X-Git-Url: https://review.fuel-infra.org/gitweb?a=blobdiff_plain;f=spec%2Funit%2Ffacter%2Fapt_security_updates_spec.rb;h=89421205bc2f0be881bbe22094033bd7e3deef4f;hb=ef0d4e7337a535a25d76b73aebf6bfdda975f533;hp=999603b6124d410d76882b4f2771523752e1411e;hpb=98d16464c32d17e449cc12dd2406654afe81f397;p=puppet-modules%2Fpuppetlabs-apt.git diff --git a/spec/unit/facter/apt_security_updates_spec.rb b/spec/unit/facter/apt_security_updates_spec.rb index 999603b..8942120 100644 --- a/spec/unit/facter/apt_security_updates_spec.rb +++ b/spec/unit/facter/apt_security_updates_spec.rb @@ -1,24 +1,52 @@ +# frozen_string_literal: true + require 'spec_helper' describe 'apt_security_updates fact' do subject { Facter.fact(:apt_security_updates).value } - after(:each) { Facter.clear } - - describe 'on Debian based distro missing update-notifier-common' do - before { - Facter.fact(:osfamily).stubs(:value).returns 'Debian' - File.stubs(:executable?).returns false - } - it { should == nil } - end - describe 'on Debian based distro' do - before { - Facter.fact(:osfamily).stubs(:value).returns 'Debian' - File.stubs(:executable?).returns true - Facter::Util::Resolution.stubs(:exec).returns '14;7' - } - it { should == 7 } + before(:each) { Facter.clear } + + describe 'when apt has no updates' do + before(:each) do + allow(Facter.fact(:apt_has_updates)).to receive(:value).and_return(false) + end + it { is_expected.to be nil } end + describe 'when apt has security updates' do + before(:each) do + allow(Facter.fact(:osfamily)).to receive(:value).and_return('Debian') + allow(File).to receive(:executable?) # Stub all other calls + allow(Facter::Util::Resolution).to receive(:exec) # Catch all other calls + allow(File).to receive(:executable?).with('/usr/bin/apt-get').and_return(true) + allow(Facter::Util::Resolution).to receive(:exec).with('/usr/bin/apt-get -s -o Debug::NoLocking=true upgrade 2>&1').and_return(apt_get_upgrade_output) + end + + describe 'on Debian' do + let(:apt_get_upgrade_output) do + "Inst tzdata [2015f-0+deb8u1] (2015g-0+deb8u1 Debian:stable-updates [all])\n" \ + "Conf tzdata (2015g-0+deb8u1 Debian:stable-updates [all])\n" \ + "Inst unhide.rb [13-1.1] (22-2~bpo8+1 Debian Backports:jessie-backports [all])\n" \ + "Conf unhide.rb (22-2~bpo8+1 Debian Backports:jessie-backports [all])\n" \ + "Inst curl [7.52.1-5] (7.52.1-5+deb9u2 Debian-Security:9/stable [amd64]) []\n" \ + "Conf curl (7.52.1-5+deb9u2 Debian-Security:9/stable [amd64])\n" \ + end + + it { is_expected.to eq(1) } + end + + describe 'on Ubuntu' do + let(:apt_get_upgrade_output) do + "Inst tzdata [2016f-0ubuntu0.16.04] (2016j-0ubuntu0.16.04 Ubuntu:16.04/xenial-security, Ubuntu:16.04/xenial-updates [all])\n" \ + "Conf tzdata (2016j-0ubuntu0.16.04 Ubuntu:16.04/xenial-security, Ubuntu:16.04/xenial-updates [all])\n" \ + "Inst curl [7.47.0-1ubuntu2] (7.47.0-1ubuntu2.2 Ubuntu:16.04/xenial-security [amd64]) []\n" \ + "Conf curl (7.47.0-1ubuntu2.2 Ubuntu:16.04/xenial-security [amd64])\n" \ + "Inst procps [2:3.3.10-4ubuntu2] (2:3.3.10-4ubuntu2.3 Ubuntu:16.04/xenial-updates [amd64])\n" \ + "Conf procps (2:3.3.10-4ubuntu2.3 Ubuntu:16.04/xenial-updates [amd64])\n" + end + + it { is_expected.to eq(2) } + end + end end