Skip to content

Commit 5899b35

Browse files
authored
Remedy problems in automated tests. (#220)
* Remedy problems in automated tests. * CIS 1.2.7, CIS 1.2.20 tests: update expected evaluation * Fix post-merge problems. * Bring back OPA decision logs. Automated tests currently depend on these logs. * Address comments.
1 parent 7c07795 commit 5899b35

17 files changed

+361
-132
lines changed

JUSTFILE

+80-10
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Refactor via kustomize https://kustomize.io/
22

3-
image-tag := `git branch --show-current`
3+
image_tag := `git branch --show-current`
44

55
create-kind-cluster:
66
kind create cluster --config deploy/k8s/kind/kind-config.yml
@@ -20,6 +20,7 @@ load-cloudbeat-image:
2020
kind load docker-image cloudbeat:latest --name kind-mono
2121

2222
build-cloudbeat:
23+
GOOS=linux go mod vendor
2324
GOOS=linux go build -v && docker build -t cloudbeat .
2425

2526
deploy-cloudbeat:
@@ -43,7 +44,7 @@ delete-cloudbeat-debug:
4344
build-deploy-eks-cloudbeat: build-cloudbeat publish-image-to-ecr deploy-eks-cloudbeat
4445

4546
publish-image-to-ecr:
46-
aws ecr get-login-password --region us-east-2 | docker login --username AWS --password-stdin 704479110758.dkr.ecr.us-east-2.amazonaws.com && docker tag cloudbeat 704479110758.dkr.ecr.us-east-2.amazonaws.com/cloudbeat:{{image-tag}} && docker push 704479110758.dkr.ecr.us-east-2.amazonaws.com/cloudbeat:{{image-tag}}
47+
aws ecr get-login-password --region us-east-2 | docker login --username AWS --password-stdin 704479110758.dkr.ecr.us-east-2.amazonaws.com && docker tag cloudbeat 704479110758.dkr.ecr.us-east-2.amazonaws.com/cloudbeat:{{image_tag}} && docker push 704479110758.dkr.ecr.us-east-2.amazonaws.com/cloudbeat:{{image_tag}}
4748

4849
deploy-eks-cloudbeat:
4950
kubectl delete -f deploy/eks/cloudbeat-ds.yml -n kube-system & kubectl apply -f deploy/eks/cloudbeat-ds.yml -n kube-system
@@ -80,23 +81,28 @@ expose-ports:
8081

8182
#### TESTS ####
8283

83-
TESTS_RELEASE := "cloudbeat-tests"
84-
TIMEOUT := "1200s"
84+
TEST_POD := 'test-pod-v1'
85+
TESTS_RELEASE := 'cloudbeat-test'
86+
TEST_LOGS_DIRECTORY := 'test-logs'
87+
POD_STATUS_UNKNOWN := 'Unknown'
88+
POD_STATUS_PENDING := 'Pending'
89+
POD_STATUS_RUNNING := 'Running'
90+
TIMEOUT := '1200s'
8591

8692
patch-cb-yml-tests:
8793
kubectl kustomize deploy/k8s/kustomize/test > tests/deploy/cloudbeat-pytest.yml
8894

8995
build-pytest-docker:
90-
cd tests; docker build -t cloudbeat-test .
96+
cd tests; docker build -t {{TESTS_RELEASE}} .
9197

9298
load-pytest-kind:
93-
kind load docker-image cloudbeat-test:latest --name kind-mono
99+
kind load docker-image {{TESTS_RELEASE}}:latest --name kind-mono
94100

95101
deploy-tests-helm:
96102
helm upgrade --wait --timeout={{TIMEOUT}} --install --values tests/deploy/values/ci.yml --namespace kube-system {{TESTS_RELEASE}} tests/deploy/k8s-cloudbeat-tests/
97103

