sos updates to RHEL 9.0 Beta
making 9.0 Beta in par with 8.5 Resolves: bz1985985 bz1992859 bz1992861 Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
This commit is contained in:
parent
85a21d6d8c
commit
83792b8dcc
@ -112,3 +112,173 @@ index 1eda55d6..a014a022 100644
|
|||||||
--
|
--
|
||||||
2.31.1
|
2.31.1
|
||||||
|
|
||||||
|
From c7d3644c0c64e9e5439806250592a55c8e2de26f Mon Sep 17 00:00:00 2001
|
||||||
|
From: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
Date: Thu, 1 Jul 2021 08:11:15 +0200
|
||||||
|
Subject: [PATCH] [report,collect] unify --map-file arguments
|
||||||
|
|
||||||
|
Unify --map[-file] argument among report/collect/clean.
|
||||||
|
|
||||||
|
Resolves: #2602
|
||||||
|
|
||||||
|
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
---
|
||||||
|
sos/cleaner/__init__.py | 2 +-
|
||||||
|
sos/collector/__init__.py | 2 +-
|
||||||
|
sos/report/__init__.py | 2 +-
|
||||||
|
3 files changed, 3 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sos/cleaner/__init__.py b/sos/cleaner/__init__.py
|
||||||
|
index 7414b55e0..4c9837826 100644
|
||||||
|
--- a/sos/cleaner/__init__.py
|
||||||
|
+++ b/sos/cleaner/__init__.py
|
||||||
|
@@ -192,7 +192,7 @@ def add_parser_options(cls, parser):
|
||||||
|
'file for obfuscation'))
|
||||||
|
clean_grp.add_argument('--no-update', dest='no_update', default=False,
|
||||||
|
action='store_true',
|
||||||
|
- help='Do not update the --map file with new '
|
||||||
|
+ help='Do not update the --map-file with new '
|
||||||
|
'mappings from this run')
|
||||||
|
clean_grp.add_argument('--keep-binary-files', default=False,
|
||||||
|
action='store_true',
|
||||||
|
diff --git a/sos/collector/__init__.py b/sos/collector/__init__.py
|
||||||
|
index 7b8cfcf72..6d96d6923 100644
|
||||||
|
--- a/sos/collector/__init__.py
|
||||||
|
+++ b/sos/collector/__init__.py
|
||||||
|
@@ -427,7 +427,7 @@ def add_parser_options(cls, parser):
|
||||||
|
cleaner_grp.add_argument('--no-update', action='store_true',
|
||||||
|
default=False, dest='no_update',
|
||||||
|
help='Do not update the default cleaner map')
|
||||||
|
- cleaner_grp.add_argument('--map', dest='map_file',
|
||||||
|
+ cleaner_grp.add_argument('--map-file', dest='map_file',
|
||||||
|
default='/etc/sos/cleaner/default_mapping',
|
||||||
|
help=('Provide a previously generated mapping'
|
||||||
|
' file for obfuscation'))
|
||||||
|
diff --git a/sos/report/__init__.py b/sos/report/__init__.py
|
||||||
|
index 7ad2d24a4..411c4eb03 100644
|
||||||
|
--- a/sos/report/__init__.py
|
||||||
|
+++ b/sos/report/__init__.py
|
||||||
|
@@ -341,7 +341,7 @@ def add_parser_options(cls, parser):
|
||||||
|
cleaner_grp.add_argument('--no-update', action='store_true',
|
||||||
|
default=False, dest='no_update',
|
||||||
|
help='Do not update the default cleaner map')
|
||||||
|
- cleaner_grp.add_argument('--map', dest='map_file',
|
||||||
|
+ cleaner_grp.add_argument('--map-file', dest='map_file',
|
||||||
|
default='/etc/sos/cleaner/default_mapping',
|
||||||
|
help=('Provide a previously generated mapping'
|
||||||
|
' file for obfuscation'))
|
||||||
|
From fd75745e7a5a6c5def8e6d23190227872b9912c3 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||||
|
Date: Wed, 11 Aug 2021 10:48:41 -0400
|
||||||
|
Subject: [PATCH] [sosnode] Fix passing of plugin options when using
|
||||||
|
`--only-plugins`
|
||||||
|
|
||||||
|
Fixes the handling of plugin options passed by `sos collect` to each
|
||||||
|
node by first aligning the SoSOption name to those of `report`
|
||||||
|
(`plugopts`), and second re-arranges the handling of plugin options and
|
||||||
|
preset options passed by the user when also using `--only-plugins` so
|
||||||
|
that the former are preserved and passed only with the `--only-plugins`
|
||||||
|
option value.
|
||||||
|
|
||||||
|
Resolves: #2641
|
||||||
|
|
||||||
|
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||||
|
---
|
||||||
|
sos/collector/__init__.py | 5 +++--
|
||||||
|
sos/collector/sosnode.py | 34 +++++++++++++++++-----------------
|
||||||
|
2 files changed, 20 insertions(+), 19 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sos/collector/__init__.py b/sos/collector/__init__.py
|
||||||
|
index 57ef074e..70b7a69e 100644
|
||||||
|
--- a/sos/collector/__init__.py
|
||||||
|
+++ b/sos/collector/__init__.py
|
||||||
|
@@ -84,7 +84,7 @@ class SoSCollector(SoSComponent):
|
||||||
|
'only_plugins': [],
|
||||||
|
'password': False,
|
||||||
|
'password_per_node': False,
|
||||||
|
- 'plugin_options': [],
|
||||||
|
+ 'plugopts': [],
|
||||||
|
'plugin_timeout': None,
|
||||||
|
'cmd_timeout': None,
|
||||||
|
'preset': '',
|
||||||
|
@@ -273,7 +273,8 @@ class SoSCollector(SoSComponent):
|
||||||
|
help="chroot executed commands to SYSROOT")
|
||||||
|
sos_grp.add_argument('-e', '--enable-plugins', action="extend",
|
||||||
|
help='Enable specific plugins for sosreport')
|
||||||
|
- sos_grp.add_argument('-k', '--plugin-option', action="extend",
|
||||||
|
+ sos_grp.add_argument('-k', '--plugin-option', '--plugopts',
|
||||||
|
+ action="extend", dest='plugopts',
|
||||||
|
help='Plugin option as plugname.option=value')
|
||||||
|
sos_grp.add_argument('--log-size', default=0, type=int,
|
||||||
|
help='Limit the size of individual logs (in MiB)')
|
||||||
|
diff --git a/sos/collector/sosnode.py b/sos/collector/sosnode.py
|
||||||
|
index 426edcba..5d05c297 100644
|
||||||
|
--- a/sos/collector/sosnode.py
|
||||||
|
+++ b/sos/collector/sosnode.py
|
||||||
|
@@ -667,10 +667,10 @@ class SosNode():
|
||||||
|
|
||||||
|
if self.cluster.sos_plugin_options:
|
||||||
|
for opt in self.cluster.sos_plugin_options:
|
||||||
|
- if not any(opt in o for o in self.plugin_options):
|
||||||
|
+ if not any(opt in o for o in self.plugopts):
|
||||||
|
option = '%s=%s' % (opt,
|
||||||
|
self.cluster.sos_plugin_options[opt])
|
||||||
|
- self.plugin_options.append(option)
|
||||||
|
+ self.plugopts.append(option)
|
||||||
|
|
||||||
|
# set master-only options
|
||||||
|
if self.cluster.check_node_is_master(self):
|
||||||
|
@@ -688,7 +688,7 @@ class SosNode():
|
||||||
|
self.only_plugins = list(self.opts.only_plugins)
|
||||||
|
self.skip_plugins = list(self.opts.skip_plugins)
|
||||||
|
self.enable_plugins = list(self.opts.enable_plugins)
|
||||||
|
- self.plugin_options = list(self.opts.plugin_options)
|
||||||
|
+ self.plugopts = list(self.opts.plugopts)
|
||||||
|
self.preset = list(self.opts.preset)
|
||||||
|
|
||||||
|
def finalize_sos_cmd(self):
|
||||||
|
@@ -754,6 +754,20 @@ class SosNode():
|
||||||
|
os.path.join(self.host.sos_bin_path, self.sos_bin)
|
||||||
|
)
|
||||||
|
|
||||||
|
+ if self.plugopts:
|
||||||
|
+ opts = [o for o in self.plugopts
|
||||||
|
+ if self._plugin_exists(o.split('.')[0])
|
||||||
|
+ and self._plugin_option_exists(o.split('=')[0])]
|
||||||
|
+ if opts:
|
||||||
|
+ sos_opts.append('-k %s' % quote(','.join(o for o in opts)))
|
||||||
|
+
|
||||||
|
+ if self.preset:
|
||||||
|
+ if self._preset_exists(self.preset):
|
||||||
|
+ sos_opts.append('--preset=%s' % quote(self.preset))
|
||||||
|
+ else:
|
||||||
|
+ self.log_debug('Requested to enable preset %s but preset does '
|
||||||
|
+ 'not exist on node' % self.preset)
|
||||||
|
+
|
||||||
|
if self.only_plugins:
|
||||||
|
plugs = [o for o in self.only_plugins if self._plugin_exists(o)]
|
||||||
|
if len(plugs) != len(self.only_plugins):
|
||||||
|
@@ -792,20 +806,6 @@ class SosNode():
|
||||||
|
if enable:
|
||||||
|
sos_opts.append('--enable-plugins=%s' % quote(enable))
|
||||||
|
|
||||||
|
- if self.plugin_options:
|
||||||
|
- opts = [o for o in self.plugin_options
|
||||||
|
- if self._plugin_exists(o.split('.')[0])
|
||||||
|
- and self._plugin_option_exists(o.split('=')[0])]
|
||||||
|
- if opts:
|
||||||
|
- sos_opts.append('-k %s' % quote(','.join(o for o in opts)))
|
||||||
|
-
|
||||||
|
- if self.preset:
|
||||||
|
- if self._preset_exists(self.preset):
|
||||||
|
- sos_opts.append('--preset=%s' % quote(self.preset))
|
||||||
|
- else:
|
||||||
|
- self.log_debug('Requested to enable preset %s but preset does '
|
||||||
|
- 'not exist on node' % self.preset)
|
||||||
|
-
|
||||||
|
self.sos_cmd = "%s %s" % (sos_cmd, ' '.join(sos_opts))
|
||||||
|
self.log_info('Final sos command set to %s' % self.sos_cmd)
|
||||||
|
self.manifest.add_field('final_sos_command', self.sos_cmd)
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
||||||
|
387
sos-bz1992859-rhui-plugin.patch
Normal file
387
sos-bz1992859-rhui-plugin.patch
Normal file
@ -0,0 +1,387 @@
|
|||||||
|
From 94b9b90c818eb18f0ca8d78fe063dc5b0677c885 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
Date: Tue, 22 Jun 2021 12:58:03 +0200
|
||||||
|
Subject: [PATCH] [rhui] add plugin to RHUI
|
||||||
|
|
||||||
|
Add a new/revoked plugin for RHUI (newly based on python3 and pulp-3).
|
||||||
|
|
||||||
|
Edditionally, collect /etc/pki/pulp certificates except for RSA keys.
|
||||||
|
|
||||||
|
Resolves: #2590
|
||||||
|
|
||||||
|
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
---
|
||||||
|
sos/report/plugins/pulpcore.py | 7 ++++-
|
||||||
|
sos/report/plugins/rhui.py | 49 ++++++++++++++++++++++++++++++++++
|
||||||
|
2 files changed, 55 insertions(+), 1 deletion(-)
|
||||||
|
create mode 100644 sos/report/plugins/rhui.py
|
||||||
|
|
||||||
|
diff --git a/sos/report/plugins/pulpcore.py b/sos/report/plugins/pulpcore.py
|
||||||
|
index ccaac3185..77ceacb92 100644
|
||||||
|
--- a/sos/report/plugins/pulpcore.py
|
||||||
|
+++ b/sos/report/plugins/pulpcore.py
|
||||||
|
@@ -77,7 +77,12 @@ def separate_value(line, sep=':'):
|
||||||
|
def setup(self):
|
||||||
|
self.parse_settings_config()
|
||||||
|
|
||||||
|
- self.add_copy_spec("/etc/pulp/settings.py")
|
||||||
|
+ self.add_copy_spec([
|
||||||
|
+ "/etc/pulp/settings.py",
|
||||||
|
+ "/etc/pki/pulp/*"
|
||||||
|
+ ])
|
||||||
|
+ # skip collecting certificate keys
|
||||||
|
+ self.add_forbidden_path("/etc/pki/pulp/*.key")
|
||||||
|
|
||||||
|
self.add_cmd_output("rq info -u redis://localhost:6379/8",
|
||||||
|
env={"LC_ALL": "en_US.UTF-8"},
|
||||||
|
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||||
|
new file mode 100644
|
||||||
|
index 000000000..7acd3f49e
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/sos/report/plugins/rhui.py
|
||||||
|
@@ -0,0 +1,49 @@
|
||||||
|
+# Copyright (C) 2021 Red Hat, Inc., Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
+
|
||||||
|
+# This file is part of the sos project: https://github.com/sosreport/sos
|
||||||
|
+#
|
||||||
|
+# This copyrighted material is made available to anyone wishing to use,
|
||||||
|
+# modify, copy, or redistribute it subject to the terms and conditions of
|
||||||
|
+# version 2 of the GNU General Public License.
|
||||||
|
+#
|
||||||
|
+# See the LICENSE file in the source distribution for further information.
|
||||||
|
+
|
||||||
|
+from sos.report.plugins import Plugin, RedHatPlugin
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+class Rhui(Plugin, RedHatPlugin):
|
||||||
|
+
|
||||||
|
+ short_desc = 'Red Hat Update Infrastructure'
|
||||||
|
+
|
||||||
|
+ plugin_name = "rhui"
|
||||||
|
+ commands = ("rhui-manager",)
|
||||||
|
+ files = ("/etc/ansible/facts.d/rhui_auth.fact", "/usr/lib/rhui/cds.py")
|
||||||
|
+
|
||||||
|
+ def setup(self):
|
||||||
|
+ self.add_copy_spec([
|
||||||
|
+ "/etc/rhui/rhui-tools.conf",
|
||||||
|
+ "/etc/rhui/registered_subscriptions.conf",
|
||||||
|
+ "/etc/pki/rhui/*",
|
||||||
|
+ "/var/log/rhui-subscription-sync.log",
|
||||||
|
+ "/var/cache/rhui/*",
|
||||||
|
+ "/root/.rhui/*",
|
||||||
|
+ ])
|
||||||
|
+ # skip collecting certificate keys
|
||||||
|
+ self.add_forbidden_path("/etc/pki/rhui/*.key")
|
||||||
|
+
|
||||||
|
+ self.add_cmd_output([
|
||||||
|
+ "rhui-manager status",
|
||||||
|
+ "rhui-manager cert info",
|
||||||
|
+ "ls -lR /var/lib/rhui/remote_share",
|
||||||
|
+ ])
|
||||||
|
+
|
||||||
|
+ def postproc(self):
|
||||||
|
+ # obfuscate admin_pw and secret_key values
|
||||||
|
+ for prop in ["admin_pw", "secret_key"]:
|
||||||
|
+ self.do_path_regex_sub(
|
||||||
|
+ "/etc/ansible/facts.d/rhui_auth.fact",
|
||||||
|
+ r"(%s\s*=\s*)(.*)" % prop,
|
||||||
|
+ r"\1********")
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+# vim: set et ts=4 sw=4 :
|
||||||
|
From bd15dc764c9d4554d8e8f08163228d65ca099985 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
Date: Thu, 24 Jun 2021 17:53:27 +0200
|
||||||
|
Subject: [PATCH 1/4] [plugins] Allow add_forbidden_path to apply glob
|
||||||
|
recursively
|
||||||
|
|
||||||
|
Add option to apply glob.glob to forbidden path recursively.
