mirror of
https://github.com/open-cluster-management-io/ocm.git
synced 2026-02-14 18:09:57 +00:00
* Use basecontroller in sdk-go instead for better logging Signed-off-by: Jian Qiu <jqiu@redhat.com> * Rename to fakeSyncContext Signed-off-by: Jian Qiu <jqiu@redhat.com> --------- Signed-off-by: Jian Qiu <jqiu@redhat.com>
413 lines
14 KiB
Go
413 lines
14 KiB
Go
package csr
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
authorizationv1 "k8s.io/api/authorization/v1"
|
|
certificatesv1 "k8s.io/api/certificates/v1"
|
|
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
|
corev1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
"k8s.io/client-go/informers"
|
|
kubefake "k8s.io/client-go/kubernetes/fake"
|
|
clienttesting "k8s.io/client-go/testing"
|
|
"k8s.io/klog/v2/ktesting"
|
|
|
|
clusterfake "open-cluster-management.io/api/client/cluster/clientset/versioned/fake"
|
|
clusterinformers "open-cluster-management.io/api/client/cluster/informers/externalversions"
|
|
clusterv1 "open-cluster-management.io/api/cluster/v1"
|
|
ocmfeature "open-cluster-management.io/api/feature"
|
|
|
|
testingcommon "open-cluster-management.io/ocm/pkg/common/testing"
|
|
"open-cluster-management.io/ocm/pkg/features"
|
|
testinghelpers "open-cluster-management.io/ocm/pkg/registration/helpers/testing"
|
|
"open-cluster-management.io/ocm/pkg/registration/hub/user"
|
|
)
|
|
|
|
var (
|
|
validCSR = testinghelpers.CSRHolder{
|
|
Name: "testcsr",
|
|
Labels: map[string]string{"open-cluster-management.io/cluster-name": "managedcluster1"},
|
|
SignerName: certificatesv1.KubeAPIServerClientSignerName,
|
|
CN: user.SubjectPrefix + "managedcluster1:spokeagent1",
|
|
Orgs: []string{user.SubjectPrefix + "managedcluster1", user.ManagedClustersGroup},
|
|
Username: user.SubjectPrefix + "managedcluster1:spokeagent1",
|
|
ReqBlockType: "CERTIFICATE REQUEST",
|
|
}
|
|
)
|
|
|
|
func TestSync(t *testing.T) {
|
|
cases := []struct {
|
|
name string
|
|
startingClusters []runtime.Object
|
|
startingCSRs []runtime.Object
|
|
approvalUsers []string
|
|
autoApprovingAllowed bool
|
|
validateActions func(t *testing.T, actions []clienttesting.Action)
|
|
}{
|
|
{
|
|
name: "sync a deleted csr",
|
|
startingClusters: []runtime.Object{},
|
|
startingCSRs: []runtime.Object{},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testingcommon.AssertNoActions(t, actions)
|
|
},
|
|
},
|
|
{
|
|
name: "sync a denied csr",
|
|
startingClusters: []runtime.Object{},
|
|
startingCSRs: []runtime.Object{testinghelpers.NewDeniedCSR(validCSR)},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testingcommon.AssertNoActions(t, actions)
|
|
},
|
|
},
|
|
{
|
|
name: "sync an approved csr",
|
|
startingClusters: []runtime.Object{},
|
|
startingCSRs: []runtime.Object{testinghelpers.NewApprovedCSR(validCSR)},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testingcommon.AssertNoActions(t, actions)
|
|
},
|
|
},
|
|
{
|
|
name: "sync an invalid csr",
|
|
startingClusters: []runtime.Object{},
|
|
startingCSRs: []runtime.Object{testinghelpers.NewCSR(testinghelpers.CSRHolder{
|
|
Name: validCSR.Name,
|
|
Labels: validCSR.Labels,
|
|
SignerName: validCSR.SignerName,
|
|
CN: "system:open-cluster-management:managedcluster1:invalidagent",
|
|
Orgs: validCSR.Orgs,
|
|
Username: validCSR.Username,
|
|
ReqBlockType: validCSR.ReqBlockType,
|
|
})},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testingcommon.AssertNoActions(t, actions)
|
|
},
|
|
},
|
|
{
|
|
name: "deny an auto approving csr",
|
|
startingClusters: []runtime.Object{},
