mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-26 05:03:09 +00:00
Merge pull request #129178 from liggitt/automated-cherry-pick-of-#129059-upstream-release-1.32
Automated cherry pick of #129059: Isolate mock signer for externaljwt tests
This commit is contained in:
commit
a40d8d675f
@ -345,15 +345,10 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
t.Fatalf("Failed to encode private key: %v", err)
|
t.Fatalf("Failed to encode private key: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// create and start mock signer.
|
|
||||||
socketPath := "@mock-external-jwt-signer.sock"
|
|
||||||
mockSigner := v1alpha1testing.NewMockSigner(t, socketPath)
|
|
||||||
defer mockSigner.CleanUp()
|
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
desc string
|
desc string
|
||||||
issuers []string
|
issuers []string
|
||||||
signingEndpoint string
|
externalSigner bool
|
||||||
signingKeyFiles string
|
signingKeyFiles string
|
||||||
maxExpiration time.Duration
|
maxExpiration time.Duration
|
||||||
externalMaxExpirationSec int64
|
externalMaxExpirationSec int64
|
||||||
@ -366,11 +361,11 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
externalPublicKeyGetterPresent bool
|
externalPublicKeyGetterPresent bool
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
desc: "no endpoint or key file",
|
desc: "endpoint and key file",
|
||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: socketPath,
|
externalSigner: true,
|
||||||
signingKeyFiles: "private_key.pem",
|
signingKeyFiles: "private_key.pem",
|
||||||
maxExpiration: time.Second * 3600,
|
maxExpiration: time.Second * 3600,
|
||||||
|
|
||||||
@ -381,7 +376,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: socketPath,
|
externalSigner: true,
|
||||||
signingKeyFiles: "private_key.pem",
|
signingKeyFiles: "private_key.pem",
|
||||||
maxExpiration: time.Second * 10,
|
maxExpiration: time.Second * 10,
|
||||||
|
|
||||||
@ -392,7 +387,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: "",
|
externalSigner: false,
|
||||||
signingKeyFiles: "private_key.pem",
|
signingKeyFiles: "private_key.pem",
|
||||||
maxExpiration: time.Second * 3600,
|
maxExpiration: time.Second * 3600,
|
||||||
|
|
||||||
@ -405,7 +400,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: socketPath,
|
externalSigner: true,
|
||||||
signingKeyFiles: "",
|
signingKeyFiles: "",
|
||||||
maxExpiration: 0,
|
maxExpiration: 0,
|
||||||
externalMaxExpirationSec: 600, // 10m
|
externalMaxExpirationSec: 600, // 10m
|
||||||
@ -419,7 +414,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: socketPath,
|
externalSigner: true,
|
||||||
signingKeyFiles: "",
|
signingKeyFiles: "",
|
||||||
maxExpiration: time.Second * 3600,
|
maxExpiration: time.Second * 3600,
|
||||||
externalMaxExpirationSec: 600, // 10m
|
externalMaxExpirationSec: 600, // 10m
|
||||||
@ -431,7 +426,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: socketPath,
|
externalSigner: true,
|
||||||
signingKeyFiles: "",
|
signingKeyFiles: "",
|
||||||
maxExpiration: 0,
|
maxExpiration: 0,
|
||||||
externalMaxExpirationSec: 300, // 5m
|
externalMaxExpirationSec: 300, // 5m
|
||||||
@ -443,7 +438,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: socketPath,
|
externalSigner: true,
|
||||||
signingKeyFiles: "",
|
signingKeyFiles: "",
|
||||||
maxExpiration: 0,
|
maxExpiration: 0,
|
||||||
externalMaxExpirationSec: 900, // 15m
|
externalMaxExpirationSec: 900, // 15m
|
||||||
@ -456,7 +451,7 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
issuers: []string{
|
issuers: []string{
|
||||||
"iss",
|
"iss",
|
||||||
},
|
},
|
||||||
signingEndpoint: socketPath,
|
externalSigner: true,
|
||||||
signingKeyFiles: "",
|
signingKeyFiles: "",
|
||||||
maxExpiration: 0,
|
maxExpiration: 0,
|
||||||
externalMaxExpirationSec: 900, // 15m
|
externalMaxExpirationSec: 900, // 15m
|
||||||
@ -468,8 +463,20 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
t.Run(tc.desc, func(t *testing.T) {
|
t.Run(tc.desc, func(t *testing.T) {
|
||||||
|
|
||||||
options := NewOptions()
|
options := NewOptions()
|
||||||
options.ServiceAccountSigningEndpoint = tc.signingEndpoint
|
if tc.externalSigner {
|
||||||
|
// create and start mock signer.
