forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathaudit_test.go
104 lines (91 loc) · 2.78 KB
/
audit_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
package integration
import (
"io/ioutil"
"os"
"testing"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apiserver/pkg/apis/audit"
kclientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
configapi "github.com/openshift/origin/pkg/cmd/server/apis/config"
testutil "github.com/openshift/origin/test/util"
testserver "github.com/openshift/origin/test/util/server"
)
func setupAudit(t *testing.T, auditConfig configapi.AuditConfig) (kclientset.Interface, func()) {
masterConfig, err := testserver.DefaultMasterOptions()
if err != nil {
t.Fatalf("error creating config: %v", err)
}
masterConfig.AuditConfig = auditConfig
kubeConfigFile, err := testserver.StartConfiguredMasterAPI(masterConfig)
if err != nil {
t.Fatalf("error starting server: %v", err)
}
kubeClient, err := testutil.GetClusterAdminKubeClient(kubeConfigFile)
if err != nil {
t.Fatalf("error getting client: %v", err)
}
return kubeClient, func() {
testserver.CleanupMasterEtcd(t, masterConfig)
}
}
func TestBasicFunctionalityWithAudit(t *testing.T) {
kubeClient, fn := setupAudit(t, configapi.AuditConfig{Enabled: true})
defer fn()
if _, err := kubeClient.Core().Pods(metav1.NamespaceDefault).Watch(metav1.ListOptions{}); err != nil {
t.Errorf("Unexpected error watching pods: %v", err)
}
// TODO: test oc debug, exec, rsh, port-forward
}
func TestAuditConfigEmbeded(t *testing.T) {
auditConfig := configapi.AuditConfig{
Enabled: true,
PolicyConfiguration: &audit.Policy{
Rules: []audit.PolicyRule{
{Level: audit.LevelMetadata},
},
},
}
kubeClient, fn := setupAudit(t, auditConfig)
defer fn()
if _, err := kubeClient.Core().Pods(metav1.NamespaceDefault).Watch(metav1.ListOptions{}); err != nil {
t.Errorf("Unexpected error watching pods: %v", err)
}
}
func TestAuditConfigV1Alpha1File(t *testing.T) {
testAuditConfigFile(t, []byte(`
apiVersion: audit.k8s.io/v1alpha1
kind: Policy
rules:
- level: Metadata
`))
}
func TestAuditConfigV1Beta1File(t *testing.T) {
testAuditConfigFile(t, []byte(`
apiVersion: audit.k8s.io/v1beta1
kind: Policy
rules:
- level: Metadata
`))
}
func testAuditConfigFile(t *testing.T, policy []byte) {
tmp, err := ioutil.TempFile("", "audit-policy")
if err != nil {
t.Fatalf("Cannot create a temporary file: %v", err)
}
defer os.Remove(tmp.Name())
if _, err := tmp.Write(policy); err != nil {
t.Fatalf("Cannot write to a temporary file: %v", err)
}
if err := tmp.Close(); err != nil {
t.Fatalf("Cannot close a temporary file: %v", err)
}
auditConfig := configapi.AuditConfig{
Enabled: true,
PolicyFile: tmp.Name(),
}
kubeClient, fn := setupAudit(t, auditConfig)
defer fn()
if _, err := kubeClient.Core().Pods(metav1.NamespaceDefault).Watch(metav1.ListOptions{}); err != nil {
t.Errorf("Unexpected error watching pods: %v", err)
}
}