98-
deploy-local-tests-helm:
99-
helm upgrade --wait --timeout={{TIMEOUT}} --install --values tests/deploy/values/local-host.yml --namespace kube-system {{TESTS_RELEASE}} tests/deploy/k8s-cloudbeat-tests/
104+
deploy-local-tests-helm target:
105+
helm upgrade --wait --timeout={{TIMEOUT}} --install --values tests/deploy/values/local-host.yml --set testData.marker={{target}} --namespace kube-system {{TESTS_RELEASE}} tests/deploy/k8s-cloudbeat-tests/
100106

101107
purge-tests:
102108
helm del {{TESTS_RELEASE}} -n kube-system
@@ -105,8 +111,72 @@ gen-report:
105111
allure generate tests/allure/results --clean -o tests/allure/reports && cp tests/allure/reports/history/* tests/allure/results/history/. && allure open tests/allure/reports
106112

107113
run-tests:
108-
helm test cloudbeat-tests --namespace kube-system --logs
114+
helm test {{TESTS_RELEASE}} --namespace kube-system
109115

110116
build-load-run-tests: build-pytest-docker load-pytest-kind run-tests
111117

112-
prepare-local-helm-cluster: create-kind-cluster build-cloudbeat load-cloudbeat-image deploy-local-tests-helm
118+
delete-local-helm-cluster:
119+
kind delete cluster --name kind-mono
120+
121+
cleanup-create-local-helm-cluster target: delete-local-helm-cluster create-kind-cluster build-cloudbeat load-cloudbeat-image
122+
just deploy-local-tests-helm {{target}}
123+
124+
# TODO(DaveSys911): Move scripts out of JUSTFILE: https://github.com/elastic/security-team/issues/4291
125+
test-pod-status:
126+
#!/usr/bin/env sh
127+
128+
if [ ${STATUS=`kubectl get pod -n kube-system test-pod-v1 --template {{{{.status.phase}}`} ]; then
129+
echo $STATUS
130+
else
131+
echo {{POD_STATUS_UNKNOWN}}
132+
fi
133+
134+
collect-logs target:
135+
#!/usr/bin/env sh
136+
137+
echo 'Collecting logs for target {{target}}...'
138+
139+
LOG_FILE={{TEST_LOGS_DIRECTORY}}/{{target}}.log
140+
LOG_FILE_TMP={{TEST_LOGS_DIRECTORY}}/{{target}}.log.tmp
141+
142+
mkdir -p {{TEST_LOGS_DIRECTORY}}
143+
echo '' > $LOG_FILE
144+
145+
STATUS={{POD_STATUS_UNKNOWN}}
146+
while [ $STATUS = {{POD_STATUS_UNKNOWN}} ] || [ $STATUS = {{POD_STATUS_PENDING}} ] || [ $STATUS = {{POD_STATUS_RUNNING}} ]; do
147+
sleep 5
148+
149+
STATUS=`just test-pod-status`
150+
if [ $STATUS = {{POD_STATUS_UNKNOWN}} ]; then
151+
continue
152+
fi
153+
154+
kubectl logs test-pod-v1 -n kube-system 2>&1 > $LOG_FILE_TMP
155+
156+
if [ `stat -c%s "${LOG_FILE_TMP}"` -gt `stat -c%s "${LOG_FILE}"` ]; then
157+
cp $LOG_FILE_TMP $LOG_FILE
158+
echo "Wrote logs to ${LOG_FILE}"
159+
fi
160+
done
161+
162+
rm $LOG_FILE_TMP
163+
echo 'Done collecting logs for target {{target}}.'
164+
165+
run-test-target target:
166+
echo 'Cleaning up cluster for running test target: {{target}}'
167+
just cleanup-create-local-helm-cluster {{target}}
168+
169+
echo 'Running test target: {{target}}'
170+
just build-load-run-tests &
171+
172+
173+
run-test-targets +targets='file_system_rules k8s_object_rules process_api_server_rules process_controller_manager_rules process_etcd_rules process_kubelet_rules process_scheduler_rules':
174+
#!/usr/bin/env sh
175+
176+
echo 'Running tests: {{targets}}'
177+
178+
for TARGET in {{targets}}; do
179+
just run-test-target $TARGET
180+
just collect-logs $TARGET
181+
done
182+

evaluator/opa.go

+3
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,9 @@ var opaConfig = `{
5151
"resource": "/bundles/bundle.tar.gz"
5252
}
5353
},
54+
"decision_logs": {
55+
"console": true
56+
}
5457
}`
5558

5659
func NewOpaEvaluator(ctx context.Context, log *logp.Logger, cfg config.Config) (Evaluator, error) {

tests/README.md

+10
Original file line numberDiff line numberDiff line change
@@ -172,6 +172,16 @@ Tests execution depends on the developers needs and currently this framework sup
172172

173173
### Dev Mode
174174

175+
To run all test targets with just cloudbeat, without testing against Kibana or Elasticsearch, run
176+
177+
```
178+
just run-test-targets
179+
```
180+
181+
Note that this will create and destroy the test cluster several times. Logs can be found in the `test-logs` directory and test results can be found in `tests/allure/results`.
182+
183+
----
184+
175185
Before running tests verify that **System Under Test (SUT) Setup** is done and running.
176186
Since elasticsearch is deployed inside cluster, for reaching it from outside execute the following command:
177187
```shell

tests/commonlib/kubernetes.py

+95-7
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,18 @@
22
This module provides kubernetes functionality based on original kubernetes python library.
33
"""
44

5+
from typing import Union
6+
from pathlib import Path
7+
58
from kubernetes import client, config, utils
69
from kubernetes.client import ApiException
710
from kubernetes.watch import watch
811

12+
from commonlib.io_utils import get_k8s_yaml_objects
13+
14+
15+
RESOURCE_POD = 'Pod'
16+
RESOURCE_SERVICE_ACCOUNT = 'ServiceAccount'
917

1018
class KubernetesHelper:
1119

@@ -23,9 +31,9 @@ def __init__(self, is_in_cluster_config: bool = False):
2331
self.api_client = client.api_client.ApiClient(configuration=self.config)
2432

2533
self.dispatch_list = {
26-
'Pod': self.core_v1_client.list_namespaced_pod,
34+
RESOURCE_POD: self.core_v1_client.list_namespaced_pod,
2735
'ConfigMap': self.core_v1_client.list_namespaced_config_map,
28-
'ServiceAccount': self.core_v1_client.list_namespaced_service_account,
36+
RESOURCE_SERVICE_ACCOUNT: self.core_v1_client.list_namespaced_service_account,
2937
'DaemonSet': self.app_api.list_namespaced_daemon_set,
3038
'Role': self.rbac_api.list_namespaced_role,
3139
'RoleBinding': self.rbac_api.list_namespaced_role_binding,
@@ -36,9 +44,9 @@ def __init__(self, is_in_cluster_config: bool = False):
3644
}
3745

3846
self.dispatch_delete = {
39-
'Pod': self.core_v1_client.delete_namespaced_pod,
47+
RESOURCE_POD: self.core_v1_client.delete_namespaced_pod,
4048
'ConfigMap': self.core_v1_client.delete_namespaced_config_map,
41-
'ServiceAccount': self.core_v1_client.delete_namespaced_service_account,
49+
RESOURCE_SERVICE_ACCOUNT: self.core_v1_client.delete_namespaced_service_account,
4250
'DaemonSet': self.app_api.delete_namespaced_daemon_set,
4351
'Role': self.rbac_api.delete_namespaced_role,
4452
'RoleBinding': self.rbac_api.delete_namespaced_role_binding,
@@ -179,7 +187,82 @@ def delete_resources(self, resource_type: str, **kwargs):
179187
def patch_resources(self, resource_type: str, **kwargs):
180188
"""
181189
"""
182-
return self.dispatch_patch[resource_type](**kwargs)
190+
if resource_type != RESOURCE_POD:
191+
return self.dispatch_patch[resource_type](**kwargs)
192+
193+
patch_body = kwargs.pop('body')
194+
195+
pod = self.get_resource(resource_type, **kwargs)
196+
self.delete_resources(resource_type=resource_type, **kwargs)
197+
deleted = self.wait_for_resource(resource_type=resource_type, status_list=['DELETED'], **kwargs)
