Add new unsupported feature to exclude root CA assert in Vault issuer e2e-tests
Signed-off-by: Erik Godding Boye <egboye@gmail.com>
This commit is contained in:
parent
1919e4cb3f
commit
5d21410156
@ -128,6 +128,10 @@ const (
|
||||
OnlySAN = "OnlySAN"
|
||||
|
||||
// SaveCAToSecret denotes whether the target issuer returns a CA
|
||||
// certificate which can be stored in the CA.crt field of the Secret.
|
||||
// certificate which can be stored in the ca.crt field of the Secret.
|
||||
SaveCAToSecret = "SaveCAToSecret"
|
||||
|
||||
// SaveRootCAToSecret denotes whether the CA certificate is expected to
|
||||
// represent a root CA (sub-feature of SaveCAToSecret)
|
||||
SaveRootCAToSecret = "SaveRootCAToSecret"
|
||||
)
|
||||
|
||||
@ -72,7 +72,9 @@ func (h *Helper) ValidationSetForUnsupportedFeatureSet(fs featureset.FeatureSet)
|
||||
|
||||
if !fs.Contains(featureset.SaveCAToSecret) {
|
||||
out = append(out, validations.ExpectCorrectTrustChain)
|
||||
out = append(out, validations.ExpectCARootCertificate)
|
||||
if !fs.Contains(featureset.SaveRootCAToSecret) {
|
||||
out = append(out, validations.ExpectCARootCertificate)
|
||||
}
|
||||
}
|
||||
|
||||
return out
|
||||
|
||||
@ -43,6 +43,7 @@ const (
|
||||
var _ = framework.ConformanceDescribe("Certificates", func() {
|
||||
var unsupportedFeatures = featureset.NewFeatureSet(
|
||||
featureset.KeyUsagesFeature,
|
||||
featureset.SaveRootCAToSecret,
|
||||
)
|
||||
|
||||
provisioner := new(vaultAppRoleProvisioner)
|
||||
|
||||
@ -15,6 +15,7 @@ go_library(
|
||||
"//test/e2e/framework:go_default_library",
|
||||
"//test/e2e/framework/addon:go_default_library",
|
||||
"//test/e2e/framework/addon/vault:go_default_library",
|
||||
"//test/e2e/framework/helper/featureset:go_default_library",
|
||||
"//test/e2e/util:go_default_library",
|
||||
"//test/unit/gen:go_default_library",
|
||||
"@com_github_onsi_ginkgo//:go_default_library",
|
||||
|
||||
@ -31,6 +31,7 @@ import (
|
||||
"github.com/jetstack/cert-manager/test/e2e/framework"
|
||||
"github.com/jetstack/cert-manager/test/e2e/framework/addon"
|
||||
vaultaddon "github.com/jetstack/cert-manager/test/e2e/framework/addon/vault"
|
||||
"github.com/jetstack/cert-manager/test/e2e/framework/helper/featureset"
|
||||
"github.com/jetstack/cert-manager/test/e2e/util"
|
||||
"github.com/jetstack/cert-manager/test/unit/gen"
|
||||
)
|
||||
@ -171,7 +172,8 @@ func runVaultAppRoleTests(issuerKind string) {
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
By("Validating the issued Certificate...")
|
||||
err = f.Helper().ValidateCertificate(f.Namespace.Name, certificateName)
|
||||
unsupportedFeatures := featureset.NewFeatureSet(featureset.SaveRootCAToSecret)
|
||||
err = f.Helper().ValidateCertificate(f.Namespace.Name, certificateName, f.Helper().ValidationSetForUnsupportedFeatureSet(unsupportedFeatures)...)
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
})
|
||||
@ -266,7 +268,8 @@ func runVaultAppRoleTests(issuerKind string) {
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
By("Validating the issued Certificate...")
|
||||
err = f.Helper().ValidateCertificate(f.Namespace.Name, certificateName)
|
||||
unsupportedFeatures := featureset.NewFeatureSet(featureset.SaveRootCAToSecret)
|
||||
err = f.Helper().ValidateCertificate(f.Namespace.Name, certificateName, f.Helper().ValidationSetForUnsupportedFeatureSet(unsupportedFeatures)...)
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
// Vault subtract 30 seconds to the NotBefore date.
|
||||
|
||||
@ -30,6 +30,7 @@ import (
|
||||
"github.com/jetstack/cert-manager/test/e2e/framework"
|
||||
"github.com/jetstack/cert-manager/test/e2e/framework/addon"
|
||||
vaultaddon "github.com/jetstack/cert-manager/test/e2e/framework/addon/vault"
|
||||
"github.com/jetstack/cert-manager/test/e2e/framework/helper/featureset"
|
||||
"github.com/jetstack/cert-manager/test/e2e/util"
|
||||
"github.com/jetstack/cert-manager/test/unit/gen"
|
||||
)
|
||||
@ -169,7 +170,8 @@ func runVaultCustomAppRoleTests(issuerKind string) {
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
By("Validating the issued Certificate...")
|
||||
err = f.Helper().ValidateCertificate(f.Namespace.Name, certificateName)
|
||||
unsupportedFeatures := featureset.NewFeatureSet(featureset.SaveRootCAToSecret)
|
||||
err = f.Helper().ValidateCertificate(f.Namespace.Name, certificateName, f.Helper().ValidationSetForUnsupportedFeatureSet(unsupportedFeatures)...)
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
})
|
||||
}
|
||||
|
||||
Loading…
Reference in New Issue
Block a user