|
|
startingCSRs: []runtime.Object{testinghelpers.NewCSR(validCSR)},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
testingcommon.AssertActions(t, actions, "create")
|
|
testinghelpers.AssertSubjectAccessReviewObj(t, actions[0].(clienttesting.CreateActionImpl).Object)
|
|
},
|
|
},
|
|
{
|
|
name: "allow an auto approving csr",
|
|
startingClusters: []runtime.Object{},
|
|
startingCSRs: []runtime.Object{testinghelpers.NewCSR(validCSR)},
|
|
autoApprovingAllowed: true,
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
expectedCondition := certificatesv1.CertificateSigningRequestCondition{
|
|
Type: certificatesv1.CertificateApproved,
|
|
Status: corev1.ConditionTrue,
|
|
Reason: "AutoApprovedByHubCSRApprovingController",
|
|
Message: "Auto approving Managed cluster agent certificate after SubjectAccessReview.",
|
|
}
|
|
testingcommon.AssertActions(t, actions, "create", "update")
|
|
actual := actions[1].(clienttesting.UpdateActionImpl).Object
|
|
testinghelpers.AssertCSRCondition(t, actual.(*certificatesv1.CertificateSigningRequest).Status.Conditions, expectedCondition)
|
|
},
|
|
},
|
|
{
|
|
name: "allow an auto approving csr w/o ManagedClusterGroup for backward-compatibility",
|
|
startingClusters: []runtime.Object{},
|
|
startingCSRs: []runtime.Object{testinghelpers.NewCSR(testinghelpers.CSRHolder{
|
|
Name: validCSR.Name,
|
|
Labels: validCSR.Labels,
|
|
SignerName: validCSR.SignerName,
|
|
CN: validCSR.CN,
|
|
Orgs: sets.NewString(validCSR.Orgs...).Delete(user.ManagedClustersGroup).List(),
|
|
Username: validCSR.Username,
|
|
ReqBlockType: validCSR.ReqBlockType,
|
|
})},
|
|
autoApprovingAllowed: true,
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
expectedCondition := certificatesv1.CertificateSigningRequestCondition{
|
|
Type: certificatesv1.CertificateApproved,
|
|
Status: corev1.ConditionTrue,
|
|
Reason: "AutoApprovedByHubCSRApprovingController",
|
|
Message: "Auto approving Managed cluster agent certificate after SubjectAccessReview.",
|
|
}
|
|
testingcommon.AssertActions(t, actions, "create", "update")
|
|
actual := actions[1].(clienttesting.UpdateActionImpl).Object
|
|
testinghelpers.AssertCSRCondition(t, actual.(*certificatesv1.CertificateSigningRequest).Status.Conditions, expectedCondition)
|
|
},
|
|
},
|
|
{
|
|
name: "auto approve a bootstrap csr request",
|
|
startingClusters: []runtime.Object{
|
|
&clusterv1.ManagedCluster{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "managedcluster1",
|
|
},
|
|
},
|
|
},
|
|
startingCSRs: []runtime.Object{func() *certificatesv1.CertificateSigningRequest {
|
|
csr := testinghelpers.NewCSR(validCSR)
|
|
csr.Spec.Username = "test"
|
|
return csr
|
|
}()},
|
|
autoApprovingAllowed: true,
|
|
approvalUsers: []string{"test"},
|
|
validateActions: func(t *testing.T, actions []clienttesting.Action) {
|
|
expectedCondition := certificatesv1.CertificateSigningRequestCondition{
|
|
Type: certificatesv1.CertificateApproved,
|
|
Status: corev1.ConditionTrue,
|
|
Reason: "AutoApprovedByHubCSRApprovingController",
|
|
Message: "Auto approving Managed cluster agent certificate after SubjectAccessReview.",
|
|
}
|
|
testingcommon.AssertActions(t, actions, "update")
|
|
actual := actions[0].(clienttesting.UpdateActionImpl).Object
|
|
testinghelpers.AssertCSRCondition(t, actual.(*certificatesv1.CertificateSigningRequest).Status.Conditions, expectedCondition)
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
t.Run(c.name, func(t *testing.T) {
|
|
kubeClient := kubefake.NewSimpleClientset(c.startingCSRs...)
