mirror of
https://github.com/freedombox/FreedomBox.git
synced 2026-02-18 08:33:41 +00:00
Any privileged action (a method) can be marked as such with the new decorator. A call to the method will be serialized into a sudo call (or later into a D-Bus call). The method arguments are turned to JSON and method is called as superuser. Arguments are de-serialized and are verified for type before the actual call as superuser. Return values are serialized and returned where they are de-serialized. Exceptions are also serialized and de-serialized. The method must have be strictly typed and should not have keyword-only arguments. Currently supported types are int, float, str, dict/Dict, list/List and Optional. Signed-off-by: Sunil Mohan Adapa <sunil@medhas.org> Reviewed-by: James Valleroy <jvalleroy@mailbox.org>
290 lines
8.4 KiB
Python
290 lines
8.4 KiB
Python
# SPDX-License-Identifier: AGPL-3.0-or-later
|
|
"""
|
|
Test module for actions utilities that modify configuration.
|
|
|
|
Verify that privileged actions perform as expected. See actions.py for a full
|
|
description of the expectations.
|
|
|
|
"""
|
|
|
|
import json
|
|
import os
|
|
import pathlib
|
|
import shutil
|
|
import tempfile
|
|
from unittest.mock import call, patch
|
|
|
|
import apt_pkg
|
|
import pytest
|
|
|
|
from plinth import cfg
|
|
from plinth.actions import _log_command as log_command
|
|
from plinth.actions import privileged, run, superuser_run
|
|
from plinth.errors import ActionError
|
|
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def actions_test_setup(load_cfg):
|
|
"""Setup a temporary directory for testing actions.
|
|
|
|
Copy system commands ``echo`` and ``id`` into actions directory during
|
|
testing.
|
|
|
|
"""
|
|
with tempfile.TemporaryDirectory() as tmp_directory:
|
|
old_actions_dir = cfg.actions_dir
|
|
cfg.actions_dir = str(tmp_directory)
|
|
|
|
actions_dir = pathlib.Path(__file__).parent / '../../actions'
|
|
shutil.copy(str(actions_dir / 'packages'), str(tmp_directory))
|
|
shutil.copy(str(actions_dir / 'test_path'), str(tmp_directory))
|
|
shutil.copy('/bin/echo', str(tmp_directory))
|
|
shutil.copy('/usr/bin/id', str(tmp_directory))
|
|
|
|
yield
|
|
cfg.actions_dir = old_actions_dir
|
|
|
|
|
|
def notest_run_as_root():
|
|
"""1. Privileged actions run as root. """
|
|
assert superuser_run('id', ['-ur'])[0].strip() == '0' # user 0 is root
|
|
|
|
|
|
def test_breakout_actions_dir():
|
|
"""2. The actions directory can't be changed at run time.
|
|
|
|
Can't currently be tested, as the actions directory is hardcoded.
|
|
"""
|
|
|
|
|
|
def test_breakout_up():
|
|
"""3A. Users can't call actions above the actions directory.
|
|
|
|
Tests both a relative and a literal path.
|
|
"""
|
|
for action in ('../echo', '/bin/echo'):
|
|
with pytest.raises(ValueError):
|
|
run(action, ['hi'])
|
|
|
|
|
|
def test_breakout_down():
|
|
"""3B. Users can't call actions beneath the actions directory."""
|
|
action = 'directory/echo'
|
|
with pytest.raises(ValueError):
|
|
superuser_run(action)
|
|
|
|
|
|
def test_breakout_actions():
|
|
"""3C. Actions can't be used to run other actions.
|
|
|
|
If multiple actions are specified, bail out.
|
|
"""
|
|
# Counting is safer than actual badness.
|
|
actions = ('echo ""; echo $((1+1))', 'echo "" && echo $((1+1))',
|
|
'echo "" || echo $((1+1))')
|
|
options = ('good', '')
|
|
|
|
for action in actions:
|
|
for option in options:
|
|
with pytest.raises(ValueError):
|
|
run(action, [option])
|
|
|
|
|
|
def test_breakout_option_string():
|
|
"""3D. Option strings can't be used to run other actions.
