kubeguard / guard

🔑 Kubernetes Authentication & Authorization WebHook Server
https://kubeguard.dev
Apache License 2.0
591 stars 81 forks source link

Fix e2e tests #156

Open tamalsaha opened 6 years ago

tamalsaha commented 6 years ago
------------------------------
I0621 00:00:00.232056   29604 installer_test.go:123] apiVersion: v1
kind: Namespace
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: test-guard-37x5pq
spec: {}
status: {}
---
apiVersion: v1
kind: ServiceAccount
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: guard
  namespace: test-guard-37x5pq
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: guard
  namespace: test-guard-37x5pq
rules:
- apiGroups:
  - ""
  resources:
  - nodes
  verbs:
  - list
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: guard
  namespace: test-guard-37x5pq
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: guard
subjects:
- kind: ServiceAccount
  name: guard
  namespace: test-guard-37x5pq
---
apiVersion: apps/v1beta1
kind: Deployment
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: guard
  namespace: test-guard-37x5pq
spec:
  replicas: 1
  strategy: {}
  template:
    metadata:
      annotations:
        scheduler.alpha.kubernetes.io/critical-pod: ""
      creationTimestamp: null
      labels:
        app: guard
    spec:
      containers:
      - args:
        - run
        - --v=3
        - --tls-ca-file=/etc/guard/pki/ca.crt
        - --tls-cert-file=/etc/guard/pki/tls.crt
        - --tls-private-key-file=/etc/guard/pki/tls.key
        - --auth-providers=azure
        - --azure.client-id=client_id
        - --azure.tenant-id=tenant_id
        - --azure.use-group-uid=false
        env:
        - name: AZURE_CLIENT_SECRET
          valueFrom:
            secretKeyRef:
              key: client-secret
              name: guard-azure-auth
        image: appscode/guard:canary
        name: guard
        ports:
        - containerPort: 8443
        readinessProbe:
          httpGet:
            path: /healthz
            port: 8443
            scheme: HTTPS
          initialDelaySeconds: 30
        resources: {}
        volumeMounts:
        - mountPath: /etc/guard/pki
          name: guard-pki
        - mountPath: /etc/guard/auth/azure
          name: guard-azure-auth
      serviceAccountName: guard
      tolerations:
      - key: CriticalAddonsOnly
        operator: Exists
      volumes:
      - name: guard-pki
        secret:
          defaultMode: 365
          secretName: guard-pki
      - name: guard-azure-auth
        secret:
          defaultMode: 365
          secretName: guard-azure-auth
status: {}
---
apiVersion: v1
data:
  ca.crt: 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
  tls.crt: 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
  tls.key: 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
kind: Secret
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: guard-pki
  namespace: test-guard-37x5pq
---
apiVersion: v1
data:
  client-secret: Y2xpZW50X3NlY3JldA==
kind: Secret
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: guard-azure-auth
  namespace: test-guard-37x5pq
---
apiVersion: v1
kind: Service
metadata:
  creationTimestamp: null
  labels:
    app: guard
  name: guard
  namespace: test-guard-37x5pq
spec:
  clusterIP: 10.96.10.96
  ports:
  - name: api
    port: 443
    protocol: TCP
    targetPort: 8443
  selector:
    app: guard
  type: ClusterIP
status:
  loadBalancer: {}
SIGQUIT: quit
PC=0x45d7f1 m=0 sigcode=0

goroutine 0 [idle]:
runtime.futex(0x1ff3e48, 0x0, 0x0, 0x0, 0x7fff00000000, 0x0, 0x0, 0x0, 0x7fff89e39c88, 0x410e9b, ...)
    /usr/local/go/src/runtime/sys_linux_amd64.s:530 +0x21
runtime.futexsleep(0x1ff3e48, 0x7fff00000000, 0xffffffffffffffff)
    /usr/local/go/src/runtime/os_linux.go:45 +0x4b
runtime.notesleep(0x1ff3e48)
    /usr/local/go/src/runtime/lock_futex.go:151 +0x9b
runtime.stoplockedm()
    /usr/local/go/src/runtime/proc.go:2101 +0x8c
runtime.schedule()
    /usr/local/go/src/runtime/proc.go:2493 +0x2da
runtime.park_m(0xc4204d0480)
    /usr/local/go/src/runtime/proc.go:2604 +0xb6
runtime.mcall(0x0)
    /usr/local/go/src/runtime/asm_amd64.s:351 +0x5b

