|
27 | 27 |
|
28 | 28 | describe 'should contain correct sql syntax for check' do
|
29 | 29 | let(:should_contain_onlyif) { [
|
30 |
| - "USE [myDatabase]", |
31 |
| - "\nIF NOT EXISTS(SELECT name FROM sys.database_principals WHERE type in ('U','S','G') AND name = 'loggingUser')\n", |
32 |
| - "THROW 51000, 'User [loggingUser] does not exist for database [myDatabase]', 10\n" |
| 30 | + "USE [myDatabase]", |
| 31 | + "\nIF NOT EXISTS(SELECT name FROM sys.database_principals WHERE type in ('U','S','G') AND name = 'loggingUser')\n", |
| 32 | + "THROW 51000, 'User [loggingUser] does not exist for database [myDatabase]', 10\n" |
33 | 33 | ] }
|
34 | 34 | let(:should_contain_command) { [
|
35 |
| - "USE [myDatabase]", |
36 |
| - /CREATE USER \[loggingUser\]\n\s+FROM LOGIN \[mySysLogin\]/ |
| 35 | + "USE [myDatabase]", |
| 36 | + /CREATE USER \[loggingUser\]\n\s+FROM LOGIN \[mySysLogin\]/ |
37 | 37 | ] }
|
38 | 38 | let(:should_not_contain_command) { [
|
39 |
| - 'PASSWORD', |
40 |
| - 'DEFAULT_SCHEMA', |
41 |
| - 'WITH' |
| 39 | + 'PASSWORD', |
| 40 | + 'DEFAULT_SCHEMA', |
| 41 | + 'WITH' |
42 | 42 | ] }
|
43 | 43 | let(:additional_params) { {:login => 'mySysLogin'} }
|
44 | 44 | it_should_behave_like 'sqlserver_tsql onlyif'
|
|
50 | 50 | password = 'Pupp3t1@'
|
51 | 51 | let(:additional_params) { {:password => password} }
|
52 | 52 | let(:should_contain_command) { [
|
53 |
| - "USE [myDatabase];", |
54 |
| - /CREATE USER \[loggingUser\]\n\s+WITH PASSWORD = '#{password}'/ |
| 53 | + "USE [myDatabase];", |
| 54 | + /CREATE USER \[loggingUser\]\n\s+WITH PASSWORD = '#{password}'/ |
55 | 55 | ] }
|
56 | 56 | let(:should_not_contain_command) { [
|
57 |
| - 'DEFAULT_SCHEMA', |
| 57 | + 'DEFAULT_SCHEMA', |
58 | 58 | ] }
|
59 | 59 | it_should_behave_like 'sqlserver_tsql onlyif'
|
60 | 60 | it_should_behave_like 'sqlserver_tsql command'
|
|
64 | 64 | describe 'when a default_schema is specified' do
|
65 | 65 | let(:additional_params) { {:default_schema => 'dbo'} }
|
66 | 66 | let(:should_contain_command) { [
|
67 |
| - "USE [myDatabase]", |
68 |
| - /CREATE USER \[loggingUser\]\n\s+WITH\s+DEFAULT_SCHEMA = dbo/ |
| 67 | + "USE [myDatabase]", |
| 68 | + /CREATE USER \[loggingUser\]\n\s+WITH\s+DEFAULT_SCHEMA = dbo/ |
69 | 69 | ] }
|
70 | 70 | let(:should_not_contain_command) { [
|
71 |
| - 'PASSWORD', |
| 71 | + 'PASSWORD', |
72 | 72 | ] }
|
73 | 73 | it_should_behave_like 'sqlserver_tsql command'
|
74 | 74 | it_should_behave_like 'sqlserver_tsql without_command'
|
|
78 | 78 | let(:additional_params) { {:user => 'myMachineName/myUser'} }
|
79 | 79 | let(:sqlserver_tsql_title) { 'user-MSSQLSERVER-myDatabase-myMachineName/myUser' }
|
80 | 80 | let(:should_contain_command) { [
|
81 |
| - "USE [myDatabase];", |
82 |
| - 'CREATE USER [myMachineName/myUser]' |
| 81 | + "USE [myDatabase];", |
| 82 | + 'CREATE USER [myMachineName/myUser]' |
83 | 83 | ] }
|
84 | 84 | it_should_behave_like 'sqlserver_tsql command'
|
85 | 85 | end
|
|
88 | 88 | let(:additional_params) { {:user => 'myMachineName/myUser', :login => 'myMachineName/myUser'} }
|
89 | 89 | let(:sqlserver_tsql_title) { 'user-MSSQLSERVER-myDatabase-myMachineName/myUser' }
|
90 | 90 | let(:should_contain_command) { [
|
91 |
| - "USE [myDatabase]", |
92 |
| - /CREATE USER \[myMachineName\/myUser\]\n\s+FROM LOGIN \[myMachineName\/myUser\]/ |
| 91 | + "USE [myDatabase]", |
| 92 | + /CREATE USER \[myMachineName\/myUser\]\n\s+FROM LOGIN \[myMachineName\/myUser\]/ |
93 | 93 | ] }
|
94 | 94 | it_should_behave_like 'sqlserver_tsql command'
|
95 | 95 | end
|
|
103 | 103 | describe 'when ensure => absent' do
|
104 | 104 | let(:additional_params) { {:ensure => 'absent'} }
|
105 | 105 | let(:sqlserver_contain_command) { [
|
106 |
| - 'USE [loggingDb];\nDROP [loggingUser]', |
107 |
| - "\nIF EXISTS(SELECT name FROM sys.database_principals WHERE name = 'loggingUser')\n THROW", |
| 106 | + 'USE [loggingDb];\nDROP [loggingUser]', |
| 107 | + "\nIF EXISTS(SELECT name FROM sys.database_principals WHERE name = 'loggingUser')\n THROW", |
108 | 108 | ] }
|
109 | 109 | let(:sqlserver_contain_onlyif) { [
