metadata_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446
  1. /*
  2. Copyright 2014 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package gcp
  14. import (
  15. "encoding/base64"
  16. "encoding/json"
  17. "fmt"
  18. "io/ioutil"
  19. "net/http"
  20. "net/http/httptest"
  21. "net/url"
  22. "os"
  23. "reflect"
  24. "strings"
  25. "testing"
  26. utilnet "k8s.io/apimachinery/pkg/util/net"
  27. "k8s.io/kubernetes/pkg/credentialprovider"
  28. )
  29. func createProductNameFile() (string, error) {
  30. file, err := ioutil.TempFile("", "")
  31. if err != nil {
  32. return "", fmt.Errorf("failed to create temporary test file: %v", err)
  33. }
  34. return file.Name(), ioutil.WriteFile(file.Name(), []byte("Google"), 0600)
  35. }
  36. func TestDockerKeyringFromGoogleDockerConfigMetadata(t *testing.T) {
  37. registryURL := "hello.kubernetes.io"
  38. email := "foo@bar.baz"
  39. username := "foo"
  40. password := "bar" // Fake value for testing.
  41. auth := base64.StdEncoding.EncodeToString([]byte(fmt.Sprintf("%s:%s", username, password)))
  42. sampleDockerConfig := fmt.Sprintf(`{
  43. "https://%s": {
  44. "email": %q,
  45. "auth": %q
  46. }
  47. }`, registryURL, email, auth)
  48. var err error
  49. gceProductNameFile, err = createProductNameFile()
  50. if err != nil {
  51. t.Errorf("failed to create gce product name file: %v", err)
  52. }
  53. defer os.Remove(gceProductNameFile)
  54. const probeEndpoint = "/computeMetadata/v1/"
  55. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  56. // Only serve the one metadata key.
  57. if probeEndpoint == r.URL.Path {
  58. w.WriteHeader(http.StatusOK)
  59. } else if strings.HasSuffix(dockerConfigKey, r.URL.Path) {
  60. w.WriteHeader(http.StatusOK)
  61. w.Header().Set("Content-Type", "application/json")
  62. fmt.Fprintln(w, sampleDockerConfig)
  63. } else {
  64. http.Error(w, "", http.StatusNotFound)
  65. }
  66. }))
  67. defer server.Close()
  68. // Make a transport that reroutes all traffic to the example server
  69. transport := utilnet.SetTransportDefaults(&http.Transport{
  70. Proxy: func(req *http.Request) (*url.URL, error) {
  71. return url.Parse(server.URL + req.URL.Path)
  72. },
  73. })
  74. keyring := &credentialprovider.BasicDockerKeyring{}
  75. provider := &dockerConfigKeyProvider{
  76. metadataProvider{Client: &http.Client{Transport: transport}},
  77. }
  78. if !provider.Enabled() {
  79. t.Errorf("Provider is unexpectedly disabled")
  80. }
  81. keyring.Add(provider.Provide(""))
  82. creds, ok := keyring.Lookup(registryURL)
  83. if !ok {
  84. t.Errorf("Didn't find expected URL: %s", registryURL)
  85. return
  86. }
  87. if len(creds) > 1 {
  88. t.Errorf("Got more hits than expected: %s", creds)
  89. }
  90. val := creds[0]
  91. if username != val.Username {
  92. t.Errorf("Unexpected username value, want: %s, got: %s", username, val.Username)
  93. }
  94. if password != val.Password {
  95. t.Errorf("Unexpected password value, want: %s, got: %s", password, val.Password)
  96. }
  97. if email != val.Email {
  98. t.Errorf("Unexpected email value, want: %s, got: %s", email, val.Email)
  99. }
  100. }
  101. func TestDockerKeyringFromGoogleDockerConfigMetadataUrl(t *testing.T) {
  102. registryURL := "hello.kubernetes.io"
  103. email := "foo@bar.baz"
  104. username := "foo"
  105. password := "bar" // Fake value for testing.
