Skip to content

Commit 4f1bb6a

Browse files
committed
WIP:tests
Signed-off-by: Simo Sorce <[email protected]>
1 parent 4a226f8 commit 4f1bb6a

6 files changed

+31
-47
lines changed

test/cmd/authentication.sh

+5-5
Original file line numberDiff line numberDiff line change
@@ -47,21 +47,21 @@ os::cmd::expect_success "oc policy can-i --list"
4747
whoamitoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=whoami SCOPE=user:info USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')"
4848
os::cmd::expect_success_and_text "oc get user/~ --token='${whoamitoken}'" "${username}"
4949
os::cmd::expect_success_and_text "oc whoami --token='${whoamitoken}'" "${username}"
50-
os::cmd::expect_failure_and_text "oc get pods --token='${whoamitoken}' -n '${project}'" "prevent this action; User \"scoped-user\" cannot list pods in project \"${project}\""
50+
os::cmd::expect_failure_and_text "oc get pods --token='${whoamitoken}' -n '${project}'" "pods is forbidden: User \"scoped-user\" cannot list pods in the namespace \"${project}\""
5151

5252
listprojecttoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=listproject SCOPE=user:list-scoped-projects USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')"
5353
# this token doesn't have rights to see any projects even though it can hit the list endpoint, so an empty list is correct
5454
# we'll add another scope that allows listing all known projects even if this token has no other powers in them.
5555
os::cmd::expect_success_and_not_text "oc get projects --token='${listprojecttoken}'" "${project}"
56-
os::cmd::expect_failure_and_text "oc get user/~ --token='${listprojecttoken}'" 'prevent this action; User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
57-
os::cmd::expect_failure_and_text "oc get pods --token='${listprojecttoken}' -n '${project}'" "prevent this action; User \"scoped-user\" cannot list pods in project \"${project}\""
56+
os::cmd::expect_failure_and_text "oc get user/~ --token='${listprojecttoken}'" 'User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
57+
os::cmd::expect_failure_and_text "oc get pods --token='${listprojecttoken}' -n '${project}'" "User \"scoped-user\" cannot list pods in the namespace \"${project}\""
5858

5959
listprojecttoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=listallprojects SCOPE=user:list-projects USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')"
6060
os::cmd::expect_success_and_text "oc get projects --token='${listprojecttoken}'" "${project}"
6161

6262
adminnonescalatingpowerstoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=admin SCOPE=role:admin:* USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')"
63-
os::cmd::expect_failure_and_text "oc get user/~ --token='${adminnonescalatingpowerstoken}'" 'prevent this action; User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
64-
os::cmd::expect_failure_and_text "oc get secrets --token='${adminnonescalatingpowerstoken}' -n '${project}'" "prevent this action; User \"scoped-user\" cannot list secrets in project \"${project}\""
63+
os::cmd::expect_failure_and_text "oc get user/~ --token='${adminnonescalatingpowerstoken}'" 'User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
64+
os::cmd::expect_failure_and_text "oc get secrets --token='${adminnonescalatingpowerstoken}' -n '${project}'" "User \"scoped-user\" cannot list secrets in the namespace \"${project}\""
6565
os::cmd::expect_success_and_text "oc get 'projects/${project}' --token='${adminnonescalatingpowerstoken}' -n '${project}'" "${project}"
6666

6767
allescalatingpowerstoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=clusteradmin SCOPE='role:cluster-admin:*:!' USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')"

test/cmd/basicresources.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ project=$(oc project -q)
235235
os::cmd::expect_success 'oc policy add-role-to-user view view-user'
236236
os::cmd::expect_success 'oc login -u view-user -p anything'
237237
os::cmd::try_until_success 'oc project ${project}'
238-
os::cmd::expect_failure_and_text "oc set env dc/test-deployment-config --list --resolve" "cannot get secrets in project"
238+
os::cmd::expect_failure_and_text "oc set env dc/test-deployment-config --list --resolve" "cannot get secrets in the namespace"
239239
oc login -u system:admin
240240
# clean up
241241
os::cmd::expect_success "oc delete dc/test-deployment-config"

test/cmd/policy.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ os::cmd::expect_success_and_text 'oc policy scc-review -z default -f ${OS_ROOT}
234234
os::cmd::expect_success_and_text 'oc policy scc-review -z system:serviceaccount:policy-second:default -f ${OS_ROOT}/test/testdata/job.yaml --no-headers=true' 'Job/hello default lax'
235235
os::cmd::expect_success_and_text 'oc policy scc-review -f ${OS_ROOT}/test/extended/testdata/deployments/deployment-simple.yaml --no-headers=true' 'DeploymentConfig/deployment-simple default lax'
236236
os::cmd::expect_success_and_text 'oc policy scc-review -f ${OS_ROOT}/test/testdata/nginx_pod.yaml --no-headers=true' ''
237-
os::cmd::expect_failure_and_text 'oc policy scc-review -z default -f ${OS_ROOT}/test/testdata/job.yaml --namespace=no-exist' 'error: unable to compute Pod Security Policy Review for "hello": podsecuritypolicyreviews.security.openshift.io is forbidden: User "bob" cannot create podsecuritypolicyreviews.security.openshift.io in the namespace "no-exist": User "bob" cannot create podsecuritypolicyreviews.security.openshift.io in project "no-exist"'
237+
os::cmd::expect_failure_and_text 'oc policy scc-review -z default -f ${OS_ROOT}/test/testdata/job.yaml --namespace=no-exist' 'error: unable to compute Pod Security Policy Review for "hello": podsecuritypolicyreviews.security.openshift.io is forbidden: User "bob" cannot create podsecuritypolicyreviews.security.openshift.io in the namespace "no-exist"'
238238
os::cmd::expect_failure_and_text 'oc policy scc-review -z default -f ${OS_ROOT}/test/testdata/pspreview_unsupported_statefulset.yaml' 'error: StatefulSet "rd" with spec.volumeClaimTemplates currently not supported.'
239239
os::cmd::expect_failure_and_text 'oc policy scc-review -z no-exist -f ${OS_ROOT}/test/testdata/job.yaml' 'error: unable to compute Pod Security Policy Review for "hello": unable to retrieve ServiceAccount no-exist: serviceaccount "no-exist" not found'
240240
os::cmd::expect_success "oc login -u system:admin -n '${project}'"

