authz_unix_test.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. // +build !windows
  2. // TODO Windows: This uses a Unix socket for testing. This might be possible
  3. // to port to Windows using a named pipe instead.
  4. package authorization
  5. import (
  6. "encoding/json"
  7. "io/ioutil"
  8. "log"
  9. "net"
  10. "net/http"
  11. "net/http/httptest"
  12. "os"
  13. "path"
  14. "reflect"
  15. "testing"
  16. "github.com/docker/docker/pkg/plugins"
  17. "github.com/docker/go-connections/tlsconfig"
  18. "github.com/gorilla/mux"
  19. )
  20. const pluginAddress = "authzplugin.sock"
  21. func TestAuthZRequestPluginError(t *testing.T) {
  22. server := authZPluginTestServer{t: t}
  23. go server.start()
  24. defer server.stop()
  25. authZPlugin := createTestPlugin(t)
  26. request := Request{
  27. User: "user",
  28. RequestBody: []byte("sample body"),
  29. RequestURI: "www.authz.com",
  30. RequestMethod: "GET",
  31. RequestHeaders: map[string]string{"header": "value"},
  32. }
  33. server.replayResponse = Response{
  34. Err: "an error",
  35. }
  36. actualResponse, err := authZPlugin.AuthZRequest(&request)
  37. if err != nil {
  38. t.Fatalf("Failed to authorize request %v", err)
  39. }
  40. if !reflect.DeepEqual(server.replayResponse, *actualResponse) {
  41. t.Fatalf("Response must be equal")
  42. }
  43. if !reflect.DeepEqual(request, server.recordedRequest) {
  44. t.Fatalf("Requests must be equal")
  45. }
  46. }
  47. func TestAuthZRequestPlugin(t *testing.T) {
  48. server := authZPluginTestServer{t: t}
  49. go server.start()
  50. defer server.stop()
  51. authZPlugin := createTestPlugin(t)
  52. request := Request{
  53. User: "user",
  54. RequestBody: []byte("sample body"),
  55. RequestURI: "www.authz.com",
  56. RequestMethod: "GET",
  57. RequestHeaders: map[string]string{"header": "value"},
  58. }
  59. server.replayResponse = Response{
  60. Allow: true,
  61. Msg: "Sample message",
  62. }
  63. actualResponse, err := authZPlugin.AuthZRequest(&request)
  64. if err != nil {
  65. t.Fatalf("Failed to authorize request %v", err)
  66. }
  67. if !reflect.DeepEqual(server.replayResponse, *actualResponse) {
  68. t.Fatalf("Response must be equal")
  69. }
  70. if !reflect.DeepEqual(request, server.recordedRequest) {
  71. t.Fatalf("Requests must be equal")
  72. }
  73. }
  74. func TestAuthZResponsePlugin(t *testing.T) {
  75. server := authZPluginTestServer{t: t}
  76. go server.start()
  77. defer server.stop()
  78. authZPlugin := createTestPlugin(t)
  79. request := Request{
  80. User: "user",
  81. RequestBody: []byte("sample body"),
  82. }
  83. server.replayResponse = Response{
  84. Allow: true,
  85. Msg: "Sample message",
  86. }
  87. actualResponse, err := authZPlugin.AuthZResponse(&request)
  88. if err != nil {
  89. t.Fatalf("Failed to authorize request %v", err)
  90. }
  91. if !reflect.DeepEqual(server.replayResponse, *actualResponse) {
  92. t.Fatalf("Response must be equal")
  93. }
  94. if !reflect.DeepEqual(request, server.recordedRequest) {
  95. t.Fatalf("Requests must be equal")
  96. }
  97. }
  98. func TestResponseModifier(t *testing.T) {
  99. r := httptest.NewRecorder()
  100. m := NewResponseModifier(r)
  101. m.Header().Set("h1", "v1")
  102. m.Write([]byte("body"))
  103. m.WriteHeader(500)
  104. m.FlushAll()
  105. if r.Header().Get("h1") != "v1" {
  106. t.Fatalf("Header value must exists %s", r.Header().Get("h1"))
  107. }
  108. if !reflect.DeepEqual(r.Body.Bytes(), []byte("body")) {
  109. t.Fatalf("Body value must exists %s", r.Body.Bytes())
  110. }
