[OOM-K8S-CERT-EXTERNAL-PROVIDER] Add CertificateRequest controller test
[oom/platform/cert-service.git] / certServiceK8sExternalProvider / src / cmpv2controller / cmpv2_issuer_controller_test.go
1 /*
2  * ============LICENSE_START=======================================================
3  * oom-certservice-k8s-external-provider
4  * ================================================================================
5  * Copyright (C) 2020 Nokia. All rights reserved.
6  * ================================================================================
7  * Licensed under the Apache License, Version 2.0 (the "License");
8  * you may not use this file except in compliance with the License.
9  * You may obtain a copy of the License at
10  *
11  *      http://www.apache.org/licenses/LICENSE-2.0
12  *
13  * Unless required by applicable law or agreed to in writing, software
14  * distributed under the License is distributed on an "AS IS" BASIS,
15  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16  * See the License for the specific language governing permissions and
17  * limitations under the License.
18  * ============LICENSE_END=========================================================
19  */
20
21 package cmpv2controller
22
23 import (
24         "testing"
25
26         "github.com/go-logr/logr"
27         "github.com/stretchr/testify/assert"
28         "github.com/stretchr/testify/mock"
29         "k8s.io/client-go/tools/record"
30         "k8s.io/utils/clock"
31         ctrl "sigs.k8s.io/controller-runtime"
32         "sigs.k8s.io/controller-runtime/pkg/client"
33         "sigs.k8s.io/controller-runtime/pkg/client/fake"
34
35         "onap.org/oom-certservice/k8s-external-provider/src/cmpv2api"
36         provisioners "onap.org/oom-certservice/k8s-external-provider/src/cmpv2provisioner"
37         "onap.org/oom-certservice/k8s-external-provider/src/testdata"
38 )
39
40 func Test_shouldPrepareAndVerifyCMPv2Issuer_whenRequestReceived(t *testing.T) {
41         scheme := testdata.GetScheme()
42         issuer, secret := testdata.GetValidIssuerWithSecret()
43         fakeClient := fake.NewFakeClientWithScheme(scheme, &issuer, &secret)
44         fakeRequest := testdata.GetFakeRequest(testdata.IssuerObjectName)
45         fakeRecorder := record.NewFakeRecorder(recorderBufferSize)
46         controller := getCMPv2IssuerController(fakeRecorder, fakeClient)
47
48         res, err := controller.Reconcile(fakeRequest)
49
50         expectedProvisioner, _ := controller.ProvisionerFactory.CreateProvisioner(&issuer, secret)
51         actualProvisioner, _ := provisioners.Load(testdata.GetIssuerStoreKey())
52         assert.Nil(t, err)
53         assert.NotNil(t, res)
54         assert.Equal(t, <-fakeRecorder.Events, "Normal Verified CMPv2Issuer verified and ready to sign certificates")
55         assert.NotNil(t, actualProvisioner)
56         assert.ObjectsAreEqual(expectedProvisioner, actualProvisioner)
57         clearProvisioner()
58 }
59
60 func Test_shouldBeValidCMPv2IssuerSpec_whenAllFieldsAreSet(t *testing.T) {
61         spec := testdata.GetValidCMPv2IssuerSpec()
62
63         err := validateCMPv2IssuerSpec(spec, &MockLogger{})
64         assert.Nil(t, err)
65 }
66
67 func Test_shouldBeInvalidCMPv2IssuerSpec_whenSpecIsEmpty(t *testing.T) {
68         spec := cmpv2api.CMPv2IssuerSpec{}
69         err := validateCMPv2IssuerSpec(spec, nil)
70         assert.NotNil(t, err)
71 }
72
73 func Test_shouldBeInvalidCMPv2IssuerSpec_whenNotAllFieldsAreSet(t *testing.T) {
74         setEmptyFieldFunctions := map[string]func(spec *cmpv2api.CMPv2IssuerSpec){
75                 "emptyUrl":            func(spec *cmpv2api.CMPv2IssuerSpec) { spec.URL = "" },
76                 "empryCaName":         func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CaName = "" },
77                 "emptySecretName":     func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.Name = "" },
78                 "emptySecretKeyRef":   func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.KeyRef = "" },
79                 "emptySecretCertRef":  func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.CertRef = "" },
80                 "emptySecretCaertRef": func(spec *cmpv2api.CMPv2IssuerSpec) { spec.CertSecretRef.CacertRef = "" },
81         }
82
83         for caseName, setEmptyFieldFunction := range setEmptyFieldFunctions {
84                 t.Run(caseName, func(t *testing.T) {
85                         test_shouldBeInvalidCMPv2IssuerSpec_whenFunctionApplied(t, setEmptyFieldFunction)
86                 })
87         }
88 }
89
90 func test_shouldBeInvalidCMPv2IssuerSpec_whenFunctionApplied(t *testing.T, transformSpec func(spec *cmpv2api.CMPv2IssuerSpec)) {
91         spec := testdata.GetValidCMPv2IssuerSpec()
92         transformSpec(&spec)
93         err := validateCMPv2IssuerSpec(spec, nil)
94         assert.NotNil(t, err)
95 }
96
97 func getCMPv2IssuerController(fakeRecorder *record.FakeRecorder, mockClient client.Client) CMPv2IssuerController {
98         controller := CMPv2IssuerController{
99                 Log:                ctrl.Log.WithName("controllers").WithName("CertificateRequest"),
100                 Clock:              clock.RealClock{},
101                 Recorder:           fakeRecorder,
102                 Client:             mockClient,
103                 ProvisionerFactory: &provisioners.ProvisionerFactoryMock{},
104         }
105         return controller
106 }
107
108 type MockLogger struct {
109         mock.Mock
110 }
111
112 func (m *MockLogger) Info(msg string, keysAndValues ...interface{})             {}
113 func (m *MockLogger) Error(err error, msg string, keysAndValues ...interface{}) {}
114 func (m *MockLogger) Enabled() bool                                             { return false }
115 func (m *MockLogger) V(level int) logr.Logger                                   { return m }
116 func (m *MockLogger) WithValues(keysAndValues ...interface{}) logr.Logger       { return m }
117 func (m *MockLogger) WithName(name string) logr.Logger                          { return m }