authz_unix_test.go 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276
  1. // +build !windows
  2. // TODO Windows: This uses a Unix socket for testing. This might be possible
  3. // to port to Windows using a named pipe instead.
  4. package authorization
  5. import (
  6. "encoding/json"
  7. "io/ioutil"
  8. "log"
  9. "net"
  10. "net/http"
  11. "net/http/httptest"
  12. "os"
  13. "path"
  14. "reflect"
  15. "testing"
  16. "bytes"
  17. "strings"
  18. "github.com/docker/docker/pkg/plugins"
  19. "github.com/docker/go-connections/tlsconfig"
  20. "github.com/gorilla/mux"
  21. )
  22. const pluginAddress = "authzplugin.sock"
  23. func TestAuthZRequestPluginError(t *testing.T) {
  24. server := authZPluginTestServer{t: t}
  25. go server.start()
  26. defer server.stop()
  27. authZPlugin := createTestPlugin(t)
  28. request := Request{
  29. User: "user",
  30. RequestBody: []byte("sample body"),
  31. RequestURI: "www.authz.com",
  32. RequestMethod: "GET",
  33. RequestHeaders: map[string]string{"header": "value"},
  34. }
  35. server.replayResponse = Response{
  36. Err: "an error",
  37. }
  38. actualResponse, err := authZPlugin.AuthZRequest(&request)
  39. if err != nil {
  40. t.Fatalf("Failed to authorize request %v", err)
  41. }
  42. if !reflect.DeepEqual(server.replayResponse, *actualResponse) {
  43. t.Fatalf("Response must be equal")
  44. }
  45. if !reflect.DeepEqual(request, server.recordedRequest) {
  46. t.Fatalf("Requests must be equal")
  47. }
  48. }
  49. func TestAuthZRequestPlugin(t *testing.T) {
  50. server := authZPluginTestServer{t: t}
  51. go server.start()
  52. defer server.stop()
  53. authZPlugin := createTestPlugin(t)
  54. request := Request{
  55. User: "user",
  56. RequestBody: []byte("sample body"),
  57. RequestURI: "www.authz.com",
  58. RequestMethod: "GET",
  59. RequestHeaders: map[string]string{"header": "value"},
  60. }
  61. server.replayResponse = Response{
  62. Allow: true,
  63. Msg: "Sample message",
  64. }
  65. actualResponse, err := authZPlugin.AuthZRequest(&request)
  66. if err != nil {
  67. t.Fatalf("Failed to authorize request %v", err)
  68. }
  69. if !reflect.DeepEqual(server.replayResponse, *actualResponse) {
  70. t.Fatalf("Response must be equal")
  71. }
  72. if !reflect.DeepEqual(request, server.recordedRequest) {
  73. t.Fatalf("Requests must be equal")
  74. }
  75. }
  76. func TestAuthZResponsePlugin(t *testing.T) {
  77. server := authZPluginTestServer{t: t}
  78. go server.start()
  79. defer server.stop()
  80. authZPlugin := createTestPlugin(t)
  81. request := Request{
  82. User: "user",
  83. RequestBody: []byte("sample body"),
  84. }
  85. server.replayResponse = Response{
  86. Allow: true,
  87. Msg: "Sample message",
  88. }
  89. actualResponse, err := authZPlugin.AuthZResponse(&request)
  90. if err != nil {
  91. t.Fatalf("Failed to authorize request %v", err)
  92. }
  93. if !reflect.DeepEqual(server.replayResponse, *actualResponse) {
  94. t.Fatalf("Response must be equal")
  95. }
  96. if !reflect.DeepEqual(request, server.recordedRequest) {
  97. t.Fatalf("Requests must be equal")
  98. }
  99. }
  100. func TestResponseModifier(t *testing.T) {
  101. r := httptest.NewRecorder()
  102. m := NewResponseModifier(r)
  103. m.Header().Set("h1", "v1")
  104. m.Write([]byte("body"))
  105. m.WriteHeader(500)
  106. m.FlushAll()
  107. if r.Header().Get("h1") != "v1" {
  108. t.Fatalf("Header value must exists %s", r.Header().Get("h1"))
  109. }
  110. if !reflect.DeepEqual(r.Body.Bytes(), []byte("body")) {
  111. t.Fatalf("Body value must exists %s", r.Body.Bytes())
  112. }
  113. if r.Code != 500 {
  114. t.Fatalf("Status code must be correct %d", r.Code)
  115. }
  116. }
  117. func TestDrainBody(t *testing.T) {
  118. tests := []struct {
  119. length int // length is the message length send to drainBody
  120. expectedBodyLength int // expectedBodyLength is the expected body length after drainBody is called
  121. }{
  122. {10, 10}, // Small message size
  123. {maxBodySize - 1, maxBodySize - 1}, // Max message size
  124. {maxBodySize * 2, 0}, // Large message size (skip copying body)
  125. }
  126. for _, test := range tests {
