123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658 |
- /*
- Copyright 2017 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package auth
- import (
- "context"
- "fmt"
- "io/ioutil"
- "strings"
- "testing"
- "time"
- coordination "k8s.io/api/coordination/v1"
- corev1 "k8s.io/api/core/v1"
- policy "k8s.io/api/policy/v1beta1"
- storagev1 "k8s.io/api/storage/v1"
- apierrors "k8s.io/apimachinery/pkg/api/errors"
- "k8s.io/apimachinery/pkg/api/resource"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/apimachinery/pkg/util/wait"
- utilfeature "k8s.io/apiserver/pkg/util/feature"
- clientset "k8s.io/client-go/kubernetes"
- featuregatetesting "k8s.io/component-base/featuregate/testing"
- kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
- "k8s.io/kubernetes/pkg/features"
- "k8s.io/kubernetes/test/integration/framework"
- "k8s.io/utils/pointer"
- )
- func TestNodeAuthorizer(t *testing.T) {
- const (
- // Define credentials
- // Fake values for testing.
- tokenMaster = "master-token"
- tokenNodeUnknown = "unknown-token"
- tokenNode1 = "node1-token"
- tokenNode2 = "node2-token"
- )
- // Enable DynamicKubeletConfig feature so that Node.Spec.ConfigSource can be set
- defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.DynamicKubeletConfig, true)()
- // Enable CSINodeInfo feature so that nodes can create CSINode objects.
- defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.CSINodeInfo, true)()
- tokenFile, err := ioutil.TempFile("", "kubeconfig")
- if err != nil {
- t.Fatal(err)
- }
- tokenFile.WriteString(strings.Join([]string{
- fmt.Sprintf(`%s,admin,uid1,"system:masters"`, tokenMaster),
- fmt.Sprintf(`%s,unknown,uid2,"system:nodes"`, tokenNodeUnknown),
- fmt.Sprintf(`%s,system:node:node1,uid3,"system:nodes"`, tokenNode1),
- fmt.Sprintf(`%s,system:node:node2,uid4,"system:nodes"`, tokenNode2),
- }, "\n"))
- tokenFile.Close()
- server := kubeapiservertesting.StartTestServerOrDie(t, nil, []string{
- "--authorization-mode", "Node,RBAC",
- "--token-auth-file", tokenFile.Name(),
- "--enable-admission-plugins", "NodeRestriction",
- // The "default" SA is not installed, causing the ServiceAccount plugin to retry for ~1s per
- // API request.
- "--disable-admission-plugins", "ServiceAccount,TaintNodesByCondition",
- }, framework.SharedEtcd())
- defer server.TearDownFn()
- // Build client config and superuser clientset
- clientConfig := server.ClientConfig
- superuserClient, superuserClientExternal := clientsetForToken(tokenMaster, clientConfig)
- // Wait for a healthy server
- for {
- result := superuserClient.CoreV1().RESTClient().Get().AbsPath("/healthz").Do(context.TODO())
- _, err := result.Raw()
- if err == nil {
- break
- }
- t.Log(err)
- time.Sleep(time.Second)
- }
- // Create objects
- if _, err := superuserClient.CoreV1().Namespaces().Create(context.TODO(), &corev1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: "ns"}}, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- if _, err := superuserClient.CoreV1().Secrets("ns").Create(context.TODO(), &corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mysecret"}}, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- if _, err := superuserClient.CoreV1().Secrets("ns").Create(context.TODO(), &corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mypvsecret"}}, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- if _, err := superuserClient.CoreV1().ConfigMaps("ns").Create(context.TODO(), &corev1.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmap"}}, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- if _, err := superuserClient.CoreV1().ConfigMaps("ns").Create(context.TODO(), &corev1.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmapconfigsource"}}, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- pvName := "mypv"
