import sos-4.1-8.el9
This commit is contained in:
commit
72b5fce49d
2
.gitignore
vendored
Normal file
2
.gitignore
vendored
Normal file
@ -0,0 +1,2 @@
|
||||
SOURCES/sos-4.1.tar.gz
|
||||
SOURCES/sos-audit-0.3.tgz
|
2
.sos.metadata
Normal file
2
.sos.metadata
Normal file
@ -0,0 +1,2 @@
|
||||
7d4d03af232e2357e3359ad564a59f4c3654eac0 SOURCES/sos-4.1.tar.gz
|
||||
9d478b9f0085da9178af103078bbf2fd77b0175a SOURCES/sos-audit-0.3.tgz
|
39
SOURCES/sos-bz1925419-gluster-pubkeys-statusfile.patch
Normal file
39
SOURCES/sos-bz1925419-gluster-pubkeys-statusfile.patch
Normal file
@ -0,0 +1,39 @@
|
||||
From 4fb834ec862228afb276ccbd45aa86c66044ea66 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Mon, 15 Mar 2021 09:09:51 +0100
|
||||
Subject: [PATCH] [gluster] collect public keys from the right dir
|
||||
|
||||
Collection of glusterfind dir is achieved by /var/lib/gluster
|
||||
so it doesn't be collected explicitly.
|
||||
|
||||
/var/lib/glusterd/glusterfind/.keys/ subdir is required to be
|
||||
explicitly collected, as add_copy_spec uses glob.glob() that skips
|
||||
hidden files.
|
||||
|
||||
Resolves: #2451
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/report/plugins/gluster.py | 5 ++---
|
||||
1 file changed, 2 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/sos/report/plugins/gluster.py b/sos/report/plugins/gluster.py
|
||||
index e1a89df2..952cab63 100644
|
||||
--- a/sos/report/plugins/gluster.py
|
||||
+++ b/sos/report/plugins/gluster.py
|
||||
@@ -76,9 +76,8 @@ class Gluster(Plugin, RedHatPlugin):
|
||||
"/var/lib/glusterd/",
|
||||
# collect nfs-ganesha related configuration
|
||||
"/run/gluster/shared_storage/nfs-ganesha/",
|
||||
- # collect status files and public ssh keys
|
||||
- "/var/lib/glusterd/.keys/",
|
||||
- "/var/lib/glusterd/glusterfind/"
|
||||
+ # collect public ssh keys (a_s_c skips implicit hidden files)
|
||||
+ "/var/lib/glusterd/glusterfind/.keys/",
|
||||
] + glob.glob('/run/gluster/*tier-dht/*'))
|
||||
|
||||
if not self.get_option("all_logs"):
|
||||
--
|
||||
2.26.2
|
||||
|
65
SOURCES/sos-bz1938874-potential-issues-static-analyse.patch
Normal file
65
SOURCES/sos-bz1938874-potential-issues-static-analyse.patch
Normal file
@ -0,0 +1,65 @@
|
||||
From 6d5cbe90e17534d53d7fe42dff4d8ca734acf594 Mon Sep 17 00:00:00 2001
|
||||
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||
Date: Tue, 29 Jun 2021 15:49:00 -0400
|
||||
Subject: [PATCH] [yum] Fix potential traceback when yum history is empty
|
||||
|
||||
Like we did in #969 for `dnf`, fix a potential issue where we would
|
||||
generate a traceback in the plugin when `yum history` is empty.
|
||||
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/report/plugins/yum.py | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/sos/report/plugins/yum.py b/sos/report/plugins/yum.py
|
||||
index 54e222df..aec805e6 100644
|
||||
--- a/sos/report/plugins/yum.py
|
||||
+++ b/sos/report/plugins/yum.py
|
||||
@@ -91,7 +91,7 @@ class Yum(Plugin, RedHatPlugin):
|
||||
# packages installed/erased/updated per transaction
|
||||
if self.get_option("yum-history-info"):
|
||||
history = self.exec_cmd("yum history")
|
||||
- transactions = None
|
||||
+ transactions = -1
|
||||
if history['status'] == 0:
|
||||
for line in history['output'].splitlines():
|
||||
try:
|
||||
--
|
||||
2.31.1
|
||||
|
||||
From a7a4ef73faee6cddba36bf670d4a20ab0521c36f Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Wed, 30 Jun 2021 13:10:56 +0200
|
||||
Subject: [PATCH] [plugins] Set default predicate instead of None for
|
||||
robustness
|
||||
|
||||
Just making the code more robustness, it could be dangerous to
|
||||
set pred = None and then potentially call log_skipped_cmd that
|
||||
expects "pred" of SoSPredicate type.
|
||||
|
||||
Currently such a call flow can not happen, but it is worth to
|
||||
make the code more robust for potential future changes.
|
||||
|
||||
Resolves: #2601
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/__init__.py | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/sos/report/plugins/__init__.py b/sos/report/plugins/__init__.py
|
||||
index 6fd1a3b2..b9cd28ed 100644
|
||||
--- a/sos/report/plugins/__init__.py
|
||||
+++ b/sos/report/plugins/__init__.py
|
||||
@@ -1629,7 +1629,7 @@ class Plugin(object):
|
||||
|
||||
def _add_cmd_output(self, **kwargs):
|
||||
"""Internal helper to add a single command to the collection list."""
|
||||
- pred = kwargs.pop('pred') if 'pred' in kwargs else None
|
||||
+ pred = kwargs.pop('pred') if 'pred' in kwargs else SoSPredicate(self)
|
||||
soscmd = SoSCommand(**kwargs)
|
||||
self._log_debug("packed command: " + soscmd.__str__())
|
||||
for _skip_cmd in self.skip_commands:
|
||||
--
|
||||
2.31.1
|
||||
|
50
SOURCES/sos-bz1959779-conversions-and-upgrades.patch
Normal file
50
SOURCES/sos-bz1959779-conversions-and-upgrades.patch
Normal file
@ -0,0 +1,50 @@
|
||||
From ee5d9d017b0a1bfeaebee9c21c17e89ef1f909a8 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Mon, 26 Jul 2021 13:30:09 +0200
|
||||
Subject: [PATCH] [MigrationResults] collect info about conversions and
|
||||
upgrades
|
||||
|
||||
A new tiny plugin independent on leapp and convert2rhel is proposed.
|
||||
|
||||
It should collect /etc/migration-results with info about RHEL
|
||||
conversions and upgrades, whenever the file is present.
|
||||
|
||||
Resolves: #2627
|
||||
Relevant to: rhbz#1959598
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/migration_results.py | 21 +++++++++++++++++++++
|
||||
1 file changed, 21 insertions(+)
|
||||
create mode 100644 sos/report/plugins/migration_results.py
|
||||
|
||||
diff --git a/sos/report/plugins/migration_results.py b/sos/report/plugins/migration_results.py
|
||||
new file mode 100644
|
||||
index 00000000..b67480ba
|
||||
--- /dev/null
|
||||
+++ b/sos/report/plugins/migration_results.py
|
||||
@@ -0,0 +1,21 @@
|
||||
+# This file is part of the sos project: https://github.com/sosreport/sos
|
||||
+#
|
||||
+# This copyrighted material is made available to anyone wishing to use,
|
||||
+# modify, copy, or redistribute it subject to the terms and conditions of
|
||||
+# version 2 of the GNU General Public License.
|
||||
+#
|
||||
+# See the LICENSE file in the source distribution for further information.
|
||||
+
|
||||
+from sos.report.plugins import Plugin, RedHatPlugin
|
||||
+
|
||||
+
|
||||
+class MigrationResults(Plugin, RedHatPlugin):
|
||||
+
|
||||
+ short_desc = 'Information about conversions and upgrades'
|
||||
+
|
||||
+ plugin_name = 'migration_results'
|
||||
+ profiles = ('system',)
|
||||
+
|
||||
+ files = ('/etc/migration-results',)
|
||||
+
|
||||
+# vim: et ts=4 sw=4
|
||||
--
|
||||
2.31.1
|
||||
|
135
SOURCES/sos-bz1965002-skip-selinux-of-proc-everytime.patch
Normal file
135
SOURCES/sos-bz1965002-skip-selinux-of-proc-everytime.patch
Normal file
@ -0,0 +1,135 @@
|
||||
From 206d65618f20995b168dcc63090d1e6871450e90 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Wed, 26 May 2021 15:45:26 +0200
|
||||
Subject: [PATCH] [archive] skip copying SELinux context for /proc and /sys
|
||||
everytime
|
||||
|
||||
A supplement of #1399 fix, now also for adding strings or special
|
||||
device files.
|
||||
|
||||
Also adding a (vendor) test case for it.
|
||||
|
||||
Resolves: #2560
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/archive.py | 35 +++++++++++----------
|
||||
tests/vendor_tests/redhat/rhbz1965001.py | 39 ++++++++++++++++++++++++
|
||||
2 files changed, 56 insertions(+), 18 deletions(-)
|
||||
create mode 100644 tests/vendor_tests/redhat/rhbz1965001.py
|
||||
|
||||
diff --git a/sos/archive.py b/sos/archive.py
|
||||
index 4dd31d75..b02b2475 100644
|
||||
--- a/sos/archive.py
|
||||
+++ b/sos/archive.py
|
||||
@@ -326,6 +326,20 @@ class FileCacheArchive(Archive):
|
||||
return None
|
||||
return dest
|
||||
|
||||
+ def _copy_attributes(self, src, dest):
|
||||
+ # copy file attributes, skip SELinux xattrs for /sys and /proc
|
||||
+ try:
|
||||
+ stat = os.stat(src)
|
||||
+ if src.startswith("/sys/") or src.startswith("/proc/"):
|
||||
+ shutil.copymode(src, dest)
|
||||
+ os.utime(dest, ns=(stat.st_atime_ns, stat.st_mtime_ns))
|
||||
+ else:
|
||||
+ shutil.copystat(src, dest)
|
||||
+ os.chown(dest, stat.st_uid, stat.st_gid)
|
||||
+ except Exception as e:
|
||||
+ self.log_debug("caught '%s' setting attributes of '%s'"
|
||||
+ % (e, dest))
|
||||
+
|
||||
def add_file(self, src, dest=None):
|
||||
with self._path_lock:
|
||||
if not dest:
|
||||
@@ -348,18 +362,7 @@ class FileCacheArchive(Archive):
|
||||
else:
|
||||
self.log_info("File %s not collected: '%s'" % (src, e))
|
||||
|
||||
- # copy file attributes, skip SELinux xattrs for /sys and /proc
|
||||
- try:
|
||||
- stat = os.stat(src)
|
||||
- if src.startswith("/sys/") or src.startswith("/proc/"):
|
||||
- shutil.copymode(src, dest)
|
||||
- os.utime(dest, ns=(stat.st_atime_ns, stat.st_mtime_ns))
|
||||
- else:
|
||||
- shutil.copystat(src, dest)
|
||||
- os.chown(dest, stat.st_uid, stat.st_gid)
|
||||
- except Exception as e:
|
||||
- self.log_debug("caught '%s' setting attributes of '%s'"
|
||||
- % (e, dest))
|
||||
+ self._copy_attributes(src, dest)
|
||||
file_name = "'%s'" % src
|
||||
else:
|
||||
# Open file case: first rewind the file to obtain
|
||||
@@ -388,11 +391,7 @@ class FileCacheArchive(Archive):
|
||||
content = content.decode('utf8', 'ignore')
|
||||
f.write(content)
|
||||
if os.path.exists(src):
|
||||
- try:
|
||||
- shutil.copystat(src, dest)
|
||||
- except OSError as e:
|
||||
- self.log_error("Unable to add '%s' to archive: %s" %
|
||||
- (dest, e))
|
||||
+ self._copy_attributes(src, dest)
|
||||
self.log_debug("added string at '%s' to FileCacheArchive '%s'"
|
||||
% (src, self._archive_root))
|
||||
|
||||
@@ -501,7 +500,7 @@ class FileCacheArchive(Archive):
|
||||
self.log_info("add_node: %s - mknod '%s'" % (msg, dest))
|
||||
return
|
||||
raise e
|
||||
- shutil.copystat(path, dest)
|
||||
+ self._copy_attributes(path, dest)
|
||||
|
||||
def name_max(self):
|
||||
if 'PC_NAME_MAX' in os.pathconf_names:
|
||||
diff --git a/tests/vendor_tests/redhat/rhbz1965001.py b/tests/vendor_tests/redhat/rhbz1965001.py
|
||||
new file mode 100644
|
||||
index 00000000..aa16ba81
|
||||
--- /dev/null
|
||||
+++ b/tests/vendor_tests/redhat/rhbz1965001.py
|
||||
@@ -0,0 +1,39 @@
|
||||
+# This file is part of the sos project: https://github.com/sosreport/sos
|
||||
+#
|
||||
+# This copyrighted material is made available to anyone wishing to use,
|
||||
+# modify, copy, or redistribute it subject to the terms and conditions of
|
||||
+# version 2 of the GNU General Public License.
|
||||
+#
|
||||
+# See the LICENSE file in the source distribution for further information.
|
||||
+
|
||||
+
|
||||
+import tempfile
|
||||
+import shutil
|
||||
+from sos_tests import StageOneReportTest
|
||||
+
|
||||
+
|
||||
+class rhbz1965001(StageOneReportTest):
|
||||
+ """
|
||||
+ Copying /proc/sys/vm/{compact_memory,drop_caches} must ignore SELinux
|
||||
+ context, otherwise an attempt to set the context to files under some
|
||||
+ directories like /tmp raises an AVC denial, and an ERROR
|
||||
+ "Unable to add '...' to archive: [Errno 13] Permission denied: '...'
|
||||
+ is raise.
|
||||
+
|
||||
+ https://bugzilla.redhat.com/show_bug.cgi?id=1965001
|
||||
+
|
||||
+ :avocado: enable
|
||||
+ :avocado: tags=stageone
|
||||
+ """
|
||||
+
|
||||
+ sos_cmd = '-o system'
|
||||
+ # it is crucial to run the test case with --tmp-dir=/tmp/... as that is
|
||||
+ # (an example of) directory exhibiting the relabel permission deny.
|
||||
+ # /var/tmp directory allows those relabels.
|
||||
+ #
|
||||
+ # the directory shouldn't exist at this moment, otherwise
|
||||
+ # "check to prevent multiple setUp() runs" in sos_tests.py would fail
|
||||
+ _tmpdir = '/tmp/rhbz1965001_avocado_test'
|
||||
+
|
||||
+ def test_no_permission_denied(self):
|
||||
+ self.assertSosLogNotContains("Permission denied")
|
||||
--
|
||||
2.26.3
|
||||
|
243
SOURCES/sos-bz1967110-collect-cleaning-consistency.patch
Normal file
243
SOURCES/sos-bz1967110-collect-cleaning-consistency.patch
Normal file
@ -0,0 +1,243 @@
|
||||
From fc0218638f3e865c4315823e72aef2f46d012d07 Mon Sep 17 00:00:00 2001
|
||||
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||
Date: Wed, 14 Apr 2021 11:55:03 -0400
|
||||
Subject: [PATCH 1/2] [clean] Load maps from all archives before obfuscation
|
||||
loop
|
||||
|
||||
Previously, maps were being prepped via archives after extraction. This
|
||||
reduced the amount of file IO being done, but made it so that necessary
|
||||
obfuscations from later archives in a series would not be obfuscated in
|
||||
the archives obfuscated before those later archives were extracted.
|
||||
|
||||
Fix this by extracting the map prep files into memory for each archive
|
||||
to prep the maps before we enter the obfuscation loop entirely.
|
||||
|
||||
Closes: #2490
|
||||
Related: RHBZ#1930181
|
||||
Resolves: #2492
|
||||
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/cleaner/__init__.py | 69 +++++++++++++++-----------
|
||||
sos/cleaner/parsers/username_parser.py | 13 +++--
|
||||
2 files changed, 45 insertions(+), 37 deletions(-)
|
||||
|
||||
diff --git a/sos/cleaner/__init__.py b/sos/cleaner/__init__.py
|
||||
index b9eb61ef..d10cdc55 100644
|
||||
--- a/sos/cleaner/__init__.py
|
||||
+++ b/sos/cleaner/__init__.py
|
||||
@@ -292,6 +292,7 @@ third party.
|
||||
|
||||
# we have at least one valid target to obfuscate
|
||||
self.completed_reports = []
|
||||
+ self.preload_all_archives_into_maps()
|
||||
self.obfuscate_report_paths()
|
||||
|
||||
if not self.completed_reports:
|
||||
@@ -473,6 +474,44 @@ third party.
