mirror of
https://github.com/ansible/awx.git
synced 2026-02-27 15:58:45 -03:30
Merge pull request #170 from chrismeyersfsu/fix-job_template_extra_vars
Fix job template passwords
This commit is contained in:
@@ -1775,13 +1775,14 @@ class JobLaunchSerializer(BaseSerializer):
|
|||||||
passwords = self.context.get('passwords')
|
passwords = self.context.get('passwords')
|
||||||
data = self.context.get('data')
|
data = self.context.get('data')
|
||||||
|
|
||||||
|
credential = attrs.get('credential', None) or obj.credential
|
||||||
# fill passwords dict with request data passwords
|
# fill passwords dict with request data passwords
|
||||||
if obj.passwords_needed_to_start:
|
if credential and credential.passwords_needed:
|
||||||
try:
|
try:
|
||||||
for p in obj.passwords_needed_to_start:
|
for p in credential.passwords_needed:
|
||||||
passwords[p] = data.get(p)
|
passwords[p] = data[p]
|
||||||
except KeyError:
|
except KeyError:
|
||||||
raise serializers.ValidationError(obj.passwords_needed_to_start)
|
raise serializers.ValidationError(credential.passwords_needed)
|
||||||
return attrs
|
return attrs
|
||||||
|
|
||||||
def validate(self, attrs):
|
def validate(self, attrs):
|
||||||
|
|||||||
@@ -114,7 +114,7 @@ class AdHocCommand(UnifiedJob):
|
|||||||
@property
|
@property
|
||||||
def passwords_needed_to_start(self):
|
def passwords_needed_to_start(self):
|
||||||
'''Return list of password field names needed to start the job.'''
|
'''Return list of password field names needed to start the job.'''
|
||||||
if self.credential:
|
if self.credential and self.credential.active:
|
||||||
return self.credential.passwords_needed
|
return self.credential.passwords_needed
|
||||||
else:
|
else:
|
||||||
return []
|
return []
|
||||||
|
|||||||
@@ -141,7 +141,7 @@ class JobOptions(BaseModel):
|
|||||||
@property
|
@property
|
||||||
def passwords_needed_to_start(self):
|
def passwords_needed_to_start(self):
|
||||||
'''Return list of password field names needed to start the job.'''
|
'''Return list of password field names needed to start the job.'''
|
||||||
if self.credential:
|
if self.credential and self.credential.active:
|
||||||
return self.credential.passwords_needed
|
return self.credential.passwords_needed
|
||||||
else:
|
else:
|
||||||
return []
|
return []
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
from __future__ import absolute_import
|
from __future__ import absolute_import
|
||||||
|
|
||||||
from .jobs_monolithic import * # noqa
|
from .jobs_monolithic import * # noqa
|
||||||
|
from .job_launch import * # noqa
|
||||||
from .survey_password import * # noqa
|
from .survey_password import * # noqa
|
||||||
from .start_cancel import * # noqa
|
from .start_cancel import * # noqa
|
||||||
from .base import * # noqa
|
from .base import * # noqa
|
||||||
|
|||||||
@@ -264,6 +264,21 @@ class BaseJobTestMixin(BaseTestMixin):
|
|||||||
password=TEST_SSH_KEY_DATA,
|
password=TEST_SSH_KEY_DATA,
|
||||||
created_by=self.user_sue,
|
created_by=self.user_sue,
|
||||||
)
|
)
|
||||||
|
self.cred_sue_ask = self.user_sue.credentials.create(
|
||||||
|
username='sue',
|
||||||
|
password='ASK',
|
||||||
|
created_by=self.user_sue,
|
||||||
|
)
|
||||||
|
self.cred_sue_ask_many = self.user_sue.credentials.create(
|
||||||
|
username='sue',
|
||||||
|
password='ASK',
|
||||||
|
become_method='sudo',
|
||||||
|
become_username='root',
|
||||||
|
become_password='ASK',
|
||||||
|
ssh_key_data=TEST_SSH_KEY_DATA_LOCKED,
|
||||||
|
ssh_key_unlock='ASK',
|
||||||
|
created_by=self.user_sue,
|
||||||
|
)
