mirror of https://github.com/hashicorp/consul
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
406 lines
12 KiB
406 lines
12 KiB
// Copyright (c) HashiCorp, Inc. |
|
// SPDX-License-Identifier: MPL-2.0 |
|
|
|
package proxycfgglue |
|
|
|
import ( |
|
"context" |
|
"testing" |
|
|
|
"github.com/stretchr/testify/require" |
|
|
|
"github.com/hashicorp/consul/acl" |
|
cachetype "github.com/hashicorp/consul/agent/cache-types" |
|
|
|
"github.com/hashicorp/consul/agent/consul/state" |
|
"github.com/hashicorp/consul/agent/proxycfg" |
|
"github.com/hashicorp/consul/agent/structs" |
|
"github.com/hashicorp/consul/lib" |
|
"github.com/hashicorp/consul/proto/private/pbpeering" |
|
"github.com/hashicorp/consul/sdk/testutil" |
|
) |
|
|
|
func TestServerTrustBundle(t *testing.T) { |
|
const ( |
|
index uint64 = 123 |
|
peerName = "peer1" |
|
) |
|
|
|
store := state.NewStateStore(nil) |
|
|
|
// Peering must exist for ptb write to succeed |
|
require.NoError(t, store.PeeringWrite(index-1, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
Name: peerName, |
|
ID: "2ae8c79e-242e-4f4a-afd6-9aede8831c5f", |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: peerName, |
|
TrustDomain: "before.com", |
|
})) |
|
|
|
dataSource := ServerTrustBundle(ServerDataSourceDeps{ |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(acl.ManageAll()), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleReadRequest{ |
|
Request: &pbpeering.TrustBundleReadRequest{ |
|
Name: peerName, |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
testutil.RunStep(t, "initial state", func(t *testing.T) { |
|
result := getEventResult[*pbpeering.TrustBundleReadResponse](t, eventCh) |
|
require.Equal(t, "before.com", result.Bundle.TrustDomain) |
|
}) |
|
|
|
testutil.RunStep(t, "update trust bundle", func(t *testing.T) { |
|
require.NoError(t, store.PeeringTrustBundleWrite(index+1, &pbpeering.PeeringTrustBundle{ |
|
PeerName: peerName, |
|
TrustDomain: "after.com", |
|
})) |
|
|
|
result := getEventResult[*pbpeering.TrustBundleReadResponse](t, eventCh) |
|
require.Equal(t, "after.com", result.Bundle.TrustDomain) |
|
}) |
|
} |
|
|
|
func TestServerTrustBundle_ACLEnforcement(t *testing.T) { |
|
const ( |
|
index uint64 = 123 |
|
peerName = "peer1" |
|
) |
|
|
|
store := state.NewStateStore(nil) |
|
|
|
// Peering must exist for ptb write to succeed |
|
require.NoError(t, store.PeeringWrite(index-1, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
Name: peerName, |
|
ID: "2ae8c79e-242e-4f4a-afd6-9aede8831c5f", |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: peerName, |
|
TrustDomain: "before.com", |
|
})) |
|
|
|
testutil.RunStep(t, "can read", func(t *testing.T) { |
|
authz := policyAuthorizer(t, ` |
|
service "web" { policy = "write" }`) |
|
dataSource := ServerTrustBundle(ServerDataSourceDeps{ |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(authz), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleReadRequest{ |
|
Request: &pbpeering.TrustBundleReadRequest{ |
|
Name: peerName, |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
result := getEventResult[*pbpeering.TrustBundleReadResponse](t, eventCh) |
|
require.Equal(t, "before.com", result.Bundle.TrustDomain) |
|
}) |
|
|
|
testutil.RunStep(t, "can't read", func(t *testing.T) { |
|
authz := policyAuthorizer(t, ``) |
|
dataSource := ServerTrustBundle(ServerDataSourceDeps{ |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(authz), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleReadRequest{ |
|
Request: &pbpeering.TrustBundleReadRequest{ |
|
Name: peerName, |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
err = getEventError(t, eventCh) |
|
require.Contains(t, err.Error(), "token with AccessorID '' lacks permission 'service:write' on \"any service\"") |
|
}) |
|
} |
|
|
|
func TestServerTrustBundleList(t *testing.T) { |
|
const index uint64 = 123 |
|
|
|
