2018-02-28 18:04:27 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
2020-10-06 18:24:05 +00:00
|
|
|
"fmt"
|
2018-02-28 18:04:27 +00:00
|
|
|
"os"
|
|
|
|
"testing"
|
2018-03-03 16:43:19 +00:00
|
|
|
"time"
|
2018-02-28 18:04:27 +00:00
|
|
|
|
2021-08-06 22:00:58 +00:00
|
|
|
msgpackrpc "github.com/hashicorp/net-rpc-msgpackrpc"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
2018-03-04 08:39:56 +00:00
|
|
|
"github.com/hashicorp/consul/acl"
|
2018-02-28 18:04:27 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2020-10-06 18:24:05 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil"
|
2018-02-28 18:04:27 +00:00
|
|
|
)
|
|
|
|
|
2018-03-01 05:11:35 +00:00
|
|
|
// Test basic creation
|
2018-02-28 18:28:07 +00:00
|
|
|
func TestIntentionApply_new(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-02-28 18:28:07 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2018-02-28 18:28:07 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-02-28 18:28:07 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
2018-03-03 16:51:40 +00:00
|
|
|
SourceNS: structs.IntentionDefaultNamespace,
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationNS: structs.IntentionDefaultNamespace,
|
|
|
|
DestinationName: "test",
|
2018-03-03 17:43:37 +00:00
|
|
|
Action: structs.IntentionActionAllow,
|
2018-03-03 17:55:27 +00:00
|
|
|
SourceType: structs.IntentionSourceConsul,
|
2018-03-03 17:43:37 +00:00
|
|
|
Meta: map[string]string{},
|
2018-02-28 18:28:07 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
|
2018-03-03 16:43:19 +00:00
|
|
|
// Record now to check created at time
|
|
|
|
now := time.Now()
|
|
|
|
|
2018-02-28 18:28:07 +00:00
|
|
|
// Create
|
2020-10-06 18:24:05 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
|
|
|
require.NotEmpty(t, reply)
|
2018-02-28 18:28:07 +00:00
|
|
|
|
2018-02-28 18:44:49 +00:00
|
|
|
// Read
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-10-06 18:24:05 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
2018-02-28 18:44:49 +00:00
|
|
|
actual := resp.Intentions[0]
|
2020-10-06 18:24:05 +00:00
|
|
|
require.Equal(t, resp.Index, actual.ModifyIndex)
|
|
|
|
require.WithinDuration(t, now, actual.CreatedAt, 5*time.Second)
|
|
|
|
require.WithinDuration(t, now, actual.UpdatedAt, 5*time.Second)
|
2018-03-03 16:43:19 +00:00
|
|
|
|
2018-02-28 18:44:49 +00:00
|
|
|
actual.CreateIndex, actual.ModifyIndex = 0, 0
|
2018-03-03 16:43:19 +00:00
|
|
|
actual.CreatedAt = ixn.Intention.CreatedAt
|
|
|
|
actual.UpdatedAt = ixn.Intention.UpdatedAt
|
2019-06-18 00:52:01 +00:00
|
|
|
actual.Hash = ixn.Intention.Hash
|
2020-10-06 18:24:05 +00:00
|
|
|
//nolint:staticcheck
|
2018-06-07 04:11:37 +00:00
|
|
|
ixn.Intention.UpdatePrecedence()
|
2021-09-08 15:59:30 +00:00
|
|
|
// Partition fields will be normalized on Intention.Get
|
2021-09-28 19:31:12 +00:00
|
|
|
ixn.Intention.FillPartitionAndNamespace(nil, true)
|
2020-10-06 18:24:05 +00:00
|
|
|
require.Equal(t, ixn.Intention, actual)
|
2018-02-28 18:44:49 +00:00
|
|
|
}
|
2020-10-06 18:24:05 +00:00
|
|
|
|
|
|
|
// Rename should fail
|
|
|
|
t.Run("renaming the destination should fail", func(t *testing.T) {
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn2 := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpUpdate,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
ID: ixn.Intention.ID,
|
|
|
|
SourceNS: structs.IntentionDefaultNamespace,
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationNS: structs.IntentionDefaultNamespace,
|
|
|
|
DestinationName: "test-updated",
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
Meta: map[string]string{},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var reply string
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn2, &reply)
|
2021-09-08 15:59:30 +00:00
|
|
|
testutil.RequireErrorContains(t, err, "Cannot modify Destination partition/namespace/name for an intention once it exists.")
|
2020-10-06 18:24:05 +00:00
|
|
|
})
|
2018-02-28 18:28:07 +00:00
|
|
|
}
|
|
|
|
|
2018-03-03 17:55:27 +00:00
|
|
|
// Test the source type defaults
|
|
|
|
func TestIntentionApply_defaultSourceType(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-03 17:55:27 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-03 17:55:27 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-03 17:55:27 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceNS: structs.IntentionDefaultNamespace,
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationNS: structs.IntentionDefaultNamespace,
|
|
|
|
DestinationName: "test",
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
|
|
|
|
// Create
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
|
|
|
require.NotEmpty(reply)
|
2018-03-03 17:55:27 +00:00
|
|
|
|
|
|
|
// Read
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp))
|
|
|
|
require.Len(resp.Intentions, 1)
|
2018-03-03 17:55:27 +00:00
|
|
|
actual := resp.Intentions[0]
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Equal(structs.IntentionSourceConsul, actual.SourceType)
|
2018-03-03 17:55:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-01 05:16:45 +00:00
|
|
|
// Shouldn't be able to create with an ID set
|
|
|
|
func TestIntentionApply_createWithID(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-01 05:16:45 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-01 05:16:45 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-01 05:16:45 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
2021-09-16 16:08:45 +00:00
|
|
|
ID: generateUUID(),
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test2",
|
2018-03-01 05:16:45 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
|
|
|
|
// Create
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Contains(err, "ID must be empty")
|
2018-03-01 05:16:45 +00:00
|
|
|
}
|
|
|
|
|
2018-03-01 05:11:35 +00:00
|
|
|
// Test basic updating
|
|
|
|
func TestIntentionApply_updateGood(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-01 05:11:35 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2018-03-01 05:11:35 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-01 05:11:35 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
2018-03-03 16:51:40 +00:00
|
|
|
SourceNS: structs.IntentionDefaultNamespace,
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationNS: structs.IntentionDefaultNamespace,
|
|
|
|
DestinationName: "test",
|
2018-03-03 17:43:37 +00:00
|
|
|
Action: structs.IntentionActionAllow,
|
2018-03-03 17:55:27 +00:00
|
|
|
SourceType: structs.IntentionSourceConsul,
|
2018-03-03 17:43:37 +00:00
|
|
|
Meta: map[string]string{},
|
2018-03-01 05:11:35 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
|
|
|
|
// Create
|
2020-10-06 18:24:05 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
|
|
|
require.NotEmpty(t, reply)
|
2018-03-01 05:11:35 +00:00
|
|
|
|
2018-03-03 16:43:19 +00:00
|
|
|
// Read CreatedAt
|
|
|
|
var createdAt time.Time
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-10-06 18:24:05 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
2018-03-03 16:43:19 +00:00
|
|
|
actual := resp.Intentions[0]
|
|
|
|
createdAt = actual.CreatedAt
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sleep a bit so that the updated at will definitely be different, not much
|
|
|
|
time.Sleep(1 * time.Millisecond)
|
|
|
|
|
2018-03-01 05:11:35 +00:00
|
|
|
// Update
|
|
|
|
ixn.Op = structs.IntentionOpUpdate
|
|
|
|
ixn.Intention.ID = reply
|
2020-10-06 18:24:05 +00:00
|
|
|
ixn.Intention.Description = "updated"
|
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-01 05:11:35 +00:00
|
|
|
|
|
|
|
// Read
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-10-06 18:24:05 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
2018-03-01 05:11:35 +00:00
|
|
|
actual := resp.Intentions[0]
|
2020-10-06 18:24:05 +00:00
|
|
|
require.Equal(t, createdAt, actual.CreatedAt)
|
|
|
|
require.WithinDuration(t, time.Now(), actual.UpdatedAt, 5*time.Second)
|
2018-03-03 16:43:19 +00:00
|
|
|
|
2018-03-01 05:11:35 +00:00
|
|
|
actual.CreateIndex, actual.ModifyIndex = 0, 0
|
2018-03-03 16:43:19 +00:00
|
|
|
actual.CreatedAt = ixn.Intention.CreatedAt
|
|
|
|
actual.UpdatedAt = ixn.Intention.UpdatedAt
|
2019-06-18 00:52:01 +00:00
|
|
|
actual.Hash = ixn.Intention.Hash
|
2020-10-06 18:24:05 +00:00
|
|
|
//nolint:staticcheck
|
2018-06-07 04:11:37 +00:00
|
|
|
ixn.Intention.UpdatePrecedence()
|
2021-09-08 15:59:30 +00:00
