mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 02:08:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			237 lines
		
	
	
		
			8.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			237 lines
		
	
	
		
			8.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2020 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package admissionwebhook
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"context"
 | |
| 	"crypto/tls"
 | |
| 	"crypto/x509"
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"net/http"
 | |
| 	"net/http/httptest"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	v1 "k8s.io/api/admission/v1"
 | |
| 	admissionv1 "k8s.io/api/admissionregistration/v1"
 | |
| 	corev1 "k8s.io/api/core/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	v1validation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/apimachinery/pkg/util/validation/field"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	"k8s.io/apiserver/pkg/endpoints/handlers/fieldmanager"
 | |
| 	clientset "k8s.io/client-go/kubernetes"
 | |
| 	restclient "k8s.io/client-go/rest"
 | |
| 	kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
 | |
| 	"k8s.io/kubernetes/test/integration/framework"
 | |
| )
 | |
| 
 | |
| // TestMutatingWebhookResetsInvalidManagedFields ensures that the API server
 | |
| // resets managedFields to their state before admission if a mutating webhook
 | |
| // patches create/update requests with invalid managedFields.
 | |
| func TestMutatingWebhookResetsInvalidManagedFields(t *testing.T) {
 | |
| 	roots := x509.NewCertPool()
 | |
| 	if !roots.AppendCertsFromPEM(localhostCert) {
 | |
| 		t.Fatal("Failed to append Cert from PEM")
 | |
| 	}
 | |
| 	cert, err := tls.X509KeyPair(localhostCert, localhostKey)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to build cert with error: %+v", err)
 | |
| 	}
 | |
| 
 | |
| 	webhookServer := httptest.NewUnstartedServer(newInvalidManagedFieldsWebhookHandler(t))
 | |
| 	webhookServer.TLS = &tls.Config{
 | |
| 		RootCAs:      roots,
 | |
| 		Certificates: []tls.Certificate{cert},
 | |
| 	}
 | |
| 	webhookServer.StartTLS()
 | |
| 	defer webhookServer.Close()
 | |
| 
 | |
| 	s := kubeapiservertesting.StartTestServerOrDie(t,
 | |
| 		kubeapiservertesting.NewDefaultTestServerOptions(), []string{
 | |
| 			"--disable-admission-plugins=ServiceAccount",
 | |
| 		}, framework.SharedEtcd())
 | |
| 	defer s.TearDownFn()
 | |
| 
 | |
| 	recordedWarnings := &bytes.Buffer{}
 | |
| 	warningWriter := restclient.NewWarningWriter(recordedWarnings, restclient.WarningWriterOptions{})
 | |
| 	s.ClientConfig.WarningHandler = warningWriter
 | |
| 	client := clientset.NewForConfigOrDie(s.ClientConfig)
 | |
| 
 | |
| 	if _, err := client.CoreV1().Pods("default").Create(
 | |
| 		context.TODO(), invalidManagedFieldsMarkerFixture, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	// make sure we delete the pod even on a failed test
 | |
| 	defer func() {
 | |
| 		if err := client.CoreV1().Pods("default").Delete(context.TODO(), invalidManagedFieldsMarkerFixture.Name, metav1.DeleteOptions{}); err != nil {
 | |
| 			t.Fatalf("failed to delete marker pod: %v", err)
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	fail := admissionv1.Fail
 | |
| 	none := admissionv1.SideEffectClassNone
 | |
| 	mutatingCfg, err := client.AdmissionregistrationV1().MutatingWebhookConfigurations().Create(context.TODO(), &admissionv1.MutatingWebhookConfiguration{
 | |
| 		ObjectMeta: metav1.ObjectMeta{Name: "invalid-managedfields.admission.integration.test"},
 | |
| 		Webhooks: []admissionv1.MutatingWebhook{{
 | |
| 			Name: "invalid-managedfields.admission.integration.test",
 | |
| 			ClientConfig: admissionv1.WebhookClientConfig{
 | |
| 				URL:      &webhookServer.URL,
 | |
| 				CABundle: localhostCert,
 | |
| 			},
 | |
| 			Rules: []admissionv1.RuleWithOperations{{
 | |
| 				Operations: []admissionv1.OperationType{admissionv1.Create, admissionv1.Update},
 | |
| 				Rule:       admissionv1.Rule{APIGroups: []string{""}, APIVersions: []string{"v1"}, Resources: []string{"pods"}},
 | |
| 			}},
 | |
| 			FailurePolicy:           &fail,
 | |
| 			AdmissionReviewVersions: []string{"v1", "v1beta1"},
 | |
| 			SideEffects:             &none,
 | |
| 		}},
 | |
| 	}, metav1.CreateOptions{})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	defer func() {
 | |
| 		err := client.AdmissionregistrationV1().MutatingWebhookConfigurations().Delete(context.TODO(), mutatingCfg.GetName(), metav1.DeleteOptions{})
 | |
| 		if err != nil {
 | |
| 			t.Fatal(err)
 | |
| 		}
 | |
| 	}()
 | |
| 
 | |
| 	var pod *corev1.Pod
 | |
| 	var lastErr error
 | |
| 	// We just expect the general warning text as the detail order might change
 | |
