mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-30 09:56:21 -05:00
3a5753045e
rules_go added a SIGTERM handler that has a goroutine that survives the scope of the goleak check. Currently, the best known workaround is to ignore this goroutine. https://github.com/uber-go/goleak/issues/119 https://github.com/bazelbuild/rules_go/pull/3749 https://github.com/bazelbuild/rules_go/pull/3827#issuecomment-1894002120
158 lines
5.5 KiB
Go
158 lines
5.5 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package azureshared
|
|
|
|
import (
|
|
"net/url"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"go.uber.org/goleak"
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
goleak.VerifyTestMain(m, goleak.IgnoreAnyFunction("github.com/bazelbuild/rules_go/go/tools/bzltestutil.RegisterTimeoutHandler.func1"))
|
|
}
|
|
|
|
func TestApplicationCredentialsFromURI(t *testing.T) {
|
|
creds := ApplicationCredentials{
|
|
TenantID: "tenant-id",
|
|
AppClientID: "client-id",
|
|
ClientSecretValue: "client-secret",
|
|
Location: "location",
|
|
UamiResourceID: "subscriptions/9b352db0-82af-408c-a02c-36fbffbf7015/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/UAMIName",
|
|
PreferredAuthMethod: AuthMethodServicePrincipal,
|
|
SubscriptionID: "9b352db0-82af-408c-a02c-36fbffbf7015",
|
|
ResourceGroup: "resourceGroupName",
|
|
}
|
|
credsWithoutSecret := ApplicationCredentials{
|
|
TenantID: "tenant-id",
|
|
Location: "location",
|
|
UamiResourceID: "subscriptions/9b352db0-82af-408c-a02c-36fbffbf7015/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/UAMIName",
|
|
PreferredAuthMethod: AuthMethodUserAssignedIdentity,
|
|
SubscriptionID: "9b352db0-82af-408c-a02c-36fbffbf7015",
|
|
ResourceGroup: "resourceGroupName",
|
|
}
|
|
credsWithoutPreferrredAuthMethod := ApplicationCredentials{
|
|
TenantID: "tenant-id",
|
|
AppClientID: "client-id",
|
|
ClientSecretValue: "client-secret",
|
|
Location: "location",
|
|
}
|
|
testCases := map[string]struct {
|
|
cloudServiceAccountURI string
|
|
wantCreds ApplicationCredentials
|
|
wantErr bool
|
|
}{
|
|
"getApplicationCredentials works": {
|
|
cloudServiceAccountURI: "serviceaccount://azure?tenant_id=tenant-id&client_id=client-id&client_secret=client-secret&location=location&preferred_auth_method=serviceprincipal&uami_resource_id=subscriptions%2F9b352db0-82af-408c-a02c-36fbffbf7015%2FresourceGroups%2FresourceGroupName%2Fproviders%2FMicrosoft.ManagedIdentity%2FuserAssignedIdentities%2FUAMIName",
|
|
wantCreds: creds,
|
|
},
|
|
"can parse URI without app registration / secret": {
|
|
cloudServiceAccountURI: "serviceaccount://azure?tenant_id=tenant-id&location=location&preferred_auth_method=userassignedidentity&uami_resource_id=subscriptions%2F9b352db0-82af-408c-a02c-36fbffbf7015%2FresourceGroups%2FresourceGroupName%2Fproviders%2FMicrosoft.ManagedIdentity%2FuserAssignedIdentities%2FUAMIName",
|
|
wantCreds: credsWithoutSecret,
|
|
},
|
|
"can parse URI without preferred auth method": {
|
|
cloudServiceAccountURI: "serviceaccount://azure?tenant_id=tenant-id&client_id=client-id&client_secret=client-secret&location=location",
|
|
wantCreds: credsWithoutPreferrredAuthMethod,
|
|
},
|
|
"invalid URI fails": {
|
|
cloudServiceAccountURI: "\x00",
|
|
wantErr: true,
|
|
},
|
|
"incorrect URI scheme fails": {
|
|
cloudServiceAccountURI: "invalid",
|
|
wantErr: true,
|
|
},
|
|
"incorrect URI host fails": {
|
|
cloudServiceAccountURI: "serviceaccount://incorrect",
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
creds, err := ApplicationCredentialsFromURI(tc.cloudServiceAccountURI)
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
require.NoError(err)
|
|
assert.Equal(tc.wantCreds, creds)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestToCloudServiceAccountURI(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
credentials ApplicationCredentials
|
|
wantURLValues url.Values
|
|
}{
|
|
"client id and secret without preferred auth method": {
|
|
credentials: ApplicationCredentials{
|
|
TenantID: "tenant-id",
|
|
AppClientID: "client-id",
|
|
ClientSecretValue: "client-secret",
|
|
Location: "location",
|
|
},
|
|
wantURLValues: url.Values{
|
|
"tenant_id": []string{"tenant-id"},
|
|
"client_id": []string{"client-id"},
|
|
"client_secret": []string{"client-secret"},
|
|
"location": []string{"location"},
|
|
},
|
|
},
|
|
"client id and secret with preferred auth method": {
|
|
credentials: ApplicationCredentials{
|
|
TenantID: "tenant-id",
|
|
AppClientID: "client-id",
|
|
ClientSecretValue: "client-secret",
|
|
Location: "location",
|
|
PreferredAuthMethod: AuthMethodServicePrincipal,
|
|
},
|
|
wantURLValues: url.Values{
|
|
"tenant_id": []string{"tenant-id"},
|
|
"client_id": []string{"client-id"},
|
|
"client_secret": []string{"client-secret"},
|
|
"location": []string{"location"},
|
|
"preferred_auth_method": []string{"ServicePrincipal"},
|
|
},
|
|
},
|
|
"only preferred auth method": {
|
|
credentials: ApplicationCredentials{
|
|
TenantID: "tenant-id",
|
|
Location: "location",
|
|
PreferredAuthMethod: AuthMethodUserAssignedIdentity,
|
|
},
|
|
wantURLValues: url.Values{
|
|
"tenant_id": []string{"tenant-id"},
|
|
"location": []string{"location"},
|
|
"preferred_auth_method": []string{"UserAssignedIdentity"},
|
|
},
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
cloudServiceAccountURI := tc.credentials.ToCloudServiceAccountURI()
|
|
uri, err := url.Parse(cloudServiceAccountURI)
|
|
require.NoError(err)
|
|
query := uri.Query()
|
|
assert.Equal("serviceaccount", uri.Scheme)
|
|
assert.Equal("azure", uri.Host)
|
|
assert.Equal(tc.wantURLValues, query)
|
|
})
|
|
}
|
|
}
|