salt/tests/integration/modules/test_ssh.py

247 lines
8.6 KiB
Python
Raw Normal View History

# -*- coding: utf-8 -*-
'''
Test the ssh module
'''
# Import python libs
from __future__ import absolute_import
import os
import shutil
# Import Salt Testing libs
from tests.support.case import ModuleCase
from tests.support.paths import FILES, TMP
from tests.support.helpers import skip_if_binaries_missing
# Import salt libs
import salt.utils.files
2017-04-18 11:26:06 +00:00
# Import 3rd-party libs
from tornado.httpclient import HTTPClient
SUBSALT_DIR = os.path.join(TMP, 'subsalt')
2013-09-05 22:32:48 +00:00
AUTHORIZED_KEYS = os.path.join(SUBSALT_DIR, 'authorized_keys')
KNOWN_HOSTS = os.path.join(SUBSALT_DIR, 'known_hosts')
GITHUB_FINGERPRINT = '9d:38:5b:83:a9:17:52:92:56:1a:5e:c4:d4:81:8e:0a:ca:51:a2:64:f1:74:20:11:2e:f8:8a:c3:a1:39:49:8f'
def check_status():
'''
Check the status of Github for remote operations
'''
2017-04-18 11:26:06 +00:00
try:
return HTTPClient().fetch('http://github.com').code == 200
except Exception: # pylint: disable=broad-except
return False
2014-02-08 07:45:25 +00:00
@skip_if_binaries_missing(['ssh', 'ssh-keygen'], check_all=True)
class SSHModuleTest(ModuleCase):
'''
Test the ssh module
'''
def setUp(self):
2012-06-04 23:22:43 +00:00
'''
Set up the ssh module tests
'''
if not check_status():
self.skipTest('External source, github.com is down')
super(SSHModuleTest, self).setUp()
2013-09-05 22:32:48 +00:00
if not os.path.isdir(SUBSALT_DIR):
os.makedirs(SUBSALT_DIR)
ssh_raw_path = os.path.join(FILES, 'ssh', 'raw')
with salt.utils.files.fopen(ssh_raw_path) as fd:
self.key = fd.read().strip()
def tearDown(self):
2012-06-04 23:22:43 +00:00
'''
Tear down the ssh module tests
'''
2013-09-05 22:32:48 +00:00
if os.path.isdir(SUBSALT_DIR):
shutil.rmtree(SUBSALT_DIR)
2012-05-21 17:45:03 +00:00
super(SSHModuleTest, self).tearDown()
2017-03-06 16:45:59 +00:00
del self.key
def test_auth_keys(self):
2012-06-04 23:22:43 +00:00
'''
test ssh.auth_keys
'''
shutil.copyfile(
os.path.join(FILES, 'ssh', 'authorized_keys'),
AUTHORIZED_KEYS)
ret = self.run_function('ssh.auth_keys', ['root', AUTHORIZED_KEYS])
2012-06-04 23:22:43 +00:00
self.assertEqual(len(list(ret.items())), 1) # exactly one key is found
2012-06-04 22:40:34 +00:00
key_data = list(ret.items())[0][1]
try:
self.assertEqual(key_data['comment'], 'github.com')
self.assertEqual(key_data['enc'], 'ssh-rsa')
self.assertEqual(
key_data['options'], ['command="/usr/local/lib/ssh-helper"']
)
self.assertEqual(key_data['fingerprint'], GITHUB_FINGERPRINT)
except AssertionError as exc:
raise AssertionError(
'AssertionError: {0}. Function returned: {1}'.format(
exc, ret
)
)
def test_bad_enctype(self):
'''
test to make sure that bad key encoding types don't generate an
invalid key entry in authorized_keys
'''
shutil.copyfile(
os.path.join(FILES, 'ssh', 'authorized_badkeys'),
AUTHORIZED_KEYS)
ret = self.run_function('ssh.auth_keys', ['root', AUTHORIZED_KEYS])
