123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package bootstrap
- import (
- "testing"
- "time"
- "github.com/stretchr/testify/assert"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- bootstrapapi "k8s.io/cluster-bootstrap/token/api"
- )
- const (
- givenTokenID = "abc123"
- givenTokenID2 = "def456"
- givenTokenSecret = "tokenSecret"
- )
- func timeString(delta time.Duration) string {
- return time.Now().Add(delta).Format(time.RFC3339)
- }
- func TestValidateSecretForSigning(t *testing.T) {
- cases := []struct {
- description string
- tokenID string
- tokenSecret string
- okToSign string
- expiration string
- valid bool
- }{
- {
- "Signing token with no exp",
- givenTokenID, givenTokenSecret, "true", "", true,
- },
- {
- "Signing token with valid exp",
- givenTokenID, givenTokenSecret, "true", timeString(time.Hour), true,
- },
- {
- "Expired signing token",
- givenTokenID, givenTokenSecret, "true", timeString(-time.Hour), false,
- },
- {
- "Signing token with bad exp",
- givenTokenID, givenTokenSecret, "true", "garbage", false,
- },
- {
- "Signing token without signing bit",
- givenTokenID, givenTokenSecret, "", "garbage", false,
- },
- {
- "Signing token with bad signing bit",
- givenTokenID, givenTokenSecret, "", "", false,
- },
- {
- "Signing token with no ID",
- "", givenTokenSecret, "true", "", false,
- },
- {
- "Signing token with no secret",
- givenTokenID, "", "true", "", false,
- },
- }
- for _, tc := range cases {
- secret := &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: metav1.NamespaceSystem,
- Name: bootstrapapi.BootstrapTokenSecretPrefix + givenTokenID,
- ResourceVersion: "1",
- },
- Type: bootstrapapi.SecretTypeBootstrapToken,
- Data: map[string][]byte{
- bootstrapapi.BootstrapTokenIDKey: []byte(tc.tokenID),
- bootstrapapi.BootstrapTokenSecretKey: []byte(tc.tokenSecret),
- bootstrapapi.BootstrapTokenUsageSigningKey: []byte(tc.okToSign),
- bootstrapapi.BootstrapTokenExpirationKey: []byte(tc.expiration),
- },
- }
- tokenID, tokenSecret, ok := validateSecretForSigning(secret)
- if ok != tc.valid {
- t.Errorf("%s: Unexpected validation failure. Expected %v, got %v", tc.description, tc.valid, ok)
- }
- if ok {
- if tokenID != tc.tokenID {
- t.Errorf("%s: Unexpected Token ID. Expected %q, got %q", tc.description, givenTokenID, tokenID)
- }
- if tokenSecret != tc.tokenSecret {
- t.Errorf("%s: Unexpected Token Secret. Expected %q, got %q", tc.description, givenTokenSecret, tokenSecret)
- }
- }
- }
- }
- func TestValidateSecret(t *testing.T) {
- secret := &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: metav1.NamespaceSystem,
- Name: bootstrapapi.BootstrapTokenSecretPrefix + givenTokenID,
- ResourceVersion: "1",
- },
- Type: bootstrapapi.SecretTypeBootstrapToken,
- Data: map[string][]byte{
- bootstrapapi.BootstrapTokenIDKey: []byte(givenTokenID),
- bootstrapapi.BootstrapTokenSecretKey: []byte(givenTokenSecret),
- bootstrapapi.BootstrapTokenUsageSigningKey: []byte("true"),
- },
- }
- tokenID, tokenSecret, ok := validateSecretForSigning(secret)
- if !ok {
- t.Errorf("Unexpected validation failure.")
- }
- if tokenID != givenTokenID {
- t.Errorf("Unexpected Token ID. Expected %q, got %q", givenTokenID, tokenID)
- }
- if tokenSecret != givenTokenSecret {
- t.Errorf("Unexpected Token Secret. Expected %q, got %q", givenTokenSecret, tokenSecret)
- }
- }
- func TestBadSecretName(t *testing.T) {
- secret := &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: metav1.NamespaceSystem,
- Name: givenTokenID,
- ResourceVersion: "1",
- },
- Type: bootstrapapi.SecretTypeBootstrapToken,
- Data: map[string][]byte{
- bootstrapapi.BootstrapTokenIDKey: []byte(givenTokenID),
- bootstrapapi.BootstrapTokenSecretKey: []byte(givenTokenSecret),
- bootstrapapi.BootstrapTokenUsageSigningKey: []byte("true"),
- },
- }
- _, _, ok := validateSecretForSigning(secret)
- if ok {
- t.Errorf("Token validation should fail with bad name")
- }
- }
- func TestMismatchSecretName(t *testing.T) {
- secret := &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: metav1.NamespaceSystem,
- Name: bootstrapapi.BootstrapTokenSecretPrefix + givenTokenID2,
- ResourceVersion: "1",
- },
- Type: bootstrapapi.SecretTypeBootstrapToken,
- Data: map[string][]byte{
- bootstrapapi.BootstrapTokenIDKey: []byte(givenTokenID),
- bootstrapapi.BootstrapTokenSecretKey: []byte(givenTokenSecret),
- bootstrapapi.BootstrapTokenUsageSigningKey: []byte("true"),
- },
- }
- _, _, ok := validateSecretForSigning(secret)
- if ok {
- t.Errorf("Token validation should fail with mismatched name")
- }
- }
- func TestParseSecretName(t *testing.T) {
- tokenID, ok := parseSecretName("bootstrap-token-abc123")
- assert.True(t, ok, "parseSecretName should accept valid name")
- assert.Equal(t, "abc123", tokenID, "parseSecretName should return token ID")
- _, ok = parseSecretName("")
- assert.False(t, ok, "parseSecretName should reject blank name")
- _, ok = parseSecretName("abc123")
- assert.False(t, ok, "parseSecretName should reject with no prefix")
- _, ok = parseSecretName("bootstrap-token-")
- assert.False(t, ok, "parseSecretName should reject no token ID")
- _, ok = parseSecretName("bootstrap-token-abc")
- assert.False(t, ok, "parseSecretName should reject short token ID")
- _, ok = parseSecretName("bootstrap-token-abc123ghi")
- assert.False(t, ok, "parseSecretName should reject long token ID")
- _, ok = parseSecretName("bootstrap-token-ABC123")
- assert.False(t, ok, "parseSecretName should reject invalid token ID")
- }
|