Skip to content

Commit

Permalink
Add TestRouterWaitsForCRLs
Browse files Browse the repository at this point in the history
TestRouterWaitsForCRLs verifies that the router reports not ready until
all required CRLs are downloaded

This is part of the fix for OCPBUGS-29894
  • Loading branch information
rfredette committed Sep 23, 2024
1 parent fe0bba5 commit f62a85a
Show file tree
Hide file tree
Showing 3 changed files with 222 additions and 0 deletions.
1 change: 1 addition & 0 deletions test/e2e/all_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ func TestAll(t *testing.T) {
t.Run("TestClientTLS", TestClientTLS)
t.Run("TestMTLSWithCRLs", TestMTLSWithCRLs)
t.Run("TestCRLUpdate", TestCRLUpdate)
t.Run("TestRouterWaitsForCRLs", TestRouterWaitsForCRLs)
t.Run("TestContainerLogging", TestContainerLogging)
t.Run("TestContainerLoggingMaxLength", TestContainerLoggingMaxLength)
t.Run("TestContainerLoggingMinLength", TestContainerLoggingMinLength)
Expand Down
215 changes: 215 additions & 0 deletions test/e2e/client_tls_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1372,6 +1372,221 @@ func TestCRLUpdate(t *testing.T) {
}
}

// TestRouterWaitsForCRLs verifies that router pods only report ready once all CRLs are downloaded.
func TestRouterWaitsForCRLs(t *testing.T) {
t.Parallel()
namespaceName := names.SimpleNameGenerator.GenerateName("router-waits-for-crls-")
namespace := createNamespace(t, namespaceName)

// Create certs.
crlHostName := types.NamespacedName{
Name: names.SimpleNameGenerator.GenerateName("crl-host-"),
Namespace: namespaceName,
}
crlHostServiceName := names.SimpleNameGenerator.GenerateName("crl-host-service-")
crlHostURL := crlHostServiceName + "." + crlHostName.Namespace + ".svc"

rootCDP := "http://" + crlHostURL + "/root.crl"
intermediateCDP := "http://" + crlHostURL + "/intermediate.crl"

rootCA := MustCreateTLSKeyCert("testing root CA", time.Now(), time.Now().Add(24*time.Hour), true, []string{rootCDP}, nil)
intermediateCA := MustCreateTLSKeyCert("testing intermediate CA", time.Now(), time.Now().Add(24*time.Hour), true, []string{intermediateCDP}, &rootCA)

rootCRL, rootCRLPem := MustCreateCRL(nil, rootCA, time.Now(), time.Now().Add(1*time.Hour), nil)
intermediateCRL, intermediateCRLPem := MustCreateCRL(nil, intermediateCA, time.Now(), time.Now().Add(1*time.Hour), nil)

// Create an ingress controller with mTLS enabled.
clientCAConfigMapName := names.SimpleNameGenerator.GenerateName("client-ca-cm-")
clientCAConfigMap := corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: clientCAConfigMapName,
Namespace: "openshift-config",
},
Data: map[string]string{
"ca-bundle.pem": strings.Join([]string{intermediateCA.CertPem, rootCA.CertPem}, "\n"),
},
}
assertCreated(t, kclient, &clientCAConfigMap)
t.Cleanup(func() { assertDeleted(t, kclient, &clientCAConfigMap) })
icName := types.NamespacedName{
Name: names.SimpleNameGenerator.GenerateName("router-waits-for-crls-"),
Namespace: operatorNamespace,
}
icDomain := icName.Name + "." + dnsConfig.Spec.BaseDomain
ic := newPrivateController(icName, icDomain)
ic.Spec.ClientTLS = operatorv1.ClientTLS{
ClientCA: configv1.ConfigMapNameReference{
Name: clientCAConfigMapName,
},
ClientCertificatePolicy: operatorv1.ClientCertificatePolicyRequired,
}
if err := kclient.Create(context.TODO(), ic); err != nil {
t.Fatalf("failed to create ingresscontroller %s/%s: %v", icName.Namespace, icName.Name, err)
}
t.Cleanup(func() { assertIngressControllerDeleted(t, kclient, ic) })

