crds_controller_test.go 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package crds
  13. import (
  14. "context"
  15. "crypto/rsa"
  16. "crypto/x509"
  17. "encoding/json"
  18. "os"
  19. "testing"
  20. "time"
  21. corev1 "k8s.io/api/core/v1"
  22. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  23. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  24. "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
  25. "k8s.io/apimachinery/pkg/types"
  26. ctrl "sigs.k8s.io/controller-runtime"
  27. client "sigs.k8s.io/controller-runtime/pkg/client/fake"
  28. )
  29. const (
  30. setupError = "Could not setup test"
  31. errorSearchingField = "Error when searching for field"
  32. failedCreateCaCerts = "could not create ca certificates:%v"
  33. failedCreateServerCerts = "could not create server certificates:%v"
  34. invalidCerts = "generated certificates are invalid:%v,%v"
  35. dnsName = "foobar"
  36. )
  37. func newReconciler() Reconciler {
  38. return Reconciler{
  39. CrdResources: []string{"one", "two", "three"},
  40. SvcName: "foo",
  41. SvcNamespace: "default",
  42. SecretName: "foo",
  43. SecretNamespace: "default",
  44. }
  45. }
  46. func newService() corev1.Service {
  47. return corev1.Service{
  48. ObjectMeta: metav1.ObjectMeta{
  49. Name: "foo",
  50. Namespace: "default",
  51. Labels: map[string]string{"foo": "bar"},
  52. },
  53. }
  54. }
  55. func newSecret() corev1.Secret {
  56. return corev1.Secret{
  57. ObjectMeta: metav1.ObjectMeta{
  58. Name: "foo",
  59. Namespace: "default",
  60. Labels: map[string]string{"foo": "bar"},
  61. },
  62. }
  63. }
  64. func newCRD() apiextensionsv1.CustomResourceDefinition {
  65. return apiextensionsv1.CustomResourceDefinition{
  66. ObjectMeta: metav1.ObjectMeta{
  67. Name: "one",
  68. },
  69. Spec: apiextensionsv1.CustomResourceDefinitionSpec{
  70. Conversion: &apiextensionsv1.CustomResourceConversion{
  71. Strategy: "Webhook",
  72. Webhook: &apiextensionsv1.WebhookConversion{
  73. ConversionReviewVersions: []string{"v1"},
  74. ClientConfig: &apiextensionsv1.WebhookClientConfig{
  75. CABundle: []byte("test"),
  76. Service: &apiextensionsv1.ServiceReference{
  77. Name: "wrong",
  78. Namespace: "wrong",
  79. },
  80. },
  81. },
  82. },
  83. },
  84. }
  85. }
  86. func TestConvertToWebhookInfo(t *testing.T) {
  87. rec := newReconciler()
  88. info := rec.ConvertToWebhookInfo()
  89. if len(info) != 3 {
  90. t.Errorf("Convert to WebhookInfo failed. Total resources:%d", len(info))
  91. }
  92. for _, v := range info {
  93. if v.Type != CRDConversion {
  94. t.Errorf("Convert to WebhookInfo failed. wrong type:%v", v.Type)
  95. }
  96. if v.Name != "one" && v.Name != "two" && v.Name != "three" {
  97. t.Errorf("Convert to WebhookInfo failed. wrong name:%v", v.Name)
  98. }
  99. }
  100. }
  101. func TestUpdateCRD(t *testing.T) {
  102. rec := newReconciler()
  103. svc := newService()
  104. secret := newSecret()
  105. crd := newCRD()
  106. c := client.NewClientBuilder().WithObjects(&svc, &secret, &crd).Build()
  107. rec.Client = c
  108. ctx := context.Background()
  109. req := ctrl.Request{
  110. NamespacedName: types.NamespacedName{
  111. Name: "one",
  112. },
  113. }
  114. err := rec.updateCRD(ctx, req)
  115. if err != nil {
  116. t.Errorf("Failed updating CRD:%v", err)
  117. }
  118. }
  119. func TestInjectSvcToConversionWebhook(t *testing.T) {
  120. svc := newService()
  121. crd := newCRD()
  122. crdunmarshalled := make(map[string]interface{})
  123. crdJSON, err := json.Marshal(crd)
