summaryrefslogtreecommitdiffstats
path: root/src/fluent-bit/lib/librdkafka-2.1.0/tests/0126-oauthbearer_oidc.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-05 11:19:16 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-05 12:07:37 +0000
commitb485aab7e71c1625cfc27e0f92c9509f42378458 (patch)
treeae9abe108601079d1679194de237c9a435ae5b55 /src/fluent-bit/lib/librdkafka-2.1.0/tests/0126-oauthbearer_oidc.c
parentAdding upstream version 1.44.3. (diff)
downloadnetdata-b485aab7e71c1625cfc27e0f92c9509f42378458.tar.xz
netdata-b485aab7e71c1625cfc27e0f92c9509f42378458.zip
Adding upstream version 1.45.3+dfsg.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/fluent-bit/lib/librdkafka-2.1.0/tests/0126-oauthbearer_oidc.c')
-rw-r--r--src/fluent-bit/lib/librdkafka-2.1.0/tests/0126-oauthbearer_oidc.c213
1 files changed, 213 insertions, 0 deletions
diff --git a/src/fluent-bit/lib/librdkafka-2.1.0/tests/0126-oauthbearer_oidc.c b/src/fluent-bit/lib/librdkafka-2.1.0/tests/0126-oauthbearer_oidc.c
new file mode 100644
index 000000000..8eb187068
--- /dev/null
+++ b/src/fluent-bit/lib/librdkafka-2.1.0/tests/0126-oauthbearer_oidc.c
@@ -0,0 +1,213 @@
+/*
+ * librdkafka - Apache Kafka C library
+ *
+ * Copyright (c) 2021, Magnus Edenhill
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "test.h"
+/* Typical include path would be <librdkafka/rdkafka.h>, but this program
+ * is built from within the librdkafka source tree and thus differs. */
+#include "rdkafka.h" /* for Kafka driver */
+
+static rd_bool_t error_seen;
+/**
+ * @brief After config OIDC, make sure the producer and consumer
+ * can work successfully.
+ *
+ */
+static void
+do_test_produce_consumer_with_OIDC(const rd_kafka_conf_t *base_conf) {
+ const char *topic;
+ uint64_t testid;
+ rd_kafka_t *p1;
+ rd_kafka_t *c1;
+ rd_kafka_conf_t *conf;
+
+ const char *url = test_getenv("VALID_OIDC_URL", NULL);
+
+ SUB_TEST("Test producer and consumer with oidc configuration");
+
+ if (!url) {
+ SUB_TEST_SKIP(
+ "VALID_OIDC_URL environment variable is not set\n");
+ return;
+ }
+
+ conf = rd_kafka_conf_dup(base_conf);
+ test_conf_set(conf, "sasl.oauthbearer.token.endpoint.url", url);
+
+ testid = test_id_generate();
+
+ rd_kafka_conf_set_dr_msg_cb(conf, test_dr_msg_cb);
+
+ p1 = test_create_handle(RD_KAFKA_PRODUCER, rd_kafka_conf_dup(conf));
+
+ topic = test_mk_topic_name("0126-oauthbearer_oidc", 1);
+ test_create_topic(p1, topic, 1, 3);
+ TEST_SAY("Topic: %s is created\n", topic);
+
+ test_produce_msgs2(p1, topic, testid, 0, 0, 1, NULL, 0);
+
+ test_conf_set(conf, "auto.offset.reset", "earliest");
+ c1 = test_create_consumer(topic, NULL, rd_kafka_conf_dup(conf), NULL);
+ test_consumer_subscribe(c1, topic);
+
+ /* Give it some time to trigger the token refresh. */
+ rd_usleep(5 * 1000 * 1000, NULL);
+ test_consumer_poll("OIDC.C1", c1, testid, 1, -1, 1, NULL);
+
+ test_consumer_close(c1);
+
+ rd_kafka_destroy(p1);
+ rd_kafka_destroy(c1);
+ SUB_TEST_PASS();
+}
+
+
+static void
+auth_error_cb(rd_kafka_t *rk, int err, const char *reason, void *opaque) {
+ if (err == RD_KAFKA_RESP_ERR__AUTHENTICATION ||
+ err == RD_KAFKA_RESP_ERR__ALL_BROKERS_DOWN) {
+ TEST_SAY("Expected error: %s: %s\n", rd_kafka_err2str(err),
+ reason);
+ error_seen = rd_true;
+ } else
+ TEST_FAIL("Unexpected error: %s: %s", rd_kafka_err2str(err),
+ reason);
+ rd_kafka_yield(rk);
+}
+
+
+/**
+ * @brief After config OIDC, if the token is expired, make sure
+ * the authentication fail as expected.
+ *
+ */
+static void do_test_produce_consumer_with_OIDC_expired_token_should_fail(
+ const rd_kafka_conf_t *base_conf) {
+ rd_kafka_t *c1;
+ uint64_t testid;
+ rd_kafka_conf_t *conf;
+
+ const char *expired_url = test_getenv("EXPIRED_TOKEN_OIDC_URL", NULL);
+
+ SUB_TEST("Test OAUTHBEARER/OIDC failing with expired JWT");
+
+ if (!expired_url) {
+ SUB_TEST_SKIP(
+ "EXPIRED_TOKEN_OIDC_URL environment variable is not set\n");
+ return;
+ }
+
+ conf = rd_kafka_conf_dup(base_conf);
+
+ error_seen = rd_false;
+ test_conf_set(conf, "sasl.oauthbearer.token.endpoint.url", expired_url);
+
+ rd_kafka_conf_set_error_cb(conf, auth_error_cb);
+
+ testid = test_id_generate();
+
+ c1 = test_create_consumer("OIDC.fail.C1", NULL, conf, NULL);
+
+ test_consumer_poll_no_msgs("OIDC.fail.C1", c1, testid, 10 * 1000);
+ TEST_ASSERT(error_seen);
+
+ test_consumer_close(c1);
+ rd_kafka_destroy(c1);
+ SUB_TEST_PASS();
+}
+
+
+/**
+ * @brief After config OIDC, if the token is not valid, make sure the
+ * authentication fail as expected.
+ *
+ */
+static void do_test_produce_consumer_with_OIDC_should_fail(
+ const rd_kafka_conf_t *base_conf) {
+ rd_kafka_t *c1;
+ uint64_t testid;
+ rd_kafka_conf_t *conf;
+
+ const char *invalid_url = test_getenv("INVALID_OIDC_URL", NULL);
+
+ SUB_TEST("Test OAUTHBEARER/OIDC failing with invalid JWT");
+
+ if (!invalid_url) {
+ SUB_TEST_SKIP(
+ "INVALID_OIDC_URL environment variable is not set\n");
+ return;
+ }
+
+ conf = rd_kafka_conf_dup(base_conf);
+
+ error_seen = rd_false;
+
+ test_conf_set(conf, "sasl.oauthbearer.token.endpoint.url", invalid_url);
+
+ rd_kafka_conf_set_error_cb(conf, auth_error_cb);
+
+ testid = test_id_generate();
+
+ c1 = test_create_consumer("OIDC.fail.C1", NULL, conf, NULL);
+
+ test_consumer_poll_no_msgs("OIDC.fail.C1", c1, testid, 10 * 1000);
+
+ TEST_ASSERT(error_seen);
+
+ test_consumer_close(c1);
+ rd_kafka_destroy(c1);
+ SUB_TEST_PASS();
+}
+
+
+int main_0126_oauthbearer_oidc(int argc, char **argv) {
+ rd_kafka_conf_t *conf;
+ const char *sec;
+ const char *oidc;
+
+ test_conf_init(&conf, NULL, 60);
+
+ sec = test_conf_get(conf, "security.protocol");
+ if (!strstr(sec, "sasl")) {
+ TEST_SKIP("Apache Kafka cluster not configured for SASL\n");
+ return 0;
+ }
+
+ oidc = test_conf_get(conf, "sasl.oauthbearer.method");
+ if (rd_strcasecmp(oidc, "OIDC")) {
+ TEST_SKIP("`sasl.oauthbearer.method=OIDC` is required\n");
+ return 0;
+ }
+
+ do_test_produce_consumer_with_OIDC(conf);
+ do_test_produce_consumer_with_OIDC_should_fail(conf);
+ do_test_produce_consumer_with_OIDC_expired_token_should_fail(conf);
+
+ rd_kafka_conf_destroy(conf);
+
+ return 0;
+}