
Secure serving was already enabled for kube-controller-manager. Do the same for kube-scheduler, by passing the flags "authentication-kubeconfig" and "authorization-kubeconfig" to the binary in the static Pod. This change allows the scheduler to perform reviews on incoming requests, such as: - authentication.k8s.io/v1beta1 TokenReview - authorization.k8s.io/v1 SubjectAccessReview The authentication and authorization checks for "system:kube-scheduler" users were previously enabled by PR 72491.
591 lines
14 KiB
Go
591 lines
14 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package selfhosting
|
|
|
|
import (
|
|
"reflect"
|
|
"sort"
|
|
"testing"
|
|
|
|
v1 "k8s.io/api/core/v1"
|
|
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
)
|
|
|
|
func TestMutatePodSpec(t *testing.T) {
|
|
var tests = []struct {
|
|
name string
|
|
component string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "mutate api server podspec",
|
|
component: kubeadmconstants.KubeAPIServer,
|
|
podSpec: &v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
Name: "kube-apiserver",
|
|
Command: []string{
|
|
"--advertise-address=10.0.0.1",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expected: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
Name: "kube-apiserver",
|
|
Command: []string{
|
|
"--advertise-address=$(HOST_IP)",
|
|
},
|
|
Env: []v1.EnvVar{
|
|
{
|
|
Name: "HOST_IP",
|
|
ValueFrom: &v1.EnvVarSource{
|
|
FieldRef: &v1.ObjectFieldSelector{
|
|
FieldPath: "status.hostIP",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
|
|
NodeSelector: map[string]string{
|
|
kubeadmconstants.LabelNodeRoleMaster: "",
|
|
},
|
|
Tolerations: []v1.Toleration{
|
|
kubeadmconstants.ControlPlaneToleration,
|
|
},
|
|
DNSPolicy: v1.DNSClusterFirstWithHostNet,
|
|
},
|
|
},
|
|
{
|
|
name: "mutate controller manager podspec",
|
|
component: kubeadmconstants.KubeControllerManager,
|
|
podSpec: &v1.PodSpec{},
|
|
expected: v1.PodSpec{
|
|
NodeSelector: map[string]string{
|
|
kubeadmconstants.LabelNodeRoleMaster: "",
|
|
},
|
|
Tolerations: []v1.Toleration{
|
|
kubeadmconstants.ControlPlaneToleration,
|
|
},
|
|
DNSPolicy: v1.DNSClusterFirstWithHostNet,
|
|
},
|
|
},
|
|
{
|
|
name: "mutate scheduler podspec",
|
|
component: kubeadmconstants.KubeScheduler,
|
|
podSpec: &v1.PodSpec{},
|
|
expected: v1.PodSpec{
|
|
NodeSelector: map[string]string{
|
|
kubeadmconstants.LabelNodeRoleMaster: "",
|
|
},
|
|
Tolerations: []v1.Toleration{
|
|
kubeadmconstants.ControlPlaneToleration,
|
|
},
|
|
DNSPolicy: v1.DNSClusterFirstWithHostNet,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
mutatePodSpec(GetDefaultMutators(), rt.component, rt.podSpec)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed mutatePodSpec:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAddNodeSelectorToPodSpec(t *testing.T) {
|
|
var tests = []struct {
|
|
name string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "empty podspec",
|
|
podSpec: &v1.PodSpec{},
|
|
expected: v1.PodSpec{
|
|
NodeSelector: map[string]string{
|
|
kubeadmconstants.LabelNodeRoleMaster: "",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "podspec with a valid node selector",
|
|
podSpec: &v1.PodSpec{
|
|
NodeSelector: map[string]string{
|
|
"foo": "bar",
|
|
},
|
|
},
|
|
expected: v1.PodSpec{
|
|
NodeSelector: map[string]string{
|
|
"foo": "bar",
|
|
kubeadmconstants.LabelNodeRoleMaster: "",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
addNodeSelectorToPodSpec(rt.podSpec)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed addNodeSelectorToPodSpec:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSetControlPlaneTolerationOnPodSpec(t *testing.T) {
|
|
var tests = []struct {
|
|
name string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "empty podspec",
|
|
podSpec: &v1.PodSpec{},
|
|
expected: v1.PodSpec{
|
|
Tolerations: []v1.Toleration{
|
|
kubeadmconstants.ControlPlaneToleration,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "podspec with a valid toleration",
|
|
podSpec: &v1.PodSpec{
|
|
Tolerations: []v1.Toleration{
|
|
{Key: "foo", Value: "bar"},
|
|
},
|
|
},
|
|
expected: v1.PodSpec{
|
|
Tolerations: []v1.Toleration{
|
|
{Key: "foo", Value: "bar"},
|
|
