forked from msvsphere/leapp-repository
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
388 lines
15 KiB
388 lines
15 KiB
import os
|
|
from collections import namedtuple
|
|
|
|
import pytest
|
|
|
|
from leapp import reporting
|
|
from leapp.exceptions import StopActorExecutionError
|
|
from leapp.libraries.common import repofileutils, rhsm
|
|
from leapp.libraries.common.testutils import create_report_mocked, CurrentActorMocked, logger_mocked
|
|
from leapp.libraries.stdlib import api, CalledProcessError
|
|
from leapp.models import RepositoryData, RepositoryFile
|
|
from leapp.utils.report import is_inhibitor
|
|
|
|
Repository = namedtuple('Repository', ['repoid', 'file'])
|
|
LIST_SEPARATOR = '\n - '
|
|
|
|
# External commands called by the RHSM library
|
|
CMD_RHSM_LIST_CONSUMED = ('subscription-manager', 'list', '--consumed')
|
|
CMD_RHSM_STATUS = ('subscription-manager', 'status')
|
|
CMD_RHSM_RELEASE = ('subscription-manager', 'release')
|
|
CMD_RHSM_LIST_ENABLED_REPOS = ('subscription-manager', 'repos', '--list-enabled')
|
|
|
|
RHSM_STATUS_OUTPUT_NOSCA = '''
|
|
+-------------------------------------------+
|
|
System Status Details
|
|
+-------------------------------------------+
|
|
Overall Status: Current
|
|
|
|
System Purpose Status: Not Specified
|
|
'''
|
|
|
|
RHSM_STATUS_OUTPUT_SCA = '''
|
|
+-------------------------------------------+
|
|
System Status Details
|
|
+-------------------------------------------+
|
|
Overall Status: Current
|
|
|
|
System Purpose Status: Matched
|
|
|
|
Content Access Mode is set to Simple Content Access
|
|
'''
|
|
|
|
# Used to simulate realistic output of RHSM, therefore carries more information than `Repository` namedtuple
|
|
RHSMRepositoryEntry = namedtuple('RHSMRepositoryEntry', ('id', 'name', 'url', 'enabled')) # For clarity purposes
|
|
RHSM_ENABLED_REPOS = [
|
|
RHSMRepositoryEntry(
|
|
id='rhel-8-for-x86_64-appstream-rpms',
|
|
name='Appstream',
|
|
url='some_url',
|
|
enabled='1'),
|
|
RHSMRepositoryEntry(
|
|
id='satellite-tools-6.6-for-rhel-8-x86_64-rpms',
|
|
name='Satellite',
|
|
url='some_url',
|
|
enabled='1'),
|
|
RHSMRepositoryEntry(
|
|
id='rhel-8-for-x86_64-baseos-rpms',
|
|
name='Base',
|
|
url='some_url',
|
|
enabled='1')
|
|
]
|
|
|
|
|
|
class IsolatedActionsMocked(object):
|
|
def __init__(self, call_stdout=None, raise_err=False):
|
|
self.commands_called = []
|
|
self.call_return = {'stdout': call_stdout, 'stderr': None}
|
|
self.raise_err = raise_err
|
|
|
|
# A map from called commands to their mocked output
|
|
self.mocked_command_call_outputs = dict()
|
|
|
|
def call(self, cmd, *args, **dummy_kwargs):
|
|
self.commands_called.append(cmd)
|
|
if self.raise_err:
|
|
raise_call_error(cmd)
|
|
|
|
return self.mocked_command_call_outputs.get(
|
|
tuple(cmd), # Cast to tuple, as list is not hashable
|
|
self.call_return)
|
|
|
|
def add_mocked_command_call_with_stdout(self, cmd, stdout):
|
|
# We cast `cmd` from list to tuple, as a list cannot be hashed
|
|
self.mocked_command_call_outputs[tuple(cmd)] = {
|
|
'stdout': stdout,
|
|
'stderr': None}
|
|
|
|
def full_path(self, path):
|
|
return path
|
|
|
|
|
|
@pytest.fixture
|
|
def actor_mocked(monkeypatch):
|
|
"""
|
|
Fixture providing a mocked actor that was already used to monkeypatch api.current_actor.
