spec/unit/plugins/windows/fips_spec.rb in ohai-14.0.29 vs spec/unit/plugins/windows/fips_spec.rb in ohai-14.1.0

- old
+ new

@@ -15,49 +15,62 @@ # See the License for the specific language governing permissions and # limitations under the License. # require_relative "../../../spec_helper.rb" +require "openssl" describe Ohai::System, "plugin fips", :windows_only do let(:enabled) { 0 } let(:plugin) { get_plugin("windows/fips") } let(:fips_key) { 'System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy' } let(:win_reg_entry) { { "Enabled" => enabled } } + let(:openssl_test_mode) { true } + subject do + plugin.run + plugin["fips"]["kernel"]["enabled"] + end + before(:each) do allow(plugin).to receive(:collect_os).and_return(:windows) allow(Win32::Registry::HKEY_LOCAL_MACHINE).to receive(:open).with(fips_key, arch).and_yield(win_reg_entry) end + around do |ex| + begin + $FIPS_TEST_MODE = openssl_test_mode + ex.run + ensure + $FIPS_TEST_MODE = false + end + end + shared_examples "fips_plugin" do context "fips enabled key is set to 1" do let(:enabled) { 1 } it "sets fips plugin" do - plugin.run - expect(plugin["fips"]["kernel"]["enabled"]).to be(true) + expect(subject).to be(true) end end context "fips enabled key is set to 0" do let(:enabled) { 0 } it "does not set fips plugin" do - plugin.run - expect(plugin["fips"]["kernel"]["enabled"]).to be(false) + expect(subject).to be(false) end end context "fips key does not exist" do before do allow(Win32::Registry::HKEY_LOCAL_MACHINE).to receive(:open).and_raise(Win32::Registry::Error, 50) end it "does not set fips plugin" do - plugin.run - expect(plugin["fips"]["kernel"]["enabled"]).to be(false) + expect(subject).to be(false) end end end context "on 32 bit ruby" do @@ -80,7 +93,25 @@ let(:arch) { Win32::Registry::KEY_READ } before { stub_const("::RbConfig::CONFIG", { "target_cpu" => nil } ) } it_behaves_like "fips_plugin" + end + + context "with Ruby 2.5 or newer", if: defined?(OpenSSL.fips_mode) do + let(:openssl_test_mode) { false } + + context "with OpenSSL.fips_mode == false" do + before { allow(OpenSSL).to receive(:fips_mode).and_return(false) } + it "does not set fips plugin" do + expect(subject).to be(false) + end + end + + context "with OpenSSL.fips_mode == true" do + before { allow(OpenSSL).to receive(:fips_mode).and_return(true) } + it "sets fips plugin" do + expect(subject).to be(true) + end + end end end