123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400 |
- /*
- Copyright 2017 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package e2e_node
- import (
- "fmt"
- "net"
- "os/exec"
- "strings"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/util/sets"
- "k8s.io/apimachinery/pkg/util/uuid"
- utilfeature "k8s.io/apiserver/pkg/util/feature"
- "k8s.io/kubernetes/pkg/features"
- "k8s.io/kubernetes/test/e2e/framework"
- e2elog "k8s.io/kubernetes/test/e2e/framework/log"
- . "github.com/onsi/ginkgo"
- imageutils "k8s.io/kubernetes/test/utils/image"
- )
- var _ = framework.KubeDescribe("Security Context", func() {
- f := framework.NewDefaultFramework("security-context-test")
- var podClient *framework.PodClient
- BeforeEach(func() {
- podClient = f.PodClient()
- })
- Context("when pod PID namespace is configurable [Feature:ShareProcessNamespace][NodeAlphaFeature:ShareProcessNamespace]", func() {
- It("containers in pods using isolated PID namespaces should all receive PID 1", func() {
- By("Create a pod with isolated PID namespaces.")
- f.PodClient().CreateSync(&v1.Pod{
- ObjectMeta: metav1.ObjectMeta{Name: "isolated-pid-ns-test-pod"},
- Spec: v1.PodSpec{
- Containers: []v1.Container{
- {
- Name: "test-container-1",
- Image: imageutils.GetE2EImage(imageutils.BusyBox),
- Command: []string{"/bin/top"},
- },
- {
- Name: "test-container-2",
- Image: imageutils.GetE2EImage(imageutils.BusyBox),
- Command: []string{"/bin/sleep"},
- Args: []string{"10000"},
- },
- },
- },
- })
- By("Check if both containers receive PID 1.")
- pid1 := f.ExecCommandInContainer("isolated-pid-ns-test-pod", "test-container-1", "/bin/pidof", "top")
- pid2 := f.ExecCommandInContainer("isolated-pid-ns-test-pod", "test-container-2", "/bin/pidof", "sleep")
- if pid1 != "1" || pid2 != "1" {
- framework.Failf("PIDs of different containers are not all 1: test-container-1=%v, test-container-2=%v", pid1, pid2)
- }
- })
- It("processes in containers sharing a pod namespace should be able to see each other [Alpha]", func() {
- By("Check whether shared PID namespace is supported.")
- isEnabled, err := isSharedPIDNamespaceSupported()
- framework.ExpectNoError(err)
- if !isEnabled {
- framework.Skipf("Skipped because shared PID namespace is not supported by this docker version.")
- }
- // It's not enough to set this flag in the kubelet because the apiserver needs it too
- if !utilfeature.DefaultFeatureGate.Enabled(features.PodShareProcessNamespace) {
- framework.Skipf("run test with --feature-gates=PodShareProcessNamespace=true to test PID namespace sharing")
- }
- By("Create a pod with shared PID namespace.")
- f.PodClient().CreateSync(&v1.Pod{
- ObjectMeta: metav1.ObjectMeta{Name: "shared-pid-ns-test-pod"},
- Spec: v1.PodSpec{
- ShareProcessNamespace: &[]bool{true}[0],
- Containers: []v1.Container{
- {
- Name: "test-container-1",
- Image: imageutils.GetE2EImage(imageutils.BusyBox),
- Command: []string{"/bin/top"},
- },
- {
- Name: "test-container-2",
- Image: imageutils.GetE2EImage(imageutils.BusyBox),
- Command: []string{"/bin/sleep"},
- Args: []string{"10000"},
- },
- },
- },
- })
- By("Check if the process in one container is visible to the process in the other.")
