Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
salt.14914
various-netapi-fixes-and-tests.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File various-netapi-fixes-and-tests.patch of Package salt.14914
From 95f38ddf067b9c52654395a217afea988e44a54f Mon Sep 17 00:00:00 2001 From: Jochen Breuer <jbreuer@suse.de> Date: Wed, 19 Feb 2020 14:37:05 +0100 Subject: [PATCH] various netapi fixes and tests --- conf/master | 6 ++ salt/config/__init__.py | 6 +- salt/netapi/__init__.py | 7 +- tests/integration/netapi/test_client.py | 150 +++++++++++++++++++++++++++++++- tests/support/helpers.py | 19 ++++ 5 files changed, 185 insertions(+), 3 deletions(-) diff --git a/conf/master b/conf/master index 06bed3ea44..349d971414 100644 --- a/conf/master +++ b/conf/master @@ -1291,3 +1291,9 @@ syndic_user: salt # use OS defaults, typically 75 seconds on Linux, see # /proc/sys/net/ipv4/tcp_keepalive_intvl. #tcp_keepalive_intvl: -1 + + +##### NetAPI settings ##### +############################################ +# Allow the raw_shell parameter to be used when calling Salt SSH client via API +#netapi_allow_raw_shell: True diff --git a/salt/config/__init__.py b/salt/config/__init__.py index 5d0c18b5d1..dc257ff8b8 100644 --- a/salt/config/__init__.py +++ b/salt/config/__init__.py @@ -1216,6 +1216,10 @@ VALID_OPTS = { # Use Adler32 hashing algorithm for server_id (default False until Sodium, "adler32" after) # Possible values are: False, adler32, crc32 'server_id_use_crc': (bool, six.string_types), + + # Allow raw_shell option when using the ssh + # client via the Salt API + 'netapi_allow_raw_shell': bool, } # default configurations @@ -1869,9 +1873,9 @@ DEFAULT_MASTER_OPTS = { 'auth_events': True, 'minion_data_cache_events': True, 'enable_ssh_minions': False, + 'netapi_allow_raw_shell': False, } - # ----- Salt Proxy Minion Configuration Defaults -----------------------------------> # These are merged with DEFAULT_MINION_OPTS since many of them also apply here. DEFAULT_PROXY_MINION_OPTS = { diff --git a/salt/netapi/__init__.py b/salt/netapi/__init__.py index 43b6e943a7..31a24bb420 100644 --- a/salt/netapi/__init__.py +++ b/salt/netapi/__init__.py @@ -71,10 +71,15 @@ class NetapiClient(object): raise salt.exceptions.SaltInvocationError( 'Invalid client specified: \'{0}\''.format(low.get('client'))) - if not ('token' in low or 'eauth' in low) and low['client'] != 'ssh': + if not ('token' in low or 'eauth' in low): raise salt.exceptions.EauthAuthenticationError( 'No authentication credentials given') + if low.get('raw_shell') and \ + not self.opts.get('netapi_allow_raw_shell'): + raise salt.exceptions.EauthAuthenticationError( + 'Raw shell option not allowed.') + l_fun = getattr(self, low['client']) f_call = salt.utils.args.format_call(l_fun, low) return l_fun(*f_call.get('args', ()), **f_call.get('kwargs', {})) diff --git a/tests/integration/netapi/test_client.py b/tests/integration/netapi/test_client.py index 503bbaf335..a886563e3d 100644 --- a/tests/integration/netapi/test_client.py +++ b/tests/integration/netapi/test_client.py @@ -2,17 +2,32 @@ # Import Python libs from __future__ import absolute_import, print_function, unicode_literals +import logging import os import time # Import Salt Testing libs -from tests.support.paths import TMP_CONF_DIR +from tests.support.paths import TMP_CONF_DIR, TMP +from tests.support.runtests import RUNTIME_VARS from tests.support.unit import TestCase, skipIf +from tests.support.mock import patch +from tests.support.case import SSHCase +from tests.support.helpers import ( + Webserver, + SaveRequestsPostHandler, + requires_sshd_server +) # Import Salt libs import salt.config import salt.netapi +from salt.exceptions import ( + EauthAuthenticationError +) + +log = logging.getLogger(__name__) + class NetapiClientTest(TestCase): eauth_creds = { @@ -74,6 +89,12 @@ class NetapiClientTest(TestCase): pass self.assertEqual(ret, {'minions': sorted(['minion', 'sub_minion'])}) + def test_local_unauthenticated(self): + low = {'client': 'local', 'tgt': '*', 'fun': 'test.ping'} + + with self.assertRaises(EauthAuthenticationError) as excinfo: + ret = self.netapi.run(low) + def test_wheel(self): low = {'client': 'wheel', 'fun': 'key.list_all'} low.update(self.eauth_creds) @@ -107,6 +128,12 @@ class NetapiClientTest(TestCase): self.assertIn('jid', ret) self.assertIn('tag', ret) + def test_wheel_unauthenticated(self): + low = {'client': 'wheel', 'tgt': '*', 'fun': 'test.ping'} + + with self.assertRaises(EauthAuthenticationError) as