forked from coreos/etcd-operator
-
Notifications
You must be signed in to change notification settings - Fork 0
/
tls_util.go
88 lines (79 loc) · 2.49 KB
/
tls_util.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
// Copyright 2017 The etcd-operator Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package e2eslow
import (
"fmt"
"io/ioutil"
"math/rand"
"os"
"testing"
api "github.com/coreos/etcd-operator/pkg/apis/etcd/v1beta2"
"github.com/coreos/etcd-operator/test/e2e/e2eutil"
"github.com/coreos/etcd-operator/test/e2e/framework"
)
func TLSTestCommon(t *testing.T, selfHosted bool) {
f := framework.Global
suffix := fmt.Sprintf("-%d", rand.Uint64())
clusterName := "tls-test" + suffix
memberPeerTLSSecret := "etcd-peer-tls" + suffix
memberClientTLSSecret := "etcd-server-tls" + suffix
operatorClientTLSSecret := "etcd-client-tls" + suffix
err := e2eutil.PreparePeerTLSSecret(clusterName, f.Namespace, memberPeerTLSSecret)
if err != nil {
t.Fatal(err)
}
certsDir, err := ioutil.TempDir("", "etcd-operator-tls-")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(certsDir)
err = e2eutil.PrepareClientTLSSecret(certsDir, clusterName, f.Namespace, memberClientTLSSecret, operatorClientTLSSecret)
if err != nil {
t.Fatal(err)
}
defer func() {
err := e2eutil.DeleteSecrets(f.KubeClient, f.Namespace, memberPeerTLSSecret, memberClientTLSSecret, operatorClientTLSSecret)
if err != nil {
t.Fatal(err)
}
}()
c := e2eutil.NewCluster("", 3)
c.Name = clusterName
c.Spec.TLS = &api.TLSPolicy{
Static: &api.StaticTLS{
Member: &api.MemberSecret{
PeerSecret: memberPeerTLSSecret,
ServerSecret: memberClientTLSSecret,
},
OperatorSecret: operatorClientTLSSecret,
},
}
if selfHosted {
c = e2eutil.ClusterWithSelfHosted(c, &api.SelfHostedPolicy{})
}
c, err = e2eutil.CreateCluster(t, f.CRClient, f.Namespace, c)
if err != nil {
t.Fatal(err)
}
defer func() {
if err := e2eutil.DeleteCluster(t, f.CRClient, f.KubeClient, c); err != nil {
t.Fatal(err)
}
}()
_, err = e2eutil.WaitUntilSizeReached(t, f.CRClient, 3, 6, c)
if err != nil {
t.Fatalf("failed to create 3 members etcd cluster: %v", err)
}
// TODO: use client key/certs to talk to secure etcd cluster.
}