Avoid encoding in LogResponseObject when we are not going to use it
Signed-off-by: Davanum Srinivas <davanum@gmail.com> Kubernetes-commit: e418ee3a92ca6c670d26f775b0f669e8a5fe233c
This commit is contained in:
		
							parent
							
								
									9b509bf53b
								
							
						
					
					
						commit
						bda7e28bbb
					
				| 
						 | 
				
			
			@ -171,7 +171,7 @@ func LogRequestPatch(ctx context.Context, patch []byte) {
 | 
			
		|||
// will be converted to the given gv.
 | 
			
		||||
func LogResponseObject(ctx context.Context, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer) {
 | 
			
		||||
	ac := AuditContextFrom(WithAuditContext(ctx))
 | 
			
		||||
	if ac.GetEventLevel().Less(auditinternal.LevelMetadata) {
 | 
			
		||||
	if ac.GetEventLevel().Less(auditinternal.LevelRequestResponse) {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -0,0 +1,259 @@
 | 
			
		|||
/*
 | 
			
		||||
Copyright 2025 The Kubernetes Authors.
 | 
			
		||||
 | 
			
		||||
Licensed under the Apache License, Version 2.0 (the "License");
 | 
			
		||||
you may not use this file except in compliance with the License.
 | 
			
		||||
You may obtain a copy of the License at
 | 
			
		||||
 | 
			
		||||
    http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 | 
			
		||||
Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
distributed under the License is distributed on an "AS IS" BASIS,
 | 
			
		||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
See the License for the specific language governing permissions and
 | 
			
		||||
limitations under the License.
 | 
			
		||||
*/
 | 
			
		||||
 | 
			
		||||
package audit
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"io"
 | 
			
		||||
	"strings"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	corev1 "k8s.io/api/core/v1"
 | 
			
		||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
			
		||||
	"k8s.io/apimachinery/pkg/runtime"
 | 
			
		||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
			
		||||
	"k8s.io/apimachinery/pkg/runtime/serializer"
 | 
			
		||||
	auditinternal "k8s.io/apiserver/pkg/apis/audit"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestLogResponseObjectWithPod(t *testing.T) {
 | 
			
		||||
	testPod := &corev1.Pod{
 | 
			
		||||
		TypeMeta: metav1.TypeMeta{
 | 
			
		||||
			APIVersion: "v1",
 | 
			
		||||
			Kind:       "Pod",
 | 
			
		||||
		},
 | 
			
		||||
		ObjectMeta: metav1.ObjectMeta{
 | 
			
		||||
			Name:      "test-pod",
 | 
			
		||||
			Namespace: "test-namespace",
 | 
			
		||||
		},
 | 
			
		||||
		Spec: corev1.PodSpec{
 | 
			
		||||
			Containers: []corev1.Container{
 | 
			
		||||
				{
 | 
			
		||||
					Name:  "test-container",
 | 
			
		||||
					Image: "test-image",
 | 
			
		||||
				},
 | 
			
		||||
			},
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	scheme := runtime.NewScheme()
 | 
			
		||||
	if err := corev1.AddToScheme(scheme); err != nil {
 | 
			
		||||
		t.Fatalf("Failed to add core/v1 to scheme: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	codecs := serializer.NewCodecFactory(scheme)
 | 
			
		||||
	negotiatedSerializer := codecs.WithoutConversion()
 | 
			
		||||
 | 
			
		||||
	// Create audit context with RequestResponse level
 | 
			
		||||
	ctx := WithAuditContext(context.Background())
 | 
			
		||||
	ac := AuditContextFrom(ctx)
 | 
			
		||||
 | 
			
		||||
	captureSink := &capturingAuditSink{}
 | 
			
		||||
	if err := ac.Init(RequestAuditConfig{Level: auditinternal.LevelRequestResponse}, captureSink); err != nil {
 | 
			
		||||
		t.Fatalf("Failed to initialize audit context: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	LogResponseObject(ctx, testPod, schema.GroupVersion{Group: "", Version: "v1"}, negotiatedSerializer)
 | 
			
		||||
	ac.ProcessEventStage(ctx, auditinternal.StageResponseComplete)
 | 
			
		||||
 | 
			
		||||
	if len(captureSink.events) != 1 {
 | 
			
		||||
		t.Fatalf("Expected one audit event to be captured, got %d", len(captureSink.events))
 | 
			
