23185d55a5
Also increase the timeout in an integration test because it is flaking on one of the GKE environments sometimes, probably because the Concierge controllers aren't ready fast enough before the integration tests start.
172 lines
7.0 KiB
Go
172 lines
7.0 KiB
Go
// Copyright 2020-2022 the Pinniped contributors. All Rights Reserved.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package integration
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/client-go/kubernetes"
|
|
|
|
loginv1alpha1 "go.pinniped.dev/generated/latest/apis/concierge/login/v1alpha1"
|
|
"go.pinniped.dev/internal/testutil"
|
|
"go.pinniped.dev/test/testlib"
|
|
)
|
|
|
|
// Never run this test in parallel since breaking discovery is disruptive, see main_test.go.
|
|
func TestAPIServingCertificateAutoCreationAndRotation_Disruptive(t *testing.T) {
|
|
env := testlib.IntegrationEnv(t)
|
|
defaultServingCertResourceName := env.ConciergeAppName + "-api-tls-serving-certificate"
|
|
|
|
tests := []struct {
|
|
name string
|
|
forceRotation func(context.Context, kubernetes.Interface, string) error
|
|
}{
|
|
{
|
|
name: "manual",
|
|
forceRotation: func(
|
|
ctx context.Context,
|
|
kubeClient kubernetes.Interface,
|
|
namespace string,
|
|
) error {
|
|
// Delete the Secret, simulating an end user doing `kubectl delete` to manually ask for an immediate rotation.
|
|
return kubeClient.
|
|
CoreV1().
|
|
Secrets(namespace).
|
|
Delete(ctx, defaultServingCertResourceName, metav1.DeleteOptions{})
|
|
},
|
|
},
|
|
{
|
|
name: "automatic",
|
|
forceRotation: func(
|
|
ctx context.Context,
|
|
kubeClient kubernetes.Interface,
|
|
namespace string,
|
|
) error {
|
|
// Create a cert that is expired - this should force the rotation controller
|
|
// to delete the cert, and therefore the cert should get rotated.
|
|
secret, err := kubeClient.
|
|
CoreV1().
|
|
Secrets(namespace).
|
|
Get(ctx, defaultServingCertResourceName, metav1.GetOptions{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
secret.Data["tlsCertificateChain"], _, err = createExpiredCertificate()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = kubeClient.
|
|
CoreV1().
|
|
Secrets(namespace).
|
|
Update(ctx, secret, metav1.UpdateOptions{})
|
|
return err
|
|
},
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
test := test
|
|
t.Run(test.name, func(t *testing.T) {
|
|
kubeClient := testlib.NewKubernetesClientset(t)
|
|
aggregatedClient := testlib.NewAggregatedClientset(t)
|
|
conciergeClient := testlib.NewConciergeClientset(t)
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Minute)
|
|
defer cancel()
|
|
|
|
apiServiceName := "v1alpha1.login.concierge." + env.APIGroupSuffix
|
|
|
|
// Create a testWebhook so we have a legitimate authenticator to pass to the
|
|
// TokenCredentialRequest API.
|
|
testWebhook := testlib.CreateTestWebhookAuthenticator(ctx, t)
|
|
|
|
// Get the initial auto-generated version of the Secret.
|
|
secret, err := kubeClient.CoreV1().Secrets(env.ConciergeNamespace).Get(ctx, defaultServingCertResourceName, metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
initialCACert := secret.Data["caCertificate"]
|
|
initialPrivateKey := secret.Data["tlsPrivateKey"]
|
|
initialCertChain := secret.Data["tlsCertificateChain"]
|
|
require.NotEmpty(t, initialCACert)
|
|
require.NotEmpty(t, initialPrivateKey)
|
|
require.NotEmpty(t, initialCertChain)
|
|
for k, v := range env.ConciergeCustomLabels {
|
|
require.Equalf(t, v, secret.Labels[k], "expected secret to have label %s: %s", k, v)
|
|
}
|
|
require.Equal(t, env.ConciergeAppName, secret.Labels["app"])
|
|
|
|
// Check that the APIService has the same CA.
|
|
apiService, err := aggregatedClient.ApiregistrationV1().APIServices().Get(ctx, apiServiceName, metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
require.Equal(t, initialCACert, apiService.Spec.CABundle)
|
|
|
|
// Force rotation to happen.
