auth_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package auth
  13. import (
  14. "context"
  15. "os"
  16. "strings"
  17. "testing"
  18. "time"
  19. "github.com/aws/aws-sdk-go/aws"
  20. "github.com/aws/aws-sdk-go/aws/credentials"
  21. awssess "github.com/aws/aws-sdk-go/aws/session"
  22. "github.com/aws/aws-sdk-go/service/sts"
  23. "github.com/aws/aws-sdk-go/service/sts/stsiface"
  24. "github.com/stretchr/testify/assert"
  25. authv1 "k8s.io/api/authentication/v1"
  26. v1 "k8s.io/api/core/v1"
  27. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  28. clientfake "sigs.k8s.io/controller-runtime/pkg/client/fake"
  29. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  30. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  31. fakesess "github.com/external-secrets/external-secrets/pkg/provider/aws/auth/fake"
  32. )
  33. func TestNewSession(t *testing.T) {
  34. rows := []TestSessionRow{
  35. {
  36. name: "nil store",
  37. expectErr: "found nil store",
  38. store: nil,
  39. },
  40. {
  41. name: "not store spec",
  42. expectErr: "storeSpec is missing provider",
  43. store: &esv1alpha1.SecretStore{},
  44. },
  45. {
  46. name: "store spec has no provider",
  47. expectErr: "storeSpec is missing provider",
  48. store: &esv1alpha1.SecretStore{
  49. Spec: esv1alpha1.SecretStoreSpec{},
  50. },
  51. },
  52. {
  53. name: "spec has no awssm field",
  54. expectErr: "Missing AWS field",
  55. store: &esv1alpha1.SecretStore{
  56. Spec: esv1alpha1.SecretStoreSpec{
  57. Provider: &esv1alpha1.SecretStoreProvider{},
  58. },
  59. },
  60. },
  61. {
  62. name: "configure aws using environment variables",
  63. store: &esv1alpha1.SecretStore{
  64. Spec: esv1alpha1.SecretStoreSpec{
  65. Provider: &esv1alpha1.SecretStoreProvider{
  66. AWS: &esv1alpha1.AWSProvider{},
  67. },
  68. },
  69. },
  70. env: map[string]string{
  71. "AWS_ACCESS_KEY_ID": "1111",
  72. "AWS_SECRET_ACCESS_KEY": "2222",
  73. },
  74. expectProvider: true,
  75. expectedKeyID: "1111",
  76. expectedSecretKey: "2222",
  77. },
  78. {
  79. name: "configure aws using environment variables + assume role",
  80. stsProvider: func(*awssess.Session) stsiface.STSAPI {
  81. return &fakesess.AssumeRoler{
  82. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  83. assert.Equal(t, *input.RoleArn, "foo-bar-baz")
