auth_test.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package auth
  14. import (
  15. "context"
  16. "strings"
  17. "testing"
  18. "time"
  19. "github.com/aws/aws-sdk-go-v2/aws"
  20. "github.com/aws/aws-sdk-go-v2/service/sts"
  21. ststypes "github.com/aws/aws-sdk-go-v2/service/sts/types"
  22. "github.com/stretchr/testify/assert"
  23. authv1 "k8s.io/api/authentication/v1"
  24. v1 "k8s.io/api/core/v1"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. clientfake "sigs.k8s.io/controller-runtime/pkg/client/fake"
  27. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  28. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  29. fakesess "github.com/external-secrets/external-secrets/pkg/provider/aws/auth/fake"
  30. )
  31. const (
  32. esNamespaceKey = "es-namespace"
  33. platformTeamNsKey = "platform-team-ns"
  34. myServiceAccountKey = "my-service-account"
  35. otherNsName = "other-ns"
  36. )
  37. func TestSTSResolver(t *testing.T) {
  38. endpointEnvKey := STSEndpointEnv
  39. endpointURL := "http://sts.foo"
  40. t.Setenv(endpointEnvKey, endpointURL)
  41. f, err := customEndpointResolver{}.ResolveEndpoint(context.Background(), sts.EndpointParameters{})
  42. assert.Nil(t, err)
  43. assert.Equal(t, endpointURL, f.URI.String())
  44. }
  45. func TestNewSession(t *testing.T) {
  46. rows := []TestSessionRow{
  47. {
  48. name: "nil store",
  49. expectErr: "found nil store",
  50. store: nil,
  51. },
  52. {
  53. name: "not store spec",
  54. expectErr: "storeSpec is missing provider",
  55. store: &esv1.SecretStore{},
  56. },
  57. {
  58. name: "store spec has no provider",
  59. expectErr: "storeSpec is missing provider",
  60. store: &esv1.SecretStore{
  61. Spec: esv1.SecretStoreSpec{},
  62. },
  63. },
  64. {
  65. name: "spec has no awssm field",
  66. expectErr: "Missing AWS field",
  67. store: &esv1.SecretStore{
  68. Spec: esv1.SecretStoreSpec{
  69. Provider: &esv1.SecretStoreProvider{},
  70. },
  71. },
  72. },
  73. {
  74. name: "configure aws using environment variables",
  75. store: &esv1.SecretStore{
  76. Spec: esv1.SecretStoreSpec{
  77. Provider: &esv1.SecretStoreProvider{
  78. AWS: &esv1.AWSProvider{},
  79. },
  80. },
  81. },
  82. env: map[string]string{
  83. "AWS_ACCESS_KEY_ID": "1111",
  84. "AWS_SECRET_ACCESS_KEY": "2222",
  85. },
  86. expectProvider: true,
  87. expectedKeyID: "1111",
  88. expectedSecretKey: "2222",
  89. },
  90. {
  91. name: "configure aws using environment variables + assume role",
  92. stsProvider: func(cfg *aws.Config) STSprovider {
  93. return &fakesess.AssumeRoler{
  94. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  95. assert.Equal(t, *input.RoleArn, "foo-bar-baz")
  96. return &sts.AssumeRoleOutput{
  97. AssumedRoleUser: &ststypes.AssumedRoleUser{
  98. Arn: aws.String("1123132"),
  99. AssumedRoleId: aws.String("xxxxx"),
  100. },
  101. Credentials: &ststypes.Credentials{
  102. AccessKeyId: aws.String("3333"),
  103. SecretAccessKey: aws.String("4444"),
  104. Expiration: aws.Time(time.Now().Add(time.Hour)),