- if _, err := superuserClientExternal.StorageV1().VolumeAttachments().Create(context.TODO(), &storagev1.VolumeAttachment{
- ObjectMeta: metav1.ObjectMeta{Name: "myattachment"},
- Spec: storagev1.VolumeAttachmentSpec{
- Attacher: "foo",
- Source: storagev1.VolumeAttachmentSource{PersistentVolumeName: &pvName},
- NodeName: "node2",
- },
- }, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- if _, err := superuserClient.CoreV1().PersistentVolumeClaims("ns").Create(context.TODO(), &corev1.PersistentVolumeClaim{
- ObjectMeta: metav1.ObjectMeta{Name: "mypvc"},
- Spec: corev1.PersistentVolumeClaimSpec{
- AccessModes: []corev1.PersistentVolumeAccessMode{corev1.ReadOnlyMany},
- Resources: corev1.ResourceRequirements{Requests: corev1.ResourceList{corev1.ResourceStorage: resource.MustParse("1")}},
- },
- }, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- if _, err := superuserClient.CoreV1().PersistentVolumes().Create(context.TODO(), &corev1.PersistentVolume{
- ObjectMeta: metav1.ObjectMeta{Name: "mypv"},
- Spec: corev1.PersistentVolumeSpec{
- AccessModes: []corev1.PersistentVolumeAccessMode{corev1.ReadOnlyMany},
- Capacity: corev1.ResourceList{corev1.ResourceStorage: resource.MustParse("1")},
- ClaimRef: &corev1.ObjectReference{Namespace: "ns", Name: "mypvc"},
- PersistentVolumeSource: corev1.PersistentVolumeSource{AzureFile: &corev1.AzureFilePersistentVolumeSource{ShareName: "default", SecretName: "mypvsecret"}},
- },
- }, metav1.CreateOptions{}); err != nil {
- t.Fatal(err)
- }
- getSecret := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().Secrets("ns").Get(context.TODO(), "mysecret", metav1.GetOptions{})
- return err
- }
- }
- getPVSecret := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().Secrets("ns").Get(context.TODO(), "mypvsecret", metav1.GetOptions{})
- return err
- }
- }
- getConfigMap := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().ConfigMaps("ns").Get(context.TODO(), "myconfigmap", metav1.GetOptions{})
- return err
- }
- }
- getConfigMapConfigSource := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().ConfigMaps("ns").Get(context.TODO(), "myconfigmapconfigsource", metav1.GetOptions{})
- return err
- }
- }
- getPVC := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().PersistentVolumeClaims("ns").Get(context.TODO(), "mypvc", metav1.GetOptions{})
- return err
- }
- }
- getPV := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().PersistentVolumes().Get(context.TODO(), "mypv", metav1.GetOptions{})
- return err
- }
- }
- getVolumeAttachment := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.StorageV1().VolumeAttachments().Get(context.TODO(), "myattachment", metav1.GetOptions{})
- return err
- }
- }
- createNode2NormalPod := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().Pods("ns").Create(context.TODO(), &corev1.Pod{
- ObjectMeta: metav1.ObjectMeta{Name: "node2normalpod"},
- Spec: corev1.PodSpec{
- NodeName: "node2",
- Containers: []corev1.Container{{Name: "image", Image: "busybox"}},
- Volumes: []corev1.Volume{
- {Name: "secret", VolumeSource: corev1.VolumeSource{Secret: &corev1.SecretVolumeSource{SecretName: "mysecret"}}},
- {Name: "cm", VolumeSource: corev1.VolumeSource{ConfigMap: &corev1.ConfigMapVolumeSource{LocalObjectReference: corev1.LocalObjectReference{Name: "myconfigmap"}}}},