|
|
kubeClient.PrependReactor(
|
|
"create",
|
|
"subjectaccessreviews",
|
|
func(action clienttesting.Action) (handled bool, ret runtime.Object, err error) {
|
|
return true, &authorizationv1.SubjectAccessReview{
|
|
Status: authorizationv1.SubjectAccessReviewStatus{
|
|
Allowed: c.autoApprovingAllowed,
|
|
},
|
|
}, nil
|
|
},
|
|
)
|
|
informerFactory := informers.NewSharedInformerFactory(kubeClient, 3*time.Minute)
|
|
csrStore := informerFactory.Certificates().V1().CertificateSigningRequests().Informer().GetStore()
|
|
for _, csr := range c.startingCSRs {
|
|
if err := csrStore.Add(csr); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
clusterClient := clusterfake.NewSimpleClientset(c.startingClusters...)
|
|
clusterInformerFactory := clusterinformers.NewSharedInformerFactory(clusterClient, time.Minute*10)
|
|
clusterStore := clusterInformerFactory.Cluster().V1().ManagedClusters().Informer().GetStore()
|
|
for _, cluster := range c.startingClusters {
|
|
if err := clusterStore.Add(cluster); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
ctrl := &csrApprovingController[*certificatesv1.CertificateSigningRequest]{
|
|
lister: informerFactory.Certificates().V1().CertificateSigningRequests().Lister(),
|
|
approver: NewCSRV1Approver(kubeClient),
|
|
csrInfoGetter: getCSRInfo,
|
|
reconcilers: []Reconciler{
|
|
&csrBootstrapReconciler{
|
|
signer: certificatesv1.KubeAPIServerClientSignerName,
|
|
kubeClient: kubeClient,
|
|
approvalUsers: sets.Set[string]{},
|
|
},
|
|
NewCSRRenewalReconciler(kubeClient, certificatesv1.KubeAPIServerClientSignerName),
|
|
NewCSRBootstrapReconciler(
|
|
kubeClient,
|
|
certificatesv1.KubeAPIServerClientSignerName,
|
|
c.approvalUsers,
|
|
),
|
|
},
|
|
}
|
|
syncErr := ctrl.sync(context.TODO(), testingcommon.NewFakeSyncContext(t, validCSR.Name), validCSR.Name)
|
|
if syncErr != nil {
|
|
t.Errorf("unexpected err: %v", syncErr)
|
|
}
|
|
|
|
c.validateActions(t, kubeClient.Actions())
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestIsSpokeClusterClientCertRenewal(t *testing.T) {
|
|
invalidSignerName := "invalidsigner"
|
|
|
|
cases := []struct {
|
|
name string
|
|
csr testinghelpers.CSRHolder
|
|
isRenewal bool
|
|
clusterName string
|
|
commonName string
|
|
}{
|
|
{
|
|
name: "a spoke cluster csr without labels",
|
|
csr: testinghelpers.CSRHolder{},
|
|
isRenewal: false,
|
|
},
|
|
{
|
|
name: "an invalid signer name",
|
|
csr: testinghelpers.CSRHolder{
|
|
Labels: validCSR.Labels,
|
|
SignerName: invalidSignerName,
|
|
},
|
|
isRenewal: false,
|
|
},
|
|
{
|
|
name: "a wrong block type",
|
|
csr: testinghelpers.CSRHolder{
|
|
Labels: validCSR.Labels,
|
|
SignerName: validCSR.SignerName,
|
|
ReqBlockType: "RSA PRIVATE KEY",
|
|
},
|
|
isRenewal: false,
|
|
},
|
|
{
|
|
name: "an empty organization",
|
|
csr: testinghelpers.CSRHolder{
|
|
Labels: validCSR.Labels,
|
|
SignerName: validCSR.SignerName,
|
|
ReqBlockType: validCSR.ReqBlockType,
|
|
},
|
|
isRenewal: false,
|
|
},
|
|
{
|
|
name: "an invalid organization",
|
|
csr: testinghelpers.CSRHolder{
|
|
Labels: validCSR.Labels,
|
|
SignerName: validCSR.SignerName,
|
|
Orgs: []string{"test"},
|
|
ReqBlockType: validCSR.ReqBlockType,
|
|
},
|
|
isRenewal: false,
|
|
},
|
|
{
|
|
name: "an invalid common name",
|
|
csr: testinghelpers.CSRHolder{
|
|
Labels: validCSR.Labels,
|
|
SignerName: validCSR.SignerName,
|
|
