blob: 205236f6ea292c53f12794605ef54f4fd7016e09 [file] [log] [blame]
// Licensed to the Apache Software Foundation (ASF) under one or more
// contributor license agreements. See the NOTICE file distributed with
// this work for additional information regarding copyright ownership.
// The ASF licenses this file to You under the Apache License, Version 2.0
// (the "License"); you may not use this file except in compliance with
// the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package v1
import (
"context"
"testing"
"github.com/stretchr/testify/require"
corev1 "k8s.io/api/core/v1"
networkingv1 "k8s.io/api/networking/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"sigs.k8s.io/controller-runtime/pkg/client/fake"
apisixv2 "github.com/apache/apisix-ingress-controller/api/v2"
"github.com/apache/apisix-ingress-controller/internal/controller/config"
)
func buildApisixTlsValidator(t *testing.T, objects ...runtime.Object) *ApisixTlsCustomValidator {
t.Helper()
scheme := runtime.NewScheme()
require.NoError(t, clientgoscheme.AddToScheme(scheme))
require.NoError(t, networkingv1.AddToScheme(scheme))
require.NoError(t, apisixv2.AddToScheme(scheme))
managed := []runtime.Object{
&networkingv1.IngressClass{
ObjectMeta: metav1.ObjectMeta{
Name: "apisix",
Annotations: map[string]string{
"ingressclass.kubernetes.io/is-default-class": "true",
},
},
Spec: networkingv1.IngressClassSpec{
Controller: config.ControllerConfig.ControllerName,
},
},
}
allObjects := append(managed, objects...)
builder := fake.NewClientBuilder().WithScheme(scheme).WithRuntimeObjects(allObjects...)
return NewApisixTlsCustomValidator(builder.Build())
}
func newApisixTls() *apisixv2.ApisixTls {
return &apisixv2.ApisixTls{
ObjectMeta: metav1.ObjectMeta{
Name: "demo",
Namespace: "default",
},
Spec: apisixv2.ApisixTlsSpec{
IngressClassName: "apisix",
Hosts: []apisixv2.HostType{"example.com"},
Secret: apisixv2.ApisixSecret{
Name: "server-cert",
Namespace: "default",
},
},
}
}
func TestApisixTlsValidator_MissingServerSecret(t *testing.T) {
tls := newApisixTls()
validator := buildApisixTlsValidator(t)
warnings, err := validator.ValidateCreate(context.Background(), tls)
require.NoError(t, err)
require.Len(t, warnings, 1)
require.Contains(t, warnings[0], "Referenced Secret 'default/server-cert' not found")
}
func TestApisixTlsValidator_MissingClientSecret(t *testing.T) {
tls := newApisixTls()
tls.Spec.Client = &apisixv2.ApisixMutualTlsClientConfig{
CASecret: apisixv2.ApisixSecret{
Name: "mtls-ca",
Namespace: "mtls",
},
}
serverSecret := &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "server-cert",
Namespace: "default",
},
}
validator := buildApisixTlsValidator(t, serverSecret)
warnings, err := validator.ValidateCreate(context.Background(), tls)
require.NoError(t, err)
require.Len(t, warnings, 1)
require.Contains(t, warnings[0], "Referenced Secret 'mtls/mtls-ca' not found")
}
func TestApisixTlsValidator_NoWarningsWhenSecretsExist(t *testing.T) {
tls := newApisixTls()
tls.Spec.Client = &apisixv2.ApisixMutualTlsClientConfig{
CASecret: apisixv2.ApisixSecret{
Name: "mtls-ca",
Namespace: "mtls",
},
}
objects := []runtime.Object{
&corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "server-cert", Namespace: "default"}},
&corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mtls-ca", Namespace: "mtls"}},
}
validator := buildApisixTlsValidator(t, objects...)
warnings, err := validator.ValidateCreate(context.Background(), tls)
require.NoError(t, err)
require.Empty(t, warnings)
}