1
0

test_dbus.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449
  1. # systemctl-mqtt - MQTT client triggering & reporting shutdown on systemd-based systems
  2. #
  3. # Copyright (C) 2020 Fabian Peter Hammerle <fabian@hammerle.me>
  4. #
  5. # This program is free software: you can redistribute it and/or modify
  6. # it under the terms of the GNU General Public License as published by
  7. # the Free Software Foundation, either version 3 of the License, or
  8. # any later version.
  9. #
  10. # This program is distributed in the hope that it will be useful,
  11. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. # GNU General Public License for more details.
  14. #
  15. # You should have received a copy of the GNU General Public License
  16. # along with this program. If not, see <https://www.gnu.org/licenses/>.
  17. import asyncio
  18. import datetime
  19. import getpass
  20. import logging
  21. import typing
  22. import unittest.mock
  23. import jeepney
  24. import jeepney.low_level
  25. import jeepney.wrappers
  26. import pytest
  27. import systemctl_mqtt._dbus.login_manager
  28. # pylint: disable=protected-access
  29. def test_get_login_manager_proxy():
  30. login_manager = systemctl_mqtt._dbus.login_manager.get_login_manager_proxy()
  31. assert isinstance(login_manager, jeepney.io.blocking.Proxy)
  32. assert login_manager._msggen.interface == "org.freedesktop.login1.Manager"
  33. # https://freedesktop.org/wiki/Software/systemd/logind/
  34. assert login_manager.CanPowerOff() in {("yes",), ("challenge",)}
  35. def test__log_shutdown_inhibitors_some(caplog):
  36. login_manager = unittest.mock.MagicMock()
  37. login_manager.ListInhibitors.return_value = (
  38. [
  39. (
  40. "shutdown:sleep",
  41. "Developer",
  42. "Haven't pushed my commits yet",
  43. "delay",
  44. 1000,
  45. 1234,
  46. ),
  47. ("shutdown", "Editor", "", "Unsafed files open", 0, 42),
  48. ],
  49. )
  50. with caplog.at_level(logging.DEBUG):
  51. systemctl_mqtt._dbus.login_manager._log_shutdown_inhibitors(login_manager)
  52. assert len(caplog.records) == 2
  53. assert caplog.records[0].levelno == logging.DEBUG
  54. assert (
  55. caplog.records[0].message
  56. == "detected shutdown inhibitor Developer (pid=1234, uid=1000, mode=delay): "
  57. + "Haven't pushed my commits yet"
  58. )
  59. def test__log_shutdown_inhibitors_none(caplog):
  60. login_manager = unittest.mock.MagicMock()
  61. login_manager.ListInhibitors.return_value = ([],)
  62. with caplog.at_level(logging.DEBUG):
  63. systemctl_mqtt._dbus.login_manager._log_shutdown_inhibitors(login_manager)
  64. assert len(caplog.records) == 1
  65. assert caplog.records[0].levelno == logging.DEBUG
  66. assert caplog.records[0].message == "no shutdown inhibitor locks found"
  67. def test__log_shutdown_inhibitors_fail(caplog):
  68. login_manager = unittest.mock.MagicMock()
  69. login_manager.ListInhibitors.side_effect = DBusErrorResponseMock("error", "mocked")
  70. with caplog.at_level(logging.DEBUG):
  71. systemctl_mqtt._dbus.login_manager._log_shutdown_inhibitors(login_manager)
  72. assert len(caplog.records) == 1
  73. assert caplog.records[0].levelno == logging.WARNING
  74. assert (
  75. caplog.records[0].message
  76. == "failed to fetch shutdown inhibitors: [error] mocked"
  77. )
  78. @pytest.mark.parametrize("action", ["poweroff", "reboot"])
  79. @pytest.mark.parametrize("delay", [datetime.timedelta(0), datetime.timedelta(hours=1)])
  80. def test__schedule_shutdown(action, delay):