  127. msg := strings.Repeat("a", test.length)
  128. body, closer, err := drainBody(ioutil.NopCloser(bytes.NewReader([]byte(msg))))
  129. if len(body) != test.expectedBodyLength {
  130. t.Fatalf("Body must be copied, actual length: '%d'", len(body))
  131. }
  132. if closer == nil {
  133. t.Fatalf("Closer must not be nil")
  134. }
  135. if err != nil {
  136. t.Fatalf("Error must not be nil: '%v'", err)
  137. }
  138. modified, err := ioutil.ReadAll(closer)
  139. if err != nil {
  140. t.Fatalf("Error must not be nil: '%v'", err)
  141. }
  142. if len(modified) != len(msg) {
  143. t.Fatalf("Result should not be truncated. Original length: '%d', new length: '%d'", len(msg), len(modified))
  144. }
  145. }
  146. }
  147. func TestResponseModifierOverride(t *testing.T) {
  148. r := httptest.NewRecorder()
  149. m := NewResponseModifier(r)
  150. m.Header().Set("h1", "v1")
  151. m.Write([]byte("body"))
  152. m.WriteHeader(500)
  153. overrideHeader := make(http.Header)
  154. overrideHeader.Add("h1", "v2")
  155. overrideHeaderBytes, err := json.Marshal(overrideHeader)
  156. if err != nil {
  157. t.Fatalf("override header failed %v", err)
  158. }
  159. m.OverrideHeader(overrideHeaderBytes)
  160. m.OverrideBody([]byte("override body"))
  161. m.OverrideStatusCode(404)
  162. m.FlushAll()
  163. if r.Header().Get("h1") != "v2" {
  164. t.Fatalf("Header value must exists %s", r.Header().Get("h1"))
  165. }
  166. if !reflect.DeepEqual(r.Body.Bytes(), []byte("override body")) {
  167. t.Fatalf("Body value must exists %s", r.Body.Bytes())
  168. }
  169. if r.Code != 404 {
  170. t.Fatalf("Status code must be correct %d", r.Code)
  171. }
  172. }
  173. // createTestPlugin creates a new sample authorization plugin
  174. func createTestPlugin(t *testing.T) *authorizationPlugin {
  175. plugin := &plugins.Plugin{Name: "authz"}
  176. pwd, err := os.Getwd()
  177. if err != nil {
  178. log.Fatal(err)
  179. }
  180. plugin.Client, err = plugins.NewClient("unix:///"+path.Join(pwd, pluginAddress), tlsconfig.Options{InsecureSkipVerify: true})
  181. if err != nil {
  182. t.Fatalf("Failed to create client %v", err)
  183. }
  184. return &authorizationPlugin{name: "plugin", plugin: plugin}
  185. }
  186. // AuthZPluginTestServer is a simple server that implements the authZ plugin interface
  187. type authZPluginTestServer struct {
  188. listener net.Listener
  189. t *testing.T
  190. // request stores the request sent from the daemon to the plugin
  191. recordedRequest Request
  192. // response stores the response sent from the plugin to the daemon
  193. replayResponse Response
  194. }
  195. // start starts the test server that implements the plugin
  196. func (t *authZPluginTestServer) start() {
  197. r := mux.NewRouter()
  198. os.Remove(pluginAddress)
  199. l, err := net.ListenUnix("unix", &net.UnixAddr{Name: pluginAddress, Net: "unix"})
  200. if err != nil {
  201. t.t.Fatalf("Failed to listen %v", err)
  202. }
  203. t.listener = l
  204. r.HandleFunc("/Plugin.Activate", t.activate)
  205. r.HandleFunc("/"+AuthZApiRequest, t.auth)
  206. r.HandleFunc("/"+AuthZApiResponse, t.auth)
  207. t.listener, _ = net.Listen("tcp", pluginAddress)
  208. server := http.Server{Handler: r, Addr: pluginAddress}
  209. server.Serve(l)
  210. }
  211. // stop stops the test server that implements the plugin
  212. func (t *authZPluginTestServer) stop() {
  213. os.Remove(pluginAddress)
  214. if t.listener != nil {
  215. t.listener.Close()
  216. }
  217. }
  218. // auth is a used to record/replay the authentication api messages
  219. func (t *authZPluginTestServer) auth(w http.ResponseWriter, r *http.Request) {
  220. t.recordedRequest = Request{}
  221. defer r.Body.Close()
  222. body, err := ioutil.ReadAll(r.Body)
  223. json.Unmarshal(body, &t.recordedRequest)
  224. b, err := json.Marshal(t.replayResponse)
  225. if err != nil {
  226. log.Fatal(err)
  227. }
  228. w.Write(b)
  229. }
  230. func (t *authZPluginTestServer) activate(w http.ResponseWriter, r *http.Request) {
  231. b, err := json.Marshal(plugins.Manifest{Implements: []string{AuthZApiImplements}})
  232. if err != nil {
  233. log.Fatal(err)
  234. }
  235. w.Write(b)
  236. }