|
||||||
|
|
||||||
|
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
---
|
||||||
|
sos/report/plugins/__init__.py | 6 ++++--
|
||||||
|
1 file changed, 4 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sos/report/plugins/__init__.py b/sos/report/plugins/__init__.py
|
||||||
|
index 06923300..6fd1a3b2 100644
|
||||||
|
--- a/sos/report/plugins/__init__.py
|
||||||
|
+++ b/sos/report/plugins/__init__.py
|
||||||
|
@@ -1187,12 +1187,14 @@ class Plugin(object):
|
||||||
|
'symlink': "no"
|
||||||
|
})
|
||||||
|
|
||||||
|
- def add_forbidden_path(self, forbidden):
|
||||||
|
+ def add_forbidden_path(self, forbidden, recursive=False):
|
||||||
|
"""Specify a path, or list of paths, to not copy, even if it's part of
|
||||||
|
an ``add_copy_spec()`` call
|
||||||
|
|
||||||
|
:param forbidden: A filepath to forbid collection from
|
||||||
|
:type forbidden: ``str`` or a ``list`` of strings
|
||||||
|
+
|
||||||
|
+ :param recursive: Should forbidden glob be applied recursively
|
||||||
|
"""
|
||||||
|
if isinstance(forbidden, str):
|
||||||
|
forbidden = [forbidden]
|
||||||
|
@@ -1202,7 +1204,7 @@ class Plugin(object):
|
||||||
|
|
||||||
|
for forbid in forbidden:
|
||||||
|
self._log_info("adding forbidden path '%s'" % forbid)
|
||||||
|
- for path in glob.glob(forbid):
|
||||||
|
+ for path in glob.glob(forbid, recursive=recursive):
|
||||||
|
self.forbidden_paths.append(path)
|
||||||
|
|
||||||
|
def get_all_options(self):
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
||||||
|
|
||||||
|
From b695201baeb629a6543445d98dbb04f357670621 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
Date: Thu, 24 Jun 2021 17:57:48 +0200
|
||||||
|
Subject: [PATCH 2/4] [pulpcore] improve settings.py parsing
|
||||||
|
|
||||||
|
- deal with /etc/pulp/settings.py as a one-line string
|
||||||
|
- parse dbname from it as well
|
||||||
|
- dont collect any *.key file from whole /etc/pki/pulp dir
|
||||||
|
|
||||||
|
Related: #2593
|
||||||
|
|
||||||
|
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
---
|
||||||
|
sos/report/plugins/pulpcore.py | 23 +++++++++++++++--------
|
||||||
|
1 file changed, 15 insertions(+), 8 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sos/report/plugins/pulpcore.py b/sos/report/plugins/pulpcore.py
|
||||||
|
index 77ceacb9..be526035 100644
|
||||||
|
--- a/sos/report/plugins/pulpcore.py
|
||||||
|
+++ b/sos/report/plugins/pulpcore.py
|
||||||
|
@@ -28,9 +28,10 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||||
|
databases_scope = False
|
||||||
|
self.dbhost = "localhost"
|
||||||
|
self.dbport = 5432
|
||||||
|
+ self.dbname = "pulpcore"
|
||||||
|
self.dbpasswd = ""
|
||||||
|
# TODO: read also redis config (we dont expect much customisations)
|
||||||
|
- # TODO: read also db user (pulp) and database name (pulpcore)
|
||||||
|
+ # TODO: read also db user (pulp)
|
||||||
|
self.staticroot = "/var/lib/pulp/assets"
|
||||||
|
self.uploaddir = "/var/lib/pulp/media/upload"
|
||||||
|
|
||||||
|
@@ -44,7 +45,10 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||||
|
return val
|
||||||
|
|
||||||
|
try:
|
||||||
|
- for line in open("/etc/pulp/settings.py").read().splitlines():
|
||||||
|
+ # split the lines to "one option per line" format
|
||||||
|
+ for line in open("/etc/pulp/settings.py").read() \
|
||||||
|
+ .replace(',', ',\n').replace('{', '{\n') \
|
||||||
|
+ .replace('}', '\n}').splitlines():
|
||||||
|
# skip empty lines and lines with comments
|
||||||
|
if not line or line[0] == '#':
|
||||||
|
continue
|
||||||
|
@@ -53,11 +57,14 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||||
|
continue
|
||||||
|
# example HOST line to parse:
|
||||||
|
# 'HOST': 'localhost',
|
||||||
|
- if databases_scope and match(r"\s+'HOST'\s*:\s+\S+", line):
|
||||||
|
+ pattern = r"\s*['|\"]%s['|\"]\s*:\s*\S+"
|
||||||
|
+ if databases_scope and match(pattern % 'HOST', line):
|
||||||
|
self.dbhost = separate_value(line)
|
||||||
|
- if databases_scope and match(r"\s+'PORT'\s*:\s+\S+", line):
|
||||||
|
+ if databases_scope and match(pattern % 'PORT', line):
|
||||||
|
self.dbport = separate_value(line)
|
||||||
|
- if databases_scope and match(r"\s+'PASSWORD'\s*:\s+\S+", line):
|
||||||
|
+ if databases_scope and match(pattern % 'NAME', line):
|
||||||
|
+ self.dbname = separate_value(line)
|
||||||
|
+ if databases_scope and match(pattern % 'PASSWORD', line):
|
||||||
|
self.dbpasswd = separate_value(line)
|
||||||
|
# if line contains closing '}' database_scope end
|
||||||
|
if databases_scope and '}' in line:
|
||||||
|
@@ -82,7 +89,7 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||||
|
"/etc/pki/pulp/*"
|
||||||
|
])
|
||||||
|
# skip collecting certificate keys
|
||||||
|
- self.add_forbidden_path("/etc/pki/pulp/*.key")
|
||||||
|
+ self.add_forbidden_path("/etc/pki/pulp/**/*.key", recursive=True)
|
||||||
|
|
||||||
|
self.add_cmd_output("rq info -u redis://localhost:6379/8",
|
||||||
|
env={"LC_ALL": "en_US.UTF-8"},
|
||||||
|
@@ -104,8 +111,8 @@ class PulpCore(Plugin, IndependentPlugin):
|
||||||
|
_query = "select * from %s where pulp_last_updated > NOW() - " \
|
||||||
|
"interval '%s days' order by pulp_last_updated" % \
|
||||||
|
(table, task_days)
|
||||||
|
- _cmd = "psql -h %s -p %s -U pulp -d pulpcore -c %s" % \
|
||||||
|
- (self.dbhost, self.dbport, quote(_query))
|
||||||
|
+ _cmd = "psql -h %s -p %s -U pulp -d %s -c %s" % \
|
||||||
|
+ (self.dbhost, self.dbport, self.dbname, quote(_query))
|
||||||
|
self.add_cmd_output(_cmd, env=self.env, suggest_filename=table)
|
||||||
|
|
||||||
|
def postproc(self):
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
||||||
|
|
||||||
|
From 0286034da44bce43ab368dfc6815da7d74d60719 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
Date: Thu, 24 Jun 2021 17:59:36 +0200
|
||||||
|
Subject: [PATCH 3/4] [rhui] call rhui-* commands with proper env and timeout
|
||||||
|
|
||||||
|
rhui-manager commands timeout when not being logged in, which
|
||||||
|
should be reacted by adding proper cmd timeout.
