123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package projected
- import (
- "fmt"
- "io/ioutil"
- "os"
- "path/filepath"
- "reflect"
- "strings"
- "testing"
- authenticationv1 "k8s.io/api/authentication/v1"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/runtime"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/apimachinery/pkg/util/diff"
- utilruntime "k8s.io/apimachinery/pkg/util/runtime"
- clientset "k8s.io/client-go/kubernetes"
- "k8s.io/client-go/kubernetes/fake"
- clitesting "k8s.io/client-go/testing"
- pkgauthenticationv1 "k8s.io/kubernetes/pkg/apis/authentication/v1"
- pkgcorev1 "k8s.io/kubernetes/pkg/apis/core/v1"
- "k8s.io/kubernetes/pkg/volume"
- "k8s.io/kubernetes/pkg/volume/emptydir"
- volumetest "k8s.io/kubernetes/pkg/volume/testing"
- "k8s.io/kubernetes/pkg/volume/util"
- )
- func TestCollectDataWithSecret(t *testing.T) {
- caseMappingMode := int32(0400)
- cases := []struct {
- name string
- mappings []v1.KeyToPath
- secret *v1.Secret
- mode int32
- optional bool
- payload map[string]util.FileProjection
- success bool
- }{
- {
- name: "no overrides",
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "foo": {Data: []byte("foo"), Mode: 0644},
- "bar": {Data: []byte("bar"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "basic 1",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/foo.txt",
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/foo.txt": {Data: []byte("foo"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "subdirs",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/1/2/3/foo.txt",
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/1/2/3/foo.txt": {Data: []byte("foo"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "subdirs 2",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/1/2/3/foo.txt",
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/1/2/3/foo.txt": {Data: []byte("foo"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "subdirs 3",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/1/2/3/foo.txt",
- },
- {
- Key: "bar",
- Path: "another/path/to/the/esteemed/bar.bin",
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/1/2/3/foo.txt": {Data: []byte("foo"), Mode: 0644},
- "another/path/to/the/esteemed/bar.bin": {Data: []byte("bar"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "non existent key",
- mappings: []v1.KeyToPath{
- {
- Key: "zab",
- Path: "path/to/foo.txt",
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- success: false,
- },
- {
- name: "mapping with Mode",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "foo.txt",
- Mode: &caseMappingMode,
- },
- {
- Key: "bar",
- Path: "bar.bin",
- Mode: &caseMappingMode,
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "foo.txt": {Data: []byte("foo"), Mode: caseMappingMode},
- "bar.bin": {Data: []byte("bar"), Mode: caseMappingMode},
- },
- success: true,
- },
- {
- name: "mapping with defaultMode",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "foo.txt",
- },
- {
- Key: "bar",
- Path: "bar.bin",
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "foo.txt": {Data: []byte("foo"), Mode: 0644},
- "bar.bin": {Data: []byte("bar"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "optional non existent key",
- mappings: []v1.KeyToPath{
- {
- Key: "zab",
- Path: "path/to/foo.txt",
- },
- },
- secret: &v1.Secret{
- Data: map[string][]byte{
- "foo": []byte("foo"),
- "bar": []byte("bar"),
- },
- },
- mode: 0644,
- optional: true,
- payload: map[string]util.FileProjection{},
- success: true,
- },
- }
- for _, tc := range cases {
- testNamespace := "test_projected_namespace"
- tc.secret.ObjectMeta = metav1.ObjectMeta{
- Namespace: testNamespace,
- Name: tc.name,
- }
- source := makeProjection(tc.name, tc.mode, "secret")
- source.Sources[0].Secret.Items = tc.mappings
- source.Sources[0].Secret.Optional = &tc.optional
- testPodUID := types.UID("test_pod_uid")
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID}}
- client := fake.NewSimpleClientset(tc.secret)
- _, host := newTestHost(t, client)
- var myVolumeMounter = projectedVolumeMounter{