test/integration/authorization_test.go

+21-37
Original file line numberDiff line numberDiff line change
@@ -875,7 +875,7 @@ func TestAuthorizationSubjectAccessReviewAPIGroup(t *testing.T) {
875875
kubeAuthInterface: clusterAdminSARGetter,
876876
response: authorizationapi.SubjectAccessReviewResponse{
877877
Allowed: true,
878-
Reason: "allowed by openshift authorizer",
878+
Reason: `RBAC: allowed by RoleBinding "admin/hammer-project" of ClusterRole "admin" to User "harold"`,
879879
Namespace: "hammer-project",
880880
},
881881
}.run(t)
@@ -889,7 +889,7 @@ func TestAuthorizationSubjectAccessReviewAPIGroup(t *testing.T) {
889889
kubeAuthInterface: clusterAdminSARGetter,
890890
response: authorizationapi.SubjectAccessReviewResponse{
891891
Allowed: false,
892-
Reason: `User "harold" cannot get horizontalpodautoscalers in project "hammer-project"`,
892+
Reason: ``,
893893
Namespace: "hammer-project",
894894
},
895895
}.run(t)
@@ -903,7 +903,7 @@ func TestAuthorizationSubjectAccessReviewAPIGroup(t *testing.T) {
903903
kubeAuthInterface: clusterAdminKubeClient.Authorization(),
904904
response: authorizationapi.SubjectAccessReviewResponse{
905905
Allowed: false,
906-
Reason: `User "harold" cannot get horizontalpodautoscalers.foo in project "hammer-project"`,
906+
Reason: ``,
907907
Namespace: "hammer-project",
908908
},
909909
}.run(t)
@@ -917,7 +917,7 @@ func TestAuthorizationSubjectAccessReviewAPIGroup(t *testing.T) {
917917
kubeAuthInterface: clusterAdminSARGetter,
918918
response: authorizationapi.SubjectAccessReviewResponse{
919919
Allowed: false,
920-
Reason: `User "harold" cannot get horizontalpodautoscalers.* in project "hammer-project"`,
920+
Reason: ``,
921921
Namespace: "hammer-project",
922922
},
923923
}.run(t)
@@ -1068,7 +1068,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
10681068
kubeAuthInterface: clusterAdminLocalSARGetter,
10691069
response: authorizationapi.SubjectAccessReviewResponse{
10701070
Allowed: true,
1071-
Reason: "allowed by openshift authorizer",
1071+
Reason: `RBAC: allowed by RoleBinding "view/default" of ClusterRole "view" to User "danny"`,
10721072
Namespace: "default",
10731073
},
10741074
}.run(t)
@@ -1079,7 +1079,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
10791079
kubeAuthInterface: clusterAdminLocalSARGetter,
10801080
response: authorizationapi.SubjectAccessReviewResponse{
10811081
Allowed: false,
1082-
Reason: `User "danny" cannot get projects at the cluster scope`,
1082+
Reason: ``,
10831083
Namespace: "",
10841084
},
10851085
}.run(t)
@@ -1133,7 +1133,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
11331133
kubeAuthInterface: haroldSARGetter,
11341134
response: authorizationapi.SubjectAccessReviewResponse{
11351135
Allowed: true,
1136-
Reason: "allowed by openshift authorizer",
1136+
Reason: `RBAC: allowed by RoleBinding "view/hammer-project" of ClusterRole "view" to User "valerie"`,
11371137
Namespace: "hammer-project",
11381138
},
11391139
}.run(t)
@@ -1144,7 +1144,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
11441144
kubeAuthInterface: markSARGetter,
11451145
response: authorizationapi.SubjectAccessReviewResponse{
11461146
Allowed: false,
1147-
Reason: `User "valerie" cannot get project "mallet-project"`,
1147+
Reason: ``,
11481148
Namespace: "mallet-project",
11491149
},
11501150
}.run(t)
@@ -1160,7 +1160,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
11601160
kubeAuthInterface: markSARGetter,
11611161
response: authorizationapi.SubjectAccessReviewResponse{
11621162
Allowed: true,
1163-
Reason: "allowed by openshift authorizer",
1163+
Reason: `RBAC: allowed by RoleBinding "edit/mallet-project" of ClusterRole "edit" to User "edgar"`,
11641164
Namespace: "mallet-project",
11651165
},
11661166
}.run(t)
@@ -1214,7 +1214,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
12141214
kubeAuthInterface: haroldSARGetter,
12151215
response: authorizationapi.SubjectAccessReviewResponse{
12161216
Allowed: true,
1217-
Reason: "allowed by openshift authorizer",
1217+
Reason: `RBAC: allowed by RoleBinding "admin/hammer-project" of ClusterRole "admin" to User "harold"`,
12181218
Namespace: "hammer-project",
12191219
},
12201220
}.run(t)
@@ -1230,7 +1230,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
12301230
kubeAuthInterface: clusterAdminLocalSARGetter,
12311231
response: authorizationapi.SubjectAccessReviewResponse{
12321232
Allowed: true,
1233-
Reason: "allowed by cluster rule",
1233+
Reason: `RBAC: allowed by ClusterRoleBinding "cluster-admins" of ClusterRole "cluster-admin" to Group "system:cluster-admins"`,
12341234
Namespace: "",
12351235
},
12361236
}.run(t)
@@ -1253,7 +1253,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
12531253
kubeAuthInterface: haroldSARGetter,
12541254
response: authorizationapi.SubjectAccessReviewResponse{
12551255
Allowed: true,
1256-
Reason: "allowed by openshift authorizer",
1256+
Reason: `RBAC: allowed by RoleBinding "admin/hammer-project" of ClusterRole "admin" to User "harold"`,
12571257
Namespace: "hammer-project",
12581258
},
12591259
}.run(t)
@@ -1264,7 +1264,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
12641264
kubeAuthInterface: anonymousSARGetter,
12651265
response: authorizationapi.SubjectAccessReviewResponse{
12661266
Allowed: true,
1267-
Reason: "allowed by openshift authorizer",
1267+
Reason: `RBAC: allowed by RoleBinding "edit/hammer-project" of ClusterRole "edit" to User "system:anonymous"`,
12681268
Namespace: "hammer-project",
12691269
},
12701270
}.run(t)
@@ -1277,7 +1277,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
12771277
kubeAuthInterface: haroldSARGetter,
12781278
response: authorizationapi.SubjectAccessReviewResponse{
12791279
Allowed: false,
1280-
Reason: `User "harold" cannot create pods in project "mallet-project"`,
1280+
Reason: ``,
12811281
Namespace: "mallet-project",
12821282
},
12831283
}.run(t)
@@ -1288,7 +1288,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
12881288
kubeAuthInterface: anonymousSARGetter,
12891289
response: authorizationapi.SubjectAccessReviewResponse{
12901290
Allowed: false,
1291-
Reason: `User "system:anonymous" cannot create pods in project "mallet-project"`,
1291+
Reason: ``,
12921292
Namespace: "mallet-project",
12931293
},
12941294
}.run(t)
@@ -1302,7 +1302,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
13021302
kubeAuthInterface: haroldSARGetter,
13031303
response: authorizationapi.SubjectAccessReviewResponse{
13041304
Allowed: false,
1305-
Reason: `User "harold" cannot create pods in project "nonexistent-project"`,
1305+
Reason: ``,
13061306
Namespace: "nonexistent-project",
13071307
},
13081308
}.run(t)
@@ -1313,7 +1313,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
13131313
kubeAuthInterface: anonymousSARGetter,
13141314
response: authorizationapi.SubjectAccessReviewResponse{
13151315
Allowed: false,
1316-
Reason: `User "system:anonymous" cannot create pods in project "nonexistent-project"`,
1316+
Reason: ``,
13171317
Namespace: "nonexistent-project",
13181318
},
13191319
}.run(t)
@@ -1328,7 +1328,7 @@ func TestAuthorizationSubjectAccessReview(t *testing.T) {
13281328
localReview: askCanICreatePolicyBindings,
13291329
response: authorizationapi.SubjectAccessReviewResponse{
13301330
Allowed: false,
1331-
Reason: `User "harold" cannot create policybindings in project "hammer-project"`,
1331+
Reason: ``,
13321332
Namespace: "hammer-project",
13331333
},
13341334
}.run(t)
@@ -1364,14 +1364,6 @@ func TestBrowserSafeAuthorizer(t *testing.T) {
13641364
proxyVerb := []string{"api", "v1", "proxy", "namespaces", "ns", "pods", "podX1:8080"}
13651365
proxySubresource := []string{"api", "v1", "namespaces", "ns", "pods", "podX1:8080", "proxy", "appEndPoint"}
13661366

