
This significantly reduces the surface area of the fieldmanager package by hiding all the private "managers" objects, as well as the interface that was made specifically for these. There is no reason to configure these.
238 lines
8.2 KiB
Go
238 lines
8.2 KiB
Go
/*
|
|
Copyright 2020 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package admissionwebhook
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
v1 "k8s.io/api/admission/v1"
|
|
admissionv1 "k8s.io/api/admissionregistration/v1"
|
|
corev1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
v1validation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
"k8s.io/apiserver/pkg/endpoints/handlers/fieldmanager"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
restclient "k8s.io/client-go/rest"
|
|
kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
|
|
"k8s.io/kubernetes/test/integration/framework"
|
|
)
|
|
|
|
// TestMutatingWebhookResetsInvalidManagedFields ensures that the API server
|
|
// resets managedFields to their state before admission if a mutating webhook
|
|
// patches create/update requests with invalid managedFields.
|
|
func TestMutatingWebhookResetsInvalidManagedFields(t *testing.T) {
|
|
roots := x509.NewCertPool()
|
|
if !roots.AppendCertsFromPEM(localhostCert) {
|
|
t.Fatal("Failed to append Cert from PEM")
|
|
}
|
|
cert, err := tls.X509KeyPair(localhostCert, localhostKey)
|
|
if err != nil {
|
|
t.Fatalf("Failed to build cert with error: %+v", err)
|
|
}
|
|
|
|
webhookServer := httptest.NewUnstartedServer(newInvalidManagedFieldsWebhookHandler(t))
|
|
webhookServer.TLS = &tls.Config{
|
|
RootCAs: roots,
|
|
Certificates: []tls.Certificate{cert},
|
|
}
|
|
webhookServer.StartTLS()
|
|
defer webhookServer.Close()
|
|
|
|
s := kubeapiservertesting.StartTestServerOrDie(t,
|
|
kubeapiservertesting.NewDefaultTestServerOptions(), []string{
|
|
"--disable-admission-plugins=ServiceAccount",
|
|
}, framework.SharedEtcd())
|
|
defer s.TearDownFn()
|
|
|
|
recordedWarnings := &bytes.Buffer{}
|
|
warningWriter := restclient.NewWarningWriter(recordedWarnings, restclient.WarningWriterOptions{})
|
|
s.ClientConfig.WarningHandler = warningWriter
|
|
client := clientset.NewForConfigOrDie(s.ClientConfig)
|
|
|
|
if _, err := client.CoreV1().Pods("default").Create(
|
|
context.TODO(), invalidManagedFieldsMarkerFixture, metav1.CreateOptions{}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
// make sure we delete the pod even on a failed test
|
|
defer func() {
|
|
if err := client.CoreV1().Pods("default").Delete(context.TODO(), invalidManagedFieldsMarkerFixture.Name, metav1.DeleteOptions{}); err != nil {
|
|
t.Fatalf("failed to delete marker pod: %v", err)
|
|
}
|
|
}()
|
|
|
|
fail := admissionv1.Fail
|
|
none := admissionv1.SideEffectClassNone
|
|
mutatingCfg, err := client.AdmissionregistrationV1().MutatingWebhookConfigurations().Create(context.TODO(), &admissionv1.MutatingWebhookConfiguration{
|
|
ObjectMeta: metav1.ObjectMeta{Name: "invalid-managedfields.admission.integration.test"},
|
|
Webhooks: []admissionv1.MutatingWebhook{{
|
|
Name: "invalid-managedfields.admission.integration.test",
|
|
ClientConfig: admissionv1.WebhookClientConfig{
|
|
URL: &webhookServer.URL,
|
|
CABundle: localhostCert,
|
|
},
|
|
Rules: []admissionv1.RuleWithOperations{{
|
|
Operations: []admissionv1.OperationType{admissionv1.Create, admissionv1.Update},
|
|
Rule: admissionv1.Rule{APIGroups: []string{""}, APIVersions: []string{"v1"}, Resources: []string{"pods"}},
|
|
}},
|
|
FailurePolicy: &fail,
|
|
AdmissionReviewVersions: []string{"v1", "v1beta1"},
|
|
SideEffects: &none,
|
|
}},
|
|
}, metav1.CreateOptions{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer func() {
|
|
err := client.AdmissionregistrationV1().MutatingWebhookConfigurations().Delete(context.TODO(), mutatingCfg.GetName(), metav1.DeleteOptions{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}()
|
|
|
|
var pod *corev1.Pod
|
|
var lastErr error
|
|
// We just expect the general warning text as the detail order might change
|
|
expectedWarning := fmt.Sprintf(fieldmanager.InvalidManagedFieldsAfterMutatingAdmissionWarningFormat, "")