- projectedVolume: &projectedVolume{
- sources: source.Sources,
- podUID: pod.UID,
- plugin: &projectedPlugin{
- host: host,
- getSecret: host.GetSecretFunc(),
- },
- },
- source: *source,
- pod: pod,
- }
- actualPayload, err := myVolumeMounter.collectData()
- if err != nil && tc.success {
- t.Errorf("%v: unexpected failure making payload: %v", tc.name, err)
- continue
- }
- if err == nil && !tc.success {
- t.Errorf("%v: unexpected success making payload", tc.name)
- continue
- }
- if !tc.success {
- continue
- }
- if e, a := tc.payload, actualPayload; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: expected and actual payload do not match", tc.name)
- }
- }
- }
- func TestCollectDataWithConfigMap(t *testing.T) {
- caseMappingMode := int32(0400)
- cases := []struct {
- name string
- mappings []v1.KeyToPath
- configMap *v1.ConfigMap
- mode int32
- optional bool
- payload map[string]util.FileProjection
- success bool
- }{
- {
- name: "no overrides",
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "foo": {Data: []byte("foo"), Mode: 0644},
- "bar": {Data: []byte("bar"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "basic 1",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/foo.txt",
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/foo.txt": {Data: []byte("foo"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "subdirs",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/1/2/3/foo.txt",
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/1/2/3/foo.txt": {Data: []byte("foo"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "subdirs 2",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/1/2/3/foo.txt",
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/1/2/3/foo.txt": {Data: []byte("foo"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "subdirs 3",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "path/to/1/2/3/foo.txt",
- },
- {
- Key: "bar",
- Path: "another/path/to/the/esteemed/bar.bin",
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "path/to/1/2/3/foo.txt": {Data: []byte("foo"), Mode: 0644},
- "another/path/to/the/esteemed/bar.bin": {Data: []byte("bar"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "non existent key",
- mappings: []v1.KeyToPath{
- {
- Key: "zab",
- Path: "path/to/foo.txt",
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- success: false,
- },
- {
- name: "mapping with Mode",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "foo.txt",
- Mode: &caseMappingMode,
- },
- {
- Key: "bar",
- Path: "bar.bin",
- Mode: &caseMappingMode,
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "foo.txt": {Data: []byte("foo"), Mode: caseMappingMode},
- "bar.bin": {Data: []byte("bar"), Mode: caseMappingMode},
- },
- success: true,
- },
- {
- name: "mapping with defaultMode",
- mappings: []v1.KeyToPath{
- {
- Key: "foo",
- Path: "foo.txt",
- },
- {
- Key: "bar",
- Path: "bar.bin",
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "foo.txt": {Data: []byte("foo"), Mode: 0644},
- "bar.bin": {Data: []byte("bar"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "optional non existent key",
- mappings: []v1.KeyToPath{
- {
- Key: "zab",
- Path: "path/to/foo.txt",
- },
- },
- configMap: &v1.ConfigMap{
- Data: map[string]string{
- "foo": "foo",
- "bar": "bar",
- },
- },
- mode: 0644,
- optional: true,
- payload: map[string]util.FileProjection{},
- success: true,
- },
- }
- for _, tc := range cases {
- testNamespace := "test_projected_namespace"
- tc.configMap.ObjectMeta = metav1.ObjectMeta{
- Namespace: testNamespace,
- Name: tc.name,
- }
- source := makeProjection(tc.name, tc.mode, "configMap")
- source.Sources[0].ConfigMap.Items = tc.mappings
- source.Sources[0].ConfigMap.Optional = &tc.optional
- testPodUID := types.UID("test_pod_uid")
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID}}
- client := fake.NewSimpleClientset(tc.configMap)
- _, host := newTestHost(t, client)
- var myVolumeMounter = projectedVolumeMounter{
- projectedVolume: &projectedVolume{
- sources: source.Sources,
- podUID: pod.UID,
