pkg/webhook/webhook_test.go

257 lines
7.2 KiB
Go

/*
Copyright 2019 The Knative Authors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package webhook
import (
"crypto/tls"
"encoding/pem"
"fmt"
"net"
"strings"
"testing"
"time"
"github.com/google/go-cmp/cmp"
"go.uber.org/zap"
"golang.org/x/sync/errgroup"
admissionregistrationv1beta1 "k8s.io/api/admissionregistration/v1beta1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/client-go/kubernetes"
fakekubeclientset "k8s.io/client-go/kubernetes/fake"
. "knative.dev/pkg/logging/testing"
. "knative.dev/pkg/testing"
)
func newDefaultOptions() ControllerOptions {
return ControllerOptions{
Namespace: "knative-something",
ServiceName: "webhook",
Port: 443,
SecretName: "webhook-certs",
WebhookName: "webhook.knative.dev",
}
}
func newHandlers() map[schema.GroupVersionKind]GenericCRD {
return map[schema.GroupVersionKind]GenericCRD{
{
Group: "pkg.knative.dev",
Version: "v1alpha1",
Kind: "Resource",
}: &Resource{},
{
Group: "pkg.knative.dev",
Version: "v1beta1",
Kind: "Resource",
}: &Resource{},
{
Group: "pkg.knative.dev",
Version: "v1alpha1",
Kind: "InnerDefaultResource",
}: &InnerDefaultResource{},
{
Group: "pkg.knative.io",
Version: "v1alpha1",
Kind: "InnerDefaultResource",
}: &InnerDefaultResource{},
}
}
const (
testNamespace = "test-namespace"
testResourceName = "test-resource"
user1 = "brutto@knative.dev"
user2 = "arrabbiato@knative.dev"
)
func newNonRunningTestAdmissionController(t *testing.T, options ControllerOptions) (
kubeClient *fakekubeclientset.Clientset,
ac *AdmissionController) {
t.Helper()
// Create fake clients
kubeClient = fakekubeclientset.NewSimpleClientset()
ac, err := NewTestAdmissionController(kubeClient, options, TestLogger(t))
if err != nil {
t.Fatalf("Failed to create new admission controller: %v", err)
}
return
}
func TestRegistrationStopChanFire(t *testing.T) {
opts := newDefaultOptions()
kubeClient, ac := newNonRunningTestAdmissionController(t, opts)
webhook := &admissionregistrationv1beta1.MutatingWebhookConfiguration{
ObjectMeta: metav1.ObjectMeta{
Name: ac.Options.WebhookName,
},
Webhooks: []admissionregistrationv1beta1.Webhook{
{
Name: ac.Options.WebhookName,
Rules: []admissionregistrationv1beta1.RuleWithOperations{{}},
ClientConfig: admissionregistrationv1beta1.WebhookClientConfig{},
},
},
}
createWebhook(kubeClient, webhook)
ac.Options.RegistrationDelay = 1 * time.Minute
stopCh := make(chan struct{})
var g errgroup.Group
g.Go(func() error {
return ac.Run(stopCh)
})
close(stopCh)
if err := g.Wait(); err != nil {
t.Fatal("Error during run: ", err)
}
conn, err := net.Dial("tcp", fmt.Sprintf(":%d", opts.Port))
if err == nil {
conn.Close()
t.Errorf("Unexpected success to dial to port %d", opts.Port)
}
}
func TestRegistrationForAlreadyExistingWebhook(t *testing.T) {
kubeClient, ac := newNonRunningTestAdmissionController(t, newDefaultOptions())
webhook := &admissionregistrationv1beta1.MutatingWebhookConfiguration{
ObjectMeta: metav1.ObjectMeta{
Name: ac.Options.WebhookName,
},
Webhooks: []admissionregistrationv1beta1.Webhook{
{
Name: ac.Options.WebhookName,
Rules: []admissionregistrationv1beta1.RuleWithOperations{{}},
ClientConfig: admissionregistrationv1beta1.WebhookClientConfig{},
},
},
}