|
|
|
// Partition fields will be normalized on Intention.Get
|
2021-09-28 19:31:12 +00:00
|
|
|
ixn.Intention.FillPartitionAndNamespace(nil, true)
|
2020-10-06 18:24:05 +00:00
|
|
|
require.Equal(t, ixn.Intention, actual)
|
2018-03-01 05:11:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shouldn't be able to update a non-existent intention
|
|
|
|
func TestIntentionApply_updateNonExist(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-01 05:11:35 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-01 05:11:35 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-01 05:11:35 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpUpdate,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
ID: generateUUID(),
|
|
|
|
SourceName: "test",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
|
|
|
|
// Create
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Contains(err, "Cannot modify non-existent intention")
|
2018-03-01 05:11:35 +00:00
|
|
|
}
|
|
|
|
|
2018-03-01 23:48:48 +00:00
|
|
|
// Test basic deleting
|
|
|
|
func TestIntentionApply_deleteGood(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-01 23:48:48 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-01 23:48:48 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-01 23:48:48 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
2018-03-03 17:43:37 +00:00
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test",
|
|
|
|
Action: structs.IntentionActionAllow,
|
2018-03-01 23:48:48 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
|
2020-11-24 18:44:20 +00:00
|
|
|
// Delete a non existent intention should return an error
|
|
|
|
testutil.RequireErrorContains(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpDelete,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
ID: generateUUID(),
|
|
|
|
},
|
|
|
|
}, &reply), "Cannot delete non-existent intention")
|
|
|
|
|
2018-03-01 23:48:48 +00:00
|
|
|
// Create
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
|
|
|
require.NotEmpty(reply)
|
2018-03-01 23:48:48 +00:00
|
|
|
|
|
|
|
// Delete
|
|
|
|
ixn.Op = structs.IntentionOpDelete
|
|
|
|
ixn.Intention.ID = reply
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-01 23:48:48 +00:00
|
|
|
|
|
|
|
// Read
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Contains(err, ErrIntentionNotFound.Error())
|
2018-03-01 23:48:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
func TestIntentionApply_WithoutIDs(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
|
|
|
waitForLeaderEstablishment(t, s1)
|
|
|
|
|
2021-07-22 18:20:45 +00:00
|
|
|
defaultEntMeta := structs.DefaultEnterpriseMetaInDefaultPartition()
|
2020-10-06 18:24:05 +00:00
|
|
|
|
2020-10-06 22:09:13 +00:00
|
|
|
// Force "test" to be L7-capable.
|
|
|
|
{
|
|
|
|
args := structs.ConfigEntryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Entry: &structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "test",
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var out bool
|
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "ConfigEntry.Apply", &args, &out))
|
|
|
|
require.True(t, out)
|
|
|
|
}
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
opApply := func(req *structs.IntentionRequest) error {
|
|
|
|
req.Datacenter = "dc1"
|
|
|
|
var ignored string
|
|
|
|
return msgpackrpc.CallWithCodec(codec, "Intention.Apply", &req, &ignored)
|
|
|
|
}
|
|
|
|
|
|
|
|
opGet := func(req *structs.IntentionQueryRequest) (*structs.IndexedIntentions, error) {
|
|
|
|
req.Datacenter = "dc1"
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &resp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
opList := func() (*structs.IndexedIntentions, error) {
|
|
|
|
req := &structs.IntentionListRequest{
|
|
|
|
Datacenter: "dc1",
|
2021-07-22 18:20:45 +00:00
|
|
|
EnterpriseMeta: *structs.WildcardEnterpriseMetaInDefaultPartition(),
|
2020-10-06 18:24:05 +00:00
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Intention.List", req, &resp); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &resp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
configEntryUpsert := func(entry *structs.ServiceIntentionsConfigEntry) error {
|
|
|
|
req := &structs.ConfigEntryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.ConfigEntryUpsert,
|
|
|
|
Entry: entry,
|
|
|
|
}
|
|
|
|
var ignored bool
|
|
|
|
return msgpackrpc.CallWithCodec(codec, "ConfigEntry.Apply", req, &ignored)
|
|
|
|
}
|
|
|
|
|
|
|
|
getConfigEntry := func(kind, name string) (*structs.ServiceIntentionsConfigEntry, error) {
|
|
|
|
state := s1.fsm.State()
|
|
|
|
_, entry, err := state.ConfigEntry(nil, kind, name, defaultEntMeta)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
ixn, ok := entry.(*structs.ServiceIntentionsConfigEntry)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("unexpected type: %T", entry)
|
|
|
|
}
|
|
|
|
return ixn, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
require.NoError(t, opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpUpsert,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test",
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
Description: "original",
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
|
|
|
|
// Read it back.
|
|
|
|
{
|
|
|
|
resp, err := opGet(&structs.IntentionQueryRequest{
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
got := resp.Intentions[0]
|
|
|
|
require.Equal(t, "original", got.Description)
|
|
|
|
|
2020-10-06 22:09:13 +00:00
|
|
|
// L4
|
|
|
|
require.Equal(t, structs.IntentionActionAllow, got.Action)
|
|
|
|
require.Empty(t, got.Permissions)
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
// Verify it is in the new-style.
|
|
|
|
require.Empty(t, got.ID)
|
|
|
|
require.True(t, got.CreatedAt.IsZero())
|
|
|
|
require.True(t, got.UpdatedAt.IsZero())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Double check that there's only 1.
|
|
|
|
{
|
|
|
|
resp, err := opList()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the config entry structure is expected.
|
|
|
|
{
|
|
|
|
entry, err := getConfigEntry(structs.ServiceIntentions, "test")
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, entry)
|
|
|
|
|
|
|
|
expect := &structs.ServiceIntentionsConfigEntry{
|
|
|
|
Kind: structs.ServiceIntentions,
|
|
|
|
Name: "test",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Sources: []*structs.SourceIntention{
|
|
|
|
{
|
|
|
|
Name: "test",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
Description: "original",
|
|
|
|
Precedence: 9,
|
|
|
|
Type: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
RaftIndex: entry.RaftIndex,
|
|
|
|
}
|
|
|
|
|
|
|
|
require.Equal(t, expect, entry)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update in place.
|
|
|
|
require.NoError(t, opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpUpsert,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test",
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
Description: "updated",
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
|
|
|
|
// Read it back.
|
|
|
|
{
|
|
|
|
resp, err := opGet(&structs.IntentionQueryRequest{
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
got := resp.Intentions[0]
|
|
|
|
require.Equal(t, "updated", got.Description)
|
|
|
|
|
2020-10-06 22:09:13 +00:00
|
|
|
// L4
|
|
|
|
require.Equal(t, structs.IntentionActionAllow, got.Action)
|
|
|
|
require.Empty(t, got.Permissions)
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
// Verify it is in the new-style.
|
|
|
|
require.Empty(t, got.ID)
|
|
|
|
require.True(t, got.CreatedAt.IsZero())
|
|
|
|
require.True(t, got.UpdatedAt.IsZero())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Double check that there's only 1.
|
|
|
|
{
|
|
|
|
resp, err := opList()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a second one sharing the same destination
|
|
|
|
require.NoError(t, opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpUpsert,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "assay",
|
|
|
|
DestinationName: "test",
|
|
|
|
Description: "original-2",
|
2020-10-06 22:09:13 +00:00
|
|
|
Permissions: []*structs.IntentionPermission{
|
|
|
|
{
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
HTTP: &structs.IntentionHTTPPermission{
|
|
|
|
PathExact: "/foo",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-10-06 18:24:05 +00:00
|
|
|
},
|
|
|
|
}))
|
|
|
|
|
|
|
|
// Read it back.
