import pcs-0.12.0~a1-3.el10

i10cs changed/i10cs/pcs-0.12.0%7ea1-3.el10
MSVSphere Packaging Team 4 months ago
commit 8b70c04720
Signed by: sys_gitsync
GPG Key ID: B2B0B9F29E528FE8

24
.gitignore vendored

@ -0,0 +1,24 @@
SOURCES/backports-3.25.0.gem
SOURCES/base64-0.2.0.gem
SOURCES/childprocess-5.0.0.gem
SOURCES/dacite-1.8.1.tar.gz
SOURCES/ethon-0.16.0.gem
SOURCES/ffi-1.16.3.gem
SOURCES/mustermann-3.0.0.gem
SOURCES/nio4r-2.7.3.gem
SOURCES/pcs-0.12.0a1.tar.gz
SOURCES/pcs-web-ui-0.1.20.tar.gz
SOURCES/pcs-web-ui-node-modules-0.1.20.tar.xz
SOURCES/puma-6.4.2.gem
SOURCES/pyagentx-0.4.pcs.2.tar.gz
SOURCES/pycurl-7.45.3.tar.gz
SOURCES/rack-3.0.11.gem
SOURCES/rack-protection-4.0.0.gem
SOURCES/rack-session-2.0.0.gem
SOURCES/rack-test-2.1.0.gem
SOURCES/rackup-2.1.0.gem
SOURCES/ruby2_keywords-0.0.5.gem
SOURCES/sinatra-4.0.0.gem
SOURCES/tilt-2.3.0.gem
SOURCES/tornado-6.4.0.tar.gz
SOURCES/webrick-1.8.1.gem

@ -0,0 +1,24 @@
7bfaf5b42c0992bbc5055d7bd4013f0ca4731775 SOURCES/backports-3.25.0.gem
ea3a591bdfa93655d8eec9d7bdd7fb87ecb5616a SOURCES/base64-0.2.0.gem
8f910640f84d085707138aa70d6eedb7df10ca73 SOURCES/childprocess-5.0.0.gem
07b26abbf7ff0dcba5c7f9e814ff7eebafefb058 SOURCES/dacite-1.8.1.tar.gz
5b56a68268708c474bef04550639ded3add5e946 SOURCES/ethon-0.16.0.gem
10e4cf0e11ef4581ec4ad5fe2cdf3c78b6077d39 SOURCES/ffi-1.16.3.gem
e892678aaf02ccb27f3a6cd58482cda00aea6ce8 SOURCES/mustermann-3.0.0.gem
632c455f6e27a5f568e9d24761b8a4246cfcc603 SOURCES/nio4r-2.7.3.gem
85dccd75ffe486aff1c3c5ce4448b3da7bae6919 SOURCES/pcs-0.12.0a1.tar.gz
c75288254b282cb8aed7307fd18dbdd8dda9252d SOURCES/pcs-web-ui-0.1.20.tar.gz
1dbe81ac08cfe60da25cc8650292cdc7c33cdb89 SOURCES/pcs-web-ui-node-modules-0.1.20.tar.xz
623cb3ebec75de449cad3c9f50d5d370edf9e2f9 SOURCES/puma-6.4.2.gem
3176b2f2b332c2b6bf79fe882e83feecf3d3f011 SOURCES/pyagentx-0.4.pcs.2.tar.gz
d36e54b3d6d36460dae0c7a2b9971d72d16d8225 SOURCES/pycurl-7.45.3.tar.gz
a156440aaee17f60b83f2f681ec60fce2329a480 SOURCES/rack-3.0.11.gem
f91158b296882aa5b3798ff6c24f01cdf233ef48 SOURCES/rack-protection-4.0.0.gem
9e7935696af0b64cc5f5ce2dfeabdb7e0d3a84f0 SOURCES/rack-session-2.0.0.gem
ae09ea83748b55875edc3708fffba90db180cb8e SOURCES/rack-test-2.1.0.gem
657a2dc63695e1bf9eb5feae4d9d65a7c6b900ad SOURCES/rackup-2.1.0.gem
d017b9e4d1978e0b3ccc3e2a31493809e4693cd3 SOURCES/ruby2_keywords-0.0.5.gem
28c671c6d061475ed2bfd3e6a4a17970a0a12d8a SOURCES/sinatra-4.0.0.gem
4a38a9a55887b2882182a2c5771e592efe514e5e SOURCES/tilt-2.3.0.gem
ee95560139af1bb8d0d49d4acf0518deb04877d2 SOURCES/tornado-6.4.0.tar.gz
0696afa9cc0b56f541aacb7483aecdb385a5bd37 SOURCES/webrick-1.8.1.gem

@ -0,0 +1,38 @@
From 7bfa2ad4f4f5f59fd501b0cec23cdc489f90a09e Mon Sep 17 00:00:00 2001
From: Michal Pospisil <mpospisi@redhat.com>
Date: Thu, 23 May 2024 17:22:12 +0200
Subject: [PATCH] do not support cluster setup with udp(u) transport in RHEL10
---
