mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 18:28:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			670 lines
		
	
	
		
			26 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			670 lines
		
	
	
		
			26 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2017 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package auth
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	coordination "k8s.io/api/coordination/v1"
 | |
| 	corev1 "k8s.io/api/core/v1"
 | |
| 	policy "k8s.io/api/policy/v1"
 | |
| 	storagev1 "k8s.io/api/storage/v1"
 | |
| 	apierrors "k8s.io/apimachinery/pkg/api/errors"
 | |
| 	"k8s.io/apimachinery/pkg/api/resource"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	utilfeature "k8s.io/apiserver/pkg/util/feature"
 | |
| 	clientset "k8s.io/client-go/kubernetes"
 | |
| 	featuregatetesting "k8s.io/component-base/featuregate/testing"
 | |
| 	kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
 | |
| 	"k8s.io/kubernetes/pkg/features"
 | |
| 	"k8s.io/kubernetes/test/integration/framework"
 | |
| 	"k8s.io/utils/pointer"
 | |
| )
 | |
| 
 | |
| func TestNodeAuthorizer(t *testing.T) {
 | |
| 	const (
 | |
| 		// Define credentials
 | |
| 		// Fake values for testing.
 | |
| 		tokenMaster      = "master-token"
 | |
| 		tokenNodeUnknown = "unknown-token"
 | |
| 		tokenNode1       = "node1-token"
 | |
| 		tokenNode2       = "node2-token"
 | |
| 	)
 | |
| 
 | |
| 	// Enable DynamicKubeletConfig feature so that Node.Spec.ConfigSource can be set
 | |
| 	defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.DynamicKubeletConfig, true)()
 | |
| 
 | |
| 	tokenFile, err := os.CreateTemp("", "kubeconfig")
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	tokenFile.WriteString(strings.Join([]string{
 | |
| 		fmt.Sprintf(`%s,admin,uid1,"system:masters"`, tokenMaster),
 | |
| 		fmt.Sprintf(`%s,unknown,uid2,"system:nodes"`, tokenNodeUnknown),
 | |
| 		fmt.Sprintf(`%s,system:node:node1,uid3,"system:nodes"`, tokenNode1),
 | |
| 		fmt.Sprintf(`%s,system:node:node2,uid4,"system:nodes"`, tokenNode2),
 | |
| 	}, "\n"))
 | |
| 	tokenFile.Close()
 | |
| 
 | |
| 	server := kubeapiservertesting.StartTestServerOrDie(t, nil, []string{
 | |
| 		"--authorization-mode", "Node,RBAC",
 | |
| 		"--token-auth-file", tokenFile.Name(),
 | |
| 		"--enable-admission-plugins", "NodeRestriction",
 | |
| 		// The "default" SA is not installed, causing the ServiceAccount plugin to retry for ~1s per
 | |
| 		// API request.
 | |
| 		"--disable-admission-plugins", "ServiceAccount,TaintNodesByCondition",
 | |
| 	}, framework.SharedEtcd())
 | |
| 	defer server.TearDownFn()
 | |
| 
 | |
| 	// Build client config and superuser clientset
 | |
| 	clientConfig := server.ClientConfig
 | |
| 	superuserClient, superuserClientExternal := clientsetForToken(tokenMaster, clientConfig)
 | |
| 
 | |
| 	// Wait for a healthy server
 | |
| 	for {
 | |
| 		result := superuserClient.CoreV1().RESTClient().Get().AbsPath("/healthz").Do(context.TODO())
 | |
| 		_, err := result.Raw()
 | |
| 		if err == nil {
 | |
| 			break
 | |
| 		}
 | |
| 		t.Log(err)
 | |
| 		time.Sleep(time.Second)
 | |
| 	}
 | |
| 
 | |
| 	// Create objects
 | |
| 	if _, err := superuserClient.CoreV1().Namespaces().Create(context.TODO(), &corev1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: "ns"}}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	if _, err := superuserClient.CoreV1().Secrets("ns").Create(context.TODO(), &corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mysecret"}}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if _, err := superuserClient.CoreV1().Secrets("ns").Create(context.TODO(), &corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mypvsecret"}}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if _, err := superuserClient.CoreV1().ConfigMaps("ns").Create(context.TODO(), &corev1.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmap"}}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if _, err := superuserClient.CoreV1().ConfigMaps("ns").Create(context.TODO(), &corev1.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmapconfigsource"}}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	pvName := "mypv"
