File support-transactional-systems-microos-268.patch of Package salt.18368
From 3c0ff4309887e4db719caa6d18ebdbbcb4e3866e Mon Sep 17 00:00:00 2001
From: Alberto Planas <aplanas@suse.com>
Date: Mon, 5 Oct 2020 16:32:40 +0200
Subject: [PATCH] Support transactional systems (MicroOS) (#268)
* Add rebootmgr module
* Add transactional_update module
* chroot: add chroot detector
* systemd: add offline mode detector
* transactional_update: add pending_transaction detector
* extra: add EFI and transactional grains
* transactional_update: add call, apply_, sls & highstate
* transactional_update: add documentation
* transactional_update: add executor
* Add changelog entry 58519.added
Closes #58519
* transactional_update: update the cleanups family
* transactional_update: add activate_transaction param
* transactional_update: skip tests on Windows
---
changelog/58519.added | 1 +
doc/ref/executors/all/index.rst | 1 +
.../salt.executors.transactional_update.rst | 6 +
doc/ref/modules/all/index.rst | 2 +
.../modules/all/salt.modules.rebootmgr.rst | 5 +
.../all/salt.modules.transactional_update.rst | 5 +
salt/executors/transactional_update.py | 126 ++
salt/grains/extra.py | 29 +
salt/modules/chroot.py | 39 +-
salt/modules/rebootmgr.py | 357 +++++
salt/modules/systemd_service.py | 22 +-
salt/modules/transactional_update.py | 1270 +++++++++++++++++
salt/utils/systemd.py | 22 +
tests/unit/modules/test_chroot.py | 15 +
tests/unit/modules/test_rebootmgr.py | 304 ++++
.../unit/modules/test_transactional_update.py | 683 +++++++++
16 files changed, 2882 insertions(+), 5 deletions(-)
create mode 100644 changelog/58519.added
create mode 100644 doc/ref/executors/all/salt.executors.transactional_update.rst
create mode 100644 doc/ref/modules/all/salt.modules.rebootmgr.rst
create mode 100644 doc/ref/modules/all/salt.modules.transactional_update.rst
create mode 100644 salt/executors/transactional_update.py
create mode 100644 salt/modules/rebootmgr.py
create mode 100644 salt/modules/transactional_update.py
create mode 100644 tests/unit/modules/test_rebootmgr.py
create mode 100644 tests/unit/modules/test_transactional_update.py
diff --git a/changelog/58519.added b/changelog/58519.added
new file mode 100644
index 0000000000..1cc8d7dc74
--- /dev/null
+++ b/changelog/58519.added
@@ -0,0 +1 @@
+Add support for transactional systems, like openSUSE MicroOS
\ No newline at end of file
diff --git a/doc/ref/executors/all/index.rst b/doc/ref/executors/all/index.rst
index 1f26a86fc3..4cd430d8e3 100644
--- a/doc/ref/executors/all/index.rst
+++ b/doc/ref/executors/all/index.rst
@@ -14,3 +14,4 @@ executors modules
docker
splay
sudo
+ transactional_update
diff --git a/doc/ref/executors/all/salt.executors.transactional_update.rst b/doc/ref/executors/all/salt.executors.transactional_update.rst
new file mode 100644
index 0000000000..17f00b2d27
--- /dev/null
+++ b/doc/ref/executors/all/salt.executors.transactional_update.rst
@@ -0,0 +1,6 @@
+salt.executors.transactional_update module
+==========================================
+
+.. automodule:: salt.executors.transactional_update
+ :members:
+
diff --git a/doc/ref/modules/all/index.rst b/doc/ref/modules/all/index.rst
index 8e1bf2ecf1..ec5f4b9cd9 100644
--- a/doc/ref/modules/all/index.rst
+++ b/doc/ref/modules/all/index.rst
@@ -371,6 +371,7 @@ execution modules
rbac_solaris
rbenv
rdp
+ rebootmgr
redismod
reg
rest_pkg
@@ -457,6 +458,7 @@ execution modules
tls
tomcat
trafficserver
+ transactional_update
travisci
tuned
twilio_notify
diff --git a/doc/ref/modules/all/salt.modules.rebootmgr.rst b/doc/ref/modules/all/salt.modules.rebootmgr.rst
new file mode 100644
index 0000000000..22240080b0
--- /dev/null
+++ b/doc/ref/modules/all/salt.modules.rebootmgr.rst
@@ -0,0 +1,5 @@
+salt.modules.rebootmgr module
+=============================
+
+.. automodule:: salt.modules.rebootmgr
+ :members:
diff --git a/doc/ref/modules/all/salt.modules.transactional_update.rst b/doc/ref/modules/all/salt.modules.transactional_update.rst
new file mode 100644
index 0000000000..2f15b95ad4
--- /dev/null
+++ b/doc/ref/modules/all/salt.modules.transactional_update.rst
@@ -0,0 +1,5 @@
+salt.modules.transactional_update module
+========================================
+
+.. automodule:: salt.modules.transactional_update
+ :members:
diff --git a/salt/executors/transactional_update.py b/salt/executors/transactional_update.py
new file mode 100644
index 0000000000..ef7d92bc05
--- /dev/null
+++ b/salt/executors/transactional_update.py
@@ -0,0 +1,126 @@
+"""
+Transactional executor module
+
+.. versionadded:: TBD
+
+"""
+
+import salt.utils.path
+
+# Functions that are mapped into an equivalent one in
+# transactional_update module
+DELEGATION_MAP = {
+ "state.single": "transactional_update.single",
+ "state.sls": "transactional_update.sls",
+ "state.apply": "transactional_update.apply",
+ "state.highstate": "transactional_update.highstate",
+}
+
+# By default, all modules and functions are executed outside the
+# transaction. The next two sets will enumerate the exceptions that
+# will be routed to transactional_update.call()
+DEFAULT_DELEGATED_MODULES = [
+ "ansible",
+ "cabal",
+ "chef",
+ "cmd",
+ "composer",
+ "cp",
+ "cpan",
+ "cyg",
+ "file",
+ "freeze",
+ "nix",
+ "npm",
+ "pip",
+ "pkg",
+ "puppet",
+ "pyenv",
+ "rbenv",
+ "scp",
+]
+DEFAULT_DELEGATED_FUNCTIONS = []
+
+
+def __virtual__():
+ if salt.utils.path.which("transactional-update"):
+ return True
+ else:
+ return (False, "transactional_update executor requires a transactional system")
+
+
+def execute(opts, data, func, args, kwargs):
+ """Delegate into transactional_update module
+
+ The ``transactional_update`` module support the execution of
+ functions inside a transaction, as support apply a state (via
+ ``apply``, ``sls``, ``single`` or ``highstate``).
+
+ This execution module can be used to route some Salt modules and
+ functions to be executed inside the transaction snapshot.
+
+ Add this executor in the minion configuration file:
+
+ .. code-block:: yaml
+
+ module_executors:
+ - transactional_update
+ - direct_call
+
+ Or use the command line parameter:
+
+ .. code-block:: bash
+
+ salt-call --module-executors='[transactional_update, direct_call]' test.version
+
+ You can also schedule a reboot if needed:
+
+ .. code-block:: bash
+
+ salt-call --module-executors='[transactional_update]' state.sls stuff activate_transaction=True
+
+ There are some configuration parameters supported:
+
+ .. code-block:: yaml
+
+ # Replace the list of default modules that all the functions
+ # are delegated to `transactional_update.call()`
+ delegated_modules: [cmd, pkg]
+
+ # Replace the list of default functions that are delegated to
+ # `transactional_update.call()`
+ delegated_functions: [pip.install]
+
+ # Expand the default list of modules
+ add_delegated_modules: [ansible]
+
+ # Expand the default list of functions
+ add_delegated_functions: [file.copy]
+
+ """
+ fun = data["fun"]
+ module, _ = fun.split(".")
+
+ delegated_modules = set(opts.get("delegated_modules", DEFAULT_DELEGATED_MODULES))
+ delegated_functions = set(
+ opts.get("delegated_functions", DEFAULT_DELEGATED_FUNCTIONS)
+ )
+ if "executor_opts" in data:
+ delegated_modules |= set(data["executor_opts"].get("add_delegated_modules", []))
+ delegated_functions |= set(
+ data["executor_opts"].get("add_delegated_functions", [])
+ )
+ else:
+ delegated_modules |= set(opts.get("add_delegated_modules", []))
+ delegated_functions |= set(opts.get("add_delegated_functions", []))
+
+ if fun in DELEGATION_MAP:
+ result = __executors__["direct_call.execute"](
+ opts, data, __salt__[DELEGATION_MAP[fun]], args, kwargs
+ )
+ elif module in delegated_modules or fun in delegated_functions:
+ result = __salt__["transactional_update.call"](fun, *args, **kwargs)
+ else:
+ result = __executors__["direct_call.execute"](opts, data, func, args, kwargs)
+
+ return result
diff --git a/salt/grains/extra.py b/salt/grains/extra.py
index b30ab0091f..6a26aece77 100644
--- a/salt/grains/extra.py
+++ b/salt/grains/extra.py
@@ -3,14 +3,18 @@
from __future__ import absolute_import, print_function, unicode_literals
# Import python libs
+import glob
+import logging
import os
# Import third party libs
import logging
# Import salt libs
+import salt.utils
import salt.utils.data
import salt.utils.files
+import salt.utils.path
import salt.utils.platform
import salt.utils.yaml
@@ -83,3 +87,28 @@ def suse_backported_capabilities():
'__suse_reserved_pkg_patches_support': True,
'__suse_reserved_saltutil_states_support': True
}
+
+
+def __secure_boot():
+ """Detect if secure-boot is enabled."""
+ enabled = False
+ sboot = glob.glob("/sys/firmware/efi/vars/SecureBoot-*/data")
+ if len(sboot) == 1:
+ with salt.utils.files.fopen(sboot[0], "rb") as fd:
+ enabled = fd.read()[-1:] == b"\x01"
+ return enabled
+
+
+def uefi():
+ """Populate UEFI grains."""
+ grains = {
+ "efi": os.path.exists("/sys/firmware/efi/systab"),
+ "efi-secure-boot": __secure_boot(),
+ }
+
+ return grains
+
+
+def transactional():
+ """Determine if the system in transactional."""
