blob: c4f2ab1bb14d97900a004e8e7c81e6634247ce7a [file] [log] [blame]
//go:build integ
// +build integ
// Copyright Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package security
import (
"fmt"
"testing"
"time"
)
import (
"github.com/apache/dubbo-go-pixiu/pkg/config/protocol"
"github.com/apache/dubbo-go-pixiu/pkg/test/framework"
"github.com/apache/dubbo-go-pixiu/pkg/test/framework/components/echo"
"github.com/apache/dubbo-go-pixiu/pkg/test/framework/components/echo/deployment"
"github.com/apache/dubbo-go-pixiu/pkg/test/framework/components/namespace"
)
// TestMtlsHealthCheck verifies Kubernetes HTTP health check can work when mTLS
// is enabled, https://github.com/istio/istio/issues/9150.
// Currently this test can only pass on Prow with a real GKE cluster, and fail
// on Minikube. For more details, see https://github.com/istio/istio/issues/12754.
func TestMtlsHealthCheck(t *testing.T) {
framework.NewTest(t).
Features("security.healthcheck").
Run(func(t framework.TestContext) {
ns := namespace.NewOrFail(t, t, namespace.Config{Prefix: "healthcheck", Inject: true})
for _, testCase := range []struct {
name string
rewrite bool
}{
{name: "rewrite-success", rewrite: true},
} {
t.NewSubTest(testCase.name).Run(func(t framework.TestContext) {
runHealthCheckDeployment(t, ns, testCase.name, testCase.rewrite)
})
}
})
}
func runHealthCheckDeployment(ctx framework.TestContext, ns namespace.Instance, //nolint:interfacer
name string, rewrite bool) {
ctx.Helper()
wantSuccess := rewrite
policyYAML := fmt.Sprintf(`apiVersion: security.istio.io/v1beta1
kind: PeerAuthentication
metadata:
name: "mtls-strict-for-%v"
spec:
selector:
matchLabels:
app: "%v"
mtls:
mode: STRICT
`, name, name)
ctx.ConfigIstio().YAML(ns.Name(), policyYAML).ApplyOrFail(ctx)
var healthcheck echo.Instance
cfg := echo.Config{
Namespace: ns,
Service: name,
Ports: []echo.Port{{
Name: "http-8080",
Protocol: protocol.HTTP,
ServicePort: 8080,
WorkloadPort: 8080,
}},
Subsets: []echo.SubsetConfig{
{
Annotations: echo.NewAnnotations().SetBool(echo.SidecarRewriteAppHTTPProbers, rewrite),
},
},
}
// Negative test, we expect the health check fails, so set a timeout duration.
if !rewrite {
cfg.ReadinessTimeout = time.Second * 15
}
_, err := deployment.New(ctx).
With(&healthcheck, cfg).
Build()
gotSuccess := err == nil
if gotSuccess != wantSuccess {
ctx.Errorf("health check app %v, got error %v, want success = %v", name, err, wantSuccess)
}
}