foreman_remote_execution 3.3.4 → 4.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.github/workflows/ci.yml +1 -1
- data/app/controllers/api/v2/job_invocations_controller.rb +1 -0
- data/app/controllers/foreman_remote_execution/concerns/api/v2/subnets_controller_extensions.rb +21 -0
- data/app/controllers/job_invocations_controller.rb +22 -8
- data/app/helpers/job_invocations_helper.rb +3 -2
- data/app/lib/actions/remote_execution/run_host_job.rb +1 -1
- data/app/lib/actions/remote_execution/run_hosts_job.rb +4 -3
- data/app/lib/foreman_remote_execution/renderer/scope/input.rb +35 -0
- data/app/models/concerns/api/v2/interfaces_controller_extensions.rb +13 -0
- data/app/models/concerns/foreman_remote_execution/orchestration/ssh.rb +11 -4
- data/app/models/job_invocation.rb +11 -4
- data/app/models/job_invocation_composer.rb +2 -2
- data/app/models/remote_execution_provider.rb +2 -2
- data/app/models/setting/remote_execution.rb +2 -2
- data/app/models/ssh_execution_provider.rb +1 -1
- data/app/views/api/v2/interfaces/execution_flag.json.rabl +1 -0
- data/app/views/api/v2/job_invocations/base.json.rabl +1 -0
- data/app/views/api/v2/job_invocations/main.json.rabl +1 -1
- data/app/views/api/v2/subnets/remote_execution_proxies.json.rabl +3 -0
- data/app/views/job_invocations/_form.html.erb +1 -1
- data/app/views/job_invocations/_tab_hosts.html.erb +1 -20
- data/app/views/job_invocations/_tab_overview.html.erb +13 -1
- data/app/views/job_invocations/show.html.erb +9 -0
- data/app/views/job_invocations/show.js.erb +5 -0
- data/app/views/job_invocations/show.json.erb +2 -1
- data/db/migrate/20200623073022_rename_sudo_password_to_effective_user_password.rb +34 -0
- data/db/seeds.d/20-permissions.rb +9 -0
- data/lib/foreman_remote_execution/engine.rb +19 -1
- data/lib/foreman_remote_execution/version.rb +1 -1
- data/test/functional/api/v2/job_invocations_controller_test.rb +65 -2
- data/test/functional/job_invocations_controller_test.rb +71 -0
- data/test/models/orchestration/ssh_test.rb +1 -1
- data/test/support/remote_execution_helper.rb +5 -0
- data/test/unit/actions/run_host_job_test.rb +3 -3
- data/test/unit/actions/run_hosts_job_test.rb +2 -2
- data/test/unit/job_invocation_composer_test.rb +5 -5
- data/test/unit/remote_execution_provider_test.rb +6 -6
- data/webpack/__mocks__/foremanReact/components/Pagination/PaginationWrapper.js +2 -0
- data/webpack/__mocks__/foremanReact/components/SearchBar.js +2 -0
- data/webpack/__mocks__/foremanReact/constants.js +21 -0
- data/webpack/__mocks__/foremanReact/redux/API/APISelectors.js +2 -0
- data/webpack/__mocks__/foremanReact/redux/middlewares/IntervalMiddleware/IntervalSelectors.js +1 -0
- data/webpack/react_app/components/TargetingHosts/TargetingHosts.js +21 -15
- data/webpack/react_app/components/TargetingHosts/TargetingHostsHelpers.js +10 -0
- data/webpack/react_app/components/TargetingHosts/TargetingHostsPage.js +62 -0
- data/webpack/react_app/components/TargetingHosts/TargetingHostsPage.scss +6 -0
- data/webpack/react_app/components/TargetingHosts/TargetingHostsSelectors.js +10 -2
- data/webpack/react_app/components/TargetingHosts/__tests__/TargetingHostsPage.test.js +9 -0
- data/webpack/react_app/components/TargetingHosts/__tests__/TargetingHostsSelectors.test.js +26 -0
- data/webpack/react_app/components/TargetingHosts/__tests__/__snapshots__/TargetingHosts.test.js.snap +16 -1
- data/webpack/react_app/components/TargetingHosts/__tests__/__snapshots__/TargetingHostsPage.test.js.snap +68 -0
- data/webpack/react_app/components/TargetingHosts/__tests__/__snapshots__/TargetingHostsSelectors.test.js.snap +11 -0
- data/webpack/react_app/components/TargetingHosts/__tests__/fixtures.js +35 -19
- data/webpack/react_app/components/TargetingHosts/index.js +73 -13
- metadata +22 -3
- data/webpack/react_app/components/TargetingHosts/TargetingHostsActions.js +0 -8
@@ -2,6 +2,9 @@
|
|
2
2
|
<% stylesheet 'foreman_remote_execution/foreman_remote_execution' %>
|
3
3
|
<% javascript 'charts', 'foreman_remote_execution/template_invocation' %>
|
4
4
|
<% javascript *webpack_asset_paths('foreman_remote_execution', :extension => 'js') %>
|
5
|
+
<% content_for(:stylesheets) do %>
|
6
|
+
<%= webpacked_plugins_css_for :foreman_remote_execution %>
|
7
|
+
<% end %>
|
5
8
|
|
6
9
|
<%= breadcrumbs name_field: 'description' %>
|
7
10
|
|
@@ -41,3 +44,9 @@
|
|
41
44
|
<% end %>
|
42
45
|
<%= render_tab_content_for(:main_tabs, subject: @job_invocation) %>
|
43
46
|
</div>
|
47
|
+
|
48
|
+
<script id="job_invocation_refresh" data-refresh-url="<%= job_invocation_path(@job_invocation) %>">
|
49
|
+
<% if @auto_refresh %>
|
50
|
+
delayed_refresh($('script#job_invocation_refresh').data('refresh-url'), {});
|
51
|
+
<% end %>
|
52
|
+
</script>
|
@@ -0,0 +1,34 @@
|
|
1
|
+
class RenameSudoPasswordToEffectiveUserPassword < ActiveRecord::Migration[6.0]
|
2
|
+
def up
|
3
|
+
rename_column :job_invocations, :sudo_password, :effective_user_password
|
4
|
+
|
5
|
+
Parameter.where(name: 'remote_execution_sudo_password').each do |parameter|
|
6
|
+
record = Parameter.find_by(type: parameter.type, reference_id: parameter.reference_id, name: "remote_execution_effective_user_password")
|
7
|
+
if record.nil?
|
8
|
+
parameter.update(name: "remote_execution_effective_user_password")
|
9
|
+
end
|
10
|
+
end
|
11
|
+
|
12
|
+
return unless (password = Setting.find_by(:name => 'remote_execution_sudo_password').try(:value))
|
13
|
+
|
14
|
+
Setting.find_by(:name => 'remote_execution_effective_user_password').update(value: password)
|
15
|
+
|
16
|
+
Setting.find_by(:name => 'remote_execution_sudo_password').delete
|
17
|
+
end
|
18
|
+
|
19
|
+
def down
|
20
|
+
rename_column :job_invocations, :effective_user_password, :sudo_password
|
21
|
+
|
22
|
+
Parameter.where(name: 'remote_execution_effective_user_password').each do |parameter|
|
23
|
+
record = Parameter.find_by(type: parameter.type, reference_id: parameter.reference_id, name: "remote_execution_sudo_password")
|
24
|
+
if record.nil?
