123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111 |
- """Test perms"""
- import os
- import warnings
- import pytest
- @pytest.mark.parametrize('autoperms', ['notest', 'unset', 'true', 'false'])
- @pytest.mark.usefixtures('ds1_copy')
- def test_perms(runner, yadm_y, paths, ds1, autoperms):
- """Test perms"""
- # set the value of auto-perms
- if autoperms != 'notest':
- if autoperms != 'unset':
- os.system(' '.join(yadm_y('config', 'yadm.auto-perms', autoperms)))
- # privatepaths will hold all paths that should become secured
- privatepaths = [paths.work.join('.ssh'), paths.work.join('.gnupg')]
- privatepaths += [paths.work.join(private.path) for private in ds1.private]
- # create an archive file
- os.system(f'touch "{str(paths.archive)}"')
- privatepaths.append(paths.archive)
- # create encrypted file test data
- efile1 = paths.work.join('efile1')
- efile1.write('efile1')
- efile2 = paths.work.join('efile2')
- efile2.write('efile2')
- paths.encrypt.write('efile1\nefile2\n!efile1\n')
- insecurepaths = [efile1]
- privatepaths.append(efile2)
- # assert these paths begin unsecured
- for private in privatepaths + insecurepaths:
- assert not oct(private.stat().mode).endswith('00'), (
- 'Path started secured')
- cmd = 'perms'
- if autoperms != 'notest':
- cmd = 'status'
- run = runner(yadm_y(cmd))
- assert run.success
- assert run.err == ''
- if cmd == 'perms':
- assert run.out == ''
- # these paths should be secured if processing perms
- for private in privatepaths:
- if '.p2' in private.basename or '.p4' in private.basename:
- # Dot files within .ssh/.gnupg are not protected.
- # This is a but which must be fixed
- warnings.warn('Unhandled bug: private dot files', Warning)
- continue
- if autoperms == 'false':
- assert not oct(private.stat().mode).endswith('00'), (
- 'Path should not be secured')
- else:
- assert oct(private.stat().mode).endswith('00'), (
- 'Path has not been secured')
- # these paths should never be secured
- for private in insecurepaths:
- assert not oct(private.stat().mode).endswith('00'), (
- 'Path should not be secured')
- @pytest.mark.parametrize('sshperms', [None, 'true', 'false'])
- @pytest.mark.parametrize('gpgperms', [None, 'true', 'false'])
- @pytest.mark.usefixtures('ds1_copy')
- def test_perms_control(runner, yadm_y, paths, ds1, sshperms, gpgperms):
- """Test fine control of perms"""
- # set the value of ssh-perms
- if sshperms:
- os.system(' '.join(yadm_y('config', 'yadm.ssh-perms', sshperms)))
- # set the value of gpg-perms
- if gpgperms:
- os.system(' '.join(yadm_y('config', 'yadm.gpg-perms', gpgperms)))
- # privatepaths will hold all paths that should become secured
- privatepaths = [paths.work.join('.ssh'), paths.work.join('.gnupg')]
- privatepaths += [paths.work.join(private.path) for private in ds1.private]
- # assert these paths begin unsecured
- for private in privatepaths:
- assert not oct(private.stat().mode).endswith('00'), (
- 'Path started secured')
- run = runner(yadm_y('perms'))
- assert run.success
- assert run.err == ''
- assert run.out == ''
- # these paths should be secured if processing perms
- for private in privatepaths:
- if '.p2' in private.basename or '.p4' in private.basename:
- # Dot files within .ssh/.gnupg are not protected.
- # This is a but which must be fixed
- warnings.warn('Unhandled bug: private dot files', Warning)
- continue
- if (
- (sshperms == 'false' and 'ssh' in str(private))
- or
- (gpgperms == 'false' and 'gnupg' in str(private))
- ):
- assert not oct(private.stat().mode).endswith('00'), (
- 'Path should not be secured')
- else:
- assert oct(private.stat().mode).endswith('00'), (
- 'Path has not been secured')
|