Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
A
ansible
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
OpenEdx
ansible
Commits
d293a469
Commit
d293a469
authored
10 years ago
by
Toshio Kuratomi
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Unittests to detect speed regressions in password obfuscation and that
the passwords are correctly hidden in the output.
parent
1afc8161
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
145 additions
and
0 deletions
+145
-0
test/units/TestModuleUtilsBasic.py
+145
-0
No files found.
test/units/TestModuleUtilsBasic.py
View file @
d293a469
...
...
@@ -3,6 +3,7 @@ import tempfile
import
unittest
from
nose.tools
import
raises
from
nose.tools
import
timed
from
ansible
import
errors
from
ansible.module_common
import
ModuleReplacer
...
...
@@ -159,3 +160,147 @@ class TestModuleUtilsBasic(unittest.TestCase):
self
.
cleanup_temp_dir
(
tmp_path
)
class
TestModuleUtilsBasicHelpers
(
unittest
.
TestCase
):
''' Test some implementation details of AnsibleModule
Some pieces of AnsibleModule are implementation details but they have
potential cornercases that we need to check. Go ahead and test at
this level that the functions are behaving even though their API may
change and we'd have to rewrite these tests so that we know that we
need to check for those problems in any rewrite.
In the future we might want to restructure higher level code to be
friendlier to unittests so that we can test at the level that the public
is interacting with the APIs.
'''
MANY_RECORDS
=
7000
URL_SECRET
=
'http://username:pas:word@foo.com/data'
SSH_SECRET
=
'username:pas:word@foo.com/data'
def
cleanup_temp_file
(
self
,
fd
,
path
):
try
:
os
.
close
(
fd
)
os
.
remove
(
path
)
except
:
pass
def
cleanup_temp_dir
(
self
,
path
):
try
:
os
.
rmdir
(
path
)
except
:
pass
def
_gen_data
(
self
,
records
,
per_rec
,
top_level
,
secret_text
):
hostvars
=
{
'hostvars'
:
{}}
for
i
in
range
(
1
,
records
,
1
):
host_facts
=
{
'host
%
s'
%
i
:
{
'pstack'
:
{
'running'
:
'875.1'
,
'symlinked'
:
'880.0'
,
'tars'
:
[],
'versions'
:
[
'885.0'
]},
}}
if
per_rec
:
host_facts
[
'host
%
s'
%
i
][
'secret'
]
=
secret_text
hostvars
[
'hostvars'
]
.
update
(
host_facts
)
if
top_level
:
hostvars
[
'secret'
]
=
secret_text
return
hostvars
def
setUp
(
self
):
self
.
many_url
=
repr
(
self
.
_gen_data
(
self
.
MANY_RECORDS
,
True
,
True
,
self
.
URL_SECRET
))
self
.
many_ssh
=
repr
(
self
.
_gen_data
(
self
.
MANY_RECORDS
,
True
,
True
,
self
.
SSH_SECRET
))
self
.
one_url
=
repr
(
self
.
_gen_data
(
self
.
MANY_RECORDS
,
False
,
True
,
self
.
URL_SECRET
))
self
.
one_ssh
=
repr
(
self
.
_gen_data
(
self
.
MANY_RECORDS
,
False
,
True
,
self
.
SSH_SECRET
))
self
.
zero_secrets
=
repr
(
self
.
_gen_data
(
self
.
MANY_RECORDS
,
False
,
False
,
''
))
self
.
few_url
=
repr
(
self
.
_gen_data
(
2
,
True
,
True
,
self
.
URL_SECRET
))
self
.
few_ssh
=
repr
(
self
.
_gen_data
(
2
,
True
,
True
,
self
.
SSH_SECRET
))
# create a temporary file for the test module
# we're about to generate
self
.
tmp_fd
,
self
.
tmp_path
=
tempfile
.
mkstemp
()
os
.
write
(
self
.
tmp_fd
,
TEST_MODULE_DATA
)
# template the module code and eval it
module_data
,
module_style
,
shebang
=
ModuleReplacer
()
.
modify_module
(
self
.
tmp_path
,
{},
""
,
{})
d
=
{}
exec
(
module_data
,
d
,
d
)
self
.
module
=
d
[
'get_module'
]()
# module_utils/basic.py screws with CWD, let's save it and reset
self
.
cwd
=
os
.
getcwd
()
def
tearDown
(
self
):
self
.
cleanup_temp_file
(
self
.
tmp_fd
,
self
.
tmp_path
)
# Reset CWD back to what it was before basic.py changed it
os
.
chdir
(
self
.
cwd
)
#################################################################################
#
# Several speed tests -- previously, the obfuscation of passwords carried
# an unreasonable speed penalty for some module parameters. We want to be
# sure we don't regress to that state.
#
@timed
(
5
)
def
test_log_sanitize_speed_many_url
(
self
):
self
.
module
.
_heuristic_log_sanitize
(
self
.
many_url
)
@timed
(
5
)
def
test_log_sanitize_speed_many_ssh
(
self
):
self
.
module
.
_heuristic_log_sanitize
(
self
.
many_ssh
)
@timed
(
5
)
def
test_log_sanitize_speed_one_url
(
self
):
self
.
module
.
_heuristic_log_sanitize
(
self
.
one_url
)
@timed
(
5
)
def
test_log_sanitize_speed_one_ssh
(
self
):
self
.
module
.
_heuristic_log_sanitize
(
self
.
one_ssh
)
@timed
(
5
)
def
test_log_sanitize_speed_zero_secrets
(
self
):
self
.
module
.
_heuristic_log_sanitize
(
self
.
zero_secrets
)
#
# Test that the password obfuscation sanitizes somewhat cleanly.
#
def
test_log_sanitize_correctness
(
self
):
url_data
=
repr
(
self
.
_gen_data
(
3
,
True
,
True
,
self
.
URL_SECRET
))
ssh_data
=
repr
(
self
.
_gen_data
(
3
,
True
,
True
,
self
.
SSH_SECRET
))
url_output
=
self
.
module
.
_heuristic_log_sanitize
(
url_data
)
ssh_output
=
self
.
module
.
_heuristic_log_sanitize
(
ssh_data
)
# Basic functionality: Successfully hid the password
self
.
assertNotIn
(
'pas:word'
,
url_output
)
self
.
assertNotIn
(
'pas:word'
,
ssh_output
)
# Slightly more advanced, we hid all of the password despite the ":"
self
.
assertNotIn
(
'pas'
,
url_output
)
self
.
assertNotIn
(
'pas'
,
ssh_output
)
# In this implementation we replace the password with 8 "*" which is
# also the length of our password. The url fields should be able to
# accurately detect where the password ends so the length should be
# the same:
self
.
assertEqual
(
len
(
url_output
),
len
(
url_data
))
# ssh checking is somewhat harder as the heuristic is overzealous in
# most cases. Since the input will have at least one ":" present
# before the password we can tell some things about the beginning and
# end of the data, though:
self
.
assertTrue
(
ssh_output
.
startswith
(
"{'"
))
self
.
assertTrue
(
ssh_output
.
endswith
(
"'}}}}"
))
self
.
assertIn
(
":********@foo.com/data',"
,
ssh_output
)
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment