This repository has been archived by the owner on Jun 26, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 173
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
134 changed files
with
7,793 additions
and
1,409 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
e2e.go merge=union |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
126 changes: 126 additions & 0 deletions
126
benchmarks/e2e/tests/block_multitenant_resources/block_multitenant_resources.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,126 @@ | ||
package test | ||
|
||
import ( | ||
"fmt" | ||
"os" | ||
"strings" | ||
"time" | ||
|
||
"github.com/onsi/ginkgo" | ||
configutil "sigs.k8s.io/multi-tenancy/benchmarks/e2e/config" | ||
"k8s.io/kubernetes/test/e2e/framework" | ||
) | ||
|
||
const ( | ||
expectedVal = "Error from server (Forbidden)" | ||
) | ||
|
||
var _ = framework.KubeDescribe("test tenant's permission to modify multi-tenancy resources", func() { | ||
var config *configutil.BenchmarkConfig | ||
var resourceList string | ||
var err error | ||
var dryrun = "--dry-run=true" | ||
var nsFlag = "-n" | ||
var outputFlag = "-o=name" | ||
|
||
ginkgo.BeforeEach(func() { | ||
ginkgo.By("get resources managed by the cluster administrator in tenant's namespace") | ||
|
||
config, err = configutil.ReadConfig(configutil.ConfigPath) | ||
framework.ExpectNoError(err) | ||
|
||
os.Setenv("KUBECONFIG", config.Adminkubeconfig) | ||
labelFlg := fmt.Sprintf("-l") | ||
|
||
tenantkubeconfig, err := config.GetValidTenant() | ||
framework.ExpectNoError(err) | ||
|
||
resourceList, err = framework.RunKubectl("get", "all", labelFlg, config.Label , nsFlag, tenantkubeconfig.Namespace, outputFlag) | ||
framework.ExpectNoError(err) | ||
}) | ||
|
||
framework.KubeDescribe("tenant cannot modify resources managed by the cluster administrator in tenant's namespace", func() { | ||
var user string | ||
|
||
ginkgo.BeforeEach(func() { | ||
tenantkubeconfig, err := config.GetValidTenant() | ||
framework.ExpectNoError(err) | ||
os.Setenv("KUBECONFIG", tenantkubeconfig.Kubeconfig) | ||
user = configutil.GetContextFromKubeconfig(tenantkubeconfig.Kubeconfig) | ||
}) | ||
|
||
ginkgo.It("annotate resources managed by the cluster administrator in tenant's namespace", func() { | ||
ginkgo.By(fmt.Sprintf("tenant %s cannot annotate resources managed by the cluster administrator in tenant's namespace", user)) | ||
|
||
resources := strings.Fields(resourceList) | ||
annotate := fmt.Sprintf("test=multi") | ||
|
||
tenantkubeconfig, err := config.GetValidTenant() | ||
framework.ExpectNoError(err) | ||
|
||
for _, resource := range resources { | ||
_, errNew := framework.LookForString(expectedVal, time.Minute, func() string { | ||
_, err := framework.RunKubectl(dryrun, nsFlag, tenantkubeconfig.Namespace, "annotate", resource, annotate) | ||
return err.Error() | ||
}) | ||
|
||
framework.ExpectNoError(errNew) | ||
} | ||
}) | ||
}) | ||
}) | ||
|
||
var _ = framework.KubeDescribe("test tenant's permission to modify multi-tenancy rolebindings", func() { | ||
var config *configutil.BenchmarkConfig | ||
var resourceList string | ||
var err error | ||
var dryrun = "--dry-run=true" | ||
var nsFlag = "-n" | ||
var outputFlag = "-o=name" | ||
|
||
ginkgo.BeforeEach(func() { | ||
ginkgo.By("get rolebindings managed by the cluster administrator in tenant's namespace") | ||
|
||
config, err = configutil.ReadConfig(configutil.ConfigPath) | ||
framework.ExpectNoError(err) | ||
|
||
os.Setenv("KUBECONFIG", config.Adminkubeconfig) | ||
|
||
tenantkubeconfig, err := config.GetValidTenant() | ||
framework.ExpectNoError(err) | ||
|
||
resourceList, err = framework.RunKubectl("get", "rolebinding", nsFlag, tenantkubeconfig.Namespace, outputFlag) | ||
framework.ExpectNoError(err) | ||
}) | ||
|
||
framework.KubeDescribe("tenant cannot modify rolebinding in tenant's namespace", func() { | ||
var user string | ||
|
||
ginkgo.BeforeEach(func() { | ||
tenantkubeconfig, err := config.GetValidTenant() | ||
framework.ExpectNoError(err) | ||
|
||
os.Setenv("KUBECONFIG", tenantkubeconfig.Kubeconfig) | ||
user = configutil.GetContextFromKubeconfig(tenantkubeconfig.Kubeconfig) | ||
}) | ||
|
||
ginkgo.It("annotate rolebinding in tenant's namespace", func() { | ||
ginkgo.By(fmt.Sprintf("tenant %s cannot annotate rolebinding in tenant's namespace", user)) | ||
|
||
resources := strings.Fields(resourceList) | ||
annotate := fmt.Sprintf("test=multi") | ||
|
||
tenantkubeconfig, err := config.GetValidTenant() | ||
framework.ExpectNoError(err) | ||
for _, resource := range resources { | ||
_, errNew := framework.LookForString(expectedVal, time.Minute, func() string { | ||
_, err := framework.RunKubectl(dryrun, nsFlag, tenantkubeconfig.Namespace, "annotate", resource, annotate) | ||
return err.Error() | ||
}) | ||
|
||
framework.ExpectNoError(errNew) | ||
} | ||
}) | ||
}) | ||
}) | ||
|
83 changes: 83 additions & 0 deletions
83
benchmarks/e2e/tests/block_other_tenant_resources/block_other_tenant_resources.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,83 @@ | ||
package test | ||
|
||
import ( | ||
"fmt" | ||
"os" | ||
"strings" | ||
"time" | ||
|
||
"github.com/onsi/ginkgo" | ||
configutil "sigs.k8s.io/multi-tenancy/benchmarks/e2e/config" | ||
"k8s.io/kubernetes/test/e2e/framework" | ||
) | ||
|
||
const ( | ||
expectedVal = "Error from server (Forbidden)" | ||
) | ||
|
||
var _ = framework.KubeDescribe("test across tenants permission", func() { | ||
var config *configutil.BenchmarkConfig | ||
var resourceList string | ||
var err error | ||
var tenantA, tenantB string | ||
var namespaceFlag = "-n" | ||
var dryrun = "--dry-run=true" | ||
var all = "--all=true" | ||
|
||
ginkgo.BeforeEach(func() { | ||
ginkgo.By("get tenant's namespace wide api-resources") | ||
|
||
config, err = configutil.ReadConfig(configutil.ConfigPath) | ||
framework.ExpectNoError(err) | ||
|
||
err = config.ValidateTenant(config.TenantA) | ||
framework.ExpectNoError(err) | ||
|
||
os.Setenv("KUBECONFIG", config.TenantA.Kubeconfig) | ||
tenantA = configutil.GetContextFromKubeconfig(config.TenantA.Kubeconfig) | ||
|
||
outputFlag := fmt.Sprintf("-o=name") | ||
nsdFlag := fmt.Sprintf("--namespaced=true") | ||
|
||
resourceList, err = framework.RunKubectl(namespaceFlag, config.TenantA.Namespace, "api-resources", nsdFlag, outputFlag) | ||
framework.ExpectNoError(err) | ||
}) | ||
|
||
framework.KubeDescribe("tenant cannot access other tenant namespaced resources", func() { | ||
|
||
ginkgo.BeforeEach(func() { | ||
err = config.ValidateTenant(config.TenantB) | ||
framework.ExpectNoError(err) | ||
|
||
os.Setenv("KUBECONFIG", config.TenantB.Kubeconfig) | ||
tenantB = configutil.GetContextFromKubeconfig(config.TenantB.Kubeconfig) | ||
}) | ||
|
||
ginkgo.It("get tenant namespaced resources", func() { | ||
ginkgo.By(fmt.Sprintf("tenant %s cannot get tenant %s namespaced resources", tenantB, tenantA)) | ||
resources := strings.Fields(resourceList) | ||
for _, resource := range resources { | ||
_, errNew := framework.LookForString(expectedVal, time.Minute, func() string { | ||
_, err := framework.RunKubectl(namespaceFlag, config.TenantA.Namespace, "get", resource) | ||
return err.Error() | ||
}) | ||
|
||
framework.ExpectNoError(errNew) | ||
} | ||
}) | ||
|
||
ginkgo.It("edit other tenant namespaced resources", func() { | ||
ginkgo.By(fmt.Sprintf("tenant %s cannot edit tenant %s namespaced resources", tenantB, tenantA)) | ||
resources := strings.Fields(resourceList) | ||
annotation := "test=multi-tenancy" | ||
for _, resource := range resources { | ||
_, errNew := framework.LookForString(expectedVal, time.Minute, func() string { | ||
_, err := framework.RunKubectl(namespaceFlag, config.TenantA.Namespace, "annotate", resource, annotation, dryrun, all) | ||
return err.Error() | ||
}) | ||
|
||
framework.ExpectNoError(errNew) | ||
} | ||
}) | ||
}) | ||
}) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
# [MTB-PL2-BC-OPS-3] Create role bindings | ||
|
||
**Profile Applicability:** | ||
|
||
Level 2 | ||
|
||
**Type:** | ||
|
||
Behavioral | ||
|
||
**Category:** | ||
|
||
Self-Service Operations | ||
|
||
**Description:** | ||
|
||
Tenants should be able to create roles and role-bindings in their namespaces. | ||
|
||
**Rationale:** | ||
|
||
Enables self-service management of roles and role-bindings within a tenant namespace. | ||
|
||
**Audit:** | ||
|
||
Run the following commands to check for permissions to manage `rolebinding` and `role` for each verb(get, list, create, update, patch, watch, delete, and deletecollection) in the tenant namespace: | ||
|
||
kubectl --kubeconfig=tenant-a -n a1 auth can-i <verb> <resource> | ||
|
||
Each command must return 'yes' | ||
|
||
Create a `role` pod-reader with permission to view pods and create a `role binding` to this role. | ||
|
||
kubectl --kubeconfig=tenant-a -n a1 create role <role-name> --verb=get --resource=pods | ||
kubectl --kubeconfig=tenant-a -n a1 create rolebinding <rolebinding-name> --role=<role-name> |
Oops, something went wrong.