|
|
|
|
Verify that shell control characters aren't interpreted.
|
|
"""
|
|
options = ('; echo hello', '&& echo hello', '|| echo hello',
|
|
'& echo hello', r'\; echo hello', '| echo hello',
|
|
r':;!&\/$%@`"~#*(){}[]|+=')
|
|
for option in options:
|
|
output = run('echo', [option])
|
|
output = output.rstrip('\n')
|
|
assert option == output
|
|
|
|
|
|
def test_breakout_option_list():
|
|
"""3D. Option lists can't be used to run other actions.
|
|
|
|
Verify that shell control characters aren't interpreted in
|
|
option lists.
|
|
"""
|
|
option_lists = (
|
|
(';', 'echo', 'hello'),
|
|
('&&', 'echo', 'hello'),
|
|
('||', 'echo', 'hello'),
|
|
('&', 'echo', 'hello'),
|
|
(r'\;', 'echo'
|
|
'hello'),
|
|
('|', 'echo', 'hello'),
|
|
('', 'echo', '', 'hello'), # Empty option argument
|
|
tuple(r':;!&\/$%@`"~#*(){}[]|+='))
|
|
for options in option_lists:
|
|
output = run('echo', options)
|
|
output = output.rstrip('\n')
|
|
expected_output = ' '.join(options)
|
|
assert output == expected_output
|
|
|
|
|
|
def test_multiple_options_and_output():
|
|
"""4. Multiple options can be provided as a list or as a tuple.
|
|
|
|
5. Output is returned from the command.
|
|
"""
|
|
options = '1 2 3 4 5 6 7 8 9'
|
|
|
|
output = run('echo', options.split())
|
|
output = output.rstrip('\n')
|
|
assert options == output
|
|
|
|
output = run('echo', tuple(options.split()))
|
|
output = output.rstrip('\n')
|
|
assert options == output
|
|
|
|
|
|
@pytest.mark.usefixtures('needs_root')
|
|
def test_is_package_manager_busy():
|
|
"""Test the behavior of `is-package-manager-busy` in both locked and
|
|
unlocked states of the dpkg lock file."""
|
|
|
|
apt_pkg.init() # initialize apt_pkg module
|
|
|
|
# In the locked state, the lsof command returns 0.
|
|
# Hence no error is thrown.
|
|
with apt_pkg.SystemLock():
|
|
superuser_run('packages', ['is-package-manager-busy'])
|
|
|
|
# In the unlocked state, the lsof command returns 1.
|
|
# An ActionError is raised in this case.
|
|
with pytest.raises(ActionError):
|
|
superuser_run('packages', ['is-package-manager-busy'])
|
|
|
|
|
|
@pytest.mark.usefixtures('develop_mode', 'needs_root')
|
|
def test_action_path(monkeypatch):
|
|
"""Test that in development mode, python action scripts get the
|
|
correct PYTHONPATH"""
|
|
monkeypatch.setitem(os.environ, 'PYTHONPATH', '')
|
|
plinth_path = run('test_path').strip()
|
|
su_plinth_path = superuser_run('test_path').strip()
|
|
assert plinth_path.startswith(cfg.file_root)
|
|
assert plinth_path == su_plinth_path
|
|
|
|
|
|
@patch('plinth.actions.logger.info')
|
|
@pytest.mark.parametrize('cmd,message', [
|
|
[['ls'], '$ ls'],
|
|
[['/bin/ls'], '$ ls'],
|
|
[['ls', 'a', 'b', 'c'], '$ ls a b c'],
|
|
[['ls', 'a b c'], "$ ls 'a b c'"],
|
|
[['ls', 'a;'], "$ ls 'a;'"],
|
|
[['sudo', 'ls'], '# ls'],
|
|
[['sudo', '-n', 'ls'], '# ls'],
|
|
[['sudo', '-u', 'tester', 'ls'], 'tester$ ls'],
|
|
[['sudo', 'key1=value1', 'key2=value2', 'ls'], '# ls'],
|
|
[[
|
|
'sudo', '-n', 'PYTHONPATH=/vagrant', '/vagrant/actions/ejabberd',
|
|
'add-domain', '--domainname', 'freedombox.local'
|
|
], '# ejabberd add-domain --domainname freedombox.local'],
|
|
])
|
|
def test_log_command(logger, cmd, message):
|
|
"""Test log messages for various action calls."""
