mirror of
https://github.com/argoproj/argo-cd
synced 2026-04-21 08:57:17 +00:00
268 lines
8.7 KiB
Go
268 lines
8.7 KiB
Go
package settings
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"github.com/argoproj/argo-cd/v3/pkg/apis/application/v1alpha1"
|
|
)
|
|
|
|
func TestDeriveServiceAccountToImpersonate(t *testing.T) {
|
|
t.Run("MatchingServerAndNamespace", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "https://cluster-api.example.com", Namespace: "dest-ns", DefaultServiceAccount: "test-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, "system:serviceaccount:dest-ns:test-sa", user)
|
|
})
|
|
|
|
t.Run("MatchingWithGlobPatterns", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "*", Namespace: "*", DefaultServiceAccount: "test-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "any-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, "system:serviceaccount:any-ns:test-sa", user)
|
|
})
|
|
|
|
t.Run("MatchingWithNamespacedServiceAccount", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "https://cluster-api.example.com", Namespace: "dest-ns", DefaultServiceAccount: "other-ns:deploy-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, "system:serviceaccount:other-ns:deploy-sa", user)
|
|
})
|
|
|
|
t.Run("FallbackToAppNamespaceWhenDestEmpty", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
// Namespace pattern matches empty string via glob "*"
|
|
{Server: "*", Namespace: "", DefaultServiceAccount: "test-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
ObjectMeta: metav1.ObjectMeta{Namespace: "app-ns"},
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
require.NoError(t, err)
|
|
// Should use app.Namespace ("app-ns") as the SA namespace since Destination.Namespace is empty
|
|
assert.Equal(t, "system:serviceaccount:app-ns:test-sa", user)
|
|
})
|
|
|
|
t.Run("NoMatchingEntry", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "https://other-server.com", Namespace: "other-ns", DefaultServiceAccount: "test-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
assert.Empty(t, user)
|
|
assert.ErrorContains(t, err, "no matching service account found")
|
|
})
|
|
|
|
t.Run("EmptyDestinationServiceAccounts", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
assert.Empty(t, user)
|
|
assert.ErrorContains(t, err, "no matching service account found")
|
|
})
|
|
|
|
t.Run("InvalidServiceAccountChars", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "*", Namespace: "*", DefaultServiceAccount: "bad*sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
assert.Empty(t, user)
|
|
assert.ErrorContains(t, err, "default service account contains invalid chars")
|
|
})
|
|
|
|
t.Run("BlankServiceAccount", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "*", Namespace: "*", DefaultServiceAccount: " "},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
assert.Empty(t, user)
|
|
assert.ErrorContains(t, err, "default service account contains invalid chars")
|
|
})
|
|
|
|
t.Run("InvalidServerGlobPattern", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "[", Namespace: "dest-ns", DefaultServiceAccount: "test-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
assert.Empty(t, user)
|
|
assert.ErrorContains(t, err, "invalid glob pattern for destination server")
|
|
})
|
|
|
|
t.Run("InvalidNamespaceGlobPattern", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "*", Namespace: "[", DefaultServiceAccount: "test-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
assert.Empty(t, user)
|
|
assert.ErrorContains(t, err, "invalid glob pattern for destination namespace")
|
|
})
|
|
|
|
t.Run("FirstMatchWins", func(t *testing.T) {
|
|
project := &v1alpha1.AppProject{
|
|
Spec: v1alpha1.AppProjectSpec{
|
|
DestinationServiceAccounts: []v1alpha1.ApplicationDestinationServiceAccount{
|
|
{Server: "*", Namespace: "dest-ns", DefaultServiceAccount: "first-sa"},
|
|
{Server: "*", Namespace: "*", DefaultServiceAccount: "second-sa"},
|
|
},
|
|
},
|
|
}
|
|
app := &v1alpha1.Application{
|
|
Spec: v1alpha1.ApplicationSpec{
|
|
Destination: v1alpha1.ApplicationDestination{
|
|
Server: "https://cluster-api.example.com",
|
|
Namespace: "dest-ns",
|
|
},
|
|
},
|
|
}
|
|
cluster := &v1alpha1.Cluster{Server: "https://cluster-api.example.com"}
|
|
|
|
user, err := DeriveServiceAccountToImpersonate(project, app, cluster)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, "system:serviceaccount:dest-ns:first-sa", user)
|
|
})
|
|
}
|