-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
This adds testing for all commands except SSH.
- Loading branch information
Showing
18 changed files
with
366 additions
and
29 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
export const getAuth = jest.fn().mockReturnValue({}); | ||
|
||
export const signInWithCredential = jest.fn(); | ||
|
||
export const SignInMethod = { | ||
GOOGLE: "google.com", | ||
}; | ||
|
||
export class OAuthProvider { | ||
credential() { | ||
return "test-credential"; | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
// Jest Snapshot v1, https://goo.gl/fbAQLP | ||
|
||
exports[`login organization exists should write the user's identity to the file system 1`] = ` | ||
[ | ||
[ | ||
"/path/to/home/.p0", | ||
"{ | ||
"credential": { | ||
"access_token": "test-access-token", | ||
"id_token": "test-id-token", | ||
"token_type": "oidc", | ||
"scope": "oidc", | ||
"expires_in": 3600, | ||
"refresh_token": "test-refresh-token", | ||
"device_secret": "test-device-secret", | ||
"expires_at": 1600003599 | ||
}, | ||
"org": { | ||
"slug": "test-org", | ||
"tenantId": "test-tenant", | ||
"ssoProvider": "google" | ||
} | ||
}", | ||
{ | ||
"mode": "600", | ||
}, | ||
], | ||
] | ||
`; | ||
|
||
exports[`login organization exists validates authentication 1`] = ` | ||
[ | ||
[ | ||
{ | ||
"tenantId": "test-tenant", | ||
}, | ||
"test-credential", | ||
], | ||
] | ||
`; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
import { pluginLoginMap } from "../../plugins/login"; | ||
import { mockGetDoc } from "../../testing/firestore"; | ||
import { login } from "../login"; | ||
import { signInWithCredential } from "firebase/auth"; | ||
import { readFile, writeFile } from "fs/promises"; | ||
|
||
jest.spyOn(Date, "now").mockReturnValue(1.6e12); | ||
jest.mock("fs/promises"); | ||
jest.mock("../../drivers/auth", () => ({ | ||
...jest.requireActual("../../drivers/auth"), | ||
IDENTITY_FILE_PATH: "/path/to/home/.p0", | ||
})); | ||
jest.mock("../../drivers/stdio"); | ||
jest.mock("../../plugins/login"); | ||
|
||
const mockReadFile = readFile as jest.Mock; | ||
const mockWriteFile = writeFile as jest.Mock; | ||
|
||
describe("login", () => { | ||
it("prints a friendly error if the org is not found", async () => { | ||
mockGetDoc(undefined); | ||
await expect(login({ org: "test-org" })).rejects.toMatchInlineSnapshot( | ||
`"Could not find organization"` | ||
); | ||
}); | ||
it("should print a friendly error if unsupported login", async () => { | ||
mockGetDoc({ | ||
slug: "test-org", | ||
tenantId: "test-tenant", | ||
ssoProvider: "microsoft", | ||
}); | ||
await expect(login({ org: "test-org" })).rejects.toMatchInlineSnapshot( | ||
`"Unsupported login for your organization"` | ||
); | ||
}); | ||
describe("organization exists", () => { | ||
let credentialData: string = ""; | ||
mockReadFile.mockImplementation(async () => | ||
Buffer.from(credentialData, "utf-8") | ||
); | ||
mockWriteFile.mockImplementation(async (_path, data) => { | ||
credentialData = data; | ||
}); | ||
beforeEach(() => { | ||
credentialData = ""; | ||
jest.clearAllMocks(); | ||
mockGetDoc({ | ||
slug: "test-org", | ||
tenantId: "test-tenant", | ||
ssoProvider: "google", | ||
}); | ||
}); | ||
it("should call the provider's login function", async () => { | ||
await login({ org: "test-org" }); | ||
expect(pluginLoginMap.google).toHaveBeenCalled(); | ||
}); | ||
it("should write the user's identity to the file system", async () => { | ||
await login({ org: "test-org" }); | ||
expect(mockWriteFile.mock.calls).toMatchSnapshot(); | ||
}); | ||
it("validates authentication", async () => { | ||
await login({ org: "test-org" }); | ||
expect((signInWithCredential as jest.Mock).mock.calls).toMatchSnapshot(); | ||
}); | ||
}); | ||
}); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
export const samlResponse = `<html> | ||
<body> | ||
<input name="SAMLResponse" type="hidden" value="<?xml version="1.0" encoding="UTF-8"?>
 <saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:xs="http://www.w3.org/2001/XMLSchema" Destination="https://signin.aws.amazon.com/saml" ID="abc" IssueInstant="2024-01-01T00:00:00.000Z" Version="2.0">
  <saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">http://www.okta.com/abcdef</saml2:Issuer>
  <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
    <ds:SignedInfo>
      <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
      <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
      <ds:Reference URI="#abc">
        <ds:Transforms>
          <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
          <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#">
            <ec:InclusiveNamespaces xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#" PrefixList="xs"/>
