Commit 6cc6c1a1 authored by Geoff Simmons's avatar Geoff Simmons

Add an e2e test about deletion of a TLS Secret for a non-viking Ingress.

parent 2bf40a90
......@@ -157,4 +157,10 @@ cd ${MYPATH}/../examples/backend-config/
./verify.sh
./undeploy.sh
echo Ignore deletion of TLS Secrets for non-viking Ingresses
cd ${MYPATH}/e2e/deleteTLSsecret
./deploy.sh
./verify.sh
./undeploy.sh
exit 0
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: cafe-ingress-varnish
annotations:
kubernetes.io/ingress.class: "varnish"
spec:
tls:
- hosts:
- cafe.example.com
secretName: cafe-tls-secret
rules:
- host: cafe.example.com
http:
paths:
- path: /tea
backend:
serviceName: tea-svc
servicePort: 80
- path: /coffee
backend:
serviceName: coffee-svc
servicePort: 80
apiVersion: v1
kind: Secret
metadata:
name: cafe-tls-secret
data:
tls.crt: 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
tls.key: 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
type: kubernetes.io/tls
apiVersion: apps/v1
kind: Deployment
metadata:
name: coffee
spec:
replicas: 2
selector:
matchLabels:
app: coffee
template:
metadata:
labels:
app: coffee
spec:
containers:
- name: coffee
image: nginxdemos/hello:plain-text
ports:
- containerPort: 80
---
apiVersion: v1
kind: Service
metadata:
name: coffee-svc
spec:
ports:
- port: 80
targetPort: 80
protocol: TCP
name: http
selector:
app: coffee
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: tea
spec:
replicas: 3
selector:
matchLabels:
app: tea
template:
metadata:
labels:
app: tea
spec:
containers:
- name: tea
image: nginxdemos/hello:plain-text
ports:
- containerPort: 80
---
apiVersion: v1
kind: Service
metadata:
name: tea-svc
labels:
spec:
ports:
- port: 80
targetPort: 80
protocol: TCP
name: http
selector:
app: tea
#! /bin/bash -ex
kubectl create -f cafe-tls-secret.yaml
kubectl create -f cafe.yaml
kubectl create -f cafe-ingress.yaml
kubectl create -f other-tls-secret.yaml
kubectl create -f other-ingress.yaml
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: other-ingress
spec:
tls:
- hosts:
- other.example.com
secretName: other-tls-secret
rules:
- host: other.example.com
http:
paths:
- path: /this
backend:
serviceName: this-svc
servicePort: 80
- path: /that
backend:
serviceName: that-svc
servicePort: 80
apiVersion: v1
kind: Secret
metadata:
name: other-tls-secret
data:
tls.crt: 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
tls.key: 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
type: kubernetes.io/tls
#! /bin/bash -ex
kubectl delete -f other-ingress.yaml
kubectl delete -f cafe-ingress.yaml
kubectl delete -f cafe.yaml
kubectl delete -f cafe-tls-secret.yaml
echo "Waiting until varnish-ingress Pods are not ready"
JSONPATH='{range .items[*]}{@.metadata.name}:{range @.status.conditions[*]}{@.type}={@.status};{end}{end}'
N=0
until [ $N -ge 120 ]
do
if kubectl get pods -l app=varnish-ingress -o jsonpath="${JSONPATH}" | grep -q '\bReady=True\b'; then
sleep 10
N=$(( N + 10 ))
continue
fi
exit 0
done
echo "Giving up"
exit 1
#! /bin/bash -ex
# Long timeout to wait for the Secret to appear as a certificate on
# the Pods.
kubectl wait --timeout=5m pod -l app=varnish-ingress --for=condition=Ready
# Delete the TLS Secret not used by the Ingress for Varnish
kubectl delete -f other-tls-secret.yaml
# Parse the controller log for this line:
# TLS Secret default/other-tls-secret not specified by any Ingress for Varnish, ignoring
# Get the name of the controller Pod
CTLPOD=$(kubectl get pods -n kube-system -l app=varnish-ingress-controller -o jsonpath={.items[0].metadata.name})
kubectl logs -n kube-system $CTLPOD | grep -q 'TLS Secret default/other-tls-secret not specified by any Ingress for Varnish, ignoring'
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment