capabilities_test.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413
  1. /*
  2. Copyright 2016 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package capabilities
  14. import (
  15. "reflect"
  16. "testing"
  17. corev1 "k8s.io/api/core/v1"
  18. policy "k8s.io/api/policy/v1beta1"
  19. "k8s.io/apimachinery/pkg/util/validation/field"
  20. api "k8s.io/kubernetes/pkg/apis/core"
  21. )
  22. func TestGenerateAdds(t *testing.T) {
  23. tests := map[string]struct {
  24. defaultAddCaps []corev1.Capability
  25. containerCaps *api.Capabilities
  26. expectedCaps *api.Capabilities
  27. }{
  28. "no required, no container requests": {},
  29. "no required, no container requests, non-nil": {
  30. containerCaps: &api.Capabilities{},
  31. expectedCaps: &api.Capabilities{},
  32. },
  33. "required, no container requests": {
  34. defaultAddCaps: []corev1.Capability{"foo"},
  35. expectedCaps: &api.Capabilities{
  36. Add: []api.Capability{"foo"},
  37. },
  38. },
  39. "required, container requests add required": {
  40. defaultAddCaps: []corev1.Capability{"foo"},
  41. containerCaps: &api.Capabilities{
  42. Add: []api.Capability{"foo"},
  43. },
  44. expectedCaps: &api.Capabilities{
  45. Add: []api.Capability{"foo"},
  46. },
  47. },
  48. "multiple required, container requests add required": {
  49. defaultAddCaps: []corev1.Capability{"foo", "bar", "baz"},
  50. containerCaps: &api.Capabilities{
  51. Add: []api.Capability{"foo"},
  52. },
  53. expectedCaps: &api.Capabilities{
  54. Add: []api.Capability{"bar", "baz", "foo"},
  55. },
  56. },
  57. "required, container requests add non-required": {
  58. defaultAddCaps: []corev1.Capability{"foo"},
  59. containerCaps: &api.Capabilities{
  60. Add: []api.Capability{"bar"},
  61. },
  62. expectedCaps: &api.Capabilities{
  63. Add: []api.Capability{"bar", "foo"},
  64. },
  65. },
  66. "generation does not mutate unnecessarily": {
  67. defaultAddCaps: []corev1.Capability{"foo", "bar"},
  68. containerCaps: &api.Capabilities{
  69. Add: []api.Capability{"foo", "foo", "bar", "baz"},
  70. },
  71. expectedCaps: &api.Capabilities{
  72. Add: []api.Capability{"foo", "foo", "bar", "baz"},
  73. },
  74. },
  75. "generation dedupes": {
  76. defaultAddCaps: []corev1.Capability{"foo", "bar"},
  77. containerCaps: &api.Capabilities{
  78. Add: []api.Capability{"foo", "baz"},
  79. },
  80. expectedCaps: &api.Capabilities{
  81. Add: []api.Capability{"bar", "baz", "foo"},
  82. },
  83. },
  84. "generation is case sensitive - will not dedupe": {
  85. defaultAddCaps: []corev1.Capability{"foo"},
  86. containerCaps: &api.Capabilities{
  87. Add: []api.Capability{"FOO"},
  88. },
  89. expectedCaps: &api.Capabilities{
  90. Add: []api.Capability{"FOO", "foo"},
  91. },
  92. },
  93. }
  94. for k, v := range tests {
  95. container := &api.Container{
  96. SecurityContext: &api.SecurityContext{
  97. Capabilities: v.containerCaps,
  98. },
  99. }
  100. strategy, err := NewDefaultCapabilities(v.defaultAddCaps, nil, nil)
  101. if err != nil {
  102. t.Errorf("%s failed: %v", k, err)
  103. continue
  104. }
  105. generatedCaps, err := strategy.Generate(nil, container)
  106. if err != nil {
  107. t.Errorf("%s failed generating: %v", k, err)
  108. continue
  109. }
  110. if v.expectedCaps == nil && generatedCaps != nil {
  111. t.Errorf("%s expected nil caps to be generated but got %v", k, generatedCaps)
  112. continue
  113. }
  114. if !reflect.DeepEqual(v.expectedCaps, generatedCaps) {
