cmdctl_test.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493
  1. # Copyright (C) 2009 Internet Systems Consortium.
  2. #
  3. # Permission to use, copy, modify, and distribute this software for any
  4. # purpose with or without fee is hereby granted, provided that the above
  5. # copyright notice and this permission notice appear in all copies.
  6. #
  7. # THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SYSTEMS CONSORTIUM
  8. # DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
  9. # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
  10. # INTERNET SYSTEMS CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
  11. # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
  12. # FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
  13. # NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
  14. # WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  15. import unittest
  16. import socket
  17. import tempfile
  18. import sys
  19. from cmdctl import *
  20. import isc.log
  21. SPEC_FILE_PATH = '..' + os.sep
  22. if 'CMDCTL_SPEC_PATH' in os.environ:
  23. SPEC_FILE_PATH = os.environ['CMDCTL_SPEC_PATH'] + os.sep
  24. SRC_FILE_PATH = '..' + os.sep
  25. if 'CMDCTL_SRC_PATH' in os.environ:
  26. SRC_FILE_PATH = os.environ['CMDCTL_SRC_PATH'] + os.sep
  27. # Rewrite the class for unittest.
  28. class MySecureHTTPRequestHandler(SecureHTTPRequestHandler):
  29. def __init__(self):
  30. pass
  31. def send_response(self, rcode):
  32. self.rcode = rcode
  33. def end_headers(self):
  34. pass
  35. def do_GET(self):
  36. self.wfile = open('tmp.file', 'wb')
  37. super().do_GET()
  38. self.wfile.close()
  39. os.remove('tmp.file')
  40. def do_POST(self):
  41. self.wfile = open("tmp.file", 'wb')
  42. super().do_POST()
  43. self.wfile.close()
  44. os.remove('tmp.file')
  45. class FakeSecureHTTPServer(SecureHTTPServer):
  46. def __init__(self):
  47. self.user_sessions = {}
  48. self.cmdctl = FakeCommandControlForTestRequestHandler()
  49. self._verbose = True
  50. self._user_infos = {}
  51. self.idle_timeout = 1200
  52. self._lock = threading.Lock()
  53. class FakeCommandControlForTestRequestHandler(CommandControl):
  54. def __init__(self):
  55. self._config_data = {}
  56. self.modules_spec = {}
  57. self._lock = threading.Lock()
  58. def send_command(self, mod, cmd, param):
  59. return 0, {}
  60. class TestSecureHTTPRequestHandler(unittest.TestCase):
  61. def setUp(self):
  62. self.old_stdout = sys.stdout
  63. sys.stdout = open(os.devnull, 'w')
  64. self.handler = MySecureHTTPRequestHandler()
  65. self.handler.server = FakeSecureHTTPServer()
  66. self.handler.server.user_sessions = {}
  67. self.handler.server._user_infos = {}
  68. self.handler.headers = {}
  69. self.handler.rfile = open("check.tmp", 'w+b')
  70. def tearDown(self):
  71. sys.stdout.close()
  72. sys.stdout = self.old_stdout
  73. self.handler.rfile.close()
  74. os.remove('check.tmp')
  75. def test_parse_request_path(self):
  76. self.handler.path = ''
  77. mod, cmd = self.handler._parse_request_path()
  78. self.assertTrue((mod == None) and (cmd == None))
  79. self.handler.path = '/abc'
  80. mod, cmd = self.handler._parse_request_path()
  81. self.assertTrue((mod == 'abc') and (cmd == None))
  82. self.handler.path = '/abc/edf'
  83. mod, cmd = self.handler._parse_request_path()
