datasource_cache_test.go 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243
  1. package models
  2. import (
  3. "testing"
  4. "time"
  5. . "github.com/smartystreets/goconvey/convey"
  6. "github.com/grafana/grafana/pkg/components/simplejson"
  7. "github.com/grafana/grafana/pkg/setting"
  8. "github.com/grafana/grafana/pkg/util"
  9. )
  10. //nolint:goconst
  11. func TestDataSourceCache(t *testing.T) {
  12. Convey("When caching a datasource proxy", t, func() {
  13. clearCache()
  14. ds := DataSource{
  15. Id: 1,
  16. Url: "http://k8s:8001",
  17. Type: "Kubernetes",
  18. }
  19. t1, err := ds.GetHttpTransport()
  20. So(err, ShouldBeNil)
  21. t2, err := ds.GetHttpTransport()
  22. So(err, ShouldBeNil)
  23. Convey("Should be using the cached proxy", func() {
  24. So(t2, ShouldEqual, t1)
  25. })
  26. Convey("Should verify TLS by default", func() {
  27. So(t1.TLSClientConfig.InsecureSkipVerify, ShouldEqual, false)
  28. })
  29. Convey("Should have no TLS client certificate configured", func() {
  30. So(len(t1.TLSClientConfig.Certificates), ShouldEqual, 0)
  31. })
  32. Convey("Should have no user-supplied TLS CA onfigured", func() {
  33. So(t1.TLSClientConfig.RootCAs, ShouldBeNil)
  34. })
  35. })
  36. Convey("When caching a datasource proxy then updating it", t, func() {
  37. clearCache()
  38. setting.SecretKey = "password"
  39. json := simplejson.New()
  40. json.Set("tlsAuthWithCACert", true)
  41. tlsCaCert, err := util.Encrypt([]byte(caCert), "password")
  42. So(err, ShouldBeNil)
  43. ds := DataSource{
  44. Id: 1,
  45. Url: "http://k8s:8001",
  46. Type: "Kubernetes",
  47. SecureJsonData: map[string][]byte{"tlsCACert": tlsCaCert},
  48. Updated: time.Now().Add(-2 * time.Minute),
  49. }
  50. t1, err := ds.GetHttpTransport()
  51. So(err, ShouldBeNil)
  52. Convey("Should verify TLS by default", func() {
  53. So(t1.TLSClientConfig.InsecureSkipVerify, ShouldEqual, false)
  54. })
  55. Convey("Should have no TLS client certificate configured", func() {
  56. So(len(t1.TLSClientConfig.Certificates), ShouldEqual, 0)
  57. })
  58. Convey("Should have no user-supplied TLS CA configured", func() {
  59. So(t1.TLSClientConfig.RootCAs, ShouldBeNil)
  60. })
  61. ds.JsonData = nil
  62. ds.SecureJsonData = map[string][]byte{}
  63. ds.Updated = time.Now()
  64. t2, err := ds.GetHttpTransport()