  105. SessionToken: aws.String("6666"),
  106. },
  107. }, nil
  108. },
  109. }
  110. },
  111. store: &esv1.SecretStore{
  112. Spec: esv1.SecretStoreSpec{
  113. Provider: &esv1.SecretStoreProvider{
  114. AWS: &esv1.AWSProvider{
  115. Role: "foo-bar-baz",
  116. },
  117. },
  118. },
  119. },
  120. env: map[string]string{
  121. "AWS_ACCESS_KEY_ID": "1111",
  122. "AWS_SECRET_ACCESS_KEY": "2222",
  123. },
  124. expectProvider: true,
  125. expectedKeyID: "3333",
  126. expectedSecretKey: "4444",
  127. },
  128. {
  129. name: "error out when secret with credentials does not exist",
  130. namespace: "foo",
  131. store: &esv1.SecretStore{
  132. Spec: esv1.SecretStoreSpec{
  133. Provider: &esv1.SecretStoreProvider{
  134. AWS: &esv1.AWSProvider{
  135. Auth: esv1.AWSAuth{
  136. SecretRef: &esv1.AWSAuthSecretRef{
  137. AccessKeyID: esmeta.SecretKeySelector{
  138. Name: "othersecret",
  139. Key: "one",
  140. },
  141. SecretAccessKey: esmeta.SecretKeySelector{
  142. Name: "othersecret",
  143. Key: "two",
  144. },
  145. },
  146. },
  147. },
  148. },
  149. },
  150. },
  151. expectErr: `secrets "othersecret" not found`,
  152. },
  153. {
  154. name: "use credentials from secret to configure aws",
  155. namespace: "foo",
  156. store: &esv1.SecretStore{
  157. Spec: esv1.SecretStoreSpec{
  158. Provider: &esv1.SecretStoreProvider{
  159. AWS: &esv1.AWSProvider{
  160. Auth: esv1.AWSAuth{
  161. SecretRef: &esv1.AWSAuthSecretRef{
  162. AccessKeyID: esmeta.SecretKeySelector{
  163. Name: "onesecret",
  164. // Namespace is not set
  165. Key: "one",
  166. },
  167. SecretAccessKey: esmeta.SecretKeySelector{
  168. Name: "onesecret",
  169. // Namespace is not set
  170. Key: "two",
  171. },
  172. },
  173. },
  174. },
  175. },
  176. },
  177. },
  178. secrets: []v1.Secret{
  179. {
  180. ObjectMeta: metav1.ObjectMeta{
  181. Name: "onesecret",
  182. Namespace: "foo",
  183. },
  184. Data: map[string][]byte{
  185. "one": []byte("1111"),
  186. "two": []byte("2222"),
  187. },
  188. },
  189. },
  190. expectProvider: true,
  191. expectedKeyID: "1111",
  192. expectedSecretKey: "2222",
  193. },
  194. {
  195. name: "error out when secret key does not exist",
  196. namespace: "foo",
  197. store: &esv1.SecretStore{
  198. Spec: esv1.SecretStoreSpec{
  199. Provider: &esv1.SecretStoreProvider{
  200. AWS: &esv1.AWSProvider{
  201. Auth: esv1.AWSAuth{
  202. SecretRef: &esv1.AWSAuthSecretRef{
  203. AccessKeyID: esmeta.SecretKeySelector{
  204. Name: "brokensecret",
  205. Key: "one",
  206. },
  207. SecretAccessKey: esmeta.SecretKeySelector{
  208. Name: "brokensecret",
  209. Key: "two",
  210. },
  211. },
  212. },
  213. },
  214. },
  215. },
  216. },
  217. secrets: []v1.Secret{
  218. {
  219. ObjectMeta: metav1.ObjectMeta{
  220. Name: "brokensecret",
  221. Namespace: "foo",
  222. },
  223. Data: map[string][]byte{},
  224. },
  225. },
  226. expectErr: "could not fetch SecretAccessKey secret: cannot find secret data for key: \"two\"",