excinfo: + ret = self.netapi.run(low) + @skipIf(True, 'This is not testing anything. Skipping for now.') def test_runner(self): # TODO: fix race condition in init of event-- right now the event class @@ -125,3 +152,124 @@ class NetapiClientTest(TestCase): low.update(self.eauth_creds) ret = self.netapi.run(low) + + def test_runner_unauthenticated(self): + low = {'client': 'runner', 'tgt': '*', 'fun': 'test.ping'} + + with self.assertRaises(EauthAuthenticationError) as excinfo: + ret = self.netapi.run(low) + + +@requires_sshd_server +class NetapiSSHClientTest(SSHCase): + eauth_creds = { + 'username': 'saltdev_auto', + 'password': 'saltdev', + 'eauth': 'auto', + } + + def setUp(self): + ''' + Set up a NetapiClient instance + ''' + opts = salt.config.client_config(os.path.join(TMP_CONF_DIR, 'master')) + self.netapi = salt.netapi.NetapiClient(opts) + self.priv_file = os.path.join(RUNTIME_VARS.TMP_CONF_DIR, 'key_test') + self.rosters = os.path.join(RUNTIME_VARS.TMP_CONF_DIR) + + self.priv_file = os.path.join(RUNTIME_VARS.TMP_CONF_DIR, 'key_test') + self.rosters = os.path.join(RUNTIME_VARS.TMP_CONF_DIR) + + # Initialize salt-ssh + self.run_function('test.ping') + + def tearDown(self): + del self.netapi + + @classmethod + def setUpClass(cls): + cls.post_webserver = Webserver(handler=SaveRequestsPostHandler) + cls.post_webserver.start() + cls.post_web_root = cls.post_webserver.web_root + cls.post_web_handler = cls.post_webserver.handler + + @classmethod + def tearDownClass(cls): + cls.post_webserver.stop() + del cls.post_webserver + + def test_ssh(self): + low = {'client': 'ssh', + 'tgt': 'localhost', + 'fun': 'test.ping', + 'ignore_host_keys': True, + 'roster_file': 'roster', + 'rosters': [self.rosters], + 'ssh_priv': self.priv_file} + + low.update(self.eauth_creds) + + ret = self.netapi.run(low) + + self.assertIn('localhost', ret) + self.assertIn('return', ret['localhost']) + self.assertEqual(ret['localhost']['return'], True) + self.assertEqual(ret['localhost']['id'], 'localhost') + self.assertEqual(ret['localhost']['fun'], 'test.ping') + + def test_ssh_unauthenticated(self): + low = {'client': 'ssh', 'tgt': 'localhost', 'fun': 'test.ping'} + + with self.assertRaises(EauthAuthenticationError) as excinfo: + ret = self.netapi.run(low) + + def test_ssh_unauthenticated_raw_shell_curl(self): + + fun = '-o ProxyCommand curl {0}'.format(self.post_web_root) + low = {'client': 'ssh', + 'tgt': 'localhost', + 'fun': fun, + 'raw_shell': True} + + ret = None + with self.assertRaises(EauthAuthenticationError) as excinfo: + ret = self.netapi.run(low) + + self.assertEqual(self.post_web_handler.received_requests, []) + self.assertEqual(ret, None) + + def test_ssh_unauthenticated_raw_shell_touch(self): + + badfile = os.path.join(TMP, 'badfile.txt') + fun = '-o ProxyCommand touch {0}'.format(badfile) + low = {'client': 'ssh', + 'tgt': 'localhost', + 'fun': fun, + 'raw_shell': True} + + ret = None + with self.assertRaises(EauthAuthenticationError) as excinfo: + ret = self.netapi.run(low) + + self.assertEqual(ret, None) + self.assertFalse(os.path.exists('badfile.txt')) + + def test_ssh_authenticated_raw_shell_disabled(self): + + badfile = os.path.join(TMP, 'badfile.txt') + fun = '-o ProxyCommand touch {0}'.format(badfile) + low = {'client': 'ssh', + 'tgt': 'localhost', + 'fun': fun, + 'raw_shell': True} + + low.update(self.eauth_creds) + + ret = None + with patch.dict(self.netapi.opts, + {'netapi_allow_raw_shell': False}): + with self.assertRaises(EauthAuthenticationError) as excinfo: + ret = self.netapi.run(low) + + self.assertEqual(ret, None) + self.assertFalse(os.path.exists('badfile.txt')) diff --git a/tests/support/helpers.py b/tests/support/helpers.py index 626da6a069..e5ca5918c9 100644 --- a/tests/support/helpers.py +++ b/tests/support/helpers.py @@ -1582,6 +1582,25 @@ class Webserver(object): self.server_thread.join() +class SaveRequestsPostHandler(tornado.web.RequestHandler): + ''' + Save all requests sent to the server. + ''' + received_requests = [] + + def post(self, *args): # pylint: disable=arguments-differ + ''' + Handle the post + ''' + self.received_requests.append(self.request) + + def data_received(self): # pylint: disable=arguments-differ + ''' + Streaming not used for testing + ''' + raise NotImplementedError() + + def win32_kill_process_tree(pid, sig=signal.SIGTERM, include_parent=True, timeout=None, on_terminate=None): ''' -- 2.16.4
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor