Skip to content
This repository has been archived by the owner on Dec 7, 2020. It is now read-only.

Commit

Permalink
[KEYCLOAK-9379] Health, metrics and profiling on separate port
Browse files Browse the repository at this point in the history
Added option to serve health, metrics and profiling endpoints on separate port (with https or http)

    Added support for http scheme on health & metrics endpoint
    Added support for specific TLS config for health & metrics endpoint(including client cert for mutual TLS)
    Updated go-chi router dependency to actual repo (not link)
    Updated dependencies: replaced outdated repo location for go-chi/chi router
    Removed logging from admin handler

Signed-off-by: Frederic BIDON frederic@oneconcern.com
  • Loading branch information
fredbi committed Mar 11, 2019
1 parent 2d9c8fd commit 479cc40
Show file tree
Hide file tree
Showing 8 changed files with 547 additions and 63 deletions.
18 changes: 4 additions & 14 deletions Gopkg.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

349 changes: 349 additions & 0 deletions admin_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,349 @@
/*
Copyright 2015 All rights reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package main

import (
"fmt"
"io"
"io/ioutil"
"log"
"net/http"
"net/url"
"path"
"testing"
"time"

"github.com/go-chi/chi"
"github.com/stretchr/testify/assert"
)

const (
e2eAdminProxyListener = "127.0.0.1:24329"
e2eAdminEndpointListener = "127.0.0.1:24330"

e2eAdminProxyListener2 = "127.0.0.1:44329"

e2eAdminOauthListener = "127.0.0.1:23457"
e2eAdminUpstreamListener = "127.0.0.1:28512"
e2eAdminAppListener = "127.0.0.1:33996"
e2eAdminOauthURL = "/auth/realms/hod-test/.well-known/openid-configuration"
e2eAdminOauthAuthorizeURL = "/auth/realms/hod-test/protocol/openid-connect/auth"
// #nosec
e2eAdminOauthTokenURL = "/auth/realms/hod-test/protocol/openid-connect/token"
e2eAdminOauthJWKSURL = "/auth/realms/hod-test/protocol/openid-connect/certs"
e2eAdminAppURL = "/ok"
)

// checkListenOrBail waits on a endpoint listener to respond.
// This avoids race conditions with test listieners as go routines
func checkListenOrBail(endpoint string) bool {
const (
maxWaitCycles = 10
waitTime = 100 * time.Millisecond
)
checkListen := http.Client{}
_, err := checkListen.Get(endpoint)
limit := 0
for err != nil && limit < maxWaitCycles {
time.Sleep(waitTime)
_, err = checkListen.Get(endpoint)
limit++
}
return limit < maxWaitCycles
}

func runAdminTestAuth(t *testing.T) error {
// a stub OIDC provider
fake := newFakeAuthServer()
fake.location, _ = url.Parse("http://" + e2eAdminOauthListener)
go func() {
mux := http.NewServeMux()
configurationHandler := func(w http.ResponseWriter, req *http.Request) {
w.Header().Set("Content-Type", "application/json")
_, _ = io.WriteString(w, `{
"issuer": "http://`+e2eAdminOauthListener+`/auth/realms/hod-test",
"subject_types_supported":["public","pairwise"],
"id_token_signing_alg_values_supported":["ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","RS512"],
"userinfo_signing_alg_values_supported":["ES384","RS384","HS256","HS512","ES256","RS256","HS384","ES512","RS512","none"],
"authorization_endpoint":"http://`+e2eAdminOauthListener+e2eAdminOauthAuthorizeURL+`",
"token_endpoint":"http://`+e2eAdminOauthListener+e2eAdminOauthTokenURL+`",
"jwks_uri":"http://`+e2eAdminOauthListener+e2eAdminOauthJWKSURL+`"
}`)
}

authorizeHandler := func(w http.ResponseWriter, req *http.Request) {
redirect := req.FormValue("redirect_uri")
state := req.FormValue("state")
code := "zyx"
location, _ := url.PathUnescape(redirect)
u, _ := url.Parse(location)
v := u.Query()
v.Set("code", code)
v.Set("state", state)
u.RawQuery = v.Encode()
http.Redirect(w, req, u.String(), http.StatusFound)
}