  227. },
  228. {
  229. name: "should not be able to access secrets from different namespace",
  230. namespace: "foo",
  231. store: &esv1.SecretStore{
  232. Spec: esv1.SecretStoreSpec{
  233. Provider: &esv1.SecretStoreProvider{
  234. AWS: &esv1.AWSProvider{
  235. Auth: esv1.AWSAuth{
  236. SecretRef: &esv1.AWSAuthSecretRef{
  237. AccessKeyID: esmeta.SecretKeySelector{
  238. Name: "onesecret",
  239. Namespace: aws.String("evil"), // this should not be possible!
  240. Key: "one",
  241. },
  242. SecretAccessKey: esmeta.SecretKeySelector{
  243. Name: "onesecret",
  244. Namespace: aws.String("evil"),
  245. Key: "two",
  246. },
  247. },
  248. },
  249. },
  250. },
  251. },
  252. },
  253. secrets: []v1.Secret{
  254. {
  255. ObjectMeta: metav1.ObjectMeta{
  256. Name: "onesecret",
  257. Namespace: "evil",
  258. },
  259. Data: map[string][]byte{
  260. "one": []byte("1111"),
  261. "two": []byte("2222"),
  262. },
  263. },
  264. },
  265. expectErr: `secrets "onesecret" not found`,
  266. },
  267. {
  268. name: "ClusterStore should use credentials from a specific namespace",
  269. namespace: esNamespaceKey,
  270. store: &esv1.ClusterSecretStore{
  271. TypeMeta: metav1.TypeMeta{
  272. APIVersion: esv1.ClusterSecretStoreKindAPIVersion,
  273. Kind: esv1.ClusterSecretStoreKind,
  274. },
  275. Spec: esv1.SecretStoreSpec{
  276. Provider: &esv1.SecretStoreProvider{
  277. AWS: &esv1.AWSProvider{
  278. Auth: esv1.AWSAuth{
  279. SecretRef: &esv1.AWSAuthSecretRef{
  280. AccessKeyID: esmeta.SecretKeySelector{
  281. Name: "onesecret",
  282. Namespace: aws.String(platformTeamNsKey),
  283. Key: "one",
  284. },
  285. SecretAccessKey: esmeta.SecretKeySelector{
  286. Name: "onesecret",
  287. Namespace: aws.String(platformTeamNsKey),
  288. Key: "two",
  289. },
  290. },
  291. },
  292. },
  293. },
  294. },
  295. },
  296. secrets: []v1.Secret{
  297. {
  298. ObjectMeta: metav1.ObjectMeta{
  299. Name: "onesecret",
  300. Namespace: platformTeamNsKey,
  301. },
  302. Data: map[string][]byte{
  303. "one": []byte("1111"),
  304. "two": []byte("2222"),
  305. },
  306. },
  307. },
  308. expectProvider: true,
  309. expectedKeyID: "1111",
  310. expectedSecretKey: "2222",
  311. },
  312. {
  313. name: "ClusterStore should use credentials from a ExternalSecret namespace (referentAuth)",
  314. namespace: esNamespaceKey,
  315. store: &esv1.ClusterSecretStore{
  316. TypeMeta: metav1.TypeMeta{
  317. APIVersion: esv1.ClusterSecretStoreKindAPIVersion,
  318. Kind: esv1.ClusterSecretStoreKind,
  319. },
  320. Spec: esv1.SecretStoreSpec{
  321. Provider: &esv1.SecretStoreProvider{
  322. AWS: &esv1.AWSProvider{
  323. Auth: esv1.AWSAuth{
  324. SecretRef: &esv1.AWSAuthSecretRef{
  325. AccessKeyID: esmeta.SecretKeySelector{
  326. Name: "onesecret",
  327. Key: "one",
  328. },
  329. SecretAccessKey: esmeta.SecretKeySelector{
  330. Name: "onesecret",
  331. Key: "two",
  332. },
  333. },
  334. },
  335. },
  336. },
  337. },
  338. },
  339. secrets: []v1.Secret{
  340. {
  341. ObjectMeta: metav1.ObjectMeta{
  342. Name: "onesecret",
  343. Namespace: esNamespaceKey,
  344. },
  345. Data: map[string][]byte{
  346. "one": []byte("7777"),
  347. "two": []byte("4444"),
  348. },
  349. },
  350. },
  351. expectProvider: true,
  352. expectedKeyID: "7777",
  353. expectedSecretKey: "4444",
  354. },
  355. {
  356. name: "jwt auth via cluster secret store",
  357. namespace: esNamespaceKey,
  358. sa: &v1.ServiceAccount{
  359. ObjectMeta: metav1.ObjectMeta{
  360. Name: myServiceAccountKey,
  361. Namespace: otherNsName,
  362. Annotations: map[string]string{