|
|
|
|
Introduced to reduce repetition inside tests.
|
|
"""
|
|
actor = CurrentActorMocked()
|
|
monkeypatch.setattr(api, 'current_actor', actor)
|
|
return actor
|
|
|
|
|
|
@pytest.fixture
|
|
def context_mocked():
|
|
return IsolatedActionsMocked()
|
|
|
|
|
|
def raise_call_error(args=None, exit_code=1):
|
|
raise CalledProcessError(
|
|
message='Command {0} failed with exit code {1}.'.format(str(args), exit_code),
|
|
command=args,
|
|
result={'signal': None, 'exit_code': exit_code, 'pid': 0, 'stdout': 'fake out', 'stderr': 'fake err'}
|
|
)
|
|
|
|
|
|
def _gen_repo(repoid):
|
|
return RepositoryData(repoid=repoid, name='name {}'.format(repoid))
|
|
|
|
|
|
def _gen_repofile(rfile, data=None):
|
|
if data is None:
|
|
data = [_gen_repo("{}-{}".format(rfile.split("/")[-1], i)) for i in range(3)]
|
|
return RepositoryFile(file=rfile, data=data)
|
|
|
|
|
|
@pytest.mark.parametrize('other_repofiles', [
|
|
[],
|
|
[_gen_repofile("foo")],
|
|
[_gen_repofile("foo"), _gen_repofile("bar")],
|
|
])
|
|
@pytest.mark.parametrize('rhsm_repofile', [
|
|
None,
|
|
_gen_repofile(rhsm._DEFAULT_RHSM_REPOFILE, []),
|
|
_gen_repofile(rhsm._DEFAULT_RHSM_REPOFILE, [_gen_repo("rh-0")]),
|
|
_gen_repofile(rhsm._DEFAULT_RHSM_REPOFILE),
|
|
])
|
|
def test_get_available_repo_ids(monkeypatch, other_repofiles, rhsm_repofile):
|
|
context_mocked = IsolatedActionsMocked()
|
|
repos = other_repofiles[:]
|
|
if rhsm_repofile:
|
|
repos.append(rhsm_repofile)
|
|
rhsm_repos = [repo.repoid for repo in rhsm_repofile.data] if rhsm_repofile else []
|
|
|
|
monkeypatch.setattr(api, 'current_logger', logger_mocked())
|
|
monkeypatch.setattr(rhsm, '_inhibit_on_duplicate_repos', lambda x: None)
|
|
monkeypatch.setattr(repofileutils, 'get_parsed_repofiles', lambda x: repos)
|
|
|
|
result = rhsm.get_available_repo_ids(context_mocked)
|
|
|
|
rhsm_repos.sort()
|
|
assert context_mocked.commands_called == [['yum', 'clean', 'all']]
|
|
assert result == rhsm_repos
|
|
if result:
|
|
msg = (
|
|
'The following repoids are available through RHSM:{0}{1}'
|
|
.format(LIST_SEPARATOR, LIST_SEPARATOR.join(rhsm_repos))
|
|
)
|
|
assert msg in api.current_logger.infomsg
|
|
else:
|
|
assert 'There are no repos available through RHSM.' in api.current_logger.infomsg
|
|
|
|
|
|
def test_get_available_repo_ids_error():
|
|
context_mocked = IsolatedActionsMocked(raise_err=True)
|
|
|
|
with pytest.raises(StopActorExecutionError) as err:
|
|
rhsm.get_available_repo_ids(context_mocked)
|
|
|
|
assert 'Unable to use yum' in str(err)
|
|
|
|
|
|
def test_inhibit_on_duplicate_repos(monkeypatch):
|
|
monkeypatch.setattr(reporting, 'create_report', create_report_mocked())
|
|
monkeypatch.setattr(api, 'current_logger', logger_mocked())
|
|
repofiles = [
|
|
_gen_repofile("foo", [_gen_repo('repoX'), _gen_repo('repoY')]),
|
|
_gen_repofile("bar", [_gen_repo('repoX')]),
|
|
]
|
|
|
|
rhsm._inhibit_on_duplicate_repos(repofiles)
|
|
|
|
dups = ['repoX']
|
|
assert ('The following repoids are defined multiple times:{0}{1}'
