123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165 |
- //go:build !windows
- package authz // import "github.com/docker/docker/integration/plugin/authz"
- import (
- "context"
- "fmt"
- "io"
- "strings"
- "testing"
- "github.com/docker/docker/api/types"
- "github.com/docker/docker/api/types/filters"
- "github.com/docker/docker/api/types/volume"
- "github.com/docker/docker/client"
- "github.com/docker/docker/integration/internal/container"
- "github.com/docker/docker/integration/internal/requirement"
- "gotest.tools/v3/assert"
- "gotest.tools/v3/skip"
- )
- var (
- authzPluginName = "riyaz/authz-no-volume-plugin"
- authzPluginTag = "latest"
- authzPluginNameWithTag = authzPluginName + ":" + authzPluginTag
- authzPluginBadManifestName = "riyaz/authz-plugin-bad-manifest"
- nonexistentAuthzPluginName = "riyaz/nonexistent-authz-plugin"
- )
- func setupTestV2(t *testing.T) context.Context {
- skip.If(t, testEnv.DaemonInfo.OSType == "windows")
- skip.If(t, !requirement.HasHubConnectivity(t))
- ctx := setupTest(t)
- d.Start(t)
- return ctx
- }
- func TestAuthZPluginV2AllowNonVolumeRequest(t *testing.T) {
- skip.If(t, testEnv.NotAmd64)
- ctx := setupTestV2(t)
- c := d.NewClientT(t)
- // Install authz plugin
- err := pluginInstallGrantAllPermissions(ctx, c, authzPluginNameWithTag)
- assert.NilError(t, err)
- // start the daemon with the plugin and load busybox, --net=none build fails otherwise
- // because it needs to pull busybox
- d.Restart(t, "--authorization-plugin="+authzPluginNameWithTag)
- d.LoadBusybox(ctx, t)
- // Ensure docker run command and accompanying docker ps are successful
- cID := container.Run(ctx, t, c)
- _, err = c.ContainerInspect(ctx, cID)
- assert.NilError(t, err)
- }
- func TestAuthZPluginV2Disable(t *testing.T) {
- skip.If(t, testEnv.NotAmd64)
- ctx := setupTestV2(t)
- c := d.NewClientT(t)
- // Install authz plugin
- err := pluginInstallGrantAllPermissions(ctx, c, authzPluginNameWithTag)
- assert.NilError(t, err)
- d.Restart(t, "--authorization-plugin="+authzPluginNameWithTag)
- d.LoadBusybox(ctx, t)
- _, err = c.VolumeCreate(ctx, volume.CreateOptions{Driver: "local"})
- assert.Assert(t, err != nil)
- assert.Assert(t, strings.Contains(err.Error(), fmt.Sprintf("Error response from daemon: plugin %s failed with error:", authzPluginNameWithTag)))
- // disable the plugin
- err = c.PluginDisable(ctx, authzPluginNameWithTag, types.PluginDisableOptions{})
- assert.NilError(t, err)
- // now test to see if the docker api works.
- _, err = c.VolumeCreate(ctx, volume.CreateOptions{Driver: "local"})
- assert.NilError(t, err)
- }
- func TestAuthZPluginV2RejectVolumeRequests(t *testing.T) {
- skip.If(t, testEnv.NotAmd64)
- ctx := setupTestV2(t)
- c := d.NewClientT(t)
- // Install authz plugin
- err := pluginInstallGrantAllPermissions(ctx, c, authzPluginNameWithTag)
- assert.NilError(t, err)
- // restart the daemon with the plugin
- d.Restart(t, "--authorization-plugin="+authzPluginNameWithTag)
- _, err = c.VolumeCreate(ctx, volume.CreateOptions{Driver: "local"})
- assert.Assert(t, err != nil)
- assert.Assert(t, strings.Contains(err.Error(), fmt.Sprintf("Error response from daemon: plugin %s failed with error:", authzPluginNameWithTag)))
- _, err = c.VolumeList(ctx, volume.ListOptions{})
- assert.Assert(t, err != nil)
- assert.Assert(t, strings.Contains(err.Error(), fmt.Sprintf("Error response from daemon: plugin %s failed with error:", authzPluginNameWithTag)))
- // The plugin will block the command before it can determine the volume does not exist
- err = c.VolumeRemove(ctx, "test", false)
- assert.Assert(t, err != nil)
- assert.Assert(t, strings.Contains(err.Error(), fmt.Sprintf("Error response from daemon: plugin %s failed with error:", authzPluginNameWithTag)))
- _, err = c.VolumeInspect(ctx, "test")
- assert.Assert(t, err != nil)
- assert.Assert(t, strings.Contains(err.Error(), fmt.Sprintf("Error response from daemon: plugin %s failed with error:", authzPluginNameWithTag)))
- _, err = c.VolumesPrune(ctx, filters.Args{})
- assert.Assert(t, err != nil)
- assert.Assert(t, strings.Contains(err.Error(), fmt.Sprintf("Error response from daemon: plugin %s failed with error:", authzPluginNameWithTag)))
- }
- func TestAuthZPluginV2BadManifestFailsDaemonStart(t *testing.T) {
- skip.If(t, testEnv.NotAmd64)
- ctx := setupTestV2(t)
- c := d.NewClientT(t)
- // Install authz plugin with bad manifest
- err := pluginInstallGrantAllPermissions(ctx, c, authzPluginBadManifestName)
- assert.NilError(t, err)
- // start the daemon with the plugin, it will error
- err = d.RestartWithError("--authorization-plugin=" + authzPluginBadManifestName)
- assert.Assert(t, err != nil)
- // restarting the daemon without requiring the plugin will succeed
- d.Start(t)
- }
- func TestAuthZPluginV2NonexistentFailsDaemonStart(t *testing.T) {
- _ = setupTestV2(t)
- // start the daemon with a non-existent authz plugin, it will error
- err := d.RestartWithError("--authorization-plugin=" + nonexistentAuthzPluginName)
- assert.Assert(t, err != nil)
- // restarting the daemon without requiring the plugin will succeed
- d.Start(t)
- }
- func pluginInstallGrantAllPermissions(ctx context.Context, client client.APIClient, name string) error {
- options := types.PluginInstallOptions{
- RemoteRef: name,
- AcceptAllPermissions: true,
- }
- responseReader, err := client.PluginInstall(ctx, "", options)
- if err != nil {
- return err
- }
- defer responseReader.Close()
- // we have to read the response out here because the client API
- // actually starts a goroutine which we can only be sure has
- // completed when we get EOF from reading responseBody
- _, err = io.ReadAll(responseReader)
- return err
- }
|