|
110 |
| - "\nIF EXISTS(SELECT name FROM sys.database_principals WHERE type in ('U','S','G') AND name = 'loggingUser')\n", |
| 110 | + "\nIF EXISTS(SELECT name FROM sys.database_principals WHERE type in ('U','S','G') AND name = 'loggingUser')\n", |
111 | 111 | ] }
|
112 | 112 | it_should_behave_like 'sqlserver_tsql command'
|
113 | 113 | it_should_behave_like 'sqlserver_tsql onlyif'
|
114 | 114 | end
|
| 115 | + context 'permissions =>' do |
| 116 | + let(:title) { 'myTitle' } |
| 117 | + let(:params) { {:user => 'loggingUser', :database => 'myDatabase'} } |
| 118 | + let(:permissions) { {} } |
| 119 | + shared_examples 'sqlserver_user_permissions exists' do |type| |
| 120 | + it { |
| 121 | + params[:permissions] = permissions |
| 122 | + type_title = (type =~ /GRANT_WITH_OPTION/i ? 'GRANT-WITH_GRANT_OPTION' : type.upcase) |
| 123 | + should contain_sqlserver__user__permissions("Sqlserver::User[#{title}]-#{type_title}-loggingUser").with( |
| 124 | + { |
| 125 | + 'user' => 'loggingUser', |
| 126 | + 'database' => 'myDatabase', |
| 127 | + 'state' => type == 'GRANT_WITH_OPTION' ? 'GRANT' : type.upcase, |
| 128 | + 'with_grant_option' => type == 'GRANT_WITH_OPTION', |
| 129 | + 'permissions' => permissions[type], |
| 130 | + 'require' => 'Sqlserver_tsql[user-MSSQLSERVER-myDatabase-loggingUser]' |
| 131 | + } |
| 132 | + ) |
| 133 | + } |
| 134 | + end |
| 135 | + |
| 136 | + shared_examples 'sqlserver_user_permissions absent' do |type| |
| 137 | + it { |
| 138 | + params[:permissions] = permissions |
| 139 | + type_title = (type =~ /GRANT_WITH_OPTION/i ? 'GRANT-WITH_GRANT_OPTION' : type.upcase) |
| 140 | + should_not contain_sqlserver__user__permissions("Sqlserver::User[#{title}]-#{type_title}-loggingUser") |
| 141 | + } |
| 142 | + end |
| 143 | + |
| 144 | + describe 'GRANT permissions' do |
| 145 | + let(:permissions) { {'GRANT' => ['SELECT']} } |
| 146 | + it_behaves_like 'sqlserver_user_permissions exists', 'GRANT' |
| 147 | + it_behaves_like 'sqlserver_user_permissions absent', 'DENY' |
| 148 | + it_behaves_like 'sqlserver_user_permissions absent', 'REVOKE' |
| 149 | + it_behaves_like 'sqlserver_user_permissions absent', 'GRANT_WITH_OPTION' |
| 150 | + end |
| 151 | + |
| 152 | + describe 'GRANT DENY' do |
| 153 | + let(:permissions) { {'GRANT' => ['CONNECT SQL'], 'DENY' => ['INSERT']} } |
| 154 | + it_behaves_like 'sqlserver_user_permissions exists', 'GRANT' |
| 155 | + it_behaves_like 'sqlserver_user_permissions exists', 'DENY' |
| 156 | + it_behaves_like 'sqlserver_user_permissions absent', 'REVOKE' |
| 157 | + it_behaves_like 'sqlserver_user_permissions absent', 'GRANT_WITH_OPTION' |
| 158 | + end |
115 | 159 |
|
| 160 | + describe 'GRANT_WITH_OPTION' do |
| 161 | + let(:permissions) { {'GRANT_WITH_OPTION' => ['CONNECT SQL']} } |
| 162 | + it_behaves_like 'sqlserver_user_permissions exists', 'GRANT_WITH_OPTION' |
| 163 | + end |
| 164 | + |
| 165 | + describe 'REVOKE' do |
| 166 | + let(:permissions) { {'revoke' => ['CREATE ANY DATABASE']} } |
| 167 | + it_behaves_like 'sqlserver_user_permissions exists', 'revoke' |
| 168 | + it_behaves_like 'sqlserver_user_permissions absent', 'GRANT' |
| 169 | + it_behaves_like 'sqlserver_user_permissions absent', 'DENY' |
| 170 | + it_behaves_like 'sqlserver_user_permissions absent', 'GRANT_WITH_OPTION' |
| 171 | + end |
| 172 | + |
| 173 | + describe 'empty' do |
| 174 | + %w(GRANT DENY REVOKE GRANT-WITH_GRANT_OPTION).each do |type| |
| 175 | + it_behaves_like 'sqlserver_user_permissions absent', type |
| 176 | + end |
| 177 | + end |
| 178 | + |
| 179 | + describe 'duplicate permissions' do |
| 180 | + let(:additional_params) { { |
| 181 | + :permissions => {'GRANT' => ['CONNECT SQL'], 'REVOKE' => ['CONNECT SQL']} |
| 182 | + } } |
| 183 | + let(:raise_error_check) { "Duplicate permissions found for sqlserver::user[#{title}" } |
| 184 | + let(:raise_error_check) { "Duplicate permissions found for sqlserver::user[#{title}" } |
| 185 | + it_behaves_like 'validation error' |
| 186 | + end |
| 187 | + end |
116 | 188 | end
|
0 commit comments