You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
239 lines
6.7 KiB
239 lines
6.7 KiB
package integration
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/seaweedfs/seaweedfs/weed/iam/policy"
|
|
"github.com/seaweedfs/seaweedfs/weed/iam/sts"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
// TestPolicyVariableSubstitution tests dynamic policy variables like ${oidc:sub} in Resource fields
|
|
func TestPolicyVariableSubstitution(t *testing.T) {
|
|
iamManager := setupIntegratedIAMSystem(t)
|
|
ctx := context.Background()
|
|
|
|
// Create a role with a policy that uses ${oidc:sub} variable
|
|
// This allows users to access only their own folder
|
|
err := iamManager.CreateRole(ctx, "", "DynamicUserRole", &RoleDefinition{
|
|
RoleName: "DynamicUserRole",
|
|
TrustPolicy: &policy.PolicyDocument{
|
|
Version: "2012-10-17",
|
|
Statement: []policy.Statement{
|
|
{
|
|
Effect: "Allow",
|
|
Principal: map[string]interface{}{
|
|
"Federated": "test-oidc",
|
|
},
|
|
Action: []string{"sts:AssumeRoleWithWebIdentity"},
|
|
},
|
|
},
|
|
},
|
|
AttachedPolicies: []string{"DynamicUserPolicy"},
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
// Create the policy with variable substitution
|
|
userPolicy := &policy.PolicyDocument{
|
|
Version: "2012-10-17",
|
|
Statement: []policy.Statement{
|
|
{
|
|
Effect: "Allow",
|
|
Action: []string{"s3:GetObject", "s3:PutObject"},
|
|
Resource: []string{
|
|
"arn:aws:s3:::mybucket/${oidc:sub}/*",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
// Store the policy (in a real system this would be in the policy store)
|
|
err = iamManager.policyEngine.AddPolicy("", "DynamicUserPolicy", userPolicy)
|
|
require.NoError(t, err)
|
|
|
|
// Create JWT for user "alice"
|
|
aliceJWT := createTestJWT(t, "https://test-issuer.com", "alice", "test-signing-key")
|
|
|
|
// Assume role as "alice"
|
|
assumeRequest := &sts.AssumeRoleWithWebIdentityRequest{
|
|
RoleArn: "arn:aws:iam::role/DynamicUserRole",
|
|
WebIdentityToken: aliceJWT,
|
|
RoleSessionName: "alice-session",
|
|
}
|
|
|
|
response, err := iamManager.AssumeRoleWithWebIdentity(ctx, assumeRequest)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, response)
|
|
|
|
// Test that the policy engine correctly substitutes ${oidc:sub} with "alice"
|
|
evalCtx := &policy.EvaluationContext{
|
|
Principal: "arn:aws:sts::assumed-role/DynamicUserRole/alice-session",
|
|
Action: "s3:GetObject",
|
|
Resource: "arn:aws:s3:::mybucket/alice/file.txt",
|
|
RequestContext: map[string]interface{}{
|
|
"oidc:sub": "alice",
|
|
},
|
|
}
|
|
|
|
result, err := iamManager.policyEngine.Evaluate(ctx, "", evalCtx, []string{"DynamicUserPolicy"})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, policy.EffectAllow, result.Effect, "Alice should be allowed to access her own folder")
|
|
|
|
// Test that alice cannot access bob's folder
|
|
evalCtx.Resource = "arn:aws:s3:::mybucket/bob/file.txt"
|
|
result, err = iamManager.policyEngine.Evaluate(ctx, "", evalCtx, []string{"DynamicUserPolicy"})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, policy.EffectDeny, result.Effect, "Alice should NOT be allowed to access Bob's folder")
|
|
}
|
|
|
|
// TestConditionWithNumericComparison tests numeric conditions like DurationSeconds
|
|
func TestConditionWithNumericComparison(t *testing.T) {
|
|
iamManager := setupIntegratedIAMSystem(t)
|
|
ctx := context.Background()
|
|
|
|
// Create role with trust policy enforcing DurationSeconds <= 3600
|
|
err := iamManager.CreateRole(ctx, "", "LimitedDurationRole", &RoleDefinition{
|
|
