secret_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401
  1. package secret // import "github.com/docker/docker/integration/secret"
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "sort"
  7. "testing"
  8. "time"
  9. "github.com/docker/docker/api/types"
  10. "github.com/docker/docker/api/types/filters"
  11. swarmtypes "github.com/docker/docker/api/types/swarm"
  12. "github.com/docker/docker/client"
  13. "github.com/docker/docker/errdefs"
  14. "github.com/docker/docker/integration/internal/swarm"
  15. "github.com/docker/docker/pkg/stdcopy"
  16. "gotest.tools/v3/assert"
  17. is "gotest.tools/v3/assert/cmp"
  18. "gotest.tools/v3/poll"
  19. "gotest.tools/v3/skip"
  20. )
  21. func TestSecretInspect(t *testing.T) {
  22. skip.If(t, testEnv.DaemonInfo.OSType == "windows")
  23. defer setupTest(t)()
  24. d := swarm.NewSwarm(t, testEnv)
  25. defer d.Stop(t)
  26. c := d.NewClientT(t)
  27. defer c.Close()
  28. ctx := context.Background()
  29. testName := t.Name()
  30. secretID := createSecret(ctx, t, c, testName, []byte("TESTINGDATA"), nil)
  31. insp, body, err := c.SecretInspectWithRaw(ctx, secretID)
  32. assert.NilError(t, err)
  33. assert.Check(t, is.Equal(insp.Spec.Name, testName))
  34. var secret swarmtypes.Secret
  35. err = json.Unmarshal(body, &secret)
  36. assert.NilError(t, err)
  37. assert.Check(t, is.DeepEqual(secret, insp))
  38. }
  39. func TestSecretList(t *testing.T) {
  40. skip.If(t, testEnv.DaemonInfo.OSType == "windows")
  41. defer setupTest(t)()
  42. d := swarm.NewSwarm(t, testEnv)
  43. defer d.Stop(t)
  44. c := d.NewClientT(t)
  45. defer c.Close()
  46. ctx := context.Background()
  47. configs, err := c.SecretList(ctx, types.SecretListOptions{})
  48. assert.NilError(t, err)
  49. assert.Check(t, is.Equal(len(configs), 0))
  50. testName0 := "test0_" + t.Name()
  51. testName1 := "test1_" + t.Name()
  52. testNames := []string{testName0, testName1}
  53. sort.Strings(testNames)
  54. // create secret test0
  55. createSecret(ctx, t, c, testName0, []byte("TESTINGDATA0"), map[string]string{"type": "test"})
  56. // create secret test1
  57. secret1ID := createSecret(ctx, t, c, testName1, []byte("TESTINGDATA1"), map[string]string{"type": "production"})
  58. // test by `secret ls`
  59. entries, err := c.SecretList(ctx, types.SecretListOptions{})
  60. assert.NilError(t, err)
  61. assert.Check(t, is.DeepEqual(secretNamesFromList(entries), testNames))
  62. testCases := []struct {
  63. filters filters.Args
  64. expected []string
  65. }{
  66. // test filter by name `secret ls --filter name=xxx`
  67. {
  68. filters: filters.NewArgs(filters.Arg("name", testName0)),
  69. expected: []string{testName0},
  70. },
  71. // test filter by id `secret ls --filter id=xxx`
  72. {
  73. filters: filters.NewArgs(filters.Arg("id", secret1ID)),
  74. expected: []string{testName1},
  75. },
  76. // test filter by label `secret ls --filter label=xxx`
  77. {
  78. filters: filters.NewArgs(filters.Arg("label", "type")),
  79. expected: testNames,
  80. },
  81. {
  82. filters: filters.NewArgs(filters.Arg("label", "type=test")),
  83. expected: []string{testName0},
  84. },
  85. {
  86. filters: filters.NewArgs(filters.Arg("label", "type=production")),
  87. expected: []string{testName1},
  88. },
  89. }
  90. for _, tc := range testCases {
  91. entries, err = c.SecretList(ctx, types.SecretListOptions{