|
||||||
self.cred_bob = self.user_bob.credentials.create(
|
self.cred_bob = self.user_bob.credentials.create(
|
||||||
username='bob',
|
username='bob',
|
||||||
password='ASK',
|
password='ASK',
|
||||||
|
|||||||
191
awx/main/tests/jobs/job_launch.py
Normal file
191
awx/main/tests/jobs/job_launch.py
Normal file
@@ -0,0 +1,191 @@
|
|||||||
|
# Copyright (c) 2015 Ansible, Inc.
|
||||||
|
# All Rights Reserved
|
||||||
|
|
||||||
|
# Python
|
||||||
|
from __future__ import absolute_import
|
||||||
|
|
||||||
|
# Django
|
||||||
|
import django
|
||||||
|
from django.core.urlresolvers import reverse
|
||||||
|
|
||||||
|
# AWX
|
||||||
|
from awx.main.models import * # noqa
|
||||||
|
from .base import BaseJobTestMixin
|
||||||
|
|
||||||
|
__all__ = ['JobTemplateLaunchTest', 'JobTemplateLaunchPasswordsTest']
|
||||||
|
|
||||||
|
class JobTemplateLaunchTest(BaseJobTestMixin, django.test.TestCase):
|
||||||
|
def setUp(self):
|
||||||
|
super(JobTemplateLaunchTest, self).setUp()
|
||||||
|
|
||||||
|
self.url = reverse('api:job_template_list')
|
||||||
|
self.data = dict(
|
||||||
|
name = 'launched job template',
|
||||||
|
job_type = PERM_INVENTORY_DEPLOY,
|
||||||
|
inventory = self.inv_eng.pk,
|
||||||
|
project = self.proj_dev.pk,
|
||||||
|
credential = self.cred_sue.pk,
|
||||||
|
playbook = self.proj_dev.playbooks[0],
|
||||||
|
)
|
||||||
|
self.data_no_cred = dict(
|
||||||
|
name = 'launched job template no credential',
|
||||||
|
job_type = PERM_INVENTORY_DEPLOY,
|
||||||
|
inventory = self.inv_eng.pk,
|
||||||
|
project = self.proj_dev.pk,
|
||||||
|
playbook = self.proj_dev.playbooks[0],
|
||||||
|
)
|
||||||
|
self.data_cred_ask = dict(self.data)
|
||||||
|
self.data_cred_ask['name'] = 'launched job templated with ask passwords'
|
||||||
|
self.data_cred_ask['credential'] = self.cred_sue_ask.pk
|
||||||
|
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.url, self.data, expect=201)
|
||||||
|
self.launch_url = reverse('api:job_template_launch',
|
||||||
|
args=(response['id'],))
|
||||||
|
|
||||||
|
def test_launch_job_template(self):
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.data['name'] = 'something different'
|
||||||
|
response = self.post(self.url, self.data, expect=201)
|
||||||
|
detail_url = reverse('api:job_template_detail',
|
||||||
|
args=(response['id'],))
|
||||||
|
self.assertEquals(response['url'], detail_url)
|
||||||
|
|
||||||
|
def test_no_cred_update_template(self):
|
||||||
|
# You can still post the job template without a credential, just can't launch it without one
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.url, self.data_no_cred, expect=201)
|
||||||
|
detail_url = reverse('api:job_template_detail',
|
||||||
|
args=(response['id'],))
|
||||||
|
self.assertEquals(response['url'], detail_url)
|
||||||
|
|
||||||
|
def test_invalid_auth_unauthorized(self):
|
||||||
|
# Invalid auth can't trigger the launch endpoint
|
||||||
|
self.check_invalid_auth(self.launch_url, {}, methods=('post',))
|
||||||
|
|
||||||
|
def test_credential_implicit(self):
|
||||||
|
# Implicit, attached credentials
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.launch_url, {}, expect=202)
|
||||||
|
j = Job.objects.get(pk=response['job'])
|
||||||
|
self.assertTrue(j.status == 'new')
|
||||||
|
|
||||||
|
def test_credential_explicit(self):
|
||||||
|
# Explicit, credential
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.cred_sue.mark_inactive()
