
Handle failure cases on startup gracefully to avoid causing cascading errors and poor initialization in other components. Initial errors from config load cause the initializer to pause and hold requests. Return typed errors to better communicate failures to clients. Add code to handle two specific cases - admin wants to bypass initialization defaulting, and mirror pods (which want to bypass initialization because the kubelet owns their lifecycle).
497 lines
17 KiB
Go
497 lines
17 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package gc
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
"k8s.io/apiserver/pkg/admission"
|
|
"k8s.io/apiserver/pkg/authentication/user"
|
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
|
"k8s.io/kubernetes/pkg/api"
|
|
kubeadmission "k8s.io/kubernetes/pkg/kubeapiserver/admission"
|
|
)
|
|
|
|
type fakeAuthorizer struct{}
|
|
|
|
func (fakeAuthorizer) Authorize(a authorizer.Attributes) (bool, string, error) {
|
|
username := a.GetUser().GetName()
|
|
|
|
if username == "non-deleter" {
|
|
if a.GetVerb() == "delete" {
|
|
return false, "", nil
|
|
}
|
|
return true, "", nil
|
|
}
|
|
|
|
if username == "non-pod-deleter" {
|
|
if a.GetVerb() == "delete" && a.GetResource() == "pods" {
|
|
return false, "", nil
|
|
}
|
|
return true, "", nil
|
|
}
|
|
|
|
if username == "non-rc-deleter" {
|
|
if a.GetVerb() == "delete" && a.GetResource() == "replicationcontrollers" {
|
|
return false, "", nil
|
|
}
|
|
return true, "", nil
|
|
}
|
|
|
|
return true, "", nil
|
|
}
|
|
|
|
// newGCPermissionsEnforcement returns the admission controller configured for testing.
|
|
func newGCPermissionsEnforcement() *gcPermissionsEnforcement {
|
|
// the pods/status endpoint is ignored by this plugin since old kubelets
|
|
// corrupt them. the pod status strategy ensures status updates cannot mutate
|
|
// ownerRef.
|
|
whiteList := []whiteListItem{
|
|
{
|
|
groupResource: schema.GroupResource{Resource: "pods"},
|
|
subresource: "status",
|
|
},
|
|
}
|
|
gcAdmit := &gcPermissionsEnforcement{
|
|
Handler: admission.NewHandler(admission.Create, admission.Update),
|
|
whiteList: whiteList,
|
|
}
|
|
pluginInitializer := kubeadmission.NewPluginInitializer(nil, nil, nil, fakeAuthorizer{}, nil, api.Registry.RESTMapper(), nil)
|
|
pluginInitializer.Initialize(gcAdmit)
|
|
return gcAdmit
|
|
}
|
|
|
|
func TestGCAdmission(t *testing.T) {
|
|
expectNoError := func(err error) bool {
|
|
return err == nil
|
|
}
|
|
expectCantSetOwnerRefError := func(err error) bool {
|
|
return strings.Contains(err.Error(), "cannot set an ownerRef on a resource you can't delete")
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
username string
|
|
resource schema.GroupVersionResource
|
|
subresource string
|
|
oldObj runtime.Object
|
|
newObj runtime.Object
|
|
|
|
checkError func(error) bool
|
|
}{
|
|
{
|
|
name: "super-user, create, no objectref change",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: &api.Pod{},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "super-user, create, objectref change",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-deleter, create, no objectref change",
|
|
username: "non-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: &api.Pod{},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-deleter, create, objectref change",
|
|
username: "non-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectCantSetOwnerRefError,
|
|
},
|
|
{
|
|
name: "non-pod-deleter, create, no objectref change",
|
|
username: "non-pod-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: &api.Pod{},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-pod-deleter, create, objectref change",
|
|
username: "non-pod-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectCantSetOwnerRefError,
|
|
},
|
|
{
|
|
name: "non-pod-deleter, create, objectref change, but not a pod",
|
|
username: "non-pod-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("not-pods"),
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectNoError,
|
|
},
|
|
|
|
{
|
|
name: "super-user, update, no objectref change",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "super-user, update, no objectref change two",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "super-user, update, objectref change",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-deleter, update, no objectref change",
|
|
username: "non-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-deleter, update, no objectref change two",