| 	expectedWarning := fmt.Sprintf(fieldmanager.InvalidManagedFieldsAfterMutatingAdmissionWarningFormat, "")
 | |
| 
 | |
| 	// Make sure reset happens on patch requests
 | |
| 	// wait until new webhook is called
 | |
| 	if err := wait.PollImmediate(time.Millisecond*5, wait.ForeverTestTimeout, func() (bool, error) {
 | |
| 		defer recordedWarnings.Reset()
 | |
| 		pod, err = client.CoreV1().Pods("default").Patch(context.TODO(), invalidManagedFieldsMarkerFixture.Name, types.JSONPatchType, []byte("[]"), metav1.PatchOptions{})
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 		if err := validateManagedFieldsAndDecode(pod.ManagedFields); err != nil {
 | |
| 			lastErr = err
 | |
| 			return false, nil
 | |
| 		}
 | |
| 		if warningWriter.WarningCount() != 1 {
 | |
| 			lastErr = fmt.Errorf("expected one warning, got: %v", warningWriter.WarningCount())
 | |
| 			return false, nil
 | |
| 		}
 | |
| 		if !strings.Contains(recordedWarnings.String(), expectedWarning) {
 | |
| 			lastErr = fmt.Errorf("unexpected warning, expected: \n%v\n, got: \n%v",
 | |
| 				expectedWarning, recordedWarnings.String())
 | |
| 			return false, nil
 | |
| 		}
 | |
| 		lastErr = nil
 | |
| 		return true, nil
 | |
| 	}); err != nil || lastErr != nil {
 | |
| 		t.Fatalf("failed to wait for apiserver handling webhook mutation: %v, last error: %v", err, lastErr)
 | |
| 	}
 | |
| 
 | |
| 	// Make sure reset happens in update requests
 | |
| 	pod, err = client.CoreV1().Pods("default").Update(context.TODO(), pod, metav1.UpdateOptions{})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if err := validateManagedFieldsAndDecode(pod.ManagedFields); err != nil {
 | |
| 		t.Error(err)
 | |
| 	}
 | |
| 	if warningWriter.WarningCount() != 2 {
 | |
| 		t.Errorf("expected two warnings, got: %v", warningWriter.WarningCount())
 | |
| 	}
 | |
| 	if !strings.Contains(recordedWarnings.String(), expectedWarning) {
 | |
| 		t.Errorf("unexpected warning, expected: \n%v\n, got: \n%v",
 | |
| 			expectedWarning, recordedWarnings.String())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // validate against both decoding and validation to make sure we use the hardest rule between the both to reset
 | |
| // with decoding being as strict as it gets, only using it should be enough in admission
 | |
| func validateManagedFieldsAndDecode(managedFields []metav1.ManagedFieldsEntry) error {
 | |
| 	if _, err := fieldmanager.DecodeManagedFields(managedFields); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	validationErrs := v1validation.ValidateManagedFields(managedFields, field.NewPath("metadata").Child("managedFields"))
 | |
| 	return validationErrs.ToAggregate()
 | |
| }
 | |
| 
 | |
| func newInvalidManagedFieldsWebhookHandler(t *testing.T) http.Handler {
 | |
| 	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | |
| 		defer r.Body.Close()
 | |
| 		data, err := io.ReadAll(r.Body)
 | |
| 		if err != nil {
 | |
| 			http.Error(w, err.Error(), http.StatusBadRequest)
 | |
| 		}
 | |
| 		review := v1.AdmissionReview{}
 | |
| 		if err := json.Unmarshal(data, &review); err != nil {
 | |
| 			http.Error(w, err.Error(), http.StatusBadRequest)
 | |
| 		}
 | |
| 
 | |
| 		if len(review.Request.Object.Raw) == 0 {
 | |
| 			http.Error(w, err.Error(), http.StatusBadRequest)
 | |
| 			return
 | |
| 		}
 | |
| 		pod := &corev1.Pod{}
 | |
| 		if err := json.Unmarshal(review.Request.Object.Raw, pod); err != nil {
 | |
| 			http.Error(w, err.Error(), http.StatusBadRequest)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		review.Response = &v1.AdmissionResponse{
 | |
| 			Allowed: true,
 | |
| 			UID:     review.Request.UID,
 | |
| 			Result:  &metav1.Status{Message: "admitted"},
 | |
| 		}
 | |
| 
 | |
| 		if len(pod.ManagedFields) != 0 {
 | |
| 			t.Logf("corrupting managedFields %v", pod.ManagedFields)
 | |
| 			review.Response.Patch = []byte(`[
 | |
| 				{"op":"remove","path":"/metadata/managedFields/0/apiVersion"},
 | |
| 				{"op":"remove","path":"/metadata/managedFields/0/fieldsV1"},
 | |
| 				{"op":"remove","path":"/metadata/managedFields/0/fieldsType"}
 | |
| 			]`)
 | |
| 			jsonPatch := v1.PatchTypeJSONPatch
 | |
| 			review.Response.PatchType = &jsonPatch
 | |
| 		}
 | |
| 
 | |
| 		w.Header().Set("Content-Type", "application/json")
 | |
| 		if err := json.NewEncoder(w).Encode(review); err != nil {
 | |
| 			t.Errorf("Marshal of response failed with error: %v", err)
 | |
| 		}
 | |
| 	})
 | |
| }
 | |
| 
 | |
| var invalidManagedFieldsMarkerFixture = &corev1.Pod{
 | |
| 	ObjectMeta: metav1.ObjectMeta{
 | |
| 		Namespace: "default",
 | |
| 		Name:      "invalid-managedfields-test-marker",
 | |
| 	},
 | |
| 	Spec: corev1.PodSpec{
 | |
| 		Containers: []corev1.Container{{
 | |
| 			Name:  "fake-name",
 | |
| 			Image: "fakeimage",
 | |
| 		}},
 | |
| 	},
 | |
| }
 | 