// Verify that the router is not ready, and that the reason includes that the "crls-updated" health check failed.
routerPod := corev1.Pod{}
err := wait.PollImmediate(10*time.Second, 5*time.Minute, func() (bool, error) {
podList := &corev1.PodList{}
labels := map[string]string{
controller.ControllerDeploymentLabel: icName.Name,
}
if err := kclient.List(context.TODO(), podList, client.InNamespace("openshift-ingress"), client.MatchingLabels(labels)); err != nil {
t.Logf("failed to list pods for ingress controllers %s: %v", ic.Name, err)
return false, nil
}
if len(podList.Items) == 0 {
t.Logf("no router pods found for ingresscontroller %s", ic.Name)
return false, nil
}
routerPod = podList.Items[0]
routerPodName := types.NamespacedName{
Name: routerPod.Name,
Namespace: routerPod.Namespace,
}
if err := kclient.Get(context.TODO(), routerPodName, &routerPod); err != nil {
t.Logf("failed to get pod %s: %v", routerPod.Name, err)
return false, nil
}
for _, condition := range routerPod.Status.Conditions {
if condition.Type == corev1.PodReady {
if condition.Status != corev1.ConditionFalse {
t.Fatalf("expected %s %q condition to be False, got %s", routerPod.Name, corev1.PodReady, condition.Status)
}
t.Logf("Found router pod %s", routerPod.Name)
return true, nil
}
}
t.Logf("pod %s condition %s not found. retrying.", routerPod.Name, corev1.PodReady)
return false, nil
})
if err != nil {
t.Fatalf("Expected router to be unready: %v", err)
}
err = wait.PollImmediate(10*time.Second, 5*time.Minute, func() (bool, error) {
events := &corev1.EventList{}
if err := kclient.List(context.TODO(), events, client.InNamespace("openshift-ingress")); err != nil {
t.Log("Failed to list events in openshift-ingress namespace. retrying.")
return false, nil
}
for _, event := range events.Items {
if event.Reason == "ProbeError" && event.InvolvedObject.Name == routerPod.Name {
if strings.Contains(event.Message, "crls-updated failed") {
return true, nil
}
}
}
return false, nil
})
if err != nil {
t.Fatalf("Failed to find ProbeError event for %s containing \"crls-updated failed\"", routerPod.Name)
}
// Create a CRL host that has the root CRL, but not the intermediate one.
crlConfigMapName := names.SimpleNameGenerator.GenerateName(crlHostName.Name + "-configmap-")
crlConfigMap := corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: crlConfigMapName,
Namespace: namespace.Name,
},
Data: map[string]string{
"root.crl": rootCRLPem,
},
}
assertCreated(t, kclient, &crlConfigMap)
t.Cleanup(func() { assertDeleted(t, kclient, &crlConfigMap) })

crlHostPod := buildCRLHostPod(crlHostName.Name, namespace.Name, crlConfigMap.Name, "root")
assertCreated(t, kclient, &crlHostPod)
t.Cleanup(func() { assertDeleted(t, kclient, &crlHostPod) })

crlHostService := buildCRLHostService(crlHostServiceName, namespace.Name, crlHostName.Name)
assertCreated(t, kclient, &crlHostService)
t.Cleanup(func() { assertDeleted(t, kclient, &crlHostService) })

