mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
445ff39f94
* [WIP] become plugins Move from hardcoded method to plugins for ease of use, expansion and overrides - load into connection as it is going to be the main consumer - play_context will also use to keep backwards compat API - ensure shell is used to construct commands when needed - migrate settings remove from base config in favor of plugin specific configs - cleanup ansible-doc - add become plugin docs - remove deprecated sudo/su code and keywords - adjust become options for cli - set plugin options from context - ensure config defs are avaialbe before instance - refactored getting the shell plugin, fixed tests - changed into regex as they were string matching, which does not work with random string generation - explicitly set flags for play context tests - moved plugin loading up front - now loads for basedir also - allow pyc/o for non m modules - fixes to tests and some plugins - migrate to play objects fro play_context - simiplify gathering - added utf8 headers - moved option setting - add fail msg to dzdo - use tuple for multiple options on fail/missing - fix relative plugin paths - shift from play context to play - all tasks already inherit this from play directly - remove obsolete 'set play' - correct environment handling - add wrap_exe option to pfexec - fix runas to noop - fixed setting play context - added password configs - removed required false - remove from doc building till they are ready future development: - deal with 'enable' and 'runas' which are not 'command wrappers' but 'state flags' and currently hardcoded in diff subsystems * cleanup remove callers to removed func removed --sudo cli doc refs remove runas become_exe ensure keyerorr on plugin also fix backwards compat, missing method is attributeerror, not ansible error get remote_user consistently ignore missing system_tmpdirs on plugin load correct config precedence add deprecation fix networking imports backwards compat for plugins using BECOME_METHODS * Port become_plugins to context.CLIARGS This is a work in progress: * Stop passing options around everywhere as we can use context.CLIARGS instead * Refactor make_become_commands as asked for by alikins * Typo in comment fix * Stop loading values from the cli in more than one place Both play and play_context were saving default values from the cli arguments directly. This changes things so that the default values are loaded into the play and then play_context takes them from there. * Rename BECOME_PLUGIN_PATH to DEFAULT_BECOME_PLUGIN_PATH As alikins said, all other plugin paths are named DEFAULT_plugintype_PLUGIN_PATH. If we're going to rename these, that should be done all at one time rather than piecemeal. * One to throw away This is a set of hacks to get setting FieldAttribute defaults to command line args to work. It's not fully done yet. After talking it over with sivel and jimi-c this should be done by fixing FieldAttributeBase and _get_parent_attribute() calls to do the right thing when there is a non-None default. What we want to be able to do ideally is something like this: class Base(FieldAttributeBase): _check_mode = FieldAttribute([..] default=lambda: context.CLIARGS['check']) class Play(Base): # lambda so that we have a chance to parse the command line args # before we get here. In the future we might be able to restructure # this so that the cli parsing code runs before these classes are # defined. class Task(Base): pass And still have a playbook like this function: --- - hosts: tasks: - command: whoami check_mode: True (The check_mode test that is added as a separate commit in this PR will let you test variations on this case). There's a few separate reasons that the code doesn't let us do this or a non-ugly workaround for this as written right now. The fix that jimi-c, sivel, and I talked about may let us do this or it may still require a workaround (but less ugly) (having one class that has the FieldAttributes with default values and one class that inherits from that but just overrides the FieldAttributes which now have defaults) * Revert "One to throw away" This reverts commit 