Skip to content

Commit 678e826

Browse files
authored
Fix broken k8s_object_rules tests. (#302)
Most of the problems occur in resource-matching logic that tries to find the right ES event to compare the expected evaluation against, which is harder to do for K8S resources than other resource types. Inserting a per-testcase UUID into the K8S object's metadata that is being tested allows for much simpler resource-matching than the recursion logic in the `dict_contains` utility.
1 parent 78d8c9c commit 678e826

7 files changed

+48
-60
lines changed

tests/commonlib/docker_wrapper.py

-1
Original file line numberDiff line numberDiff line change
@@ -29,4 +29,3 @@ def exec_command(self, container_name: str, command: str, param_value: str, reso
2929
raise ValueError(f'Failed to execute command: {command_f, output}')
3030

3131
return output.decode().strip()
32-

tests/commonlib/kubernetes.py

+15-14
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@
1515
RESOURCE_POD = 'Pod'
1616
RESOURCE_SERVICE_ACCOUNT = 'ServiceAccount'
1717

18+
1819
class KubernetesHelper:
1920

2021
def __init__(self, is_in_cluster_config: bool = False):
@@ -192,15 +193,15 @@ def patch_resources(self, resource_type: str, **kwargs):
192193

193194
patch_body = kwargs.pop('body')
194195

195-
pod = self.get_resource(resource_type, **kwargs)
196+
self.get_resource(resource_type, **kwargs)
196197
self.delete_resources(resource_type=resource_type, **kwargs)
197198
deleted = self.wait_for_resource(resource_type=resource_type, status_list=['DELETED'], **kwargs)
198199

199200
if not deleted:
200-
raise ValueError(f'could not delete Pod: {kwargs}')
201+
raise ValueError(f'could not delete {resource_type}: {kwargs}')
201202

202203
return self.create_patched_resource(resource_type, patch_body)
203-
204+
204205
def create_patched_resource(self, patch_resource_type, patch_body):
205206
"""
206207
"""
@@ -225,17 +226,17 @@ def create_patched_resource(self, patch_resource_type, patch_body):
225226
done = self.wait_for_resource(resource_type=resource_type, status_list=["RUNNING", "ADDED"], **relevant_metadata)
226227
if done:
227228
patched_resource = created_resource
228-
229+
229230
break
230-
231+
231232
return patched_resource
232-
233-
def patch_resource_body(self, body: Union[list,dict], patch: Union[list,dict]) -> Union[list,dict]:
233+
234+
def patch_resource_body(self, body: Union[list, dict], patch: Union[list, dict]) -> Union[list, dict]:
234235
"""
235236
"""
236237
if type(body) != type(patch):
237238
raise ValueError(f'Cannot compare {type(body)}: {body} with {type(patch)}: {patch}')
238-
239+
239240
if isinstance(body, dict):
240241
for key, val in patch.items():
241242
if key not in body:
@@ -245,23 +246,23 @@ def patch_resource_body(self, body: Union[list,dict], patch: Union[list,dict]) -
245246
body[key] = self.patch_resource_body(body[key], val)
246247
else:
247248
body[key] = val
248-
249+
249250
elif isinstance(body, list):
250-
for i, val in enumerate(body):
251-
if i >= len(patch):
251+
for i, val in enumerate(patch):
252+
if i >= len(body):
252253
break
253254

254255
if isinstance(val, list) or isinstance(val, dict):
255256
body[i] = self.patch_resource_body(body[i], val)
256257
else:
257258
body[i] = val
258-
259+
259260
if len(patch) > len(body):
260261
body += val[len(patch):]
261-
262+
262263
else:
263264
raise ValueError(f'Invalid body {body} of type {type(body)}')
264-
265+
265266
return body
266267

267268
def list_resources(self, resource_type: str, **kwargs):

tests/deploy/mock-pod.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ spec:
1616
- "3600"
1717
securityContext:
1818
privileged: false
19-
allowPrivilegeEscalation: false
19+
allowPrivilegeEscalation: true
2020
capabilities:
2121
add: [ "NET_ADMIN", "SYS_TIME" ]
2222
---

tests/product/tests/data/k8s_object/k8s_object_rules.py

+8-20
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@
9494
resource_type='Pod',
9595
resource_body={
9696
'metadata': {'name': TEST_POD_NAME, 'namespace': KUBE_SYSTEM_NAMESPACE},
97-
'spec': {'serviceAccount': DEFAULT, 'namespace': DEFAULT},
97+
'spec': {'serviceAccount': DEFAULT},
9898
},
9999
expected=RULE_FAIL_STATUS,
100100
)
@@ -104,7 +104,7 @@
104104
resource_type='Pod',
105105
resource_body={
106106
'metadata': {'name': TEST_POD_NAME, 'namespace': KUBE_SYSTEM_NAMESPACE},
107-
'spec': {'serviceAccountName': DEFAULT, 'namespace': DEFAULT},
107+
'spec': {'serviceAccountName': DEFAULT},
108108
},
109109
expected=RULE_FAIL_STATUS,
110110
)
@@ -122,9 +122,6 @@
122122
cis_5_1_5 = {
123123
"5.1.5 ServiceAccount.Name == default and automountServiceAccountToken == true":
124124
cis_5_1_5_service_account,
125-
}
126-
127-
cis_5_1_5_skip = {
128125
'5.1.5 Pod.serviceAccount == default': cis_5_1_5_pod_serviceAccount,
129126
'5.1.5 Pod.serviceAccountName == default': cis_5_1_5_pod_serviceAccountName,
130127
}
@@ -179,7 +176,7 @@
179176

180177
# CIS 5.2.2
181178
cis_5_2_2_pod_fail = KubeTestCase(
182-
rule_tag='CIS 5.2.3',
179+
rule_tag='CIS 5.2.2',
183180
resource_type='Pod',
184181
resource_body={
185182
'metadata': {'name': TEST_POD_NAME, 'namespace': KUBE_SYSTEM_NAMESPACE},
@@ -196,7 +193,7 @@
196193
)
197194

198195
cis_5_2_2_pod_pass = KubeTestCase(
199-
rule_tag='CIS 5.2.3',
196+
rule_tag='CIS 5.2.2',
200197
resource_type='Pod',
201198
resource_body={
202199
'metadata': {'name': TEST_POD_NAME, 'namespace': KUBE_SYSTEM_NAMESPACE},
@@ -239,9 +236,7 @@
239236
)
240237

241238
cis_5_2_3 = {
242-
'5.2.3 Pod.spec.hostPID == true': cis_5_2_3_pod_fail
243-
}
244-
cis_5_2_3_skip = {
239+
'5.2.3 Pod.spec.hostPID == true': cis_5_2_3_pod_fail,
245240
'5.2.3 Pod.spec.hostPID == false': cis_5_2_3_pod_pass,
246241
}
247242

@@ -267,10 +262,7 @@
267262
)
268263

269264
cis_5_2_4 = {
270-
'5.2.4 Pod.spec.hostIPC == true': cis_5_2_4_pod_fail
271-
}
272-
273-
cis_5_2_4_skip = {
265+
'5.2.4 Pod.spec.hostIPC == true': cis_5_2_4_pod_fail,
274266
'5.2.4 Pod.spec.hostIPC == false': cis_5_2_4_pod_pass
275267
}
276268

@@ -296,12 +288,8 @@
296288
)
297289

298290
cis_5_2_5 = {
299-
'5.2.5 Pod.spec.hostNetwork == true': cis_5_2_5_pod_fail
300-
301-
}
302-
303-
cis_5_2_5_skip = {
304-
'5.2.5 Pod.spec.hostNetwork == false': cis_5_2_5_pod_pass
291+
'5.2.5 Pod.spec.hostNetwork == true': cis_5_2_5_pod_fail,
292+
'5.2.5 Pod.spec.hostNetwork == false': cis_5_2_5_pod_pass,
305293
}
306294

307295
# CIS 5.2.6

tests/product/tests/test_k8s_objects_rules.py

+22-22
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@
33
This module verifies correctness of retrieved findings by manipulating audit and remediation actions
44
"""
55
from datetime import datetime
6+
import uuid
67

78
import pytest
89

9-
# from product.tests.data.k8s_object.k8s_object_rules import *
1010
from product.tests.data.k8s_object import k8s_object_rules as k8s_tc
11-
from commonlib.utils import get_ES_evaluation, get_resource_identifier
11+
from commonlib.utils import get_ES_evaluation
1212
from commonlib.framework.reporting import skip_param_case, SkipReportData
1313