|
||||||
|
|
||||||
|
Adding the env.variable ensures potentially unaswered "RHUI Username:"
|
||||||
|
is also printed/colected.
|
||||||
|
|
||||||
|
Further, prevent collecting any *.key file from the whole /etc/pki/rhui
|
||||||
|
dir.
|
||||||
|
|
||||||
|
Related: #2593
|
||||||
|
|
||||||
|
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
---
|
||||||
|
sos/report/plugins/rhui.py | 7 +++++--
|
||||||
|
1 file changed, 5 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||||
|
index 7acd3f49..5a152427 100644
|
||||||
|
--- a/sos/report/plugins/rhui.py
|
||||||
|
+++ b/sos/report/plugins/rhui.py
|
||||||
|
@@ -29,13 +29,16 @@ class Rhui(Plugin, RedHatPlugin):
|
||||||
|
"/root/.rhui/*",
|
||||||
|
])
|
||||||
|
# skip collecting certificate keys
|
||||||
|
- self.add_forbidden_path("/etc/pki/rhui/*.key")
|
||||||
|
+ self.add_forbidden_path("/etc/pki/rhui/**/*.key", recursive=True)
|
||||||
|
|
||||||
|
+ # call rhui-manager commands with 1m timeout and
|
||||||
|
+ # with an env. variable ensuring that "RHUI Username:"
|
||||||
|
+ # even unanswered prompt gets collected
|
||||||
|
self.add_cmd_output([
|
||||||
|
"rhui-manager status",
|
||||||
|
"rhui-manager cert info",
|
||||||
|
"ls -lR /var/lib/rhui/remote_share",
|
||||||
|
- ])
|
||||||
|
+ ], timeout=60, env={'PYTHONUNBUFFERED': '1'})
|
||||||
|
|
||||||
|
def postproc(self):
|
||||||
|
# obfuscate admin_pw and secret_key values
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
||||||
|
|
||||||
|
From a656bd239ab86dfd8973f733ae2c0fbd0c57d416 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
Date: Thu, 24 Jun 2021 18:01:14 +0200
|
||||||
|
Subject: [PATCH 4/4] [rhui] fix broken obfuscation
|
||||||
|
|
||||||
|
- /etc/ansible/facts.d/rhui_*.fact must be collected by
|
||||||
|
rhui plugin to let some file to be obfuscated there
|
||||||
|
- obfuscate also cookies values that can grant login access
|
||||||
|
|
||||||
|
Resolves: #2593
|
||||||
|
|
||||||
|
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
---
|
||||||
|
sos/report/plugins/ansible.py | 3 +++
|
||||||
|
sos/report/plugins/rhui.py | 7 +++++++
|
||||||
|
2 files changed, 10 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/sos/report/plugins/ansible.py b/sos/report/plugins/ansible.py
|
||||||
|
index 3e5d3d37..5991b786 100644
|
||||||
|
--- a/sos/report/plugins/ansible.py
|
||||||
|
+++ b/sos/report/plugins/ansible.py
|
||||||
|
@@ -29,4 +29,7 @@ class Ansible(Plugin, RedHatPlugin, UbuntuPlugin):
|
||||||
|
"ansible --version"
|
||||||
|
])
|
||||||
|
|
||||||
|
+ # let rhui plugin collects the RHUI specific files
|
||||||
|
+ self.add_forbidden_path("/etc/ansible/facts.d/rhui_*.fact")
|
||||||
|
+
|
||||||
|
# vim: set et ts=4 sw=4 :
|
||||||
|
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||||
|
index 5a152427..1d479f85 100644
|
||||||
|
--- a/sos/report/plugins/rhui.py
|
||||||
|
+++ b/sos/report/plugins/rhui.py
|
||||||
|
@@ -27,6 +27,7 @@ class Rhui(Plugin, RedHatPlugin):
|
||||||
|
"/var/log/rhui-subscription-sync.log",
|
||||||
|
"/var/cache/rhui/*",
|
||||||
|
"/root/.rhui/*",
|
||||||
|
+ "/etc/ansible/facts.d/rhui_*.fact",
|
||||||
|
])
|
||||||
|
# skip collecting certificate keys
|
||||||
|
self.add_forbidden_path("/etc/pki/rhui/**/*.key", recursive=True)
|
||||||
|
@@ -47,6 +48,12 @@ class Rhui(Plugin, RedHatPlugin):
|
||||||
|
"/etc/ansible/facts.d/rhui_auth.fact",
|
||||||
|
r"(%s\s*=\s*)(.*)" % prop,
|
||||||
|
r"\1********")
|
||||||
|
+ # obfuscate twoo cookies for login session
|
||||||
|
+ for cookie in ["csrftoken", "sessionid"]:
