mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-11-03 23:40:03 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			152 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			152 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package framework
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"sync"
 | 
						|
	"time"
 | 
						|
 | 
						|
	authorizationv1beta1 "k8s.io/api/authorization/v1beta1"
 | 
						|
	rbacv1beta1 "k8s.io/api/rbac/v1beta1"
 | 
						|
	apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						|
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						|
	v1beta1authorization "k8s.io/client-go/kubernetes/typed/authorization/v1beta1"
 | 
						|
	v1beta1rbac "k8s.io/client-go/kubernetes/typed/rbac/v1beta1"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	policyCachePollInterval = 100 * time.Millisecond
 | 
						|
	policyCachePollTimeout  = 5 * time.Second
 | 
						|
)
 | 
						|
 | 
						|
// WaitForAuthorizationUpdate checks if the given user can perform the named verb and action.
 | 
						|
// If policyCachePollTimeout is reached without the expected condition matching, an error is returned
 | 
						|
func WaitForAuthorizationUpdate(c v1beta1authorization.SubjectAccessReviewsGetter, user, namespace, verb string, resource schema.GroupResource, allowed bool) error {
 | 
						|
	return WaitForNamedAuthorizationUpdate(c, user, namespace, verb, "", resource, allowed)
 | 
						|
}
 | 
						|
 | 
						|
// WaitForAuthorizationUpdate checks if the given user can perform the named verb and action on the named resource.
 | 
						|
// If policyCachePollTimeout is reached without the expected condition matching, an error is returned
 | 
						|
func WaitForNamedAuthorizationUpdate(c v1beta1authorization.SubjectAccessReviewsGetter, user, namespace, verb, resourceName string, resource schema.GroupResource, allowed bool) error {
 | 
						|
	review := &authorizationv1beta1.SubjectAccessReview{
 | 
						|
		Spec: authorizationv1beta1.SubjectAccessReviewSpec{
 | 
						|
			ResourceAttributes: &authorizationv1beta1.ResourceAttributes{
 | 
						|
				Group:     resource.Group,
 | 
						|
				Verb:      verb,
 | 
						|
				Resource:  resource.Resource,
 | 
						|
				Namespace: namespace,
 | 
						|
				Name:      resourceName,
 | 
						|
			},
 | 
						|
			User: user,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	err := wait.Poll(policyCachePollInterval, policyCachePollTimeout, func() (bool, error) {
 | 
						|
		response, err := c.SubjectAccessReviews().Create(review)
 | 
						|
		// GKE doesn't enable the SAR endpoint.  Without this endpoint, we cannot determine if the policy engine
 | 
						|
		// has adjusted as expected.  In this case, simply wait one second and hope it's up to date
 | 
						|
		if apierrors.IsNotFound(err) {
 | 
						|
			fmt.Printf("SubjectAccessReview endpoint is missing\n")
 | 
						|
			time.Sleep(1 * time.Second)
 | 
						|
			return true, nil
 | 
						|
		}
 | 
						|
		if err != nil {
 | 
						|
			return false, err
 | 
						|
		}
 | 
						|
		if response.Status.Allowed != allowed {
 | 
						|
			return false, nil
 | 
						|
		}
 | 
						|
		return true, nil
 | 
						|
	})
 | 
						|
	return err
 | 
						|
}
 | 
						|
 | 
						|
// BindClusterRole binds the cluster role at the cluster scope
 | 
						|
func BindClusterRole(c v1beta1rbac.ClusterRoleBindingsGetter, clusterRole, ns string, subjects ...rbacv1beta1.Subject) {
 | 
						|
	// Since the namespace names are unique, we can leave this lying around so we don't have to race any caches
 | 
						|
	_, err := c.ClusterRoleBindings().Create(&rbacv1beta1.ClusterRoleBinding{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: ns + "--" + clusterRole,
 | 
						|
		},
 | 
						|
		RoleRef: rbacv1beta1.RoleRef{
 | 
						|
			APIGroup: "rbac.authorization.k8s.io",
 | 
						|
			Kind:     "ClusterRole",
 | 
						|
			Name:     clusterRole,
 | 
						|
		},
 | 
						|
		Subjects: subjects,
 | 
						|
	})
 | 
						|
 | 
						|
	// if we failed, don't fail the entire test because it may still work. RBAC may simply be disabled.
 | 
						|
	if err != nil {
 | 
						|
		fmt.Printf("Error binding clusterrole/%s for %q for %v\n", clusterRole, ns, subjects)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// BindClusterRoleInNamespace binds the cluster role at the namespace scope
 | 
						|
func BindClusterRoleInNamespace(c v1beta1rbac.RoleBindingsGetter, clusterRole, ns string, subjects ...rbacv1beta1.Subject) {
 | 
						|
	bindInNamespace(c, "ClusterRole", clusterRole, ns, subjects...)
 | 
						|
}
 | 
						|
 | 
						|
// BindRoleInNamespace binds the role at the namespace scope
 | 
						|
func BindRoleInNamespace(c v1beta1rbac.RoleBindingsGetter, role, ns string, subjects ...rbacv1beta1.Subject) {
 | 
						|
	bindInNamespace(c, "Role", role, ns, subjects...)
 | 
						|
}
 | 
						|
 | 
						|
func bindInNamespace(c v1beta1rbac.RoleBindingsGetter, roleType, role, ns string, subjects ...rbacv1beta1.Subject) {
 | 
						|
	// Since the namespace names are unique, we can leave this lying around so we don't have to race any caches
 | 
						|
	_, err := c.RoleBindings(ns).Create(&rbacv1beta1.RoleBinding{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: ns + "--" + role,
 | 
						|
		},
 | 
						|
		RoleRef: rbacv1beta1.RoleRef{
 | 
						|
			APIGroup: "rbac.authorization.k8s.io",
 | 
						|
			Kind:     roleType,
 | 
						|
			Name:     role,
 | 
						|
		},
 | 
						|
		Subjects: subjects,
 | 
						|
	})
 | 
						|
 | 
						|
	// if we failed, don't fail the entire test because it may still work. RBAC may simply be disabled.
 | 
						|
	if err != nil {
 | 
						|
		fmt.Printf("Error binding %s/%s into %q for %v\n", roleType, role, ns, subjects)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	isRBACEnabledOnce sync.Once
 | 
						|
	isRBACEnabled     bool
 | 
						|
)
 | 
						|
 | 
						|
func IsRBACEnabled(f *Framework) bool {
 | 
						|
	isRBACEnabledOnce.Do(func() {
 | 
						|
		crs, err := f.ClientSet.RbacV1().ClusterRoles().List(metav1.ListOptions{})
 | 
						|
		if err != nil {
 | 
						|
			Logf("Error listing ClusterRoles; assuming RBAC is disabled: %v", err)
 | 
						|
			isRBACEnabled = false
 | 
						|
		} else if crs == nil || len(crs.Items) == 0 {
 | 
						|
			Logf("No ClusteRoles found; assuming RBAC is disabled.")
 | 
						|
			isRBACEnabled = false
 | 
						|
		} else {
 | 
						|
			Logf("Found ClusterRoles; assuming RBAC is enabled.")
 | 
						|
			isRBACEnabled = true
 | 
						|
		}
 | 
						|
	})
 | 
						|
	return isRBACEnabled
 | 
						|
}
 |