|
| 1 | +"""Conftest for SubjectAccessReview related tests.""" |
| 2 | + |
| 3 | +import pytest |
| 4 | + |
| 5 | +from testsuite.httpx.auth import HeaderApiKeyAuth |
| 6 | +from testsuite.kuadrant.policy.authorization import ValueFrom |
| 7 | +from testsuite.kubernetes.cluster_role import ClusterRole, ClusterRoleBinding |
| 8 | + |
| 9 | + |
| 10 | +@pytest.fixture(scope="module") |
| 11 | +def audience(hostname): |
| 12 | + """Return hostname as only audience for the service account bound token""" |
| 13 | + return [hostname.hostname] |
| 14 | + |
| 15 | + |
| 16 | +@pytest.fixture(scope="module") |
| 17 | +def authorization(authorization): |
| 18 | + """Add kubernetes token-review and subject-access-review identity""" |
| 19 | + authorization.identity.add_kubernetes("token-review-host") |
| 20 | + user = ValueFrom("auth.identity.user.username") |
| 21 | + authorization.authorization.add_kubernetes("subject-access-review-host", user) |
| 22 | + return authorization |
| 23 | + |
| 24 | + |
| 25 | +@pytest.fixture(scope="module") |
| 26 | +def create_cluster_role_binding(request, cluster, blame, module_label): |
| 27 | + """Creates and returns a ClusterRoleBinding""" |
| 28 | + |
| 29 | + def _create_cluster_role_binding(cluster_role, service_accounts): |
| 30 | + cluster_role_binding = ClusterRoleBinding.create_instance( |
| 31 | + cluster, blame("crb"), cluster_role, service_accounts, labels={"app": module_label} |
| 32 | + ) |
| 33 | + request.addfinalizer(cluster_role_binding.delete) |
| 34 | + cluster_role_binding.commit() |
| 35 | + return cluster_role_binding |
| 36 | + |
| 37 | + return _create_cluster_role_binding |
| 38 | + |
| 39 | + |
| 40 | +@pytest.fixture(scope="module") |
| 41 | +def cluster_role(request, cluster, blame, module_label): |
| 42 | + """Creates and returns a ClusterRole""" |
| 43 | + rules = [{"nonResourceURLs": ["/get"], "verbs": ["get"]}] |
| 44 | + cluster_role = ClusterRole.create_instance(cluster, blame("cr"), rules, labels={"app": module_label}) |
| 45 | + request.addfinalizer(cluster_role.delete) |
| 46 | + cluster_role.commit() |
| 47 | + return cluster_role |
| 48 | + |
| 49 | + |
| 50 | +@pytest.fixture(scope="module") |
| 51 | +def bound_service_account_token(cluster_role, create_service_account, create_cluster_role_binding, audience): |
| 52 | + """Create a ServiceAccount, bind it to a ClusterRole and return its token with a given audience""" |
| 53 | + service_account = create_service_account("tkn-auth") |
| 54 | + create_cluster_role_binding(cluster_role.model.metadata.name, [service_account.model.metadata.name]) |
| 55 | + return service_account.get_auth_token(audience) |
| 56 | + |
| 57 | + |
| 58 | +@pytest.fixture(scope="module") |
| 59 | +def auth(bound_service_account_token): |
| 60 | + """Create request auth with service account token as API key""" |
| 61 | + return HeaderApiKeyAuth(bound_service_account_token, "Bearer") |
| 62 | + |
| 63 | + |
| 64 | +@pytest.fixture(scope="module") |
| 65 | +def service_account_token(create_service_account, audience): |
| 66 | + """Create a non-authorized service account and request its bound token with the hostname as audience""" |
| 67 | + service_account = create_service_account("tkn-non-auth") |
| 68 | + return service_account.get_auth_token(audience) |
| 69 | + |
| 70 | + |
| 71 | +@pytest.fixture(scope="module") |
| 72 | +def auth2(service_account_token): |
| 73 | + """Create request auth with service account token as API key""" |
| 74 | + return HeaderApiKeyAuth(service_account_token, "Bearer") |
0 commit comments