|
25
|
+
parameter.update(name: "remote_execution_sudo_password")
|
26
|
+
end
|
27
|
+
end
|
28
|
+
|
29
|
+
return unless (password = Setting.find_by(:name => 'remote_execution_effective_user_password').try(:value))
|
30
|
+
|
31
|
+
Setting.create!(name: 'remote_execution_sudo_password', value: password, description: 'Sudo password', category: 'Setting::RemoteExecution', settings_type: 'string', full_name: 'Sudo password',encrypted: true, default: nil)
|
32
|
+
Setting.find_by(:name => 'remote_execution_effective_user_password').delete
|
33
|
+
end
|
34
|
+
end
|
@@ -0,0 +1,9 @@
|
|
1
|
+
view_permission = Permission.find_by(name: "view_job_invocations", resource_type: 'JobInvocation')
|
2
|
+
default_role = Role.default
|
3
|
+
|
4
|
+
# the view_permissions can be nil in tests: skipping in that case
|
5
|
+
if view_permission && !default_role.permissions.include?(view_permission)
|
6
|
+
default_role.filters.create(:search => 'user = current_user') do |filter|
|
7
|
+
filter.filterings.build { |f| f.permission = view_permission }
|
8
|
+
end
|
9
|
+
end
|
@@ -32,6 +32,15 @@ module ForemanRemoteExecution
|
|
32
32
|
end
|
33
33
|
end
|
34
34
|
|
35
|
+
# A workaround for https://projects.theforeman.org/issues/30685
|
36
|
+
initializer 'foreman_remote_execution.rails_loading_workaround' do
|
37
|
+
# Without this, in production environment the module gets prepended too
|
38
|
+
# late and the extensions do not get applied
|
39
|
+
# TODO: Remove this and from config.to_prepare once there is an extension
|
40
|
+
# point in Foreman
|
41
|
+
ProvisioningTemplatesHelper.prepend ForemanRemoteExecution::JobTemplatesExtensions
|
42
|
+
end
|
43
|
+
|
35
44
|
initializer 'foreman_remote_execution.apipie' do
|
36
45
|
Apipie.configuration.checksum_path += ['/api/']
|
37
46
|
end
|
@@ -44,9 +53,12 @@ module ForemanRemoteExecution
|
|
44
53
|
|
45
54
|
initializer 'foreman_remote_execution.register_plugin', before: :finisher_hook do |_app|
|
46
55
|
Foreman::Plugin.register :foreman_remote_execution do
|
47
|
-
requires_foreman '>=
|
56
|
+
requires_foreman '>= 2.2'
|
48
57
|
|
49
58
|
apipie_documented_controllers ["#{ForemanRemoteExecution::Engine.root}/app/controllers/api/v2/*.rb"]
|
59
|
+
ApipieDSL.configuration.dsl_classes_matchers += [
|
60
|
+
"#{ForemanRemoteExecution::Engine.root}/app/lib/foreman_remote_execution/renderer/**/*.rb",
|
61
|
+
]
|
50
62
|
|
51
63
|
automatic_assets(false)
|
52
64
|
precompile_assets(*assets_to_precompile)
|
@@ -135,6 +147,9 @@ module ForemanRemoteExecution
|
|
135
147
|
end
|
136
148
|
|
137
149
|
extend_rabl_template 'api/v2/smart_proxies/main', 'api/v2/smart_proxies/pubkey'
|
150
|
+
extend_rabl_template 'api/v2/interfaces/main', 'api/v2/interfaces/execution_flag'
|
151
|
+
extend_rabl_template 'api/v2/subnets/show', 'api/v2/subnets/remote_execution_proxies'
|
152
|
+
parameter_filter ::Subnet, :remote_execution_proxy_ids
|
138
153
|
describe_host { overview_buttons_provider :host_overview_buttons }
|
139
154
|
end
|
140
155
|
end
|
@@ -181,6 +196,7 @@ module ForemanRemoteExecution
