pkg/webhook/helper_test.go

265 lines
7.3 KiB
Go

/*
Copyright 2018 The Knative Authors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package webhook
import (
"context"
"crypto/tls"
"crypto/x509"
"net"
"net/http"
"testing"
"time"
"github.com/google/go-cmp/cmp"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/wait"
"k8s.io/client-go/kubernetes"
"knative.dev/pkg/system"
certresources "knative.dev/pkg/webhook/certificates/resources"
. "knative.dev/pkg/logging/testing"
)
func TestEnsureLabelSelectorExpressions(t *testing.T) {
fooExpression := metav1.LabelSelectorRequirement{
Key: "foo.bar/baz",
Operator: metav1.LabelSelectorOpDoesNotExist,
}
knativeExpression := metav1.LabelSelectorRequirement{
Key: "knative.dev/foo",
Operator: metav1.LabelSelectorOpDoesNotExist,
}
tests := []struct {
name string
current *metav1.LabelSelector
want *metav1.LabelSelector
expect *metav1.LabelSelector
}{{
name: "all nil",
}, {
name: "current nil",
current: nil,
want: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
expect: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
}, {
name: "current empty",
current: &metav1.LabelSelector{},
want: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
expect: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
}, {
name: "want nil",
current: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
want: nil,
expect: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
}, {
name: "want empty",
current: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
want: &metav1.LabelSelector{},
expect: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
}, {
name: "add new",
current: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression},
},
want: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{knativeExpression},
},
expect: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{
knativeExpression, fooExpression},
},
}, {
name: "remove obsolete",
current: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{fooExpression, {
Key: "knative.dev/bar",
Operator: metav1.LabelSelectorOpDoesNotExist,
}},
},
want: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{knativeExpression},
},
expect: &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{
knativeExpression, fooExpression},
},
}}
for _, tc := range tests {
t.Run(tc.name, func(t *testing.T) {
got := EnsureLabelSelectorExpressions(tc.current, tc.want)
if !cmp.Equal(got, tc.expect) {
t.Errorf("LabelSelector mismatch: diff(-want,+got):\n%s", cmp.Diff(tc.expect, got))
}
})
}
}
func waitForNonTLSServerAvailable(t *testing.T, serverURL string, timeout time.Duration) error {
t.Helper()
var interval = 100 * time.Millisecond
conditionFunc := func(ctx context.Context) (done bool, err error) {
var conn net.Conn
conn, _ = net.DialTimeout("tcp", serverURL, timeout)
if conn != nil {
conn.Close()
return true, nil
}
return false, nil
}
return wait.PollUntilContextTimeout(context.Background(), interval, timeout, true, conditionFunc)
}
func waitForServerAvailable(t *testing.T, serverURL string, timeout time.Duration) error {
t.Helper()
var (
// if this is too low you'll see TLS handshake EOF warnings
interval = 500 * time.Millisecond
tlsConf = &tls.Config{InsecureSkipVerify: true}
dialer = &net.Dialer{
Timeout: interval, // Initial duration.
KeepAlive: 5 * time.Second,
DualStack: true,
}
)
conditionFunc := func(ctx context.Context) (done bool, err error) {
conn, _ := tls.DialWithDialer(dialer, "tcp", serverURL, tlsConf)
if conn != nil {
conn.Close()
return true, nil
}
return false, nil
}
return wait.PollUntilContextTimeout(context.Background(), interval, timeout, true, conditionFunc)
}
func createNamespace(t *testing.T, kubeClient kubernetes.Interface, name string) error {
t.Helper()
testns := &corev1.Namespace{
ObjectMeta: metav1.ObjectMeta{
Name: name,
},
}
_, err := kubeClient.CoreV1().Namespaces().Create(context.Background(), testns, metav1.CreateOptions{})
if err != nil {
return err
}
return nil
}
func createTestConfigMap(t *testing.T, kubeClient kubernetes.Interface) error {
t.Helper()
configMaps := &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: "extension-apiserver-authentication",
},
Data: map[string]string{"requestheader-client-ca-file": "test-client-file"},
}
_, err := kubeClient.CoreV1().ConfigMaps(metav1.NamespaceSystem).Create(context.Background(), configMaps, metav1.CreateOptions{})
if err != nil {
return err
}
return nil
}
func createSecureTLSClient(t *testing.T, kubeClient kubernetes.Interface, acOpts *Options) (*http.Client, error) {
t.Helper()
ctx := TestContextWithLogger(t)
secret, err := kubeClient.CoreV1().Secrets(system.Namespace()).Get(ctx, acOpts.SecretName, metav1.GetOptions{})
if err != nil {
return nil, err
}
sKey, sCert := getSecretDataKeyNamesOrDefault(acOpts.ServerPrivateKeyName, acOpts.ServerCertificateName)
serverKey := secret.Data[sKey]
serverCert := secret.Data[sCert]
caCert := secret.Data[certresources.CACert]
// Build cert pool with CA Cert
pool := x509.NewCertPool()
pool.AppendCertsFromPEM(caCert)
// Build key pair
cert, err := tls.X509KeyPair(serverCert, serverKey)
if err != nil {
return nil, err
}
tlsClientConfig := &tls.Config{
// Add knative namespace as CN
ServerName: "webhook." + system.Namespace(),
RootCAs: pool,
Certificates: []tls.Certificate{cert},
}
return &http.Client{
Transport: &http.Transport{
TLSClientConfig: tlsClientConfig,
},
}, nil
}
func createNonTLSClient() *http.Client {
return &http.Client{
Transport: &http.Transport{},
}
}
func customSecretWithOverrides(ctx context.Context, name, namespace, serviceName string) (*corev1.Secret, error) {
serverKey, serverCert, caCert, err := certresources.CreateCerts(ctx, serviceName, namespace, time.Now().Add(24*time.Hour))
if err != nil {
return nil, err
}
webOpts := GetOptions(ctx)
sKey, sCert := getSecretDataKeyNamesOrDefault(webOpts.ServerPrivateKeyName, webOpts.ServerCertificateName)
return &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: namespace,
},
Data: map[string][]byte{
sKey: serverKey,
sCert: serverCert,
certresources.CACert: caCert,
},
}, nil
}