|
||||
self.ui_log.info("Exiting on user cancel")
|
||||
os._exit(130)
|
||||
|
||||
+ def preload_all_archives_into_maps(self):
|
||||
+ """Before doing the actual obfuscation, if we have multiple archives
|
||||
+ to obfuscate then we need to preload each of them into the mappings
|
||||
+ to ensure that node1 is obfuscated in node2 as well as node2 being
|
||||
+ obfuscated in node1's archive.
|
||||
+ """
|
||||
+ self.log_info("Pre-loading multiple archives into obfuscation maps")
|
||||
+ for _arc in self.report_paths:
|
||||
+ is_dir = os.path.isdir(_arc)
|
||||
+ if is_dir:
|
||||
+ _arc_name = _arc
|
||||
+ else:
|
||||
+ archive = tarfile.open(_arc)
|
||||
+ _arc_name = _arc.split('/')[-1].split('.tar')[0]
|
||||
+ # for each parser, load the map_prep_file into memory, and then
|
||||
+ # send that for obfuscation. We don't actually obfuscate the file
|
||||
+ # here, do that in the normal archive loop
|
||||
+ for _parser in self.parsers:
|
||||
+ if not _parser.prep_map_file:
|
||||
+ continue
|
||||
+ _arc_path = os.path.join(_arc_name, _parser.prep_map_file)
|
||||
+ try:
|
||||
+ if is_dir:
|
||||
+ _pfile = open(_arc_path, 'r')
|
||||
+ content = _pfile.read()
|
||||
+ else:
|
||||
+ _pfile = archive.extractfile(_arc_path)
|
||||
+ content = _pfile.read().decode('utf-8')
|
||||
+ _pfile.close()
|
||||
+ if isinstance(_parser, SoSUsernameParser):
|
||||
+ _parser.load_usernames_into_map(content)
|
||||
+ for line in content.splitlines():
|
||||
+ if isinstance(_parser, SoSHostnameParser):
|
||||
+ _parser.load_hostname_into_map(line)
|
||||
+ self.obfuscate_line(line, _parser.prep_map_file)
|
||||
+ except Exception as err:
|
||||
+ self.log_debug("Could not prep %s: %s" % (_arc_path, err))
|
||||
+
|
||||
def obfuscate_report(self, report):
|
||||
"""Individually handle each archive or directory we've discovered by
|
||||
running through each file therein.
|
||||
@@ -493,7 +532,6 @@ third party.
|
||||
start_time = datetime.now()
|
||||
arc_md.add_field('start_time', start_time)
|
||||
archive.extract()
|
||||
- self.prep_maps_from_archive(archive)
|
||||
archive.report_msg("Beginning obfuscation...")
|
||||
|
||||
file_list = archive.get_file_list()
|
||||
@@ -542,35 +580,6 @@ third party.
|
||||
self.ui_log.info("Exception while processing %s: %s"
|
||||
% (report, err))
|
||||
|
||||
- def prep_maps_from_archive(self, archive):
|
||||
- """Open specific files from an archive and try to load those values
|
||||
- into our mappings before iterating through the entire archive.
|
||||
-
|
||||
- Positional arguments:
|
||||
-
|
||||
- :param archive SoSObfuscationArchive: An open archive object
|
||||
- """
|
||||
- for parser in self.parsers:
|
||||
- if not parser.prep_map_file:
|
||||
- continue
|
||||
- prep_file = archive.get_file_path(parser.prep_map_file)
|
||||
- if not prep_file:
|
||||
- self.log_debug("Could not prepare %s: %s does not exist"
|
||||
- % (parser.name, parser.prep_map_file),
|
||||
- caller=archive.archive_name)
|
||||
- continue
|
||||
- # this is a bit clunky, but we need to load this particular
|
||||
- # parser in a different way due to how hostnames are validated for
|
||||
- # obfuscation
|
||||
- if isinstance(parser, SoSHostnameParser):
|
||||
- with open(prep_file, 'r') as host_file:
|
||||
- hostname = host_file.readline().strip()
|
||||
- parser.load_hostname_into_map(hostname)
|
||||
- if isinstance(parser, SoSUsernameParser):
|
||||
- parser.load_usernames_into_map(prep_file)
|
||||
- self.obfuscate_file(prep_file, parser.prep_map_file,
|
||||
- archive.archive_name)
|
||||
-
|
||||
def obfuscate_file(self, filename, short_name=None, arc_name=None):
|
||||
"""Obfuscate and individual file, line by line.
|
||||
|
||||
diff --git a/sos/cleaner/parsers/username_parser.py b/sos/cleaner/parsers/username_parser.py
|
||||
index 5223c018..2bb6c7f3 100644
|
||||
--- a/sos/cleaner/parsers/username_parser.py
|
||||
+++ b/sos/cleaner/parsers/username_parser.py
|
||||
@@ -39,16 +39,15 @@ class SoSUsernameParser(SoSCleanerParser):
|
||||
super(SoSUsernameParser, self).__init__(conf_file)
|
||||
self.mapping.load_names_from_options(opt_names)
|
||||
|
||||
- def load_usernames_into_map(self, fname):
|
||||
+ def load_usernames_into_map(self, content):
|
||||
"""Since we don't get the list of usernames from a straight regex for
|
||||
this parser, we need to override the initial parser prepping here.
|
||||
"""
|
||||
- with open(fname, 'r') as lastfile:
|
||||
- for line in lastfile.read().splitlines()[1:]:
|
||||
- user = line.split()[0]
|
||||
- if user in self.skip_list:
|
||||
- continue
|
||||
- self.mapping.get(user)
|
||||
+ for line in content.splitlines()[1:]:
|
||||
+ user = line.split()[0]
|
||||
+ if user in self.skip_list:
|
||||
+ continue
|
||||
+ self.mapping.get(user)
|
||||
|
||||
def parse_line(self, line):
|
||||
count = 0
|
||||
--
|
||||
2.26.3
|
||||
|
||||
|
||||
From b713f458bfa92427147de754ea36054bfde53d71 Mon Sep 17 00:00:00 2001
|
||||
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||
Date: Wed, 14 Apr 2021 12:22:28 -0400
|
||||
Subject: [PATCH 2/2] [clean] Remove duplicate file skipping within
|
||||
obfuscate_line()
|
||||
|
||||
A redundant file skipping check was being executed within
|
||||
`obfuscate_line()` that would cause subsequent archives being obfuscated
|
||||
to skip line obfuscation within a file, despite iterating through the
|
||||
entire file.
|
||||
|
||||
Remove this redundant check, thus allowing proper obfuscation.
|
||||
|
||||
Closes: #2490
|
||||
Related: RHBZ#1930181
|
||||
Resolves: #2492
|
||||
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/cleaner/__init__.py | 11 +++--------
|
||||
sos/cleaner/obfuscation_archive.py | 2 --
|
||||
2 files changed, 3 insertions(+), 10 deletions(-)
|
||||
|
||||
diff --git a/sos/cleaner/__init__.py b/sos/cleaner/__init__.py
|
||||
index d10cdc55..bdd24f95 100644
|
||||
--- a/sos/cleaner/__init__.py
|
||||
+++ b/sos/cleaner/__init__.py
|
||||
@@ -508,7 +508,7 @@ third party.
|
||||
for line in content.splitlines():
|
||||
if isinstance(_parser, SoSHostnameParser):
|
||||
_parser.load_hostname_into_map(line)
|
||||
- self.obfuscate_line(line, _parser.prep_map_file)
|
||||
+ self.obfuscate_line(line)
|
||||
except Exception as err:
|
||||
self.log_debug("Could not prep %s: %s" % (_arc_path, err))
|
||||
|
||||
@@ -606,7 +606,7 @@ third party.
|
||||
if not line.strip():
|
||||
continue
|
||||
try:
|
||||
- line, count = self.obfuscate_line(line, short_name)
|
||||
+ line, count = self.obfuscate_line(line)
|
||||
subs += count
|
||||
tfile.write(line)
|
||||
except Exception as err:
|
||||
@@ -631,7 +631,7 @@ third party.
|
||||
pass
|
||||
return string_data
|
||||
|
||||
- def obfuscate_line(self, line, filename):
|
||||
+ def obfuscate_line(self, line):
|
||||
"""Run a line through each of the obfuscation parsers, keeping a
|
||||
cumulative total of substitutions done on that particular line.
|
||||
|
||||
@@ -639,16 +639,11 @@ third party.
|
||||
|
||||
:param line str: The raw line as read from the file being
|
||||
processed
|
||||
- :param filename str: Filename the line was read from
|
||||
|
||||
Returns the fully obfuscated line and the number of substitutions made
|
||||
"""
|
||||
count = 0
|
||||
for parser in self.parsers:
|
||||
- if filename and any([
|
||||
- re.match(_s, filename) for _s in parser.skip_files
|
||||
- ]):
|
||||
- continue
|
||||
try:
|
||||
line, _count = parser.parse_line(line)
|
||||
count += _count
|
||||
diff --git a/sos/cleaner/obfuscation_archive.py b/sos/cleaner/obfuscation_archive.py
|
||||
index 84ca30cd..c64ab13b 100644
|
||||
--- a/sos/cleaner/obfuscation_archive.py
|
||||
+++ b/sos/cleaner/obfuscation_archive.py
|
||||
@@ -219,8 +219,6 @@ class SoSObfuscationArchive():
|
||||
:param filename str: Filename relative to the extracted
|
||||
archive root
|
||||
"""
|
||||
- if filename in self.file_sub_list:
|
||||
- return True
|
||||
|
||||
if not os.path.isfile(self.get_file_path(filename)):
|
||||
return True
|
||||
--
|
||||
2.26.3
|
||||
|
99
SOURCES/sos-bz1967111-manpages-see-also.patch
Normal file
99
SOURCES/sos-bz1967111-manpages-see-also.patch
Normal file
@ -0,0 +1,99 @@
|
||||
From 3b439fb64d8d65b0c09aa8452bf0181ec20f8bcf Mon Sep 17 00:00:00 2001
|
||||
From: Jose Castillo <jcastillo@redhat.com>
|
||||
Date: Wed, 3 Mar 2021 13:03:16 +0100
|
||||
Subject: [PATCH] [man] Multiple fixes in man pages
|
||||
|
||||
This patch fixes references to sosreport, to the
|
||||
preferred 'sos report'. Also adds "SEE ALSO" consistently
|
||||
for all man pages, and fixes a MAINTAINER line.
|
||||
|
||||
Resolves: #2432
|
||||
|
||||
Signed-off-by: Jose Castillo <jcastillo@redhat.com>
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
man/en/sos-clean.1 | 5 +++++
|
||||
man/en/sos-collect.1 | 1 +
|
||||
man/en/sos-report.1 | 22 ++++++++++++++--------
|
||||
3 files changed, 20 insertions(+), 8 deletions(-)
|
||||
|
||||
diff --git a/man/en/sos-clean.1 b/man/en/sos-clean.1
|
||||
index 0c62ed07..d64a0ec7 100644
|
||||
--- a/man/en/sos-clean.1
|
||||
+++ b/man/en/sos-clean.1
|
||||
@@ -77,6 +77,11 @@ Default: 4
|
||||
.TP
|
||||
.B \-\-no-update
|
||||
Do not write the mapping file contents to /etc/sos/cleaner/default_mapping
|
||||
+.SH SEE ALSO
|
||||
+.BR sos (1)
|
||||
+.BR sos-report (1)
|
||||
+.BR sos-collect (1)
|
||||
+
|
||||
.SH MAINTAINER
|
||||
.nf
|
||||
Jake Hunsaker <jhunsake@redhat.com>
|
||||
diff --git a/man/en/sos-collect.1 b/man/en/sos-collect.1
|
||||
index d4e5e648..da36542d 100644
|
||||
--- a/man/en/sos-collect.1
|
||||
+++ b/man/en/sos-collect.1
|
||||
@@ -330,6 +330,7 @@ Sosreport option. Override the default compression type.
|
||||
.SH SEE ALSO
|
||||
.BR sos (1)
|
||||
.BR sos-report (1)
|
||||
+.BR sos-clean (1)
|
||||
|
||||
.SH MAINTAINER
|
||||
Jake Hunsaker <jhunsake@redhat.com>
|
||||
diff --git a/man/en/sos-report.1 b/man/en/sos-report.1
|
||||
index e7fae97b..81005959 100644
|
||||
--- a/man/en/sos-report.1
|
||||
+++ b/man/en/sos-report.1
|
||||
@@ -38,11 +38,12 @@ sosreport \- Collect and package diagnostic and support data
|
||||
[-h|--help]\fR
|
||||
|
||||
.SH DESCRIPTION
|
||||
-\fBsosreport\fR generates an archive of configuration and diagnostic
|
||||
-information from the running system. The archive may be stored locally
|
||||
-or centrally for recording or tracking purposes or may be sent to
|
||||
-technical support representatives, developers or system administrators
|
||||
-to assist with technical fault-finding and debugging.
|
||||
+\fBreport\fR is an sos subcommand that generates an archive of
|
||||
+configuration and diagnostic information from the running system.
|
||||
+The archive may be stored locally or centrally for recording or
|
||||
+tracking purposes or may be sent to technical support representatives,
|
||||
+developers or system administrators to assist with technical
|
||||
+fault-finding and debugging.
|
||||
.LP
|
||||
Sos is modular in design and is able to collect data from a wide
|
||||
range of subsystems and packages that may be installed. An
|
||||
@@ -110,8 +111,8 @@ User defined presets are saved under /var/lib/sos/presets as JSON-formatted file
|
||||
.B \--add-preset ADD_PRESET [options]
|
||||
Add a preset with name ADD_PRESET that enables [options] when called.
|
||||
|
||||
-For example, 'sosreport --add-preset mypreset --log-size=50 -n logs' will enable
|
||||
-a user to run 'sosreport --preset mypreset' that sets the maximum log size to
|
||||
+For example, 'sos report --add-preset mypreset --log-size=50 -n logs' will enable
|
||||
+a user to run 'sos report --preset mypreset' that sets the maximum log size to
|
||||
50 and disables the logs plugin.
|
||||
|
||||
Note: to set a description for the preset that is displayed with \fB--list-presets\fR,
|
||||
@@ -343,9 +344,14 @@ been tested for this port or may still be under active development.
|
||||
.TP
|
||||
.B \--help
|
||||
Display usage message.
|
||||
+.SH SEE ALSO
|
||||
+.BR sos (1)
|
||||
+.BR sos-clean (1)
|
||||
+.BR sos-collect (1)
|
||||
+
|
||||
.SH MAINTAINER
|
||||
.nf
|
||||
-Bryn M. Reeves <bmr@redhat.com>
|
||||
+Jake Hunsaker <jhunsake@redhat.com>
|
||||
.fi
|
||||
.SH AUTHORS & CONTRIBUTORS
|
||||
See \fBAUTHORS\fR file in the package documentation.
|
||||
--
|
||||
2.26.3
|
||||
|
315
SOURCES/sos-bz1967112-add-cmd-timeout.patch
Normal file
315
SOURCES/sos-bz1967112-add-cmd-timeout.patch
Normal file
@ -0,0 +1,315 @@
|
||||
From 90b6b709e9f4002376b656b155d00d85382f1828 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Mon, 29 Mar 2021 16:23:01 +0200
|
||||
Subject: [PATCH] [report] add --cmd-timeout option
|
||||
|
||||
Add --cmd-timeout option to configure command timeout. Plugin-specific
|
||||
option of the same name (i.e. -k logs.cmd-timeout=60) can control the
|
||||
timeout per plugin.
|
||||
|
||||
Option defaults and global/plugin-specific option preference follows the
|
||||
--plugin-timeout rules.
|
||||
|
||||
Resolves: #2466
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
man/en/sos-report.1 | 18 +++++++++-
|
||||
sos/collector/__init__.py | 3 ++
|
||||
sos/collector/sosnode.py | 5 +++
|
||||
sos/options.py | 3 +-
|
||||
sos/report/__init__.py | 5 ++-
|
||||
sos/report/plugins/__init__.py | 63 ++++++++++++++++++++++++----------
|
||||
6 files changed, 76 insertions(+), 21 deletions(-)
|
||||
|
||||
diff --git a/man/en/sos-report.1 b/man/en/sos-report.1
|
||||
index 81005959..51cf3436 100644
|
||||
--- a/man/en/sos-report.1
|
||||
+++ b/man/en/sos-report.1
|
||||
@@ -17,6 +17,7 @@ sosreport \- Collect and package diagnostic and support data
|
||||
[--label label] [--case-id id]\fR
|
||||
[--threads threads]\fR
|
||||
[--plugin-timeout TIMEOUT]\fR
|
||||
+ [--cmd-timeout TIMEOUT]\fR
|
||||
[-s|--sysroot SYSROOT]\fR
|
||||
[-c|--chroot {auto|always|never}\fR
|
||||
[--tmp-dir directory]\fR
|
||||
@@ -247,7 +248,7 @@ Specify a timeout in seconds to allow each plugin to run for. A value of 0
|
||||
means no timeout will be set. A value of -1 is used to indicate the default
|
||||
timeout of 300 seconds.