RoleName: "LimitedDurationRole",
|
|
TrustPolicy: &policy.PolicyDocument{
|
|
Version: "2012-10-17",
|
|
Statement: []policy.Statement{
|
|
{
|
|
Effect: "Allow",
|
|
Principal: map[string]interface{}{
|
|
"Federated": "test-oidc",
|
|
},
|
|
Action: []string{"sts:AssumeRoleWithWebIdentity"},
|
|
Condition: map[string]map[string]interface{}{
|
|
"NumericLessThanEquals": {
|
|
"sts:DurationSeconds": 3600, // Max 1 hour
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
AttachedPolicies: []string{"S3ReadOnlyPolicy"},
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
validJWT := createTestJWT(t, "https://test-issuer.com", "user", "test-signing-key")
|
|
|
|
tests := []struct {
|
|
name string
|
|
duration int64
|
|
shouldAllow bool
|
|
}{
|
|
{
|
|
name: "duration within limit",
|
|
duration: 1800, // 30 mins
|
|
shouldAllow: true,
|
|
},
|
|
{
|
|
name: "duration at limit",
|
|
duration: 3600, // 1 hour
|
|
shouldAllow: true,
|
|
},
|
|
{
|
|
name: "duration exceeding limit",
|
|
duration: 7200, // 2 hours
|
|
shouldAllow: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
req := &sts.AssumeRoleWithWebIdentityRequest{
|
|
RoleArn: "arn:aws:iam::role/LimitedDurationRole",
|
|
WebIdentityToken: validJWT,
|
|
RoleSessionName: "test-session",
|
|
DurationSeconds: &tt.duration,
|
|
}
|
|
|
|
response, err := iamManager.AssumeRoleWithWebIdentity(ctx, req)
|
|
|
|
if tt.shouldAllow {
|
|
assert.NoError(t, err, "Expected role assumption to succeed for duration %d", tt.duration)
|
|
assert.NotNil(t, response)
|
|
} else {
|
|
assert.Error(t, err, "Expected role assumption to fail for duration %d", tt.duration)
|
|
assert.Nil(t, response)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestMultipleConditionOperators tests policies with multiple condition operators
|
|
func TestMultipleConditionOperators(t *testing.T) {
|
|
iamManager := setupIntegratedIAMSystem(t)
|
|
ctx := context.Background()
|
|
|
|
// Create a policy with multiple conditions
|
|
complexPolicy := &policy.PolicyDocument{
|
|
Version: "2012-10-17",
|
|
Statement: []policy.Statement{
|
|
{
|
|
Effect: "Allow",
|
|
Action: []string{"s3:GetObject"},
|
|
Resource: []string{
|
|
"arn:aws:s3:::secure-bucket/*",
|
|
},
|
|
Condition: map[string]map[string]interface{}{
|
|
"StringEquals": {
|
|
"oidc:aud": "my-app-id",
|
|
},
|
|
"StringLike": {
|
|
"oidc:sub": "user-*",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
err := iamManager.policyEngine.AddPolicy("", "ComplexConditionPolicy", complexPolicy)
|
|
require.NoError(t, err)
|
|
|
|
tests := []struct {
|
|
name string
|
|
aud string
|
|
sub string
|
|
expectedEffect policy.Effect
|
|
}{
|
|
{
|
|
name: "all conditions match",
|
|
aud: "my-app-id",
|
|
sub: "user-alice",
|
|
expectedEffect: policy.EffectAllow,
|
|
},
|
|
{
|
|
name: "aud mismatch",
|
|
aud: "wrong-app-id",
|
|
sub: "user-alice",
|
|
expectedEffect: policy.EffectDeny,
|
|
},
|
|
{
|
|
name: "sub pattern mismatch",
|
|
aud: "my-app-id",
|
|
sub: "admin-alice",
|
|
expectedEffect: policy.EffectDeny,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
evalCtx := &policy.EvaluationContext{
|
|
Principal: "arn:aws:sts::assumed-role/TestRole/session",
|
|
Action: "s3:GetObject",
|
|
Resource: "arn:aws:s3:::secure-bucket/file.txt",
|
|
RequestContext: map[string]interface{}{
|
|
"oidc:aud": tt.aud,
|
|
"oidc:sub": tt.sub,
|
|
},
|
|
}
|
|
|
|
result, err := iamManager.policyEngine.Evaluate(ctx, "", evalCtx, []string{"ComplexConditionPolicy"})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, tt.expectedEffect, result.Effect)
|
|
})
|
|
}
|
|
}
|