|
|
181
196
|
SmartProxy.prepend ForemanRemoteExecution::SmartProxyExtensions
|
182
197
|
Subnet.include ForemanRemoteExecution::SubnetExtensions
|
183
198
|
|
199
|
+
::Api::V2::InterfacesController.include Api::V2::InterfacesControllerExtensions
|
184
200
|
# We need to explicitly force to load the Task model due to Rails loader
|
185
201
|
# having issues with resolving it to Rake::Task otherwise
|
186
202
|
require_dependency 'foreman_tasks/task'
|
@@ -189,6 +205,8 @@ module ForemanRemoteExecution
|
|
189
205
|
RemoteExecutionProvider.register(:SSH, SSHExecutionProvider)
|
190
206
|
|
191
207
|
ForemanRemoteExecution.register_rex_feature
|
208
|
+
|
209
|
+
::Api::V2::SubnetsController.include ::ForemanRemoteExecution::Concerns::Api::V2::SubnetsControllerExtensions
|
192
210
|
end
|
193
211
|
|
194
212
|
initializer 'foreman_remote_execution.register_gettext', after: :load_config_initializers do |_app|
|
@@ -38,13 +38,14 @@ module Api
|
|
38
38
|
|
39
39
|
test 'should see only permitted hosts' do
|
40
40
|
@user = FactoryBot.create(:user, admin: false)
|
41
|
+
@invocation.task.update(user: @user)
|
41
42
|
setup_user('view', 'job_invocations', nil, @user)
|
42
43
|
setup_user('view', 'hosts', 'name ~ nope.example.com', @user)
|
43
44
|
|
44
|
-
get :show, params: { :id => @invocation.id }, session:
|
45
|
+
get :show, params: { :id => @invocation.id }, session: prepare_user(@user)
|
45
46
|
assert_response :success
|
46
47
|
response = ActiveSupport::JSON.decode(@response.body)
|
47
|
-
|
48
|
+
assert_equal response['targeting']['hosts'], []
|
48
49
|
end
|
49
50
|
end
|
50
51
|
|
@@ -298,6 +299,68 @@ module Api
|
|
298
299
|
post :rerun, params: { :id => @invocation.id }
|
299
300
|
assert_response 404
|
300
301
|
end
|
302
|
+
|
303
|
+
describe 'restricted access' do
|
304
|
+
setup do
|
305
|
+
@admin = FactoryBot.create(:user, mail: 'admin@test.foreman.com', admin: true)
|
306
|
+
@user = FactoryBot.create(:user, mail: 'user@test.foreman.com', admin: false)
|
307
|
+
@invocation = FactoryBot.create(:job_invocation, :with_template, :with_task, :with_unplanned_host)
|
308
|
+
@invocation2 = FactoryBot.create(:job_invocation, :with_template, :with_task, :with_unplanned_host)
|
309
|
+
|
310
|
+
@invocation.task.update(user: @admin)
|
311
|
+
@invocation2.task.update(user: @user)
|
312
|
+
|
313
|
+
setup_user 'view', 'hosts', nil, @user
|
314
|
+
setup_user 'view', 'job_invocations', 'user = current_user', @user
|
315
|
+
setup_user 'create', 'job_invocations', 'user = current_user', @user
|
316
|
+
setup_user 'cancel', 'job_invocations', 'user = current_user', @user
|
317
|
+
end
|
318
|
+
|
319
|
+
let(:host) { @invocation.targeting.hosts.first }
|
320
|
+
let(:host2) { @invocation2.targeting.hosts.first }
|
321
|
+
|
322
|
+
context 'without user filter' do
|
323
|
+
test '#index' do
|
324
|
+
get :index, session: prepare_user(@admin)
|
325
|
+
assert_response :success
|
326
|
+
assert JSON.parse(@response.body)['results'].size >= 2
|
327
|
+
end
|
328
|
+
|
329
|
+
test '#show' do
|
330
|
+