# The authorized_badkeys file contains a key with an invalid ssh key
# encoding (dsa-sha2-nistp256 instead of ecdsa-sha2-nistp256)
# auth_keys should skip any keys with invalid encodings. Internally
# the minion will throw a CommandExecutionError so the
# user will get an indicator of what went wrong.
self.assertEqual(len(list(ret.items())), 0) # Zero keys found
def test_get_known_host(self):
2012-06-04 23:22:43 +00:00
'''
Check that known host information is returned from ~/.ssh/config
2012-06-04 23:22:43 +00:00
'''
shutil.copyfile(
os.path.join(FILES, 'ssh', 'known_hosts'),
KNOWN_HOSTS)
arg = ['root', 'github.com']
kwargs = {'config': KNOWN_HOSTS}
ret = self.run_function('ssh.get_known_host', arg, **kwargs)
try:
self.assertEqual(ret['enc'], 'ssh-rsa')
self.assertEqual(ret['key'], self.key)
self.assertEqual(ret['fingerprint'], GITHUB_FINGERPRINT)
except AssertionError as exc:
raise AssertionError(
'AssertionError: {0}. Function returned: {1}'.format(
exc, ret
)
)
def test_recv_known_host(self):
2012-06-04 23:22:43 +00:00
'''
Check that known host information is returned from remote host
2012-06-04 23:22:43 +00:00
'''
ret = self.run_function('ssh.recv_known_host', ['github.com'])
try:
self.assertNotEqual(ret, None)
self.assertEqual(ret['enc'], 'ssh-rsa')
self.assertEqual(ret['key'], self.key)
self.assertEqual(ret['fingerprint'], GITHUB_FINGERPRINT)
except AssertionError as exc:
raise AssertionError(
'AssertionError: {0}. Function returned: {1}'.format(
exc, ret
)
)
def test_check_known_host_add(self):
2012-06-04 23:22:43 +00:00
'''
Check known hosts by its fingerprint. File needs to be updated
2012-06-04 23:22:43 +00:00
'''
arg = ['root', 'github.com']
kwargs = {'fingerprint': GITHUB_FINGERPRINT, 'config': KNOWN_HOSTS}
ret = self.run_function('ssh.check_known_host', arg, **kwargs)
self.assertEqual(ret, 'add')
def test_check_known_host_update(self):
2012-06-04 23:22:43 +00:00
'''
ssh.check_known_host update verification
'''
shutil.copyfile(
os.path.join(FILES, 'ssh', 'known_hosts'),
KNOWN_HOSTS)
arg = ['root', 'github.com']
kwargs = {'config': KNOWN_HOSTS}
# wrong fingerprint
ret = self.run_function('ssh.check_known_host', arg,
**dict(kwargs, fingerprint='aa:bb:cc:dd'))
self.assertEqual(ret, 'update')
# wrong keyfile
ret = self.run_function('ssh.check_known_host', arg,
**dict(kwargs, key='YQ=='))
self.assertEqual(ret, 'update')
def test_check_known_host_exists(self):
2012-06-04 23:22:43 +00:00
'''
Verify check_known_host_exists
'''
shutil.copyfile(
os.path.join(FILES, 'ssh', 'known_hosts'),
KNOWN_HOSTS)
arg = ['root', 'github.com']
kwargs = {'config': KNOWN_HOSTS}
# wrong fingerprint
ret = self.run_function('ssh.check_known_host', arg,
**dict(kwargs, fingerprint=GITHUB_FINGERPRINT))
self.assertEqual(ret, 'exists')
# wrong keyfile
ret = self.run_function('ssh.check_known_host', arg,
**dict(kwargs, key=self.key))
self.assertEqual(ret, 'exists')
def test_rm_known_host(self):
2012-06-04 23:22:43 +00:00
'''
ssh.rm_known_host
'''
shutil.copyfile(
os.path.join(FILES, 'ssh', 'known_hosts'),
KNOWN_HOSTS)
arg = ['root', 'github.com']
kwargs = {'config': KNOWN_HOSTS, 'key': self.key}
# before removal
ret = self.run_function('ssh.check_known_host', arg, **kwargs)
self.assertEqual(ret, 'exists')
# remove
self.run_function('ssh.rm_known_host', arg, config=KNOWN_HOSTS)
# after removal
ret = self.run_function('ssh.check_known_host', arg, **kwargs)
self.assertEqual(ret, 'add')
def test_set_known_host(self):
2012-06-04 23:22:43 +00:00
'''
ssh.set_known_host
'''
# add item
ret = self.run_function('ssh.set_known_host', ['root', 'github.com'],
config=KNOWN_HOSTS)
try:
self.assertEqual(ret['status'], 'updated')
self.assertEqual(ret['old'], None)
self.assertEqual(ret['new']['fingerprint'], GITHUB_FINGERPRINT)
except AssertionError as exc:
raise AssertionError(
'AssertionError: {0}. Function returned: {1}'.format(
exc, ret
)
)
# check that item does exist
ret = self.run_function('ssh.get_known_host', ['root', 'github.com'],
config=KNOWN_HOSTS)
try:
self.assertEqual(ret['fingerprint'], GITHUB_FINGERPRINT)
except AssertionError as exc:
raise AssertionError(
'AssertionError: {0}. Function returned: {1}'.format(
exc, ret
)
)
# add the same item once again
ret = self.run_function('ssh.set_known_host', ['root', 'github.com'],
config=KNOWN_HOSTS)
try:
self.assertEqual(ret['status'], 'exists')
except AssertionError as exc:
raise AssertionError(
'AssertionError: {0}. Function returned: {1}'.format(
exc, ret
)
)