Add union token authenticator
Kubernetes-commit: 4fd8196cf56aa7884f5a385017b2be651a259e59
This commit is contained in:
		
							parent
							
								
									80d2e2dae5
								
							
						
					
					
						commit
						be8f046a0c
					
				| 
						 | 
				
			
			@ -0,0 +1,41 @@
 | 
			
		|||
package(default_visibility = ["//visibility:public"])
 | 
			
		||||
 | 
			
		||||
licenses(["notice"])
 | 
			
		||||
 | 
			
		||||
load(
 | 
			
		||||
    "@io_bazel_rules_go//go:def.bzl",
 | 
			
		||||
    "go_library",
 | 
			
		||||
    "go_test",
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
go_test(
 | 
			
		||||
    name = "go_default_test",
 | 
			
		||||
    srcs = ["unionauth_test.go"],
 | 
			
		||||
    library = ":go_default_library",
 | 
			
		||||
    tags = ["automanaged"],
 | 
			
		||||
    deps = ["//vendor/k8s.io/apiserver/pkg/authentication/user:go_default_library"],
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
go_library(
 | 
			
		||||
    name = "go_default_library",
 | 
			
		||||
    srcs = ["union.go"],
 | 
			
		||||
    tags = ["automanaged"],
 | 
			
		||||
    deps = [
 | 
			
		||||
        "//vendor/k8s.io/apimachinery/pkg/util/errors:go_default_library",
 | 
			
		||||
        "//vendor/k8s.io/apiserver/pkg/authentication/authenticator:go_default_library",
 | 
			
		||||
        "//vendor/k8s.io/apiserver/pkg/authentication/user:go_default_library",
 | 
			
		||||
    ],
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
filegroup(
 | 
			
		||||
    name = "package-srcs",
 | 
			
		||||
    srcs = glob(["**"]),
 | 
			
		||||
    tags = ["automanaged"],
 | 
			
		||||
    visibility = ["//visibility:private"],
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
filegroup(
 | 
			
		||||
    name = "all-srcs",
 | 
			
		||||
    srcs = [":package-srcs"],
 | 
			
		||||
    tags = ["automanaged"],
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -0,0 +1,70 @@
 | 
			
		|||
/*
 | 
			
		||||
Copyright 2017 The Kubernetes Authors.
 | 
			
		||||
 | 
			
		||||
Licensed under the Apache License, Version 2.0 (the "License");
 | 
			
		||||
you may not use this file except in compliance with the License.
 | 
			
		||||
You may obtain a copy of the License at
 | 
			
		||||
 | 
			
		||||
    http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 | 
			
		||||
Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
distributed under the License is distributed on an "AS IS" BASIS,
 | 
			
		||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
See the License for the specific language governing permissions and
 | 
			
		||||
limitations under the License.
 | 
			
		||||
*/
 | 
			
		||||
 | 
			
		||||
package union
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	utilerrors "k8s.io/apimachinery/pkg/util/errors"
 | 
			
		||||
	"k8s.io/apiserver/pkg/authentication/authenticator"
 | 
			
		||||
	"k8s.io/apiserver/pkg/authentication/user"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// unionAuthTokenHandler authenticates tokens using a chain of authenticator.Token objects
 | 
			
		||||
type unionAuthTokenHandler struct {
 | 
			
		||||
	// Handlers is a chain of request authenticators to delegate to
 | 
			
		||||
	Handlers []authenticator.Token
 | 
			
		||||
	// FailOnError determines whether an error returns short-circuits the chain
 | 
			
		||||
	FailOnError bool
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// New returns a token authenticator that validates credentials using a chain of authenticator.Token objects.
 | 
			
		||||
// The entire chain is tried until one succeeds. If all fail, an aggregate error is returned.
 | 
			
		||||
func New(authTokenHandlers ...authenticator.Token) authenticator.Token {
 | 
			
		||||
	if len(authTokenHandlers) == 1 {
 | 
			
		||||
		return authTokenHandlers[0]
 | 
			
		||||
	}
 | 
			
		||||
	return &unionAuthTokenHandler{Handlers: authTokenHandlers, FailOnError: false}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NewFailOnError returns a token authenticator that validates credentials using a chain of authenticator.Token objects.
 | 
			
		||||
// The first error short-circuits the chain.
 | 
			
		||||
func NewFailOnError(authTokenHandlers ...authenticator.Token) authenticator.Token {
 | 
			
