2013-12-24 05:13:02 +00:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
'''
|
2014-05-22 00:59:02 +00:00
|
|
|
:codeauthor: :email:`Mike Place <mp@saltstack.com>`
|
2013-12-24 05:13:02 +00:00
|
|
|
'''
|
|
|
|
|
|
|
|
# Import Salt Testing libs
|
|
|
|
from salttesting import TestCase, skipIf
|
|
|
|
from salttesting.helpers import ensure_in_syspath
|
2014-05-06 18:04:12 +00:00
|
|
|
from salttesting.mock import patch, call, NO_MOCK, NO_MOCK_REASON, MagicMock
|
2014-05-05 22:49:51 +00:00
|
|
|
|
2014-10-07 13:03:06 +00:00
|
|
|
ensure_in_syspath('../')
|
|
|
|
|
2014-05-05 22:49:51 +00:00
|
|
|
# Import Salt libraries
|
|
|
|
import salt.master
|
2014-05-08 22:19:07 +00:00
|
|
|
import integration
|
2013-12-24 05:13:02 +00:00
|
|
|
from salt import auth
|
|
|
|
|
|
|
|
|
2013-12-31 13:53:37 +00:00
|
|
|
@skipIf(NO_MOCK, NO_MOCK_REASON)
|
2013-12-24 05:13:02 +00:00
|
|
|
class LoadAuthTestCase(TestCase):
|
|
|
|
|
|
|
|
@patch('salt.payload.Serial')
|
2014-05-05 22:49:51 +00:00
|
|
|
@patch('salt.loader.auth', return_value={'pam.auth': 'fake_func_str', 'pam.groups': 'fake_groups_function_str'})
|
2013-12-27 17:56:31 +00:00
|
|
|
def setUp(self, auth_mock, serial_mock): # pylint: disable=W0221
|
2013-12-24 05:13:02 +00:00
|
|
|
self.lauth = auth.LoadAuth({}) # Load with empty opts
|
|
|
|
|
|
|
|
def test_load_name(self):
|
|
|
|
valid_eauth_load = {'username': 'test_user',
|
|
|
|
'show_timeout': False,
|
|
|
|
'test_password': '',
|
|
|
|
'eauth': 'pam'}
|
|
|
|
|
|
|
|
# Test a case where the loader auth doesn't have the auth type
|
2014-01-30 04:17:24 +00:00
|
|
|
without_auth_type = dict(valid_eauth_load)
|
|
|
|
without_auth_type.pop('eauth')
|
|
|
|
ret = self.lauth.load_name(without_auth_type)
|
|
|
|
self.assertEqual(ret, '', "Did not bail when the auth loader didn't have the auth type.")
|
2013-12-24 05:13:02 +00:00
|
|
|
|
2014-01-30 04:17:24 +00:00
|
|
|
# Test a case with valid params
|
2013-12-24 05:13:02 +00:00
|
|
|
with patch('salt.utils.format_call') as format_call_mock:
|
2014-01-30 04:17:58 +00:00
|
|
|
expected_ret = call('fake_func_str', {
|
|
|
|
'username': 'test_user',
|
|
|
|
'test_password': '',
|
|
|
|
'show_timeout': False,
|
|
|
|
'eauth': 'pam'
|
|
|
|
})
|
|
|
|
ret = self.lauth.load_name(valid_eauth_load)
|
2013-12-24 05:13:02 +00:00
|
|
|
format_call_mock.assert_has_calls(expected_ret)
|
2014-01-30 04:16:02 +00:00
|
|
|
|
2014-05-05 22:49:51 +00:00
|
|
|
def test_get_groups(self):
|
|
|
|
valid_eauth_load = {'username': 'test_user',
|
|
|
|
'show_timeout': False,
|
|
|
|
'test_password': '',
|
|
|
|
'eauth': 'pam'}
|
|
|
|
with patch('salt.utils.format_call') as format_call_mock:
|
|
|
|
expected_ret = call('fake_groups_function_str', {
|
|
|
|
'username': 'test_user',
|
|
|
|
'test_password': '',
|
|
|
|
'show_timeout': False,
|
|
|
|
'eauth': 'pam'
|
|
|
|
})
|
|
|
|
self.lauth.get_groups(valid_eauth_load)
|
|
|
|
format_call_mock.assert_has_calls(expected_ret)
|
|
|
|
|
2014-05-06 18:04:12 +00:00
|
|
|
|
|
|
|
@patch('zmq.Context', MagicMock())
|
|
|
|
@patch('salt.payload.Serial.dumps', MagicMock())
|
|
|
|
@patch('salt.master.tagify', MagicMock())
|
2014-05-05 22:49:51 +00:00
|
|
|
@patch('salt.utils.event.SaltEvent.fire_event', return_value='dummy_tag')
|
2014-05-06 18:04:12 +00:00
|
|
|
@patch('salt.auth.LoadAuth.time_auth', MagicMock(return_value=True))
|
2014-05-08 22:19:07 +00:00
|
|
|
class MasterACLTestCase(integration.ModuleCase):
|
2014-05-07 22:43:52 +00:00
|
|
|
'''
|
|
|
|
A class to check various aspects of the client ACL system
|
|
|
|
'''
|
2014-05-07 22:58:34 +00:00
|
|
|
@patch('salt.minion.MasterMinion', MagicMock())
|
2014-05-08 22:19:07 +00:00
|
|
|
@patch('salt.utils.verify.check_path_traversal', MagicMock())
|
2014-05-07 22:58:34 +00:00
|
|
|
def setUp(self):
|
2014-10-07 13:03:06 +00:00
|
|
|
opts = self.get_config('minion', from_scratch=True)
|
2014-05-08 22:19:07 +00:00
|
|
|
opts['client_acl_blacklist'] = {}
|
|
|
|
opts['master_job_cache'] = ''
|
|
|
|
opts['sign_pub_messages'] = False
|
|
|
|
opts['external_auth'] = {'pam': {'test_user': [{'*': ['test.ping']},
|
|
|
|
{'minion_glob*': ['foo.bar']},
|
|
|
|
{'minion_func_test': ['func_test.*']}],
|
|
|
|
'test_group%': [{'*': ['test.echo']}],
|
|
|
|
'test_user_mminion': [{'target_minion': ['test.ping']}],
|
|
|
|
'*': [{'my_minion': ['my_mod.my_func']}],
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
self.clear = salt.master.ClearFuncs(opts, MagicMock(), MagicMock(), MagicMock())
|
2014-05-05 22:49:51 +00:00
|
|
|
|
2014-05-07 22:43:52 +00:00
|
|
|
self.valid_clear_load = {'tgt_type': 'glob',
|
2014-05-05 22:49:51 +00:00
|
|
|
'jid': '',
|
|
|
|
'cmd': 'publish',
|
|
|
|
'tgt': 'test_minion',
|
|
|
|
'kwargs':
|
2014-05-06 15:23:09 +00:00
|
|
|
{'username': 'test_user',
|
|
|
|
'password': 'test_password',
|
|
|
|
'show_timeout': False,
|
|
|
|
'eauth': 'pam',
|
|
|
|
'show_jid': False},
|
2014-05-05 22:49:51 +00:00
|
|
|
'ret': '',
|
|
|
|
'user': 'test_user',
|
|
|
|
'key': '',
|
|
|
|
'arg': '',
|
2014-05-06 18:04:12 +00:00
|
|
|
'fun': 'test.ping',
|
2014-05-08 22:19:07 +00:00
|
|
|
}
|
2014-05-07 22:43:52 +00:00
|
|
|
|
|
|
|
@patch('salt.utils.minions.CkMinions.check_minions', MagicMock(return_value='some_minions'))
|
|
|
|
def test_master_publish_name(self, fire_event_mock):
|
|
|
|
'''
|
|
|
|
Test to ensure a simple name can auth against a given function.
|
|
|
|
This tests to ensure test_user can access test.ping but *not* sys.doc
|
|
|
|
'''
|
2014-05-06 18:04:12 +00:00
|
|
|
# Can we access test.ping?
|
2014-05-07 22:43:52 +00:00
|
|
|
self.clear.publish(self.valid_clear_load)
|
2014-05-06 18:04:12 +00:00
|
|
|
self.assertEqual(fire_event_mock.call_args[0][0]['fun'], 'test.ping')
|
|
|
|
|
|
|
|
# Are we denied access to sys.doc?
|
2014-05-07 22:43:52 +00:00
|
|
|
sys_doc_load = self.valid_clear_load
|
2014-05-06 18:04:12 +00:00
|
|
|
sys_doc_load['fun'] = 'sys.doc'
|
|
|
|
self.clear.publish(sys_doc_load)
|
|
|
|
self.assertNotEqual(fire_event_mock.call_args[0][0]['fun'], 'sys.doc') # If sys.doc were to fire, this would match
|
2014-05-05 22:49:51 +00:00
|
|
|
|
2014-05-07 22:43:52 +00:00
|
|
|
@patch('salt.utils.minions.CkMinions.check_minions', MagicMock(return_value='some_minions'))
|
|
|
|
def test_master_publish_group(self, fire_event_mock):
|
|
|
|
'''
|
|
|
|
Tests to ensure test_group can access test.echo but *not* sys.doc
|
|
|
|
'''
|
|
|
|
self.valid_clear_load['kwargs']['user'] = 'new_user'
|
|
|
|
self.valid_clear_load['fun'] = 'test.echo'
|
|
|
|
self.valid_clear_load['arg'] = 'hello'
|
|
|
|
with patch('salt.auth.LoadAuth.get_groups', return_value=['test_group', 'second_test_group']):
|
|
|
|
self.clear.publish(self.valid_clear_load)