|
||||
|
||||
-Note that this options sets the timeout for all plugins. If you want to set
|
||||
+Note that this option sets the timeout for all plugins. If you want to set
|
||||
a timeout for a specific plugin, use the 'timeout' plugin option available to
|
||||
all plugins - e.g. '-k logs.timeout=600'.
|
||||
|
||||
@@ -255,6 +256,21 @@ The plugin-specific timeout option will override this option. For example, using
|
||||
\'--plugin-timeout=60 -k logs.timeout=600\' will set a timeout of 600 seconds for
|
||||
the logs plugin and 60 seconds for all other enabled plugins.
|
||||
.TP
|
||||
+.B \--cmd-timeout TIMEOUT
|
||||
+Specify a timeout limit in seconds for a command execution. Same defaults logic
|
||||
+from --plugin-timeout applies here.
|
||||
+
|
||||
+This option sets the command timeout for all plugins. If you want to set a cmd
|
||||
+timeout for a specific plugin, use the 'cmd-timeout' plugin option available to
|
||||
+all plugins - e.g. '-k logs.cmd-timeout=600'.
|
||||
+
|
||||
+Again, the same plugin/global precedence logic as for --plugin-timeout applies
|
||||
+here.
|
||||
+
|
||||
+Note that setting --cmd-timeout (or -k logs.cmd-timeout) high should be followed
|
||||
+by increasing the --plugin-timeout equivalent, otherwise the plugin can easily
|
||||
+timeout on slow commands execution.
|
||||
+.TP
|
||||
.B \--case-id NUMBER
|
||||
Specify a case identifier to associate with the archive.
|
||||
Identifiers may include alphanumeric characters, commas and periods ('.').
|
||||
diff --git a/sos/collector/__init__.py b/sos/collector/__init__.py
|
||||
index 406c8f35..1ae73508 100644
|
||||
--- a/sos/collector/__init__.py
|
||||
+++ b/sos/collector/__init__.py
|
||||
@@ -82,6 +82,7 @@ class SoSCollector(SoSComponent):
|
||||
'password_per_node': False,
|
||||
'plugin_options': [],
|
||||
'plugin_timeout': None,
|
||||
+ 'cmd_timeout': None,
|
||||
'preset': '',
|
||||
'save_group': '',
|
||||
'since': '',
|
||||
@@ -276,6 +277,8 @@ class SoSCollector(SoSComponent):
|
||||
help='Do not collect env vars in sosreports')
|
||||
sos_grp.add_argument('--plugin-timeout', type=int, default=None,
|
||||
help='Set the global plugin timeout value')
|
||||
+ sos_grp.add_argument('--cmd-timeout', type=int, default=None,
|
||||
+ help='Set the global command timeout value')
|
||||
sos_grp.add_argument('--since', default=None,
|
||||
help=('Escapes archived files older than date. '
|
||||
'This will also affect --all-logs. '
|
||||
diff --git a/sos/collector/sosnode.py b/sos/collector/sosnode.py
|
||||
index a1679655..dbbee12e 100644
|
||||
--- a/sos/collector/sosnode.py
|
||||
+++ b/sos/collector/sosnode.py
|
||||
@@ -664,6 +664,11 @@ class SosNode():
|
||||
'--skip-files=%s' % (quote(self.opts.skip_files))
|
||||
)
|
||||
|
||||
+ if self.check_sos_version('4.2'):
|
||||
+ if self.opts.cmd_timeout:
|
||||
+ sos_opts.append('--cmd-timeout=%s'
|
||||
+ % quote(str(self.opts.cmd_timeout)))
|
||||
+
|
||||
sos_cmd = sos_cmd.replace(
|
||||
'sosreport',
|
||||
os.path.join(self.host.sos_bin_path, self.sos_bin)
|
||||
diff --git a/sos/options.py b/sos/options.py
|
||||
index b82a7d36..1eda55d6 100644
|
||||
--- a/sos/options.py
|
||||
+++ b/sos/options.py
|
||||
@@ -283,7 +283,8 @@ class SoSOptions():
|
||||
if name in ("add_preset", "del_preset", "desc", "note"):
|
||||
return False
|
||||
# Exception list for options that still need to be reported when 0
|
||||
- if name in ['log_size', 'plugin_timeout'] and value == 0:
|
||||
+ if name in ['log_size', 'plugin_timeout', 'cmd_timeout'] \
|
||||
+ and value == 0:
|
||||
return True
|
||||
return has_value(name, value)
|
||||
|
||||
diff --git a/sos/report/__init__.py b/sos/report/__init__.py
|
||||
index 25478ba7..945d0fc1 100644
|
||||
--- a/sos/report/__init__.py
|
||||
+++ b/sos/report/__init__.py
|
||||
@@ -107,6 +107,7 @@ class SoSReport(SoSComponent):
|
||||
'only_plugins': [],
|
||||
'preset': 'auto',
|
||||
'plugin_timeout': 300,
|
||||
+ 'cmd_timeout': 300,
|
||||
'profiles': [],
|
||||
'since': None,
|
||||
'verify': False,
|
||||
@@ -266,6 +267,8 @@ class SoSReport(SoSComponent):
|
||||
help="A preset identifier", default="auto")
|
||||
report_grp.add_argument("--plugin-timeout", default=None,
|
||||
help="set a timeout for all plugins")
|
||||
+ report_grp.add_argument("--cmd-timeout", default=None,
|
||||
+ help="set a command timeout for all plugins")
|
||||
report_grp.add_argument("-p", "--profile", "--profiles",
|
||||
action="extend", dest="profiles", type=str,
|
||||
default=[],
|
||||
@@ -709,7 +712,7 @@ class SoSReport(SoSComponent):
|
||||
|
||||
self.ui_log.info(_("The following plugin options are available:"))
|
||||
for (plug, plugname, optname, optparm) in self.all_options:
|
||||
- if optname in ('timeout', 'postproc'):
|
||||
+ if optname in ('timeout', 'postproc', 'cmd-timeout'):
|
||||
continue
|
||||
# format option value based on its type (int or bool)
|
||||
if type(optparm["enabled"]) == bool:
|
||||
diff --git a/sos/report/plugins/__init__.py b/sos/report/plugins/__init__.py
|
||||
index 02625eb1..779119af 100644
|
||||
--- a/sos/report/plugins/__init__.py
|
||||
+++ b/sos/report/plugins/__init__.py
|
||||
@@ -472,6 +472,9 @@ class Plugin(object):
|
||||
_default_plug_opts = [
|
||||
('timeout', 'Timeout in seconds for plugin. The default value (-1) ' +
|
||||
'defers to the general plugin timeout, 300 seconds', 'fast', -1),
|
||||
+ ('cmd-timeout', 'Timeout in seconds for a command execution. The ' +
|
||||
+ 'default value (-1) defers to the general cmd timeout, 300 ' +
|
||||
+ 'seconds', 'fast', -1),
|
||||
('postproc', 'Enable post-processing collected plugin data', 'fast',
|
||||
True)
|
||||
]
|
||||
@@ -532,16 +535,15 @@ class Plugin(object):
|
||||
self.manifest.add_list('commands', [])
|
||||
self.manifest.add_list('files', [])
|
||||
|
||||
- @property
|
||||
- def timeout(self):
|
||||
- """Returns either the default plugin timeout value, the value as
|
||||
- provided on the commandline via -k plugin.timeout=value, or the value
|
||||
- of the global --plugin-timeout option.
|
||||
+ def timeout_from_options(self, optname, plugoptname, default_timeout):
|
||||
+ """Returns either the default [plugin|cmd] timeout value, the value as
|
||||
+ provided on the commandline via -k plugin.[|cmd-]timeout=value, or the
|
||||
+ value of the global --[plugin|cmd]-timeout option.
|
||||
"""
|
||||
_timeout = None
|
||||
try:
|
||||
- opt_timeout = self.get_option('plugin_timeout')
|
||||
- own_timeout = int(self.get_option('timeout'))
|
||||
+ opt_timeout = self.get_option(optname)
|
||||
+ own_timeout = int(self.get_option(plugoptname))
|
||||
if opt_timeout is None:
|
||||
_timeout = own_timeout
|
||||
elif opt_timeout is not None and own_timeout == -1:
|
||||
@@ -551,10 +553,30 @@ class Plugin(object):
|
||||
else:
|
||||
return None
|
||||
except ValueError:
|
||||
- return self.plugin_timeout # Default to known safe value
|
||||
+ return default_timeout # Default to known safe value
|
||||
if _timeout is not None and _timeout > -1:
|
||||
return _timeout
|
||||
- return self.plugin_timeout
|
||||
+ return default_timeout
|
||||
+
|
||||
+ @property
|
||||
+ def timeout(self):
|
||||
+ """Returns either the default plugin timeout value, the value as
|
||||
+ provided on the commandline via -k plugin.timeout=value, or the value
|
||||
+ of the global --plugin-timeout option.
|
||||
+ """
|
||||
+ _timeout = self.timeout_from_options('plugin_timeout', 'timeout',
|
||||
+ self.plugin_timeout)
|
||||
+ return _timeout
|
||||
+
|
||||
+ @property
|
||||
+ def cmdtimeout(self):
|
||||
+ """Returns either the default command timeout value, the value as
|
||||
+ provided on the commandline via -k plugin.cmd-timeout=value, or the
|
||||
+ value of the global --cmd-timeout option.
|
||||
+ """
|
||||
+ _cmdtimeout = self.timeout_from_options('cmd_timeout', 'cmd-timeout',
|
||||
+ self.cmd_timeout)
|
||||
+ return _cmdtimeout
|
||||
|
||||
def set_timeout_hit(self):
|
||||
self._timeout_hit = True
|
||||
@@ -1235,8 +1257,8 @@ class Plugin(object):
|
||||
"""
|
||||
|
||||
global_options = (
|
||||
- 'all_logs', 'allow_system_changes', 'log_size', 'plugin_timeout',
|
||||
- 'since', 'verify'
|
||||
+ 'all_logs', 'allow_system_changes', 'cmd_timeout', 'log_size',
|
||||
+ 'plugin_timeout', 'since', 'verify'
|
||||
)
|
||||
|
||||
if optionname in global_options:
|
||||
@@ -1505,7 +1527,7 @@ class Plugin(object):
|
||||
'tags': _spec_tags
|
||||
})
|
||||
|
||||
- def add_blockdev_cmd(self, cmds, devices='block', timeout=300,
|
||||
+ def add_blockdev_cmd(self, cmds, devices='block', timeout=None,
|
||||
sizelimit=None, chroot=True, runat=None, env=None,
|
||||
binary=False, prepend_path=None, whitelist=[],
|
||||
blacklist=[], tags=[]):
|
||||
@@ -1569,7 +1591,7 @@ class Plugin(object):
|
||||
whitelist=whitelist, blacklist=blacklist,
|
||||
tags=_dev_tags)
|
||||
|
||||
- def _add_device_cmd(self, cmds, devices, timeout=300, sizelimit=None,
|
||||
+ def _add_device_cmd(self, cmds, devices, timeout=None, sizelimit=None,
|
||||
chroot=True, runat=None, env=None, binary=False,
|
||||
prepend_path=None, whitelist=[], blacklist=[],
|
||||
tags=[]):
|
||||
@@ -1627,7 +1649,7 @@ class Plugin(object):
|
||||
changes=soscmd.changes)
|
||||
|
||||
def add_cmd_output(self, cmds, suggest_filename=None,
|
||||
- root_symlink=None, timeout=cmd_timeout, stderr=True,
|
||||
+ root_symlink=None, timeout=None, stderr=True,
|
||||
chroot=True, runat=None, env=None, binary=False,
|
||||
sizelimit=None, pred=None, subdir=None,
|
||||
changes=False, foreground=False, tags=[]):
|
||||
@@ -1849,7 +1871,7 @@ class Plugin(object):
|
||||
self._log_debug("added string ...'%s' as '%s'" % (summary, filename))
|
||||
|
||||
def _collect_cmd_output(self, cmd, suggest_filename=None,
|
||||
- root_symlink=False, timeout=cmd_timeout,
|
||||
+ root_symlink=False, timeout=None,
|
||||
stderr=True, chroot=True, runat=None, env=None,
|
||||
binary=False, sizelimit=None, subdir=None,
|
||||
changes=False, foreground=False, tags=[]):
|
||||
@@ -1883,6 +1905,8 @@ class Plugin(object):
|
||||
if self._timeout_hit:
|
||||
return
|
||||
|
||||
+ if timeout is None:
|
||||
+ timeout = self.cmdtimeout
|
||||
_tags = []
|
||||
|
||||
if isinstance(tags, str):
|
||||
@@ -1975,7 +1999,7 @@ class Plugin(object):
|
||||
return result
|
||||
|
||||
def collect_cmd_output(self, cmd, suggest_filename=None,
|
||||
- root_symlink=False, timeout=cmd_timeout,
|
||||
+ root_symlink=False, timeout=None,
|
||||
stderr=True, chroot=True, runat=None, env=None,
|
||||
binary=False, sizelimit=None, pred=None,
|
||||
subdir=None, tags=[]):
|
||||
@@ -2044,7 +2068,7 @@ class Plugin(object):
|
||||
tags=tags
|
||||
)
|
||||
|
||||
- def exec_cmd(self, cmd, timeout=cmd_timeout, stderr=True, chroot=True,
|
||||
+ def exec_cmd(self, cmd, timeout=None, stderr=True, chroot=True,
|
||||
runat=None, env=None, binary=False, pred=None,
|
||||
foreground=False, container=False, quotecmd=False):
|
||||
"""Execute a command right now and return the output and status, but
|
||||
@@ -2095,6 +2119,9 @@ class Plugin(object):
|
||||
if not self.test_predicate(cmd=True, pred=pred):
|
||||
return _default
|
||||
|
||||
+ if timeout is None:
|
||||
+ timeout = self.cmdtimeout
|
||||
+
|
||||
if chroot or self.commons['cmdlineopts'].chroot == 'always':
|
||||
root = self.sysroot
|
||||
else:
|
||||
@@ -2331,7 +2358,7 @@ class Plugin(object):
|
||||
|
||||
def add_journal(self, units=None, boot=None, since=None, until=None,
|
||||
lines=None, allfields=False, output=None,
|
||||
- timeout=cmd_timeout, identifier=None, catalog=None,
|
||||
+ timeout=None, identifier=None, catalog=None,
|
||||
sizelimit=None, pred=None, tags=[]):
|
||||
"""Collect journald logs from one of more units.
|
||||
|
||||
--
|
||||
2.26.3
|
||||
|
50
SOURCES/sos-bz1967113-ds-mask-password-in-ldif.patch
Normal file
50
SOURCES/sos-bz1967113-ds-mask-password-in-ldif.patch
Normal file
@ -0,0 +1,50 @@
|
||||
From 153c0154050a111fd7e5bcf4a685f906a1dea737 Mon Sep 17 00:00:00 2001
|
||||
From: Jose Castillo <jcastillo@redhat.com>
|
||||
Date: Wed, 10 Mar 2021 15:33:50 +0100
|
||||
Subject: [PATCH] [ds] Mask password and encription keys in ldif files
|
||||
|
||||
Both /etc/dirsrv/slapd*/dse.ldif{,.startOK} files contain
|
||||
sensitive information :
|
||||
- all the nsSymmetricKey entries : symmetric encryption key
|
||||
- nsslapd-rootpw : the admin password's hash
|
||||
|
||||
This patch masks these entries in the files we collect.
