Files
argo-cd/util/helm/client_test.go

708 lines
21 KiB
Go

package helm
import (
"bytes"
"encoding/json"
"fmt"
"math"
"net/http"
"net/http/httptest"
"net/url"
"os"
"path/filepath"
"strings"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v2"
utilio "github.com/argoproj/argo-cd/v3/util/io"
"github.com/argoproj/argo-cd/v3/util/workloadidentity"
"github.com/argoproj/argo-cd/v3/util/workloadidentity/mocks"
)
type fakeIndexCache struct {
data []byte
}
type fakeTagsList struct {
Tags []string `json:"tags"`
}
func (f *fakeIndexCache) SetHelmIndex(_ string, indexData []byte) error {
f.data = indexData
return nil
}
func (f *fakeIndexCache) GetHelmIndex(_ string, indexData *[]byte) error {
*indexData = f.data
return nil
}
func TestIndex(t *testing.T) {
t.Run("Invalid", func(t *testing.T) {
client := NewClient("", HelmCreds{}, false, "", "")
_, err := client.GetIndex(false, 10000)
require.Error(t, err)
})
t.Run("Stable", func(t *testing.T) {
client := NewClient("https://argoproj.github.io/argo-helm", HelmCreds{}, false, "", "")
index, err := client.GetIndex(false, 10000)
require.NoError(t, err)
assert.NotNil(t, index)
})
t.Run("BasicAuth", func(t *testing.T) {
client := NewClient("https://argoproj.github.io/argo-helm", HelmCreds{
Username: "my-password",
Password: "my-username",
}, false, "", "")
index, err := client.GetIndex(false, 10000)
require.NoError(t, err)
assert.NotNil(t, index)
})
t.Run("Cached", func(t *testing.T) {
fakeIndex := Index{Entries: map[string]Entries{"fake": {}}}
data := bytes.Buffer{}
err := yaml.NewEncoder(&data).Encode(fakeIndex)
require.NoError(t, err)
client := NewClient("https://argoproj.github.io/argo-helm", HelmCreds{}, false, "", "", WithIndexCache(&fakeIndexCache{data: data.Bytes()}))
index, err := client.GetIndex(false, 10000)
require.NoError(t, err)
assert.Equal(t, fakeIndex, *index)
})
t.Run("Limited", func(t *testing.T) {
client := NewClient("https://argoproj.github.io/argo-helm", HelmCreds{}, false, "", "")
_, err := client.GetIndex(false, 100)
assert.ErrorContains(t, err, "unexpected end of stream")
})
}
func Test_nativeHelmChart_ExtractChart(t *testing.T) {
client := NewClient("https://argoproj.github.io/argo-helm", HelmCreds{}, false, "", "")
path, closer, err := client.ExtractChart("argo-cd", "0.7.1", false, math.MaxInt64, true)
require.NoError(t, err)
defer utilio.Close(closer)
info, err := os.Stat(path)
require.NoError(t, err)
assert.True(t, info.IsDir())
}
func Test_nativeHelmChart_ExtractChartWithLimiter(t *testing.T) {
client := NewClient("https://argoproj.github.io/argo-helm", HelmCreds{}, false, "", "")
_, _, err := client.ExtractChart("argo-cd", "0.7.1", false, 100, false)
require.Error(t, err, "error while iterating on tar reader: unexpected EOF")
}
func Test_nativeHelmChart_ExtractChart_insecure(t *testing.T) {
client := NewClient("https://argoproj.github.io/argo-helm", HelmCreds{InsecureSkipVerify: true}, false, "", "")
path, closer, err := client.ExtractChart("argo-cd", "0.7.1", false, math.MaxInt64, true)
require.NoError(t, err)
defer utilio.Close(closer)
info, err := os.Stat(path)
require.NoError(t, err)
assert.True(t, info.IsDir())
}
func Test_normalizeChartName(t *testing.T) {
t.Run("Test non-slashed name", func(t *testing.T) {
n := normalizeChartName("mychart")
assert.Equal(t, "mychart", n)
})
t.Run("Test single-slashed name", func(t *testing.T) {
n := normalizeChartName("myorg/mychart")
assert.Equal(t, "mychart", n)
})
t.Run("Test chart name with suborg", func(t *testing.T) {
n := normalizeChartName("myorg/mysuborg/mychart")
assert.Equal(t, "mychart", n)
})
t.Run("Test double-slashed name", func(t *testing.T) {
n := normalizeChartName("myorg//mychart")
assert.Equal(t, "mychart", n)
})
t.Run("Test invalid chart name - ends with slash", func(t *testing.T) {
n := normalizeChartName("myorg/")
assert.Equal(t, "myorg/", n)
})
t.Run("Test invalid chart name - is dot", func(t *testing.T) {
n := normalizeChartName("myorg/.")
