mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	* Forensic Container Checkpointing as described in KEP 2008 moves from
   Alpha to Beta. This is corresponding code change.
 * Adapt e2e test to handle
   '(rpc error: code = Unimplemented desc = unknown method CheckpointContainer'
   and
   '(rpc error: code = Unimplemented desc = method CheckpointContainer not implemented)'
   and
   '(rpc error: code = Unknown desc = checkpoint/restore support not available)'
   One error message is if the CRI implementation does
   not implement the CRI RPC (too old) and the second is
   if the CRI implementation does explicitly not support the feature.
   The third error message can be seen if the container engine
   explicitly disabled the checkpoint/restore support,
 * As described in the corresponding KEP 2008 explicitly test for
   disabled functionality.
 * Extended test to look for the checkpoint kubelet metric.
 * Extended test to look for the CRI error metric.
 *  Add separate sub-resource permission to control permissions on
    the checkpoint kubelet API endpoint
Signed-off-by: Adrian Reber <areber@redhat.com>
		
	
		
			
				
	
	
		
			150 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			150 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package server
 | 
						|
 | 
						|
import (
 | 
						|
	"net/http"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
	"github.com/stretchr/testify/require"
 | 
						|
	"k8s.io/apiserver/pkg/authentication/user"
 | 
						|
	"k8s.io/apiserver/pkg/authorization/authorizer"
 | 
						|
)
 | 
						|
 | 
						|
func TestIsSubPath(t *testing.T) {
 | 
						|
	testcases := map[string]struct {
 | 
						|
		subpath  string
 | 
						|
		path     string
 | 
						|
		expected bool
 | 
						|
	}{
 | 
						|
		"empty": {subpath: "", path: "", expected: true},
 | 
						|
 | 
						|
		"match 1": {subpath: "foo", path: "foo", expected: true},
 | 
						|
		"match 2": {subpath: "/foo", path: "/foo", expected: true},
 | 
						|
		"match 3": {subpath: "/foo/", path: "/foo/", expected: true},
 | 
						|
		"match 4": {subpath: "/foo/bar", path: "/foo/bar", expected: true},
 | 
						|
 | 
						|
		"subpath of root 1": {subpath: "/foo", path: "/", expected: true},
 | 
						|
		"subpath of root 2": {subpath: "/foo/", path: "/", expected: true},
 | 
						|
		"subpath of root 3": {subpath: "/foo/bar", path: "/", expected: true},
 | 
						|
 | 
						|
		"subpath of path 1": {subpath: "/foo", path: "/foo", expected: true},
 | 
						|
		"subpath of path 2": {subpath: "/foo/", path: "/foo", expected: true},
 | 
						|
		"subpath of path 3": {subpath: "/foo/bar", path: "/foo", expected: true},
 | 
						|
 | 
						|
		"mismatch 1": {subpath: "/foo", path: "/bar", expected: false},
 | 
						|
		"mismatch 2": {subpath: "/foo", path: "/foobar", expected: false},
 | 
						|
		"mismatch 3": {subpath: "/foobar", path: "/foo", expected: false},
 | 
						|
	}
 | 
						|
 | 
						|
	for k, tc := range testcases {
 | 
						|
		result := isSubpath(tc.subpath, tc.path)
 | 
						|
		if result != tc.expected {
 | 
						|
			t.Errorf("%s: expected %v, got %v", k, tc.expected, result)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestGetRequestAttributes(t *testing.T) {
 | 
						|
	for _, test := range AuthzTestCases() {
 | 
						|
		t.Run(test.Method+":"+test.Path, func(t *testing.T) {
 | 
						|
			getter := NewNodeAuthorizerAttributesGetter(authzTestNodeName)
 | 
						|
 | 
						|
			req, err := http.NewRequest(test.Method, "https://localhost:1234"+test.Path, nil)
 | 
						|
			require.NoError(t, err)
 | 
						|