|
||||||
|
socketPath := fmt.Sprintf("@mock-external-jwt-signer-%d.sock", time.Now().Nanosecond())
|
||||||
|
mockSigner := v1alpha1testing.NewMockSigner(t, socketPath)
|
||||||
|
defer mockSigner.CleanUp()
|
||||||
|
|
||||||
|
mockSigner.MaxTokenExpirationSeconds = tc.externalMaxExpirationSec
|
||||||
|
mockSigner.MetadataError = tc.metadataError
|
||||||
|
mockSigner.FetchError = tc.fetchError
|
||||||
|
|
||||||
|
options.ServiceAccountSigningEndpoint = socketPath
|
||||||
|
}
|
||||||
options.ServiceAccountSigningKeyFile = tc.signingKeyFiles
|
options.ServiceAccountSigningKeyFile = tc.signingKeyFiles
|
||||||
options.Authentication = &kubeoptions.BuiltInAuthenticationOptions{
|
options.Authentication = &kubeoptions.BuiltInAuthenticationOptions{
|
||||||
ServiceAccounts: &kubeoptions.ServiceAccountAuthenticationOptions{
|
ServiceAccounts: &kubeoptions.ServiceAccountAuthenticationOptions{
|
||||||
@ -478,16 +485,13 @@ func TestCompleteForServiceAccount(t *testing.T) {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
_ = mockSigner.Reset()
|
|
||||||
mockSigner.MaxTokenExpirationSeconds = tc.externalMaxExpirationSec
|
|
||||||
mockSigner.MetadataError = tc.metadataError
|
|
||||||
mockSigner.FetchError = tc.fetchError
|
|
||||||
|
|
||||||
co := completedOptions{
|
co := completedOptions{
|
||||||
Options: *options,
|
Options: *options,
|
||||||
}
|
}
|
||||||
|
|
||||||
err := options.completeServiceAccountOptions(context.Background(), &co)
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
defer cancel()
|
||||||
|
err := options.completeServiceAccountOptions(ctx, &co)
|
||||||
|
|
||||||
if tc.wantError != nil {
|
if tc.wantError != nil {
|
||||||
if err == nil || tc.wantError.Error() != err.Error() {
|
if err == nil || tc.wantError.Error() != err.Error() {
|
||||||
|
@ -24,6 +24,7 @@ import (
|
|||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"os"
|
"os"
|
||||||
@ -225,7 +226,7 @@ func (m *MockSigner) start(t *testing.T) error {
|
|||||||
|
|
||||||
klog.Infof("Starting Mock Signer at socketPath %s", m.socketPath)
|
klog.Infof("Starting Mock Signer at socketPath %s", m.socketPath)
|
||||||
go func() {
|
go func() {
|
||||||
if err := m.server.Serve(m.listener); err != nil {
|
if err := m.server.Serve(m.listener); err != nil && !errors.Is(err, grpc.ErrServerStopped) {
|
||||||
t.Error(err)
|
t.Error(err)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
@ -264,7 +265,7 @@ func (m *MockSigner) waitForMockServerToStart() error {
|
|||||||
|
|
||||||
// CleanUp stops gRPC server and the underlying listener.
|
// CleanUp stops gRPC server and the underlying listener.
|
||||||
func (m *MockSigner) CleanUp() {
|
func (m *MockSigner) CleanUp() {
|
||||||
m.server.Stop()
|
m.server.GracefulStop()
|
||||||
_ = m.listener.Close()
|
_ = m.listener.Close()
|
||||||
_ = os.Remove(m.socketPath)
|
_ = os.Remove(m.socketPath)
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user