kubeadmconstants.ControlPlaneToleration,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
setControlPlaneTolerationOnPodSpec(rt.podSpec)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed setControlPlaneTolerationOnPodSpec:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSetRightDNSPolicyOnPodSpec(t *testing.T) {
|
|
var tests = []struct {
|
|
name string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "empty podspec",
|
|
podSpec: &v1.PodSpec{},
|
|
expected: v1.PodSpec{
|
|
DNSPolicy: v1.DNSClusterFirstWithHostNet,
|
|
},
|
|
},
|
|
{
|
|
name: "podspec with a v1.DNSClusterFirst policy",
|
|
podSpec: &v1.PodSpec{
|
|
DNSPolicy: v1.DNSClusterFirst,
|
|
},
|
|
expected: v1.PodSpec{
|
|
DNSPolicy: v1.DNSClusterFirstWithHostNet,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
setRightDNSPolicyOnPodSpec(rt.podSpec)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed setRightDNSPolicyOnPodSpec:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSetHostIPOnPodSpec(t *testing.T) {
|
|
var tests = []struct {
|
|
name string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "set HOST_IP env var on a podspec",
|
|
podSpec: &v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
Name: "kube-apiserver",
|
|
Command: []string{
|
|
"--advertise-address=10.0.0.1",
|
|
},
|
|
Env: []v1.EnvVar{},
|
|
},
|
|
},
|
|
},
|
|
expected: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
Name: "kube-apiserver",
|
|
Command: []string{
|
|
"--advertise-address=$(HOST_IP)",
|
|
},
|
|
Env: []v1.EnvVar{
|
|
{
|
|
Name: "HOST_IP",
|
|
ValueFrom: &v1.EnvVarSource{
|
|
FieldRef: &v1.ObjectFieldSelector{
|
|
FieldPath: "status.hostIP",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
setHostIPOnPodSpec(rt.podSpec)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed setHostIPOnPodSpec:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSetSelfHostedVolumesForAPIServer(t *testing.T) {
|
|
hostPathDirectoryOrCreate := v1.HostPathDirectoryOrCreate
|
|
var tests = []struct {
|
|
name string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "set selfhosted volumes for api server",
|
|
podSpec: &v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
VolumeMounts: []v1.VolumeMount{
|
|
{
|
|
Name: "ca-certs",
|
|
MountPath: "/etc/ssl/certs",
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
MountPath: "/etc/kubernetes/pki",
|
|
},
|
|
},
|
|
Command: []string{
|
|
"--foo=bar",
|
|
},
|
|
},
|
|
},
|
|
Volumes: []v1.Volume{
|
|
{
|
|
Name: "ca-certs",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/ssl/certs",
|
|
Type: &hostPathDirectoryOrCreate,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/kubernetes/pki",
|
|
Type: &hostPathDirectoryOrCreate,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expected: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
VolumeMounts: []v1.VolumeMount{
|
|
{
|
|
Name: "ca-certs",
|
|
MountPath: "/etc/ssl/certs",
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
MountPath: "/etc/kubernetes/pki",
|
|
},
|
|
},
|
|
Command: []string{
|
|
"--foo=bar",
|
|
},
|
|
},
|
|
},
|
|
Volumes: []v1.Volume{
|
|
{
|
|
Name: "ca-certs",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/ssl/certs",
|
|
Type: &hostPathDirectoryOrCreate,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
VolumeSource: apiServerCertificatesVolumeSource(),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
setSelfHostedVolumesForAPIServer(rt.podSpec)
|
|
sort.Strings(rt.podSpec.Containers[0].Command)
|
|
sort.Strings(rt.expected.Containers[0].Command)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed setSelfHostedVolumesForAPIServer:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSetSelfHostedVolumesForControllerManager(t *testing.T) {
|
|
hostPathFileOrCreate := v1.HostPathFileOrCreate
|
|
hostPathDirectoryOrCreate := v1.HostPathDirectoryOrCreate
|
|
var tests = []struct {
|
|
name string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "set selfhosted volumes for controller mananger",
|
|
podSpec: &v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
VolumeMounts: []v1.VolumeMount{
|
|
{
|
|
Name: "ca-certs",
|
|
MountPath: "/etc/ssl/certs",
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
MountPath: "/etc/kubernetes/pki",
|
|
},
|
|
{
|
|
