Files
open-cluster-management/pkg/hub/csr/controller_test.go

226 lines
6.8 KiB
Go

package csr
import (
"context"
"testing"
testinghelpers "github.com/open-cluster-management/registration/pkg/helpers/testing"
"github.com/openshift/library-go/pkg/operator/events/eventstesting"
authorizationv1 "k8s.io/api/authorization/v1"
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
"k8s.io/apimachinery/pkg/runtime"
kubefake "k8s.io/client-go/kubernetes/fake"
clienttesting "k8s.io/client-go/testing"
)
var (
signerName = certificatesv1beta1.KubeAPIServerClientSignerName
validCSR = testinghelpers.CSRHolder{
Name: "testcsr",
Labels: map[string]string{"open-cluster-management.io/cluster-name": "managedcluster1"},
SignerName: &signerName,
CN: "system:open-cluster-management:managedcluster1:spokeagent1",
Orgs: []string{"system:open-cluster-management:managedcluster1"},
Username: "system:open-cluster-management:managedcluster1:spokeagent1",
ReqBlockType: "CERTIFICATE REQUEST",
}
)
func TestSync(t *testing.T) {
cases := []struct {
name string
startingCSRs []runtime.Object
autoApprovingAllowed bool
validateActions func(t *testing.T, actions []clienttesting.Action)
}{
{
name: "sync a deleted csr",
startingCSRs: []runtime.Object{},
validateActions: func(t *testing.T, actions []clienttesting.Action) {
testinghelpers.AssertActions(t, actions, "get")
},
},
{
name: "sync a denied csr",
startingCSRs: []runtime.Object{testinghelpers.NewDeniedCSR(validCSR)},
validateActions: func(t *testing.T, actions []clienttesting.Action) {
testinghelpers.AssertActions(t, actions, "get")
},
},
{
name: "sync an approved csr",
startingCSRs: []runtime.Object{testinghelpers.NewApprovedCSR(validCSR)},
validateActions: func(t *testing.T, actions []clienttesting.Action) {
testinghelpers.AssertActions(t, actions, "get")
},
},
{
name: "sync an invalid csr",
startingCSRs: []runtime.Object{testinghelpers.NewCSR(testinghelpers.CSRHolder{
Name: validCSR.Name,
Labels: validCSR.Labels,
SignerName: validCSR.SignerName,
CN: "system:open-cluster-management:managedcluster1:invalidagent",
Orgs: validCSR.Orgs,
Username: validCSR.Username,
ReqBlockType: validCSR.ReqBlockType,
})},
validateActions: func(t *testing.T, actions []clienttesting.Action) {
testinghelpers.AssertActions(t, actions, "get")
},
},
{
name: "deny an auto approving csr",
startingCSRs: []runtime.Object{testinghelpers.NewCSR(validCSR)},
validateActions: func(t *testing.T, actions []clienttesting.Action) {
testinghelpers.AssertActions(t, actions, "get", "create")
testinghelpers.AssertSubjectAccessReviewObj(t, actions[1].(clienttesting.CreateActionImpl).Object)
},
},
{
name: "allow an auto approving csr",
startingCSRs: []runtime.Object{testinghelpers.NewCSR(validCSR)},
autoApprovingAllowed: true,
validateActions: func(t *testing.T, actions []clienttesting.Action) {
expectedCondition := certificatesv1beta1.CertificateSigningRequestCondition{
Type: certificatesv1beta1.CertificateApproved,
Reason: "AutoApprovedByHubCSRApprovingController",
Message: "Auto approving Managed cluster agent certificate after SubjectAccessReview.",
}
testinghelpers.AssertActions(t, actions, "get", "create", "update")
actual := actions[2].(clienttesting.UpdateActionImpl).Object
testinghelpers.AssertCSRCondition(t, actual.(*certificatesv1beta1.CertificateSigningRequest).Status.Conditions, expectedCondition)
},
},
}
for _, c := range cases {
t.Run(c.name, func(t *testing.T) {
kubeClient := kubefake.NewSimpleClientset(c.startingCSRs...)
kubeClient.PrependReactor(
"create",
"subjectaccessreviews",
func(action clienttesting.Action) (handled bool, ret runtime.Object, err error) {
return true, &authorizationv1.SubjectAccessReview{
Status: authorizationv1.SubjectAccessReviewStatus{
Allowed: c.autoApprovingAllowed,
},
}, nil
},
)
ctrl := &csrApprovingController{kubeClient, eventstesting.NewTestingEventRecorder(t)}
syncErr := ctrl.sync(context.TODO(), testinghelpers.NewFakeSyncContext(t, validCSR.Name))
if syncErr != nil {
t.Errorf("unexpected err: %v", syncErr)
}
c.validateActions(t, kubeClient.Actions())
})
}
}
func TestIsSpokeClusterClientCertRenewal(t *testing.T) {
invalidSignerName := "invalidsigner"
cases := []struct {
name string
csr testinghelpers.CSRHolder
isRenewal bool
}{
{
name: "a spoke cluster csr without labels",
csr: testinghelpers.CSRHolder{},
isRenewal: false,
},
{
name: "an invalid signer name",
csr: testinghelpers.CSRHolder{
Labels: validCSR.Labels,
SignerName: &invalidSignerName,
},
isRenewal: false,
},
{
name: "a wrong block type",
csr: testinghelpers.CSRHolder{
Labels: validCSR.Labels,
SignerName: validCSR.SignerName,
ReqBlockType: "RSA PRIVATE KEY",
},
isRenewal: false,
},
{
name: "an empty organization",
csr: testinghelpers.CSRHolder{
Labels: validCSR.Labels,
SignerName: validCSR.SignerName,
ReqBlockType: validCSR.ReqBlockType,
},
isRenewal: false,
},
{
name: "an invalid organization",
csr: testinghelpers.CSRHolder{
Labels: validCSR.Labels,
SignerName: &signerName,
Orgs: []string{"test"},
ReqBlockType: validCSR.ReqBlockType,
},
isRenewal: false,
},
{
name: "an invalid common name",
csr: testinghelpers.CSRHolder{
Labels: validCSR.Labels,
SignerName: validCSR.SignerName,
Orgs: validCSR.Orgs,
ReqBlockType: validCSR.ReqBlockType,
},
isRenewal: false,
},
{
name: "an common name does not equal user name",
csr: testinghelpers.CSRHolder{
Name: validCSR.Name,
Labels: validCSR.Labels,
SignerName: validCSR.SignerName,
CN: "system:open-cluster-management:managedcluster1:invalidagent",
Orgs: validCSR.Orgs,
Username: validCSR.Username,
ReqBlockType: validCSR.ReqBlockType,
},
isRenewal: false,
},
{
name: "a renewal csr without signer name",
csr: testinghelpers.CSRHolder{
Name: validCSR.Name,
Labels: validCSR.Labels,
SignerName: nil,
CN: validCSR.CN,
Orgs: validCSR.Orgs,
Username: validCSR.Username,
ReqBlockType: validCSR.ReqBlockType,
},
isRenewal: true,
},
{
name: "a renewal csr",
csr: validCSR,
isRenewal: true,
},
}
for _, c := range cases {
t.Run(c.name, func(t *testing.T) {
isRenewal := isSpokeClusterClientCertRenewal(testinghelpers.NewCSR(c.csr))
if isRenewal != c.isRenewal {
t.Errorf("expected %t, but failed", c.isRenewal)
}
})
}
}