          </ds:Transform>
        </ds:Transforms>
        <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
        <ds:DigestValue>digest</ds:DigestValue>
      </ds:Reference>
    </ds:SignedInfo>
    <ds:SignatureValue>signature</ds:SignatureValue>
    <ds:KeyInfo>
      <ds:X509Data>
        <ds:X509Certificate>certificate</ds:X509Certificate>
      </ds:X509Data>
    </ds:KeyInfo>
  </ds:Signature>
  <saml2p:Status xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
    <saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  </saml2p:Status>
  <saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="abc" IssueInstant="2024-01-01T00:00:00.000Z" Version="2.0">
    <saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">http://www.okta.com/abcdef</saml2:Issuer>
    <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
      <ds:SignedInfo>
        <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
        <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
        <ds:Reference URI="#id8477729977532301927088708">
          <ds:Transforms>
            <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
            <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#">
              <ec:InclusiveNamespaces xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#" PrefixList="xs"/>
            </ds:Transform>
          </ds:Transforms>
          <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
          <ds:DigestValue>digest</ds:DigestValue>
        </ds:Reference>
      </ds:SignedInfo>
      <ds:SignatureValue>signature</ds:SignatureValue>
      <ds:KeyInfo>
        <ds:X509Data>
          <ds:X509Certificate>certificate</ds:X509Certificate>
        </ds:X509Data>
      </ds:KeyInfo>
    </ds:Signature>
    <saml2:Subject xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
      <saml2:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified">test-user@test.com</saml2:NameID>
      <saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
        <saml2:SubjectConfirmationData NotOnOrAfter="2024-01-01T00:00:00.000Z" Recipient="https://signin.aws.amazon.com/saml"/>
      </saml2:SubjectConfirmation>
    </saml2:Subject>
    <saml2:Conditions xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" NotBefore="2024-01-01T00:00:00.000Z" NotOnOrAfter="2024-01-01T00:00:00.000Z">
      <saml2:AudienceRestriction>
        <saml2:Audience>urn:amazon:webservices</saml2:Audience>
      </saml2:AudienceRestriction>
    </saml2:Conditions>
    <saml2:AuthnStatement xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" AuthnInstant="2024-01-01T00:00:00.000Z" SessionIndex="abc">
      <saml2:AuthnContext>
        <saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef>
      </saml2:AuthnContext>
    </saml2:AuthnStatement>
    <saml2:AttributeStatement xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
      <saml2:Attribute Name="https://aws.amazon.com/SAML/Attributes/Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">arn:aws:iam::1:saml-provider/test_okta,arn:aws:iam::1:role/Role1</saml2:AttributeValue>
        <saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">arn:aws:iam::1:saml-provider/test_okta,arn:aws:iam::1:role/Role2</saml2:AttributeValue>
      </saml2:Attribute>
      <saml2:Attribute Name="https://aws.amazon.com/SAML/Attributes/RoleSessionName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">
        <saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">test-user@test.com</saml2:AttributeValue>
      </saml2:Attribute>
      <saml2:Attribute Name="https://aws.amazon.com/SAML/Attributes/SessionDuration" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">
        <saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">3600</saml2:AttributeValue>
      </saml2:Attribute>
      <saml2:Attribute Name="https://aws.amazon.com/SAML/Attributes/PrincipalTag:org" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">
        <saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">test</saml2:AttributeValue>
      </saml2:Attribute>
      <saml2:Attribute Name="https://aws.amazon.com/SAML/Attributes/SourceIdentity" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
        <saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">test-user@test.com</saml2:AttributeValue>
      </saml2:Attribute>
    </saml2:AttributeStatement>
  </saml2:Assertion>
</saml2p:Response>" /> | ||
</body> | ||
</html>`; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
export const stsResponse = `<AssumeRoleWithSAMLResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | ||
<AssumeRoleWithSAMLResult> | ||
<Audience>https://signin.aws.amazon.com/saml</Audience> | ||
<AssumedRoleUser> | ||