|
||||
|
||||
Resolves: #2442
|
||||
|
||||
Signed-off-by: Jose Castillo <jcastillo@redhat.com>
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/report/plugins/ds.py | 18 ++++++++++++++++++
|
||||
1 file changed, 18 insertions(+)
|
||||
|
||||
diff --git a/sos/report/plugins/ds.py b/sos/report/plugins/ds.py
|
||||
index f4d68d6e..d467dc89 100644
|
||||
--- a/sos/report/plugins/ds.py
|
||||
+++ b/sos/report/plugins/ds.py
|
||||
@@ -74,4 +74,22 @@ class DirectoryServer(Plugin, RedHatPlugin):
|
||||
|
||||
self.add_cmd_output("ls -l /var/lib/dirsrv/slapd-*/db/*")
|
||||
|
||||
+ def postproc(self):
|
||||
+ # Example for scrubbing rootpw hash
|
||||
+ #
|
||||
+ # nsslapd-rootpw: AAAAB3NzaC1yc2EAAAADAQABAAABAQDeXYA3juyPqaUuyfWV2HuIM
|
||||
+ # v3gebb/5cvx9ehEAFF2yIKvsQN2EJGTV+hBM1DEOB4eyy/H11NqcNwm/2QsagDB3PVwYp
|
||||
+ # 9VKN3BdhQjlhuoYKhLwgtYUMiGL8AX5g1qxjirIkTRJwjbXkSNuQaXig7wVjmvXnB2o7B
|
||||
+ # zLtu99DiL1AizfVeZTYA+OVowYKYaXYljVmVKS+g3t29Obaom54ZLpfuoGMmyO64AJrWs
|
||||
+ #
|
||||
+ # to
|
||||
+ #
|
||||
+ # nsslapd-rootpw:********
|
||||
+
|
||||
+ regexppass = r"(nsslapd-rootpw(\s)*:(\s)*)(\S+)([\r\n]\s.*)*\n"
|
||||
+ regexpkey = r"(nsSymmetricKey(\s)*::(\s)*)(\S+)([\r\n]\s.*)*\n"
|
||||
+ repl = r"\1********\n"
|
||||
+ self.do_path_regex_sub('/etc/dirsrv/*', regexppass, repl)
|
||||
+ self.do_path_regex_sub('/etc/dirsrv/*', regexpkey, repl)
|
||||
+
|
||||
# vim: set et ts=4 sw=4 :
|
||||
--
|
||||
2.26.3
|
||||
|
30
SOURCES/sos-bz1967114-gather-cups-browsed-logs.patch
Normal file
30
SOURCES/sos-bz1967114-gather-cups-browsed-logs.patch
Normal file
@ -0,0 +1,30 @@
|
||||
From 0d56e43299009ffa91f665d85b5a08ba76da9c1f Mon Sep 17 00:00:00 2001
|
||||
From: Jose Castillo <jcastillo@redhat.com>
|
||||
Date: Wed, 17 Mar 2021 13:10:36 +0100
|
||||
Subject: [PATCH] [cups] Add gathering cups-browsed logs
|
||||
|
||||
Gather logs from the service cups-browsed sent
|
||||
to the journal.
|
||||
|
||||
Resolves: #2452
|
||||
|
||||
Signed-off-by: Jose Castillo <jcastillo@redhat.com>
|
||||
Signed-off-by: Bryan Quigley <code@bryanquigley.com>
|
||||
---
|
||||
sos/report/plugins/cups.py | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/sos/report/plugins/cups.py b/sos/report/plugins/cups.py
|
||||
index 29a903e8..ab7b6b70 100644
|
||||
--- a/sos/report/plugins/cups.py
|
||||
+++ b/sos/report/plugins/cups.py
|
||||
@@ -40,5 +40,6 @@ class Cups(Plugin, IndependentPlugin):
|
||||
])
|
||||
|
||||
self.add_journal(units="cups")
|
||||
+ self.add_journal(units="cups-browsed")
|
||||
|
||||
# vim: set et ts=4 sw=4 :
|
||||
--
|
||||
2.26.3
|
||||
|
62
SOURCES/sos-bz1967115-sssd-memcache-and-logs.patch
Normal file
62
SOURCES/sos-bz1967115-sssd-memcache-and-logs.patch
Normal file
@ -0,0 +1,62 @@
|
||||
From d03c2fa4439c87783293c922b2825cf86e8818bd Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Pawe=C5=82=20Po=C5=82awski?= <ppolawsk@redhat.com>
|
||||
Date: Fri, 12 Mar 2021 12:42:30 +0100
|
||||
Subject: [PATCH] [sssd] Enable collecting SSSD memory cache
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
SSSD plugin by default collects only logs and configuration.
|
||||
This patch enables collecting memory cache maintained
|
||||
by SSSD daemon. Cache does not contain any client sensible
|
||||
data so can be safely included in the sos-report.
|
||||
|
||||
Resolves: #2444
|
||||
|
||||
Signed-off-by: Paweł Poławski <ppolawsk@redhat.com>
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/report/plugins/sssd.py | 8 ++++++--
|
||||
1 file changed, 6 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/sos/report/plugins/sssd.py b/sos/report/plugins/sssd.py
|
||||
index 9469c41c..aeb68c4f 100644
|
||||
--- a/sos/report/plugins/sssd.py
|
||||
+++ b/sos/report/plugins/sssd.py
|
||||
@@ -10,6 +10,7 @@
|
||||
|
||||
from sos.report.plugins import (Plugin, RedHatPlugin, DebianPlugin,
|
||||
UbuntuPlugin, SoSPredicate)
|
||||
+from glob import glob
|
||||
|
||||
|
||||
class Sssd(Plugin):
|
||||
@@ -22,11 +23,22 @@ class Sssd(Plugin):
|
||||
|
||||
def setup(self):
|
||||
self.add_copy_spec([
|
||||
+ # main config file
|
||||
"/etc/sssd/sssd.conf",
|
||||
- "/var/log/sssd/*",
|
||||
- "/var/lib/sss/pubconf/krb5.include.d/*",
|
||||
# SSSD 1.14
|
||||
- "/etc/sssd/conf.d/*.conf"
|
||||
+ "/etc/sssd/conf.d/*.conf",
|
||||
+ # dynamic Kerberos configuration
|
||||
+ "/var/lib/sss/pubconf/krb5.include.d/*"
|
||||
+ ])
|
||||
+
|
||||
+ # add individual log files
|
||||
+ self.add_copy_spec(glob("/var/log/sssd/*log*"))
|
||||
+
|
||||
+ # add memory cache
|
||||
+ self.add_copy_spec([
|
||||
+ "/var/lib/sss/mc/passwd",
|
||||
+ "/var/lib/sss/mc/group",
|
||||
+ "/var/lib/sss/mc/initgroups"
|
||||
])
|
||||
|
||||
# call sssctl commands only when sssd service is running,
|
||||
--
|
||||
2.26.3
|
||||
|
29
SOURCES/sos-bz1967116-ibmvNIC-dynamic-debugs.patch
Normal file
29
SOURCES/sos-bz1967116-ibmvNIC-dynamic-debugs.patch
Normal file
@ -0,0 +1,29 @@
|
||||
From dddabb07a88d398ed7b8a878e95acfd968af6698 Mon Sep 17 00:00:00 2001
|
||||
From: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
Date: Tue, 23 Mar 2021 17:58:30 +0530
|
||||
Subject: [PATCH] This patch is to update kernel plugin to collect
|
||||
dynamic_debug log files for ibmvNIC
|
||||
|
||||
Resolves: #2458
|
||||
|
||||
Signed-off-by: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
Signed-off-by: Bryan Quigley <code@bryanquigley.com>
|
||||
---
|
||||
sos/report/plugins/kernel.py | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/sos/report/plugins/kernel.py b/sos/report/plugins/kernel.py
|
||||
index febe2ad0..dd7b6939 100644
|
||||
--- a/sos/report/plugins/kernel.py
|
||||
+++ b/sos/report/plugins/kernel.py
|
||||
@@ -106,6 +106,7 @@ class Kernel(Plugin, IndependentPlugin):
|
||||
"/proc/misc",
|
||||
"/var/log/dmesg",
|
||||
"/sys/fs/pstore",
|
||||
+ "/sys/kernel/debug/dynamic_debug/control",
|
||||
clocksource_path + "available_clocksource",
|
||||
clocksource_path + "current_clocksource"
|
||||
])
|
||||
--
|
||||
2.26.3
|
||||
|
147
SOURCES/sos-bz1967117-pulpcore-plugin.patch
Normal file
147
SOURCES/sos-bz1967117-pulpcore-plugin.patch
Normal file
@ -0,0 +1,147 @@
|
||||
From 808d9f35ac504a58c337ffed14b39119a591808f Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Tue, 27 Apr 2021 22:16:08 +0200
|
||||
Subject: [PATCH] [pulpcore] add plugin for pulp-3
|
||||
|
||||
Pulp-3 / pulpcore as a revolution from pulp-2 needs a separate
|
||||
plugin, since both plugins have nothing in common and there might
|
||||
be deployments where is active both pulp-2 and pulp-3.
|
||||
|
||||
Resolves: #2278
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/report/plugins/pulpcore.py | 120 +++++++++++++++++++++++++++++++++
|
||||
1 file changed, 120 insertions(+)
|
||||
create mode 100644 sos/report/plugins/pulpcore.py
|
||||
|
||||
diff --git a/sos/report/plugins/pulpcore.py b/sos/report/plugins/pulpcore.py
|
||||
new file mode 100644
|
||||
index 00000000..20403814
|
||||
--- /dev/null
|
||||
+++ b/sos/report/plugins/pulpcore.py
|
||||
@@ -0,0 +1,120 @@
|
||||
+# Copyright (C) 2021 Red Hat, Inc., Pavel Moravec <pmoravec@redhat.com>
|
||||
+
|
||||
+# This file is part of the sos project: https://github.com/sosreport/sos
|
||||
+#
|
||||
+# This copyrighted material is made available to anyone wishing to use,
|
||||
+# modify, copy, or redistribute it subject to the terms and conditions of
|
||||
+# version 2 of the GNU General Public License.
|
||||
+#
|
||||
+# See the LICENSE file in the source distribution for further information.
|
||||
+
|
||||
+from sos.report.plugins import Plugin, IndependentPlugin
|
||||
+from pipes import quote
|
||||
+from re import match
|
||||
+
|
||||
+
|
||||
+class PulpCore(Plugin, IndependentPlugin):
|
||||
+
|
||||
+ short_desc = 'Pulp-3 aka pulpcore'
|
||||
+
|
||||
+ plugin_name = "pulpcore"
|
||||
+ commands = ("pulpcore-manager",)
|
||||
+ files = ("/etc/pulp/settings.py",)
|
||||
+ option_list = [
|
||||
+ ('task-days', 'days of tasks history', 'fast', 7)
|
||||
+ ]
|
||||
+
|
||||
+ def parse_settings_config(self):
|
||||
+ databases_scope = False
|
||||
+ self.dbhost = "localhost"
|
||||
+ self.dbport = 5432
|
||||
+ self.dbpasswd = ""
|
||||
+ # TODO: read also redis config (we dont expect much customisations)
|
||||
+ # TODO: read also db user (pulp) and database name (pulpcore)
|
||||
+ self.staticroot = "/var/lib/pulp/assets"
|
||||
+ self.uploaddir = "/var/lib/pulp/media/upload"
|
||||
+
|
||||
+ def separate_value(line, sep=':'):
|
||||
+ # an auxiliary method to parse values from lines like:
|
||||
+ # 'HOST': 'localhost',
|
||||
+ val = line.split(sep)[1].lstrip().rstrip(',')
|
||||
+ if (val.startswith('"') and val.endswith('"')) or \
|
||||
+ (val.startswith('\'') and val.endswith('\'')):
|
||||
+ val = val[1:-1]
|
||||
+ return val
|
||||
+
|
||||
+ try:
|
||||
+ for line in open("/etc/pulp/settings.py").read().splitlines():
|
||||
+ # skip empty lines and lines with comments
|
||||
+ if not line or line[0] == '#':
|
||||
+ continue
|
||||
+ if line.startswith("DATABASES"):
|
||||
+ databases_scope = True
|
||||
+ continue
|
||||
+ # example HOST line to parse:
|
||||
+ # 'HOST': 'localhost',
|
||||
+ if databases_scope and match(r"\s+'HOST'\s*:\s+\S+", line):
|
||||
+ self.dbhost = separate_value(line)
|
||||
+ if databases_scope and match(r"\s+'PORT'\s*:\s+\S+", line):
|
||||
+ self.dbport = separate_value(line)
|
||||
+ if databases_scope and match(r"\s+'PASSWORD'\s*:\s+\S+", line):
|
||||
+ self.dbpasswd = separate_value(line)
|
||||
+ # if line contains closing '}' database_scope end
|
||||
+ if databases_scope and '}' in line:
|
||||
+ databases_scope = False
|
||||
+ if line.startswith("STATIC_ROOT = "):
|
||||
+ self.staticroot = separate_value(line, sep='=')
|
||||
+ if line.startswith("CHUNKED_UPLOAD_DIR = "):
|
||||
+ self.uploaddir = separate_value(line, sep='=')
|
||||
+ except IOError:
|
||||
+ # fallback when the cfg file is not accessible
|
||||
+ pass
|
||||
+ # set the password to os.environ when calling psql commands to prevent
|
||||
+ # printing it in sos logs
|
||||
+ # we can't set os.environ directly now: other plugins can overwrite it
|
||||
+ self.env = {"PGPASSWORD": self.dbpasswd}
|
||||
+
|
||||
+ def setup(self):
|
||||
+ self.parse_settings_config()
|
||||
+
|
||||
+ self.add_copy_spec("/etc/pulp/settings.py")
|
||||
+
|
||||
+ self.add_cmd_output("rq info -u redis://localhost:6379/8",
|
||||
+ env={"LC_ALL": "en_US.UTF-8"},
|
||||
+ suggest_filename="rq_info")
|
||||
+ self.add_cmd_output("curl -ks https://localhost/pulp/api/v3/status/",
|
||||
+ suggest_filename="pulp_status")
|
||||
+ dynaconf_env = {"LC_ALL": "en_US.UTF-8",
|
||||
+ "PULP_SETTINGS": "/etc/pulp/settings.py",
|
||||
+ "DJANGO_SETTINGS_MODULE": "pulpcore.app.settings"}
|
||||
+ self.add_cmd_output("dynaconf list", env=dynaconf_env)
|
||||
+ for _dir in [self.staticroot, self.uploaddir]:
|
||||
+ self.add_cmd_output("ls -l %s" % _dir)
|
||||
+
|
||||
+ task_days = self.get_option('task-days')
|
||||
+ for table in ['core_task', 'core_taskgroup',
|
||||
+ 'core_reservedresourcerecord',
|
||||
+ 'core_taskreservedresourcerecord',
|
||||
+ 'core_groupprogressreport', 'core_progressreport']:
|
||||
+ _query = "select * from %s where pulp_last_updated > NOW() - " \
|
||||
+ "interval '%s days' order by pulp_last_updated" % \
|
||||
+ (table, task_days)
|
||||
+ _cmd = "psql -h %s -p %s -U pulp -d pulpcore -c %s" % \
|
||||
+ (self.dbhost, self.dbport, quote(_query))
|
||||
+ self.add_cmd_output(_cmd, env=self.env, suggest_filename=table)
|
||||
+
|
||||
+ def postproc(self):
|
||||
+ # TODO obfuscate from /etc/pulp/settings.py :
|
||||
+ # SECRET_KEY = "eKfeDkTnvss7p5WFqYdGPWxXfHnsbDBx"
|
||||
+ # 'PASSWORD': 'tGrag2DmtLqKLTWTQ6U68f6MAhbqZVQj',
|
||||
+ self.do_path_regex_sub(
|
||||
+ "/etc/pulp/settings.py",
|
||||
+ r"(SECRET_KEY\s*=\s*)(.*)",
|
||||
+ r"\1********")
|
||||
+ self.do_path_regex_sub(
|
||||
+ "/etc/pulp/settings.py",
|
||||
+ r"(PASSWORD\S*\s*:\s*)(.*)",
|
||||
+ r"\1********")
|
||||
+
|
||||
+
|
||||
+# vim: set et ts=4 sw=4 :
|
||||
--
|
||||
2.26.3
|
||||
|
30
SOURCES/sos-bz1967118-saphana-traceback.patch
Normal file
30
SOURCES/sos-bz1967118-saphana-traceback.patch
Normal file
@ -0,0 +1,30 @@
|
||||
From c998ea8c1c950586f91fc9728ee66590740968a5 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Tue, 11 May 2021 15:59:40 +0200
|
||||
Subject: [PATCH] [saphana] remove redundant unused argument of get_inst_info
|
||||
|
||||
get_inst_info does not use and isnt called with 'prefix' argument
|
||||
|
||||
Resolves: #2535
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/saphana.py | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/sos/report/plugins/saphana.py b/sos/report/plugins/saphana.py
|
||||
index 82c497b4..00e84b59 100644
|
||||
--- a/sos/report/plugins/saphana.py
|
||||
+++ b/sos/report/plugins/saphana.py
|
||||
@@ -51,7 +51,7 @@ class saphana(Plugin, RedHatPlugin):
|
||||
inst = inst.strip()[-2:]
|
||||
self.get_inst_info(sid, sidadm, inst)
|
||||
|
||||
- def get_inst_info(self, prefix, sid, sidadm, inst):
|
||||
+ def get_inst_info(self, sid, sidadm, inst):
|
||||
proc_cmd = 'su - %s -c "sapcontrol -nr %s -function GetProcessList"'
|
||||
status_fname = "%s_%s_status" % (sid, inst)
|
||||
self.add_cmd_output(
|
||||
--
|
||||
2.26.3
|
||||
|
36
SOURCES/sos-bz1967119-collect-nstat.patch
Normal file
36
SOURCES/sos-bz1967119-collect-nstat.patch
Normal file
@ -0,0 +1,36 @@
|
||||
From 575ddeddf2f6e1d6a639922f9ccc51c7e46fbe12 Mon Sep 17 00:00:00 2001
|
||||
From: Seiichi Ikarashi <s.ikarashi@jp.fujitsu.com>
|
||||
Date: Fri, 14 May 2021 09:49:33 +0900
|
||||
Subject: [PATCH] [networking] Add nstat command support
|
||||
|
||||
As netstat command is being deprecated,
|
||||
we need nstat as an alternative to "netstat -s".