|
|
log_command(cmd)
|
|
logger.assert_called_once()
|
|
args = logger.call_args[0]
|
|
assert message == args[0] % args[1:]
|
|
|
|
|
|
def test_privileged_properties():
|
|
"""Test that privileged decorator sets proper properties on the method."""
|
|
|
|
def func():
|
|
return
|
|
|
|
wrapped_func = privileged(func)
|
|
assert wrapped_func._privileged
|
|
assert wrapped_func.__wrapped__ == func
|
|
|
|
|
|
def test_privileged_argument_vararg_check():
|
|
"""Test that privileged decorator checks for simple arguments."""
|
|
|
|
def func_with_varargs(*_args):
|
|
return
|
|
|
|
def func_with_kwargs(**_kwargs):
|
|
return
|
|
|
|
def func_with_kwonlyargs(*_args, _kwarg):
|
|
return
|
|
|
|
def func_with_kwonlydefaults(*_args, _kwargs='foo'):
|
|
return
|
|
|
|
for func in (func_with_varargs, func_with_kwargs, func_with_kwonlyargs,
|
|
func_with_kwonlydefaults):
|
|
with pytest.raises(SyntaxError):
|
|
privileged(func)
|
|
|
|
|
|
def test_privileged_argument_annotation_check():
|
|
"""Test that privileged decorator checks for annotations to arguments."""
|
|
|
|
def func1(_a):
|
|
return
|
|
|
|
def func2(_a: int, _b):
|
|
return
|
|
|
|
def func_valid(_a: int, _b: dict[int, str]):
|
|
return
|
|
|
|
for func in (func1, func2):
|
|
with pytest.raises(SyntaxError):
|
|
privileged(func)
|
|
|
|
privileged(func_valid)
|
|
|
|
|
|
@patch('plinth.actions.superuser_run')
|
|
def test_privileged_method_call(superuser_run_):
|
|
"""Test that privileged method calls the superuser action properly."""
|
|
|
|
def func_with_args(_a: int, _b: str, _c: int = 1, _d: str = 'dval',
|
|
_e: str = 'eval'):
|
|
return
|
|
|
|
superuser_run_.return_value = json.dumps({
|
|
'result': 'success',
|
|
'return': 'bar'
|
|
})
|
|
wrapped_func = privileged(func_with_args)
|
|
return_value = wrapped_func(1, 'bval', None, _d='dnewval')
|
|
assert return_value == 'bar'
|
|
|
|
input_ = {'args': [1, 'bval', None], 'kwargs': {'_d': 'dnewval'}}
|
|
input_ = json.dumps(input_)
|
|
superuser_run_.assert_has_calls(
|
|
[call('actions', ['tests', 'func_with_args'], input=input_.encode())])
|
|
|
|
|
|
@patch('plinth.actions.superuser_run')
|
|
def test_privileged_method_exceptions(superuser_run_):
|
|
"""Test that exceptions on privileged methods are return properly."""
|
|
|
|
def func_with_exception():
|
|
raise TypeError('type error')
|
|
|
|
superuser_run_.return_value = json.dumps({
|
|
'result': 'exception',
|
|
'exception': {
|
|
'module': 'builtins',
|
|
'name': 'TypeError',
|
|
'args': ['type error']
|
|
}
|
|
})
|
|
wrapped_func = privileged(func_with_exception)
|
|
with pytest.raises(TypeError, match='type error'):
|
|
wrapped_func()
|