123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334 |
- /*
- Copyright 2014 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package securitycontext
- import (
- "fmt"
- "reflect"
- "strconv"
- "testing"
- dockercontainer "github.com/docker/engine-api/types/container"
- "k8s.io/kubernetes/pkg/api"
- apitesting "k8s.io/kubernetes/pkg/api/testing"
- )
- func TestModifyContainerConfig(t *testing.T) {
- var uid int64 = 123
- var overrideUid int64 = 321
- cases := []struct {
- name string
- podSc *api.PodSecurityContext
- sc *api.SecurityContext
- expected *dockercontainer.Config
- }{
- {
- name: "container.SecurityContext.RunAsUser set",
- sc: &api.SecurityContext{
- RunAsUser: &uid,
- },
- expected: &dockercontainer.Config{
- User: strconv.FormatInt(uid, 10),
- },
- },
- {
- name: "no RunAsUser value set",
- sc: &api.SecurityContext{},
- expected: &dockercontainer.Config{},
- },
- {
- name: "pod.Spec.SecurityContext.RunAsUser set",
- podSc: &api.PodSecurityContext{
- RunAsUser: &uid,
- },
- expected: &dockercontainer.Config{
- User: strconv.FormatInt(uid, 10),
- },
- },
- {
- name: "container.SecurityContext.RunAsUser overrides pod.Spec.SecurityContext.RunAsUser",
- podSc: &api.PodSecurityContext{
- RunAsUser: &uid,
- },
- sc: &api.SecurityContext{
- RunAsUser: &overrideUid,
- },
- expected: &dockercontainer.Config{
- User: strconv.FormatInt(overrideUid, 10),
- },
- },
- }
- provider := NewSimpleSecurityContextProvider()
- dummyContainer := &api.Container{}
- for _, tc := range cases {
- pod := &api.Pod{Spec: api.PodSpec{SecurityContext: tc.podSc}}
- dummyContainer.SecurityContext = tc.sc
- dockerCfg := &dockercontainer.Config{}
- provider.ModifyContainerConfig(pod, dummyContainer, dockerCfg)
- if e, a := tc.expected, dockerCfg; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: unexpected modification of docker config\nExpected:\n\n%#v\n\nGot:\n\n%#v", tc.name, e, a)
- }
- }
- }
- func TestModifyHostConfig(t *testing.T) {
- priv := true
- setPrivSC := &api.SecurityContext{}
- setPrivSC.Privileged = &priv
- setPrivHC := &dockercontainer.HostConfig{
- Privileged: true,
- }
- setCapsHC := &dockercontainer.HostConfig{
- CapAdd: []string{"addCapA", "addCapB"},
- CapDrop: []string{"dropCapA", "dropCapB"},
- }
- setSELinuxHC := &dockercontainer.HostConfig{}
- setSELinuxHC.SecurityOpt = []string{
- fmt.Sprintf("%s:%s", dockerLabelUser, "user"),
- fmt.Sprintf("%s:%s", dockerLabelRole, "role"),
- fmt.Sprintf("%s:%s", dockerLabelType, "type"),
- fmt.Sprintf("%s:%s", dockerLabelLevel, "level"),
- }
- // seLinuxLabelsSC := fullValidSecurityContext()
- // seLinuxLabelsHC := fullValidHostConfig()
- cases := []struct {
- name string
- podSc *api.PodSecurityContext
- sc *api.SecurityContext
- expected *dockercontainer.HostConfig
- }{
- {
- name: "fully set container.SecurityContext",
- sc: fullValidSecurityContext(),
- expected: fullValidHostConfig(),
- },
- {
- name: "container.SecurityContext.Privileged",
- sc: setPrivSC,
- expected: setPrivHC,
- },
- {
- name: "container.SecurityContext.Capabilities",
- sc: &api.SecurityContext{
- Capabilities: inputCapabilities(),
- },
- expected: setCapsHC,
- },
- {
- name: "container.SecurityContext.SELinuxOptions",
- sc: &api.SecurityContext{
- SELinuxOptions: inputSELinuxOptions(),
- },
- expected: setSELinuxHC,
- },
- {
- name: "pod.Spec.SecurityContext.SELinuxOptions",
- podSc: &api.PodSecurityContext{
- SELinuxOptions: inputSELinuxOptions(),
- },
- expected: setSELinuxHC,
- },
- {
- name: "container.SecurityContext overrides pod.Spec.SecurityContext",
- podSc: overridePodSecurityContext(),
- sc: fullValidSecurityContext(),
- expected: fullValidHostConfig(),
- },
- }
- provider := NewSimpleSecurityContextProvider()
- dummyContainer := &api.Container{}
- for _, tc := range cases {
- pod := &api.Pod{Spec: api.PodSpec{SecurityContext: tc.podSc}}
- dummyContainer.SecurityContext = tc.sc
- dockerCfg := &dockercontainer.HostConfig{}
- provider.ModifyHostConfig(pod, dummyContainer, dockerCfg, nil)
- if e, a := tc.expected, dockerCfg; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: unexpected modification of host config\nExpected:\n\n%#v\n\nGot:\n\n%#v", tc.name, e, a)
- }
- }
- }
- func TestModifyHostConfigPodSecurityContext(t *testing.T) {
