
Automatic merge from submit-queue (batch tested with PRs 55938, 56055, 53385, 55796, 55922). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. admission: make admission metrics compositional Metrics emission of admission plugins and the admission chain can be implemented compositionally, i.e. completely independently from the chain logic. This PR does that, moves the whole metrics code into a sub-package to contain complexity. The plumbing logic for the emitted metrics finally is cleanly done in the apiserver bootstrapping code, instead of being totally interleaved with the core admission logic. Ratio: - considerably less complexity - admission plugins are compositional, including the chain. We cannot assume that there is only one chain at the outside of the admission plugin structure. Downstream projects might have more complex admission chains, i.e. multiple chain object nested. - addition of metrics is plumbing and should be in the apiserver plumbing code. This makes it much easier to reason about the security critical admission chain. Follow-up of #55183 and based on #55919.
173 lines
6.3 KiB
Go
173 lines
6.3 KiB
Go
/*
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package autoprovision
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
"k8s.io/apiserver/pkg/admission"
|
|
core "k8s.io/client-go/testing"
|
|
api "k8s.io/kubernetes/pkg/apis/core"
|
|
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/fake"
|
|
informers "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion"
|
|
kubeadmission "k8s.io/kubernetes/pkg/kubeapiserver/admission"
|
|
)
|
|
|
|
// newHandlerForTest returns the admission controller configured for testing.
|
|
func newHandlerForTest(c clientset.Interface) (admission.MutationInterface, informers.SharedInformerFactory, error) {
|
|
f := informers.NewSharedInformerFactory(c, 5*time.Minute)
|
|
handler := NewProvision()
|
|
pluginInitializer := kubeadmission.NewPluginInitializer(c, f, nil, nil, nil)
|
|
pluginInitializer.Initialize(handler)
|
|
err := admission.ValidateInitialization(handler)
|
|
return handler, f, err
|
|
}
|
|
|
|
// newMockClientForTest creates a mock client that returns a client configured for the specified list of namespaces.
|
|
func newMockClientForTest(namespaces []string) *fake.Clientset {
|
|
mockClient := &fake.Clientset{}
|
|
mockClient.AddReactor("list", "namespaces", func(action core.Action) (bool, runtime.Object, error) {
|
|
namespaceList := &api.NamespaceList{
|
|
ListMeta: metav1.ListMeta{
|
|
ResourceVersion: fmt.Sprintf("%d", len(namespaces)),
|
|
},
|
|
}
|
|
for i, ns := range namespaces {
|
|
namespaceList.Items = append(namespaceList.Items, api.Namespace{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: ns,
|
|
ResourceVersion: fmt.Sprintf("%d", i),
|
|
},
|
|
})
|
|
}
|
|
return true, namespaceList, nil
|
|
})
|
|
return mockClient
|
|
}
|
|
|
|
// newPod returns a new pod for the specified namespace
|
|
func newPod(namespace string) api.Pod {
|
|
return api.Pod{
|
|
ObjectMeta: metav1.ObjectMeta{Name: "123", Namespace: namespace},
|
|
Spec: api.PodSpec{
|
|
Volumes: []api.Volume{{Name: "vol"}},
|
|
Containers: []api.Container{{Name: "ctr", Image: "image"}},
|
|
},
|
|
}
|
|
}
|
|
|
|
// hasCreateNamespaceAction returns true if it has the create namespace action
|
|
func hasCreateNamespaceAction(mockClient *fake.Clientset) bool {
|
|
for _, action := range mockClient.Actions() {
|
|
if action.GetVerb() == "create" && action.GetResource().Resource == "namespaces" {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// TestAdmission verifies a namespace is created on create requests for namespace managed resources
|
|
func TestAdmission(t *testing.T) {
|
|
namespace := "test"
|
|
mockClient := newMockClientForTest([]string{})
|
|
handler, informerFactory, err := newHandlerForTest(mockClient)
|
|
if err != nil {
|
|
t.Errorf("unexpected error initializing handler: %v", err)
|
|
}
|
|
informerFactory.Start(wait.NeverStop)
|
|
|
|
pod := newPod(namespace)
|
|
err = handler.Admit(admission.NewAttributesRecord(&pod, nil, api.Kind("Pod").WithVersion("version"), pod.Namespace, pod.Name, api.Resource("pods").WithVersion("version"), "", admission.Create, nil))
|
|
if err != nil {
|
|
t.Errorf("unexpected error returned from admission handler")
|
|
}
|
|
if !hasCreateNamespaceAction(mockClient) {
|
|
t.Errorf("expected create namespace action")
|
|
}
|
|
}
|
|
|
|
// TestAdmissionNamespaceExists verifies that no client call is made when a namespace already exists
|
|
func TestAdmissionNamespaceExists(t *testing.T) {
|
|
namespace := "test"
|
|
mockClient := newMockClientForTest([]string{namespace})
|
|
handler, informerFactory, err := newHandlerForTest(mockClient)
|
|
if err != nil {
|
|
t.Errorf("unexpected error initializing handler: %v", err)
|
|
}
|
|
informerFactory.Start(wait.NeverStop)
|
|
|
|
pod := newPod(namespace)
|
|
err = handler.Admit(admission.NewAttributesRecord(&pod, nil, api.Kind("Pod").WithVersion("version"), pod.Namespace, pod.Name, api.Resource("pods").WithVersion("version"), "", admission.Create, nil))
|
|
if err != nil {
|
|
t.Errorf("unexpected error returned from admission handler")
|
|
}
|
|
if hasCreateNamespaceAction(mockClient) {
|
|
t.Errorf("unexpected create namespace action")
|
|
}
|
|
}
|
|
|
|
// TestIgnoreAdmission validates that a request is ignored if its not a create
|
|
func TestIgnoreAdmission(t *testing.T) {
|
|
namespace := "test"
|
|
mockClient := newMockClientForTest([]string{})
|
|
handler, informerFactory, err := newHandlerForTest(mockClient)
|
|
if err != nil {
|
|
t.Errorf("unexpected error initializing handler: %v", err)
|
|
}
|
|
informerFactory.Start(wait.NeverStop)
|
|
chainHandler := admission.NewChainHandler(handler)
|
|
|
|
pod := newPod(namespace)
|
|
err = chainHandler.Admit(admission.NewAttributesRecord(&pod, nil, api.Kind("Pod").WithVersion("version"), pod.Namespace, pod.Name, api.Resource("pods").WithVersion("version"), "", admission.Update, nil))
|
|
if err != nil {
|
|
t.Errorf("unexpected error returned from admission handler")
|
|
}
|
|
if hasCreateNamespaceAction(mockClient) {
|
|
t.Errorf("unexpected create namespace action")
|
|
}
|
|
}
|
|
|
|
func TestAdmissionWithLatentCache(t *testing.T) {
|
|
namespace := "test"
|
|
mockClient := newMockClientForTest([]string{})
|
|
mockClient.AddReactor("create", "namespaces", func(action core.Action) (bool, runtime.Object, error) {
|
|
return true, nil, errors.NewAlreadyExists(api.Resource("namespaces"), namespace)
|
|
})
|
|
handler, informerFactory, err := newHandlerForTest(mockClient)
|
|
if err != nil {
|
|
t.Errorf("unexpected error initializing handler: %v", err)
|
|
}
|
|
informerFactory.Start(wait.NeverStop)
|
|
|
|
pod := newPod(namespace)
|
|
err = handler.Admit(admission.NewAttributesRecord(&pod, nil, api.Kind("Pod").WithVersion("version"), pod.Namespace, pod.Name, api.Resource("pods").WithVersion("version"), "", admission.Create, nil))
|
|
if err != nil {
|
|
t.Errorf("unexpected error returned from admission handler")
|
|
}
|
|
|
|
if !hasCreateNamespaceAction(mockClient) {
|
|
t.Errorf("expected create namespace action")
|
|
}
|
|
}
|