23aa883cbed11429ef1be2a2d0ed18f83a3b8064. * Set FieldAttr defaults directly from CLIARGS * Remove dead code * Move timeout directly to PlayContext, it's never needed on Play * just for backwards compat, add a static version of BECOME_METHODS to constants * Make the become attr on the connection public, since it's used outside of the connection * Logic fix * Nuke connection testing if it supports specific become methods * Remove unused vars * Address rebase issues * Fix path encoding issue * Remove unused import * Various cleanups * Restore network_cli check in _low_level_execute_command * type improvements for cliargs_deferred_get and swap shallowcopy to default to False * minor cleanups * Allow the su plugin to work, since it doesn't define a prompt the same way * Fix up ksu become plugin * Only set prompt if build_become_command was called * Add helper to assist connection plugins in knowing they need to wait for a prompt * Fix tests and code expectations * Doc updates * Various additional minor cleanups * Make doas functional * Don't change connection signature, load become plugin from TaskExecutor * Remove unused imports * Add comment about setting the become plugin on the playcontext * Fix up tests for recent changes * Support 'Password:' natively for the doas plugin * Make default prompts raw * wording cleanups. ci_complete * Remove unrelated changes * Address spelling mistake * Restore removed test, and udpate to use new functionality * Add changelog fragment * Don't hard fail in set_attributes_from_cli on missing CLI keys * Remove unrelated change to loader * Remove internal deprecated FieldAttributes now * Emit deprecation warnings now
263 lines
12 KiB
Python
263 lines
12 KiB
Python
# (c) 2015, Toshio Kuratomi <tkuratomi@ansible.com>
|
|
#
|
|
# This file is part of Ansible
|
|
#
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
# Make coding more python3-ish
|
|
from __future__ import (absolute_import, division, print_function)
|
|
__metaclass__ = type
|
|
|
|
from io import StringIO
|
|
import sys
|
|
import pytest
|
|
|
|
from units.compat import mock
|
|
from units.compat import unittest
|
|
from units.compat.mock import MagicMock
|
|
from units.compat.mock import patch
|
|
from ansible.errors import AnsibleError
|
|
from ansible.playbook.play_context import PlayContext
|
|
from ansible.plugins.connection import ConnectionBase
|
|
from ansible.plugins.loader import become_loader
|
|
# from ansible.plugins.connection.accelerate import Connection as AccelerateConnection
|
|
# from ansible.plugins.connection.chroot import Connection as ChrootConnection
|
|
# from ansible.plugins.connection.funcd import Connection as FuncdConnection
|
|
# from ansible.plugins.connection.jail import Connection as JailConnection
|
|
# from ansible.plugins.connection.libvirt_lxc import Connection as LibvirtLXCConnection
|
|
from ansible.plugins.connection.lxc import Connection as LxcConnection
|
|
from ansible.plugins.connection.local import Connection as LocalConnection
|
|
from ansible.plugins.connection.paramiko_ssh import Connection as ParamikoConnection
|
|
from ansible.plugins.connection.ssh import Connection as SSHConnection
|
|
from ansible.plugins.connection.docker import Connection as DockerConnection
|
|
# from ansible.plugins.connection.winrm import Connection as WinRmConnection
|
|
from ansible.plugins.connection.network_cli import Connection as NetworkCliConnection
|
|
from ansible.plugins.connection.httpapi import Connection as HttpapiConnection
|
|
|
|
pytest.importorskip("ncclient")
|
|
|
|
PY3 = sys.version_info[0] == 3
|
|
builtin_import = __import__
|
|
|
|
mock_ncclient = MagicMock(name='ncclient')
|
|
|
|
|
|
def import_mock(name, *args):
|
|
if name.startswith('ncclient'):
|
|
return mock_ncclient
|
|
return builtin_import(name, *args)
|
|
|
|
|
|
if PY3:
|
|
with patch('builtins.__import__', side_effect=import_mock):
|
|
from ansible.plugins.connection.netconf import Connection as NetconfConnection
|
|
else:
|
|
with patch('__builtin__.__import__', side_effect=import_mock):
|
|
from ansible.plugins.connection.netconf import Connection as NetconfConnection
|
|
|
|
|
|
class TestConnectionBaseClass(unittest.TestCase):