  106. auth := base64.StdEncoding.EncodeToString([]byte(fmt.Sprintf("%s:%s", username, password)))
  107. sampleDockerConfig := fmt.Sprintf(`{
  108. "https://%s": {
  109. "email": %q,
  110. "auth": %q
  111. }
  112. }`, registryURL, email, auth)
  113. var err error
  114. gceProductNameFile, err = createProductNameFile()
  115. if err != nil {
  116. t.Errorf("failed to create gce product name file: %v", err)
  117. }
  118. defer os.Remove(gceProductNameFile)
  119. const probeEndpoint = "/computeMetadata/v1/"
  120. const valueEndpoint = "/my/value"
  121. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  122. // Only serve the URL key and the value endpoint
  123. if probeEndpoint == r.URL.Path {
  124. w.WriteHeader(http.StatusOK)
  125. } else if valueEndpoint == r.URL.Path {
  126. w.WriteHeader(http.StatusOK)
  127. w.Header().Set("Content-Type", "application/json")
  128. fmt.Fprintln(w, sampleDockerConfig)
  129. } else if strings.HasSuffix(dockerConfigURLKey, r.URL.Path) {
  130. w.WriteHeader(http.StatusOK)
  131. w.Header().Set("Content-Type", "application/text")
  132. fmt.Fprint(w, "http://foo.bar.com"+valueEndpoint)
  133. } else {
  134. http.Error(w, "", http.StatusNotFound)
  135. }
  136. }))
  137. defer server.Close()
  138. // Make a transport that reroutes all traffic to the example server
  139. transport := utilnet.SetTransportDefaults(&http.Transport{
  140. Proxy: func(req *http.Request) (*url.URL, error) {
  141. return url.Parse(server.URL + req.URL.Path)
  142. },
  143. })
  144. keyring := &credentialprovider.BasicDockerKeyring{}
  145. provider := &dockerConfigURLKeyProvider{
  146. metadataProvider{Client: &http.Client{Transport: transport}},
  147. }
  148. if !provider.Enabled() {
  149. t.Errorf("Provider is unexpectedly disabled")
  150. }
  151. keyring.Add(provider.Provide(""))
  152. creds, ok := keyring.Lookup(registryURL)
  153. if !ok {
  154. t.Errorf("Didn't find expected URL: %s", registryURL)
  155. return
  156. }
  157. if len(creds) > 1 {
  158. t.Errorf("Got more hits than expected: %s", creds)
  159. }
  160. val := creds[0]
  161. if username != val.Username {
  162. t.Errorf("Unexpected username value, want: %s, got: %s", username, val.Username)
  163. }
  164. if password != val.Password {
  165. t.Errorf("Unexpected password value, want: %s, got: %s", password, val.Password)
  166. }
  167. if email != val.Email {
  168. t.Errorf("Unexpected email value, want: %s, got: %s", email, val.Email)
  169. }
  170. }
  171. func TestContainerRegistryBasics(t *testing.T) {
  172. registryURLs := []string{"container.cloud.google.com", "eu.gcr.io", "us-west2-docker.pkg.dev"}
  173. for _, registryURL := range registryURLs {
  174. t.Run(registryURL, func(t *testing.T) {
  175. email := "1234@project.gserviceaccount.com"
  176. token := &tokenBlob{AccessToken: "ya26.lots-of-indiscernible-garbage"} // Fake value for testing.
