Skip to content

Commit

Permalink
Merge branch '3.0.x'
Browse files Browse the repository at this point in the history
  • Loading branch information
ryanjbaxter committed Dec 27, 2023
2 parents c1d6cff + 05fa5db commit 8fbfa40
Show file tree
Hide file tree
Showing 29 changed files with 2,727 additions and 6 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,98 @@
/*
* Copyright 2013-2023 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/

package org.springframework.cloud.kubernetes.client.config.boostrap.stubs;

import java.util.Map;

import com.github.tomakehurst.wiremock.WireMockServer;
import com.github.tomakehurst.wiremock.client.WireMock;
import io.kubernetes.client.openapi.ApiClient;
import io.kubernetes.client.openapi.JSON;
import io.kubernetes.client.openapi.models.V1ConfigMap;
import io.kubernetes.client.openapi.models.V1ConfigMapBuilder;
import io.kubernetes.client.openapi.models.V1ConfigMapList;
import io.kubernetes.client.openapi.models.V1ObjectMetaBuilder;
import io.kubernetes.client.openapi.models.V1Secret;
import io.kubernetes.client.openapi.models.V1SecretBuilder;
import io.kubernetes.client.openapi.models.V1SecretList;
import io.kubernetes.client.util.ClientBuilder;

import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.core.annotation.Order;

import static com.github.tomakehurst.wiremock.core.WireMockConfiguration.options;

/**
* A test bootstrap that takes care to initialize ApiClient _before_ our main bootstrap
* context; with some stub data already present.
*
* @author wind57
*/
@Order(0)
@Configuration
@ConditionalOnProperty("bootstrap.sanitize")
public class BootstrapKubernetesClientSanitizeEnvEndpointStub {

@Bean
public WireMockServer wireMock() {
WireMockServer server = new WireMockServer(options().dynamicPort());
server.start();
WireMock.configureFor("localhost", server.port());
return server;
}

@Bean
public ApiClient apiClient(WireMockServer wireMockServer) {
ApiClient apiClient = new ClientBuilder().setBasePath("http://localhost:" + wireMockServer.port()).build();
io.kubernetes.client.openapi.Configuration.setDefaultApiClient(apiClient);
apiClient.setDebugging(true);
stubData();
return apiClient;
}

public static void stubData() {

V1ConfigMap one = new V1ConfigMapBuilder()
.withMetadata(new V1ObjectMetaBuilder().withName("sanitize-configmap").withNamespace("test").build())
.addToData(Map.of("sanitize.sanitizeConfigMapName", "sanitizeConfigMapValue")).build();

V1Secret secretOne = new V1SecretBuilder()
.withMetadata(new V1ObjectMetaBuilder().withName("sanitize-secret").withNamespace("test").build())
.addToData(Map.of("sanitize.sanitizeSecretName", "sanitizeSecretValue".getBytes())).build();

V1Secret secretTwo = new V1SecretBuilder()
.withMetadata(new V1ObjectMetaBuilder().withName("sanitize-secret-two").withNamespace("test").build())
.addToData(Map.of("sanitize.sanitizeSecretNameTwo", "sanitizeSecretValueTwo".getBytes())).build();

// the actual stub for CoreV1Api calls
V1ConfigMapList configMapList = new V1ConfigMapList();
configMapList.addItemsItem(one);

V1SecretList secretList = new V1SecretList();
secretList.addItemsItem(secretOne);
secretList.addItemsItem(secretTwo);

WireMock.stubFor(WireMock.get("/api/v1/namespaces/test/configmaps")
.willReturn(WireMock.aResponse().withStatus(200).withBody(new JSON().serialize(configMapList))));

WireMock.stubFor(WireMock.get("/api/v1/namespaces/test/secrets")
.willReturn(WireMock.aResponse().withStatus(200).withBody(new JSON().serialize(secretList))));
}

}
Original file line number Diff line number Diff line change
@@ -0,0 +1,218 @@
/*
* Copyright 2013-2023 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/

package org.springframework.cloud.kubernetes.client.config.sanitize_secrets;

import org.junit.jupiter.api.Nested;
import org.junit.jupiter.api.Test;

import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.boot.actuate.endpoint.SanitizableData;
import org.springframework.boot.test.context.SpringBootTest;
import org.springframework.boot.test.web.server.LocalManagementPort;
import org.springframework.http.MediaType;
import org.springframework.test.web.reactive.server.WebTestClient;

/**
* @author wind57
*/
class BootstrapKubernetesClientSanitizeConfigpropsEndpointTests {

@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT, classes = SanitizeApp.class,
properties = { "spring.main.cloud-platform=KUBERNETES", "spring.cloud.bootstrap.enabled=true",
"management.endpoints.web.exposure.include=*", "spring.cloud.bootstrap.name=sanitize",
"bootstrap.sanitize=true", "spring.cloud.kubernetes.client.namespace=test" })
@Nested
class DefaultSettingsTest {

@Autowired
private WebTestClient webClient;

@LocalManagementPort
private int port;

