-
Notifications
You must be signed in to change notification settings - Fork 175
/
scyllacluster_auth.go
172 lines (136 loc) · 6.31 KB
/
scyllacluster_auth.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
// Copyright (C) 2021 ScyllaDB
package scyllacluster
import (
"context"
"fmt"
"net/http"
g "github.com/onsi/ginkgo/v2"
o "github.com/onsi/gomega"
"github.com/scylladb/scylla-operator/pkg/helpers"
"github.com/scylladb/scylla-operator/pkg/naming"
"github.com/scylladb/scylla-operator/pkg/scyllaclient"
scyllafixture "github.com/scylladb/scylla-operator/test/e2e/fixture/scylla"
"github.com/scylladb/scylla-operator/test/e2e/framework"
"github.com/scylladb/scylla-operator/test/e2e/utils"
"gopkg.in/yaml.v2"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
)
var _ = g.Describe("ScyllaCluster authentication", func() {
defer g.GinkgoRecover()
f := framework.NewFramework("scyllacluster")
g.It("agent requires authentication", func() {
ctx, cancel := context.WithTimeout(context.Background(), testTimeout)
defer cancel()
sc := scyllafixture.BasicScyllaCluster.ReadOrFail()
sc.Spec.Datacenter.Racks[0].Members = 1
framework.By("Creating a ScyllaCluster")
sc, err := f.ScyllaClient().ScyllaV1().ScyllaClusters(f.Namespace()).Create(ctx, sc, metav1.CreateOptions{})
o.Expect(err).NotTo(o.HaveOccurred())
framework.By("Waiting for the ScyllaCluster to rollout (RV=%s)", sc.ResourceVersion)
waitCtx1, waitCtx1Cancel := utils.ContextForRollout(ctx, sc)
defer waitCtx1Cancel()
sc, err = utils.WaitForScyllaClusterState(waitCtx1, f.ScyllaClient().ScyllaV1(), sc.Namespace, sc.Name, utils.WaitForStateOptions{}, utils.IsScyllaClusterRolledOut)
o.Expect(err).NotTo(o.HaveOccurred())
verifyScyllaCluster(ctx, f.KubeClient(), sc)
hosts := getScyllaHostsAndWaitForFullQuorum(ctx, f.KubeClient().CoreV1(), sc)
o.Expect(hosts).To(o.HaveLen(1))
di := insertAndVerifyCQLData(ctx, hosts)
defer di.Close()
framework.By("Rejecting an unauthorized request")
emptyAuthToken := ""
_, err = getScyllaClientStatus(ctx, hosts, emptyAuthToken)
o.Expect(err).To(o.HaveOccurred())
o.Expect(scyllaclient.StatusCodeOf(err)).To(o.Equal(http.StatusUnauthorized))
framework.By("Accepting requests authorized using token from provisioned secret")
tokenSecret, err := f.KubeClient().CoreV1().Secrets(sc.Namespace).Get(ctx, naming.AgentAuthTokenSecretName(sc.Name), metav1.GetOptions{})
o.Expect(err).ToNot(o.HaveOccurred())
token, err := helpers.GetAgentAuthTokenFromSecret(tokenSecret)
o.Expect(err).ToNot(o.HaveOccurred())
_, err = getScyllaClientStatus(ctx, hosts, token)
o.Expect(err).NotTo(o.HaveOccurred())
framework.By("Specifying auth token in agent config")
agentConfig := struct {
AuthToken string `yaml:"auth_token"`
}{
AuthToken: "42",
}
agentConfigData, err := yaml.Marshal(agentConfig)
o.Expect(err).NotTo(o.HaveOccurred())
agentConfigSecret := &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "agent-config",
},
Type: corev1.SecretTypeOpaque,
Data: map[string][]byte{
naming.ScyllaAgentConfigFileName: agentConfigData,
},
}
_, err = f.KubeClient().CoreV1().Secrets(f.Namespace()).Create(ctx, agentConfigSecret, metav1.CreateOptions{})
o.Expect(err).NotTo(o.HaveOccurred())