goroutine 1 [chan receive, 9 minutes]:
testing.(*T).Run(0xc4208820f0, 0x14b6456, 0x7, 0x1560638, 0x47f346)
    /usr/local/go/src/testing/testing.go:825 +0x301
testing.runTests.func1(0xc420882000)
    /usr/local/go/src/testing/testing.go:1063 +0x64
testing.tRunner(0xc420882000, 0xc4207bfdf8)
    /usr/local/go/src/testing/testing.go:777 +0xd0
testing.runTests(0xc42051b3a0, 0x1fc47f0, 0x1, 0x1, 0x411eb9)
    /usr/local/go/src/testing/testing.go:1061 +0x2c4
testing.(*M).Run(0xc42056f200, 0x0)
    /usr/local/go/src/testing/testing.go:978 +0x171
main.main()
    _testmain.go:44 +0x151

goroutine 19 [runnable]:
github.com/appscode/guard/vendor/github.com/golang/glog.(*loggingT).flushDaemon(0x1ff2e80)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/golang/glog/glog.go:879 +0x8b
created by github.com/appscode/guard/vendor/github.com/golang/glog.init.0
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/golang/glog/glog.go:410 +0x203

goroutine 20 [syscall, 9 minutes]:
os/signal.signal_recv(0x0)
    /usr/local/go/src/runtime/sigqueue.go:139 +0xa6
os/signal.loop()
    /usr/local/go/src/os/signal/signal_unix.go:22 +0x22
created by os/signal.init.0
    /usr/local/go/src/os/signal/signal_unix.go:28 +0x41

goroutine 38 [chan receive, 9 minutes]:
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner.(*SpecRunner).registerForInterrupts(0xc4205d57c0, 0xc420872300)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner/spec_runner.go:223 +0xd1
created by github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner.(*SpecRunner).Run
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner/spec_runner.go:60 +0x88

goroutine 37 [select]:
github.com/appscode/guard/vendor/github.com/onsi/gomega/internal/asyncassertion.(*AsyncAssertion).match(0xc42089f040, 0x160cfa0, 0x20114c8, 0x412701, 0x0, 0x0, 0x0, 0x20114c8)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/gomega/internal/asyncassertion/async_assertion.go:139 +0x2e6
github.com/appscode/guard/vendor/github.com/onsi/gomega/internal/asyncassertion.(*AsyncAssertion).Should(0xc42089f040, 0x160cfa0, 0x20114c8, 0x0, 0x0, 0x0, 0xc42089f040)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/gomega/internal/asyncassertion/async_assertion.go:48 +0x62
github.com/appscode/guard/test/e2e_test.glob..func3.3()
    /home/tamal/go/src/github.com/appscode/guard/test/e2e/installer_test.go:152 +0x154
github.com/appscode/guard/test/e2e_test.glob..func3.16.6.3()
    /home/tamal/go/src/github.com/appscode/guard/test/e2e/installer_test.go:402 +0xed
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/leafnodes.(*runner).runSync(0xc4200a79e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ...)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/leafnodes/runner.go:110 +0x9c
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/leafnodes.(*runner).run(0xc4200a79e0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ...)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/leafnodes/runner.go:64 +0x13e
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/leafnodes.(*ItNode).Run(0xc4203c37a0, 0x15f68c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ...)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/leafnodes/it_node.go:26 +0x7f
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/spec.(*Spec).runSample(0xc420882780, 0x0, 0x15f68c0, 0xc420408e40)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/spec/spec.go:203 +0x648
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/spec.(*Spec).Run(0xc420882780, 0x15f68c0, 0xc420408e40)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/spec/spec.go:138 +0xff
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner.(*SpecRunner).runSpec(0xc4205d57c0, 0xc420882780, 0x0)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner/spec_runner.go:200 +0x10d
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner.(*SpecRunner).runSpecs(0xc4205d57c0, 0x1)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner/spec_runner.go:170 +0x329
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner.(*SpecRunner).Run(0xc4205d57c0, 0x9)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/specrunner/spec_runner.go:66 +0x11b
github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/suite.(*Suite).Run(0xc420402cd0, 0x7f0633fa2c90, 0xc4208820f0, 0x14b94a0, 0x9, 0xc42051b420, 0x2, 0x2, 0x161d3a0, 0xc420408e40, ...)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/internal/suite/suite.go:62 +0x27c
github.com/appscode/guard/vendor/github.com/onsi/ginkgo.RunSpecsWithCustomReporters(0x15f7d40, 0xc4208820f0, 0x14b94a0, 0x9, 0xc42051b3c0, 0x2, 0x2, 0x2)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/ginkgo_dsl.go:220 +0x258
github.com/appscode/guard/vendor/github.com/onsi/ginkgo.RunSpecsWithDefaultAndCustomReporters(0x15f7d40, 0xc4208820f0, 0x14b94a0, 0x9, 0xc420125788, 0x1, 0x1, 0x5b2b4bd0)
    /home/tamal/go/src/github.com/appscode/guard/vendor/github.com/onsi/ginkgo/ginkgo_dsl.go:208 +0xab
github.com/appscode/guard/test/e2e_test.TestE2e(0xc4208820f0)
    /home/tamal/go/src/github.com/appscode/guard/test/e2e/e2e_suite_test.go:29 +0xed
testing.tRunner(0xc4208820f0, 0x1560638)
    /usr/local/go/src/testing/testing.go:777 +0xd0
created by testing.(*T).Run
    /usr/local/go/src/testing/testing.go:824 +0x2e0