  84. return &sts.AssumeRoleOutput{
  85. AssumedRoleUser: &sts.AssumedRoleUser{
  86. Arn: aws.String("1123132"),
  87. AssumedRoleId: aws.String("xxxxx"),
  88. },
  89. Credentials: &sts.Credentials{
  90. AccessKeyId: aws.String("3333"),
  91. SecretAccessKey: aws.String("4444"),
  92. Expiration: aws.Time(time.Now().Add(time.Hour)),
  93. SessionToken: aws.String("6666"),
  94. },
  95. }, nil
  96. },
  97. }
  98. },
  99. store: &esv1alpha1.SecretStore{
  100. Spec: esv1alpha1.SecretStoreSpec{
  101. Provider: &esv1alpha1.SecretStoreProvider{
  102. AWS: &esv1alpha1.AWSProvider{
  103. Role: "foo-bar-baz",
  104. },
  105. },
  106. },
  107. },
  108. env: map[string]string{
  109. "AWS_ACCESS_KEY_ID": "1111",
  110. "AWS_SECRET_ACCESS_KEY": "2222",
  111. },
  112. expectProvider: true,
  113. expectedKeyID: "3333",
  114. expectedSecretKey: "4444",
  115. },
  116. {
  117. name: "error out when secret with credentials does not exist",
  118. namespace: "foo",
  119. store: &esv1alpha1.SecretStore{
  120. Spec: esv1alpha1.SecretStoreSpec{
  121. Provider: &esv1alpha1.SecretStoreProvider{
  122. AWS: &esv1alpha1.AWSProvider{
  123. Auth: esv1alpha1.AWSAuth{
  124. SecretRef: &esv1alpha1.AWSAuthSecretRef{
  125. AccessKeyID: esmeta.SecretKeySelector{
  126. Name: "othersecret",
  127. Key: "one",
  128. },
  129. SecretAccessKey: esmeta.SecretKeySelector{
  130. Name: "othersecret",
  131. Key: "two",
  132. },
  133. },
  134. },
  135. },
  136. },
  137. },
  138. },
  139. expectErr: `secrets "othersecret" not found`,
  140. },
  141. {
  142. name: "use credentials from secret to configure aws",
  143. namespace: "foo",
  144. store: &esv1alpha1.SecretStore{
  145. Spec: esv1alpha1.SecretStoreSpec{
  146. Provider: &esv1alpha1.SecretStoreProvider{
  147. AWS: &esv1alpha1.AWSProvider{
  148. Auth: esv1alpha1.AWSAuth{
  149. SecretRef: &esv1alpha1.AWSAuthSecretRef{
  150. AccessKeyID: esmeta.SecretKeySelector{
  151. Name: "onesecret",
  152. // Namespace is not set
  153. Key: "one",
  154. },
  155. SecretAccessKey: esmeta.SecretKeySelector{
  156. Name: "onesecret",
  157. // Namespace is not set
  158. Key: "two",
  159. },
  160. },
  161. },
  162. },
  163. },
  164. },
  165. },
  166. secrets: []v1.Secret{
  167. {
  168. ObjectMeta: metav1.ObjectMeta{
  169. Name: "onesecret",
  170. Namespace: "foo",
  171. },
  172. Data: map[string][]byte{
  173. "one": []byte("1111"),
  174. "two": []byte("2222"),
  175. },
  176. },
  177. },
  178. expectProvider: true,
  179. expectedKeyID: "1111",
  180. expectedSecretKey: "2222",
  181. },
  182. {
  183. name: "error out when secret key does not exist",
  184. namespace: "foo",
  185. store: &esv1alpha1.SecretStore{
  186. Spec: esv1alpha1.SecretStoreSpec{
  187. Provider: &esv1alpha1.SecretStoreProvider{
  188. AWS: &esv1alpha1.AWSProvider{
  189. Auth: esv1alpha1.AWSAuth{
  190. SecretRef: &esv1alpha1.AWSAuthSecretRef{
  191. AccessKeyID: esmeta.SecretKeySelector{
  192. Name: "brokensecret",
  193. Key: "one",
  194. },
  195. SecretAccessKey: esmeta.SecretKeySelector{
  196. Name: "brokensecret",
  197. Key: "two",
  198. },
  199. },
  200. },
  201. },
  202. },
  203. },
  204. },
  205. secrets: []v1.Secret{
  206. {
  207. ObjectMeta: metav1.ObjectMeta{