tokenHandler := func(w http.ResponseWriter, req *http.Request) {
fake.tokenHandler(w, req)
}

keysHandler := func(w http.ResponseWriter, req *http.Request) {
fake.keysHandler(w, req)
}
mux.HandleFunc(e2eAdminOauthURL, configurationHandler)
mux.HandleFunc(e2eAdminOauthAuthorizeURL, authorizeHandler)
mux.HandleFunc(e2eAdminOauthTokenURL, tokenHandler)
mux.HandleFunc(e2eAdminOauthJWKSURL, keysHandler)
_ = http.ListenAndServe(e2eAdminOauthListener, mux)
}()
if !assert.True(t, checkListenOrBail("http://"+path.Join(e2eAdminOauthListener, e2eAdminOauthURL))) {
err := fmt.Errorf("cannot connect to test http listener on: %s", "http://"+path.Join(e2eAdminOauthListener, e2eAdminOauthURL))
t.Logf("%v", err)
t.FailNow()
return err
}
return nil
}

func runAdminTestApp(t *testing.T) error {
go func() {
mux := http.NewServeMux()
appHandler := func(w http.ResponseWriter, req *http.Request) {
_, _ = io.WriteString(w, `{"message": "ok"}`)
w.Header().Set("Content-Type", "application/json")
}
mux.HandleFunc(e2eAdminAppURL, appHandler)
_ = http.ListenAndServe(e2eAdminAppListener, mux)
}()
if !assert.True(t, checkListenOrBail("http://"+path.Join(e2eAdminAppListener, e2eAdminAppURL))) {
err := fmt.Errorf("cannot connect to test http listener on: %s", "http://"+path.Join(e2eAdminAppListener, e2eAdminAppURL))
t.Logf("%v", err)
t.FailNow()
return err
}
return nil
}

func runAdminTestGatekeeper(t *testing.T, config *Config) error {
proxy, err := newProxy(config)
if err != nil {
return err
}
_ = proxy.Run()
if !assert.True(t, checkListenOrBail("http://"+config.Listen+"/oauth/login")) {
err := fmt.Errorf("cannot connect to test http listener on: %s", "http://"+config.Listen+"/oauth/login")
t.Logf("%v", err)
t.FailNow()
return err
}
return nil
}

func runAdminTestUpstream(t *testing.T) error {
// a stub upstream API server
go func() {
getUpstream := func(w http.ResponseWriter, req *http.Request) {
w.Header().Set("Content-Type", "application/json")
w.Header().Set("X-Upstream-Response-Header", "test")
_, _ = io.WriteString(w, `{"message": "test"}`)
}

upstream := chi.NewRouter()
upstream.Route("/", func(r chi.Router) {
r.Get("/fake", getUpstream)
})

_ = http.ListenAndServe(e2eAdminUpstreamListener, upstream)
}()
if !assert.True(t, checkListenOrBail("http://"+path.Join(e2eAdminUpstreamListener, "/fake"))) {
err := fmt.Errorf("cannot connect to test http listener on: %s", "http://"+path.Join(e2eAdminUpstreamListener, "/fake"))
t.Logf("%v", err)
t.FailNow()
return err
}
return nil
}

func TestAdmin(t *testing.T) {
log.SetOutput(ioutil.Discard)

config := newDefaultConfig()
config.Verbose = false
config.DisableAllLogging = false
config.EnableLogging = false

config.Listen = e2eAdminProxyListener
config.ListenAdmin = e2eAdminEndpointListener
config.EnableMetrics = true
config.EnableProfiling = true
config.DiscoveryURL = "http://" + e2eAdminOauthListener + e2eAdminOauthURL
config.Upstream = "http://" + e2eAdminUpstreamListener

config.CorsOrigins = []string{"*"}
config.HTTPOnlyCookie = false // since we want to inspect the cookie for testing
config.SecureCookie = false // since we are testing over HTTP
config.AccessTokenDuration = 30 * time.Minute
config.EnableEncryptedToken = false
config.EnableSessionCookies = true
config.EnableAuthorizationCookies = false
config.EnableTokenHeader = false
config.EnableAuthorizationHeader = true
config.ClientID = fakeClientID
config.ClientSecret = fakeSecret
config.Resources = []*Resource{
{
URL: "/fake",
Methods: []string{"GET", "POST", "DELETE"},
WhiteListed: false,
},
}
config.Resources = append(config.Resources, &Resource{
URL: "/another-fake",
Methods: []string{"GET", "POST", "DELETE"},
WhiteListed: false,
})
config.EncryptionKey = "A123456789B123456789C123456789D1"
if !assert.NoError(t, config.isValid()) {
t.FailNow()
}

