1
|
|
|
package credentials |
2
|
|
|
|
3
|
|
|
import ( |
4
|
|
|
"os" |
5
|
|
|
"testing" |
6
|
|
|
|
7
|
|
|
"github.com/alibabacloud-go/tea/tea" |
8
|
|
|
"github.com/aliyun/credentials-go/credentials/internal/utils" |
9
|
|
|
"github.com/aliyun/credentials-go/credentials/request" |
10
|
|
|
"github.com/stretchr/testify/assert" |
11
|
|
|
) |
12
|
|
|
|
13
|
|
|
var privatekey = `---- |
14
|
|
|
this is privatekey` |
15
|
|
|
|
16
|
|
|
func TestConfig(t *testing.T) { |
17
|
|
|
config := new(Config) |
18
|
|
|
assert.Equal(t, "{\n \"type\": null,\n \"access_key_id\": null,\n \"access_key_secret\": null,\n \"oidc_provider_arn\": null,\n \"oidc_token\": null,\n \"role_arn\": null,\n \"role_session_name\": null,\n \"public_key_id\": null,\n \"role_name\": null,\n \"enable_imds_v2\": null,\n \"disable_imds_v1\": null,\n \"metadata_token_duration\": null,\n \"session_expiration\": null,\n \"private_key_file\": null,\n \"bearer_token\": null,\n \"security_token\": null,\n \"role_session_expiratioon\": null,\n \"policy\": null,\n \"host\": null,\n \"timeout\": null,\n \"connect_timeout\": null,\n \"proxy\": null,\n \"inAdvanceScale\": null,\n \"url\": null,\n \"sts_endpoint\": null,\n \"external_id\": null\n}", config.String()) |
19
|
|
|
assert.Equal(t, "{\n \"type\": null,\n \"access_key_id\": null,\n \"access_key_secret\": null,\n \"oidc_provider_arn\": null,\n \"oidc_token\": null,\n \"role_arn\": null,\n \"role_session_name\": null,\n \"public_key_id\": null,\n \"role_name\": null,\n \"enable_imds_v2\": null,\n \"disable_imds_v1\": null,\n \"metadata_token_duration\": null,\n \"session_expiration\": null,\n \"private_key_file\": null,\n \"bearer_token\": null,\n \"security_token\": null,\n \"role_session_expiratioon\": null,\n \"policy\": null,\n \"host\": null,\n \"timeout\": null,\n \"connect_timeout\": null,\n \"proxy\": null,\n \"inAdvanceScale\": null,\n \"url\": null,\n \"sts_endpoint\": null,\n \"external_id\": null\n}", config.GoString()) |
20
|
|
|
|
21
|
|
|
config.SetSTSEndpoint("sts.cn-hangzhou.aliyuncs.com") |
22
|
|
|
assert.Equal(t, "sts.cn-hangzhou.aliyuncs.com", *config.STSEndpoint) |
23
|
|
|
} |
24
|
|
|
|
25
|
|
|
func TestNewCredentialWithNil(t *testing.T) { |
26
|
|
|
rollback := utils.Memory(EnvVarAccessKeyId, EnvVarAccessKeySecret, "ALIBABA_CLOUD_CLI_PROFILE_DISABLED") |
27
|
|
|
defer func() { |
28
|
|
|
rollback() |
29
|
|
|
}() |
30
|
|
|
|
31
|
|
|
os.Setenv(EnvVarAccessKeyId, "accesskey") |
32
|
|
|
os.Setenv(EnvVarAccessKeySecret, "accesssecret") |
33
|
|
|
|
34
|
|
|
cred, err := NewCredential(nil) |
35
|
|
|
assert.Nil(t, err) |
36
|
|
|
assert.NotNil(t, cred) |
37
|
|
|
|
38
|
|
|
os.Unsetenv(EnvVarAccessKeyId) |
39
|
|
|
os.Unsetenv(EnvVarAccessKeySecret) |
40
|
|
|
os.Setenv("ALIBABA_CLOUD_CLI_PROFILE_DISABLED", "true") |
41
|
|
|