  363. roleARNAnnotation: "my-sa-role",
  364. },
  365. },
  366. },
  367. jwtProvider: func(name, namespace, roleArn string, aud []string, region string) (aws.CredentialsProvider, error) {
  368. assert.Equal(t, myServiceAccountKey, name)
  369. assert.Equal(t, otherNsName, namespace)
  370. assert.Equal(t, "my-sa-role", roleArn)
  371. return fakesess.CredentialsProvider{
  372. RetrieveFunc: func() (aws.Credentials, error) {
  373. return aws.Credentials{
  374. AccessKeyID: "3333",
  375. SecretAccessKey: "4444",
  376. SessionToken: "1234",
  377. Source: "fake",
  378. }, nil
  379. },
  380. }, nil
  381. },
  382. store: &esv1.ClusterSecretStore{
  383. TypeMeta: metav1.TypeMeta{
  384. APIVersion: esv1.ClusterSecretStoreKindAPIVersion,
  385. Kind: esv1.ClusterSecretStoreKind,
  386. },
  387. Spec: esv1.SecretStoreSpec{
  388. Provider: &esv1.SecretStoreProvider{
  389. AWS: &esv1.AWSProvider{
  390. Auth: esv1.AWSAuth{
  391. JWTAuth: &esv1.AWSJWTAuth{
  392. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  393. Name: myServiceAccountKey,
  394. Namespace: aws.String(otherNsName),
  395. },
  396. },
  397. },
  398. },
  399. },
  400. },
  401. },
  402. expectProvider: true,
  403. expectedKeyID: "3333",
  404. expectedSecretKey: "4444",
  405. },
  406. {
  407. name: "configure aws using environment variables + assume role + check external id",
  408. stsProvider: func(cfg *aws.Config) STSprovider {
  409. return &fakesess.AssumeRoler{
  410. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  411. assert.Equal(t, *input.ExternalId, "12345678")
  412. return &sts.AssumeRoleOutput{
  413. AssumedRoleUser: &ststypes.AssumedRoleUser{
  414. Arn: aws.String("1123132"),
  415. AssumedRoleId: aws.String("xxxxx"),
  416. },
  417. Credentials: &ststypes.Credentials{
  418. AccessKeyId: aws.String("3333"),
  419. SecretAccessKey: aws.String("4444"),
  420. Expiration: aws.Time(time.Now().Add(time.Hour)),
  421. SessionToken: aws.String("6666"),
  422. },
  423. }, nil
  424. },
  425. }
  426. },
  427. store: &esv1.SecretStore{
  428. Spec: esv1.SecretStoreSpec{
  429. Provider: &esv1.SecretStoreProvider{
  430. AWS: &esv1.AWSProvider{
  431. Role: "foo-bar-baz",
  432. ExternalID: "12345678",
  433. },
  434. },
  435. },
  436. },
  437. env: map[string]string{
  438. "AWS_ACCESS_KEY_ID": "1111",
  439. "AWS_SECRET_ACCESS_KEY": "2222",
  440. },
  441. expectProvider: true,
  442. expectedKeyID: "3333",
  443. expectedSecretKey: "4444",
  444. },
  445. }
  446. for i := range rows {
  447. row := rows[i]
  448. t.Run(row.name, func(t *testing.T) {
  449. testRow(t, row)
  450. })
  451. }
  452. }
  453. type TestSessionRow struct {
  454. name string
  455. store esv1.GenericStore
  456. secrets []v1.Secret
  457. sa *v1.ServiceAccount
  458. jwtProvider jwtProviderFactory
  459. namespace string
  460. stsProvider STSProvider
  461. expectProvider bool
  462. expectErr string
  463. expectedKeyID string
  464. expectedSecretKey string
  465. env map[string]string
  466. }
  467. func testRow(t *testing.T, row TestSessionRow) {
  468. kc := clientfake.NewClientBuilder().Build()
  469. for i := range row.secrets {
  470. err := kc.Create(context.Background(), &row.secrets[i])
  471. assert.Nil(t, err)
  472. }
  473. for k, v := range row.env {
  474. t.Setenv(k, v)
  475. }
  476. if row.sa != nil {
  477. err := kc.Create(context.Background(), row.sa)
  478. assert.Nil(t, err)
  479. }
  480. err := kc.Create(context.Background(), &authv1.TokenRequest{
  481. ObjectMeta: metav1.ObjectMeta{
  482. Name: myServiceAccountKey,
  483. Namespace: otherNsName,
  484. },
