aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPete Brown <pete@abstractit.com.au>2016-07-06 03:36:29 +1000
committerPete Brown <pete@abstractit.com.au>2016-07-06 03:36:29 +1000
commit2229e9dcaf7ab7e82a77a7421deb8879e1204de6 (patch)
tree4a90793324c346713cbb9a8917018c0592408137
parent00c1f835a7bb60a104cea3c8c70b43646de2bd91 (diff)
downloadpuppet-samba-2229e9dcaf7ab7e82a77a7421deb8879e1204de6.tar.gz
puppet-samba-2229e9dcaf7ab7e82a77a7421deb8879e1204de6.tar.bz2
Adding tests for more share settings
-rwxr-xr-xmanifests/server/share.pp12
-rw-r--r--spec/defines/samba__server__share_spec.rb1076
2 files changed, 1061 insertions, 27 deletions
diff --git a/manifests/server/share.pp b/manifests/server/share.pp
index d93cc0b..be4ee1e 100755
--- a/manifests/server/share.pp
+++ b/manifests/server/share.pp
@@ -160,23 +160,23 @@ define samba::server::share($ensure = present,
default => "rm \"${target}/strict allocate\"",
},
$valid_users ? {
- '' => "rm \"${target}/valid users\"",
+ '' => "rm \"${target}/valid users\"",
default => "set \"${target}/valid users\" '${valid_users}'",
},
$op_locks ? {
- '' => "rm \"${target}/oplocks\"",
+ '' => "rm \"${target}/oplocks\"",
default => "set \"${target}/oplocks\" '${op_locks}'",
},
$level2_oplocks ? {
- '' => "rm \"${target}/level2 oplocks\"",
+ '' => "rm \"${target}/level2 oplocks\"",
default => "set \"${target}/level2 oplocks\" '${level2_oplocks}'",
},
$veto_oplock_files ? {
- '' => "rm \"${target}/veto oplock files\"",
+ '' => "rm \"${target}/veto oplock files\"",
default => "set \"${target}/veto oplock files\" '${veto_oplock_files}'",
},
$write_list ? {
- '' => "rm \"${target}/write list\"",
+ '' => "rm \"${target}/write list\"",
default => "set \"${target}/write list\" '${write_list}'",
},
$hide_dot_files ? {
@@ -185,7 +185,7 @@ define samba::server::share($ensure = present,
default => "rm \"${target}/hide dot files\"",
},
$root_preexec ? {
- '' => "rm \"${target}/root preexec\"",
+ '' => "rm \"${target}/root preexec\"",
default => "set \"${target}/root preexec\" '${root_preexec}'",
},
]
diff --git a/spec/defines/samba__server__share_spec.rb b/spec/defines/samba__server__share_spec.rb
index 26c39a1..656b8b0 100644
--- a/spec/defines/samba__server__share_spec.rb
+++ b/spec/defines/samba__server__share_spec.rb
@@ -2,7 +2,23 @@ require 'spec_helper'
describe 'samba::server::share', :type => :define do
let(:pre_condition){ 'class{"samba::server":}'}
- on_supported_os.each do |os, facts|
+ on_supported_os({
+ :hardwaremodels => ['x86_64'],
+ :supported_os => [
+ {
+ "operatingsystem" => "Ubuntu",
+ "operatingsystemrelease" => [
+ "14.04"
+ ]
+ },
+ {
+ "operatingsystem" => "CentOS",
+ "operatingsystemrelease" => [
+ "7"
+ ]
+ }
+ ],
+ }).each do |os, facts|
context "When on an #{os} system" do
let(:facts) do
facts.merge({
@@ -23,14 +39,14 @@ describe 'samba::server::share', :type => :define do
:lens => 'Samba.lns',
:context => '/files/etc/samba/smb.conf',
:changes => ["set target[. = 'test_share'] 'test_share'"],
- :requires => 'Class[Samba::Server::Config]',
- :notify => 'Class[Samba::Server::Service]')
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
}
it { is_expected.to contain_augeas('test_share-changes').with(
:incl => '/etc/samba/smb.conf',
:lens => 'Samba.lns',
:context => '/files/etc/samba/smb.conf',
- :requires => 'Augeas[test_share-section]',
+ :require => 'Augeas[test_share-section]',
:notify => 'Class[Samba::Server::Service]')
}
end#no params
@@ -41,10 +57,14 @@ describe 'samba::server::share', :type => :define do
:ensure => 'absent'
}}
- it 'should not contain the share' do
- skip 'this is not working'
- should_not contain_samba__server__share('test_share')
- end
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["rm target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
end#no params
context 'when called with available set to true' do
@@ -59,20 +79,219 @@ describe 'samba::server::share', :type => :define do
:lens => 'Samba.lns',
:context => '/files/etc/samba/smb.conf',
:changes => ["set target[. = 'test_share'] 'test_share'"],
- :requires => 'Class[Samba::Server::Config]',
- :notify => 'Class[Samba::Server::Service]')
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
}
it { is_expected.to contain_augeas('test_share-changes').with(
:incl => '/etc/samba/smb.conf',
:lens => 'Samba.lns',