  124. if err != nil {
  125. t.Fatal(setupError)
  126. }
  127. err = json.Unmarshal(crdJSON, &crdunmarshalled)
  128. if err != nil {
  129. t.Fatal(setupError)
  130. }
  131. u := unstructured.Unstructured{
  132. Object: crdunmarshalled,
  133. }
  134. name := types.NamespacedName{
  135. Name: svc.Name,
  136. Namespace: svc.Namespace,
  137. }
  138. err = injectSvcToConversionWebhook(&u, name)
  139. if err != nil {
  140. t.Errorf("Failed: error when injecting: %v", err)
  141. }
  142. val, found, err := unstructured.NestedString(u.Object, "spec", "conversion", "webhook", "clientConfig", "service", "name")
  143. if err != nil {
  144. t.Error(errorSearchingField)
  145. }
  146. if !found {
  147. t.Error("fieldNotFound")
  148. }
  149. if val != "foo" {
  150. t.Errorf("Wrong service name injected: %v", val)
  151. }
  152. val, found, err = unstructured.NestedString(u.Object, "spec", "conversion", "webhook", "clientConfig", "service", "namespace")
  153. if err != nil {
  154. t.Error(errorSearchingField)
  155. }
  156. if !found {
  157. t.Error("fieldNotFound")
  158. }
  159. if val != "default" {
  160. t.Errorf("Wrong service namespace injected: %v", val)
  161. }
  162. }
  163. func TestInjectCertToConversionWebhook(t *testing.T) {
  164. certPEM := []byte("foobar")
  165. crd := newCRD()
  166. crdunmarshalled := make(map[string]interface{})
  167. crdJSON, err := json.Marshal(crd)
  168. if err != nil {
  169. t.Fatal(setupError)
  170. }
  171. err = json.Unmarshal(crdJSON, &crdunmarshalled)
  172. if err != nil {
  173. t.Fatal(setupError)
  174. }
  175. u := unstructured.Unstructured{
  176. Object: crdunmarshalled,
  177. }
  178. err = injectCertToConversionWebhook(&u, certPEM)
  179. if err != nil {
  180. t.Errorf("Failed: error when injecting: %v", err)
  181. }
  182. val, found, err := unstructured.NestedString(u.Object, "spec", "conversion", "webhook", "clientConfig", "caBundle")
  183. if err != nil {
  184. t.Error(errorSearchingField)
  185. }
  186. if !found {
  187. t.Error("fieldNotFound")
  188. }
  189. if val != "Zm9vYmFy" {
  190. t.Errorf("Wrong certificate name injected: %v", val)
  191. }
  192. }
  193. func TestPopulateSecret(t *testing.T) {
  194. secret := newSecret()
  195. caArtifacts := KeyPairArtifacts{
  196. Cert: &x509.Certificate{},
  197. Key: &rsa.PrivateKey{},
  198. CertPEM: []byte("foobarca"),
  199. KeyPEM: []byte("foobarcakey"),
  200. }
  201. cert := []byte("foobarcert")
  202. key := []byte("foobarkey")
  203. populateSecret(cert, key, &caArtifacts, &secret)
  204. if string(secret.Data["tls.crt"]) != string(cert) {
  205. t.Errorf("secret value for tls.crt is wrong:%v", cert)
  206. }
  207. if string(secret.Data["tls.key"]) != string(key) {
  208. t.Errorf("secret value for tls.key is wrong:%v", cert)
  209. }
  210. if string(secret.Data["ca.crt"]) != string(caArtifacts.CertPEM) {
  211. t.Errorf("secret value for ca.crt is wrong:%v", cert)
  212. }
  213. if string(secret.Data["ca.key"]) != string(caArtifacts.KeyPEM) {
  214. t.Errorf("secret value for ca.key is wrong:%v", cert)
  215. }
  216. }
  217. func TestCreateCACert(t *testing.T) {
  218. rec := newReconciler()
  219. caArtifacts, err := rec.CreateCACert(time.Now(), time.Now().AddDate(1, 0, 0))
  220. if err != nil {
  221. t.Errorf(failedCreateCaCerts, err)
  222. }
  223. if !rec.validCACert(caArtifacts.CertPEM, caArtifacts.KeyPEM) {
  224. t.Errorf(invalidCerts, caArtifacts.CertPEM, caArtifacts.KeyPEM)
  225. }
  226. }
  227. func TestCreateCertPEM(t *testing.T) {
