mirror of
https://github.com/kata-containers/kata-containers.git
synced 2025-07-11 22:28:06 +00:00
Introduce new test case to the security context bats file which verifies that policy works properly for a deployment yaml containing fsGroup and supplementalGroup configuration. Signed-off-by: Cameron Baird <cameronbaird@microsoft.com>
129 lines
5.4 KiB
Bash
129 lines
5.4 KiB
Bash
#!/usr/bin/env bats
|
|
#
|
|
# Copyright (c) 2024 Microsoft.
|
|
#
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
#
|
|
|
|
load "${BATS_TEST_DIRNAME}/../../common.bash"
|
|
load "${BATS_TEST_DIRNAME}/tests_common.sh"
|
|
|
|
setup() {
|
|
auto_generate_policy_enabled || skip "Auto-generated policy tests are disabled."
|
|
|
|
get_pod_config_dir
|
|
|
|
deployment_name="policy-redis-deployment"
|
|
pod_sc_deployment_yaml="${pod_config_dir}/k8s-pod-sc-deployment.yaml"
|
|
pod_sc_deployment_supplementalgroups_yaml="${pod_config_dir}/k8s-pod-sc-supplementalgroups-deployment.yaml"
|
|
pod_sc_nobodyupdate_deployment_yaml="${pod_config_dir}/k8s-pod-sc-nobodyupdate-deployment.yaml"
|
|
pod_sc_layered_deployment_yaml="${pod_config_dir}/k8s-layered-sc-deployment.yaml"
|
|
|
|
# Save some time by executing genpolicy a single time.
|
|
if [ "${BATS_TEST_NUMBER}" == "1" ]; then
|
|
# Add an appropriate policy to the correct YAML file.
|
|
policy_settings_dir="$(create_tmp_policy_settings_dir "${pod_config_dir}")"
|
|
add_requests_to_policy_settings "${policy_settings_dir}" "ReadStreamRequest"
|
|
auto_generate_policy "${policy_settings_dir}" "${pod_sc_deployment_yaml}"
|
|
auto_generate_policy "${policy_settings_dir}" "${pod_sc_deployment_supplementalgroups_yaml}"
|
|
auto_generate_policy "${policy_settings_dir}" "${pod_sc_nobodyupdate_deployment_yaml}"
|
|
auto_generate_policy "${policy_settings_dir}" "${pod_sc_layered_deployment_yaml}"
|
|
fi
|
|
|
|
# Start each test case with a copy of the correct yaml file.
|
|
incorrect_deployment_yaml="${pod_config_dir}/k8s-layered-sc-deployment-incorrect.yaml"
|
|
incorrect_deployment_yaml_supplementalgroups="${pod_config_dir}/k8s-layered-sc-deployment-incorrect-supplementalgroups.yaml"
|
|
cp "${pod_sc_layered_deployment_yaml}" "${incorrect_deployment_yaml}"
|
|
cp "${pod_sc_deployment_supplementalgroups_yaml}" "${incorrect_deployment_yaml_supplementalgroups}"
|
|
}
|
|
|
|
@test "Successful sc deployment with auto-generated policy and container image volumes" {
|
|
# Initiate deployment
|
|
kubectl apply -f "${pod_sc_deployment_yaml}"
|
|
|
|
# Wait for the deployment to be created
|
|
cmd="kubectl rollout status --timeout=1s deployment/${deployment_name} | grep 'successfully rolled out'"
|
|
info "Waiting for: ${cmd}"
|
|
waitForProcess "${wait_time}" "${sleep_time}" "${cmd}"
|
|
}
|
|
|
|
@test "Successful sc with fsGroup/supplementalGroup deployment with auto-generated policy and container image volumes" {
|
|
# Initiate deployment
|
|
kubectl apply -f "${pod_sc_deployment_supplementalgroups_yaml}"
|
|
|
|
# Wait for the deployment to be created
|
|
cmd="kubectl rollout status --timeout=1s deployment/${deployment_name} | grep 'successfully rolled out'"
|
|
info "Waiting for: ${cmd}"
|
|
waitForProcess "${wait_time}" "${sleep_time}" "${cmd}"
|
|
}
|
|
|
|
@test "Successful sc deployment with security context choosing another valid user" {
|
|
# Initiate deployment
|
|
kubectl apply -f "${pod_sc_nobodyupdate_deployment_yaml}"
|
|
|
|
# Wait for the deployment to be created
|
|
cmd="kubectl rollout status --timeout=1s deployment/${deployment_name} | grep 'successfully rolled out'"
|
|
info "Waiting for: ${cmd}"
|
|
waitForProcess "${wait_time}" "${sleep_time}" "${cmd}"
|
|
}
|
|
|
|
@test "Successful layered sc deployment with auto-generated policy and container image volumes" {
|
|
# Initiate deployment
|
|
kubectl apply -f "${pod_sc_layered_deployment_yaml}"
|
|
|
|
# Wait for the deployment to be created
|
|
cmd="kubectl rollout status --timeout=1s deployment/${deployment_name} | grep 'successfully rolled out'"
|
|
info "Waiting for: ${cmd}"
|
|
waitForProcess "${wait_time}" "${sleep_time}" "${cmd}"
|
|
}
|
|
|
|
test_deployment_policy_error() {
|
|
local yaml=$1
|
|
|
|
# Initiate deployment
|
|
kubectl apply -f "${yaml}"
|
|
|
|
# Wait for the deployment pod to fail
|
|
wait_for_blocked_request "CreateContainerRequest" "${deployment_name}"
|
|
}
|
|
|
|
@test "Policy failure: unexpected GID = 0 for layered securityContext deployment" {
|
|
# Change the pod GID to 0 after the policy has been generated using a different
|
|
# runAsGroup value. The policy would use GID = 0 by default, if there weren't
|
|
# a different runAsGroup value in the YAML file.
|
|
yq -i \
|
|
'.spec.template.spec.securityContext.runAsGroup = 0' \
|
|
"${incorrect_deployment_yaml}"
|
|
|
|
test_deployment_policy_error "${incorrect_deployment_yaml}"
|
|
}
|
|
|
|
@test "Policy failure: malicious root group added via supplementalGroups deployment" {
|
|
# Inject a supplementalGroup of 0 (root) after the policy has been generated
|
|
yq -i \
|
|
'.spec.template.spec.securityContext.supplementalGroups += 0' \
|
|
"${incorrect_deployment_yaml_supplementalgroups}"
|
|
|
|
test_deployment_policy_error "${incorrect_deployment_yaml_supplementalgroups}"
|
|
}
|
|
|
|
teardown() {
|
|
auto_generate_policy_enabled || skip "Auto-generated policy tests are disabled."
|
|
|
|
# Pod debugging information. Don't print the "Message:" line because it contains a truncated policy log.
|
|
info "Pod ${deployment_name}:"
|
|
kubectl describe pod "${deployment_name}" | grep -v "Message:"
|
|
|
|
# Deployment debugging information. The --watch=false argument makes "kubectl rollout status"
|
|
# return instead of waiting for a possibly failed deployment to complete.
|
|
info "Deployment ${deployment_name}:"
|
|
kubectl describe deployment "${deployment_name}"
|
|
kubectl rollout status deployment/${deployment_name} --watch=false
|
|
|
|
# Clean-up
|
|
kubectl delete deployment "${deployment_name}"
|
|
|
|
delete_tmp_policy_settings_dir "${policy_settings_dir}"
|
|
rm -f "${incorrect_deployment_yaml}"
|
|
}
|