|
|
|
|
{
|
|
|
|
resp, err := opGet(&structs.IntentionQueryRequest{
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceName: "assay",
|
|
|
|
DestinationName: "test",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
got := resp.Intentions[0]
|
|
|
|
require.Equal(t, "original-2", got.Description)
|
|
|
|
|
2020-10-06 22:09:13 +00:00
|
|
|
// L7
|
|
|
|
require.Empty(t, got.Action)
|
|
|
|
require.Equal(t, []*structs.IntentionPermission{
|
|
|
|
{
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
HTTP: &structs.IntentionHTTPPermission{
|
|
|
|
PathExact: "/foo",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}, got.Permissions)
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
// Verify it is in the new-style.
|
|
|
|
require.Empty(t, got.ID)
|
|
|
|
require.True(t, got.CreatedAt.IsZero())
|
|
|
|
require.True(t, got.UpdatedAt.IsZero())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Double check that there's 2 now.
|
|
|
|
{
|
|
|
|
resp, err := opList()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, resp.Intentions, 2)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the config entry structure is expected.
|
|
|
|
{
|
|
|
|
entry, err := getConfigEntry(structs.ServiceIntentions, "test")
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, entry)
|
|
|
|
|
|
|
|
expect := &structs.ServiceIntentionsConfigEntry{
|
|
|
|
Kind: structs.ServiceIntentions,
|
|
|
|
Name: "test",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Sources: []*structs.SourceIntention{
|
|
|
|
{
|
|
|
|
Name: "test",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
Description: "updated",
|
|
|
|
Precedence: 9,
|
|
|
|
Type: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "assay",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Description: "original-2",
|
|
|
|
Precedence: 9,
|
|
|
|
Type: structs.IntentionSourceConsul,
|
2020-10-06 22:09:13 +00:00
|
|
|
Permissions: []*structs.IntentionPermission{
|
|
|
|
{
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
HTTP: &structs.IntentionHTTPPermission{
|
|
|
|
PathExact: "/foo",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-10-06 18:24:05 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
RaftIndex: entry.RaftIndex,
|
|
|
|
}
|
|
|
|
|
|
|
|
require.Equal(t, expect, entry)
|
|
|
|
}
|
|
|
|
|
2021-01-04 17:27:00 +00:00
|
|
|
// Delete a non existent intention should act like it did work
|
|
|
|
require.NoError(t, opApply(&structs.IntentionRequest{
|
2020-11-24 18:44:20 +00:00
|
|
|
Op: structs.IntentionOpDelete,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "ghost",
|
|
|
|
DestinationName: "phantom",
|
|
|
|
},
|
2021-01-04 17:27:00 +00:00
|
|
|
}))
|
2020-11-24 18:44:20 +00:00
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
// Delete the original
|
|
|
|
require.NoError(t, opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpDelete,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test",
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
|
|
|
|
// Read it back (not found)
|
|
|
|
{
|
|
|
|
_, err := opGet(&structs.IntentionQueryRequest{
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceName: "test",
|
|
|
|
DestinationName: "test",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
testutil.RequireErrorContains(t, err, ErrIntentionNotFound.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Double check that there's 1 again.
|
|
|
|
{
|
|
|
|
resp, err := opList()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the config entry structure is expected.
|
|
|
|
{
|
|
|
|
entry, err := getConfigEntry(structs.ServiceIntentions, "test")
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, entry)
|
|
|
|
|
|
|
|
expect := &structs.ServiceIntentionsConfigEntry{
|
|
|
|
Kind: structs.ServiceIntentions,
|
|
|
|
Name: "test",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Sources: []*structs.SourceIntention{
|
|
|
|
{
|
|
|
|
Name: "assay",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Description: "original-2",
|
|
|
|
Precedence: 9,
|
|
|
|
Type: structs.IntentionSourceConsul,
|
2020-10-06 22:09:13 +00:00
|
|
|
Permissions: []*structs.IntentionPermission{
|
|
|
|
{
|
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
HTTP: &structs.IntentionHTTPPermission{
|
|
|
|
PathExact: "/foo",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-10-06 18:24:05 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
RaftIndex: entry.RaftIndex,
|
|
|
|
}
|
|
|
|
|
|
|
|
require.Equal(t, expect, entry)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set metadata on the config entry directly.
|
|
|
|
{
|
|
|
|
require.NoError(t, configEntryUpsert(&structs.ServiceIntentionsConfigEntry{
|
|
|
|
Kind: structs.ServiceIntentions,
|
|
|
|
Name: "test",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Meta: map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
"zim": "gir",
|
|
|
|
},
|
|
|
|
Sources: []*structs.SourceIntention{
|
|
|
|
{
|
|
|
|
Name: "assay",
|
|
|
|
EnterpriseMeta: *defaultEntMeta,
|
|
|
|
Action: structs.IntentionActionDeny,
|
|
|
|
Description: "original-2",
|
|
|
|
Precedence: 9,
|
|
|
|
Type: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to create a new intention and set the metadata.
|
|
|
|
{
|
|
|
|
err := opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpUpsert,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "foo",
|
|
|
|
DestinationName: "bar",
|
|
|
|
Action: structs.IntentionActionDeny,
|
|
|
|
Meta: map[string]string{"horseshoe": "crab"},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
testutil.RequireErrorContains(t, err, "Meta must not be specified")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to update an intention and change the metadata.
|
|
|
|
{
|
|
|
|
err := opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpUpsert,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "assay",
|
|
|
|
DestinationName: "test",
|
|
|
|
Action: structs.IntentionActionDeny,
|
|
|
|
Description: "original-3",
|
|
|
|
Meta: map[string]string{"horseshoe": "crab"},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
testutil.RequireErrorContains(t, err, "Meta must not be specified, or should be unchanged during an update.")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try again with the same metadata.
|
|
|
|
require.NoError(t, opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpUpsert,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "assay",
|
|
|
|
DestinationName: "test",
|
|
|
|
Action: structs.IntentionActionDeny,
|
|
|
|
Description: "original-3",
|
|
|
|
Meta: map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
"zim": "gir",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
|
|
|
|
// Read it back.
|
|
|
|
{
|
|
|
|
resp, err := opGet(&structs.IntentionQueryRequest{
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceName: "assay",
|
|
|
|
DestinationName: "test",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
got := resp.Intentions[0]
|
|
|
|
require.Equal(t, "original-3", got.Description)
|
|
|
|
require.Equal(t, map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
"zim": "gir",
|
|
|
|
}, got.Meta)
|
|
|
|
|
|
|
|
// Verify it is in the new-style.
|
|
|
|
require.Empty(t, got.ID)
|
|
|
|
require.True(t, got.CreatedAt.IsZero())
|
|
|
|
require.True(t, got.UpdatedAt.IsZero())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try again with NO metadata.
|
|
|
|
require.NoError(t, opApply(&structs.IntentionRequest{
|
|
|
|
Op: structs.IntentionOpUpsert,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceName: "assay",
|
|
|
|
DestinationName: "test",
|
|
|
|
Action: structs.IntentionActionDeny,
|
|
|
|
Description: "original-4",
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
|
|
|
|
// Read it back.
|
|
|
|
{
|
|
|
|
resp, err := opGet(&structs.IntentionQueryRequest{
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceName: "assay",
|
|
|
|
DestinationName: "test",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
got := resp.Intentions[0]
|
|
|
|
require.Equal(t, "original-4", got.Description)
|
|
|
|
require.Equal(t, map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
"zim": "gir",
|
|
|
|
}, got.Meta)
|
|
|
|
|
|
|
|
// Verify it is in the new-style.
|
|
|
|
require.Empty(t, got.ID)
|
|
|
|
require.True(t, got.CreatedAt.IsZero())
|
|
|
|
require.True(t, got.UpdatedAt.IsZero())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-04 08:39:56 +00:00
|
|
|
// Test apply with a deny ACL
|
|
|
|
func TestIntentionApply_aclDeny(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-04 08:39:56 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-04 08:39:56 +00:00
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-03-04 08:39:56 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-03-04 08:39:56 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-04 08:39:56 +00:00
|
|
|
|
2021-09-03 20:13:11 +00:00
|
|
|
rules := `
|
2021-09-22 22:24:56 +00:00
|
|
|
service "foobar" {
|
2018-03-04 08:39:56 +00:00
|
|
|
policy = "deny"
|
|
|
|
intentions = "write"
|
|
|
|
}`
|
2021-09-03 20:13:11 +00:00
|
|
|
token := createToken(t, codec, rules)
|
2018-03-04 08:39:56 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
|
|
|
ixn.Intention.DestinationName = "foobar"
|
|
|
|
|
|
|
|
// Create without a token should error since default deny
|
|
|
|
var reply string
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.True(acl.IsErrPermissionDenied(err))
|
2018-03-04 08:39:56 +00:00
|
|
|
|
|
|
|
// Now add the token and try again.
|
|
|
|
ixn.WriteRequest.Token = token
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 08:39:56 +00:00
|
|
|
|
|
|
|
// Read
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
2018-03-06 18:51:26 +00:00
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
QueryOptions: structs.QueryOptions{Token: "root"},
|
2018-03-04 08:39:56 +00:00
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp))
|
|
|
|
require.Len(resp.Intentions, 1)
|
2018-03-04 08:39:56 +00:00
|
|
|
actual := resp.Intentions[0]
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Equal(resp.Index, actual.ModifyIndex)
|
2018-03-04 08:39:56 +00:00
|
|
|
|
|
|
|
actual.CreateIndex, actual.ModifyIndex = 0, 0
|
|
|
|
actual.CreatedAt = ixn.Intention.CreatedAt
|
|
|
|
actual.UpdatedAt = ixn.Intention.UpdatedAt
|
2019-06-18 00:52:01 +00:00
|
|
|
actual.Hash = ixn.Intention.Hash
|
2020-10-06 18:24:05 +00:00
|
|
|
//nolint:staticcheck
|
2018-06-07 04:11:37 +00:00
|
|
|
ixn.Intention.UpdatePrecedence()
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Equal(ixn.Intention, actual)
|
2018-03-04 08:39:56 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-13 20:51:40 +00:00
|
|
|
func TestIntention_WildcardACLEnforcement(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2020-01-13 20:51:40 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2020-06-16 16:54:27 +00:00
|
|
|
_, srv, codec := testACLServerWithConfig(t, nil, false)
|
|
|
|
waitForLeaderEstablishment(t, srv)
|
2020-01-13 20:51:40 +00:00
|
|
|
|
|
|
|
// create some test policies.
|
|
|
|
|
|
|
|
writeToken, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service_prefix "" { policy = "deny" intentions = "write" }`)
|
|
|
|
require.NoError(t, err)
|
|
|
|
readToken, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service_prefix "" { policy = "deny" intentions = "read" }`)
|
|
|
|
require.NoError(t, err)
|
|
|
|
exactToken, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service "*" { policy = "deny" intentions = "write" }`)
|
|
|
|
require.NoError(t, err)
|
|
|
|
wildcardPrefixToken, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service_prefix "*" { policy = "deny" intentions = "write" }`)
|
|
|
|
require.NoError(t, err)
|
|
|
|
fooToken, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service "foo" { policy = "deny" intentions = "write" }`)
|
|
|
|
require.NoError(t, err)
|
|
|
|
denyToken, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service_prefix "" { policy = "deny" intentions = "deny" }`)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionCreate := func(t *testing.T, token string, dest string, deny bool) string {
|
2020-01-13 20:51:40 +00:00
|
|
|
t.Helper()
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
SourceNS: "default",
|
|
|
|
SourceName: "*",
|
|
|
|
DestinationNS: "default",
|
2020-10-06 18:24:05 +00:00
|
|
|
DestinationName: dest,
|
2020-01-13 20:51:40 +00:00
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: token},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
|
|
|
if deny {
|
|
|
|
require.Error(t, err)
|
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
|
|
|
return ""
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEmpty(t, reply)
|
|
|
|
return reply
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("deny-write-for-read-token", func(t *testing.T) {
|
|
|
|
// This tests ensures that tokens with only read access to all intentions
|
|
|
|
// cannot create a wildcard intention
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionCreate(t, readToken.SecretID, "*", true)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deny-write-for-exact-wildcard-rule", func(t *testing.T) {
|
|
|
|
// This test ensures that having a rules like:
|
|
|
|
// service "*" {
|
|
|
|
// intentions = "write"
|
|
|
|
// }
|
|
|
|
// will not actually allow creating an intention with a wildcard service name
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionCreate(t, exactToken.SecretID, "*", true)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deny-write-for-prefix-wildcard-rule", func(t *testing.T) {
|
|
|
|
// This test ensures that having a rules like:
|
|
|
|
// service_prefix "*" {
|
|
|
|
// intentions = "write"
|
|
|
|
// }
|
|
|
|
// will not actually allow creating an intention with a wildcard service name
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionCreate(t, wildcardPrefixToken.SecretID, "*", true)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
var intentionID string
|
|
|
|
allowWriteOk := t.Run("allow-write", func(t *testing.T) {
|
|
|
|
// tests that a token with all the required privileges can create
|
|
|
|
// intentions with a wildcard destination
|
2020-10-06 18:24:05 +00:00
|
|
|
intentionID = doIntentionCreate(t, writeToken.SecretID, "*", false)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
requireAllowWrite := func(t *testing.T) {
|
|
|
|
t.Helper()
|
|
|
|
if !allowWriteOk {
|
|
|
|
t.Skip("Skipping because the allow-write subtest failed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
doIntentionRead := func(t *testing.T, token string, deny bool) {
|
|
|
|
t.Helper()
|
|
|
|
requireAllowWrite(t)
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: intentionID,
|
|
|
|
QueryOptions: structs.QueryOptions{Token: token},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp)
|
|
|
|
if deny {
|
|
|
|
require.Error(t, err)
|
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
require.Equal(t, "*", resp.Intentions[0].DestinationName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("allow-read-for-write-token", func(t *testing.T) {
|
|
|
|
doIntentionRead(t, writeToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-read-for-read-token", func(t *testing.T) {
|
|
|
|
doIntentionRead(t, readToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-read-for-exact-wildcard-token", func(t *testing.T) {
|
|
|
|
// this is allowed because, the effect of the policy is to grant
|
|
|
|
// intention:write on the service named "*". When reading the
|
|
|
|
// intention we will validate that the token has read permissions
|
|
|
|
// for any intention that would match the wildcard.