  81. login_manager_mock = unittest.mock.MagicMock()
  82. with unittest.mock.patch(
  83. "systemctl_mqtt._dbus.login_manager.get_login_manager_proxy",
  84. return_value=login_manager_mock,
  85. ):
  86. login_manager_mock.ListInhibitors.return_value = ([],)
  87. systemctl_mqtt._dbus.login_manager.schedule_shutdown(action=action, delay=delay)
  88. login_manager_mock.ScheduleShutdown.assert_called_once()
  89. schedule_args, schedule_kwargs = login_manager_mock.ScheduleShutdown.call_args
  90. assert not schedule_args
  91. assert schedule_kwargs.pop("action") == action
  92. actual_delay = schedule_kwargs.pop("time") - datetime.datetime.now()
  93. assert actual_delay.total_seconds() == pytest.approx(delay.total_seconds(), abs=0.1)
  94. assert not schedule_kwargs
  95. class DBusErrorResponseMock(jeepney.wrappers.DBusErrorResponse):
  96. # pylint: disable=missing-class-docstring,super-init-not-called
  97. def __init__(self, name: str, data: typing.Any):
  98. self.name = name
  99. self.data = data
  100. @pytest.mark.parametrize(
  101. ("action", "error_name", "error_message", "log_message"),
  102. [
  103. (
  104. "poweroff",
  105. "test error",
  106. "test message",
  107. "[test error] ('test message',)",
  108. ),
  109. (
  110. "poweroff",
  111. "org.freedesktop.DBus.Error.InteractiveAuthorizationRequired",
  112. "Interactive authentication required.",
  113. """interactive authorization required
  114. create /etc/polkit-1/rules.d/50-systemctl-mqtt.rules and insert the following rule:
  115. polkit.addRule(function(action, subject) {
  116. if(action.id === "org.freedesktop.login1.power-off" && subject.user === "{{username}}") {
  117. return polkit.Result.YES;
  118. }
  119. });
  120. """.replace(
  121. "{{username}}", getpass.getuser()
  122. ),
  123. ),
  124. (
  125. "reboot",
  126. "org.freedesktop.DBus.Error.InteractiveAuthorizationRequired",
  127. "Interactive authentication required.",
  128. """interactive authorization required
  129. create /etc/polkit-1/rules.d/50-systemctl-mqtt.rules and insert the following rule:
  130. polkit.addRule(function(action, subject) {
  131. if(action.id === "org.freedesktop.login1.reboot" && subject.user === "{{username}}") {
  132. return polkit.Result.YES;
  133. }
  134. });
  135. """.replace(
  136. "{{username}}", getpass.getuser()
  137. ),
  138. ),
  139. ],
  140. )
  141. def test__schedule_shutdown_fail(
  142. caplog, action: str, error_name: str, error_message: str, log_message: str
  143. ) -> None:
  144. login_manager_mock = unittest.mock.MagicMock()
  145. login_manager_mock.ScheduleShutdown.side_effect = DBusErrorResponseMock(
  146. name=error_name,
  147. data=(error_message,),
  148. )
  149. login_manager_mock.ListInhibitors.return_value = ([],)
  150. with unittest.mock.patch(
  151. "systemctl_mqtt._dbus.login_manager.get_login_manager_proxy",
  152. return_value=login_manager_mock,
  153. ), caplog.at_level(logging.DEBUG):
  154. systemctl_mqtt._dbus.login_manager.schedule_shutdown(
  155. action=action, delay=datetime.timedelta(seconds=21)
  156. )
  157. login_manager_mock.ScheduleShutdown.assert_called_once()
  158. assert len(caplog.records) == 3
  159. assert caplog.records[0].levelno == logging.INFO
  160. assert caplog.records[0].message.startswith(f"scheduling {action} for ")
  161. assert caplog.records[1].levelno == logging.ERROR
  162. assert caplog.records[1].message == f"failed to schedule {action}: {log_message}"
  163. assert "inhibitor" in caplog.records[2].message