 | |
| 	if _, err := superuserClientExternal.StorageV1().VolumeAttachments().Create(context.TODO(), &storagev1.VolumeAttachment{
 | |
| 		ObjectMeta: metav1.ObjectMeta{Name: "myattachment"},
 | |
| 		Spec: storagev1.VolumeAttachmentSpec{
 | |
| 			Attacher: "foo",
 | |
| 			Source:   storagev1.VolumeAttachmentSource{PersistentVolumeName: &pvName},
 | |
| 			NodeName: "node2",
 | |
| 		},
 | |
| 	}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if _, err := superuserClient.CoreV1().PersistentVolumeClaims("ns").Create(context.TODO(), &corev1.PersistentVolumeClaim{
 | |
| 		ObjectMeta: metav1.ObjectMeta{Name: "mypvc"},
 | |
| 		Spec: corev1.PersistentVolumeClaimSpec{
 | |
| 			AccessModes: []corev1.PersistentVolumeAccessMode{corev1.ReadOnlyMany},
 | |
| 			Resources:   corev1.ResourceRequirements{Requests: corev1.ResourceList{corev1.ResourceStorage: resource.MustParse("1")}},
 | |
| 		},
 | |
| 	}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	if _, err := superuserClient.CoreV1().PersistentVolumes().Create(context.TODO(), &corev1.PersistentVolume{
 | |
| 		ObjectMeta: metav1.ObjectMeta{Name: "mypv"},
 | |
| 		Spec: corev1.PersistentVolumeSpec{
 | |
| 			AccessModes:            []corev1.PersistentVolumeAccessMode{corev1.ReadOnlyMany},
 | |
| 			Capacity:               corev1.ResourceList{corev1.ResourceStorage: resource.MustParse("1")},
 | |
| 			ClaimRef:               &corev1.ObjectReference{Namespace: "ns", Name: "mypvc"},
 | |
| 			PersistentVolumeSource: corev1.PersistentVolumeSource{AzureFile: &corev1.AzureFilePersistentVolumeSource{ShareName: "default", SecretName: "mypvsecret"}},
 | |
| 		},
 | |
| 	}, metav1.CreateOptions{}); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	getSecret := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().Secrets("ns").Get(context.TODO(), "mysecret", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	getPVSecret := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().Secrets("ns").Get(context.TODO(), "mypvsecret", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	getConfigMap := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().ConfigMaps("ns").Get(context.TODO(), "myconfigmap", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	getConfigMapConfigSource := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().ConfigMaps("ns").Get(context.TODO(), "myconfigmapconfigsource", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	getPVC := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().PersistentVolumeClaims("ns").Get(context.TODO(), "mypvc", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	getPV := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().PersistentVolumes().Get(context.TODO(), "mypv", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	getVolumeAttachment := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.StorageV1().VolumeAttachments().Get(context.TODO(), "myattachment", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	createNode2NormalPod := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().Pods("ns").Create(context.TODO(), &corev1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Name: "node2normalpod"},
 | |
| 				Spec: corev1.PodSpec{
 | |
| 					NodeName:   "node2",
 | |
| 					Containers: []corev1.Container{{Name: "image", Image: "busybox"}},
 | |
| 					Volumes: []corev1.Volume{
 | |
| 						{Name: "secret", VolumeSource: corev1.VolumeSource{Secret: &corev1.SecretVolumeSource{SecretName: "mysecret"}}},
 | |
| 						{Name: "cm", VolumeSource: corev1.VolumeSource{ConfigMap: &corev1.ConfigMapVolumeSource{LocalObjectReference: corev1.LocalObjectReference{Name: "myconfigmap"}}}},
 | |
| 						{Name: "pvc", VolumeSource: corev1.VolumeSource{PersistentVolumeClaim: &corev1.PersistentVolumeClaimVolumeSource{ClaimName: "mypvc"}}},
 | |
| 					},
 | |
| 				},
 | |
| 			}, metav1.CreateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	updateNode2NormalPodStatus := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			startTime := metav1.NewTime(time.Now())