|
|
|
|
doIntentionRead(t, exactToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-read-for-prefix-wildcard-token", func(t *testing.T) {
|
|
|
|
// this is allowed for the same reasons as for the
|
|
|
|
// exact-wildcard-token case
|
|
|
|
doIntentionRead(t, wildcardPrefixToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deny-read-for-deny-token", func(t *testing.T) {
|
|
|
|
doIntentionRead(t, denyToken.SecretID, true)
|
|
|
|
})
|
|
|
|
|
|
|
|
doIntentionList := func(t *testing.T, token string, deny bool) {
|
|
|
|
t.Helper()
|
|
|
|
requireAllowWrite(t)
|
2020-10-06 18:24:05 +00:00
|
|
|
req := &structs.IntentionListRequest{
|
2020-01-13 20:51:40 +00:00
|
|
|
Datacenter: "dc1",
|
|
|
|
QueryOptions: structs.QueryOptions{Token: token},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.List", req, &resp)
|
|
|
|
// even with permission denied this should return success but with an empty list
|
|
|
|
require.NoError(t, err)
|
|
|
|
if deny {
|
|
|
|
require.Empty(t, resp.Intentions)
|
|
|
|
} else {
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
require.Equal(t, "*", resp.Intentions[0].DestinationName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("allow-list-for-write-token", func(t *testing.T) {
|
|
|
|
doIntentionList(t, writeToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-list-for-read-token", func(t *testing.T) {
|
|
|
|
doIntentionList(t, readToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-list-for-exact-wildcard-token", func(t *testing.T) {
|
|
|
|
doIntentionList(t, exactToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-list-for-prefix-wildcard-token", func(t *testing.T) {
|
|
|
|
doIntentionList(t, wildcardPrefixToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deny-list-for-deny-token", func(t *testing.T) {
|
|
|
|
doIntentionList(t, denyToken.SecretID, true)
|
|
|
|
})
|
|
|
|
|
|
|
|
doIntentionMatch := func(t *testing.T, token string, deny bool) {
|
|
|
|
t.Helper()
|
|
|
|
requireAllowWrite(t)
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Match: &structs.IntentionQueryMatch{
|
|
|
|
Type: structs.IntentionMatchDestination,
|
|
|
|
Entries: []structs.IntentionMatchEntry{
|
2020-06-16 17:19:31 +00:00
|
|
|
{
|
2020-01-13 20:51:40 +00:00
|
|
|
Namespace: "default",
|
|
|
|
Name: "*",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
QueryOptions: structs.QueryOptions{Token: token},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentionMatches
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Match", req, &resp)
|
|
|
|
if deny {
|
|
|
|
require.Error(t, err)
|
|
|
|
require.Empty(t, resp.Matches)
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, resp.Matches, 1)
|
|
|
|
require.Len(t, resp.Matches[0], 1)
|
|
|
|
require.Equal(t, "*", resp.Matches[0][0].DestinationName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("allow-match-for-write-token", func(t *testing.T) {
|
|
|
|
doIntentionMatch(t, writeToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-match-for-read-token", func(t *testing.T) {
|
|
|
|
doIntentionMatch(t, readToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-match-for-exact-wildcard-token", func(t *testing.T) {
|
|
|
|
doIntentionMatch(t, exactToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-match-for-prefix-wildcard-token", func(t *testing.T) {
|
|
|
|
doIntentionMatch(t, wildcardPrefixToken.SecretID, false)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deny-match-for-deny-token", func(t *testing.T) {
|
|
|
|
doIntentionMatch(t, denyToken.SecretID, true)
|
|
|
|
})
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
// Since we can't rename the destination, create a new intention for the rest of this test.
|
|
|
|
wildIntentionID := intentionID
|
|
|
|
fooIntentionID := doIntentionCreate(t, writeToken.SecretID, "foo", false)
|
|
|
|
|
|
|
|
doIntentionUpdate := func(t *testing.T, token string, intentionID, dest, description string, deny bool) {
|
2020-01-13 20:51:40 +00:00
|
|
|
t.Helper()
|
|
|
|
requireAllowWrite(t)
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpUpdate,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
ID: intentionID,
|
|
|
|
SourceNS: "default",
|
|
|
|
SourceName: "*",
|
|
|
|
DestinationNS: "default",
|
|
|
|
DestinationName: dest,
|
2020-10-06 18:24:05 +00:00
|
|
|
Description: description,
|
2020-01-13 20:51:40 +00:00
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: token},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
|
|
|
if deny {
|
|
|
|
require.Error(t, err)
|
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("deny-update-for-foo-token", func(t *testing.T) {
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionUpdate(t, fooToken.SecretID, wildIntentionID, "*", "wild-desc", true)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-update-for-prefix-token", func(t *testing.T) {
|
2020-10-06 18:24:05 +00:00
|
|
|
// This tests that the prefix token can edit wildcard intentions and regular intentions.
|
|
|
|
doIntentionUpdate(t, writeToken.SecretID, fooIntentionID, "foo", "foo-desc-two", false)
|
|
|
|
doIntentionUpdate(t, writeToken.SecretID, wildIntentionID, "*", "wild-desc-two", false)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionDelete := func(t *testing.T, token string, intentionID string, deny bool) {
|
2020-01-13 20:51:40 +00:00
|
|
|
t.Helper()
|
|
|
|
requireAllowWrite(t)
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpDelete,
|
|
|
|
Intention: &structs.Intention{
|
|
|
|
ID: intentionID,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: token},
|
|
|
|
}
|
|
|
|
var reply string
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
|
|
|
if deny {
|
|
|
|
require.Error(t, err)
|
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("deny-delete-for-read-token", func(t *testing.T) {
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionDelete(t, readToken.SecretID, fooIntentionID, true)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deny-delete-for-exact-wildcard-rule", func(t *testing.T) {
|
|
|
|
// This test ensures that having a rules like:
|
|
|
|
// service "*" {
|
|
|
|
// intentions = "write"
|
|
|
|
// }
|
|
|
|
// will not actually allow deleting an intention with a wildcard service name
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionDelete(t, exactToken.SecretID, fooIntentionID, true)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deny-delete-for-prefix-wildcard-rule", func(t *testing.T) {
|
|
|
|
// This test ensures that having a rules like:
|
|
|
|
// service_prefix "*" {
|
|
|
|
// intentions = "write"
|
|
|
|
// }
|
|
|
|
// will not actually allow creating an intention with a wildcard service name
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionDelete(t, wildcardPrefixToken.SecretID, fooIntentionID, true)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("allow-delete", func(t *testing.T) {
|
|
|
|
// tests that a token with all the required privileges can delete
|
|
|
|
// intentions with a wildcard destination
|
2020-10-06 18:24:05 +00:00
|
|
|
doIntentionDelete(t, writeToken.SecretID, fooIntentionID, false)
|
2020-01-13 20:51:40 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-03-04 08:55:23 +00:00
|
|
|
// Test apply with delete and a default deny ACL
|
|
|
|
func TestIntentionApply_aclDelete(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-04 08:55:23 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-04 08:55:23 +00:00
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-03-04 08:55:23 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-03-04 08:55:23 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-04 08:55:23 +00:00
|
|
|
|
2021-09-03 20:13:11 +00:00
|
|
|
rules := `
|
2021-09-22 22:24:56 +00:00
|
|
|
service "foobar" {
|
2018-03-04 08:55:23 +00:00
|
|
|
policy = "deny"
|
|
|
|
intentions = "write"
|
|
|
|
}`
|
2021-09-03 20:13:11 +00:00
|
|
|
token := createToken(t, codec, rules)
|
2018-03-04 08:55:23 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
|
|
|
ixn.Intention.DestinationName = "foobar"
|
|
|
|
ixn.WriteRequest.Token = token
|
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 08:55:23 +00:00
|
|
|
|
|
|
|
// Try to do a delete with no token; this should get rejected.
|
|
|
|
ixn.Op = structs.IntentionOpDelete
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
ixn.WriteRequest.Token = ""
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.True(acl.IsErrPermissionDenied(err))
|
2018-03-04 08:55:23 +00:00
|
|
|
|
|
|
|
// Try again with the original token. This should go through.
|
|
|
|
ixn.WriteRequest.Token = token
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 08:55:23 +00:00
|
|
|
|
|
|
|
// Verify it is gone
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Contains(err.Error(), ErrIntentionNotFound.Error())
|
2018-03-04 08:55:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test apply with update and a default deny ACL
|
|
|
|
func TestIntentionApply_aclUpdate(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-04 08:55:23 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-04 08:55:23 +00:00
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-03-04 08:55:23 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-03-04 08:55:23 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-04 08:55:23 +00:00
|
|
|
|
2021-09-03 20:13:11 +00:00
|
|
|
rules := `
|
2021-09-22 22:24:56 +00:00
|
|
|
service "foobar" {
|
2018-03-04 08:55:23 +00:00
|
|
|
policy = "deny"
|
|
|
|
intentions = "write"
|
|
|
|
}`
|
2021-09-03 20:13:11 +00:00
|
|
|
token := createToken(t, codec, rules)
|
2018-03-04 08:55:23 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
|
|
|
ixn.Intention.DestinationName = "foobar"
|
|
|
|
ixn.WriteRequest.Token = token
|
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 08:55:23 +00:00
|
|
|
|
|
|
|
// Try to do an update without a token; this should get rejected.
|
|
|
|
ixn.Op = structs.IntentionOpUpdate
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
ixn.WriteRequest.Token = ""
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.True(acl.IsErrPermissionDenied(err))
|
2018-03-04 08:55:23 +00:00
|
|
|
|
|
|
|
// Try again with the original token; this should go through.