+ return {"transactional": bool(salt.utils.path.which("transactional-update"))}
diff --git a/salt/modules/chroot.py b/salt/modules/chroot.py
index bc089ebf18..5e890b5c35 100644
--- a/salt/modules/chroot.py
+++ b/salt/modules/chroot.py
@@ -21,6 +21,7 @@ import salt.defaults.exitcodes
import salt.exceptions
import salt.ext.six as six
import salt.utils.args
+import salt.utils.files
__func_alias__ = {
@@ -82,6 +83,38 @@ def create(root):
return True
+def in_chroot():
+ """
+ Return True if the process is inside a chroot jail
+
+ .. versionadded:: TBD
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt myminion chroot.in_chroot
+
+ """
+ result = False
+
+ try:
+ # We cannot assume that we are "root", so we cannot read
+ # '/proc/1/root', that is required for the usual way of
+ # detecting that we are in a chroot jail. We use the debian
+ # ischroot method.
+ with salt.utils.files.fopen(
+ "/proc/1/mountinfo"
+ ) as root_fd, salt.utils.files.fopen("/proc/self/mountinfo") as self_fd:
+ root_mountinfo = root_fd.read()
+ self_mountinfo = self_fd.read()
+ result = root_mountinfo != self_mountinfo
+ except OSError:
+ pass
+
+ return result
+
+
def call(root, function, *args, **kwargs):
'''
Executes a Salt function inside a chroot environment.
@@ -121,7 +154,7 @@ def call(root, function, *args, **kwargs):
so_mods=__salt__['config.option']('thin_so_mods', '')
)
# Some bug in Salt is preventing us to use `archive.tar` here. A
- # AsyncZeroMQReqChannel is not closed at the end os the salt-call,
+ # AsyncZeroMQReqChannel is not closed at the end of the salt-call,
# and makes the client never exit.
#
# stdout = __salt__['archive.tar']('xzf', thin_path, dest=thin_dest_path)
@@ -198,7 +231,7 @@ def apply_(root, mods=None, **kwargs):
def _create_and_execute_salt_state(root, chunks, file_refs, test, hash_type):
'''
- Create the salt_stage tarball, and execute in the chroot
+ Create the salt_state tarball, and execute in the chroot
'''
# Create the tar containing the state pkg and relevant files.
salt.client.ssh.wrapper.state._cleanup_slsmod_low_data(chunks)
@@ -210,7 +243,7 @@ def _create_and_execute_salt_state(root, chunks, file_refs, test, hash_type):
ret = None
# Create a temporary directory inside the chroot where we can move
- # the salt_stage.tgz
+ # the salt_state.tgz
salt_state_path = tempfile.mkdtemp(dir=root)
salt_state_path = os.path.join(salt_state_path, 'salt_state.tgz')
salt_state_path_in_chroot = salt_state_path.replace(root, '', 1)
diff --git a/salt/modules/rebootmgr.py b/salt/modules/rebootmgr.py
new file mode 100644
index 0000000000..96133c754b
--- /dev/null
+++ b/salt/modules/rebootmgr.py
@@ -0,0 +1,357 @@
+"""
+:maintainer: Alberto Planas <aplanas@suse.com>
+:maturity: new
+:depends: None
+:platform: Linux
+"""
+
+import logging
+import re
+
+import salt.exceptions
+
+log = logging.getLogger(__name__)
+
+
+def __virtual__():
+ """rebootmgrctl command is required."""
+ if __utils__["path.which"]("rebootmgrctl") is not None:
+ return True
+ else:
+ return (False, "Module rebootmgt requires the command rebootmgrctl")
+
+
+def _cmd(cmd, retcode=False):
+ """Utility function to run commands."""
+ result = __salt__["cmd.run_all"](cmd)
+ if retcode:
+ return result["retcode"]
+
+ if result["retcode"]:
+ raise salt.exceptions.CommandExecutionError(result["stderr"])
+
+ return result["stdout"]
+
+
+def version():
+ """Return the version of rebootmgrd
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr version
+
+ """
+ cmd = ["rebootmgrctl", "--version"]
+
+ return _cmd(cmd).split()[-1]
+
+
+def is_active():
+ """Check if the rebootmgrd is running and active or not.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr is_active
+
+ """
+ cmd = ["rebootmgrctl", "is_active", "--quiet"]
+
+ return _cmd(cmd, retcode=True) == 0
+
+
+def reboot(order=None):
+ """Tells rebootmgr to schedule a reboot.
+
+ With the [now] option, a forced reboot is done, no lock from etcd
+ is requested and a set maintenance window is ignored. With the
+ [fast] option, a lock from etcd is requested if needed, but a
+ defined maintenance window is ignored.
+
+ order
+ If specified, can be "now" or "fast"
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr reboot
+ salt microos rebootmgt reboot order=now
+
+ """
+ if order and order not in ("now", "fast"):
+ raise salt.exceptions.CommandExecutionError(
+ "Order parameter, if specified, must be 'now' or 'fast'"
+ )
+
+ cmd = ["rebootmgrctl", "reboot"]
+ if order:
+ cmd.append(order)
+
+ return _cmd(cmd)
+
+
+def cancel():
+ """Cancels an already running reboot.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr cancel
+
+ """
+ cmd = ["rebootmgrctl", "cancel"]
+
+ return _cmd(cmd)
+
+
+def status():
+ """Returns the current status of rebootmgrd.
+
+ Valid returned values are:
+ 0 - No reboot requested
+ 1 - Reboot requested
+ 2 - Reboot requested, waiting for maintenance window
+ 3 - Reboot requested, waiting for etcd lock.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr status
+
+ """
+ cmd = ["rebootmgrctl", "status", "--quiet"]
+
+ return _cmd(cmd, retcode=True)
+
+
+def set_strategy(strategy=None):
+ """A new strategy to reboot the machine is set and written into
+ /etc/rebootmgr.conf.
+
+ strategy
+ If specified, must be one of those options:
+
+ best-effort - This is the default strategy. If etcd is
+ running, etcd-lock is used. If no etcd is running, but a
+ maintenance window is specified, the strategy will be
+ maint-window. If no maintenance window is specified, the
+ machine is immediately rebooted (instantly).
+
+ etcd-lock - A lock at etcd for the specified lock-group will
+ be acquired before reboot. If a maintenance window is
+ specified, the lock is only acquired during this window.
+
+ maint-window - Reboot does happen only during a specified
+ maintenance window. If no window is specified, the
+ instantly strategy is followed.
+
+ instantly - Other services will be informed that a reboot will
+ happen. Reboot will be done without getting any locks or
+ waiting for a maintenance window.
+
+ off - Reboot requests are temporary
+ ignored. /etc/rebootmgr.conf is not modified.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr set_strategy stragegy=off
+
+ """
+ if strategy and strategy not in (
+ "best-effort",
+ "etcd-lock",
+ "maint-window",
+ "instantly",
+ "off",
+ ):
+ raise salt.exceptions.CommandExecutionError("Strategy parameter not valid")
+
+ cmd = ["rebootmgrctl", "set-strategy"]
+ if strategy:
+ cmd.append(strategy)
+
+ return _cmd(cmd)
+
+
+def get_strategy():
+ """The currently used reboot strategy of rebootmgrd will be printed.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr get_strategy
+
+ """
+ cmd = ["rebootmgrctl", "get-strategy"]
+
+ return _cmd(cmd).split(":")[-1].strip()
+
+
+def set_window(time, duration):
+ """Set's the maintenance window.
+
+ time
+ The format of time is the same as described in
+ systemd.time(7).
+
+ duration
+ The format of duration is "[XXh][YYm]".
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr set_window time="Thu,Fri 2020-*-1,5 11:12:13" duration=1h
+
+ """
+ cmd = ["rebootmgrctl", "set-window", time, duration]
+
+ return _cmd(cmd)
+
+
+def get_window():
+ """The currently set maintenance window will be printed.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr get_window
+
+ """
+ cmd = ["rebootmgrctl", "get-window"]
+ window = _cmd(cmd)
+
+ return dict(
+ zip(
+ ("time", "duration"),
+ re.search(
+ r"Maintenance window is set to (.*), lasting (.*).", window
+ ).groups(),
+ )
+ )
+
+
+def set_group(group):
+ """Set the group, to which this machine belongs to get a reboot lock
+ from etcd.
+
+ group
+ Group name
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr set_group group=group_1
+
+ """
+ cmd = ["rebootmgrctl", "set-group", group]
+
+ return _cmd(cmd)
+
+
+def get_group():
+ """The currently set lock group for etcd.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr get_group
+
+ """
+ cmd = ["rebootmgrctl", "get-group"]
+ group = _cmd(cmd)
+
+ return re.search(r"Etcd lock group is set to (.*)", group).groups()[0]
+
+
+def set_max(max_locks, group=None):
+ """Set the maximal number of hosts in a group, which are allowed to
+ reboot at the same time.
+
+ number
+ Maximal number of hosts in a group
+
+ group
+ Group name
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr set_max 4
+
+ """
+ cmd = ["rebootmgrctl", "set-max"]
+ if group:
+ cmd.extend(["--group", group])
+ cmd.append(max_locks)
+
+ return _cmd(cmd)
+
+
+def lock(machine_id=None, group=None):
+ """Lock a machine. If no group is specified, the local default group
+ will be used. If no machine-id is specified, the local machine
+ will be locked.
+
+ machine_id
+ The machine-id is a network wide, unique ID. Per default the
+ ID from /etc/machine-id is used.
+
+ group
+ Group name
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr lock group=group1
+
+ """
+ cmd = ["rebootmgrctl", "lock"]
+ if group:
+ cmd.extend(["--group", group])
+ if machine_id:
+ cmd.append(machine_id)
+
+ return _cmd(cmd)
+
+
+def unlock(machine_id=None, group=None):
+ """Unlock a machine. If no group is specified, the local default group
+ will be used. If no machine-id is specified, the local machine
+ will be locked.
+
+ machine_id
+ The machine-id is a network wide, unique ID. Per default the
+ ID from /etc/machine-id is used.
+
+ group
+ Group name
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos rebootmgr unlock group=group1
+
+ """
+ cmd = ["rebootmgrctl", "unlock"]
+ if group:
+ cmd.extend(["--group", group])
+ if machine_id:
+ cmd.append(machine_id)
+
+ return _cmd(cmd)
diff --git a/salt/modules/systemd_service.py b/salt/modules/systemd_service.py
index e39962f9ac..a684ec0778 100644
--- a/salt/modules/systemd_service.py
+++ b/salt/modules/systemd_service.py
@@ -56,8 +56,10 @@ def __virtual__():
'''
Only work on systems that have been booted with systemd
'''
- if __grains__['kernel'] == 'Linux' \
- and salt.utils.systemd.booted(__context__):
+ is_linux = __grains__.get("kernel") == "Linux"
+ is_booted = salt.utils.systemd.booted(__context__)
+ is_offline = salt.utils.systemd.offline(__context__)
+ if is_linux and (is_booted or is_offline):
return __virtualname__
return (
False,
@@ -1419,3 +1421,19 @@ def firstboot(locale=None, locale_message=None, keymap=None,
'systemd-firstboot error: {}'.format(out['stderr']))
return True
+
+
+def offline():
+ """
+ .. versionadded:: TBD
+
+ Check if systemd is working in offline mode, where is not possible
+ to talk with PID 1.
