Testing Kerberos Authentication Configuration in Apache Airflow
This test suite validates Kerberos authentication functionality in Apache Airflow’s Helm chart deployment. It ensures proper configuration, resource management, and integration of Kerberos authentication across worker nodes and sidecars.
Test Coverage Overview
Implementation Analysis
Technical Details
Best Practices Demonstrated
apache/airflow
helm_tests/security/test_kerberos.py
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
from __future__ import annotations
import json
import jmespath
from tests.charts.helm_template_generator import render_chart
class TestKerberos:
"""Tests kerberos."""
def test_kerberos_not_mentioned_in_render_if_disabled(self):
# the name is deliberately shorter as we look for "kerberos" in the rendered chart
k8s_objects = render_chart(name="no-krbros", values={"kerberos": {"enabled": False}})
# ignore airflow config map
k8s_objects_to_consider = [
obj for obj in k8s_objects if obj["metadata"]["name"] != "no-krbros-config"
]
k8s_objects_to_consider_str = json.dumps(k8s_objects_to_consider)
assert k8s_objects_to_consider_str.count("kerberos") == 1
def test_kerberos_envs_available_in_worker_with_persistence(self):
docs = render_chart(
values={
"executor": "CeleryExecutor",
"workers": {
"kerberosSidecar": {"enabled": True},
"persistence": {
"enabled": True,
},
},
"kerberos": {
"enabled": True,
"configPath": "/etc/krb5.conf",
"ccacheMountPath": "/var/kerberos-ccache",
"ccacheFileName": "ccache",
},
},
show_only=["templates/workers/worker-deployment.yaml"],
)
assert {"name": "KRB5_CONFIG", "value": "/etc/krb5.conf"} in jmespath.search(
"spec.template.spec.containers[0].env", docs[0]
)
assert {"name": "KRB5CCNAME", "value": "/var/kerberos-ccache/ccache"} in jmespath.search(
"spec.template.spec.containers[0].env", docs[0]
)
def test_kerberos_sidecar_resources(self):
docs = render_chart(
values={
"executor": "CeleryExecutor",
"workers": {
"kerberosSidecar": {
"enabled": True,
"resources": {
"requests": {
"cpu": "200m",
"memory": "200Mi",
},
"limits": {
"cpu": "201m",
"memory": "201Mi",
},
},
},
},
},
show_only=["templates/workers/worker-deployment.yaml"],
)
assert jmespath.search("spec.template.spec.containers[2].resources.requests.cpu", docs[0]) == "200m"
assert (
jmespath.search("spec.template.spec.containers[2].resources.requests.memory", docs[0]) == "200Mi"
)
assert jmespath.search("spec.template.spec.containers[2].resources.limits.cpu", docs[0]) == "201m"
assert jmespath.search("spec.template.spec.containers[2].resources.limits.memory", docs[0]) == "201Mi"
def test_keberos_sidecar_resources_are_not_added_by_default(self):
docs = render_chart(
show_only=["templates/workers/worker-deployment.yaml"],
)
assert jmespath.search("spec.template.spec.containers[0].resources", docs[0]) == {}
def test_kerberos_keytab_exists_in_worker_when_enable(self):
docs = render_chart(
values={
"executor": "CeleryExecutor",
"kerberos": {
"enabled": True,
"keytabBase64Content": "dGVzdGtleXRhYg==",
"configPath": "/etc/krb5.conf",
"ccacheMountPath": "/var/kerberos-ccache",
"ccacheFileName": "ccache",
},
},
show_only=["templates/workers/worker-deployment.yaml"],
)
assert {
"name": "kerberos-keytab",
"subPath": "kerberos.keytab",
"mountPath": "/etc/airflow.keytab",
"readOnly": True,
} in jmespath.search("spec.template.spec.containers[0].volumeMounts", docs[0])
def test_kerberos_keytab_secret_available(self):
docs = render_chart(
values={
"executor": "CeleryExecutor",
"kerberos": {
"enabled": True,
"keytabBase64Content": "dGVzdGtleXRhYg==",
"configPath": "/etc/krb5.conf",
"ccacheMountPath": "/var/kerberos-ccache",
"ccacheFileName": "ccache",
},
},
show_only=["templates/secrets/kerberos-keytab-secret.yaml"],
)
assert jmespath.search('data."kerberos.keytab"', docs[0]) == "dGVzdGtleXRhYg=="
def test_kerberos_keytab_secret_unavailable_when_not_specified(self):
docs = render_chart(
values={
"executor": "CeleryExecutor",
"kerberos": {
"enabled": True,
"configPath": "/etc/krb5.conf",
"ccacheMountPath": "/var/kerberos-ccache",
"ccacheFileName": "ccache",
},
},
show_only=["templates/secrets/kerberos-keytab-secret.yaml"],
)
assert len(docs) == 0