Merge pull request #129178 from liggitt/automated-cherry-pick-of-#129059-upstream-release-1.32

Automated cherry pick of #129059: Isolate mock signer for externaljwt tests
This commit is contained in:
Kubernetes Prow Robot 2025-01-07 16:28:28 +01:00 committed by GitHub
commit a40d8d675f
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 29 additions and 24 deletions

View File

@ -345,15 +345,10 @@ func TestCompleteForServiceAccount(t *testing.T) {
t.Fatalf("Failed to encode private key: %v", err) t.Fatalf("Failed to encode private key: %v", err)
} }
// create and start mock signer.
socketPath := "@mock-external-jwt-signer.sock"
mockSigner := v1alpha1testing.NewMockSigner(t, socketPath)
defer mockSigner.CleanUp()
testCases := []struct { testCases := []struct {
desc string desc string
issuers []string issuers []string
signingEndpoint string externalSigner bool
signingKeyFiles string signingKeyFiles string
maxExpiration time.Duration maxExpiration time.Duration
externalMaxExpirationSec int64 externalMaxExpirationSec int64
@ -366,11 +361,11 @@ func TestCompleteForServiceAccount(t *testing.T) {
externalPublicKeyGetterPresent bool externalPublicKeyGetterPresent bool
}{ }{
{ {
desc: "no endpoint or key file", desc: "endpoint and key file",
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: socketPath, externalSigner: true,
signingKeyFiles: "private_key.pem", signingKeyFiles: "private_key.pem",
maxExpiration: time.Second * 3600, maxExpiration: time.Second * 3600,
@ -381,7 +376,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: socketPath, externalSigner: true,
signingKeyFiles: "private_key.pem", signingKeyFiles: "private_key.pem",
maxExpiration: time.Second * 10, maxExpiration: time.Second * 10,
@ -392,7 +387,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: "", externalSigner: false,
signingKeyFiles: "private_key.pem", signingKeyFiles: "private_key.pem",
maxExpiration: time.Second * 3600, maxExpiration: time.Second * 3600,
@ -405,7 +400,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: socketPath, externalSigner: true,
signingKeyFiles: "", signingKeyFiles: "",
maxExpiration: 0, maxExpiration: 0,
externalMaxExpirationSec: 600, // 10m externalMaxExpirationSec: 600, // 10m
@ -419,7 +414,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: socketPath, externalSigner: true,
signingKeyFiles: "", signingKeyFiles: "",
maxExpiration: time.Second * 3600, maxExpiration: time.Second * 3600,
externalMaxExpirationSec: 600, // 10m externalMaxExpirationSec: 600, // 10m
@ -431,7 +426,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: socketPath, externalSigner: true,
signingKeyFiles: "", signingKeyFiles: "",
maxExpiration: 0, maxExpiration: 0,
externalMaxExpirationSec: 300, // 5m externalMaxExpirationSec: 300, // 5m
@ -443,7 +438,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: socketPath, externalSigner: true,
signingKeyFiles: "", signingKeyFiles: "",
maxExpiration: 0, maxExpiration: 0,
externalMaxExpirationSec: 900, // 15m externalMaxExpirationSec: 900, // 15m
@ -456,7 +451,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
issuers: []string{ issuers: []string{
"iss", "iss",
}, },
signingEndpoint: socketPath, externalSigner: true,
signingKeyFiles: "", signingKeyFiles: "",
maxExpiration: 0, maxExpiration: 0,
externalMaxExpirationSec: 900, // 15m externalMaxExpirationSec: 900, // 15m
@ -468,8 +463,20 @@ func TestCompleteForServiceAccount(t *testing.T) {
for _, tc := range testCases { for _, tc := range testCases {
t.Run(tc.desc, func(t *testing.T) { t.Run(tc.desc, func(t *testing.T) {
options := NewOptions() options := NewOptions()
options.ServiceAccountSigningEndpoint = tc.signingEndpoint if tc.externalSigner {
// create and start mock signer.
socketPath := fmt.Sprintf("@mock-external-jwt-signer-%d.sock", time.Now().Nanosecond())
mockSigner := v1alpha1testing.NewMockSigner(t, socketPath)
defer mockSigner.CleanUp()
mockSigner.MaxTokenExpirationSeconds = tc.externalMaxExpirationSec
mockSigner.MetadataError = tc.metadataError
mockSigner.FetchError = tc.fetchError
options.ServiceAccountSigningEndpoint = socketPath
}
options.ServiceAccountSigningKeyFile = tc.signingKeyFiles options.ServiceAccountSigningKeyFile = tc.signingKeyFiles
options.Authentication = &kubeoptions.BuiltInAuthenticationOptions{ options.Authentication = &kubeoptions.BuiltInAuthenticationOptions{
ServiceAccounts: &kubeoptions.ServiceAccountAuthenticationOptions{ ServiceAccounts: &kubeoptions.ServiceAccountAuthenticationOptions{
@ -478,16 +485,13 @@ func TestCompleteForServiceAccount(t *testing.T) {
}, },
} }
_ = mockSigner.Reset()
mockSigner.MaxTokenExpirationSeconds = tc.externalMaxExpirationSec
mockSigner.MetadataError = tc.metadataError
mockSigner.FetchError = tc.fetchError
co := completedOptions{ co := completedOptions{
Options: *options, Options: *options,
} }
err := options.completeServiceAccountOptions(context.Background(), &co) ctx, cancel := context.WithCancel(context.Background())
defer cancel()
err := options.completeServiceAccountOptions(ctx, &co)
if tc.wantError != nil { if tc.wantError != nil {
if err == nil || tc.wantError.Error() != err.Error() { if err == nil || tc.wantError.Error() != err.Error() {

View File

@ -24,6 +24,7 @@ import (
"crypto/x509" "crypto/x509"
"encoding/base64" "encoding/base64"
"encoding/json" "encoding/json"
"errors"
"fmt" "fmt"
"net" "net"
"os" "os"
@ -225,7 +226,7 @@ func (m *MockSigner) start(t *testing.T) error {
klog.Infof("Starting Mock Signer at socketPath %s", m.socketPath) klog.Infof("Starting Mock Signer at socketPath %s", m.socketPath)
go func() { go func() {
if err := m.server.Serve(m.listener); err != nil { if err := m.server.Serve(m.listener); err != nil && !errors.Is(err, grpc.ErrServerStopped) {
t.Error(err) t.Error(err)
} }
}() }()
@ -264,7 +265,7 @@ func (m *MockSigner) waitForMockServerToStart() error {
// CleanUp stops gRPC server and the underlying listener. // CleanUp stops gRPC server and the underlying listener.
func (m *MockSigner) CleanUp() { func (m *MockSigner) CleanUp() {
m.server.Stop() m.server.GracefulStop()
_ = m.listener.Close() _ = m.listener.Close()
_ = os.Remove(m.socketPath) _ = os.Remove(m.socketPath)
} }