mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-19 09:52:49 +00:00
This is the result of automatically editing source files like this: go install golang.org/x/tools/cmd/goimports@latest find ./test/e2e* -name "*.go" | xargs env PATH=$GOPATH/bin:$PATH ./e2e-framework-sed.sh with e2e-framework-sed.sh containing this: sed -i \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.ExecCommandInContainer(/e2epod.ExecCommandInContainer(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.ExecCommandInContainerWithFullOutput(/e2epod.ExecCommandInContainerWithFullOutput(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.ExecShellInContainer(/e2epod.ExecShellInContainer(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.ExecShellInPod(/e2epod.ExecShellInPod(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.ExecShellInPodWithFullOutput(/e2epod.ExecShellInPodWithFullOutput(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.ExecWithOptions(/e2epod.ExecWithOptions(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.MatchContainerOutput(/e2eoutput.MatchContainerOutput(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.PodClient(/e2epod.NewPodClient(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.PodClientNS(/e2epod.PodClientNS(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.TestContainerOutput(/e2eoutput.TestContainerOutput(\1, /" \ -e "s/\(f\|fr\|\w\w*\.[fF]\w*\)\.TestContainerOutputRegexp(/e2eoutput.TestContainerOutputRegexp(\1, /" \ -e "s/framework.AddOrUpdateLabelOnNode\b/e2enode.AddOrUpdateLabelOnNode/" \ -e "s/framework.AllNodes\b/e2edebug.AllNodes/" \ -e "s/framework.AllNodesReady\b/e2enode.AllNodesReady/" \ -e "s/framework.ContainerResourceGatherer\b/e2edebug.ContainerResourceGatherer/" \ -e "s/framework.ContainerResourceUsage\b/e2edebug.ContainerResourceUsage/" \ -e "s/framework.CreateEmptyFileOnPod\b/e2eoutput.CreateEmptyFileOnPod/" \ -e "s/framework.DefaultPodDeletionTimeout\b/e2epod.DefaultPodDeletionTimeout/" \ -e "s/framework.DumpAllNamespaceInfo\b/e2edebug.DumpAllNamespaceInfo/" \ -e "s/framework.DumpDebugInfo\b/e2eoutput.DumpDebugInfo/" \ -e "s/framework.DumpNodeDebugInfo\b/e2edebug.DumpNodeDebugInfo/" \ -e "s/framework.EtcdUpgrade\b/e2eproviders.EtcdUpgrade/" \ -e "s/framework.EventsLister\b/e2edebug.EventsLister/" \ -e "s/framework.ExecOptions\b/e2epod.ExecOptions/" \ -e "s/framework.ExpectNodeHasLabel\b/e2enode.ExpectNodeHasLabel/" \ -e "s/framework.ExpectNodeHasTaint\b/e2enode.ExpectNodeHasTaint/" \ -e "s/framework.GCEUpgradeScript\b/e2eproviders.GCEUpgradeScript/" \ -e "s/framework.ImagePrePullList\b/e2epod.ImagePrePullList/" \ -e "s/framework.KubectlBuilder\b/e2ekubectl.KubectlBuilder/" \ -e "s/framework.LocationParamGKE\b/e2eproviders.LocationParamGKE/" \ -e "s/framework.LogSizeDataTimeseries\b/e2edebug.LogSizeDataTimeseries/" \ -e "s/framework.LogSizeGatherer\b/e2edebug.LogSizeGatherer/" \ -e "s/framework.LogsSizeData\b/e2edebug.LogsSizeData/" \ -e "s/framework.LogsSizeDataSummary\b/e2edebug.LogsSizeDataSummary/" \ -e "s/framework.LogsSizeVerifier\b/e2edebug.LogsSizeVerifier/" \ -e "s/framework.LookForStringInLog\b/e2eoutput.LookForStringInLog/" \ -e "s/framework.LookForStringInPodExec\b/e2eoutput.LookForStringInPodExec/" \ -e "s/framework.LookForStringInPodExecToContainer\b/e2eoutput.LookForStringInPodExecToContainer/" \ -e "s/framework.MasterAndDNSNodes\b/e2edebug.MasterAndDNSNodes/" \ -e "s/framework.MasterNodes\b/e2edebug.MasterNodes/" \ -e "s/framework.MasterUpgradeGKE\b/e2eproviders.MasterUpgradeGKE/" \ -e "s/framework.NewKubectlCommand\b/e2ekubectl.NewKubectlCommand/" \ -e "s/framework.NewLogsVerifier\b/e2edebug.NewLogsVerifier/" \ -e "s/framework.NewNodeKiller\b/e2enode.NewNodeKiller/" \ -e "s/framework.NewResourceUsageGatherer\b/e2edebug.NewResourceUsageGatherer/" \ -e "s/framework.NodeHasTaint\b/e2enode.NodeHasTaint/" \ -e "s/framework.NodeKiller\b/e2enode.NodeKiller/" \ -e "s/framework.NodesSet\b/e2edebug.NodesSet/" \ -e "s/framework.PodClient\b/e2epod.PodClient/" \ -e "s/framework.RemoveLabelOffNode\b/e2enode.RemoveLabelOffNode/" \ -e "s/framework.ResourceConstraint\b/e2edebug.ResourceConstraint/" \ -e "s/framework.ResourceGathererOptions\b/e2edebug.ResourceGathererOptions/" \ -e "s/framework.ResourceUsagePerContainer\b/e2edebug.ResourceUsagePerContainer/" \ -e "s/framework.ResourceUsageSummary\b/e2edebug.ResourceUsageSummary/" \ -e "s/framework.RunHostCmd\b/e2eoutput.RunHostCmd/" \ -e "s/framework.RunHostCmdOrDie\b/e2eoutput.RunHostCmdOrDie/" \ -e "s/framework.RunHostCmdWithFullOutput\b/e2eoutput.RunHostCmdWithFullOutput/" \ -e "s/framework.RunHostCmdWithRetries\b/e2eoutput.RunHostCmdWithRetries/" \ -e "s/framework.RunKubectl\b/e2ekubectl.RunKubectl/" \ -e "s/framework.RunKubectlInput\b/e2ekubectl.RunKubectlInput/" \ -e "s/framework.RunKubectlOrDie\b/e2ekubectl.RunKubectlOrDie/" \ -e "s/framework.RunKubectlOrDieInput\b/e2ekubectl.RunKubectlOrDieInput/" \ -e "s/framework.RunKubectlWithFullOutput\b/e2ekubectl.RunKubectlWithFullOutput/" \ -e "s/framework.RunKubemciCmd\b/e2ekubectl.RunKubemciCmd/" \ -e "s/framework.RunKubemciWithKubeconfig\b/e2ekubectl.RunKubemciWithKubeconfig/" \ -e "s/framework.SingleContainerSummary\b/e2edebug.SingleContainerSummary/" \ -e "s/framework.SingleLogSummary\b/e2edebug.SingleLogSummary/" \ -e "s/framework.TimestampedSize\b/e2edebug.TimestampedSize/" \ -e "s/framework.WaitForAllNodesSchedulable\b/e2enode.WaitForAllNodesSchedulable/" \ -e "s/framework.WaitForSSHTunnels\b/e2enode.WaitForSSHTunnels/" \ -e "s/framework.WorkItem\b/e2edebug.WorkItem/" \ "$@" for i in "$@"; do # Import all sub packages and let goimports figure out which of those # are redundant (= already imported) or not needed. sed -i -e '/"k8s.io.kubernetes.test.e2e.framework"/a e2edebug "k8s.io/kubernetes/test/e2e/framework/debug"' "$i" sed -i -e '/"k8s.io.kubernetes.test.e2e.framework"/a e2ekubectl "k8s.io/kubernetes/test/e2e/framework/kubectl"' "$i" sed -i -e '/"k8s.io.kubernetes.test.e2e.framework"/a e2enode "k8s.io/kubernetes/test/e2e/framework/node"' "$i" sed -i -e '/"k8s.io.kubernetes.test.e2e.framework"/a e2eoutput "k8s.io/kubernetes/test/e2e/framework/pod/output"' "$i" sed -i -e '/"k8s.io.kubernetes.test.e2e.framework"/a e2epod "k8s.io/kubernetes/test/e2e/framework/pod"' "$i" sed -i -e '/"k8s.io.kubernetes.test.e2e.framework"/a e2eproviders "k8s.io/kubernetes/test/e2e/framework/providers"' "$i" goimports -w "$i" done
189 lines
6.5 KiB
Go
189 lines
6.5 KiB
Go
/*
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package kubeadm
|
|
|
|
import (
|
|
"context"
|
|
|
|
appsv1 "k8s.io/api/apps/v1"
|
|
authv1 "k8s.io/api/authorization/v1"
|
|
corev1 "k8s.io/api/core/v1"
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
|
|
"github.com/onsi/gomega"
|
|
"github.com/onsi/gomega/gstruct"
|
|
)
|
|
|
|
// ServiceAccounts utils
|
|
|
|
// ExpectServiceAccount expects to be able to get the ServiceAccount with specific name from the namespace
|
|
func ExpectServiceAccount(c clientset.Interface, namespace, name string) {
|
|
_, err := c.CoreV1().
|
|
ServiceAccounts(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting ServiceAccount %q from namespace %q", name, namespace)
|
|
}
|
|
|
|
// Secret utils
|
|
|
|
// GetSecret gets Secret with specific name from the namespace
|
|
func GetSecret(c clientset.Interface, namespace, name string) *corev1.Secret {
|
|
r, err := c.CoreV1().
|
|
Secrets(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting Secret %q from namespace %q", name, namespace)
|
|
return r
|
|
}
|
|
|
|
// ConfigMaps utils
|
|
|
|
// GetConfigMap gets ConfigMap with specific name from the namespace
|
|
func GetConfigMap(c clientset.Interface, namespace, name string) *corev1.ConfigMap {
|
|
r, err := c.CoreV1().
|
|
ConfigMaps(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting ConfigMap %q from namespace %q", name, namespace)
|
|
return r
|
|
}
|
|
|
|
// Service utils
|
|
|
|
// ExpectService expects to be able to get the Service with specific name from the namespace
|
|
func ExpectService(c clientset.Interface, namespace, name string) {
|
|
_, err := c.CoreV1().
|
|
Services(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting Service %q from namespace %q", name, namespace)
|
|
}
|
|
|
|
// Deployments utils
|
|
|
|
// GetDeployment gets Deployment with specific name from the namespace
|
|
func GetDeployment(c clientset.Interface, namespace, name string) *appsv1.Deployment {
|
|
r, err := c.AppsV1().
|
|
Deployments(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting Deployment %q from namespace %q", name, namespace)
|
|
return r
|
|
}
|
|
|
|
// DaemonSets utils
|
|
|
|
// GetDaemonSet gets DaemonSet with specific name from the namespace
|
|
func GetDaemonSet(c clientset.Interface, namespace, name string) *appsv1.DaemonSet {
|
|
r, err := c.AppsV1().
|
|
DaemonSets(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting DaemonSet %q from namespace %q", name, namespace)
|
|
return r
|
|
}
|
|
|
|
// RBAC utils
|
|
|
|
// ExpectRole expects to be able to get the Role with specific name from the namespace
|
|
func ExpectRole(c clientset.Interface, namespace, name string) {
|
|
_, err := c.RbacV1().
|
|
Roles(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting Role %q from namespace %q", name, namespace)
|
|
}
|
|
|
|
// ExpectRoleBinding expects to be able to get the RoleBinding with specific name from the namespace
|
|
func ExpectRoleBinding(c clientset.Interface, namespace, name string) {
|
|
_, err := c.RbacV1().
|
|
RoleBindings(namespace).
