
|||
completions = Host::Managed.complete_for("user.login =")
|
|||
assert completions.include?("user.login = current_user"), "completion missing: current_user"
|
|||
end
|
|||
5dfb51bb | Tomer Brisker | end
|
|
afe02d30 | Daniel Lobato | test "can auto-complete owner searches by current_user" do
|
|
as_admin do
|
|||
completions = Host::Managed.complete_for("owner = ")
|
|||
assert completions.include?("owner = current_user"), "completion missing: current_user"
|
|||
end
|
|||
5dfb51bb | Tomer Brisker | end
|
|
afe02d30 | Daniel Lobato | test "should accept lookup_values_attributes" do
|
|
h = FactoryGirl.create(:host)
|
|||
as_admin do
|
|||
assert_difference "LookupValue.count" do
|
|||
assert h.update_attributes(:lookup_values_attributes => {"0" => {:lookup_key_id => lookup_keys(:one).id, :value => "8080" }})
|
|||
end
|
|||
a6810fc6 | Joseph Mitchell Magen | end
|
|
end
|
|||
afe02d30 | Daniel Lobato | test "can search hosts by params" do
|
|
host = FactoryGirl.create(:host, :with_parameter)
|
|||
parameter = host.parameters.first
|
|||
results = Host.search_for(%{params.#{parameter.name} = "#{parameter.value}"})
|
|||
assert_equal 1, results.count
|
|||
assert_equal parameter.value, results.first.params[parameter.name]
|
|||
end
|
|||
98dd4a08 | Daniel Lobato | ||
afe02d30 | Daniel Lobato | test "can search hosts by current_user" do
|
|
FactoryGirl.create(:host)
|
|||
results = Host.search_for("owner = current_user")
|
|||
assert_equal 1, results.count
|
|||
assert_equal results[0].owner, User.current
|
|||
end
|
|||
5dfb51bb | Tomer Brisker | ||
afe02d30 | Daniel Lobato | test "can search hosts by owner" do
|
|
FactoryGirl.create(:host)
|
|||
results = Host.search_for("owner = " + User.current.login)
|
|||
assert_equal User.current.hosts.count, results.count
|
|||
assert_equal results[0].owner, User.current
|
|||
end
|
|||
5dfb51bb | Tomer Brisker | ||
afe02d30 | Daniel Lobato | test "can search hosts by inherited params from a hostgroup" do
|
|
hg = hostgroups(:common)
|
|||
host = FactoryGirl.create(:host, :hostgroup => hg)
|
|||
parameter = hg.group_parameters.first
|
|||
results = Host.search_for(%{params.#{parameter.name} = "#{parameter.value}"})
|
|||
assert results.include?(host)
|
|||
assert_equal parameter.value, results.find(host).params[parameter.name]
|
|||
end
|
|||
e5b861e3 | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "can search hosts by inherited params from a parent hostgroup" do
|
|
parent_hg = hostgroups(:common)
|
|||
hg = FactoryGirl.create(:hostgroup, :parent => parent_hg)
|
|||
host = FactoryGirl.create(:host, :hostgroup => hg)
|
|||
parameter = parent_hg.group_parameters.first
|
|||
results = Host.search_for(%{params.#{parameter.name} = "#{parameter.value}"})
|
|||
assert results.include?(host)
|
|||
assert_equal parameter.value, results.find(host).params[parameter.name]
|
|||
end
|
|||
98dd4a08 | Daniel Lobato | ||
afe02d30 | Daniel Lobato | test "can search hosts by puppet class" do
|
|
host = FactoryGirl.create(:host, :with_puppetclass)
|
|||
results = Host.search_for("class = #{host.puppetclasses.first.name}")
|
|||
assert_equal 1, results.count
|
|||
assert_equal host.puppetclasses.first, results.first.puppetclasses.first
|
|||
end
|
|||
a44dd094 | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "can search hosts by inherited puppet class from a hostgroup" do
|
|
hg = FactoryGirl.create(:hostgroup, :with_puppetclass)
|
|||
FactoryGirl.create(:host, :hostgroup => hg, :environment => hg.environment)
|
|||
results = Host.search_for("class = #{hg.puppetclasses.first.name}")
|
|||
assert_equal 1, results.count
|
|||
assert_equal 0, results.first.puppetclasses.count
|
|||
assert_equal hg.puppetclasses.first, results.first.hostgroup.puppetclasses.first
|
|||
end
|
|||
b52484ff | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "can search hosts by inherited puppet class from a parent hostgroup" do
|
|
parent_hg = FactoryGirl.create(:hostgroup, :with_puppetclass)
|
|||
hg = FactoryGirl.create(:hostgroup, :parent => parent_hg)
|
|||
FactoryGirl.create(:host, :hostgroup => hg, :environment => hg.environment)
|
|||
results = Host.search_for("class = #{parent_hg.puppetclasses.first.name}")
|
|||
assert_equal 1, results.count
|
|||
assert_equal 0, results.first.puppetclasses.count
|
|||
assert_equal 0, results.first.hostgroup.puppetclasses.count
|
|||
assert_equal parent_hg.puppetclasses.first, results.first.hostgroup.parent.puppetclasses.first
|
|||
end
|
|||
a44dd094 | Dominic Cleal | ||
afe02d30 | Daniel Lobato | test "can search hosts by puppet class from config group in parent hostgroup" do
|
|
hostgroup = FactoryGirl.create(:hostgroup, :with_config_group)
|
|||
host = FactoryGirl.create(:host, :hostgroup => hostgroup, :environment => hostgroup.environment)
|
|||
puppetclass = hostgroup.config_groups.first.puppetclasses.first
|
|||
results = Host.search_for("class = #{puppetclass.name}")
|
|||
assert_equal 1, results.count
|
|||
assert_equal host, results.first
|
|||
end
|
|||
81f4af16 | Joseph Magen | ||
afe02d30 | Daniel Lobato | test "should update puppet_proxy_id to the id of the validated proxy" do
|
|
sp = smart_proxies(:puppetmaster)
|
|||
raw = parse_json_fixture('/facts_with_caps.json')
|
|||
Host.import_host_and_facts(raw['name'], raw['facts'], nil, sp.id)
|
|||
assert_equal sp.id, Host.find_by_name('sinn1636.lan').puppet_proxy_id
|
|||
end
|
|||
5ab79857 | Ohad Levy | ||
afe02d30 | Daniel Lobato | test "shouldn't update puppet_proxy_id if it has been set" do
|
|
Host.new(:name => 'sinn1636.lan', :puppet_proxy_id => smart_proxies(:puppetmaster).id).save(:validate => false)
|
|||
sp = smart_proxies(:puppetmaster)
|
|||
raw = parse_json_fixture('/facts_with_certname.json')
|
|||
assert Host.import_host_and_facts(raw['name'], raw['facts'], nil, sp.id)
|
|||
assert_equal smart_proxies(:puppetmaster).id, Host.find_by_name('sinn1636.lan').puppet_proxy_id
|
|||
end
|
|||
5ab79857 | Ohad Levy | ||
afe02d30 | Daniel Lobato | # Ip validations
|
|
test "unmanaged hosts don't require an IP" do
|
|||
h=FactoryGirl.build(:host)
|
|||
refute h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "CRs without IP attribute don't require an IP" do