- plugin: &projectedPlugin{
- host: host,
- getConfigMap: host.GetConfigMapFunc(),
- },
- },
- source: *source,
- pod: pod,
- }
- actualPayload, err := myVolumeMounter.collectData()
- if err != nil && tc.success {
- t.Errorf("%v: unexpected failure making payload: %v", tc.name, err)
- continue
- }
- if err == nil && !tc.success {
- t.Errorf("%v: unexpected success making payload", tc.name)
- continue
- }
- if !tc.success {
- continue
- }
- if e, a := tc.payload, actualPayload; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: expected and actual payload do not match", tc.name)
- }
- }
- }
- func TestCollectDataWithDownwardAPI(t *testing.T) {
- testNamespace := "test_projected_namespace"
- testPodUID := types.UID("test_pod_uid")
- testPodName := "podName"
- cases := []struct {
- name string
- volumeFile []v1.DownwardAPIVolumeFile
- pod *v1.Pod
- mode int32
- payload map[string]util.FileProjection
- success bool
- }{
- {
- name: "annotation",
- volumeFile: []v1.DownwardAPIVolumeFile{
- {Path: "annotation", FieldRef: &v1.ObjectFieldSelector{
- FieldPath: "metadata.annotations['a1']"}}},
- pod: &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: testPodName,
- Namespace: testNamespace,
- Annotations: map[string]string{
- "a1": "value1",
- "a2": "value2",
- },
- UID: testPodUID},
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "annotation": {Data: []byte("value1"), Mode: 0644},
- },
- success: true,
- },
- {
- name: "annotation-error",
- volumeFile: []v1.DownwardAPIVolumeFile{
- {Path: "annotation", FieldRef: &v1.ObjectFieldSelector{
- FieldPath: "metadata.annotations['']"}}},
- pod: &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: testPodName,
- Namespace: testNamespace,
- Annotations: map[string]string{
- "a1": "value1",
- "a2": "value2",
- },
- UID: testPodUID},
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "annotation": {Data: []byte("does-not-matter-because-this-test-case-will-fail-anyway"), Mode: 0644},
- },
- success: false,
- },
- {
- name: "labels",
- volumeFile: []v1.DownwardAPIVolumeFile{
- {Path: "labels", FieldRef: &v1.ObjectFieldSelector{
- FieldPath: "metadata.labels"}}},
- pod: &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: testPodName,
- Namespace: testNamespace,
- Labels: map[string]string{
- "key1": "value1",
- "key2": "value2"},
- UID: testPodUID},
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "labels": {Data: []byte("key1=\"value1\"\nkey2=\"value2\""), Mode: 0644},
- },
- success: true,
- },
- {
- name: "annotations",
- volumeFile: []v1.DownwardAPIVolumeFile{
- {Path: "annotations", FieldRef: &v1.ObjectFieldSelector{
- FieldPath: "metadata.annotations"}}},
- pod: &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: testPodName,
- Namespace: testNamespace,
- Annotations: map[string]string{
- "a1": "value1",
- "a2": "value2"},
- UID: testPodUID},
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "annotations": {Data: []byte("a1=\"value1\"\na2=\"value2\""), Mode: 0644},
- },
- success: true,
- },
- {
- name: "name",
- volumeFile: []v1.DownwardAPIVolumeFile{
- {Path: "name_file_name", FieldRef: &v1.ObjectFieldSelector{
- FieldPath: "metadata.name"}}},
- pod: &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: testPodName,
- Namespace: testNamespace,
- UID: testPodUID},
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "name_file_name": {Data: []byte(testPodName), Mode: 0644},
- },
- success: true,
- },
- {
- name: "namespace",
- volumeFile: []v1.DownwardAPIVolumeFile{
- {Path: "namespace_file_name", FieldRef: &v1.ObjectFieldSelector{
- FieldPath: "metadata.namespace"}}},
- pod: &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: testPodName,
- Namespace: testNamespace,
- UID: testPodUID},
- },
- mode: 0644,
- payload: map[string]util.FileProjection{
- "namespace_file_name": {Data: []byte(testNamespace), Mode: 0644},
- },
- success: true,
- },
- }
- for _, tc := range cases {
- source := makeProjection("", tc.mode, "downwardAPI")
- source.Sources[0].DownwardAPI.Items = tc.volumeFile
