Fixed distribution list type, function signatures (later versions parse uuids in the generated code), defaults actually being set and added x-go-type where needed.
317 lines
8.3 KiB
Go
317 lines
8.3 KiB
Go
package v2_test
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
|
"github.com/google/uuid"
|
|
"github.com/openshift-online/ocm-sdk-go/authentication"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/osbuild/osbuild-composer/pkg/jobqueue"
|
|
|
|
"github.com/osbuild/images/pkg/distro/test_distro"
|
|
v2 "github.com/osbuild/osbuild-composer/internal/cloudapi/v2"
|
|
"github.com/osbuild/osbuild-composer/internal/test"
|
|
"github.com/osbuild/osbuild-composer/internal/worker"
|
|
)
|
|
|
|
func kojiRequest() string {
|
|
return fmt.Sprintf(`
|
|
{
|
|
"distribution":"%[1]s",
|
|
"image_requests": [
|
|
{
|
|
"architecture": "%[2]s",
|
|
"image_type": "%[3]s",
|
|
"repositories": [
|
|
{
|
|
"baseurl": "https://repo.example.com/"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"koji": {
|
|
"server": "koji.example.com",
|
|
"task_id": 1,
|
|
"name":"foo",
|
|
"version":"1",
|
|
"release":"2"
|
|
}
|
|
}`, test_distro.TestDistro1Name, test_distro.TestArch3Name, string(v2.ImageTypesGuestImage))
|
|
}
|
|
|
|
func s3Request() string {
|
|
return fmt.Sprintf(`
|
|
{
|
|
"distribution":"%[1]s",
|
|
"image_requests": [
|
|
{
|
|
"architecture": "%[2]s",
|
|
"image_type": "%[3]s",
|
|
"repositories": [
|
|
{
|
|
"baseurl": "https://repo.example.com/"
|
|
}
|
|
],
|
|
"upload_options": {
|
|
"region": "us-east-1"
|
|
}
|
|
}
|
|
]
|
|
}`, test_distro.TestDistro1Name, test_distro.TestArch3Name, string(v2.ImageTypesGuestImage))
|
|
}
|
|
|
|
var reqContextCallCount = 0
|
|
|
|
func reqContext(orgID string) context.Context {
|
|
// Alternate between rh-org-id and account_id so we verify that the APIs understand
|
|
// both fields.
|
|
tenantFields := []string{"rh-org-id", "account_id"}
|
|
tenantField := tenantFields[reqContextCallCount%2]
|
|
reqContextCallCount++
|
|
return authentication.ContextWithToken(context.Background(), &jwt.Token{
|
|
Claims: jwt.MapClaims{
|
|
tenantField: orgID,
|
|
},
|
|
})
|
|
}
|
|
|
|
func scheduleRequest(t *testing.T, handler http.Handler, orgID, request string) uuid.UUID {
|
|
result := test.APICall{
|
|
Handler: handler,
|
|
Context: reqContext(orgID),
|
|
Method: http.MethodPost,
|
|
Path: "/api/image-builder-composer/v2/compose",
|
|
RequestBody: test.JSONRequestBody(request),
|
|
ExpectedStatus: http.StatusCreated,
|
|
}.Do(t)
|
|
|
|
// Parse ID
|
|
var id v2.ComposeId
|
|
require.NoError(t, json.Unmarshal(result.Body, &id))
|
|
return id.Id
|
|
}
|
|
|
|
func getAllJobsOfCompose(t *testing.T, q jobqueue.JobQueue, finalJob uuid.UUID) []uuid.UUID {
|
|
// This is basically a BFS on job dependencies
|
|
// It may return duplicates (job dependencies are not a tree) but we don't care for our purposes
|
|
|
|
jobsToQuery := []uuid.UUID{finalJob}
|
|
discovered := []uuid.UUID{finalJob}
|
|
|
|
for len(jobsToQuery) > 0 {
|
|
current := jobsToQuery[0]
|
|
jobsToQuery = jobsToQuery[1:]
|
|
|
|
_, _, deps, _, err := q.Job(current)
|
|
require.NoError(t, err)
|
|
discovered = append(discovered, deps...)