 | |
| 			_, err := client.CoreV1().Pods("ns").UpdateStatus(context.TODO(), &corev1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Name: "node2normalpod"},
 | |
| 				Status:     corev1.PodStatus{StartTime: &startTime},
 | |
| 			}, metav1.UpdateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	deleteNode2NormalPod := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			zero := int64(0)
 | |
| 			return client.CoreV1().Pods("ns").Delete(context.TODO(), "node2normalpod", metav1.DeleteOptions{GracePeriodSeconds: &zero})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	createNode2MirrorPod := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			const nodeName = "node2"
 | |
| 			node, err := client.CoreV1().Nodes().Get(context.TODO(), nodeName, metav1.GetOptions{})
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			controller := true
 | |
| 			_, err = client.CoreV1().Pods("ns").Create(context.TODO(), &corev1.Pod{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:        "node2mirrorpod",
 | |
| 					Annotations: map[string]string{corev1.MirrorPodAnnotationKey: "true"},
 | |
| 					OwnerReferences: []metav1.OwnerReference{{
 | |
| 						APIVersion: corev1.SchemeGroupVersion.String(),
 | |
| 						Kind:       "Node",
 | |
| 						Name:       nodeName,
 | |
| 						UID:        node.UID,
 | |
| 						Controller: &controller,
 | |
| 					}},
 | |
| 				},
 | |
| 				Spec: corev1.PodSpec{
 | |
| 					NodeName:   nodeName,
 | |
| 					Containers: []corev1.Container{{Name: "image", Image: "busybox"}},
 | |
| 				},
 | |
| 			}, metav1.CreateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	deleteNode2MirrorPod := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			zero := int64(0)
 | |
| 			return client.CoreV1().Pods("ns").Delete(context.TODO(), "node2mirrorpod", metav1.DeleteOptions{GracePeriodSeconds: &zero})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	createNode2 := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().Nodes().Create(context.TODO(), &corev1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node2"}}, metav1.CreateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	setNode2ConfigSource := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			node2, err := client.CoreV1().Nodes().Get(context.TODO(), "node2", metav1.GetOptions{})
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			node2.Spec.ConfigSource = &corev1.NodeConfigSource{
 | |
| 				ConfigMap: &corev1.ConfigMapNodeConfigSource{
 | |
| 					Namespace:        "ns",
 | |
| 					Name:             "myconfigmapconfigsource",
 | |
| 					KubeletConfigKey: "kubelet",
 | |
| 				},
 | |
| 			}
 | |
| 			_, err = client.CoreV1().Nodes().Update(context.TODO(), node2, metav1.UpdateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	unsetNode2ConfigSource := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			node2, err := client.CoreV1().Nodes().Get(context.TODO(), "node2", metav1.GetOptions{})
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			node2.Spec.ConfigSource = nil
 | |
| 			_, err = client.CoreV1().Nodes().Update(context.TODO(), node2, metav1.UpdateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	updateNode2Status := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoreV1().Nodes().UpdateStatus(context.TODO(), &corev1.Node{
 | |
| 				ObjectMeta: metav1.ObjectMeta{Name: "node2"},
 | |
| 				Status:     corev1.NodeStatus{},
 | |
| 			}, metav1.UpdateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	deleteNode2 := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			return client.CoreV1().Nodes().Delete(context.TODO(), "node2", metav1.DeleteOptions{})
 | |
| 		}
 | |
| 	}
 | |
| 	createNode2NormalPodEviction := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			zero := int64(0)
 | |
| 			return client.PolicyV1().Evictions("ns").Evict(context.TODO(), &policy.Eviction{
 | |
| 				TypeMeta: metav1.TypeMeta{
 | |
| 					APIVersion: "policy/v1",
 | |
| 					Kind:       "Eviction",
 | |
| 				},
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:      "node2normalpod",