|
||||
|
||||
Signed-off-by: Seiichi Ikarashi <s.ikarashi@fujitsu.com>
|
||||
---
|
||||
sos/report/plugins/networking.py | 2 ++
|
||||
1 file changed, 2 insertions(+)
|
||||
|
||||
diff --git a/sos/report/plugins/networking.py b/sos/report/plugins/networking.py
|
||||
index 8b4614bb..acfa027f 100644
|
||||
--- a/sos/report/plugins/networking.py
|
||||
+++ b/sos/report/plugins/networking.py
|
||||
@@ -87,6 +87,7 @@ class Networking(Plugin):
|
||||
root_symlink="netstat")
|
||||
|
||||
self.add_cmd_output([
|
||||
+ "nstat -zas",
|
||||
"netstat -s",
|
||||
"netstat %s -agn" % self.ns_wide,
|
||||
"ip route show table all",
|
||||
@@ -198,6 +199,7 @@ class Networking(Plugin):
|
||||
ns_cmd_prefix + "netstat %s -neopa" % self.ns_wide,
|
||||
ns_cmd_prefix + "netstat -s",
|
||||
ns_cmd_prefix + "netstat %s -agn" % self.ns_wide,
|
||||
+ ns_cmd_prefix + "nstat -zas",
|
||||
])
|
||||
|
||||
ss_cmd = ns_cmd_prefix + "ss -peaonmi"
|
||||
--
|
||||
2.26.3
|
||||
|
@ -0,0 +1,121 @@
|
||||
From 60105e0705f3483b9a3e8e98dafd6f0e1e277ab7 Mon Sep 17 00:00:00 2001
|
||||
From: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
Date: Mon, 19 Apr 2021 16:55:52 +0530
|
||||
Subject: [PATCH 1/3] [block]:Patch to update block pluging to collect disk
|
||||
info
|
||||
|
||||
This patch is to update block plugin to collect
|
||||
state of sda
|
||||
|
||||
Resolves: #2504
|
||||
|
||||
Signed-off-by: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
---
|
||||
sos/report/plugins/block.py | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/sos/report/plugins/block.py b/sos/report/plugins/block.py
|
||||
index f93b3231..c959d667 100644
|
||||
--- a/sos/report/plugins/block.py
|
||||
+++ b/sos/report/plugins/block.py
|
||||
@@ -38,7 +38,8 @@ class Block(Plugin, IndependentPlugin):
|
||||
"/run/blkid/blkid.tab",
|
||||
"/proc/partitions",
|
||||
"/proc/diskstats",
|
||||
- "/sys/block/*/queue/"
|
||||
+ "/sys/block/*/queue/",
|
||||
+ "/sys/block/sd*/device/state",
|
||||
])
|
||||
|
||||
cmds = [
|
||||
--
|
||||
2.26.3
|
||||
|
||||
|
||||
From c6e0fe5cebd0d9581950db75fa2d234713b7e15a Mon Sep 17 00:00:00 2001
|
||||
From: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
Date: Mon, 26 Apr 2021 23:09:19 +0530
|
||||
Subject: [PATCH 2/3] [snapper]:Ptach to update snapper plugin to collect
|
||||
snapper info
|
||||
|
||||
This patch is to Introduce snapper plugin to collect
|
||||
/usr/lib/snapper/ information to check executable
|
||||
permission for installation-helper command
|
||||
|
||||
Resolves: #2504
|
||||
|
||||
Signed-off-by: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
---
|
||||
sos/report/plugins/snapper.py | 27 +++++++++++++++++++++++++++
|
||||
1 file changed, 27 insertions(+)
|
||||
create mode 100644 sos/report/plugins/snapper.py
|
||||
|
||||
diff --git a/sos/report/plugins/snapper.py b/sos/report/plugins/snapper.py
|
||||
new file mode 100644
|
||||
index 00000000..9ef5fec2
|
||||
--- /dev/null
|
||||
+++ b/sos/report/plugins/snapper.py
|
||||
@@ -0,0 +1,27 @@
|
||||
+# This file is part of the sos project: https://github.com/sosreport/sos
|
||||
+#
|
||||
+# This copyrighted material is made available to anyone wishing to use,
|
||||
+# modify, copy, or redistribute it subject to the terms and conditions of
|
||||
+# version 2 of the GNU General Public License.
|
||||
+#
|
||||
+# See the LICENSE file in the source distribution for further information.
|
||||
+
|
||||
+from sos.report.plugins import Plugin, IndependentPlugin
|
||||
+
|
||||
+
|
||||
+class Snapper(Plugin, IndependentPlugin):
|
||||
+
|
||||
+ short_desc = 'System snapper'
|
||||
+
|
||||
+ plugin_name = 'snapper'
|
||||
+ commands = ("snapper",)
|
||||
+
|
||||
+ def setup(self):
|
||||
+
|
||||
+ self.add_cmd_output([
|
||||
+ "ls -la /usr/lib/snapper/",
|
||||
+ "snapper --version",
|
||||
+ "snapper list"
|
||||
+ ])
|
||||
+
|
||||
+# vim: set et ts=4 sw=4 :
|
||||
--
|
||||
2.26.3
|
||||
|
||||
|
||||
From 61ff5ce165e654a02fe80b9de5ec8e49ed808ec9 Mon Sep 17 00:00:00 2001
|
||||
From: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
Date: Mon, 19 Apr 2021 17:49:08 +0530
|
||||
Subject: [PATCH 3/3] [kernel]:Patch to update kernel plugin to collect debug
|
||||
info
|
||||
|
||||
This patch is to update kernel plugin to collect
|
||||
page allocation failure info
|
||||
|
||||
Resolves: #2504
|
||||
|
||||
Signed-off-by: Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
|
||||
---
|
||||
sos/report/plugins/kernel.py | 2 ++
|
||||
1 file changed, 2 insertions(+)
|
||||
|
||||
diff --git a/sos/report/plugins/kernel.py b/sos/report/plugins/kernel.py
|
||||
index dd7b6939..9d53ca03 100644
|
||||
--- a/sos/report/plugins/kernel.py
|
||||
+++ b/sos/report/plugins/kernel.py
|
||||
@@ -107,6 +107,8 @@ class Kernel(Plugin, IndependentPlugin):
|
||||
"/var/log/dmesg",
|
||||
"/sys/fs/pstore",
|
||||
"/sys/kernel/debug/dynamic_debug/control",
|
||||
+ "/sys/kernel/debug/extfrag/unusable_index",
|
||||
+ "/sys/kernel/debug/extfrag/extfrag_index",
|
||||
clocksource_path + "available_clocksource",
|
||||
clocksource_path + "current_clocksource"
|
||||
])
|
||||
--
|
||||
2.26.3
|
||||
|
36
SOURCES/sos-bz1967718-sssd-common.patch
Normal file
36
SOURCES/sos-bz1967718-sssd-common.patch
Normal file
@ -0,0 +1,36 @@
|
||||
From 630dfbee936050698d33b59abd1e243c44e50af8 Mon Sep 17 00:00:00 2001
|
||||
From: Jan Jansky <jjansky@redhat.com>
|
||||
Date: Thu, 3 Jun 2021 15:04:57 +0200
|
||||
Subject: [PATCH] [sssd] sssd plugin when sssd-common
|
||||
|
||||
We have reports that sssd logs are not
|
||||
collected, when we investigated
|
||||
we found associate wants to collect
|
||||
sssd related logs also when only
|
||||
sssd-common package is installed.
|
||||
|
||||
We got this confirmed by sbr-idm.
|
||||
|
||||
Resolves: #2571
|
||||
|
||||
Signed-off-by: Jan Jansky <jjansky@redhat.com>
|
||||
---
|
||||
sos/report/plugins/sssd.py | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/sos/report/plugins/sssd.py b/sos/report/plugins/sssd.py
|
||||
index 17933935..6f98e90c 100644
|
||||
--- a/sos/report/plugins/sssd.py
|
||||
+++ b/sos/report/plugins/sssd.py
|
||||
@@ -19,7 +19,7 @@ class Sssd(Plugin):
|
||||
|
||||
plugin_name = "sssd"
|
||||
profiles = ('services', 'security', 'identity')
|
||||
- packages = ('sssd',)
|
||||
+ packages = ('sssd', 'sssd-common')
|
||||
|
||||
def setup(self):
|
||||
self.add_copy_spec([
|
||||
--
|
||||
2.26.3
|
||||
|
32
SOURCES/sos-bz1985976-enhance-tc-hw-offload.patch
Normal file
32
SOURCES/sos-bz1985976-enhance-tc-hw-offload.patch
Normal file
@ -0,0 +1,32 @@
|
||||
From bbb7f8bf522960a8ca7625f539e9e5d109abb704 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Wed, 19 May 2021 08:31:45 +0200
|
||||
Subject: [PATCH] [networking] collect also tc filter show ingress
|
||||
|
||||
Both "tc -s filter show dev %eth [|ingress]" commands required as
|
||||
they provide different output.
|
||||
|
||||
Resolves: #2550
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/networking.py | 3 ++-
|
||||
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/sos/report/plugins/networking.py b/sos/report/plugins/networking.py
|
||||
index acfa027f..35646268 100644
|
||||
--- a/sos/report/plugins/networking.py
|
||||
+++ b/sos/report/plugins/networking.py
|
||||
@@ -156,7 +156,8 @@ class Networking(Plugin):
|
||||
"ethtool --phy-statistics " + eth,
|
||||
"ethtool --show-priv-flags " + eth,
|
||||
"ethtool --show-eee " + eth,
|
||||
- "tc -s filter show dev " + eth
|
||||
+ "tc -s filter show dev " + eth,
|
||||
+ "tc -s filter show dev " + eth + " ingress",
|
||||
], tags=eth)
|
||||
|
||||
# skip EEPROM collection by default, as it might hang or
|
||||
--
|
||||
2.26.3
|
||||
|
78
SOURCES/sos-bz1985982-obfuscate-fqdn-from-dnf-log.patch
Normal file
78
SOURCES/sos-bz1985982-obfuscate-fqdn-from-dnf-log.patch
Normal file
@ -0,0 +1,78 @@
|
||||
From b27140a9126ea82efb517d60bf1b8455aaf4f5a6 Mon Sep 17 00:00:00 2001
|
||||
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||
Date: Fri, 26 Mar 2021 11:12:33 -0400
|
||||
Subject: [PATCH] [cleaner] Only skip packaging-based files for the IP parser
|
||||
|
||||
Files primarily containing package information, e.g. `installed-rpms` or
|
||||
`installed-debs`, were previously being skipped by all parsers. In
|
||||
reality, we only need to skip these for the IP parser due to the fact
|
||||
that version numbers often generate a match for IP address regexes.
|
||||
|
||||
This will also fix a problem where if a system was the build host for
|
||||
certain packages, the hostname would remain in these files as the
|
||||
hostname parser was previously not checking these files.
|
||||
|
||||
Closes: #2400
|
||||
Resolves: #2464
|
||||
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/cleaner/obfuscation_archive.py | 10 ----------
|
||||
sos/cleaner/parsers/ip_parser.py | 16 ++++++++++++++++
|
||||
2 files changed, 16 insertions(+), 10 deletions(-)
|
||||
|
||||
diff --git a/sos/cleaner/obfuscation_archive.py b/sos/cleaner/obfuscation_archive.py
|
||||
index 981cc05f..84ca30cd 100644
|
||||
--- a/sos/cleaner/obfuscation_archive.py
|
||||
+++ b/sos/cleaner/obfuscation_archive.py
|
||||
@@ -59,20 +59,10 @@ class SoSObfuscationArchive():
|
||||
Returns: list of files and file regexes
|
||||
"""
|
||||
return [
|
||||
- 'installed-debs',
|
||||
- 'installed-rpms',
|
||||
- 'sos_commands/dpkg',
|
||||
- 'sos_commands/python/pip_list',
|
||||
- 'sos_commands/rpm',
|
||||
- 'sos_commands/yum/.*list.*',
|
||||
- 'sos_commands/snappy/snap_list_--all',
|
||||
- 'sos_commands/snappy/snap_--version',
|
||||
- 'sos_commands/vulkan/vulkaninfo',
|
||||
'sys/firmware',
|
||||
'sys/fs',
|
||||
'sys/kernel/debug',
|
||||
'sys/module',
|
||||
- 'var/log/.*dnf.*',
|
||||
r'.*\.tar$', # TODO: support archive unpacking
|
||||
# Be explicit with these tar matches to avoid matching commands
|
||||
r'.*\.tar\.xz',
|
||||
diff --git a/sos/cleaner/parsers/ip_parser.py b/sos/cleaner/parsers/ip_parser.py
|
||||
index 3ea7f865..08d1cd05 100644
|
||||
--- a/sos/cleaner/parsers/ip_parser.py
|
||||
+++ b/sos/cleaner/parsers/ip_parser.py
|
||||
@@ -24,6 +24,22 @@ class SoSIPParser(SoSCleanerParser):
|
||||
# don't match package versions recorded in journals
|
||||
r'.*dnf\[.*\]:'
|
||||
]
|
||||
+
|
||||
+ skip_files = [
|
||||
+ # skip these as version numbers will frequently look like IP addresses
|
||||
+ # when using regex matching
|
||||
+ 'installed-debs',
|
||||
+ 'installed-rpms',
|
||||
+ 'sos_commands/dpkg',
|
||||
+ 'sos_commands/python/pip_list',
|
||||
+ 'sos_commands/rpm',
|
||||
+ 'sos_commands/yum/.*list.*',
|
||||
+ 'sos_commands/snappy/snap_list_--all',
|
||||
+ 'sos_commands/snappy/snap_--version',
|
||||
+ 'sos_commands/vulkan/vulkaninfo',
|
||||
+ 'var/log/.*dnf.*'
|
||||
+ ]
|
||||
+
|
||||
map_file_key = 'ip_map'
|
||||
prep_map_file = 'sos_commands/networking/ip_-o_addr'
|
||||
|
||||
--
|
||||
2.26.3
|
||||
|
2156
SOURCES/sos-bz1985983-ocp-cluster-cleaner.patch
Normal file
2156
SOURCES/sos-bz1985983-ocp-cluster-cleaner.patch
Normal file
File diff suppressed because it is too large
Load Diff
284
SOURCES/sos-bz1985985-sos-log-effective-options.patch
Normal file
284
SOURCES/sos-bz1985985-sos-log-effective-options.patch
Normal file
@ -0,0 +1,284 @@
|
||||
From 00d12ad3cf24dcc6c73e9bcf63db1d3f17e58bb1 Mon Sep 17 00:00:00 2001
|
||||
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||
Date: Thu, 1 Jul 2021 10:50:54 -0400
|
||||
Subject: [PATCH] [sosnode] Properly format skip-commands and skip-files on
|
||||
nodes
|
||||
|
||||
Fixes an issue where options provided for `skip-commands` and
|
||||
`skip-files` were not properly formatted, thus causing an exception
|
||||
during the finalization of the node's sos command.
