2 * ============LICENSE_START=======================================================
3 * oom-certservice-k8s-external-provider
4 * ================================================================================
5 * Copyright (C) 2020 Nokia. All rights reserved.
6 * ================================================================================
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
18 * ============LICENSE_END=========================================================
21 package cmpv2controller
26 "github.com/go-logr/logr"
27 certmanager "github.com/jetstack/cert-manager/pkg/apis/certmanager/v1"
28 "github.com/stretchr/testify/assert"
29 "github.com/stretchr/testify/mock"
30 apiv1 "k8s.io/api/core/v1"
31 "k8s.io/apimachinery/pkg/runtime"
32 "k8s.io/apimachinery/pkg/types"
33 clientgoscheme "k8s.io/client-go/kubernetes/scheme"
34 "k8s.io/client-go/tools/record"
36 ctrl "sigs.k8s.io/controller-runtime"
37 "sigs.k8s.io/controller-runtime/pkg/client"
38 "sigs.k8s.io/controller-runtime/pkg/client/fake"
39 "sigs.k8s.io/controller-runtime/pkg/reconcile"
41 "onap.org/oom-certservice/k8s-external-provider/src/cmpv2api"
42 certserviceapi "onap.org/oom-certservice/k8s-external-provider/src/cmpv2api"
43 provisioners "onap.org/oom-certservice/k8s-external-provider/src/cmpv2provisioner"
44 "onap.org/oom-certservice/k8s-external-provider/src/testdata"
47 func Test_shouldPrepareAndVerifyCMPv2Issuer_whenRequestReceived(t *testing.T) {
48 scheme := initScheme()
49 issuer, secret := testdata.GetValidIssuerWithSecret()
50 fakeClient := getFakeClient(scheme, issuer, secret)
51 fakeRequest := getFakeRequest()
52 fakeRecorder := record.NewFakeRecorder(3)
53 controller := getController(fakeRecorder, fakeClient)
55 res, err := controller.Reconcile(fakeRequest)
57 expectedProvisioner, _ := controller.ProvisionerFactory.CreateProvisioner(&issuer, secret)
58 actualProvisioner, _ := provisioners.Load(types.NamespacedName{Name: testdata.IssuerObjectName, Namespace: testdata.Namespace})
61 assert.Equal(t, <-fakeRecorder.Events, "Normal Verified CMPv2Issuer verified and ready to sign certificates")
62 assert.NotNil(t, actualProvisioner)
63 assert.ObjectsAreEqual(expectedProvisioner, actualProvisioner)
66 func Test_shouldBeValidCMPv2IssuerSpec_whenAllFieldsAreSet(t *testing.T) {
67 spec := testdata.GetValidCMPv2IssuerSpec()
69 err := validateCMPv2IssuerSpec(spec, &MockLogger{})
73 func Test_shouldBeInvalidCMPv2IssuerSpec_whenSpecIsEmpty(t *testing.T) {
74 spec := cmpv2api.CMPv2IssuerSpec{}
75 err := validateCMPv2IssuerSpec(spec, nil)
79 func Test_shouldBeInvalidCMPv2IssuerSpec_whenNotAllFieldsAreSet(t *testing.T) {
80 setEmptyFieldFunctions := map[string]func(spec *cmpv2api.CMPv2IssuerSpec){
81 "emptyUrl": func(spec *cmpv2api.CMPv2IssuerSpec) { spec.URL = "" },
82 "empryCaName": func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CaName = "" },
83 "emptySecretName": func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.Name = "" },
84 "emptySecretKeyRef": func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.KeyRef = "" },
85 "emptySecretCertRef": func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.CertRef = "" },
86 "emptySecretCaertRef": func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.CacertRef = "" },
89 for caseName, setEmptyFieldFunction := range setEmptyFieldFunctions {
90 t.Run(caseName, func(t *testing.T) {
91 test_shouldBeInvalidCMPv2IssuerSpec_whenFunctionApplied(t, setEmptyFieldFunction)
96 func test_shouldBeInvalidCMPv2IssuerSpec_whenFunctionApplied(t *testing.T, transformSpec func(spec *cmpv2api.CMPv2IssuerSpec)) {
97 spec := testdata.GetValidCMPv2IssuerSpec()
99 err := validateCMPv2IssuerSpec(spec, nil)
100 assert.NotNil(t, err)
103 func getController(fakeRecorder *record.FakeRecorder, mockClient client.Client) CMPv2IssuerController {
104 controller := CMPv2IssuerController{
105 Log: ctrl.Log.WithName("controllers").WithName("CertificateRequest"),
106 Clock: clock.RealClock{},
107 Recorder: fakeRecorder,
109 ProvisionerFactory: &provisioners.ProvisionerFactoryMock{},
114 func getFakeRequest() reconcile.Request {
115 fakeRequest := reconcile.Request{
116 NamespacedName: types.NamespacedName{
117 Namespace: testdata.Namespace,
118 Name: testdata.IssuerObjectName,
124 func getFakeClient(scheme *runtime.Scheme, issuer cmpv2api.CMPv2Issuer, secret apiv1.Secret) client.Client {
125 fakeClient := func() client.Client {
126 return fake.NewFakeClientWithScheme(scheme, &issuer, &secret)
131 func initScheme() *runtime.Scheme {
132 scheme := runtime.NewScheme()
133 _ = clientgoscheme.AddToScheme(scheme)
134 _ = certmanager.AddToScheme(scheme)
135 _ = certserviceapi.AddToScheme(scheme)
139 type MockLogger struct {
143 func (m *MockLogger) Info(msg string, keysAndValues ...interface{}) {}
144 func (m *MockLogger) Error(err error, msg string, keysAndValues ...interface{}) {}
145 func (m *MockLogger) Enabled() bool { return false }
146 func (m *MockLogger) V(level int) logr.Logger { return m }
147 func (m *MockLogger) WithValues(keysAndValues ...interface{}) logr.Logger { return m }
148 func (m *MockLogger) WithName(name string) logr.Logger { return m }