  208. Name: "brokensecret",
  209. Namespace: "foo",
  210. },
  211. Data: map[string][]byte{},
  212. },
  213. },
  214. expectErr: "missing SecretAccessKey",
  215. },
  216. {
  217. name: "should not be able to access secrets from different namespace",
  218. namespace: "foo",
  219. store: &esv1alpha1.SecretStore{
  220. Spec: esv1alpha1.SecretStoreSpec{
  221. Provider: &esv1alpha1.SecretStoreProvider{
  222. AWS: &esv1alpha1.AWSProvider{
  223. Auth: esv1alpha1.AWSAuth{
  224. SecretRef: &esv1alpha1.AWSAuthSecretRef{
  225. AccessKeyID: esmeta.SecretKeySelector{
  226. Name: "onesecret",
  227. Namespace: aws.String("evil"), // this should not be possible!
  228. Key: "one",
  229. },
  230. SecretAccessKey: esmeta.SecretKeySelector{
  231. Name: "onesecret",
  232. Namespace: aws.String("evil"),
  233. Key: "two",
  234. },
  235. },
  236. },
  237. },
  238. },
  239. },
  240. },
  241. secrets: []v1.Secret{
  242. {
  243. ObjectMeta: metav1.ObjectMeta{
  244. Name: "onesecret",
  245. Namespace: "evil",
  246. },
  247. Data: map[string][]byte{
  248. "one": []byte("1111"),
  249. "two": []byte("2222"),
  250. },
  251. },
  252. },
  253. expectErr: `secrets "onesecret" not found`,
  254. },
  255. {
  256. name: "ClusterStore should use credentials from a specific namespace",
  257. namespace: "es-namespace",
  258. store: &esv1alpha1.ClusterSecretStore{
  259. TypeMeta: metav1.TypeMeta{
  260. APIVersion: esv1alpha1.ClusterSecretStoreKindAPIVersion,
  261. Kind: esv1alpha1.ClusterSecretStoreKind,
  262. },
  263. Spec: esv1alpha1.SecretStoreSpec{
  264. Provider: &esv1alpha1.SecretStoreProvider{
  265. AWS: &esv1alpha1.AWSProvider{
  266. Auth: esv1alpha1.AWSAuth{
  267. SecretRef: &esv1alpha1.AWSAuthSecretRef{
  268. AccessKeyID: esmeta.SecretKeySelector{
  269. Name: "onesecret",
  270. Namespace: aws.String("platform-team-ns"),
  271. Key: "one",
  272. },
  273. SecretAccessKey: esmeta.SecretKeySelector{
  274. Name: "onesecret",
  275. Namespace: aws.String("platform-team-ns"),
  276. Key: "two",
  277. },
  278. },
  279. },
  280. },
  281. },
  282. },
  283. },
  284. secrets: []v1.Secret{
  285. {
  286. ObjectMeta: metav1.ObjectMeta{
  287. Name: "onesecret",
  288. Namespace: "platform-team-ns",
  289. },
  290. Data: map[string][]byte{
  291. "one": []byte("1111"),
  292. "two": []byte("2222"),
  293. },
  294. },
  295. },
  296. expectProvider: true,
  297. expectedKeyID: "1111",
  298. expectedSecretKey: "2222",
  299. },
  300. {
  301. name: "namespace is mandatory when using ClusterStore with SecretKeySelector",
  302. namespace: "es-namespace",
  303. store: &esv1alpha1.ClusterSecretStore{
  304. TypeMeta: metav1.TypeMeta{
  305. APIVersion: esv1alpha1.ClusterSecretStoreKindAPIVersion,
  306. Kind: esv1alpha1.ClusterSecretStoreKind,
  307. },
  308. Spec: esv1alpha1.SecretStoreSpec{
  309. Provider: &esv1alpha1.SecretStoreProvider{
  310. AWS: &esv1alpha1.AWSProvider{
  311. Auth: esv1alpha1.AWSAuth{
  312. SecretRef: &esv1alpha1.AWSAuthSecretRef{
  313. AccessKeyID: esmeta.SecretKeySelector{
  314. Name: "onesecret",
  315. Key: "one",
  316. },
  317. SecretAccessKey: esmeta.SecretKeySelector{
  318. Name: "onesecret",
  319. Key: "two",
  320. },
  321. },
  322. },