_, err = f.ScyllaClient().ScyllaV1().ScyllaClusters(f.Namespace()).Patch(
ctx,
sc.Name,
types.JSONPatchType,
[]byte(fmt.Sprintf(`[{"op":"replace","path":"/spec/datacenter/racks/0/scyllaAgentConfig","value":"%s"}]`, agentConfigSecret.Name)),
metav1.PatchOptions{},
)
o.Expect(err).NotTo(o.HaveOccurred())
// TODO: restart should be triggered by the Operator
framework.By("Initiating a rolling restart")
_, err = f.ScyllaClient().ScyllaV1().ScyllaClusters(f.Namespace()).Patch(
ctx,
sc.Name,
types.MergePatchType,
[]byte(fmt.Sprintf(`{"spec": {"forceRedeploymentReason": "%s"}}`, "scyllaAgenConfig was updated to contain a token")),
metav1.PatchOptions{},
)
o.Expect(err).NotTo(o.HaveOccurred())
framework.By("Waiting for the ScyllaCluster to pick up token change")
waitCtx2, waitCtx2Cancel := utils.ContextForRollout(ctx, sc)
defer waitCtx2Cancel()
sc, err = utils.WaitForScyllaClusterState(waitCtx2, f.ScyllaClient().ScyllaV1(), sc.Namespace, sc.Name, utils.WaitForStateOptions{}, utils.IsScyllaClusterRolledOut)
o.Expect(err).NotTo(o.HaveOccurred())
verifyScyllaCluster(ctx, f.KubeClient(), sc)
o.Expect(hosts).To(o.ConsistOf(getScyllaHostsAndWaitForFullQuorum(ctx, f.KubeClient().CoreV1(), sc)))
verifyCQLData(ctx, di)
framework.By("Accepting requests authorized using token from user agent config")
_, err = getScyllaClientStatus(ctx, hosts, agentConfig.AuthToken)
o.Expect(err).NotTo(o.HaveOccurred())
framework.By("Changing auth token in agent config")
agentConfig.AuthToken = "666"
agentConfigData, err = yaml.Marshal(agentConfig)
o.Expect(err).NotTo(o.HaveOccurred())
agentConfigSecret.Data[naming.ScyllaAgentConfigFileName] = agentConfigData
_, err = f.KubeClient().CoreV1().Secrets(f.Namespace()).Update(ctx, agentConfigSecret, metav1.UpdateOptions{})
o.Expect(err).NotTo(o.HaveOccurred())
framework.By("Initiating a rolling restart")
_, err = f.ScyllaClient().ScyllaV1().ScyllaClusters(f.Namespace()).Patch(
ctx,
sc.Name,
types.MergePatchType,
[]byte(fmt.Sprintf(`{"spec": {"forceRedeploymentReason": "%s"}}`, "scyllaAgenConfig token was changed")),
metav1.PatchOptions{},
)
o.Expect(err).NotTo(o.HaveOccurred())
framework.By("Waiting for the ScyllaCluster to pick up token change")
waitCtx3, waitCtx3Cancel := utils.ContextForRollout(ctx, sc)
defer waitCtx3Cancel()
sc, err = utils.WaitForScyllaClusterState(waitCtx3, f.ScyllaClient().ScyllaV1(), sc.Namespace, sc.Name, utils.WaitForStateOptions{}, utils.IsScyllaClusterRolledOut)
o.Expect(err).NotTo(o.HaveOccurred())
verifyScyllaCluster(ctx, f.KubeClient(), sc)
o.Expect(hosts).To(o.ConsistOf(getScyllaHostsAndWaitForFullQuorum(ctx, f.KubeClient().CoreV1(), sc)))
verifyCQLData(ctx, di)
framework.By("Accepting requests authorized using token from user agent config")
_, err = getScyllaClientStatus(ctx, hosts, agentConfig.AuthToken)
o.Expect(err).NotTo(o.HaveOccurred())
})
})
func getScyllaClientStatus(ctx context.Context, hosts []string, authToken string) (scyllaclient.NodeStatusInfoSlice, error) {
cfg := scyllaclient.DefaultConfig(authToken, hosts...)
client, err := scyllaclient.NewClient(cfg)
o.Expect(err).NotTo(o.HaveOccurred())
defer client.Close()
return client.Status(ctx, hosts[0])
}