2020-09-14 15:34:07 +00:00
|
|
|
"""outpost tests"""
|
2020-10-19 15:47:51 +00:00
|
|
|
from os import environ
|
|
|
|
from unittest.case import skipUnless
|
|
|
|
from unittest.mock import patch
|
|
|
|
|
2020-09-14 15:34:07 +00:00
|
|
|
from django.test import TestCase
|
|
|
|
from guardian.models import UserObjectPermission
|
|
|
|
|
|
|
|
from passbook.crypto.models import CertificateKeyPair
|
|
|
|
from passbook.flows.models import Flow
|
2020-10-19 15:47:51 +00:00
|
|
|
from passbook.outposts.controllers.k8s.base import NeedsUpdate
|
|
|
|
from passbook.outposts.controllers.k8s.deployment import DeploymentReconciler
|
|
|
|
from passbook.outposts.controllers.kubernetes import KubernetesController
|
2020-09-14 15:34:07 +00:00
|
|
|
from passbook.outposts.models import Outpost, OutpostDeploymentType, OutpostType
|
|
|
|
from passbook.providers.proxy.models import ProxyProvider
|
|
|
|
|
|
|
|
|
|
|
|
class OutpostTests(TestCase):
|
|
|
|
"""Outpost Tests"""
|
|
|
|
|
|
|
|
def test_service_account_permissions(self):
|
|
|
|
"""Test that the service account has correct permissions"""
|
|
|
|
provider: ProxyProvider = ProxyProvider.objects.create(
|
|
|
|
name="test",
|
|
|
|
internal_host="http://localhost",
|
|
|
|
external_host="http://localhost",
|
|
|
|
authorization_flow=Flow.objects.first(),
|
|
|
|
)
|
|
|
|
outpost: Outpost = Outpost.objects.create(
|
|
|
|
name="test",
|
|
|
|
type=OutpostType.PROXY,
|
|
|
|
deployment_type=OutpostDeploymentType.CUSTOM,
|
|
|
|
)
|
|
|
|
|
|
|
|
# Before we add a provider, the user should only have access to the outpost
|
|
|
|
permissions = UserObjectPermission.objects.filter(user=outpost.user)
|
|
|
|
self.assertEqual(len(permissions), 1)
|
|
|
|
self.assertEqual(permissions[0].object_pk, str(outpost.pk))
|
|
|
|
|
|
|
|
# We add a provider, user should only have access to outpost and provider
|
|
|
|
outpost.providers.add(provider)
|
|
|
|
outpost.save()
|
|
|
|
permissions = UserObjectPermission.objects.filter(user=outpost.user).order_by(
|
|
|
|
"content_type__model"
|
|
|
|
)
|
|
|
|
self.assertEqual(len(permissions), 2)
|
|
|
|
self.assertEqual(permissions[0].object_pk, str(outpost.pk))
|
|
|
|
self.assertEqual(permissions[1].object_pk, str(provider.pk))
|
|
|
|
|
|
|
|
# Provider requires a certificate-key-pair, user should have permissions for it
|
|
|
|
keypair = CertificateKeyPair.objects.first()
|
|
|
|
provider.certificate = keypair
|
|
|
|
provider.save()
|
|
|
|
permissions = UserObjectPermission.objects.filter(user=outpost.user).order_by(
|
|
|
|
"content_type__model"
|
|
|
|
)
|
|
|
|
self.assertEqual(len(permissions), 3)
|
|
|
|
self.assertEqual(permissions[0].object_pk, str(keypair.pk))
|
|
|
|
self.assertEqual(permissions[1].object_pk, str(outpost.pk))
|
|
|
|
self.assertEqual(permissions[2].object_pk, str(provider.pk))
|
|
|
|
|
|
|
|
# Remove provider from outpost, user should only have access to outpost
|
|
|
|
outpost.providers.remove(provider)
|
|
|
|
outpost.save()
|
|
|
|
permissions = UserObjectPermission.objects.filter(user=outpost.user)
|
|
|
|
self.assertEqual(len(permissions), 1)
|
|
|
|
self.assertEqual(permissions[0].object_pk, str(outpost.pk))
|
2020-10-19 15:47:51 +00:00
|
|
|
|
|
|
|
|
|
|
|
@skipUnless("PB_TEST_K8S" in environ, "Kubernetes test cluster required")
|
|
|
|
class OutpostKubernetesTests(TestCase):
|
|
|
|
"""Test Kubernetes Controllers"""
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super().setUp()
|
|
|
|
self.provider: ProxyProvider = ProxyProvider.objects.create(
|
|
|
|
name="test",
|
|
|
|
internal_host="http://localhost",
|
|
|
|
external_host="http://localhost",
|
|
|
|
authorization_flow=Flow.objects.first(),
|
|
|
|
)
|
|
|
|
self.outpost: Outpost = Outpost.objects.create(
|
|
|
|
name="test",
|
|
|
|
type=OutpostType.PROXY,
|
|
|
|
deployment_type=OutpostDeploymentType.KUBERNETES,
|
|
|
|
)
|
|
|
|
self.outpost.providers.add(self.provider)
|
|
|
|
self.outpost.save()
|
|
|
|
|
|
|
|
def test_deployment_reconciler(self):
|
|
|
|
"""test that deployment requires update"""
|
|
|
|
controller = KubernetesController(self.outpost)
|
|
|
|
deployment_reconciler = DeploymentReconciler(controller)
|
|
|
|
|
|
|
|
self.assertIsNotNone(deployment_reconciler.retrieve())
|
|
|
|
|
|
|
|
config = self.outpost.config
|
|
|
|
config.kubernetes_replicas = 3
|
|
|
|
self.outpost.config = config
|
|
|
|
|
|
|
|
with self.assertRaises(NeedsUpdate):
|
|
|
|
deployment_reconciler.reconcile(
|
|
|
|
deployment_reconciler.retrieve(),
|
|
|
|
deployment_reconciler.get_reference_object(),
|
|
|
|
)
|
|
|
|
|
|
|
|
with patch.object(deployment_reconciler, "image_base", "test"):
|
|
|
|
with self.assertRaises(NeedsUpdate):
|
|
|
|
deployment_reconciler.reconcile(
|
|
|
|
deployment_reconciler.retrieve(),
|
|
|
|
deployment_reconciler.get_reference_object(),
|
|
|
|
)
|
|
|
|
|
|
|
|
deployment_reconciler.delete(deployment_reconciler.get_reference_object())
|