setupLog.Info("Registering CMPv2IssuerController...")
err := (&controllers.CMPv2IssuerController{
- Client: manager.GetClient(),
- Log: leveledlogger.GetLoggerWithValues("controllers", "CMPv2Issuer"),
- Clock: clock.RealClock{},
- Recorder: manager.GetEventRecorderFor("cmpv2-issuer-controller"),
+ Client: manager.GetClient(),
+ Log: leveledlogger.GetLoggerWithValues("controllers", "CMPv2Issuer"),
+ Clock: clock.RealClock{},
+ Recorder: manager.GetEventRecorderFor("cmpv2-issuer-controller"),
ProvisionerFactory: &cmpv2provisioner.ProvisionerFactoryImpl{},
}).SetupWithManager(manager)
return nil, err
}
client := CertServiceClientImpl{
- healthUrl: healthUrl,
+ healthUrl: healthUrl,
certificationUrl: certificationUrl,
httpClient: httpClient,
}
certificationUrl = "https://oom-cert-service:8443/v1/certificate/RA"
)
-
func Test_GetCertificates_shouldParseCertificateResponseCorrectly(t *testing.T) {
responseJson := `{"certificateChain": ["cert-0", "cert-1"], "trustedCertificates": ["trusted-cert-0", "trusted-cert-1"]}`
responseJsonReader := ioutil.NopCloser(bytes.NewReader([]byte(responseJson)))
responseJsonReader := ioutil.NopCloser(bytes.NewReader([]byte(responseJson)))
client := CertServiceClientImpl{
certificationUrl: certificationUrl,
- httpClient: &httpClientMock{
+ httpClient: &httpClientMock{
DoFunc: func(req *http.Request) (response *http.Response, e error) {
mockedResponse := &http.Response{
Body: responseJsonReader,
func Test_GetCertificates_shouldReturnError_whenHttpClientReturnsError(t *testing.T) {
client := CertServiceClientImpl{
certificationUrl: certificationUrl,
- httpClient: &httpClientMock{
+ httpClient: &httpClientMock{
DoFunc: func(req *http.Request) (response *http.Response, err error) {
return nil, fmt.Errorf("mock error")
},
func Test_CheckHealth_shouldReturnNil_whenHttpClientReturnsStatusCode200(t *testing.T) {
client := CertServiceClientImpl{
certificationUrl: certificationUrl,
- httpClient: &httpClientMock{
+ httpClient: &httpClientMock{
DoFunc: func(req *http.Request) (response *http.Response, e error) {
mockedResponse := &http.Response{
- Body: nil,
+ Body: nil,
StatusCode: 200,
}
return mockedResponse, nil
func Test_CheckHealth_shouldReturnError_whenHttpClientReturnsStatusCode404(t *testing.T) {
client := CertServiceClientImpl{
certificationUrl: certificationUrl,
- httpClient: &httpClientMock{
+ httpClient: &httpClientMock{
DoFunc: func(req *http.Request) (response *http.Response, e error) {
mockedResponse := &http.Response{
- Body: nil,
+ Body: nil,
StatusCode: 404,
}
return mockedResponse, nil
func Test_CheckHealth_shouldReturnError_whenHttpClientReturnsError(t *testing.T) {
client := CertServiceClientImpl{
certificationUrl: certificationUrl,
- httpClient: &httpClientMock{
+ httpClient: &httpClientMock{
DoFunc: func(req *http.Request) (response *http.Response, err error) {
return nil, fmt.Errorf("mock error")
},
"+ property 'ipAddresses'",
"+ property 'uris'",
"+ property 'email addresses'",
- }
+}
const RESULT_LOG = "testdata/test_result.log"
)
const (
- recorderBufferSize = 3
+ recorderBufferSize = 3
)
-
func Test_shouldFireWarningEvent_forCmpv2Issuer(t *testing.T) {
fakeRecorder := record.NewFakeRecorder(recorderBufferSize)
certmanager "github.com/jetstack/cert-manager/pkg/apis/certmanager/v1"
"k8s.io/apimachinery/pkg/types"
- "onap.org/oom-certservice/k8s-external-provider/src/leveledlogger"
"onap.org/oom-certservice/k8s-external-provider/src/certserviceclient"
"onap.org/oom-certservice/k8s-external-provider/src/cmpv2api"
"onap.org/oom-certservice/k8s-external-provider/src/cmpv2provisioner/csr"
+ "onap.org/oom-certservice/k8s-external-provider/src/leveledlogger"
)
var collection = new(sync.Map)
"onap.org/oom-certservice/k8s-external-provider/src/cmpv2api"
)
-
type ProvisionerFactory interface {
CreateProvisioner(issuer *cmpv2api.CMPv2Issuer, secret v1.Secret) (*CertServiceCA, error)
}
filteredSubject := filterFieldsFromSubject(csr.Subject)
filteredCsr, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
- Subject: filteredSubject,
- DNSNames: csr.DNSNames,
- IPAddresses: csr.IPAddresses,
- URIs: csr.URIs,
+ Subject: filteredSubject,
+ DNSNames: csr.DNSNames,
+ IPAddresses: csr.IPAddresses,
+ URIs: csr.URIs,
EmailAddresses: csr.EmailAddresses,
}, key)
if err != nil {
"log"
"github.com/go-logr/logr"
- "go.uber.org/zap/zapcore"
"github.com/go-logr/zapr"
"go.uber.org/zap"
+ "go.uber.org/zap/zapcore"
)
const (
)
type Logger struct {
- Log logr.Logger
+ Log logr.Logger
ConfigFile string
}
SetConfigFileName("testdata/test_logger_config_debug.json")
logger := GetLoggerWithName("loggername")
- logOnAllLevels(logger)
+ logOnAllLevels(logger)
resultLogBytes := readFile(resultLogName)
expectedLogBytes := readFile(expectedLogName)
func DecodeCSR(data []byte) (*x509.CertificateRequest, error) {
block, err := decodePemBlock(data, PemCsrType)
if err != nil {
- return nil, fmt.Errorf("error decoding CSR PEM: %v", err)
+ return nil, fmt.Errorf("error decoding CSR PEM: %v", err)
}
csr, err := x509.ParseCertificateRequest(block.Bytes)
if err != nil {
func DecodePrivateKey(data []byte) (interface{}, error) {
block, err := decodePemBlock(data, pemPrivateKeyType)
if err != nil {
- return nil, fmt.Errorf("error decoding Private Key PEM: %v", err)
+ return nil, fmt.Errorf("error decoding Private Key PEM: %v", err)
}
key, err := x509.ParsePKCS8PrivateKey(block.Bytes)
if err != nil {
- return nil, fmt.Errorf("error parsing Private Key: %v", err)
+ return nil, fmt.Errorf("error parsing Private Key: %v", err)
}
return key, nil
}
return block, nil
}
-
func ParseCertificateArrayToBytes(certificateArray []string) ([]byte, error) {
buffer := bytes.NewBuffer([]byte{})
for _, cert := range certificateArray {