|
|
.format(LIST_SEPARATOR, LIST_SEPARATOR.join(dups))) in api.current_logger.warnmsg
|
|
assert reporting.create_report.called == 1
|
|
assert is_inhibitor(reporting.create_report.report_fields)
|
|
assert reporting.create_report.report_fields['title'] == 'A YUM/DNF repository defined multiple times'
|
|
summary = ('The following repositories are defined multiple times:{0}{1}'
|
|
.format(LIST_SEPARATOR, LIST_SEPARATOR.join(dups)))
|
|
assert summary in reporting.create_report.report_fields['summary']
|
|
|
|
|
|
def test_inhibit_on_duplicate_repos_no_dups(monkeypatch):
|
|
monkeypatch.setattr(reporting, 'create_report', create_report_mocked())
|
|
monkeypatch.setattr(api, 'current_logger', logger_mocked())
|
|
|
|
rhsm._inhibit_on_duplicate_repos([_gen_repofile("foo")])
|
|
|
|
assert not api.current_logger.warnmsg
|
|
assert reporting.create_report.called == 0
|
|
|
|
|
|
def test_sku_listing(monkeypatch, actor_mocked, context_mocked):
|
|
"""Tests whether the rhsm library can obtain used SKUs correctly."""
|
|
context_mocked.add_mocked_command_call_with_stdout(CMD_RHSM_LIST_CONSUMED, 'SKU: 598339696910')
|
|
|
|
attached_skus = rhsm.get_attached_skus(context_mocked)
|
|
|
|
assert_fail_description = 'Some calls to subscription-manager were expected.'
|
|
assert context_mocked.commands_called, assert_fail_description
|
|
|
|
assert_fail_description = 'RHSM command reported 1 SKU, however {0} were detected.'.format(
|
|
len(attached_skus)
|
|
)
|
|
assert len(attached_skus) == 1, assert_fail_description
|
|
|
|
assert_fail_description = 'The parsed SKU is different than the one contained in the mocked RHSM output.'
|
|
assert attached_skus[0] == '598339696910', assert_fail_description
|
|
|
|
|
|
def test_scanrhsminfo_with_skip_rhsm(monkeypatch, context_mocked):
|
|
"""Tests whether the scan_rhsm_info respects the LEAPP_NO_RHSM environmental variable."""
|
|
mocked_actor = CurrentActorMocked(envars={'LEAPP_NO_RHSM': '1'})
|
|
monkeypatch.setattr(api, 'current_actor', mocked_actor)
|
|
|
|
result = rhsm.scan_rhsm_info(context_mocked)
|
|
|
|
assert_fail_description = 'No external shell commands should be executed when RHSM is skipped.'
|
|
assert not context_mocked.commands_called, assert_fail_description
|
|
|
|
assert result is None, 'The `scan_rhsm_info` should not provide any output when RHSM is skipped.'
|
|
|
|
|
|
def test_get_release(monkeypatch, actor_mocked, context_mocked):
|
|
"""Tests whether the library correctly retrieves release from RHSM."""
|
|
context_mocked.add_mocked_command_call_with_stdout(CMD_RHSM_RELEASE, 'Release: 7.9')
|
|
|
|
release = rhsm.get_release(context_mocked)
|
|
|
|
assert release, 'No release information detected (but valid release info was provided).'
|
|
assert release == '7.9', 'Detected release is incorrect.'
|
|
|
|
|
|
def test_get_release_with_release_not_set(monkeypatch, actor_mocked, context_mocked):
|
|
"""Tests whether the library does not retrieve release information when the release is not set."""