|
||||
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/collector/sosnode.py | 5 +++--
|
||||
1 file changed, 3 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/sos/collector/sosnode.py b/sos/collector/sosnode.py
|
||||
index 6597d236..426edcba 100644
|
||||
--- a/sos/collector/sosnode.py
|
||||
+++ b/sos/collector/sosnode.py
|
||||
@@ -734,11 +734,12 @@ class SosNode():
|
||||
if self.check_sos_version('4.1'):
|
||||
if self.opts.skip_commands:
|
||||
sos_opts.append(
|
||||
- '--skip-commands=%s' % (quote(self.opts.skip_commands))
|
||||
+ '--skip-commands=%s' % (
|
||||
+ quote(','.join(self.opts.skip_commands)))
|
||||
)
|
||||
if self.opts.skip_files:
|
||||
sos_opts.append(
|
||||
- '--skip-files=%s' % (quote(self.opts.skip_files))
|
||||
+ '--skip-files=%s' % (quote(','.join(self.opts.skip_files)))
|
||||
)
|
||||
|
||||
if self.check_sos_version('4.2'):
|
||||
--
|
||||
2.31.1
|
||||
|
||||
From de7edce3f92ed50abcb28dd0dbcbeb104dc7c679 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Fri, 2 Jul 2021 09:52:11 +0200
|
||||
Subject: [PATCH] [collector] fix a typo in --plugin-option
|
||||
|
||||
Sos report uses --plugin-option or --plugopts.
|
||||
|
||||
Relevant: #2606
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/collector/__init__.py | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/sos/collector/__init__.py b/sos/collector/__init__.py
|
||||
index 6d96d692..f072287e 100644
|
||||
--- a/sos/collector/__init__.py
|
||||
+++ b/sos/collector/__init__.py
|
||||
@@ -272,7 +272,7 @@ class SoSCollector(SoSComponent):
|
||||
help="chroot executed commands to SYSROOT")
|
||||
sos_grp.add_argument('-e', '--enable-plugins', action="extend",
|
||||
help='Enable specific plugins for sosreport')
|
||||
- sos_grp.add_argument('-k', '--plugin-options', action="extend",
|
||||
+ sos_grp.add_argument('-k', '--plugin-option', action="extend",
|
||||
help='Plugin option as plugname.option=value')
|
||||
sos_grp.add_argument('--log-size', default=0, type=int,
|
||||
help='Limit the size of individual logs (in MiB)')
|
||||
--
|
||||
2.31.1
|
||||
|
||||
From 24a79ae8df8f29276f6139c68d4ba9b05114f951 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Fri, 2 Jul 2021 09:53:47 +0200
|
||||
Subject: [PATCH] [options] allow variant option names in config file
|
||||
|
||||
While cmdline allows --plugin-option as well as --plugopts,
|
||||
it stores the value under `plugopts` key. Therefore parsing
|
||||
config file ignores --plugin-option.
|
||||
|
||||
Similarly for --name/--label and --profile/--profiles.
|
||||
|
||||
When processing config file, we must unify those potentially duplicit
|
||||
keys.
|
||||
|
||||
Resolves: #2606
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/options.py | 9 +++++++++
|
||||
1 file changed, 9 insertions(+)
|
||||
|
||||
diff --git a/sos/options.py b/sos/options.py
|
||||
index 1eda55d6..a014a022 100644
|
||||
--- a/sos/options.py
|
||||
+++ b/sos/options.py
|
||||
@@ -186,9 +186,18 @@ class SoSOptions():
|
||||
if 'verbose' in odict.keys():
|
||||
odict['verbosity'] = int(odict.pop('verbose'))
|
||||
# convert options names
|
||||
+ # unify some of them if multiple variants of the
|
||||
+ # cmdoption exist
|
||||
+ rename_opts = {
|
||||
+ 'name': 'label',
|
||||
+ 'plugin_option': 'plugopts',
|
||||
+ 'profile': 'profiles'
|
||||
+ }
|
||||
for key in list(odict):
|
||||
if '-' in key:
|
||||
odict[key.replace('-', '_')] = odict.pop(key)
|
||||
+ if key in rename_opts:
|
||||
+ odict[rename_opts[key]] = odict.pop(key)
|
||||
# set the values according to the config file
|
||||
for key, val in odict.items():
|
||||
if isinstance(val, str):
|
||||
--
|
||||
2.31.1
|
||||
|
||||
From c7d3644c0c64e9e5439806250592a55c8e2de26f Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Thu, 1 Jul 2021 08:11:15 +0200
|
||||
Subject: [PATCH] [report,collect] unify --map-file arguments
|
||||
|
||||
Unify --map[-file] argument among report/collect/clean.
|
||||
|
||||
Resolves: #2602
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/cleaner/__init__.py | 2 +-
|
||||
sos/collector/__init__.py | 2 +-
|
||||
sos/report/__init__.py | 2 +-
|
||||
3 files changed, 3 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/sos/cleaner/__init__.py b/sos/cleaner/__init__.py
|
||||
index 7414b55e0..4c9837826 100644
|
||||
--- a/sos/cleaner/__init__.py
|
||||
+++ b/sos/cleaner/__init__.py
|
||||
@@ -192,7 +192,7 @@ def add_parser_options(cls, parser):
|
||||
'file for obfuscation'))
|
||||
clean_grp.add_argument('--no-update', dest='no_update', default=False,
|
||||
action='store_true',
|
||||
- help='Do not update the --map file with new '
|
||||
+ help='Do not update the --map-file with new '
|
||||
'mappings from this run')
|
||||
clean_grp.add_argument('--keep-binary-files', default=False,
|
||||
action='store_true',
|
||||
diff --git a/sos/collector/__init__.py b/sos/collector/__init__.py
|
||||
index 7b8cfcf72..6d96d6923 100644
|
||||
--- a/sos/collector/__init__.py
|
||||
+++ b/sos/collector/__init__.py
|
||||
@@ -427,7 +427,7 @@ def add_parser_options(cls, parser):
|
||||
cleaner_grp.add_argument('--no-update', action='store_true',
|
||||
default=False, dest='no_update',
|
||||
help='Do not update the default cleaner map')
|
||||
- cleaner_grp.add_argument('--map', dest='map_file',
|
||||
+ cleaner_grp.add_argument('--map-file', dest='map_file',
|
||||
default='/etc/sos/cleaner/default_mapping',
|
||||
help=('Provide a previously generated mapping'
|
||||
' file for obfuscation'))
|
||||
diff --git a/sos/report/__init__.py b/sos/report/__init__.py
|
||||
index 7ad2d24a4..411c4eb03 100644
|
||||
--- a/sos/report/__init__.py
|
||||
+++ b/sos/report/__init__.py
|
||||
@@ -341,7 +341,7 @@ def add_parser_options(cls, parser):
|
||||
cleaner_grp.add_argument('--no-update', action='store_true',
|
||||
default=False, dest='no_update',
|
||||
help='Do not update the default cleaner map')
|
||||
- cleaner_grp.add_argument('--map', dest='map_file',
|
||||
+ cleaner_grp.add_argument('--map-file', dest='map_file',
|
||||
default='/etc/sos/cleaner/default_mapping',
|
||||
help=('Provide a previously generated mapping'
|
||||
' file for obfuscation'))
|
||||
From fd75745e7a5a6c5def8e6d23190227872b9912c3 Mon Sep 17 00:00:00 2001
|
||||
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||
Date: Wed, 11 Aug 2021 10:48:41 -0400
|
||||
Subject: [PATCH] [sosnode] Fix passing of plugin options when using
|
||||
`--only-plugins`
|
||||
|
||||
Fixes the handling of plugin options passed by `sos collect` to each
|
||||
node by first aligning the SoSOption name to those of `report`
|
||||
(`plugopts`), and second re-arranges the handling of plugin options and
|
||||
preset options passed by the user when also using `--only-plugins` so
|
||||
that the former are preserved and passed only with the `--only-plugins`
|
||||
option value.
|
||||
|
||||
Resolves: #2641
|
||||
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/collector/__init__.py | 5 +++--
|
||||
sos/collector/sosnode.py | 34 +++++++++++++++++-----------------
|
||||
2 files changed, 20 insertions(+), 19 deletions(-)
|
||||
|
||||
diff --git a/sos/collector/__init__.py b/sos/collector/__init__.py
|
||||
index 57ef074e..70b7a69e 100644
|
||||
--- a/sos/collector/__init__.py
|
||||
+++ b/sos/collector/__init__.py
|
||||
@@ -84,7 +84,7 @@ class SoSCollector(SoSComponent):
|
||||
'only_plugins': [],
|
||||
'password': False,
|
||||
'password_per_node': False,
|
||||
- 'plugin_options': [],
|
||||
+ 'plugopts': [],
|
||||
'plugin_timeout': None,
|
||||
'cmd_timeout': None,
|
||||
'preset': '',
|
||||
@@ -273,7 +273,8 @@ class SoSCollector(SoSComponent):
|
||||
help="chroot executed commands to SYSROOT")
|
||||
sos_grp.add_argument('-e', '--enable-plugins', action="extend",
|
||||
help='Enable specific plugins for sosreport')
|
||||
- sos_grp.add_argument('-k', '--plugin-option', action="extend",
|
||||
+ sos_grp.add_argument('-k', '--plugin-option', '--plugopts',
|
||||
+ action="extend", dest='plugopts',
|
||||
help='Plugin option as plugname.option=value')
|
||||
sos_grp.add_argument('--log-size', default=0, type=int,
|
||||
help='Limit the size of individual logs (in MiB)')
|
||||
diff --git a/sos/collector/sosnode.py b/sos/collector/sosnode.py
|
||||
index 426edcba..5d05c297 100644
|
||||
--- a/sos/collector/sosnode.py
|
||||
+++ b/sos/collector/sosnode.py
|
||||
@@ -667,10 +667,10 @@ class SosNode():
|
||||
|
||||
if self.cluster.sos_plugin_options:
|
||||
for opt in self.cluster.sos_plugin_options:
|
||||
- if not any(opt in o for o in self.plugin_options):
|
||||
+ if not any(opt in o for o in self.plugopts):
|
||||
option = '%s=%s' % (opt,
|
||||
self.cluster.sos_plugin_options[opt])
|
||||
- self.plugin_options.append(option)
|
||||
+ self.plugopts.append(option)
|
||||
|
||||
# set master-only options
|
||||
if self.cluster.check_node_is_master(self):
|
||||
@@ -688,7 +688,7 @@ class SosNode():
|
||||
self.only_plugins = list(self.opts.only_plugins)
|
||||
self.skip_plugins = list(self.opts.skip_plugins)
|
||||
self.enable_plugins = list(self.opts.enable_plugins)
|
||||
- self.plugin_options = list(self.opts.plugin_options)
|
||||
+ self.plugopts = list(self.opts.plugopts)
|
||||
self.preset = list(self.opts.preset)
|
||||
|
||||
def finalize_sos_cmd(self):
|
||||
@@ -754,6 +754,20 @@ class SosNode():
|
||||
os.path.join(self.host.sos_bin_path, self.sos_bin)
|
||||
)
|
||||
|
||||
+ if self.plugopts:
|
||||
+ opts = [o for o in self.plugopts
|
||||
+ if self._plugin_exists(o.split('.')[0])
|
||||
+ and self._plugin_option_exists(o.split('=')[0])]
|
||||
+ if opts:
|
||||
+ sos_opts.append('-k %s' % quote(','.join(o for o in opts)))
|
||||
+
|
||||
+ if self.preset:
|
||||
+ if self._preset_exists(self.preset):
|
||||
+ sos_opts.append('--preset=%s' % quote(self.preset))
|
||||
+ else:
|
||||
+ self.log_debug('Requested to enable preset %s but preset does '
|
||||
+ 'not exist on node' % self.preset)
|
||||
+
|
||||
if self.only_plugins:
|
||||
plugs = [o for o in self.only_plugins if self._plugin_exists(o)]
|
||||
if len(plugs) != len(self.only_plugins):
|
||||
@@ -792,20 +806,6 @@ class SosNode():
|
||||
if enable:
|
||||
sos_opts.append('--enable-plugins=%s' % quote(enable))
|
||||
|
||||
- if self.plugin_options:
|
||||
- opts = [o for o in self.plugin_options
|
||||
- if self._plugin_exists(o.split('.')[0])
|
||||
- and self._plugin_option_exists(o.split('=')[0])]
|
||||
- if opts:
|
||||
- sos_opts.append('-k %s' % quote(','.join(o for o in opts)))
|
||||
-
|
||||
- if self.preset:
|
||||
- if self._preset_exists(self.preset):
|
||||
- sos_opts.append('--preset=%s' % quote(self.preset))
|
||||
- else:
|
||||
- self.log_debug('Requested to enable preset %s but preset does '
|
||||
- 'not exist on node' % self.preset)
|
||||
-
|
||||
self.sos_cmd = "%s %s" % (sos_cmd, ' '.join(sos_opts))
|
||||
self.log_info('Final sos command set to %s' % self.sos_cmd)
|
||||
self.manifest.add_field('final_sos_command', self.sos_cmd)
|
||||
--
|
||||
2.31.1
|
||||
|
387
SOURCES/sos-bz1992859-rhui-plugin.patch
Normal file
387
SOURCES/sos-bz1992859-rhui-plugin.patch
Normal file
@ -0,0 +1,387 @@
|
||||
From 94b9b90c818eb18f0ca8d78fe063dc5b0677c885 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Tue, 22 Jun 2021 12:58:03 +0200
|
||||
Subject: [PATCH] [rhui] add plugin to RHUI
|
||||
|
||||
Add a new/revoked plugin for RHUI (newly based on python3 and pulp-3).
|
||||
|
||||
Edditionally, collect /etc/pki/pulp certificates except for RSA keys.
|
||||
|
||||
Resolves: #2590
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/pulpcore.py | 7 ++++-
|
||||
sos/report/plugins/rhui.py | 49 ++++++++++++++++++++++++++++++++++
|
||||
2 files changed, 55 insertions(+), 1 deletion(-)
|
||||
create mode 100644 sos/report/plugins/rhui.py
|
||||
|
||||
diff --git a/sos/report/plugins/pulpcore.py b/sos/report/plugins/pulpcore.py
|
||||
index ccaac3185..77ceacb92 100644
|
||||
--- a/sos/report/plugins/pulpcore.py
|
||||
+++ b/sos/report/plugins/pulpcore.py
|
||||
@@ -77,7 +77,12 @@ def separate_value(line, sep=':'):
|
||||
def setup(self):
|
||||
self.parse_settings_config()
|
||||
|
||||
- self.add_copy_spec("/etc/pulp/settings.py")
|
||||
+ self.add_copy_spec([
|
||||
+ "/etc/pulp/settings.py",
|
||||
+ "/etc/pki/pulp/*"
|
||||
+ ])
|
||||
+ # skip collecting certificate keys
|
||||
+ self.add_forbidden_path("/etc/pki/pulp/*.key")
|
||||
|
||||
self.add_cmd_output("rq info -u redis://localhost:6379/8",
|
||||
env={"LC_ALL": "en_US.UTF-8"},
|
||||
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||
new file mode 100644
|
||||
index 000000000..7acd3f49e
|
||||
--- /dev/null
|
||||
+++ b/sos/report/plugins/rhui.py
|
||||
@@ -0,0 +1,49 @@
|
||||
+# Copyright (C) 2021 Red Hat, Inc., Pavel Moravec <pmoravec@redhat.com>
|
||||
+
|
||||
+# This file is part of the sos project: https://github.com/sosreport/sos
|
||||
+#
|
||||
+# This copyrighted material is made available to anyone wishing to use,
|
||||
+# modify, copy, or redistribute it subject to the terms and conditions of
|
||||
+# version 2 of the GNU General Public License.
|
||||
+#
|
||||
+# See the LICENSE file in the source distribution for further information.
|
||||
+
|
||||
+from sos.report.plugins import Plugin, RedHatPlugin
|
||||
+
|
||||
+
|
||||
+class Rhui(Plugin, RedHatPlugin):
|
||||
+
|
||||
+ short_desc = 'Red Hat Update Infrastructure'
|
||||
+
|
||||
+ plugin_name = "rhui"
|
||||
+ commands = ("rhui-manager",)
|
||||
+ files = ("/etc/ansible/facts.d/rhui_auth.fact", "/usr/lib/rhui/cds.py")
|
||||
+
|
||||
+ def setup(self):
|
||||
+ self.add_copy_spec([
|
||||
+ "/etc/rhui/rhui-tools.conf",
|
||||
+ "/etc/rhui/registered_subscriptions.conf",
|
||||
+ "/etc/pki/rhui/*",
|
||||
+ "/var/log/rhui-subscription-sync.log",
|
||||
+ "/var/cache/rhui/*",
|
||||
+ "/root/.rhui/*",
|
||||
+ ])
|
||||
+ # skip collecting certificate keys
|
||||
+ self.add_forbidden_path("/etc/pki/rhui/*.key")
|
||||
+
|
||||
+ self.add_cmd_output([
|
||||
+ "rhui-manager status",
|
||||
+ "rhui-manager cert info",
|
||||
+ "ls -lR /var/lib/rhui/remote_share",
|
||||
+ ])
|
||||
+
|
||||
+ def postproc(self):
|
||||
+ # obfuscate admin_pw and secret_key values
|
||||
+ for prop in ["admin_pw", "secret_key"]:
|
||||
+ self.do_path_regex_sub(
|
||||
+ "/etc/ansible/facts.d/rhui_auth.fact",
|
||||
+ r"(%s\s*=\s*)(.*)" % prop,
|
||||
+ r"\1********")
|
||||
+
|
||||
+
|
||||
+# vim: set et ts=4 sw=4 :
|
||||
From bd15dc764c9d4554d8e8f08163228d65ca099985 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Thu, 24 Jun 2021 17:53:27 +0200
|
||||
Subject: [PATCH 1/4] [plugins] Allow add_forbidden_path to apply glob
|
||||
recursively
|
||||
|
||||
Add option to apply glob.glob to forbidden path recursively.