  164. @pytest.mark.parametrize("action", ["poweroff"])
  165. @pytest.mark.parametrize(
  166. ("error_name", "error_message", "log_message"),
  167. [
  168. (
  169. "org.freedesktop.DBus.Error.InteractiveAuthorizationRequired",
  170. "Interactive authentication required.",
  171. """interactive authorization required
  172. create /etc/polkit-1/rules.d/50-systemctl-mqtt.rules and insert the following rule:
  173. polkit.addRule(function(action, subject) {
  174. if(action.id === "org.freedesktop.login1.power-off" && subject.user === "USERNAME") {
  175. return polkit.Result.YES;
  176. }
  177. });
  178. """,
  179. ),
  180. ],
  181. )
  182. def test__schedule_shutdown_fail_no_username(
  183. caplog, action, error_name, error_message, log_message
  184. ):
  185. login_manager_mock = unittest.mock.MagicMock()
  186. login_manager_mock.ScheduleShutdown.side_effect = DBusErrorResponseMock(
  187. name=error_name,
  188. data=(error_message,),
  189. )
  190. login_manager_mock.ListInhibitors.return_value = ([],)
  191. with unittest.mock.patch(
  192. "systemctl_mqtt._dbus.login_manager.get_login_manager_proxy",
  193. return_value=login_manager_mock,
  194. ), unittest.mock.patch(
  195. "getpass.getuser", side_effect=OSError("No username set in the environment")
  196. ), caplog.at_level(
  197. logging.ERROR
  198. ):
  199. systemctl_mqtt._dbus.login_manager.schedule_shutdown(
  200. action=action, delay=datetime.timedelta(seconds=21)
  201. )
  202. login_manager_mock.ScheduleShutdown.assert_called_once()
  203. assert len(caplog.records) == 1
  204. assert caplog.records[0].levelno == logging.ERROR
  205. assert caplog.records[0].message == f"failed to schedule {action}: {log_message}"
  206. def test_suspend(caplog):
  207. login_manager_mock = unittest.mock.MagicMock()
  208. with unittest.mock.patch(
  209. "systemctl_mqtt._dbus.login_manager.get_login_manager_proxy",
  210. return_value=login_manager_mock,
  211. ), caplog.at_level(logging.INFO):
  212. systemctl_mqtt._dbus.login_manager.suspend()
  213. login_manager_mock.Suspend.assert_called_once_with(interactive=False)
  214. assert len(caplog.records) == 1
  215. assert caplog.records[0].levelno == logging.INFO
  216. assert caplog.records[0].message == "suspending system"
  217. def test_lock_all_sessions(caplog):
  218. login_manager_mock = unittest.mock.MagicMock()
  219. with unittest.mock.patch(
  220. "systemctl_mqtt._dbus.login_manager.get_login_manager_proxy",
  221. return_value=login_manager_mock,
  222. ), caplog.at_level(logging.INFO):
  223. systemctl_mqtt._dbus.login_manager.lock_all_sessions()
  224. login_manager_mock.LockSessions.assert_called_once_with()
  225. assert len(caplog.records) == 1
  226. assert caplog.records[0].levelno == logging.INFO
  227. assert caplog.records[0].message == "instruct all sessions to activate screen locks"
  228. @pytest.mark.parametrize(
  229. ("error_name", "error_message", "log_message"),
  230. [
  231. (
  232. "test error",
  233. "test message",
  234. "[test error] ('test message',)",
  235. ),
  236. (
  237. "org.freedesktop.DBus.Error.InteractiveAuthorizationRequired",
  238. "Interactive authentication required.",
  239. """interactive authorization required
  240. create /etc/polkit-1/rules.d/50-systemctl-mqtt.rules and insert the following rule:
  241. polkit.addRule(function(action, subject) {
  242. if(action.id === "org.freedesktop.login1.lock-sessions" && subject.user === "{{username}}") {
  243. return polkit.Result.YES;
  244. }
  245. });
