mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-07 03:03:59 +00:00
Merge pull request #47039 from zjj2wry/crb_test
Automatic merge from submit-queue (batch tested with PRs 47039, 53681, 53303, 53181, 53781). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. RBAC: Add test for create clusterrolebindding **What this PR does / why we need it**: **Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes # **Special notes for your reviewer**: **Release note**: ```release-note NONE ```
This commit is contained in:
commit
ab56f37100
@ -3500,17 +3500,21 @@ run_clusterroles_tests() {
|
|||||||
kube::test::get_object_assert clusterrole/url-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:'
|
kube::test::get_object_assert clusterrole/url-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:'
|
||||||
kube::test::get_object_assert clusterrole/url-reader "{{range.rules}}{{range.nonResourceURLs}}{{.}}:{{end}}{{end}}" '/logs/\*:/healthz/\*:'
|
kube::test::get_object_assert clusterrole/url-reader "{{range.rules}}{{range.nonResourceURLs}}{{.}}:{{end}}{{end}}" '/logs/\*:/healthz/\*:'
|
||||||
|
|
||||||
# test `kubectl create rolebinding/clusterrolebinding`
|
# test `kubectl create clusterrolebinding`
|
||||||
# test `kubectl set subject rolebinding/clusterrolebinding`
|
# test `kubectl set subject clusterrolebinding`
|
||||||
kubectl create "${kube_flags[@]}" clusterrolebinding super-admin --clusterrole=admin --user=super-admin
|
kubectl create "${kube_flags[@]}" clusterrolebinding super-admin --clusterrole=admin --user=super-admin
|
||||||
kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:'
|
kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:'
|
||||||
kubectl set subject "${kube_flags[@]}" clusterrolebinding super-admin --user=foo
|
kubectl set subject "${kube_flags[@]}" clusterrolebinding super-admin --user=foo
|
||||||
kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:foo:'
|
kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:foo:'
|
||||||
|
kubectl create "${kube_flags[@]}" clusterrolebinding multi-users --clusterrole=admin --user=user-1 --user=user-2
|
||||||
|
kube::test::get_object_assert clusterrolebinding/multi-users "{{range.subjects}}{{.name}}:{{end}}" 'user-1:user-2:'
|
||||||
|
|
||||||
kubectl create "${kube_flags[@]}" clusterrolebinding super-group --clusterrole=admin --group=the-group
|
kubectl create "${kube_flags[@]}" clusterrolebinding super-group --clusterrole=admin --group=the-group
|
||||||
kube::test::get_object_assert clusterrolebinding/super-group "{{range.subjects}}{{.name}}:{{end}}" 'the-group:'
|
kube::test::get_object_assert clusterrolebinding/super-group "{{range.subjects}}{{.name}}:{{end}}" 'the-group:'
|
||||||
kubectl set subject "${kube_flags[@]}" clusterrolebinding super-group --group=foo
|
kubectl set subject "${kube_flags[@]}" clusterrolebinding super-group --group=foo
|
||||||
kube::test::get_object_assert clusterrolebinding/super-group "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:'
|
kube::test::get_object_assert clusterrolebinding/super-group "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:'
|
||||||
|
kubectl create "${kube_flags[@]}" clusterrolebinding multi-groups --clusterrole=admin --group=group-1 --group=group-2
|
||||||
|
kube::test::get_object_assert clusterrolebinding/multi-groups "{{range.subjects}}{{.name}}:{{end}}" 'group-1:group-2:'
|
||||||
|
|
||||||
kubectl create "${kube_flags[@]}" clusterrolebinding super-sa --clusterrole=admin --serviceaccount=otherns:sa-name
|
kubectl create "${kube_flags[@]}" clusterrolebinding super-sa --clusterrole=admin --serviceaccount=otherns:sa-name
|
||||||
kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:'
|
kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:'
|
||||||
@ -3518,13 +3522,17 @@ run_clusterroles_tests() {
|
|||||||
kubectl set subject "${kube_flags[@]}" clusterrolebinding super-sa --serviceaccount=otherfoo:foo
|
kubectl set subject "${kube_flags[@]}" clusterrolebinding super-sa --serviceaccount=otherfoo:foo
|
||||||
kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:otherfoo:'
|
kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:otherfoo:'
|
||||||
kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:foo:'
|
kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:foo:'
|
||||||
|
|
||||||
|
# test `kubectl create rolebinding`
|