198+
199+
if not deleted:
200+
raise ValueError(f'could not delete Pod: {kwargs}')
201+
202+
return self.create_patched_resource(resource_type, patch_body)
203+
204+
def create_patched_resource(self, patch_resource_type, patch_body):
205+
"""
206+
"""
207+
file_path = Path(__file__).parent / '../deploy/mock-pod.yml'
208+
k8s_resources = get_k8s_yaml_objects(file_path=file_path)
209+
210+
patch_metadata = patch_body['metadata']
211+
patch_relevant_metadata = {k: patch_metadata[k] for k in ('name', 'namespace') if k in patch_metadata}
212+
213+
patched_resource = None
214+
215+
for yml_resource in k8s_resources:
216+
resource_type, metadata = yml_resource['kind'], yml_resource['metadata']
217+
relevant_metadata = {k: metadata[k] for k in ('name', 'namespace') if k in metadata}
218+
219+
if resource_type != patch_resource_type or relevant_metadata != patch_relevant_metadata:
220+
continue
221+
222+
patched_body = self.patch_resource_body(yml_resource, patch_body)
223+
created_resource = self.create_from_dict(patched_body, **relevant_metadata)
224+
225+
done = self.wait_for_resource(resource_type=resource_type, status_list=["RUNNING", "ADDED"], **relevant_metadata)
226+
if done:
227+
patched_resource = created_resource
228+
229+
break
230+
231+
return patched_resource
232+
233+
def patch_resource_body(self, body: Union[list,dict], patch: Union[list,dict]) -> Union[list,dict]:
234+
"""
235+
"""
236+
if type(body) != type(patch):
237+
raise ValueError(f'Cannot compare {type(body)}: {body} with {type(patch)}: {patch}')
238+
239+
if isinstance(body, dict):
240+
for key, val in patch.items():
241+
if key not in body:
242+
body[key] = val
243+
else:
244+
if isinstance(val, list) or isinstance(val, dict):
245+
body[key] = self.patch_resource_body(body[key], val)
246+
else:
247+
body[key] = val
248+
249+
elif isinstance(body, list):
250+
for i, val in enumerate(body):
251+
if i >= len(patch):
252+
break
253+
254+
if isinstance(val, list) or isinstance(val, dict):
255+
body[i] = self.patch_resource_body(body[i], val)
256+
else:
257+
body[i] = val
258+
259+
if len(patch) > len(body):
260+
body += val[len(patch):]
261+
262+
else:
263+
raise ValueError(f'Invalid body {body} of type {type(body)}')
264+
265+
return body
183266

184267
def list_resources(self, resource_type: str, **kwargs):
185268
"""
@@ -206,16 +289,21 @@ def wait_for_resource(self, resource_type: str, name: str, status_list: list,
206289
watches a resources for a status change
207290
@param resource_type: the resource type
208291
@param name: resource name
209-
@param status_list: excepted statuses e.g., RUNNING, DELETED, MODIFIED, ADDED
292+
@param status_list: accepted statuses e.g., RUNNING, DELETED, MODIFIED, ADDED
210293
@param timeout: until wait
211294
@return: True if status reached
212295
"""
296+
# When pods are being created, MODIFIED events are also of interest to check if
297+
# they successfully transition from ContainerCreating to Running state.
298+
if (resource_type == RESOURCE_POD) and ('ADDED' in status_list) and ('MODIFIED' not in status_list):
299+
status_list.append('MODIFIED')
300+
213301
w = watch.Watch()
214302
for event in w.stream(func=self.dispatch_list[resource_type],
215303
timeout_seconds=timeout,
216304
**kwargs):
217305
if name in event["object"].metadata.name and event["type"] in status_list:
218-
if event['object'].status.phase == 'Pending':
306+
if (resource_type == RESOURCE_POD) and ('ADDED' in status_list) and (event['object'].status.phase == 'Pending'):
219307
continue
220308
w.stop()
221309
return True

tests/commonlib/utils.py

+14-5
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,16 @@
11
import datetime
2+
import time
3+
4+
from typing import Union
25

36
from commonlib.io_utils import get_logs_from_stream
4-
import time
57

68

79
def get_evaluation(k8s, timeout, pod_name, namespace, rule_tag, exec_timestamp,
8-
resource_identifier=lambda r: True) -> str:
10+
resource_identifier=lambda r: True) -> Union[str,None]:
911
"""
1012
This function retrieves pod logs and verifies if evaluation result is equal to expected result.
13+
It returns None if no pod logs for evaluation for the given rule_tag can be found.
1114
@param resource_identifier: function to filter a specific resource
1215
@param k8s: Kubernetes wrapper instance
1316
@param timeout: Exit timeout
@@ -28,12 +31,18 @@ def get_evaluation(k8s, timeout, pod_name, namespace, rule_tag, exec_timestamp,
2831
findings_timestamp = datetime.datetime.strptime(log.time, '%Y-%m-%dT%H:%M:%Sz')
2932
if (findings_timestamp - exec_timestamp).total_seconds() < 0:
3033
continue
31-
for finding in log.result.findings:
34+
35+
try:
36+
findings = log.result.findings
37+
resource = log.result.resource
38+
except AttributeError:
39+
continue
40+
41+
for finding in findings:
3242
if rule_tag in finding.rule.tags:
33-
resource = log.result.resource
3443
if resource_identifier(resource):
3544
return finding.result.evaluation
36-
return "unknown"
45+
return None
3746

3847

3948
def dict_contains(small, big):

tests/product/tests/conftest.py

+15-1
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,28 @@
11
from pathlib import Path
2+
import time
23
import pytest
34
from kubernetes.client import ApiException
45
from kubernetes.utils import FailToCreateError
56
import json
67
from commonlib.io_utils import get_k8s_yaml_objects
78

89

10+
DEPLOY_YML = "../../deploy/cloudbeat-pytest.yml"
911
KUBE_RULES_ENV_YML = "../../deploy/mock-pod.yml"
1012
POD_RESOURCE_TYPE = "Pod"
1113

1214

15+
@pytest.fixture(scope='module')
16+
def data(k8s, api_client, cloudbeat_agent):
17+
file_path = Path(__file__).parent / DEPLOY_YML
18+
if k8s.get_agent_pod_instances(agent_name=cloudbeat_agent.name, namespace=cloudbeat_agent.namespace):
19+
k8s.delete_from_yaml(get_k8s_yaml_objects(file_path=file_path))
20+
k8s.start_agent(yaml_file=file_path, namespace=cloudbeat_agent.namespace)
21+
time.sleep(5)
22+
yield k8s, api_client, cloudbeat_agent
23+
k8s_yaml_list = get_k8s_yaml_objects(file_path=file_path)
24+
k8s.delete_from_yaml(yaml_objects_list=k8s_yaml_list) # stop agent
25+
1326
@pytest.fixture(scope='module')
1427
def config_node_pre_test(data):
1528
k8s_client, api_client, cloudbeat_agent = data
@@ -50,7 +63,8 @@ def clean_test_env(data):
5063
except ApiException as notFound:
5164
print(f"no {relevant_metadata['name']} online - setting up a new one: {notFound}")
5265
# create resource
53-
k8s_client.create_from_dict(data=yml_resource, **relevant_metadata)
66+
67+
k8s_client.create_from_dict(data=yml_resource, **relevant_metadata)
5468

5569
yield k8s_client, api_client, cloudbeat_agent
5670
# teardown

0 commit comments

Comments
 (0)