  84. self.assertTrue((mod == 'abc') and (cmd == 'edf'))
  85. self.handler.path = '/abc/edf/ghi'
  86. mod, cmd = self.handler._parse_request_path()
  87. self.assertTrue((mod == 'abc') and (cmd == 'edf'))
  88. def test_parse_request_path_1(self):
  89. self.handler.path = '/ab*c'
  90. mod, cmd = self.handler._parse_request_path()
  91. self.assertTrue((mod == 'ab') and cmd == None)
  92. self.handler.path = '/abc/ed*fdd/ddd'
  93. mod, cmd = self.handler._parse_request_path()
  94. self.assertTrue((mod == 'abc') and cmd == 'ed')
  95. self.handler.path = '/-*/edfdd/ddd'
  96. mod, cmd = self.handler._parse_request_path()
  97. self.assertTrue((mod == None) and (cmd == None))
  98. self.handler.path = '/-*/edfdd/ddd'
  99. mod, cmd = self.handler._parse_request_path()
  100. self.assertTrue((mod == None) and (cmd == None))
  101. def test_do_GET(self):
  102. self.handler.do_GET()
  103. self.assertEqual(self.handler.rcode, http.client.BAD_REQUEST)
  104. def test_do_GET_1(self):
  105. self.handler.headers['cookie'] = 12345
  106. self.handler.do_GET()
  107. self.assertEqual(self.handler.rcode, http.client.UNAUTHORIZED)
  108. def test_do_GET_2(self):
  109. self.handler.headers['cookie'] = 12345
  110. self.handler.server.user_sessions[12345] = time.time() + 1000000
  111. self.handler.path = '/how/are'
  112. self.handler.do_GET()
  113. self.assertEqual(self.handler.rcode, http.client.NO_CONTENT)
  114. def test_do_GET_3(self):
  115. self.handler.headers['cookie'] = 12346
  116. self.handler.server.user_sessions[12346] = time.time() + 1000000
  117. path_vec = ['config_data', 'module_spec']
  118. for path in path_vec:
  119. self.handler.path = '/' + path
  120. self.handler.do_GET()
  121. self.assertEqual(self.handler.rcode, http.client.OK)
  122. def test_user_logged_in(self):
  123. self.handler.server.user_sessions = {}
  124. self.handler.session_id = 12345
  125. self.assertTrue(self.handler._is_user_logged_in() == False)
  126. self.handler.server.user_sessions[12345] = time.time()
  127. self.assertTrue(self.handler._is_user_logged_in())
  128. self.handler.server.user_sessions[12345] = time.time() - 1500
  129. self.handler.idle_timeout = 1200
  130. self.assertTrue(self.handler._is_user_logged_in() == False)
  131. def test_check_user_name_and_pwd(self):
  132. self.handler.headers = {}
  133. ret, msg = self.handler._check_user_name_and_pwd()
  134. self.assertFalse(ret)
  135. self.assertEqual(msg, ['invalid username or password'])
  136. def test_check_user_name_and_pwd_1(self):
  137. user_info = {'username':'root', 'password':'abc123'}
  138. len = self.handler.rfile.write(json.dumps(user_info).encode())
  139. self.handler.headers['Content-Length'] = len
  140. self.handler.rfile.seek(0, 0)
  141. self.handler.server._user_infos['root'] = ['aa', 'aaa']
  142. ret, msg = self.handler._check_user_name_and_pwd()
  143. self.assertFalse(ret)
  144. self.assertEqual(msg, ['username or password error'])
  145. def test_check_user_name_and_pwd_2(self):
  146. user_info = {'username':'root', 'password':'abc123'}
  147. len = self.handler.rfile.write(json.dumps(user_info).encode())
  148. self.handler.headers['Content-Length'] = len - 1
  149. self.handler.rfile.seek(0, 0)
  150. ret, msg = self.handler._check_user_name_and_pwd()
  151. self.assertFalse(ret)