|
|
Setting[:token_duration] = 30 #enable tokens so that we only test the CR
|
|||
h=FactoryGirl.build(:host, :managed,
|
|||
:compute_resource => compute_resources(:one),
|
|||
:compute_attributes => {:fake => "data"})
|
|||
refute h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "CRs with IP attribute and a DNS-enabled domain do not require an IP" do
|
|
Setting[:token_duration] = 30 #enable tokens so that we only test the CR
|
|||
h=FactoryGirl.build(:host, :managed, :domain => domains(:mydomain),
|
|||
:compute_resource => compute_resources(:openstack),
|
|||
:compute_attributes => {:fake => "data"})
|
|||
refute h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "hosts with a DNS-enabled Domain do require an IP" do
|
|
Setting[:token_duration] = 30 #enable tokens so that we only test the domain
|
|||
h=FactoryGirl.build(:host, :managed, :domain => domains(:mydomain))
|
|||
assert h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "hosts without a DNS-enabled Domain don't require an IP" do
|
|
Setting[:token_duration] = 30 #enable tokens so that we only test the domain
|
|||
h=FactoryGirl.build(:host, :managed, :domain => domains(:useless))
|
|||
refute h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "hosts with a DNS-enabled Subnet do require an IP" do
|
|
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
|
|||
h=FactoryGirl.build(:host, :managed, :subnet => FactoryGirl.build(:subnet, :dns))
|
|||
assert h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "hosts with a DHCP-enabled Subnet do require an IP" do
|
|
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
|
|||
h=FactoryGirl.build(:host, :managed, :subnet => FactoryGirl.build(:subnet, :dhcp))
|
|||
assert h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "hosts without a DNS/DHCP-enabled Subnet don't require an IP" do
|
|
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
|
|||
h=FactoryGirl.build(:host, :managed, :subnet => FactoryGirl.build(:subnet, :dhcp => nil, :dns => nil))
|
|||
refute h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "with tokens enabled hosts don't require an IP" do
|
|
Setting[:token_duration] = 30
|
|||
h=FactoryGirl.build(:host, :managed)
|
|||
refute h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "with tokens disabled PXE build hosts do require an IP" do
|
|
h=FactoryGirl.build(:host, :managed)
|
|||
h.expects(:pxe_build?).returns(true)
|
|||
h.stubs(:image_build?).returns(false)
|
|||
assert h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "tokens disabled doesn't require an IP for image hosts" do
|
|
h=FactoryGirl.build(:host, :managed)
|
|||
h.expects(:pxe_build?).returns(false)
|
|||
h.expects(:image_build?).returns(true)
|
|||
image = stub()
|
|||
image.expects(:user_data?).returns(false)
|
|||
h.stubs(:image).returns(image)
|
|||
refute h.require_ip_validation?
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | ||
afe02d30 | Daniel Lobato | test "tokens disabled requires an IP for image hosts with user data" do
|
|
h=FactoryGirl.build(:host, :managed)
|
|||
h.expects(:pxe_build?).returns(false)
|
|||
h.expects(:image_build?).returns(true)
|
|||
image = stub()
|
|||
image.expects(:user_data?).returns(true)
|
|||
h.stubs(:image).returns(image)
|
|||
assert h.require_ip_validation?
|
|||
end
|
|||
3d03e334 | Dominic Cleal | ||
c2ff4bd6 | Ori Rabin | test "test tokens are not created until host is saved" do
|
|
class Host::Test < Host::Base
|
|||
def lookup_value_match
|
|||
'no_match'
|
|||
end
|
|||
def to_managed!
|
|||
host = self.becomes(::Host::Managed)
|
|||
host.type = 'Host::Managed'
|
|||
host.build = true
|
|||
host
|
|||
end
|
|||
end
|
|||
Setting[:token_duration] = 30 #enable tokens so that we only test the subnet
|
|||
test_host = Host::Test.create(:name => 'testhost', :interfaces => [FactoryGirl.build(:nic_primary_and_provision)])
|
|||
managed_host = test_host.to_managed!
|
|||
assert_empty Token.where(:host_id => managed_host.id)
|
|||
end
|
|||
afe02d30 | Daniel Lobato | test "compute attributes are populated by hardware profile from hostgroup" do
|
|
# hostgroups(:common) fixture has compute_profiles(:one)
|
|||
8f695d94 | Shimon Shtein | host = FactoryGirl.build(:host, :managed,
|
|
:hostgroup => hostgroups(:common),
|
|||
:compute_resource => compute_resources(:ec2),
|
|||
:organization => nil,
|
|||
:location => nil )
|
|||
afe02d30 | Daniel Lobato | host.expects(:queue_compute_create)
|
|
assert host.valid?, host.errors.full_messages.to_sentence
|
|||
assert_equal compute_attributes(:one).vm_attrs, host.compute_attributes
|
|||
end
|
|||
c6e02bd3 | Joseph Magen | ||
afe02d30 | Daniel Lobato | test "compute attributes are populated by hardware profile passed to host" do
|
|
8f695d94 | Shimon Shtein | host = FactoryGirl.build(:host, :managed,
|
|
:compute_resource => compute_resources(:ec2),
|
|||
:compute_profile => compute_profiles(:two),
|
|||
:organization => nil,
|
|||
:location => nil )
|
|||
afe02d30 | Daniel Lobato | host.expects(:queue_compute_create)
|
|
assert host.valid?, host.errors.full_messages.to_sentence
|
|||
assert_equal compute_attributes(:three).vm_attrs, host.compute_attributes
|
|||
end
|
|||
end # end of context "location or organizations are not enabled"
|
|||
160e24ea | Joseph Magen | ||
3d03e334 | Dominic Cleal | test "#capabilities returns capabilities from compute resource" do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :compute_resource => compute_resources(:one))
|
|
3d03e334 | Dominic Cleal | host.compute_resource.expects(:capabilities).returns([:build, :image])
|
|
assert_equal [:build, :image], host.capabilities
|
|||
end
|
|||
test "#capabilities on bare metal returns build" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
3d03e334 | Dominic Cleal | host.compute_resource = nil
|
|
assert_equal [:build], host.capabilities
|
|||
end
|
|||
test "#provision_method cannot be set to invalid type" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :managed)
|
|
3d03e334 | Dominic Cleal | host.provision_method = 'foobar'
|
|
host.stubs(:provision_method_in_capabilities).returns(true)
|
|||
host.valid?
|
|||
57e4204b | Joseph Magen | assert host.errors[:provision_method].include?('is unknown')
|
|
3d03e334 | Dominic Cleal | end
|
|
test "#provision_method doesn't matter on unmanaged hosts" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
3d03e334 | Dominic Cleal | host.managed = false
|
|
host.provision_method = 'foobar'
|
|||
assert host.valid?
|
|||
end
|
|||
test "#provision_method must be within capabilities" do
|
|||
3dce1589 | Justin Sherrill | host = FactoryGirl.create(:host, :managed, :with_environment)
|
|
3d03e334 | Dominic Cleal | host.provision_method = 'image'
|
|
host.expects(:capabilities).returns([:build])
|
|||
host.valid?
|
|||
57e4204b | Joseph Magen | assert host.errors[:provision_method].include?('is an unsupported provisioning method')
|
|
end
|
|||
test "#provision_method cannot be updated for existing host" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :managed)
|
|
57e4204b | Joseph Magen | host.provision_method = 'image'
|
|
refute host.save
|
|||
assert host.errors[:provision_method].include?("can't be updated after host is provisioned")
|
|||
3d03e334 | Dominic Cleal | end
|
|
test "#image_build? must be true when provision_method is image" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :managed)
|
|
3d03e334 | Dominic Cleal | host.provision_method = 'image'
|
|
assert host.image_build?
|
|||
refute host.pxe_build?
|
|||
end
|
|||
test "#pxe_build? must be true when provision_method is build" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :managed)
|
|
3d03e334 | Dominic Cleal | host.provision_method = 'build'
|
|
assert host.pxe_build?
|
|||
refute host.image_build?
|
|||
end
|
|||
111cde57 | Joseph Magen | test "classes_in_groups should return the puppetclasses of a config group only if it is in host environment" do
|
|
e14b5758 | Greg Sutcliffe | group1 = config_groups(:one)
|
|
group2 = config_groups(:two)
|
|||
host = FactoryGirl.create(:host,
|
|||
:location => taxonomies(:location1),
|
|||
:organization => taxonomies(:organization1),
|
|||
:environment => environments(:production),
|
|||
:config_groups => [group1, group2])
|
|||
111cde57 | Joseph Magen | group_classes = host.classes_in_groups
|
|
# four classes in config groups, all are in same environment
|
|||
e14b5758 | Greg Sutcliffe | assert_equal 4, (group1.puppetclasses + group2.puppetclasses).uniq.count
|
|
111cde57 | Joseph Magen | assert_equal ['chkmk', 'nagios', 'pam', 'auth'].sort, group_classes.map(&:name).sort
|
|
end
|
|||
test "should return all classes for environment only" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host,
|
|
:location => taxonomies(:location1),
|
|||
:organization => taxonomies(:organization1),
|
|||
:environment => environments(:production),
|
|||
:config_groups => [config_groups(:one), config_groups(:two)],
|
|||
:puppetclasses => [puppetclasses(:one)])
|
|||
111cde57 | Joseph Magen | all_classes = host.classes
|
|
# four classes in config groups plus one manually added
|
|||
assert_equal 5, all_classes.count
|
|||
assert_equal ['base', 'chkmk', 'nagios', 'pam', 'auth'].sort, all_classes.map(&:name).sort
|
|||
46b3d8f1 | Dominic Cleal | assert_equal all_classes, host.all_puppetclasses
|
|
111cde57 | Joseph Magen | end
|
|
test "search hostgroups by config group" do
|
|||
config_group = config_groups(:one)
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host,
|
|
:location => taxonomies(:location1),
|
|||
:organization => taxonomies(:organization1),
|
|||
:environment => environments(:production),
|
|||
:config_groups => [config_groups(:one)])
|
|||
111cde57 | Joseph Magen | hosts = Host::Managed.search_for("config_group = #{config_group.name}")
|
|
e14b5758 | Greg Sutcliffe | assert_equal [host.name], hosts.map(&:name)
|
|
111cde57 | Joseph Magen | end
|
|
test "parent_classes should return parent_classes if host has hostgroup and environment are the same" do
|
|||
e14b5758 | Greg Sutcliffe | hostgroup = FactoryGirl.create(:hostgroup, :with_puppetclass)
|
|
host = FactoryGirl.create(:host, :hostgroup => hostgroup, :environment => hostgroup.environment)
|
|||
111cde57 | Joseph Magen | assert host.hostgroup
|
|
refute_empty host.parent_classes
|
|||
assert_equal host.parent_classes, host.hostgroup.classes
|
|||
end
|
|||
test "parent_classes should not return parent classes that do not match environment" do
|
|||
e14b5758 | Greg Sutcliffe | # one class in the right env, one in a different env
|
|
pclass1 = FactoryGirl.create(:puppetclass, :environments => [environments(:testing), environments(:production)])
|
|||
pclass2 = FactoryGirl.create(:puppetclass, :environments => [environments(:production)])
|
|||
hostgroup = FactoryGirl.create(:hostgroup, :puppetclasses => [pclass1, pclass2], :environment => environments(:testing))
|
|||
host = FactoryGirl.create(:host, :hostgroup => hostgroup, :environment => environments(:production))
|
|||
111cde57 | Joseph Magen | assert host.hostgroup
|
|
refute_empty host.parent_classes
|
|||
refute_equal host.environment, host.hostgroup.environment
|
|||
refute_equal host.parent_classes, host.hostgroup.classes
|
|||
end
|
|||
test "parent_classes should return empty array if host does not have hostgroup" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
111cde57 | Joseph Magen | assert_nil host.hostgroup
|
|
assert_empty host.parent_classes
|
|||
end
|
|||
test "parent_config_groups should return parent config_groups if host has hostgroup" do
|
|||
e14b5758 | Greg Sutcliffe | hostgroup = FactoryGirl.create(:hostgroup, :with_config_group)
|
|
host = FactoryGirl.create(:host, :hostgroup => hostgroup, :environment => hostgroup.environment)
|
|||
111cde57 | Joseph Magen | assert host.hostgroup
|
|
assert_equal host.parent_config_groups, host.hostgroup.config_groups
|
|||
end
|
|||
test "parent_config_groups should return empty array if host has no hostgroup" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
111cde57 | Joseph Magen | refute host.hostgroup
|
|
assert_empty host.parent_config_groups
|
|||
end
|
|||
test "individual puppetclasses added to host (that can be removed) does not include classes that are included by config group" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :with_config_group)
|
|
pclass = FactoryGirl.create(:puppetclass, :environments => [host.environment])
|
|||
host.puppetclasses << pclass
|
|||
# not sure why, but .classes and .puppetclasses don't return the same thing here...
|
|||
assert_equal (host.config_groups.first.classes + [pclass]).map(&:name).sort, host.classes.map(&:name).sort
|
|||
assert_equal [pclass.name], host.individual_puppetclasses.map(&:name)
|
|||
111cde57 | Joseph Magen | end
|
|
test "available_puppetclasses should return all if no environment" do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
111cde57 | Joseph Magen | host.update_attribute(:environment_id, nil)
|
|
assert_equal Puppetclass.scoped, host.available_puppetclasses
|
|||
end
|
|||
test "available_puppetclasses should return environment-specific classes" do
|
|||
3dce1589 | Justin Sherrill | host = FactoryGirl.create(:host, :with_environment)
|
|
111cde57 | Joseph Magen | refute_equal Puppetclass.scoped, host.available_puppetclasses
|
|
assert_equal host.environment.puppetclasses.sort, host.available_puppetclasses.sort
|
|||
end
|
|||
test "available_puppetclasses should return environment-specific classes (and that are NOT already inherited by parent)" do
|
|||
e14b5758 | Greg Sutcliffe | hostgroup = FactoryGirl.create(:hostgroup, :with_puppetclass)
|
|
host = FactoryGirl.create(:host, :hostgroup => hostgroup, :environment => hostgroup.environment)
|
|||
111cde57 | Joseph Magen | refute_equal Puppetclass.scoped, host.available_puppetclasses
|
|
refute_equal host.environment.puppetclasses.sort, host.available_puppetclasses.sort
|
|||
assert_equal (host.environment.puppetclasses - host.parent_classes).sort, host.available_puppetclasses.sort
|
|||
end
|
|||
331ff165 | William Hefter | test "#info ENC YAML omits root_pw when password_hash is set to Base64" do
|
|
host = FactoryGirl.build(:host, :managed)
|
|||
host.hostgroup = nil
|
|||
unencrypted_password = "xybxa6JUkz63w"
|
|||
host.operatingsystem.password_hash = 'Base64'
|
|||
host.root_pass = unencrypted_password
|
|||
assert host.save!
|
|||
enc = host.info
|
|||
assert_kind_of Hash, enc
|
|||
assert_nil enc['parameters']['root_pw']
|
|||
host.operatingsystem.password_hash = 'SHA512'
|
|||
host.root_pass = unencrypted_password
|
|||
assert host.save!
|
|||
enc = host.info
|
|||
assert_kind_of Hash, enc
|
|||
refute_nil enc['parameters']['root_pw']
|
|||
end
|
|||
46b3d8f1 | Dominic Cleal | test "#info ENC YAML uses all_puppetclasses for non-parameterized output" do
|
|
Setting[:Parametrized_Classes_in_ENC] = false
|
|||
myclass = mock('myclass')
|
|||
myclass.expects(:name).returns('myclass')
|
|||
3dce1589 | Justin Sherrill | host = FactoryGirl.build(:host, :with_environment)
|
|
46b3d8f1 | Dominic Cleal | host.expects(:all_puppetclasses).returns([myclass])
|
|
enc = host.info
|
|||
assert_kind_of Hash, enc
|
|||
assert_equal ['myclass'], enc['classes']
|
|||
end
|
|||
3dce1589 | Justin Sherrill | test "#info ENC YAML omits environment if not set" do
|
|
host = FactoryGirl.build(:host)
|
|||
host.environment = nil
|
|||
enc = host.info
|
|||
refute_includes enc.keys, 'environment'
|
|||
end
|
|||
test "#info ENC YAML returns no puppet classes if no environment" do
|
|||
puppetclass = FactoryGirl.create(:puppetclass)
|
|||
host = FactoryGirl.create(:host, :puppetclasses => [puppetclass])
|
|||
assert_empty host.info['classes']
|
|||
end
|
|||
46b3d8f1 | Dominic Cleal | test "#info ENC YAML uses Classification::ClassParam for parameterized output" do
|
|
Setting[:Parametrized_Classes_in_ENC] = true
|
|||
Setting[:Enable_Smart_Variables_in_ENC] = true
|
|||
3dce1589 | Justin Sherrill | host = FactoryGirl.build(:host, :with_environment)
|
|
46b3d8f1 | Dominic Cleal | classes = {'myclass' => {'myparam' => 'myvalue'}}
|
|
classification = mock('Classification::ClassParam')
|
|||
classification.expects(:enc).returns(classes)
|
|||
Classification::ClassParam.expects(:new).with(:host => host).returns(classification)
|
|||
enc = host.info
|
|||
assert_kind_of Hash, enc
|
|||
assert_equal classes, enc['classes']
|
|||
end
|
|||
e67fc0bd | Joseph Magen | test 'clone host including its relationships' do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :with_config_group, :with_puppetclass, :with_parameter)
|
|
e67fc0bd | Joseph Magen | copy = host.clone
|
|
assert_equal host.host_classes.map(&:puppetclass_id), copy.host_classes.map(&:puppetclass_id)
|
|||
assert_equal host.host_parameters.map(&:name), copy.host_parameters.map(&:name)
|
|||
assert_equal host.host_parameters.map(&:value), copy.host_parameters.map(&:value)
|
|||
assert_equal host.host_config_groups.map(&:config_group_id), copy.host_config_groups.map(&:config_group_id)
|
|||
end
|
|||
43c4bd72 | Marek Hulan | describe 'cloning' do
|
|
test 'clone host should not copy name, system fields (mac, ip, etc)' do
|
|||
host = FactoryGirl.create(:host, :with_config_group, :with_puppetclass, :with_parameter)
|
|||
copy = host.clone
|
|||
assert copy.name.blank?
|
|||
assert copy.mac.blank?
|
|||
assert copy.ip.blank?
|
|||
assert copy.uuid.blank?
|
|||
assert copy.certname.blank?
|
|||
assert copy.last_report.blank?
|
|||
end
|
|||
test 'clone host should copy interfaces without name, mac and ip' do
|
|||
host = FactoryGirl.create(:host, :with_config_group, :with_puppetclass, :with_parameter)
|
|||
copy = host.clone
|
|||
assert_equal host.interfaces.length, copy.interfaces.length
|
|||
interface = copy.interfaces.first
|
|||
assert interface.name.blank?
|
|||
assert interface.mac.blank?
|
|||
assert interface.ip.blank?
|
|||
end
|
|||
e67fc0bd | Joseph Magen | end
|
|
e254ea51 | Joseph Magen | test 'fqdn of host with period in name returns just name with no concatenation of domain' do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :hostname => 'my5name.mydomain.net')
|
|
assert_equal 'my5name.mydomain.net', host.name
|
|||
e254ea51 | Joseph Magen | assert_equal host.name, host.fqdn
|
|
end
|
|||
test 'fqdn of host without period in name returns name concatenated with domain' do
|
|||
e14b5758 | Greg Sutcliffe | host = Host::Managed.new(:name => 'otherfullhost', :domain => domains(:mydomain) )
|
|
assert_equal 'otherfullhost', host.name
|
|||
assert_equal 'mydomain.net', host.domain.name
|
|||
e254ea51 | Joseph Magen | assert_equal 'otherfullhost.mydomain.net', host.fqdn
|
|
end
|
|||
test 'fqdn of host period and no domain returns just name' do
|
|||
2312cccf | Daniel Lobato | assert_equal "dhcp123", Host::Managed.new(:name => "dhcp123").fqdn
|
|
e254ea51 | Joseph Magen | end
|
|
f5ab56ae | Dmitri Dolguikh | test 'clone should create compute_attributes for VM-based hosts' do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host, :compute_resource => compute_resources(:ec2))
|
|
ComputeResource.any_instance.stubs(:vm_compute_attributes_for).returns({:foo => 'bar'})
|
|||
copy = host.clone
|
|||
f5ab56ae | Dmitri Dolguikh | assert !copy.compute_attributes.nil?
|
|
end
|
|||
test 'clone should NOT create compute_attributes for bare-metal host' do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
ComputeResource.any_instance.stubs(:vm_compute_attributes_for).returns({:foo => 'bar'})
|
|||
copy = host.clone
|
|||
f5ab56ae | Dmitri Dolguikh | assert copy.compute_attributes.nil?
|
|
end
|
|||
aa19255e | Dominic Cleal | test 'facts are deleted when build set to true' do
|
|
host = FactoryGirl.create(:host, :with_facts)
|
|||
445dd7ab | Daniel Lobato | assert host.fact_values.present?
|
|
aa19255e | Dominic Cleal | refute host.build?
|
|
host.update_attributes(:build => true)
|
|||
assert_empty host.fact_values.reload
|
|||
end
|
|||
test 'reports are deleted when build set to true' do
|
|||
host = FactoryGirl.create(:host, :with_reports)
|
|||
445dd7ab | Daniel Lobato | assert host.reports.present?
|
|
aa19255e | Dominic Cleal | refute host.build?
|
|
host.update_attributes(:build => true)
|
|||
assert_empty host.reports.reload
|
|||
end
|
|||
89730c3c | Trey Dockendorf | test 'changing name with a fqdn should rename lookup_value matcher' do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
6b4b489f | Ori Rabin | lookup_key = FactoryGirl.create(:puppetclass_lookup_key)
|
|
e14b5758 | Greg Sutcliffe | lookup_value = FactoryGirl.create(:lookup_value, :lookup_key_id => lookup_key.id,
|
|
:match => "fqdn=#{host.fqdn}", :value => '8080')
|
|||
host.reload
|
|||
assert_equal "fqdn=#{host.fqdn}", LookupValue.find(lookup_value.id).match
|
|||
89730c3c | Trey Dockendorf | ||
host.name = "my5name-new.mydomain.net"
|
|||
host.save!
|
|||
e14b5758 | Greg Sutcliffe | assert_equal "fqdn=my5name-new.mydomain.net", LookupValue.find(lookup_value.id).match
|
|
89730c3c | Trey Dockendorf | end
|
|
test 'changing only name should rename lookup_value matcher' do
|
|||
43c4bd72 | Marek Hulan | host = FactoryGirl.create(:host, :domain => FactoryGirl.create(:domain))
|
|
6b4b489f | Ori Rabin | lookup_key = FactoryGirl.create(:puppetclass_lookup_key)
|
|
e14b5758 | Greg Sutcliffe | lookup_value = FactoryGirl.create(:lookup_value, :lookup_key_id => lookup_key.id,
|
|
:match => "fqdn=#{host.fqdn}", :value => '8080')
|
|||
host.reload
|
|||
assert_equal LookupValue.find(lookup_value.id).match, "fqdn=#{host.fqdn}"
|
|||
89730c3c | Trey Dockendorf | ||
host.name = "my5name-new"
|
|||
host.save!
