Skip to content
This repository has been archived by the owner on Jun 29, 2022. It is now read-only.

packet: disable syncing allowed SSH keys on nodes #471

Merged
merged 2 commits into from
May 29, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,8 @@ systemd:
enable: true
- name: locksmithd.service
mask: true
- name: coreos-metadata-sshkeys@core.service
mask: true
- name: wait-for-dns.service
enable: true
contents: |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,8 @@ systemd:
enable: true
- name: locksmithd.service
mask: true
- name: coreos-metadata-sshkeys@core.service
mask: true
- name: wait-for-dns.service
enable: true
contents: |
Expand Down
8 changes: 4 additions & 4 deletions pkg/assets/generated_assets.go

Large diffs are not rendered by default.

129 changes: 129 additions & 0 deletions test/system/ssh_keys_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,129 @@
// Copyright 2020 The Lokomotive Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

// +build aws aws_edge baremetal packet
// +build e2e

package system // nolint:testpackage

import (
"crypto/sha512"
"fmt"
"os"
"strings"
"testing"
"time"

appsv1 "k8s.io/api/apps/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"sigs.k8s.io/yaml"

testutil "github.com/kinvolk/lokomotive/test/components/util"
)

const (
// sshKeyEnv is an environment variable from which we take the SSH key
// to be used in testing.
sshKeyEnv = "PUB_KEY"
)

// authorizedKeysSHA512 takes a list of public SSH keys as an argument and calculates their
// SHA512, thus mimicking the behavior of the following command: `sha512sum /home/core/.ssh/authorized_keys`.
// The format of authorized_keys should match what the 'update-ssh-keys' command generates on Flatcar.
func authorizedKeysSHA512(keys []string) string {
plain := ""

for _, key := range keys {
// Trim the key before appending to make sure it does not contain
// a newline.
plain += fmt.Sprintf("%s\n", strings.TrimSpace(key))
}

// Add one more extra line to the file, this is what Ignition does.
plain += "\n"

return fmt.Sprintf("%x", sha512.Sum512([]byte(plain)))
}

// Define manifest as YAML and then unmarshal it to a Go struct so that it is easier to
// write and debug, as it can be copy-pasted to a file and applied manually.
const noExtraSSHKeysOnNodesDSManifest = `apiVersion: apps/v1
kind: DaemonSet
metadata:
generateName: test-ssh-keys-
spec:
selector:
matchLabels:
name: test-ssh-keys
template:
metadata:
labels:
name: test-ssh-keys
spec:
tolerations:
- key: node-role.kubernetes.io/master
effect: NoSchedule
terminationGracePeriodSeconds: 1
containers:
- name: test-ssh-keys
image: ubuntu
command: ["bash"]
volumeMounts:
- name: ssh
mountPath: /home/core/.ssh
readOnly: true
volumes:
- name: ssh
hostPath:
path: /home/core/.ssh
`

func TestNoExtraSSHKeysOnNodes(t *testing.T) {
t.Parallel()

key := os.Getenv(sshKeyEnv)
if key == "" {
t.Skipf("%q environment variable not set", sshKeyEnv)
}

namespace := "kube-system"

client := testutil.CreateKubeClient(t)

sum := authorizedKeysSHA512([]string{key})

ds := &appsv1.DaemonSet{}
if err := yaml.Unmarshal([]byte(noExtraSSHKeysOnNodesDSManifest), ds); err != nil {
t.Fatalf("failed unmarshaling manifest: %v", err)
}

// Set the right arguments from the manifest with the desired SHA512 sum.
ds.Spec.Template.Spec.Containers[0].Args = []string{
"-c",
fmt.Sprintf("sha512sum --status -c <(echo %s /home/core/.ssh/authorized_keys) && exec tail -f /dev/null", sum), //nolint:lll
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
fmt.Sprintf("sha512sum --status -c <(echo %s /home/core/.ssh/authorized_keys) && exec tail -f /dev/null", sum), //nolint:lll
fmt.Sprintf("sha512sum \" +
"--status -c <(echo %s /home/core/.ssh/authorized_keys) && \"
"exec tail -f /dev/null", sum
),

would something like this be better to avoid //nolint:lll

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if that improves the readability 😄

}

ds, err := client.AppsV1().DaemonSets(namespace).Create(ds)
if err != nil {
t.Fatalf("failed to create DaemonSet: %v", err)
}

testutil.WaitForDaemonSet(t, client, namespace, ds.ObjectMeta.Name, time.Second*5, time.Minute*5)

t.Cleanup(func() {
if err := client.AppsV1().DaemonSets(namespace).Delete(ds.ObjectMeta.Name, &metav1.DeleteOptions{}); err != nil {
t.Logf("failed to remove DaemonSet: %v", err)
}
})
}