  65. So(err, ShouldBeNil)
  66. Convey("Should have no user-supplied TLS CA configured after the update", func() {
  67. So(t2.TLSClientConfig.RootCAs, ShouldBeNil)
  68. })
  69. })
  70. Convey("When caching a datasource proxy with TLS client authentication enabled", t, func() {
  71. clearCache()
  72. setting.SecretKey = "password"
  73. json := simplejson.New()
  74. json.Set("tlsAuth", true)
  75. tlsClientCert, err := util.Encrypt([]byte(clientCert), "password")
  76. So(err, ShouldBeNil)
  77. tlsClientKey, err := util.Encrypt([]byte(clientKey), "password")
  78. So(err, ShouldBeNil)
  79. ds := DataSource{
  80. Id: 1,
  81. Url: "http://k8s:8001",
  82. Type: "Kubernetes",
  83. JsonData: json,
  84. SecureJsonData: map[string][]byte{
  85. "tlsClientCert": tlsClientCert,
  86. "tlsClientKey": tlsClientKey,
  87. },
  88. }
  89. tr, err := ds.GetHttpTransport()
  90. So(err, ShouldBeNil)
  91. Convey("Should verify TLS by default", func() {
  92. So(tr.TLSClientConfig.InsecureSkipVerify, ShouldEqual, false)
  93. })
  94. Convey("Should have a TLS client certificate configured", func() {
  95. So(len(tr.TLSClientConfig.Certificates), ShouldEqual, 1)
  96. })
  97. })
  98. Convey("When caching a datasource proxy with a user-supplied TLS CA", t, func() {
  99. clearCache()
  100. setting.SecretKey = "password"
  101. json := simplejson.New()
  102. json.Set("tlsAuthWithCACert", true)
  103. tlsCaCert, err := util.Encrypt([]byte(caCert), "password")
  104. So(err, ShouldBeNil)
  105. ds := DataSource{
  106. Id: 1,
  107. Url: "http://k8s:8001",
  108. Type: "Kubernetes",
  109. JsonData: json,
  110. SecureJsonData: map[string][]byte{"tlsCACert": tlsCaCert},
  111. }
  112. tr, err := ds.GetHttpTransport()
  113. So(err, ShouldBeNil)
  114. Convey("Should verify TLS by default", func() {
  115. So(tr.TLSClientConfig.InsecureSkipVerify, ShouldEqual, false)
  116. })
  117. Convey("Should have a TLS CA configured", func() {
  118. So(len(tr.TLSClientConfig.RootCAs.Subjects()), ShouldEqual, 1)
  119. })
  120. })
  121. Convey("When caching a datasource proxy when user skips TLS verification", t, func() {
  122. clearCache()
  123. json := simplejson.New()
  124. json.Set("tlsSkipVerify", true)
  125. ds := DataSource{
  126. Id: 1,
  127. Url: "http://k8s:8001",
  128. Type: "Kubernetes",