  177. const (
  178. serviceAccountsEndpoint = "/computeMetadata/v1/instance/service-accounts/"
  179. defaultEndpoint = "/computeMetadata/v1/instance/service-accounts/default/"
  180. scopeEndpoint = defaultEndpoint + "scopes"
  181. emailEndpoint = defaultEndpoint + "email"
  182. tokenEndpoint = defaultEndpoint + "token"
  183. )
  184. var err error
  185. gceProductNameFile, err = createProductNameFile()
  186. if err != nil {
  187. t.Errorf("failed to create gce product name file: %v", err)
  188. }
  189. defer os.Remove(gceProductNameFile)
  190. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  191. // Only serve the URL key and the value endpoint
  192. if scopeEndpoint == r.URL.Path {
  193. w.WriteHeader(http.StatusOK)
  194. w.Header().Set("Content-Type", "application/json")
  195. fmt.Fprintf(w, `["%s.read_write"]`, storageScopePrefix)
  196. } else if emailEndpoint == r.URL.Path {
  197. w.WriteHeader(http.StatusOK)
  198. fmt.Fprint(w, email)
  199. } else if tokenEndpoint == r.URL.Path {
  200. w.WriteHeader(http.StatusOK)
  201. w.Header().Set("Content-Type", "application/json")
  202. bytes, err := json.Marshal(token)
  203. if err != nil {
  204. t.Fatalf("unexpected error: %v", err)
  205. }
  206. fmt.Fprintln(w, string(bytes))
  207. } else if serviceAccountsEndpoint == r.URL.Path {
  208. w.WriteHeader(http.StatusOK)
  209. fmt.Fprintln(w, "default/\ncustom")
  210. } else {
  211. http.Error(w, "", http.StatusNotFound)
  212. }
  213. }))
  214. defer server.Close()
  215. // Make a transport that reroutes all traffic to the example server
  216. transport := utilnet.SetTransportDefaults(&http.Transport{
  217. Proxy: func(req *http.Request) (*url.URL, error) {
  218. return url.Parse(server.URL + req.URL.Path)
  219. },
  220. })
  221. keyring := &credentialprovider.BasicDockerKeyring{}
  222. provider := &containerRegistryProvider{
  223. metadataProvider{Client: &http.Client{Transport: transport}},
  224. }
  225. if !provider.Enabled() {
  226. t.Errorf("Provider is unexpectedly disabled")
  227. }
  228. keyring.Add(provider.Provide(""))
  229. creds, ok := keyring.Lookup(registryURL)
  230. if !ok {
  231. t.Errorf("Didn't find expected URL: %s", registryURL)
  232. return
  233. }
  234. if len(creds) > 1 {
  235. t.Errorf("Got more hits than expected: %s", creds)
  236. }
  237. val := creds[0]
  238. if val.Username != "_token" {
  239. t.Errorf("Unexpected username value, want: %s, got: %s", "_token", val.Username)
  240. }
  241. if token.AccessToken != val.Password {
  242. t.Errorf("Unexpected password value, want: %s, got: %s", token.AccessToken, val.Password)
  243. }
  244. if email != val.Email {
  245. t.Errorf("Unexpected email value, want: %s, got: %s", email, val.Email)
  246. }
  247. })
  248. }
  249. }
  250. func TestContainerRegistryNoServiceAccount(t *testing.T) {
  251. const (
  252. serviceAccountsEndpoint = "/computeMetadata/v1/instance/service-accounts/"
  253. )
  254. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  255. // Only serve the URL key and the value endpoint
  256. if serviceAccountsEndpoint == r.URL.Path {
  257. w.WriteHeader(http.StatusOK)
  258. w.Header().Set("Content-Type", "application/json")
  259. bytes, err := json.Marshal([]string{})
  260. if err != nil {
  261. t.Fatalf("unexpected error: %v", err)
  262. }
  263. fmt.Fprintln(w, string(bytes))
  264. } else {
  265. http.Error(w, "", http.StatusNotFound)
  266. }
  267. }))
  268. defer server.Close()
  269. var err error
  270. gceProductNameFile, err = createProductNameFile()
  271. if err != nil {
  272. t.Errorf("failed to create gce product name file: %v", err)
  273. }
  274. defer os.Remove(gceProductNameFile)
  275. // Make a transport that reroutes all traffic to the example server
  276. transport := utilnet.SetTransportDefaults(&http.Transport{
  277. Proxy: func(req *http.Request) (*url.URL, error) {
  278. return url.Parse(server.URL + req.URL.Path)
  279. },
  280. })
  281. provider := &containerRegistryProvider{
  282. metadataProvider{Client: &http.Client{Transport: transport}},
  283. }
  284. if provider.Enabled() {
  285. t.Errorf("Provider is unexpectedly enabled")
  286. }
  287. }
  288. func TestContainerRegistryNoStorageScope(t *testing.T) {
  289. const (