+
+ CLI Example:
+
+ salt '*' service.offline
+
+ """
+
+ return salt.utils.systemd.offline(__context__)
diff --git a/salt/modules/transactional_update.py b/salt/modules/transactional_update.py
new file mode 100644
index 0000000000..9b14557e07
--- /dev/null
+++ b/salt/modules/transactional_update.py
@@ -0,0 +1,1270 @@
+"""Transactional update
+====================
+
+.. versionadded: TBD
+
+A transactional system, like `MicroOS`_, can present some challenges
+when the user decided to manage it via Salt.
+
+MicroOS provide a read-only rootfs and a tool,
+``transactional-update``, that takes care of the management of the
+system (updating, upgrading, installation or reboot, among others) in
+an atomic way.
+
+Atomicity is the main feature of MicroOS, and to guarantee this
+property, this model leverages ``snapper``, ``zypper``, ``btrfs`` and
+``overlayfs`` to create snapshots that will be updated independently
+of the currently running system, and that are activated after the
+reboot. This implies, for example, that some changes made on the
+system are not visible until the next reboot, as those changes are
+living in a different snapshot of the file system.
+
+This model present a lot of problems with the traditional Salt model,
+where the inspections (like 'is this package installed?') are executed
+in order to determine if a subsequent action is required (like
+'install this package').
+
+Lets consider this use case, to see how it works on a traditional
+system, and in a transactional system:
+
+1) Check if ``apache`` is installed
+
+2) If it is not installed, install it
+
+3) Check that a ``vhost`` is configured for ``apache``
+
+4) Make sure that ``apache2.service`` is enabled
+
+5) If the configuration changes, restart ``apache2.service``
+
+In the traditional system everything will work as expected. The
+system can see if the package is present or not, install it if it
+isn't, and a re-check will shows that is already present. The same
+will happen to the configuration file in ``/etc/apache2``, that will
+be available as soon the package gets installed. Salt can inspect the
+current form of this file, and add the missing bits if required. Salt
+can annotate that a change is present, and restart the service.
+
+In a transactional system we will have multiple issues. The first one
+is that Salt can only see the content of the snapshot where the system
+booted from. Later snapshots may contain different content, including
+the presence of ``apache``. If Salt decides to install ``apache``
+calling ``zypper``, it will fail, as this will try to write into the
+read-only rootfs. Even if Salt would call ``transactional-update pkg
+install``, the package would only be present in the new transaction
+(snapshot), and will not be found in the currently running system when
+later Salt tries to validate the presence of the package in the
+current one.
+
+Any change in ``/etc`` alone will have also problems, as the changes
+will be alive in a different overlay, only visible after the reboot.
+And, finally, the service can only be enabled and restarted if the
+service file is already present in the current ``/etc``.
+
+
+General strategy
+----------------
+
+``transactional-update`` is the reference tool used for the
+administration of transactional systems. Newer versions of this tool
+support the execution of random commands in the new transaction, the
+continuation of a transaction, the automatic detection of changes in
+new transactions and the merge of ``/etc`` overlays.
+
+Continue a transaction
+......................
+
+One prerequisite already present is the support for branching from a
+different snapshot than the current one in snapper.
+
+With this feature we can represent in ``transactional-update`` the
+action of creating a transaction snapshot based on one that is planned
+to be the active one after the reboot. This feature removes a lot of
+user complains (like, for example, loosing changes that are stored in
+a transaction not yet activated), but also provide a more simple model
+to work with.
+
+So, for example, if the user have this scenario::
+
+ +-----+ *=====* +--V--+
+ --| T.1 |--| T.2 |--| T.3 |
+ +-----+ *=====* +--A--+
+
+where T.2 is the current active one, and T.3 is an snapshot generated
+from T.2 with a new package (``apache2``), and is marked to be the
+active after the reboot.
+
+Previously, if the user (that is still on T.2) created a new
+transaction, maybe for adding a new package (``tomcat``, for example),
+the new T.4 will be based on the content of T.2 again, and not T.3, so
+the new T.4 will have lost the changes of T.3 (i.e. `apache2` will not
+be present in T.4).
+
+With the ``--continue`` parameter, ``transactional-update`` will
+create T.4 based on T.3, and nothing will be lost.
+
+Command execution inside a new transaction
+..........................................
+
+With ``transactional-update run`` we will create a new transaction
+based on the current one (T.2), where we can send interactive commands
+that can modify the new transaction, and as commented, with
+``transactional-update --continue run``, we will create a new
+transaction based on the last created (T.3)
+
+The ``run`` command can execute any application inside the new
+transaction namespace. This module uses this feature to execute the
+different Salt execution modules, via ``call()``. Or even the full
+``salt-thin`` or ``salt-call`` via ``sls()``, ``apply()``,
+``single()`` or ``highstate``.
+
+``transactional-update`` will drop empty snapshots
+..................................................
+
+The option ``--drop-if-no-change`` is used to detect whether there is
+any change in the file system on the read-only subvolume of the new
+transaction will be added. If a change is present, the new
+transaction will remain, if not it will be discarded.
+
+For example::
+
+ transactional-update --continute --drop-if-no-change run zypper in apache2"
+
+If we are in the scenario described before, ``apache2`` is already
+present in T.3. In this case a new transaction, T.4, will be created
+based on T.3, ``zypper`` will detect that the package is already
+present and no change will be produced on T.4. At the end of the
+execution, ``transactional-update`` will validate that T.3 and T.4 are
+equivalent and T.4 will be discarded.
+
+If the command is::
+
+ transactional-update --continue --drop-if-no-change run zypper in tomcat
+
+the new T.4 will be indeed different from T.3, and will remain after
+the transaction is closed.
+
+With this feature, every time that we call any function of this
+execution module, we will minimize the amount of transaction, while
+maintaining the idempotence so some operations.
+
+Report for pending transaction
+..............................
+
+A change in the system will create a new transaction, that needs to be
+activated via a reboot. With ``pending_transaction()`` we can check
+if a reboot is needed. We can execute the reboot using the
+``reboot()`` function, that will follow the plan established by the
+functions of the ``rebootmgr`` execution module.
+
+``/etc`` overlay merge when no new transaction is created
+.........................................................
+
+In a transactional model, ``/etc`` is an overlay file system. Changes
+done during the update are only present in the new transaction, and so
+will only be available after the reboot. Or worse, if the transaction
+gets dropped, because there is no change in the ``rootfs``, the
+changes in ``/etc`` will be dropped too!. This is designed like that
+in order to make the configuration files for the new package available
+only when new package is also available to the user. So, after the
+reboot.
+
+This makes sense for the case when, for example, ``apache2`` is not
+present in the current transaction, but we installed it. The new
+snapshot contains the ``apache2`` service, and the configuration files
+in ``/etc`` will be accessible only after the reboot.
+
+But this model presents an issue. If we use ``transactional-update
+--continue --drop-if-no-change run <command>``, where ``<command>``
+does not make any change in the read-only subvolume, but only in
+``/etc`` (which is also read-write in the running system), the new
+overlay with the changes in ``/etc`` will be dropped together with the
+transaction.
+
+To fix this, ``transactional-update`` will detect that when no change
+has been made on the read-only subvolume, but done in the overlay, the
+transaction will be dropped and the changes in the overlay will be
+merged back into ``/etc`` overlay of the current transaction.
+
+
+Using the execution module
+--------------------------
+
+With this module we can create states that leverage Salt into this
+kind of systems::
+
+ # Install apache (low-level API)
+ salt-call transactional_update.pkg_install apache2
+
+ # We can call any execution module
+ salt-call transactional_update.call pkg.install apache2
+
+ # Or via a state
+ salt-call transactional_update.single pkg.installed name=apache2
+
+ # We can also execute a zypper directly
+ salt-call transactional_update run "zypper in apache2" snapshot="continue"
+
+ # We can reuse SLS states
+ salt-call transactional_update.apply install_and_configure_apache
+
+ # Or apply the full highstate
+ salt-call transactional_update.highstate
+
+ # Is there any change done in the system?
+ salt-call transactional_update pending_transaction
+
+ # If so, reboot via rebootmgr
+ salt-call transactional_update reboot
+
+ # We can enable the service
+ salt-call service.enable apache2
+
+ # If apache2 is available, this will work too
+ salt-call service.restart apache2
+
+
+Fixing some expectations
+------------------------
+
+This module alone is an improvement over the current state, but is
+easy to see some limitations and problems:
+
+Is not a fully transparent approach
+...................................
+
+The user needs to know if the system is transactional or not, as not
+everything can be expressed inside a transaction (for example,
+restarting a service inside transaction is not allowed).
+
+Two step for service restart
+............................
+
+In the ``apache2` example from the beginning we can observe the
+biggest drawback. If the package ``apache2`` is missing, the new
+module will create a new transaction, will execute ``pkg.install``
+inside the transaction (creating the salt-thin, moving it inside and
+delegating the execution to `transactional-update` CLI as part of the
+full state). Inside the transaction we can do too the required
+changes in ``/etc`` for adding the new ``vhost``, and we can enable the
+service via systemctl inside the same transaction.
+
+At this point we will not merge the ``/etc`` overlay into the current
+one, and we expect from the user call the ``reboot`` function inside
+this module, in order to activate the new transaction and start the
+``apache2`` service.
+
+In the case that the package is already there, but the configuration
+for the ``vhost`` is required, the new transaction will be dropped and
+the ``/etc`` overlay will be visible in the live system. Then from
+outside the transaction, via a different call to Salt, we can command
+a restart of the ``apache2`` service.
+
+We can see that in both cases we break the user expectation, where a
+change on the configuration will trigger automatically the restart of
+the associated service. In a transactional scenario we need two
+different steps: or a reboot, or a restart from outside of the
+transaction.
+
+.. _MicroOS: https://microos.opensuse.org/
+
+:maintainer: Alberto Planas <aplanas@suse.com>
+:maturity: new
+:depends: None
+:platform: Linux
+
+"""
+
+import copy
+import logging
+import os
+import sys
+import tempfile
+
+import salt.client.ssh.state
+import salt.client.ssh.wrapper.state
+import salt.exceptions
+import salt.utils.args
+
+__func_alias__ = {"apply_": "apply"}
+
+log = logging.getLogger(__name__)
+
+
+def __virtual__():
+ """
+ transactional-update command is required.