|
42
|
|
|
cred, err = NewCredential(nil) |
43
|
|
|
assert.Nil(t, err) |
44
|
|
|
_, err = cred.GetCredential() |
45
|
|
|
assert.Contains(t, err.Error(), "unable to get credentials from any of the providers in the chain:") |
46
|
|
|
} |
47
|
|
|
|
48
|
|
|
func TestNewCredentialWithAK(t *testing.T) { |
49
|
|
|
config := new(Config) |
50
|
|
|
config.SetType("access_key") |
51
|
|
|
cred, err := NewCredential(config) |
52
|
|
|
assert.NotNil(t, err) |
53
|
|
|
assert.Equal(t, "the access key id is empty", err.Error()) |
54
|
|
|
assert.Nil(t, cred) |
55
|
|
|
|
56
|
|
|
config.SetAccessKeyId("AccessKeyId") |
57
|
|
|
cred, err = NewCredential(config) |
58
|
|
|
assert.NotNil(t, err) |
59
|
|
|
assert.Equal(t, "the access key secret is empty", err.Error()) |
60
|
|
|
assert.Nil(t, cred) |
61
|
|
|
|
62
|
|
|
config.SetAccessKeySecret("AccessKeySecret") |
63
|
|
|
cred, err = NewCredential(config) |
64
|
|
|
assert.Nil(t, err) |
65
|
|
|
cm, err := cred.GetCredential() |
66
|
|
|
assert.Nil(t, err) |
67
|
|
|
assert.Equal(t, "AccessKeyId", *cm.AccessKeyId) |
68
|
|
|
assert.Equal(t, "AccessKeySecret", *cm.AccessKeySecret) |
69
|
|
|
assert.Equal(t, "", *cm.SecurityToken) |
70
|
|
|
|
71
|
|
|
// test deprecated methods |
72
|
|
|
accessKeyId, err := cred.GetAccessKeyId() |
73
|
|
|
assert.Nil(t, err) |
74
|
|
|
assert.Equal(t, "AccessKeyId", *accessKeyId) |
75
|
|
|
accessKeySecret, err := cred.GetAccessKeySecret() |
76
|
|
|
assert.Nil(t, err) |
77
|
|
|
assert.Equal(t, "AccessKeySecret", *accessKeySecret) |
78
|
|
|
securityToken, err := cred.GetSecurityToken() |
79
|
|
|
assert.Nil(t, err) |
80
|
|
|
assert.Equal(t, "", *securityToken) |
81
|
|
|
} |
82
|
|
|
|
83
|
|
|
func TestNewCredentialWithSts(t *testing.T) { |
84
|
|
|
config := new(Config) |
85
|
|
|
config.SetType("sts") |
86
|
|
|
|
87
|
|
|
config.SetAccessKeyId("") |
88
|
|
|
cred, err := NewCredential(config) |
89
|
|
|
assert.NotNil(t, err) |
90
|
|
|
assert.Equal(t, "the access key id is empty", err.Error()) |
91
|
|
|
assert.Nil(t, cred) |
92
|
|
|
|
93
|
|
|
config.SetAccessKeyId("akid") |
94
|
|
|
cred, err = NewCredential(config) |
95
|
|
|
assert.NotNil(t, err) |
96
|
|
|
assert.Equal(t, "the access key secret is empty", err.Error()) |
97
|
|
|
assert.Nil(t, cred) |
98
|
|
|
|
99
|
|
|
config.SetAccessKeySecret("aksecret") |
100
|
|
|
cred, err = NewCredential(config) |
101
|
|
|
assert.NotNil(t, err) |
102
|
|
|
assert.Equal(t, "the security token is empty", err.Error()) |
103
|
|
|
assert.Nil(t, cred) |
104
|
|
|
|
105
|
|
|
config.SetSecurityToken("SecurityToken") |
106
|
|
|
cred, err = NewCredential(config) |
107
|
|
|
assert.Nil(t, err) |
108
|
|
|
assert.NotNil(t, cred) |
109
|
|
|
} |
110
|
|
|
|
111
|
|
|
func TestNewCredentialWithECSRAMRole(t *testing.T) { |
112
|
|
|
config := new(Config) |
113
|
|
|
config.SetType("ecs_ram_role") |
114
|
|
|
cred, err := NewCredential(config) |
115
|
|
|
assert.Nil(t, err) |
116
|
|
|
assert.NotNil(t, cred) |
117
|
|
|
|
118
|
|
|
config.SetRoleName("AccessKeyId") |
119
|
|
|
cred, err = NewCredential(config) |
120
|
|
|
assert.Nil(t, err) |
121
|
|
|
assert.NotNil(t, cred) |
122
|
|
|
|
123
|
|
|
config.SetEnableIMDSv2(false) |
124
|
|
|
cred, err = NewCredential(config) |
125
|
|
|
assert.Nil(t, err) |
126
|
|
|
assert.NotNil(t, cred) |
127
|
|
|
|
128
|
|
|
config.SetDisableIMDSv1(false) |
129
|
|
|
cred, err = NewCredential(config) |
130
|
|
|
assert.Nil(t, err) |
131
|
|
|
assert.NotNil(t, cred) |
132
|
|
|
|
133
|
|
|
config.SetEnableIMDSv2(true) |
134
|
|
|
cred, err = NewCredential(config) |
135
|
|
|
assert.Nil(t, err) |
136
|
|
|
assert.NotNil(t, cred) |
137
|
|
|
|
138
|
|
|
config.SetDisableIMDSv1(true) |
139
|
|
|
cred, err = NewCredential(config) |
140
|
|
|
assert.Nil(t, err) |
141
|
|
|
assert.NotNil(t, cred) |
142
|
|
|
|
143
|
|
|
config.SetEnableIMDSv2(true) |
144
|
|
|
config.SetMetadataTokenDuration(180) |
145
|
|
|
cred, err = NewCredential(config) |
146
|
|
|
assert.Nil(t, err) |
147
|
|
|
assert.NotNil(t, cred) |
148
|
|
|
} |
149
|
|
|
|
150
|
|
|
func TestNewCredentialWithRSAKeyPair(t *testing.T) { |
151
|
|
|
config := new(Config) |
152
|
|
|
config.SetType("rsa_key_pair") |
153
|
|
|
cred, err := NewCredential(config) |
154
|
|
|
assert.NotNil(t, err) |
155
|
|
|
assert.Equal(t, "PrivateKeyFile cannot be empty", err.Error()) |
156
|
|
|
assert.Nil(t, cred) |
157
|
|
|
|
158
|
|
|
config.SetPrivateKeyFile("test") |
159
|
|
|
cred, err = NewCredential(config) |
160
|
|
|
assert.NotNil(t, err) |
161
|
|
|
assert.Equal(t, "PublicKeyId cannot be empty", err.Error()) |
162
|
|
|
assert.Nil(t, cred) |
163
|
|
|
|
164
|
|
|
config. |
165
|
|
|
SetPublicKeyId("resource"). |
166
|
|
|
SetPrivateKeyFile("nofile"). |
167
|
|
|
SetSessionExpiration(10). |
168
|
|
|
SetRoleSessionExpiration(10). |
169
|
|
|
SetPolicy(""). |
170
|
|
|
SetHost(""). |
171
|
|
|
SetTimeout(10). |
172
|
|
|
SetConnectTimeout(10). |
173
|
|
|
SetProxy("") |
174
|
|
|
cred, err = NewCredential(config) |
175
|
|
|
assert.NotNil(t, err) |
176
|
|
|
assert.Contains(t, err.Error(), "InvalidPath: Can not open PrivateKeyFile, err is open nofile:") |
177
|
|
|
assert.Nil(t, cred) |
178
|
|
|
|
179
|
|
|
file, err := os.Create("./pk.pem") |
180
|
|
|
assert.Nil(t, err) |
181
|
|
|
file.WriteString(privatekey) |
182
|
|
|
file.Close() |
183
|
|
|
|
184
|
|
|
config.SetType("rsa_key_pair"). |
185
|
|
|
SetPublicKeyId("resource"). |
186
|
|
|
SetPrivateKeyFile("./pk.pem") |
187
|
|
|
cred, err = NewCredential(config) |
188
|
|
|
assert.Nil(t, err) |
189
|
|
|
assert.NotNil(t, cred) |
190
|
|
|
} |
191
|
|
|
|
192
|
|
|
