Implement AppArmor Kubelet support
This commit is contained in:
@@ -21,6 +21,7 @@ import (
|
||||
"testing"
|
||||
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
"k8s.io/kubernetes/pkg/kubelet/lifecycle"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
@@ -36,7 +37,7 @@ func TestGetAppArmorFS(t *testing.T) {
|
||||
assert.Equal(t, expectedPath, actualPath)
|
||||
}
|
||||
|
||||
func TestValidateHost(t *testing.T) {
|
||||
func TestAdmitHost(t *testing.T) {
|
||||
// This test only passes on systems running AppArmor with the default configuration.
|
||||
// The test should be manually run if modifying the getAppArmorFS function.
|
||||
t.Skip()
|
||||
@@ -45,7 +46,7 @@ func TestValidateHost(t *testing.T) {
|
||||
assert.Error(t, validateHost("rkt"))
|
||||
}
|
||||
|
||||
func TestValidateProfile(t *testing.T) {
|
||||
func TestAdmitProfile(t *testing.T) {
|
||||
loadedProfiles := map[string]bool{
|
||||
"docker-default": true,
|
||||
"foo-bar": true,
|
||||
@@ -78,7 +79,7 @@ func TestValidateProfile(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
func TestValidateBadHost(t *testing.T) {
|
||||
func TestAdmitBadHost(t *testing.T) {
|
||||
hostErr := errors.New("expected host error")
|
||||
v := &validator{
|
||||
validateHostErr: hostErr,
|
||||
@@ -94,16 +95,20 @@ func TestValidateBadHost(t *testing.T) {
|
||||
}
|
||||
|
||||
for _, test := range tests {
|
||||
err := v.Validate(getPodWithProfile(test.profile))
|
||||
result := v.Admit(&lifecycle.PodAdmitAttributes{
|
||||
Pod: getPodWithProfile(test.profile),
|
||||
})
|
||||
if test.expectValid {
|
||||
assert.NoError(t, err, "Pod with profile %q should be valid", test.profile)
|
||||
assert.True(t, result.Admit, "Pod with profile %q should be admitted", test.profile)
|
||||
} else {
|
||||
assert.Equal(t, hostErr, err, "Pod with profile %q should trigger a host validation error", test.profile)
|
||||
assert.False(t, result.Admit, "Pod with profile %q should be rejected", test.profile)
|
||||
assert.Equal(t, rejectReason, result.Reason, "Pod with profile %q", test.profile)
|
||||
assert.Contains(t, result.Message, hostErr.Error(), "Pod with profile %q", test.profile)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestValidateValidHost(t *testing.T) {
|
||||
func TestAdmitValidHost(t *testing.T) {
|
||||
v := &validator{
|
||||
appArmorFS: "./testdata/",
|
||||
}
|
||||
@@ -123,11 +128,15 @@ func TestValidateValidHost(t *testing.T) {
|
||||
}
|
||||
|
||||
for _, test := range tests {
|
||||
err := v.Validate(getPodWithProfile(test.profile))
|
||||
result := v.Admit(&lifecycle.PodAdmitAttributes{
|
||||
Pod: getPodWithProfile(test.profile),
|
||||
})
|
||||
if test.expectValid {
|
||||
assert.NoError(t, err, "Pod with profile %q should be valid", test.profile)
|
||||
assert.True(t, result.Admit, "Pod with profile %q should be admitted", test.profile)
|
||||
} else {
|
||||
assert.Error(t, err, "Pod with profile %q should trigger a validation error", test.profile)
|
||||
assert.False(t, result.Admit, "Pod with profile %q should be rejected", test.profile)
|
||||
assert.Equal(t, rejectReason, result.Reason, "Pod with profile %q", test.profile)
|
||||
assert.NotEmpty(t, result.Message, "Pod with profile %q", test.profile)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -151,10 +160,16 @@ func TestValidateValidHost(t *testing.T) {
|
||||
},
|
||||
},
|
||||
}
|
||||
assert.NoError(t, v.Validate(pod), "Multi-container pod should validate")
|
||||
assert.True(t, v.Admit(&lifecycle.PodAdmitAttributes{Pod: pod}).Admit,
|
||||
"Multi-container pod should be admitted")
|
||||
for k, val := range pod.Annotations {
|
||||
pod.Annotations[k] = val + "-bad"
|
||||
assert.Error(t, v.Validate(pod), "Multi-container pod with invalid profile %s:%s", k, pod.Annotations[k])
|
||||
|
||||
result := v.Admit(&lifecycle.PodAdmitAttributes{Pod: pod})
|
||||
assert.False(t, result.Admit, "Multi-container pod with invalid profile should be rejected")
|
||||
assert.Equal(t, rejectReason, result.Reason, "Multi-container pod with invalid profile")
|
||||
assert.NotEmpty(t, result.Message, "Multi-container pod with invalid profile")
|
||||
|
||||
pod.Annotations[k] = val // Restore.
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user