-
Notifications
You must be signed in to change notification settings - Fork 394
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ authorizer: allow configuring the order of authorizers #3281
Merged
Merged
Changes from all commits
Commits
Show all changes
9 commits
Select commit
Hold shift + click to select a range
ed6c93e
Add the authorization-steps flag in the authorizer
cnvergence 8c89fc1
add ordering and validation of authorization steps
cnvergence 1492162
rename authorization-steps to authorization-modes and add e2e test
cnvergence 75cf096
update e2e test
cnvergence f99a881
rename to authorization mode
cnvergence eb22ab6
generate httest during the run and seperate webhooks
cnvergence dff992c
fix boilerplate
cnvergence 4ff70ae
update e2e test
cnvergence 56cb95e
rename to authorization order
cnvergence File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,99 @@ | ||
/* | ||
Copyright 2025 The KCP Authors. | ||
|
||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
|
||
http://www.apache.org/licenses/LICENSE-2.0 | ||
|
||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package authorizer | ||
|
||
import ( | ||
"context" | ||
"testing" | ||
|
||
kcpkubernetesclientset "github.com/kcp-dev/client-go/kubernetes" | ||
"github.com/kcp-dev/logicalcluster/v3" | ||
"github.com/stretchr/testify/require" | ||
|
||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
kubernetesscheme "k8s.io/client-go/kubernetes/scheme" | ||
"k8s.io/client-go/rest" | ||
|
||
kcpclientset "github.com/kcp-dev/kcp/sdk/client/clientset/versioned/cluster" | ||
"github.com/kcp-dev/kcp/test/e2e/framework" | ||
) | ||
|
||
func TestAuthorizationOrder(t *testing.T) { | ||
framework.Suite(t, "control-plane") | ||
webhookPort := "8081" | ||
ctx, cancelFunc := context.WithCancel(context.Background()) | ||
t.Cleanup(cancelFunc) | ||
// start a webhook that allows kcp to boot up | ||
webhookStop := RunWebhook(ctx, t, webhookPort, "kubernetes:authz:allow") | ||
t.Cleanup(webhookStop) | ||
|
||
server := framework.PrivateKcpServer(t, framework.WithCustomArguments( | ||
"--authorization-order", | ||
"Webhook,AlwaysAllowPaths,AlwaysAllowGroups,RBAC", | ||
"--authorization-webhook-config-file", | ||
"authzorder.kubeconfig", | ||
)) | ||
|
||
// create clients | ||
kcpConfig := server.BaseConfig(t) | ||
kubeClusterClient, err := kcpkubernetesclientset.NewForConfig(kcpConfig) | ||
require.NoError(t, err, "failed to construct client for server") | ||
kcpClusterClient, err := kcpclientset.NewForConfig(kcpConfig) | ||
require.NoError(t, err, "failed to construct client for server") | ||
|
||
// access to health endpoints should not be granted, as webhook is first | ||
// in the order of authorizers and rejects the request | ||
rootShardCfg := server.RootShardSystemMasterBaseConfig(t) | ||
if rootShardCfg.NegotiatedSerializer == nil { | ||
rootShardCfg.NegotiatedSerializer = kubernetesscheme.Codecs.WithoutConversion() | ||
} | ||
// Ensure the request is unauthenticated, as Kubernetes' webhook authorizer is wrapped | ||
// in a reloadable authorizer that also always injects a privilegedGroup authorizer | ||
// that lets system:masters users in. | ||
rootShardCfg.BearerToken = "" | ||
restClient, err := rest.UnversionedRESTClientFor(rootShardCfg) | ||
require.NoError(t, err) | ||
|
||
t.Log("Verify that you are allowed to access one of AllowAllPaths endpoints.") | ||
req := rest.NewRequest(restClient).RequestURI("/livez") | ||
t.Logf("%s should not be accessible.", req.URL().String()) | ||
_, err = req.Do(ctx).Raw() | ||
require.NoError(t, err) | ||
|
||
t.Log("Admin should be allowed now to list Workspaces.") | ||
_, err = kcpClusterClient.Cluster(logicalcluster.NewPath("root")).TenancyV1alpha1().Workspaces().List(ctx, metav1.ListOptions{}) | ||
require.NoError(t, err) | ||
|
||
webhookStop() | ||
// run the webhook with deny policy | ||
webhookStop = RunWebhook(ctx, t, webhookPort, "kubernetes:authz:deny") | ||
t.Cleanup(webhookStop) | ||
|
||
t.Log("Admin should not be allowed now to list Logical clusters.") | ||
_, err = kcpClusterClient.Cluster(logicalcluster.NewPath("root")).CoreV1alpha1().LogicalClusters().List(ctx, metav1.ListOptions{}) | ||
require.Error(t, err) | ||
|
||
t.Log("Admin should not be allowed to list Services.") | ||
_, err = kubeClusterClient.Cluster(logicalcluster.NewPath("root")).CoreV1().Services("default").List(ctx, metav1.ListOptions{}) | ||
require.Error(t, err) | ||
|
||
t.Log("Verify that it is not allowed to access AllowAllPaths endpoints.") | ||
req = rest.NewRequest(restClient).RequestURI("/healthz") | ||
t.Logf("%s should not be accessible.", req.URL().String()) | ||
_, err = req.Do(ctx).Raw() | ||
require.Error(t, err) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
apiVersion: v1 | ||
kind: Config | ||
clusters: | ||
- name: httest | ||
cluster: | ||
certificate-authority: .TestAuthorizationOrder/ca.crt | ||
server: https://localhost:8081/ | ||
current-context: webhook | ||
contexts: | ||
- name: webhook | ||
context: | ||
cluster: httest |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what's the kube variant of that flag? Doesn't that also exist?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
would have expected
--authorization-order
, if we are not following some kube legacy here. Hence the question whether we do.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Kube's flag is
--authorization-mode
.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
initially went with the issue proposed
--authorization-steps
, however modes or types feels much better in my opinionThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍🏻 for
--authorization-order