func TestNewCredentialWithRAMRoleARN(t *testing.T) { |
193
|
|
|
config := new(Config) |
194
|
|
|
config.SetType("ram_role_arn") |
195
|
|
|
config.SetAccessKeyId("") |
196
|
|
|
cred, err := NewCredential(config) |
197
|
|
|
assert.NotNil(t, err) |
198
|
|
|
assert.Equal(t, "the access key id is empty", err.Error()) |
199
|
|
|
assert.Nil(t, cred) |
200
|
|
|
|
201
|
|
|
config.SetAccessKeyId("akid") |
202
|
|
|
config.SetAccessKeySecret("") |
203
|
|
|
cred, err = NewCredential(config) |
204
|
|
|
assert.NotNil(t, err) |
205
|
|
|
assert.Equal(t, "the access key secret is empty", err.Error()) |
206
|
|
|
assert.Nil(t, cred) |
207
|
|
|
|
208
|
|
|
config.SetAccessKeySecret("AccessKeySecret") |
209
|
|
|
cred, err = NewCredential(config) |
210
|
|
|
assert.NotNil(t, err) |
211
|
|
|
assert.Equal(t, "the RoleArn is empty", err.Error()) |
212
|
|
|
assert.Nil(t, cred) |
213
|
|
|
|
214
|
|
|
config.SetRoleArn("roleArn") |
215
|
|
|
cred, err = NewCredential(config) |
216
|
|
|
assert.Nil(t, err) |
217
|
|
|
assert.NotNil(t, cred) |
218
|
|
|
|
219
|
|
|
config.SetRoleSessionName("role_session_name") |
220
|
|
|
cred, err = NewCredential(config) |
221
|
|
|
assert.Nil(t, err) |
222
|
|
|
assert.NotNil(t, cred) |
223
|
|
|
|
224
|
|
|
// empty security token should ok |
225
|
|
|
config.SetSecurityToken("") |
226
|
|
|
cred, err = NewCredential(config) |
227
|
|
|
assert.Nil(t, err) |
228
|
|
|
assert.NotNil(t, cred) |
229
|
|
|
|
230
|
|
|
// with sts should ok |
231
|
|
|
config.SetSecurityToken("securitytoken") |
232
|
|
|
cred, err = NewCredential(config) |
233
|
|
|
assert.Nil(t, err) |
234
|
|
|
assert.NotNil(t, cred) |
235
|
|
|
|
236
|
|
|
config.SetExternalId("externalId") |
237
|
|
|
config.SetPolicy("policy") |
238
|
|
|
config.SetRoleSessionExpiration(3600) |
239
|
|
|
config.SetRoleSessionName("roleSessionName") |
240
|
|
|
cred, err = NewCredential(config) |
241
|
|
|
assert.Nil(t, err) |
242
|
|
|
assert.NotNil(t, cred) |
243
|
|
|
|
244
|
|
|
} |
245
|
|
|
|
246
|
|
|
func TestNewCredentialWithBearerToken(t *testing.T) { |
247
|
|
|
config := new(Config) |
248
|
|
|
config.SetType("bearer") |
249
|
|
|
cred, err := NewCredential(config) |
250
|
|
|
assert.NotNil(t, err) |
251
|
|
|
assert.Equal(t, "BearerToken cannot be empty", err.Error()) |
252
|
|
|
assert.Nil(t, cred) |
253
|
|
|
|
254
|
|
|
config.SetBearerToken("BearerToken") |
255
|
|
|
cred, err = NewCredential(config) |
256
|
|
|
assert.Nil(t, err) |
257
|
|
|
assert.NotNil(t, cred) |
258
|
|
|
} |
259
|
|
|
|
260
|
|
|
func TestNewCredentialWithOIDC(t *testing.T) { |
261
|
|
|
config := new(Config) |
262
|
|
|
// oidc role arn |
263
|
|
|
config.SetType("oidc_role_arn") |
264
|
|
|
cred, err := NewCredential(config) |
265
|
|
|
assert.NotNil(t, err) |
266
|
|
|
assert.Equal(t, "the OIDCTokenFilePath is empty", err.Error()) |
