kubernetes/test/e2e/windows/volumes.go
Patrick Ohly 2f6c4f5eab e2e: use Ginkgo context
All code must use the context from Ginkgo when doing API calls or polling for a
change, otherwise the code would not return immediately when the test gets
aborted.
2022-12-16 20:14:04 +01:00

193 lines
6.3 KiB
Go

/*
Copyright 2018 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package windows
import (
"context"
"fmt"
v1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/uuid"
"k8s.io/kubernetes/test/e2e/framework"
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
"github.com/onsi/ginkgo/v2"
)
const (
emptyDirVolumePath = "C:\\test-volume"
hostMapPath = "C:\\tmp"
containerName = "test-container"
volumeName = "test-volume"
)
var (
image = imageutils.GetE2EImage(imageutils.Pause)
)
var _ = SIGDescribe("[Feature:Windows] Windows volume mounts ", func() {
f := framework.NewDefaultFramework("windows-volumes")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
var (
emptyDirSource = v1.VolumeSource{
EmptyDir: &v1.EmptyDirVolumeSource{
Medium: v1.StorageMediumDefault,
},
}
hostPathDirectoryOrCreate = v1.HostPathDirectoryOrCreate
hostMapSource = v1.VolumeSource{
HostPath: &v1.HostPathVolumeSource{
Path: hostMapPath,
Type: &hostPathDirectoryOrCreate,
},
}
)
ginkgo.BeforeEach(func() {
e2eskipper.SkipUnlessNodeOSDistroIs("windows")
})
ginkgo.Context("check volume mount permissions", func() {
ginkgo.It("container should have readOnly permissions on emptyDir", func(ctx context.Context) {
ginkgo.By("creating a container with readOnly permissions on emptyDir volume")
doReadOnlyTest(ctx, f, emptyDirSource, emptyDirVolumePath)
ginkgo.By("creating two containers, one with readOnly permissions the other with read-write permissions on emptyDir volume")
doReadWriteReadOnlyTest(ctx, f, emptyDirSource, emptyDirVolumePath)
})
ginkgo.It("container should have readOnly permissions on hostMapPath", func(ctx context.Context) {
ginkgo.By("creating a container with readOnly permissions on hostMap volume")
doReadOnlyTest(ctx, f, hostMapSource, hostMapPath)
ginkgo.By("creating two containers, one with readOnly permissions the other with read-write permissions on hostMap volume")
doReadWriteReadOnlyTest(ctx, f, hostMapSource, hostMapPath)
})
})
})
func doReadOnlyTest(ctx context.Context, f *framework.Framework, source v1.VolumeSource, volumePath string) {
var (
filePath = volumePath + "\\test-file.txt"
podName = "pod-" + string(uuid.NewUUID())
pod = testPodWithROVolume(podName, source, volumePath)
)
pod.Spec.NodeSelector = map[string]string{
"kubernetes.io/os": "windows",
}
pod = e2epod.NewPodClient(f).CreateSync(ctx, pod)
ginkgo.By("verifying that pod has the correct nodeSelector")
framework.ExpectEqual(pod.Spec.NodeSelector["kubernetes.io/os"], "windows")
cmd := []string{"cmd", "/c", "echo windows-volume-test", ">", filePath}
ginkgo.By("verifying that pod will get an error when writing to a volume that is readonly")
_, stderr, _ := e2epod.ExecCommandInContainerWithFullOutput(f, podName, containerName, cmd...)
framework.ExpectEqual(stderr, "Access is denied.")
}
func doReadWriteReadOnlyTest(ctx context.Context, f *framework.Framework, source v1.VolumeSource, volumePath string) {
var (
filePath = volumePath + "\\test-file" + string(uuid.NewUUID())
podName = "pod-" + string(uuid.NewUUID())
pod = testPodWithROVolume(podName, source, volumePath)
rwcontainerName = containerName + "-rw"
)
pod.Spec.NodeSelector = map[string]string{
"kubernetes.io/os": "windows",
}
rwcontainer := v1.Container{
Name: containerName + "-rw",
Image: image,
VolumeMounts: []v1.VolumeMount{
{
Name: volumeName,
MountPath: volumePath,
},
},
}
pod.Spec.Containers = append(pod.Spec.Containers, rwcontainer)
pod = e2epod.NewPodClient(f).CreateSync(ctx, pod)
ginkgo.By("verifying that pod has the correct nodeSelector")
framework.ExpectEqual(pod.Spec.NodeSelector["kubernetes.io/os"], "windows")
ginkgo.By("verifying that pod can write to a volume with read/write access")
writecmd := []string{"cmd", "/c", "echo windows-volume-test", ">", filePath}
stdoutRW, stderrRW, errRW := e2epod.ExecCommandInContainerWithFullOutput(f, podName, rwcontainerName, writecmd...)
msg := fmt.Sprintf("cmd: %v, stdout: %q, stderr: %q", writecmd, stdoutRW, stderrRW)
framework.ExpectNoError(errRW, msg)
ginkgo.By("verifying that pod will get an error when writing to a volume that is readonly")
_, stderr, _ := e2epod.ExecCommandInContainerWithFullOutput(f, podName, containerName, writecmd...)
framework.ExpectEqual(stderr, "Access is denied.")
ginkgo.By("verifying that pod can read from a volume that is readonly")
readcmd := []string{"cmd", "/c", "type", filePath}
readout, readerr, err := e2epod.ExecCommandInContainerWithFullOutput(f, podName, containerName, readcmd...)
readmsg := fmt.Sprintf("cmd: %v, stdout: %q, stderr: %q", readcmd, readout, readerr)
framework.ExpectEqual(readout, "windows-volume-test")
framework.ExpectNoError(err, readmsg)
}
// testPodWithROVolume makes a minimal pod defining a volume input source. Similarly to
// other tests for sig-windows this should append a nodeSelector for windows.
func testPodWithROVolume(podName string, source v1.VolumeSource, path string) *v1.Pod {
return &v1.Pod{
TypeMeta: metav1.TypeMeta{
Kind: "Pod",
APIVersion: "v1",
},
ObjectMeta: metav1.ObjectMeta{
Name: podName,
},
Spec: v1.PodSpec{
Containers: []v1.Container{
{
Name: containerName,
Image: image,
VolumeMounts: []v1.VolumeMount{
{
Name: volumeName,
MountPath: path,
ReadOnly: true,
},
},
},
},
RestartPolicy: v1.RestartPolicyNever,
Volumes: []v1.Volume{
{
Name: volumeName,
VolumeSource: source,
},
},
},
}
}