def test_multiple(self): """ Test setting multiple passwords. """ self.navigate_to_resource("host1.example.com") history_links = self.wd.find_elements(By.LINK_TEXT, "History") history_links[0].click() time.sleep(0.5) # The click isn't auto-waiting ... els = self.wd.find_elements(By.XPATH, ".//*[@id='content']/table[2]/tbody/tr/td") self.assertEqual(1, len(els), "Expected table with 1 [no-content-message] row.") self.assertTrue(els[0].text.startswith("No password history")) pw_id = self.wd.current_url.split('/')[-1] session = meta.Session() passwords.modify(pw_id, password="******") session.commit() time.sleep(1) passwords.modify(pw_id, password="******") session.commit() self.wd.refresh() curr_pw = self.wd.find_element(By.ID, "current-password") self.assertEqual("Second Change", curr_pw.get_attribute("value")) els = self.wd.find_elements(By.XPATH, ".//*[@id='content']/table[2]/tbody/tr") self.assertEqual(2, len(els), "Expected table with 2 rows.") input_el = self.wd.find_element(By.XPATH, "//*[@id='content']/table[2]/tbody/tr[1]/td[1]/form/input") self.assertTrue(input_el is not None, "Expected to find an input element for pw hist.") self.assertEqual("First Change", input_el.get_attribute("value"))
def process_edit(self, **kwargs): form = PasswordEditForm(request_params()) if form.validate(): (pw, modified) = passwords.modify(form.password_id.data, username=form.username.data, password=form.password_decrypted.data, description=form.description.data, tags=form.tags.data) auditlog.log(auditlog.CODE_CONTENT_MOD, target=pw, attributes_modified=modified) notify_entity_activity(pw, 'updated') raise cherrypy.HTTPRedirect('/resource/view/{0}'.format(pw.resource_id)) else: log.warning("Form failed validation: {0}".format(form.errors)) return render('password/edit.html', {'form': form})
def modifyPassword(self, password_id, **kwargs): """ Modify an existing password. This method requires keyword arguments and so only works with JSON-RPC2 protocol. :param password_id: The ID of the password to modify. :type password_id: int :keyword username: :keyword password: :keyword description: :return: The modified password object. :rtype: dict """ (pw, modified) = passwords.modify(password_id, **kwargs) auditlog.log(auditlog.CODE_CONTENT_MOD, target=pw, attributes_modified=modified) return pw.to_dict()
def from_structure(self, structure): """ Populates the SQLAlchemy model from a python dictionary of the database structure. """ session = meta.Session() try: for resource_s in structure['resources']: log.debug("Importing: {0!r}".format(resource_s)) # First build up a list of group_ids for this resource that will correspond to groups # in *this* database. group_ids = [] for gname in resource_s['groups']: group = groups.get_by_name(gname, assert_exists=False) if not group: group = groups.create(gname) log.info("Created group: {0!r}".format(group)) else: log.info("Found existing group: {0!r}".format(group)) group_ids.append(group.id) # First we should see if there is a match for the id and name; we can't rely on name alone since # there is no guarantee of name uniqueness (even with a group) resource = None resource_candidate = resources.get(resource_s['id'], assert_exists=False) if resource_candidate and resource_candidate.name == resource_s['name']: resource = resource_candidate else: # If we find a matching resource (by name) and there is only one then we'll use that. try: resource = resources.get_by_name(resource_s['name'], assert_single=True, assert_exists=True) except MultipleResultsFound: log.info("Multiple resource matched name {0!r}, will create a new one.".format(resource_s['name'])) except exc.NoSuchEntity: log.debug("No resource found matching name: {0!r}".format(resource_s['name'])) pass resource_attribs = ('name', 'addr', 'description', 'notes', 'tags') resource_attribs_update = dict([(k,v) for (k,v) in resource_s.items() if k in resource_attribs]) if resource: (resource, modified) = resources.modify(resource.id, group_ids=group_ids, **resource_attribs_update) # (yes, we are overwriting 'resource' var with new copy returned from this method) log.info("Updating existing resource: {0!r} (modified: {1!r})".format(resource, modified)) if modified and modified != ['group_ids']: if not self.force: raise RuntimeError("Refusing to modify existing resource attributes {0!r} on {1!r} (use 'force' to override this).".format(modified, resource)) else: log.warning("Overwriting resource attributes {0!r} on {1!r}".format(modified, resource)) else: # We will just assume that we need to create the resource. Yes, it's possible it'll match an existing # one, but better to build a merge tool than end up silently merging things that are not the same. resource = resources.create(group_ids=group_ids, **resource_attribs_update) log.info("Created new resource: {0!r}".format(resource)) # Add the passwords for password_s in resource_s['passwords']: password_attribs = ('username', 'description', 'password', 'tags') password_attribs_update = dict([(k,v) for (k,v) in password_s.items() if k in password_attribs]) # Look for a matching password. We do know that this is unique. password = passwords.get_for_resource(password_s['username'], password_s['resource_id'], assert_exists=False) if password: (password, modified) = passwords.modify(password_id=password.id, **password_attribs_update) # (Yeah, we overwrite password object.) log.info("Updating existing password: {0!r} (modified: {1!r})".format(password, modified)) non_pw_modified = set(modified) - set(['password']) if not modified: log.debug("Password row not modified.") else: log.debug("Password modified: {0!r}".format(modified)) # If anything changed other than password, we need to ensure that force=true if non_pw_modified: if not self.force: raise RuntimeError("Refusing to modify existing password attributes {0!r} on {1!r} (use 'force' to override this).".format(non_pw_modified, password)) else: log.warning("Overwriting password attributes {0!r} on {1!r}".format(non_pw_modified, password)) else: password = passwords.create(resource_id=resource.id, **password_attribs_update) log.info("Creating new password: {0!r}".format(password)) # This probably isn't necessary as all the DAO methods should also flush session, but might as well. session.flush() except: session.rollback() raise