+ """
+ if __utils__["path.which"]("transactional-update"):
+ return True
+ else:
+ return (False, "Module transactional_update requires a transactional system")
+
+
+def _global_params(self_update, snapshot=None, quiet=False):
+ """Utility function to prepare common global parameters."""
+ params = ["--non-interactive", "--drop-if-no-change"]
+ if self_update is False:
+ params.append("--no-selfupdate")
+ if snapshot and snapshot != "continue":
+ params.extend(["--continue", snapshot])
+ elif snapshot:
+ params.append("--continue")
+ if quiet:
+ params.append("--quiet")
+ return params
+
+
+def _pkg_params(pkg, pkgs, args):
+ """Utility function to prepare common package parameters."""
+ params = []
+
+ if not pkg and not pkgs:
+ raise salt.exceptions.CommandExecutionError("Provide pkg or pkgs parameters")
+
+ if args and isinstance(args, str):
+ params.extend(args.split())
+ elif args and isinstance(args, list):
+ params.extend(args)
+
+ if pkg:
+ params.append(pkg)
+
+ if pkgs and isinstance(pkgs, str):
+ params.extend(pkgs.split())
+ elif pkgs and isinstance(pkgs, list):
+ params.extend(pkgs)
+
+ return params
+
+
+def _cmd(cmd, retcode=False):
+ """Utility function to run commands."""
+ result = __salt__["cmd.run_all"](cmd)
+ if retcode:
+ return result["retcode"]
+
+ if result["retcode"]:
+ raise salt.exceptions.CommandExecutionError(result["stderr"])
+
+ return result["stdout"]
+
+
+def transactional():
+ """Check if the system is a transactional system
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update transactional
+
+ """
+ return bool(__utils__["path.which"]("transactional-update"))
+
+
+def in_transaction():
+ """Check if Salt is executing while in a transaction
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update in_transaction
+
+ """
+ return transactional() and __salt__["chroot.in_chroot"]()
+
+
+def cleanup(self_update=False):
+ """Run both cleanup-snapshots and cleanup-overlays.
+
+ Identical to calling both cleanup-snapshots and cleanup-overlays.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update cleanup
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update))
+ cmd.append("cleanup")
+ return _cmd(cmd)
+
+
+def cleanup_snapshots(self_update=False):
+ """Mark unused snapshots for snapper removal.
+
+ If the current root filesystem is identical to the active root
+ filesystem (means after a reboot, before transactional-update
+ creates a new snapshot with updates), all old snapshots without a
+ cleanup algorithm get a cleanup algorithm set. This is to make
+ sure, that old snapshots will be deleted by snapper. See the
+ section about cleanup algorithms in snapper(8).
+
+ self_update
+ Check for newer transactional-update versions.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update cleanup_snapshots
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update))
+ cmd.append("cleanup-snapshots")
+ return _cmd(cmd)
+
+
+def cleanup_overlays(self_update=False):
+ """Remove unused overlay layers.
+
+ Removes all unreferenced (and thus unused) /etc overlay
+ directories in /var/lib/overlay.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update cleanup_overlays
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update))
+ cmd.append("cleanup-overlays")
+ return _cmd(cmd)
+
+
+def grub_cfg(self_update=False, snapshot=None):
+ """Regenerate grub.cfg
+
+ grub2-mkconfig(8) is called to create a new /boot/grub2/grub.cfg
+ configuration file for the bootloader.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update grub_cfg snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("grub.cfg")
+ return _cmd(cmd)
+
+
+def bootloader(self_update=False, snapshot=None):
+ """Reinstall the bootloader
+
+ Same as grub.cfg, but will also rewrite the bootloader itself.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update bootloader snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("bootloader")
+ return _cmd(cmd)
+
+
+def initrd(self_update=False, snapshot=None):
+ """Regenerate initrd
+
+ A new initrd is created in a snapshot.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update initrd snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("initrd")
+ return _cmd(cmd)
+
+
+def kdump(self_update=False, snapshot=None):
+ """Regenerate kdump initrd
+
+ A new initrd for kdump is created in a snapshot.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update kdump snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("kdump")
+ return _cmd(cmd)
+
+
+def run(command, self_update=False, snapshot=None):
+ """Run a command in a new snapshot
+
+ Execute the command inside a new snapshot. By default this snaphot
+ will remain, but if --drop-if-no-chage is set, the new snapshot
+ will be dropped if there is no change in the file system.
+
+ command
+ Command with parameters that will be executed (as string or
+ array)
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update run "mkdir /tmp/dir" snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot, quiet=True))
+ cmd.append("run")
+ if isinstance(command, str):
+ cmd.extend(command.split())
+ elif isinstance(command, list):
+ cmd.extend(command)
+ else:
+ raise salt.exceptions.CommandExecutionError("Command parameter not recognized")
+ return _cmd(cmd)
+
+
+def reboot(self_update=False):
+ """Reboot after update
+
+ Trigger a reboot after updating the system.
+
+ Several different reboot methods are supported, configurable via
+ the REBOOT_METHOD configuration option in
+ transactional-update.conf(5). By default rebootmgrd(8) will be
+ used to reboot the system according to the configured policies if
+ the service is running, otherwise systemctl reboot will be called.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update reboot
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update))
+ cmd.append("reboot")
+ return _cmd(cmd)
+
+
+def dup(self_update=False, snapshot=None):
+ """Call 'zypper dup'
+
+ If new updates are available, a new snapshot is created and zypper
+ dup --no-allow-vendor-change is used to update the
+ snapshot. Afterwards, the snapshot is activated and will be used
+ as the new root filesystem during next boot.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update dup snapshot="continue"
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("dup")
+ return _cmd(cmd)
+
+
+def up(self_update=False, snapshot=None):
+ """Call 'zypper up'
+
+ If new updates are available, a new snapshot is created and zypper
+ up is used to update the snapshot. Afterwards, the snapshot is
+ activated and will be used as the new root filesystem during next
+ boot.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update up snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("up")
+ return _cmd(cmd)
+
+
+def patch(self_update=False, snapshot=None):
+ """Call 'zypper patch'
+
+ If new updates are available, a new snapshot is created and zypper
+ patch is used to update the snapshot. Afterwards, the snapshot is
+ activated and will be used as the new root filesystem during next
+ boot.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update patch snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("patch")
+ return _cmd(cmd)
+
+
+def migration(self_update=False, snapshot=None):
+ """Updates systems registered via SCC / SMT
+
+ On systems which are registered against the SUSE Customer Center
+ (SCC) or SMT, a migration to a new version of the installed
+ products can be made with this option.
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update migration snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.append("migration")
+ return _cmd(cmd)
+
+
+def pkg_install(pkg=None, pkgs=None, args=None, self_update=False, snapshot=None):
+ """Install individual packages
+
+ Installs additional software. See the install description in the
+ "Package Management Commands" section of zypper's man page for all
+ available arguments.
+
+ pkg
+ Package name to install
+
+ pkgs
+ List of packages names to install
+
+ args
+ String or list of extra parameters for zypper
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update pkg_install pkg=emacs snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.extend(["pkg", "install"])
+ cmd.extend(_pkg_params(pkg, pkgs, args))
+ return _cmd(cmd)
+
+
+def pkg_remove(pkg=None, pkgs=None, args=None, self_update=False, snapshot=None):
+ """Remove individual packages
+
+ Removes installed software. See the remove description in the
+ "Package Management Commands" section of zypper's man page for all
+ available arguments.
+
+ pkg
+ Package name to install
+
+ pkgs
+ List of packages names to install
+
+ args
+ String or list of extra parameters for zypper
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update pkg_remove pkg=vim snapshot="continue"
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.extend(["pkg", "remove"])
+ cmd.extend(_pkg_params(pkg, pkgs, args))
+ return _cmd(cmd)
+
+
+def pkg_update(pkg=None, pkgs=None, args=None, self_update=False, snapshot=None):
+ """Updates individual packages
+
+ Update selected software. See the update description in the
+ "Update Management Commands" section of zypper's man page for all
+ available arguments.
+
+ pkg
+ Package name to install
+
+ pkgs
+ List of packages names to install
+
+ args
+ String or list of extra parameters for zypper
+
+ self_update
+ Check for newer transactional-update versions.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "continue" to indicate the last snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update pkg_update pkg=emacs snapshot="continue"
+
+ """
+ cmd = ["transactional-update"]
+ cmd.extend(_global_params(self_update=self_update, snapshot=snapshot))
+ cmd.extend(["pkg", "update"])
+ cmd.extend(_pkg_params(pkg, pkgs, args))
+ return _cmd(cmd)
+
+
+def rollback(snapshot=None):
+ """Set the current, given or last working snapshot as default snapshot
+
+ Sets the default root file system. On a read-only system the root
+ file system is set directly using btrfs. On read-write systems
+ snapper(8) rollback is called.
+
+ If no snapshot number is given, the current root file system is
+ set as the new default root file system. Otherwise number can
+ either be a snapshot number (as displayed by snapper list) or the
+ word last. last will try to reset to the latest working snapshot.
+
+ snapshot
+ Use the given snapshot or, if no number is given, the current
+ default snapshot as a base for the next snapshot. Use
+ "last" to indicate the last working snapshot done.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update rollback
+
+ """
+ if (
+ snapshot
+ and isinstance(snapshot, str)
+ and snapshot != "last"
+ and not snapshot.isnumeric()
+ ):
+ raise salt.exceptions.CommandExecutionError(
+ "snapshot should be a number or 'last'"
+ )
+ cmd = ["transactional-update"]
+ cmd.append("rollback")
+ if snapshot:
+ cmd.append(snapshot)
+ return _cmd(cmd)
+
+
+def pending_transaction():
+ """Check if there is a pending transaction
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update pending_transaction
+
+ """
+ # If we are running inside a transaction, we do not have a good
+ # way yet to detect a pending transaction
+ if in_transaction():
+ raise salt.exceptions.CommandExecutionError(
+ "pending_transaction cannot be executed inside a transaction"
+ )
+
+ cmd = ["snapper", "--no-dbus", "list", "--columns", "number"]
+ snapshots = _cmd(cmd)
+
+ return any(snapshot.endswith("+") for snapshot in snapshots)
+
+
+def call(function, *args, **kwargs):
+ """Executes a Salt function inside a transaction.
+
+ The chroot does not need to have Salt installed, but Python is
+ required.
