test(e2e): Add test for alias (#4436)

pull/4470/head
Michael Li 2 years ago committed by Todd
parent cedff227c3
commit 2e55ae72ba

@ -0,0 +1,195 @@
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: BUSL-1.1
package base_test
import (
"context"
"encoding/json"
"strings"
"testing"
"github.com/hashicorp/boundary/api/aliases"
"github.com/hashicorp/boundary/api/targets"
"github.com/hashicorp/boundary/internal/target"
"github.com/hashicorp/boundary/testing/internal/e2e"
"github.com/hashicorp/boundary/testing/internal/e2e/boundary"
"github.com/stretchr/testify/require"
)
// TestCliAlias uses the boundary cli to create an alias and connect to a target
// using that alias
func TestCliAlias(t *testing.T) {
e2e.MaybeSkipTest(t)
c, err := loadTestConfig()
require.NoError(t, err)
// Set up the test
ctx := context.Background()
boundary.AuthenticateAdminCli(t, ctx)
newOrgId := boundary.CreateNewOrgCli(t, ctx)
t.Cleanup(func() {
ctx := context.Background()
boundary.AuthenticateAdminCli(t, ctx)
output := e2e.RunCommand(ctx, "boundary", e2e.WithArgs("scopes", "delete", "-id", newOrgId))
require.NoError(t, output.Err, string(output.Stderr))
})
newProjectId := boundary.CreateNewProjectCli(t, ctx, newOrgId)
// Create an alias for a target
newTargetId := boundary.CreateNewTargetCli(
t,
ctx,
newProjectId,
c.TargetPort,
target.WithAddress(c.TargetAddress),
)
aliasTargetAddress := "example.alias.boundary"
output := e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"aliases", "create", "target",
"-scope-id", "global",
"-value", aliasTargetAddress,
"-destination-id", newTargetId,
"-format", "json",
),
)
require.NoError(t, output.Err, string(output.Stderr))
var newAliasResult aliases.AliasCreateResult
err = json.Unmarshal(output.Stdout, &newAliasResult)
require.NoError(t, err)
aliasTargetAddressId := newAliasResult.Item.Id
t.Cleanup(func() {
output := e2e.RunCommand(ctx, "boundary", e2e.WithArgs("aliases", "delete", "-id", aliasTargetAddressId))
require.NoError(t, output.Err, string(output.Stderr))
})
// Connect to target using alias
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"connect", aliasTargetAddress,
"-exec", "/usr/bin/ssh", "--",
"-l", c.TargetSshUser,
"-i", c.TargetSshKeyPath,
"-o", "UserKnownHostsFile=/dev/null",
"-o", "StrictHostKeyChecking=no",
"-o", "IdentitiesOnly=yes", // forces the use of the provided key
"-p", "{{boundary.port}}", // this is provided by boundary
"{{boundary.ip}}",
"hostname", "-i",
),
)
require.NoError(t, output.Err, string(output.Stderr))
parts := strings.Fields(string(output.Stdout))
hostIp := parts[len(parts)-1]
require.Equal(t, c.TargetAddress, hostIp, "SSH session did not return expected output")
// Connect Ssh to target using alias
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"connect", "ssh", aliasTargetAddress, "--",
"-l", c.TargetSshUser,
"-i", c.TargetSshKeyPath,
"-o", "UserKnownHostsFile=/dev/null",
"-o", "StrictHostKeyChecking=no",
"-o", "IdentitiesOnly=yes", // forces the use of the provided key
),
)
require.NoError(t, output.Err, string(output.Stderr))
// Authorize session using alias
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"targets", "authorize-session", aliasTargetAddress,
"-format", "json",
),
)
require.NoError(t, output.Err, string(output.Stderr))
var newSessionAuthorizationResult targets.SessionAuthorizationResult
err = json.Unmarshal(output.Stdout, &newSessionAuthorizationResult)
require.NoError(t, err)
// Create another alias that uses a target with a host set
newHostCatalogId := boundary.CreateNewHostCatalogCli(t, ctx, newProjectId)
newHostSetId := boundary.CreateNewHostSetCli(t, ctx, newHostCatalogId)
newHostId := boundary.CreateNewHostCli(t, ctx, newHostCatalogId, c.TargetAddress)
boundary.AddHostToHostSetCli(t, ctx, newHostSetId, newHostId)
targetWithHost := boundary.CreateNewTargetCli(
t,
ctx,
newProjectId,
c.TargetPort,
target.WithName("targetWithHost"),
)
boundary.AddHostSourceToTargetCli(t, ctx, targetWithHost, newHostSetId)
aliasTargetHost := "aliasTargetHost"
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"aliases", "create", "target",
"-scope-id", "global",
"-value", aliasTargetHost,
"-destination-id", targetWithHost,
"-format", "json",
),
)
require.NoError(t, output.Err, string(output.Stderr))
err = json.Unmarshal(output.Stdout, &newAliasResult)
require.NoError(t, err)
aliasTargetHostId := newAliasResult.Item.Id
t.Cleanup(func() {
output := e2e.RunCommand(ctx, "boundary", e2e.WithArgs("aliases", "delete", "-id", aliasTargetHostId))
require.NoError(t, output.Err, string(output.Stderr))
})
// Connect to target with host set using alias
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"connect", "ssh", aliasTargetHost, "--",
"-l", c.TargetSshUser,
"-i", c.TargetSshKeyPath,
"-o", "UserKnownHostsFile=/dev/null",
"-o", "StrictHostKeyChecking=no",
"-o", "IdentitiesOnly=yes", // forces the use of the provided key
),
)
require.NoError(t, output.Err, string(output.Stderr))
// Update the alias to include a host id
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"aliases", "update", "target",
"-id", aliasTargetHostId,
"-authorize-session-host-id", newHostId,
"-format", "json",
),
)
require.NoError(t, output.Err, string(output.Stderr))
// Connect to target with host set using alias
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"connect", "ssh", aliasTargetHost, "--",
"-l", c.TargetSshUser,
"-i", c.TargetSshKeyPath,
"-o", "UserKnownHostsFile=/dev/null",
"-o", "StrictHostKeyChecking=no",
"-o", "IdentitiesOnly=yes", // forces the use of the provided key
),
)
require.NoError(t, output.Err, string(output.Stderr))
// Use an alias that does not exist. Expect an error
output = e2e.RunCommand(ctx, "boundary",
e2e.WithArgs(
"connect", "ssh", "test.alias", "--",
"-l", c.TargetSshUser,
"-i", c.TargetSshKeyPath,
"-o", "UserKnownHostsFile=/dev/null",
"-o", "StrictHostKeyChecking=no",
"-o", "IdentitiesOnly=yes", // forces the use of the provided key
),
)
require.Error(t, output.Err, string(output.Stderr))
}
Loading…
Cancel
Save