get :show, params: { id: @invocation2.id }, session: prepare_user(@admin)
|
331
|
+
assert_response :success
|
332
|
+
end
|
333
|
+
|
334
|
+
test '#output' do
|
335
|
+
get :output, params: { job_invocation_id: @invocation2.id, host_id: host2.id }, session: prepare_user(@admin)
|
336
|
+
assert_response :success
|
337
|
+
end
|
338
|
+
end
|
339
|
+
|
340
|
+
context 'with user filter' do
|
341
|
+
test '#index' do
|
342
|
+
get :index, session: prepare_user(@user)
|
343
|
+
assert_response :success
|
344
|
+
assert_equal 1, JSON.parse(@response.body)['results'].size
|
345
|
+
end
|
346
|
+
|
347
|
+
test '#show' do
|
348
|
+
get :show, params: { id: @invocation.id }, session: prepare_user(@user)
|
349
|
+
assert_response :not_found
|
350
|
+
end
|
351
|
+
|
352
|
+
test '#output' do
|
353
|
+
get :output, params: { job_invocation_id: @invocation.id, host_id: host.id }, session: prepare_user(@user)
|
354
|
+
assert_response :not_found
|
355
|
+
assert_includes @response.body, 'Job invocation not found'
|
356
|
+
end
|
357
|
+
end
|
358
|
+
end
|
359
|
+
|
360
|
+
def prepare_user(user)
|
361
|
+
User.current = user
|
362
|
+
set_session_user(user)
|
363
|
+
end
|
301
364
|
end
|
302
365
|
end
|
303
366
|
end
|
@@ -1,6 +1,7 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
3
|
require 'test_plugin_helper'
|
4
|
+
require_relative '../support/remote_execution_helper'
|
4
5
|
|
5
6
|
class JobInvocationsControllerTest < ActionController::TestCase
|
6
7
|
test 'should parse inputs coming from the URL params' do
|
@@ -58,4 +59,74 @@ class JobInvocationsControllerTest < ActionController::TestCase
|
|
58
59
|
post :new, params: params, session: set_session_user
|
59
60
|
assert_response :success
|
60
61
|
end
|
62
|
+
|
63
|
+
context 'restricted access' do
|
64
|
+
setup do
|
65
|
+
@admin = users(:admin)
|
66
|
+
@user = FactoryBot.create(:user, mail: 'test23@test.foreman.com', admin: false)
|
67
|
+
@invocation = FactoryBot.create(:job_invocation, :with_template, :with_task)
|
68
|
+
@invocation2 = FactoryBot.create(:job_invocation, :with_template, :with_task)
|
69
|
+
|
70
|
+
@invocation.task.update(user: @admin)
|
71
|
+
@invocation2.task.update(user: @user)
|
72
|
+
|
73
|
+
setup_user 'view', 'hosts', nil, @user
|
74
|
+
setup_user 'view', 'job_invocations', 'user = current_user', @user
|
75
|
+
setup_user 'create', 'job_invocations', 'user = current_user', @user
|
76
|
+
setup_user 'cancel', 'job_invocations', 'user = current_user', @user
|
77
|
+
end
|
78
|
+
|
79
|
+
context 'without user filter' do
|
80
|
+
test '#index' do
|
81
|
+
get :index, session: prepare_user(@admin)
|
82
|
+
assert_response :success
|
83
|
+
assert 2, assigns(:job_invocations).size
|
84
|
+
end
|
85
|
+
|
86
|
+
test '#show' do
|
87
|
+
get :show, params: { id: @invocation2.id }, session: prepare_user(@admin)
|
88
|
+
assert_response :success
|
89
|
+
end
|
90
|
+
|
91
|
+
test '#rerun' do
|
92
|
+
get :rerun, params: { id: @invocation2.id }, session: prepare_user(@admin)
|
93
|
+
assert_response :success
|
94
|
+
end
|
95
|
+
|
96
|
+
test '#cancel' do
