Skip to content

Commit 64a5a57

Browse files
committed
Egress mtls test fix - WIP
1 parent b907278 commit 64a5a57

File tree

2 files changed

+28
-2
lines changed

2 files changed

+28
-2
lines changed

hack/tls-cert-gen/certs.go

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
package main
22

3+
import (
4+
v1 "k8s.io/api/core/v1"
5+
)
6+
37
// yamlSecret encapsulates all the data that we need to create the tls secrets
48
// that kubernetes needs as tls files.
59
//
@@ -16,7 +20,7 @@ type yamlSecret struct {
1620
symlinks []string
1721
valid bool
1822
templateData templateData
19-
secretType string
23+
secretType v1.SecretType
2024
usedIn []string
2125
}
2226

@@ -236,4 +240,20 @@ var yamlSecrets = []yamlSecret{
236240
"tests/suite/test_wildcard_tls_secret.py - subject info",
237241
},
238242
},
243+
244+
{
245+
secretName: "egress-tls-secret",
246+
fileName: "egress-tls-secret.yaml",
247+
templateData: templateData{
248+
country: []string{"IE"},
249+
organization: []string{"F5 NGINX"},
250+
organizationalUnit: []string{"NGINX Ingress Controller"},
251+
locality: []string{"Cork"},
252+
province: []string{"Cork"},
253+
commonName: "example.com",
254+
dnsNames: []string{"foo.bar.example.com", "*.example.com"},
255+
},
256+
valid: secretShouldHaveValidTLSCrt,
257+
symlinks: []string{},
258+
},
239259
}

hack/tls-cert-gen/tls-cert-gen.go

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ import (
1717
"path/filepath"
1818
"time"
1919

20+
"github.com/nginx/kubernetes-ingress/internal/configs"
21+
"github.com/nginx/kubernetes-ingress/internal/k8s/secrets"
2022
log "github.com/nginx/kubernetes-ingress/internal/logger"
2123
v1 "k8s.io/api/core/v1"
2224
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -252,12 +254,16 @@ func createYamlSecret(secret yamlSecret, isValid bool, tlsKeys *JITTLSKey) ([]by
252254
Type: v1.SecretTypeTLS,
253255
}
254256

257+
if secret.secretType == secrets.SecretTypeCA {
258+
s.Data[configs.CACrlKey] = s.Data[v1.TLSCertKey]
259+
}
260+
255261
if !isValid {
256262
s.Data[v1.TLSCertKey] = []byte(``)
257263
}
258264

259265
if secret.secretType != "" {
260-
s.Type = v1.SecretType(secret.secretType)
266+
s.Type = secret.secretType
261267
}
262268

263269
sb, err := yaml.Marshal(s)

0 commit comments

Comments
 (0)