crds_controller_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package crds
  13. import (
  14. "bytes"
  15. "context"
  16. "crypto/rsa"
  17. "crypto/x509"
  18. "os"
  19. "testing"
  20. "time"
  21. corev1 "k8s.io/api/core/v1"
  22. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  23. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  24. "k8s.io/apimachinery/pkg/types"
  25. ctrl "sigs.k8s.io/controller-runtime"
  26. client "sigs.k8s.io/controller-runtime/pkg/client/fake"
  27. )
  28. const (
  29. failedCreateCaCerts = "could not create ca certificates:%v"
  30. failedCreateCaChain = "could not create the intermediate certificates:%v"
  31. failedCreateServerCerts = "could not create server certificates:%v"
  32. invalidCerts = "generated certificates are invalid:%v,%v"
  33. dnsName = "foobar"
  34. tlscrt = "/tmp/tls"
  35. tlskey = "/tmp/key"
  36. cacrt = "/tmp/ca"
  37. )
  38. func newReconciler() Reconciler {
  39. return Reconciler{
  40. CrdResources: []string{"one", "two", "three"},
  41. SvcName: "foo",
  42. SvcNamespace: "default",
  43. SecretName: "foo",
  44. SecretNamespace: "default",
  45. }
  46. }
  47. func newService() corev1.Service {
  48. return corev1.Service{
  49. ObjectMeta: metav1.ObjectMeta{
  50. Name: "foo",
  51. Namespace: "default",
  52. Labels: map[string]string{"foo": "bar"},
  53. },
  54. }
  55. }
  56. func newSecret() corev1.Secret {
  57. return corev1.Secret{
  58. ObjectMeta: metav1.ObjectMeta{
  59. Name: "foo",
  60. Namespace: "default",
  61. Labels: map[string]string{"foo": "bar"},
  62. },
  63. }
  64. }
  65. func newCRD() apiextensionsv1.CustomResourceDefinition {
  66. return apiextensionsv1.CustomResourceDefinition{
  67. ObjectMeta: metav1.ObjectMeta{
  68. Name: "one",
  69. },
  70. Spec: apiextensionsv1.CustomResourceDefinitionSpec{
  71. Conversion: &apiextensionsv1.CustomResourceConversion{
  72. Strategy: "Webhook",
  73. Webhook: &apiextensionsv1.WebhookConversion{
  74. ConversionReviewVersions: []string{"v1"},
  75. ClientConfig: &apiextensionsv1.WebhookClientConfig{
  76. CABundle: []byte("test"),
  77. Service: &apiextensionsv1.ServiceReference{
  78. Name: "wrong",
  79. Namespace: "wrong",
  80. },
  81. },
  82. },
  83. },
  84. },
  85. }
  86. }
  87. func TestUpdateCRD(t *testing.T) {
  88. svc := newService()
  89. secret := newSecret()
  90. crd := newCRD()
  91. c := client.NewClientBuilder().WithObjects(&svc, &secret, &crd).Build()
  92. rec := newReconciler()
  93. rec.Client = c
  94. ctx := context.Background()
  95. req := ctrl.Request{
  96. NamespacedName: types.NamespacedName{
  97. Name: "one",
  98. },
  99. }
  100. err := rec.updateCRD(ctx, req)
  101. if err != nil {
  102. t.Fatalf("Failed updating CRD: %v", err)
  103. }
  104. var updatedCRD apiextensionsv1.CustomResourceDefinition
  105. var updatedSecret corev1.Secret
  106. err = c.Get(ctx, req.NamespacedName, &updatedCRD)
  107. if err != nil {
  108. t.Fatalf("Failed getting updated CRD: %v", err)
  109. }
  110. err = c.Get(ctx, types.NamespacedName{Name: secret.Name, Namespace: secret.Namespace}, &updatedSecret)
  111. if err != nil {
  112. t.Fatalf("Failed getting updated secret: %v", err)
  113. }
  114. if updatedCRD.Spec.Conversion.Webhook.ClientConfig.Service.Name != svc.Name {
  115. t.Fatalf("Failed updating CRD webhook service name: expected %v, got %v", svc.Name, updatedCRD.Spec.Conversion.Webhook.ClientConfig.Service.Name)
  116. }
  117. if !bytes.Equal(updatedSecret.Data[caCertName], updatedCRD.Spec.Conversion.Webhook.ClientConfig.CABundle) {
  118. t.Fatalf("Failed updating CRD webhook ca bundle: expected %v, got %v", string(updatedSecret.Data[caCertName]), string(updatedCRD.Spec.Conversion.Webhook.ClientConfig.CABundle))
  119. }
  120. err = rec.updateCRD(ctx, req)
  121. if err != nil {
  122. t.Fatalf("Failed updating CRD: %v", err)
  123. }
  124. resourceVersion := updatedCRD.ResourceVersion
  125. err = c.Get(ctx, req.NamespacedName, &updatedCRD)
  126. if err != nil {
  127. t.Fatalf("Failed getting updated CRD: %v", err)