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/__init__.py | 6 ++++--
|
||||
1 file changed, 4 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/sos/report/plugins/__init__.py b/sos/report/plugins/__init__.py
|
||||
index 06923300..6fd1a3b2 100644
|
||||
--- a/sos/report/plugins/__init__.py
|
||||
+++ b/sos/report/plugins/__init__.py
|
||||
@@ -1187,12 +1187,14 @@ class Plugin(object):
|
||||
'symlink': "no"
|
||||
})
|
||||
|
||||
- def add_forbidden_path(self, forbidden):
|
||||
+ def add_forbidden_path(self, forbidden, recursive=False):
|
||||
"""Specify a path, or list of paths, to not copy, even if it's part of
|
||||
an ``add_copy_spec()`` call
|
||||
|
||||
:param forbidden: A filepath to forbid collection from
|
||||
:type forbidden: ``str`` or a ``list`` of strings
|
||||
+
|
||||
+ :param recursive: Should forbidden glob be applied recursively
|
||||
"""
|
||||
if isinstance(forbidden, str):
|
||||
forbidden = [forbidden]
|
||||
@@ -1202,7 +1204,7 @@ class Plugin(object):
|
||||
|
||||
for forbid in forbidden:
|
||||
self._log_info("adding forbidden path '%s'" % forbid)
|
||||
- for path in glob.glob(forbid):
|
||||
+ for path in glob.glob(forbid, recursive=recursive):
|
||||
self.forbidden_paths.append(path)
|
||||
|
||||
def get_all_options(self):
|
||||
--
|
||||
2.31.1
|
||||
|
||||
|
||||
From b695201baeb629a6543445d98dbb04f357670621 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Thu, 24 Jun 2021 17:57:48 +0200
|
||||
Subject: [PATCH 2/4] [pulpcore] improve settings.py parsing
|
||||
|
||||
- deal with /etc/pulp/settings.py as a one-line string
|
||||
- parse dbname from it as well
|
||||
- dont collect any *.key file from whole /etc/pki/pulp dir
|
||||
|
||||
Related: #2593
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/pulpcore.py | 23 +++++++++++++++--------
|
||||
1 file changed, 15 insertions(+), 8 deletions(-)
|
||||
|
||||
diff --git a/sos/report/plugins/pulpcore.py b/sos/report/plugins/pulpcore.py
|
||||
index 77ceacb9..be526035 100644
|
||||
--- a/sos/report/plugins/pulpcore.py
|
||||
+++ b/sos/report/plugins/pulpcore.py
|
||||
@@ -28,9 +28,10 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||
databases_scope = False
|
||||
self.dbhost = "localhost"
|
||||
self.dbport = 5432
|
||||
+ self.dbname = "pulpcore"
|
||||
self.dbpasswd = ""
|
||||
# TODO: read also redis config (we dont expect much customisations)
|
||||
- # TODO: read also db user (pulp) and database name (pulpcore)
|
||||
+ # TODO: read also db user (pulp)
|
||||
self.staticroot = "/var/lib/pulp/assets"
|
||||
self.uploaddir = "/var/lib/pulp/media/upload"
|
||||
|
||||
@@ -44,7 +45,10 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||
return val
|
||||
|
||||
try:
|
||||
- for line in open("/etc/pulp/settings.py").read().splitlines():
|
||||
+ # split the lines to "one option per line" format
|
||||
+ for line in open("/etc/pulp/settings.py").read() \
|
||||
+ .replace(',', ',\n').replace('{', '{\n') \
|
||||
+ .replace('}', '\n}').splitlines():
|
||||
# skip empty lines and lines with comments
|
||||
if not line or line[0] == '#':
|
||||
continue
|
||||
@@ -53,11 +57,14 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||
continue
|
||||
# example HOST line to parse:
|
||||
# 'HOST': 'localhost',
|
||||
- if databases_scope and match(r"\s+'HOST'\s*:\s+\S+", line):
|
||||
+ pattern = r"\s*['|\"]%s['|\"]\s*:\s*\S+"
|
||||
+ if databases_scope and match(pattern % 'HOST', line):
|
||||
self.dbhost = separate_value(line)
|
||||
- if databases_scope and match(r"\s+'PORT'\s*:\s+\S+", line):
|
||||
+ if databases_scope and match(pattern % 'PORT', line):
|
||||
self.dbport = separate_value(line)
|
||||
- if databases_scope and match(r"\s+'PASSWORD'\s*:\s+\S+", line):
|
||||
+ if databases_scope and match(pattern % 'NAME', line):
|
||||
+ self.dbname = separate_value(line)
|
||||
+ if databases_scope and match(pattern % 'PASSWORD', line):
|
||||
self.dbpasswd = separate_value(line)
|
||||
# if line contains closing '}' database_scope end
|
||||
if databases_scope and '}' in line:
|
||||
@@ -82,7 +89,7 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||
"/etc/pki/pulp/*"
|
||||
])
|
||||
# skip collecting certificate keys
|
||||
- self.add_forbidden_path("/etc/pki/pulp/*.key")
|
||||
+ self.add_forbidden_path("/etc/pki/pulp/**/*.key", recursive=True)
|
||||
|
||||
self.add_cmd_output("rq info -u redis://localhost:6379/8",
|
||||
env={"LC_ALL": "en_US.UTF-8"},
|
||||
@@ -104,8 +111,8 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||
_query = "select * from %s where pulp_last_updated > NOW() - " \
|
||||
"interval '%s days' order by pulp_last_updated" % \
|
||||
(table, task_days)
|
||||
- _cmd = "psql -h %s -p %s -U pulp -d pulpcore -c %s" % \
|
||||
- (self.dbhost, self.dbport, quote(_query))
|
||||
+ _cmd = "psql -h %s -p %s -U pulp -d %s -c %s" % \
|
||||
+ (self.dbhost, self.dbport, self.dbname, quote(_query))
|
||||
self.add_cmd_output(_cmd, env=self.env, suggest_filename=table)
|
||||
|
||||
def postproc(self):
|
||||
--
|
||||
2.31.1
|
||||
|
||||
|
||||
From 0286034da44bce43ab368dfc6815da7d74d60719 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Thu, 24 Jun 2021 17:59:36 +0200
|
||||
Subject: [PATCH 3/4] [rhui] call rhui-* commands with proper env and timeout
|
||||
|
||||
rhui-manager commands timeout when not being logged in, which
|
||||
should be reacted by adding proper cmd timeout.
|
||||
|
||||
Adding the env.variable ensures potentially unaswered "RHUI Username:"
|
||||
is also printed/colected.
|
||||
|
||||
Further, prevent collecting any *.key file from the whole /etc/pki/rhui
|
||||
dir.
|
||||
|
||||
Related: #2593
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/rhui.py | 7 +++++--
|
||||
1 file changed, 5 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||
index 7acd3f49..5a152427 100644
|
||||
--- a/sos/report/plugins/rhui.py
|
||||
+++ b/sos/report/plugins/rhui.py
|
||||
@@ -29,13 +29,16 @@ class Rhui(Plugin, RedHatPlugin):
|
||||
"/root/.rhui/*",
|
||||
])
|
||||
# skip collecting certificate keys
|
||||
- self.add_forbidden_path("/etc/pki/rhui/*.key")
|
||||
+ self.add_forbidden_path("/etc/pki/rhui/**/*.key", recursive=True)
|
||||
|
||||
+ # call rhui-manager commands with 1m timeout and
|
||||
+ # with an env. variable ensuring that "RHUI Username:"
|
||||
+ # even unanswered prompt gets collected
|
||||
self.add_cmd_output([
|
||||
"rhui-manager status",
|
||||
"rhui-manager cert info",
|
||||
"ls -lR /var/lib/rhui/remote_share",
|
||||
- ])
|
||||
+ ], timeout=60, env={'PYTHONUNBUFFERED': '1'})
|
||||
|
||||
def postproc(self):
|
||||
# obfuscate admin_pw and secret_key values
|
||||
--
|
||||
2.31.1
|
||||
|
||||
|
||||
From a656bd239ab86dfd8973f733ae2c0fbd0c57d416 Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Thu, 24 Jun 2021 18:01:14 +0200
|
||||
Subject: [PATCH 4/4] [rhui] fix broken obfuscation
|
||||
|
||||
- /etc/ansible/facts.d/rhui_*.fact must be collected by
|
||||
rhui plugin to let some file to be obfuscated there
|
||||
- obfuscate also cookies values that can grant login access
|
||||
|
||||
Resolves: #2593
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/ansible.py | 3 +++
|
||||
sos/report/plugins/rhui.py | 7 +++++++
|
||||
2 files changed, 10 insertions(+)
|
||||
|
||||
diff --git a/sos/report/plugins/ansible.py b/sos/report/plugins/ansible.py
|
||||
index 3e5d3d37..5991b786 100644
|
||||
--- a/sos/report/plugins/ansible.py
|
||||
+++ b/sos/report/plugins/ansible.py
|
||||
@@ -29,4 +29,7 @@ class Ansible(Plugin, RedHatPlugin, UbuntuPlugin):
|
||||
"ansible --version"
|
||||
])
|
||||
|
||||
+ # let rhui plugin collects the RHUI specific files
|
||||
+ self.add_forbidden_path("/etc/ansible/facts.d/rhui_*.fact")
|
||||
+
|
||||
# vim: set et ts=4 sw=4 :
|
||||
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||
index 5a152427..1d479f85 100644
|
||||
--- a/sos/report/plugins/rhui.py
|
||||
+++ b/sos/report/plugins/rhui.py
|
||||
@@ -27,6 +27,7 @@ class Rhui(Plugin, RedHatPlugin):
|
||||
"/var/log/rhui-subscription-sync.log",
|
||||
"/var/cache/rhui/*",
|
||||
"/root/.rhui/*",
|
||||
+ "/etc/ansible/facts.d/rhui_*.fact",
|
||||
])
|
||||
# skip collecting certificate keys
|
||||
self.add_forbidden_path("/etc/pki/rhui/**/*.key", recursive=True)
|
||||
@@ -47,6 +48,12 @@ class Rhui(Plugin, RedHatPlugin):
|
||||
"/etc/ansible/facts.d/rhui_auth.fact",
|
||||
r"(%s\s*=\s*)(.*)" % prop,
|
||||
r"\1********")
|
||||
+ # obfuscate twoo cookies for login session
|
||||
+ for cookie in ["csrftoken", "sessionid"]:
|
||||
+ self.do_path_regex_sub(
|
||||
+ r"/root/\.rhui/.*/cookies.txt",
|
||||
+ r"(%s\s+)(\S+)" % cookie,
|
||||
+ r"\1********")
|
||||
|
||||
|
||||
# vim: set et ts=4 sw=4 :
|
||||
--
|
||||
2.31.1
|
||||
|
||||
From 4e5bebffca9936bcdf4d38aad9989970a15dd72b Mon Sep 17 00:00:00 2001
|
||||
From: Pavel Moravec <pmoravec@redhat.com>
|
||||
Date: Tue, 3 Aug 2021 21:54:33 +0200
|
||||
Subject: [PATCH] [rhui] Update the plugin on several places
|
||||
|
||||
- obfuscate "rhui_manager_password: xxx" in /root/.rhui/answers.yaml*
|
||||
- no need to collect or obfuscate anything from /etc/ansible/facts.d
|
||||
- newly detect the plugin via /etc/rhui/rhui-tools.conf file or rhui-manager
|
||||
command (only)
|
||||
|
||||
Resolves: #2637
|
||||
|
||||
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||
---
|
||||
sos/report/plugins/rhui.py | 14 ++++++--------
|
||||
1 file changed, 6 insertions(+), 8 deletions(-)
|
||||
|
||||
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||
index 1d479f85..52065fb4 100644
|
||||
--- a/sos/report/plugins/rhui.py
|
||||
+++ b/sos/report/plugins/rhui.py
|
||||
@@ -16,8 +16,8 @@ class Rhui(Plugin, RedHatPlugin):
|
||||
short_desc = 'Red Hat Update Infrastructure'
|
||||
|
||||
plugin_name = "rhui"
|
||||
- commands = ("rhui-manager",)
|
||||
- files = ("/etc/ansible/facts.d/rhui_auth.fact", "/usr/lib/rhui/cds.py")
|
||||
+ commands = ("rhui-manager", )
|
||||
+ files = ("/etc/rhui/rhui-tools.conf", )
|
||||
|
||||
def setup(self):
|
||||
self.add_copy_spec([
|
||||
@@ -27,7 +27,6 @@ class Rhui(Plugin, RedHatPlugin):
|
||||
"/var/log/rhui-subscription-sync.log",
|
||||
"/var/cache/rhui/*",
|
||||
"/root/.rhui/*",
|
||||
- "/etc/ansible/facts.d/rhui_*.fact",
|
||||
])
|
||||
# skip collecting certificate keys
|
||||
self.add_forbidden_path("/etc/pki/rhui/**/*.key", recursive=True)
|
||||
@@ -42,11 +41,10 @@ class Rhui(Plugin, RedHatPlugin):
|
||||
], timeout=60, env={'PYTHONUNBUFFERED': '1'})
|
||||
|
||||
def postproc(self):
|
||||
- # obfuscate admin_pw and secret_key values
|
||||
- for prop in ["admin_pw", "secret_key"]:
|
||||
- self.do_path_regex_sub(
|
||||
- "/etc/ansible/facts.d/rhui_auth.fact",
|
||||
- r"(%s\s*=\s*)(.*)" % prop,
|
||||
+ # hide rhui_manager_password value in (also rotated) answers file
|
||||
+ self.do_path_regex_sub(
|
||||
+ r"/root/\.rhui/answers.yaml.*",
|
||||
+ r"(\s*rhui_manager_password\s*:)\s*(\S+)",
|
||||
r"\1********")
|
||||
# obfuscate twoo cookies for login session
|
||||
for cookie in ["csrftoken", "sessionid"]:
|
||||
--
|
||||
2.31.1
|
||||
|
142
SOURCES/sos-bz1992861-cleaner-AD-users-obfuscation.patch
Normal file
142
SOURCES/sos-bz1992861-cleaner-AD-users-obfuscation.patch
Normal file
@ -0,0 +1,142 @@
|
||||
From 7e471676fe41dab155a939c60446cc7b7dab773b Mon Sep 17 00:00:00 2001
|
||||
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||
Date: Tue, 20 Jul 2021 11:09:29 -0400
|
||||
Subject: [PATCH] [username parser] Load usernames from `last` for LDAP users
|
||||
|
||||
AD/LDAP users are not reported into `lastlog` generally, however they
|
||||
are reported in `last`. Conversely, `last` does not report local users
|
||||
who have not logged in but still exist.
|
||||
|
||||
In order to obfuscate both kinds of users, we need to look at both
|
||||
sources.
|
||||
|
||||
For this, first allow parsers to specify multiple prep files. Second,
|
||||
update the username parser to search through all `lastlog` collections
|
||||
as well as the `last` collection.
|
||||
|
||||
Also includes a small update to the username parser's prep loading logic
|
||||
to ensure we are iterating over each username discovered only once.