		||||
	if len(authTokenHandlers) == 1 {
 | 
			
		||||
		return authTokenHandlers[0]
 | 
			
		||||
	}
 | 
			
		||||
	return &unionAuthTokenHandler{Handlers: authTokenHandlers, FailOnError: true}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// AuthenticateToken authenticates the token using a chain of authenticator.Token objects.
 | 
			
		||||
func (authHandler *unionAuthTokenHandler) AuthenticateToken(token string) (user.Info, bool, error) {
 | 
			
		||||
	var errlist []error
 | 
			
		||||
	for _, currAuthRequestHandler := range authHandler.Handlers {
 | 
			
		||||
		info, ok, err := currAuthRequestHandler.AuthenticateToken(token)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			if authHandler.FailOnError {
 | 
			
		||||
				return info, ok, err
 | 
			
		||||
			}
 | 
			
		||||
			errlist = append(errlist, err)
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if ok {
 | 
			
		||||
			return info, ok, err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil, false, utilerrors.NewAggregate(errlist)
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -0,0 +1,158 @@
 | 
			
		|||
/*
 | 
			
		||||
Copyright 2017 The Kubernetes Authors.
 | 
			
		||||
 | 
			
		||||
Licensed under the Apache License, Version 2.0 (the "License");
 | 
			
		||||
you may not use this file except in compliance with the License.
 | 
			
		||||
You may obtain a copy of the License at
 | 
			
		||||
 | 
			
		||||
    http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 | 
			
		||||
Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
distributed under the License is distributed on an "AS IS" BASIS,
 | 
			
		||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
See the License for the specific language governing permissions and
 | 
			
		||||
limitations under the License.
 | 
			
		||||
*/
 | 
			
		||||
 | 
			
		||||
package union
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"errors"
 | 
			
		||||
	"reflect"
 | 
			
		||||
	"strings"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"k8s.io/apiserver/pkg/authentication/user"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type mockAuthRequestHandler struct {
 | 
			
		||||
	returnUser      user.Info
 | 
			
		||||
	isAuthenticated bool
 | 
			
		||||
	err             error
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var (
 | 
			
		||||
	user1 = &user.DefaultInfo{Name: "fresh_ferret", UID: "alfa"}
 | 
			
		||||
	user2 = &user.DefaultInfo{Name: "elegant_sheep", UID: "bravo"}
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func (mock *mockAuthRequestHandler) AuthenticateToken(token string) (user.Info, bool, error) {
 | 
			
		||||
	return mock.returnUser, mock.isAuthenticated, mock.err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAuthenticateTokenSecondPasses(t *testing.T) {
 | 
			
		||||
	handler1 := &mockAuthRequestHandler{returnUser: user1}
 | 
			
		||||
	handler2 := &mockAuthRequestHandler{returnUser: user2, isAuthenticated: true}
 | 
			
		||||
	authRequestHandler := New(handler1, handler2)
 | 
			
		||||
 | 
			
		||||
	authenticatedUser, isAuthenticated, err := authRequestHandler.AuthenticateToken("foo")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Errorf("Unexpected error: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	if !isAuthenticated {
 | 
			
		||||
		t.Errorf("Unexpectedly unauthenticated: %v", isAuthenticated)
 | 
			
		||||
	}
 | 
			
		||||
	if !reflect.DeepEqual(user2, authenticatedUser) {
 | 
			
		||||
		t.Errorf("Expected %v, got %v", user2, authenticatedUser)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAuthenticateTokenFirstPasses(t *testing.T) {
 | 
			
		||||
	handler1 := &mockAuthRequestHandler{returnUser: user1, isAuthenticated: true}
 | 
			
		||||
	handler2 := &mockAuthRequestHandler{returnUser: user2}
 | 
			
		||||
	authRequestHandler := New(handler1, handler2)
 | 
			
		||||
 | 
			
		||||
	authenticatedUser, isAuthenticated, err := authRequestHandler.AuthenticateToken("foo")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Errorf("Unexpected error: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	if !isAuthenticated {
 | 
			
		||||
		t.Errorf("Unexpectedly unauthenticated: %v", isAuthenticated)
 | 
			
		||||
	}
 | 
			
		||||
	if !reflect.DeepEqual(user1, authenticatedUser) {
 | 
			
		||||
		t.Errorf("Expected %v, got %v", user1, authenticatedUser)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAuthenticateTokenSuppressUnnecessaryErrors(t *testing.T) {
 | 
			