- client := fake.NewSimpleClientset(tc.pod)
- _, host := newTestHost(t, client)
- var myVolumeMounter = projectedVolumeMounter{
- projectedVolume: &projectedVolume{
- sources: source.Sources,
- podUID: tc.pod.UID,
- plugin: &projectedPlugin{
- host: host,
- },
- },
- source: *source,
- pod: tc.pod,
- }
- actualPayload, err := myVolumeMounter.collectData()
- if err != nil && tc.success {
- t.Errorf("%v: unexpected failure making payload: %v", tc.name, err)
- continue
- }
- if err == nil && !tc.success {
- t.Errorf("%v: unexpected success making payload", tc.name)
- continue
- }
- if !tc.success {
- continue
- }
- if e, a := tc.payload, actualPayload; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: expected and actual payload do not match", tc.name)
- }
- }
- }
- func TestCollectDataWithServiceAccountToken(t *testing.T) {
- scheme := runtime.NewScheme()
- utilruntime.Must(pkgauthenticationv1.RegisterDefaults(scheme))
- utilruntime.Must(pkgcorev1.RegisterDefaults(scheme))
- minute := int64(60)
- cases := []struct {
- name string
- svcacct string
- audience string
- expiration *int64
- path string
- payload map[string]util.FileProjection
- }{
- {
- name: "test good service account",
- audience: "https://example.com",
- path: "token",
- expiration: &minute,
- payload: map[string]util.FileProjection{
- "token": {Data: []byte("test_projected_namespace:foo:60:[https://example.com]"), Mode: 0600},
- },
- },
- {
- name: "test good service account other path",
- audience: "https://example.com",
- path: "other-token",
- expiration: &minute,
- payload: map[string]util.FileProjection{
- "other-token": {Data: []byte("test_projected_namespace:foo:60:[https://example.com]"), Mode: 0600},
- },
- },
- {
- name: "test good service account defaults audience",
- path: "token",
- expiration: &minute,
- payload: map[string]util.FileProjection{
- "token": {Data: []byte("test_projected_namespace:foo:60:[https://api]"), Mode: 0600},
- },
- },
- {
- name: "test good service account defaults expiration",
- audience: "https://example.com",
- path: "token",
- payload: map[string]util.FileProjection{
- "token": {Data: []byte("test_projected_namespace:foo:3600:[https://example.com]"), Mode: 0600},
- },
- },
- }
- for _, tc := range cases {
- t.Run(tc.name, func(t *testing.T) {
- testNamespace := "test_projected_namespace"
- source := makeProjection(tc.name, 0600, "serviceAccountToken")
- source.Sources[0].ServiceAccountToken.Audience = tc.audience
- source.Sources[0].ServiceAccountToken.ExpirationSeconds = tc.expiration
- source.Sources[0].ServiceAccountToken.Path = tc.path
- testPodUID := types.UID("test_pod_uid")
- pod := &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID},
- Spec: v1.PodSpec{ServiceAccountName: "foo"},
- }
- scheme.Default(pod)
- client := &fake.Clientset{}
- client.AddReactor("create", "serviceaccounts", clitesting.ReactionFunc(func(action clitesting.Action) (bool, runtime.Object, error) {
- tr := action.(clitesting.CreateAction).GetObject().(*authenticationv1.TokenRequest)
- scheme.Default(tr)
- if len(tr.Spec.Audiences) == 0 {
- tr.Spec.Audiences = []string{"https://api"}
- }
- tr.Status.Token = fmt.Sprintf("%v:%v:%d:%v", action.GetNamespace(), "foo", *tr.Spec.ExpirationSeconds, tr.Spec.Audiences)
- return true, tr, nil
- }))
- _, host := newTestHost(t, client)
- var myVolumeMounter = projectedVolumeMounter{
- projectedVolume: &projectedVolume{
- sources: source.Sources,
- podUID: pod.UID,
- plugin: &projectedPlugin{
- host: host,
- getServiceAccountToken: host.GetServiceAccountTokenFunc(),
- },
- },
- source: *source,
- pod: pod,
- }
- actualPayload, err := myVolumeMounter.collectData()
- if err != nil {
- t.Fatalf("unexpected failure making payload: %v", err)
- }
- if e, a := tc.payload, actualPayload; !reflect.DeepEqual(e, a) {
- t.Errorf("expected and actual payload do not match:\n%s", diff.ObjectReflectDiff(e, a))
- }
- })
- }
- }
- func newTestHost(t *testing.T, clientset clientset.Interface) (string, volume.VolumeHost) {
- tempDir, err := ioutil.TempDir("/tmp", "projected_volume_test.")