+
+ function
+ Salt execution module function
+
+ activate_transaction
+ If at the end of the transaction there is a pending activation
+ (i.e there is a new snaphot in the system), a new reboot will
+ be scheduled (default False)
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update.call test.ping
+ salt microos transactional_update.call ssh.set_auth_key user key=mykey
+ salt microos transactional_update.call pkg.install emacs activate_transaction=True
+
+ """
+
+ if not function:
+ raise salt.exceptions.CommandExecutionError("Missing function parameter")
+
+ activate_transaction = kwargs.pop("activate_transaction", False)
+
+ # Generate the salt-thin and create a temporary directory in a
+ # place that the new transaction will have access to, and where we
+ # can untar salt-thin
+ thin_path = __utils__["thin.gen_thin"](
+ __opts__["cachedir"],
+ extra_mods=__salt__["config.option"]("thin_extra_mods", ""),
+ so_mods=__salt__["config.option"]("thin_so_mods", ""),
+ )
+ thin_dest_path = tempfile.mkdtemp(dir=__opts__["cachedir"])
+ # Some bug in Salt is preventing us to use `archive.tar` here. A
+ # AsyncZeroMQReqChannel is not closed at the end of the salt-call,
+ # and makes the client never exit.
+ #
+ # stdout = __salt__['archive.tar']('xzf', thin_path, dest=thin_dest_path)
+ #
+ stdout = __salt__["cmd.run"](["tar", "xzf", thin_path, "-C", thin_dest_path])
+ if stdout:
+ __utils__["files.rm_rf"](thin_dest_path)
+ return {"result": False, "comment": stdout}
+
+ try:
+ safe_kwargs = salt.utils.args.clean_kwargs(**kwargs)
+ salt_argv = (
+ [
+ "python{}".format(sys.version_info[0]),
+ os.path.join(thin_dest_path, "salt-call"),
+ "--metadata",
+ "--local",
+ "--log-file",
+ os.path.join(thin_dest_path, "log"),
+ "--cachedir",
+ os.path.join(thin_dest_path, "cache"),
+ "--out",
+ "json",
+ "-l",
+ "quiet",
+ "--",
+ function,
+ ]
+ + list(args)
+ + ["{}={}".format(k, v) for (k, v) in safe_kwargs.items()]
+ )
+ try:
+ ret_stdout = run([str(x) for x in salt_argv], snapshot="continue")
+ except salt.exceptions.CommandExecutionError as e:
+ ret_stdout = e.message
+
+ # Process "real" result in stdout
+ try:
+ data = __utils__["json.find_json"](ret_stdout)
+ local = data.get("local", data)
+ if isinstance(local, dict) and "retcode" in local:
+ __context__["retcode"] = local["retcode"]
+ return local.get("return", data)
+ except (KeyError, ValueError):
+ return {"result": False, "comment": ret_stdout}
+ finally:
+ __utils__["files.rm_rf"](thin_dest_path)
+
+ # Check if reboot is needed
+ if activate_transaction and pending_transaction():
+ reboot()
+
+
+def apply_(mods=None, **kwargs):
+ """Apply an state inside a transaction.
+
+ This function will call `transactional_update.highstate` or
+ `transactional_update.sls` based on the arguments passed to this
+ function. It exists as a more intuitive way of applying states.
+
+ For a formal description of the possible parameters accepted in
+ this function, check `state.apply_` documentation.
+
+ activate_transaction
+ If at the end of the transaction there is a pending activation
+ (i.e there is a new snaphot in the system), a new reboot will
+ be scheduled (default False)
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update.apply
+ salt microos transactional_update.apply stuff
+ salt microos transactional_update.apply stuff pillar='{"foo": "bar"}'
+ salt microos transactional_update.apply stuff activate_transaction=True
+
+ """
+ if mods:
+ return sls(mods, **kwargs)
+ return highstate(**kwargs)
+
+
+def _create_and_execute_salt_state(
+ chunks, file_refs, test, hash_type, activate_transaction
+):
+ """Create the salt_state tarball, and execute it in a transaction"""
+
+ # Create the tar containing the state pkg and relevant files.
+ salt.client.ssh.wrapper.state._cleanup_slsmod_low_data(chunks)
+ trans_tar = salt.client.ssh.state.prep_trans_tar(
+ salt.fileclient.get_file_client(__opts__), chunks, file_refs, __pillar__
+ )
+ trans_tar_sum = salt.utils.hashutils.get_hash(trans_tar, hash_type)
+
+ ret = None
+
+ # Create a temporary directory accesible later by the transaction
+ # where we can move the salt_state.tgz
+ salt_state_path = tempfile.mkdtemp(dir=__opts__["cachedir"])
+ salt_state_path = os.path.join(salt_state_path, "salt_state.tgz")
+ try:
+ salt.utils.files.copyfile(trans_tar, salt_state_path)
+ ret = call(
+ "state.pkg",
+ salt_state_path,
+ test=test,
+ pkg_sum=trans_tar_sum,
+ hash_type=hash_type,
+ activate_transaction=activate_transaction,
+ )
+ finally:
+ __utils__["files.rm_rf"](salt_state_path)
+
+ return ret
+
+
+def sls(
+ mods, saltenv="base", test=None, exclude=None, activate_transaction=False, **kwargs
+):
+ """Execute the states in one or more SLS files inside a transaction.
+
+ saltenv
+ Specify a salt fileserver environment to be used when applying
+ states
+
+ mods
+ List of states to execute
+
+ test
+ Run states in test-only (dry-run) mode
+
+ exclude
+ Exclude specific states from execution. Accepts a list of sls
+ names, a comma-separated string of sls names, or a list of
+ dictionaries containing ``sls`` or ``id`` keys. Glob-patterns
+ may be used to match multiple states.
+
+ activate_transaction
+ If at the end of the transaction there is a pending activation
+ (i.e there is a new snaphot in the system), a new reboot will
+ be scheduled (default False)
+
+ For a formal description of the possible parameters accepted in
+ this function, check `state.sls` documentation.
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update.sls stuff pillar='{"foo": "bar"}'
+ salt microos transactional_update.sls stuff activate_transaction=True
+
+ """
+ # Get a copy of the pillar data, to avoid overwriting the current
+ # pillar, instead the one delegated
+ pillar = copy.deepcopy(__pillar__)
+ pillar.update(kwargs.get("pillar", {}))
+
+ # Clone the options data and apply some default values. May not be
+ # needed, as this module just delegate
+ opts = salt.utils.state.get_sls_opts(__opts__, **kwargs)
+ st_ = salt.client.ssh.state.SSHHighState(
+ opts, pillar, __salt__, salt.fileclient.get_file_client(__opts__)
+ )
+
+ if isinstance(mods, str):
+ mods = mods.split(",")
+
+ high_data, errors = st_.render_highstate({saltenv: mods})
+ if exclude:
+ if isinstance(exclude, str):
+ exclude = exclude.split(",")
+ if "__exclude__" in high_data:
+ high_data["__exclude__"].extend(exclude)
+ else:
+ high_data["__exclude__"] = exclude
+
+ high_data, ext_errors = st_.state.reconcile_extend(high_data)
+ errors += ext_errors
+ errors += st_.state.verify_high(high_data)
+ if errors:
+ return errors
+
+ high_data, req_in_errors = st_.state.requisite_in(high_data)
+ errors += req_in_errors
+ if errors:
+ return errors
+
+ high_data = st_.state.apply_exclude(high_data)
+
+ # Compile and verify the raw chunks
+ chunks = st_.state.compile_high_data(high_data)
+ file_refs = salt.client.ssh.state.lowstate_file_refs(
+ chunks,
+ salt.client.ssh.wrapper.state._merge_extra_filerefs(
+ kwargs.get("extra_filerefs", ""), opts.get("extra_filerefs", "")
+ ),
+ )
+
+ hash_type = opts["hash_type"]
+ return _create_and_execute_salt_state(
+ chunks, file_refs, test, hash_type, activate_transaction
+ )
+
+
+def highstate(activate_transaction=False, **kwargs):
+ """Retrieve the state data from the salt master for this minion and
+ execute it inside a transaction.
+
+ For a formal description of the possible parameters accepted in
+ this function, check `state.highstate` documentation.
+
+ activate_transaction
+ If at the end of the transaction there is a pending activation
+ (i.e there is a new snaphot in the system), a new reboot will
+ be scheduled (default False)
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update.highstate
+ salt microos transactional_update.highstate pillar='{"foo": "bar"}'
+ salt microos transactional_update.highstate activate_transaction=True
+
+ """
+ # Get a copy of the pillar data, to avoid overwriting the current
+ # pillar, instead the one delegated
+ pillar = copy.deepcopy(__pillar__)
+ pillar.update(kwargs.get("pillar", {}))
+
+ # Clone the options data and apply some default values. May not be
+ # needed, as this module just delegate
+ opts = salt.utils.state.get_sls_opts(__opts__, **kwargs)
+ st_ = salt.client.ssh.state.SSHHighState(
+ opts, pillar, __salt__, salt.fileclient.get_file_client(__opts__)
+ )
+
+ # Compile and verify the raw chunks
+ chunks = st_.compile_low_chunks()
+ file_refs = salt.client.ssh.state.lowstate_file_refs(
+ chunks,
+ salt.client.ssh.wrapper.state._merge_extra_filerefs(
+ kwargs.get("extra_filerefs", ""), opts.get("extra_filerefs", "")
+ ),
+ )
+ # Check for errors
+ for chunk in chunks:
+ if not isinstance(chunk, dict):
+ __context__["retcode"] = 1
+ return chunks
+
+ test = kwargs.pop("test", False)
+ hash_type = opts["hash_type"]
+ return _create_and_execute_salt_state(
+ chunks, file_refs, test, hash_type, activate_transaction
+ )
+
+
+def single(fun, name, test=None, activate_transaction=False, **kwargs):
+ """Execute a single state function with the named kwargs, returns
+ False if insufficient data is sent to the command
+
+ By default, the values of the kwargs will be parsed as YAML. So,
+ you can specify lists values, or lists of single entry key-value
+ maps, as you would in a YAML salt file. Alternatively, JSON format
+ of keyword values is also supported.
+
+ activate_transaction
+ If at the end of the transaction there is a pending activation
+ (i.e there is a new snaphot in the system), a new reboot will
+ be scheduled (default False)
+
+ CLI Example:
+
+ .. code-block:: bash
+
+ salt microos transactional_update.single pkg.installed name=emacs
+ salt microos transactional_update.single pkg.installed name=emacs activate_transaction=True
+
+ """
+ # Get a copy of the pillar data, to avoid overwriting the current
+ # pillar, instead the one delegated
+ pillar = copy.deepcopy(__pillar__)
+ pillar.update(kwargs.get("pillar", {}))
+
+ # Clone the options data and apply some default values. May not be
+ # needed, as this module just delegate
+ opts = salt.utils.state.get_sls_opts(__opts__, **kwargs)
+ st_ = salt.client.ssh.state.SSHState(opts, pillar)
+
+ # state.fun -> [state, fun]
+ comps = fun.split(".")
