123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package e2e_node
- import (
- "bytes"
- "fmt"
- "io/ioutil"
- "os"
- "os/exec"
- "regexp"
- "strconv"
- "strings"
- "k8s.io/kubernetes/pkg/api"
- "k8s.io/kubernetes/pkg/security/apparmor"
- "k8s.io/kubernetes/test/e2e/framework"
- "github.com/davecgh/go-spew/spew"
- "github.com/golang/glog"
- . "github.com/onsi/ginkgo"
- . "github.com/onsi/gomega"
- )
- var _ = framework.KubeDescribe("AppArmor [Feature:AppArmor]", func() {
- if isAppArmorEnabled() {
- testAppArmorNode()
- } else {
- testNonAppArmorNode()
- }
- })
- func testAppArmorNode() {
- BeforeEach(func() {
- By("Loading AppArmor profiles for testing")
- framework.ExpectNoError(loadTestProfiles(), "Could not load AppArmor test profiles")
- })
- Context("when running with AppArmor", func() {
- f := framework.NewDefaultFramework("apparmor-test")
- It("should reject an unloaded profile", func() {
- status := runAppArmorTest(f, apparmor.ProfileNamePrefix+"non-existant-profile")
- Expect(status.Phase).To(Equal(api.PodFailed), "PodStatus: %+v", status)
- Expect(status.Reason).To(Equal("AppArmor"), "PodStatus: %+v", status)
- })
- It("should enforce a profile blocking writes", func() {
- status := runAppArmorTest(f, apparmor.ProfileNamePrefix+apparmorProfilePrefix+"deny-write")
- if len(status.ContainerStatuses) == 0 {
- framework.Failf("Unexpected pod status: %s", spew.Sdump(status))
- return
- }
- state := status.ContainerStatuses[0].State.Terminated
- Expect(state.ExitCode).To(Not(BeZero()), "ContainerStateTerminated: %+v", state)
- })
- It("should enforce a permissive profile", func() {
- status := runAppArmorTest(f, apparmor.ProfileNamePrefix+apparmorProfilePrefix+"audit-write")
- if len(status.ContainerStatuses) == 0 {
- framework.Failf("Unexpected pod status: %s", spew.Sdump(status))
- return
- }
- state := status.ContainerStatuses[0].State.Terminated
- Expect(state.ExitCode).To(BeZero(), "ContainerStateTerminated: %+v", state)
- })
- })
- }
- func testNonAppArmorNode() {
- Context("when running without AppArmor", func() {
- f := framework.NewDefaultFramework("apparmor-test")
- It("should reject a pod with an AppArmor profile", func() {
- status := runAppArmorTest(f, apparmor.ProfileRuntimeDefault)
- Expect(status.Phase).To(Equal(api.PodFailed), "PodStatus: %+v", status)
- Expect(status.Reason).To(Equal("AppArmor"), "PodStatus: %+v", status)
- })
- })
- }
- const apparmorProfilePrefix = "e2e-node-apparmor-test-"
- const testProfiles = `
- #include <tunables/global>
- profile e2e-node-apparmor-test-deny-write flags=(attach_disconnected) {
- #include <abstractions/base>
- file,
- # Deny all file writes.
- deny /** w,
- }
- profile e2e-node-apparmor-test-audit-write flags=(attach_disconnected) {
- #include <abstractions/base>
- file,
- # Only audit file writes.
- audit /** w,
- }
- `
- func loadTestProfiles() error {
- f, err := ioutil.TempFile("/tmp", "apparmor")
- if err != nil {
- return fmt.Errorf("failed to open temp file: %v", err)
- }
- defer os.Remove(f.Name())
- defer f.Close()
- if _, err := f.WriteString(testProfiles); err != nil {
- return fmt.Errorf("failed to write profiles to file: %v", err)
- }
- cmd := exec.Command("sudo", "apparmor_parser", "-r", "-W", f.Name())
- stderr := &bytes.Buffer{}
- cmd.Stderr = stderr
- out, err := cmd.Output()
- // apparmor_parser does not always return an error code, so consider any stderr output an error.
- if err != nil || stderr.Len() > 0 {
- if stderr.Len() > 0 {
- glog.Warning(stderr.String())
- }
- if len(out) > 0 {
- glog.Infof("apparmor_parser: %s", out)
- }
- return fmt.Errorf("failed to load profiles: %v", err)
- }
- glog.V(2).Infof("Loaded profiles: %v", out)
- return nil
- }
- func runAppArmorTest(f *framework.Framework, profile string) api.PodStatus {
- pod := createPodWithAppArmor(f, profile)
- // The pod needs to start before it stops, so wait for the longer start timeout.
- framework.ExpectNoError(framework.WaitTimeoutForPodNoLongerRunningInNamespace(
- f.Client, pod.Name, f.Namespace.Name, "", framework.PodStartTimeout))
- p, err := f.PodClient().Get(pod.Name)
- framework.ExpectNoError(err)
- return p.Status
- }
- func createPodWithAppArmor(f *framework.Framework, profile string) *api.Pod {
- pod := &api.Pod{
- ObjectMeta: api.ObjectMeta{
- Name: fmt.Sprintf("test-apparmor-%s", strings.Replace(profile, "/", "-", -1)),
- Annotations: map[string]string{
- apparmor.ContainerAnnotationKeyPrefix + "test": profile,
- },
- },
- Spec: api.PodSpec{
- Containers: []api.Container{{
- Name: "test",
- Image: ImageRegistry[busyBoxImage],
- Command: []string{"touch", "foo"},
- }},
- RestartPolicy: api.RestartPolicyNever,
- },
- }
- return f.PodClient().Create(pod)
- }
- func isAppArmorEnabled() bool {
- // TODO(timstclair): Pass this through the image setup rather than hardcoding.
- if strings.Contains(framework.TestContext.NodeName, "-gci-dev-") {
- gciVersionRe := regexp.MustCompile("-gci-dev-([0-9]+)-")
- matches := gciVersionRe.FindStringSubmatch(framework.TestContext.NodeName)
- if len(matches) == 2 {
- version, err := strconv.Atoi(matches[1])
- if err != nil {
- glog.Errorf("Error parsing GCI version from NodeName %q: %v", framework.TestContext.NodeName, err)
- return false
- }
- return version >= 54
- }
- return false
- }
- if strings.Contains(framework.TestContext.NodeName, "-ubuntu-") {
- return true
- }
- return apparmor.IsAppArmorEnabled()
- }
|