-
Notifications
You must be signed in to change notification settings - Fork 1.2k
/
Copy pathwebhook_integration_test.go
113 lines (101 loc) · 3.26 KB
/
webhook_integration_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
package webhook_test
import (
"context"
"fmt"
"time"
. "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/webhook"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
)
var _ = Describe("Webhook", func() {
var c client.Client
var obj *appsv1.Deployment
BeforeEach(func() {
Expect(cfg).NotTo(BeNil())
var err error
c, err = client.New(cfg, client.Options{})
Expect(err).NotTo(HaveOccurred())
obj = &appsv1.Deployment{
TypeMeta: metav1.TypeMeta{
APIVersion: "apps/v1",
Kind: "Deployment",
},
ObjectMeta: metav1.ObjectMeta{
Name: "test-deployment",
Namespace: "default",
},
Spec: appsv1.DeploymentSpec{
Selector: &metav1.LabelSelector{
MatchLabels: map[string]string{"foo": "bar"},
},
Template: corev1.PodTemplateSpec{
ObjectMeta: metav1.ObjectMeta{Labels: map[string]string{"foo": "bar"}},
Spec: corev1.PodSpec{
Containers: []corev1.Container{
{
Name: "nginx",
Image: "nginx",
},
},
},
},
},
}
})
Context("when running a webhook server with a manager", func() {
It("should reject create request for webhook that rejects all requests", func(done Done) {
m, err := manager.New(cfg, manager.Options{
Port: testenv.WebhookInstallOptions.LocalServingPort,
Host: testenv.WebhookInstallOptions.LocalServingHost,
CertDir: testenv.WebhookInstallOptions.LocalServingCertDir,
}) // we need manager here just to leverage manager.SetFields
Expect(err).NotTo(HaveOccurred())
server := m.GetWebhookServer()
server.Register("/failing", &webhook.Admission{Handler: &rejectingValidator{}})
ctx, cancel := context.WithCancel(context.Background())
go func() {
_ = server.Start(ctx)
}()
Eventually(func() bool {
err = c.Create(context.TODO(), obj)
return errors.ReasonForError(err) == metav1.StatusReason("Always denied")
}, 1*time.Second).Should(BeTrue())
cancel()
close(done)
})
})
Context("when running a webhook server without a manager ", func() {
It("should reject create request for webhook that rejects all requests", func(done Done) {
opts := webhook.Options{
Port: testenv.WebhookInstallOptions.LocalServingPort,
Host: testenv.WebhookInstallOptions.LocalServingHost,
CertDir: testenv.WebhookInstallOptions.LocalServingCertDir,
}
server, err := webhook.NewUnmanaged(opts)
Expect(err).NotTo(HaveOccurred())
server.Register("/failing", &webhook.Admission{Handler: &rejectingValidator{}})
ctx, cancel := context.WithCancel(context.Background())
go func() {
_ = server.Start(ctx)
}()
Eventually(func() bool {
err = c.Create(context.TODO(), obj)
return errors.ReasonForError(err) == metav1.StatusReason("Always denied")
}, 1*time.Second).Should(BeTrue())
cancel()
close(done)
})
})
})
type rejectingValidator struct {
}
func (v *rejectingValidator) Handle(ctx context.Context, req admission.Request) admission.Response {
return admission.Denied(fmt.Sprint("Always denied"))
}