pcs/pcs.8.in | 2 ++
pcs/usage.py | 1 +
2 files changed, 3 insertions(+)
diff --git a/pcs/pcs.8.in b/pcs/pcs.8.in
index 0bc1a4e5..4dea3582 100644
--- a/pcs/pcs.8.in
+++ b/pcs/pcs.8.in
@@ -479,6 +479,8 @@ By default, encryption is enabled with cipher=aes256 and hash=sha256. To disable
Transports udp and udpu:
.br
+WARNING: These transports are not supported in RHEL 10.
+.br
These transports are limited to one address per node. They do not support traffic encryption nor compression.
.br
Transport options are: ip_version, netmtu
diff --git a/pcs/usage.py b/pcs/usage.py
index 26204c59..31eba549 100644
--- a/pcs/usage.py
+++ b/pcs/usage.py
@@ -1496,6 +1496,7 @@ Commands:
hash=sha256. To disable encryption, set cipher=none and hash=none.
Transports udp and udpu:
+ WARNING: These transports are not supported in RHEL 10.
These transports are limited to one address per node. They do not
support traffic encryption nor compression.
Transport options are:
--
2.45.1

@ -0,0 +1,444 @@
From 525b102bd053a6653dff663845c98683fa78bbab Mon Sep 17 00:00:00 2001
From: Ivan Devat <idevat@redhat.com>
Date: Mon, 24 Jun 2024 17:19:58 +0200
Subject: [PATCH] fix tests for missing webui
---
pcs_test/Makefile.am | 1 +
pcs_test/smoke.sh.in | 23 ++++++--
pcs_test/tier0/daemon/app/fixtures_app.py | 53 +++----------------
.../tier0/daemon/app/fixtures_app_webui.py | 28 ++++++++++
pcs_test/tier0/daemon/app/test_app_gui.py | 37 ++++++++++---
pcs_test/tier0/daemon/app/test_app_spa.py | 26 +++++++--
pcs_test/tier0/daemon/test_env.py | 6 ++-
pcs_test/tier0/daemon/test_session.py | 25 ++++++---
pcs_test/tools/misc.py | 9 ++++
9 files changed, 138 insertions(+), 70 deletions(-)
create mode 100644 pcs_test/tier0/daemon/app/fixtures_app_webui.py
diff --git a/pcs_test/Makefile.am b/pcs_test/Makefile.am
index 4e71fcda..6c5932b3 100644
--- a/pcs_test/Makefile.am
+++ b/pcs_test/Makefile.am
@@ -134,6 +134,7 @@ EXTRA_DIST = \
tier0/common/test_tools.py \
tier0/common/test_tools_xml_fromstring.py \
tier0/daemon/app/fixtures_app.py \
+ tier0/daemon/app/fixtures_app_webui.py \
tier0/daemon/app/__init__.py \
tier0/daemon/app/test_api_v0.py \
tier0/daemon/app/test_api_v1.py \
diff --git a/pcs_test/smoke.sh.in b/pcs_test/smoke.sh.in
index a4b3ac71..37eac345 100755
--- a/pcs_test/smoke.sh.in
+++ b/pcs_test/smoke.sh.in
@@ -66,10 +66,25 @@ cat <<EOF > ${pcsd_settings_conf_path}
EOF
cat ${pcsd_settings_conf_path}
pcs cluster start --all --wait
-curl --insecure --data "username=${cluster_user}&password=${cluster_user_password}" --cookie-jar ${cookie_file} https://localhost:2224/ui/login
-curl --insecure --cookie ${cookie_file} --header "X-Requested-With: XMLHttpRequest" --data "hidden[hidden_input]=&config[stonith-enabled]=false" https://localhost:2224/managec/${cluster_name}/update_cluster_settings > "${output_file}"
-cat "${output_file}"; echo ""
