On Tue, Sep 20, 2022 at 11:25 PM Honnappa Nagarahalli
<honnappa.nagaraha...@arm.com> wrote:
>
> <snip>
> > >
> > >      On Fri, Jul 29, 2022 at 10:55:45AM +0000, Juraj Linkeš wrote:
> > >      <snip>
> > >      > +                self.session = pxssh.pxssh(encoding="utf-8")
> > >      > +                self.session.login(
> > >      > +                    self.node,
> > >      > +                    self.username,
> > >      > +                    self.password,
> > >      > +                    original_prompt="[$#>]",
> > >      > +
> > >      password_regex=r"(?i)(?:password:)|(?:passphrase for
> > >      key)|(?i)(password for .+:)",
> > >      > +                )
> > >      > +                [1]self.logger.info(f"Connection to {self.node}
> > >      succeeded")
> > >      > +            self.send_expect("stty -echo", "#")
> > >      > +            self.send_expect("stty columns 1000", "#")
> > >      First of all, thanks for those changes! Having DTS inside DPDK makes
> > >      test synchronization a lot easier. I'm happy to say (unsurprisingly)
> > >      that it works with my RISC-V HiFive Unmatched board like a charm.
> > >
> > >
> > >      Though there is a small issue with the lines above. They assume "#"
> > >      as
> > >      the prompt sign, even though original_prompt was set to "[$#>]".
> > >      This
> > >      touches on two problems:
> > >      1. # is usually a root prompt - is DTS assumed to be run with root
> > >         privileges? DPDK may (in theory) run without them with some
> > >      permission
> > >         adjustment (hugetlb, VFIO container, etc.). If we assume DTS
> > >      needs
> > >         root access, this has to be both documented and validated before
> > >         running the whole suite. Otherwise it'll be hard to debug.
> > >
> > >
> > >    Around a year ago there were some attempts to get DTS to not require
> > >    root. This ended up running into issues because DTS sets up drivers for
> > >    you, which requires root as far as I know, as well as setting up
> > >    hugepages, which I think also requires root. The current version of DTS
> > >    can probably run without root, but it will probably stop working as
> > >    soon as DTS starts interacting with PCI devices. Elevating privileges
> > >    using pkexec or sudo is less portable and would require supporting a
> > >    lot more forms of authentication (kerberos/ldap for enterprise
> > >    deployments, passwords, 2fa, etc). It is much easier to say that the
> > >    default SSH agent must provide root access to the SUT and Traffic
> > >    Generator either with a password or pre-configured passwordless
> > >    authentication (ssh keys, kerberos, etc).
> > >
> > >    [Honnappa] One of the feedback we collected asks to deprecate the use
> > >    of clear text passwords in config files and root user. It suggests to
> > >    use keys and sudo. It is a ‘Must Have’ item.
> > >
> > >
> > >    I agree it should be documented. I honestly didn't consider that anyone
> > >    would try running DTS as a non-root user.
> > >
> > >    [Honnappa] +1 for supporting root users for now and documenting.
> > >
> > >
> > >      2. Different shells use different prompts on different distros.
> > >      Hence
> > >         perhaps there should be a regex here (same as with
> > >      original_prompt)
> > >         and there could be a conf.yaml option to modify it on a per-host
> > >         basis?
> > >
> > >
> > >    As far as customizing the prompts, I think that is doable via a
> > >    configuration option.
> > >    As far as different shells, I don't think we were planning to support
> > >    anything besides either bash or posix-compatible shells. At the moment
> > >    all of the community lab systems use bash, and for ease of test
> > >    development it will be easier to mandate that everyone uses one shell.
> > >    Otherwise DTS CI will need to run once for each shell to catch issues,
> > >    which in my opinion are resources better spent on more in-depth testing
> > >    of DTS and DPDK.
> > >
> > >    [Honnappa] +1 for using just bash, we can document this as well.
> > >
> >
> > I would agree overall. Just supporting one shell is fine - certainly for 
> > now. Also
> > completely agree that we need to remove hard-coded passwords and ideally
> > non-root. However, I think for the initial versions the main thing should be
> > removing the passwords so I would be ok for keeping the "root"
> > login requirement, so long as we support using ssh keys for login rather 
> > than
> > hard-coded passwords.
> I would be for dropping support for the hard-coded passwords completely. 
> Setting up the password-less SSH is straightforward (not sure if you meant 
> the same).
>
> >
> > /Bruce
>
>
> I think the question is whether there are any platforms/devices that should 
> be tested by DTS that do not support passwordless SSH.  Right now, the 
> community lab is using SSH keys for everything. If Intel also doesn't need 
> passwords, then it's up to the community whether to support them at all. It 
> does make it a lot easier on DTS if we can just require that the active 
> OpenSSH agent can log into all of the systems involved without a password. 
> This would also make it easier to enable AD authentication for Windows.
>
> [Honnappa] Jerin, Hemant do you have any concerns for your platforms 
> regarding this?

No. We are using passwordless SSH in our CI testing framework.

Reply via email to