|
|
|
|
# Did we fire test.echo?
|
|
|
|
self.assertEqual(fire_event_mock.call_args[0][0]['fun'], 'test.echo')
|
|
|
|
|
|
|
|
# Request sys.doc
|
|
|
|
self.valid_clear_load['fun'] = 'sys.doc'
|
|
|
|
# Did we fire it?
|
2014-05-07 22:58:34 +00:00
|
|
|
self.assertNotEqual(fire_event_mock.call_args[0][0]['fun'], 'sys.doc')
|
2014-05-07 22:43:52 +00:00
|
|
|
|
|
|
|
def test_master_publish_some_minions(self, fire_event_mock):
|
|
|
|
'''
|
|
|
|
Tests to ensure we can only target minions for which we
|
|
|
|
have permission with client acl.
|
|
|
|
|
|
|
|
Note that in order for these sorts of tests to run correctly that
|
|
|
|
you should NOT patch check_minions!
|
|
|
|
'''
|
|
|
|
self.valid_clear_load['kwargs']['username'] = 'test_user_mminion'
|
|
|
|
self.valid_clear_load['user'] = 'test_user_mminion'
|
|
|
|
self.clear.publish(self.valid_clear_load)
|
|
|
|
self.assertEqual(fire_event_mock.mock_calls, [])
|
|
|
|
|
|
|
|
def test_master_not_user_glob_all(self, fire_event_mock):
|
|
|
|
'''
|
|
|
|
Test to ensure that we DO NOT access to a given
|
|
|
|
function to all users with client acl. ex:
|
|
|
|
|
|
|
|
'*':
|
|
|
|
my_minion:
|
|
|
|
- my_func
|
|
|
|
|
|
|
|
Yes, this seems like a bit of a no-op test but it's
|
|
|
|
here to document that this functionality
|
|
|
|
is NOT supported currently.
|
|
|
|
|
|
|
|
WARNING: Do not patch this wit
|
|
|
|
'''
|
|
|
|
self.valid_clear_load['kwargs']['username'] = 'NOT_A_VALID_USERNAME'
|
|
|
|
self.valid_clear_load['user'] = 'NOT_A_VALID_USERNAME'
|
|
|
|
self.valid_clear_load['fun'] = 'test.ping'
|
|
|
|
self.clear.publish(self.valid_clear_load)
|
|
|
|
self.assertEqual(fire_event_mock.mock_calls, [])
|
|
|
|
|
|
|
|
def test_master_minion_glob(self, fire_event_mock):
|
|
|
|
'''
|
|
|
|
Test to ensure we can allow access to a given
|
|
|
|
function for a user to a subset of minions
|
|
|
|
selected by a glob. ex:
|
|
|
|
|
|
|
|
test_user:
|
|
|
|
'minion_glob*':
|
|
|
|
- glob_mod.glob_func
|
|
|
|
|
|
|
|
This test is a bit tricky, because ultimately the real functionality
|
|
|
|
lies in what's returned from check_minions, but this checks a limited
|
|
|
|
amount of logic on the way there as well. Note the inline patch.
|
|
|
|
'''
|
|
|
|
requested_function = 'foo.bar'
|
|
|
|
requested_tgt = 'minion_glob1'
|
|
|
|
self.valid_clear_load['tgt'] = requested_tgt
|
|
|
|
self.valid_clear_load['fun'] = requested_function
|
|
|
|
with patch('salt.utils.minions.CkMinions.check_minions', MagicMock(return_value=['minion_glob1'])): # Assume that there is a listening minion match
|
|
|
|
self.clear.publish(self.valid_clear_load)
|
|
|
|
self.assertTrue(fire_event_mock.called, 'Did not fire {0} for minion tgt {1}'.format(requested_function, requested_tgt))
|
|
|
|
self.assertEqual(fire_event_mock.call_args[0][0]['fun'], requested_function, 'Did not fire {0} for minion glob'.format(requested_function))
|
|
|
|
|
|
|
|
def test_master_function_glob(self, fire_event_mock):
|
|
|
|
'''
|
|
|
|
Test to ensure that we can allow access to a given
|
|
|
|
set of functions in an execution module as selected
|
|
|
|
by a glob. ex:
|
|
|
|
|
|
|
|
my_user:
|
|
|
|
my_minion:
|
|
|
|
'test.*'
|
|
|
|
'''
|
|
|
|
# Unimplemented
|
|
|
|
pass
|
|
|
|
|
2014-01-30 04:16:02 +00:00
|
|
|
if __name__ == '__main__':
|
|
|
|
from integration import run_tests
|
|
|
|
run_tests(LoadAuthTestCase, needs_daemon=False)
|