aboutsummaryrefslogtreecommitdiff
path: root/spec/acceptance/tests/resource/cron/should_write_an_originally_unauthorized_users_crontab_if_puppet_authorizes_them_spec.rb
diff options
context:
space:
mode:
Diffstat (limited to 'spec/acceptance/tests/resource/cron/should_write_an_originally_unauthorized_users_crontab_if_puppet_authorizes_them_spec.rb')
-rw-r--r--spec/acceptance/tests/resource/cron/should_write_an_originally_unauthorized_users_crontab_if_puppet_authorizes_them_spec.rb111
1 files changed, 111 insertions, 0 deletions
diff --git a/spec/acceptance/tests/resource/cron/should_write_an_originally_unauthorized_users_crontab_if_puppet_authorizes_them_spec.rb b/spec/acceptance/tests/resource/cron/should_write_an_originally_unauthorized_users_crontab_if_puppet_authorizes_them_spec.rb
new file mode 100644
index 0000000..964cc17
--- /dev/null
+++ b/spec/acceptance/tests/resource/cron/should_write_an_originally_unauthorized_users_crontab_if_puppet_authorizes_them_spec.rb
@@ -0,0 +1,111 @@
+require 'spec_helper_acceptance'
+
+RSpec.context 'when Puppet authorizes a previously unauthorized user to use crontab' do
+ class << self
+ alias_method :orig_compatible_agents, :compatible_agents
+
+ # This test is confined to AIX and Solaris agents only.
+ def compatible_agents
+ orig_compatible_agents.select do |agent|
+ agent['platform'].include?('aix') || agent['platform'].include?('solaris')
+ end
+ end
+ end
+
+ let(:username) { "pl#{rand(999_999).to_i}" }
+ let(:unauthorized_username) { "pl#{rand(999_999).to_i}" }
+
+ let(:cron_deny_path) do
+ {}
+ end
+ let(:cron_deny_original_contents) do
+ {}
+ end
+
+ before(:each) do
+ step 'Ensure that the test users exist' do
+ compatible_agents.each do |agent|
+ user_present(agent, username)
+ user_present(agent, unauthorized_username)
+ end
+ end
+
+ step 'Get the current cron.deny contents for each agent' do
+ compatible_agents.each do |agent|
+ case agent['platform']
+ when %r{aix}
+ cron_deny_path[agent] = '/var/adm/cron/cron.deny'
+ when %r{solaris}
+ cron_deny_path[agent] = '/etc/cron.d/cron.deny'
+ else
+ fail_test "Cannot figure out the path of the cron.deny file for the #{agent['platform']} platform"
+ end
+
+ cron_deny_original_contents[agent] = on(agent, "cat #{cron_deny_path[agent]}").stdout
+ end
+ end
+ end
+
+ after(:each) do
+ step 'Teardown -- Erase the test users on the agents' do
+ compatible_agents.each do |agent|
+ run_cron_on(agent, :remove, username)
+ user_absent(agent, username)
+
+ run_cron_on(agent, :remove, unauthorized_username)
+ user_absent(agent, unauthorized_username)
+ end
+ end
+
+ # It is possible for the "before" hook to raise an exception while the
+ # cron.deny contents are being computed, so only execute the next step
+ # if we've managed to compute the cron.deny contents for each agent
+ next unless cron_deny_original_contents.keys.size == compatible_agents.size
+
+ step "Teardown -- Reset each agent's cron.deny contents" do
+ compatible_agents.each do |agent|
+ apply_manifest_on(agent, file_manifest(cron_deny_path[agent], ensure: :present, content: cron_deny_original_contents[agent]))
+ end
+ end
+ end
+
+ compatible_agents.each do |agent|
+ it "should write that user's crontab on #{agent}" do
+ step 'Add the unauthorized user to the cron.deny file' do
+ on(agent, "echo #{unauthorized_username} >> #{cron_deny_path[agent]}")
+ end
+
+ step 'Verify that the unauthorized user was added to the cron.deny file' do
+ cron_deny_contents = on(agent, "cat #{cron_deny_path[agent]}").stdout
+ assert_match(%r{^#{unauthorized_username}$}, cron_deny_contents, 'Failed to add the unauthorized user to the cron.deny file')
+ end
+
+ step "Modify the unauthorized user's crontab with Puppet" do
+ # The scenario we're testing here is:
+ # * An unrelated cron resource triggers the prefetch step, which will also
+ # prefetch the crontab of our unauthorized user. The latter prefetch should
+ # fail, instead returning an empty crontab file.
+ #
+ # * Puppet authorizes our unauthorized user by removing them from the cron.deny
+ # file.
+ #
+ # * A cron resource linked to our (originally) unauthorized user should now be able
+ # to write to that user's crontab file (assuming it requires the resource updating
+ # the cron.deny file)
+ #
+ # The following manifest replicates the above scenario. Note that we test this specific
+ # scenario to ensure that the changes in PUP-9217 enforce backwards compatibility.
+ manifest = [
+ cron_manifest('first_entry', command: 'ls', user: username),
+ file_manifest(cron_deny_path[agent], ensure: :present, content: cron_deny_original_contents[agent]),
+ cron_manifest('second_entry', command: 'ls', user: unauthorized_username),
+ ].join("\n\n")
+ apply_manifest_on(agent, manifest)
+ end
+
+ step "Verify that Puppet did modify the unauthorized user's crontab" do
+ assert_matching_arrays(['* * * * * ls'], crontab_entries_of(agent, unauthorized_username), "Puppet did not modify the unauthorized user's crontab file")
+ end
+ end
+ end
+end