assert.Equal(t, "myorg/.", n)
})
t.Run("Test invalid chart name - is two dots", func(t *testing.T) {
n := normalizeChartName("myorg/..")
assert.Equal(t, "myorg/..", n)
})
}
func TestIsHelmOciRepo(t *testing.T) {
assert.True(t, IsHelmOciRepo("demo.goharbor.io"))
assert.True(t, IsHelmOciRepo("demo.goharbor.io:8080"))
assert.False(t, IsHelmOciRepo("https://demo.goharbor.io"))
assert.False(t, IsHelmOciRepo("https://demo.goharbor.io:8080"))
}
func TestGetIndexURL(t *testing.T) {
urlTemplate := `https://gitlab.com/projects/%s/packages/helm/stable`
t.Run("URL without escaped characters", func(t *testing.T) {
rawURL := fmt.Sprintf(urlTemplate, "232323982")
want := rawURL + "/index.yaml"
got, err := getIndexURL(rawURL)
assert.Equal(t, want, got)
require.NoError(t, err)
})
t.Run("URL with escaped characters", func(t *testing.T) {
rawURL := fmt.Sprintf(urlTemplate, "mygroup%2Fmyproject")
want := rawURL + "/index.yaml"
got, err := getIndexURL(rawURL)
assert.Equal(t, want, got)
require.NoError(t, err)
})
t.Run("URL with invalid escaped characters", func(t *testing.T) {
rawURL := fmt.Sprintf(urlTemplate, "mygroup%**myproject")
got, err := getIndexURL(rawURL)
assert.Empty(t, got)
require.Error(t, err)
})
}
func TestGetTagsFromUrl(t *testing.T) {
t.Run("should return tags correctly while following the link header", func(t *testing.T) {
server := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
t.Logf("called %s", r.URL.Path)
var responseTags fakeTagsList
w.Header().Set("Content-Type", "application/json")
if !strings.Contains(r.URL.String(), "token") {
w.Header().Set("Link", fmt.Sprintf("<https://%s%s?token=next-token>; rel=next", r.Host, r.URL.Path))
responseTags = fakeTagsList{
Tags: []string{"first"},
}
} else {
responseTags = fakeTagsList{
Tags: []string{
"second",
"2.8.0",
"2.8.0-prerelease",
"2.8.0_build",
"2.8.0-prerelease_build",
"2.8.0-prerelease.1_build.1234",
},
}
}
w.WriteHeader(http.StatusOK)
require.NoError(t, json.NewEncoder(w).Encode(responseTags))
}))
client := NewClient(server.URL, HelmCreds{InsecureSkipVerify: true}, true, "", "")
tags, err := client.GetTags("mychart", true)
require.NoError(t, err)
assert.ElementsMatch(t, tags, []string{
"first",
"second",
"2.8.0",
"2.8.0-prerelease",
"2.8.0+build",
"2.8.0-prerelease+build",
"2.8.0-prerelease.1+build.1234",
})
})
t.Run("should return an error not when oci is not enabled", func(t *testing.T) {
client := NewClient("example.com", HelmCreds{}, false, "", "")
_, err := client.GetTags("my-chart", true)
assert.ErrorIs(t, ErrOCINotEnabled, err)
})
}
func TestGetTagsFromURLPrivateRepoAuthentication(t *testing.T) {
username := "my-username"
password := "my-password"
expectedAuthorization := "Basic bXktdXNlcm5hbWU6bXktcGFzc3dvcmQ=" // base64(user:password)
server := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
t.Logf("called %s", r.URL.Path)
authorization := r.Header.Get("Authorization")
if authorization == "" {
w.Header().Set("WWW-Authenticate", `Basic realm="helm repo to get tags"`)
w.WriteHeader(http.StatusUnauthorized)
return
}
assert.Equal(t, expectedAuthorization, authorization)
responseTags := fakeTagsList{
Tags: []string{
"2.8.0",
"2.8.0-prerelease",
"2.8.0_build",
"2.8.0-prerelease_build",
"2.8.0-prerelease.1_build.1234",
},
}
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
require.NoError(t, json.NewEncoder(w).Encode(responseTags))
}))
t.Cleanup(server.Close)
serverURL, err := url.Parse(server.URL)
require.NoError(t, err)
testCases := []struct {
name string
repoURL string
}{
{
name: "should login correctly when the repo path is in the server root with http scheme",
repoURL: server.URL,
},
{
name: "should login correctly when the repo path is not in the server root with http scheme",
repoURL: server.URL + "/my-repo",
},
{
name: "should login correctly when the repo path is in the server root without http scheme",