1367-
isUnsafeErr := func(errProxy error) (matches bool) {
1368-
if errProxy == nil {
1369-
return false
1370-
}
1371-
return strings.Contains(errProxy.Error(), `cannot "unsafeproxy" "pods" with name "podX1:8080" in project "ns"`) ||
1372-
strings.Contains(errProxy.Error(), `cannot get pods/unsafeproxy in project "ns"`)
1373-
}
1374-
13751367
for _, tc := range []struct {
13761368
name string
13771369
client rest.Interface
@@ -1383,35 +1375,27 @@ func TestBrowserSafeAuthorizer(t *testing.T) {
13831375
name: "safe to proxy verb",
13841376
client: userClient.Core().RESTClient(),
13851377
path: proxyVerb,
1386-
1387-
expectUnsafe: false,
13881378
},
13891379
{
13901380
name: "safe to proxy subresource",
13911381
client: userClient.Core().RESTClient(),
13921382
path: proxySubresource,
1393-
1394-
expectUnsafe: false,
13951383
},
13961384
{
13971385
name: "unsafe to proxy verb",
13981386
client: anonymousClient,
13991387
path: proxyVerb,
1400-
1401-
expectUnsafe: true,
14021388
},
14031389
{
14041390
name: "unsafe to proxy subresource",
14051391
client: anonymousClient,
14061392
path: proxySubresource,
1407-
1408-
expectUnsafe: true,
14091393
},
14101394
} {
14111395
errProxy := tc.client.Get().AbsPath(tc.path...).Do().Error()
1412-
if errProxy == nil || !kapierror.IsForbidden(errProxy) || tc.expectUnsafe != isUnsafeErr(errProxy) {
1413-
t.Errorf("%s: expected forbidden error on GET %s, got %#v (isForbidden=%v, expectUnsafe=%v, actualUnsafe=%v)",
1414-
tc.name, tc.path, errProxy, kapierror.IsForbidden(errProxy), tc.expectUnsafe, isUnsafeErr(errProxy))
1396+
if errProxy == nil || !kapierror.IsForbidden(errProxy) {
1397+
t.Errorf("%s: expected forbidden error on GET %s, got %#v (isForbidden=%v)",
1398+
tc.name, tc.path, errProxy, kapierror.IsForbidden(errProxy))
14151399
}
14161400
}
14171401
}

test/integration/bootstrap_policy_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ func TestBootstrapPolicySelfSubjectAccessReviews(t *testing.T) {
9898
kubeAuthInterface: valerieKubeClient.Authorization(),
9999
response: authorizationapi.SubjectAccessReviewResponse{
100100
Allowed: false,
101-
Reason: `User "valerie" cannot create policybindings in project "openshift"`,
101+
Reason: ``,
102102
Namespace: "openshift",
103103
},
104104
}.run(t)
@@ -148,7 +148,7 @@ func TestSelfSubjectAccessReviewsNonExistingNamespace(t *testing.T) {
148148
kubeAuthInterface: valerieKubeClient.Authorization(),
149149
response: authorizationapi.SubjectAccessReviewResponse{
150150
Allowed: false,
151-
Reason: `User "valerie" cannot create pods in project "foo"`,
151+
Reason: ``,
152152
Namespace: "foo",
153153
},
154154
}.run(t)

test/integration/oauth_cert_fallback_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ func TestOAuthCertFallback(t *testing.T) {
3535
certUser = "system:admin"
3636

3737
unauthorizedError = "Unauthorized"
38-
anonymousError = `users.user.openshift.io "~" is forbidden: User "system:anonymous" cannot get users.user.openshift.io at the cluster scope: User "system:anonymous" cannot get users.user.openshift.io at the cluster scope`
38+
anonymousError = `users.user.openshift.io "~" is forbidden: User "system:anonymous" cannot get users.user.openshift.io at the cluster scope`
3939
)
4040

4141
// Build master config

0 commit comments

Comments
 (0)