  128. }
  129. if updatedCRD.ResourceVersion != resourceVersion {
  130. t.Errorf("expected no change in resource version: %v, got %v", resourceVersion, updatedCRD.ResourceVersion)
  131. }
  132. }
  133. func TestInjectSvcToConversionWebhook(t *testing.T) {
  134. svc := newService()
  135. crd := newCRD()
  136. name := types.NamespacedName{
  137. Name: svc.Name,
  138. Namespace: svc.Namespace,
  139. }
  140. err := injectService(&crd, name)
  141. if err != nil {
  142. t.Errorf("Failed: error when injecting: %v", err)
  143. }
  144. val := crd.Spec.Conversion.Webhook.ClientConfig.Service.Name
  145. if val != "foo" {
  146. t.Errorf("Wrong service name injected: %v", val)
  147. }
  148. val = crd.Spec.Conversion.Webhook.ClientConfig.Service.Namespace
  149. if val != "default" {
  150. t.Errorf("Wrong service namespace injected: %v", val)
  151. }
  152. }
  153. func TestInjectCertToConversionWebhook(t *testing.T) {
  154. certPEM := []byte("foobar")
  155. crd := newCRD()
  156. err := injectCert(&crd, certPEM)
  157. if err != nil {
  158. t.Errorf("Failed: error when injecting: %v", err)
  159. }
  160. if string(crd.Spec.Conversion.Webhook.ClientConfig.CABundle) != "foobar" {
  161. t.Errorf("Wrong certificate name injected: %v", string(crd.Spec.Conversion.Webhook.ClientConfig.CABundle))
  162. }
  163. }
  164. func TestPopulateSecret(t *testing.T) {
  165. secret := newSecret()
  166. caArtifacts := KeyPairArtifacts{
  167. Cert: &x509.Certificate{},
  168. Key: &rsa.PrivateKey{},
  169. CertPEM: []byte("foobarca"),
  170. KeyPEM: []byte("foobarcakey"),
  171. }
  172. cert := []byte("foobarcert")
  173. key := []byte("foobarkey")
  174. populateSecret(cert, key, &caArtifacts, &secret)
  175. if !bytes.Equal(secret.Data["tls.crt"], cert) {
  176. t.Errorf("secret value for tls.crt is wrong:%v", cert)
  177. }
  178. if !bytes.Equal(secret.Data["tls.key"], key) {
  179. t.Errorf("secret value for tls.key is wrong:%v", cert)
  180. }
  181. if !bytes.Equal(secret.Data["ca.crt"], caArtifacts.CertPEM) {
  182. t.Errorf("secret value for ca.crt is wrong:%v", cert)
  183. }
  184. if !bytes.Equal(secret.Data["ca.key"], caArtifacts.KeyPEM) {
  185. t.Errorf("secret value for ca.key is wrong:%v", cert)
  186. }
  187. }
  188. func TestCreateCACert(t *testing.T) {
  189. rec := newReconciler()
  190. caArtifacts, err := rec.CreateCACert(time.Now(), time.Now().AddDate(1, 0, 0))
  191. if err != nil {
  192. t.Errorf(failedCreateCaCerts, err)
  193. }
  194. if !rec.validCACert(caArtifacts.CertPEM, caArtifacts.KeyPEM) {
  195. t.Errorf(invalidCerts, caArtifacts.CertPEM, caArtifacts.KeyPEM)
  196. }
  197. }
  198. func TestCreateCertPEM(t *testing.T) {
  199. rec := newReconciler()
  200. caArtifacts, err := rec.CreateCACert(time.Now(), time.Now().AddDate(1, 0, 0))
  201. if err != nil {
  202. t.Fatalf(failedCreateCaCerts, err)
  203. }
  204. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(1, 0, 0))
  205. if err != nil {
  206. t.Errorf(failedCreateServerCerts, err)
  207. }
  208. if !rec.validServerCert(caArtifacts.CertPEM, certPEM, keyPEM) {
  209. t.Errorf(invalidCerts, certPEM, keyPEM)
  210. }
  211. }
  212. func TestValidCert(t *testing.T) {
  213. rec := newReconciler()
  214. rec.dnsName = dnsName
  215. caArtifacts, err := rec.CreateCACert(time.Now(), time.Now().AddDate(1, 0, 0))
  216. if err != nil {
  217. t.Fatalf(failedCreateCaCerts, err)
  218. }
  219. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(1, 0, 0))
  220. if err != nil {
  221. t.Errorf(failedCreateServerCerts, err)
  222. }
  223. ok, err := ValidCert(caArtifacts.CertPEM, certPEM, keyPEM, dnsName, time.Now())
  224. if err != nil {
  225. t.Errorf("error validating cert: %v", err)
  226. }
  227. if !ok {
  228. t.Errorf("certificate is invalid")
  229. }
  230. }
  231. func TestRefreshCertIfNeeded(t *testing.T) {
  232. rec := newReconciler()
  233. secret := newSecret()
  234. c := client.NewClientBuilder().WithObjects(&secret).Build()
  235. rec.Client = c
  236. rec.dnsName = dnsName