|
|
username: "non-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-deleter, update, objectref change",
|
|
username: "non-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectCantSetOwnerRefError,
|
|
},
|
|
{
|
|
name: "non-deleter, update, objectref change two",
|
|
username: "non-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}, {Name: "second"}}}},
|
|
checkError: expectCantSetOwnerRefError,
|
|
},
|
|
{
|
|
name: "non-pod-deleter, update, no objectref change",
|
|
username: "non-pod-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-pod-deleter, update status, objectref change",
|
|
username: "non-pod-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
subresource: "status",
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-pod-deleter, update, objectref change",
|
|
username: "non-pod-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectCantSetOwnerRefError,
|
|
},
|
|
{
|
|
name: "non-pod-deleter, update, objectref change, but not a pod",
|
|
username: "non-pod-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("not-pods"),
|
|
oldObj: &api.Pod{},
|
|
newObj: &api.Pod{ObjectMeta: metav1.ObjectMeta{OwnerReferences: []metav1.OwnerReference{{Name: "first"}}}},
|
|
checkError: expectNoError,
|
|
},
|
|
}
|
|
gcAdmit := newGCPermissionsEnforcement()
|
|
|
|
for _, tc := range tests {
|
|
operation := admission.Create
|
|
if tc.oldObj != nil {
|
|
operation = admission.Update
|
|
}
|
|
user := &user.DefaultInfo{Name: tc.username}
|
|
attributes := admission.NewAttributesRecord(tc.newObj, tc.oldObj, schema.GroupVersionKind{}, metav1.NamespaceDefault, "foo", tc.resource, tc.subresource, operation, user)
|
|
|
|
err := gcAdmit.Admit(attributes)
|
|
if !tc.checkError(err) {
|
|
t.Errorf("%v: unexpected err: %v", tc.name, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestBlockOwnerDeletionAdmission(t *testing.T) {
|
|
podWithOwnerRefs := func(refs ...metav1.OwnerReference) *api.Pod {
|
|
var refSlice []metav1.OwnerReference
|
|
for _, ref := range refs {
|
|
refSlice = append(refSlice, ref)
|
|
}
|
|
return &api.Pod{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
OwnerReferences: refSlice,
|
|
},
|
|
}
|
|
}
|
|
|
|
getTrueVar := func() *bool {
|
|
ret := true
|
|
return &ret
|
|
}
|
|
|
|
getFalseVar := func() *bool {
|
|
ret := false
|
|
return &ret
|
|
}
|
|
blockRC1 := metav1.OwnerReference{
|
|
APIVersion: "v1",
|
|
Kind: "ReplicationController",
|
|
Name: "rc1",
|
|
BlockOwnerDeletion: getTrueVar(),
|
|
}
|
|
blockRC2 := metav1.OwnerReference{
|
|
APIVersion: "v1",
|
|
Kind: "ReplicationController",
|
|
Name: "rc2",
|
|
BlockOwnerDeletion: getTrueVar(),
|
|
}
|
|
notBlockRC1 := metav1.OwnerReference{
|
|
APIVersion: "v1",
|
|
Kind: "ReplicationController",
|
|
Name: "rc1",
|
|
BlockOwnerDeletion: getFalseVar(),
|
|
}
|
|
notBlockRC2 := metav1.OwnerReference{
|
|
APIVersion: "v1",
|
|
Kind: "ReplicationController",
|
|
Name: "rc2",
|
|
BlockOwnerDeletion: getFalseVar(),
|
|
}
|
|
nilBlockRC1 := metav1.OwnerReference{
|
|
APIVersion: "v1",
|
|
Kind: "ReplicationController",
|
|
Name: "rc1",
|
|
}
|
|
nilBlockRC2 := metav1.OwnerReference{
|
|
APIVersion: "v1",
|
|
Kind: "ReplicationController",
|
|
Name: "rc2",
|
|
}
|
|
blockDS1 := metav1.OwnerReference{
|
|
APIVersion: "extensions/v1beta1",
|
|
Kind: "DaemonSet",
|
|
Name: "ds1",
|
|
BlockOwnerDeletion: getTrueVar(),
|
|
}
|
|
notBlockDS1 := metav1.OwnerReference{
|
|
APIVersion: "extensions/v1beta1",
|
|
Kind: "DaemonSet",
|
|
Name: "ds1",
|
|
BlockOwnerDeletion: getFalseVar(),
|
|
}
|
|
|
|
expectNoError := func(err error) bool {
|
|
return err == nil
|
|
}
|
|
expectCantSetBlockOwnerDeletionError := func(err error) bool {
|
|
return strings.Contains(err.Error(), "cannot set blockOwnerDeletion if an ownerReference refers to a resource you can't delete")
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
username string
|
|
resource schema.GroupVersionResource
|
|
subresource string
|
|
oldObj runtime.Object
|
|
newObj runtime.Object
|
|
|
|
checkError func(error) bool
|
|
}{
|
|
// cases for create
|
|
{
|
|