repoURL: serverURL.Host,
},
{
name: "should login correctly when the repo path is not in the server root without http scheme",
repoURL: serverURL.Host + "/my-repo",
},
}
for _, testCase := range testCases {
t.Run(testCase.name, func(t *testing.T) {
client := NewClient(testCase.repoURL, HelmCreds{
InsecureSkipVerify: true,
Username: username,
Password: password,
}, true, "", "")
tags, err := client.GetTags("mychart", true)
require.NoError(t, err)
assert.ElementsMatch(t, tags, []string{
"2.8.0",
"2.8.0-prerelease",
"2.8.0+build",
"2.8.0-prerelease+build",
"2.8.0-prerelease.1+build.1234",
})
})
}
}
func TestGetTagsFromURLPrivateRepoWithAzureWorkloadIdentityAuthentication(t *testing.T) {
expectedAuthorization := "Basic MDAwMDAwMDAtMDAwMC0wMDAwLTAwMDAtMDAwMDAwMDAwMDAwOmFjY2Vzc1Rva2Vu" // base64(00000000-0000-0000-0000-000000000000:accessToken)
mockServerURL := ""
mockedServerURL := func() string {
return mockServerURL
}
workloadIdentityMock := &mocks.TokenProvider{}
workloadIdentityMock.EXPECT().GetToken("https://management.core.windows.net/.default").Return(&workloadidentity.Token{AccessToken: "accessToken"}, nil)
mockServer := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
t.Logf("called %s", r.URL.Path)
switch r.URL.Path {
case "/v2/":
w.Header().Set("Www-Authenticate", fmt.Sprintf(`Bearer realm=%q,service=%q`, mockedServerURL(), mockedServerURL()[8:]))
w.WriteHeader(http.StatusUnauthorized)
case "/oauth2/exchange":
response := `{"refresh_token":"accessToken"}`
w.WriteHeader(http.StatusOK)
_, err := w.Write([]byte(response))
require.NoError(t, err)
default:
authorization := r.Header.Get("Authorization")
if authorization == "" {
w.Header().Set("WWW-Authenticate", `Basic realm="helm repo to get tags"`)
w.WriteHeader(http.StatusUnauthorized)
return
}
assert.Equal(t, expectedAuthorization, authorization)
responseTags := fakeTagsList{
Tags: []string{
"2.8.0",
"2.8.0-prerelease",
"2.8.0_build",
"2.8.0-prerelease_build",
"2.8.0-prerelease.1_build.1234",
},
}
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
require.NoError(t, json.NewEncoder(w).Encode(responseTags))
}
}))
mockServerURL = mockServer.URL
t.Cleanup(mockServer.Close)
serverURL, err := url.Parse(mockServer.URL)
require.NoError(t, err)
testCases := []struct {
name string
repoURL string
}{
{
name: "should login correctly when the repo path is in the server root with http scheme",
repoURL: mockServer.URL,
},
{
name: "should login correctly when the repo path is not in the server root with http scheme",
repoURL: mockServer.URL + "/my-repo",
},
{
name: "should login correctly when the repo path is in the server root without http scheme",
repoURL: serverURL.Host,
},
{
name: "should login correctly when the repo path is not in the server root without http scheme",
repoURL: serverURL.Host + "/my-repo",
},
}
for _, testCase := range testCases {
t.Run(testCase.name, func(t *testing.T) {
client := NewClient(testCase.repoURL, AzureWorkloadIdentityCreds{
repoURL: mockServer.URL[8:],
InsecureSkipVerify: true,
tokenProvider: workloadIdentityMock,
}, true, "", "")
tags, err := client.GetTags("mychart", true)
require.NoError(t, err)
assert.ElementsMatch(t, tags, []string{
"2.8.0",
"2.8.0-prerelease",
"2.8.0+build",
"2.8.0-prerelease+build",
"2.8.0-prerelease.1+build.1234",
})
})
}
}
func TestGetTagsFromURLEnvironmentAuthentication(t *testing.T) {
bearerToken := "Zm9vOmJhcg=="
expectedAuthorization := "Basic " + bearerToken
server := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
t.Logf("called %s", r.URL.Path)
authorization := r.Header.Get("Authorization")
if authorization == "" {
w.Header().Set("WWW-Authenticate", `Basic realm="helm repo to get tags"`)
w.WriteHeader(http.StatusUnauthorized)
return
}
assert.Equal(t, expectedAuthorization, authorization)
responseTags := fakeTagsList{
Tags: []string{
"2.8.0",
"2.8.0-prerelease",
