kubernetes/cmd/kubeadm/app/util/pkiutil/testing/testing.go
Lubomir I. Ivanov b5bffb6d97 kubeadm: add v1beta4.ClusterConfiguration.EncryptionAlgorithm
Add v1beta4.ClusterConfiguration.EncryptionAlgorithm field (string)
and allow the user to configure the cluster asymetric encryption
algorithm to be either "RSA" (default, 2048 pkey size) or "ECDSA" (P-256).
Add validation and fuzzing. Conversion from v1beta3 is not required
because an empty field value is accepted and defaulted to RSA if needed.

Leverage the existing configuration option (feature gate) PublicKeysECDSA
but rename the backend fields, arguments, function names to be more
generic - EncryptionAlgorithm instead of PublicKeyAlgorithm.
That is because once the feature gate is enabled the algorithm
configuration also applies to private keys. It also uses the kubeadm API
type (string) instead of the x509.PublicKeyAlgorithm enum (int).

Deprecate the PublicKeysECDSA feature gate with a message.
It should be removed with the release of v1beta4 or maximum one release
later (it is an alpha FG).
2023-09-21 11:48:48 +03:00

139 lines
3.0 KiB
Go

/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package testing
import (
"crypto"
"fmt"
"os"
"path/filepath"
"regexp"
"runtime"
"runtime/debug"
"strings"
"sync"
"testing"
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
"k8s.io/kubernetes/cmd/kubeadm/app/util/pkiutil"
)
// RunWithPrivateKeyFixtureDirectory overrides NewPrivateKey to return private key fixtures
// while executing tests in m.
func RunWithPrivateKeyFixtureDirectory(m *testing.M) {
defer install()()
os.Exit(m.Run())
}
// Reset indicates a new test is starting and previously returned private key fixtures may be reused.
func Reset() {
lock.Lock()
defer lock.Unlock()
ecdsa = 0
rsa = 0
}
var (
testFunction = regexp.MustCompile(`.*\.Test[^./]+(.func\d*)?$`)
lock = sync.Mutex{}
fixtureDir = ""
lastTest = ""
ecdsa = 0
rsa = 0
)
func install() (cleanup func()) {
lock.Lock()
defer lock.Unlock()
_, filename, _, ok := runtime.Caller(1)
if !ok {
fmt.Println("Could not determine testdata location, skipping private key fixture installation")
return func() {}
}
fixtureDir = filepath.Join(filepath.Dir(filename), "testdata")
originalNewPrivateKey := pkiutil.NewPrivateKey
pkiutil.NewPrivateKey = newPrivateKey
return func() {
pkiutil.NewPrivateKey = originalNewPrivateKey
}
}
func newPrivateKey(keyType kubeadmapi.EncryptionAlgorithmType) (crypto.Signer, error) {
lock.Lock()
defer lock.Unlock()
var pcs [50]uintptr
nCallers := runtime.Callers(2, pcs[:])
frames := runtime.CallersFrames(pcs[:nCallers])
thisTest := ""
for {
frame, more := frames.Next()
if strings.HasSuffix(frame.File, "_test.go") && testFunction.MatchString(frame.Function) {
thisTest = frame.Function
break
}
if !more {
break
}
}
if len(thisTest) == 0 {
fmt.Println("could not determine test for private key fixture")
debug.PrintStack()
return pkiutil.GeneratePrivateKey(keyType)
}
if thisTest != lastTest {
rsa = 0
ecdsa = 0
lastTest = thisTest
}
keyName := ""
switch keyType {
case kubeadmapi.EncryptionAlgorithmECDSA:
ecdsa++
keyName = fmt.Sprintf("%d.ecdsa", ecdsa)
default:
rsa++
keyName = fmt.Sprintf("%d.rsa", rsa)
}
if len(keyName) > 0 {
privKey, err := pkiutil.TryLoadKeyFromDisk(fixtureDir, keyName)
if err == nil {
return privKey, nil
}
}
fmt.Println("GeneratePrivateKey " + keyName + " for " + thisTest)
signer, err := pkiutil.GeneratePrivateKey(keyType)
if err != nil {
return signer, err
}
if len(keyName) > 0 {
pkiutil.WriteKey(fixtureDir, keyName, signer)
}
return signer, err
}