1414

@@ -22,22 +22,15 @@
2222
*k8s_tc.cis_5_2_3.values(),
2323
*k8s_tc.cis_5_2_4.values(),
2424
*k8s_tc.cis_5_2_5.values(),
25-
*skip_param_case(skip_list=[*k8s_tc.cis_5_1_5_skip.values(),
26-
*k8s_tc.cis_5_2_2.values(),
27-
*k8s_tc.cis_5_2_3_skip.values(),
28-
*k8s_tc.cis_5_2_4_skip.values(),
29-
*k8s_tc.cis_5_2_5_skip.values(),
30-
*k8s_tc.cis_5_2_6.values(),
31-
*k8s_tc.cis_5_2_7.values(),
32-
*k8s_tc.cis_5_2_8.values()
33-
],
25+
*k8s_tc.cis_5_2_2.values(),
26+
*k8s_tc.cis_5_2_6.values(),
27+
*k8s_tc.cis_5_2_8.values(),
28+
*skip_param_case(skip_list=[*k8s_tc.cis_5_2_7.values()],
3429
data_to_report=SkipReportData(
35-
url_title="security-team: #4312",
36-
url_link="https://github.com/elastic/security-team/issues/4312",
37-
skip_reason="known issue: broken k8s object tests"
30+
url_title="security-team: #4540",
31+
url_link="https://github.com/elastic/security-team/issues/4540",
32+
skip_reason="Known issue: incorrect implementation"
3833
))
39-
# *k8s_tc.cis_5_2_9.values(), - TODO: cases are not implemented
40-
# *k8s_tc.cis_5_2_10.values() - TODO: cases are not implemented
4134
],
4235
ids=[
4336
*k8s_tc.cis_5_1_3.keys(),
@@ -46,11 +39,7 @@
4639
*k8s_tc.cis_5_2_3.keys(),
4740
*k8s_tc.cis_5_2_4.keys(),
4841
*k8s_tc.cis_5_2_5.keys(),
49-
*k8s_tc.cis_5_1_5_skip.keys(),
5042
*k8s_tc.cis_5_2_2.keys(),
51-
*k8s_tc.cis_5_2_3_skip.keys(),
52-
*k8s_tc.cis_5_2_4_skip.keys(),
53-
*k8s_tc.cis_5_2_5_skip.keys(),
5443
*k8s_tc.cis_5_2_6.keys(),
5544
*k8s_tc.cis_5_2_7.keys(),
5645
*k8s_tc.cis_5_2_8.keys(),
@@ -82,6 +71,11 @@ def test_kube_resource_patch(elastic_client, test_env, rule_tag, resource_type,
8271

8372
assert resource, f"Resource {resource_type} not found"
8473

74+
test_resource_id = str(uuid.uuid4())
75+
76+
labels = metadata.setdefault('labels', {})
77+
labels['test_resource_id'] = test_resource_id
78+
8579
# patch resource
8680
resource = k8s_client.patch_resources(
8781
resource_type=resource_type,
@@ -92,13 +86,19 @@ def test_kube_resource_patch(elastic_client, test_env, rule_tag, resource_type,
9286
raise ValueError(
9387
f'Could not patch resource type {resource_type}:'
9488
f' {relevant_metadata} with patch {resource_body}')
95-
89+
90+
def match_resource(eval_resource):
91+
try:
92+
return eval_resource.metadata.labels.test_resource_id == test_resource_id
93+
except AttributeError:
94+
return False
95+
9696
evaluation = get_ES_evaluation(
9797
elastic_client=elastic_client,
9898
timeout=agent_config.findings_timeout,
9999
rule_tag=rule_tag,
100100
exec_timestamp=datetime.utcnow(),
101-
resource_identifier=get_resource_identifier(resource_body),
101+
resource_identifier=match_resource,
102102
)
103103

104104
assert evaluation is not None, f"No evaluation for rule {rule_tag} could be found"

tests/product/tests/test_process_controller_manager_rules.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ def test_process_controller_manager(elastic_client,
4848
# Wait for process reboot
4949
# TODO: Implement a more optimal way of waiting
5050
time.sleep(60)
51-
51+
5252
evaluation = get_ES_evaluation(
5353
elastic_client=elastic_client,
5454
timeout=cloudbeat_agent.findings_timeout,

tests/product/tests/test_process_etcd_rules.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ def test_process_etcd(elastic_client,
4444
api_client.edit_process_file(container_name=node.metadata.name,
4545
dictionary=dictionary,
4646
resource=resource)
47-
47+
4848
# Wait for process reboot
4949
# TODO: Implement a more optimal way of waiting
5050
time.sleep(60)

0 commit comments

Comments
 (0)