  129. JsonData: json,
  130. }
  131. tr, err := ds.GetHttpTransport()
  132. So(err, ShouldBeNil)
  133. Convey("Should skip TLS verification", func() {
  134. So(tr.TLSClientConfig.InsecureSkipVerify, ShouldEqual, true)
  135. })
  136. })
  137. }
  138. func clearCache() {
  139. ptc.Lock()
  140. defer ptc.Unlock()
  141. ptc.cache = make(map[int64]cachedTransport)
  142. }
  143. const caCert string = `-----BEGIN CERTIFICATE-----
  144. MIIDATCCAemgAwIBAgIJAMQ5hC3CPDTeMA0GCSqGSIb3DQEBCwUAMBcxFTATBgNV
  145. BAMMDGNhLWs4cy1zdGhsbTAeFw0xNjEwMjcwODQyMjdaFw00NDAzMTQwODQyMjda
  146. MBcxFTATBgNVBAMMDGNhLWs4cy1zdGhsbTCCASIwDQYJKoZIhvcNAQEBBQADggEP
  147. ADCCAQoCggEBAMLe2AmJ6IleeUt69vgNchOjjmxIIxz5sp1vFu94m1vUip7CqnOg
  148. QkpUsHeBPrGYv8UGloARCL1xEWS+9FVZeXWQoDmbC0SxXhFwRIESNCET7Q8KMi/4
  149. 4YPvnMLGZi3Fjwxa8BdUBCN1cx4WEooMVTWXm7RFMtZgDfuOAn3TNXla732sfT/d
  150. 1HNFrh48b0wA+HhmA3nXoBnBEblA665hCeo7lIAdRr0zJxJpnFnWXkyTClsAUTMN
  151. iL905LdBiiIRenojipfKXvMz88XSaWTI7JjZYU3BvhyXndkT6f12cef3I96NY3WJ
  152. 0uIK4k04WrbzdYXMU3rN6NqlvbHqnI+E7aMCAwEAAaNQME4wHQYDVR0OBBYEFHHx
  153. 2+vSPw9bECHj3O51KNo5VdWOMB8GA1UdIwQYMBaAFHHx2+vSPw9bECHj3O51KNo5
  154. VdWOMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAH2eV5NcV3LBJHs9
  155. I+adbiTPg2vyumrGWwy73T0X8Dtchgt8wU7Q9b9Ucg2fOTmSSyS0iMqEu1Yb2ORB
  156. CknM9mixHC9PwEBbkGCom3VVkqdLwSP6gdILZgyLoH4i8sTUz+S1yGPepi+Vzhs7
  157. adOXtryjcGnwft6HdfKPNklMOHFnjw6uqpho54oj/z55jUpicY/8glDHdrr1bh3k
  158. MHuiWLGewHXPvxfG6UoUx1te65IhifVcJGFZDQwfEmhBflfCmtAJlZEsgTLlBBCh
  159. FHoXIyGOdq1chmRVocdGBCF8fUoGIbuF14r53rpvcbEKtKnnP8+96luKAZLq0a4n
  160. 3lb92xM=
  161. -----END CERTIFICATE-----`
  162. const clientCert string = `
  163. -----BEGIN CERTIFICATE-----
  164. MIICsjCCAZoCCQCcd8sOfstQLzANBgkqhkiG9w0BAQsFADAXMRUwEwYDVQQDDAxj
  165. YS1rOHMtc3RobG0wHhcNMTYxMTAyMDkyNTE1WhcNMTcxMTAyMDkyNTE1WjAfMR0w
  166. GwYDVQQDDBRhZG0tZGFuaWVsLWs4cy1zdGhsbTCCASIwDQYJKoZIhvcNAQEBBQAD
  167. ggEPADCCAQoCggEBAOMliaWyNEUJKM37vWCl5bGub3lMicyRAqGQyY/qxD9yKKM2
  168. FbucVcmWmg5vvTqQVl5rlQ+c7GI8OD6ptmFl8a26coEki7bFr8bkpSyBSEc5p27b
  169. Z0ORFSqBHWHQbr9PkxPLYW6T3gZYUtRYv3OQgGxLXlvUh85n/mQfuR3N1FgmShHo
  170. GtAFi/ht6leXa0Ms+jNSDLCmXpJm1GIEqgyKX7K3+g3vzo9coYqXq4XTa8Efs2v8
  171. SCwqWfBC3rHfgs/5DLB8WT4Kul8QzxkytzcaBQfRfzhSV6bkgm7oTzt2/1eRRsf4
  172. YnXzLE9YkCC9sAn+Owzqf+TYC1KRluWDfqqBTJUCAwEAATANBgkqhkiG9w0BAQsF