		||||
	}
 | 
			
		||||
	event := captureSink.events[0]
 | 
			
		||||
	if event.ResponseObject == nil {
 | 
			
		||||
		t.Fatal("Expected ResponseObject to be set, but it was nil")
 | 
			
		||||
	}
 | 
			
		||||
	if event.ResponseObject.ContentType != runtime.ContentTypeJSON {
 | 
			
		||||
		t.Errorf("Expected ContentType to be %q, got %q", runtime.ContentTypeJSON, event.ResponseObject.ContentType)
 | 
			
		||||
	}
 | 
			
		||||
	if len(event.ResponseObject.Raw) == 0 {
 | 
			
		||||
		t.Error("Expected ResponseObject.Raw to contain data, but it was empty")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	responseJSON := string(event.ResponseObject.Raw)
 | 
			
		||||
	expectedFields := []string{"test-pod", "test-namespace", "test-container", "test-image"}
 | 
			
		||||
	for _, field := range expectedFields {
 | 
			
		||||
		if !strings.Contains(responseJSON, field) {
 | 
			
		||||
			t.Errorf("Response should contain %q but didn't. Response: %s", field, responseJSON)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if event.ResponseStatus != nil {
 | 
			
		||||
		t.Errorf("Expected ResponseStatus to be nil for regular object, got: %+v", event.ResponseStatus)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestLogResponseObjectWithStatus(t *testing.T) {
 | 
			
		||||
	// Create a status object to test ResponseStatus handling
 | 
			
		||||
	testStatus := &metav1.Status{
 | 
			
		||||
		TypeMeta: metav1.TypeMeta{
 | 
			
		||||
			APIVersion: "v1",
 | 
			
		||||
			Kind:       "Status",
 | 
			
		||||
		},
 | 
			
		||||
		Status:  "Success",
 | 
			
		||||
		Message: "Test status message",
 | 
			
		||||
		Reason:  "TestReason",
 | 
			
		||||
		Code:    200,
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	scheme := runtime.NewScheme()
 | 
			
		||||
	err := metav1.AddMetaToScheme(scheme)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatalf("Failed to add meta to scheme: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
	scheme.AddKnownTypes(schema.GroupVersion{Version: "v1"}, &metav1.Status{})
 | 
			
		||||
	codecs := serializer.NewCodecFactory(scheme)
 | 
			
		||||
	negotiatedSerializer := codecs.WithoutConversion()
 | 
			
		||||
 | 
			
		||||
	ctx := WithAuditContext(context.Background())
 | 
			
		||||
	ac := AuditContextFrom(ctx)
 | 
			
		||||
 | 
			
		||||
	captureSink := &capturingAuditSink{}
 | 
			
		||||
	if err := ac.Init(RequestAuditConfig{Level: auditinternal.LevelRequestResponse}, captureSink); err != nil {
 | 
			
		||||
		t.Fatalf("Failed to initialize audit context: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	LogResponseObject(ctx, testStatus, schema.GroupVersion{Group: "", Version: "v1"}, negotiatedSerializer)
 | 
			
		||||
	ac.ProcessEventStage(ctx, auditinternal.StageResponseComplete)
 | 
			
		||||
 | 
			
		||||
	if len(captureSink.events) != 1 {
 | 
			
		||||
		t.Fatalf("Expected one audit event to be captured, got %d", len(captureSink.events))
 | 
			
		||||
	}
 | 
			
		||||
	event := captureSink.events[0]
 | 
			
		||||
 | 
			
		||||
	if event.ResponseObject == nil {
 | 
			
		||||
		t.Fatal("Expected ResponseObject to be set, but it was nil")
 | 
			
		||||
	}
 | 
			
		||||
	if event.ResponseStatus == nil {
 | 
			
		||||
		t.Fatal("Expected ResponseStatus to be set for Status object, but it was nil")
 | 
			
		||||
	}
 | 
			
		||||
	if event.ResponseStatus.Status != "Success" {
 | 
			
		||||
		t.Errorf("Expected ResponseStatus.Status to be 'Success', got %q", event.ResponseStatus.Status)
 | 
			
		||||
	}
 | 
			
		||||
	if event.ResponseStatus.Message != "Test status message" {
 | 
			
		||||
		t.Errorf("Expected ResponseStatus.Message to be 'Test status message', got %q", event.ResponseStatus.Message)
 | 
			
		||||
	}
 | 
			
		||||
	if event.ResponseStatus.Reason != "TestReason" {
 | 
			
		||||
		t.Errorf("Expected ResponseStatus.Reason to be 'TestReason', got %q", event.ResponseStatus.Reason)
 | 
			