- {Name: "pvc", VolumeSource: corev1.VolumeSource{PersistentVolumeClaim: &corev1.PersistentVolumeClaimVolumeSource{ClaimName: "mypvc"}}},
- },
- },
- }, metav1.CreateOptions{})
- return err
- }
- }
- updateNode2NormalPodStatus := func(client clientset.Interface) func() error {
- return func() error {
- startTime := metav1.NewTime(time.Now())
- _, err := client.CoreV1().Pods("ns").UpdateStatus(context.TODO(), &corev1.Pod{
- ObjectMeta: metav1.ObjectMeta{Name: "node2normalpod"},
- Status: corev1.PodStatus{StartTime: &startTime},
- }, metav1.UpdateOptions{})
- return err
- }
- }
- deleteNode2NormalPod := func(client clientset.Interface) func() error {
- return func() error {
- zero := int64(0)
- return client.CoreV1().Pods("ns").Delete(context.TODO(), "node2normalpod", &metav1.DeleteOptions{GracePeriodSeconds: &zero})
- }
- }
- createNode2MirrorPod := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().Pods("ns").Create(context.TODO(), &corev1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: "node2mirrorpod",
- Annotations: map[string]string{corev1.MirrorPodAnnotationKey: "true"},
- },
- Spec: corev1.PodSpec{
- NodeName: "node2",
- Containers: []corev1.Container{{Name: "image", Image: "busybox"}},
- },
- }, metav1.CreateOptions{})
- return err
- }
- }
- deleteNode2MirrorPod := func(client clientset.Interface) func() error {
- return func() error {
- zero := int64(0)
- return client.CoreV1().Pods("ns").Delete(context.TODO(), "node2mirrorpod", &metav1.DeleteOptions{GracePeriodSeconds: &zero})
- }
- }
- createNode2 := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().Nodes().Create(context.TODO(), &corev1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node2"}}, metav1.CreateOptions{})
- return err
- }
- }
- setNode2ConfigSource := func(client clientset.Interface) func() error {
- return func() error {
- node2, err := client.CoreV1().Nodes().Get(context.TODO(), "node2", metav1.GetOptions{})
- if err != nil {
- return err
- }
- node2.Spec.ConfigSource = &corev1.NodeConfigSource{
- ConfigMap: &corev1.ConfigMapNodeConfigSource{
- Namespace: "ns",
- Name: "myconfigmapconfigsource",
- KubeletConfigKey: "kubelet",
- },
- }
- _, err = client.CoreV1().Nodes().Update(context.TODO(), node2, metav1.UpdateOptions{})
- return err
- }
- }
- unsetNode2ConfigSource := func(client clientset.Interface) func() error {
- return func() error {
- node2, err := client.CoreV1().Nodes().Get(context.TODO(), "node2", metav1.GetOptions{})
- if err != nil {
- return err
- }
- node2.Spec.ConfigSource = nil
- _, err = client.CoreV1().Nodes().Update(context.TODO(), node2, metav1.UpdateOptions{})
- return err
- }
- }
- updateNode2Status := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoreV1().Nodes().UpdateStatus(context.TODO(), &corev1.Node{
- ObjectMeta: metav1.ObjectMeta{Name: "node2"},
- Status: corev1.NodeStatus{},
- }, metav1.UpdateOptions{})
- return err
- }
- }
- deleteNode2 := func(client clientset.Interface) func() error {
- return func() error {
- return client.CoreV1().Nodes().Delete(context.TODO(), "node2", nil)
- }
- }
- createNode2NormalPodEviction := func(client clientset.Interface) func() error {
- return func() error {
- zero := int64(0)
- return client.PolicyV1beta1().Evictions("ns").Evict(&policy.Eviction{
- TypeMeta: metav1.TypeMeta{
- APIVersion: "policy/v1beta1",
- Kind: "Eviction",
- },
- ObjectMeta: metav1.ObjectMeta{
- Name: "node2normalpod",
- Namespace: "ns",
- },
- DeleteOptions: &metav1.DeleteOptions{GracePeriodSeconds: &zero},
