mirror of
https://github.com/fleetdm/fleet
synced 2026-04-21 13:37:30 +00:00
<!-- Add the related story/sub-task/bug number, like Resolves #123, or remove if NA --> **Related issue:** Resolves #43047 # Checklist for submitter - [x] Changes file added for user-visible changes in `changes/`, `orbit/changes/` or `ee/fleetd-chrome/changes`. See [Changes files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/guides/committing-changes.md#changes-files) for more information. - [x] Input data is properly validated, `SELECT *` is avoided, SQL injection is prevented (using placeholders for values in statements), JS inline code is prevented especially for url redirects, and untrusted data interpolated into shell scripts/commands is validated against shell metacharacters. ## Testing - [x] Added/updated automated tests - [x] Where appropriate, [automated tests simulate multiple hosts and test for host isolation](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/reference/patterns-backend.md#unit-testing) (updates to one hosts's records do not affect another) - [x] QA'd all new/changed functionality manually See https://github.com/fleetdm/fleet/issues/42960#issuecomment-4244206563 and subsequent comments. <!-- This is an auto-generated comment: release notes by coderabbit.ai --> ## Summary by CodeRabbit * **New Features** * Apple DDM declarations support a vetted subset of Fleet variables with per-host substitution; premium license required. Declaration tokens and resend behavior now reflect variable changes; unresolved host substitutions mark that host’s declaration as failed. * **Bug Fixes** * Clearer errors for unsupported or license-restricted Fleet variables and more consistent DDM resend/update semantics when variables change. * **Tests** * Added extensive unit and integration tests covering Fleet variable validation, substitution, token changes, resends, and failure states. <!-- end of auto-generated comment: release notes by coderabbit.ai -->
278 lines
10 KiB
Go
278 lines
10 KiB
Go
package mysql
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/fleetdm/fleet/v4/server/fleet"
|
|
"github.com/fleetdm/fleet/v4/server/ptr"
|
|
"github.com/jmoiron/sqlx"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestMDMDDMApple(t *testing.T) {
|
|
ds := CreateMySQLDS(t)
|
|
|
|
cases := []struct {
|
|
name string
|
|
fn func(t *testing.T, ds *Datastore)
|
|
}{
|
|
{"TestMDMAppleBatchSetHostDeclarationState", testMDMAppleBatchSetHostDeclarationState},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
t.Helper()
|
|
t.Run(c.name, func(t *testing.T) {
|
|
defer TruncateTables(t, ds)
|
|
c.fn(t, ds)
|
|
})
|
|
}
|
|
}
|
|
|
|
// Helper function to set up device and enrollment records for a host
|
|
func setupMDMDeviceAndEnrollment(t *testing.T, ds *Datastore, ctx context.Context, hostUUID, hardwareSerial string) {
|
|
ExecAdhocSQL(t, ds, func(q sqlx.ExtContext) error {
|
|
_, err := q.ExecContext(ctx, `INSERT INTO nano_devices (id, serial_number, authenticate) VALUES (?, ?, ?)`,
|
|
hostUUID, hardwareSerial, "test")
|
|
return err
|
|
})
|
|
ExecAdhocSQL(t, ds, func(q sqlx.ExtContext) error {
|
|
_, err := q.ExecContext(ctx,
|
|
`INSERT INTO nano_enrollments (id, device_id, type, topic, push_magic, token_hex, enabled, last_seen_at) VALUES (?, ?, ?, ?, ?, ?, ?, ?)`,
|
|
hostUUID, hostUUID, "Device", "topic", "push_magic", "token_hex", 1, time.Now())
|
|
return err
|
|
})
|
|
}
|
|
|
|
// Helper function to insert a host declaration
|
|
func insertHostDeclaration(t *testing.T, ds *Datastore, ctx context.Context, hostUUID, declarationUUID, token, status, operationType, identifier string) {
|
|
var statusPtr *string
|
|
if status != "" {
|
|
statusPtr = ptr.String(status)
|
|
}
|
|
ExecAdhocSQL(t, ds, func(q sqlx.ExtContext) error {
|
|
_, err := q.ExecContext(ctx, `
|
|
INSERT INTO host_mdm_apple_declarations
|
|
(host_uuid, declaration_uuid, status, operation_type, token, declaration_identifier)
|
|
VALUES (?, ?, ?, ?, UNHEX(MD5(?)), ?)`,
|
|
hostUUID, declarationUUID, statusPtr, operationType, token, identifier)
|
|
return err
|
|
})
|
|
}
|
|
|
|
// Helper function to check declaration status
|
|
func checkDeclarationStatus(t *testing.T, ds *Datastore, ctx context.Context, hostUUID, declarationUUID, expectedStatus, operation string) {
|
|
var status string
|
|
ExecAdhocSQL(t, ds, func(q sqlx.ExtContext) error {
|
|
db := q.(*sqlx.DB)
|
|
return db.QueryRowContext(ctx, `
|
|
SELECT status FROM host_mdm_apple_declarations
|
|
WHERE host_uuid = ? AND declaration_uuid = ? AND operation_type = ?`,
|
|
hostUUID, declarationUUID, operation).Scan(&status)
|
|
})
|
|
assert.Equal(t, expectedStatus, status)
|
|
}
|
|
|
|
func testMDMAppleBatchSetHostDeclarationState(t *testing.T, ds *Datastore) {
|
|
t.Run("BasicTest", func(t *testing.T) {
|
|
ctx := t.Context()
|
|
|
|
// Create a test host
|
|
host, err := ds.NewHost(ctx, &fleet.Host{
|
|
Hostname: "test-host-ddm",
|
|
UUID: "test-host-uuid-ddm",
|
|
HardwareSerial: "ABC123-DDM",
|
|
PrimaryIP: "192.168.1.1",
|
|
PrimaryMac: "00:00:00:00:00:00",
|
|
OsqueryHostID: ptr.String("test-host-uuid-ddm"),
|
|
NodeKey: ptr.String("test-host-uuid-ddm"),
|
|
DetailUpdatedAt: time.Now(),
|
|
Platform: "darwin",
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
// Set up device and enrollment records (required for foreign key constraints)
|
|
setupMDMDeviceAndEnrollment(t, ds, ctx, host.UUID, host.HardwareSerial)
|
|
|
|
// Create 6 declarations (3 for install, 3 for remove)
|
|
declarations := make([]*fleet.MDMAppleDeclaration, 3)
|
|
for i := 0; i < 3; i++ {
|
|
declarations[i], err = ds.NewMDMAppleDeclaration(ctx, &fleet.MDMAppleDeclaration{
|
|
DeclarationUUID: "test-declaration-uuid-" + string(rune('A'+i)),
|
|
Name: "Test Declaration " + string(rune('A'+i)),
|
|
Identifier: "com.example.test.declaration." + string(rune('A'+i)),
|
|
RawJSON: []byte(`{"Type":"com.apple.test.declaration","Identifier":"com.example.test.declaration.` + string(rune('A'+i)) + `"}`),
|
|
}, nil)
|
|
require.NoError(t, err)
|
|
}
|
|
removeDeclarations := make([]*fleet.MDMAppleDeclaration, 3)
|
|
for i := 0; i < 3; i++ {
|
|
removeDeclarations[i] = &fleet.MDMAppleDeclaration{
|
|
DeclarationUUID: "test-remove-declaration-uuid-" + string(rune('A'+i)),
|
|
Name: "Test Remove Declaration " + string(rune('A'+i)),
|
|
Identifier: "com.example.test.remove.declaration." + string(rune('A'+i)),
|
|
RawJSON: []byte(`{"Type":"com.apple.test.declaration","Identifier":"com.example.test.remove.declaration.` + string(rune('A'+i)) + `"}`),
|
|
}
|
|
}
|
|
|
|
// Don't insert the install declarations in host_mdm_apple_declarations
|
|
// so they get picked up as new declarations to install
|
|
|
|
// Insert 3 remove declarations with verified status
|
|
// These simulate declarations that were previously installed but no longer
|
|
// exist in mdm_apple_declarations (hence should be removed)
|
|
for i := 0; i < 3; i++ {
|
|
// Use a proper hex token for each remove declaration
|
|
token := fmt.Sprintf("%032x", i+1000) // 32 hex chars = 16 bytes when unhexed
|
|
insertHostDeclaration(
|
|
t, ds, ctx,
|
|
host.UUID,
|
|
removeDeclarations[i].DeclarationUUID,
|
|
token,
|
|
"verified",
|
|
"install", // should get converted to "remove"
|
|
removeDeclarations[i].Identifier,
|
|
)
|
|
}
|
|
|
|
// Call the method under test
|
|
hostUUIDs, err := ds.MDMAppleBatchSetHostDeclarationState(ctx)
|
|
require.NoError(t, err)
|
|
require.Contains(t, hostUUIDs, host.UUID)
|
|
|
|
// Also verify that the 3 remove declarations have been marked as pending
|
|
for i := 0; i < 3; i++ {
|
|
checkDeclarationStatus(t, ds, ctx, host.UUID, removeDeclarations[i].DeclarationUUID, "pending", "remove")
|
|
}
|
|
// Verify that the 3 install declarations have been marked as pending
|
|
for i := 0; i < 3; i++ {
|
|
checkDeclarationStatus(t, ds, ctx, host.UUID, declarations[i].DeclarationUUID, "pending", "install")
|
|
}
|
|
})
|
|
|
|
t.Run("MultipleHostsSharedTokens", func(t *testing.T) {
|
|
ctx := t.Context()
|
|
|
|
// Create 3 test hosts
|
|
hosts := make([]*fleet.Host, 3)
|
|
for i := 0; i < 3; i++ {
|
|
hostUUID := "test-host-uuid-" + string(rune('A'+i))
|
|
hardwareSerial := "ABC123-" + string(rune('A'+i))
|
|
|
|
var err error
|
|
hosts[i], err = ds.NewHost(ctx, &fleet.Host{
|
|