  115. t.Errorf("%s did not generate correctly. Expected: %#v, Actual: %#v", k, v.expectedCaps, generatedCaps)
  116. }
  117. }
  118. }
  119. func TestGenerateDrops(t *testing.T) {
  120. tests := map[string]struct {
  121. defaultAddCaps []corev1.Capability
  122. requiredDropCaps []corev1.Capability
  123. containerCaps *api.Capabilities
  124. expectedCaps *api.Capabilities
  125. }{
  126. "no required, no container requests": {
  127. expectedCaps: nil,
  128. },
  129. "no required, no container requests, non-nil": {
  130. containerCaps: &api.Capabilities{},
  131. expectedCaps: &api.Capabilities{},
  132. },
  133. "required drops are defaulted": {
  134. requiredDropCaps: []corev1.Capability{"foo"},
  135. expectedCaps: &api.Capabilities{
  136. Drop: []api.Capability{"foo"},
  137. },
  138. },
  139. "required drops are defaulted when making container requests": {
  140. requiredDropCaps: []corev1.Capability{"baz"},
  141. containerCaps: &api.Capabilities{
  142. Drop: []api.Capability{"foo", "bar"},
  143. },
  144. expectedCaps: &api.Capabilities{
  145. Drop: []api.Capability{"bar", "baz", "foo"},
  146. },
  147. },
  148. "required drops do not mutate unnecessarily": {
  149. requiredDropCaps: []corev1.Capability{"baz"},
  150. containerCaps: &api.Capabilities{
  151. Drop: []api.Capability{"foo", "bar", "baz"},
  152. },
  153. expectedCaps: &api.Capabilities{
  154. Drop: []api.Capability{"foo", "bar", "baz"},
  155. },
  156. },
  157. "can drop a required add": {
  158. defaultAddCaps: []corev1.Capability{"foo"},
  159. containerCaps: &api.Capabilities{
  160. Drop: []api.Capability{"foo"},
  161. },
  162. expectedCaps: &api.Capabilities{
  163. Drop: []api.Capability{"foo"},
  164. },
  165. },
  166. "can drop non-required add": {
  167. defaultAddCaps: []corev1.Capability{"foo"},
  168. containerCaps: &api.Capabilities{
  169. Drop: []api.Capability{"bar"},
  170. },
  171. expectedCaps: &api.Capabilities{
  172. Add: []api.Capability{"foo"},
  173. Drop: []api.Capability{"bar"},
  174. },
  175. },
  176. "defaulting adds and drops, dropping a required add": {
  177. defaultAddCaps: []corev1.Capability{"foo", "bar", "baz"},
  178. requiredDropCaps: []corev1.Capability{"abc"},
  179. containerCaps: &api.Capabilities{
  180. Drop: []api.Capability{"foo"},
  181. },
  182. expectedCaps: &api.Capabilities{
  183. Add: []api.Capability{"bar", "baz"},
  184. Drop: []api.Capability{"abc", "foo"},
  185. },
  186. },
  187. "generation dedupes": {
  188. requiredDropCaps: []corev1.Capability{"baz", "foo"},
  189. containerCaps: &api.Capabilities{
  190. Drop: []api.Capability{"bar", "foo"},
  191. },
  192. expectedCaps: &api.Capabilities{
  193. Drop: []api.Capability{"bar", "baz", "foo"},
  194. },
  195. },
  196. "generation is case sensitive - will not dedupe": {
  197. requiredDropCaps: []corev1.Capability{"bar"},
  198. containerCaps: &api.Capabilities{
  199. Drop: []api.Capability{"BAR"},
  200. },
  201. expectedCaps: &api.Capabilities{
  202. Drop: []api.Capability{"BAR", "bar"},
  203. },
  204. },
  205. }
  206. for k, v := range tests {
  207. container := &api.Container{
  208. SecurityContext: &api.SecurityContext{
  209. Capabilities: v.containerCaps,
  210. },
  211. }
  212. strategy, err := NewDefaultCapabilities(v.defaultAddCaps, v.requiredDropCaps, nil)
  213. if err != nil {
  214. t.Errorf("%s failed: %v", k, err)
  215. continue
  216. }
  217. generatedCaps, err := strategy.Generate(nil, container)
  218. if err != nil {
  219. t.Errorf("%s failed generating: %v", k, err)
  220. continue
  221. }
  222. if v.expectedCaps == nil && generatedCaps != nil {
  223. t.Errorf("%s expected nil caps to be generated but got %#v", k, generatedCaps)
  224. continue
  225. }
  226. if !reflect.DeepEqual(v.expectedCaps, generatedCaps) {
  227. t.Errorf("%s did not generate correctly. Expected: %#v, Actual: %#v", k, v.expectedCaps, generatedCaps)
  228. }
  229. }
  230. }
  231. func TestValidateAdds(t *testing.T) {
  232. tests := map[string]struct {
  233. defaultAddCaps []corev1.Capability
  234. allowedCaps []corev1.Capability
  235. containerCaps *api.Capabilities
  236. expectedError string
  237. }{
  238. // no container requests
  239. "no required, no allowed, no container requests": {},
  240. "no required, allowed, no container requests": {
  241. allowedCaps: []corev1.Capability{"foo"},
  242. },
  243. "required, no allowed, no container requests": {
  244. defaultAddCaps: []corev1.Capability{"foo"},
  245. expectedError: `capabilities: Invalid value: "null": required capabilities are not set on the securityContext`,
  246. },
  247. // container requests match required
  248. "required, no allowed, container requests valid": {
  249. defaultAddCaps: []corev1.Capability{"foo"},
  250. containerCaps: &api.Capabilities{
  251. Add: []api.Capability{"foo"},
  252. },
  253. },
  254. "required, no allowed, container requests invalid": {
  255. defaultAddCaps: []corev1.Capability{"foo"},
  256. containerCaps: &api.Capabilities{
  257. Add: []api.Capability{"bar"},
  258. },
  259. expectedError: `capabilities.add: Invalid value: "bar": capability may not be added`,
  260. },
  261. // container requests match allowed
  262. "no required, allowed, container requests valid": {
  263. allowedCaps: []corev1.Capability{"foo"},
  264. containerCaps: &api.Capabilities{
  265. Add: []api.Capability{"foo"},
  266. },
  267. },
  268. "no required, all allowed, container requests valid": {
  269. allowedCaps: []corev1.Capability{policy.AllowAllCapabilities},
  270. containerCaps: &api.Capabilities{
  271. Add: []api.Capability{"foo"},
  272. },
  273. },
  274. "no required, allowed, container requests invalid": {
  275. allowedCaps: []corev1.Capability{"foo"},
  276. containerCaps: &api.Capabilities{
  277. Add: []api.Capability{"bar"},
  278. },
  279. expectedError: `capabilities.add: Invalid value: "bar": capability may not be added`,
  280. },
  281. // required and allowed
  282. "required, allowed, container requests valid required": {
  283. defaultAddCaps: []corev1.Capability{"foo"},
  284. allowedCaps: []corev1.Capability{"bar"},
  285. containerCaps: &api.Capabilities{
  286. Add: []api.Capability{"foo"},
  287. },
  288. },
  289. "required, allowed, container requests valid allowed": {
  290. defaultAddCaps: []corev1.Capability{"foo"},
  291. allowedCaps: []corev1.Capability{"bar"},
  292. containerCaps: &api.Capabilities{
  293. Add: []api.Capability{"bar"},
  294. },
  295. },
  296. "required, allowed, container requests invalid": {
  297. defaultAddCaps: []corev1.Capability{"foo"},
  298. allowedCaps: []corev1.Capability{"bar"},
  299. containerCaps: &api.Capabilities{
  300. Add: []api.Capability{"baz"},
  301. },
  302. expectedError: `capabilities.add: Invalid value: "baz": capability may not be added`,
  303. },
  304. "validation is case sensitive": {
  305. defaultAddCaps: []corev1.Capability{"foo"},
  306. containerCaps: &api.Capabilities{
  307. Add: []api.Capability{"FOO"},
  308. },
  309. expectedError: `capabilities.add: Invalid value: "FOO": capability may not be added`,
  310. },
  311. }
  312. for k, v := range tests {
  313. strategy, err := NewDefaultCapabilities(v.defaultAddCaps, nil, v.allowedCaps)
  314. if err != nil {
  315. t.Errorf("%s failed: %v", k, err)
  316. continue
  317. }
  318. errs := strategy.Validate(field.NewPath("capabilities"), nil, nil, v.containerCaps)
  319. if v.expectedError == "" && len(errs) > 0 {
  320. t.Errorf("%s should have passed but had errors %v", k, errs)
  321. continue
  322. }
  323. if v.expectedError != "" && len(errs) == 0 {
  324. t.Errorf("%s should have failed but received no errors", k)
  325. continue
  326. }
  327. if len(errs) == 1 && errs[0].Error() != v.expectedError {
  328. t.Errorf("%s should have failed with %v but received %v", k, v.expectedError, errs[0])
  329. continue
  330. }
  331. if len(errs) > 1 {
  332. t.Errorf("%s should have failed with at most one error, but received %v: %v", k, len(errs), errs)
  333. }
  334. }
  335. }
  336. func TestValidateDrops(t *testing.T) {
  337. tests := map[string]struct {
  338. requiredDropCaps []corev1.Capability
  339. containerCaps *api.Capabilities
  340. expectedError string
  341. }{
  342. // no container requests
  343. "no required, no container requests": {},
  344. "required, no container requests": {
  345. requiredDropCaps: []corev1.Capability{"foo"},
  346. expectedError: `capabilities: Invalid value: "null": required capabilities are not set on the securityContext`,
  347. },
  348. // container requests match required
  349. "required, container requests valid": {
  350. requiredDropCaps: []corev1.Capability{"foo"},
  351. containerCaps: &api.Capabilities{
  352. Drop: []api.Capability{"foo"},
  353. },
  354. },
  355. "required, container requests invalid": {
  356. requiredDropCaps: []corev1.Capability{"foo"},
  357. containerCaps: &api.Capabilities{
  358. Drop: []api.Capability{"bar"},
  359. },
  360. expectedError: `capabilities.drop: Invalid value: []core.Capability{"bar"}: foo is required to be dropped but was not found`,
  361. },
  362. "validation is case sensitive": {
  363. requiredDropCaps: []corev1.Capability{"foo"},
  364. containerCaps: &api.Capabilities{
  365. Drop: []api.Capability{"FOO"},
  366. },
  367. expectedError: `capabilities.drop: Invalid value: []core.Capability{"FOO"}: foo is required to be dropped but was not found`,
  368. },
  369. }
  370. for k, v := range tests {
  371. strategy, err := NewDefaultCapabilities(nil, v.requiredDropCaps, nil)
  372. if err != nil {
  373. t.Errorf("%s failed: %v", k, err)
  374. continue
  375. }
  376. errs := strategy.Validate(field.NewPath("capabilities"), nil, nil, v.containerCaps)
  377. if v.expectedError == "" && len(errs) > 0 {
  378. t.Errorf("%s should have passed but had errors %v", k, errs)
  379. continue
  380. }
  381. if v.expectedError != "" && len(errs) == 0 {
  382. t.Errorf("%s should have failed but received no errors", k)
  383. continue
  384. }
  385. if len(errs) == 1 && errs[0].Error() != v.expectedError {
  386. t.Errorf("%s should have failed with %v but received %v", k, v.expectedError, errs[0])
  387. continue
  388. }
  389. if len(errs) > 1 {
  390. t.Errorf("%s should have failed with at most one error, but received %v: %v", k, len(errs), errs)
  391. }
  392. }
  393. }