+ if len(comps) < 2:
+ __context__["retcode"] = 1
+ return "Invalid function passed"
+
+ # Create the low chunk, using kwargs as a base
+ kwargs.update({"state": comps[0], "fun": comps[1], "__id__": name, "name": name})
+
+ # Verify the low chunk
+ err = st_.verify_data(kwargs)
+ if err:
+ __context__["retcode"] = 1
+ return err
+
+ # Must be a list of low-chunks
+ chunks = [kwargs]
+
+ # Retrieve file refs for the state run, so we can copy relevant
+ # files down to the minion before executing the state
+ file_refs = salt.client.ssh.state.lowstate_file_refs(
+ chunks,
+ salt.client.ssh.wrapper.state._merge_extra_filerefs(
+ kwargs.get("extra_filerefs", ""), opts.get("extra_filerefs", "")
+ ),
+ )
+
+ hash_type = opts["hash_type"]
+ return _create_and_execute_salt_state(
+ chunks, file_refs, test, hash_type, activate_transaction
+ )
diff --git a/salt/utils/systemd.py b/salt/utils/systemd.py
index 060bc1e3fb..674b6d419f 100644
--- a/salt/utils/systemd.py
+++ b/salt/utils/systemd.py
@@ -11,6 +11,7 @@ import subprocess
# Import Salt libs
from salt.exceptions import SaltInvocationError
+import salt.utils.path
import salt.utils.stringutils
log = logging.getLogger(__name__)
@@ -47,6 +48,27 @@ def booted(context=None):
return ret
+def offline(context=None):
+ """Return True is systemd is in offline mode"""
+ contextkey = "salt.utils.systemd.offline"
+ if isinstance(context, dict):
+ if contextkey in context:
+ return context[contextkey]
+ elif context is not None:
+ raise SaltInvocationError("context must be a dictionary if passed")
+
+ # Note that there is a difference from SYSTEMD_OFFLINE=1. Here we
+ # assume that there is no PID 1 to talk with.
+ ret = not booted(context) and salt.utils.path.which("systemctl")
+
+ try:
+ context[contextkey] = ret
+ except TypeError:
+ pass
+
+ return ret
+
+
def version(context=None):
'''
Attempts to run systemctl --version. Returns None if unable to determine
diff --git a/tests/unit/modules/test_chroot.py b/tests/unit/modules/test_chroot.py
index de3041e98f..62808ed680 100644
--- a/tests/unit/modules/test_chroot.py
+++ b/tests/unit/modules/test_chroot.py
@@ -31,6 +31,9 @@ from __future__ import absolute_import, print_function, unicode_literals
import sys
# Import Salt Testing Libs
+import salt.modules.chroot as chroot
+import salt.utils.platform
+from salt.exceptions import CommandExecutionError
from tests.support.mixins import LoaderModuleMockMixin
from tests.support.unit import skipIf, TestCase
from tests.support.mock import MagicMock, patch
@@ -80,6 +83,18 @@ class ChrootTestCase(TestCase, LoaderModuleMockMixin):
self.assertTrue(chroot.create('/chroot'))
makedirs.assert_called()
+ @patch("salt.modules.chroot.exist")
+ @patch("salt.utils.files.fopen")
+ def test_in_chroot(self, fopen):
+ """
+ Test the detection of chroot environment.
+ """
+ matrix = (("a", "b", True), ("a", "a", False))
+ for root_mountinfo, self_mountinfo, result in matrix:
+ fopen.return_value.__enter__.return_value = fopen
+ fopen.read = MagicMock(side_effect=(root_mountinfo, self_mountinfo))
+ self.assertEqual(chroot.in_chroot(), result)
+
@patch('salt.modules.chroot.exist')
def test_call_fails_input_validation(self, exist):
'''
diff --git a/tests/unit/modules/test_rebootmgr.py b/tests/unit/modules/test_rebootmgr.py
new file mode 100644
index 0000000000..4cf573997c
--- /dev/null
+++ b/tests/unit/modules/test_rebootmgr.py
@@ -0,0 +1,304 @@
+import pytest
+import salt.modules.rebootmgr as rebootmgr
+from salt.exceptions import CommandExecutionError
+
+# Import Salt Testing Libs
+from tests.support.mixins import LoaderModuleMockMixin
+from tests.support.mock import MagicMock, patch
+from tests.support.unit import TestCase
+
+
+class RebootMgrTestCase(TestCase, LoaderModuleMockMixin):
+ """
+ Test cases for salt.modules.rebootmgr
+ """
+
+ def setup_loader_modules(self):
+ return {rebootmgr: {"__salt__": {}, "__utils__": {}}}
+
+ def test_version(self):
+ """
+ Test rebootmgr.version without parameters
+ """
+ version = "rebootmgrctl (rebootmgr) 1.3"
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": version, "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.version() == "1.3"
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "--version"])
+
+ def test_is_active(self):
+ """
+ Test rebootmgr.is_active without parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": None, "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.is_active()
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "is_active", "--quiet"]
+ )
+
+ def test_reboot(self):
+ """
+ Test rebootmgr.reboot without parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.reboot() == "output"
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "reboot"])
+
+ def test_reboot_order(self):
+ """
+ Test rebootmgr.reboot with order parameter
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.reboot("now") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "reboot", "now"]
+ )
+
+ def test_reboot_invalid(self):
+ """
+ Test rebootmgr.reboot with invalid parameter
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ with pytest.raises(CommandExecutionError):
+ rebootmgr.reboot("invalid")
+
+ def test_cancel(self):
+ """
+ Test rebootmgr.cancel without parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.cancel() == "output"
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "cancel"])
+
+ def test_status(self):
+ """
+ Test rebootmgr.status without parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ # 0 - No reboot requested
+ assert rebootmgr.status() == 0
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "status", "--quiet"]
+ )
+
+ def test_set_strategy_default(self):
+ """
+ Test rebootmgr.set_strategy without parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.set_strategy() == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "set-strategy"]
+ )
+
+ def test_set_strategy(self):
+ """
+ Test rebootmgr.set_strategy with strategy parameter
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.set_strategy("best-effort") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "set-strategy", "best-effort"]
+ )
+
+ def test_set_strategy_invalid(self):
+ """
+ Test rebootmgr.strategy with invalid parameter
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ with pytest.raises(CommandExecutionError):
+ rebootmgr.set_strategy("invalid")
+
+ def test_get_strategy(self):
+ """
+ Test rebootmgr.get_strategy without parameters
+ """
+ strategy = "Reboot strategy: best-effort"
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": strategy, "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.get_strategy() == "best-effort"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "get-strategy"]
+ )
+
+ def test_set_window(self):
+ """
+ Test rebootmgr.set_window with parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.set_window("Thu,Fri 2020-*-1,5 11:12:13", "1h") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "set-window", "Thu,Fri 2020-*-1,5 11:12:13", "1h"]
+ )
+
+ def test_get_window(self):
+ """
+ Test rebootmgr.get_window without parameters
+ """
+ window = "Maintenance window is set to *-*-* 03:30:00, lasting 01h30m."
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": window, "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.get_window() == {
+ "time": "*-*-* 03:30:00",
+ "duration": "01h30m",
+ }
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "get-window"])
+
+ def test_set_group(self):
+ """
+ Test rebootmgr.set_group with parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.set_group("group1") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "set-group", "group1"]
+ )
+
+ def test_get_group(self):
+ """
+ Test rebootmgr.get_group without parameters
+ """
+ group = "Etcd lock group is set to group1"
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": group, "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.get_group() == "group1"
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "get-group"])
+
+ def test_set_max(self):
+ """
+ Test rebootmgr.set_max with default parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.set_max(10) == "output"
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "set-max", 10])
+
+ def test_set_max_group(self):
+ """
+ Test rebootmgr.set_max with group parameter
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.set_max(10, "group1") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "set-max", "--group", "group1", 10]
+ )
+
+ def test_lock(self):
+ """
+ Test rebootmgr.lock without parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.lock() == "output"
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "lock"])
+
+ def test_lock_machine_id(self):
+ """
+ Test rebootmgr.lock with machine_id parameter
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.lock("machine-id") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "lock", "machine-id"]
+ )
+
+ def test_lock_machine_id_group(self):
+ """
+ Test rebootmgr.lock with machine_id and group parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.lock("machine-id", "group1") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "lock", "--group", "group1", "machine-id"]
+ )
+
+ def test_unlock(self):
+ """
+ Test rebootmgr.unlock without parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.unlock() == "output"
+ salt_mock["cmd.run_all"].assert_called_with(["rebootmgrctl", "unlock"])
+
+ def test_unlock_machine_id(self):
+ """
+ Test rebootmgr.unlock with machine_id parameter
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.unlock("machine-id") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "unlock", "machine-id"]
+ )
+
+ def test_unlock_machine_id_group(self):
+ """
+ Test rebootmgr.unlock with machine_id and group parameters
+ """
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(rebootmgr.__salt__, salt_mock):
+ assert rebootmgr.unlock("machine-id", "group1") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["rebootmgrctl", "unlock", "--group", "group1", "machine-id"]
+ )
diff --git a/tests/unit/modules/test_transactional_update.py b/tests/unit/modules/test_transactional_update.py
new file mode 100644
index 0000000000..b42734a53d
--- /dev/null
+++ b/tests/unit/modules/test_transactional_update.py
@@ -0,0 +1,683 @@
+import sys
+
+import pytest
+import salt.modules.transactional_update as tu
+import salt.utils.platform
+from salt.exceptions import CommandExecutionError
+
+# Import Salt Testing Libs
+from tests.support.mixins import LoaderModuleMockMixin
+from tests.support.mock import MagicMock, patch
+from tests.support.unit import TestCase, skipIf
+
+
+@skipIf(salt.utils.platform.is_windows(), "Do not run these tests on Windows")
+class TransactionalUpdateTestCase(TestCase, LoaderModuleMockMixin):
+ """
+ Test cases for salt.modules.transactional_update
+ """
+
+ def setup_loader_modules(self):
+ return {tu: {"__salt__": {}, "__utils__": {}}}
+
+ def test__global_params_no_self_update(self):
+ """Test transactional_update._global_params without self_update"""
+ assert tu._global_params(self_update=False) == [
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ ]
+
+ def test__global_params_self_update(self):
+ """Test transactional_update._global_params with self_update"""
+ assert tu._global_params(self_update=True) == [
+ "--non-interactive",
+ "--drop-if-no-change",
+ ]
+
+ def test__global_params_no_self_update_snapshot(self):
+ """Test transactional_update._global_params without self_update and
+ snapshot
+
+ """
+ assert tu._global_params(self_update=False, snapshot=10) == [
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--continue",
+ 10,
+ ]
+
+ def test__global_params_no_self_update_continue(self):
+ """Test transactional_update._global_params without self_update and
+ snapshot conitue
+
+ """
+ assert tu._global_params(self_update=False, snapshot="continue") == [
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--continue",
+ ]
+
+ def test__pkg_params_no_packages(self):
+ """Test transactional_update._pkg_params without packages"""
+ with pytest.raises(CommandExecutionError):
+ tu._pkg_params(pkg=None, pkgs=None, args=None)
+
+ def test__pkg_params_pkg(self):
+ """Test transactional_update._pkg_params with single package"""
+ assert tu._pkg_params(pkg="pkg1", pkgs=None, args=None) == ["pkg1"]
+
+ def test__pkg_params_pkgs(self):
+ """Test transactional_update._pkg_params with packages"""
+ assert tu._pkg_params(pkg=None, pkgs="pkg1", args=None) == ["pkg1"]
+ assert tu._pkg_params(pkg=None, pkgs="pkg1 pkg2 ", args=None) == [
+ "pkg1",
+ "pkg2",
+ ]
+ assert tu._pkg_params(pkg=None, pkgs=["pkg1", "pkg2"], args=None) == [
+ "pkg1",
+ "pkg2",
+ ]
+
+ def test__pkg_params_pkg_pkgs(self):
+ """Test transactional_update._pkg_params with packages"""
+ assert tu._pkg_params(pkg="pkg1", pkgs="pkg2", args=None) == [
+ "pkg1",
+ "pkg2",
+ ]
+
+ def test__pkg_params_args(self):
+ """Test transactional_update._pkg_params with argumens"""
+ assert tu._pkg_params(pkg="pkg1", pkgs=None, args="--arg1") == [
+ "--arg1",
+ "pkg1",
+ ]
+ assert tu._pkg_params(pkg="pkg1", pkgs=None, args="--arg1 --arg2") == [
+ "--arg1",
+ "--arg2",
+ "pkg1",
+ ]
+ assert tu._pkg_params(pkg="pkg1", pkgs=None, args=["--arg1", "--arg2"]) == [
+ "--arg1",
+ "--arg2",
+ "pkg1",
+ ]
+
+ def test_transactional_transactional(self):
+ """Test transactional_update.transactional"""
+ matrix = (("/usr/sbin/transactional-update", True), ("", False))
+
+ for path_which, result in matrix:
+ utils_mock = {"path.which": MagicMock(return_value=path_which)}
+
+ with patch.dict(tu.__utils__, utils_mock):
+ assert tu.transactional() is result
+ utils_mock["path.which"].assert_called_with("transactional-update")
+
+ def test_in_transaction(self):
+ """Test transactional_update.in_transaction"""
+ matrix = (
+ ("/usr/sbin/transactional-update", True, True),
+ ("/usr/sbin/transactional-update", False, False),
+ ("", True, False),
+ ("", False, False),
+ )
+
+ for path_which, in_chroot, result in matrix:
+ utils_mock = {"path.which": MagicMock(return_value=path_which)}
+ salt_mock = {"chroot.in_chroot": MagicMock(return_value=in_chroot)}
+
+ with patch.dict(tu.__utils__, utils_mock):
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.in_transaction() is result
+
+ def test_commands_with_global_params(self):
+ """Test commands that only accept global params"""
+ for cmd in [
+ "cleanup",
+ "cleanup_snapshots",
+ "cleanup_overlays",
+ "grub_cfg",
+ "bootloader",
+ "initrd",
+ "kdump",
+ "reboot",
+ "dup",
+ "up",
+ "patch",
+ "migration",
+ ]:
+ salt_mock = {
+ "cmd.run_all": MagicMock(
+ return_value={"stdout": "output", "retcode": 0}
+ )
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert getattr(tu, cmd)() == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ cmd.replace("_", ".")
+ if cmd.startswith("grub")
+ else cmd.replace("_", "-"),
+ ]
+ )
+
+ def test_run_error(self):
+ """Test transactional_update.run with missing command"""
+ with pytest.raises(CommandExecutionError):
+ tu.run(None)
+
+ def test_run_string(self):
+ """Test transactional_update.run with command as string"""
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.run("cmd --flag p1 p2") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--quiet",
+ "run",
+ "cmd",
+ "--flag",
+ "p1",
+ "p2",
+ ]
+ )
+
+ def test_run_array(self):
+ """Test transactional_update.run with command as array"""
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.run(["cmd", "--flag", "p1", "p2"]) == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--quiet",
+ "run",
+ "cmd",
+ "--flag",
+ "p1",
+ "p2",
+ ]
+ )
+
+ def test_pkg_commands(self):
+ """Test transactional_update.pkg_* commands"""
+ for cmd in ["pkg_install", "pkg_remove", "pkg_update"]:
+ salt_mock = {
+ "cmd.run_all": MagicMock(
+ return_value={"stdout": "output", "retcode": 0}
+ )
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert getattr(tu, cmd)("pkg1", "pkg2 pkg3", "--arg") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "pkg",
+ cmd.replace("pkg_", ""),
+ "--arg",
+ "pkg1",
+ "pkg2",
+ "pkg3",
+ ]
+ )
+
+ def test_rollback_error(self):
+ """Test transactional_update.rollback with wrong snapshot"""
+ with pytest.raises(CommandExecutionError):
+ tu.rollback("error")
+
+ def test_rollback_default(self):
+ """Test transactional_update.rollback with default snapshot"""
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.rollback() == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["transactional-update", "rollback"]
+ )
+
+ def test_rollback_snapshot_number(self):
+ """Test transactional_update.rollback with numeric snapshot"""
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.rollback(10) == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["transactional-update", "rollback", 10]
+ )
+
+ def test_rollback_snapshot_str(self):
+ """Test transactional_update.rollback with string snapshot"""
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.rollback("10") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["transactional-update", "rollback", "10"]
+ )
+
+ def test_rollback_last(self):
+ """Test transactional_update.rollback with last snapshot"""
+ salt_mock = {
+ "cmd.run_all": MagicMock(return_value={"stdout": "output", "retcode": 0})
+ }
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.rollback("last") == "output"
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["transactional-update", "rollback", "last"]
+ )
+
+ def test_pending_transaction(self):
+ """Test transactional_update.pending_transaction"""
+ matrix = (
+ (False, ["1", "2+", "3-"], True),
+ (False, ["1", "2-", "3+"], True),
+ (False, ["1", "2", "3*"], False),
+ )
+
+ for in_transaction, snapshots, result in matrix:
+ salt_mock = {
+ "cmd.run_all": MagicMock(
+ return_value={"stdout": snapshots, "retcode": 0}
+ )
+ }
+
+ tu_in_transaction = "salt.modules.transactional_update.in_transaction"
+ with patch(tu_in_transaction) as in_transaction_mock:
+ in_transaction_mock.return_value = in_transaction
+ with patch.dict(tu.__salt__, salt_mock):
+ assert tu.pending_transaction() is result
+ salt_mock["cmd.run_all"].assert_called_with(
+ ["snapper", "--no-dbus", "list", "--columns", "number"]
+ )
+
+ def test_pending_transaction_in_transaction(self):
+ """Test transactional_update.pending_transaction when in transaction"""
+ tu_in_transaction = "salt.modules.transactional_update.in_transaction"
+ with patch(tu_in_transaction) as in_transaction_mock:
+ in_transaction_mock.return_value = True
+ with pytest.raises(CommandExecutionError):
+ tu.pending_transaction()
+
+ def test_call_fails_input_validation(self):
+ """Test transactional_update.call missing function name"""
+ with pytest.raises(CommandExecutionError):
+ tu.call("")
+
+ @patch("tempfile.mkdtemp")
+ def test_call_fails_untar(self, mkdtemp):
+ """Test transactional_update.call when tar fails"""
+ mkdtemp.return_value = "/var/cache/salt/minion/tmp01"
+ utils_mock = {
+ "thin.gen_thin": MagicMock(return_value="/salt-thin.tgz"),
+ "files.rm_rf": MagicMock(),
+ }
+ opts_mock = {"cachedir": "/var/cache/salt/minion"}
+ salt_mock = {
+ "cmd.run": MagicMock(return_value="Error"),
+ "config.option": MagicMock(),
+ }
+ with patch.dict(tu.__utils__, utils_mock), patch.dict(
+ tu.__opts__, opts_mock
+ ), patch.dict(tu.__salt__, salt_mock):
+ assert tu.call("/chroot", "test.ping") == {
+ "result": False,
+ "comment": "Error",