-[ "$(cat ${output_file})" = "Update Successful" ]
+
+webui_http_code_response=$(
+ curl --insecure --silent --output /dev/null --write-out "%{http_code}" \
+ https://localhost:2224/ui/
+)
+if [ "$webui_http_code_response" = "200" ]; then
+ # Webui backend check
+ curl --insecure --data "username=${cluster_user}&password=${cluster_user_password}" --cookie-jar ${cookie_file} https://localhost:2224/ui/login
+ curl --insecure --cookie ${cookie_file} --header "X-Requested-With: XMLHttpRequest" --data "hidden[hidden_input]=&config[stonith-enabled]=false" https://localhost:2224/managec/${cluster_name}/update_cluster_settings > "${output_file}"
+ cat "${output_file}"; echo ""
+ [ "$(cat ${output_file})" = "Update Successful" ]
+elif [ "$webui_http_code_response" = "401" ]; then
+ curl --insecure https://localhost:2224/ui/ > "${output_file}"
+ cat "${output_file}"; echo ""
+ [ "$(cat "${output_file}")" = '{"notauthorized":"true"}' ]
+else
+ echo "Unexpected response from https://localhost:2224/ui/ - http code: '${webui_http_code_response}'"
+ exit 1
+fi
# Sanity check of API V1
curl -kb "token=${token}" https://localhost:2224/api/v1/resource-agent-get-agents-list/v1 --data '{}' > "${output_file}"
diff --git a/pcs_test/tier0/daemon/app/fixtures_app.py b/pcs_test/tier0/daemon/app/fixtures_app.py
index 3c0d6a4f..56acf473 100644
--- a/pcs_test/tier0/daemon/app/fixtures_app.py
+++ b/pcs_test/tier0/daemon/app/fixtures_app.py
@@ -1,16 +1,11 @@
from pprint import pformat
from urllib.parse import urlencode
-from tornado.httputil import (
- HTTPHeaders,
- parse_cookie,
-)
+from tornado.httputil import HTTPHeaders
from tornado.testing import AsyncHTTPTestCase
from tornado.web import Application
from pcs.daemon import ruby_pcsd
-from pcs.daemon.app.webui import session
-from pcs.daemon.app.webui.auth import PCSD_SESSION
USER = "user"
GROUPS = ["group1", "group2"]
@@ -56,6 +51,13 @@ class AppTest(AsyncHTTPTestCase):
def fetch(self, path, raise_error=False, **kwargs):
if "follow_redirects" not in kwargs:
kwargs["follow_redirects"] = False
+
+ if "is_ajax" in kwargs:
+ if "headers" not in kwargs:
+ kwargs["headers"] = {}
+ kwargs["headers"]["X-Requested-With"] = "XMLHttpRequest"
+ del kwargs["is_ajax"]
+
response = super().fetch(path, raise_error=raise_error, **kwargs)
# "Strict-Transport-Security" header is expected in every response
self.assertTrue(
@@ -91,45 +93,6 @@ class AppTest(AsyncHTTPTestCase):
self.assert_headers_contains(response.headers, self.wrapper.headers)
self.assertEqual(response.body, self.wrapper.body)
-
-class AppUiTestMixin(AppTest):
- def setUp(self):
- self.session_storage = session.Storage(lifetime_seconds=10)
- super().setUp()
-
- def assert_session_in_response(self, response, sid=None):
- self.assertTrue("Set-Cookie" in response.headers)
- cookie = parse_cookie(response.headers["Set-Cookie"])
- self.assertTrue(PCSD_SESSION, cookie)
- if sid:
- self.assertEqual(cookie[PCSD_SESSION], sid)
- return cookie[PCSD_SESSION]
-
- def fetch(self, path, raise_error=False, **kwargs):
- if "sid" in kwargs:
- if "headers" not in kwargs:
- kwargs["headers"] = {}
- kwargs["headers"]["Cookie"] = f"{PCSD_SESSION}={kwargs['sid']}"
- del kwargs["sid"]
-
- if "is_ajax" in kwargs:
- if "headers" not in kwargs:
- kwargs["headers"] = {}
- kwargs["headers"]["X-Requested-With"] = "XMLHttpRequest"
- del kwargs["is_ajax"]
-
- if "follow_redirects" not in kwargs:
- kwargs["follow_redirects"] = False
-
- return super().fetch(path, raise_error=raise_error, **kwargs)
-
- def create_login_session(self):
- return self.session_storage.login(USER)
-
- def assert_success_response(self, response, expected_body):
- self.assertEqual(response.code, 200)
- self.assertEqual(response.body.decode(), expected_body)
-
def assert_unauth_ajax(self, response):
self.assertEqual(response.code, 401)
self.assertEqual(response.body, b'{"notauthorized":"true"}')
diff --git a/pcs_test/tier0/daemon/app/fixtures_app_webui.py b/pcs_test/tier0/daemon/app/fixtures_app_webui.py
new file mode 100644
index 00000000..e38ca3e7
--- /dev/null
+++ b/pcs_test/tier0/daemon/app/fixtures_app_webui.py
@@ -0,0 +1,28 @@
+try:
+ from pcs.daemon.app import webui
+except ImportError:
+ # You need to skip tests in tests that uses AppTest in the case webui
+ # is not there.
+ webui = None
+
+from pcs_test.tier0.daemon.app import fixtures_app
+
+
+class AppTest(fixtures_app.AppTest):
+ def setUp(self):
+ self.session_storage = webui.session.Storage(lifetime_seconds=10)
+ super().setUp()
+
+ def fetch(self, path, raise_error=False, **kwargs):
+ if "sid" in kwargs:
+ if "headers" not in kwargs:
+ kwargs["headers"] = {}
+ kwargs["headers"][
+ "Cookie"
+ ] = f"{webui.auth.PCSD_SESSION}={kwargs['sid']}"
+ del kwargs["sid"]
+
+ return super().fetch(path, raise_error=raise_error, **kwargs)
+
+ def create_login_session(self):
+ return self.session_storage.login(fixtures_app.USER)
diff --git a/pcs_test/tier0/daemon/app/test_app_gui.py b/pcs_test/tier0/daemon/app/test_app_gui.py
index b3446fdb..2317eea5 100644
--- a/pcs_test/tier0/daemon/app/test_app_gui.py
+++ b/pcs_test/tier0/daemon/app/test_app_gui.py
@@ -1,14 +1,24 @@
import logging
from unittest import mock
+from tornado.httputil import parse_cookie
+
from pcs.daemon import ruby_pcsd
from pcs.daemon.app import sinatra_ui
from pcs.daemon.app.auth import UnixSocketAuthProvider
-from pcs.daemon.app.webui import sinatra_ui as sinatra_ui_webui
+
+try:
+ from pcs.daemon.app import webui
+except ImportError:
+ webui = None
from pcs.lib.auth.provider import AuthProvider
from pcs.lib.auth.types import AuthUser
-from pcs_test.tier0.daemon.app import fixtures_app
+from pcs_test.tier0.daemon.app import (
+ fixtures_app,
+ fixtures_app_webui,
+)
