mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-22 03:11:40 +00:00
test/cmd: kubectl and exec plugins don't fight for stdin
Signed-off-by: Andrew Keesler <akeesler@vmware.com>
This commit is contained in:
parent
60246f69cc
commit
e427d2f22a
@ -432,6 +432,9 @@ run_deployment_tests() {
|
|||||||
kubectl set env deployment nginx-deployment --from=secret/test-set-env-secret "${kube_flags[@]:?}"
|
kubectl set env deployment nginx-deployment --from=secret/test-set-env-secret "${kube_flags[@]:?}"
|
||||||
# Remove specific env of deployment
|
# Remove specific env of deployment
|
||||||
kubectl set env deployment nginx-deployment env-
|
kubectl set env deployment nginx-deployment env-
|
||||||
|
# Assert that we cannot use standard input for both resource and environment variable
|
||||||
|
output_message="$(echo SOME_ENV_VAR_KEY=SOME_ENV_VAR_VAL | kubectl set env -f - - "${kube_flags[@]:?}" 2>&1 || true)"
|
||||||
|
kube::test::if_has_string "${output_message}" 'standard input cannot be used for multiple arguments'
|
||||||
# Clean up
|
# Clean up
|
||||||
kubectl delete deployment nginx-deployment "${kube_flags[@]:?}"
|
kubectl delete deployment nginx-deployment "${kube_flags[@]:?}"
|
||||||
kubectl delete configmap test-set-env-config "${kube_flags[@]:?}"
|
kubectl delete configmap test-set-env-config "${kube_flags[@]:?}"
|
||||||
|
@ -92,7 +92,6 @@ users:
|
|||||||
user:
|
user:
|
||||||
exec:
|
exec:
|
||||||
apiVersion: client.authentication.k8s.io/v1beta1
|
apiVersion: client.authentication.k8s.io/v1beta1
|
||||||
# Any invalid exec credential plugin will do to demonstrate
|
|
||||||
command: echo
|
command: echo
|
||||||
args:
|
args:
|
||||||
- '{"apiVersion":"client.authentication.k8s.io/v1beta1","status":{"token":"admin-token"}}'
|
- '{"apiVersion":"client.authentication.k8s.io/v1beta1","status":{"token":"admin-token"}}'
|
||||||
@ -132,3 +131,89 @@ EOF
|
|||||||
set +o nounset
|
set +o nounset
|
||||||
set +o errexit
|
set +o errexit
|
||||||
}
|
}
|
||||||
|
|
||||||
|
run_exec_credentials_interactive_tests() {
|
||||||
|
set -o nounset
|
||||||
|
set -o errexit
|
||||||
|
|
||||||
|
kube::log::status "Testing kubectl with configured interactive exec credentials plugin"
|
||||||
|
|
||||||
|
cat > "${TMPDIR:-/tmp}"/always_interactive_exec_plugin.yaml << EOF
|
||||||
|
apiVersion: v1
|
||||||
|
clusters:
|
||||||
|
- cluster:
|
||||||
|
name: test
|
||||||
|
contexts:
|
||||||
|
- context:
|
||||||
|
cluster: test
|
||||||
|
user: always_interactive_token_user
|
||||||
|
name: test
|
||||||
|
current-context: test
|
||||||
|
kind: Config
|
||||||
|
preferences: {}
|
||||||
|
users:
|
||||||
|
- name: always_interactive_token_user
|
||||||
|
user:
|
||||||
|
exec:
|
||||||
|
apiVersion: client.authentication.k8s.io/v1beta1
|
||||||
|
command: echo
|
||||||
|
args:
|
||||||
|
- '{"apiVersion":"client.authentication.k8s.io/v1beta1","status":{"token":"admin-token"}}'
|
||||||
|
interactiveMode: Always
|
||||||
|
EOF
|
||||||
|
|
||||||
|
### The exec credential plugin should not be run if it kubectl already uses standard input
|
||||||
|
# Pre-condition: The kubectl command requires standard input
|
||||||
|
|
||||||
|
some_resource='{"apiVersion":"v1","kind":"ConfigMap","metadata":{"name":"some-resource"}}'
|
||||||
|
|
||||||
|
# Declare map from kubectl command to standard input data
|
||||||
|
declare -A kubectl_commands
|
||||||
|
kubectl_commands["apply -f -"]="$some_resource"
|
||||||
|
kubectl_commands["set env deployment/some-deployment -"]="SOME_ENV_VAR_KEY=SOME_ENV_VAR_VAL"
|
||||||
|
kubectl_commands["replace -f - --force"]="$some_resource"
|
||||||
|
|
||||||
|
failure=
|
||||||
|
for kubectl_command in "${!kubectl_commands[@]}"; do
|
||||||
|
# Use a separate bash script for the command here so that script(1) will not get confused with kubectl flags
|
||||||
|
script_file="${TMPDIR:-/tmp}/test-cmd-exec-credentials-script-file.sh"
|
||||||
|
cat <<EOF >"$script_file"
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
set -o errexit
|
||||||
|
set -o nounset
|
||||||
|
set -o pipefail
|
||||||
|
kubectl ${kube_flags_without_token[*]:?} --kubeconfig=${TMPDIR:-/tmp}/always_interactive_exec_plugin.yaml ${kubectl_command} 2>&1 || true
|
||||||
|
EOF
|
||||||
|
chmod +x "$script_file"
|
||||||
|
|
||||||
|
# Run kubectl as child of script(1) so kubectl will always run with a PTY
|
||||||
|
# Dynamically build script(1) command so that we can conditionally add flags on Linux
|
||||||
|
script_command="script -q /dev/null"
|
||||||
|
if [[ "$(uname)" == "Linux" ]]; then script_command="${script_command} -c"; fi
|
||||||
|
script_command="${script_command} ${script_file}"
|
||||||
|
|
||||||
|
# Specify SHELL env var when we call script(1) since it is picky about the format of the env var
|
||||||
|
shell="$(which bash)"
|
||||||
|
|
||||||
|
kube::log::status "Running command '$script_command' (kubectl command: '$kubectl_command') with input '${kubectl_commands[$kubectl_command]}'"
|
||||||
|
output=$(echo "${kubectl_commands[$kubectl_command]}" | SHELL="$shell" $script_command)
|
||||||
|
|
||||||
|
if [[ "${output}" =~ "used by stdin resource manifest reader" ]]; then
|
||||||
|
kube::log::status "exec credential plugin not run because kubectl already uses standard input"
|
||||||
|
else
|
||||||
|
kube::log::status "Unexpected output when running kubectl command that uses standard input. Output: ${output}"
|
||||||
|
failure=yup
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
if [[ -n "$failure" ]]; then
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Post-condition: None
|
||||||
|
|
||||||
|
rm "${TMPDIR:-/tmp}"/always_interactive_exec_plugin.yaml
|
||||||
|
|
||||||
|
set +o nounset
|
||||||
|
set +o errexit
|
||||||
|
}
|
@ -775,6 +775,7 @@ runTests() {
|
|||||||
########################
|
########################
|
||||||
|
|
||||||
record_command run_exec_credentials_tests
|
record_command run_exec_credentials_tests
|
||||||
|
record_command run_exec_credentials_interactive_tests
|
||||||
|
|
||||||
########################
|
########################
|
||||||
# authorization.k8s.io #
|
# authorization.k8s.io #
|
||||||
|
Loading…
Reference in New Issue
Block a user