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting RoleBinding %q from namespace %q", name, namespace)
|
|
}
|
|
|
|
// ExpectClusterRole expects to be able to get the ClusterRole with specific name
|
|
func ExpectClusterRole(c clientset.Interface, name string) {
|
|
_, err := c.RbacV1().
|
|
ClusterRoles().
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting ClusterRole %q", name)
|
|
}
|
|
|
|
// ExpectClusterRoleBinding expects to be able to get the ClusterRoleBinding with specific name
|
|
func ExpectClusterRoleBinding(c clientset.Interface, name string) {
|
|
_, err := c.RbacV1().
|
|
ClusterRoleBindings().
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting ClusterRoleBindings %q", name)
|
|
}
|
|
|
|
// ExpectClusterRoleBindingWithSubjectAndRole expects to be able to get the ClusterRoleBinding with specific name, subject and role
|
|
func ExpectClusterRoleBindingWithSubjectAndRole(c clientset.Interface, name, subjectKind, subject, role string) {
|
|
binding, err := c.RbacV1().
|
|
ClusterRoleBindings().
|
|
Get(context.TODO(), name, metav1.GetOptions{})
|
|
framework.ExpectNoError(err, "error getting ClusterRoleBindings %q", name)
|
|
gomega.Expect(binding.Subjects).To(
|
|
gomega.ContainElement(subjectMatcher(
|
|
subject,
|
|
subjectKind,
|
|
)),
|
|
"ClusterRole %q does not have %s %q as subject", name, subjectKind, subject,
|
|
)
|
|
gomega.Expect(binding.RoleRef.Name).To(
|
|
gomega.Equal(role),
|
|
"ClusterRole %q does not have %q as role", name, role,
|
|
)
|
|
}
|
|
|
|
// ExpectSubjectHasAccessToResource expects that the subject has access to the target resource
|
|
func ExpectSubjectHasAccessToResource(c clientset.Interface, subjectKind, subject string, resource *authv1.ResourceAttributes) {
|
|
var sar *authv1.SubjectAccessReview
|
|
switch subjectKind {
|
|
case rbacv1.GroupKind:
|
|
sar = &authv1.SubjectAccessReview{
|
|
Spec: authv1.SubjectAccessReviewSpec{
|
|
Groups: []string{subject},
|
|
ResourceAttributes: resource,
|
|
},
|
|
}
|
|
case rbacv1.UserKind:
|
|
fallthrough
|
|
case rbacv1.ServiceAccountKind:
|
|
sar = &authv1.SubjectAccessReview{
|
|
Spec: authv1.SubjectAccessReviewSpec{
|
|
User: subject,
|
|
ResourceAttributes: resource,
|
|
},
|
|
}
|
|
default:
|
|
framework.Failf("invalid subjectKind %s", subjectKind)
|
|
}
|
|
|
|
s, err := c.AuthorizationV1().SubjectAccessReviews().Create(context.TODO(), sar, metav1.CreateOptions{})
|
|
framework.ExpectNoError(err, "error getting SubjectAccessReview for %s %s to resource %+v", subjectKind, subject, *sar.Spec.ResourceAttributes)
|
|
|
|
gomega.Expect(s.Status.Allowed).Should(gomega.BeTrue(), "%s %s has no access to resource %+v", subjectKind, subject, *sar.Spec.ResourceAttributes)
|
|
}
|
|
|
|
// matchers
|
|
|
|
func subjectMatcher(name, kind string) gomega.OmegaMatcher {
|
|
return gstruct.MatchFields(gstruct.IgnoreExtras, gstruct.Fields{
|
|
"Name": gomega.Equal(name),
|
|
"Kind": gomega.Equal(kind),
|
|
})
|
|
}
|