			attrs := getter.GetRequestAttributes(AuthzTestUser(), req)
 | 
						|
 | 
						|
			test.AssertAttributes(t, attrs)
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	authzTestNodeName = "test"
 | 
						|
	authzTestUserName = "phibby"
 | 
						|
)
 | 
						|
 | 
						|
type AuthzTestCase struct {
 | 
						|
	Method, Path string
 | 
						|
 | 
						|
	ExpectedVerb, ExpectedSubresource string
 | 
						|
}
 | 
						|
 | 
						|
func (a *AuthzTestCase) AssertAttributes(t *testing.T, attrs authorizer.Attributes) {
 | 
						|
	expectedAttributes := authorizer.AttributesRecord{
 | 
						|
		User:            AuthzTestUser(),
 | 
						|
		APIGroup:        "",
 | 
						|
		APIVersion:      "v1",
 | 
						|
		Verb:            a.ExpectedVerb,
 | 
						|
		Resource:        "nodes",
 | 
						|
		Name:            authzTestNodeName,
 | 
						|
		Subresource:     a.ExpectedSubresource,
 | 
						|
		ResourceRequest: true,
 | 
						|
		Path:            a.Path,
 | 
						|
	}
 | 
						|
 | 
						|
	assert.Equal(t, expectedAttributes, attrs)
 | 
						|
}
 | 
						|
 | 
						|
func AuthzTestUser() user.Info {
 | 
						|
	return &user.DefaultInfo{Name: authzTestUserName}
 | 
						|
}
 | 
						|
 | 
						|
func AuthzTestCases() []AuthzTestCase {
 | 
						|
	// Path -> ExpectedSubresource
 | 
						|
	testPaths := map[string]string{
 | 
						|
		"/attach/{podNamespace}/{podID}/{containerName}":       "proxy",
 | 
						|
		"/attach/{podNamespace}/{podID}/{uid}/{containerName}": "proxy",
 | 
						|
		"/checkpoint/{podNamespace}/{podID}/{containerName}":   "checkpoint",
 | 
						|
		"/configz": "proxy",
 | 
						|
		"/containerLogs/{podNamespace}/{podID}/{containerName}": "proxy",
 | 
						|
		"/debug/flags/v":                                     "proxy",
 | 
						|
		"/debug/pprof/{subpath:*}":                           "proxy",
 | 
						|
		"/exec/{podNamespace}/{podID}/{containerName}":       "proxy",
 | 
						|
		"/exec/{podNamespace}/{podID}/{uid}/{containerName}": "proxy",
 | 
						|
		"/healthz":                            "proxy",
 | 
						|
		"/healthz/log":                        "proxy",
 | 
						|
		"/healthz/ping":                       "proxy",
 | 
						|
		"/healthz/syncloop":                   "proxy",
 | 
						|
		"/logs/":                              "log",
 | 
						|
		"/logs/{logpath:*}":                   "log",
 | 
						|
		"/metrics":                            "metrics",
 | 
						|
		"/metrics/cadvisor":                   "metrics",
 | 
						|
		"/metrics/probes":                     "metrics",
 | 
						|
		"/metrics/resource":                   "metrics",
 | 
						|
		"/pods/":                              "proxy",
 | 
						|
		"/portForward/{podNamespace}/{podID}": "proxy",
 | 
						|
		"/portForward/{podNamespace}/{podID}/{uid}":         "proxy",
 | 
						|
		"/run/{podNamespace}/{podID}/{containerName}":       "proxy",
 | 
						|
		"/run/{podNamespace}/{podID}/{uid}/{containerName}": "proxy",
 | 
						|
		"/runningpods/":  "proxy",
 | 
						|
		"/stats/":        "stats",
 | 
						|
		"/stats/summary": "stats",
 | 
						|
	}
 | 
						|
	testCases := []AuthzTestCase{}
 | 
						|
	for path, subresource := range testPaths {
 | 
						|
		testCases = append(testCases,
 | 
						|
			AuthzTestCase{"POST", path, "create", subresource},
 | 
						|
			AuthzTestCase{"GET", path, "get", subresource},
 | 
						|
			AuthzTestCase{"PUT", path, "update", subresource},
 | 
						|
			AuthzTestCase{"PATCH", path, "patch", subresource},
 | 
						|
			AuthzTestCase{"DELETE", path, "delete", subresource})
 | 
						|
	}
 | 
						|
	return testCases
 | 
						|
}
 |