||||||
|
# test `kubectl set subject rolebinding`
|
||||||
kubectl create "${kube_flags[@]}" rolebinding admin --clusterrole=admin --user=default-admin
|
kubectl create "${kube_flags[@]}" rolebinding admin --clusterrole=admin --user=default-admin
|
||||||
|
kube::test::get_object_assert rolebinding/admin "{{.roleRef.kind}}" 'ClusterRole'
|
||||||
kube::test::get_object_assert rolebinding/admin "{{range.subjects}}{{.name}}:{{end}}" 'default-admin:'
|
kube::test::get_object_assert rolebinding/admin "{{range.subjects}}{{.name}}:{{end}}" 'default-admin:'
|
||||||
kubectl set subject "${kube_flags[@]}" rolebinding admin --user=foo
|
kubectl set subject "${kube_flags[@]}" rolebinding admin --user=foo
|
||||||
kube::test::get_object_assert rolebinding/admin "{{range.subjects}}{{.name}}:{{end}}" 'default-admin:foo:'
|
kube::test::get_object_assert rolebinding/admin "{{range.subjects}}{{.name}}:{{end}}" 'default-admin:foo:'
|
||||||
|
|
||||||
kubectl create "${kube_flags[@]}" rolebinding localrole --role=localrole --group=the-group
|
kubectl create "${kube_flags[@]}" rolebinding localrole --role=localrole --group=the-group
|
||||||
|
kube::test::get_object_assert rolebinding/localrole "{{.roleRef.kind}}" 'Role'
|
||||||
kube::test::get_object_assert rolebinding/localrole "{{range.subjects}}{{.name}}:{{end}}" 'the-group:'
|
kube::test::get_object_assert rolebinding/localrole "{{range.subjects}}{{.name}}:{{end}}" 'the-group:'
|
||||||
kubectl set subject "${kube_flags[@]}" rolebinding localrole --group=foo
|
kubectl set subject "${kube_flags[@]}" rolebinding localrole --group=foo
|
||||||
kube::test::get_object_assert rolebinding/localrole "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:'
|
kube::test::get_object_assert rolebinding/localrole "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:'
|
||||||
|
@ -152,6 +152,7 @@ go_test(
|
|||||||
"cmd_test.go",
|
"cmd_test.go",
|
||||||
"cp_test.go",
|
"cp_test.go",
|
||||||
"create_clusterrole_test.go",
|
"create_clusterrole_test.go",
|
||||||
|
"create_clusterrolebinding_test.go",
|
||||||
"create_configmap_test.go",
|
"create_configmap_test.go",
|
||||||
"create_deployment_test.go",
|
"create_deployment_test.go",
|
||||||
"create_namespace_test.go",
|
"create_namespace_test.go",
|
||||||
@ -213,6 +214,7 @@ go_test(
|
|||||||
"//vendor/github.com/stretchr/testify/assert:go_default_library",
|
"//vendor/github.com/stretchr/testify/assert:go_default_library",
|
||||||
"//vendor/gopkg.in/yaml.v2:go_default_library",
|
"//vendor/gopkg.in/yaml.v2:go_default_library",
|
||||||
"//vendor/k8s.io/api/core/v1:go_default_library",
|
"//vendor/k8s.io/api/core/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/api/rbac/v1beta1:go_default_library",
|
||||||
"//vendor/k8s.io/apimachinery/pkg/api/equality:go_default_library",
|
"//vendor/k8s.io/apimachinery/pkg/api/equality:go_default_library",
|
||||||
"//vendor/k8s.io/apimachinery/pkg/api/errors:go_default_library",
|
"//vendor/k8s.io/apimachinery/pkg/api/errors:go_default_library",
|
||||||
"//vendor/k8s.io/apimachinery/pkg/api/meta:go_default_library",
|
"//vendor/k8s.io/apimachinery/pkg/api/meta:go_default_library",
|
||||||
|
147
pkg/kubectl/cmd/create_clusterrolebinding_test.go
Normal file
147
pkg/kubectl/cmd/create_clusterrolebinding_test.go
Normal file
@ -0,0 +1,147 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"io/ioutil"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
rbac "k8s.io/api/rbac/v1beta1"
|
||||||
|
"k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
restclient "k8s.io/client-go/rest"
|
||||||
|
"k8s.io/client-go/rest/fake"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
cmdtesting "k8s.io/kubernetes/pkg/kubectl/cmd/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCreateClusterRoleBinding(t *testing.T) {
|
||||||
|
expectBinding := &rbac.ClusterRoleBinding{
|
||||||
|
ObjectMeta: v1.ObjectMeta{
|
||||||
|
Name: "fake-binding",
|
||||||
|
},
|
||||||
|
TypeMeta: v1.TypeMeta{
|
||||||
|
Kind: "ClusterRoleBinding",
|
||||||
|
APIVersion: "rbac.authorization.k8s.io/v1beta1",
|
||||||
|
},
|
||||||
|
RoleRef: rbac.RoleRef{
|
||||||
|
APIGroup: rbac.GroupName,
|
||||||
|
Kind: "ClusterRole",
|
||||||
|
Name: "fake-clusterrole",
|
||||||
|
},
|
||||||
|
Subjects: []rbac.Subject{
|
||||||
|
{
|
||||||
|
Kind: rbac.UserKind,
|
||||||
|