  152. self.assertEqual(msg, ['invalid username or password'])
  153. def test_check_user_name_and_pwd_3(self):
  154. user_info = {'usernae':'root', 'password':'abc123'}
  155. len = self.handler.rfile.write(json.dumps(user_info).encode())
  156. self.handler.headers['Content-Length'] = len
  157. self.handler.rfile.seek(0, 0)
  158. ret, msg = self.handler._check_user_name_and_pwd()
  159. self.assertFalse(ret)
  160. self.assertEqual(msg, ['need user name'])
  161. def test_check_user_name_and_pwd_4(self):
  162. user_info = {'username':'root', 'pssword':'abc123'}
  163. len = self.handler.rfile.write(json.dumps(user_info).encode())
  164. self.handler.headers['Content-Length'] = len
  165. self.handler.rfile.seek(0, 0)
  166. self.handler.server._user_infos['root'] = ['aa', 'aaa']
  167. ret, msg = self.handler._check_user_name_and_pwd()
  168. self.assertFalse(ret)
  169. self.assertEqual(msg, ['need password'])
  170. def test_check_user_name_and_pwd_5(self):
  171. user_info = {'username':'root', 'password':'abc123'}
  172. len = self.handler.rfile.write(json.dumps(user_info).encode())
  173. self.handler.headers['Content-Length'] = len
  174. self.handler.rfile.seek(0, 0)
  175. ret, msg = self.handler._check_user_name_and_pwd()
  176. self.assertFalse(ret)
  177. self.assertEqual(msg, ['username or password error'])
  178. def test_do_POST(self):
  179. self.handler.headers = {}
  180. self.handler.do_POST()
  181. self.assertEqual(self.handler.rcode, http.client.BAD_REQUEST)
  182. def test_do_POST_1(self):
  183. self.handler.headers = {}
  184. self.handler.headers['cookie'] = 12345
  185. self.handler.path = '/'
  186. self.handler.do_POST()
  187. self.assertEqual(self.handler.rcode, http.client.UNAUTHORIZED)
  188. def test_handle_post_request(self):
  189. self.handler.path = '/cfgmgr/revert'
  190. self.handler.headers = {}
  191. rcode, reply = self.handler._handle_post_request()
  192. self.assertEqual(http.client.BAD_REQUEST, rcode)
  193. def test_handle_post_request_1(self):
  194. self.handler.path = '/*d/revert'
  195. self.handler.headers = {}
  196. rcode, reply = self.handler._handle_post_request()
  197. self.assertEqual(http.client.BAD_REQUEST, rcode)
  198. def _gen_module_spec(self):
  199. spec = { 'commands': [
  200. { 'command_name' :'command',
  201. 'command_args': [ {
  202. 'item_name' : 'param1',
  203. 'item_type' : 'integer',
  204. 'item_optional' : False,
  205. 'item_default' : 0
  206. } ],
  207. 'command_description' : 'cmd description'
  208. }
  209. ]
  210. }
  211. return spec
  212. def test_handle_post_request_2(self):
  213. params = {'param1':123}
  214. len = self.handler.rfile.write(json.dumps(params).encode())
  215. self.handler.headers['Content-Length'] = len
  216. self.handler.rfile.seek(0, 0)
  217. self.handler.path = '/module/command'
  218. self.handler.server.cmdctl.modules_spec = {}
  219. self.handler.server.cmdctl.modules_spec['module'] = self._gen_module_spec()
  220. rcode, reply = self.handler._handle_post_request()
  221. self.assertEqual(http.client.OK, rcode)
  222. def test_handle_post_request_3(self):
  223. params = {'param1':'abc'}
  224. len = self.handler.rfile.write(json.dumps(params).encode())
  225. self.handler.headers['Content-Length'] = len
  226. self.handler.rfile.seek(0, 0)
  227. self.handler.path = '/module/command'
