1 # frozen_string_literal: true
5 describe 'apt_security_updates fact' do
6 subject { Facter.fact(:apt_security_updates).value }
8 before(:each) { Facter.clear }
10 describe 'when apt has no updates' do
12 allow(Facter.fact(:apt_has_updates)).to receive(:value).and_return(false)
14 it { is_expected.to be nil }
17 describe 'when apt has security updates' do
19 allow(Facter.fact(:osfamily)).to receive(:value).and_return('Debian')
20 allow(File).to receive(:executable?) # Stub all other calls
21 allow(Facter::Core::Execution).to receive(:execute) # Catch all other calls
22 allow(File).to receive(:executable?).with('/usr/bin/apt-get').and_return(true)
23 allow(Facter::Core::Execution).to receive(:execute).with('/usr/bin/apt-get -s -o Debug::NoLocking=true upgrade 2>&1').and_return(apt_get_upgrade_output)
26 describe 'on Debian' do
27 let(:apt_get_upgrade_output) do
28 "Inst tzdata [2015f-0+deb8u1] (2015g-0+deb8u1 Debian:stable-updates [all])\n" \
29 "Conf tzdata (2015g-0+deb8u1 Debian:stable-updates [all])\n" \
30 "Inst unhide.rb [13-1.1] (22-2~bpo8+1 Debian Backports:-backports [all])\n" \
31 "Conf unhide.rb (22-2~bpo8+1 Debian Backports:-backports [all])\n" \
32 "Inst curl [7.52.1-5] (7.52.1-5+deb9u2 Debian-Security:9/stable [amd64]) []\n" \
33 "Conf curl (7.52.1-5+deb9u2 Debian-Security:9/stable [amd64])\n" \
36 it { is_expected.to eq(1) }
39 describe 'on Ubuntu' do
40 let(:apt_get_upgrade_output) do
41 "Inst tzdata [2016f-0ubuntu0.18.04] (2016j-0ubuntu0.18.04 Ubuntu:18.04/xenial-security, Ubuntu:18.04/xenial-updates [all])\n" \
42 "Conf tzdata (2016j-0ubuntu0.18.04 Ubuntu:18.04/xenial-security, Ubuntu:18.04/xenial-updates [all])\n" \
43 "Inst curl [7.47.0-1ubuntu2] (7.47.0-1ubuntu2.2 Ubuntu:18.04/xenial-security [amd64]) []\n" \
44 "Conf curl (7.47.0-1ubuntu2.2 Ubuntu:18.04/xenial-security [amd64])\n" \
45 "Inst procps [2:3.3.10-4ubuntu2] (2:3.3.10-4ubuntu2.3 Ubuntu:18.04/xenial-updates [amd64])\n" \
46 "Conf procps (2:3.3.10-4ubuntu2.3 Ubuntu:18.04/xenial-updates [amd64])\n"
49 it { is_expected.to eq(2) }