		||||
	}
 | 
			
		||||
	if event.ResponseStatus.Code != 200 {
 | 
			
		||||
		t.Errorf("Expected ResponseStatus.Code to be 200, got %d", event.ResponseStatus.Code)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestLogResponseObjectLevelCheck(t *testing.T) {
 | 
			
		||||
	testCases := []struct {
 | 
			
		||||
		name         string
 | 
			
		||||
		level        auditinternal.Level
 | 
			
		||||
		shouldEncode bool
 | 
			
		||||
	}{
 | 
			
		||||
		{
 | 
			
		||||
			name:         "None level should not encode",
 | 
			
		||||
			level:        auditinternal.LevelNone,
 | 
			
		||||
			shouldEncode: false,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name:         "Metadata level should not encode",
 | 
			
		||||
			level:        auditinternal.LevelMetadata,
 | 
			
		||||
			shouldEncode: false,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name:         "Request level should not encode",
 | 
			
		||||
			level:        auditinternal.LevelRequest,
 | 
			
		||||
			shouldEncode: false,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name:         "RequestResponse level should encode",
 | 
			
		||||
			level:        auditinternal.LevelRequestResponse,
 | 
			
		||||
			shouldEncode: true,
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, tc := range testCases {
 | 
			
		||||
		t.Run(tc.name, func(t *testing.T) {
 | 
			
		||||
			// Create a test object
 | 
			
		||||
			testObj := &corev1.Pod{
 | 
			
		||||
				ObjectMeta: metav1.ObjectMeta{
 | 
			
		||||
					Name:      "test-pod",
 | 
			
		||||
					Namespace: "test-namespace",
 | 
			
		||||
				},
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			// Create audit context with the specified level
 | 
			
		||||
			ctx := WithAuditContext(context.Background())
 | 
			
		||||
			ac := AuditContextFrom(ctx)
 | 
			
		||||
			ac.Init(RequestAuditConfig{Level: tc.level}, nil)
 | 
			
		||||
 | 
			
		||||
			// Create a mock serializer that tracks if encoding was attempted
 | 
			
		||||
			mockSerializer := &mockNegotiatedSerializer{}
 | 
			
		||||
 | 
			
		||||
			// Call the function under test
 | 
			
		||||
			LogResponseObject(ctx, testObj, schema.GroupVersion{Group: "", Version: "v1"}, mockSerializer)
 | 
			
		||||
 | 
			
		||||
			// Check if encoding was attempted as expected
 | 
			
		||||
			if mockSerializer.encodeCalled != tc.shouldEncode {
 | 
			
		||||
				t.Errorf("Expected encoding to be called: %v, but got: %v", tc.shouldEncode, mockSerializer.encodeCalled)
 | 
			
		||||
			}
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type mockNegotiatedSerializer struct {
 | 
			
		||||
	encodeCalled bool
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (m *mockNegotiatedSerializer) SupportedMediaTypes() []runtime.SerializerInfo {
 | 
			
		||||
	return []runtime.SerializerInfo{
 | 
			
		||||
		{
 | 
			
		||||
			MediaType:        runtime.ContentTypeJSON,
 | 
			
		||||
			EncodesAsText:    true,
 | 
			
		||||
			Serializer:       nil,
 | 
			
		||||
			PrettySerializer: nil,
 | 
			
		||||
			StreamSerializer: nil,
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (m *mockNegotiatedSerializer) EncoderForVersion(serializer runtime.Encoder, gv runtime.GroupVersioner) runtime.Encoder {
 | 
			
		||||
	m.encodeCalled = true
 | 
			
		||||
	return &mockEncoder{}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (m *mockNegotiatedSerializer) DecoderToVersion(serializer runtime.Decoder, gv runtime.GroupVersioner) runtime.Decoder {
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type mockEncoder struct{}
 | 
			
		||||
 | 
			
		||||
func (e *mockEncoder) Encode(obj runtime.Object, w io.Writer) error {
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (e *mockEncoder) Identifier() runtime.Identifier {
 | 
			
		||||
	return runtime.Identifier("mock")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type capturingAuditSink struct {
 | 
			
		||||
	events []*auditinternal.Event
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (s *capturingAuditSink) ProcessEvents(events ...*auditinternal.Event) bool {
 | 
			
		||||
	for _, event := range events {
 | 
			
		||||
		eventCopy := event.DeepCopy()
 | 
			
		||||
		s.events = append(s.events, eventCopy)
 | 
			
		||||
	}
 | 
			
		||||
	return true
 | 
			
		||||
}
 | 
			
		||||
		Loading…
	
		Reference in New Issue