"2.8.0_build",
"2.8.0-prerelease_build",
"2.8.0-prerelease.1_build.1234",
},
}
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
require.NoError(t, json.NewEncoder(w).Encode(responseTags))
}))
t.Cleanup(server.Close)
serverURL, err := url.Parse(server.URL)
require.NoError(t, err)
tempDir := t.TempDir()
configPath := filepath.Join(tempDir, "config.json")
t.Setenv("DOCKER_CONFIG", tempDir)
config := fmt.Sprintf(`{"auths":{%q:{"auth":%q}}}`, server.URL, bearerToken)
require.NoError(t, os.WriteFile(configPath, []byte(config), 0o666))
testCases := []struct {
name string
repoURL string
}{
{
name: "should login correctly when the repo path is in the server root with http scheme",
repoURL: server.URL,
},
{
name: "should login correctly when the repo path is not in the server root with http scheme",
repoURL: server.URL + "/my-repo",
},
{
name: "should login correctly when the repo path is in the server root without http scheme",
repoURL: serverURL.Host,
},
{
name: "should login correctly when the repo path is not in the server root without http scheme",
repoURL: serverURL.Host + "/my-repo",
},
}
for _, testCase := range testCases {
t.Run(testCase.name, func(t *testing.T) {
client := NewClient(testCase.repoURL, HelmCreds{
InsecureSkipVerify: true,
}, true, "", "")
tags, err := client.GetTags("mychart", true)
require.NoError(t, err)
assert.ElementsMatch(t, tags, []string{
"2.8.0",
"2.8.0-prerelease",
"2.8.0+build",
"2.8.0-prerelease+build",
"2.8.0-prerelease.1+build.1234",
})
})
}
}
func TestGetTagsCaching(t *testing.T) {
requestCount := 0
server := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
requestCount++
t.Logf("request %d called %s", requestCount, r.URL.Path)
responseTags := fakeTagsList{
Tags: []string{
"1.0.0",
"1.1.0",
"2.0.0_beta",
},
}
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
require.NoError(t, json.NewEncoder(w).Encode(responseTags))
}))
t.Cleanup(server.Close)
serverURL, err := url.Parse(server.URL)
require.NoError(t, err)
t.Run("should cache tags correctly", func(t *testing.T) {
cache := &fakeIndexCache{}
client := NewClient(serverURL.Host, HelmCreds{
InsecureSkipVerify: true,
}, true, "", "", WithIndexCache(cache))
tags1, err := client.GetTags("mychart", false)
require.NoError(t, err)
assert.ElementsMatch(t, tags1, []string{
"1.0.0",
"1.1.0",
"2.0.0+beta",
})
assert.Equal(t, 1, requestCount)
requestCount = 0
tags2, err := client.GetTags("mychart", false)
require.NoError(t, err)
assert.ElementsMatch(t, tags2, []string{
"1.0.0",
"1.1.0",
"2.0.0+beta",
})
assert.Equal(t, 0, requestCount)
assert.NotEmpty(t, cache.data)
type entriesStruct struct {
Tags []string
}
var entries entriesStruct
err = json.Unmarshal(cache.data, &entries)
require.NoError(t, err)
assert.ElementsMatch(t, entries.Tags, []string{
"1.0.0",
"1.1.0",
"2.0.0+beta",
})
})
t.Run("should bypass cache when noCache is true", func(t *testing.T) {
cache := &fakeIndexCache{}
client := NewClient(serverURL.Host, HelmCreds{
InsecureSkipVerify: true,
}, true, "", "", WithIndexCache(cache))
requestCount = 0
tags1, err := client.GetTags("mychart", true)
require.NoError(t, err)
assert.ElementsMatch(t, tags1, []string{
"1.0.0",
"1.1.0",
"2.0.0+beta",
})
assert.Equal(t, 1, requestCount)
tags2, err := client.GetTags("mychart", true)
require.NoError(t, err)
assert.ElementsMatch(t, tags2, []string{
"1.0.0",
"1.1.0",
"2.0.0+beta",
})
assert.Equal(t, 2, requestCount)
})
}
func TestUserAgentIsSet(t *testing.T) {
t.Run("Default User-Agent for traditional Helm repo", func(t *testing.T) {
// Create a test server that captures the User-Agent header
receivedUserAgent := ""
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
receivedUserAgent = r.Header.Get("User-Agent")
// Return a valid minimal index.yaml
w.WriteHeader(http.StatusOK)
_, _ = w.Write([]byte(`apiVersion: v1
entries: {}
`))
}))
defer ts.Close()
