forked from Narcissus/pylibmeshctrl
Compare commits
2 Commits
fix/multip
...
fix/bad-au
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
fe4c2fe874 | ||
|
|
bb7cf17cd3 |
@@ -2,7 +2,9 @@ class MeshCtrlError(Exception):
|
|||||||
"""
|
"""
|
||||||
Base class for Meshctrl errors
|
Base class for Meshctrl errors
|
||||||
"""
|
"""
|
||||||
pass
|
def __init__(self, message, *args, **kwargs):
|
||||||
|
self.message = message
|
||||||
|
super().__init__(message, *args, **kwargs)
|
||||||
|
|
||||||
class ServerError(MeshCtrlError):
|
class ServerError(MeshCtrlError):
|
||||||
"""
|
"""
|
||||||
@@ -25,6 +27,7 @@ class FileTransferError(MeshCtrlError):
|
|||||||
"""
|
"""
|
||||||
def __init__(self, message, stats):
|
def __init__(self, message, stats):
|
||||||
self.stats = stats
|
self.stats = stats
|
||||||
|
super().__init__(message)
|
||||||
|
|
||||||
class FileTransferCancelled(FileTransferError):
|
class FileTransferCancelled(FileTransferError):
|
||||||
"""
|
"""
|
||||||
|
|||||||
@@ -1463,7 +1463,6 @@ class Session(object):
|
|||||||
result.setdefault(node, {})["complete"] = True
|
result.setdefault(node, {})["complete"] = True
|
||||||
if all(_["complete"] for key, _ in result.items()):
|
if all(_["complete"] for key, _ in result.items()):
|
||||||
break
|
break
|
||||||
continue
|
|
||||||
elif (event["value"].startswith("Run commands")):
|
elif (event["value"].startswith("Run commands")):
|
||||||
continue
|
continue
|
||||||
result[node]["result"].append(event["value"])
|
result[node]["result"].append(event["value"])
|
||||||
|
|||||||
@@ -140,17 +140,20 @@ def compare_dict(dict1, dict2):
|
|||||||
return False
|
return False
|
||||||
|
|
||||||
def _check_socket(f):
|
def _check_socket(f):
|
||||||
|
async def _check_errs(self):
|
||||||
|
if not self.alive and self._main_loop_error is not None:
|
||||||
|
raise self._main_loop_error
|
||||||
|
elif not self.alive and self.initialized.is_set():
|
||||||
|
raise exceptions.SocketError("Socket Closed")
|
||||||
|
|
||||||
@functools.wraps(f)
|
@functools.wraps(f)
|
||||||
async def wrapper(self, *args, **kwargs):
|
async def wrapper(self, *args, **kwargs):
|
||||||
try:
|
try:
|
||||||
async with asyncio.TaskGroup() as tg:
|
await asyncio.wait_for(self.initialized.wait(), 10)
|
||||||
tg.create_task(asyncio.wait_for(self.initialized.wait(), 10))
|
await _check_errs(self)
|
||||||
tg.create_task(asyncio.wait_for(self._socket_open.wait(), 10))
|
await asyncio.wait_for(self._socket_open.wait(), 10)
|
||||||
finally:
|
finally:
|
||||||
if not self.alive and self._main_loop_error is not None:
|
await _check_errs(self)
|
||||||
raise self._main_loop_error
|
|
||||||
elif not self.alive and self.initialized.is_set():
|
|
||||||
raise exceptions.SocketError("Socket Closed")
|
|
||||||
return await f(self, *args, **kwargs)
|
return await f(self, *args, **kwargs)
|
||||||
return wrapper
|
return wrapper
|
||||||
|
|
||||||
|
|||||||
@@ -5,6 +5,8 @@ import meshctrl
|
|||||||
import requests
|
import requests
|
||||||
import random
|
import random
|
||||||
import io
|
import io
|
||||||
|
import traceback
|
||||||
|
import time
|
||||||
thisdir = os.path.dirname(os.path.realpath(__file__))
|
thisdir = os.path.dirname(os.path.realpath(__file__))
|
||||||
|
|
||||||
async def test_admin(env):
|
async def test_admin(env):
|
||||||
@@ -77,6 +79,17 @@ async def test_users(env):
|
|||||||
pass
|
pass
|
||||||
else:
|
else:
|
||||||
raise Exception("Connected with no password")
|
raise Exception("Connected with no password")
|
||||||
|
|
||||||
|
start = time.time()
|
||||||
|
try:
|
||||||
|
async with meshctrl.Session(env.mcurl, user="admin", password="The wrong password", ignore_ssl=True) as admin_session:
|
||||||
|
pass
|
||||||
|
except* meshctrl.exceptions.ServerError as eg:
|
||||||
|
assert str(eg.exceptions[0]) == "Invalid Auth" or eg.exceptions[0].message == "Invalid Auth", "Didn't get invalid auth message"
|
||||||
|
assert time.time() - start < 10, "Invalid auth wasn't raised until after timeout"
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
raise Exception("Connected with bad password")
|
||||||
async with meshctrl.Session(env.mcurl+"/", user="admin", password=env.users["admin"], ignore_ssl=True) as admin_session,\
|
async with meshctrl.Session(env.mcurl+"/", user="admin", password=env.users["admin"], ignore_ssl=True) as admin_session,\
|
||||||
meshctrl.Session(env.mcurl, user="privileged", password=env.users["privileged"], ignore_ssl=True) as privileged_session,\
|
meshctrl.Session(env.mcurl, user="privileged", password=env.users["privileged"], ignore_ssl=True) as privileged_session,\
|
||||||
meshctrl.Session(env.mcurl, user="unprivileged", password=env.users["unprivileged"], ignore_ssl=True) as unprivileged_session:
|
meshctrl.Session(env.mcurl, user="unprivileged", password=env.users["unprivileged"], ignore_ssl=True) as unprivileged_session:
|
||||||
@@ -187,22 +200,21 @@ async def test_mesh_device(env):
|
|||||||
|
|
||||||
assert r[0].description == "New description", "Description either failed to change, or was changed by a user without permission to do so"
|
assert r[0].description == "New description", "Description either failed to change, or was changed by a user without permission to do so"
|
||||||
|
|
||||||
with env.create_agent(mesh.short_meshid) as agent,\
|
with env.create_agent(mesh.short_meshid) as agent:
|
||||||
env.create_agent(mesh.short_meshid) as agent2:
|
|
||||||
# Test agent added to device group being propagated correctly
|
# Test agent added to device group being propagated correctly
|
||||||
# Create agent isn't so good at waiting for the agent to show in the sessions. Give it a couple seconds to appear.
|
# Create agent isn't so good at waiting for the agent to show in the sessions. Give it a couple seconds to appear.
|
||||||
for i in range(3):
|
for i in range(3):
|
||||||
try:
|
try:
|
||||||
r = await admin_session.list_devices(timeout=10)
|
r = await admin_session.list_devices(timeout=10)
|
||||||
print("\ninfo list_devices: {}\n".format(r))
|
print("\ninfo list_devices: {}\n".format(r))
|
||||||
assert len(r) == 2, "Incorrect number of agents connected"
|
assert len(r) == 1, "Incorrect number of agents connected"
|
||||||
except:
|
except:
|
||||||
if i == 2:
|
if i == 2:
|
||||||
raise
|
raise
|
||||||
await asyncio.sleep(1)
|
await asyncio.sleep(1)
|
||||||
else:
|
else:
|
||||||
break
|
break
|
||||||
assert len(await privileged_session.list_devices(timeout=10)) == 2, "Incorrect number of agents connected"
|
assert len(await privileged_session.list_devices(timeout=10)) == 1, "Incorrect number of agents connected"
|
||||||
assert len(await unprivileged_session.list_devices(timeout=10)) == 0, "Unprivileged account has access to agent it should not"
|
assert len(await unprivileged_session.list_devices(timeout=10)) == 0, "Unprivileged account has access to agent it should not"
|
||||||
|
|
||||||
r = await admin_session.list_devices(details=True, timeout=10)
|
r = await admin_session.list_devices(details=True, timeout=10)
|
||||||
@@ -222,12 +234,9 @@ async def test_mesh_device(env):
|
|||||||
assert await admin_session.edit_device(agent.nodeid, consent=meshctrl.constants.ConsentFlags.none, timeout=10), "Failed to edit device info"
|
assert await admin_session.edit_device(agent.nodeid, consent=meshctrl.constants.ConsentFlags.none, timeout=10), "Failed to edit device info"
|
||||||
|
|
||||||
# Test run_commands
|
# Test run_commands
|
||||||
r = await admin_session.run_command([agent.nodeid, agent2.nodeid], "ls", timeout=10)
|
r = await admin_session.run_command(agent.nodeid, "ls", timeout=10)
|
||||||
print("\ninfo run_command: {}\n".format(r))
|
print("\ninfo run_command: {}\n".format(r))
|
||||||
assert "meshagent" in r[agent.nodeid]["result"], "ls gave incorrect data"
|
assert "meshagent" in r[agent.nodeid]["result"], "ls gave incorrect data"
|
||||||
assert "meshagent" in r[agent2.nodeid]["result"], "ls gave incorrect data"
|
|
||||||
assert "Run commands completed." not in r[agent.nodeid]["result"], "Didn't parse run command ending correctly"
|
|
||||||
assert "Run commands completed." not in r[agent2.nodeid]["result"], "Didn't parse run command ending correctly"
|
|
||||||
assert "meshagent" in (await privileged_session.run_command(agent.nodeid, "ls", timeout=10))[agent.nodeid]["result"], "ls gave incorrect data"
|
assert "meshagent" in (await privileged_session.run_command(agent.nodeid, "ls", timeout=10))[agent.nodeid]["result"], "ls gave incorrect data"
|
||||||
|
|
||||||
# Test run commands with ndividual device permissions
|
# Test run commands with ndividual device permissions
|
||||||
|
|||||||
Reference in New Issue
Block a user