issue #410: support sudo --user and SELinux options, add stub test.

issue260
David Wilson 6 years ago
parent 0d410aef51
commit fadb9181bc

@ -717,6 +717,10 @@ Router Class
:param bool preserve_env: :param bool preserve_env:
If :data:`True`, request ``sudo`` to preserve the environment of If :data:`True`, request ``sudo`` to preserve the environment of
the parent process. the parent process.
:param str selinux_type:
If not :data:`None`, the SELinux security context to use.
:param str selinux_role:
If not :data:`None`, the SELinux role to use.
:param list sudo_args: :param list sudo_args:
Arguments in the style of :data:`sys.argv` that would normally Arguments in the style of :data:`sys.argv` that would normally
be passed to ``sudo``. The arguments are parsed in-process to set be passed to ``sudo``. The arguments are parsed in-process to set

@ -55,7 +55,10 @@ SUDO_OPTIONS = [
#(False, 'bool', '--list', '-l') #(False, 'bool', '--list', '-l')
#(False, 'bool', '--preserve-groups', '-P') #(False, 'bool', '--preserve-groups', '-P')
#(False, 'str', '--prompt', '-p') #(False, 'str', '--prompt', '-p')
#(False, 'str', '--role', '-r')
# SELinux options. Passed through as-is.
(False, 'str', '--role', '-r'),
(False, 'str', '--type', '-t'),
# These options are supplied by default by Ansible, but are ignored, as # These options are supplied by default by Ansible, but are ignored, as
# sudo always runs under a TTY with Mitogen. # sudo always runs under a TTY with Mitogen.
@ -63,9 +66,8 @@ SUDO_OPTIONS = [
(True, 'bool', '--non-interactive', '-n'), (True, 'bool', '--non-interactive', '-n'),
#(False, 'str', '--shell', '-s') #(False, 'str', '--shell', '-s')
#(False, 'str', '--type', '-t')
#(False, 'str', '--other-user', '-U') #(False, 'str', '--other-user', '-U')
#(False, 'str', '--user', '-u') (False, 'str', '--user', '-u'),
#(False, 'bool', '--version', '-V') #(False, 'bool', '--version', '-V')
#(False, 'bool', '--validate', '-v') #(False, 'bool', '--validate', '-v')
] ]
@ -103,6 +105,13 @@ class PasswordError(mitogen.core.StreamError):
pass pass
def option(default, *args):
for arg in args:
if arg is not None:
return arg
return default
class Stream(mitogen.parent.Stream): class Stream(mitogen.parent.Stream):
create_child = staticmethod(mitogen.parent.hybrid_tty_create_child) create_child = staticmethod(mitogen.parent.hybrid_tty_create_child)
child_is_immediate_subprocess = False child_is_immediate_subprocess = False
@ -118,24 +127,24 @@ class Stream(mitogen.parent.Stream):
set_home = False set_home = False
login = False login = False
selinux_role = None
selinux_type = None
def construct(self, username=None, sudo_path=None, password=None, def construct(self, username=None, sudo_path=None, password=None,
preserve_env=None, set_home=None, sudo_args=None, preserve_env=None, set_home=None, sudo_args=None,
login=None, **kwargs): login=None, selinux_role=None, selinux_type=None, **kwargs):
super(Stream, self).construct(**kwargs) super(Stream, self).construct(**kwargs)
opts = parse_sudo_flags(sudo_args or []) opts = parse_sudo_flags(sudo_args or [])
if username is not None: self.username = option(self.username, username, opts.user)
self.username = username self.sudo_path = option(self.sudo_path, sudo_path)
if sudo_path is not None: self.password = password or None
self.sudo_path = sudo_path self.preserve_env = option(self.preserve_env,
if password is not None: preserve_env, opts.preserve_env)
self.password = password self.set_home = option(self.set_home, set_home, opts.set_home)
if (preserve_env or opts.preserve_env) is not None: self.login = option(self.login, login, opts.login)
self.preserve_env = preserve_env or opts.preserve_env self.selinux_role = option(self.selinux_role, selinux_role, opts.role)
if (set_home or opts.set_home) is not None: self.selinux_type = option(self.selinux_type, selinux_type, opts.type)
self.set_home = set_home or opts.set_home
if (login or opts.login) is not None:
self.login = True
def connect(self): def connect(self):
super(Stream, self).connect() super(Stream, self).connect()
@ -156,8 +165,12 @@ class Stream(mitogen.parent.Stream):
bits += ['-H'] bits += ['-H']
if self.login: if self.login:
bits += ['-i'] bits += ['-i']
if self.selinux_role:
bits += ['-r', self.selinux_role]
if self.selinux_type:
bits += ['-t', self.selinux_type]
bits = bits + super(Stream, self).get_boot_command() bits = bits + ['--'] + super(Stream, self).get_boot_command()
LOG.debug('sudo command line: %r', bits) LOG.debug('sudo command line: %r', bits)
return bits return bits

@ -0,0 +1,60 @@
import os
import mitogen
import mitogen.lxd
import mitogen.parent
import unittest2
import testlib
class ConstructorTest(testlib.RouterMixin, testlib.TestCase):
sudo_path = testlib.data_path('stubs/stub-sudo.py')
def run_sudo(self, **kwargs):
context = self.router.sudo(
sudo_path=self.sudo_path,
**kwargs
)
argv = eval(context.call(os.getenv, 'ORIGINAL_ARGV'))
return context, argv
def test_basic(self):
context, argv = self.run_sudo()
self.assertEquals(argv[:4], [
self.sudo_path,
'-u', 'root',
'--'
])
def test_selinux_type_role(self):
context, argv = self.run_sudo(
selinux_type='setype',
selinux_role='serole',
)
self.assertEquals(argv[:8], [
self.sudo_path,
'-u', 'root',
'-r', 'serole',
'-t', 'setype',
'--'
])
def test_reparse_args(self):
context, argv = self.run_sudo(
sudo_args=['--type', 'setype', '--role', 'serole', '--user', 'user']
)
self.assertEquals(argv[:8], [
self.sudo_path,
'-u', 'user',
'-r', 'serole',
'-t', 'setype',
'--'
])
if __name__ == '__main__':
unittest2.main()
Loading…
Cancel
Save