APIGroup: "rbac.authorization.k8s.io",
|
||||||
|
Name: "fake-user",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Kind: rbac.GroupKind,
|
||||||
|
APIGroup: "rbac.authorization.k8s.io",
|
||||||
|
Name: "fake-group",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Kind: rbac.ServiceAccountKind,
|
||||||
|
Namespace: "fake-namespace",
|
||||||
|
Name: "fake-account",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
f, tf, _, ns := cmdtesting.NewAPIFactory()
|
||||||
|
|
||||||
|
info, _ := runtime.SerializerInfoForMediaType(ns.SupportedMediaTypes(), runtime.ContentTypeJSON)
|
||||||
|
encoder := ns.EncoderForVersion(info.Serializer, groupVersion)
|
||||||
|
decoder := ns.DecoderToVersion(info.Serializer, groupVersion)
|
||||||
|
|
||||||
|
tf.Namespace = "test"
|
||||||
|
tf.Printer = &testPrinter{}
|
||||||
|
tf.Client = &ClusterRoleBindingRESTClient{
|
||||||
|
RESTClient: &fake.RESTClient{
|
||||||
|
APIRegistry: api.Registry,
|
||||||
|
NegotiatedSerializer: ns,
|
||||||
|
Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
|
||||||
|
switch p, m := req.URL.Path, req.Method; {
|
||||||
|
case p == "/clusterrolebindings" && m == "POST":
|
||||||
|
bodyBits, err := ioutil.ReadAll(req.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("TestCreateClusterRoleBinding error: %v", err)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if obj, _, err := decoder.Decode(bodyBits, nil, &rbac.ClusterRoleBinding{}); err == nil {
|
||||||
|
if !reflect.DeepEqual(obj.(*rbac.ClusterRoleBinding), expectBinding) {
|
||||||
|
t.Fatalf("TestCreateClusterRoleBinding: expected:\n%#v\nsaw:\n%#v", expectBinding, obj.(*rbac.ClusterRoleBinding))
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
t.Fatalf("TestCreateClusterRoleBinding error, could not decode the request body into rbac.ClusterRoleBinding object: %v", err)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
responseBinding := &rbac.ClusterRoleBinding{}
|
||||||
|
responseBinding.Name = "fake-binding"
|
||||||
|
return &http.Response{StatusCode: 201, Header: defaultHeader(), Body: ioutil.NopCloser(bytes.NewReader([]byte(runtime.EncodeOrDie(encoder, responseBinding))))}, nil
|
||||||
|
default:
|
||||||
|
t.Fatalf("unexpected request: %#v\n%#v", req.URL, req)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
expectedOutput := "clusterrolebinding/" + expectBinding.Name + "\n"
|
||||||
|
buf := bytes.NewBuffer([]byte{})
|
||||||
|
cmd := NewCmdCreateClusterRoleBinding(f, buf)
|
||||||
|
cmd.Flags().Set("clusterrole", "fake-clusterrole")
|
||||||
|
cmd.Flags().Set("user", "fake-user")
|
||||||
|
cmd.Flags().Set("group", "fake-group")
|
||||||
|
cmd.Flags().Set("output", "name")
|
||||||
|
cmd.Flags().Set("serviceaccount", "fake-namespace:fake-account")
|
||||||
|
cmd.Run(cmd, []string{"fake-binding"})
|
||||||
|
if buf.String() != expectedOutput {
|
||||||
|
t.Errorf("TestCreateClusterRoleBinding: expected %v\n but got %v\n", expectedOutput, buf.String())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type ClusterRoleBindingRESTClient struct {
|
||||||
|
*fake.RESTClient
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *ClusterRoleBindingRESTClient) Post() *restclient.Request {
|
||||||
|
config := restclient.ContentConfig{
|
||||||
|
ContentType: runtime.ContentTypeJSON,
|
||||||
|
GroupVersion: &schema.GroupVersion{Group: "rbac.authorization.k8s.io", Version: "v1beta1"},
|
||||||
|
NegotiatedSerializer: c.NegotiatedSerializer,
|
||||||
|
}
|
||||||
|
|
||||||
|
info, _ := runtime.SerializerInfoForMediaType(c.NegotiatedSerializer.SupportedMediaTypes(), runtime.ContentTypeJSON)
|
||||||
|
serializers := restclient.Serializers{
|
||||||
|
Encoder: c.NegotiatedSerializer.EncoderForVersion(info.Serializer, schema.GroupVersion{Group: "rbac.authorization.k8s.io", Version: "v1beta1"}),
|
||||||
|
Decoder: c.NegotiatedSerializer.DecoderToVersion(info.Serializer, schema.GroupVersion{Group: "rbac.authorization.k8s.io", Version: "v1beta1"}),
|
||||||
|
}
|
||||||
|
if info.StreamSerializer != nil {
|
||||||
|
serializers.StreamingSerializer = info.StreamSerializer.Serializer
|
||||||
|
serializers.Framer = info.StreamSerializer.Framer
|
||||||
|
}
|
||||||
|
return restclient.NewRequest(c, "POST", &url.URL{Host: "localhost"}, c.VersionedAPIPath, config, serializers, nil, nil)
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user