+from pcs_test.tools.misc import skip_unless_webui_installed
# Don't write errors to test output.
logging.getLogger("tornado.access").setLevel(logging.CRITICAL)
@@ -33,21 +43,28 @@ def patch_get_unix_socket_user(user):
auth_provider = AuthProvider(logging.getLogger("test logger"))
-class AppTest(fixtures_app.AppUiTestMixin):
+@skip_unless_webui_installed()
+@patch_login_user()
+class SinatraAjaxProtectedSession(fixtures_app_webui.AppTest):
def setUp(self):
self.wrapper = fixtures_app.RubyPcsdWrapper(ruby_pcsd.SINATRA)
super().setUp()
-
-@patch_login_user()
-class SinatraAjaxProtectedSession(AppTest):
def get_routes(self):
- return sinatra_ui_webui.get_routes(
+ return webui.sinatra_ui.get_routes(
self.session_storage,
auth_provider,
self.wrapper,
)
+ def assert_session_in_response(self, response, sid=None):
+ self.assertTrue("Set-Cookie" in response.headers)
+ cookie = parse_cookie(response.headers["Set-Cookie"])
+ self.assertTrue(webui.auth.PCSD_SESSION, cookie)
+ if sid:
+ self.assertEqual(cookie[webui.auth.PCSD_SESSION], sid)
+ return cookie[webui.auth.PCSD_SESSION]
+
def test_deal_without_authentication(self):
self.assert_unauth_ajax(self.get("/some-ajax", is_ajax=True))
@@ -63,7 +80,11 @@ class SinatraAjaxProtectedSession(AppTest):
@patch_login_user()
-class SinatraAjaxProtectedUnixSocket(AppTest):
+class SinatraAjaxProtectedUnixSocket(fixtures_app.AppTest):
+ def setUp(self):
+ self.wrapper = fixtures_app.RubyPcsdWrapper(ruby_pcsd.SINATRA)
+ super().setUp()
+
def get_routes(self):
return sinatra_ui.get_routes(auth_provider, self.wrapper)
diff --git a/pcs_test/tier0/daemon/app/test_app_spa.py b/pcs_test/tier0/daemon/app/test_app_spa.py
index 89a5ab0e..6acf3c7d 100644
--- a/pcs_test/tier0/daemon/app/test_app_spa.py
+++ b/pcs_test/tier0/daemon/app/test_app_spa.py
@@ -2,12 +2,22 @@ import logging
import os
from unittest import mock
-from pcs.daemon.app import webui
+try:
+ from pcs.daemon.app import webui
+except ImportError:
+ webui = None
+
from pcs.lib.auth.provider import AuthProvider
from pcs.lib.auth.types import AuthUser
-from pcs_test.tier0.daemon.app import fixtures_app
-from pcs_test.tools.misc import get_tmp_dir
+from pcs_test.tier0.daemon.app import (
+ fixtures_app,
+ fixtures_app_webui,
+)
+from pcs_test.tools.misc import (
+ get_tmp_dir,
+ skip_unless_webui_installed,
+)
LOGIN_BODY = {"username": fixtures_app.USER, "password": fixtures_app.PASSWORD}
PREFIX = "/ui/"
@@ -16,7 +26,7 @@ PREFIX = "/ui/"
logging.getLogger("tornado.access").setLevel(logging.CRITICAL)
-class AppTest(fixtures_app.AppUiTestMixin):
+class AppTest(fixtures_app_webui.AppTest):
def setUp(self):
self.public_dir = get_tmp_dir("tier0_daemon_app_spa")
self.spa_dir_path = os.path.join(self.public_dir.name, "ui")
@@ -41,7 +51,12 @@ class AppTest(fixtures_app.AppUiTestMixin):
auth_provider=AuthProvider(logging.Logger("test logger")),
)
+ def assert_success_response(self, response, expected_body):
+ self.assertEqual(response.code, 200)
+ self.assertEqual(response.body.decode(), expected_body)
+
+@skip_unless_webui_installed()
class Static(AppTest):
def test_index(self):
self.assert_success_response(
@@ -50,6 +65,7 @@ class Static(AppTest):
)
+@skip_unless_webui_installed()
class Fallback(AppTest):
def setUp(self):
super().setUp()
@@ -65,6 +81,7 @@ class Fallback(AppTest):
)
+@skip_unless_webui_installed()
class Login(AppTest):
def setUp(self):
super().setUp()
@@ -94,6 +111,7 @@ class Login(AppTest):
)
+@skip_unless_webui_installed()
class Logout(AppTest):
def test_can_logout(self):