  111. if r.Code != 500 {
  112. t.Fatalf("Status code must be correct %d", r.Code)
  113. }
  114. }
  115. func TestResponseModifierOverride(t *testing.T) {
  116. r := httptest.NewRecorder()
  117. m := NewResponseModifier(r)
  118. m.Header().Set("h1", "v1")
  119. m.Write([]byte("body"))
  120. m.WriteHeader(500)
  121. overrideHeader := make(http.Header)
  122. overrideHeader.Add("h1", "v2")
  123. overrideHeaderBytes, err := json.Marshal(overrideHeader)
  124. if err != nil {
  125. t.Fatalf("override header failed %v", err)
  126. }
  127. m.OverrideHeader(overrideHeaderBytes)
  128. m.OverrideBody([]byte("override body"))
  129. m.OverrideStatusCode(404)
  130. m.FlushAll()
  131. if r.Header().Get("h1") != "v2" {
  132. t.Fatalf("Header value must exists %s", r.Header().Get("h1"))
  133. }
  134. if !reflect.DeepEqual(r.Body.Bytes(), []byte("override body")) {
  135. t.Fatalf("Body value must exists %s", r.Body.Bytes())
  136. }
  137. if r.Code != 404 {
  138. t.Fatalf("Status code must be correct %d", r.Code)
  139. }
  140. }
  141. // createTestPlugin creates a new sample authorization plugin
  142. func createTestPlugin(t *testing.T) *authorizationPlugin {
  143. plugin := &plugins.Plugin{Name: "authz"}
  144. pwd, err := os.Getwd()
  145. if err != nil {
  146. log.Fatal(err)
  147. }
  148. plugin.Client, err = plugins.NewClient("unix:///"+path.Join(pwd, pluginAddress), tlsconfig.Options{InsecureSkipVerify: true})
  149. if err != nil {
  150. t.Fatalf("Failed to create client %v", err)
  151. }
  152. return &authorizationPlugin{name: "plugin", plugin: plugin}
  153. }
  154. // AuthZPluginTestServer is a simple server that implements the authZ plugin interface
  155. type authZPluginTestServer struct {
  156. listener net.Listener
  157. t *testing.T
  158. // request stores the request sent from the daemon to the plugin
  159. recordedRequest Request
  160. // response stores the response sent from the plugin to the daemon
  161. replayResponse Response
  162. }
  163. // start starts the test server that implements the plugin
  164. func (t *authZPluginTestServer) start() {
  165. r := mux.NewRouter()
  166. os.Remove(pluginAddress)
  167. l, err := net.ListenUnix("unix", &net.UnixAddr{Name: pluginAddress, Net: "unix"})
  168. if err != nil {
  169. t.t.Fatalf("Failed to listen %v", err)
  170. }
  171. t.listener = l
  172. r.HandleFunc("/Plugin.Activate", t.activate)
  173. r.HandleFunc("/"+AuthZApiRequest, t.auth)
  174. r.HandleFunc("/"+AuthZApiResponse, t.auth)
  175. t.listener, err = net.Listen("tcp", pluginAddress)
  176. server := http.Server{Handler: r, Addr: pluginAddress}
  177. server.Serve(l)
  178. }
  179. // stop stops the test server that implements the plugin
  180. func (t *authZPluginTestServer) stop() {
  181. os.Remove(pluginAddress)
  182. if t.listener != nil {
  183. t.listener.Close()
  184. }
  185. }
  186. // auth is a used to record/replay the authentication api messages
  187. func (t *authZPluginTestServer) auth(w http.ResponseWriter, r *http.Request) {
  188. t.recordedRequest = Request{}
  189. defer r.Body.Close()
  190. body, err := ioutil.ReadAll(r.Body)
  191. json.Unmarshal(body, &t.recordedRequest)
  192. b, err := json.Marshal(t.replayResponse)
  193. if err != nil {
  194. log.Fatal(err)
  195. }
  196. w.Write(b)
  197. }
  198. func (t *authZPluginTestServer) activate(w http.ResponseWriter, r *http.Request) {
  199. b, err := json.Marshal(plugins.Manifest{Implements: []string{AuthZApiImplements}})
  200. if err != nil {
  201. log.Fatal(err)
  202. }
  203. w.Write(b)
  204. }