  92. Filters: tc.filters,
  93. })
  94. assert.NilError(t, err)
  95. assert.Check(t, is.DeepEqual(secretNamesFromList(entries), tc.expected))
  96. }
  97. }
  98. func createSecret(ctx context.Context, t *testing.T, client client.APIClient, name string, data []byte, labels map[string]string) string {
  99. secret, err := client.SecretCreate(ctx, swarmtypes.SecretSpec{
  100. Annotations: swarmtypes.Annotations{
  101. Name: name,
  102. Labels: labels,
  103. },
  104. Data: data,
  105. })
  106. assert.NilError(t, err)
  107. assert.Check(t, secret.ID != "")
  108. return secret.ID
  109. }
  110. func TestSecretsCreateAndDelete(t *testing.T) {
  111. skip.If(t, testEnv.DaemonInfo.OSType == "windows")
  112. defer setupTest(t)()
  113. d := swarm.NewSwarm(t, testEnv)
  114. defer d.Stop(t)
  115. c := d.NewClientT(t)
  116. defer c.Close()
  117. ctx := context.Background()
  118. testName := "test_secret_" + t.Name()
  119. secretID := createSecret(ctx, t, c, testName, []byte("TESTINGDATA"), nil)
  120. // create an already existing secret, daemon should return a status code of 409
  121. _, err := c.SecretCreate(ctx, swarmtypes.SecretSpec{
  122. Annotations: swarmtypes.Annotations{
  123. Name: testName,
  124. },
  125. Data: []byte("TESTINGDATA"),
  126. })
  127. assert.Check(t, errdefs.IsConflict(err))
  128. assert.Check(t, is.ErrorContains(err, testName))
  129. err = c.SecretRemove(ctx, secretID)
  130. assert.NilError(t, err)
  131. _, _, err = c.SecretInspectWithRaw(ctx, secretID)
  132. assert.Check(t, errdefs.IsNotFound(err))
  133. assert.Check(t, is.ErrorContains(err, secretID))
  134. err = c.SecretRemove(ctx, "non-existing")
  135. assert.Check(t, errdefs.IsNotFound(err))
  136. assert.Check(t, is.ErrorContains(err, "non-existing"))
  137. testName = "test_secret_with_labels_" + t.Name()
  138. secretID = createSecret(ctx, t, c, testName, []byte("TESTINGDATA"), map[string]string{
  139. "key1": "value1",
  140. "key2": "value2",
  141. })
  142. insp, _, err := c.SecretInspectWithRaw(ctx, secretID)
  143. assert.NilError(t, err)
  144. assert.Check(t, is.Equal(insp.Spec.Name, testName))
  145. assert.Check(t, is.Equal(len(insp.Spec.Labels), 2))
  146. assert.Check(t, is.Equal(insp.Spec.Labels["key1"], "value1"))
  147. assert.Check(t, is.Equal(insp.Spec.Labels["key2"], "value2"))
  148. }
  149. func TestSecretsUpdate(t *testing.T) {
  150. skip.If(t, testEnv.DaemonInfo.OSType == "windows")
  151. defer setupTest(t)()
  152. d := swarm.NewSwarm(t, testEnv)
  153. defer d.Stop(t)
  154. c := d.NewClientT(t)
  155. defer c.Close()
  156. ctx := context.Background()
  157. testName := "test_secret_" + t.Name()
  158. secretID := createSecret(ctx, t, c, testName, []byte("TESTINGDATA"), nil)
  159. insp, _, err := c.SecretInspectWithRaw(ctx, secretID)
  160. assert.NilError(t, err)
  161. assert.Check(t, is.Equal(insp.ID, secretID))
  162. // test UpdateSecret with full ID
  163. insp.Spec.Labels = map[string]string{"test": "test1"}
  164. err = c.SecretUpdate(ctx, secretID, insp.Version, insp.Spec)
  165. assert.NilError(t, err)
  166. insp, _, err = c.SecretInspectWithRaw(ctx, secretID)
  167. assert.NilError(t, err)
  168. assert.Check(t, is.Equal(insp.Spec.Labels["test"], "test1"))
  169. // test UpdateSecret with full name
  170. insp.Spec.Labels = map[string]string{"test": "test2"}
  171. err = c.SecretUpdate(ctx, testName, insp.Version, insp.Spec)