- pid1 := f.ExecCommandInContainer("shared-pid-ns-test-pod", "test-container-1", "/bin/pidof", "top")
- pid2 := f.ExecCommandInContainer("shared-pid-ns-test-pod", "test-container-2", "/bin/pidof", "top")
- if pid1 != pid2 {
- framework.Failf("PIDs are not the same in different containers: test-container-1=%v, test-container-2=%v", pid1, pid2)
- }
- })
- })
- Context("when creating a pod in the host PID namespace", func() {
- makeHostPidPod := func(podName, image string, command []string, hostPID bool) *v1.Pod {
- return &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: podName,
- },
- Spec: v1.PodSpec{
- RestartPolicy: v1.RestartPolicyNever,
- HostPID: hostPID,
- Containers: []v1.Container{
- {
- Image: image,
- Name: podName,
- Command: command,
- },
- },
- },
- }
- }
- createAndWaitHostPidPod := func(podName string, hostPID bool) {
- podClient.Create(makeHostPidPod(podName,
- busyboxImage,
- []string{"sh", "-c", "pidof nginx || true"},
- hostPID,
- ))
- podClient.WaitForSuccess(podName, framework.PodStartTimeout)
- }
- nginxPid := ""
- BeforeEach(func() {
- nginxPodName := "nginx-hostpid-" + string(uuid.NewUUID())
- podClient.CreateSync(makeHostPidPod(nginxPodName,
- imageutils.GetE2EImage(imageutils.Nginx),
- nil,
- true,
- ))
- output := f.ExecShellInContainer(nginxPodName, nginxPodName,
- "cat /var/run/nginx.pid")
- nginxPid = strings.TrimSpace(output)
- })
- It("should show its pid in the host PID namespace [NodeFeature:HostAccess]", func() {
- busyboxPodName := "busybox-hostpid-" + string(uuid.NewUUID())
- createAndWaitHostPidPod(busyboxPodName, true)
- logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, busyboxPodName, busyboxPodName)
- if err != nil {
- framework.Failf("GetPodLogs for pod %q failed: %v", busyboxPodName, err)
- }
- pids := strings.TrimSpace(logs)
- e2elog.Logf("Got nginx's pid %q from pod %q", pids, busyboxPodName)
- if pids == "" {
- framework.Failf("nginx's pid should be seen by hostpid containers")
- }
- pidSets := sets.NewString(strings.Split(pids, " ")...)
- if !pidSets.Has(nginxPid) {
- framework.Failf("nginx's pid should be seen by hostpid containers")
- }
- })
- It("should not show its pid in the non-hostpid containers [NodeFeature:HostAccess]", func() {
- busyboxPodName := "busybox-non-hostpid-" + string(uuid.NewUUID())
- createAndWaitHostPidPod(busyboxPodName, false)
- logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, busyboxPodName, busyboxPodName)
- if err != nil {
- framework.Failf("GetPodLogs for pod %q failed: %v", busyboxPodName, err)
- }
- pids := strings.TrimSpace(logs)
- e2elog.Logf("Got nginx's pid %q from pod %q", pids, busyboxPodName)
- pidSets := sets.NewString(strings.Split(pids, " ")...)
- if pidSets.Has(nginxPid) {
- framework.Failf("nginx's pid should not be seen by non-hostpid containers")
- }
- })
- })
- Context("when creating a pod in the host IPC namespace", func() {
- makeHostIPCPod := func(podName, image string, command []string, hostIPC bool) *v1.Pod {
- return &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: podName,
- },
- Spec: v1.PodSpec{
- RestartPolicy: v1.RestartPolicyNever,
- HostIPC: hostIPC,
- Containers: []v1.Container{
- {
- Image: image,
- Name: podName,
- Command: command,
- },
- },
- },
- }
- }
- createAndWaitHostIPCPod := func(podName string, hostNetwork bool) {
- podClient.Create(makeHostIPCPod(podName,
- imageutils.GetE2EImage(imageutils.IpcUtils),
- []string{"sh", "-c", "ipcs -m | awk '{print $2}'"},
- hostNetwork,
- ))
- podClient.WaitForSuccess(podName, framework.PodStartTimeout)
- }
- hostSharedMemoryID := ""
- BeforeEach(func() {
- output, err := exec.Command("sh", "-c", "ipcmk -M 1048576 | awk '{print $NF}'").Output()
- if err != nil {
- framework.Failf("Failed to create the shared memory on the host: %v", err)
- }
- hostSharedMemoryID = strings.TrimSpace(string(output))
- e2elog.Logf("Got host shared memory ID %q", hostSharedMemoryID)
- })
- It("should show the shared memory ID in the host IPC containers [NodeFeature:HostAccess]", func() {
- ipcutilsPodName := "ipcutils-hostipc-" + string(uuid.NewUUID())
- createAndWaitHostIPCPod(ipcutilsPodName, true)
- logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, ipcutilsPodName, ipcutilsPodName)
- if err != nil {
- framework.Failf("GetPodLogs for pod %q failed: %v", ipcutilsPodName, err)
- }
- podSharedMemoryIDs := strings.TrimSpace(logs)
- e2elog.Logf("Got shared memory IDs %q from pod %q", podSharedMemoryIDs, ipcutilsPodName)
- if !strings.Contains(podSharedMemoryIDs, hostSharedMemoryID) {
- framework.Failf("hostIPC container should show shared memory IDs on host")
- }
- })
- It("should not show the shared memory ID in the non-hostIPC containers [NodeFeature:HostAccess]", func() {
- ipcutilsPodName := "ipcutils-non-hostipc-" + string(uuid.NewUUID())
- createAndWaitHostIPCPod(ipcutilsPodName, false)
- logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, ipcutilsPodName, ipcutilsPodName)
- if err != nil {
- framework.Failf("GetPodLogs for pod %q failed: %v", ipcutilsPodName, err)
- }
- podSharedMemoryIDs := strings.TrimSpace(logs)
- e2elog.Logf("Got shared memory IDs %q from pod %q", podSharedMemoryIDs, ipcutilsPodName)
- if strings.Contains(podSharedMemoryIDs, hostSharedMemoryID) {
- framework.Failf("non-hostIPC container should not show shared memory IDs on host")
- }
- })
- AfterEach(func() {
- if hostSharedMemoryID != "" {
- _, err := exec.Command("sh", "-c", fmt.Sprintf("ipcrm -m %q", hostSharedMemoryID)).Output()
- if err != nil {
- framework.Failf("Failed to remove shared memory %q on the host: %v", hostSharedMemoryID, err)
- }
- }
- })
- })
- Context("when creating a pod in the host network namespace", func() {
- makeHostNetworkPod := func(podName, image string, command []string, hostNetwork bool) *v1.Pod {
- return &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: podName,
- },
- Spec: v1.PodSpec{
- RestartPolicy: v1.RestartPolicyNever,
- HostNetwork: hostNetwork,
- Containers: []v1.Container{
- {
- Image: image,
- Name: podName,
- Command: command,
- },
- },
- },
- }
- }
- listListeningPortsCommand := []string{"sh", "-c", "netstat -ln"}
- createAndWaitHostNetworkPod := func(podName string, hostNetwork bool) {
- podClient.Create(makeHostNetworkPod(podName,
- busyboxImage,
- listListeningPortsCommand,
- hostNetwork,
- ))
- podClient.WaitForSuccess(podName, framework.PodStartTimeout)
- }
- listeningPort := ""
- var l net.Listener
- var err error
- BeforeEach(func() {
- l, err = net.Listen("tcp", ":0")
- if err != nil {
- framework.Failf("Failed to open a new tcp port: %v", err)
- }
- addr := strings.Split(l.Addr().String(), ":")
- listeningPort = addr[len(addr)-1]
- e2elog.Logf("Opened a new tcp port %q", listeningPort)
- })
- It("should listen on same port in the host network containers [NodeFeature:HostAccess]", func() {
- busyboxPodName := "busybox-hostnetwork-" + string(uuid.NewUUID())
- createAndWaitHostNetworkPod(busyboxPodName, true)
- logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, busyboxPodName, busyboxPodName)
- if err != nil {
- framework.Failf("GetPodLogs for pod %q failed: %v", busyboxPodName, err)
- }
- e2elog.Logf("Got logs for pod %q: %q", busyboxPodName, logs)
- if !strings.Contains(logs, listeningPort) {
- framework.Failf("host-networked container should listening on same port as host")
- }
- })
- It("shouldn't show the same port in the non-hostnetwork containers [NodeFeature:HostAccess]", func() {
- busyboxPodName := "busybox-non-hostnetwork-" + string(uuid.NewUUID())
- createAndWaitHostNetworkPod(busyboxPodName, false)
- logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, busyboxPodName, busyboxPodName)
- if err != nil {
- framework.Failf("GetPodLogs for pod %q failed: %v", busyboxPodName, err)
- }
- e2elog.Logf("Got logs for pod %q: %q", busyboxPodName, logs)
- if strings.Contains(logs, listeningPort) {
- framework.Failf("non-hostnetworked container shouldn't show the same port as host")
- }
- })
- AfterEach(func() {
- if l != nil {
- l.Close()
- }
- })
- })
- Context("When creating a pod with privileged", func() {
- makeUserPod := func(podName, image string, command []string, privileged bool) *v1.Pod {
- return &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- Name: podName,
- },
- Spec: v1.PodSpec{
- RestartPolicy: v1.RestartPolicyNever,
- Containers: []v1.Container{
- {
- Image: image,
- Name: podName,
- Command: command,
- SecurityContext: &v1.SecurityContext{
- Privileged: &privileged,
- },
- },
- },
- },
- }
- }
- createAndWaitUserPod := func(privileged bool) string {
- podName := fmt.Sprintf("busybox-privileged-%v-%s", privileged, uuid.NewUUID())
- podClient.Create(makeUserPod(podName,
- busyboxImage,
- []string{"sh", "-c", "ip link add dummy0 type dummy || true"},
- privileged,
- ))
- podClient.WaitForSuccess(podName, framework.PodStartTimeout)
- return podName
- }
- It("should run the container as privileged when true [NodeFeature:HostAccess]", func() {
- podName := createAndWaitUserPod(true)
- logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, podName, podName)
- if err != nil {
- framework.Failf("GetPodLogs for pod %q failed: %v", podName, err)
- }
- e2elog.Logf("Got logs for pod %q: %q", podName, logs)
- if strings.Contains(logs, "Operation not permitted") {
- framework.Failf("privileged container should be able to create dummy device")
- }
- })
- })
- })
|