  246. """.replace(
  247. "{{username}}", getpass.getuser()
  248. ),
  249. ),
  250. ],
  251. )
  252. def test_lock_all_sessions_fail(
  253. caplog: pytest.LogCaptureFixture,
  254. error_name: str,
  255. error_message: str,
  256. log_message: str,
  257. ) -> None:
  258. login_manager_mock = unittest.mock.MagicMock()
  259. login_manager_mock.LockSessions.side_effect = DBusErrorResponseMock(
  260. name=error_name, data=(error_message,)
  261. )
  262. with unittest.mock.patch(
  263. "systemctl_mqtt._dbus.login_manager.get_login_manager_proxy",
  264. return_value=login_manager_mock,
  265. ), caplog.at_level(logging.ERROR):
  266. systemctl_mqtt._dbus.login_manager.lock_all_sessions()
  267. login_manager_mock.LockSessions.assert_called_once()
  268. assert len(caplog.records) == 1
  269. assert caplog.records[0].levelno == logging.ERROR
  270. assert caplog.records[0].message == f"failed to lock all sessions: {log_message}"
  271. async def _get_unit_path_mock( # pylint: disable=unused-argument
  272. *, service_manager: jeepney.io.asyncio.Proxy, unit_name: str
  273. ) -> str:
  274. return "/org/freedesktop/systemd1/unit/" + unit_name
  275. @pytest.mark.asyncio
  276. @pytest.mark.parametrize(
  277. "monitored_system_unit_names", [[], ["foo.service", "bar.service"]]
  278. )
  279. async def test__dbus_signal_loop(monitored_system_unit_names: typing.List[str]) -> None:
  280. # pylint: disable=too-many-locals,too-many-arguments
  281. state_mock = unittest.mock.AsyncMock()
  282. with unittest.mock.patch(
  283. "jeepney.io.asyncio.open_dbus_router",
  284. ) as open_dbus_router_mock, unittest.mock.patch(
  285. "systemctl_mqtt._get_unit_path", _get_unit_path_mock
  286. ), unittest.mock.patch(
  287. "systemctl_mqtt._dbus_signal_loop_unit"
  288. ) as dbus_signal_loop_unit_mock:
  289. async with open_dbus_router_mock() as dbus_router_mock:
  290. pass
  291. add_match_reply = unittest.mock.Mock()
  292. add_match_reply.body = ()
  293. dbus_router_mock.send_and_get_reply.return_value = add_match_reply
  294. msg_queue: asyncio.Queue[jeepney.low_level.Message] = asyncio.Queue()
  295. await msg_queue.put(jeepney.low_level.Message(header=None, body=(False,)))
  296. await msg_queue.put(jeepney.low_level.Message(header=None, body=(True,)))
  297. await msg_queue.put(jeepney.low_level.Message(header=None, body=(False,)))
  298. dbus_router_mock.filter = unittest.mock.MagicMock()
  299. dbus_router_mock.filter.return_value.__enter__.return_value = msg_queue
  300. state_mock.monitored_system_unit_names = monitored_system_unit_names
  301. # asyncio.TaskGroup added in python3.11
  302. loop_task = asyncio.create_task(
  303. systemctl_mqtt._dbus_signal_loop(
  304. state=state_mock, mqtt_client=unittest.mock.MagicMock()
  305. )
  306. )
  307. async def _abort_after_msg_queue():
  308. await msg_queue.join()
  309. loop_task.cancel()
  310. with pytest.raises(asyncio.exceptions.CancelledError):
  311. await asyncio.gather(*(loop_task, _abort_after_msg_queue()))
  312. assert unittest.mock.call(bus="SYSTEM") in open_dbus_router_mock.call_args_list
  313. dbus_router_mock.filter.assert_called_once()
  314. (filter_match_rule,) = dbus_router_mock.filter.call_args[0]
  315. assert (
  316. filter_match_rule.header_fields["interface"] == "org.freedesktop.login1.Manager"
  317. )
  318. assert filter_match_rule.header_fields["member"] == "PrepareForShutdown"
  319. add_match_msg = dbus_router_mock.send_and_get_reply.call_args[0][0]
  320. assert (