t.Run("list by service", func(t *testing.T) { |
|
const ( |
|
serviceName = "web" |
|
us = "default" |
|
them = "peer2" |
|
) |
|
|
|
store := state.NewStateStore(nil) |
|
require.NoError(t, store.CASetConfig(index, &structs.CAConfiguration{ClusterID: "cluster-id"})) |
|
|
|
testutil.RunStep(t, "export service to peer", func(t *testing.T) { |
|
require.NoError(t, store.PeeringWrite(index, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
ID: testUUID(t), |
|
Name: them, |
|
State: pbpeering.PeeringState_ACTIVE, |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: them, |
|
})) |
|
|
|
require.NoError(t, store.EnsureConfigEntry(index, &structs.ExportedServicesConfigEntry{ |
|
Name: us, |
|
Services: []structs.ExportedService{ |
|
{ |
|
Name: serviceName, |
|
Consumers: []structs.ServiceConsumer{ |
|
{Peer: them}, |
|
}, |
|
}, |
|
}, |
|
})) |
|
}) |
|
|
|
dataSource := ServerTrustBundleList(ServerDataSourceDeps{ |
|
Datacenter: "dc1", |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(acl.ManageAll()), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleListRequest{ |
|
Request: &pbpeering.TrustBundleListByServiceRequest{ |
|
ServiceName: serviceName, |
|
Partition: us, |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
testutil.RunStep(t, "initial state", func(t *testing.T) { |
|
result := getEventResult[*pbpeering.TrustBundleListByServiceResponse](t, eventCh) |
|
require.Len(t, result.Bundles, 1) |
|
}) |
|
|
|
testutil.RunStep(t, "unexport the service", func(t *testing.T) { |
|
require.NoError(t, store.EnsureConfigEntry(index+1, &structs.ExportedServicesConfigEntry{ |
|
Name: us, |
|
Services: []structs.ExportedService{}, |
|
})) |
|
|
|
result := getEventResult[*pbpeering.TrustBundleListByServiceResponse](t, eventCh) |
|
require.Len(t, result.Bundles, 0) |
|
}) |
|
}) |
|
|
|
t.Run("list for mesh gateway", func(t *testing.T) { |
|
store := state.NewStateStore(nil) |
|
require.NoError(t, store.CASetConfig(index, &structs.CAConfiguration{ClusterID: "cluster-id"})) |
|
|
|
// Peering must exist for ptb write to succeed |
|
require.NoError(t, store.PeeringWrite(index, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
Name: "peer1", |
|
ID: "2ae8c79e-242e-4f4a-afd6-9aede8831c5f", |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringWrite(index, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
Name: "peer2", |
|
ID: "e69f14e3-f253-43bc-bdbe-888994ca4f81", |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: "peer1", |
|
})) |
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: "peer2", |
|
})) |
|
|
|
dataSource := ServerTrustBundleList(ServerDataSourceDeps{ |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(acl.ManageAll()), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleListRequest{ |
|
Request: &pbpeering.TrustBundleListByServiceRequest{ |
|
Kind: string(structs.ServiceKindMeshGateway), |
|
Partition: "default", |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
result := getEventResult[*pbpeering.TrustBundleListByServiceResponse](t, eventCh) |
|
require.Len(t, result.Bundles, 2) |
|
}) |
|
} |
|
|
|
func TestServerTrustBundleList_ACLEnforcement(t *testing.T) { |
|
const index uint64 = 123 |
|
var ( |
|
authzWriteWeb = policyAuthorizer(t, `service "web" { policy = "write" }`) |
|
authzWriteAll = policyAuthorizer(t, `service "" { policy = "write" }`) |
|
authzNothing = policyAuthorizer(t, ``) |
|
) |
|
|
|
t.Run("ACL enforcement: list by service", func(t *testing.T) { |
|
const ( |
|
serviceName = "web" |
|
us = "default" |
|
them = "peer2" |
|
) |
|
|
|
store := state.NewStateStore(nil) |
|
require.NoError(t, store.CASetConfig(index, &structs.CAConfiguration{ClusterID: "cluster-id"})) |
|
|
|
testutil.RunStep(t, "export service to peer", func(t *testing.T) { |
|
require.NoError(t, store.PeeringWrite(index, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
ID: testUUID(t), |