- })
- }
- }
- createNode2MirrorPodEviction := func(client clientset.Interface) func() error {
- return func() error {
- zero := int64(0)
- return client.PolicyV1beta1().Evictions("ns").Evict(&policy.Eviction{
- TypeMeta: metav1.TypeMeta{
- APIVersion: "policy/v1beta1",
- Kind: "Eviction",
- },
- ObjectMeta: metav1.ObjectMeta{
- Name: "node2mirrorpod",
- Namespace: "ns",
- },
- DeleteOptions: &metav1.DeleteOptions{GracePeriodSeconds: &zero},
- })
- }
- }
- capacity := 50
- updatePVCCapacity := func(client clientset.Interface) func() error {
- return func() error {
- capacity++
- statusString := fmt.Sprintf("{\"status\": {\"capacity\": {\"storage\": \"%dG\"}}}", capacity)
- patchBytes := []byte(statusString)
- _, err := client.CoreV1().PersistentVolumeClaims("ns").Patch(context.TODO(), "mypvc", types.StrategicMergePatchType, patchBytes, metav1.PatchOptions{}, "status")
- return err
- }
- }
- updatePVCPhase := func(client clientset.Interface) func() error {
- return func() error {
- patchBytes := []byte(`{"status":{"phase": "Bound"}}`)
- _, err := client.CoreV1().PersistentVolumeClaims("ns").Patch(context.TODO(), "mypvc", types.StrategicMergePatchType, patchBytes, metav1.PatchOptions{}, "status")
- return err
- }
- }
- getNode1Lease := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Get(context.TODO(), "node1", metav1.GetOptions{})
- return err
- }
- }
- node1LeaseDurationSeconds := int32(40)
- createNode1Lease := func(client clientset.Interface) func() error {
- return func() error {
- lease := &coordination.Lease{
- ObjectMeta: metav1.ObjectMeta{
- Name: "node1",
- },
- Spec: coordination.LeaseSpec{
- HolderIdentity: pointer.StringPtr("node1"),
- LeaseDurationSeconds: pointer.Int32Ptr(node1LeaseDurationSeconds),
- RenewTime: &metav1.MicroTime{Time: time.Now()},
- },
- }
- _, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Create(context.TODO(), lease, metav1.CreateOptions{})
- return err
- }
- }
- updateNode1Lease := func(client clientset.Interface) func() error {
- return func() error {
- lease, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Get(context.TODO(), "node1", metav1.GetOptions{})
- if err != nil {
- return err
- }
- lease.Spec.RenewTime = &metav1.MicroTime{Time: time.Now()}
- _, err = client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Update(context.TODO(), lease, metav1.UpdateOptions{})
- return err
- }
- }
- patchNode1Lease := func(client clientset.Interface) func() error {
- return func() error {
- node1LeaseDurationSeconds++
- bs := []byte(fmt.Sprintf(`{"spec": {"leaseDurationSeconds": %d}}`, node1LeaseDurationSeconds))
- _, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Patch(context.TODO(), "node1", types.StrategicMergePatchType, bs, metav1.PatchOptions{})
- return err
- }
- }
- deleteNode1Lease := func(client clientset.Interface) func() error {
- return func() error {
- return client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Delete(context.TODO(), "node1", &metav1.DeleteOptions{})
- }
- }
- getNode1CSINode := func(client clientset.Interface) func() error {
- return func() error {
- _, err := client.StorageV1().CSINodes().Get(context.TODO(), "node1", metav1.GetOptions{})
- return err
- }
- }
- createNode1CSINode := func(client clientset.Interface) func() error {
- return func() error {
- nodeInfo := &storagev1.CSINode{
- ObjectMeta: metav1.ObjectMeta{
- Name: "node1",
- },
- Spec: storagev1.CSINodeSpec{
- Drivers: []storagev1.CSINodeDriver{
- {
- Name: "com.example.csi.driver1",
- NodeID: "com.example.csi/node1",
