Skip to content

Commit 7b08c84

Browse files
committed
Add unit testing for generateCACert, new HTTPS call, some debugging, and fix yaml
1 parent 6e03d25 commit 7b08c84

File tree

6 files changed

+171
-12
lines changed

6 files changed

+171
-12
lines changed

conformance/tests/backendtlspolicy.go

+9-5
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@ import (
2020
"testing"
2121

2222
"k8s.io/apimachinery/pkg/types"
23-
2423
"sigs.k8s.io/gateway-api/conformance/utils/http"
2524
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
2625
"sigs.k8s.io/gateway-api/conformance/utils/suite"
@@ -48,17 +47,22 @@ var BackendTLSPolicy = suite.ConformanceTest{
4847

4948
gwAddr := kubernetes.GatewayAndHTTPRoutesMustBeAccepted(t, suite.Client, suite.TimeoutConfig, suite.ControllerName, kubernetes.NewGatewayRef(gwNN), routeNN)
5049

50+
serverStr := "abc.example.com"
51+
headers := make(map[string]string)
52+
headers["Host"] = serverStr
53+
5154
// Verify that the response to a call to /backendTLS will return the matching SNI.
5255
t.Run("Simple request targeting BackendTLSPolicy should reach infra-backend", func(t *testing.T) {
53-
http.MakeRequestAndExpectEventuallyConsistentResponse(t, suite.RoundTripper, suite.TimeoutConfig, gwAddr,
56+
http.MakeHTTPSRequestAndExpectEventuallyConsistentResponse(t, suite.RoundTripper, suite.TimeoutConfig, gwAddr,
5457
http.ExpectedResponse{
5558
Request: http.Request{
56-
Path: "/backendTLS",
59+
Headers: headers,
60+
Host: serverStr,
61+
Path: "/backendTLS",
5762
},
5863
Response: http.Response{StatusCode: 200},
59-
Backend: "infra-backend-v1",
6064
Namespace: "gateway-conformance-infra",
61-
ServerName: "abc.example.com",
65+
ServerName: serverStr,
6266
})
6367
})
6468
},

conformance/tests/backendtlspolicy.yaml

+5-4
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ spec:
1515
- group: ""
1616
kind: Secret
1717
name: tls-checks-certificate
18-
hostname: "*.example.com"
18+
hostname: "abc.example.com"
1919
allowedRoutes:
2020
namespaces:
2121
from: Same
@@ -52,6 +52,7 @@ spec:
5252
hostnames:
5353
- abc.example.com
5454
rules:
55-
- backendRefs:
56-
- name: tls-backend
57-
port: 443
55+
- matches:
56+
- path:
57+
type: Exact
58+
value: /backendTLS

conformance/utils/http/http.go

+14-1
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,19 @@ func MakeRequestAndExpectEventuallyConsistentResponse(t *testing.T, r roundtripp
110110
WaitForConsistentResponse(t, r, req, expected, timeoutConfig.RequiredConsecutiveSuccesses, timeoutConfig.MaxTimeToConsistency)
111111
}
112112

113+
// MakeHTTPSRequestAndExpectEventuallyConsistentResponse makes a request with the given parameters,
114+
// understanding that the request may fail for some amount of time.
115+
//
116+
// Once the request succeeds consistently with the response having the expected status code, make
117+
// additional assertions on the response body using the provided ExpectedResponse.
118+
func MakeHTTPSRequestAndExpectEventuallyConsistentResponse(t *testing.T, r roundtripper.RoundTripper, timeoutConfig config.TimeoutConfig, gwAddr string, expected ExpectedResponse) {
119+
t.Helper()
120+
121+
req := MakeRequest(t, &expected, gwAddr, "HTTPS", "https")
122+
123+
WaitForConsistentResponse(t, r, req, expected, timeoutConfig.RequiredConsecutiveSuccesses, timeoutConfig.MaxTimeToConsistency)
124+
}
125+
113126
func MakeRequest(t *testing.T, expected *ExpectedResponse, gwAddr, protocol, scheme string) roundtripper.Request {
114127
t.Helper()
115128