|
97
|
+
ForemanTasks::Task.any_instance.expects(:cancel).returns(true)
|
98
|
+
post :cancel, params: { id: @invocation2.id }, session: prepare_user(@admin)
|
99
|
+
assert_response :redirect
|
100
|
+
end
|
101
|
+
end
|
102
|
+
|
103
|
+
context 'with user filter' do
|
104
|
+
test '#index' do
|
105
|
+
get :index, session: prepare_user(@user)
|
106
|
+
assert_response :success
|
107
|
+
assert_equal 1, assigns(:job_invocations).size
|
108
|
+
assert_equal @invocation2, assigns(:job_invocations)[0]
|
109
|
+
end
|
110
|
+
|
111
|
+
test '#show' do
|
112
|
+
get :show, params: { id: @invocation.id }, session: prepare_user(@user)
|
113
|
+
assert_response :not_found
|
114
|
+
end
|
115
|
+
|
116
|
+
test '#rerun' do
|
117
|
+
get :rerun, params: { id: @invocation.id }, session: prepare_user(@user)
|
118
|
+
assert_response :not_found
|
119
|
+
end
|
120
|
+
|
121
|
+
test 'cancel' do
|
122
|
+
post :cancel, params: { id: @invocation.id }, session: prepare_user(@user)
|
123
|
+
assert_response :not_found
|
124
|
+
end
|
125
|
+
end
|
126
|
+
end
|
127
|
+
|
128
|
+
def prepare_user(user)
|
129
|
+
User.current = user
|
130
|
+
set_session_user(user)
|
131
|
+
end
|
61
132
|
end
|
@@ -30,7 +30,7 @@ class SSHOrchestrationTest < ActiveSupport::TestCase
|
|
30
30
|
|
31
31
|
it 'does not fail on 404 from the smart proxy' do
|
32
32
|
host.stubs(:skip_orchestration?).returns false
|
33
|
-
|
33
|
+
::ProxyAPI::RemoteExecutionSSH.any_instance.expects(:delete).raises(RestClient::ResourceNotFound).twice
|
34
34
|
host.build = true
|
35
35
|
host.save!
|
36
36
|
ids = ["ssh_remove_known_hosts_interface_#{interface.ip}_#{proxy.id}",
|
@@ -12,7 +12,7 @@ module ForemanRemoteExecution
|
|
12
12
|
let(:provider) do
|
13
13
|
provider = ::SSHExecutionProvider
|
14
14
|
provider.expects(:ssh_password).with(host).returns('sshpass')
|
15
|
-
provider.expects(:
|
15
|
+
provider.expects(:effective_user_password).with(host).returns('sudopass')
|
16
16
|
provider.expects(:ssh_key_passphrase).with(host).returns('keypass')
|
17
17
|
provider
|
18
18
|
end
|
@@ -21,7 +21,7 @@ module ForemanRemoteExecution
|
|
21
21
|
secrets = subject.secrets(host, job_invocation, provider)
|
22
22
|
|
23
23
|
assert_equal 'sshpass', secrets[:ssh_password]
|
24
|
-
assert_equal 'sudopass', secrets[:
|
24
|
+
assert_equal 'sudopass', secrets[:effective_user_password]
|
25
25
|
assert_equal 'keypass', secrets[:key_passphrase]
|
26
26
|
end
|
27
27
|
|
@@ -31,7 +31,7 @@ module ForemanRemoteExecution
|
|
31
31
|
secrets = subject.secrets(host, job_invocation, provider)
|
32
32
|
|
33
33
|
assert_equal 'jobsshpass', secrets[:ssh_password]
|
34
|
-
assert_equal 'sudopass', secrets[:
|
34
|
+
assert_equal 'sudopass', secrets[:effective_user_password]
|
35
35
|
assert_equal 'jobkeypass', secrets[:key_passphrase]
|
36
36
|
end
|
37
37
|
end
|
@@ -14,7 +14,7 @@ module ForemanRemoteExecution
|
|
14
14
|
invocation.description = 'Some short description'
|
15
15
|
invocation.password = 'changeme'
|
16
16
|
invocation.key_passphrase = 'changemetoo'
|
17
|
-
invocation.