|
Name: them, |
|
State: pbpeering.PeeringState_ACTIVE, |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: them, |
|
})) |
|
|
|
require.NoError(t, store.EnsureConfigEntry(index, &structs.ExportedServicesConfigEntry{ |
|
Name: us, |
|
Services: []structs.ExportedService{ |
|
{ |
|
Name: serviceName, |
|
Consumers: []structs.ServiceConsumer{ |
|
{Peer: them}, |
|
}, |
|
}, |
|
}, |
|
})) |
|
}) |
|
|
|
testutil.RunStep(t, "can read", func(t *testing.T) { |
|
dataSource := ServerTrustBundleList(ServerDataSourceDeps{ |
|
Datacenter: "dc1", |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(authzWriteWeb), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleListRequest{ |
|
Request: &pbpeering.TrustBundleListByServiceRequest{ |
|
ServiceName: serviceName, |
|
Partition: us, |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
result := getEventResult[*pbpeering.TrustBundleListByServiceResponse](t, eventCh) |
|
require.Len(t, result.Bundles, 1) |
|
}) |
|
|
|
testutil.RunStep(t, "can't read", func(t *testing.T) { |
|
dataSource := ServerTrustBundleList(ServerDataSourceDeps{ |
|
Datacenter: "dc1", |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(authzNothing), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleListRequest{ |
|
Request: &pbpeering.TrustBundleListByServiceRequest{ |
|
ServiceName: serviceName, |
|
Partition: us, |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
err = getEventError(t, eventCh) |
|
require.Contains(t, err.Error(), "token with AccessorID '' lacks permission 'service:write' on \"web\"") |
|
}) |
|
}) |
|
|
|
t.Run("ACL Enforcement: list for mesh gateway", func(t *testing.T) { |
|
store := state.NewStateStore(nil) |
|
require.NoError(t, store.CASetConfig(index, &structs.CAConfiguration{ClusterID: "cluster-id"})) |
|
|
|
// Peering must exist for ptb write to succeed |
|
require.NoError(t, store.PeeringWrite(index, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
Name: "peer1", |
|
ID: "2ae8c79e-242e-4f4a-afd6-9aede8831c5f", |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringWrite(index, &pbpeering.PeeringWriteRequest{ |
|
Peering: &pbpeering.Peering{ |
|
Name: "peer2", |
|
ID: "e69f14e3-f253-43bc-bdbe-888994ca4f81", |
|
}, |
|
})) |
|
|
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: "peer1", |
|
})) |
|
require.NoError(t, store.PeeringTrustBundleWrite(index, &pbpeering.PeeringTrustBundle{ |
|
PeerName: "peer2", |
|
})) |
|
|
|
testutil.RunStep(t, "can read", func(t *testing.T) { |
|
dataSource := ServerTrustBundleList(ServerDataSourceDeps{ |
|
Datacenter: "dc1", |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(authzWriteAll), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleListRequest{ |
|
Request: &pbpeering.TrustBundleListByServiceRequest{ |
|
Kind: string(structs.ServiceKindMeshGateway), |
|
Partition: "default", |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
result := getEventResult[*pbpeering.TrustBundleListByServiceResponse](t, eventCh) |
|
require.Len(t, result.Bundles, 2) |
|
}) |
|
|
|
testutil.RunStep(t, "can't read", func(t *testing.T) { |
|
dataSource := ServerTrustBundleList(ServerDataSourceDeps{ |
|
Datacenter: "dc1", |
|
GetStore: func() Store { return store }, |
|
ACLResolver: newStaticResolver(authzNothing), |
|
}) |
|
|
|
eventCh := make(chan proxycfg.UpdateEvent) |
|
err := dataSource.Notify(context.Background(), &cachetype.TrustBundleListRequest{ |
|
Request: &pbpeering.TrustBundleListByServiceRequest{ |
|
Kind: string(structs.ServiceKindMeshGateway), |
|
Partition: "default", |
|
}, |
|
}, "", eventCh) |
|
require.NoError(t, err) |
|
|
|
err = getEventError(t, eventCh) |
|
require.Contains(t, err.Error(), "token with AccessorID '' lacks permission 'service:write'") |
|
}) |
|
}) |
|
} |
|
|
|
func testUUID(t *testing.T) string { |
|
v, err := lib.GenerateUUID(nil) |
|
require.NoError(t, err) |
|
return v |
|
}
|
|
|