@@ -128,7 +141,7 @@ func MakeRequest(t *testing.T, expected *ExpectedResponse, gwAddr, protocol, sch
128141
path, query, _ := strings.Cut(expected.Request.Path, "?")
129142
reqURL := url.URL{Scheme: scheme, Host: CalculateHost(t, gwAddr, scheme), Path: path, RawQuery: query}
130143

131-
tlog.Logf(t, "Making %s request to %s", expected.Request.Method, reqURL.String())
144+
tlog.Logf(t, "Making %s request to host %s via %s", expected.Request.Method, expected.Request.Host, reqURL.String())
132145

133146
req := roundtripper.Request{
134147
T: t,

conformance/utils/kubernetes/certificate.go

+32-2
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,14 @@ import (
2727
"io"
2828
"math/big"
2929
"net"
30+
"strings"
3031
"testing"
3132
"time"
3233

3334
"github.com/stretchr/testify/require"
3435
corev1 "k8s.io/api/core/v1"
3536
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
37+
kvalidation "k8s.io/apimachinery/pkg/util/validation"
3638
)
3739

3840
const (
@@ -97,7 +99,7 @@ func generateRSACert(hosts []string, keyOut, certOut io.Writer) error {
9799
for _, h := range hosts {
98100
if ip := net.ParseIP(h); ip != nil {
99101
template.IPAddresses = append(template.IPAddresses, ip)
100-
} else {
102+
} else if err := validateHost(h); err == nil {
101103
template.DNSNames = append(template.DNSNames, h)
102104
}
103105
}
@@ -164,10 +166,11 @@ func generateCACert(hosts []string, keyOut, certOut io.Writer) error {
164166
BasicConstraintsValid: true,
165167
}
166168