Orgs: validCSR.Orgs,
|
|
ReqBlockType: validCSR.ReqBlockType,
|
|
},
|
|
isRenewal: false,
|
|
},
|
|
{
|
|
name: "a renewal csr without signer name",
|
|
csr: testinghelpers.CSRHolder{
|
|
Name: validCSR.Name,
|
|
Labels: validCSR.Labels,
|
|
SignerName: "",
|
|
CN: validCSR.CN,
|
|
Orgs: validCSR.Orgs,
|
|
Username: validCSR.Username,
|
|
ReqBlockType: validCSR.ReqBlockType,
|
|
},
|
|
isRenewal: false,
|
|
},
|
|
{
|
|
name: "a renewal csr",
|
|
csr: validCSR,
|
|
isRenewal: true,
|
|
clusterName: "managedcluster1",
|
|
commonName: validCSR.CN,
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
t.Run(c.name, func(t *testing.T) {
|
|
logger, _ := ktesting.NewTestContext(t)
|
|
isRenewal, clusterName, commonName := validateCSR(logger, certificatesv1.KubeAPIServerClientSignerName, getCSRInfo(testinghelpers.NewCSR(c.csr)))
|
|
if isRenewal != c.isRenewal {
|
|
t.Errorf("expected %t, but failed", c.isRenewal)
|
|
}
|
|
if clusterName != c.clusterName {
|
|
t.Errorf("expected %s, but failed", commonName)
|
|
}
|
|
if commonName != c.commonName {
|
|
t.Errorf("expected %s, but failed", commonName)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestNewApprover(t *testing.T) {
|
|
kubeClient := kubefake.NewClientset()
|
|
informerFactory := informers.NewSharedInformerFactory(kubeClient, 3*time.Minute)
|
|
utilruntime.Must(features.HubMutableFeatureGate.Add(ocmfeature.DefaultHubRegistrationFeatureGates))
|
|
_, err := NewCSRHubDriver(kubeClient, informerFactory, []string{})
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
features.HubMutableFeatureGate.Set(fmt.Sprintf("%s=true", ocmfeature.ManagedClusterAutoApproval))
|
|
_, err = NewCSRHubDriver(kubeClient, informerFactory, []string{})
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func TestEventFilter(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
input any
|
|
expected bool
|
|
}{
|
|
{
|
|
name: "nil input",
|
|
input: nil,
|
|
expected: false,
|
|
},
|
|
{
|
|
name: "v1 CSR with matching signer",
|
|
input: &certificatesv1.CertificateSigningRequest{
|
|
Spec: certificatesv1.CertificateSigningRequestSpec{
|
|
SignerName: certificatesv1.KubeAPIServerClientSignerName,
|
|
},
|
|
},
|
|
expected: true,
|
|
},
|
|
{
|
|
name: "v1 CSR with non-matching signer",
|
|
input: &certificatesv1.CertificateSigningRequest{
|
|
Spec: certificatesv1.CertificateSigningRequestSpec{
|
|
SignerName: "example.com/custom",
|
|
},
|
|
},
|
|
expected: false,
|
|
},
|
|
{
|
|
name: "v1beta1 CSR with matching signer",
|
|
input: func() *certificatesv1beta1.CertificateSigningRequest {
|
|
signer := certificatesv1beta1.KubeAPIServerClientSignerName
|
|
return &certificatesv1beta1.CertificateSigningRequest{
|
|
Spec: certificatesv1beta1.CertificateSigningRequestSpec{
|
|
SignerName: &signer,
|
|
},
|
|
}
|
|
}(),
|
|
expected: true,
|
|
},
|
|
{
|
|
name: "v1beta1 CSR with non-matching signer",
|
|
input: func() *certificatesv1beta1.CertificateSigningRequest {
|
|
signer := "example.com/custom"
|
|
return &certificatesv1beta1.CertificateSigningRequest{
|
|
Spec: certificatesv1beta1.CertificateSigningRequestSpec{
|
|
SignerName: &signer,
|
|
},
|
|
}
|
|
}(),
|
|
expected: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
if got := eventFilter(tt.input); got != tt.expected {
|
|
t.Errorf("eventFilter() = %v, want %v", got, tt.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|