|
| 1 | +#!/usr/bin/env bats |
| 2 | +# |
| 3 | +# Copyright (c) 2018 Intel Corporation |
| 4 | +# |
| 5 | +# SPDX-License-Identifier: Apache-2.0 |
| 6 | +# |
| 7 | + |
| 8 | +load "${BATS_TEST_DIRNAME}/../../.ci/lib.sh" |
| 9 | + |
| 10 | +setup() { |
| 11 | + export KUBECONFIG=/etc/kubernetes/admin.conf |
| 12 | + if sudo -E kubectl get runtimeclass | grep kata; then |
| 13 | + pod_config_dir="${BATS_TEST_DIRNAME}/runtimeclass_workloads" |
| 14 | + else |
| 15 | + pod_config_dir="${BATS_TEST_DIRNAME}/untrusted_workloads" |
| 16 | + fi |
| 17 | +} |
| 18 | + |
| 19 | +@test "Credentials using secrets" { |
| 20 | + secret_name="test-secret" |
| 21 | + pod_name="secret-test-pod" |
| 22 | + second_pod_name="secret-envars-test-pod" |
| 23 | + |
| 24 | + # Create the secret |
| 25 | + sudo -E kubectl create -f "${pod_config_dir}/inject_secret.yaml" |
| 26 | + |
| 27 | + # View information about the secret |
| 28 | + sudo -E kubectl get secret "${secret_name}" -o yaml | grep "type: Opaque" |
| 29 | + |
| 30 | + # Create a pod that has access to the secret through a volume |
| 31 | + sudo -E kubectl create -f "${pod_config_dir}/pod-secret.yaml" |
| 32 | + |
| 33 | + # Check pod creation |
| 34 | + sudo -E kubectl wait --for=condition=Ready pod "$pod_name" |
| 35 | + |
| 36 | + # List the files |
| 37 | + cmd="ls /tmp/secret-volume" |
| 38 | + sudo -E kubectl exec $pod_name -- sh -c "$cmd" | grep -w "password" |
| 39 | + sudo -E kubectl exec $pod_name -- sh -c "$cmd" | grep -w "username" |
| 40 | + |
| 41 | + # Create a pod that has access to the secret data through environment variables |
| 42 | + sudo -E kubectl create -f "${pod_config_dir}/pod-secret-env.yaml" |
| 43 | + |
| 44 | + # Check pod creation |
| 45 | + sudo -E kubectl wait --for=condition=Ready pod "$second_pod_name" |
| 46 | + |
| 47 | + # Display environment variables |
| 48 | + second_cmd="printenv" |
| 49 | + sudo -E kubectl exec $second_pod_name -- sh -c "$second_cmd" | grep -w "SECRET_USERNAME" |
| 50 | + sudo -E kubectl exec $second_pod_name -- sh -c "$second_cmd" | grep -w "SECRET_PASSWORD" |
| 51 | +} |
| 52 | + |
| 53 | +teardown() { |
| 54 | + sudo -E kubectl delete pod "$pod_name" "$second_pod_name" |
| 55 | + sudo -E kubectl delete secret "$secret_name" |
| 56 | +} |
0 commit comments