|
||||||
|
response = self.post(self.launch_url, {'credential': self.cred_doug.pk}, expect=202)
|
||||||
|
j = Job.objects.get(pk=response['job'])
|
||||||
|
self.assertEqual(j.status, 'new')
|
||||||
|
self.assertEqual(j.credential.pk, self.cred_doug.pk)
|
||||||
|
|
||||||
|
def test_credential_explicit_via_credential_id(self):
|
||||||
|
# Explicit, credential
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.cred_sue.mark_inactive()
|
||||||
|
response = self.post(self.launch_url, {'credential_id': self.cred_doug.pk}, expect=202)
|
||||||
|
j = Job.objects.get(pk=response['job'])
|
||||||
|
self.assertEqual(j.status, 'new')
|
||||||
|
self.assertEqual(j.credential.pk, self.cred_doug.pk)
|
||||||
|
|
||||||
|
def test_credential_override(self):
|
||||||
|
# Explicit, credential
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.launch_url, {'credential': self.cred_doug.pk}, expect=202)
|
||||||
|
j = Job.objects.get(pk=response['job'])
|
||||||
|
self.assertEqual(j.status, 'new')
|
||||||
|
self.assertEqual(j.credential.pk, self.cred_doug.pk)
|
||||||
|
|
||||||
|
def test_credential_override_via_credential_id(self):
|
||||||
|
# Explicit, credential
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.launch_url, {'credential_id': self.cred_doug.pk}, expect=202)
|
||||||
|
j = Job.objects.get(pk=response['job'])
|
||||||
|
self.assertEqual(j.status, 'new')
|
||||||
|
self.assertEqual(j.credential.pk, self.cred_doug.pk)
|
||||||
|
|
||||||
|
def test_bad_credential_launch_fail(self):
|
||||||
|
# Can't launch a job template without a credential defined (or if we
|
||||||
|
# pass an invalid/inactive credential value).
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.cred_sue.mark_inactive()
|
||||||
|
self.post(self.launch_url, {}, expect=400)
|
||||||
|
self.post(self.launch_url, {'credential': 0}, expect=400)
|
||||||
|
self.post(self.launch_url, {'credential_id': 0}, expect=400)
|
||||||
|
self.post(self.launch_url, {'credential': 'one'}, expect=400)
|
||||||
|
self.post(self.launch_url, {'credential_id': 'one'}, expect=400)
|
||||||
|
self.cred_doug.mark_inactive()
|
||||||
|
self.post(self.launch_url, {'credential': self.cred_doug.pk}, expect=400)
|
||||||
|
self.post(self.launch_url, {'credential_id': self.cred_doug.pk}, expect=400)
|
||||||
|
|
||||||
|
def test_no_project_fail(self):
|
||||||
|
# Job Templates without projects can not be launched
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.data['name'] = "missing proj"
|
||||||
|
response = self.post(self.url, self.data, expect=201)
|
||||||
|
jt = JobTemplate.objects.get(pk=response['id'])
|
||||||
|
jt.project = None
|
||||||
|
jt.save()
|
||||||
|
launch_url2 = reverse('api:job_template_launch',
|
||||||
|
args=(response['id'],))
|
||||||
|
self.post(launch_url2, {}, expect=400)
|
||||||
|
|
||||||
|
def test_no_inventory_fail(self):
|
||||||
|
# Job Templates without inventory can not be launched
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.data['name'] = "missing inv"
|
||||||
|
response = self.post(self.url, self.data, expect=201)
|
||||||
|
jt = JobTemplate.objects.get(pk=response['id'])
|
||||||
|
jt.inventory = None
|
||||||
|
jt.save()
|
||||||
|
launch_url3 = reverse('api:job_template_launch',
|
||||||
|
args=(response['id'],))
|
||||||
|
self.post(launch_url3, {}, expect=400)
|
||||||
|
|
||||||
|
def test_deleted_credential_fail(self):