name: "super-user, create, no ownerReferences",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: podWithOwnerRefs(),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "super-user, create, all ownerReferences have blockOwnerDeletion=false",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: podWithOwnerRefs(notBlockRC1, notBlockRC2),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "super-user, create, some ownerReferences have blockOwnerDeletion=true",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: podWithOwnerRefs(blockRC1, blockRC2),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, create, no ownerReferences",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: podWithOwnerRefs(),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, create, all ownerReferences have blockOwnerDeletion=false or nil",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: podWithOwnerRefs(notBlockRC1, nilBlockRC2),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, create, some ownerReferences have blockOwnerDeletion=true",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: podWithOwnerRefs(blockRC1, notBlockRC2),
|
|
checkError: expectCantSetBlockOwnerDeletionError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, create, some ownerReferences have blockOwnerDeletion=true, but are pointing to daemonset",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
newObj: podWithOwnerRefs(blockDS1),
|
|
checkError: expectNoError,
|
|
},
|
|
// cases are for update
|
|
{
|
|
name: "super-user, update, no ownerReferences change blockOwnerDeletion",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(nilBlockRC1),
|
|
newObj: podWithOwnerRefs(notBlockRC1),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "super-user, update, some ownerReferences change to blockOwnerDeletion=true",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(notBlockRC1),
|
|
newObj: podWithOwnerRefs(blockRC1),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "super-user, update, add new ownerReferences with blockOwnerDeletion=true",
|
|
username: "super",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(),
|
|
newObj: podWithOwnerRefs(blockRC1),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, no ownerReferences change blockOwnerDeletion",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(nilBlockRC1),
|
|
newObj: podWithOwnerRefs(notBlockRC1),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, some ownerReferences change from blockOwnerDeletion=false to true",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(notBlockRC1),
|
|
newObj: podWithOwnerRefs(blockRC1),
|
|
checkError: expectCantSetBlockOwnerDeletionError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, some ownerReferences change from blockOwnerDeletion=nil to true",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(nilBlockRC1),
|
|
newObj: podWithOwnerRefs(blockRC1),
|
|
checkError: expectCantSetBlockOwnerDeletionError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, some ownerReferences change from blockOwnerDeletion=true to false",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(blockRC1),
|
|
newObj: podWithOwnerRefs(notBlockRC1),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, some ownerReferences change blockOwnerDeletion, but all such references are to daemonset",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(notBlockDS1),
|
|
newObj: podWithOwnerRefs(blockDS1),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, add new ownerReferences with blockOwnerDeletion=nil or false",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(),
|
|
newObj: podWithOwnerRefs(notBlockRC1, nilBlockRC2),
|
|
checkError: expectNoError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, add new ownerReferences with blockOwnerDeletion=true",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(),
|
|
newObj: podWithOwnerRefs(blockRC1),
|
|
checkError: expectCantSetBlockOwnerDeletionError,
|
|
},
|
|
{
|
|
name: "non-rc-deleter, update, add new ownerReferences with blockOwnerDeletion=true, but the references are to daemonset",
|
|
username: "non-rc-deleter",
|
|
resource: api.SchemeGroupVersion.WithResource("pods"),
|
|
oldObj: podWithOwnerRefs(),
|
|
newObj: podWithOwnerRefs(blockDS1),
|
|
checkError: expectNoError,
|
|
},
|
|
}
|
|
gcAdmit := newGCPermissionsEnforcement()
|
|
|
|
for _, tc := range tests {
|
|
operation := admission.Create
|
|
if tc.oldObj != nil {
|
|
operation = admission.Update
|
|
}
|
|
user := &user.DefaultInfo{Name: tc.username}
|
|
attributes := admission.NewAttributesRecord(tc.newObj, tc.oldObj, schema.GroupVersionKind{}, metav1.NamespaceDefault, "foo", tc.resource, tc.subresource, operation, user)
|
|
|
|
err := gcAdmit.Admit(attributes)
|
|
if !tc.checkError(err) {
|
|
t.Errorf("%v: unexpected err: %v", tc.name, err)
|
|
}
|
|
}
|
|
}
|