  228. self.handler.server.cmdctl.modules_spec = {}
  229. self.handler.server.cmdctl.modules_spec['module'] = self._gen_module_spec()
  230. rcode, reply = self.handler._handle_post_request()
  231. self.assertEqual(http.client.BAD_REQUEST, rcode)
  232. class MyCommandControl(CommandControl):
  233. def _get_modules_specification(self):
  234. return {}
  235. def _get_config_data_from_config_manager(self):
  236. return {}
  237. def _setup_session(self):
  238. spec_file = SPEC_FILE_PATH + 'cmdctl.spec'
  239. module_spec = isc.config.module_spec_from_file(spec_file)
  240. config = isc.config.config_data.ConfigData(module_spec)
  241. self._module_name = 'Cmdctl'
  242. self._cmdctl_config_data = config.get_full_config()
  243. def _handle_msg_from_msgq(self):
  244. pass
  245. class TestCommandControl(unittest.TestCase):
  246. def setUp(self):
  247. self.old_stdout = sys.stdout
  248. sys.stdout = open(os.devnull, 'w')
  249. self.cmdctl = MyCommandControl(None, True)
  250. def tearDown(self):
  251. sys.stdout.close()
  252. sys.stdout = self.old_stdout
  253. def _check_config(self, cmdctl):
  254. key, cert, account = cmdctl.get_cmdctl_config_data()
  255. self.assertIsNotNone(key)
  256. self.assertIsNotNone(cert)
  257. self.assertIsNotNone(account)
  258. def test_get_cmdctl_config_data(self):
  259. old_env = os.environ
  260. if 'B10_FROM_SOURCE' in os.environ:
  261. del os.environ['B10_FROM_SOURCE']
  262. self.cmdctl.get_cmdctl_config_data()
  263. self._check_config(self.cmdctl)
  264. os.environ = old_env
  265. old_env = os.environ
  266. os.environ['B10_FROM_SOURCE'] = '../'
  267. self._check_config(self.cmdctl)
  268. os.environ = old_env
  269. def test_parse_command_result(self):
  270. self.assertEqual({}, self.cmdctl._parse_command_result(1, {'error' : 1}))
  271. self.assertEqual({'a': 1}, self.cmdctl._parse_command_result(0, {'a' : 1}))
  272. def _check_answer(self, answer, rcode_, msg_):
  273. rcode, msg = ccsession.parse_answer(answer)
  274. self.assertEqual(rcode, rcode_)
  275. self.assertEqual(msg, msg_)
  276. def test_command_handler(self):
  277. answer = self.cmdctl.command_handler('unknown-command', None)
  278. self._check_answer(answer, 1, 'unknown command: unknown-command')
  279. answer = self.cmdctl.command_handler('print_settings', None)
  280. rcode, msg = ccsession.parse_answer(answer)
  281. self.assertEqual(rcode, 0)
  282. self.assertTrue(msg != None)
  283. def test_command_handler_spec_update(self):
  284. # Should not be present
  285. self.assertFalse("foo" in self.cmdctl.modules_spec)
  286. answer = self.cmdctl.command_handler(
  287. ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", {} ])
  288. rcode, msg = ccsession.parse_answer(answer)
  289. self.assertEqual(rcode, 0)
  290. self.assertEqual(msg, None)
  291. # Should now be present
  292. self.assertTrue("foo" in self.cmdctl.modules_spec)
  293. # When sending specification 'None', it should be removed
  294. answer = self.cmdctl.command_handler(
  295. ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", None ])
  296. rcode, msg = ccsession.parse_answer(answer)
  297. self.assertEqual(rcode, 0)
  298. self.assertEqual(msg, None)
  299. # Should no longer be present
  300. self.assertFalse("foo" in self.cmdctl.modules_spec)
  301. # Don't store 'None' if it wasn't there in the first place!