|
|
|
|
ixn.WriteRequest.Token = token
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 08:55:23 +00:00
|
|
|
}
|
|
|
|
|
2018-03-04 19:35:39 +00:00
|
|
|
// Test apply with a management token
|
|
|
|
func TestIntentionApply_aclManagement(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-04 19:35:39 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-04 19:35:39 +00:00
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-03-04 19:35:39 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-03-04 19:35:39 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-04 19:35:39 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
|
|
|
ixn.Intention.DestinationName = "foobar"
|
|
|
|
ixn.WriteRequest.Token = "root"
|
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 19:35:39 +00:00
|
|
|
ixn.Intention.ID = reply
|
|
|
|
|
|
|
|
// Update
|
|
|
|
ixn.Op = structs.IntentionOpUpdate
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 19:35:39 +00:00
|
|
|
|
|
|
|
// Delete
|
|
|
|
ixn.Op = structs.IntentionOpDelete
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 19:35:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test update changing the name where an ACL won't allow it
|
|
|
|
func TestIntentionApply_aclUpdateChange(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-04 19:35:39 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-03-04 19:35:39 +00:00
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-03-04 19:35:39 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-03-04 19:35:39 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-04 19:35:39 +00:00
|
|
|
|
2021-09-03 20:13:11 +00:00
|
|
|
rules := `
|
2021-09-22 22:24:56 +00:00
|
|
|
service "foobar" {
|
2018-03-04 19:35:39 +00:00
|
|
|
policy = "deny"
|
|
|
|
intentions = "write"
|
|
|
|
}`
|
2021-09-03 20:13:11 +00:00
|
|
|
token := createToken(t, codec, rules)
|
2018-03-04 19:35:39 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
|
|
|
ixn.Intention.DestinationName = "bar"
|
|
|
|
ixn.WriteRequest.Token = "root"
|
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 19:35:39 +00:00
|
|
|
|
|
|
|
// Try to do an update without a token; this should get rejected.
|
|
|
|
ixn.Op = structs.IntentionOpUpdate
|
|
|
|
ixn.Intention.ID = reply
|
|
|
|
ixn.Intention.DestinationName = "foo"
|
|
|
|
ixn.WriteRequest.Token = token
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.True(acl.IsErrPermissionDenied(err))
|
2018-03-04 19:35:39 +00:00
|
|
|
}
|
|
|
|
|
2018-03-04 19:53:52 +00:00
|
|
|
// Test reading with ACLs
|
|
|
|
func TestIntentionGet_acl(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-04 19:53:52 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2018-03-04 19:53:52 +00:00
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-03-04 19:53:52 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-03-04 19:53:52 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-04 19:53:52 +00:00
|
|
|
|
|
|
|
// Create an ACL with service write permissions. This will grant
|
2020-06-26 21:59:15 +00:00
|
|
|
// intentions read on either end of an intention.
|
|
|
|
token, err := upsertTestTokenWithPolicyRules(codec, "root", "dc1", `
|
|
|
|
service "foobar" {
|
|
|
|
policy = "write"
|
|
|
|
}`)
|
|
|
|
require.NoError(t, err)
|
2018-03-04 19:53:52 +00:00
|
|
|
|
|
|
|
// Setup a basic record to create
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
|
|
|
ixn.Intention.DestinationName = "foobar"
|
|
|
|
ixn.WriteRequest.Token = "root"
|
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-04 19:53:52 +00:00
|
|
|
ixn.Intention.ID = reply
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
t.Run("Read by ID without token should be error", func(t *testing.T) {
|
2018-03-04 19:53:52 +00:00
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
|
|
|
require.Len(t, resp.Intentions, 0)
|
|
|
|
})
|
2018-03-04 19:53:52 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
t.Run("Read by ID with token should work", func(t *testing.T) {
|
2018-03-04 19:53:52 +00:00
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
IntentionID: ixn.Intention.ID,
|
2020-06-26 21:59:15 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Token: token.SecretID},
|
2018-03-04 19:53:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentions
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Read by Exact without token should be error", func(t *testing.T) {
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceNS: structs.IntentionDefaultNamespace,
|
|
|
|
SourceName: "api",
|
|
|
|
DestinationNS: structs.IntentionDefaultNamespace,
|
|
|
|
DestinationName: "foobar",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp)
|
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
|
|
|
require.Len(t, resp.Intentions, 0)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Read by Exact with token should work", func(t *testing.T) {
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Exact: &structs.IntentionQueryExact{
|
|
|
|
SourceNS: structs.IntentionDefaultNamespace,
|
|
|
|
SourceName: "api",
|
|
|
|
DestinationNS: structs.IntentionDefaultNamespace,
|
|
|
|
DestinationName: "foobar",
|
|
|
|
},
|
|
|
|
QueryOptions: structs.QueryOptions{Token: token.SecretID},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Get", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
})
|
2018-03-04 19:53:52 +00:00
|
|
|
}
|
|
|
|
|
2018-02-28 18:04:27 +00:00
|
|
|
func TestIntentionList(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-02-28 18:04:27 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
require := require.New(t)
|
2018-02-28 18:04:27 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-02-28 18:04:27 +00:00
|
|
|
|
|
|
|
// Test with no intentions inserted yet
|
|
|
|
{
|
2020-10-06 18:24:05 +00:00
|
|
|
req := &structs.IntentionListRequest{
|
2018-02-28 18:04:27 +00:00
|
|
|
Datacenter: "dc1",
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(msgpackrpc.CallWithCodec(codec, "Intention.List", req, &resp))
|
|
|
|
require.NotNil(resp.Intentions)
|
|
|
|
require.Len(resp.Intentions, 0)
|
2018-02-28 18:04:27 +00:00
|
|
|
}
|
|
|
|
}
|
2018-03-02 21:40:03 +00:00
|
|
|
|
2018-03-05 02:32:28 +00:00
|
|
|
// Test listing with ACLs
|
|
|
|
func TestIntentionList_acl(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-05 02:32:28 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2020-04-07 15:48:44 +00:00
|
|
|
dir1, s1 := testServerWithConfig(t, testServerACLConfig(nil))
|
2018-03-05 02:32:28 +00:00
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-05 02:32:28 +00:00
|
|
|
|
2020-04-07 15:48:44 +00:00
|
|
|
token, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service_prefix "foo" { policy = "write" }`)
|
|
|
|
require.NoError(t, err)
|
2018-03-05 02:32:28 +00:00
|
|
|
|
|
|
|
// Create a few records
|
|
|
|
for _, name := range []string{"foobar", "bar", "baz"} {
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
2020-01-24 15:04:58 +00:00
|
|
|
ixn.Intention.SourceNS = "default"
|
|
|
|
ixn.Intention.DestinationNS = "default"
|
2018-03-05 02:32:28 +00:00
|
|
|
ixn.Intention.DestinationName = name
|
2020-04-07 15:48:44 +00:00
|
|
|
ixn.WriteRequest.Token = TestDefaultMasterToken
|
2018-03-05 02:32:28 +00:00
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-04-07 15:48:44 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test with no token
|
2020-04-07 15:48:44 +00:00
|
|
|
t.Run("no-token", func(t *testing.T) {
|
2020-10-06 18:24:05 +00:00
|
|
|
req := &structs.IntentionListRequest{
|
2018-03-05 02:32:28 +00:00
|
|
|
Datacenter: "dc1",
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-04-07 15:48:44 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.List", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 0)
|
|
|
|
})
|
2018-03-05 02:32:28 +00:00
|
|
|
|
|
|
|
// Test with management token
|
2020-04-07 15:48:44 +00:00
|
|
|
t.Run("master-token", func(t *testing.T) {
|
2020-10-06 18:24:05 +00:00
|
|
|
req := &structs.IntentionListRequest{
|
2018-03-05 02:32:28 +00:00
|
|
|
Datacenter: "dc1",
|
2020-04-07 15:48:44 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Token: TestDefaultMasterToken},
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-04-07 15:48:44 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.List", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 3)
|
|
|
|
})
|
2018-03-05 02:32:28 +00:00
|
|
|
|
|
|
|
// Test with user token
|
2020-04-07 15:48:44 +00:00
|
|
|
t.Run("user-token", func(t *testing.T) {
|
2020-10-06 18:24:05 +00:00
|
|
|
req := &structs.IntentionListRequest{
|
2018-03-05 02:32:28 +00:00
|
|
|
Datacenter: "dc1",
|
2020-04-07 15:48:44 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Token: token.SecretID},
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentions
|
2020-04-07 15:48:44 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.List", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("filtered", func(t *testing.T) {
|
2020-10-06 18:24:05 +00:00
|
|
|
req := &structs.IntentionListRequest{
|
2020-04-07 15:48:44 +00:00
|
|
|
Datacenter: "dc1",
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Token: TestDefaultMasterToken,
|
|
|
|
Filter: "DestinationName == foobar",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.IndexedIntentions
|
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.List", req, &resp))
|
|
|
|
require.Len(t, resp.Intentions, 1)
|
|
|
|
})
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
|
2018-03-02 21:40:03 +00:00
|
|
|
// Test basic matching. We don't need to exhaustively test inputs since this
|
|
|
|
// is tested in the agent/consul/state package.
