mirror of
https://github.com/valitydev/salt.git
synced 2024-11-07 17:09:03 +00:00
13e8124031
Due to the many merge conflicts created from #47106 against the 2017.7 branch and #46002 against the 2018.3 branch, the changes from #47106 have been largely removed from this merge forward and the HEAD of 2018.3 was taken. A separate fix for Tornado 5.0 support will need to be made directly against the 2018.3 branch. Conflicts: - doc/topics/development/conventions/formulas.rst - salt/master.py - salt/minion.py - salt/netapi/rest_tornado/saltnado.py - salt/states/zfs.py - salt/transport/ipc.py - salt/transport/tcp.py - salt/transport/zeromq.py - salt/utils/async.py - tests/support/helpers.py - tests/support/parser/cover.py - tests/unit/grains/test_core.py - tests/unit/modules/test_ssh.py - tests/unit/test_minion.py - tests/unit/utils/test_safe_walk.py
145 lines
5.7 KiB
Python
145 lines
5.7 KiB
Python
# -*- coding: utf-8 -*-
|
|
|
|
# import Python Libs
|
|
from __future__ import absolute_import, unicode_literals, print_function
|
|
import tempfile
|
|
|
|
# Import Salt Testing Libs
|
|
from tests.support.mixins import LoaderModuleMockMixin
|
|
from tests.support.unit import skipIf, TestCase
|
|
from tests.support.mock import (
|
|
MagicMock,
|
|
NO_MOCK,
|
|
NO_MOCK_REASON,
|
|
patch
|
|
)
|
|
|
|
# Import Salt Libs
|
|
import salt.utils.files
|
|
import salt.utils.platform
|
|
import salt.modules.ssh as ssh
|
|
from salt.exceptions import CommandExecutionError
|
|
|
|
|
|
@skipIf(NO_MOCK, NO_MOCK_REASON)
|
|
class SSHAuthKeyTestCase(TestCase, LoaderModuleMockMixin):
|
|
'''
|
|
TestCase for salt.modules.ssh
|
|
'''
|
|
def setup_loader_modules(self):
|
|
return {
|
|
ssh: {
|
|
'__salt__': {
|
|
'user.info': lambda u: getattr(self, 'user_info_mock', None),
|
|
}
|
|
}
|
|
}
|
|
|
|
def tearDown(self):
|
|
try:
|
|
delattr(self, 'user_info_mock')
|
|
except AttributeError:
|
|
pass
|
|
|
|
def test_expand_user_token(self):
|
|
'''
|
|
Test if the %u, %h, and %% tokens are correctly expanded
|
|
'''
|
|
output = ssh._expand_authorized_keys_path('/home/%u', 'user',
|
|
'/home/user')
|
|
self.assertEqual(output, '/home/user')
|
|
|
|
output = ssh._expand_authorized_keys_path('/home/%h', 'user',
|
|
'/home/user')
|
|
self.assertEqual(output, '/home//home/user')
|
|
|
|
output = ssh._expand_authorized_keys_path('%h/foo', 'user',
|
|
'/home/user')
|
|
self.assertEqual(output, '/home/user/foo')
|
|
|
|
output = ssh._expand_authorized_keys_path('/srv/%h/aaa/%u%%', 'user',
|
|
'/home/user')
|
|
self.assertEqual(output, '/srv//home/user/aaa/user%')
|
|
|
|
user = 'dude'
|
|
home = '/home/dude'
|
|
path = '/home/dude%'
|
|
self.assertRaises(CommandExecutionError, ssh._expand_authorized_keys_path, path, user, home)
|
|
|
|
path = '/home/%dude'
|
|
self.assertRaises(CommandExecutionError, ssh._expand_authorized_keys_path, path, user, home)
|
|
|
|
def test_set_auth_key_invalid(self):
|
|
self.user_info_mock = {'home': '/dev/null'}
|
|
# Inserting invalid public key should be rejected
|
|
invalid_key = 'AAAAB3NzaC1kc3MAAACBAL0sQ9fJ5bYTEyY' # missing padding
|
|
self.assertEqual(ssh.set_auth_key('user', invalid_key), 'Invalid public key')
|
|
|
|
def test_replace_auth_key(self):
|
|
'''
|
|
Test the _replace_auth_key with some different authorized_keys examples
|
|
'''
|
|
# First test a known working example, gathered from the authorized_keys file
|
|
# in the integration test files.
|
|
enc = 'ssh-rsa'
|
|
key = 'AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+' \
|
|
'PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNl' \
|
|
'GEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWp' \
|
|
'XLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal' \
|
|
'72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi' \
|
|
'/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ=='
|
|
options = 'command="/usr/local/lib/ssh-helper"'
|
|
email = 'github.com'
|
|
empty_line = '\n'
|
|
comment_line = '# this is a comment\n'
|
|
|
|
# Write out the authorized key to a temporary file
|
|
temp_file = tempfile.NamedTemporaryFile(delete=False, mode='w+')
|
|
temp_file.close()
|
|
|
|
with salt.utils.files.fopen(temp_file.name, 'w') as _fh:
|
|
# Add comment
|
|
_fh.write(comment_line)
|
|
# Add empty line for #41335
|
|
_fh.write(empty_line)
|
|
_fh.write('{0} {1} {2} {3}'.format(options, enc, key, email))
|
|
|
|
with patch.dict(ssh.__salt__, {'user.info': MagicMock(return_value={})}):
|
|
with patch('salt.modules.ssh._get_config_file', MagicMock(return_value=temp_file.name)):
|
|
ssh._replace_auth_key('foo', key, config=temp_file.name)
|
|
|
|
# The previous authorized key should have been replaced by the simpler one
|
|
with salt.utils.files.fopen(temp_file.name) as _fh:
|
|
file_txt = salt.utils.stringutils.to_unicode(_fh.read())
|
|
self.assertIn(enc, file_txt)
|
|
self.assertIn(key, file_txt)
|
|
self.assertNotIn(options, file_txt)
|
|
self.assertNotIn(email, file_txt)
|
|
|
|
# Now test a very simple key using ecdsa instead of ssh-rsa and with multiple options
|
|
enc = 'ecdsa-sha2-nistp256'
|
|
key = 'abcxyz'
|
|
|
|
with salt.utils.files.fopen(temp_file.name, 'a') as _fh:
|
|
_fh.write(salt.utils.stringutils.to_str('{0} {1}'.format(enc, key)))
|
|
|
|
# Replace the simple key from before with the more complicated options + new email
|
|
# Option example is taken from Pull Request #39855
|
|
options = ['no-port-forwarding', 'no-agent-forwarding', 'no-X11-forwarding',
|
|
'command="echo \'Please login as the user \"ubuntu\" rather than the user \"root\".\'']
|
|
email = 'foo@example.com'
|
|
|
|
with patch.dict(ssh.__salt__, {'user.info': MagicMock(return_value={})}):
|
|
with patch('salt.modules.ssh._get_config_file', MagicMock(return_value=temp_file.name)):
|
|
ssh._replace_auth_key('foo', key, enc=enc, comment=email, options=options, config=temp_file.name)
|
|
|
|
# Assert that the new line was added as-is to the file
|
|
with salt.utils.files.fopen(temp_file.name) as _fh:
|
|
file_txt = salt.utils.stringutils.to_unicode(_fh.read())
|
|
self.assertIn(enc, file_txt)
|
|
self.assertIn(key, file_txt)
|
|
self.assertIn('{0} '.format(','.join(options)), file_txt)
|
|
self.assertIn(email, file_txt)
|
|
self.assertIn(empty_line, file_txt)
|
|
self.assertIn(comment_line, file_txt)
|