  172. assert.NilError(t, err)
  173. insp, _, err = c.SecretInspectWithRaw(ctx, secretID)
  174. assert.NilError(t, err)
  175. assert.Check(t, is.Equal(insp.Spec.Labels["test"], "test2"))
  176. // test UpdateSecret with prefix ID
  177. insp.Spec.Labels = map[string]string{"test": "test3"}
  178. err = c.SecretUpdate(ctx, secretID[:1], insp.Version, insp.Spec)
  179. assert.NilError(t, err)
  180. insp, _, err = c.SecretInspectWithRaw(ctx, secretID)
  181. assert.NilError(t, err)
  182. assert.Check(t, is.Equal(insp.Spec.Labels["test"], "test3"))
  183. // test UpdateSecret in updating Data which is not supported in daemon
  184. // this test will produce an error in func UpdateSecret
  185. insp.Spec.Data = []byte("TESTINGDATA2")
  186. err = c.SecretUpdate(ctx, secretID, insp.Version, insp.Spec)
  187. assert.Check(t, errdefs.IsInvalidParameter(err))
  188. assert.Check(t, is.ErrorContains(err, "only updates to Labels are allowed"))
  189. }
  190. func TestTemplatedSecret(t *testing.T) {
  191. skip.If(t, testEnv.DaemonInfo.OSType == "windows")
  192. d := swarm.NewSwarm(t, testEnv)
  193. defer d.Stop(t)
  194. c := d.NewClientT(t)
  195. defer c.Close()
  196. ctx := context.Background()
  197. referencedSecretName := "referencedsecret_" + t.Name()
  198. referencedSecretSpec := swarmtypes.SecretSpec{
  199. Annotations: swarmtypes.Annotations{
  200. Name: referencedSecretName,
  201. },
  202. Data: []byte("this is a secret"),
  203. }
  204. referencedSecret, err := c.SecretCreate(ctx, referencedSecretSpec)
  205. assert.Check(t, err)
  206. referencedConfigName := "referencedconfig_" + t.Name()
  207. referencedConfigSpec := swarmtypes.ConfigSpec{
  208. Annotations: swarmtypes.Annotations{
  209. Name: referencedConfigName,
  210. },
  211. Data: []byte("this is a config"),
  212. }
  213. referencedConfig, err := c.ConfigCreate(ctx, referencedConfigSpec)
  214. assert.Check(t, err)
  215. templatedSecretName := "templated_secret_" + t.Name()
  216. secretSpec := swarmtypes.SecretSpec{
  217. Annotations: swarmtypes.Annotations{
  218. Name: templatedSecretName,
  219. },
  220. Templating: &swarmtypes.Driver{
  221. Name: "golang",
  222. },
  223. Data: []byte("SERVICE_NAME={{.Service.Name}}\n" +
  224. "{{secret \"referencedsecrettarget\"}}\n" +
  225. "{{config \"referencedconfigtarget\"}}\n"),
  226. }
  227. templatedSecret, err := c.SecretCreate(ctx, secretSpec)
  228. assert.Check(t, err)
  229. serviceName := "svc_" + t.Name()
  230. serviceID := swarm.CreateService(t, d,
  231. swarm.ServiceWithSecret(
  232. &swarmtypes.SecretReference{
  233. File: &swarmtypes.SecretReferenceFileTarget{
  234. Name: "templated_secret",
  235. UID: "0",
  236. GID: "0",
  237. Mode: 0600,
  238. },
  239. SecretID: templatedSecret.ID,
  240. SecretName: templatedSecretName,
  241. },
  242. ),
  243. swarm.ServiceWithConfig(
  244. &swarmtypes.ConfigReference{
  245. File: &swarmtypes.ConfigReferenceFileTarget{
  246. Name: "referencedconfigtarget",
  247. UID: "0",
  248. GID: "0",
  249. Mode: 0600,
  250. },
  251. ConfigID: referencedConfig.ID,
  252. ConfigName: referencedConfigName,
  253. },
  254. ),
  255. swarm.ServiceWithSecret(
  256. &swarmtypes.SecretReference{
  257. File: &swarmtypes.SecretReferenceFileTarget{
  258. Name: "referencedsecrettarget",
  259. UID: "0",
  260. GID: "0",
  261. Mode: 0600,
  262. },
