-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RAS Update #70
RAS Update #70
Conversation
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
…ode. Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
…mo00 response buffer size configurable. Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
…d redaction to hex dump logging. Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
…ssions. Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All looks good minus 1 minor typo. I do like the additional validation you added for buffer size. Good idea, and the test for it looks solid.
Signed-off-by: Leonard Carcaramo <lcarcaramo@ibm.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great!
💡 Issue Reference
Issue: #60
💻 What does this address?
IRRSMO00.call_racf()
dump_mode
toggle to force the creation of dumps of the raw result XML returned by IRRSMO00 on all requests (failure and success).irrsmo00_result_buffer_size
to enable the size of the IRRSMO00 result buffer to be customized.10000
and should not be larger than100000000
since it can lead to aSIGKILL
signal being raised, which will result in the Python process that pyRACF runs under being kill._valid_segment_traits
dictionary forDataSetAdmin
. Updating_valid_segment_traits
after calling the parent constructor breaks "Replace Existing Segment Traits" and "Update Existing Segment Traits" functionally. Moving this code to before calling the parent constructor fixes the problem.Dumper
for creation of dump files.debug
is enabled and a dump of the raw IRRSMO00 result XML is created.600
permissions and IRRSMO00 already redacts passwords and passphrases which are among the most sensitive information that could be included in a security result. So, given the dump files are protected and sensitive information is more or less already redacted by IRRSMO00, it makes seems to dump the raw result XML from IRRSMO00 with no post processing at all to ensure that during problem determination, an exact copy of what IRRSMO00 returned is available to better determine if there is a problem with IRRSMO00 or if there is a problem pyRACF.📟 Implementation Details
y#
inPy_BuildValue()
to return an unmodified copy of the raw result XML from IRRSMO00.~/.pyracf/dumps
with the naming conventionpyracf.<timestamp>.<md5>.dump
.~/.pyracf
(including the.pyracf
folder itself) are created with700
permissions and dump files are created with600
permissions.~/.pyracf
(including the.pyracf
folder itself) have any permissions other than700
, they will be dynamically updated during dump processing. This handles scenarios where the user sets incorrect/insecure permissions on these directories and whenumask
changes the permissions on folder creation.IRRSMO00.__init__()
is no longer necessary since updating the C code to function as a Python Extension and it also breaks new test cases introduced here. All Mocks ofIRRSMO00.__init__()
have been removed.📋 Is there a test case?
Run test cases and try out new functionality manually.