 | |
| 					Namespace: "ns",
 | |
| 				},
 | |
| 				DeleteOptions: &metav1.DeleteOptions{GracePeriodSeconds: &zero},
 | |
| 			})
 | |
| 		}
 | |
| 	}
 | |
| 	createNode2MirrorPodEviction := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			zero := int64(0)
 | |
| 			return client.PolicyV1().Evictions("ns").Evict(context.TODO(), &policy.Eviction{
 | |
| 				TypeMeta: metav1.TypeMeta{
 | |
| 					APIVersion: "policy/v1",
 | |
| 					Kind:       "Eviction",
 | |
| 				},
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name:      "node2mirrorpod",
 | |
| 					Namespace: "ns",
 | |
| 				},
 | |
| 				DeleteOptions: &metav1.DeleteOptions{GracePeriodSeconds: &zero},
 | |
| 			})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	capacity := 50
 | |
| 	updatePVCCapacity := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			capacity++
 | |
| 			statusString := fmt.Sprintf("{\"status\": {\"capacity\": {\"storage\": \"%dG\"}}}", capacity)
 | |
| 			patchBytes := []byte(statusString)
 | |
| 			_, err := client.CoreV1().PersistentVolumeClaims("ns").Patch(context.TODO(), "mypvc", types.StrategicMergePatchType, patchBytes, metav1.PatchOptions{}, "status")
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	updatePVCPhase := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			patchBytes := []byte(`{"status":{"phase": "Bound"}}`)
 | |
| 			_, err := client.CoreV1().PersistentVolumeClaims("ns").Patch(context.TODO(), "mypvc", types.StrategicMergePatchType, patchBytes, metav1.PatchOptions{}, "status")
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	getNode1Lease := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Get(context.TODO(), "node1", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	node1LeaseDurationSeconds := int32(40)
 | |
| 	createNode1Lease := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			lease := &coordination.Lease{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name: "node1",
 | |
| 				},
 | |
| 				Spec: coordination.LeaseSpec{
 | |
| 					HolderIdentity:       pointer.StringPtr("node1"),
 | |
| 					LeaseDurationSeconds: pointer.Int32Ptr(node1LeaseDurationSeconds),
 | |
| 					RenewTime:            &metav1.MicroTime{Time: time.Now()},
 | |
| 				},
 | |
| 			}
 | |
| 			_, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Create(context.TODO(), lease, metav1.CreateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	updateNode1Lease := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			lease, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Get(context.TODO(), "node1", metav1.GetOptions{})
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			lease.Spec.RenewTime = &metav1.MicroTime{Time: time.Now()}
 | |
| 			_, err = client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Update(context.TODO(), lease, metav1.UpdateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	patchNode1Lease := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			node1LeaseDurationSeconds++
 | |
| 			bs := []byte(fmt.Sprintf(`{"spec": {"leaseDurationSeconds": %d}}`, node1LeaseDurationSeconds))
 | |
| 			_, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Patch(context.TODO(), "node1", types.StrategicMergePatchType, bs, metav1.PatchOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	deleteNode1Lease := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			return client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Delete(context.TODO(), "node1", metav1.DeleteOptions{})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	getNode1CSINode := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			_, err := client.StorageV1().CSINodes().Get(context.TODO(), "node1", metav1.GetOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	createNode1CSINode := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			nodeInfo := &storagev1.CSINode{
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Name: "node1",
 | |
| 				},
 | |
| 				Spec: storagev1.CSINodeSpec{
 | |
| 					Drivers: []storagev1.CSINodeDriver{
 | |
| 						{
 | |
| 							Name:         "com.example.csi.driver1",
 | |
| 							NodeID:       "com.example.csi/node1",
 | |
| 							TopologyKeys: []string{"com.example.csi/zone"},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			}
 | |
| 			_, err := client.StorageV1().CSINodes().Create(context.TODO(), nodeInfo, metav1.CreateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	updateNode1CSINode := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			nodeInfo, err := client.StorageV1().CSINodes().Get(context.TODO(), "node1", metav1.GetOptions{})
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			nodeInfo.Spec.Drivers = []storagev1.CSINodeDriver{
 | |
| 				{
 | |
| 					Name:         "com.example.csi.driver2",
 | |
| 					NodeID:       "com.example.csi/node1",
 | |
| 					TopologyKeys: []string{"com.example.csi/rack"},
 | |
| 				},
 | |
| 			}
 | |
| 			_, err = client.StorageV1().CSINodes().Update(context.TODO(), nodeInfo, metav1.UpdateOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	patchNode1CSINode := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			bs := []byte(fmt.Sprintf(`{"csiDrivers": [ { "driver": "net.example.storage.driver2", "nodeID": "net.example.storage/node1", "topologyKeys": [ "net.example.storage/region" ] } ] }`))
 | |
| 			// StrategicMergePatch is unsupported by CRs. Falling back to MergePatch
 | |
| 			_, err := client.StorageV1().CSINodes().Patch(context.TODO(), "node1", types.MergePatchType, bs, metav1.PatchOptions{})
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 	deleteNode1CSINode := func(client clientset.Interface) func() error {
 | |
| 		return func() error {
 | |
| 			return client.StorageV1().CSINodes().Delete(context.TODO(), "node1", metav1.DeleteOptions{})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	nodeanonClient, _ := clientsetForToken(tokenNodeUnknown, clientConfig)
 | |
| 	node1Client, node1ClientExternal := clientsetForToken(tokenNode1, clientConfig)
 | |
| 	node2Client, node2ClientExternal := clientsetForToken(tokenNode2, clientConfig)
 | |
| 	_, csiNode1Client := clientsetForToken(tokenNode1, clientConfig)
 | |
| 	_, csiNode2Client := clientsetForToken(tokenNode2, clientConfig)
 | |
| 
 | |
| 	// all node requests from node1 and unknown node fail
 | |
| 	expectForbidden(t, getSecret(nodeanonClient))
 | |
| 	expectForbidden(t, getPVSecret(nodeanonClient))
 | |
| 	expectForbidden(t, getConfigMap(nodeanonClient))
 | |
| 	expectForbidden(t, getPVC(nodeanonClient))
 | |
| 	expectForbidden(t, getPV(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2NormalPod(nodeanonClient))
 | |
| 	expectForbidden(t, deleteNode2NormalPod(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2MirrorPodEviction(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2(nodeanonClient))
 | |
| 	expectForbidden(t, updateNode2Status(nodeanonClient))
 | |
| 	expectForbidden(t, deleteNode2(nodeanonClient))
 | |
| 
 | |
| 	expectForbidden(t, getSecret(node1Client))
 | |
| 	expectForbidden(t, getPVSecret(node1Client))
 | |
| 	expectForbidden(t, getConfigMap(node1Client))
 | |
| 	expectForbidden(t, getPVC(node1Client))
 | |
| 	expectForbidden(t, getPV(node1Client))
 | |
| 	expectForbidden(t, createNode2NormalPod(nodeanonClient))
 | |
| 	expectNotFound(t, createNode2MirrorPodEviction(node1Client))
 | |
| 	expectForbidden(t, createNode2(node1Client))
 | |
| 	expectNotFound(t, updateNode2Status(node1Client))
 | |
| 	expectForbidden(t, deleteNode2(node1Client))
 | |
| 
 | |
| 	// related object requests from node2 fail
 | |
| 	expectForbidden(t, getSecret(node2Client))
 | |
| 	expectForbidden(t, getPVSecret(node2Client))
 | |
| 	expectForbidden(t, getConfigMap(node2Client))
 | |
| 	expectForbidden(t, getPVC(node2Client))
 | |
| 	expectForbidden(t, getPV(node2Client))
 | |
| 
 | |
| 	expectForbidden(t, createNode2NormalPod(nodeanonClient))
 | |
| 	// mirror pod and self node lifecycle is allowed
 | |
| 	expectAllowed(t, createNode2(node2Client))
 | |
| 	expectAllowed(t, updateNode2Status(node2Client))
 | |
| 	expectForbidden(t, createNode2MirrorPod(nodeanonClient))
 | |
| 	expectForbidden(t, deleteNode2MirrorPod(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2MirrorPod(node1Client))
 | |
| 	expectNotFound(t, deleteNode2MirrorPod(node1Client))
 | |
| 	// create a pod as an admin to add object references
 | |
| 	expectAllowed(t, createNode2NormalPod(superuserClient))
 | |
| 
 | |
| 	expectAllowed(t, createNode2MirrorPod(node2Client))
 | |
| 	expectAllowed(t, deleteNode2MirrorPod(node2Client))
 | |
| 	expectAllowed(t, createNode2MirrorPod(node2Client))
 | |
| 	expectAllowed(t, createNode2MirrorPodEviction(node2Client))
 | |
| 	// self deletion is not allowed
 | |
| 	expectForbidden(t, deleteNode2(node2Client))
 | |
| 	// modification of another node's status is not allowed
 | |
| 	expectForbidden(t, updateNode2Status(node1Client))
 | |
| 
 | |
| 	// unidentifiable node and node1 are still forbidden
 | |
| 	expectForbidden(t, getSecret(nodeanonClient))
 | |
| 	expectForbidden(t, getPVSecret(nodeanonClient))
 | |
| 	expectForbidden(t, getConfigMap(nodeanonClient))
 | |
| 	expectForbidden(t, getPVC(nodeanonClient))
 | |
| 	expectForbidden(t, getPV(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2NormalPod(nodeanonClient))
 | |
| 	expectForbidden(t, updateNode2NormalPodStatus(nodeanonClient))
 | |
| 	expectForbidden(t, deleteNode2NormalPod(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2NormalPodEviction(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2MirrorPod(nodeanonClient))
 | |
| 	expectForbidden(t, deleteNode2MirrorPod(nodeanonClient))
 | |
| 	expectForbidden(t, createNode2MirrorPodEviction(nodeanonClient))
 | |
| 
 | |
| 	expectForbidden(t, getSecret(node1Client))
 | |
| 	expectForbidden(t, getPVSecret(node1Client))
 | |
| 	expectForbidden(t, getConfigMap(node1Client))
 | |
| 	expectForbidden(t, getPVC(node1Client))
 | |
| 	expectForbidden(t, getPV(node1Client))
 | |
| 	expectForbidden(t, createNode2NormalPod(node1Client))
 | |
| 	expectForbidden(t, updateNode2NormalPodStatus(node1Client))
 | |
| 	expectForbidden(t, deleteNode2NormalPod(node1Client))
 | |
| 	expectForbidden(t, createNode2NormalPodEviction(node1Client))
 | |
| 	expectForbidden(t, createNode2MirrorPod(node1Client))
 | |
| 	expectNotFound(t, deleteNode2MirrorPod(node1Client))
 | |
| 	expectNotFound(t, createNode2MirrorPodEviction(node1Client))
 | |
| 
 | |
| 	// node2 can get referenced objects now
 | |
| 	expectAllowed(t, getSecret(node2Client))
 | |
| 	expectAllowed(t, getPVSecret(node2Client))
 | |
| 	expectAllowed(t, getConfigMap(node2Client))
 | |
| 	expectAllowed(t, getPVC(node2Client))
 | |
| 	expectAllowed(t, getPV(node2Client))
 | |
| 
 | |
| 	expectForbidden(t, createNode2NormalPod(node2Client))
 | |
| 	expectAllowed(t, updateNode2NormalPodStatus(node2Client))
 | |
| 	expectAllowed(t, deleteNode2NormalPod(node2Client))
 | |
| 	expectAllowed(t, createNode2MirrorPod(node2Client))
 | |
| 	expectAllowed(t, deleteNode2MirrorPod(node2Client))
 | |
| 
 | |
| 	// recreate as an admin to test eviction
 | |
| 	expectAllowed(t, createNode2NormalPod(superuserClient))
 | |
| 	expectAllowed(t, createNode2MirrorPod(superuserClient))
 | |
| 	expectAllowed(t, createNode2NormalPodEviction(node2Client))
 | |
| 	expectAllowed(t, createNode2MirrorPodEviction(node2Client))
 | |
| 	// clean up node2
 | |
| 	expectAllowed(t, deleteNode2(superuserClient))
 | |
| 
 | |
| 	// re-create a pod as an admin to add object references
 | |
| 	expectAllowed(t, createNode2NormalPod(superuserClient))
 | |
| 
 | |
| 	// ExpandPersistentVolumes feature disabled
 | |
| 	defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ExpandPersistentVolumes, false)()
 | |
| 	expectForbidden(t, updatePVCCapacity(node1Client))
 | |
| 	expectForbidden(t, updatePVCCapacity(node2Client))
 | |
| 
 | |
| 	// ExpandPersistentVolumes feature enabled
 | |
| 	defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ExpandPersistentVolumes, true)()
 | |
| 	expectForbidden(t, updatePVCCapacity(node1Client))
 | |
| 	expectAllowed(t, updatePVCCapacity(node2Client))
 | |
| 	expectForbidden(t, updatePVCPhase(node2Client))
 | |
| 
 | |
| 	// Enabled CSIPersistentVolume feature
 | |
| 	expectForbidden(t, getVolumeAttachment(node1ClientExternal))
