util.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. /*
  2. Copyright 2017 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package bootstrap
  14. import (
  15. "crypto/rand"
  16. "encoding/hex"
  17. "errors"
  18. "time"
  19. "k8s.io/api/core/v1"
  20. apierrs "k8s.io/apimachinery/pkg/api/errors"
  21. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  22. "k8s.io/apimachinery/pkg/util/wait"
  23. clientset "k8s.io/client-go/kubernetes"
  24. bootstrapapi "k8s.io/cluster-bootstrap/token/api"
  25. "k8s.io/kubernetes/test/e2e/framework"
  26. )
  27. func newTokenSecret(tokenID, tokenSecret string) *v1.Secret {
  28. return &v1.Secret{
  29. ObjectMeta: metav1.ObjectMeta{
  30. Namespace: metav1.NamespaceSystem,
  31. Name: bootstrapapi.BootstrapTokenSecretPrefix + tokenID,
  32. },
  33. Type: bootstrapapi.SecretTypeBootstrapToken,
  34. Data: map[string][]byte{
  35. bootstrapapi.BootstrapTokenIDKey: []byte(tokenID),
  36. bootstrapapi.BootstrapTokenSecretKey: []byte(tokenSecret),
  37. bootstrapapi.BootstrapTokenUsageSigningKey: []byte("true"),
  38. },
  39. }
  40. }
  41. func GenerateTokenId() (string, error) {
  42. tokenID, err := randBytes(TokenIDBytes)
  43. if err != nil {
  44. return "", err
  45. }
  46. return tokenID, nil
  47. }
  48. func GenerateTokenSecret() (string, error) {
  49. tokenSecret, err := randBytes(TokenSecretBytes)
  50. if err != nil {
  51. return "", err
  52. }
  53. return tokenSecret, err
  54. }
  55. func randBytes(length int) (string, error) {
  56. b := make([]byte, length)
  57. _, err := rand.Read(b)
  58. if err != nil {
  59. return "", err
  60. }
  61. return hex.EncodeToString(b), nil
  62. }
  63. func addSecretExpiration(s *v1.Secret, expiration string) {
  64. s.Data[bootstrapapi.BootstrapTokenExpirationKey] = []byte(expiration)
  65. }
  66. func TimeStringFromNow(delta time.Duration) string {
  67. return time.Now().Add(delta).Format(time.RFC3339)
  68. }
  69. func WaitforSignedClusterInfoByBootStrapToken(c clientset.Interface, tokenID string) error {
  70. return wait.Poll(framework.Poll, 2*time.Minute, func() (bool, error) {
  71. cfgMap, err := c.CoreV1().ConfigMaps(metav1.NamespacePublic).Get(bootstrapapi.ConfigMapClusterInfo, metav1.GetOptions{})
  72. if err != nil {
  73. framework.Failf("Failed to get cluster-info configMap: %v", err)
  74. return false, err
  75. }
  76. _, ok := cfgMap.Data[bootstrapapi.JWSSignatureKeyPrefix+tokenID]
  77. if !ok {
  78. return false, nil
  79. }
  80. return true, nil
  81. })
  82. }
  83. func WaitForSignedClusterInfoGetUpdatedByBootstrapToken(c clientset.Interface, tokenID string, signedToken string) error {
  84. return wait.Poll(framework.Poll, 2*time.Minute, func() (bool, error) {
  85. cfgMap, err := c.CoreV1().ConfigMaps(metav1.NamespacePublic).Get(bootstrapapi.ConfigMapClusterInfo, metav1.GetOptions{})
  86. if err != nil {
  87. framework.Failf("Failed to get cluster-info configMap: %v", err)
  88. return false, err
  89. }
  90. updated, ok := cfgMap.Data[bootstrapapi.JWSSignatureKeyPrefix+tokenID]
  91. if !ok || updated == signedToken {
  92. return false, nil
  93. }
  94. return true, nil
  95. })
  96. }
  97. func WaitForSignedClusterInfoByBootstrapTokenToDisappear(c clientset.Interface, tokenID string) error {
  98. return wait.Poll(framework.Poll, 2*time.Minute, func() (bool, error) {
  99. cfgMap, err := c.CoreV1().ConfigMaps(metav1.NamespacePublic).Get(bootstrapapi.ConfigMapClusterInfo, metav1.GetOptions{})
  100. if err != nil {
  101. framework.Failf("Failed to get cluster-info configMap: %v", err)
  102. return false, err
  103. }
  104. _, ok := cfgMap.Data[bootstrapapi.JWSSignatureKeyPrefix+tokenID]
  105. if ok {
  106. return false, nil
  107. }
  108. return true, nil
  109. })
  110. }
  111. func WaitForBootstrapTokenSecretToDisappear(c clientset.Interface, tokenID string) error {
  112. return wait.Poll(framework.Poll, 1*time.Minute, func() (bool, error) {
  113. _, err := c.CoreV1().Secrets(metav1.NamespaceSystem).Get(bootstrapapi.BootstrapTokenSecretPrefix+tokenID, metav1.GetOptions{})
  114. if apierrs.IsNotFound(err) {
  115. return true, nil
  116. }
  117. return false, nil
  118. })
  119. }
  120. func WaitForBootstrapTokenSecretNotDisappear(c clientset.Interface, tokenID string, t time.Duration) error {
  121. err := wait.Poll(framework.Poll, t, func() (bool, error) {
  122. secret, err := c.CoreV1().Secrets(metav1.NamespaceSystem).Get(bootstrapapi.BootstrapTokenSecretPrefix+tokenID, metav1.GetOptions{})
  123. if apierrs.IsNotFound(err) {
  124. return true, errors.New("secret not exists")
  125. }
  126. if secret != nil {
  127. return false, nil
  128. }
  129. return true, err
  130. })
  131. if err == wait.ErrWaitTimeout {
  132. return nil
  133. }
  134. return err
  135. }