:context => '/files/etc/samba/smb.conf',
- :changes => ["set \"target[. = 'test_share']/available\" yes"],
- :requires => 'Augeas[test_share-section]',
- :notify => 'Class[Samba::Server::Service]')
+ :changes => [
+ "set \"target[. = 'test_share']/available\" yes",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
}
- end#no params
+ end#available true
+
+ context 'when called with available set to false' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :available => false,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "set \"target[. = 'test_share']/available\" no",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#available false
+
+ context 'when called with browsable set to true' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :browsable => true,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "set \"target[. = 'test_share']/browsable\" yes",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#browsable false
- context 'when called with root_preexec set to something' do
+ context 'when called with browsable set to false' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :browsable => false,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "set \"target[. = 'test_share']/browsable\" no",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#browsable false
+
+ context 'when called with root_preexec set to /bin/true' do
let(:title) { 'test_share' }
let(:params) {{
:ensure => 'present',
@@ -84,18 +303,833 @@ describe 'samba::server::share', :type => :define do
:lens => 'Samba.lns',
:context => '/files/etc/samba/smb.conf',
:changes => ["set target[. = 'test_share'] 'test_share'"],
- :requires => 'Class[Samba::Server::Config]',
- :notify => 'Class[Samba::Server::Service]')
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
}
it { is_expected.to contain_augeas('test_share-changes').with(
:incl => '/etc/samba/smb.conf',
:lens => 'Samba.lns',
:context => '/files/etc/samba/smb.conf',
- :changes => ["set \"target[. = 'test_share']/root_preexec\" /bin/true"],
- :requires => 'Augeas[test_share-section]',
- :notify => 'Class[Samba::Server::Service]')
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "set \"target[. = 'test_share']/root preexec\" '/bin/true'"
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
}
- end#no params
+ end#root_preexec
+
+ context 'when called with comment set to "testing testing"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :comment => 'testing testing',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "set \"target[. = 'test_share']/comment\" 'testing testing'",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#comment
+
+ context 'when called with copy set to "testing testing"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :copy => 'testing testing',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "set \"target[. = 'test_share']/copy\" 'testing testing'",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#copy
+
+ context 'when called with create_mask set to "755"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :create_mask => '755',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "set \"target[. = 'test_share']/create mask\" '755'",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#create mask
+
+ context 'when called with directory_mask set to "755"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :directory_mask => '755',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "set \"target[. = 'test_share']/directory mask\" '755'",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#directory_mask
+
+ context 'when called with force_create_mask set to "755"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :force_create_mask => '755',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "set \"target[. = 'test_share']/force create mask\" '755'",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#force_create_mask
+
+ context 'when called with force_directory_mode set to "755"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :force_directory_mode => '755',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "set \"target[. = 'test_share']/force directory mode\" '755'",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#force_directory_mode
+
