1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
|
#
# Secrets responder integration tests
#
# Copyright (c) 2016 Red Hat, Inc.
#
# This is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation; version 2 only
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
import os
import stat
import config
import signal
import subprocess
import time
import socket
import pytest
from requests import HTTPError
from util import unindent
from secrets import SecretsLocalClient
def create_conf_fixture(request, contents):
"""Generate sssd.conf and add teardown for removing it"""
conf = open(config.CONF_PATH, "w")
conf.write(contents)
conf.close()
os.chmod(config.CONF_PATH, stat.S_IRUSR | stat.S_IWUSR)
request.addfinalizer(lambda: os.unlink(config.CONF_PATH))
def create_sssd_secrets_fixture(request):
if subprocess.call(['sssd', "--genconf"]) != 0:
raise Exception("failed to regenerate confdb")
resp_path = os.path.join(config.LIBEXEC_PATH, "sssd", "sssd_secrets")
secpid = os.fork()
if secpid == 0:
if subprocess.call([resp_path, "--uid=0", "--gid=0"]) != 0:
raise Exception("sssd_secrets failed to start")
sock_path = os.path.join(config.RUNSTATEDIR, "secrets.socket")
sck = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
for _ in range(1, 10):
try:
sck.connect(sock_path)
except:
time.sleep(0.1)
else:
break
sck.close()
def sec_teardown():
if secpid == 0:
return
os.kill(secpid, signal.SIGTERM)
for secdb_file in os.listdir(config.SECDB_PATH):
os.unlink(config.SECDB_PATH + "/" + secdb_file)
request.addfinalizer(sec_teardown)
@pytest.fixture
def setup_for_secrets(request):
"""
Just set up the local provider for tests and enable the secrets
responder
"""
conf = unindent("""\
[sssd]
domains = local
services = nss
[domain/local]
id_provider = local
[secrets]
max_secrets = 10
""").format(**locals())
create_conf_fixture(request, conf)
create_sssd_secrets_fixture(request)
return None
@pytest.fixture
def secrets_cli(request):
sock_path = os.path.join(config.RUNSTATEDIR, "secrets.socket")
cli = SecretsLocalClient(sock_path=sock_path)
return cli
def test_crd_ops(setup_for_secrets, secrets_cli):
"""
Test that the basic Create, Retrieve, Delete operations work
"""
cli = secrets_cli
# Listing a totally empty database yields a 404 error, no secrets are there
with pytest.raises(HTTPError) as err404:
secrets = cli.list_secrets()
assert str(err404.value).startswith("404")
# Set some value, should succeed
cli.set_secret("foo", "bar")
fooval = cli.get_secret("foo")
assert fooval == "bar"
# Listing secrets should work now as well
secrets = cli.list_secrets()
assert len(secrets) == 1
assert "foo" in secrets
# Overwriting a secret is an error
with pytest.raises(HTTPError) as err409:
cli.set_secret("foo", "baz")
assert str(err409.value).startswith("409")
# Delete a secret
cli.del_secret("foo")
with pytest.raises(HTTPError) as err404:
fooval = cli.get_secret("foo")
assert str(err404.value).startswith("404")
# Delete a non-existent secret must yield a 404
with pytest.raises(HTTPError) as err404:
cli.del_secret("foo")
assert str(err404.value).startswith("404")
# Don't allow storing more secrets after reaching the max
# number of entries.
MAX_SECRETS = 10
sec_value = "value"
for x in xrange(MAX_SECRETS):
cli.set_secret(str(x), sec_value)
with pytest.raises(HTTPError) as err507:
cli.set_secret(str(MAX_SECRETS), sec_value)
assert str(err507.value).startswith("507")
def test_containers(setup_for_secrets, secrets_cli):
"""
Test that storing secrets inside containers works
"""
cli = secrets_cli
# No trailing slash, no game..
with pytest.raises(HTTPError) as err400:
cli.create_container("mycontainer")
assert str(err400.value).startswith("400")
cli.create_container("mycontainer/")
cli.set_secret("mycontainer/foo", "containedfooval")
assert cli.get_secret("mycontainer/foo") == "containedfooval"
# Removing a non-empty container should not succeed
with pytest.raises(HTTPError) as err409:
cli.del_secret("mycontainer/")
assert str(err409.value).startswith("409")
# Try removing the secret first, then the container
cli.del_secret("mycontainer/foo")
cli.del_secret("mycontainer/")
# Don't allow creating a container after reaching the max nested level
DEFAULT_CONTAINERS_NEST_LEVEL = 4
container = "mycontainer"
for x in xrange(DEFAULT_CONTAINERS_NEST_LEVEL):
container += "%s/" % str(x)
cli.create_container(container)
container += "%s/" % str(DEFAULT_CONTAINERS_NEST_LEVEL)
with pytest.raises(HTTPError) as err406:
cli.create_container(container)
assert str(err406.value).startswith("406")
|