  228. rec := newReconciler()
  229. caArtifacts, err := rec.CreateCACert(time.Now(), time.Now().AddDate(1, 0, 0))
  230. if err != nil {
  231. t.Fatalf(failedCreateCaCerts, err)
  232. }
  233. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(1, 0, 0))
  234. if err != nil {
  235. t.Errorf(failedCreateServerCerts, err)
  236. }
  237. if !rec.validServerCert(caArtifacts.CertPEM, certPEM, keyPEM) {
  238. t.Errorf(invalidCerts, certPEM, keyPEM)
  239. }
  240. }
  241. func TestValidCert(t *testing.T) {
  242. rec := newReconciler()
  243. rec.dnsName = dnsName
  244. caArtifacts, err := rec.CreateCACert(time.Now(), time.Now().AddDate(1, 0, 0))
  245. if err != nil {
  246. t.Fatalf(failedCreateCaCerts, err)
  247. }
  248. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(1, 0, 0))
  249. if err != nil {
  250. t.Errorf(failedCreateServerCerts, err)
  251. }
  252. ok, err := ValidCert(caArtifacts.CertPEM, certPEM, keyPEM, dnsName, time.Now())
  253. if err != nil {
  254. t.Errorf("error validating cert: %v", err)
  255. }
  256. if !ok {
  257. t.Errorf("certificate is invalid")
  258. }
  259. }
  260. func TestRefreshCertIfNeeded(t *testing.T) {
  261. rec := newReconciler()
  262. secret := newSecret()
  263. c := client.NewClientBuilder().WithObjects(&secret).Build()
  264. rec.Client = c
  265. rec.dnsName = dnsName
  266. caArtifacts, err := rec.CreateCACert(time.Now().AddDate(-1, 0, 0), time.Now().AddDate(0, -1, 0))
  267. if err != nil {
  268. t.Fatalf(failedCreateCaCerts, err)
  269. }
  270. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(1, 0, 0))
  271. if err != nil {
  272. t.Errorf(failedCreateServerCerts, err)
  273. }
  274. populateSecret(certPEM, keyPEM, caArtifacts, &secret)
  275. ok, err := rec.refreshCertIfNeeded(&secret)
  276. if err != nil {
  277. t.Errorf("could not verify refresh need: %v", err)
  278. }
  279. if !ok {
  280. t.Error("expected refresh true. got false")
  281. }
  282. ok, err = rec.refreshCertIfNeeded(&secret)
  283. if err != nil {
  284. t.Errorf("could not verify refresh need: %v", err)
  285. }
  286. if !ok {
  287. t.Error("expected refresh false. got true")
  288. }
  289. }
  290. func TestCheckCerts(t *testing.T) {
  291. rec := newReconciler()
  292. rec.dnsName = dnsName
  293. caArtifacts, err := rec.CreateCACert(time.Now().AddDate(0, 0, -1), time.Now().AddDate(0, 0, 2))
  294. if err != nil {
  295. t.Fatalf(failedCreateCaCerts, err)
  296. }
  297. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(0, 0, 1))
  298. if err != nil {
  299. t.Errorf(failedCreateServerCerts, err)
  300. }
  301. os.WriteFile("/tmp/ca", caArtifacts.CertPEM, 0644)
  302. os.WriteFile("/tmp/tls", certPEM, 0644)
  303. os.WriteFile("/tmp/key", keyPEM, 0644)
  304. cert := CertInfo{
  305. CertDir: "/tmp",
  306. CertName: "tls",
  307. CAName: "ca",
  308. KeyName: "key",
  309. }
  310. err = CheckCerts(cert, rec.dnsName, time.Now())
  311. if err != nil {
  312. t.Errorf("error checking valid cert: %v", err)
  313. }
  314. err = CheckCerts(cert, rec.dnsName, time.Now().AddDate(-1, 0, 0))
  315. if err == nil {
  316. t.Error("expected failure due to expired certificate, got success")
  317. }
  318. err = CheckCerts(cert, "wrong", time.Now())
  319. if err == nil {
  320. t.Error("expected failure due to dns name got, success")
  321. }
  322. cert.CAName = "wrong"
  323. err = CheckCerts(cert, rec.dnsName, time.Now())
  324. if err == nil {
  325. t.Error("expected failure due to wrong certificate name, got success")
  326. }
  327. }