|
|
jobsToQuery = append(jobsToQuery, deps...)
|
|
}
|
|
|
|
return discovered
|
|
}
|
|
|
|
func jobRequest() string {
|
|
return fmt.Sprintf(`
|
|
{
|
|
"types": [
|
|
%q,
|
|
%q,
|
|
%q,
|
|
%q
|
|
],
|
|
"arch": %q
|
|
}`,
|
|
worker.JobTypeKojiInit,
|
|
worker.JobTypeOSBuild,
|
|
worker.JobTypeKojiFinalize,
|
|
worker.JobTypeDepsolve,
|
|
test_distro.TestArch3Name)
|
|
}
|
|
|
|
func runNextJob(t *testing.T, jobs []uuid.UUID, workerHandler http.Handler, orgID string) {
|
|
// test that a different tenant doesn't get any job
|
|
// 100ms ought to be enough 🤞
|
|
ctx, cancel := context.WithDeadline(reqContext("987"), time.Now().Add(time.Millisecond*100))
|
|
defer cancel()
|
|
test.APICall{
|
|
Handler: workerHandler,
|
|
Method: http.MethodPost,
|
|
Path: "/api/worker/v1/jobs",
|
|
RequestBody: test.JSONRequestBody(jobRequest()),
|
|
Context: ctx,
|
|
ExpectedStatus: http.StatusNoContent,
|
|
}.Do(t)
|
|
|
|
// get a job using the right tenant
|
|
resp := test.APICall{
|
|
Handler: workerHandler,
|
|
Method: http.MethodPost,
|
|
Path: "/api/worker/v1/jobs",
|
|
RequestBody: test.JSONRequestBody(jobRequest()),
|
|
Context: reqContext(orgID),
|
|
ExpectedStatus: http.StatusCreated,
|
|
}.Do(t)
|
|
|
|
// get the job ID and test if it belongs to the list of jobs belonging to a particular compose (and thus tenant)
|
|
var job struct {
|
|
ID string `json:"id"`
|
|
Location string `json:"location"`
|
|
}
|
|
require.NoError(t, json.Unmarshal(resp.Body, &job))
|
|
jobID := uuid.MustParse(job.ID)
|
|
require.Contains(t, jobs, jobID)
|
|
|
|
// finish the job
|
|
test.APICall{
|
|
Handler: workerHandler,
|
|
Method: http.MethodPatch,
|
|
Path: job.Location,
|
|
RequestBody: test.JSONRequestBody(`{"result": {"job_result":{}}}`),
|
|
Context: reqContext(orgID),
|
|
ExpectedStatus: http.StatusOK,
|
|
}.Do(t)
|
|
}
|
|
|
|
// TestMultitenancy tests that the cloud API is securely multi-tenant.
|
|
//
|
|
// It creates 4 composes (mixed s3 and koji ones) and then simulates workers of
|
|
// 5 different tenants and makes sure that the workers only pick jobs that
|
|
// belong to their tenant.
|
|
//
|
|
// The test is not written in a parallel way but since our queue is FIFO and
|
|
// the test is running the job in a LIFO way, it should cover everything.
|
|
//
|
|
// It's important to acknowledge that this test is not E2E. We don't pass raw
|
|
// JWT here but an already parsed one inside a request context. A proper E2E
|
|
// also exists to test the full setup. Unfortunately, it cannot properly test
|
|
// that all jobs are assigned to the correct channel, therefore we need also
|
|
// this test.