+ }
+
+ utils_mock["thin.gen_thin"].assert_called_once()
+ salt_mock["config.option"].assert_called()
+ salt_mock["cmd.run"].assert_called_once()
+ utils_mock["files.rm_rf"].assert_called_once()
+
+ @patch("tempfile.mkdtemp")
+ def test_call_fails_salt_thin(self, mkdtemp):
+ """Test transactional_update.chroot when fails salt_thin"""
+ mkdtemp.return_value = "/var/cache/salt/minion/tmp01"
+ utils_mock = {
+ "thin.gen_thin": MagicMock(return_value="/salt-thin.tgz"),
+ "files.rm_rf": MagicMock(),
+ "json.find_json": MagicMock(side_effect=ValueError()),
+ }
+ opts_mock = {"cachedir": "/var/cache/salt/minion"}
+ salt_mock = {
+ "cmd.run": MagicMock(return_value=""),
+ "config.option": MagicMock(),
+ "cmd.run_all": MagicMock(return_value={"retcode": 1, "stderr": "Error"}),
+ }
+ with patch.dict(tu.__utils__, utils_mock), patch.dict(
+ tu.__opts__, opts_mock
+ ), patch.dict(tu.__salt__, salt_mock):
+ assert tu.call("test.ping") == {"result": False, "comment": "Error"}
+
+ utils_mock["thin.gen_thin"].assert_called_once()
+ salt_mock["config.option"].assert_called()
+ salt_mock["cmd.run"].assert_called_once()
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--continue",
+ "--quiet",
+ "run",
+ "python{}".format(sys.version_info[0]),
+ "/var/cache/salt/minion/tmp01/salt-call",
+ "--metadata",
+ "--local",
+ "--log-file",
+ "/var/cache/salt/minion/tmp01/log",
+ "--cachedir",
+ "/var/cache/salt/minion/tmp01/cache",
+ "--out",
+ "json",
+ "-l",
+ "quiet",
+ "--",
+ "test.ping",
+ ]
+ )
+ utils_mock["files.rm_rf"].assert_called_once()
+
+ @patch("tempfile.mkdtemp")
+ def test_call_fails_function(self, mkdtemp):
+ """Test transactional_update.chroot when fails the function"""
+ mkdtemp.return_value = "/var/cache/salt/minion/tmp01"
+ utils_mock = {
+ "thin.gen_thin": MagicMock(return_value="/salt-thin.tgz"),
+ "files.rm_rf": MagicMock(),
+ "json.find_json": MagicMock(side_effect=ValueError()),
+ }
+ opts_mock = {"cachedir": "/var/cache/salt/minion"}
+ salt_mock = {
+ "cmd.run": MagicMock(return_value=""),
+ "config.option": MagicMock(),
+ "cmd.run_all": MagicMock(
+ return_value={"retcode": 0, "stdout": "Not found", "stderr": ""}
+ ),
+ }
+ with patch.dict(tu.__utils__, utils_mock), patch.dict(
+ tu.__opts__, opts_mock
+ ), patch.dict(tu.__salt__, salt_mock):
+ assert tu.call("test.ping") == {"result": False, "comment": "Not found"}
+
+ utils_mock["thin.gen_thin"].assert_called_once()
+ salt_mock["config.option"].assert_called()
+ salt_mock["cmd.run"].assert_called_once()
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--continue",
+ "--quiet",
+ "run",
+ "python{}".format(sys.version_info[0]),
+ "/var/cache/salt/minion/tmp01/salt-call",
+ "--metadata",
+ "--local",
+ "--log-file",
+ "/var/cache/salt/minion/tmp01/log",
+ "--cachedir",
+ "/var/cache/salt/minion/tmp01/cache",
+ "--out",
+ "json",
+ "-l",
+ "quiet",
+ "--",
+ "test.ping",
+ ]
+ )
+ utils_mock["files.rm_rf"].assert_called_once()
+
+ @patch("tempfile.mkdtemp")
+ def test_call_success_no_reboot(self, mkdtemp):
+ """Test transactional_update.chroot when succeed"""
+ mkdtemp.return_value = "/var/cache/salt/minion/tmp01"
+ utils_mock = {
+ "thin.gen_thin": MagicMock(return_value="/salt-thin.tgz"),
+ "files.rm_rf": MagicMock(),
+ "json.find_json": MagicMock(return_value={"return": "result"}),
+ }
+ opts_mock = {"cachedir": "/var/cache/salt/minion"}
+ salt_mock = {
+ "cmd.run": MagicMock(return_value=""),
+ "config.option": MagicMock(),
+ "cmd.run_all": MagicMock(return_value={"retcode": 0, "stdout": ""}),
+ }
+ with patch.dict(tu.__utils__, utils_mock), patch.dict(
+ tu.__opts__, opts_mock
+ ), patch.dict(tu.__salt__, salt_mock):
+ assert tu.call("test.ping") == "result"
+
+ utils_mock["thin.gen_thin"].assert_called_once()
+ salt_mock["config.option"].assert_called()
+ salt_mock["cmd.run"].assert_called_once()
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--continue",
+ "--quiet",
+ "run",
+ "python{}".format(sys.version_info[0]),
+ "/var/cache/salt/minion/tmp01/salt-call",
+ "--metadata",
+ "--local",
+ "--log-file",
+ "/var/cache/salt/minion/tmp01/log",
+ "--cachedir",
+ "/var/cache/salt/minion/tmp01/cache",
+ "--out",
+ "json",
+ "-l",
+ "quiet",
+ "--",
+ "test.ping",
+ ]
+ )
+ utils_mock["files.rm_rf"].assert_called_once()
+
+ @patch("salt.modules.transactional_update.reboot")
+ @patch("salt.modules.transactional_update.pending_transaction")
+ @patch("tempfile.mkdtemp")
+ def test_call_success_reboot(self, mkdtemp, pending_transaction, reboot):
+ """Test transactional_update.chroot when succeed and reboot"""
+ mkdtemp.return_value = "/var/cache/salt/minion/tmp01"
+ pending_transaction.return_value = True
+ utils_mock = {
+ "thin.gen_thin": MagicMock(return_value="/salt-thin.tgz"),
+ "files.rm_rf": MagicMock(),
+ "json.find_json": MagicMock(return_value={"return": "result"}),
+ }
+ opts_mock = {"cachedir": "/var/cache/salt/minion"}
+ salt_mock = {
+ "cmd.run": MagicMock(return_value=""),
+ "config.option": MagicMock(),
+ "cmd.run_all": MagicMock(return_value={"retcode": 0, "stdout": ""}),
+ }
+ with patch.dict(tu.__utils__, utils_mock), patch.dict(
+ tu.__opts__, opts_mock
+ ), patch.dict(tu.__salt__, salt_mock):
+ assert (
+ tu.call("transactional_update.dup", activate_transaction=True)
+ == "result"
+ )
+
+ utils_mock["thin.gen_thin"].assert_called_once()
+ salt_mock["config.option"].assert_called()
+ salt_mock["cmd.run"].assert_called_once()
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--continue",
+ "--quiet",
+ "run",
+ "python{}".format(sys.version_info[0]),
+ "/var/cache/salt/minion/tmp01/salt-call",
+ "--metadata",
+ "--local",
+ "--log-file",
+ "/var/cache/salt/minion/tmp01/log",
+ "--cachedir",
+ "/var/cache/salt/minion/tmp01/cache",
+ "--out",
+ "json",
+ "-l",
+ "quiet",
+ "--",
+ "transactional_update.dup",
+ ]
+ )
+ utils_mock["files.rm_rf"].assert_called_once()
+ pending_transaction.assert_called_once()
+ reboot.assert_called_once()
+
+ @patch("tempfile.mkdtemp")
+ def test_call_success_parameters(self, mkdtemp):
+ """Test transactional_update.chroot when succeed with parameters"""
+ mkdtemp.return_value = "/var/cache/salt/minion/tmp01"
+ utils_mock = {
+ "thin.gen_thin": MagicMock(return_value="/salt-thin.tgz"),
+ "files.rm_rf": MagicMock(),
+ "json.find_json": MagicMock(return_value={"return": "result"}),
+ }
+ opts_mock = {"cachedir": "/var/cache/salt/minion"}
+ salt_mock = {
+ "cmd.run": MagicMock(return_value=""),
+ "config.option": MagicMock(),
+ "cmd.run_all": MagicMock(return_value={"retcode": 0, "stdout": ""}),
+ }
+ with patch.dict(tu.__utils__, utils_mock), patch.dict(
+ tu.__opts__, opts_mock
+ ), patch.dict(tu.__salt__, salt_mock):
+ assert tu.call("module.function", key="value") == "result"
+
+ utils_mock["thin.gen_thin"].assert_called_once()
+ salt_mock["config.option"].assert_called()
+ salt_mock["cmd.run"].assert_called_once()
+ salt_mock["cmd.run_all"].assert_called_with(
+ [
+ "transactional-update",
+ "--non-interactive",
+ "--drop-if-no-change",
+ "--no-selfupdate",
+ "--continue",
+ "--quiet",
+ "run",
+ "python{}".format(sys.version_info[0]),
+ "/var/cache/salt/minion/tmp01/salt-call",
+ "--metadata",
+ "--local",
+ "--log-file",
+ "/var/cache/salt/minion/tmp01/log",
+ "--cachedir",
+ "/var/cache/salt/minion/tmp01/cache",
+ "--out",
+ "json",
+ "-l",
+ "quiet",
+ "--",
+ "module.function",
+ "key=value",
+ ]
+ )
+ utils_mock["files.rm_rf"].assert_called_once()
+
+ @patch("salt.modules.transactional_update._create_and_execute_salt_state")
+ @patch("salt.client.ssh.state.SSHHighState")
+ @patch("salt.fileclient.get_file_client")
+ @patch("salt.utils.state.get_sls_opts")
+ def test_sls(
+ self,
+ get_sls_opts,
+ get_file_client,
+ SSHHighState,
+ _create_and_execute_salt_state,
+ ):
+ """Test transactional_update.sls"""
+ SSHHighState.return_value = SSHHighState
+ SSHHighState.render_highstate.return_value = (None, [])
+ SSHHighState.state.reconcile_extend.return_value = (None, [])
+ SSHHighState.state.requisite_in.return_value = (None, [])
+ SSHHighState.state.verify_high.return_value = []
+
+ _create_and_execute_salt_state.return_value = "result"
+ opts_mock = {
+ "hash_type": "md5",
+ }
+ get_sls_opts.return_value = opts_mock
+ with patch.dict(tu.__opts__, opts_mock):
+ assert tu.sls("module") == "result"
+ _create_and_execute_salt_state.assert_called_once()
+
+ @patch("salt.modules.transactional_update._create_and_execute_salt_state")
+ @patch("salt.client.ssh.state.SSHHighState")
+ @patch("salt.fileclient.get_file_client")
+ @patch("salt.utils.state.get_sls_opts")
+ def test_highstate(
+ self,
+ get_sls_opts,
+ get_file_client,
+ SSHHighState,
+ _create_and_execute_salt_state,
+ ):
+ """Test transactional_update.highstage"""
+ SSHHighState.return_value = SSHHighState
+
+ _create_and_execute_salt_state.return_value = "result"
+ opts_mock = {
+ "hash_type": "md5",
+ }
+ get_sls_opts.return_value = opts_mock
+ with patch.dict(tu.__opts__, opts_mock):
+ assert tu.highstate() == "result"
+ _create_and_execute_salt_state.assert_called_once()
+
+ @patch("salt.modules.transactional_update._create_and_execute_salt_state")
+ @patch("salt.client.ssh.state.SSHState")
+ @patch("salt.utils.state.get_sls_opts")
+ def test_single(self, get_sls_opts, SSHState, _create_and_execute_salt_state):
+ """Test transactional_update.single"""
+ SSHState.return_value = SSHState
+ SSHState.verify_data.return_value = None
+
+ _create_and_execute_salt_state.return_value = "result"
+ opts_mock = {
+ "hash_type": "md5",
+ }
+ get_sls_opts.return_value = opts_mock
+ with patch.dict(tu.__opts__, opts_mock):
+ assert tu.single("pkg.installed", name="emacs") == "result"
+ _create_and_execute_salt_state.assert_called_once()
--
2.28.0