|
||||||
|
# Job Templates with deleted credentials cannot be launched.
|
||||||
|
self.cred_sue.mark_inactive()
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.post(self.launch_url, {}, expect=400)
|
||||||
|
|
||||||
|
class JobTemplateLaunchPasswordsTest(BaseJobTestMixin, django.test.TestCase):
|
||||||
|
def setUp(self):
|
||||||
|
super(JobTemplateLaunchPasswordsTest, self).setUp()
|
||||||
|
|
||||||
|
self.url = reverse('api:job_template_list')
|
||||||
|
self.data = dict(
|
||||||
|
name = 'launched job template',
|
||||||
|
job_type = PERM_INVENTORY_DEPLOY,
|
||||||
|
inventory = self.inv_eng.pk,
|
||||||
|
project = self.proj_dev.pk,
|
||||||
|
credential = self.cred_sue_ask.pk,
|
||||||
|
playbook = self.proj_dev.playbooks[0],
|
||||||
|
)
|
||||||
|
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.url, self.data, expect=201)
|
||||||
|
self.launch_url = reverse('api:job_template_launch',
|
||||||
|
args=(response['id'],))
|
||||||
|
|
||||||
|
# should return explicit credentials required passwords
|
||||||
|
def test_explicit_cred_with_ask_passwords_fail(self):
|
||||||
|
passwords_required = ['ssh_password', 'become_password', 'ssh_key_unlock']
|
||||||
|
# Job Templates with deleted credentials cannot be launched.
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
self.cred_sue_ask.mark_inactive()
|
||||||
|
response = self.post(self.launch_url, {'credential_id': self.cred_sue_ask_many.pk}, expect=400)
|
||||||
|
for p in passwords_required:
|
||||||
|
self.assertIn(p, response['passwords_needed_to_start'])
|
||||||
|
self.assertEqual(len(passwords_required), len(response['passwords_needed_to_start']))
|
||||||
|
|
||||||
|
def test_explicit_cred_with_ask_password(self):
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.launch_url, {'ssh_password': 'whatever'}, expect=202)
|
||||||
|
j = Job.objects.get(pk=response['job'])
|
||||||
|
self.assertEqual(j.status, 'new')
|
||||||
|
|
||||||
|
def test_explicit_cred_with_ask_password_empty_string_fail(self):
|
||||||
|
with self.current_user(self.user_sue):
|
||||||
|
response = self.post(self.launch_url, {'ssh_password': ''}, expect=400)
|
||||||
|
self.assertIn('ssh_password', response['passwords_needed_to_start'])
|
||||||
|
|
||||||
@@ -443,105 +443,6 @@ class JobTemplateTest(BaseJobTestMixin, django.test.TestCase):
|
|||||||
with self.current_user(self.user_doug):
|
with self.current_user(self.user_doug):
|
||||||
self.get(detail_url, expect=403)
|
self.get(detail_url, expect=403)
|
||||||
|
|
||||||
def test_launch_job_template(self):
|
|
||||||
url = reverse('api:job_template_list')
|
|
||||||
data = dict(
|
|
||||||
name = 'launched job template',
|
|
||||||
job_type = PERM_INVENTORY_DEPLOY,
|
|
||||||
inventory = self.inv_eng.pk,
|
|
||||||
project = self.proj_dev.pk,
|
|
||||||
credential = self.cred_sue.pk,
|
|
||||||
playbook = self.proj_dev.playbooks[0],
|
|
||||||
)
|
|
||||||
data_no_cred = dict(
|
|
||||||
name = 'launched job template no credential',
|
|
||||||
job_type = PERM_INVENTORY_DEPLOY,
|
|
||||||
inventory = self.inv_eng.pk,
|
|
||||||
project = self.proj_dev.pk,
|
|
||||||
playbook = self.proj_dev.playbooks[0],
|
|
||||||
)
|
|
||||||
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
response = self.post(url, data, expect=201)
|
|
||||||
detail_url = reverse('api:job_template_detail',
|
|
||||||
args=(response['id'],))
|
|
||||||
self.assertEquals(response['url'], detail_url)
|
|
||||||
|
|
||||||
launch_url = reverse('api:job_template_launch',
|
|
||||||
args=(response['id'],))
|
|
||||||
|
|
||||||
# You can still post the job template without a credential, just can't launch it without one
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