<AssumedRoleId>ABCDEFGHIJLMNOPQRST:test-user@test.com</AssumedRoleId> | ||
<Arn>arn:aws:sts::1:assumed-role/Role1/test-user@test.com</Arn> | ||
</AssumedRoleUser> | ||
<Credentials> | ||
<AccessKeyId>test-access-key</AccessKeyId> | ||
<SecretAccessKey>secret-access-key</SecretAccessKey> | ||
<SessionToken>session-token</SessionToken> | ||
<Expiration>2024-02-22T00:18:21Z</Expiration> | ||
</Credentials> | ||
<Subject>test-user@test.com</Subject> | ||
<NameQualifier>abcdefghijklmnop</NameQualifier> | ||
<SourceIdentity>test-user@test.com</SourceIdentity> | ||
<PackedPolicySize>2</PackedPolicySize> | ||
<SubjectType>unspecified</SubjectType> | ||
<Issuer>http://www.okta.com/abc</Issuer> | ||
</AssumeRoleWithSAMLResult> | ||
<ResponseMetadata> | ||
<RequestId>f5b94ad4-f322-4d7b-b568-84f2ec184cd7</RequestId> | ||
</ResponseMetadata> | ||
</AssumeRoleWithSAMLResponse>`; |
44 changes: 44 additions & 0 deletions
44
src/commands/aws/__tests__/__snapshots__/role.test.ts.snap
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
// Jest Snapshot v1, https://goo.gl/fbAQLP | ||
|
||
exports[`aws role a single installed account with Okta SAML assume should assume a role 1`] = ` | ||
[ | ||
[ | ||
"Execute the following commands: | ||
", | ||
], | ||
[ | ||
" | ||
Or, populate these environment variables using BASH command substitution: | ||
$(p0 aws role assume undefined) | ||
", | ||
], | ||
] | ||
`; | ||
|
||
exports[`aws role a single installed account with Okta SAML assume should assume a role 2`] = ` | ||
[ | ||
[ | ||
" export AWS_ACCESS_KEY_ID=test-access-key | ||
export AWS_SECRET_ACCESS_KEY=secret-access-key | ||
export AWS_SESSION_TOKEN=session-token", | ||
], | ||
] | ||
`; | ||
|
||
exports[`aws role a single installed account with Okta SAML ls lists roles 1`] = ` | ||
[ | ||
[ | ||
"Your available roles for account 1:", | ||
], | ||
] | ||
`; | ||
|
||
exports[`aws role a single installed account with Okta SAML ls lists roles 2`] = ` | ||
[ | ||
[ | ||
" Role1 | ||
Role2", | ||
], | ||
] | ||
`; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,86 @@ | ||
import { awsCommand } from ".."; | ||
import { print1, print2 } from "../../../drivers/stdio"; | ||
import { mockGetDoc } from "../../../testing/firestore"; | ||
import { failure } from "../../../testing/yargs"; | ||
import { samlResponse } from "./__input__/saml-response"; | ||
import { stsResponse } from "./__input__/sts-response"; | ||
import yargs from "yargs"; | ||
|
||
jest.mock("fs/promises"); | ||
jest.mock("../../../drivers/auth"); | ||
jest.mock("../../../drivers/stdio"); | ||
jest.mock("typescript", () => ({ | ||
...jest.requireActual("typescript"), | ||
sys: { | ||
writeOutputIsTTY: () => true, | ||
}, | ||
})); | ||
|
||
const mockFetch = jest.spyOn(global, "fetch"); | ||
const mockPrint1 = print1 as jest.Mock; | ||
const mockPrint2 = print2 as jest.Mock; | ||
|
||
beforeEach(() => { | ||
jest.clearAllMocks(); | ||
mockFetch.mockImplementation( | ||
async (url: RequestInfo | URL) => | ||
({ | ||
ok: true, | ||
// This is the token response from fetchSsoWebToken | ||
json: async () => ({}), | ||
// This is the XML response from fetchSamlResponse or stsAssumeRole | ||
text: async () => | ||
(url as string).match(/okta.com/) ? samlResponse : stsResponse, | ||
}) as Response | ||
); | ||
}); | ||
|
||
describe("aws role", () => { | ||
describe("a single installed account", () => { | ||
const item = { | ||
account: { | ||
id: "1", | ||
description: "1 (test)", | ||
}, | ||
state: "installed", | ||
}; | ||
describe("without Okta SAML", () => { | ||
mockGetDoc({ workflows: { items: [item] } }); | ||
describe.each([ | ||
["ls", "aws role ls"], | ||
["assume", "aws role assume Role1"], | ||
])("%s", (_, command) => { | ||
it("should print a friendly error message", async () => { | ||
const error = await failure(awsCommand(yargs), command); | ||
expect(error).toMatchInlineSnapshot( | ||
`"Account 1 (test) is not configured for Okta SAML login."` | ||
); | ||
}); | ||
}); | ||
}); | ||
describe("with Okta SAML", () => { | ||
beforeEach(() => { | ||
mockGetDoc({ | ||
workflows: { | ||
items: [{ ...item, uidLocation: { id: "okta_saml_sso" } }], | ||
}, | ||
}); | ||
}); | ||
describe("assume", () => { | ||
it("should assume a role", async () => { | ||
await awsCommand(yargs).parse("aws role assume Role1"); | ||
expect(mockPrint2.mock.calls).toMatchSnapshot(); | ||
expect(mockPrint1.mock.calls).toMatchSnapshot(); | ||
}); | ||
}); | ||
describe("ls", () => { | ||
const command = "aws role ls"; | ||
it("lists roles", async () => { | ||
await awsCommand(yargs).parse(command); | ||
expect(mockPrint2.mock.calls).toMatchSnapshot(); | ||
expect(mockPrint1.mock.calls).toMatchSnapshot(); | ||
}); | ||
}); | ||
}); | ||
}); | ||
}); |
Oops, something went wrong.