2022-07-01 15:15:49 +00:00
|
|
|
package proxycfgglue
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
|
|
"github.com/hashicorp/consul/acl/resolver"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/state"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/stream"
|
|
|
|
"github.com/hashicorp/consul/agent/proxycfg"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
"github.com/hashicorp/consul/agent/submatview"
|
|
|
|
"github.com/hashicorp/consul/proto/pbsubscribe"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestServerIntentions(t *testing.T) {
|
|
|
|
const (
|
|
|
|
serviceName = "web"
|
|
|
|
index = 1
|
|
|
|
)
|
|
|
|
|
|
|
|
logger := hclog.NewNullLogger()
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
store := submatview.NewStore(logger)
|
|
|
|
go store.Run(ctx)
|
|
|
|
|
|
|
|
publisher := stream.NewEventPublisher(10 * time.Second)
|
|
|
|
publisher.RegisterHandler(pbsubscribe.Topic_ServiceIntentions,
|
|
|
|
func(stream.SubscribeRequest, stream.SnapshotAppender) (uint64, error) { return index, nil },
|
|
|
|
false)
|
|
|
|
go publisher.Run(ctx)
|
|
|
|
|
|
|
|
intentions := ServerIntentions(ServerDataSourceDeps{
|
2022-07-01 15:18:33 +00:00
|
|
|
ACLResolver: staticResolver{acl.ManageAll()},
|
2022-07-01 15:15:49 +00:00
|
|
|
ViewStore: store,
|
|
|
|
EventPublisher: publisher,
|
|
|
|
Logger: logger,
|
|
|
|
})
|
|
|
|
|
|
|
|
eventCh := make(chan proxycfg.UpdateEvent)
|
|
|
|
require.NoError(t, intentions.Notify(ctx, &structs.ServiceSpecificRequest{
|
|
|
|
ServiceName: serviceName,
|
|
|
|
EnterpriseMeta: *acl.DefaultEnterpriseMeta(),
|
|
|
|
}, "", eventCh))
|
|
|
|
|
|
|
|
// Wait for the initial snapshots.
|
|
|
|
select {
|
|
|
|
case <-eventCh:
|
|
|
|
case <-time.After(100 * time.Millisecond):
|
|
|
|
t.Fatal("timeout waiting for event")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Publish an explicit intention on the service.
|
|
|
|
publisher.Publish([]stream.Event{
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceIntentions,
|
|
|
|
Index: index + 1,
|
|
|
|
Payload: state.EventPayloadConfigEntry{
|
|
|
|
Op: pbsubscribe.ConfigEntryUpdate_Upsert,
|
|
|
|
Value: &structs.ServiceIntentionsConfigEntry{
|
|
|
|
Name: serviceName,
|
|
|
|
Sources: []*structs.SourceIntention{
|
|
|
|
{Name: "db", Action: structs.IntentionActionAllow, Precedence: 1},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
result, ok := event.Result.(structs.Intentions)
|
|
|
|
require.Truef(t, ok, "expected Intentions, got: %T", event.Result)
|
|
|
|
require.Len(t, result, 1)
|
|
|
|
|
|
|
|
intention := result[0]
|
|
|
|
require.Equal(t, intention.DestinationName, serviceName)
|
|
|
|
require.Equal(t, intention.SourceName, "db")
|
|
|
|
case <-time.After(100 * time.Millisecond):
|
|
|
|
t.Fatal("timeout waiting for event")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Publish a wildcard intention.
|
|
|
|
publisher.Publish([]stream.Event{
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceIntentions,
|
|
|
|
Index: index + 2,
|
|
|
|
Payload: state.EventPayloadConfigEntry{
|
|
|
|
Op: pbsubscribe.ConfigEntryUpdate_Upsert,
|
|
|
|
Value: &structs.ServiceIntentionsConfigEntry{
|
|
|
|
Name: structs.WildcardSpecifier,
|
|
|
|
Sources: []*structs.SourceIntention{
|
|
|
|
{Name: structs.WildcardSpecifier, Action: structs.IntentionActionAllow, Precedence: 0},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
result, ok := event.Result.(structs.Intentions)
|
|
|
|
require.Truef(t, ok, "expected Intentions, got: %T", event.Result)
|
|
|
|
require.Len(t, result, 2)
|
|
|
|
|
|
|
|
a := result[0]
|
|
|
|
require.Equal(t, a.DestinationName, serviceName)
|
|
|
|
require.Equal(t, a.SourceName, "db")
|
|
|
|
|
|
|
|
b := result[1]
|
|
|
|
require.Equal(t, b.DestinationName, structs.WildcardSpecifier)
|
|
|
|
require.Equal(t, b.SourceName, structs.WildcardSpecifier)
|
|
|
|
case <-time.After(100 * time.Millisecond):
|
|
|
|
t.Fatal("timeout waiting for event")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Publish a delete event and observe the intention is removed from the results.
|
|
|
|
publisher.Publish([]stream.Event{
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceIntentions,
|
|
|
|
Index: index + 3,
|
|
|
|
Payload: state.EventPayloadConfigEntry{
|
|
|
|
Op: pbsubscribe.ConfigEntryUpdate_Delete,
|
|
|
|
Value: &structs.ServiceIntentionsConfigEntry{
|
|
|
|
Name: serviceName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
result, ok := event.Result.(structs.Intentions)
|
|
|
|
require.Truef(t, ok, "expected Intentions, got: %T", event.Result)
|
|
|
|
require.Len(t, result, 1)
|
|
|
|
case <-time.After(100 * time.Millisecond):
|
|
|
|
t.Fatal("timeout waiting for event")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-01 15:18:33 +00:00
|
|
|
type staticResolver struct {
|
|
|
|
authorizer acl.Authorizer
|
|
|
|
}
|
2022-07-01 15:15:49 +00:00
|
|
|
|
2022-07-01 15:18:33 +00:00
|
|
|
func (r staticResolver) ResolveTokenAndDefaultMeta(token string, entMeta *acl.EnterpriseMeta, authzContext *acl.AuthorizerContext) (resolver.Result, error) {
|
|
|
|
return resolver.Result{Authorizer: r.authorizer}, nil
|
2022-07-01 15:15:49 +00:00
|
|
|
}
|