|
|
|
|
def setUp(self):
|
|
self.play_context = PlayContext()
|
|
self.play_context.prompt = (
|
|
'[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: '
|
|
)
|
|
self.in_stream = StringIO()
|
|
|
|
def tearDown(self):
|
|
pass
|
|
|
|
def test_subclass_error(self):
|
|
class ConnectionModule1(ConnectionBase):
|
|
pass
|
|
with self.assertRaises(TypeError):
|
|
ConnectionModule1() # pylint: disable=abstract-class-instantiated
|
|
|
|
class ConnectionModule2(ConnectionBase):
|
|
def get(self, key):
|
|
super(ConnectionModule2, self).get(key)
|
|
|
|
with self.assertRaises(TypeError):
|
|
ConnectionModule2() # pylint: disable=abstract-class-instantiated
|
|
|
|
def test_subclass_success(self):
|
|
class ConnectionModule3(ConnectionBase):
|
|
|
|
@property
|
|
def transport(self):
|
|
pass
|
|
|
|
def _connect(self):
|
|
pass
|
|
|
|
def exec_command(self):
|
|
pass
|
|
|
|
def put_file(self):
|
|
pass
|
|
|
|
def fetch_file(self):
|
|
pass
|
|
|
|
def close(self):
|
|
pass
|
|
|
|
self.assertIsInstance(ConnectionModule3(self.play_context, self.in_stream), ConnectionModule3)
|
|
|
|
# def test_accelerate_connection_module(self):
|
|
# self.assertIsInstance(AccelerateConnection(), AccelerateConnection)
|
|
#
|
|
# def test_chroot_connection_module(self):
|
|
# self.assertIsInstance(ChrootConnection(), ChrootConnection)
|
|
#
|
|
# def test_funcd_connection_module(self):
|
|
# self.assertIsInstance(FuncdConnection(), FuncdConnection)
|
|
#
|
|
# def test_jail_connection_module(self):
|
|
# self.assertIsInstance(JailConnection(), JailConnection)
|
|
#
|
|
# def test_libvirt_lxc_connection_module(self):
|
|
# self.assertIsInstance(LibvirtLXCConnection(), LibvirtLXCConnection)
|
|
|
|
def test_lxc_connection_module(self):
|
|
self.assertIsInstance(LxcConnection(self.play_context, self.in_stream), LxcConnection)
|
|
|
|
def test_local_connection_module(self):
|
|
self.assertIsInstance(LocalConnection(self.play_context, self.in_stream), LocalConnection)
|
|
|
|
def test_paramiko_connection_module(self):
|
|
self.assertIsInstance(ParamikoConnection(self.play_context, self.in_stream), ParamikoConnection)
|
|
|
|
def test_ssh_connection_module(self):
|
|
self.assertIsInstance(SSHConnection(self.play_context, self.in_stream), SSHConnection)
|
|
|
|
@mock.patch('ansible.plugins.connection.docker.Connection._old_docker_version', return_value=('false', 'garbage', '', 1))
|
|
@mock.patch('ansible.plugins.connection.docker.Connection._new_docker_version', return_value=('docker version', '1.2.3', '', 0))
|
|
def test_docker_connection_module_too_old(self, mock_new_docker_verison, mock_old_docker_version):
|
|
self.assertRaisesRegexp(AnsibleError, '^docker connection type requires docker 1.3 or higher$',
|
|
DockerConnection, self.play_context, self.in_stream, docker_command='/fake/docker')
|
|
|
|
@mock.patch('ansible.plugins.connection.docker.Connection._old_docker_version', return_value=('false', 'garbage', '', 1))
|
|
@mock.patch('ansible.plugins.connection.docker.Connection._new_docker_version', return_value=('docker version', '1.3.4', '', 0))
|
|
def test_docker_connection_module(self, mock_new_docker_verison, mock_old_docker_version):
|
|
self.assertIsInstance(DockerConnection(self.play_context, self.in_stream, docker_command='/fake/docker'),
|
|
DockerConnection)
|
|
|
|
# old version and new version fail
|
|
@mock.patch('ansible.plugins.connection.docker.Connection._old_docker_version', return_value=('false', 'garbage', '', 1))
|
|
@mock.patch('ansible.plugins.connection.docker.Connection._new_docker_version', return_value=('false', 'garbage', '', 1))
|
|
def test_docker_connection_module_wrong_cmd(self, mock_new_docker_version, mock_old_docker_version):
|
|
self.assertRaisesRegexp(AnsibleError, '^Docker version check (.*?) failed: ',
|
|
DockerConnection, self.play_context, self.in_stream, docker_command='/fake/docker')
|
|
|
|
# def test_winrm_connection_module(self):
|
|
# self.assertIsInstance(WinRmConnection(), WinRmConnection)
|
|
|
|
def test_network_cli_connection_module(self):
|
|
self.play_context.network_os = 'eos'
|
|
self.assertIsInstance(NetworkCliConnection(self.play_context, self.in_stream), NetworkCliConnection)
