k8s: Validate API server included authorization mode 93/96293/1
authorPawel Wieczorek <p.wieczorek2@samsung.com>
Wed, 25 Sep 2019 14:37:24 +0000 (16:37 +0200)
committerPawel Wieczorek <p.wieczorek2@samsung.com>
Thu, 26 Sep 2019 17:02:01 +0000 (19:02 +0200)
This patch verifies if CIS Kubernetes Benchmark v1.3.0 section
regarding master node configuration is satisfied (1.1.32).

It also fixes wrong documentation comment for similar validator
(1.1.19).

Issue-ID: SECCOM-235
Change-Id: I00cb8a458871b091b16fe60fc0087b7972aa3b6b
Signed-off-by: Pawel Wieczorek <p.wieczorek2@samsung.com>
test/security/k8s/src/check/cmd/check/check.go
test/security/k8s/src/check/validators/master/api.go
test/security/k8s/src/check/validators/master/api_test.go

index f348cd0..0447d5b 100644 (file)
@@ -65,6 +65,7 @@ func main() {
        log.Printf("IsNamespaceLifecycleAdmissionControlPluginNotExcluded: %t\n", master.IsNamespaceLifecycleAdmissionControlPluginNotExcluded(k8sParams))
 
        log.Printf("IsAlwaysAllowAuthorizationModeExcluded: %t\n", master.IsAlwaysAllowAuthorizationModeExcluded(k8sParams))
+       log.Printf("IsNodeAuthorizationModeIncluded: %t\n", master.IsNodeAuthorizationModeIncluded(k8sParams))
 
        log.Printf("IsAuditLogPathSet: %t\n", master.IsAuditLogPathSet(k8sParams))
        log.Printf("IsAuditLogMaxAgeValid: %t\n", master.IsAuditLogPathSet(k8sParams))
index ea0d9ec..bc25d99 100644 (file)
@@ -262,12 +262,17 @@ func hasFlagArgumentIncluded(flag string, argument string, params []string) bool
        return false
 }
 
-// IsAlwaysAllowAuthorizationModeExcluded validates AlwaysAllow is excluded from admission control plugins.
+// IsAlwaysAllowAuthorizationModeExcluded validates AlwaysAllow is excluded from authorization modes.
 func IsAlwaysAllowAuthorizationModeExcluded(params []string) bool {
        return isSingleFlagPresent("--authorization-mode=", params) &&
                !hasFlagArgumentIncluded("--authorization-mode=", "AlwaysAllow", params)
 }
 
+// IsNodeAuthorizationModeIncluded validates Node is included in authorization modes.
+func IsNodeAuthorizationModeIncluded(params []string) bool {
+       return hasFlagArgumentIncluded("--authorization-mode=", "Node", params)
+}
+
 // IsAuditLogPathSet validates there is single "--audit-log-path" flag and has non-empty argument.
 func IsAuditLogPathSet(params []string) bool {
        return hasSingleFlagNonemptyArgument("--audit-log-path=", params)
index c0906bb..35860c6 100644 (file)
@@ -23,7 +23,7 @@ var _ = Describe("Api", func() {
                                "PersistentVolumeClaimResize,MutatingAdmissionWebhook,ValidatingAdmissionWebhook," +
                                "ResourceQuota,AlwaysPullImages,DenyEscalatingExec,SecurityContextDeny," +
                                "PodSecurityPolicy,NodeRestriction,EventRateLimit",
-                       "--authorization-mode=RBAC",
+                       "--authorization-mode=Node,RBAC",
                        "--audit-log-path=/var/log/apiserver/audit.log",
                        "--audit-log-maxage=30",
                        "--audit-log-maxbackup=10",
@@ -478,6 +478,17 @@ var _ = Describe("Api", func() {
                        Entry("Should be absent on CIS-compliant cluster", kubeApiServerCISCompliant, true),
                        Entry("Should be absent on Dublin cluster", kubeApiServerDublin, true),
                )
+
+               DescribeTable("Node authorization mode",
+                       func(params []string, expected bool) {
+                               Expect(IsNodeAuthorizationModeIncluded(params)).To(Equal(expected))
+                       },
+                       Entry("Is not explicitly enabled on insecure cluster", []string{}, false),
+                       Entry("Is not present on insecure cluster", []string{"--authorization-mode=Foo,Bar"}, false),
+                       Entry("Is not explicitly enabled on Casablanca cluster", kubeApiServerCasablanca, false),
+                       Entry("Should present on CIS-compliant cluster", kubeApiServerCISCompliant, true),
+                       Entry("Should present on Dublin cluster", kubeApiServerDublin, true),
+               )
        })
 
        Describe("Flags requiring strict equality", func() {