|
|
|
|
func TestIntentionMatch_good(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-02 21:40:03 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:35:20 +00:00
|
|
|
|
2018-03-02 21:40:03 +00:00
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-03-02 21:40:03 +00:00
|
|
|
|
|
|
|
// Create some records
|
|
|
|
{
|
|
|
|
insert := [][]string{
|
2020-06-26 21:59:15 +00:00
|
|
|
{"default", "*", "default", "*"},
|
|
|
|
{"default", "*", "default", "bar"},
|
|
|
|
{"default", "*", "default", "baz"}, // shouldn't match
|
2018-03-02 21:40:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, v := range insert {
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
2018-04-05 11:53:42 +00:00
|
|
|
SourceNS: v[0],
|
|
|
|
SourceName: v[1],
|
|
|
|
DestinationNS: v[2],
|
|
|
|
DestinationName: v[3],
|
2018-03-03 17:43:37 +00:00
|
|
|
Action: structs.IntentionActionAllow,
|
2018-03-02 21:40:03 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-02 21:40:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Match
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Match: &structs.IntentionQueryMatch{
|
|
|
|
Type: structs.IntentionMatchDestination,
|
|
|
|
Entries: []structs.IntentionMatchEntry{
|
2020-06-26 21:59:15 +00:00
|
|
|
{Name: "bar"},
|
2018-03-02 21:40:03 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentionMatches
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Nil(t, msgpackrpc.CallWithCodec(codec, "Intention.Match", req, &resp))
|
|
|
|
require.Len(t, resp.Matches, 1)
|
2018-03-02 21:40:03 +00:00
|
|
|
|
2018-04-05 11:53:42 +00:00
|
|
|
expected := [][]string{
|
2020-06-26 21:59:15 +00:00
|
|
|
{"default", "*", "default", "bar"},
|
|
|
|
{"default", "*", "default", "*"},
|
2018-04-05 11:53:42 +00:00
|
|
|
}
|
2018-03-02 21:40:03 +00:00
|
|
|
var actual [][]string
|
|
|
|
for _, ixn := range resp.Matches[0] {
|
2018-04-05 11:53:42 +00:00
|
|
|
actual = append(actual, []string{
|
|
|
|
ixn.SourceNS,
|
|
|
|
ixn.SourceName,
|
|
|
|
ixn.DestinationNS,
|
|
|
|
ixn.DestinationName,
|
|
|
|
})
|
2018-03-02 21:40:03 +00:00
|
|
|
}
|
2020-06-26 21:59:15 +00:00
|
|
|
require.Equal(t, expected, actual)
|
2018-03-02 21:40:03 +00:00
|
|
|
}
|
2018-03-05 02:32:28 +00:00
|
|
|
|
|
|
|
// Test matching with ACLs
|
|
|
|
func TestIntentionMatch_acl(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-03-05 02:32:28 +00:00
|
|
|
t.Parallel()
|
2018-03-06 18:51:26 +00:00
|
|
|
|
2020-06-16 16:54:27 +00:00
|
|
|
_, srv, codec := testACLServerWithConfig(t, nil, false)
|
|
|
|
waitForLeaderEstablishment(t, srv)
|
2018-03-05 02:32:28 +00:00
|
|
|
|
2020-01-24 15:04:58 +00:00
|
|
|
token, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service "bar" { policy = "write" }`)
|
|
|
|
require.NoError(t, err)
|
2018-03-05 02:32:28 +00:00
|
|
|
|
|
|
|
// Create some records
|
|
|
|
{
|
2020-01-24 15:04:58 +00:00
|
|
|
insert := []string{
|
|
|
|
"*",
|
|
|
|
"bar",
|
|
|
|
"baz",
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, v := range insert {
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: structs.TestIntention(t),
|
|
|
|
}
|
2020-01-24 15:04:58 +00:00
|
|
|
ixn.Intention.DestinationName = v
|
|
|
|
ixn.WriteRequest.Token = TestDefaultMasterToken
|
2018-03-05 02:32:28 +00:00
|
|
|
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-01-24 15:04:58 +00:00
|
|
|
require.Nil(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test with no token
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Match: &structs.IntentionQueryMatch{
|
|
|
|
Type: structs.IntentionMatchDestination,
|
|
|
|
Entries: []structs.IntentionMatchEntry{
|
|
|
|
{
|
2020-01-24 15:04:58 +00:00
|
|
|
Namespace: "default",
|
2018-03-05 02:32:28 +00:00
|
|
|
Name: "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentionMatches
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Match", req, &resp)
|
2020-01-24 15:04:58 +00:00
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
|
|
|
require.Len(t, resp.Matches, 0)
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test with proper token
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Match: &structs.IntentionQueryMatch{
|
|
|
|
Type: structs.IntentionMatchDestination,
|
|
|
|
Entries: []structs.IntentionMatchEntry{
|
|
|
|
{
|
2020-01-24 15:04:58 +00:00
|
|
|
Namespace: "default",
|
2018-03-05 02:32:28 +00:00
|
|
|
Name: "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-01-24 15:04:58 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Token: token.SecretID},
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
var resp structs.IndexedIntentionMatches
|
2020-01-24 15:04:58 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Match", req, &resp))
|
|
|
|
require.Len(t, resp.Matches, 1)
|
2018-03-05 02:32:28 +00:00
|
|
|
|
2020-01-24 15:04:58 +00:00
|
|
|
expected := []string{"bar", "*"}
|
|
|
|
var actual []string
|
2018-03-05 02:32:28 +00:00
|
|
|
for _, ixn := range resp.Matches[0] {
|
2020-01-24 15:04:58 +00:00
|
|
|
actual = append(actual, ixn.DestinationName)
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
|
2020-01-24 15:04:58 +00:00
|
|
|
require.ElementsMatch(t, expected, actual)
|
2018-03-05 02:32:28 +00:00
|
|
|
}
|
|
|
|
}
|
2018-05-11 05:35:47 +00:00
|
|
|
|
2018-05-11 16:19:22 +00:00
|
|
|
// Test the Check method defaults to allow with no ACL set.
|
|
|
|
func TestIntentionCheck_defaultNoACL(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-05-11 05:35:47 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
|
|
|
// Test
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
2018-05-11 16:19:22 +00:00
|
|
|
Check: &structs.IntentionQueryCheck{
|
2018-05-11 05:35:47 +00:00
|
|
|
SourceName: "bar",
|
|
|
|
DestinationName: "qux",
|
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
}
|
2018-05-11 16:19:22 +00:00
|
|
|
var resp structs.IntentionQueryCheckResponse
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Check", req, &resp))
|
|
|
|
require.True(t, resp.Allowed)
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
|
2020-05-29 18:19:16 +00:00
|
|
|
// Test the Check method defaults to deny with allowlist ACLs.
|
2018-05-11 16:19:22 +00:00
|
|
|
func TestIntentionCheck_defaultACLDeny(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-05-11 05:35:47 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-05-11 05:35:47 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-05-11 05:35:47 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
2018-05-11 16:19:22 +00:00
|
|
|
// Check
|
2018-05-11 05:35:47 +00:00
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
2018-05-11 16:19:22 +00:00
|
|
|
Check: &structs.IntentionQueryCheck{
|
2018-05-11 05:35:47 +00:00
|
|
|
SourceName: "bar",
|
|
|
|
DestinationName: "qux",
|
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
req.Token = "root"
|
2018-05-11 16:19:22 +00:00
|
|
|
var resp structs.IntentionQueryCheckResponse
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Check", req, &resp))
|
|
|
|
require.False(t, resp.Allowed)
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
|
2020-05-29 18:19:16 +00:00
|
|
|
// Test the Check method defaults to deny with denylist ACLs.