|
||||
|
||||
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||
---
|
||||
sos/cleaner/__init__.py | 38 ++++++++++++++------------
|
||||
sos/cleaner/parsers/__init__.py | 2 +-
|
||||
sos/cleaner/parsers/username_parser.py | 24 +++++++++++++---
|
||||
3 files changed, 42 insertions(+), 22 deletions(-)
|
||||
|
||||
diff --git a/sos/cleaner/__init__.py b/sos/cleaner/__init__.py
|
||||
index ca5f93e5..6aadfe79 100644
|
||||
--- a/sos/cleaner/__init__.py
|
||||
+++ b/sos/cleaner/__init__.py
|
||||
@@ -518,23 +518,27 @@ third party.
|
||||
for _parser in self.parsers:
|
||||
if not _parser.prep_map_file:
|
||||
continue
|
||||
- _arc_path = os.path.join(_arc_name, _parser.prep_map_file)
|
||||
- try:
|
||||
- if is_dir:
|
||||
- _pfile = open(_arc_path, 'r')
|
||||
- content = _pfile.read()
|
||||
- else:
|
||||
- _pfile = archive.extractfile(_arc_path)
|
||||
- content = _pfile.read().decode('utf-8')
|
||||
- _pfile.close()
|
||||
- if isinstance(_parser, SoSUsernameParser):
|
||||
- _parser.load_usernames_into_map(content)
|
||||
- for line in content.splitlines():
|
||||
- if isinstance(_parser, SoSHostnameParser):
|
||||
- _parser.load_hostname_into_map(line)
|
||||
- self.obfuscate_line(line)
|
||||
- except Exception as err:
|
||||
- self.log_debug("Could not prep %s: %s" % (_arc_path, err))
|
||||
+ if isinstance(_parser.prep_map_file, str):
|
||||
+ _parser.prep_map_file = [_parser.prep_map_file]
|
||||
+ for parse_file in _parser.prep_map_file:
|
||||
+ _arc_path = os.path.join(_arc_name, parse_file)
|
||||
+ try:
|
||||
+ if is_dir:
|
||||
+ _pfile = open(_arc_path, 'r')
|
||||
+ content = _pfile.read()
|
||||
+ else:
|
||||
+ _pfile = archive.extractfile(_arc_path)
|
||||
+ content = _pfile.read().decode('utf-8')
|
||||
+ _pfile.close()
|
||||
+ if isinstance(_parser, SoSUsernameParser):
|
||||
+ _parser.load_usernames_into_map(content)
|
||||
+ for line in content.splitlines():
|
||||
+ if isinstance(_parser, SoSHostnameParser):
|
||||
+ _parser.load_hostname_into_map(line)
|
||||
+ self.obfuscate_line(line)
|
||||
+ except Exception as err:
|
||||
+ self.log_debug("Could not prep %s: %s"
|
||||
+ % (_arc_path, err))
|
||||
|
||||
def obfuscate_report(self, report):
|
||||
"""Individually handle each archive or directory we've discovered by
|
||||
diff --git a/sos/cleaner/parsers/__init__.py b/sos/cleaner/parsers/__init__.py
|
||||
index 3076db39..af6e375e 100644
|
||||
--- a/sos/cleaner/parsers/__init__.py
|
||||
+++ b/sos/cleaner/parsers/__init__.py
|
||||
@@ -50,7 +50,7 @@ class SoSCleanerParser():
|
||||
skip_line_patterns = []
|
||||
skip_files = []
|
||||
map_file_key = 'unset'
|
||||
- prep_map_file = 'unset'
|
||||
+ prep_map_file = []
|
||||
|
||||
def __init__(self, conf_file=None):
|
||||
# attempt to load previous run data into the mapping for the parser
|
||||
diff --git a/sos/cleaner/parsers/username_parser.py b/sos/cleaner/parsers/username_parser.py
|
||||
index 96ce5f0c..b142e371 100644
|
||||
--- a/sos/cleaner/parsers/username_parser.py
|
||||
+++ b/sos/cleaner/parsers/username_parser.py
|
||||
@@ -25,13 +25,24 @@ class SoSUsernameParser(SoSCleanerParser
|
||||
|
||||
name = 'Username Parser'
|
||||
map_file_key = 'username_map'
|
||||
- prep_map_file = 'sos_commands/login/lastlog_-u_1000-60000'
|
||||
+ prep_map_file = [
|
||||
+ 'sos_commands/login/lastlog_-u_1000-60000',
|
||||
+ 'sos_commands/login/lastlog_-u_60001-65536',
|
||||
+ 'sos_commands/login/lastlog_-u_65537-4294967295',
|
||||
+ # AD users will be reported here, but favor the lastlog files since
|
||||
+ # those will include local users who have not logged in
|
||||
+ 'sos_commands/login/last'
|
||||
+ ]
|
||||
regex_patterns = []
|
||||
skip_list = [
|
||||
'core',
|
||||
'nobody',
|
||||
'nfsnobody',
|
||||
- 'root'
|
||||
+ 'shutdown',
|
||||
+ 'reboot',
|
||||
+ 'root',
|
||||
+ 'ubuntu',
|
||||
+ 'wtmp'
|
||||
]
|
||||
|
||||
def __init__(self, conf_file=None, opt_names=None):
|
||||
@@ -44,11 +54,17 @@ class SoSUsernameParser(SoSCleanerParser):
|
||||
"""Since we don't get the list of usernames from a straight regex for
|
||||
this parser, we need to override the initial parser prepping here.
|
||||
"""
|
||||
+ users = set()
|
||||
for line in content.splitlines()[1:]:
|
||||
- user = line.split()[0]
|
||||
+ try:
|
||||
+ user = line.split()[0]
|
||||
+ except Exception:
|
||||
+ continue
|
||||
if user in self.skip_list:
|
||||
continue
|
||||
- self.mapping.get(user)
|
||||
+ users.add(user)
|
||||
+ for each in users:
|
||||
+ self.mapping.get(each)
|
||||
|
||||
def parse_line(self, line):
|
||||
count = 0
|
||||
--
|
||||
2.31.1
|
||||
|
210
SPECS/sos.spec
Normal file
210
SPECS/sos.spec
Normal file
@ -0,0 +1,210 @@
|
||||
%{!?python_sitelib: %define python_sitelib %(%{__python} -c "from distutils.sysconfig import get_python_lib; print get_python_lib()")}
|
||||
|
||||
%global auditversion 0.3
|
||||
|
||||
Summary: A set of tools to gather troubleshooting information from a system
|
||||
Name: sos
|
||||
Version: 4.1
|
||||
Release: 8%{?dist}
|
||||
Group: Applications/System
|
||||
Source0: https://github.com/sosreport/sos/archive/%{version}/sos-%{version}.tar.gz
|
||||
Source1: sos-audit-%{auditversion}.tgz
|
||||
License: GPLv2+
|
||||
BuildArch: noarch
|
||||
Url: https://github.com/sosreport/sos
|
||||
BuildRequires: python3-devel
|
||||
BuildRequires: gettext
|
||||
Requires: libxml2-python3
|
||||
#Requires: python3-rpm
|
||||
Requires: tar
|
||||
Requires: bzip2
|
||||
Requires: xz
|
||||
Recommends: python3-pexpect
|
||||
Conflicts: vdsm < 4.40
|
||||
Obsoletes: sos-collector <= 1.9
|
||||
Patch1: sos-bz1925419-gluster-pubkeys-statusfile.patch
|
||||
Patch2: sos-bz1967110-collect-cleaning-consistency.patch
|
||||
Patch3: sos-bz1967111-manpages-see-also.patch
|
||||
Patch4: sos-bz1967112-add-cmd-timeout.patch
|
||||
Patch5: sos-bz1967113-ds-mask-password-in-ldif.patch
|
||||
Patch6: sos-bz1967114-gather-cups-browsed-logs.patch
|
||||
Patch7: sos-bz1967115-sssd-memcache-and-logs.patch
|
||||
Patch8: sos-bz1967116-ibmvNIC-dynamic-debugs.patch
|
||||
Patch9: sos-bz1967117-pulpcore-plugin.patch
|
||||
Patch10: sos-bz1967118-saphana-traceback.patch
|
||||
Patch11: sos-bz1967119-collect-nstat.patch
|
||||
Patch12: sos-bz1967120-snapper-plugin-and-allocation-failures.patch
|
||||
Patch13: sos-bz1965002-skip-selinux-of-proc-everytime.patch
|
||||
Patch14: sos-bz1985976-enhance-tc-hw-offload.patch
|
||||
Patch15: sos-bz1985982-obfuscate-fqdn-from-dnf-log.patch
|
||||
Patch16: sos-bz1967718-sssd-common.patch
|
||||
Patch17: sos-bz1985983-ocp-cluster-cleaner.patch
|
||||
Patch18: sos-bz1985985-sos-log-effective-options.patch
|
||||
Patch19: sos-bz1938874-potential-issues-static-analyse.patch
|
||||
Patch20: sos-bz1959779-conversions-and-upgrades.patch
|
||||
Patch21: sos-bz1992859-rhui-plugin.patch
|
||||
Patch22: sos-bz1992861-cleaner-AD-users-obfuscation.patch
|
||||
|
||||
%description
|
||||
Sos is a set of tools that gathers information about system
|
||||
hardware and configuration. The information can then be used for
|
||||
diagnostic purposes and debugging. Sos is commonly used to help
|
||||
support technicians and developers.
|
||||
|
||||
%prep
|
||||
%setup -qn %{name}-%{version}
|
||||
%setup -T -D -a1 -q
|
||||
%patch1 -p1
|
||||
%patch2 -p1
|
||||
%patch3 -p1
|
||||
%patch4 -p1
|
||||
%patch5 -p1
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
%patch8 -p1
|
||||
%patch9 -p1
|
||||
%patch10 -p1
|
||||
%patch11 -p1
|
||||
%patch12 -p1
|
||||
%patch13 -p1
|
||||
%patch14 -p1
|
||||
%patch15 -p1
|
||||
%patch16 -p1
|
||||
%patch17 -p1
|
||||
%patch18 -p1
|
||||
%patch19 -p1
|
||||
%patch20 -p1
|
||||
%patch21 -p1
|
||||
%patch22 -p1
|
||||
|
||||
%build
|
||||
%py3_build
|
||||
|
||||
%install
|
||||
%py3_install '--install-scripts=%{_sbindir}'
|
||||
|
||||
install -d -m 755 %{buildroot}%{_sysconfdir}/%{name}
|
||||
install -d -m 700 %{buildroot}%{_sysconfdir}/%{name}/cleaner
|
||||
install -d -m 755 %{buildroot}%{_sysconfdir}/%{name}/presets.d
|
||||
install -d -m 755 %{buildroot}%{_sysconfdir}/%{name}/groups.d
|
||||
install -d -m 755 %{buildroot}%{_sysconfdir}/%{name}/extras.d
|
||||
install -m 644 %{name}.conf %{buildroot}%{_sysconfdir}/%{name}/%{name}.conf
|
||||
|
||||
rm -rf %{buildroot}/usr/config/
|
||||
|
||||
%find_lang %{name} || echo 0
|
||||
|
||||
cd %{name}-audit-%{auditversion}
|
||||
DESTDIR=%{buildroot} ./install.sh
|
||||
cd ..
|
||||
|
||||
%files -f %{name}.lang
|
||||
%{_sbindir}/sos
|
||||
%{_sbindir}/sosreport
|
||||
%{_sbindir}/sos-collector
|
||||
#%dir /etc/sos/cleaner
|
||||
%dir /etc/sos/presets.d
|
||||
%dir /etc/sos/extras.d
|
||||
%dir /etc/sos/groups.d
|
||||
%{python3_sitelib}/*
|
||||
%{_mandir}/man1/*
|
||||
%{_mandir}/man5/sos.conf.5.gz
|
||||
%doc AUTHORS README.md
|
||||
%license LICENSE
|
||||
%config(noreplace) %{_sysconfdir}/sos/sos.conf
|
||||
%config(noreplace) %{_sysconfdir}/sos/cleaner
|
||||
|
||||
|
||||
%package audit
|
||||
Summary: Audit use of some commands for support purposes
|
||||
License: GPLv2+
|
||||
Group: Application/System
|
||||
|
||||
%description audit
|
||||
|
||||
Sos-audit provides configuration files for the Linux Auditing System
|
||||
to track the use of some commands capable of changing the configuration
|
||||
of the system. Currently storage and filesystem commands are audited.
|
||||
|
||||
%post audit
|
||||
%{_sbindir}/sos-audit.sh
|
||||
|
||||
%files audit
|
||||
%defattr(755,root,root,-)
|
||||
%{_sbindir}/sos-audit.sh
|
||||
%defattr(644,root,root,-)
|
||||
%config(noreplace) %{_sysconfdir}/sos/sos-audit.conf
|
||||
%defattr(444,root,root,-)
|
||||
%{_prefix}/lib/sos/audit/*
|
||||
%{_mandir}/man5/sos-audit.conf.5.gz
|
||||
%{_mandir}/man8/sos-audit.sh.8.gz
|
||||
%ghost /etc/audit/rules.d/40-sos-filesystem.rules
|
||||
%ghost /etc/audit/rules.d/40-sos-storage.rules
|
||||
|
||||
|
||||
%changelog
|
||||
* Wed Aug 11 2021 Pavel Moravec <pmoravec@redhat.com> = 4.1-8
|
||||
- [report,collect] unify --map-file arguments
|
||||
Resolves: bz1985985
|
||||
- [rhui] add new plugin for RHUI 4
|
||||
Resolves: bz1992859
|
||||
- [username parser] Load usernames from `last` for LDAP users
|
||||
Resolves: bz1992861
|
||||
|
||||
* Tue Aug 10 2021 Mohan Boddu <mboddu@redhat.com> - 4.1-7
|
||||
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
|
||||
Related: rhbz#1991688
|
||||
|
||||
* Tue Jul 27 2021 Pavel Moravec <pmoravec@redhat.com> - 4.1-6
|
||||
- [networking] collect also tc filter show ingress
|
||||
Resolves: bz1985976
|
||||
- [cleaner] Only skip packaging-based files for the IP parser
|
||||
Resolves: bz1985982
|
||||
- [sssd] sssd plugin when sssd-common
|
||||
Resolves: bz1967718
|
||||
- Various OCP/cluster/cleanup enhancements
|
||||
Resolves: bz1985983
|
||||
- [options] allow variant option names in config file
|
||||
Resolves: bz1985985
|
||||
- [plugins] Set default predicate instead of None
|
||||
Resolves: bz1938874
|
||||
- [MigrationResults] collect info about conversions and
|
||||
Resolves: bz1959779
|
||||
|
||||
* Wed Jun 02 2021 Pavel Moravec <pmoravec@redhat.com> - 4.1-4
|
||||
- [archive] skip copying SELinux context for /proc and /sys everytime
|
||||
Resolves: bz1965002
|
||||
- Load maps from all archives before obfuscation
|
||||
Resolves: bz1967110
|
||||
- Multiple fixes in man pages
|
||||
Resolves: bz1967111
|
||||
- [ds] Mask password and encryption keys in ldif files
|
||||
Resolves: bz1967112
|
||||
- [report] add --cmd-timeout option
|
||||
Resolves: bz1967113
|
||||
- [cups] Add gathering cups-browsed logs
|
||||
Resolves: bz1967114
|
||||
- [sssd] Collect memory cache / individual logfiles
|
||||
Resolves: bz1967115
|
||||
- Collect ibmvNIC dynamic_debugs
|
||||
Resolves: bz1967116
|
||||
- [pulpcore] add plugin for pulp-3
|
||||
Resolves: bz1967117
|
||||
- [saphana] remove redundant unused argument of get_inst_info
|
||||
Resolves: bz1967118
|
||||
- [networking] Add nstat command support
|
||||
Resolves: bz1967119
|
||||
- [snapper] add a new plugin
|
||||
Resolves: bz1967120
|
||||
|
||||
* Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 4.1-4
|
||||
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
|
||||
|
||||
* Thu Apr 01 2021 Pavel Moravec <pmoravec@redhat.com> - 4.1-3
|
||||
- adding sos-audit
|
||||
- [gluster] Add glusterd public keys and status files
|
||||
Resolves: bz1925419
|
||||
|
||||
* Wed Mar 10 2021 Sandro Bonazzola <sbonazzo@redhat.com> - 4.1-1
|
||||
- Rebase to 4.1
|
||||
|
Loading…
Reference in New Issue
Block a user