|
|
require.NoError(t, test.forceRotation(ctx, kubeClient, env.ConciergeNamespace))
|
|
|
|
// Expect that the Secret comes back right away with newly minted certs.
|
|
var regeneratedCACert []byte
|
|
testlib.RequireEventually(t,
|
|
func(requireEventually *require.Assertions) {
|
|
var err error
|
|
secret, err = kubeClient.CoreV1().Secrets(env.ConciergeNamespace).Get(ctx, defaultServingCertResourceName, metav1.GetOptions{})
|
|
requireEventually.NoError(err)
|
|
|
|
regeneratedCACert = secret.Data["caCertificate"]
|
|
regeneratedPrivateKey := secret.Data["tlsPrivateKey"]
|
|
regeneratedCertChain := secret.Data["tlsCertificateChain"]
|
|
requireEventually.NotEmpty(regeneratedCACert)
|
|
requireEventually.NotEmpty(regeneratedPrivateKey)
|
|
requireEventually.NotEmpty(regeneratedCertChain)
|
|
requireEventually.NotEqual(initialCACert, regeneratedCACert)
|
|
requireEventually.NotEqual(initialPrivateKey, regeneratedPrivateKey)
|
|
requireEventually.NotEqual(initialCertChain, regeneratedCertChain)
|
|
for k, v := range env.ConciergeCustomLabels {
|
|
requireEventually.Equalf(v, secret.Labels[k], "expected secret to have label `%s: %s`", k, v)
|
|
}
|
|
requireEventually.Equal(env.ConciergeAppName, secret.Labels["app"])
|
|
},
|
|
// Wait 5 minutes in case the Concierge was just redeployed, in which case it can take time for
|
|
// the controllers to be ready again. This test is often run as the very first test in the whole suite.
|
|
5*time.Minute,
|
|
250*time.Millisecond)
|
|
|
|
// Expect that the APIService was also updated with the new CA.
|
|
testlib.RequireEventually(t, func(requireEventually *require.Assertions) {
|
|
apiService, err := aggregatedClient.ApiregistrationV1().APIServices().Get(ctx, apiServiceName, metav1.GetOptions{})
|
|
requireEventually.NoErrorf(err, "get for APIService %q returned error", apiServiceName)
|
|
requireEventually.Equalf(regeneratedCACert, apiService.Spec.CABundle, "CA bundle in APIService %q does not yet have the expected value", apiServiceName)
|
|
}, 2*time.Minute, 250*time.Millisecond, "never saw CA certificate rotate to expected value")
|
|
|
|
// Check that we can still make requests to the aggregated API through the kube API server,
|
|
// because the kube API server uses these certs when proxying requests to the aggregated API server,
|
|
// so this is effectively checking that the aggregated API server is using these new certs.
|
|
// We ensure that 10 straight requests succeed so that we filter out false positives where a single
|
|
// pod has rotated their cert, but not the other ones sitting behind the service.
|
|
//
|
|
// our code changes all the certs immediately thus this should be healthy fairly quickly
|
|
// if this starts flaking, check for bugs in our dynamiccertificates.Notifier implementation
|
|
testlib.RequireEventually(t, func(requireEventually *require.Assertions) {
|
|
for i := 0; i < 10; i++ {
|
|
_, err := conciergeClient.LoginV1alpha1().TokenCredentialRequests().Create(ctx, &loginv1alpha1.TokenCredentialRequest{
|
|
TypeMeta: metav1.TypeMeta{},
|
|
ObjectMeta: metav1.ObjectMeta{},
|
|
Spec: loginv1alpha1.TokenCredentialRequestSpec{Token: "not a good token", Authenticator: testWebhook},
|
|
}, metav1.CreateOptions{})
|
|
requireEventually.NoError(err, "dynamiccertificates.Notifier broken?")
|
|
}
|
|
}, time.Minute, 250*time.Millisecond)
|
|
})
|
|
}
|
|
}
|
|
|
|
func createExpiredCertificate() ([]byte, []byte, error) {
|
|
return testutil.CreateCertificate(
|
|
time.Now().Add(-24*time.Hour), // notBefore
|
|
time.Now().Add(-time.Hour), // notAfter
|
|
)
|
|
}
|