summaryrefslogtreecommitdiff
path: root/test/nagios/webapp_login.py
blob: 1239769cdbf929e4664510396f7d2ce6fde17f35 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
#!/usr/bin/env python

# Test Authentication with the webapp API works.

import requests
import json
import string
import random
import srp._pysrp as srp
import binascii
import yaml


safe_unhexlify = lambda x: binascii.unhexlify(x) if (
    len(x) % 2 == 0) else binascii.unhexlify('0' + x)


def read_config():
    open("/etc/leap/hiera.yaml", 'r') as stream
      config = yaml.load(stream)
    user = config['webapp']['nagios_test_user']
    if ('username' not in user):
        fail('nagios test user lacks username')
    if ('password' not in user):
        fail('nagios test user lacks password')
    api = config['api']
    api['version'] = config['webapp']['api_version']
    return {'api': api, 'user': user}


def run_tests(config):
    user = config['user']
    api = config['api']
    usr = srp.User(user['username'], user['password'], srp.SHA256, srp.NG_1024)
    try:
        auth = parse(authenticate(api, usr))
    except requests.exceptions.ConnectionError:
        fail('no connection to server')
    exit(report(auth, usr))

# parse the server responses


def parse(response):
    request = response.request
    try:
        return json.loads(response.text)
    except ValueError:
        return None


def authenticate(api, usr):
    api_url = 'https://' + api['domain'] + ':' + \
        str(api['port']) + '/' + str(api['version'])
    session = requests.session()
    uname, A = usr.start_authentication()
    params = {
        'login': uname,
        'A': binascii.hexlify(A)
    }
    init = parse(
        session.post(api_url + '/sessions', data=params, verify=False))
    if ('errors' in init):
        fail('test user not found')
    M = usr.process_challenge(
        safe_unhexlify(init['salt']), safe_unhexlify(init['B']))
    return session.put(api_url + '/sessions/' + uname, verify=False,
                       data={'client_auth': binascii.hexlify(M)})

    def report(auth, usr):
        if ('errors' in auth):
            fail('srp password auth failed')
    usr.verify_session(safe_unhexlify(auth["M2"]))
    if usr.authenticated():
        print '0 webapp_login - OK - can login to webapp fine'
        return 0
    print '1 webapp_login - WARNING - failed to verify webapp server'
    return 1


def fail(reason):
    print '2 webapp_login - CRITICAL - ' + reason
    exit(2)

run_tests(read_config())