- TopologyKeys: []string{"com.example.csi/zone"},
- },
- },
- },
- }
- _, err := client.StorageV1().CSINodes().Create(context.TODO(), nodeInfo, metav1.CreateOptions{})
- return err
- }
- }
- updateNode1CSINode := func(client clientset.Interface) func() error {
- return func() error {
- nodeInfo, err := client.StorageV1().CSINodes().Get(context.TODO(), "node1", metav1.GetOptions{})
- if err != nil {
- return err
- }
- nodeInfo.Spec.Drivers = []storagev1.CSINodeDriver{
- {
- Name: "com.example.csi.driver2",
- NodeID: "com.example.csi/node1",
- TopologyKeys: []string{"com.example.csi/rack"},
- },
- }
- _, err = client.StorageV1().CSINodes().Update(context.TODO(), nodeInfo, metav1.UpdateOptions{})
- return err
- }
- }
- patchNode1CSINode := func(client clientset.Interface) func() error {
- return func() error {
- bs := []byte(fmt.Sprintf(`{"csiDrivers": [ { "driver": "net.example.storage.driver2", "nodeID": "net.example.storage/node1", "topologyKeys": [ "net.example.storage/region" ] } ] }`))
- // StrategicMergePatch is unsupported by CRs. Falling back to MergePatch
- _, err := client.StorageV1().CSINodes().Patch(context.TODO(), "node1", types.MergePatchType, bs, metav1.PatchOptions{})
- return err
- }
- }
- deleteNode1CSINode := func(client clientset.Interface) func() error {
- return func() error {
- return client.StorageV1().CSINodes().Delete(context.TODO(), "node1", &metav1.DeleteOptions{})
- }
- }
- nodeanonClient, _ := clientsetForToken(tokenNodeUnknown, clientConfig)
- node1Client, node1ClientExternal := clientsetForToken(tokenNode1, clientConfig)
- node2Client, node2ClientExternal := clientsetForToken(tokenNode2, clientConfig)
- _, csiNode1Client := clientsetForToken(tokenNode1, clientConfig)
- _, csiNode2Client := clientsetForToken(tokenNode2, clientConfig)
- // all node requests from node1 and unknown node fail
- expectForbidden(t, getSecret(nodeanonClient))
- expectForbidden(t, getPVSecret(nodeanonClient))
- expectForbidden(t, getConfigMap(nodeanonClient))
- expectForbidden(t, getPVC(nodeanonClient))
- expectForbidden(t, getPV(nodeanonClient))
- expectForbidden(t, createNode2NormalPod(nodeanonClient))
- expectForbidden(t, createNode2MirrorPod(nodeanonClient))
- expectForbidden(t, deleteNode2NormalPod(nodeanonClient))
- expectForbidden(t, deleteNode2MirrorPod(nodeanonClient))
- expectForbidden(t, createNode2MirrorPodEviction(nodeanonClient))
- expectForbidden(t, createNode2(nodeanonClient))
- expectForbidden(t, updateNode2Status(nodeanonClient))
- expectForbidden(t, deleteNode2(nodeanonClient))
- expectForbidden(t, getSecret(node1Client))
- expectForbidden(t, getPVSecret(node1Client))
- expectForbidden(t, getConfigMap(node1Client))
- expectForbidden(t, getPVC(node1Client))
- expectForbidden(t, getPV(node1Client))
- expectForbidden(t, createNode2NormalPod(nodeanonClient))
- expectForbidden(t, createNode2MirrorPod(node1Client))
- expectNotFound(t, deleteNode2MirrorPod(node1Client))
- expectNotFound(t, createNode2MirrorPodEviction(node1Client))
- expectForbidden(t, createNode2(node1Client))
- expectForbidden(t, updateNode2Status(node1Client))
- expectForbidden(t, deleteNode2(node1Client))
- // related object requests from node2 fail
- expectForbidden(t, getSecret(node2Client))
- expectForbidden(t, getPVSecret(node2Client))
- expectForbidden(t, getConfigMap(node2Client))
- expectForbidden(t, getPVC(node2Client))
- expectForbidden(t, getPV(node2Client))
- expectForbidden(t, createNode2NormalPod(nodeanonClient))
- // mirror pod and self node lifecycle is allowed
