mirror of
https://github.com/certbot/certbot.git
synced 2026-02-26 11:20:36 -05:00
* Isort execution * Fix pylint, adapt coverage * New isort * Fix magic_typing lint * Second round * Fix pylint * Third round. Store isort configuration * Fix latest mistakes * Other fixes * Add newline * Fix lint errors
161 lines
5.6 KiB
Python
161 lines
5.6 KiB
Python
"""This module contains advanced assertions for the certbot integration tests."""
|
|
import os
|
|
|
|
try:
|
|
import grp
|
|
POSIX_MODE = True
|
|
except ImportError:
|
|
import win32api
|
|
import win32security
|
|
import ntsecuritycon
|
|
POSIX_MODE = False
|
|
|
|
EVERYBODY_SID = 'S-1-1-0'
|
|
SYSTEM_SID = 'S-1-5-18'
|
|
ADMINS_SID = 'S-1-5-32-544'
|
|
|
|
|
|
def assert_hook_execution(probe_path, probe_content):
|
|
"""
|
|
Assert that a certbot hook has been executed
|
|
:param probe_path: path to the file that received the hook output
|
|
:param probe_content: content expected when the hook is executed
|
|
"""
|
|
with open(probe_path, 'r') as file:
|
|
data = file.read()
|
|
|
|
lines = [line.strip() for line in data.splitlines()]
|
|
assert probe_content in lines
|
|
|
|
|
|
def assert_saved_renew_hook(config_dir, lineage):
|
|
"""
|
|
Assert that the renew hook configuration of a lineage has been saved.
|
|
:param config_dir: location of the certbot configuration
|
|
:param lineage: lineage domain name
|
|
"""
|
|
with open(os.path.join(config_dir, 'renewal', '{0}.conf'.format(lineage))) as file_h:
|
|
assert 'renew_hook' in file_h.read()
|
|
|
|
|
|
def assert_cert_count_for_lineage(config_dir, lineage, count):
|
|
"""
|
|
Assert the number of certificates generated for a lineage.
|
|
:param config_dir: location of the certbot configuration
|
|
:param lineage: lineage domain name
|
|
:param count: number of expected certificates
|
|
"""
|
|
archive_dir = os.path.join(config_dir, 'archive')
|
|
lineage_dir = os.path.join(archive_dir, lineage)
|
|
certs = [file for file in os.listdir(lineage_dir) if file.startswith('cert')]
|
|
assert len(certs) == count
|
|
|
|
|
|
def assert_equals_group_permissions(file1, file2):
|
|
"""
|
|
Assert that two files have the same permissions for group owner.
|
|
:param file1: first file path to compare
|
|
:param file2: second file path to compare
|
|
"""
|
|
# On Windows there is no group, so this assertion does nothing on this platform
|
|
if POSIX_MODE:
|
|
mode_file1 = os.stat(file1).st_mode & 0o070
|
|
mode_file2 = os.stat(file2).st_mode & 0o070
|
|
|
|
assert mode_file1 == mode_file2
|
|
|
|
|
|
def assert_equals_world_read_permissions(file1, file2):
|
|
"""
|
|
Assert that two files have the same read permissions for everyone.