267
|
|
|
assert.Nil(t, cred) |
268
|
|
|
|
269
|
|
|
config.SetOIDCTokenFilePath("oidc_token_file_path_test") |
270
|
|
|
cred, err = NewCredential(config) |
271
|
|
|
assert.NotNil(t, err) |
272
|
|
|
assert.Equal(t, "the OIDCProviderARN is empty", err.Error()) |
273
|
|
|
assert.Nil(t, cred) |
274
|
|
|
|
275
|
|
|
config.SetOIDCProviderArn("oidc_provider_arn_test") |
276
|
|
|
cred, err = NewCredential(config) |
277
|
|
|
assert.NotNil(t, err) |
278
|
|
|
assert.Equal(t, "the RoleArn is empty", err.Error()) |
279
|
|
|
assert.Nil(t, cred) |
280
|
|
|
|
281
|
|
|
config.SetRoleArn("role_arn_test") |
282
|
|
|
cred, err = NewCredential(config) |
283
|
|
|
assert.Nil(t, err) |
284
|
|
|
assert.NotNil(t, cred) |
285
|
|
|
assert.Equal(t, "oidc_provider_arn_test", tea.StringValue(config.OIDCProviderArn)) |
286
|
|
|
assert.Equal(t, "oidc_token_file_path_test", tea.StringValue(config.OIDCTokenFilePath)) |
287
|
|
|
assert.Equal(t, "role_arn_test", tea.StringValue(config.RoleArn)) |
288
|
|
|
} |
289
|
|
|
|
290
|
|
|
func TestNewCredentialWithCredentialsURI(t *testing.T) { |
291
|
|
|
config := new(Config) |
292
|
|
|
|
293
|
|
|
config.SetType("credentials_uri"). |
294
|
|
|
SetURLCredential("http://test/") |
295
|
|
|
cred, err := NewCredential(config) |
296
|
|
|
assert.Nil(t, err) |
297
|
|
|
assert.NotNil(t, cred) |
298
|
|
|
assert.Equal(t, "http://test/", tea.StringValue(config.Url)) |
299
|
|
|
|
300
|
|
|
config.SetURLCredential("") |
301
|
|
|
cred, err = NewCredential(config) |
302
|
|
|
assert.Nil(t, err) |
303
|
|
|
assert.NotNil(t, cred) |
304
|
|
|
assert.Equal(t, "", tea.StringValue(config.Url)) |
305
|
|
|
} |
306
|
|
|
|
307
|
|
|
func TestNewCredentialWithInvalidType(t *testing.T) { |
308
|
|
|
config := new(Config) |
309
|
|
|
config.SetType("sdk") |
310
|
|
|
cred, err := NewCredential(config) |
311
|
|
|
assert.NotNil(t, err) |
312
|
|
|
assert.Equal(t, "invalid type option, support: access_key, sts, ecs_ram_role, ram_role_arn, rsa_key_pair", err.Error()) |
313
|
|
|
assert.Nil(t, cred) |
314
|
|
|
} |
315
|
|
|
|
316
|
|
|
func Test_doaction(t *testing.T) { |
317
|
|
|
request := request.NewCommonRequest() |
318
|
|
|
request.Method = "credential test" |
319
|
|
|
content, err := doAction(request, nil) |
320
|
|
|
assert.NotNil(t, err) |
321
|
|
|
assert.Equal(t, `net/http: invalid method "credential test"`, err.Error()) |
322
|
|
|
assert.Nil(t, content) |
323
|
|
|
request.Method = "GET" |
324
|
|
|
request.URL = "http://www.aliyun.com" |
325
|
|
|
runtime := &utils.Runtime{ |
326
|
|
|
Proxy: "# #%gfdf", |
327
|
|
|
} |
328
|
|
|
content, err = doAction(request, runtime) |
329
|
|
|
assert.Contains(t, err.Error(), `invalid URL escape`) |
330
|
|
|
assert.NotNil(t, err) |
331
|
|
|
assert.Nil(t, content) |
332
|
|
|
} |
333
|
|
|
|