|
||||||
|
+ self.do_path_regex_sub(
|
||||||
|
+ r"/root/\.rhui/.*/cookies.txt",
|
||||||
|
+ r"(%s\s+)(\S+)" % cookie,
|
||||||
|
+ r"\1********")
|
||||||
|
|
||||||
|
|
||||||
|
# vim: set et ts=4 sw=4 :
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
||||||
|
From 4e5bebffca9936bcdf4d38aad9989970a15dd72b Mon Sep 17 00:00:00 2001
|
||||||
|
From: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
Date: Tue, 3 Aug 2021 21:54:33 +0200
|
||||||
|
Subject: [PATCH] [rhui] Update the plugin on several places
|
||||||
|
|
||||||
|
- obfuscate "rhui_manager_password: xxx" in /root/.rhui/answers.yaml*
|
||||||
|
- no need to collect or obfuscate anything from /etc/ansible/facts.d
|
||||||
|
- newly detect the plugin via /etc/rhui/rhui-tools.conf file or rhui-manager
|
||||||
|
command (only)
|
||||||
|
|
||||||
|
Resolves: #2637
|
||||||
|
|
||||||
|
Signed-off-by: Pavel Moravec <pmoravec@redhat.com>
|
||||||
|
---
|
||||||
|
sos/report/plugins/rhui.py | 14 ++++++--------
|
||||||
|
1 file changed, 6 insertions(+), 8 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sos/report/plugins/rhui.py b/sos/report/plugins/rhui.py
|
||||||
|
index 1d479f85..52065fb4 100644
|
||||||
|
--- a/sos/report/plugins/rhui.py
|
||||||
|
+++ b/sos/report/plugins/rhui.py
|
||||||
|
@@ -16,8 +16,8 @@ class Rhui(Plugin, RedHatPlugin):
|
||||||
|
short_desc = 'Red Hat Update Infrastructure'
|
||||||
|
|
||||||
|
plugin_name = "rhui"
|
||||||
|
- commands = ("rhui-manager",)
|
||||||
|
- files = ("/etc/ansible/facts.d/rhui_auth.fact", "/usr/lib/rhui/cds.py")
|
||||||
|
+ commands = ("rhui-manager", )
|
||||||
|
+ files = ("/etc/rhui/rhui-tools.conf", )
|
||||||
|
|
||||||
|
def setup(self):
|
||||||
|
self.add_copy_spec([
|
||||||
|
@@ -27,7 +27,6 @@ class Rhui(Plugin, RedHatPlugin):
|
||||||
|
"/var/log/rhui-subscription-sync.log",
|
||||||
|
"/var/cache/rhui/*",
|
||||||
|
"/root/.rhui/*",
|
||||||
|
- "/etc/ansible/facts.d/rhui_*.fact",
|
||||||
|
])
|
||||||
|
# skip collecting certificate keys
|
||||||
|
self.add_forbidden_path("/etc/pki/rhui/**/*.key", recursive=True)
|
||||||
|
@@ -42,11 +41,10 @@ class Rhui(Plugin, RedHatPlugin):
|
||||||
|
], timeout=60, env={'PYTHONUNBUFFERED': '1'})
|
||||||
|
|
||||||
|
def postproc(self):
|
||||||
|
- # obfuscate admin_pw and secret_key values
|
||||||
|
- for prop in ["admin_pw", "secret_key"]:
|
||||||
|
- self.do_path_regex_sub(
|
||||||
|
- "/etc/ansible/facts.d/rhui_auth.fact",
|
||||||
|
- r"(%s\s*=\s*)(.*)" % prop,
|
||||||
|
+ # hide rhui_manager_password value in (also rotated) answers file
|
||||||
|
+ self.do_path_regex_sub(
|
||||||
|
+ r"/root/\.rhui/answers.yaml.*",
|
||||||
|
+ r"(\s*rhui_manager_password\s*:)\s*(\S+)",
|
||||||
|
r"\1********")
|
||||||
|
# obfuscate twoo cookies for login session
|
||||||
|
for cookie in ["csrftoken", "sessionid"]:
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
142
sos-bz1992861-cleaner-AD-users-obfuscation.patch
Normal file
142
sos-bz1992861-cleaner-AD-users-obfuscation.patch
Normal file
@ -0,0 +1,142 @@
|
|||||||
|
From 7e471676fe41dab155a939c60446cc7b7dab773b Mon Sep 17 00:00:00 2001
|
||||||
|
From: Jake Hunsaker <jhunsake@redhat.com>
|
||||||
|
Date: Tue, 20 Jul 2021 11:09:29 -0400
|
||||||
|
Subject: [PATCH] [username parser] Load usernames from `last` for LDAP users
|
||||||
|
|
||||||
|
AD/LDAP users are not reported into `lastlog` generally, however they
|
||||||
|
are reported in `last`. Conversely, `last` does not report local users
|
||||||
|
who have not logged in but still exist.
