-
Notifications
You must be signed in to change notification settings - Fork 4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #2795 from krzysied/vpa_webhook_test
VPA - Injected sidecar e2e test
- Loading branch information
Showing
78 changed files
with
1,534 additions
and
15,696 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,98 @@ | ||
/* | ||
Copyright 2020 The Kubernetes Authors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
// COPY OF https://github.com/kubernetes/kubernetes/blob/master/test/e2e/apimachinery/certs.go | ||
|
||
package utils | ||
|
||
import ( | ||
"crypto/x509" | ||
"io/ioutil" | ||
"os" | ||
|
||
"k8s.io/client-go/util/cert" | ||
"k8s.io/client-go/util/keyutil" | ||
"k8s.io/kubernetes/test/e2e/framework" | ||
"k8s.io/kubernetes/test/utils" | ||
) | ||
|
||
type certContext struct { | ||
cert []byte | ||
key []byte | ||
signingCert []byte | ||
} | ||
|
||
// SetupWebhookCert sets up the server cert. For example, user, apiservers and admission webhooks | ||
// can use the cert to prove their identity to the kube-apiserver. | ||
func SetupWebhookCert(namespaceName string) *certContext { | ||
certDir, err := ioutil.TempDir("", "test-e2e-server-cert") | ||
if err != nil { | ||
framework.Failf("Failed to create a temp dir for cert generation %v", err) | ||
} | ||
defer os.RemoveAll(certDir) | ||
signingKey, err := utils.NewPrivateKey() | ||
if err != nil { | ||
framework.Failf("Failed to create CA private key %v", err) | ||
} | ||
signingCert, err := cert.NewSelfSignedCACert(cert.Config{CommonName: "e2e-server-cert-ca"}, signingKey) | ||
if err != nil { | ||
framework.Failf("Failed to create CA cert for apiserver %v", err) | ||
} | ||
caCertFile, err := ioutil.TempFile(certDir, "ca.crt") | ||
if err != nil { | ||
framework.Failf("Failed to create a temp file for ca cert generation %v", err) | ||
} | ||
if err := ioutil.WriteFile(caCertFile.Name(), utils.EncodeCertPEM(signingCert), 0644); err != nil { | ||
framework.Failf("Failed to write CA cert %v", err) | ||
} | ||
key, err := utils.NewPrivateKey() | ||
if err != nil { | ||
framework.Failf("Failed to create private key for %v", err) | ||
} | ||
signedCert, err := utils.NewSignedCert( | ||
&cert.Config{ | ||
CommonName: WebhookServiceName + "." + namespaceName + ".svc", | ||
Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, | ||
}, | ||
key, signingCert, signingKey, | ||
) | ||
if err != nil { | ||
framework.Failf("Failed to create cert%v", err) | ||
} | ||
certFile, err := ioutil.TempFile(certDir, "server.crt") | ||
if err != nil { | ||
framework.Failf("Failed to create a temp file for cert generation %v", err) | ||
} | ||
keyFile, err := ioutil.TempFile(certDir, "server.key") | ||
if err != nil { | ||
framework.Failf("Failed to create a temp file for key generation %v", err) | ||
} | ||
if err = ioutil.WriteFile(certFile.Name(), utils.EncodeCertPEM(signedCert), 0600); err != nil { | ||
framework.Failf("Failed to write cert file %v", err) | ||
} | ||
privateKeyPEM, err := keyutil.MarshalPrivateKeyToPEM(key) | ||
if err != nil { | ||
framework.Failf("Failed to marshal key %v", err) | ||
} | ||
if err = ioutil.WriteFile(keyFile.Name(), privateKeyPEM, 0644); err != nil { | ||
framework.Failf("Failed to write key file %v", err) | ||
} | ||
return &certContext{ | ||
cert: utils.EncodeCertPEM(signedCert), | ||
key: privateKeyPEM, | ||
signingCert: utils.EncodeCertPEM(signingCert), | ||
} | ||
} |
Oops, something went wrong.