  263. SecretID: referencedSecret.ID,
  264. SecretName: referencedSecretName,
  265. },
  266. ),
  267. swarm.ServiceWithName(serviceName),
  268. )
  269. poll.WaitOn(t, swarm.RunningTasksCount(c, serviceID, 1), swarm.ServicePoll, poll.WithTimeout(1*time.Minute))
  270. tasks := swarm.GetRunningTasks(t, c, serviceID)
  271. assert.Assert(t, len(tasks) > 0, "no running tasks found for service %s", serviceID)
  272. attach := swarm.ExecTask(t, d, tasks[0], types.ExecConfig{
  273. Cmd: []string{"/bin/cat", "/run/secrets/templated_secret"},
  274. AttachStdout: true,
  275. AttachStderr: true,
  276. })
  277. expect := "SERVICE_NAME=" + serviceName + "\n" +
  278. "this is a secret\n" +
  279. "this is a config\n"
  280. assertAttachedStream(t, attach, expect)
  281. attach = swarm.ExecTask(t, d, tasks[0], types.ExecConfig{
  282. Cmd: []string{"mount"},
  283. AttachStdout: true,
  284. AttachStderr: true,
  285. })
  286. assertAttachedStream(t, attach, "tmpfs on /run/secrets/templated_secret type tmpfs")
  287. }
  288. // Test case for 28884
  289. func TestSecretCreateResolve(t *testing.T) {
  290. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  291. defer setupTest(t)()
  292. d := swarm.NewSwarm(t, testEnv)
  293. defer d.Stop(t)
  294. c := d.NewClientT(t)
  295. defer c.Close()
  296. ctx := context.Background()
  297. testName := "test_secret_" + t.Name()
  298. secretID := createSecret(ctx, t, c, testName, []byte("foo"), nil)
  299. fakeName := secretID
  300. fakeID := createSecret(ctx, t, c, fakeName, []byte("fake foo"), nil)
  301. entries, err := c.SecretList(ctx, types.SecretListOptions{})
  302. assert.NilError(t, err)
  303. assert.Check(t, is.Contains(secretNamesFromList(entries), testName))
  304. assert.Check(t, is.Contains(secretNamesFromList(entries), fakeName))
  305. err = c.SecretRemove(ctx, secretID)
  306. assert.NilError(t, err)
  307. // Fake one will remain
  308. entries, err = c.SecretList(ctx, types.SecretListOptions{})
  309. assert.NilError(t, err)
  310. assert.Assert(t, is.DeepEqual(secretNamesFromList(entries), []string{fakeName}))
  311. // Remove based on name prefix of the fake one should not work
  312. // as search is only done based on:
  313. // - Full ID
  314. // - Full Name
  315. // - Partial ID (prefix)
  316. err = c.SecretRemove(ctx, fakeName[:5])
  317. assert.Assert(t, nil != err)
  318. entries, err = c.SecretList(ctx, types.SecretListOptions{})
  319. assert.NilError(t, err)
  320. assert.Assert(t, is.DeepEqual(secretNamesFromList(entries), []string{fakeName}))
  321. // Remove based on ID prefix of the fake one should succeed
  322. err = c.SecretRemove(ctx, fakeID[:5])
  323. assert.NilError(t, err)
  324. entries, err = c.SecretList(ctx, types.SecretListOptions{})
  325. assert.NilError(t, err)
  326. assert.Assert(t, is.Equal(0, len(entries)))
  327. }
  328. func assertAttachedStream(t *testing.T, attach types.HijackedResponse, expect string) {
  329. buf := bytes.NewBuffer(nil)
  330. _, err := stdcopy.StdCopy(buf, buf, attach.Reader)
  331. assert.NilError(t, err)
  332. assert.Check(t, is.Contains(buf.String(), expect))
  333. }
  334. func secretNamesFromList(entries []swarmtypes.Secret) []string {
  335. var values []string
  336. for _, entry := range entries {
  337. values = append(values, entry.Spec.Name)
  338. }
  339. sort.Strings(values)
  340. return values
  341. }