|
|
|
|
def test_netconf_connection_module(self):
|
|
self.assertIsInstance(NetconfConnection(self.play_context, self.in_stream), NetconfConnection)
|
|
|
|
def test_httpapi_connection_module(self):
|
|
self.play_context.network_os = 'eos'
|
|
self.assertIsInstance(HttpapiConnection(self.play_context, self.in_stream), HttpapiConnection)
|
|
|
|
def test_check_password_prompt(self):
|
|
local = (
|
|
b'[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: \n'
|
|
b'BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq\n'
|
|
)
|
|
|
|
ssh_pipelining_vvvv = b'''
|
|
debug3: mux_master_read_cb: channel 1 packet type 0x10000002 len 251
|
|
debug2: process_mux_new_session: channel 1: request tty 0, X 1, agent 1, subsys 0, term "xterm-256color", cmd "/bin/sh -c 'sudo -H -S -p "[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: " -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq; /bin/true'"'"' && sleep 0'", env 0
|
|
debug3: process_mux_new_session: got fds stdin 9, stdout 10, stderr 11
|
|
debug2: client_session2_setup: id 2
|
|
debug1: Sending command: /bin/sh -c 'sudo -H -S -p "[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: " -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq; /bin/true'"'"' && sleep 0'
|
|
debug2: channel 2: request exec confirm 1
|
|
debug2: channel 2: rcvd ext data 67
|
|
[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: debug2: channel 2: written 67 to efd 11
|
|
BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq
|
|
debug3: receive packet: type 98
|
|
''' # noqa
|
|
|
|
ssh_nopipelining_vvvv = b'''
|
|
debug3: mux_master_read_cb: channel 1 packet type 0x10000002 len 251
|
|
debug2: process_mux_new_session: channel 1: request tty 1, X 1, agent 1, subsys 0, term "xterm-256color", cmd "/bin/sh -c 'sudo -H -S -p "[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: " -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq; /bin/true'"'"' && sleep 0'", env 0
|
|
debug3: mux_client_request_session: session request sent
|
|
debug3: send packet: type 98
|
|
debug1: Sending command: /bin/sh -c 'sudo -H -S -p "[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: " -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq; /bin/true'"'"' && sleep 0'
|
|
debug2: channel 2: request exec confirm 1
|
|
debug2: exec request accepted on channel 2
|
|
[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: debug3: receive packet: type 2
|
|
debug3: Received SSH2_MSG_IGNORE
|
|
debug3: Received SSH2_MSG_IGNORE
|
|
|
|
BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq
|
|
debug3: receive packet: type 98
|
|
''' # noqa
|
|
|
|
ssh_novvvv = (
|
|
b'[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: \n'
|
|
b'BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq\n'
|
|
)
|
|
|
|
dns_issue = (
|
|
b'timeout waiting for privilege escalation password prompt:\n'
|
|
b'sudo: sudo: unable to resolve host tcloud014\n'
|
|
b'[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: \n'
|
|
b'BECOME-SUCCESS-ouzmdnewuhucvuaabtjmweasarviygqq\n'
|
|
)
|
|
|
|
nothing = b''
|
|
|
|
in_front = b'''
|
|
debug1: Sending command: /bin/sh -c 'sudo -H -S -p "[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: " -u root /bin/sh -c '"'"'echo
|
|
'''
|
|
|
|
class ConnectionFoo(ConnectionBase):
|
|
|
|
@property
|
|
def transport(self):
|
|
pass
|
|
|
|
def _connect(self):
|
|
pass
|
|
|
|
def exec_command(self):
|
|
pass
|
|
|
|
def put_file(self):
|
|
pass
|
|
|
|
def fetch_file(self):
|
|
pass
|
|
|
|
def close(self):
|
|
pass
|
|
|
|
c = ConnectionFoo(self.play_context, self.in_stream)
|
|
c.set_become_plugin(become_loader.get('sudo'))
|
|
c.become.prompt = '[sudo via ansible, key=ouzmdnewuhucvuaabtjmweasarviygqq] password: '
|
|
|
|
self.assertTrue(c.check_password_prompt(local))
|
|
self.assertTrue(c.check_password_prompt(ssh_pipelining_vvvv))
|
|
self.assertTrue(c.check_password_prompt(ssh_nopipelining_vvvv))
|
|
self.assertTrue(c.check_password_prompt(ssh_novvvv))
|
|
self.assertTrue(c.check_password_prompt(dns_issue))
|
|
self.assertFalse(c.check_password_prompt(nothing))
|
|
self.assertFalse(c.check_password_prompt(in_front))
|