|
|||
e14b5758 | Greg Sutcliffe | assert_equal "fqdn=my5name-new.#{host.domain.name}", LookupValue.find(lookup_value.id).match
|
|
89730c3c | Trey Dockendorf | end
|
|
test 'changing host domain should rename lookup_value matcher' do
|
|||
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
6b4b489f | Ori Rabin | lookup_key = FactoryGirl.create(:puppetclass_lookup_key)
|
|
e14b5758 | Greg Sutcliffe | lookup_value = FactoryGirl.create(:lookup_value, :lookup_key_id => lookup_key.id,
|
|
:match => "fqdn=#{host.fqdn}", :value => '8080')
|
|||
host.reload
|
|||
assert_equal LookupValue.find(lookup_value.id).match, "fqdn=#{host.fqdn}"
|
|||
89730c3c | Trey Dockendorf | ||
host.domain = domains(:yourdomain)
|
|||
host.save!
|
|||
e14b5758 | Greg Sutcliffe | assert_equal "fqdn=#{host.shortname}.yourdomain.net", LookupValue.find(lookup_value.id).match
|
|
89730c3c | Trey Dockendorf | end
|
|
7cd51106 | Tom Caspy | test "destroying host should destroy lookup values" do
|
|
host = FactoryGirl.create(:host)
|
|||
6b4b489f | Ori Rabin | lookup_key = FactoryGirl.create(:puppetclass_lookup_key)
|
|
7cd51106 | Tom Caspy | lookup_value = FactoryGirl.create(:lookup_value, :lookup_key_id => lookup_key.id,
|
|
:match => "fqdn=#{host.fqdn}", :value => '8080')
|
|||
host.reload
|
|||
host.destroy
|
|||
assert LookupValue.where(:id => lookup_value.id).first.blank?
|
|||
end
|
|||
43c4bd72 | Marek Hulan | test '#setup_clone skips new records' do
|
|
assert_nil FactoryGirl.build(:host, :managed).send(:setup_clone)
|
|||
end
|
|||
test '#setup_clone is public and clones interfaces so delegated attributes are applied to cloned interfaces' do
|
|||
host = FactoryGirl.create(:host, :managed)
|
|||
original_mac = host.mac
|
|||
host.mac = 'AA:AA:AA:AA:AA:AA'
|
|||
clone = host.setup_clone
|
|||
refute_equal host.object_id, clone.object_id
|
|||
assert_equal 'AA:AA:AA:AA:AA:AA', host.mac
|
|||
refute_equal host.mac, clone.mac
|
|||
assert_equal original_mac, clone.mac
|
|||
assert_equal original_mac, clone.provision_interface.mac
|
|||
end
|
|||
db559817 | Dominic Cleal | test '#primary_interface works during deletion' do
|
|
host = FactoryGirl.create(:host, :managed)
|
|||
iface = host.interfaces.first
|
|||
assert iface.delete
|
|||
assert_equal iface, host.primary_interface
|
|||
end
|
|||
43c4bd72 | Marek Hulan | test '#primary_interface is never cached for new record' do
|
|
host = FactoryGirl.build(:host, :managed)
|
|||
refute_nil host.primary_interface
|
|||
host.interfaces = []
|
|||
assert_nil host.primary_interface
|
|||
end
|
|||
test '#provision_interface is never cached for new record' do
|
|||
host = FactoryGirl.build(:host, :managed)
|
|||
refute_nil host.provision_interface
|
|||
host.interfaces = []
|
|||
assert_nil host.provision_interface
|
|||
end
|
|||
test '#drop_primary_interface_cache' do
|
|||
host = FactoryGirl.create(:host, :managed)
|
|||
refute_nil host.primary_interface
|
|||
445dd7ab | Daniel Lobato | host.interfaces.clear
|
|
43c4bd72 | Marek Hulan | # existing host must cache interface
|
|
refute_nil host.primary_interface
|
|||
host.drop_primary_interface_cache
|
|||
assert_nil host.primary_interface
|
|||
end
|
|||
test '#drop_provision_interface_cache' do
|
|||
host = FactoryGirl.create(:host, :managed)
|
|||
refute_nil host.provision_interface
|
|||
445dd7ab | Daniel Lobato | host.interfaces.clear
|
|
43c4bd72 | Marek Hulan | # existing host must cache interface
|
|
refute_nil host.provision_interface
|
|||
host.drop_provision_interface_cache
|
|||
assert_nil host.provision_interface
|
|||
end
|
|||
test '#reload drops primary and provision interface cache' do
|
|||
host = FactoryGirl.create(:host, :managed)
|
|||
refute_nil host.primary_interface
|
|||
refute_nil host.provision_interface
|
|||
host.expects(:drop_primary_interface_cache).once
|
|||
host.expects(:drop_provision_interface_cache).once
|
|||
host.reload
|
|||
end
|
|||
test '#becomes drops interface cache on new instance and copies all interfaces' do
|
|||
host = FactoryGirl.create(:host, :managed)
|
|||
refute_nil host.primary_interface
|
|||
refute_nil host.provision_interface
|
|||
primary = host.primary_interface
|
|||
nic = FactoryGirl.build(:nic_managed, :host => host, :mac => '00:00:00:AA:BB:CC', :ip => '192.168.0.1',
|
|||
:name => 'host2', :domain => host.domain)
|
|||
nic.primary = true
|
|||
nic.provision = true
|
|||
# make cache wrong - I don't find a way how to do it cleanly (which is good)
|
|||
host.instance_variable_set '@primary_interface', nic
|
|||
host.instance_variable_set '@provision_interface', nic
|
|||
converted = host.becomes(Host::Managed)
|
|||
assert_equal 1, converted.interfaces.size
|
|||
assert_equal primary, converted.interfaces.first
|
|||
refute_equal host.primary_interface, converted.primary_interface
|
|||
refute_equal host.provision_interface, converted.provision_interface
|
|||
end
|
|||
test '#initialize builds primary and provision interface if not present in arguments' do
|
|||
h = Host.new
|
|||
refute_nil h.primary_interface
|
|||
refute_nil h.provision_interface
|
|||
end
|
|||
test '#initialize respects primary interface attributes and sets provision to the same if missing' do
|
|||
h = Host.new(:interfaces_attributes => {
|
|||
'0' => {'_destroy' => '0',
|
|||
:type => 'Nic::Managed',
|
|||
:mac => 'ff:ff:ff:aa:aa:aa',
|
|||
:managed => '1',
|
|||
:primary => '1',
|
|||
:provision => '0',
|
|||
:virtual => '0'}
|
|||
})
|
|||
refute_nil h.primary_interface
|
|||
refute_nil h.provision_interface
|
|||
assert_equal 'ff:ff:ff:aa:aa:aa', h.primary_interface.mac
|
|||
assert_equal h.primary_interface, h.provision_interface
|
|||
end
|
|||
test '#initialize respects primary and provision interface attributes' do
|
|||
h = Host.new(:interfaces_attributes => {
|
|||
'0' => {'_destroy' => '0',
|
|||
:type => 'Nic::Managed',
|
|||
:mac => 'ff:ff:ff:aa:aa:aa',
|
|||
:managed => '1',
|
|||
:primary => '1',
|
|||
:provision => '0',
|
|||
:virtual => '0'},
|
|||
afe02d30 | Daniel Lobato | '1' => {'_destroy' => '0',
|
|
:type => 'Nic::Managed',
|
|||
:mac => 'aa:aa:aa:ff:ff:ff',
|
|||
:managed => '1',
|
|||
:primary => '0',
|
|||
:provision => '1',
|
|||
:virtual => '0'}
|
|||
43c4bd72 | Marek Hulan | })
|
|
refute_nil h.primary_interface
|
|||
refute_nil h.provision_interface
|
|||
assert_equal 'ff:ff:ff:aa:aa:aa', h.primary_interface.mac
|
|||
assert_equal 'aa:aa:aa:ff:ff:ff', h.provision_interface.mac
|
|||
refute_equal h.primary_interface, h.provision_interface
|
|||
end
|
|||
a0d231da | Aaron Stone | describe '#overwrite=' do
|
|
context 'false' do
|
|||
[:false, 'false', false].each do |v|
|
|||
test "when setting to #{v.inspect}" do
|
|||
refute FactoryGirl.build(:host, :overwrite => v).overwrite?