  323. },
  324. },
  325. },
  326. },
  327. expectErr: "invalid ClusterSecretStore: missing AWS AccessKeyID Namespace",
  328. },
  329. {
  330. name: "jwt auth via cluster secret store",
  331. namespace: "es-namespace",
  332. sa: &v1.ServiceAccount{
  333. ObjectMeta: metav1.ObjectMeta{
  334. Name: "my-service-account",
  335. Namespace: "other-ns",
  336. Annotations: map[string]string{
  337. roleARNAnnotation: "my-sa-role",
  338. },
  339. },
  340. },
  341. jwtProvider: func(name, namespace, roleArn, region string) (credentials.Provider, error) {
  342. assert.Equal(t, "my-service-account", name)
  343. assert.Equal(t, "other-ns", namespace)
  344. assert.Equal(t, "my-sa-role", roleArn)
  345. return fakesess.CredentialsProvider{
  346. RetrieveFunc: func() (credentials.Value, error) {
  347. return credentials.Value{
  348. AccessKeyID: "3333",
  349. SecretAccessKey: "4444",
  350. SessionToken: "1234",
  351. ProviderName: "fake",
  352. }, nil
  353. },
  354. IsExpiredFunc: func() bool { return false },
  355. }, nil
  356. },
  357. store: &esv1alpha1.ClusterSecretStore{
  358. TypeMeta: metav1.TypeMeta{
  359. APIVersion: esv1alpha1.ClusterSecretStoreKindAPIVersion,
  360. Kind: esv1alpha1.ClusterSecretStoreKind,
  361. },
  362. Spec: esv1alpha1.SecretStoreSpec{
  363. Provider: &esv1alpha1.SecretStoreProvider{
  364. AWS: &esv1alpha1.AWSProvider{
  365. Auth: esv1alpha1.AWSAuth{
  366. JWTAuth: &esv1alpha1.AWSJWTAuth{
  367. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  368. Name: "my-service-account",
  369. Namespace: aws.String("other-ns"),
  370. },
  371. },
  372. },
  373. },
  374. },
  375. },
  376. },
  377. expectProvider: true,
  378. expectedKeyID: "3333",
  379. expectedSecretKey: "4444",
  380. },
  381. }
  382. for i := range rows {
  383. row := rows[i]
  384. t.Run(row.name, func(t *testing.T) {
  385. testRow(t, row)
  386. })
  387. }
  388. }
  389. type TestSessionRow struct {
  390. name string
  391. store esv1alpha1.GenericStore
  392. secrets []v1.Secret
  393. sa *v1.ServiceAccount
  394. jwtProvider jwtProviderFactory
  395. namespace string
  396. stsProvider STSProvider
  397. expectProvider bool
  398. expectErr string
  399. expectedKeyID string
  400. expectedSecretKey string
  401. env map[string]string
  402. }
  403. func testRow(t *testing.T, row TestSessionRow) {
  404. kc := clientfake.NewClientBuilder().Build()
  405. for i := range row.secrets {
  406. err := kc.Create(context.Background(), &row.secrets[i])
  407. assert.Nil(t, err)
  408. }
  409. for k, v := range row.env {
  410. os.Setenv(k, v)
  411. }
  412. if row.sa != nil {
  413. err := kc.Create(context.Background(), row.sa)
  414. assert.Nil(t, err)
  415. }
  416. err := kc.Create(context.Background(), &authv1.TokenRequest{
  417. ObjectMeta: metav1.ObjectMeta{
  418. Name: "my-service-account",
  419. Namespace: "other-ns",
  420. },
  421. })
  422. assert.Nil(t, err)
  423. defer func() {
  424. for k := range row.env {
  425. os.Unsetenv(k)
  426. }
  427. }()
  428. s, err := New(context.Background(), row.store, kc, row.namespace, row.stsProvider, row.jwtProvider)
  429. if !ErrorContains(err, row.expectErr) {
  430. t.Errorf("expected error %s but found %s", row.expectErr, err.Error())