createWebhook(kubeClient, webhook)
ac.Options.RegistrationDelay = 1 * time.Millisecond
stopCh := make(chan struct{})
var g errgroup.Group
g.Go(func() error {
return ac.Run(stopCh)
})
err := g.Wait()
if err == nil {
t.Fatal("Expected webhook controller to fail")
}
if ac.Options.ClientAuth >= tls.VerifyClientCertIfGiven && !strings.Contains(err.Error(), "configmaps") {
t.Fatal("Expected error msg to contain configmap key missing error")
}
}
func TestCertConfigurationForAlreadyGeneratedSecret(t *testing.T) {
secretName := "test-secret"
ns := "test-namespace"
opts := newDefaultOptions()
opts.SecretName = secretName
opts.Namespace = ns
kubeClient, ac := newNonRunningTestAdmissionController(t, opts)
ctx := TestContextWithLogger(t)
newSecret, err := generateSecret(ctx, &opts)
if err != nil {
t.Fatalf("Failed to generate secret: %v", err)
}
_, err = kubeClient.CoreV1().Secrets(ns).Create(newSecret)
if err != nil {
t.Fatalf("Failed to create secret: %v", err)
}
createNamespace(t, kubeClient, metav1.NamespaceSystem)
createTestConfigMap(t, kubeClient)
tlsConfig, caCert, err := configureCerts(ctx, kubeClient, &ac.Options)
if err != nil {
t.Fatalf("Failed to configure secret: %v", err)
}
expectedCert, err := tls.X509KeyPair(newSecret.Data[secretServerCert], newSecret.Data[secretServerKey])
if err != nil {
t.Fatalf("Failed to create cert from x509 key pair: %v", err)
}
if tlsConfig == nil {
t.Fatal("Expected TLS config not to be nil")
}
if len(tlsConfig.Certificates) < 1 {
t.Fatalf("Expected TLS Config Cert to be set")
}
if diff := cmp.Diff(expectedCert.Certificate, tlsConfig.Certificates[0].Certificate, cmp.AllowUnexported()); diff != "" {
t.Fatalf("Unexpected cert diff (-want, +got) %v", diff)
}
if diff := cmp.Diff(newSecret.Data[secretCACert], caCert, cmp.AllowUnexported()); diff != "" {
t.Fatalf("Unexpected CA cert diff (-want, +got) %v", diff)
}
}
func TestCertConfigurationForGeneratedSecret(t *testing.T) {
secretName := "test-secret"
ns := "test-namespace"
opts := newDefaultOptions()
opts.SecretName = secretName
opts.Namespace = ns
kubeClient, ac := newNonRunningTestAdmissionController(t, opts)
ctx := TestContextWithLogger(t)
createNamespace(t, kubeClient, metav1.NamespaceSystem)
createTestConfigMap(t, kubeClient)
tlsConfig, caCert, err := configureCerts(ctx, kubeClient, &ac.Options)
if err != nil {
t.Fatalf("Failed to configure certificates: %v", err)
}
if tlsConfig == nil {
t.Fatal("Expected TLS config not to be nil")
}
if len(tlsConfig.Certificates) < 1 {
t.Fatalf("Expected TLS Certfificate to be set on webhook server")
}
p, _ := pem.Decode(caCert)
if p == nil {
t.Fatalf("Expected PEM encoded CA cert ")
}
if p.Type != "CERTIFICATE" {
t.Fatalf("Expectet type to be CERTIFICATE but got %s", string(p.Type))
}
}
func TestSettingWebhookClientAuth(t *testing.T) {
opts := newDefaultOptions()
if opts.ClientAuth != tls.NoClientCert {
t.Fatalf("Expected default ClientAuth to be NoClientCert (%v) but got (%v)",
tls.NoClientCert, opts.ClientAuth)
}
}
func NewTestAdmissionController(client kubernetes.Interface, options ControllerOptions,
logger *zap.SugaredLogger) (*AdmissionController, error) {
handlers := newHandlers()
return NewAdmissionController(client, options, handlers, logger, nil, true)
}