+ context 'when called with force_group set to "nogroup"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :force_group => 'nogroup',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "set \"target[. = 'test_share']/force group\" 'nogroup'",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#force_group
+
+ context 'when called with force_user set to "nobody"' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :force_user => 'nobody',
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "set \"target[. = 'test_share']/force user\" 'nobody'",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#force_user
+
+ context 'when called with guest_ok set to true' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :guest_ok => true,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "set \"target[. = 'test_share']/guest ok\" yes",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#guest_ok true
+
+ context 'when called with guest_ok set to false' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :guest_ok => false,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "set \"target[. = 'test_share']/guest ok\" no",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#guest_ok false
+
+ context 'when called with guest_only set to true' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :guest_only => true,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "set \"target[. = 'test_share']/guest only\" yes",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#guest_only false
+
+ context 'when called with guest_only set to false' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :guest_only => false,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "set \"target[. = 'test_share']/guest only\" no",
+ "rm \"target[. = 'test_share']/hide unreadable\"",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#guest_only false
+
+ context 'when called with hide_unreadable set to true' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :hide_unreadable => true,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "set \"target[. = 'test_share']/hide unreadable\" yes",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#hide_unreadable true
+
+ context 'when called with hide_unreadable set to false' do
+ let(:title) { 'test_share' }
+ let(:params) {{
+ :ensure => 'present',
+ :hide_unreadable => false,
+ }}
+ it { is_expected.to contain_samba__server__share('test_share') }
+ it { is_expected.to contain_augeas('test_share-section').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => ["set target[. = 'test_share'] 'test_share'"],
+ :require => 'Class[Samba::Server::Config]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ it { is_expected.to contain_augeas('test_share-changes').with(
+ :incl => '/etc/samba/smb.conf',
+ :lens => 'Samba.lns',
+ :context => '/files/etc/samba/smb.conf',
+ :changes => [
+ "rm \"target[. = 'test_share']/available\"",
+ "rm \"target[. = 'test_share']/browsable\"",
+ "rm \"target[. = 'test_share']/comment\"",
+ "rm \"target[. = 'test_share']/copy\"",
+ "rm \"target[. = 'test_share']/create mask\"",
+ "rm \"target[. = 'test_share']/directory mask\"",
+ "rm \"target[. = 'test_share']/force create mask\"",
+ "rm \"target[. = 'test_share']/force directory mode\"",
+ "rm \"target[. = 'test_share']/force group\"",
+ "rm \"target[. = 'test_share']/force user\"",
+ "rm \"target[. = 'test_share']/guest ok\"",
+ "rm \"target[. = 'test_share']/guest only\"",
+ "set \"target[. = 'test_share']/hide unreadable\" no",
+ "rm target[. = 'test_share']/path",
+ "rm \"target[. = 'test_share']/read only\"",
+ "rm \"target[. = 'test_share']/public\"",
+ "rm \"target[. = 'test_share']/writable\"",
+ "rm \"target[. = 'test_share']/printable\"",
+ "rm \"target[. = 'test_share']/follow symlinks\"",
+ "rm \"target[. = 'test_share']/wide links\"",
+ "rm \"target[. = 'test_share']/map acl inherit\"",
+ "rm \"target[. = 'test_share']/store dos attributes\"",
+ "rm \"target[. = 'test_share']/strict allocate\"",
+ "rm \"target[. = 'test_share']/valid users\"",
+ "rm \"target[. = 'test_share']/oplocks\"",
+ "rm \"target[. = 'test_share']/level2 oplocks\"",
+ "rm \"target[. = 'test_share']/veto oplock files\"",
+ "rm \"target[. = 'test_share']/write list\"",
+ "rm \"target[. = 'test_share']/hide dot files\"",
+ "rm \"target[. = 'test_share']/root preexec\""
+ ],
+ :require => 'Augeas[test_share-section]',
+ :notify => 'Class[Samba::Server::Service]')
+ }
+ end#hide_unreadable false
end
end