  431. }
  432. // pass test on expected error
  433. if err != nil {
  434. return
  435. }
  436. if row.expectProvider && s == nil {
  437. t.Errorf("expected provider object, found nil")
  438. return
  439. }
  440. creds, _ := s.Config.Credentials.Get()
  441. assert.Equal(t, row.expectedKeyID, creds.AccessKeyID)
  442. assert.Equal(t, row.expectedSecretKey, creds.SecretAccessKey)
  443. }
  444. func TestSMEnvCredentials(t *testing.T) {
  445. k8sClient := clientfake.NewClientBuilder().Build()
  446. os.Setenv("AWS_SECRET_ACCESS_KEY", "1111")
  447. os.Setenv("AWS_ACCESS_KEY_ID", "2222")
  448. defer os.Unsetenv("AWS_SECRET_ACCESS_KEY")
  449. defer os.Unsetenv("AWS_ACCESS_KEY_ID")
  450. s, err := New(context.Background(), &esv1alpha1.SecretStore{
  451. Spec: esv1alpha1.SecretStoreSpec{
  452. Provider: &esv1alpha1.SecretStoreProvider{
  453. // defaults
  454. AWS: &esv1alpha1.AWSProvider{},
  455. },
  456. },
  457. }, k8sClient, "example-ns", DefaultSTSProvider, nil)
  458. assert.Nil(t, err)
  459. assert.NotNil(t, s)
  460. creds, err := s.Config.Credentials.Get()
  461. assert.Nil(t, err)
  462. assert.Equal(t, creds.AccessKeyID, "2222")
  463. assert.Equal(t, creds.SecretAccessKey, "1111")
  464. }
  465. func TestSMAssumeRole(t *testing.T) {
  466. k8sClient := clientfake.NewClientBuilder().Build()
  467. sts := &fakesess.AssumeRoler{
  468. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  469. // make sure the correct role is passed in
  470. assert.Equal(t, *input.RoleArn, "my-awesome-role")
  471. return &sts.AssumeRoleOutput{
  472. AssumedRoleUser: &sts.AssumedRoleUser{
  473. Arn: aws.String("1123132"),
  474. AssumedRoleId: aws.String("xxxxx"),
  475. },
  476. Credentials: &sts.Credentials{
  477. AccessKeyId: aws.String("3333"),
  478. SecretAccessKey: aws.String("4444"),
  479. Expiration: aws.Time(time.Now().Add(time.Hour)),
  480. SessionToken: aws.String("6666"),
  481. },
  482. }, nil
  483. },
  484. }
  485. os.Setenv("AWS_SECRET_ACCESS_KEY", "1111")
  486. os.Setenv("AWS_ACCESS_KEY_ID", "2222")
  487. defer os.Unsetenv("AWS_SECRET_ACCESS_KEY")
  488. defer os.Unsetenv("AWS_ACCESS_KEY_ID")
  489. s, err := New(context.Background(), &esv1alpha1.SecretStore{
  490. Spec: esv1alpha1.SecretStoreSpec{
  491. Provider: &esv1alpha1.SecretStoreProvider{
  492. // do assume role!
  493. AWS: &esv1alpha1.AWSProvider{
  494. Role: "my-awesome-role",
  495. },
  496. },
  497. },
  498. }, k8sClient, "example-ns", func(se *awssess.Session) stsiface.STSAPI {
  499. // check if the correct temporary credentials were used
  500. creds, err := se.Config.Credentials.Get()
  501. assert.Nil(t, err)
  502. assert.Equal(t, creds.AccessKeyID, "2222")
  503. assert.Equal(t, creds.SecretAccessKey, "1111")
  504. return sts
  505. }, nil)
  506. assert.Nil(t, err)
  507. assert.NotNil(t, s)
  508. creds, err := s.Config.Credentials.Get()
  509. assert.Nil(t, err)
  510. assert.Equal(t, creds.AccessKeyID, "3333")
  511. assert.Equal(t, creds.SecretAccessKey, "4444")
  512. }
  513. func ErrorContains(out error, want string) bool {
  514. if out == nil {
  515. return want == ""
  516. }
  517. if want == "" {
  518. return false
  519. }
  520. return strings.Contains(out.Error(), want)
  521. }