 | |
| 	expectAllowed(t, getVolumeAttachment(node2ClientExternal))
 | |
| 
 | |
| 	// create node2 again
 | |
| 	expectAllowed(t, createNode2(node2Client))
 | |
| 	// node2 can not set its own config source
 | |
| 	expectForbidden(t, setNode2ConfigSource(node2Client))
 | |
| 	// node2 can not access the configmap config source yet
 | |
| 	expectForbidden(t, getConfigMapConfigSource(node2Client))
 | |
| 	// superuser can access the configmap config source
 | |
| 	expectAllowed(t, getConfigMapConfigSource(superuserClient))
 | |
| 	// superuser can set node2's config source
 | |
| 	expectAllowed(t, setNode2ConfigSource(superuserClient))
 | |
| 	// node2 can now get the configmap assigned as its config source
 | |
| 	expectAllowed(t, getConfigMapConfigSource(node2Client))
 | |
| 	// superuser can unset node2's config source
 | |
| 	expectAllowed(t, unsetNode2ConfigSource(superuserClient))
 | |
| 	// node2 can no longer get the configmap after it is unassigned as its config source
 | |
| 	expectForbidden(t, getConfigMapConfigSource(node2Client))
 | |
| 	// clean up node2
 | |
| 	expectAllowed(t, deleteNode2(superuserClient))
 | |
| 
 | |
| 	//TODO(mikedanese): integration test node restriction of TokenRequest
 | |
| 
 | |
| 	// node1 allowed to operate on its own lease
 | |
| 	expectAllowed(t, createNode1Lease(node1Client))
 | |
| 	expectAllowed(t, getNode1Lease(node1Client))
 | |
| 	expectAllowed(t, updateNode1Lease(node1Client))
 | |
| 	expectAllowed(t, patchNode1Lease(node1Client))
 | |
| 	expectAllowed(t, deleteNode1Lease(node1Client))
 | |
| 	// node2 not allowed to operate on another node's lease
 | |
| 	expectForbidden(t, createNode1Lease(node2Client))
 | |
| 	expectForbidden(t, getNode1Lease(node2Client))
 | |
| 	expectForbidden(t, updateNode1Lease(node2Client))
 | |
| 	expectForbidden(t, patchNode1Lease(node2Client))
 | |
| 	expectForbidden(t, deleteNode1Lease(node2Client))
 | |
| 
 | |
| 	// node1 allowed to operate on its own CSINode
 | |
| 	expectAllowed(t, createNode1CSINode(csiNode1Client))
 | |
| 	expectAllowed(t, getNode1CSINode(csiNode1Client))
 | |
| 	expectAllowed(t, updateNode1CSINode(csiNode1Client))
 | |
| 	expectAllowed(t, patchNode1CSINode(csiNode1Client))
 | |
| 	expectAllowed(t, deleteNode1CSINode(csiNode1Client))
 | |
| 	// node2 not allowed to operate on another node's CSINode
 | |
| 	expectForbidden(t, createNode1CSINode(csiNode2Client))
 | |
| 	expectForbidden(t, getNode1CSINode(csiNode2Client))
 | |
| 	expectForbidden(t, updateNode1CSINode(csiNode2Client))
 | |
| 	expectForbidden(t, patchNode1CSINode(csiNode2Client))
 | |
| 	expectForbidden(t, deleteNode1CSINode(csiNode2Client))
 | |
| }
 | |
| 
 | |
| // expect executes a function a set number of times until it either returns the
 | |
| // expected error or executes too many times. It returns if the retries timed
 | |
| // out and the last error returned by the method.
 | |
| func expect(t *testing.T, f func() error, wantErr func(error) bool) (timeout bool, lastErr error) {
 | |
| 	t.Helper()
 | |
| 	err := wait.PollImmediate(time.Second, 30*time.Second, func() (bool, error) {
 | |
| 		t.Helper()
 | |
| 		lastErr = f()
 | |
| 		if wantErr(lastErr) {
 | |
| 			return true, nil
 | |
| 		}
 | |
| 		t.Logf("unexpected response, will retry: %v", lastErr)
 | |
| 		return false, nil
 | |
| 	})
 | |
| 	return err == nil, lastErr
 | |
| }
 | |
| 
 | |
| func expectForbidden(t *testing.T, f func() error) {
 | |
| 	t.Helper()
 | |
| 	if ok, err := expect(t, f, apierrors.IsForbidden); !ok {
 | |
| 		t.Errorf("Expected forbidden error, got %v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func expectNotFound(t *testing.T, f func() error) {
 | |
| 	t.Helper()
 | |
| 	if ok, err := expect(t, f, apierrors.IsNotFound); !ok {
 | |
| 		t.Errorf("Expected notfound error, got %v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func expectAllowed(t *testing.T, f func() error) {
 | |
| 	t.Helper()
 | |
| 	if ok, err := expect(t, f, func(e error) bool { return e == nil }); !ok {
 | |
| 		t.Errorf("Expected no error, got %v", err)
 | |
| 	}
 | |
| }
 | 