  485. })
  486. assert.Nil(t, err)
  487. s, err := New(context.Background(), Opts{
  488. Store: row.store,
  489. Kube: kc,
  490. Namespace: row.namespace,
  491. AssumeRoler: row.stsProvider,
  492. JWTProvider: row.jwtProvider,
  493. })
  494. if !ErrorContains(err, row.expectErr) {
  495. t.Errorf("expected error %s but found %s", row.expectErr, err.Error())
  496. }
  497. // pass test on expected error
  498. if err != nil {
  499. return
  500. }
  501. if row.expectProvider && s == nil {
  502. t.Errorf("expected provider object, found nil")
  503. return
  504. }
  505. creds, _ := s.Credentials.Retrieve(context.Background())
  506. assert.Equal(t, row.expectedKeyID, creds.AccessKeyID)
  507. assert.Equal(t, row.expectedSecretKey, creds.SecretAccessKey)
  508. }
  509. func TestSMEnvCredentials(t *testing.T) {
  510. k8sClient := clientfake.NewClientBuilder().Build()
  511. t.Setenv("AWS_SECRET_ACCESS_KEY", "1111")
  512. t.Setenv("AWS_ACCESS_KEY_ID", "2222")
  513. s, err := New(context.Background(), Opts{
  514. Kube: k8sClient,
  515. Namespace: "example-ns",
  516. AssumeRoler: DefaultSTSProvider,
  517. Store: &esv1.SecretStore{
  518. Spec: esv1.SecretStoreSpec{
  519. Provider: &esv1.SecretStoreProvider{
  520. // defaults
  521. AWS: &esv1.AWSProvider{},
  522. },
  523. },
  524. },
  525. })
  526. assert.Nil(t, err)
  527. assert.NotNil(t, s)
  528. creds, err := s.Credentials.Retrieve(context.Background())
  529. assert.Nil(t, err)
  530. assert.Equal(t, creds.AccessKeyID, "2222")
  531. assert.Equal(t, creds.SecretAccessKey, "1111")
  532. }
  533. func TestSMAssumeRole(t *testing.T) {
  534. k8sClient := clientfake.NewClientBuilder().Build()
  535. sts := &fakesess.AssumeRoler{
  536. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  537. if *input.RoleArn == "chained-role-1" {
  538. return &sts.AssumeRoleOutput{
  539. AssumedRoleUser: &ststypes.AssumedRoleUser{
  540. Arn: aws.String("1111111"),
  541. AssumedRoleId: aws.String("yyyyy1"),
  542. },
  543. Credentials: &ststypes.Credentials{
  544. AccessKeyId: aws.String("77771"),
  545. SecretAccessKey: aws.String("88881"),
  546. Expiration: aws.Time(time.Now().Add(time.Hour)),
  547. SessionToken: aws.String("99991"),
  548. },
  549. }, nil
  550. } else if *input.RoleArn == "chained-role-2" {
  551. return &sts.AssumeRoleOutput{
  552. AssumedRoleUser: &ststypes.AssumedRoleUser{
  553. Arn: aws.String("2222222"),
  554. AssumedRoleId: aws.String("yyyyy2"),
  555. },
  556. Credentials: &ststypes.Credentials{
  557. AccessKeyId: aws.String("77772"),
  558. SecretAccessKey: aws.String("88882"),
  559. Expiration: aws.Time(time.Now().Add(time.Hour)),
  560. SessionToken: aws.String("99992"),
  561. },
  562. }, nil
  563. } else {
  564. // make sure the correct role is passed in
  565. assert.Equal(t, *input.RoleArn, "my-awesome-role")
  566. return &sts.AssumeRoleOutput{
  567. AssumedRoleUser: &ststypes.AssumedRoleUser{
  568. Arn: aws.String("1123132"),
  569. AssumedRoleId: aws.String("xxxxx"),
  570. },
  571. Credentials: &ststypes.Credentials{
  572. AccessKeyId: aws.String("3333"),
  573. SecretAccessKey: aws.String("4444"),
  574. Expiration: aws.Time(time.Now().Add(time.Hour)),
  575. SessionToken: aws.String("6666"),
  576. },
  577. }, nil
  578. }
  579. },
  580. }
  581. t.Setenv("AWS_SECRET_ACCESS_KEY", "1111")
  582. t.Setenv("AWS_ACCESS_KEY_ID", "2222")
  583. s, err := New(context.Background(), Opts{
  584. Kube: k8sClient,
  585. Namespace: "example-ns",
  586. Store: &esv1.SecretStore{
  587. Spec: esv1.SecretStoreSpec{
  588. Provider: &esv1.SecretStoreProvider{
  589. // do assume role!