- if err != nil {
- t.Fatalf("can't make a temp rootdir: %v", err)
- }
- return tempDir, volumetest.NewFakeVolumeHost(tempDir, clientset, emptydir.ProbeVolumePlugins())
- }
- func TestCanSupport(t *testing.T) {
- pluginMgr := volume.VolumePluginMgr{}
- tempDir, host := newTestHost(t, nil)
- defer os.RemoveAll(tempDir)
- pluginMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, host)
- plugin, err := pluginMgr.FindPluginByName(projectedPluginName)
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- if plugin.GetPluginName() != projectedPluginName {
- t.Errorf("Wrong name: %s", plugin.GetPluginName())
- }
- if !plugin.CanSupport(&volume.Spec{Volume: &v1.Volume{VolumeSource: v1.VolumeSource{Projected: &v1.ProjectedVolumeSource{}}}}) {
- t.Errorf("Expected true")
- }
- if plugin.CanSupport(&volume.Spec{}) {
- t.Errorf("Expected false")
- }
- }
- func TestPlugin(t *testing.T) {
- var (
- testPodUID = types.UID("test_pod_uid")
- testVolumeName = "test_volume_name"
- testNamespace = "test_projected_namespace"
- testName = "test_projected_name"
- volumeSpec = makeVolumeSpec(testVolumeName, testName, 0644)
- secret = makeSecret(testNamespace, testName)
- client = fake.NewSimpleClientset(&secret)
- pluginMgr = volume.VolumePluginMgr{}
- rootDir, host = newTestHost(t, client)
- )
- defer os.RemoveAll(rootDir)
- pluginMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, host)
- plugin, err := pluginMgr.FindPluginByName(projectedPluginName)
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID}}
- mounter, err := plugin.NewMounter(volume.NewSpecFromVolume(volumeSpec), pod, volume.VolumeOptions{})
- if err != nil {
- t.Errorf("Failed to make a new Mounter: %v", err)
- }
- if mounter == nil {
- t.Errorf("Got a nil Mounter")
- }
- volumePath := mounter.GetPath()
- if !strings.HasSuffix(volumePath, fmt.Sprintf("pods/test_pod_uid/volumes/kubernetes.io~projected/%s", testVolumeName)) {
- t.Errorf("Got unexpected path: %s", volumePath)
- }
- err = mounter.SetUp(volume.MounterArgs{})
- if err != nil {
- t.Errorf("Failed to setup volume: %v", err)
- }
- if _, err := os.Stat(volumePath); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, volume path not created: %s", volumePath)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- // secret volume should create its own empty wrapper path
- podWrapperMetadataDir := fmt.Sprintf("%v/pods/test_pod_uid/plugins/kubernetes.io~empty-dir/wrapped_test_volume_name", rootDir)
- if _, err := os.Stat(podWrapperMetadataDir); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, empty-dir wrapper path is not created: %s", podWrapperMetadataDir)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- doTestSecretDataInVolume(volumePath, secret, t)
- defer doTestCleanAndTeardown(plugin, testPodUID, testVolumeName, volumePath, t)
- }
- func TestInvalidPathProjected(t *testing.T) {
- var (
- testPodUID = types.UID("test_pod_uid")
- testVolumeName = "test_volume_name"
- testNamespace = "test_projected_namespace"
- testName = "test_projected_name"
- volumeSpec = makeVolumeSpec(testVolumeName, testName, 0644)
- secret = makeSecret(testNamespace, testName)
- client = fake.NewSimpleClientset(&secret)
- pluginMgr = volume.VolumePluginMgr{}
- rootDir, host = newTestHost(t, client)
- )
- volumeSpec.Projected.Sources[0].Secret.Items = []v1.KeyToPath{
- {Key: "missing", Path: "missing"},
- }
- defer os.RemoveAll(rootDir)
- pluginMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, host)
