Merge branch 'main' of github.com:vmware-tanzu/pinniped into impersonation-proxy
Signed-off-by: Matt Moyer <moyerm@vmware.com>
This commit is contained in:
commit
10a1e29e15
12
test/cluster_capabilities/aks.yaml
Normal file
12
test/cluster_capabilities/aks.yaml
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
# Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
# Describe the capabilities of the cluster against which the integration tests will run.
|
||||||
|
capabilities:
|
||||||
|
|
||||||
|
# Is it possible to borrow the cluster's signing key from the kube API server?
|
||||||
|
clusterSigningKeyIsAvailable: false
|
||||||
|
|
||||||
|
# Does the cluster allow requests without authentication?
|
||||||
|
# https://kubernetes.io/docs/reference/access-authn-authz/authentication/#anonymous-requests
|
||||||
|
anonymousAuthenticationSupported: false
|
12
test/cluster_capabilities/eks.yaml
Normal file
12
test/cluster_capabilities/eks.yaml
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
# Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
# Describe the capabilities of the cluster against which the integration tests will run.
|
||||||
|
capabilities:
|
||||||
|
|
||||||
|
# Is it possible to borrow the cluster's signing key from the kube API server?
|
||||||
|
clusterSigningKeyIsAvailable: false
|
||||||
|
|
||||||
|
# Does the cluster allow requests without authentication?
|
||||||
|
# https://kubernetes.io/docs/reference/access-authn-authz/authentication/#anonymous-requests
|
||||||
|
anonymousAuthenticationSupported: true
|
@ -9,3 +9,7 @@ capabilities:
|
|||||||
|
|
||||||
# Will the cluster successfully provision a load balancer if requested?
|
# Will the cluster successfully provision a load balancer if requested?
|
||||||
hasExternalLoadBalancerProvider: true
|
hasExternalLoadBalancerProvider: true
|
||||||
|
|
||||||
|
# Does the cluster allow requests without authentication?
|
||||||
|
# https://kubernetes.io/docs/reference/access-authn-authz/authentication/#anonymous-requests
|
||||||
|
anonymousAuthenticationSupported: true
|
||||||
|
@ -9,3 +9,7 @@ capabilities:
|
|||||||
|
|
||||||
# Will the cluster successfully provision a load balancer if requested?
|
# Will the cluster successfully provision a load balancer if requested?
|
||||||
hasExternalLoadBalancerProvider: false
|
hasExternalLoadBalancerProvider: false
|
||||||
|
|
||||||
|
# Does the cluster allow requests without authentication?
|
||||||
|
# https://kubernetes.io/docs/reference/access-authn-authz/authentication/#anonymous-requests
|
||||||
|
anonymousAuthenticationSupported: true
|
||||||
|
@ -9,3 +9,7 @@ capabilities:
|
|||||||
|
|
||||||
# Will the cluster successfully provision a load balancer if requested?
|
# Will the cluster successfully provision a load balancer if requested?
|
||||||
hasExternalLoadBalancerProvider: true
|
hasExternalLoadBalancerProvider: true
|
||||||
|
|
||||||
|
# Does the cluster allow requests without authentication?
|
||||||
|
# https://kubernetes.io/docs/reference/access-authn-authz/authentication/#anonymous-requests
|
||||||
|
anonymousAuthenticationSupported: true
|
||||||
|
@ -23,7 +23,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func TestUnsuccessfulCredentialRequest(t *testing.T) {
|
func TestUnsuccessfulCredentialRequest(t *testing.T) {
|
||||||
env := library.IntegrationEnv(t)
|
env := library.IntegrationEnv(t).WithCapability(library.AnonymousAuthenticationSupported)
|
||||||
|
|
||||||
library.AssertNoRestartsDuringTest(t, env.ConciergeNamespace, "")
|
library.AssertNoRestartsDuringTest(t, env.ConciergeNamespace, "")
|
||||||
|
|
||||||
|
@ -333,7 +333,7 @@ func TestWhoAmI_CSR(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestWhoAmI_Anonymous(t *testing.T) {
|
func TestWhoAmI_Anonymous(t *testing.T) {
|
||||||
_ = library.IntegrationEnv(t)
|
_ = library.IntegrationEnv(t).WithCapability(library.AnonymousAuthenticationSupported)
|
||||||
|
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), time.Minute)
|
ctx, cancel := context.WithTimeout(context.Background(), time.Minute)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
@ -345,7 +345,6 @@ func TestWhoAmI_Anonymous(t *testing.T) {
|
|||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
// this also asserts that all users, even unauthenticated ones, can call this API when anonymous is enabled
|
// this also asserts that all users, even unauthenticated ones, can call this API when anonymous is enabled
|
||||||
// this test will need to be skipped when we start running the integration tests against AKS clusters
|
|
||||||
require.Equal(t,
|
require.Equal(t,
|
||||||
&identityv1alpha1.WhoAmIRequest{
|
&identityv1alpha1.WhoAmIRequest{
|
||||||
Status: identityv1alpha1.WhoAmIRequestStatus{
|
Status: identityv1alpha1.WhoAmIRequestStatus{
|
||||||
|
@ -19,6 +19,7 @@ type Capability string
|
|||||||
|
|
||||||
const (
|
const (
|
||||||
ClusterSigningKeyIsAvailable Capability = "clusterSigningKeyIsAvailable"
|
ClusterSigningKeyIsAvailable Capability = "clusterSigningKeyIsAvailable"
|
||||||
|
AnonymousAuthenticationSupported Capability = "anonymousAuthenticationSupported"
|
||||||
HasExternalLoadBalancerProvider Capability = "hasExternalLoadBalancerProvider"
|
HasExternalLoadBalancerProvider Capability = "hasExternalLoadBalancerProvider"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user