|
|
|
|
// Make sure reset happens on patch requests
|
|
// wait until new webhook is called
|
|
if err := wait.PollImmediate(time.Millisecond*5, wait.ForeverTestTimeout, func() (bool, error) {
|
|
defer recordedWarnings.Reset()
|
|
pod, err = client.CoreV1().Pods("default").Patch(context.TODO(), invalidManagedFieldsMarkerFixture.Name, types.JSONPatchType, []byte("[]"), metav1.PatchOptions{})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
if err := validateManagedFieldsAndDecode(pod.ManagedFields); err != nil {
|
|
lastErr = err
|
|
return false, nil
|
|
}
|
|
if warningWriter.WarningCount() != 1 {
|
|
lastErr = fmt.Errorf("expected one warning, got: %v", warningWriter.WarningCount())
|
|
return false, nil
|
|
}
|
|
if !strings.Contains(recordedWarnings.String(), expectedWarning) {
|
|
lastErr = fmt.Errorf("unexpected warning, expected: \n%v\n, got: \n%v",
|
|
expectedWarning, recordedWarnings.String())
|
|
return false, nil
|
|
}
|
|
lastErr = nil
|
|
return true, nil
|
|
}); err != nil || lastErr != nil {
|
|
t.Fatalf("failed to wait for apiserver handling webhook mutation: %v, last error: %v", err, lastErr)
|
|
}
|
|
|
|
// Make sure reset happens in update requests
|
|
pod, err = client.CoreV1().Pods("default").Update(context.TODO(), pod, metav1.UpdateOptions{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := validateManagedFieldsAndDecode(pod.ManagedFields); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if warningWriter.WarningCount() != 2 {
|
|
t.Errorf("expected two warnings, got: %v", warningWriter.WarningCount())
|
|
}
|
|
if !strings.Contains(recordedWarnings.String(), expectedWarning) {
|
|
t.Errorf("unexpected warning, expected: \n%v\n, got: \n%v",
|
|
expectedWarning, recordedWarnings.String())
|
|
}
|
|
}
|
|
|
|
// validate against both decoding and validation to make sure we use the hardest rule between the both to reset
|
|
// with decoding being as strict as it gets, only using it should be enough in admission
|
|
func validateManagedFieldsAndDecode(managedFields []metav1.ManagedFieldsEntry) error {
|
|
if err := fieldmanager.ValidateManagedFields(managedFields); err != nil {
|
|
return err
|
|
|
|
}
|
|
validationErrs := v1validation.ValidateManagedFields(managedFields, field.NewPath("metadata").Child("managedFields"))
|
|
return validationErrs.ToAggregate()
|
|
}
|
|
|
|
func newInvalidManagedFieldsWebhookHandler(t *testing.T) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
defer r.Body.Close()
|
|
data, err := io.ReadAll(r.Body)
|
|
if err != nil {
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
}
|
|
review := v1.AdmissionReview{}
|
|
if err := json.Unmarshal(data, &review); err != nil {
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
}
|
|
|
|
if len(review.Request.Object.Raw) == 0 {
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
return
|
|
}
|
|
pod := &corev1.Pod{}
|
|
if err := json.Unmarshal(review.Request.Object.Raw, pod); err != nil {
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
review.Response = &v1.AdmissionResponse{
|
|
Allowed: true,
|
|
UID: review.Request.UID,
|
|
Result: &metav1.Status{Message: "admitted"},
|
|
}
|
|
|
|
if len(pod.ManagedFields) != 0 {
|
|
t.Logf("corrupting managedFields %v", pod.ManagedFields)
|
|
review.Response.Patch = []byte(`[
|
|
{"op":"remove","path":"/metadata/managedFields/0/apiVersion"},
|
|
{"op":"remove","path":"/metadata/managedFields/0/fieldsV1"},
|
|
{"op":"remove","path":"/metadata/managedFields/0/fieldsType"}
|
|
]`)
|
|
jsonPatch := v1.PatchTypeJSONPatch
|
|
review.Response.PatchType = &jsonPatch
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
if err := json.NewEncoder(w).Encode(review); err != nil {
|
|
t.Errorf("Marshal of response failed with error: %v", err)
|
|
}
|
|
})
|
|
}
|
|
|
|
var invalidManagedFieldsMarkerFixture = &corev1.Pod{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Namespace: "default",
|
|
Name: "invalid-managedfields-test-marker",
|
|
},
|
|
Spec: corev1.PodSpec{
|
|
Containers: []corev1.Container{{
|
|
Name: "fake-name",
|
|
Image: "fakeimage",
|
|
}},
|
|
},
|
|
}
|