- plugin, err := pluginMgr.FindPluginByName(projectedPluginName)
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID}}
- mounter, err := plugin.NewMounter(volume.NewSpecFromVolume(volumeSpec), pod, volume.VolumeOptions{})
- if err != nil {
- t.Errorf("Failed to make a new Mounter: %v", err)
- }
- if mounter == nil {
- t.Errorf("Got a nil Mounter")
- }
- volumePath := mounter.GetPath()
- if !strings.HasSuffix(volumePath, fmt.Sprintf("pods/test_pod_uid/volumes/kubernetes.io~projected/%s", testVolumeName)) {
- t.Errorf("Got unexpected path: %s", volumePath)
- }
- var mounterArgs volume.MounterArgs
- err = mounter.SetUp(mounterArgs)
- if err == nil {
- t.Errorf("Expected error while setting up secret")
- }
- _, err = os.Stat(volumePath)
- if err == nil {
- t.Errorf("Expected path %s to not exist", volumePath)
- }
- }
- // Test the case where the plugin's ready file exists, but the volume dir is not a
- // mountpoint, which is the state the system will be in after reboot. The dir
- // should be mounter and the secret data written to it.
- func TestPluginReboot(t *testing.T) {
- var (
- testPodUID = types.UID("test_pod_uid3")
- testVolumeName = "test_volume_name"
- testNamespace = "test_secret_namespace"
- testName = "test_secret_name"
- volumeSpec = makeVolumeSpec(testVolumeName, testName, 0644)
- secret = makeSecret(testNamespace, testName)
- client = fake.NewSimpleClientset(&secret)
- pluginMgr = volume.VolumePluginMgr{}
- rootDir, host = newTestHost(t, client)
- )
- defer os.RemoveAll(rootDir)
- pluginMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, host)
- plugin, err := pluginMgr.FindPluginByName(projectedPluginName)
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID}}
- mounter, err := plugin.NewMounter(volume.NewSpecFromVolume(volumeSpec), pod, volume.VolumeOptions{})
- if err != nil {
- t.Errorf("Failed to make a new Mounter: %v", err)
- }
- if mounter == nil {
- t.Errorf("Got a nil Mounter")
- }
- podMetadataDir := fmt.Sprintf("%v/pods/test_pod_uid3/plugins/kubernetes.io~projected/test_volume_name", rootDir)
- util.SetReady(podMetadataDir)
- volumePath := mounter.GetPath()
- if !strings.HasSuffix(volumePath, fmt.Sprintf("pods/test_pod_uid3/volumes/kubernetes.io~projected/test_volume_name")) {
- t.Errorf("Got unexpected path: %s", volumePath)
- }
- err = mounter.SetUp(volume.MounterArgs{})
- if err != nil {
- t.Errorf("Failed to setup volume: %v", err)
- }
- if _, err := os.Stat(volumePath); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, volume path not created: %s", volumePath)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- doTestSecretDataInVolume(volumePath, secret, t)
- doTestCleanAndTeardown(plugin, testPodUID, testVolumeName, volumePath, t)
- }
- func TestPluginOptional(t *testing.T) {
- var (
- testPodUID = types.UID("test_pod_uid")
- testVolumeName = "test_volume_name"
- testNamespace = "test_secret_namespace"
- testName = "test_secret_name"
- trueVal = true
- volumeSpec = makeVolumeSpec(testVolumeName, testName, 0644)
- client = fake.NewSimpleClientset()
- pluginMgr = volume.VolumePluginMgr{}
- rootDir, host = newTestHost(t, client)
- )
- volumeSpec.VolumeSource.Projected.Sources[0].Secret.Optional = &trueVal
- defer os.RemoveAll(rootDir)
- pluginMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, host)
- plugin, err := pluginMgr.FindPluginByName(projectedPluginName)
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID}}
- mounter, err := plugin.NewMounter(volume.NewSpecFromVolume(volumeSpec), pod, volume.VolumeOptions{})