  237. caArtifacts, err := rec.CreateCACert(time.Now().AddDate(-1, 0, 0), time.Now().AddDate(0, -1, 0))
  238. if err != nil {
  239. t.Fatalf(failedCreateCaCerts, err)
  240. }
  241. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(1, 0, 0))
  242. if err != nil {
  243. t.Errorf(failedCreateServerCerts, err)
  244. }
  245. populateSecret(certPEM, keyPEM, caArtifacts, &secret)
  246. ok, err := rec.refreshCertIfNeeded(&secret)
  247. if err != nil {
  248. t.Errorf("could not verify refresh need: %v", err)
  249. }
  250. if !ok {
  251. t.Error("expected refresh true. got false")
  252. }
  253. ok, err = rec.refreshCertIfNeeded(&secret)
  254. if err != nil {
  255. t.Errorf("could not verify refresh need: %v", err)
  256. }
  257. if !ok {
  258. t.Error("expected refresh false. got true")
  259. }
  260. }
  261. func TestCheckCerts(t *testing.T) {
  262. rec := newReconciler()
  263. rec.dnsName = dnsName
  264. caArtifacts, err := rec.CreateCACert(time.Now().AddDate(0, 0, -1), time.Now().AddDate(0, 0, 2))
  265. if err != nil {
  266. t.Fatalf(failedCreateCaCerts, err)
  267. }
  268. certPEM, keyPEM, err := rec.CreateCertPEM(caArtifacts, time.Now(), time.Now().AddDate(0, 0, 1))
  269. if err != nil {
  270. t.Errorf(failedCreateServerCerts, err)
  271. }
  272. os.WriteFile(cacrt, caArtifacts.CertPEM, 0644)
  273. os.WriteFile(tlscrt, certPEM, 0644)
  274. os.WriteFile(tlskey, keyPEM, 0644)
  275. cert := CertInfo{
  276. CertDir: "/tmp",
  277. CertName: "tls",
  278. CAName: "ca",
  279. KeyName: "key",
  280. }
  281. err = CheckCerts(cert, rec.dnsName, time.Now())
  282. if err != nil {
  283. t.Errorf("error checking valid cert: %v", err)
  284. }
  285. err = CheckCerts(cert, rec.dnsName, time.Now().AddDate(-1, 0, 0))
  286. if err == nil {
  287. t.Error("expected failure due to expired certificate, got success")
  288. }
  289. err = CheckCerts(cert, "wrong", time.Now())
  290. if err == nil {
  291. t.Error("expected failure due to dns name got, success")
  292. }
  293. cert.CAName = "wrong"
  294. err = CheckCerts(cert, rec.dnsName, time.Now())
  295. if err == nil {
  296. t.Error("expected failure due to wrong certificate name, got success")
  297. }
  298. }
  299. func TestCheckCertChain(t *testing.T) {
  300. rec := newReconciler()
  301. rec.dnsName = dnsName
  302. caArtifacts, err := rec.CreateCACert(time.Now().AddDate(0, 0, -1), time.Now().AddDate(0, 0, 2))
  303. if err != nil {
  304. t.Fatalf(failedCreateCaCerts, err)
  305. }
  306. chainArtifacts, err := rec.CreateCAChain(caArtifacts, time.Now().AddDate(0, 0, -1), time.Now().AddDate(0, 0, 2))
  307. if err != nil {
  308. t.Fatalf(failedCreateCaChain, err)
  309. }
  310. certPEM, keyPEM, err := rec.CreateCertPEM(chainArtifacts, time.Now(), time.Now().AddDate(0, 0, 1))
  311. if err != nil {
  312. t.Errorf(failedCreateServerCerts, err)
  313. }
  314. _ = os.WriteFile(cacrt, caArtifacts.CertPEM, 0644)
  315. _ = os.WriteFile(tlscrt, certPEM, 0644)
  316. f, _ := os.OpenFile(tlscrt, os.O_APPEND|os.O_WRONLY, 0644)
  317. defer func() {
  318. _ = f.Close()
  319. }()
  320. if _, err = f.Write(chainArtifacts.CertPEM); err != nil {
  321. t.Errorf(failedCreateCaChain, err)
  322. }
  323. _ = os.WriteFile(tlskey, keyPEM, 0644)
  324. cert := CertInfo{
  325. CertDir: "/tmp",
  326. CertName: "tls",
  327. CAName: "ca",
  328. KeyName: "key",
  329. }
  330. err = CheckCerts(cert, rec.dnsName, time.Now())
  331. if err != nil {
  332. t.Errorf("error checking valid cert: %v", err)
  333. }
  334. err = CheckCerts(cert, rec.dnsName, time.Now().AddDate(-1, 0, 0))
  335. if err == nil {
  336. t.Error("expected failure due to expired certificate, got success")
  337. }
  338. err = CheckCerts(cert, "wrong", time.Now())
  339. if err == nil {
  340. t.Error("expected failure due to dns name got, success")
  341. }
  342. cert.CAName = "wrong"
  343. err = CheckCerts(cert, rec.dnsName, time.Now())
  344. if err == nil {
  345. t.Error("expected failure due to wrong certificate name, got success")
  346. }
  347. }