response = self.post(url, data_no_cred, expect=201)
|
|
||||||
detail_url = reverse('api:job_template_detail',
|
|
||||||
args=(response['id'],))
|
|
||||||
self.assertEquals(response['url'], detail_url)
|
|
||||||
|
|
||||||
no_launch_url = reverse('api:job_template_launch',
|
|
||||||
args=(response['id'],))
|
|
||||||
# Invalid auth can't trigger the launch endpoint
|
|
||||||
self.check_invalid_auth(launch_url, {}, methods=('post',))
|
|
||||||
|
|
||||||
# Implicit, attached credentials
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
response = self.post(launch_url, {}, expect=202)
|
|
||||||
j = Job.objects.get(pk=response['job'])
|
|
||||||
self.assertTrue(j.status == 'new')
|
|
||||||
|
|
||||||
# Explicit, override credentials
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
response = self.post(launch_url, {'credential': self.cred_doug.pk}, expect=202)
|
|
||||||
j = Job.objects.get(pk=response['job'])
|
|
||||||
self.assertTrue(j.status == 'new')
|
|
||||||
self.assertEqual(j.credential.pk, self.cred_doug.pk)
|
|
||||||
|
|
||||||
# Explicit, override credentials
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
response = self.post(launch_url, {'credential_id': self.cred_doug.pk}, expect=202)
|
|
||||||
j = Job.objects.get(pk=response['job'])
|
|
||||||
self.assertTrue(j.status == 'new')
|
|
||||||
self.assertEqual(j.credential.pk, self.cred_doug.pk)
|
|
||||||
|
|
||||||
# Can't launch a job template without a credential defined (or if we
|
|
||||||
# pass an invalid/inactive credential value).
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
response = self.post(no_launch_url, {}, expect=400)
|
|
||||||
response = self.post(no_launch_url, {'credential': 0}, expect=400)
|
|
||||||
response = self.post(no_launch_url, {'credential_id': 0}, expect=400)
|
|
||||||
response = self.post(no_launch_url, {'credential': 'one'}, expect=400)
|
|
||||||
response = self.post(no_launch_url, {'credential_id': 'one'}, expect=400)
|
|
||||||
self.cred_doug.mark_inactive()
|
|
||||||
response = self.post(no_launch_url, {'credential': self.cred_doug.pk}, expect=400)
|
|
||||||
response = self.post(no_launch_url, {'credential_id': self.cred_doug.pk}, expect=400)
|
|
||||||
|
|
||||||
# Job Templates without projects can not be launched
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
data['name'] = "missing proj"
|
|
||||||
response = self.post(url, data, expect=201)
|
|
||||||
jt = JobTemplate.objects.get(pk=response['id'])
|
|
||||||
jt.project = None
|
|
||||||
jt.save()
|
|
||||||
launch_url2 = reverse('api:job_template_launch',
|
|
||||||
args=(response['id'],))
|
|
||||||
self.post(launch_url2, {}, expect=400)
|
|
||||||
|
|
||||||
# Job Templates without inventory can not be launched
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
data['name'] = "missing inv"
|
|
||||||
response = self.post(url, data, expect=201)
|
|
||||||
jt = JobTemplate.objects.get(pk=response['id'])
|
|
||||||
jt.inventory = None
|
|
||||||
jt.save()
|
|
||||||
launch_url3 = reverse('api:job_template_launch',
|
|
||||||
args=(response['id'],))
|
|
||||||
self.post(launch_url3, {}, expect=400)
|
|
||||||
|
|
||||||
# Job Templates with deleted credentials cannot be launched.
|
|
||||||
self.cred_sue.mark_inactive()
|
|
||||||
with self.current_user(self.user_sue):
|
|
||||||
response = self.post(launch_url, {}, expect=400)
|
|
||||||
|
|
||||||
|
|
||||||
class JobTest(BaseJobTestMixin, django.test.TestCase):
|
class JobTest(BaseJobTestMixin, django.test.TestCase):
|
||||||
|
|
||||||
def test_get_job_list(self):
|
def test_get_job_list(self):
|
||||||
|
|||||||
Reference in New Issue
Block a user