-
Notifications
You must be signed in to change notification settings - Fork 38
test: fix nginx to run as non-root user #179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
With this fix, there is still issues with |
d3c867d
to
23a6f0d
Compare
It's not clear to me what fails at your end. I can run the tests successfully as an unprivileged user with Debian trixie. The nginx errors are somewhat expected for unprivileged users, but should not be fatal: rauc-hawkbit-updater/test/conftest.py Lines 237 to 238 in b201399
Can you provide logs of a pytest run with |
Here is a run on |
23a6f0d
to
e4d3004
Compare
Okay, since it's officially documented, we should apply the config directives. Rebased on top of #188 and marked as draft for now. Once the depending PRs are merged, we can mark this as "ready for review". |
4d002e2
to
f84e82e
Compare
This is preparation for a new authentication method mTLS being introduced in a future commit. Move the SSL options up, so mTLS options can be added before bailing out due to no valid authentication option set. Also move the existence check for auth/gateway token into a new variable, so we can check for them in a combined fashion. Signed-off-by: Robin van der Gracht <[email protected]> Signed-off-by: Bastian Krause <[email protected]>
Add support for mutual TLS authentication. This is the preferred method of authentication for bosch-iot-suite.com's hawkBit instance and the only one that allows keeping the authenticator in a (f)TPM. Optionally, an OpenSSL engine can be configured if required for access to the SSL private key. Signed-off-by: Robin van der Gracht <[email protected]> Signed-off-by: Bastian Krause <[email protected]>
This works by passing the client key and cert on to RAUC's "tls-key"/"tls-cert" properties. Signed-off-by: Robin van der Gracht <[email protected]> Signed-off-by: Bastian Krause <[email protected]>
A future commit will set up a nginx reverse proxy between rauc-hawkbit-updater and hawkbit for mTLS testing. server.forward-headers-strategy=NATIVE makes Hawkbit take the X-Forwarded-For/X-Forwarded-Proto headers into account. Signed-off-by: Florian Bezannier <[email protected]> Signed-off-by: Robin van der Gracht <[email protected]> Signed-off-by: Bastian Krause <[email protected]>
Inspired by https://eclipse.dev/hawkbit/concepts/authentication/ . The files in test/pki/ were generated by running this command in the repository's root directory: $ test/gen_pki.sh test/pki Signed-off-by: Florian Bezannier <[email protected]> Signed-off-by: Robin van der Gracht <[email protected]> Signed-off-by: Bastian Krause <[email protected]>
Inspired by https://eclipse.dev/hawkbit/concepts/authentication/, add options to the nginx proxy configuration for mTLS tests and some new infrastructure fixtures to make use of this feature in a future commit. Signed-off-by: Florian Bezannier <[email protected]> Signed-off-by: Robin van der Gracht <[email protected]> Signed-off-by: Bastian Krause <[email protected]>
Based on the work of Florain Bezannier. Client key and certificate are now provided to rauc_dbus_dummy by rauc-hawkbit-updater through arguments of the InstallBundle method call (for streaming installations). This also removes the need for a separate mTLS rauc_dbus_dummy fixture. Signed-off-by: Robin van der Gracht <[email protected]> Signed-off-by: Bastian Krause <[email protected]>
The nginx config is getting rather complex. Future commits will even extend the existing nginx configs with lua scripting. We should not maintain lua scripting inside nginx configs inside python f-strings. So let's move the config to a dedicated file and use Python's template mechanism instead of f-strings and .format(). Signed-off-by: Bastian Krause <[email protected]>
Until now, the partial download tests did not work reliably and relied on implicit nginx behavior: `limit_rate_after 200k;` combined with `limit_rate 70k;` lead to nginx sending "206 Partial Content" responses. As far as I remember, this was found by trial and error. Let's use a more stable solution: lua scripting allows us to control reliable and fine grained what hawkBit artifacts nginx serves. So add a config snippet that makes nginx only serve the first half of the RAUC bundle, then close the connection prematrely and serve the second half via range request only. This is basically what the previous solution tried to achieve in a more reliable fashion. This means we need to add the lua module and its dependencies to the test dependencies. Signed-off-by: Bastian Krause <[email protected]>
The nginx_proxy fixture does not do rate limiting on its own. This was mixed up with the rate_limited_port fixture. So drop that part of the doc string. Signed-off-by: Bastian Krause <[email protected]>
Under some unknown circumstances, the current nginx config run as non-root still leads to fatal errors: $ ./test/wait-for-hawkbit-online && dbus-run-session -- pytest -v -o log_cli=true test/test_download.py [...] test/test_download.py::test_download_too_slow -------------------------------------------------------- live log call -------------------------------------------------------- INFO nginx running: nginx -c /tmp/pytest-of-thibaud/pytest-8/nginx0/nginx.conf -p . INFO nginx nginx: [alert] could not open error log file: open() "/var/log/nginx/error.log" failed (13: Permission denied) INFO nginx 2024/06/28 15:41:56 [emerg] 1450257#1450257: mkdir() "/var/lib/nginx/tmp/client_body" failed (13: Permission denied) SKIPPED (nginx failed, use -s to see logs) [ 42%] test/test_download.py::test_download_partials_without_resume ------------------------------------------------------- live log setup -------------------------------------------------------- INFO nginx running: nginx -c /tmp/pytest-of-thibaud/pytest-8/nginx1/nginx.conf -p . INFO nginx nginx: [alert] could not open error log file: open() "/var/log/nginx/error.log" failed (13: Permission denied) INFO nginx 2024/06/28 15:41:56 [emerg] 1450258#1450258: mkdir() "/var/lib/nginx/tmp/client_body" failed (13: Permission denied) SKIPPED (nginx failed, use -s to see logs) [ 57%] test/test_download.py::test_download_partials_with_resume SKIPPED (nginx failed, use -s to see logs) [ 71%] test/test_download.py::test_download_slow_with_resume -------------------------------------------------------- live log call -------------------------------------------------------- INFO nginx running: nginx -c /tmp/pytest-of-thibaud/pytest-8/nginx2/nginx.conf -p . INFO nginx nginx: [alert] could not open error log file: open() "/var/log/nginx/error.log" failed (13: Permission denied) INFO nginx 2024/06/28 15:41:56 [emerg] 1450259#1450259: mkdir() "/var/lib/nginx/tmp/client_body" failed (13: Permission denied) SKIPPED (nginx failed, use -s to see logs) The section "Running nginx as a non-root user" of the official nginx docker image [1] gives a hint what options must be set to not run into errors. Apply the config directives appropriate for our use case. [1] https://hub.docker.com/_/nginx Signed-off-by: Thibaud Dufour <[email protected]> [bst: dropped unused options fastcgi_temp_path, uwsgi_temp_path, scgi_temp_path, rebased] Signed-off-by: Bastian Krause <[email protected]>
f84e82e
to
b18ac03
Compare
Logs
Run on Fedora 40 with following rpm packages installed: