d0e2badbae
The result will still pass gofmtcheck and won't trigger additional changes if someone isn't using goimports, but it will avoid the piecemeal imports changes we've been seeing.
219 lines
5.4 KiB
Go
219 lines
5.4 KiB
Go
package agent
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
"github.com/aws/aws-sdk-go/aws/session"
|
|
"github.com/aws/aws-sdk-go/service/sts"
|
|
hclog "github.com/hashicorp/go-hclog"
|
|
uuid "github.com/hashicorp/go-uuid"
|
|
"github.com/hashicorp/vault/api"
|
|
vaultaws "github.com/hashicorp/vault/builtin/credential/aws"
|
|
"github.com/hashicorp/vault/command/agent/auth"
|
|
agentaws "github.com/hashicorp/vault/command/agent/auth/aws"
|
|
"github.com/hashicorp/vault/command/agent/sink"
|
|
"github.com/hashicorp/vault/command/agent/sink/file"
|
|
"github.com/hashicorp/vault/helper/logging"
|
|
vaulthttp "github.com/hashicorp/vault/http"
|
|
"github.com/hashicorp/vault/logical"
|
|
"github.com/hashicorp/vault/vault"
|
|
)
|
|
|
|
const (
|
|
// These are the access key and secret that should be used when calling "AssumeRole"
|
|
// for the given AWS_TEST_ROLE_ARN.
|
|
envVarAwsTestAccessKey = "AWS_TEST_ACCESS_KEY"
|
|
envVarAwsTestSecretKey = "AWS_TEST_SECRET_KEY"
|
|
envVarAwsTestRoleArn = "AWS_TEST_ROLE_ARN"
|
|
|
|
// The AWS SDK doesn't export its standard env vars so they're captured here.
|
|
// These are used for the duration of the test to make sure the agent is able to
|
|
// pick up creds from the env.
|
|
//
|
|
// To run this test, do not set these. Only the above ones need to be set.
|
|
envVarAwsAccessKey = "AWS_ACCESS_KEY_ID"
|
|
envVarAwsSecretKey = "AWS_SECRET_ACCESS_KEY"
|
|
envVarAwsSessionToken = "AWS_SESSION_TOKEN"
|
|
)
|
|
|
|
func TestAWSEndToEnd(t *testing.T) {
|
|
if !runAcceptanceTests {
|
|
t.SkipNow()
|
|
}
|
|
|
|
logger := logging.NewVaultLogger(hclog.Trace)
|
|
coreConfig := &vault.CoreConfig{
|
|
Logger: logger,
|
|
CredentialBackends: map[string]logical.Factory{
|
|
"aws": vaultaws.Factory,
|
|
},
|
|
}
|
|
cluster := vault.NewTestCluster(t, coreConfig, &vault.TestClusterOptions{
|
|
HandlerFunc: vaulthttp.Handler,
|
|
})
|
|
cluster.Start()
|
|
defer cluster.Cleanup()
|
|
|
|
vault.TestWaitActive(t, cluster.Cores[0].Core)
|
|
client := cluster.Cores[0].Client
|
|
|
|
// Setup Vault
|
|
if err := client.Sys().EnableAuthWithOptions("aws", &api.EnableAuthOptions{
|
|
Type: "aws",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if _, err := client.Logical().Write("auth/aws/role/test", map[string]interface{}{
|
|
"auth_type": "iam",
|
|
"policies": "default",
|
|
// Retain thru the account number of the given arn and wildcard the rest.
|
|
"bound_iam_principal_arn": os.Getenv(envVarAwsTestRoleArn)[:25] + "*",
|
|
}); err != nil {
|
|
fmt.Println(err)
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
timer := time.AfterFunc(30*time.Second, func() {
|
|
cancelFunc()
|
|
})
|
|
defer timer.Stop()
|
|
|
|
// We're going to feed aws auth creds via env variables.
|
|
if err := setAwsEnvCreds(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer func() {
|
|
if err := unsetAwsEnvCreds(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}()
|
|
|
|
am, err := agentaws.NewAWSAuthMethod(&auth.AuthConfig{
|
|
Logger: logger.Named("auth.aws"),
|
|
MountPath: "auth/aws",
|
|
Config: map[string]interface{}{
|
|
"role": "test",
|
|
"type": "iam",
|
|
"credential_poll_interval": 1,
|
|
},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ahConfig := &auth.AuthHandlerConfig{
|
|
Logger: logger.Named("auth.handler"),
|
|
Client: client,
|
|
}
|
|
|
|
ah := auth.NewAuthHandler(ahConfig)
|
|
go ah.Run(ctx, am)
|
|
defer func() {
|
|
<-ah.DoneCh
|
|
}()
|
|
|
|
tmpFile, err := ioutil.TempFile("", "auth.tokensink.test.")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tokenSinkFileName := tmpFile.Name()
|
|
tmpFile.Close()
|
|
os.Remove(tokenSinkFileName)
|
|
t.Logf("output: %s", tokenSinkFileName)
|
|
|
|
config := &sink.SinkConfig{
|
|
Logger: logger.Named("sink.file"),
|
|
Config: map[string]interface{}{
|
|
"path": tokenSinkFileName,
|
|
},
|
|
WrapTTL: 10 * time.Second,
|
|
}
|
|
|
|
fs, err := file.NewFileSink(config)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
config.Sink = fs
|
|
|
|
ss := sink.NewSinkServer(&sink.SinkServerConfig{
|
|
Logger: logger.Named("sink.server"),
|
|
Client: client,
|
|
})
|
|
go ss.Run(ctx, ah.OutputCh, []*sink.SinkConfig{config})
|
|
defer func() {
|
|
<-ss.DoneCh
|
|
}()
|
|
|
|
if stat, err := os.Lstat(tokenSinkFileName); err == nil {
|
|
t.Fatalf("expected err but got %s", stat)
|
|
} else if !os.IsNotExist(err) {
|
|
t.Fatal("expected notexist err")
|
|
}
|
|
|
|
// Wait 2 seconds for the env variables to be detected and an auth to be generated.
|
|
time.Sleep(time.Second * 2)
|
|
|
|
token, err := readToken(tokenSinkFileName)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if token.Token == "" {
|
|
t.Fatal("expected token but didn't receive it")
|
|
}
|
|
}
|
|
|
|
func setAwsEnvCreds() error {
|
|
|
|
cfg := &aws.Config{
|
|
Credentials: credentials.NewStaticCredentials(os.Getenv(envVarAwsTestAccessKey), os.Getenv(envVarAwsTestSecretKey), ""),
|
|
}
|
|
sess, err := session.NewSession(cfg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
client := sts.New(sess)
|
|
|
|
roleArn := os.Getenv(envVarAwsTestRoleArn)
|
|
uid, err := uuid.GenerateUUID()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
input := &sts.AssumeRoleInput{
|
|
RoleArn: &roleArn,
|
|
RoleSessionName: &uid,
|
|
}
|
|
output, err := client.AssumeRole(input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := os.Setenv(envVarAwsAccessKey, *output.Credentials.AccessKeyId); err != nil {
|
|
return err
|
|
}
|
|
if err := os.Setenv(envVarAwsSecretKey, *output.Credentials.SecretAccessKey); err != nil {
|
|
return err
|
|
}
|
|
return os.Setenv(envVarAwsSessionToken, *output.Credentials.SessionToken)
|
|
}
|
|
|
|
func unsetAwsEnvCreds() error {
|
|
if err := os.Unsetenv(envVarAwsAccessKey); err != nil {
|
|
return err
|
|
}
|
|
if err := os.Unsetenv(envVarAwsSecretKey); err != nil {
|
|
return err
|
|
}
|
|
return os.Unsetenv(envVarAwsSessionToken)
|
|
}
|