err = wait.PollImmediate(10*time.Second, 5*time.Minute, func() (bool, error) {
podList := &corev1.PodList{}
labels := map[string]string{
controller.ControllerDeploymentLabel: icName.Name,
}
if err := kclient.List(context.TODO(), podList, client.InNamespace("openshift-ingress"), client.MatchingLabels(labels)); err != nil {
t.Logf("failed to list pods for ingress controllers %s: %v", ic.Name, err)
return false, nil
}
if len(podList.Items) == 0 {
t.Logf("no router pods found for ingresscontroller %s: %v", ic.Name, err)
return false, nil
}
routerPod = podList.Items[0]
for _, condition := range routerPod.Status.Conditions {
if condition.Type == corev1.PodReady {
if condition.Status != corev1.ConditionFalse {
t.Fatalf("expected %s %q condition to be False, got %s", routerPod.Name, corev1.PodReady, condition.Status)
}
return true, nil
}
}
t.Logf("pod %s condition %s not found. retrying.", routerPod.Name, corev1.PodReady)
return false, nil
})
if err != nil {
t.Fatalf("Expected router to be unready: %v", err)
}
err = wait.PollImmediate(10*time.Second, 2*time.Minute, func() (bool, error) {
events := &corev1.EventList{}
if err := kclient.List(context.TODO(), events, client.InNamespace("openshift-ingress")); err != nil {
t.Log("Failed to list events in openshift-ingress namespace. retrying.")
return false, nil
}
for _, event := range events.Items {
if event.Reason == "ProbeError" && event.InvolvedObject.Name == routerPod.Name {
if strings.Contains(event.Message, "crls-updated failed") {
return true, nil
}
}
}
return false, nil
})
if err != nil {
t.Fatalf("Failed to find ProbeError event for %s containing \"crls-updated failed\"", routerPod.Name)
}
// Add the intermediate CRL to the route host.
crlConfigMap.Data["intermediate.crl"] = intermediateCRLPem
if err := kclient.Update(context.TODO(), &crlConfigMap); err != nil {
t.Fatalf("Failed to update %s: %v", crlConfigMap.Name, err)
}
// Verify that both the root and intermediate CRLs are downloaded, and that the router is now ready.
err = wait.PollImmediate(10*time.Second, 5*time.Minute, func() (bool, error) {
podList := &corev1.PodList{}
labels := map[string]string{
controller.ControllerDeploymentLabel: icName.Name,
}
if err := kclient.List(context.TODO(), podList, client.InNamespace("openshift-ingress"), client.MatchingLabels(labels)); err != nil {
t.Logf("failed to list pods for ingress controllers %s: %v", ic.Name, err)
return false, nil
}
if len(podList.Items) == 0 {
t.Logf("no router pods found for ingresscontroller %s: %v", ic.Name, err)
return false, nil
}
routerPod = podList.Items[0]
for _, condition := range routerPod.Status.Conditions {
if condition.Type == corev1.PodReady {
return condition.Status == corev1.ConditionTrue, nil
}
}
t.Logf("pod %s condition %s not found. retrying.", routerPod.Name, corev1.PodReady)
return false, nil
})
expectedCRLs := map[string]*x509.RevocationList{
"root.crl": rootCRL,
"intermediate.crl": intermediateCRL,
}
err = wait.PollImmediate(5*time.Second, 2*time.Minute, func() (bool, error) {
return verifyCRLs(t, &routerPod, expectedCRLs)
})
}

func verifyCRLs(t *testing.T, pod *corev1.Pod, expectedCRLs map[string]*x509.RevocationList) (bool, error) {
t.Helper()
activeCRLs, err := getActiveCRLs(t, pod)
Expand Down
6 changes: 6 additions & 0 deletions test/e2e/util_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -796,6 +796,12 @@ func verifyInternalIngressController(t *testing.T, name types.NamespacedName, ho
}
}

func assertCreated(t *testing.T, cl client.Client, thing client.Object) {
if err := cl.Create(context.TODO(), thing); err != nil {
t.Fatalf("Failed to create %s: %v", thing.GetName(), err)
}
}

// assertDeleted tries to delete a cluster resource, and causes test failure if the delete fails.
func assertDeleted(t *testing.T, cl client.Client, thing client.Object) {
t.Helper()
Expand Down

0 comments on commit f62a85a

Please sign in to comment.