  590. AWS: &esv1.AWSProvider{
  591. Role: "my-awesome-role",
  592. AdditionalRoles: []string{"chained-role-1", "chained-role-2"},
  593. },
  594. },
  595. },
  596. },
  597. AssumeRoler: func(cfg *aws.Config) STSprovider {
  598. // check if the correct temporary credentials were used
  599. creds, err := cfg.Credentials.Retrieve(context.Background())
  600. assert.Nil(t, err)
  601. if creds.SessionToken == "" {
  602. // called with credentials from envvars
  603. assert.Equal(t, creds.AccessKeyID, "2222")
  604. assert.Equal(t, creds.SecretAccessKey, "1111")
  605. } else if creds.SessionToken == "99991" {
  606. // called with chained role 1's credentials
  607. assert.Equal(t, creds.AccessKeyID, "77771")
  608. assert.Equal(t, creds.SecretAccessKey, "88881")
  609. } else {
  610. // called with chained role 2's credentials
  611. assert.Equal(t, creds.AccessKeyID, "77772")
  612. assert.Equal(t, creds.SecretAccessKey, "88882")
  613. }
  614. return sts
  615. },
  616. })
  617. assert.Nil(t, err)
  618. assert.NotNil(t, s)
  619. creds, err := s.Credentials.Retrieve(context.Background())
  620. assert.Nil(t, err)
  621. assert.Equal(t, creds.AccessKeyID, "3333")
  622. assert.Equal(t, creds.SecretAccessKey, "4444")
  623. }
  624. func ErrorContains(out error, want string) bool {
  625. if out == nil {
  626. return want == ""
  627. }
  628. if want == "" {
  629. return false
  630. }
  631. return strings.Contains(out.Error(), want)
  632. }
  633. func TestNewGeneratorSession_DefaultCredentialChain(t *testing.T) {
  634. cfg, err := NewGeneratorSession(context.Background(), esv1.AWSAuth{}, "", "us-east-1", clientfake.NewClientBuilder().Build(), "test-ns", DefaultSTSProvider, DefaultJWTProvider)
  635. assert.NoError(t, err)
  636. assert.NotNil(t, cfg)
  637. assert.Equal(t, "us-east-1", cfg.Region)
  638. }
  639. func TestNewGeneratorSession_CredentialProviderPriority(t *testing.T) {
  640. ctx := context.Background()
  641. k8sClient := clientfake.NewClientBuilder().Build()
  642. assert.NoError(t, k8sClient.Create(ctx, &v1.Secret{
  643. ObjectMeta: metav1.ObjectMeta{Name: "aws-creds", Namespace: "test-ns"},
  644. Data: map[string][]byte{
  645. "access-key": []byte("SECRET_KEY_ID"),
  646. "secret-key": []byte("SECRET_ACCESS_KEY"),
  647. },
  648. }))
  649. assert.NoError(t, k8sClient.Create(ctx, &v1.ServiceAccount{
  650. ObjectMeta: metav1.ObjectMeta{
  651. Name: "test-sa",
  652. Namespace: "test-ns",
  653. Annotations: map[string]string{roleARNAnnotation: "arn:aws:iam::123456789012:role/test-role"},
  654. },
  655. }))
  656. jwtProviderCalled := false
  657. cfg, err := NewGeneratorSession(ctx, esv1.AWSAuth{
  658. JWTAuth: &esv1.AWSJWTAuth{
  659. ServiceAccountRef: &esmeta.ServiceAccountSelector{Name: "test-sa"},
  660. },