goroutine 39 [select, 9 minutes, locked to thread]:
runtime.gopark(0x1562a50, 0x0, 0x14b59f8, 0x6, 0x18, 0x1)
    /usr/local/go/src/runtime/proc.go:291 +0x11a
runtime.selectgo(0xc420125750, 0xc4208723c0)
    /usr/local/go/src/runtime/select.go:392 +0xe50
runtime.ensureSigM.func1()
    /usr/local/go/src/runtime/signal_unix.go:549 +0x1f4
runtime.goexit()
    /usr/local/go/src/runtime/asm_amd64.s:2361 +0x1

goroutine 16 [IO wait]:
internal/poll.runtime_pollWait(0x7f0634035f00, 0x72, 0xc42099d850)
    /usr/local/go/src/runtime/netpoll.go:173 +0x57
internal/poll.(*pollDesc).wait(0xc420658918, 0x72, 0xffffffffffffff00, 0x15f91c0, 0x1eeb820)
    /usr/local/go/src/internal/poll/fd_poll_runtime.go:85 +0x9b
internal/poll.(*pollDesc).waitRead(0xc420658918, 0xc420a8a000, 0x4000, 0x4000)
    /usr/local/go/src/internal/poll/fd_poll_runtime.go:90 +0x3d
internal/poll.(*FD).Read(0xc420658900, 0xc420a8a000, 0x4000, 0x4000, 0x0, 0x0, 0x0)
    /usr/local/go/src/internal/poll/fd_unix.go:157 +0x17d
net.(*netFD).Read(0xc420658900, 0xc420a8a000, 0x4000, 0x4000, 0x8, 0x8, 0x3ff3)
    /usr/local/go/src/net/fd_unix.go:202 +0x4f
net.(*conn).Read(0xc420524000, 0xc420a8a000, 0x4000, 0x4000, 0x0, 0x0, 0x0)
    /usr/local/go/src/net/net.go:176 +0x6a
crypto/tls.(*block).readFromUntil(0xc42063af30, 0x7f0633f6e000, 0xc420524000, 0x5, 0xc420524000, 0x0)
    /usr/local/go/src/crypto/tls/conn.go:493 +0x96
crypto/tls.(*Conn).readRecord(0xc420998000, 0x1562b17, 0xc420998120, 0x0)
    /usr/local/go/src/crypto/tls/conn.go:595 +0xe0
crypto/tls.(*Conn).Read(0xc420998000, 0xc420881000, 0x1000, 0x1000, 0x0, 0x0, 0x0)
    /usr/local/go/src/crypto/tls/conn.go:1156 +0x100
bufio.(*Reader).Read(0xc4200a6480, 0xc4209102d8, 0x9, 0x9, 0xc420924ef8, 0xc420a51460, 0xc42099dd10)
    /usr/local/go/src/bufio/bufio.go:216 +0x238
io.ReadAtLeast(0x15f4d00, 0xc4200a6480, 0xc4209102d8, 0x9, 0x9, 0x9, 0xc42099dce0, 0xc42099dce0, 0x406614)
    /usr/local/go/src/io/io.go:309 +0x86
io.ReadFull(0x15f4d00, 0xc4200a6480, 0xc4209102d8, 0x9, 0x9, 0xc420924ea0, 0xc42099dd10, 0xc400000101)
    /usr/local/go/src/io/io.go:327 +0x58
github.com/appscode/guard/vendor/golang.org/x/net/http2.readFrameHeader(0xc4209102d8, 0x9, 0x9, 0x15f4d00, 0xc4200a6480, 0x0, 0xc400000000, 0x91389d, 0xc42099dfb0)
    /home/tamal/go/src/github.com/appscode/guard/vendor/golang.org/x/net/http2/frame.go:237 +0x7b
github.com/appscode/guard/vendor/golang.org/x/net/http2.(*Framer).ReadFrame(0xc4209102a0, 0xc420a89230, 0x0, 0x0, 0x0)
    /home/tamal/go/src/github.com/appscode/guard/vendor/golang.org/x/net/http2/frame.go:492 +0xa4
github.com/appscode/guard/vendor/golang.org/x/net/http2.(*clientConnReadLoop).run(0xc42099dfb0, 0x1561520, 0xc4201247b0)
    /home/tamal/go/src/github.com/appscode/guard/vendor/golang.org/x/net/http2/transport.go:1428 +0x8e
github.com/appscode/guard/vendor/golang.org/x/net/http2.(*ClientConn).readLoop(0xc4200e8820)
    /home/tamal/go/src/github.com/appscode/guard/vendor/golang.org/x/net/http2/transport.go:1354 +0x76
created by github.com/appscode/guard/vendor/golang.org/x/net/http2.(*Transport).newClientConn
    /home/tamal/go/src/github.com/appscode/guard/vendor/golang.org/x/net/http2/transport.go:579 +0x651

rax    0xca
rbx    0x1ff3d00
rcx    0x45d7f3
rdx    0x0
rdi    0x1ff3e48
rsi    0x0
rbp    0x7fff89e39c50
rsp    0x7fff89e39c08
r8     0x0
r9     0x0
r10    0x0
r11    0x286
r12    0xc420125768
r13    0xff
r14    0xff
r15    0xf
rip    0x45d7f1
rflags 0x286
cs     0x33
fs     0x0
gs     0x0
*** Test killed with quit: ran too long (10m0s).
FAIL    github.com/appscode/guard/test/e2e  600.009s
?       github.com/appscode/guard/test/e2e/framework    [no test files]
?       github.com/appscode/guard/test/e2e/matcher  [no test files]
?       github.com/appscode/guard/util/kubeconfig   [no test files]
tamalsaha commented 6 years ago
=== RUN   TestForDIfferentGroupSizes/authentication_successful,_group_size_0
panic: runtime error: invalid memory address or nil pointer dereference [recovered]
    panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x8 pc=0xa73209]

goroutine 68 [running]:
testing.tRunner.func1(0xc4203360f0)
    /usr/local/go/src/testing/testing.go:742 +0x29d
panic(0xb2d8e0, 0x107bcf0)
    /usr/local/go/src/runtime/panic.go:502 +0x229
github.com/appscode/guard/auth/providers/gitlab.assertUserInfo(0xc4203360f0, 0x0, 0x0)
    /home/tamal/go/src/github.com/appscode/guard/auth/providers/gitlab/gitlab_test.go:81 +0x29
github.com/appscode/guard/auth/providers/gitlab.TestForDIfferentGroupSizes.func1(0xc4203360f0)
    /home/tamal/go/src/github.com/appscode/guard/auth/providers/gitlab/gitlab_test.go:258 +0x14a
testing.tRunner(0xc4203360f0, 0xc4203080d0)
    /usr/local/go/src/testing/testing.go:777 +0xd0
created by testing.(*T).Run
    /usr/local/go/src/testing/testing.go:824 +0x2e0

Ginkgo ran 5 suites in 5.918813786s
tamalsaha commented 6 years ago

https://github.com/vjeantet/ldapserver/issues/23

tamalsaha commented 6 years ago

@nightfury1204 , can you add a method to check that LDAP server is ready to accept connections before calling t.Run() ?

https://travis-ci.org/appscode/guard/jobs/395265438#L807