|
2018-05-11 16:19:22 +00:00
|
|
|
func TestIntentionCheck_defaultACLAllow(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-05-11 05:35:47 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-05-11 05:35:47 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "allow"
|
2018-05-11 05:35:47 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
2018-05-11 16:19:22 +00:00
|
|
|
// Check
|
2018-05-11 05:35:47 +00:00
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
2018-05-11 16:19:22 +00:00
|
|
|
Check: &structs.IntentionQueryCheck{
|
2018-05-11 05:35:47 +00:00
|
|
|
SourceName: "bar",
|
|
|
|
DestinationName: "qux",
|
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
req.Token = "root"
|
2018-05-11 16:19:22 +00:00
|
|
|
var resp structs.IntentionQueryCheckResponse
|
2020-06-26 21:59:15 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Check", req, &resp))
|
|
|
|
require.True(t, resp.Allowed)
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
|
2018-05-11 16:19:22 +00:00
|
|
|
// Test the Check method requires service:read permission.
|
|
|
|
func TestIntentionCheck_aclDeny(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-05-11 05:35:47 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
2021-08-06 22:00:58 +00:00
|
|
|
c.PrimaryDatacenter = "dc1"
|
2018-10-19 16:04:07 +00:00
|
|
|
c.ACLsEnabled = true
|
2018-05-11 05:35:47 +00:00
|
|
|
c.ACLMasterToken = "root"
|
2021-08-06 22:39:39 +00:00
|
|
|
c.ACLResolverSettings.ACLDefaultPolicy = "deny"
|
2018-05-11 05:35:47 +00:00
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2020-06-26 21:59:15 +00:00
|
|
|
waitForLeaderEstablishment(t, s1)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
2021-09-03 20:13:11 +00:00
|
|
|
rules := `
|
2018-05-11 05:35:47 +00:00
|
|
|
service "bar" {
|
|
|
|
policy = "read"
|
|
|
|
}`
|
2021-09-03 20:13:11 +00:00
|
|
|
token := createToken(t, codec, rules)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
2018-05-11 16:19:22 +00:00
|
|
|
// Check
|
2018-05-11 05:35:47 +00:00
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
2018-05-11 16:19:22 +00:00
|
|
|
Check: &structs.IntentionQueryCheck{
|
2018-05-11 05:35:47 +00:00
|
|
|
SourceName: "qux",
|
|
|
|
DestinationName: "baz",
|
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
req.Token = token
|
2018-05-11 16:19:22 +00:00
|
|
|
var resp structs.IntentionQueryCheckResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Intention.Check", req, &resp)
|
2020-06-26 21:59:15 +00:00
|
|
|
require.True(t, acl.IsErrPermissionDenied(err))
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
|
2018-05-11 16:19:22 +00:00
|
|
|
// Test the Check method returns allow/deny properly.
|
|
|
|
func TestIntentionCheck_match(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2018-05-11 05:35:47 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2020-06-16 16:54:27 +00:00
|
|
|
_, srv, codec := testACLServerWithConfig(t, nil, false)
|
|
|
|
waitForLeaderEstablishment(t, srv)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
2020-01-13 20:51:40 +00:00
|
|
|
token, err := upsertTestTokenWithPolicyRules(codec, TestDefaultMasterToken, "dc1", `service "api" { policy = "read" }`)
|
|
|
|
require.NoError(t, err)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
|
|
|
// Create some intentions
|
|
|
|
{
|
|
|
|
insert := [][]string{
|
2020-01-13 20:51:40 +00:00
|
|
|
{"web", "db"},
|
|
|
|
{"api", "db"},
|
|
|
|
{"web", "api"},
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, v := range insert {
|
|
|
|
ixn := structs.IntentionRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.IntentionOpCreate,
|
|
|
|
Intention: &structs.Intention{
|
2020-01-13 20:51:40 +00:00
|
|
|
SourceNS: "default",
|
|
|
|
SourceName: v[0],
|
|
|
|
DestinationNS: "default",
|
|
|
|
DestinationName: v[1],
|
2018-05-11 05:35:47 +00:00
|
|
|
Action: structs.IntentionActionAllow,
|
|
|
|
},
|
2020-01-13 20:51:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Token: TestDefaultMasterToken},
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
// Create
|
|
|
|
var reply string
|
2020-01-13 20:51:40 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Apply", &ixn, &reply))
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-11 16:19:22 +00:00
|
|
|
// Check
|
2018-05-11 05:35:47 +00:00
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
2018-05-11 16:19:22 +00:00
|
|
|
Check: &structs.IntentionQueryCheck{
|
2020-01-13 20:51:40 +00:00
|
|
|
SourceNS: "default",
|
|
|
|
SourceName: "web",
|
|
|
|
DestinationNS: "default",
|
|
|
|
DestinationName: "api",
|
2018-05-11 05:35:47 +00:00
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
2020-01-13 20:51:40 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Token: token.SecretID},
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
2018-05-11 16:19:22 +00:00
|
|
|
var resp structs.IntentionQueryCheckResponse
|
2020-01-13 20:51:40 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Check", req, &resp))
|
|
|
|
require.True(t, resp.Allowed)
|
2018-05-11 05:35:47 +00:00
|
|
|
|
|
|
|
// Test no match for sanity
|
|
|
|
{
|
|
|
|
req := &structs.IntentionQueryRequest{
|
|
|
|
Datacenter: "dc1",
|
2018-05-11 16:19:22 +00:00
|
|
|
Check: &structs.IntentionQueryCheck{
|
2020-01-13 20:51:40 +00:00
|
|
|
SourceNS: "default",
|
|
|
|
SourceName: "db",
|
|
|
|
DestinationNS: "default",
|
|
|
|
DestinationName: "api",
|
2018-05-11 05:35:47 +00:00
|
|
|
SourceType: structs.IntentionSourceConsul,
|
|
|
|
},
|
2020-01-13 20:51:40 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Token: token.SecretID},
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
2018-05-11 16:19:22 +00:00
|
|
|
var resp structs.IntentionQueryCheckResponse
|
2020-01-13 20:51:40 +00:00
|
|
|
require.NoError(t, msgpackrpc.CallWithCodec(codec, "Intention.Check", req, &resp))
|
|
|
|
require.False(t, resp.Allowed)
|
2018-05-11 05:35:47 +00:00
|
|
|
}
|
|
|
|
}
|
2020-10-06 18:24:05 +00:00
|
|
|
|
|
|
|
func TestEqualStringMaps(t *testing.T) {
|
|
|
|
m1 := map[string]string{
|
|
|
|
"foo": "a",
|
|
|
|
}
|
|
|
|
m2 := map[string]string{
|
|
|
|
"foo": "a",
|
|
|
|
"bar": "b",
|
|
|
|
}
|
|
|
|
var m3 map[string]string
|
|
|
|
|
|
|
|
m4 := map[string]string{
|
|
|
|
"dog": "",
|
|
|
|
}
|
|
|
|
|
|
|
|
m5 := map[string]string{
|
|
|
|
"cat": "",
|
|
|
|
}
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
a map[string]string
|
|
|
|
b map[string]string
|
|
|
|
result bool
|
|
|
|
}{
|
|
|
|
{m1, m1, true},
|
|
|
|
{m2, m2, true},
|
|
|
|
{m1, m2, false},
|
|
|
|
{m2, m1, false},
|
|
|
|
{m2, m2, true},
|
|
|
|
{m3, m1, false},
|
|
|
|
{m3, m3, true},
|
|
|
|
{m4, m5, false},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, test := range tests {
|
|
|
|
actual := equalStringMaps(test.a, test.b)
|
|
|
|
if actual != test.result {
|
|
|
|
t.Fatalf("case %d, expected %v, got %v", i, test.result, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|