|
|
:param file1: first file path to compare
|
|
:param file2: second file path to compare
|
|
"""
|
|
if POSIX_MODE:
|
|
mode_file1 = os.stat(file1).st_mode & 0o004
|
|
mode_file2 = os.stat(file2).st_mode & 0o004
|
|
else:
|
|
everybody = win32security.ConvertStringSidToSid(EVERYBODY_SID)
|
|
|
|
security1 = win32security.GetFileSecurity(file1, win32security.DACL_SECURITY_INFORMATION)
|
|
dacl1 = security1.GetSecurityDescriptorDacl()
|
|
|
|
mode_file1 = dacl1.GetEffectiveRightsFromAcl({
|
|
'TrusteeForm': win32security.TRUSTEE_IS_SID,
|
|
'TrusteeType': win32security.TRUSTEE_IS_USER,
|
|
'Identifier': everybody,
|
|
})
|
|
mode_file1 = mode_file1 & ntsecuritycon.FILE_GENERIC_READ
|
|
|
|
security2 = win32security.GetFileSecurity(file2, win32security.DACL_SECURITY_INFORMATION)
|
|
dacl2 = security2.GetSecurityDescriptorDacl()
|
|
|
|
mode_file2 = dacl2.GetEffectiveRightsFromAcl({
|
|
'TrusteeForm': win32security.TRUSTEE_IS_SID,
|
|
'TrusteeType': win32security.TRUSTEE_IS_USER,
|
|
'Identifier': everybody,
|
|
})
|
|
mode_file2 = mode_file2 & ntsecuritycon.FILE_GENERIC_READ
|
|
|
|
assert mode_file1 == mode_file2
|
|
|
|
|
|
def assert_equals_group_owner(file1, file2):
|
|
"""
|
|
Assert that two files have the same group owner.
|
|
:param file1: first file path to compare
|
|
:param file2: second file path to compare
|
|
"""
|
|
# On Windows there is no group, so this assertion does nothing on this platform
|
|
if POSIX_MODE:
|
|
group_owner_file1 = grp.getgrgid(os.stat(file1).st_gid)[0]
|
|
group_owner_file2 = grp.getgrgid(os.stat(file2).st_gid)[0]
|
|
|
|
assert group_owner_file1 == group_owner_file2
|
|
|
|
|
|
def assert_world_no_permissions(file):
|
|
"""
|
|
Assert that the given file is not world-readable.
|
|
:param file: path of the file to check
|
|
"""
|
|
if POSIX_MODE:
|
|
mode_file_all = os.stat(file).st_mode & 0o007
|
|
assert mode_file_all == 0
|
|
else:
|
|
security = win32security.GetFileSecurity(file, win32security.DACL_SECURITY_INFORMATION)
|
|
dacl = security.GetSecurityDescriptorDacl()
|
|
mode = dacl.GetEffectiveRightsFromAcl({
|
|
'TrusteeForm': win32security.TRUSTEE_IS_SID,
|
|
'TrusteeType': win32security.TRUSTEE_IS_USER,
|
|
'Identifier': win32security.ConvertStringSidToSid(EVERYBODY_SID),
|
|
})
|
|
|
|
assert not mode
|
|
|
|
|
|
def assert_world_read_permissions(file):
|
|
"""
|
|
Assert that the given file is world-readable, but not world-writable or world-executable.
|
|
:param file: path of the file to check
|
|
"""
|
|
if POSIX_MODE:
|
|
mode_file_all = os.stat(file).st_mode & 0o007
|
|
assert mode_file_all == 4
|
|
else:
|
|
security = win32security.GetFileSecurity(file, win32security.DACL_SECURITY_INFORMATION)
|
|
dacl = security.GetSecurityDescriptorDacl()
|
|
mode = dacl.GetEffectiveRightsFromAcl({
|
|
'TrusteeForm': win32security.TRUSTEE_IS_SID,
|
|
'TrusteeType': win32security.TRUSTEE_IS_USER,
|
|
'Identifier': win32security.ConvertStringSidToSid(EVERYBODY_SID),
|
|
})
|
|
|
|
assert not mode & ntsecuritycon.FILE_GENERIC_WRITE
|
|
assert not mode & ntsecuritycon.FILE_GENERIC_EXECUTE
|
|
assert mode & ntsecuritycon.FILE_GENERIC_READ == ntsecuritycon.FILE_GENERIC_READ
|
|
|
|
|
|
def _get_current_user():
|
|
account_name = win32api.GetUserNameEx(win32api.NameSamCompatible)
|
|
return win32security.LookupAccountName(None, account_name)[0]
|