123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package common
- import (
- "fmt"
- "github.com/onsi/ginkgo"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/kubernetes/test/e2e/framework"
- imageutils "k8s.io/kubernetes/test/utils/image"
- )
- // PrivilegedPodTestConfig is configuration struct for privileged pod test
- // TODO: Merge with tests in security_context.go
- type PrivilegedPodTestConfig struct {
- f *framework.Framework
- privilegedPod string
- privilegedContainer string
- notPrivilegedContainer string
- pod *v1.Pod
- }
- var _ = framework.KubeDescribe("PrivilegedPod [NodeConformance]", func() {
- config := &PrivilegedPodTestConfig{
- f: framework.NewDefaultFramework("e2e-privileged-pod"),
- privilegedPod: "privileged-pod",
- privilegedContainer: "privileged-container",
- notPrivilegedContainer: "not-privileged-container",
- }
- ginkgo.It("should enable privileged commands [LinuxOnly]", func() {
- // Windows does not support privileged containers.
- ginkgo.By("Creating a pod with a privileged container")
- config.createPods()
- ginkgo.By("Executing in the privileged container")
- config.run(config.privilegedContainer, true)
- ginkgo.By("Executing in the non-privileged container")
- config.run(config.notPrivilegedContainer, false)
- })
- })
- func (c *PrivilegedPodTestConfig) run(containerName string, expectSuccess bool) {
- cmd := []string{"ip", "link", "add", "dummy1", "type", "dummy"}
- reverseCmd := []string{"ip", "link", "del", "dummy1"}
- stdout, stderr, err := c.f.ExecCommandInContainerWithFullOutput(
- c.privilegedPod, containerName, cmd...)
- msg := fmt.Sprintf("cmd %v, stdout %q, stderr %q", cmd, stdout, stderr)
- if expectSuccess {
- framework.ExpectNoError(err, msg)
- // We need to clean up the dummy link that was created, as it
- // leaks out into the node level -- yuck.
- _, _, err := c.f.ExecCommandInContainerWithFullOutput(
- c.privilegedPod, containerName, reverseCmd...)
- framework.ExpectNoError(err,
- fmt.Sprintf("could not remove dummy1 link: %v", err))
- } else {
- framework.ExpectError(err, msg)
- }
- }
- func (c *PrivilegedPodTestConfig) createPodsSpec() *v1.Pod {
- isPrivileged := true
- notPrivileged := false
- return &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: c.privilegedPod,
- Namespace: c.f.Namespace.Name,
- },
- Spec: v1.PodSpec{
- Containers: []v1.Container{
- {
- Name: c.privilegedContainer,
- Image: imageutils.GetE2EImage(imageutils.BusyBox),
- ImagePullPolicy: v1.PullIfNotPresent,
- SecurityContext: &v1.SecurityContext{Privileged: &isPrivileged},
- Command: []string{"/bin/sleep", "10000"},
- },
- {
- Name: c.notPrivilegedContainer,
- Image: imageutils.GetE2EImage(imageutils.BusyBox),
- ImagePullPolicy: v1.PullIfNotPresent,
- SecurityContext: &v1.SecurityContext{Privileged: ¬Privileged},
- Command: []string{"/bin/sleep", "10000"},
- },
- },
- },
- }
- }
- func (c *PrivilegedPodTestConfig) createPods() {
- podSpec := c.createPodsSpec()
- c.pod = c.f.PodClient().CreateSync(podSpec)
- }
|