  661. SecretRef: &esv1.AWSAuthSecretRef{
  662. AccessKeyID: esmeta.SecretKeySelector{Name: "aws-creds", Key: "access-key"},
  663. SecretAccessKey: esmeta.SecretKeySelector{Name: "aws-creds", Key: "secret-key"},
  664. },
  665. }, "", "us-east-1", k8sClient, "test-ns", DefaultSTSProvider, func(name, namespace, roleArn string, aud []string, region string) (aws.CredentialsProvider, error) {
  666. jwtProviderCalled = true
  667. assert.Equal(t, "test-sa", name)
  668. assert.Equal(t, "test-ns", namespace)
  669. assert.Equal(t, "arn:aws:iam::123456789012:role/test-role", roleArn)
  670. return fakesess.CredentialsProvider{
  671. RetrieveFunc: func() (aws.Credentials, error) {
  672. return aws.Credentials{
  673. AccessKeyID: "JWT_ACCESS_KEY",
  674. SecretAccessKey: "JWT_SECRET_KEY",
  675. SessionToken: "JWT_SESSION_TOKEN",
  676. Source: "jwt",
  677. }, nil
  678. },
  679. }, nil
  680. })
  681. assert.NoError(t, err)
  682. assert.NotNil(t, cfg)
  683. assert.True(t, jwtProviderCalled)
  684. creds, err := cfg.Credentials.Retrieve(ctx)
  685. assert.NoError(t, err)
  686. assert.Equal(t, "SECRET_KEY_ID", creds.AccessKeyID)
  687. assert.Equal(t, "SECRET_ACCESS_KEY", creds.SecretAccessKey)
  688. }
  689. func TestNewGeneratorSession_OnlySecretRef(t *testing.T) {
  690. ctx := context.Background()
  691. k8sClient := clientfake.NewClientBuilder().Build()
  692. assert.NoError(t, k8sClient.Create(ctx, &v1.Secret{
  693. ObjectMeta: metav1.ObjectMeta{Name: "aws-creds", Namespace: "test-ns"},
  694. Data: map[string][]byte{
  695. "access-key": []byte("SECRET_KEY_ID"),
  696. "secret-key": []byte("SECRET_ACCESS_KEY"),
  697. },
  698. }))
  699. cfg, err := NewGeneratorSession(ctx, esv1.AWSAuth{
  700. SecretRef: &esv1.AWSAuthSecretRef{
  701. AccessKeyID: esmeta.SecretKeySelector{Name: "aws-creds", Key: "access-key"},
  702. SecretAccessKey: esmeta.SecretKeySelector{Name: "aws-creds", Key: "secret-key"},
  703. },
  704. }, "", "us-east-1", k8sClient, "test-ns", DefaultSTSProvider, DefaultJWTProvider)
  705. assert.NoError(t, err)
  706. assert.NotNil(t, cfg)
  707. creds, err := cfg.Credentials.Retrieve(ctx)
  708. assert.NoError(t, err)
  709. assert.Equal(t, "SECRET_KEY_ID", creds.AccessKeyID)
  710. assert.Equal(t, "SECRET_ACCESS_KEY", creds.SecretAccessKey)
  711. }
  712. func TestNewGeneratorSession_RegionConfiguration(t *testing.T) {
  713. ctx := context.Background()
  714. k8sClient := clientfake.NewClientBuilder().Build()
  715. testCases := []struct {
  716. name string
  717. region string
  718. expectedRegion string
  719. }{
  720. {"region specified", "us-east-1", "us-east-1"},
  721. {"empty region uses default", "", ""},
  722. }
  723. for _, tc := range testCases {
  724. t.Run(tc.name, func(t *testing.T) {