|
|
# Test whether no release is detected correctly too
|
|
context_mocked.add_mocked_command_call_with_stdout(CMD_RHSM_RELEASE, 'Release not set')
|
|
|
|
release = rhsm.get_release(context_mocked)
|
|
|
|
fail_description = 'The release information was obtained, even if "No release set" was repored by rhsm.'
|
|
assert not release, fail_description
|
|
|
|
|
|
def test_is_manifest_sca_on_nonsca_system(monkeypatch, actor_mocked, context_mocked):
|
|
"""Tests whether the library obtains the SCA information correctly from a non-SCA system."""
|
|
context_mocked.add_mocked_command_call_with_stdout(CMD_RHSM_STATUS, RHSM_STATUS_OUTPUT_NOSCA)
|
|
|
|
is_sca = rhsm.is_manifest_sca(context_mocked)
|
|
assert not is_sca, 'SCA was detected on a non-SCA system.'
|
|
|
|
|
|
def test_is_manifest_sca_on_sca_system(monkeypatch, actor_mocked, context_mocked):
|
|
"""Tests whether the library obtains the SCA information from SCA system correctly."""
|
|
context_mocked.add_mocked_command_call_with_stdout(CMD_RHSM_STATUS, RHSM_STATUS_OUTPUT_SCA)
|
|
|
|
is_sca = rhsm.is_manifest_sca(context_mocked)
|
|
assert is_sca, 'Failed to detected SCA on a SCA system.'
|
|
|
|
|
|
def test_get_enabled_repo_ids(monkeypatch, actor_mocked, context_mocked):
|
|
"""Tests whether the library retrieves correct information about enabled repositories."""
|
|
# Prepare the (realistic) RHSM output
|
|
rhsm_list_enabled_output = '''
|
|
+----------------------------------------------------------+
|
|
Available Repositories in /etc/yum.repos.d/redhat.repo
|
|
+----------------------------------------------------------+
|
|
'''
|
|
|
|
for enabled_repository in RHSM_ENABLED_REPOS:
|
|
rhsm_output_fragment = 'Repo ID: {0}\n'.format(enabled_repository.id)
|
|
rhsm_output_fragment += 'Repo Name: {0}\n'.format(enabled_repository.name)
|
|
rhsm_output_fragment += 'Repo URL: {0}\n'.format(enabled_repository.url)
|
|
rhsm_output_fragment += 'Enabled: {0}\n'.format(enabled_repository.enabled)
|
|
rhsm_output_fragment += '\n'
|
|
rhsm_list_enabled_output += rhsm_output_fragment
|
|
|
|
context_mocked.add_mocked_command_call_with_stdout(CMD_RHSM_LIST_ENABLED_REPOS, rhsm_list_enabled_output)
|
|
|
|
enabled_repo_ids = rhsm.get_enabled_repo_ids(context_mocked)
|
|
|
|
fail_description = 'Failed to detected enabled repositories on the system.'
|
|
assert len(enabled_repo_ids) == 3, fail_description
|
|
|
|
fail_description = 'Failed to retrieve repository ID provided in the RHSM output.'
|
|
for enabled_repository in RHSM_ENABLED_REPOS:
|
|
assert enabled_repository.id in enabled_repo_ids, fail_description
|
|
|
|
|
|
def test_get_existing_product_certificates(monkeypatch, actor_mocked, context_mocked):
|
|
"""Verifies that the library is able to correctly retrieve existing product certificates."""
|
|
|
|
CERT_DIRS_LAYOUT = {
|
|
'/etc/pki/product': ['cert1', 'cert2'],
|
|
'/etc/pki/product-default': ['cert3']
|
|
}
|
|
|
|
def mocked_isdir(path):
|
|
if path in CERT_DIRS_LAYOUT:
|
|
return True
|
|
err_message = 'RHSM library should not gather info about additional dirs (attempted to isdir: {0}).'