|
|
func TestMultitenancy(t *testing.T) {
|
|
apiServer, workerServer, q, cancel := newV2Server(t, t.TempDir(), true, false)
|
|
handler := apiServer.Handler("/api/image-builder-composer/v2")
|
|
defer cancel()
|
|
|
|
// define 4 composes
|
|
composes := []*struct {
|
|
koji bool
|
|
orgID string
|
|
id uuid.UUID
|
|
jobIDs []uuid.UUID
|
|
}{
|
|
{
|
|
koji: true,
|
|
orgID: "42",
|
|
},
|
|
{
|
|
koji: false,
|
|
orgID: "123",
|
|
},
|
|
{
|
|
koji: true,
|
|
orgID: "2022",
|
|
},
|
|
{
|
|
koji: true,
|
|
orgID: "1995",
|
|
},
|
|
}
|
|
|
|
// schedule all composes and retrieve some information about them
|
|
for _, c := range composes {
|
|
var request string
|
|
if c.koji {
|
|
request = kojiRequest()
|
|
} else {
|
|
request = s3Request()
|
|
}
|
|
id := scheduleRequest(t, handler, c.orgID, request)
|
|
c.id = id
|
|
|
|
// make sure that the channel is prefixed with "org-"
|
|
_, _, _, channel, err := q.Job(id)
|
|
require.NoError(t, err)
|
|
require.Equal(t, "org-"+c.orgID, channel)
|
|
|
|
// get all jobs belonging to this compose
|
|
c.jobIDs = getAllJobsOfCompose(t, q, id)
|
|
}
|
|
|
|
// Run the composes in a LIFO way
|
|
for i := len(composes) - 1; i >= 0; i -= 1 {
|
|
c := composes[i]
|
|
|
|
// We have to run 2 jobs for S3 composes (depsolve, osbuild)
|
|
// 4 jobs for koji composes (depsolve, koji-init, osbuild, koji-finalize)
|
|
numjobs := 2
|
|
if c.koji {
|
|
numjobs = 4
|
|
}
|
|
|
|
// Run all jobs
|
|
for j := 0; j < numjobs; j++ {
|
|
runNextJob(t, c.jobIDs, workerServer.Handler(), c.orgID)
|
|
}
|
|
|
|
// Make sure that the compose is not pending (i.e. all jobs did run)
|
|
resp := test.APICall{
|
|
Handler: handler,
|
|
Method: http.MethodGet,
|
|
Context: reqContext(c.orgID),
|
|
Path: "/api/image-builder-composer/v2/composes/" + c.id.String(),
|
|
ExpectedStatus: http.StatusOK,
|
|
}.Do(t)
|
|
var result struct {
|
|
Status string `json:"status"`
|
|
}
|
|
require.NoError(t, json.Unmarshal(resp.Body, &result))
|
|
require.NotEqual(t, "pending", result.Status)
|
|
|
|
composeEndpoints := []string{"", "logs", "manifests", "metadata"}
|
|
// Verify that all compose endpoints work with the appropriate orgID
|
|
for _, endpoint := range composeEndpoints {
|
|
// TODO: "metadata" endpoint is not supported for Koji composes
|
|
jobType, err := workerServer.JobType(c.id)
|
|
require.NoError(t, err)
|
|
if jobType == worker.JobTypeKojiFinalize && endpoint == "metadata" {
|
|
continue
|
|
}
|
|
|
|
path := "/api/image-builder-composer/v2/composes/" + c.id.String()
|
|
if endpoint != "" {
|
|
path = path + "/" + endpoint
|
|
}
|
|
|
|
_ = test.APICall{
|
|
Handler: handler,
|
|
Method: http.MethodGet,
|
|
Context: reqContext(c.orgID),
|
|
Path: path,
|
|
ExpectedStatus: http.StatusOK,
|
|
}.Do(t)
|
|
}
|
|
|
|
// Verify that no compose endpoints are accessible with wrong orgID
|
|
for _, endpoint := range composeEndpoints {
|
|
path := "/api/image-builder-composer/v2/composes/" + c.id.String()
|
|
if endpoint != "" {
|
|
path = path + "/" + endpoint
|
|
}
|
|
|
|
_ = test.APICall{
|
|
Handler: handler,
|
|
Method: http.MethodGet,
|
|
Context: reqContext("bad-org"),
|
|
Path: path,
|
|
ExpectedStatus: http.StatusNotFound,
|
|
}.Do(t)
|
|
}
|
|
}
|
|
}
|