		||||
	handler1 := &mockAuthRequestHandler{err: errors.New("first")}
 | 
			
		||||
	handler2 := &mockAuthRequestHandler{isAuthenticated: true}
 | 
			
		||||
	authRequestHandler := New(handler1, handler2)
 | 
			
		||||
 | 
			
		||||
	_, isAuthenticated, err := authRequestHandler.AuthenticateToken("foo")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Errorf("Unexpected error: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	if !isAuthenticated {
 | 
			
		||||
		t.Errorf("Unexpectedly unauthenticated: %v", isAuthenticated)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAuthenticateTokenNoAuthenticators(t *testing.T) {
 | 
			
		||||
	authRequestHandler := New()
 | 
			
		||||
 | 
			
		||||
	authenticatedUser, isAuthenticated, err := authRequestHandler.AuthenticateToken("foo")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Errorf("Unexpected error: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	if isAuthenticated {
 | 
			
		||||
		t.Errorf("Unexpectedly authenticated: %v", isAuthenticated)
 | 
			
		||||
	}
 | 
			
		||||
	if authenticatedUser != nil {
 | 
			
		||||
		t.Errorf("Unexpected authenticatedUser: %v", authenticatedUser)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAuthenticateTokenNonePass(t *testing.T) {
 | 
			
		||||
	handler1 := &mockAuthRequestHandler{}
 | 
			
		||||
	handler2 := &mockAuthRequestHandler{}
 | 
			
		||||
	authRequestHandler := New(handler1, handler2)
 | 
			
		||||
 | 
			
		||||
	_, isAuthenticated, err := authRequestHandler.AuthenticateToken("foo")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Errorf("Unexpected error: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	if isAuthenticated {
 | 
			
		||||
		t.Errorf("Unexpectedly authenticated: %v", isAuthenticated)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAuthenticateTokenAdditiveErrors(t *testing.T) {
 | 
			
		||||
	handler1 := &mockAuthRequestHandler{err: errors.New("first")}
 | 
			
		||||
	handler2 := &mockAuthRequestHandler{err: errors.New("second")}
 | 
			
		||||
	authRequestHandler := New(handler1, handler2)
 | 
			
		||||
 | 
			
		||||
	_, isAuthenticated, err := authRequestHandler.AuthenticateToken("foo")
 | 
			
		||||
	if err == nil {
 | 
			
		||||
		t.Errorf("Expected an error")
 | 
			
		||||
	}
 | 
			
		||||
	if !strings.Contains(err.Error(), "first") {
 | 
			
		||||
		t.Errorf("Expected error containing %v, got %v", "first", err)
 | 
			
		||||
	}
 | 
			
		||||
	if !strings.Contains(err.Error(), "second") {
 | 
			
		||||
		t.Errorf("Expected error containing %v, got %v", "second", err)
 | 
			
		||||
	}
 | 
			
		||||
	if isAuthenticated {
 | 
			
		||||
		t.Errorf("Unexpectedly authenticated: %v", isAuthenticated)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAuthenticateTokenFailEarly(t *testing.T) {
 | 
			
		||||
	handler1 := &mockAuthRequestHandler{err: errors.New("first")}
 | 
			
		||||
	handler2 := &mockAuthRequestHandler{err: errors.New("second")}
 | 
			
		||||
	authRequestHandler := NewFailOnError(handler1, handler2)
 | 
			
		||||
 | 
			
		||||
	_, isAuthenticated, err := authRequestHandler.AuthenticateToken("foo")
 | 
			
		||||
	if err == nil {
 | 
			
		||||
		t.Errorf("Expected an error")
 | 
			
		||||
	}
 | 
			
		||||
	if !strings.Contains(err.Error(), "first") {
 | 
			
		||||
		t.Errorf("Expected error containing %v, got %v", "first", err)
 | 
			
		||||
	}
 | 
			
		||||
	if strings.Contains(err.Error(), "second") {
 | 
			
		||||
		t.Errorf("Did not expect second error, got %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	if isAuthenticated {
 | 
			
		||||
		t.Errorf("Unexpectedly authenticated: %v", isAuthenticated)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
		Loading…
	
		Reference in New Issue