// launch fake oauth OIDC server
err := runAdminTestAuth(t)
if !assert.NoError(t, err) {
t.FailNow()
}

// launch fake upstream resource server
err = runAdminTestUpstream(t)
if !assert.NoError(t, err) {
t.FailNow()
}

// launch fake app server where to land after authentication
err = runAdminTestApp(t)
if !assert.NoError(t, err) {
t.FailNow()
}

// launch keycloak-gatekeeper proxy
err = runAdminTestGatekeeper(t, config)
if !assert.NoError(t, err) {
t.FailNow()
}

// scenario 1: dedicated admin port

// test health status endpoint
client := http.Client{}
u, _ := url.Parse("http://" + e2eAdminEndpointListener + "/oauth/health")
h := make(http.Header, 10)
h.Set("Content-Type", "application/json")
h.Add("Accept", "application/json")
req := &http.Request{
Method: "GET",
URL: u,
Header: h,
}

resp, err := client.Do(req)
if !assert.NoError(t, err) {
t.FailNow()
}

assert.Equal(t, http.StatusOK, resp.StatusCode)
buf, erb := ioutil.ReadAll(resp.Body)
assert.NoError(t, erb)
assert.Equal(t, "OK\n", string(buf)) // check this is our test resource being called

// test prometheus metrics endpoint
u, _ = url.Parse("http://" + e2eAdminEndpointListener + "/oauth/metrics")
req = &http.Request{
Method: "GET",
URL: u,
Header: h,
}

resp, err = client.Do(req)
if !assert.NoError(t, err) {
t.FailNow()
}

assert.Equal(t, http.StatusOK, resp.StatusCode)
buf, erb = ioutil.ReadAll(resp.Body)
assert.NoError(t, erb)
assert.Contains(t, string(buf), `proxy_request_duration_sec`)

// test profiling/debug endpoint
u, _ = url.Parse("http://" + e2eAdminEndpointListener + debugURL + "/symbol")
req = &http.Request{
Method: "GET",
URL: u,
Header: h,
}

resp, err = client.Do(req)
if !assert.NoError(t, err) {
t.FailNow()
}

assert.Equal(t, http.StatusOK, resp.StatusCode)
buf, erb = ioutil.ReadAll(resp.Body)
assert.NoError(t, erb)
assert.Contains(t, string(buf), "num_symbols: 1\n")

// scenario 2: admin endpoints beside other routes
config.Listen = e2eAdminProxyListener2
config.ListenAdmin = ""
config.LocalhostMetrics = true

// launch a new keycloak-gatekeeper proxy
err = runAdminTestGatekeeper(t, config)
if !assert.NoError(t, err) {
t.FailNow()
}

// test health status endpoint, unauthenticated
u, _ = url.Parse("http://" + e2eAdminProxyListener2 + "/oauth/health")
req = &http.Request{
Method: "GET",
URL: u,
Header: h,
}
resp, err = client.Do(req)
if !assert.NoError(t, err) {
t.FailNow()
}
assert.Equal(t, http.StatusOK, resp.StatusCode)

// test metrics
u, _ = url.Parse("http://" + e2eAdminProxyListener2 + "/oauth/metrics")
req = &http.Request{
Method: "GET",
URL: u,
Header: h,
}

resp, err = client.Do(req)
if !assert.NoError(t, err) {
t.FailNow()
}

assert.Equal(t, http.StatusOK, resp.StatusCode)
buf, erb = ioutil.ReadAll(resp.Body)
assert.NoError(t, erb)
assert.Contains(t, string(buf), `proxy_request_duration_sec`)
}
Loading

0 comments on commit 479cc40

Please sign in to comment.