|
|||
end
|
|||
end
|
|||
end
|
|||
context 'true' do
|
|||
[:true, 'true', true].each do |v|
|
|||
test "when setting to #{v.inspect}" do
|
|||
assert FactoryGirl.build(:host, :overwrite => v).overwrite?
|
|||
end
|
|||
end
|
|||
end
|
|||
end
|
|||
cbe1391f | Shlomi Zadok | test 'updating host domain should validate domain exists' do
|
|
host = FactoryGirl.create(:host, :managed)
|
|||
last_domain_id = Domain.order(:id).last.id
|
|||
fake_domain_id = last_domain_id + 1
|
|||
host.domain_id = fake_domain_id
|
|||
refute(host.valid?)
|
|||
host.domain_id = last_domain_id
|
|||
assert(host.valid?)
|
|||
end
|
|||
e60f0799 | Dominic Cleal | test '#jumpstart? should return true for Solaris and SPARC hosts' do
|
|
host = FactoryGirl.create(:host,
|
|||
:operatingsystem => FactoryGirl.create(:solaris),
|
|||
:architecture => FactoryGirl.create(:architecture, :name => 'SPARC-T2'))
|
|||
assert host.jumpstart?
|
|||
end
|
|||
4d5b9795 | Dominic Cleal | test '#fqdn returns the FQDN from the primary interface' do
|
|
primary = FactoryGirl.build(:nic_managed, :primary => true, :name => 'foo', :domain => FactoryGirl.build(:domain))
|
|||
host = FactoryGirl.create(:host, :managed, :interfaces => [primary, FactoryGirl.build(:nic_managed, :provision => true)])
|
|||
assert_equal "foo.#{primary.domain.name}", host.fqdn
|
|||
end
|
|||
test '#shortname returns the name from the primary interface' do
|
|||
primary = FactoryGirl.build(:nic_managed, :primary => true, :name => 'foo')
|
|||
host = FactoryGirl.create(:host, :managed, :interfaces => [primary, FactoryGirl.build(:nic_managed, :provision => true)])
|
|||
assert_equal 'foo', host.shortname
|
|||
end
|
|||
674755f4 | Ori Rabin | test 'lookup_value_match returns host name instead of fqdn when there is no primary interface' do
|
|
host = FactoryGirl.build(:host, :managed)
|
|||
host_name = host.name
|
|||
host.interfaces.delete_all
|
|||
assert_nil host.primary_interface
|
|||
assert_equal host.send(:lookup_value_match), "fqdn=#{host_name}"
|
|||
end
|
|||
f6fb925e | alongoldboim | test 'check operatingsystem and architecture association' do
|
|
host = FactoryGirl.build(:host, :interfaces => [FactoryGirl.build(:nic_primary_and_provision)])
|
|||
assert_nil Operatingsystem.find_by_name('RedHat-test'), "operatingsystem already exist"
|
|||
host.populate_fields_from_facts(:architecture => "x86_64", :operatingsystem => 'RedHat-test', :operatingsystemrelease => '6.2')
|
|||
assert host.operatingsystem.architectures.include?(host.architecture), "no association between operatingsystem and architecture"
|
|||
end
|
|||
c6b42368 | Tom Caspy | context "lookup value attributes" do
|
|
test "invoking lookup_values_attributes= does not save lookup values in db until #save is invoked" do
|
|||
host = FactoryGirl.create(:host)
|
|||
assert_no_difference('LookupValue.count') do
|
|||
host.lookup_values_attributes = {"new_123456" => {"lookup_key_id" => lookup_keys(:complex).id, "value"=>"some_value", "match" => "fqdn=abc.mydomain.net"}}
|
|||
end
|
|||
assert_difference('LookupValue.count') do
|
|||
host.save
|
|||
end
|
|||
end
|
|||
test "same works for destruction of lookup keys" do
|
|||
host = FactoryGirl.create(:host, :lookup_values_attributes => {"new_123456" => {"lookup_key_id" => lookup_keys(:complex).id, "value"=>"some_value", "match" => "fqdn=abc.mydomain.net"}})
|
|||
lookup_value = host.lookup_values.first
|
|||
assert_no_difference('LookupValue.count') do
|
|||
host.lookup_values_attributes = {"lv" => {:id => lookup_value.id, :_destroy => true}}
|
|||
end
|
|||
assert_difference('LookupValue.count', -1) do
|
|||
host.save
|
|||
end
|
|||
end
|
|||
end
|
|||
04cb74c0 | Shimon Shtein | describe '#apply_inherited_attributes' do
|
|
test 'should be no-op if no hostgroup selected' do
|
|||
host = FactoryGirl.build(:host, :managed)
|
|||
attributes = { 'environment_id' => 1 }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_equal actual_attr, attributes
|
|||
end
|
|||
test 'should take new hostgroup if hostgroup_id present' do
|
|||
host = FactoryGirl.build(:host, :managed, :with_hostgroup)
|
|||
new_environment = FactoryGirl.create(:environment)
|
|||
new_hostgroup = FactoryGirl.create(:hostgroup, :environment => new_environment)
|
|||
assert_not_equal new_environment.id, host.hostgroup.environment.try(:id)
|
|||
attributes = { 'hostgroup_id' => new_hostgroup.id }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_equal actual_attr['environment_id'], new_environment.id
|
|||
end
|
|||
test 'should take new hostgroup if hostgroup_name present' do
|
|||
host = FactoryGirl.build(:host, :managed, :with_hostgroup)
|
|||
new_environment = FactoryGirl.create(:environment)