- expectAllowed(t, createNode2MirrorPod(node2Client))
- expectAllowed(t, deleteNode2MirrorPod(node2Client))
- expectAllowed(t, createNode2MirrorPod(node2Client))
- expectAllowed(t, createNode2MirrorPodEviction(node2Client))
- expectAllowed(t, createNode2(node2Client))
- expectAllowed(t, updateNode2Status(node2Client))
- // self deletion is not allowed
- expectForbidden(t, deleteNode2(node2Client))
- // clean up node2
- expectAllowed(t, deleteNode2(superuserClient))
- // create a pod as an admin to add object references
- expectAllowed(t, createNode2NormalPod(superuserClient))
- // unidentifiable node and node1 are still forbidden
- expectForbidden(t, getSecret(nodeanonClient))
- expectForbidden(t, getPVSecret(nodeanonClient))
- expectForbidden(t, getConfigMap(nodeanonClient))
- expectForbidden(t, getPVC(nodeanonClient))
- expectForbidden(t, getPV(nodeanonClient))
- expectForbidden(t, createNode2NormalPod(nodeanonClient))
- expectForbidden(t, updateNode2NormalPodStatus(nodeanonClient))
- expectForbidden(t, deleteNode2NormalPod(nodeanonClient))
- expectForbidden(t, createNode2NormalPodEviction(nodeanonClient))
- expectForbidden(t, createNode2MirrorPod(nodeanonClient))
- expectForbidden(t, deleteNode2MirrorPod(nodeanonClient))
- expectForbidden(t, createNode2MirrorPodEviction(nodeanonClient))
- expectForbidden(t, getSecret(node1Client))
- expectForbidden(t, getPVSecret(node1Client))
- expectForbidden(t, getConfigMap(node1Client))
- expectForbidden(t, getPVC(node1Client))
- expectForbidden(t, getPV(node1Client))
- expectForbidden(t, createNode2NormalPod(node1Client))
- expectForbidden(t, updateNode2NormalPodStatus(node1Client))
- expectForbidden(t, deleteNode2NormalPod(node1Client))
- expectForbidden(t, createNode2NormalPodEviction(node1Client))
- expectForbidden(t, createNode2MirrorPod(node1Client))
- expectNotFound(t, deleteNode2MirrorPod(node1Client))
- expectNotFound(t, createNode2MirrorPodEviction(node1Client))
- // node2 can get referenced objects now
- expectAllowed(t, getSecret(node2Client))
- expectAllowed(t, getPVSecret(node2Client))
- expectAllowed(t, getConfigMap(node2Client))
- expectAllowed(t, getPVC(node2Client))
- expectAllowed(t, getPV(node2Client))
- expectForbidden(t, createNode2NormalPod(node2Client))
- expectAllowed(t, updateNode2NormalPodStatus(node2Client))
- expectAllowed(t, deleteNode2NormalPod(node2Client))
- expectAllowed(t, createNode2MirrorPod(node2Client))
- expectAllowed(t, deleteNode2MirrorPod(node2Client))
- // recreate as an admin to test eviction
- expectAllowed(t, createNode2NormalPod(superuserClient))
- expectAllowed(t, createNode2MirrorPod(superuserClient))
- expectAllowed(t, createNode2NormalPodEviction(node2Client))
- expectAllowed(t, createNode2MirrorPodEviction(node2Client))
- // re-create a pod as an admin to add object references
- expectAllowed(t, createNode2NormalPod(superuserClient))
- // ExpandPersistentVolumes feature disabled
- defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ExpandPersistentVolumes, false)()
- expectForbidden(t, updatePVCCapacity(node1Client))
- expectForbidden(t, updatePVCCapacity(node2Client))
- // ExpandPersistentVolumes feature enabled
- defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ExpandPersistentVolumes, true)()
- expectForbidden(t, updatePVCCapacity(node1Client))
- expectAllowed(t, updatePVCCapacity(node2Client))
- expectForbidden(t, updatePVCPhase(node2Client))
- // Enabled CSIPersistentVolume feature
- expectForbidden(t, getVolumeAttachment(node1ClientExternal))