  302. answer = self.cmdctl.command_handler(
  303. ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", None ])
  304. rcode, msg = ccsession.parse_answer(answer)
  305. self.assertEqual(rcode, 1)
  306. self.assertEqual(msg, "No such module: foo")
  307. # Should still not present
  308. self.assertFalse("foo" in self.cmdctl.modules_spec)
  309. def test_check_config_handler(self):
  310. answer = self.cmdctl.config_handler({'non-exist': 123})
  311. self._check_answer(answer, 1, 'unknown config item: non-exist')
  312. old_env = os.environ
  313. os.environ['B10_FROM_SOURCE'] = '../'
  314. self._check_config(self.cmdctl)
  315. os.environ = old_env
  316. answer = self.cmdctl.config_handler({'key_file': '/user/non-exist_folder'})
  317. self._check_answer(answer, 1, "the file doesn't exist: /user/non-exist_folder")
  318. answer = self.cmdctl.config_handler({'cert_file': '/user/non-exist_folder'})
  319. self._check_answer(answer, 1, "the file doesn't exist: /user/non-exist_folder")
  320. answer = self.cmdctl.config_handler({'accounts_file': '/user/non-exist_folder'})
  321. self._check_answer(answer, 1,
  322. "Invalid accounts file: [Errno 2] No such file or directory: '/user/non-exist_folder'")
  323. # Test with invalid accounts file
  324. file_name = 'tmp.account.file'
  325. temp_file = open(file_name, 'w')
  326. writer = csv.writer(temp_file)
  327. writer.writerow(['a', 'b'])
  328. temp_file.close()
  329. answer = self.cmdctl.config_handler({'accounts_file': file_name})
  330. self._check_answer(answer, 1, "Invalid accounts file: list index out of range")
  331. os.remove(file_name)
  332. def test_send_command(self):
  333. rcode, value = self.cmdctl.send_command('Cmdctl', 'print_settings', None)
  334. self.assertEqual(rcode, 0)
  335. class MySecureHTTPServer(SecureHTTPServer):
  336. def server_bind(self):
  337. pass
  338. class TestSecureHTTPServer(unittest.TestCase):
  339. def setUp(self):
  340. self.old_stdout = sys.stdout
  341. self.old_stderr = sys.stderr
  342. sys.stdout = open(os.devnull, 'w')
  343. sys.stderr = sys.stdout
  344. self.server = MySecureHTTPServer(('localhost', 8080),
  345. MySecureHTTPRequestHandler,
  346. MyCommandControl, verbose=True)
  347. def tearDown(self):
  348. # both sys.stdout and sys.stderr are the same, so closing one is
  349. # sufficient
  350. sys.stdout.close()
  351. sys.stdout = self.old_stdout
  352. sys.stderr = self.old_stderr
  353. def test_addr_in_use(self):
  354. server_one = None
  355. try:
  356. server_one = SecureHTTPServer(('localhost', 53531),
  357. MySecureHTTPRequestHandler,
  358. MyCommandControl)
  359. except CmdctlException:
  360. pass
  361. else:
  362. self.assertRaises(CmdctlException, SecureHTTPServer,
  363. ('localhost', 53531),
  364. MySecureHTTPRequestHandler, MyCommandControl)
  365. if server_one:
  366. server_one.server_close()
  367. def test_create_user_info(self):
  368. self.server._create_user_info('/local/not-exist')
  369. self.assertEqual(0, len(self.server._user_infos))
  370. self.server._create_user_info(SRC_FILE_PATH + 'cmdctl-accounts.csv')
  371. self.assertEqual(1, len(self.server._user_infos))
  372. self.assertTrue('root' in self.server._user_infos)
  373. def test_check_key_and_cert(self):
  374. self.assertRaises(CmdctlException, self.server._check_key_and_cert,
  375. '/local/not-exist', 'cmdctl-keyfile.pem')
  376. self.server._check_key_and_cert(SRC_FILE_PATH + 'cmdctl-keyfile.pem',
  377. SRC_FILE_PATH + 'cmdctl-certfile.pem')
  378. def test_wrap_sock_in_ssl_context(self):
  379. sock = socket.socket()
  380. self.assertRaises(socket.error,
  381. self.server._wrap_socket_in_ssl_context,
  382. sock,
  383. '../cmdctl-keyfile',
  384. '../cmdctl-certfile')
  385. sock1 = socket.socket()
  386. self.server._wrap_socket_in_ssl_context(sock1,
  387. SRC_FILE_PATH + 'cmdctl-keyfile.pem',
  388. SRC_FILE_PATH + 'cmdctl-certfile.pem')
  389. class TestFuncNotInClass(unittest.TestCase):
  390. def test_check_port(self):
  391. self.assertRaises(OptionValueError, check_port, None, 'port', -1, None)
  392. self.assertRaises(OptionValueError, check_port, None, 'port', 65536, None)
  393. self.assertRaises(OptionValueError, check_addr, None, 'ipstr', 'a.b.d', None)
  394. self.assertRaises(OptionValueError, check_addr, None, 'ipstr', '1::0:a.b', None)
  395. if __name__== "__main__":
  396. isc.log.resetUnitTestRootLogger()
  397. unittest.main()