- if err != nil {
- t.Errorf("Failed to make a new Mounter: %v", err)
- }
- if mounter == nil {
- t.Errorf("Got a nil Mounter")
- }
- volumePath := mounter.GetPath()
- if !strings.HasSuffix(volumePath, fmt.Sprintf("pods/test_pod_uid/volumes/kubernetes.io~projected/test_volume_name")) {
- t.Errorf("Got unexpected path: %s", volumePath)
- }
- err = mounter.SetUp(volume.MounterArgs{})
- if err != nil {
- t.Errorf("Failed to setup volume: %v", err)
- }
- if _, err := os.Stat(volumePath); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, volume path not created: %s", volumePath)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- // secret volume should create its own empty wrapper path
- podWrapperMetadataDir := fmt.Sprintf("%v/pods/test_pod_uid/plugins/kubernetes.io~empty-dir/wrapped_test_volume_name", rootDir)
- if _, err := os.Stat(podWrapperMetadataDir); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, empty-dir wrapper path is not created: %s", podWrapperMetadataDir)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- datadirSymlink := filepath.Join(volumePath, "..data")
- datadir, err := os.Readlink(datadirSymlink)
- if err != nil && os.IsNotExist(err) {
- t.Fatalf("couldn't find volume path's data dir, %s", datadirSymlink)
- } else if err != nil {
- t.Fatalf("couldn't read symlink, %s", datadirSymlink)
- }
- datadirPath := filepath.Join(volumePath, datadir)
- infos, err := ioutil.ReadDir(volumePath)
- if err != nil {
- t.Fatalf("couldn't find volume path, %s", volumePath)
- }
- if len(infos) != 0 {
- for _, fi := range infos {
- if fi.Name() != "..data" && fi.Name() != datadir {
- t.Errorf("empty data volume directory, %s, is not empty. Contains: %s", datadirSymlink, fi.Name())
- }
- }
- }
- infos, err = ioutil.ReadDir(datadirPath)
- if err != nil {
- t.Fatalf("couldn't find volume data path, %s", datadirPath)
- }
- if len(infos) != 0 {
- t.Errorf("empty data directory, %s, is not empty. Contains: %s", datadirSymlink, infos[0].Name())
- }
- defer doTestCleanAndTeardown(plugin, testPodUID, testVolumeName, volumePath, t)
- }
- func TestPluginOptionalKeys(t *testing.T) {
- var (
- testPodUID = types.UID("test_pod_uid")
- testVolumeName = "test_volume_name"
- testNamespace = "test_secret_namespace"
- testName = "test_secret_name"
- trueVal = true
- volumeSpec = makeVolumeSpec(testVolumeName, testName, 0644)
- secret = makeSecret(testNamespace, testName)
- client = fake.NewSimpleClientset(&secret)
- pluginMgr = volume.VolumePluginMgr{}
- rootDir, host = newTestHost(t, client)
- )
- volumeSpec.VolumeSource.Projected.Sources[0].Secret.Items = []v1.KeyToPath{
- {Key: "data-1", Path: "data-1"},
- {Key: "data-2", Path: "data-2"},
- {Key: "data-3", Path: "data-3"},
- {Key: "missing", Path: "missing"},
- }
- volumeSpec.VolumeSource.Projected.Sources[0].Secret.Optional = &trueVal
- defer os.RemoveAll(rootDir)
- pluginMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, host)
- plugin, err := pluginMgr.FindPluginByName(projectedPluginName)
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: testNamespace, UID: testPodUID}}
- mounter, err := plugin.NewMounter(volume.NewSpecFromVolume(volumeSpec), pod, volume.VolumeOptions{})
- if err != nil {
- t.Errorf("Failed to make a new Mounter: %v", err)
- }
- if mounter == nil {
- t.Errorf("Got a nil Mounter")
- }
- volumePath := mounter.GetPath()
- if !strings.HasSuffix(volumePath, fmt.Sprintf("pods/test_pod_uid/volumes/kubernetes.io~projected/test_volume_name")) {
- t.Errorf("Got unexpected path: %s", volumePath)
- }
- err = mounter.SetUp(volume.MounterArgs{})
- if err != nil {
- t.Errorf("Failed to setup volume: %v", err)
- }
- if _, err := os.Stat(volumePath); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, volume path not created: %s", volumePath)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- // secret volume should create its own empty wrapper path
- podWrapperMetadataDir := fmt.Sprintf("%v/pods/test_pod_uid/plugins/kubernetes.io~empty-dir/wrapped_test_volume_name", rootDir)
- if _, err := os.Stat(podWrapperMetadataDir); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, empty-dir wrapper path is not created: %s", podWrapperMetadataDir)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- doTestSecretDataInVolume(volumePath, secret, t)
- defer doTestCleanAndTeardown(plugin, testPodUID, testVolumeName, volumePath, t)
- }
- func makeVolumeSpec(volumeName, name string, defaultMode int32) *v1.Volume {
- return &v1.Volume{
- Name: volumeName,
- VolumeSource: v1.VolumeSource{
- Projected: makeProjection(name, defaultMode, "secret"),
- },
- }
- }
- func makeSecret(namespace, name string) v1.Secret {
- return v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: namespace,
- Name: name,
- },
- Data: map[string][]byte{
- "data-1": []byte("value-1"),
- "data-2": []byte("value-2"),
- "data-3": []byte("value-3"),
- },
- }
- }
- func makeProjection(name string, defaultMode int32, kind string) *v1.ProjectedVolumeSource {
- var item v1.VolumeProjection
- switch kind {
- case "configMap":
- item = v1.VolumeProjection{
- ConfigMap: &v1.ConfigMapProjection{
- LocalObjectReference: v1.LocalObjectReference{Name: name},
- },
- }
- case "secret":
- item = v1.VolumeProjection{
- Secret: &v1.SecretProjection{
- LocalObjectReference: v1.LocalObjectReference{Name: name},
- },
- }
- case "downwardAPI":
- item = v1.VolumeProjection{
- DownwardAPI: &v1.DownwardAPIProjection{},
- }
- case "serviceAccountToken":
- item = v1.VolumeProjection{
- ServiceAccountToken: &v1.ServiceAccountTokenProjection{},
- }
- }
- return &v1.ProjectedVolumeSource{
- Sources: []v1.VolumeProjection{item},
- DefaultMode: &defaultMode,
- }
- }
- func doTestSecretDataInVolume(volumePath string, secret v1.Secret, t *testing.T) {
- for key, value := range secret.Data {
- secretDataHostPath := filepath.Join(volumePath, key)
- if _, err := os.Stat(secretDataHostPath); err != nil {
- t.Fatalf("SetUp() failed, couldn't find secret data on disk: %v", secretDataHostPath)
- } else {
- actualSecretBytes, err := ioutil.ReadFile(secretDataHostPath)
- if err != nil {
- t.Fatalf("Couldn't read secret data from: %v", secretDataHostPath)
- }
- actualSecretValue := string(actualSecretBytes)
- if string(value) != actualSecretValue {
- t.Errorf("Unexpected value; expected %q, got %q", value, actualSecretValue)
- }
- }
- }
- }
- func doTestCleanAndTeardown(plugin volume.VolumePlugin, podUID types.UID, testVolumeName, volumePath string, t *testing.T) {
- unmounter, err := plugin.NewUnmounter(testVolumeName, podUID)
- if err != nil {
- t.Errorf("Failed to make a new Unmounter: %v", err)
- }
- if unmounter == nil {
- t.Errorf("Got a nil Unmounter")
- }
- if err := unmounter.TearDown(); err != nil {
- t.Errorf("Expected success, got: %v", err)
- }
- if _, err := os.Stat(volumePath); err == nil {
- t.Errorf("TearDown() failed, volume path still exists: %s", volumePath)
- } else if !os.IsNotExist(err) {
- t.Errorf("TearDown() failed: %v", err)
- }
- }
|