session1 = self.create_login_session()
diff --git a/pcs_test/tier0/daemon/test_env.py b/pcs_test/tier0/daemon/test_env.py
index 40f0c402..0eff3660 100644
--- a/pcs_test/tier0/daemon/test_env.py
+++ b/pcs_test/tier0/daemon/test_env.py
@@ -8,7 +8,10 @@ from unittest import (
from pcs import settings
from pcs.daemon import env
-from pcs_test.tools.misc import create_setup_patch_mixin
+from pcs_test.tools.misc import (
+ create_setup_patch_mixin,
+ skip_unless_webui_installed,
+)
def webui_fallback(public_dir):
@@ -177,6 +180,7 @@ class Prepare(TestCase, create_setup_patch_mixin(env)):
{env.PCSD_DEBUG: "false"}
)
+ @skip_unless_webui_installed()
def test_errors_on_missing_paths(self):
self.path_exists.return_value = False
self.assert_environ_produces_modified_pcsd_env(
diff --git a/pcs_test/tier0/daemon/test_session.py b/pcs_test/tier0/daemon/test_session.py
index a893c01d..e8eff4cd 100644
--- a/pcs_test/tier0/daemon/test_session.py
+++ b/pcs_test/tier0/daemon/test_session.py
@@ -1,23 +1,31 @@
from contextlib import contextmanager
from unittest import TestCase
-from pcs.daemon.app.webui import session
-from pcs.daemon.app.webui.session import Session
+try:
+ from pcs.daemon.app import webui
+except ImportError:
+ webui = None
-from pcs_test.tools.misc import create_setup_patch_mixin
+from pcs_test.tools.misc import (
+ create_setup_patch_mixin,
+ skip_unless_webui_installed,
+)
SID = "abc"
USER = "user"
GROUPS = ["group1", "group2"]
-PatchSessionMixin = create_setup_patch_mixin(session)
+# If webui is None, the tests in this file using these mixins are skipped,
+# passing a dummy object instead to make this executable
+PatchSessionMixin = create_setup_patch_mixin(webui) if webui else object
+@skip_unless_webui_installed()
class SessionTest(TestCase, PatchSessionMixin):
def setUp(self):
- self.now = self.setup_patch("now", return_value=0)
- self.session = Session(SID, USER)
+ self.now = self.setup_patch("session.now", return_value=0)
+ self.session = webui.session.Session(SID, USER)
def test_session_grows_older(self):
self.now.return_value = 10.1
@@ -42,10 +50,11 @@ class SessionTest(TestCase, PatchSessionMixin):
session1.sid
+@skip_unless_webui_installed()
class StorageTest(TestCase, PatchSessionMixin):
def setUp(self):
- self.now = self.setup_patch("now", return_value=0)
- self.storage = session.Storage(lifetime_seconds=10)
+ self.now = self.setup_patch("session.now", return_value=0)
+ self.storage = webui.session.Storage(lifetime_seconds=10)
def test_does_not_accept_foreign_sid(self):
self.assertIsNone(self.storage.get("unknown_sid"))
diff --git a/pcs_test/tools/misc.py b/pcs_test/tools/misc.py
index 28e03411..7a048a4d 100644
--- a/pcs_test/tools/misc.py
+++ b/pcs_test/tools/misc.py
@@ -15,6 +15,11 @@ from pcs.cli.common.parse_args import InputModifiers
from pcs.common import str_tools
from pcs.lib.external import CommandRunner
+try:
+ from pcs.daemon.app import webui
+except ImportError:
+ webui = None # type: ignore
+
from pcs_test import TEST_ROOT
from pcs_test import settings as tests_settings
from pcs_test.tools.custom_mock import MockLibraryReportProcessor
@@ -292,6 +297,10 @@ def skip_unless_booth_resource_agent_installed():
)
+def skip_unless_webui_installed():
+ return skipUnless(webui, "test requires webui which is not installed")
+
+
def create_patcher(target_prefix_or_module):
"""
Return function for patching tests with preconfigured target prefix
--
2.45.2

File diff suppressed because it is too large Load Diff
Loading…
Cancel
Save