  290. serviceAccountsEndpoint = "/computeMetadata/v1/instance/service-accounts/"
  291. defaultEndpoint = "/computeMetadata/v1/instance/service-accounts/default/"
  292. scopeEndpoint = defaultEndpoint + "scopes"
  293. )
  294. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  295. // Only serve the URL key and the value endpoint
  296. if scopeEndpoint == r.URL.Path {
  297. w.WriteHeader(http.StatusOK)
  298. w.Header().Set("Content-Type", "application/json")
  299. fmt.Fprint(w, `["https://www.googleapis.com/auth/compute.read_write"]`)
  300. } else if serviceAccountsEndpoint == r.URL.Path {
  301. w.WriteHeader(http.StatusOK)
  302. fmt.Fprintln(w, "default/\ncustom")
  303. } else {
  304. http.Error(w, "", http.StatusNotFound)
  305. }
  306. }))
  307. defer server.Close()
  308. var err error
  309. gceProductNameFile, err = createProductNameFile()
  310. if err != nil {
  311. t.Errorf("failed to create gce product name file: %v", err)
  312. }
  313. defer os.Remove(gceProductNameFile)
  314. // Make a transport that reroutes all traffic to the example server
  315. transport := utilnet.SetTransportDefaults(&http.Transport{
  316. Proxy: func(req *http.Request) (*url.URL, error) {
  317. return url.Parse(server.URL + req.URL.Path)
  318. },
  319. })
  320. provider := &containerRegistryProvider{
  321. metadataProvider{Client: &http.Client{Transport: transport}},
  322. }
  323. if provider.Enabled() {
  324. t.Errorf("Provider is unexpectedly enabled")
  325. }
  326. }
  327. func TestComputePlatformScopeSubstitutesStorageScope(t *testing.T) {
  328. const (
  329. serviceAccountsEndpoint = "/computeMetadata/v1/instance/service-accounts/"
  330. defaultEndpoint = "/computeMetadata/v1/instance/service-accounts/default/"
  331. scopeEndpoint = defaultEndpoint + "scopes"
  332. )
  333. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  334. // Only serve the URL key and the value endpoint
  335. if scopeEndpoint == r.URL.Path {
  336. w.WriteHeader(http.StatusOK)
  337. w.Header().Set("Content-Type", "application/json")
  338. fmt.Fprint(w, `["https://www.googleapis.com/auth/compute.read_write","https://www.googleapis.com/auth/cloud-platform.read-only"]`)
  339. } else if serviceAccountsEndpoint == r.URL.Path {
  340. w.WriteHeader(http.StatusOK)
  341. w.Header().Set("Content-Type", "application/json")
  342. fmt.Fprintln(w, "default/\ncustom")
  343. } else {
  344. http.Error(w, "", http.StatusNotFound)
  345. }
  346. }))
  347. defer server.Close()
  348. var err error
  349. gceProductNameFile, err = createProductNameFile()
  350. if err != nil {
  351. t.Errorf("failed to create gce product name file: %v", err)
  352. }
  353. defer os.Remove(gceProductNameFile)
  354. // Make a transport that reroutes all traffic to the example server
  355. transport := utilnet.SetTransportDefaults(&http.Transport{
  356. Proxy: func(req *http.Request) (*url.URL, error) {
  357. return url.Parse(server.URL + req.URL.Path)
  358. },
  359. })
  360. provider := &containerRegistryProvider{
  361. metadataProvider{Client: &http.Client{Transport: transport}},
  362. }
  363. if !provider.Enabled() {
  364. t.Errorf("Provider is unexpectedly disabled")
  365. }
  366. }
  367. func TestAllProvidersNoMetadata(t *testing.T) {
  368. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  369. http.Error(w, "", http.StatusNotFound)
  370. }))
  371. defer server.Close()
  372. // Make a transport that reroutes all traffic to the example server
  373. transport := utilnet.SetTransportDefaults(&http.Transport{
  374. Proxy: func(req *http.Request) (*url.URL, error) {
  375. return url.Parse(server.URL + req.URL.Path)
  376. },
  377. })
  378. providers := []credentialprovider.DockerConfigProvider{
  379. &dockerConfigKeyProvider{
  380. metadataProvider{Client: &http.Client{Transport: transport}},
  381. },
  382. &dockerConfigURLKeyProvider{
  383. metadataProvider{Client: &http.Client{Transport: transport}},
  384. },
  385. &containerRegistryProvider{
  386. metadataProvider{Client: &http.Client{Transport: transport}},
  387. },
  388. }
  389. for _, provider := range providers {
  390. if provider.Enabled() {
  391. t.Errorf("Provider %s is unexpectedly enabled", reflect.TypeOf(provider).String())
  392. }
  393. }
  394. }