- expectAllowed(t, getVolumeAttachment(node2ClientExternal))
- // create node2 again
- expectAllowed(t, createNode2(node2Client))
- // node2 can not set its own config source
- expectForbidden(t, setNode2ConfigSource(node2Client))
- // node2 can not access the configmap config source yet
- expectForbidden(t, getConfigMapConfigSource(node2Client))
- // superuser can access the configmap config source
- expectAllowed(t, getConfigMapConfigSource(superuserClient))
- // superuser can set node2's config source
- expectAllowed(t, setNode2ConfigSource(superuserClient))
- // node2 can now get the configmap assigned as its config source
- expectAllowed(t, getConfigMapConfigSource(node2Client))
- // superuser can unset node2's config source
- expectAllowed(t, unsetNode2ConfigSource(superuserClient))
- // node2 can no longer get the configmap after it is unassigned as its config source
- expectForbidden(t, getConfigMapConfigSource(node2Client))
- // clean up node2
- expectAllowed(t, deleteNode2(superuserClient))
- //TODO(mikedanese): integration test node restriction of TokenRequest
- // node1 allowed to operate on its own lease
- expectAllowed(t, createNode1Lease(node1Client))
- expectAllowed(t, getNode1Lease(node1Client))
- expectAllowed(t, updateNode1Lease(node1Client))
- expectAllowed(t, patchNode1Lease(node1Client))
- expectAllowed(t, deleteNode1Lease(node1Client))
- // node2 not allowed to operate on another node's lease
- expectForbidden(t, createNode1Lease(node2Client))
- expectForbidden(t, getNode1Lease(node2Client))
- expectForbidden(t, updateNode1Lease(node2Client))
- expectForbidden(t, patchNode1Lease(node2Client))
- expectForbidden(t, deleteNode1Lease(node2Client))
- // node1 allowed to operate on its own CSINode
- expectAllowed(t, createNode1CSINode(csiNode1Client))
- expectAllowed(t, getNode1CSINode(csiNode1Client))
- expectAllowed(t, updateNode1CSINode(csiNode1Client))
- expectAllowed(t, patchNode1CSINode(csiNode1Client))
- expectAllowed(t, deleteNode1CSINode(csiNode1Client))
- // node2 not allowed to operate on another node's CSINode
- expectForbidden(t, createNode1CSINode(csiNode2Client))
- expectForbidden(t, getNode1CSINode(csiNode2Client))
- expectForbidden(t, updateNode1CSINode(csiNode2Client))
- expectForbidden(t, patchNode1CSINode(csiNode2Client))
- expectForbidden(t, deleteNode1CSINode(csiNode2Client))
- }
- // expect executes a function a set number of times until it either returns the
- // expected error or executes too many times. It returns if the retries timed
- // out and the last error returned by the method.
- func expect(t *testing.T, f func() error, wantErr func(error) bool) (timeout bool, lastErr error) {
- t.Helper()
- err := wait.PollImmediate(time.Second, 30*time.Second, func() (bool, error) {
- t.Helper()
- lastErr = f()
- if wantErr(lastErr) {
- return true, nil
- }
- t.Logf("unexpected response, will retry: %v", lastErr)
- return false, nil
- })
- return err == nil, lastErr
- }
- func expectForbidden(t *testing.T, f func() error) {
- t.Helper()
- if ok, err := expect(t, f, apierrors.IsForbidden); !ok {
- t.Errorf("Expected forbidden error, got %v", err)
- }
- }
- func expectNotFound(t *testing.T, f func() error) {
- t.Helper()
- if ok, err := expect(t, f, apierrors.IsNotFound); !ok {
- t.Errorf("Expected notfound error, got %v", err)
- }
- }
- func expectAllowed(t *testing.T, f func() error) {
- t.Helper()
- if ok, err := expect(t, f, func(e error) bool { return e == nil }); !ok {
- t.Errorf("Expected no error, got %v", err)
- }
- }
|