@Test
void test() {
// configmap is sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeConfigMapName")
.isEqualTo(SanitizableData.SANITIZED_VALUE);

// secret is sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeSecretName")
.isEqualTo(SanitizableData.SANITIZED_VALUE);

// secret is usable from configuration properties
webClient.get().uri("http://localhost:{port}/secret", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeSecretValue");

// configmap is usable from configuration properties
webClient.get().uri("http://localhost:{port}/configmap", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeConfigMapValue");
}

}

// management.endpoint.configprops.show-values = NEVER
@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT, classes = SanitizeApp.class,
properties = { "spring.main.cloud-platform=KUBERNETES", "spring.cloud.bootstrap.enabled=true",
"management.endpoints.web.exposure.include=*", "spring.cloud.bootstrap.name=sanitize",
"management.endpoint.configprops.show-values=NEVER", "bootstrap.sanitize=true",
"spring.cloud.kubernetes.client.namespace=test" })
@Nested
class ExplicitNever {

@Autowired
private WebTestClient webClient;

@LocalManagementPort
private int port;

@Test
void test() {
// configmap is sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectStatus().isOk().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeConfigMapName")
.isEqualTo(SanitizableData.SANITIZED_VALUE);

// secret is sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectStatus().isOk().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeSecretName")
.isEqualTo(SanitizableData.SANITIZED_VALUE);

// secret is usable from configuration properties
webClient.get().uri("http://localhost:{port}/secret", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeSecretValue");

// configmap is usable from configuration properties
webClient.get().uri("http://localhost:{port}/configmap", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeConfigMapValue");
}

}

/**
* <pre>
* - management.endpoint.configprops.show-values = ALWAYS
* - spring.cloud.kubernetes.sanitize.secrets = false
*
* Sanitizing functions must apply, but we have none registered, as such
* everything is visible in plain text, both from configmaps and secrets.
*
* </pre>
*/
@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT, classes = SanitizeApp.class,
properties = { "spring.main.cloud-platform=KUBERNETES", "spring.cloud.bootstrap.enabled=true",
"management.endpoints.web.exposure.include=*", "spring.cloud.bootstrap.name=sanitize",
"management.endpoint.configprops.show-values=ALWAYS",
"spring.cloud.kubernetes.sanitize.secrets=false", "bootstrap.sanitize=true",
"spring.cloud.kubernetes.client.namespace=test" })
@Nested
class AlwaysWithoutSanitizingFunction {

@Autowired
private WebTestClient webClient;

@LocalManagementPort
private int port;

@Test
void test() {
// configmap is not sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectStatus().isOk().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeConfigMapName")
.isEqualTo("sanitizeConfigMapValue");

// secret is not sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectStatus().isOk().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeSecretName")
.isEqualTo("sanitizeSecretValue");

// secret is usable from configuration properties
webClient.get().uri("http://localhost:{port}/secret", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeSecretValue");

// configmap is usable from configuration properties
webClient.get().uri("http://localhost:{port}/configmap", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeConfigMapValue");
}

}

/**
* <pre>
* - management.endpoint.configprops.show-values = ALWAYS
* - spring.cloud.kubernetes.sanitize.secrets = true
*
* Sanitizing functions must apply, and we have one registered, as such
* configmap is visible in plain text, but secrets are sanitized.
*
* </pre>
*/
@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.RANDOM_PORT, classes = SanitizeApp.class,
properties = { "spring.main.cloud-platform=KUBERNETES", "spring.cloud.bootstrap.enabled=true",
"management.endpoints.web.exposure.include=*", "spring.cloud.bootstrap.name=sanitize-two",
"management.endpoint.configprops.show-values=ALWAYS",
"spring.cloud.kubernetes.sanitize.secrets=true", "bootstrap.sanitize=true",
"spring.cloud.kubernetes.client.namespace=test" })
@Nested
class AlwaysWithSanitizingFunction {

@Autowired
private WebTestClient webClient;

@LocalManagementPort
private int port;

@Test
void test() {
// configmap is not sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectStatus().isOk().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeConfigMapName")
.isEqualTo("sanitizeConfigMapValue");

// first secret is sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectStatus().isOk().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeSecretName")
.isEqualTo(SanitizableData.SANITIZED_VALUE);

// second secret is sanitized
webClient.get().uri("http://localhost:{port}/actuator/configprops", this.port)
.accept(MediaType.APPLICATION_JSON).exchange().expectStatus().isOk().expectBody()
.jsonPath("contexts.['sanitize-1'].beans.[*].properties.sanitizeSecretNameTwo")
.isEqualTo(SanitizableData.SANITIZED_VALUE);

// secret is usable from configuration properties
webClient.get().uri("http://localhost:{port}/secret", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeSecretValue");

// configmap is usable from configuration properties
webClient.get().uri("http://localhost:{port}/configmap", this.port).exchange().expectStatus().isOk()
.expectBody().jsonPath("$").isEqualTo("sanitizeConfigMapValue");
}

}

}
Loading

0 comments on commit 8fbfa40

Please sign in to comment.