|
||||||
|
|
||||||
|
In order to obfuscate both kinds of users, we need to look at both
|
||||||
|
sources.
|
||||||
|
|
||||||
|
For this, first allow parsers to specify multiple prep files. Second,
|
||||||
|
update the username parser to search through all `lastlog` collections
|
||||||
|
as well as the `last` collection.
|
||||||
|
|
||||||
|
Also includes a small update to the username parser's prep loading logic
|
||||||
|
to ensure we are iterating over each username discovered only once.
|
||||||
|
|
||||||
|
Signed-off-by: Jake Hunsaker <jhunsake@redhat.com>
|
||||||
|
---
|
||||||
|
sos/cleaner/__init__.py | 38 ++++++++++++++------------
|
||||||
|
sos/cleaner/parsers/__init__.py | 2 +-
|
||||||
|
sos/cleaner/parsers/username_parser.py | 24 +++++++++++++---
|
||||||
|
3 files changed, 42 insertions(+), 22 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/sos/cleaner/__init__.py b/sos/cleaner/__init__.py
|
||||||
|
index ca5f93e5..6aadfe79 100644
|
||||||
|
--- a/sos/cleaner/__init__.py
|
||||||
|
+++ b/sos/cleaner/__init__.py
|
||||||
|
@@ -518,23 +518,27 @@ third party.
|
||||||
|
for _parser in self.parsers:
|
||||||
|
if not _parser.prep_map_file:
|
||||||
|
continue
|
||||||
|
- _arc_path = os.path.join(_arc_name, _parser.prep_map_file)
|
||||||
|
- try:
|
||||||
|
- if is_dir:
|
||||||
|
- _pfile = open(_arc_path, 'r')
|
||||||
|
- content = _pfile.read()
|
||||||
|
- else:
|
||||||
|
- _pfile = archive.extractfile(_arc_path)
|
||||||
|
- content = _pfile.read().decode('utf-8')
|
||||||
|
- _pfile.close()
|
||||||
|
- if isinstance(_parser, SoSUsernameParser):
|
||||||
|
- _parser.load_usernames_into_map(content)
|
||||||
|
- for line in content.splitlines():
|
||||||
|
- if isinstance(_parser, SoSHostnameParser):
|
||||||
|
- _parser.load_hostname_into_map(line)
|
||||||
|
- self.obfuscate_line(line)
|
||||||
|
- except Exception as err:
|
||||||
|
- self.log_debug("Could not prep %s: %s" % (_arc_path, err))
|
||||||
|
+ if isinstance(_parser.prep_map_file, str):
|
||||||
|
+ _parser.prep_map_file = [_parser.prep_map_file]
|
||||||
|
+ for parse_file in _parser.prep_map_file:
|
||||||
|
+ _arc_path = os.path.join(_arc_name, parse_file)
|
||||||
|
+ try:
|
||||||
|
+ if is_dir:
|
||||||
|
+ _pfile = open(_arc_path, 'r')
|
||||||
|
+ content = _pfile.read()
|
||||||
|
+ else:
|
||||||
|
+ _pfile = archive.extractfile(_arc_path)
|
||||||
|
+ content = _pfile.read().decode('utf-8')
|
||||||
|
+ _pfile.close()
|
||||||
|
+ if isinstance(_parser, SoSUsernameParser):
|
||||||
|
+ _parser.load_usernames_into_map(content)
|
||||||
|
+ for line in content.splitlines():
|
||||||
|
+ if isinstance(_parser, SoSHostnameParser):
|
||||||
|
+ _parser.load_hostname_into_map(line)
|
||||||
|
+ self.obfuscate_line(line)
|
||||||
|
+ except Exception as err:
|
||||||
|
+ self.log_debug("Could not prep %s: %s"
|
||||||
|
+ % (_arc_path, err))
|
||||||
|
|
||||||
|
def obfuscate_report(self, report):
|
||||||
|
"""Individually handle each archive or directory we've discovered by
|
||||||
|
diff --git a/sos/cleaner/parsers/__init__.py b/sos/cleaner/parsers/__init__.py
|
||||||
|
index 3076db39..af6e375e 100644
|
||||||
|
--- a/sos/cleaner/parsers/__init__.py
|
||||||
|
+++ b/sos/cleaner/parsers/__init__.py
|
||||||
|
@@ -50,7 +50,7 @@ class SoSCleanerParser():
|
||||||
|
skip_line_patterns = []
|
||||||
|
skip_files = []
|
||||||
|
map_file_key = 'unset'
|
||||||
|
- prep_map_file = 'unset'
|
||||||
|
+ prep_map_file = []
|
||||||
|
|
||||||
|
def __init__(self, conf_file=None):
|
||||||
|
# attempt to load previous run data into the mapping for the parser
|
||||||
|
diff --git a/sos/cleaner/parsers/username_parser.py b/sos/cleaner/parsers/username_parser.py
|
||||||
|
index 96ce5f0c..b142e371 100644
|
||||||
|
--- a/sos/cleaner/parsers/username_parser.py
|
||||||
|
+++ b/sos/cleaner/parsers/username_parser.py
|
||||||
|
@@ -25,13 +25,24 @@ class SoSUsernameParser(SoSCleanerParser
|
||||||
|
|
||||||
|
name = 'Username Parser'
|
||||||
|
map_file_key = 'username_map'
|
||||||
|
- prep_map_file = 'sos_commands/login/lastlog_-u_1000-60000'
|
||||||
|
+ prep_map_file = [
|
||||||
|
+ 'sos_commands/login/lastlog_-u_1000-60000',
|
||||||
|
+ 'sos_commands/login/lastlog_-u_60001-65536',
|
||||||
|
+ 'sos_commands/login/lastlog_-u_65537-4294967295',
|
||||||
|
+ # AD users will be reported here, but favor the lastlog files since
|
||||||
|
+ # those will include local users who have not logged in
|
||||||
|
+ 'sos_commands/login/last'
|
||||||
|
+ ]
|
||||||
|
regex_patterns = []
|
||||||
|
skip_list = [
|
||||||
|
'core',
|
||||||
|
'nobody',
|
||||||
|
'nfsnobody',
|
||||||
|
- 'root'
|
||||||
|
+ 'shutdown',
|
||||||
|
+ 'reboot',
|
||||||
|
+ 'root',
|
||||||
|
+ 'ubuntu',
|
||||||
|
+ 'wtmp'
|
||||||
|
]
|
||||||
|
|
||||||
|
def __init__(self, conf_file=None, opt_names=None):
|
||||||
|
@@ -44,11 +54,17 @@ class SoSUsernameParser(SoSCleanerParser):
|
||||||
|
"""Since we don't get the list of usernames from a straight regex for
|
||||||
|
this parser, we need to override the initial parser prepping here.