|
|||
new_hostgroup = FactoryGirl.create(:hostgroup, :environment => new_environment)
|
|||
assert_not_equal new_environment.id, host.hostgroup.environment.try(:id)
|
|||
attributes = { 'hostgroup_name' => new_hostgroup.title }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_equal actual_attr['environment_id'], new_environment.id
|
|||
end
|
|||
test 'should take old hostgroup if hostgroup not updated' do
|
|||
environment = FactoryGirl.create(:environment)
|
|||
host = FactoryGirl.build(:host, :managed, :with_hostgroup, :environment => environment)
|
|||
Hostgroup.expects(:find).never
|
|||
attributes = { 'hostgroup_id' => host.hostgroup.id }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_equal actual_attr['environment_id'], host.hostgroup.environment.id
|
|||
end
|
|||
test 'should accept non-existing hostgroup' do
|
|||
host = FactoryGirl.build(:host, :managed, :with_hostgroup)
|
|||
Hostgroup.expects(:find).with(1111).returns(nil)
|
|||
attributes = { 'hostgroup_id' => 1111 }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_nil actual_attr['environment_id']
|
|||
end
|
|||
test 'should not touch attribute set explicitly' do
|
|||
host = FactoryGirl.build(:host, :managed, :with_hostgroup)
|
|||
attributes = { 'hostgroup_id' => host.hostgroup.id, 'environment_id' => 1111 }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_equal actual_attr['environment_id'], 1111
|
|||
end
|
|||
test 'should inherit attribute value, if not set explicitly' do
|
|||
host = FactoryGirl.build(:host, :managed, :with_hostgroup)
|
|||
environment = FactoryGirl.create(:environment)
|
|||
host.hostgroup.environment = environment
|
|||
host.hostgroup.save!
|
|||
attributes = { 'hostgroup_id' => host.hostgroup.id }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_equal actual_attr['environment_id'], host.hostgroup.environment.id
|
|||
end
|
|||
test 'should not touch non-inherited attributes' do
|
|||
host = FactoryGirl.build(:host, :managed, :with_hostgroup)
|
|||
attributes = { 'hostgroup_id' => host.hostgroup.id, 'zzz_id' => 1111 }
|
|||
actual_attr = host.apply_inherited_attributes(attributes)
|
|||
assert_equal actual_attr['zzz_id'], 1111
|
|||
end
|
|||
end
|
|||
6ea461fe | Marek Hulan | describe 'rendering interface' do
|
|
let(:host) { FactoryGirl.build(:host, :managed) }
|
|||
test "#multiboot" do
|
|||
host.respond_to?(:multiboot)
|
|||
end
|
|||
test "#jumpstart_path" do
|
|||
host.respond_to?(:jumpstart_path)
|
|||
end
|
|||
test "#install_path" do
|
|||
host.respond_to?(:install_path)
|
|||
end
|
|||
test "#miniroot" do
|
|||
host.respond_to?(:miniroot)
|
|||
end
|
|||
end
|
|||
1e7822a5 | Marek Hulan | describe 'interface identifiers validation' do
|
|
let(:host) { FactoryGirl.build(:host, :managed) }
|
|||
let(:additional_interface) { host.interfaces.build }
|
|||
context 'additional interface has different identifier' do
|
|||
test 'host is valid' do
|
|||
assert host.valid?
|
|||
end
|
|||
end
|
|||
context 'additional interface has same identifier' do
|
|||
before { additional_interface.identifier = host.primary_interface.identifier }
|
|||
test 'host is valid' do
|
|||
refute host.valid?
|
|||
end
|
|||
test 'validation ignores interfaces marked for destruction' do
|
|||
additional_interface.mark_for_destruction
|
|||
assert host.valid?
|
|||
end
|
|||
end
|
|||
end
|
|||
01302dc5 | Greg Sutcliffe | private
|
|
01055e77 | Greg Sutcliffe | def parse_json_fixture(relative_path)
|
|
96144a47 | Daniel Lobato | JSON.parse(File.read(File.expand_path(File.dirname(__FILE__) + relative_path)))
|
|
01055e77 | Greg Sutcliffe | end
|
|
d455f32c | Marek Hulan | ||
def setup_host_with_nic_parser(nic_attributes)
|
|||
host = FactoryGirl.create(:host, :hostgroup => FactoryGirl.create(:hostgroup))
|
|||
96144a47 | Daniel Lobato | hash = { (nic_attributes.delete(:identifier) || :eth0) => nic_attributes
|
|
afe02d30 | Daniel Lobato | }.with_indifferent_access
|
|
43c4bd72 | Marek Hulan | parser = stub(:interfaces => hash, :ipmi_interface => {}, :suggested_primary_interface => hash.to_a.first)
|
|
d455f32c | Marek Hulan | [host, parser]
|
|
end
|
|||
def setup_host_with_ipmi_parser(ipmi_attributes)
|
|||
host = FactoryGirl.create(:host, :hostgroup => FactoryGirl.create(:hostgroup))
|
|||
hash = ipmi_attributes.with_indifferent_access
|
|||
43c4bd72 | Marek Hulan | primary = host.primary_interface
|
|
parser = stub(:ipmi_interface => hash, :interfaces => {}, :suggested_primary_interface => [ primary.identifier, {:macaddress => primary.mac, :ipaddress => primary.ip} ])
|
|||
d455f32c | Marek Hulan | [host, parser]
|
|
end
|
|||
554be427 | Nacho Barrientos | end
|