169+
// Ensure only valid hosts make it into the CA cert.
167170
for _, h := range hosts {
168171
if ip := net.ParseIP(h); ip != nil {
169172
ca.IPAddresses = append(ca.IPAddresses, ip)
170-
} else {
173+
} else if err := validateHost(h); err == nil {
171174
ca.DNSNames = append(ca.DNSNames, h)
172175
}
173176
}
@@ -193,3 +196,30 @@ func generateCACert(hosts []string, keyOut, certOut io.Writer) error {
193196
}
194197
return nil
195198
}
199+
200+
// validateHost ensures that the host name length is no more than 253 characters.
201+
// The only characters allowed in host name are alphanumeric characters, '-' or '.',
202+
// and it must start and end with an alphanumeric character. A trailing dot is NOT allowed.
203+
// The host name must in addition consist of one or more labels, with each label no more
204+
// than 63 characters from the character set described above, and each label must start and
205+
// end with an alphanumeric character. Wildcards are handled specially.
206+
// DO NOT USE for general validation purposes, this is just for the hostnames set up for
207+
// conformance testing.
208+
func validateHost(host string) error {
209+
// Remove wildcard if present.
210+
host, _ = strings.CutPrefix(host, "*.")
211+
212+
errs := kvalidation.IsDNS1123Subdomain(host)
213+
if len(errs) != 0 {
214+
return fmt.Errorf("host %s must conform to DNS naming conventions: %v", host, errs)
215+
}
216+
217+
labels := strings.Split(host, ".")
218+
for _, l := range labels {
219+
errs := kvalidation.IsDNS1123Label(l)
220+
if len(errs) != 0 {
221+
return fmt.Errorf("label %s in host %s must conform to DNS naming conventions: %v", l, host, errs)
222+
}
223+
}
224+
return nil
225+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
/*
2+
Copyright 2024 The Kubernetes Authors.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
10+
Unless required by applicable law or agreed to in writing, software
11+
distributed under the License is distributed on an "AS IS" BASIS,
12+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
See the License for the specific language governing permissions and
14+
limitations under the License.
15+
*/
16+
17+
package kubernetes
18+
19+
import (
20+
"bytes"
21+
"crypto/x509"
22+
"encoding/pem"
23+
"testing"
24+
25+
"github.com/stretchr/testify/require"
26+
)
27+
28+
func Test_generateRSACert(t *testing.T) {
29+
tests := []struct {
30+
name string
31+
hosts []string
32+
expectedErr string
33+
}{
34+
{
35+
name: "one host generates cert with no host",
36+
hosts: []string{},
37+
},
38+
{
39+
name: "one host generates cert for same host",
40+
hosts: []string{"abc.example.com"},
41+
},
42+
{
43+
name: "wildcard generates cert for same host",
44+
hosts: []string{"*.example.com"},
45+
},
46+
{
47+
name: "two hosts generates cert for both hosts",
48+
hosts: []string{"abc.example.com", "def.example.com"},
49+
},
50+
{
51+
name: "bad host generates cert for no host",
52+
hosts: []string{"--abc.example.com"},
53+
expectedErr: "x509: certificate is not valid for any names, but wanted to match --abc.example.com",
54+
},
55+
{
56+
name: "one good host and one bad host generates cert for only good host",
57+
hosts: []string{"---.example.com", "def.example.com"},
58+
expectedErr: "x509: certificate is valid for def.example.com, not ---.example.com",
59+
},
60+
}
61+
62+
var serverKey, serverCert bytes.Buffer
63+
64+
for _, tc := range tests {
65+
t.Run(tc.name, func(t *testing.T) {
66+
serverCert.Reset()
67+
serverKey.Reset()
68+
// Test the function generateCACert. We can only test normative function
69+
// and hostnames, everything else is hardcoded.
70+
err := generateCACert(tc.hosts, &serverKey, &serverCert)
71+
require.NoError(t, err, "unexpected error generating RSA certificate")
72+
73+
// Test that the CA certificate is decodable, parseable, and has the configured hostname/s.
74+
block, _ := pem.Decode(serverCert.Bytes())
75+
if block == nil {
76+
require.FailNow(t, "failed to decode PEM block containing cert")
77+
}
78+
if block.Type == "CERTIFICATE" {
79+
cert, err := x509.ParseCertificate(block.Bytes)
80+
require.NoError(t, err, "failed to parse certificate")
81+
for _, h := range tc.hosts {
82+
if err = cert.VerifyHostname(h); err != nil {
83+
require.EqualValues(t, tc.expectedErr, err.Error(), "certificate verification failed")
84+
} else if len(tc.hosts) < 2 && err == nil && tc.expectedErr != "" {
85+
require.EqualValues(t, tc.expectedErr, nil, "expected an error but certification verification succeeded")
86+
}
87+
}
88+
}
89+
// Test that the server key is decodable and parseable.
90+
block, _ = pem.Decode(serverKey.Bytes())
91+
if block == nil {
92+
require.FailNow(t, "failed to decode PEM block containing public key")
93+
}
94+
if block.Type == "RSA PRIVATE KEY" {
95+
_, err := x509.ParsePKCS1PrivateKey(block.Bytes)
96+
require.NoError(t, err, "failed to parse key")
97+
}
98+
})
99+
}
100+
}

conformance/utils/roundtripper/roundtripper.go

+11
Original file line numberDiff line numberDiff line change
@@ -221,6 +221,17 @@ func (d *DefaultRoundTripper) defaultRoundTrip(request Request, transport http.R
221221

222222
resp, err := client.Do(req)
223223
if err != nil {
224+
if d.Debug {
225+
var dump []byte
226+
if resp != nil {
227+
dump, err = httputil.DumpResponse(resp, true)
228+
if err != nil {
229+
return nil, nil, err
230+
}
231+
tlog.Logf(request.T, "Error sending request:\n%s\n\n", formatDump(dump, "< "))
232+
}
233+
tlog.Log(request.T, "Error sending request: no response\n")
234+
}
224235
return nil, nil, err
225236
}
226237
defer resp.Body.Close()

0 commit comments

Comments
 (0)