mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 13:50:01 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			132 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			132 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2019 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package auth
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"io/ioutil"
 | |
| 	"os"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apiserver/pkg/authentication/authenticator"
 | |
| 	"k8s.io/apiserver/pkg/authorization/authorizerfactory"
 | |
| 	utilfeature "k8s.io/apiserver/pkg/util/feature"
 | |
| 	clientset "k8s.io/client-go/kubernetes"
 | |
| 	restclient "k8s.io/client-go/rest"
 | |
| 	featuregatetesting "k8s.io/component-base/featuregate/testing"
 | |
| 	"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
 | |
| 	"k8s.io/kubernetes/pkg/controller"
 | |
| 	"k8s.io/kubernetes/pkg/features"
 | |
| 	kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
 | |
| 	"k8s.io/kubernetes/pkg/master"
 | |
| 	"k8s.io/kubernetes/test/integration/framework"
 | |
| )
 | |
| 
 | |
| func TestDynamicClientBuilder(t *testing.T) {
 | |
| 	defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.TokenRequest, true)()
 | |
| 
 | |
| 	tmpfile, err := ioutil.TempFile("/tmp", "key")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("create temp file failed: %v", err)
 | |
| 	}
 | |
| 	defer os.RemoveAll(tmpfile.Name())
 | |
| 
 | |
| 	if err = ioutil.WriteFile(tmpfile.Name(), []byte(ecdsaPrivateKey), 0666); err != nil {
 | |
| 		t.Fatalf("write file %s failed: %v", tmpfile.Name(), err)
 | |
| 	}
 | |
| 
 | |
| 	const iss = "https://foo.bar.example.com"
 | |
| 	aud := authenticator.Audiences{"api"}
 | |
| 
 | |
| 	maxExpirationDuration := time.Second * 60 * 60
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("parse duration failed: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	stopCh := make(chan struct{})
 | |
| 	defer close(stopCh)
 | |
| 
 | |
| 	baseClient, baseConfig := framework.StartTestServer(t, stopCh, framework.TestServerSetup{
 | |
| 		ModifyServerRunOptions: func(opts *options.ServerRunOptions) {
 | |
| 			opts.ServiceAccountSigningKeyFile = tmpfile.Name()
 | |
| 			opts.ServiceAccountTokenMaxExpiration = maxExpirationDuration
 | |
| 			if opts.Authentication == nil {
 | |
| 				opts.Authentication = &kubeoptions.BuiltInAuthenticationOptions{}
 | |
| 			}
 | |
| 
 | |
| 			opts.Authentication.APIAudiences = aud
 | |
| 			if opts.Authentication.ServiceAccounts == nil {
 | |
| 				opts.Authentication.ServiceAccounts = &kubeoptions.ServiceAccountAuthenticationOptions{}
 | |
| 			}
 | |
| 			opts.Authentication.ServiceAccounts.Issuer = iss
 | |
| 			opts.Authentication.ServiceAccounts.KeyFiles = []string{tmpfile.Name()}
 | |
| 		},
 | |
| 		ModifyServerConfig: func(config *master.Config) {
 | |
| 			config.GenericConfig.Authorization.Authorizer = authorizerfactory.NewAlwaysAllowAuthorizer()
 | |
| 		},
 | |
| 	})
 | |
| 
 | |
| 	// We want to test if the token rotation works fine here.
 | |
| 	// To minimize the time this test would consume, we use the minimial token expiration.
 | |
| 	// The minimial token expiration is defined in:
 | |
| 	// pkg/apis/authentication/validation/validation.go
 | |
| 	exp := int64(600)
 | |
| 	leeway := 99
 | |
| 	ns := "default"
 | |
| 	clientBuilder := controller.NewTestDynamicClientBuilder(
 | |
| 		restclient.AnonymousClientConfig(baseConfig),
 | |
| 		baseClient.CoreV1(),
 | |
| 		ns, exp, leeway)
 | |
| 
 | |
| 	saName := "dt"
 | |
| 	dymClient, err := clientBuilder.Client(saName)
 | |
| 
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("build client via dynamic client builder failed: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	if err = testClientBuilder(dymClient, ns, saName); err != nil {
 | |
| 		t.Fatalf("dynamic client get resources failed befroe deleting sa: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// We want to trigger token rotation here by deleting service account
 | |
| 	// the dynamic client was using.
 | |
| 	if err = dymClient.CoreV1().ServiceAccounts(ns).Delete(context.TODO(), saName, metav1.DeleteOptions{}); err != nil {
 | |
| 		t.Fatalf("delete service account %s failed: %v", saName, err)
 | |
| 	}
 | |
| 	time.Sleep(time.Second * 10)
 | |
| 
 | |
| 	if err = testClientBuilder(dymClient, ns, saName); err != nil {
 | |
| 		t.Fatalf("dynamic client get resources failed after deleting sa: %v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testClientBuilder(dymClient clientset.Interface, ns, saName string) error {
 | |
| 	_, err := dymClient.CoreV1().Namespaces().Get(context.TODO(), ns, metav1.GetOptions{})
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	_, err = dymClient.CoreV1().ServiceAccounts(ns).Get(context.TODO(), saName, metav1.GetOptions{})
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |