123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605 |
- # Copyright 2016 Google LLC
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- import datetime
- import functools
- import http.client as http_client
- import os
- import sys
- import freezegun
- import mock
- import OpenSSL
- import pytest # type: ignore
- import requests
- import requests.adapters
- from google.auth import environment_vars
- from google.auth import exceptions
- import google.auth.credentials
- import google.auth.transport._custom_tls_signer
- import google.auth.transport._mtls_helper
- import google.auth.transport.requests
- from google.oauth2 import service_account
- from tests.transport import compliance
- @pytest.fixture
- def frozen_time():
- with freezegun.freeze_time("1970-01-01 00:00:00", tick=False) as frozen:
- yield frozen
- class TestRequestResponse(compliance.RequestResponseTests):
- def make_request(self):
- return google.auth.transport.requests.Request()
- def test_timeout(self):
- http = mock.create_autospec(requests.Session, instance=True)
- request = google.auth.transport.requests.Request(http)
- request(url="http://example.com", method="GET", timeout=5)
- assert http.request.call_args[1]["timeout"] == 5
- def test_session_closed_on_del(self):
- http = mock.create_autospec(requests.Session, instance=True)
- request = google.auth.transport.requests.Request(http)
- request.__del__()
- http.close.assert_called_with()
- http = mock.create_autospec(requests.Session, instance=True)
- http.close.side_effect = TypeError("test injected TypeError")
- request = google.auth.transport.requests.Request(http)
- request.__del__()
- http.close.assert_called_with()
- class TestTimeoutGuard(object):
- def make_guard(self, *args, **kwargs):
- return google.auth.transport.requests.TimeoutGuard(*args, **kwargs)
- def test_tracks_elapsed_time_w_numeric_timeout(self, frozen_time):
- with self.make_guard(timeout=10) as guard:
- frozen_time.tick(delta=datetime.timedelta(seconds=3.8))
- assert guard.remaining_timeout == 6.2
- def test_tracks_elapsed_time_w_tuple_timeout(self, frozen_time):
- with self.make_guard(timeout=(16, 19)) as guard:
- frozen_time.tick(delta=datetime.timedelta(seconds=3.8))
- assert guard.remaining_timeout == (12.2, 15.2)
- def test_noop_if_no_timeout(self, frozen_time):
- with self.make_guard(timeout=None) as guard:
- frozen_time.tick(delta=datetime.timedelta(days=3650))
- # NOTE: no timeout error raised, despite years have passed
- assert guard.remaining_timeout is None
- def test_timeout_error_w_numeric_timeout(self, frozen_time):
- with pytest.raises(requests.exceptions.Timeout):
- with self.make_guard(timeout=10) as guard:
- frozen_time.tick(delta=datetime.timedelta(seconds=10.001))
- assert guard.remaining_timeout == pytest.approx(-0.001)
- def test_timeout_error_w_tuple_timeout(self, frozen_time):
- with pytest.raises(requests.exceptions.Timeout):
- with self.make_guard(timeout=(11, 10)) as guard:
- frozen_time.tick(delta=datetime.timedelta(seconds=10.001))
- assert guard.remaining_timeout == pytest.approx((0.999, -0.001))
- def test_custom_timeout_error_type(self, frozen_time):
- class FooError(Exception):
- pass
- with pytest.raises(FooError):
- with self.make_guard(timeout=1, timeout_error_type=FooError):
- frozen_time.tick(delta=datetime.timedelta(seconds=2))
- def test_lets_suite_errors_bubble_up(self, frozen_time):
- with pytest.raises(IndexError):
- with self.make_guard(timeout=1):
- [1, 2, 3][3]
- class CredentialsStub(google.auth.credentials.Credentials):
- def __init__(self, token="token"):
- super(CredentialsStub, self).__init__()
- self.token = token
- def apply(self, headers, token=None):
- headers["authorization"] = self.token
- def before_request(self, request, method, url, headers):
- self.apply(headers)
- def refresh(self, request):
- self.token += "1"
- def with_quota_project(self, quota_project_id):
- raise NotImplementedError()
- class TimeTickCredentialsStub(CredentialsStub):
- """Credentials that spend some (mocked) time when refreshing a token."""