|
|
raise ValueError(err_message.format(path))
|
|
|
|
def mocked_listdir(path):
|
|
if path in CERT_DIRS_LAYOUT:
|
|
return CERT_DIRS_LAYOUT[path]
|
|
err_message = 'RHSM library should not listdir additional dirs (attempted to listdir: {0}).'
|
|
raise ValueError(err_message.format(path))
|
|
|
|
def mocked_isfile(path):
|
|
if path in CERT_DIRS_LAYOUT:
|
|
# The certificate directories are not files
|
|
return False
|
|
|
|
basename = os.path.basename(path)
|
|
dirname = os.path.dirname(path)
|
|
if dirname in CERT_DIRS_LAYOUT:
|
|
return basename in CERT_DIRS_LAYOUT[dirname]
|
|
|
|
err_message = 'RHSM library should not isfile additional paths (attempted to isfile: {0}).'
|
|
raise ValueError(err_message.format(path))
|
|
|
|
monkeypatch.setattr(rhsm.os.path, 'isdir', mocked_isdir)
|
|
monkeypatch.setattr(rhsm.os, 'listdir', mocked_listdir)
|
|
monkeypatch.setattr(rhsm.os.path, 'isfile', mocked_isfile)
|
|
|
|
existing_product_certificates = rhsm.get_existing_product_certificates(context_mocked)
|
|
|
|
fail_description = 'Retrieved different number of certificates than expected.'
|
|
assert len(existing_product_certificates) == 3, fail_description
|
|
|
|
fail_description_bad_dir = 'Found certificate in unexpected path: {0}'
|
|
fail_description_bad_cert_file = 'Found certificate file that was not provided by mocked output: {0}'
|
|
for certificate_path in existing_product_certificates:
|
|
dirname = os.path.dirname(certificate_path)
|
|
basename = os.path.basename(certificate_path)
|
|
assert dirname in CERT_DIRS_LAYOUT, fail_description_bad_dir.format(certificate_path)
|
|
assert basename in CERT_DIRS_LAYOUT[dirname], fail_description_bad_cert_file.format(certificate_path)
|
|
|
|
|
|
def test_get_existing_product_certificates_missing_cert_directory(monkeypatch, actor_mocked, context_mocked):
|
|
"""Tests whether the library is able to retrieve certificates even if /etc/pki/product is missing."""
|
|
|
|
def mocked_isdir(path):
|
|
if path == '/etc/pki/product':
|
|
return False # Directory is missing
|
|
if path == '/etc/pki/product-default':
|
|
return True
|
|
|
|
err_msg = 'Tried to isdir a path that is not a part of the mocked paths. Path: {0}'
|
|
raise ValueError(err_msg.format(path))
|
|
|
|
def mocked_isfile(path):
|
|
if path == '/etc/pki/product-default/cert':
|
|
return True
|
|
|
|
err_msg = 'Tried to use isfile on a path that is not a part of the mocked paths. Path: {0}'
|
|
raise ValueError(err_msg.format(path))
|
|
|
|
def mocked_listdir(path):
|
|
if path == '/etc/pki/product-default':
|
|
return ['cert']
|
|
|
|
err_msg = 'Tried to use listdir on a path that is not a part of the mocked paths. Path: {0}'
|
|
raise ValueError(err_msg.format(path))
|
|
|
|
monkeypatch.setattr(rhsm.os.path, 'isdir', mocked_isdir)
|
|
monkeypatch.setattr(rhsm.os, 'listdir', mocked_listdir)
|
|
monkeypatch.setattr(rhsm.os.path, 'isfile', mocked_isfile)
|
|
|
|
existing_product_certificates = rhsm.get_existing_product_certificates(context_mocked)
|
|
|
|
fail_description = 'Library identified more certificates than there are in mocked outputs.'
|
|
assert len(existing_product_certificates) == 1, fail_description
|
|
fail_description = 'Library failed to identify certificate from mocked outputs.'
|
|
assert existing_product_certificates[0] == '/etc/pki/product-default/cert', fail_description
|