  321. add_match_msg.header.fields[jeepney.low_level.HeaderFields.member] == "AddMatch"
  322. )
  323. assert add_match_msg.body == (
  324. "interface='org.freedesktop.login1.Manager',member='PrepareForShutdown'"
  325. ",path='/org/freedesktop/login1',type='signal'",
  326. )
  327. assert [
  328. c[1]["active"] for c in state_mock.preparing_for_shutdown_handler.call_args_list
  329. ] == [False, True, False]
  330. assert not any(args for args, _ in dbus_signal_loop_unit_mock.await_args_list)
  331. dbus_signal_loop_unit_kwargs = [
  332. kwargs for _, kwargs in dbus_signal_loop_unit_mock.await_args_list
  333. ]
  334. assert [(a["unit_name"], a["unit_path"]) for a in dbus_signal_loop_unit_kwargs] == [
  335. (n, f"/org/freedesktop/systemd1/unit/{n}") for n in monitored_system_unit_names
  336. ]
  337. def _mock_get_active_state_reply(state: str) -> unittest.mock.MagicMock:
  338. reply_mock = unittest.mock.MagicMock()
  339. reply_mock.body = (("s", state),)
  340. return reply_mock
  341. @pytest.mark.asyncio
  342. async def test__dbus_signal_loop_unit() -> None:
  343. state = systemctl_mqtt._State(
  344. mqtt_topic_prefix="prefix",
  345. homeassistant_discovery_prefix="unused",
  346. homeassistant_discovery_object_id="unused",
  347. poweroff_delay=datetime.timedelta(),
  348. monitored_system_unit_names=[],
  349. )
  350. mqtt_client_mock = unittest.mock.AsyncMock()
  351. dbus_router_mock = unittest.mock.AsyncMock()
  352. bus_proxy_mock = unittest.mock.AsyncMock()
  353. bus_proxy_mock.AddMatch.return_value = ()
  354. get_active_state_reply_mock = unittest.mock.MagicMock()
  355. get_active_state_reply_mock.body = (("s", "active"),)
  356. states = [
  357. "active",
  358. "deactivating",
  359. "inactive",
  360. "inactive",
  361. "activating",
  362. "active",
  363. "active",
  364. "active",
  365. "inactive",
  366. ]
  367. dbus_router_mock.send_and_get_reply.side_effect = [
  368. _mock_get_active_state_reply(s) for s in states
  369. ]
  370. msg_queue: asyncio.Queue[jeepney.low_level.Message] = asyncio.Queue()
  371. for _ in range(len(states) - 1):
  372. await msg_queue.put(jeepney.low_level.Message(header=None, body=()))
  373. dbus_router_mock.filter = unittest.mock.MagicMock()
  374. dbus_router_mock.filter.return_value.__enter__.return_value = msg_queue
  375. loop_task = asyncio.create_task(
  376. systemctl_mqtt._dbus_signal_loop_unit(
  377. state=state,
  378. mqtt_client=mqtt_client_mock,
  379. dbus_router=dbus_router_mock,
  380. bus_proxy=bus_proxy_mock,
  381. unit_name="foo.service",
  382. unit_path="/org/freedesktop/systemd1/unit/whatever.service",
  383. )
  384. )
  385. async def _abort_after_msg_queue():
  386. await msg_queue.join()
  387. loop_task.cancel()
  388. with pytest.raises(asyncio.exceptions.CancelledError):
  389. await asyncio.gather(*(loop_task, _abort_after_msg_queue()))
  390. bus_proxy_mock.AddMatch.assert_awaited_once()
  391. ((match_rule,), add_match_kwargs) = bus_proxy_mock.AddMatch.await_args
  392. assert match_rule.header_fields["interface"] == "org.freedesktop.DBus.Properties"
  393. assert match_rule.header_fields["member"] == "PropertiesChanged"
  394. assert not add_match_kwargs
  395. assert mqtt_client_mock.publish.await_args_list == [
  396. unittest.mock.call(
  397. topic="prefix/unit/system/foo.service/active-state", payload=s
  398. )
  399. for s in [ # consecutive duplicates filtered
  400. "active",
  401. "deactivating",
  402. "inactive",
  403. "activating",
  404. "active",
  405. "inactive",
  406. ]
  407. ]