  725. cfg, err := NewGeneratorSession(ctx, esv1.AWSAuth{}, "", tc.region, k8sClient, "test-ns", DefaultSTSProvider, DefaultJWTProvider)
  726. assert.NoError(t, err)
  727. assert.NotNil(t, cfg)
  728. if tc.expectedRegion != "" {
  729. assert.Equal(t, tc.expectedRegion, cfg.Region)
  730. }
  731. })
  732. }
  733. }
  734. func TestNewGeneratorSession_AssumeRoleWithDefaultCredentials(t *testing.T) {
  735. t.Setenv("AWS_ACCESS_KEY_ID", "BASE_ACCESS_KEY")
  736. t.Setenv("AWS_SECRET_ACCESS_KEY", "BASE_SECRET_KEY")
  737. stsProviderCalled := false
  738. cfg, err := NewGeneratorSession(context.Background(), esv1.AWSAuth{}, "arn:aws:iam::123456789012:role/assumed-role", "us-east-1", clientfake.NewClientBuilder().Build(), "test-ns", func(cfg *aws.Config) STSprovider {
  739. stsProviderCalled = true
  740. creds, err := cfg.Credentials.Retrieve(context.Background())
  741. assert.NoError(t, err)
  742. assert.Equal(t, "BASE_ACCESS_KEY", creds.AccessKeyID)
  743. return &fakesess.AssumeRoler{
  744. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  745. assert.Equal(t, "arn:aws:iam::123456789012:role/assumed-role", *input.RoleArn)
  746. return &sts.AssumeRoleOutput{
  747. AssumedRoleUser: &ststypes.AssumedRoleUser{
  748. Arn: aws.String("arn:aws:sts::123456789012:assumed-role/assumed-role/session"),
  749. AssumedRoleId: aws.String("AROA123456"),
  750. },
  751. Credentials: &ststypes.Credentials{
  752. AccessKeyId: aws.String("ASSUMED_ACCESS_KEY"),
  753. SecretAccessKey: aws.String("ASSUMED_SECRET_KEY"),
  754. SessionToken: aws.String("ASSUMED_SESSION_TOKEN"),
  755. Expiration: aws.Time(time.Now().Add(time.Hour)),
  756. },
  757. }, nil
  758. },
  759. }
  760. }, DefaultJWTProvider)
  761. assert.NoError(t, err)
  762. assert.NotNil(t, cfg)
  763. assert.True(t, stsProviderCalled)
  764. creds, err := cfg.Credentials.Retrieve(context.Background())
  765. assert.NoError(t, err)
  766. assert.Equal(t, "ASSUMED_ACCESS_KEY", creds.AccessKeyID)
  767. assert.Equal(t, "ASSUMED_SECRET_KEY", creds.SecretAccessKey)
  768. assert.Equal(t, "ASSUMED_SESSION_TOKEN", creds.SessionToken)
  769. }
  770. func TestNewGeneratorSession_DefaultCredentialChainFallback(t *testing.T) {
  771. t.Setenv("AWS_ACCESS_KEY_ID", "ENV_ACCESS_KEY")
  772. t.Setenv("AWS_SECRET_ACCESS_KEY", "ENV_SECRET_KEY")
  773. t.Setenv("AWS_SESSION_TOKEN", "ENV_SESSION_TOKEN")
  774. cfg, err := NewGeneratorSession(context.Background(), esv1.AWSAuth{}, "", "us-east-1", clientfake.NewClientBuilder().Build(), "test-ns", DefaultSTSProvider, DefaultJWTProvider)
  775. assert.NoError(t, err)
  776. assert.NotNil(t, cfg)
  777. creds, err := cfg.Credentials.Retrieve(context.Background())
  778. assert.NoError(t, err)
  779. assert.NotEmpty(t, creds.AccessKeyID)
  780. assert.NotEmpty(t, creds.SecretAccessKey)
  781. }