  173. AAOCAQEAdMsZg6edWGC+xngizn0uamrUg1ViaDqUsz0vpzY5NWLA4MsBc4EtxWRP
  174. ueQvjUimZ3U3+AX0YWNLIrH1FCVos2jdij/xkTUmHcwzr8rQy+B17cFi+a8jtpgw
  175. AU6WWoaAIEhhbWQfth/Diz3mivl1ARB+YqiWca2mjRPLTPcKJEURDVddQ423el0Q
  176. 4JNxS5icu7T2zYTYHAo/cT9zVdLZl0xuLxYm3asK1IONJ/evxyVZima3il6MPvhe
  177. 58Hwz+m+HdqHxi24b/1J/VKYbISG4huOQCdLzeNXgvwFlGPUmHSnnKo1/KbQDAR5
  178. llG/Sw5+FquFuChaA6l5KWy7F3bQyA==
  179. -----END CERTIFICATE-----`
  180. const clientKey string = `-----BEGIN RSA PRIVATE KEY-----
  181. MIIEpQIBAAKCAQEA4yWJpbI0RQkozfu9YKXlsa5veUyJzJECoZDJj+rEP3IoozYV
  182. u5xVyZaaDm+9OpBWXmuVD5zsYjw4Pqm2YWXxrbpygSSLtsWvxuSlLIFIRzmnbttn
  183. Q5EVKoEdYdBuv0+TE8thbpPeBlhS1Fi/c5CAbEteW9SHzmf+ZB+5Hc3UWCZKEega
  184. 0AWL+G3qV5drQyz6M1IMsKZekmbUYgSqDIpfsrf6De/Oj1yhiperhdNrwR+za/xI
  185. LCpZ8ELesd+Cz/kMsHxZPgq6XxDPGTK3NxoFB9F/OFJXpuSCbuhPO3b/V5FGx/hi
  186. dfMsT1iQIL2wCf47DOp/5NgLUpGW5YN+qoFMlQIDAQABAoIBAQCzy4u312XeW1Cs
  187. Mx6EuOwmh59/ESFmBkZh4rxZKYgrfE5EWlQ7i5SwG4BX+wR6rbNfy6JSmHDXlTkk
  188. CKvvToVNcW6fYHEivDnVojhIERFIJ4+rhQmpBtcNLOQ3/4cZ8X/GxE6b+3lb5l+x
  189. 64mnjPLKRaIr5/+TVuebEy0xNTJmjnJ7yiB2HRz7uXEQaVSk/P7KAkkyl/9J3/LM
  190. 8N9AX1w6qDaNQZ4/P0++1H4SQenosM/b/GqGTomarEk/GE0NcB9rzmR9VCXa7FRh
  191. WV5jyt9vUrwIEiK/6nUnOkGO8Ei3kB7Y+e+2m6WdaNoU5RAfqXmXa0Q/a0lLRruf
  192. vTMo2WrBAoGBAPRaK4cx76Q+3SJ/wfznaPsMM06OSR8A3ctKdV+ip/lyKtb1W8Pz
  193. k8MYQDH7GwPtSu5QD8doL00pPjugZL/ba7X9nAsI+pinyEErfnB9y7ORNEjIYYzs
  194. DiqDKup7ANgw1gZvznWvb9Ge0WUSXvWS0pFkgootQAf+RmnnbWGH6l6RAoGBAO35
  195. aGUrLro5u9RD24uSXNU3NmojINIQFK5dHAT3yl0BBYstL43AEsye9lX95uMPTvOQ
  196. Cqcn42Hjp/bSe3n0ObyOZeXVrWcDFAfE0wwB1BkvL1lpgnFO9+VQORlH4w3Ppnpo
  197. jcPkR2TFeDaAYtvckhxe/Bk3OnuFmnsQ3VzM75fFAoGBAI6PvS2XeNU+yA3EtA01
  198. hg5SQ+zlHswz2TMuMeSmJZJnhY78f5mHlwIQOAPxGQXlf/4iP9J7en1uPpzTK3S0
  199. M9duK4hUqMA/w5oiIhbHjf0qDnMYVbG+V1V+SZ+cPBXmCDihKreGr5qBKnHpkfV8
  200. v9WL6o1rcRw4wiQvnaV1gsvBAoGBALtzVTczr6gDKCAIn5wuWy+cQSGTsBunjRLX
  201. xuVm5iEiV+KMYkPvAx/pKzMLP96lRVR3ptyKgAKwl7LFk3u50+zh4gQLr35QH2wL
  202. Lw7rNc3srAhrItPsFzqrWX6/cGuFoKYVS239l/sZzRppQPXcpb7xVvTp2whHcir0
  203. Wtnpl+TdAoGAGqKqo2KU3JoY3IuTDUk1dsNAm8jd9EWDh+s1x4aG4N79mwcss5GD
  204. FF8MbFPneK7xQd8L6HisKUDAUi2NOyynM81LAftPkvN6ZuUVeFDfCL4vCA0HUXLD
  205. +VrOhtUZkNNJlLMiVRJuQKUOGlg8PpObqYbstQAf/0/yFJMRHG82Tcg=
  206. -----END RSA PRIVATE KEY-----`