Hostname: "test-host-" + string(rune('A'+i)),
|
|
UUID: hostUUID,
|
|
HardwareSerial: hardwareSerial,
|
|
PrimaryIP: "192.168.1." + string(rune('1'+i)),
|
|
PrimaryMac: "00:00:00:00:00:0" + string(rune('1'+i)),
|
|
OsqueryHostID: ptr.String(hostUUID),
|
|
NodeKey: ptr.String(hostUUID),
|
|
DetailUpdatedAt: time.Now(),
|
|
Platform: "darwin",
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
// Set up device and enrollment records for each host
|
|
setupMDMDeviceAndEnrollment(t, ds, ctx, hostUUID, hardwareSerial)
|
|
}
|
|
|
|
// Create 3 declarations for install operations
|
|
installDeclarations := make([]*fleet.MDMAppleDeclaration, 3)
|
|
for i := 0; i < 3; i++ {
|
|
var err error
|
|
installDeclarations[i], err = ds.NewMDMAppleDeclaration(ctx, &fleet.MDMAppleDeclaration{
|
|
DeclarationUUID: "test-install-decl-" + string(rune('A'+i)),
|
|
Name: "Test Install Declaration " + string(rune('A'+i)),
|
|
Identifier: "com.example.test.install." + string(rune('A'+i)),
|
|
RawJSON: []byte(`{"Type":"com.apple.test.declaration","Identifier":"com.example.test.install.` + string(rune('A'+i)) + `"}`),
|
|
}, nil)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// Create 3 declarations for remove operations (without calling NewMDMAppleDeclaration)
|
|
removeDeclarations := make([]*fleet.MDMAppleDeclaration, 3)
|
|
for i := 0; i < 3; i++ {
|
|
removeDeclarations[i] = &fleet.MDMAppleDeclaration{
|
|
DeclarationUUID: "test-remove-decl-" + string(rune('A'+i)),
|
|
Name: "Test Remove Declaration " + string(rune('A'+i)),
|
|
Identifier: "com.example.test.remove." + string(rune('A'+i)),
|
|
RawJSON: []byte(`{"Type":"com.apple.test.declaration","Identifier":"com.example.test.remove.` + string(rune('A'+i)) + `"}`),
|
|
}
|
|
}
|
|
|
|
// Get tokens for all declarations
|
|
getToken := func(declarationUUID string) string {
|
|
var token []byte
|
|
ExecAdhocSQL(t, ds, func(q sqlx.ExtContext) error {
|
|
err := sqlx.GetContext(ctx, q, &token,
|
|
"SELECT token FROM mdm_apple_declarations WHERE declaration_uuid = ?", declarationUUID)
|
|
return err
|
|
})
|
|
return fmt.Sprintf("%x", token)
|
|
}
|
|
|
|
installTokens := make([]string, 3)
|
|
for i := 0; i < 3; i++ {
|
|
installTokens[i] = getToken(installDeclarations[i].DeclarationUUID)
|
|
installDeclarations[i].Token = installTokens[i]
|
|
}
|
|
|
|
removeTokens := make([]string, 3)
|
|
for i := 0; i < 3; i++ {
|
|
if i < 2 {
|
|
// First 2 remove operations use the same tokens as the first 2 install operations
|
|
removeTokens[i] = installTokens[i]
|
|
} else {
|
|
// Last remove operation uses a different token
|
|
removeTokens[i] = fmt.Sprintf("%032x", i+1000)
|
|
}
|
|
}
|
|
|
|
// For each host, insert 3 install declarations and 3 remove declarations
|
|
for _, host := range hosts {
|
|
// We don't add install declarations because they will be added automatically
|
|
|
|
// Insert remove declarations
|
|
for j := 0; j < 3; j++ {
|
|
insertHostDeclaration(
|
|
t, ds, ctx,
|
|
host.UUID,
|
|
removeDeclarations[j].DeclarationUUID,
|
|
removeTokens[j],
|
|
"verified", // verified status
|
|
"install", // should get converted to "remove"
|
|
removeDeclarations[j].Identifier,
|
|
)
|
|
}
|
|
}
|
|
|
|
// Call the method under test
|
|
hostUUIDs, err := ds.MDMAppleBatchSetHostDeclarationState(ctx)
|
|
require.NoError(t, err)
|
|
|
|
// Verify that all host UUIDs are returned
|
|
for _, host := range hosts {
|
|
require.Contains(t, hostUUIDs, host.UUID)
|
|
}
|
|
|
|
// Verify that all declarations for all hosts have been marked as pending
|
|
for _, host := range hosts {
|
|
// Check remove declarations first
|
|
for _, decl := range removeDeclarations {
|
|
// All remove declarations should be marked as pending since they were inserted
|
|
// with verified status and should be converted to remove operations
|
|
checkDeclarationStatus(t, ds, ctx, host.UUID, decl.DeclarationUUID, "pending", "remove")
|
|
}
|
|
|
|
// Check install declarations
|
|
for _, decl := range installDeclarations {
|
|
// All install declarations should be marked as pending
|
|
checkDeclarationStatus(t, ds, ctx, host.UUID, decl.DeclarationUUID, "pending", "install")
|
|
}
|
|
}
|
|
})
|
|
}
|