|
17
|
+
invocation.effective_user_password = 'sudopassword'
|
18
18
|
invocation.save
|
19
19
|
end
|
20
20
|
end
|
@@ -73,7 +73,7 @@ module ForemanRemoteExecution
|
|
73
73
|
end
|
74
74
|
|
75
75
|
it 'triggers the RunHostJob actions on the resolved hosts in run phase' do
|
76
|
-
planned.expects(:output).returns(:planned_count => 0)
|
76
|
+
planned.expects(:output).at_most(5).returns(:planned_count => 0)
|
77
77
|
planned.expects(:trigger).with { |*args| args[0] == Actions::RemoteExecution::RunHostJob }
|
78
78
|
planned.create_sub_plans
|
79
79
|
end
|
@@ -523,15 +523,15 @@ class JobInvocationComposerTest < ActiveSupport::TestCase
|
|
523
523
|
end
|
524
524
|
end
|
525
525
|
|
526
|
-
describe '#
|
527
|
-
let(:
|
526
|
+
describe '#effective_user_password' do
|
527
|
+
let(:effective_user_password) { 'password' }
|
528
528
|
let(:params) do
|
529
|
-
{ :job_invocation => { :
|
529
|
+
{ :job_invocation => { :effective_user_password => effective_user_password }}
|
530
530
|
end
|
531
531
|
|
532
|
-
it 'sets the
|
532
|
+
it 'sets the effective_user_password password properly' do
|
533
533
|
composer
|
534
|
-
_(composer.job_invocation.
|
534
|
+
_(composer.job_invocation.effective_user_password).must_equal effective_user_password
|
535
535
|
end
|
536
536
|
end
|
537
537
|
|
@@ -78,12 +78,12 @@ class RemoteExecutionProviderTest < ActiveSupport::TestCase
|
|
78
78
|
end
|
79
79
|
end
|
80
80
|
|
81
|
-
describe '
|
82
|
-
it 'uses the
|
83
|
-
host.params['
|
84
|
-
host.host_parameters << FactoryBot.create(:host_parameter, :host => host, :name => '
|
85
|
-
assert_not proxy_options.key?(:
|
86
|
-
_(secrets[:
|
81
|
+
describe 'effective user password' do
|
82
|
+
it 'uses the remote_execution_effective_user_password on the host param' do
|
83
|
+
host.params['remote_execution_effective_user_password'] = 'mypassword'
|
84
|
+
host.host_parameters << FactoryBot.create(:host_parameter, :host => host, :name => 'remote_execution_effective_user_password', :value => 'mypassword')
|
85
|
+
assert_not proxy_options.key?(:effective_user_password)
|
86
|
+
_(secrets[:effective_user_password]).must_equal 'mypassword'
|
87
87
|
end
|
88
88
|
end
|
89
89
|
|
@@ -1,3 +1,24 @@
|
|
1
1
|
export const STATUS = {
|
2
|
+
PENDING: 'PENDING',
|
3
|
+
RESOLVED: 'RESOLVED',
|
2
4
|
ERROR: 'ERROR',
|
3
5
|
};
|
6
|
+
|
7
|
+
export const getControllerSearchProps = (
|
8
|
+
controller,
|
9
|
+
id = 'searchBar',
|
10
|
+
canCreate = true
|
11
|
+
) => ({
|
12
|
+
controller,
|
13
|
+
autocomplete: {
|
14
|
+
id,
|
15
|
+
searchQuery: '',
|
16
|
+
url: `${controller}/auto_complete_search`,
|
17
|
+
useKeyShortcuts: true,
|
18
|
+
},
|
19
|
+
bookmarks: {
|
20
|
+
url: '/api/bookmarks',
|
21
|
+
canCreate,
|
22
|
+
documentationUrl: `4.1.5Searching`,
|
23
|
+
},
|
24
|
+
});
|