|
||||||
|
"""
|
||||||
|
+ users = set()
|
||||||
|
for line in content.splitlines()[1:]:
|
||||||
|
- user = line.split()[0]
|
||||||
|
+ try:
|
||||||
|
+ user = line.split()[0]
|
||||||
|
+ except Exception:
|
||||||
|
+ continue
|
||||||
|
if user in self.skip_list:
|
||||||
|
continue
|
||||||
|
- self.mapping.get(user)
|
||||||
|
+ users.add(user)
|
||||||
|
+ for each in users:
|
||||||
|
+ self.mapping.get(each)
|
||||||
|
|
||||||
|
def parse_line(self, line):
|
||||||
|
count = 0
|
||||||
|
--
|
||||||
|
2.31.1
|
||||||
|
|
14
sos.spec
14
sos.spec
@ -5,7 +5,7 @@
|
|||||||
Summary: A set of tools to gather troubleshooting information from a system
|
Summary: A set of tools to gather troubleshooting information from a system
|
||||||
Name: sos
|
Name: sos
|
||||||
Version: 4.1
|
Version: 4.1
|
||||||
Release: 7%{?dist}
|
Release: 8%{?dist}
|
||||||
Group: Applications/System
|
Group: Applications/System
|
||||||
Source0: https://github.com/sosreport/sos/archive/%{version}/sos-%{version}.tar.gz
|
Source0: https://github.com/sosreport/sos/archive/%{version}/sos-%{version}.tar.gz
|
||||||
Source1: sos-audit-%{auditversion}.tgz
|
Source1: sos-audit-%{auditversion}.tgz
|
||||||
@ -42,6 +42,8 @@ Patch17: sos-bz1985983-ocp-cluster-cleaner.patch
|
|||||||
Patch18: sos-bz1985985-sos-log-effective-options.patch
|
Patch18: sos-bz1985985-sos-log-effective-options.patch
|
||||||
Patch19: sos-bz1938874-potential-issues-static-analyse.patch
|
Patch19: sos-bz1938874-potential-issues-static-analyse.patch
|
||||||
Patch20: sos-bz1959779-conversions-and-upgrades.patch
|
Patch20: sos-bz1959779-conversions-and-upgrades.patch
|
||||||
|
Patch21: sos-bz1992859-rhui-plugin.patch
|
||||||
|
Patch22: sos-bz1992861-cleaner-AD-users-obfuscation.patch
|
||||||
|
|
||||||
%description
|
%description
|
||||||
Sos is a set of tools that gathers information about system
|
Sos is a set of tools that gathers information about system
|
||||||
@ -72,6 +74,8 @@ support technicians and developers.
|
|||||||
%patch18 -p1
|
%patch18 -p1
|
||||||
%patch19 -p1
|
%patch19 -p1
|
||||||
%patch20 -p1
|
%patch20 -p1
|
||||||
|
%patch21 -p1
|
||||||
|
%patch22 -p1
|
||||||
|
|
||||||
%build
|
%build
|
||||||
%py3_build
|
%py3_build
|
||||||
@ -139,6 +143,14 @@ of the system. Currently storage and filesystem commands are audited.
|
|||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Aug 11 2021 Pavel Moravec <pmoravec@redhat.com> = 4.1-8
|
||||||
|
- [report,collect] unify --map-file arguments
|
||||||
|
Resolves: bz1985985
|
||||||
|
- [rhui] add new plugin for RHUI 4
|
||||||
|
Resolves: bz1992859
|
||||||
|
- [username parser] Load usernames from `last` for LDAP users
|
||||||
|
Resolves: bz1992861
|
||||||
|
|
||||||
* Tue Aug 10 2021 Mohan Boddu <mboddu@redhat.com> - 4.1-7
|
* Tue Aug 10 2021 Mohan Boddu <mboddu@redhat.com> - 4.1-7
|
||||||
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
|
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
|
||||||
Related: rhbz#1991688
|
Related: rhbz#1991688
|
||||||
|
Loading…
Reference in New Issue
Block a user