- supplementalGroupsSC := &api.PodSecurityContext{}
- supplementalGroupsSC.SupplementalGroups = []int64{2222}
- supplementalGroupHC := fullValidHostConfig()
- supplementalGroupHC.GroupAdd = []string{"2222"}
- fsGroupHC := fullValidHostConfig()
- fsGroupHC.GroupAdd = []string{"1234"}
- extraSupplementalGroupHC := fullValidHostConfig()
- extraSupplementalGroupHC.GroupAdd = []string{"1234"}
- bothHC := fullValidHostConfig()
- bothHC.GroupAdd = []string{"2222", "1234"}
- fsGroup := int64(1234)
- extraSupplementalGroup := []int64{1234}
- testCases := map[string]struct {
- securityContext *api.PodSecurityContext
- expected *dockercontainer.HostConfig
- extraSupplementalGroups []int64
- }{
- "nil": {
- securityContext: nil,
- expected: fullValidHostConfig(),
- extraSupplementalGroups: nil,
- },
- "SupplementalGroup": {
- securityContext: supplementalGroupsSC,
- expected: supplementalGroupHC,
- extraSupplementalGroups: nil,
- },
- "FSGroup": {
- securityContext: &api.PodSecurityContext{FSGroup: &fsGroup},
- expected: fsGroupHC,
- extraSupplementalGroups: nil,
- },
- "FSGroup + SupplementalGroups": {
- securityContext: &api.PodSecurityContext{
- SupplementalGroups: []int64{2222},
- FSGroup: &fsGroup,
- },
- expected: bothHC,
- extraSupplementalGroups: nil,
- },
- "ExtraSupplementalGroup": {
- securityContext: nil,
- expected: extraSupplementalGroupHC,
- extraSupplementalGroups: extraSupplementalGroup,
- },
- "ExtraSupplementalGroup + SupplementalGroups": {
- securityContext: supplementalGroupsSC,
- expected: bothHC,
- extraSupplementalGroups: extraSupplementalGroup,
- },
- }
- provider := NewSimpleSecurityContextProvider()
- dummyContainer := &api.Container{}
- dummyContainer.SecurityContext = fullValidSecurityContext()
- dummyPod := &api.Pod{
- Spec: apitesting.DeepEqualSafePodSpec(),
- }
- for k, v := range testCases {
- dummyPod.Spec.SecurityContext = v.securityContext
- dockerCfg := &dockercontainer.HostConfig{}
- provider.ModifyHostConfig(dummyPod, dummyContainer, dockerCfg, v.extraSupplementalGroups)
- if !reflect.DeepEqual(v.expected, dockerCfg) {
- t.Errorf("unexpected modification of host config for %s. Expected: %#v Got: %#v", k, v.expected, dockerCfg)
- }
- }
- }
- func TestModifySecurityOption(t *testing.T) {
- testCases := []struct {
- name string
- config []string
- optName string
- optVal string
- expected []string
- }{
- {
- name: "Empty val",
- config: []string{"a:b", "c:d"},
- optName: "optA",
- optVal: "",
- expected: []string{"a:b", "c:d"},
- },
- {
- name: "Valid",
- config: []string{"a:b", "c:d"},
- optName: "e",
- optVal: "f",
- expected: []string{"a:b", "c:d", "e:f"},
- },
- }
- for _, tc := range testCases {
- actual := modifySecurityOption(tc.config, tc.optName, tc.optVal)
- if !reflect.DeepEqual(tc.expected, actual) {
- t.Errorf("Failed to apply options correctly for tc: %s. Expected: %v but got %v", tc.name, tc.expected, actual)
- }
- }
- }
- func overridePodSecurityContext() *api.PodSecurityContext {
- return &api.PodSecurityContext{
- SELinuxOptions: &api.SELinuxOptions{
- User: "user2",
- Role: "role2",
- Type: "type2",
- Level: "level2",
- },
- }
- }
- func fullValidPodSecurityContext() *api.PodSecurityContext {
- return &api.PodSecurityContext{
- SELinuxOptions: inputSELinuxOptions(),
- }
- }
- func fullValidSecurityContext() *api.SecurityContext {
- priv := true
- return &api.SecurityContext{
- Privileged: &priv,
- Capabilities: inputCapabilities(),
- SELinuxOptions: inputSELinuxOptions(),
- }
- }
- func inputCapabilities() *api.Capabilities {
- return &api.Capabilities{
- Add: []api.Capability{"addCapA", "addCapB"},
- Drop: []api.Capability{"dropCapA", "dropCapB"},
- }
- }
- func inputSELinuxOptions() *api.SELinuxOptions {
- return &api.SELinuxOptions{
- User: "user",
- Role: "role",
- Type: "type",
- Level: "level",
- }
- }
- func fullValidHostConfig() *dockercontainer.HostConfig {
- return &dockercontainer.HostConfig{
- Privileged: true,
- CapAdd: []string{"addCapA", "addCapB"},
- CapDrop: []string{"dropCapA", "dropCapB"},
- SecurityOpt: []string{
- fmt.Sprintf("%s:%s", dockerLabelUser, "user"),
- fmt.Sprintf("%s:%s", dockerLabelRole, "role"),
- fmt.Sprintf("%s:%s", dockerLabelType, "type"),
- fmt.Sprintf("%s:%s", dockerLabelLevel, "level"),
- },
- }
- }
|