pulumi/pkg/secrets/cloud/aws_test.go

195 lines
5.5 KiB
Go

// Copyright 2016-2023, Pulumi Corporation.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package cloud
import (
"context"
"fmt"
"testing"
"time"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/service/iam"
"github.com/aws/aws-sdk-go-v2/service/kms"
"github.com/aws/aws-sdk-go-v2/service/sts"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func getAwsCaller(t *testing.T) (context.Context, aws.Config, *sts.GetCallerIdentityOutput) {
ctx := context.Background()
cfg, err := config.LoadDefaultConfig(ctx)
if err != nil {
t.Logf("Skipping, could not load aws config: %s", err)
t.SkipNow()
}
stsClient := sts.NewFromConfig(cfg)
caller, err := stsClient.GetCallerIdentity(ctx, &sts.GetCallerIdentityInput{})
if err != nil {
t.Logf("Skipping, couldn't use aws credentials to query identity: %s", err)
t.SkipNow()
}
return ctx, cfg, caller
}
func createKey(ctx context.Context, t *testing.T, cfg aws.Config) *kms.CreateKeyOutput {
kmsClient := kms.NewFromConfig(cfg)
keyName := "test-key-" + randomName(t)
key, err := kmsClient.CreateKey(ctx, &kms.CreateKeyInput{Description: &keyName})
require.NoError(t, err)
t.Cleanup(func() {
_, err := kmsClient.ScheduleKeyDeletion(ctx, &kms.ScheduleKeyDeletionInput{
KeyId: key.KeyMetadata.KeyId,
})
assert.NoError(t, err)
})
return key
}
//nolint:paralleltest // mutates environment variables
func TestAWSCloudManager(t *testing.T) {
t.Setenv("AWS_REGION", "us-west-2")
ctx, cfg, _ := getAwsCaller(t)
key := createKey(ctx, t, cfg)
url := "awskms://" + *key.KeyMetadata.KeyId + "?awssdk=v2"
testURL(ctx, t, url)
}
//nolint:paralleltest // mutates environment variables
func TestAWSCloudManager_SessionToken(t *testing.T) {
t.Setenv("AWS_REGION", "us-west-2")
ctx, cfg, _ := getAwsCaller(t)
key := createKey(ctx, t, cfg)
url := "awskms://" + *key.KeyMetadata.KeyId + "?awssdk=v2"
creds, err := cfg.Credentials.Retrieve(ctx)
require.NoError(t, err)
t.Setenv("AWS_PROFILE", "")
t.Setenv("AWS_ACCESS_KEY_ID", creds.AccessKeyID)
t.Setenv("AWS_SECRET_ACCESS_KEY", creds.SecretAccessKey)
t.Setenv("AWS_SESSION_TOKEN", creds.SessionToken)
testURL(ctx, t, url)
}
//nolint:paralleltest // mutates environment variables
func TestAWSCloudManager_AssumedRole(t *testing.T) {
// Regression test for https://github.com/pulumi/pulumi/issues/11482
t.Setenv("AWS_REGION", "us-west-2")
ctx, cfg, caller := getAwsCaller(t)
// Make a key with our default config
key := createKey(ctx, t, cfg)
url := "awskms://" + *key.KeyMetadata.KeyId + "?awssdk=v2"
// Make a temporary role to assume
iamClient := iam.NewFromConfig(cfg)
roleName := "test-role-" + randomName(t)
assumeRolePolicyDocument := fmt.Sprintf(`{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Principal": { "AWS": "%s" },
"Action": "sts:AssumeRole"
}
}`, *caller.Arn)
role, err := iamClient.CreateRole(ctx, &iam.CreateRoleInput{
RoleName: &roleName,
AssumeRolePolicyDocument: &assumeRolePolicyDocument,
})
require.NoError(t, err)
defer func() {
_, err := iamClient.DeleteRole(ctx, &iam.DeleteRoleInput{
RoleName: &roleName,
})
assert.NoError(t, err)
}()
policyName := "test-policy-" + randomName(t)
policyDocument := fmt.Sprintf(`{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": [
"kms:Encrypt",
"kms:Decrypt"
],
"Resource": "%s"
}
}`, *key.KeyMetadata.Arn)
policy, err := iamClient.CreatePolicy(ctx, &iam.CreatePolicyInput{
PolicyName: &policyName,
PolicyDocument: &policyDocument,
})
require.NoError(t, err)
defer func() {
_, err := iamClient.DetachRolePolicy(ctx, &iam.DetachRolePolicyInput{
PolicyArn: policy.Policy.Arn,
RoleName: &roleName,
})
assert.NoError(t, err)
_, err = iamClient.DeletePolicy(ctx, &iam.DeletePolicyInput{
PolicyArn: policy.Policy.Arn,
})
assert.NoError(t, err)
}()
_, err = iamClient.AttachRolePolicy(ctx, &iam.AttachRolePolicyInput{
PolicyArn: policy.Policy.Arn,
RoleName: &roleName,
})
require.NoError(t, err)
// AssumeRole takes about 10 seconds to take effect.
// We'll try for up to 20.
const (
MaxAttempts = 10
Delay = 2 * time.Second
)
// Now assume that role and try and use the secret manager
stsClient := sts.NewFromConfig(cfg)
var assume *sts.AssumeRoleOutput
for i := 0; i < MaxAttempts; i++ {
sessionName := "test-session-" + randomName(t)
assume, err = stsClient.AssumeRole(ctx, &sts.AssumeRoleInput{
RoleArn: role.Role.Arn,
RoleSessionName: &sessionName,
})
if err == nil {
break
}
assume = nil
t.Logf("AssumeRole failed: %v", err)
time.Sleep(Delay)
}
require.NotNil(t, assume, "Could not AssumeRole after %d attempts", MaxAttempts)
creds := assume.Credentials
t.Setenv("AWS_PROFILE", "")
t.Setenv("AWS_ACCESS_KEY_ID", *creds.AccessKeyId)
t.Setenv("AWS_SECRET_ACCESS_KEY", *creds.SecretAccessKey)
t.Setenv("AWS_SESSION_TOKEN", *creds.SessionToken)
testURL(ctx, t, url)
}