- def __init__(self, time_tick, token="token"):
- self._time_tick = time_tick
- super(TimeTickCredentialsStub, self).__init__(token=token)
- def refresh(self, request):
- self._time_tick()
- super(TimeTickCredentialsStub, self).refresh(requests)
- class AdapterStub(requests.adapters.BaseAdapter):
- def __init__(self, responses, headers=None):
- super(AdapterStub, self).__init__()
- self.responses = responses
- self.requests = []
- self.headers = headers or {}
- def send(self, request, **kwargs):
- # pylint: disable=arguments-differ
- # request is the only required argument here and the only argument
- # we care about.
- self.requests.append(request)
- return self.responses.pop(0)
- def close(self): # pragma: NO COVER
- # pylint wants this to be here because it's abstract in the base
- # class, but requests never actually calls it.
- return
- class TimeTickAdapterStub(AdapterStub):
- """Adapter that spends some (mocked) time when making a request."""
- def __init__(self, time_tick, responses, headers=None):
- self._time_tick = time_tick
- super(TimeTickAdapterStub, self).__init__(responses, headers=headers)
- def send(self, request, **kwargs):
- self._time_tick()
- return super(TimeTickAdapterStub, self).send(request, **kwargs)
- class TestMutualTlsAdapter(object):
- @mock.patch.object(requests.adapters.HTTPAdapter, "init_poolmanager")
- @mock.patch.object(requests.adapters.HTTPAdapter, "proxy_manager_for")
- def test_success(self, mock_proxy_manager_for, mock_init_poolmanager):
- adapter = google.auth.transport.requests._MutualTlsAdapter(
- pytest.public_cert_bytes, pytest.private_key_bytes
- )
- adapter.init_poolmanager()
- mock_init_poolmanager.assert_called_with(ssl_context=adapter._ctx_poolmanager)
- adapter.proxy_manager_for()
- mock_proxy_manager_for.assert_called_with(ssl_context=adapter._ctx_proxymanager)
- def test_invalid_cert_or_key(self):
- with pytest.raises(OpenSSL.crypto.Error):
- google.auth.transport.requests._MutualTlsAdapter(
- b"invalid cert", b"invalid key"
- )
- @mock.patch.dict("sys.modules", {"OpenSSL.crypto": None})
- def test_import_error(self):
- with pytest.raises(ImportError):
- google.auth.transport.requests._MutualTlsAdapter(
- pytest.public_cert_bytes, pytest.private_key_bytes
- )
- def make_response(status=http_client.OK, data=None):
- response = requests.Response()
- response.status_code = status
- response._content = data
- return response
- class TestAuthorizedSession(object):
- TEST_URL = "http://example.com/"
- def test_constructor(self):
- authed_session = google.auth.transport.requests.AuthorizedSession(
- mock.sentinel.credentials
- )
- assert authed_session.credentials == mock.sentinel.credentials
- def test_constructor_with_auth_request(self):
- http = mock.create_autospec(requests.Session)
- auth_request = google.auth.transport.requests.Request(http)
- authed_session = google.auth.transport.requests.AuthorizedSession(
- mock.sentinel.credentials, auth_request=auth_request
- )
- assert authed_session._auth_request is auth_request
- def test_request_default_timeout(self):
- credentials = mock.Mock(wraps=CredentialsStub())
- response = make_response()
- adapter = AdapterStub([response])
- authed_session = google.auth.transport.requests.AuthorizedSession(credentials)
- authed_session.mount(self.TEST_URL, adapter)
- patcher = mock.patch("google.auth.transport.requests.requests.Session.request")
- with patcher as patched_request:
- authed_session.request("GET", self.TEST_URL)
- expected_timeout = google.auth.transport.requests._DEFAULT_TIMEOUT
- assert patched_request.call_args[1]["timeout"] == expected_timeout
- def test_request_no_refresh(self):
- credentials = mock.Mock(wraps=CredentialsStub())
- response = make_response()
- adapter = AdapterStub([response])
- authed_session = google.auth.transport.requests.AuthorizedSession(credentials)
- authed_session.mount(self.TEST_URL, adapter)
- result = authed_session.request("GET", self.TEST_URL)
- assert response == result
- assert credentials.before_request.called
- assert not credentials.refresh.called
- assert len(adapter.requests) == 1
- assert adapter.requests[0].url == self.TEST_URL
- assert adapter.requests[0].headers["authorization"] == "token"
- def test_request_refresh(self):
- credentials = mock.Mock(wraps=CredentialsStub())
- final_response = make_response(status=http_client.OK)
- # First request will 401, second request will succeed.
- adapter = AdapterStub(
- [make_response(status=http_client.UNAUTHORIZED), final_response]
- )
- authed_session = google.auth.transport.requests.AuthorizedSession(
- credentials, refresh_timeout=60
- )
- authed_session.mount(self.TEST_URL, adapter)
- result = authed_session.request("GET", self.TEST_URL)
- assert result == final_response
- assert credentials.before_request.call_count == 2
- assert credentials.refresh.called
- assert len(adapter.requests) == 2
- assert adapter.requests[0].url == self.TEST_URL
- assert adapter.requests[0].headers["authorization"] == "token"
- assert adapter.requests[1].url == self.TEST_URL
- assert adapter.requests[1].headers["authorization"] == "token1"
- def test_request_max_allowed_time_timeout_error(self, frozen_time):
- tick_one_second = functools.partial(
- frozen_time.tick, delta=datetime.timedelta(seconds=1.0)
- )
- credentials = mock.Mock(
- wraps=TimeTickCredentialsStub(time_tick=tick_one_second)
- )
- adapter = TimeTickAdapterStub(
- time_tick=tick_one_second, responses=[make_response(status=http_client.OK)]
- )
- authed_session = google.auth.transport.requests.AuthorizedSession(credentials)
- authed_session.mount(self.TEST_URL, adapter)
- # Because a request takes a full mocked second, max_allowed_time shorter
- # than that will cause a timeout error.
- with pytest.raises(requests.exceptions.Timeout):
- authed_session.request("GET", self.TEST_URL, max_allowed_time=0.9)
- def test_request_max_allowed_time_w_transport_timeout_no_error(self, frozen_time):
- tick_one_second = functools.partial(
- frozen_time.tick, delta=datetime.timedelta(seconds=1.0)
- )
- credentials = mock.Mock(
- wraps=TimeTickCredentialsStub(time_tick=tick_one_second)
- )
- adapter = TimeTickAdapterStub(
- time_tick=tick_one_second,
- responses=[
- make_response(status=http_client.UNAUTHORIZED),
- make_response(status=http_client.OK),
- ],
- )
- authed_session = google.auth.transport.requests.AuthorizedSession(credentials)
- authed_session.mount(self.TEST_URL, adapter)
- # A short configured transport timeout does not affect max_allowed_time.
- # The latter is not adjusted to it and is only concerned with the actual
- # execution time. The call below should thus not raise a timeout error.
- authed_session.request("GET", self.TEST_URL, timeout=0.5, max_allowed_time=3.1)
- def test_request_max_allowed_time_w_refresh_timeout_no_error(self, frozen_time):
- tick_one_second = functools.partial(
- frozen_time.tick, delta=datetime.timedelta(seconds=1.0)
- )
- credentials = mock.Mock(
- wraps=TimeTickCredentialsStub(time_tick=tick_one_second)
- )
- adapter = TimeTickAdapterStub(
- time_tick=tick_one_second,
- responses=[
- make_response(status=http_client.UNAUTHORIZED),
- make_response(status=http_client.OK),
- ],
- )
- authed_session = google.auth.transport.requests.AuthorizedSession(
- credentials, refresh_timeout=1.1
- )
- authed_session.mount(self.TEST_URL, adapter)
- # A short configured refresh timeout does not affect max_allowed_time.
- # The latter is not adjusted to it and is only concerned with the actual
- # execution time. The call below should thus not raise a timeout error
- # (and `timeout` does not come into play either, as it's very long).
- authed_session.request("GET", self.TEST_URL, timeout=60, max_allowed_time=3.1)
- def test_request_timeout_w_refresh_timeout_timeout_error(self, frozen_time):
- tick_one_second = functools.partial(
- frozen_time.tick, delta=datetime.timedelta(seconds=1.0)
- )
- credentials = mock.Mock(
- wraps=TimeTickCredentialsStub(time_tick=tick_one_second)
- )
- adapter = TimeTickAdapterStub(
- time_tick=tick_one_second,
- responses=[
- make_response(status=http_client.UNAUTHORIZED),
- make_response(status=http_client.OK),
- ],
- )
- authed_session = google.auth.transport.requests.AuthorizedSession(
- credentials, refresh_timeout=100
- )
- authed_session.mount(self.TEST_URL, adapter)
- # An UNAUTHORIZED response triggers a refresh (an extra request), thus
- # the final request that otherwise succeeds results in a timeout error
- # (all three requests together last 3 mocked seconds).
- with pytest.raises(requests.exceptions.Timeout):
- authed_session.request(
- "GET", self.TEST_URL, timeout=60, max_allowed_time=2.9
- )
- def test_authorized_session_without_default_host(self):
- credentials = mock.create_autospec(service_account.Credentials)
- authed_session = google.auth.transport.requests.AuthorizedSession(credentials)
- authed_session.credentials._create_self_signed_jwt.assert_called_once_with(None)
- def test_authorized_session_with_default_host(self):
- default_host = "pubsub.googleapis.com"
- credentials = mock.create_autospec(service_account.Credentials)
- authed_session = google.auth.transport.requests.AuthorizedSession(
- credentials, default_host=default_host
- )
- authed_session.credentials._create_self_signed_jwt.assert_called_once_with(
- "https://{}/".format(default_host)
- )
- def test_configure_mtls_channel_with_callback(self):
- mock_callback = mock.Mock()
- mock_callback.return_value = (
- pytest.public_cert_bytes,
- pytest.private_key_bytes,
- )
- auth_session = google.auth.transport.requests.AuthorizedSession(
- credentials=mock.Mock()
- )
- with mock.patch.dict(
- os.environ, {environment_vars.GOOGLE_API_USE_CLIENT_CERTIFICATE: "true"}
- ):
- auth_session.configure_mtls_channel(mock_callback)
- assert auth_session.is_mtls
- assert isinstance(
- auth_session.adapters["https://"],
- google.auth.transport.requests._MutualTlsAdapter,
- )
- @mock.patch(
- "google.auth.transport._mtls_helper.get_client_cert_and_key", autospec=True
- )
- def test_configure_mtls_channel_with_metadata(self, mock_get_client_cert_and_key):
- mock_get_client_cert_and_key.return_value = (
- True,
- pytest.public_cert_bytes,
- pytest.private_key_bytes,
- )
- auth_session = google.auth.transport.requests.AuthorizedSession(
- credentials=mock.Mock()
- )
- with mock.patch.dict(
- os.environ, {environment_vars.GOOGLE_API_USE_CLIENT_CERTIFICATE: "true"}
- ):
- auth_session.configure_mtls_channel()
- assert auth_session.is_mtls
- assert isinstance(
- auth_session.adapters["https://"],
- google.auth.transport.requests._MutualTlsAdapter,
- )
- @mock.patch.object(google.auth.transport.requests._MutualTlsAdapter, "__init__")
- @mock.patch(
- "google.auth.transport._mtls_helper.get_client_cert_and_key", autospec=True
- )
- def test_configure_mtls_channel_non_mtls(
- self, mock_get_client_cert_and_key, mock_adapter_ctor
- ):
- mock_get_client_cert_and_key.return_value = (False, None, None)
- auth_session = google.auth.transport.requests.AuthorizedSession(
- credentials=mock.Mock()
- )
- with mock.patch.dict(
- os.environ, {environment_vars.GOOGLE_API_USE_CLIENT_CERTIFICATE: "true"}
- ):
- auth_session.configure_mtls_channel()
- assert not auth_session.is_mtls
- # Assert _MutualTlsAdapter constructor is not called.
- mock_adapter_ctor.assert_not_called()
- @mock.patch(
- "google.auth.transport._mtls_helper.get_client_cert_and_key", autospec=True
- )
- def test_configure_mtls_channel_exceptions(self, mock_get_client_cert_and_key):
- mock_get_client_cert_and_key.side_effect = exceptions.ClientCertError()
- auth_session = google.auth.transport.requests.AuthorizedSession(
- credentials=mock.Mock()
- )
- with pytest.raises(exceptions.MutualTLSChannelError):
- with mock.patch.dict(
- os.environ, {environment_vars.GOOGLE_API_USE_CLIENT_CERTIFICATE: "true"}
- ):
- auth_session.configure_mtls_channel()
- mock_get_client_cert_and_key.return_value = (False, None, None)
- with mock.patch.dict("sys.modules"):
- sys.modules["OpenSSL"] = None
- with pytest.raises(exceptions.MutualTLSChannelError):
- with mock.patch.dict(
- os.environ,
- {environment_vars.GOOGLE_API_USE_CLIENT_CERTIFICATE: "true"},
- ):
- auth_session.configure_mtls_channel()
- @mock.patch(
- "google.auth.transport._mtls_helper.get_client_cert_and_key", autospec=True
- )
- def test_configure_mtls_channel_without_client_cert_env(
- self, get_client_cert_and_key
- ):
- # Test client cert won't be used if GOOGLE_API_USE_CLIENT_CERTIFICATE
- # environment variable is not set.
- auth_session = google.auth.transport.requests.AuthorizedSession(
- credentials=mock.Mock()
- )
- auth_session.configure_mtls_channel()
- assert not auth_session.is_mtls
- get_client_cert_and_key.assert_not_called()
- mock_callback = mock.Mock()
- auth_session.configure_mtls_channel(mock_callback)
- assert not auth_session.is_mtls
- mock_callback.assert_not_called()
- def test_close_wo_passed_in_auth_request(self):
- authed_session = google.auth.transport.requests.AuthorizedSession(
- mock.sentinel.credentials
- )
- authed_session._auth_request_session = mock.Mock(spec=["close"])
- authed_session.close()
- authed_session._auth_request_session.close.assert_called_once_with()
- def test_close_w_passed_in_auth_request(self):
- http = mock.create_autospec(requests.Session)
- auth_request = google.auth.transport.requests.Request(http)
- authed_session = google.auth.transport.requests.AuthorizedSession(
- mock.sentinel.credentials, auth_request=auth_request
- )
- authed_session.close() # no raise
- class TestMutualTlsOffloadAdapter(object):
- @mock.patch.object(requests.adapters.HTTPAdapter, "init_poolmanager")
- @mock.patch.object(requests.adapters.HTTPAdapter, "proxy_manager_for")
- @mock.patch.object(
- google.auth.transport._custom_tls_signer.CustomTlsSigner, "load_libraries"
- )
- @mock.patch.object(
- google.auth.transport._custom_tls_signer.CustomTlsSigner,
- "attach_to_ssl_context",
- )
- def test_success(
- self,
- mock_attach_to_ssl_context,
- mock_load_libraries,
- mock_proxy_manager_for,
- mock_init_poolmanager,
- ):
- enterprise_cert_file_path = "/path/to/enterprise/cert/json"
- adapter = google.auth.transport.requests._MutualTlsOffloadAdapter(
- enterprise_cert_file_path
- )
- mock_load_libraries.assert_called_once()
- assert mock_attach_to_ssl_context.call_count == 2
- adapter.init_poolmanager()
- mock_init_poolmanager.assert_called_with(ssl_context=adapter._ctx_poolmanager)
- adapter.proxy_manager_for()
- mock_proxy_manager_for.assert_called_with(ssl_context=adapter._ctx_proxymanager)
- @mock.patch.object(requests.adapters.HTTPAdapter, "init_poolmanager")
- @mock.patch.object(requests.adapters.HTTPAdapter, "proxy_manager_for")
- @mock.patch.object(
- google.auth.transport._custom_tls_signer.CustomTlsSigner, "should_use_provider"
- )
- @mock.patch.object(
- google.auth.transport._custom_tls_signer.CustomTlsSigner, "load_libraries"
- )
- @mock.patch.object(
- google.auth.transport._custom_tls_signer.CustomTlsSigner,
- "attach_to_ssl_context",
- )
- def test_success_should_use_provider(
- self,
- mock_attach_to_ssl_context,
- mock_load_libraries,
- mock_should_use_provider,
- mock_proxy_manager_for,
- mock_init_poolmanager,
- ):
- enterprise_cert_file_path = "/path/to/enterprise/cert/json"
- adapter = google.auth.transport.requests._MutualTlsOffloadAdapter(
- enterprise_cert_file_path
- )
- mock_should_use_provider.side_effect = True
- mock_load_libraries.assert_called_once()
- assert mock_attach_to_ssl_context.call_count == 2
- adapter.init_poolmanager()
- mock_init_poolmanager.assert_called_with(ssl_context=adapter._ctx_poolmanager)
- adapter.proxy_manager_for()
- mock_proxy_manager_for.assert_called_with(ssl_context=adapter._ctx_proxymanager)
|