// Create client and make a request
client := NewClient(ts.URL, HelmCreds{}, false, "", "")
_, err := client.GetIndex(false, 10000)
require.NoError(t, err)
// Verify User-Agent was set and contains expected components
assert.NotEmpty(t, receivedUserAgent, "User-Agent header should be set")
assert.Contains(t, receivedUserAgent, "argocd-repo-server", "User-Agent should contain 'argocd-repo-server'")
t.Logf("User-Agent sent: %s", receivedUserAgent)
})
t.Run("Custom User-Agent via WithUserAgent option", func(t *testing.T) {
// Create a test server that captures the User-Agent header
receivedUserAgent := ""
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
receivedUserAgent = r.Header.Get("User-Agent")
// Return a valid minimal index.yaml
w.WriteHeader(http.StatusOK)
_, _ = w.Write([]byte(`apiVersion: v1
entries: {}
`))
}))
defer ts.Close()
// Create client with custom User-Agent
customUA := "my-custom-app/1.2.3 (contact@example.com)"
client := NewClient(ts.URL, HelmCreds{}, false, "", "", WithUserAgent(customUA))
_, err := client.GetIndex(false, 10000)
require.NoError(t, err)
// Verify custom User-Agent was used
assert.Equal(t, customUA, receivedUserAgent, "Custom User-Agent should be used")
t.Logf("Custom User-Agent sent: %s", receivedUserAgent)
})
}
func TestUserAgentRequiredByServer(t *testing.T) {
t.Run("Server rejects requests without User-Agent", func(t *testing.T) {
// Create a test server that mimics Wikimedia's behavior
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
userAgent := r.Header.Get("User-Agent")
t.Logf("Server received User-Agent: '%s'", userAgent)
if userAgent == "" {
// Mimic Wikimedia's rejection of empty User-Agent
w.WriteHeader(http.StatusForbidden)
_, _ = w.Write([]byte(`authorization failed: Please set a user-agent and respect our robot policy`))
return
}
// Accept request with User-Agent
w.WriteHeader(http.StatusOK)
_, _ = w.Write([]byte(`apiVersion: v1
entries: {}
`))
}))
defer ts.Close()
// Create client (should automatically set User-Agent)
client := NewClient(ts.URL, HelmCreds{}, false, "", "")
_, err := client.GetIndex(false, 10000)
// Should succeed because our implementation sets User-Agent
require.NoError(t, err, "Request should succeed with User-Agent set")
t.Logf("Success! Server accepted request with User-Agent")
})
}
func TestUserAgentPriority(t *testing.T) {
t.Run("Custom User-Agent set via WithUserAgent option", func(t *testing.T) {
// Create a test server that captures the User-Agent header
receivedUserAgent := ""
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
receivedUserAgent = r.Header.Get("User-Agent")
w.WriteHeader(http.StatusOK)
_, _ = w.Write([]byte(`apiVersion: v1
entries: {}
`))
}))
defer ts.Close()
// Set custom User-Agent using WithUserAgent option
customUA := "CustomAgent/1.0 (test)"
client := NewClient(ts.URL, HelmCreds{}, false, "", "", WithUserAgent(customUA))
_, err := client.GetIndex(false, 10000)
require.NoError(t, err)
// Verify custom User-Agent was used
assert.Equal(t, customUA, receivedUserAgent, "Custom User-Agent should be used when set")
t.Logf("Custom User-Agent sent: %s", receivedUserAgent)
})
t.Run("Default User-Agent used when no custom value provided", func(t *testing.T) {
// Create a test server that captures the User-Agent header
receivedUserAgent := ""
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
receivedUserAgent = r.Header.Get("User-Agent")
w.WriteHeader(http.StatusOK)
_, _ = w.Write([]byte(`apiVersion: v1
entries: {}
`))
}))
defer ts.Close()
// Create client without custom User-Agent
client := NewClient(ts.URL, HelmCreds{}, false, "", "")
_, err := client.GetIndex(false, 10000)
require.NoError(t, err)
// Verify default User-Agent was used
assert.Contains(t, receivedUserAgent, "argocd-repo-server", "Should use default User-Agent format")
t.Logf("Default User-Agent sent: %s", receivedUserAgent)
})
}