Name: "kubeconfig",
|
|
MountPath: "/etc/kubernetes/controller-manager.conf",
|
|
},
|
|
},
|
|
Command: []string{
|
|
"--kubeconfig=/etc/kubernetes/controller-manager.conf",
|
|
"--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf",
|
|
"--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf",
|
|
"--foo=bar",
|
|
},
|
|
},
|
|
},
|
|
Volumes: []v1.Volume{
|
|
{
|
|
Name: "ca-certs",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/ssl/certs",
|
|
Type: &hostPathDirectoryOrCreate,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/kubernetes/pki",
|
|
Type: &hostPathDirectoryOrCreate,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "kubeconfig",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/kubernetes/controller-manager.conf",
|
|
Type: &hostPathFileOrCreate,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expected: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
VolumeMounts: []v1.VolumeMount{
|
|
{
|
|
Name: "ca-certs",
|
|
MountPath: "/etc/ssl/certs",
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
MountPath: "/etc/kubernetes/pki",
|
|
},
|
|
{
|
|
Name: "kubeconfig",
|
|
MountPath: "/etc/kubernetes/kubeconfig",
|
|
},
|
|
},
|
|
Command: []string{
|
|
"--kubeconfig=/etc/kubernetes/kubeconfig/controller-manager.conf",
|
|
"--authentication-kubeconfig=/etc/kubernetes/kubeconfig/controller-manager.conf",
|
|
"--authorization-kubeconfig=/etc/kubernetes/kubeconfig/controller-manager.conf",
|
|
"--foo=bar",
|
|
},
|
|
},
|
|
},
|
|
Volumes: []v1.Volume{
|
|
{
|
|
Name: "ca-certs",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/ssl/certs",
|
|
Type: &hostPathDirectoryOrCreate,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "k8s-certs",
|
|
VolumeSource: controllerManagerCertificatesVolumeSource(),
|
|
},
|
|
{
|
|
Name: "kubeconfig",
|
|
VolumeSource: kubeConfigVolumeSource(kubeadmconstants.ControllerManagerKubeConfigFileName),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
setSelfHostedVolumesForControllerManager(rt.podSpec)
|
|
sort.Strings(rt.podSpec.Containers[0].Command)
|
|
sort.Strings(rt.expected.Containers[0].Command)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed setSelfHostedVolumesForControllerManager:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSetSelfHostedVolumesForScheduler(t *testing.T) {
|
|
hostPathFileOrCreate := v1.HostPathFileOrCreate
|
|
var tests = []struct {
|
|
name string
|
|
podSpec *v1.PodSpec
|
|
expected v1.PodSpec
|
|
}{
|
|
{
|
|
name: "set selfhosted volumes for scheduler",
|
|
podSpec: &v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
VolumeMounts: []v1.VolumeMount{
|
|
{
|
|
Name: "kubeconfig",
|
|
MountPath: "/etc/kubernetes/scheduler.conf",
|
|
},
|
|
},
|
|
Command: []string{
|
|
"--kubeconfig=/etc/kubernetes/scheduler.conf",
|
|
"--authentication-kubeconfig=/etc/kubernetes/scheduler.conf",
|
|
"--authorization-kubeconfig=/etc/kubernetes/scheduler.conf",
|
|
"--foo=bar",
|
|
},
|
|
},
|
|
},
|
|
Volumes: []v1.Volume{
|
|
{
|
|
Name: "kubeconfig",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: "/etc/kubernetes/scheduler.conf",
|
|
Type: &hostPathFileOrCreate,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expected: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
VolumeMounts: []v1.VolumeMount{
|
|
{
|
|
Name: "kubeconfig",
|
|
MountPath: "/etc/kubernetes/kubeconfig",
|
|
},
|
|
},
|
|
Command: []string{
|
|
"--kubeconfig=/etc/kubernetes/kubeconfig/scheduler.conf",
|
|
"--authentication-kubeconfig=/etc/kubernetes/kubeconfig/scheduler.conf",
|
|
"--authorization-kubeconfig=/etc/kubernetes/kubeconfig/scheduler.conf",
|
|
"--foo=bar",
|
|
},
|
|
},
|
|
},
|
|
Volumes: []v1.Volume{
|
|
{
|
|
Name: "kubeconfig",
|
|
VolumeSource: kubeConfigVolumeSource(kubeadmconstants.SchedulerKubeConfigFileName),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, rt := range tests {
|
|
t.Run(rt.name, func(t *testing.T) {
|
|
setSelfHostedVolumesForScheduler(rt.podSpec)
|
|
sort.Strings(rt.podSpec.Containers[0].Command)
|
|
sort.Strings(rt.expected.Containers[0].Command)
|
|
|
|
if !reflect.DeepEqual(*rt.podSpec, rt.expected) {
|
|
t.Errorf("failed setSelfHostedVolumesForScheduler:\nexpected:\n%v\nsaw:\n%v", rt.expected, *rt.podSpec)
|
|
}
|
|
})
|
|
}
|
|
}
|