|
| 1 | +""" |
| 2 | +Test for changing targetRef field in DNSPolicy & TLSPolicy |
| 3 | +""" |
| 4 | + |
| 5 | +import pytest |
| 6 | + |
| 7 | +from testsuite.gateway import TLSGatewayListener |
| 8 | +from testsuite.gateway.gateway_api.gateway import KuadrantGateway |
| 9 | + |
| 10 | +pytestmark = [pytest.mark.kuadrant_only, pytest.mark.dnspolicy, pytest.mark.tlspolicy] |
| 11 | + |
| 12 | + |
| 13 | +@pytest.fixture(scope="module") |
| 14 | +def gateway(request, cluster, blame, wildcard_domain, module_label): |
| 15 | + """Create Gateway 1 with TLSGatewayListener""" |
| 16 | + gateway_name = blame("gw") |
| 17 | + gw = KuadrantGateway.create_instance( |
| 18 | + cluster, |
| 19 | + gateway_name, |
| 20 | + {"app": module_label}, |
| 21 | + ) |
| 22 | + gw.add_listener(TLSGatewayListener(hostname=wildcard_domain, gateway_name=gateway_name)) |
| 23 | + request.addfinalizer(gw.delete) |
| 24 | + gw.commit() |
| 25 | + gw.wait_for_ready() |
| 26 | + return gw |
| 27 | + |
| 28 | + |
| 29 | +@pytest.fixture(scope="module") |
| 30 | +def gateway2(request, cluster, blame, wildcard_domain2, module_label): |
| 31 | + """Create Gateway 2 with TLSGatewayListener""" |
| 32 | + gateway_name = blame("gw2") |
| 33 | + gw = KuadrantGateway.create_instance( |
| 34 | + cluster, |
| 35 | + gateway_name, |
| 36 | + {"app": module_label}, |
| 37 | + ) |
| 38 | + gw.add_listener(TLSGatewayListener(hostname=wildcard_domain2, gateway_name=gateway_name)) |
| 39 | + request.addfinalizer(gw.delete) |
| 40 | + gw.commit() |
| 41 | + gw.wait_for_ready() |
| 42 | + return gw |
| 43 | + |
| 44 | + |
| 45 | +def test_update_policies_target_ref( |
| 46 | + route2, tls_policy, gateway, gateway2, client, dns_policy, change_target_ref, hostname2 |
| 47 | +): # pylint: disable=unused-argument |
| 48 | + """Test updating the targetRef of both TLSPolicy and DNSPolicy from Gateway 1 to Gateway 2""" |
| 49 | + assert gateway.wait_until(lambda obj: obj.is_affected_by(tls_policy)) |
| 50 | + assert gateway.wait_until(lambda obj: obj.is_affected_by(dns_policy)) |
| 51 | + assert gateway2.wait_until(lambda obj: not obj.is_affected_by(tls_policy)) |
| 52 | + assert gateway2.wait_until(lambda obj: not obj.is_affected_by(dns_policy)) |
| 53 | + |
| 54 | + response = client.get("/get") |
| 55 | + assert not response.has_cert_verify_error() |
| 56 | + assert not response.has_dns_error() |
| 57 | + assert response.status_code == 200 |
| 58 | + |
| 59 | + change_target_ref(tls_policy, gateway2) |
| 60 | + change_target_ref(dns_policy, gateway2) |
| 61 | + |
| 62 | + assert gateway.wait_until(lambda obj: not obj.is_affected_by(tls_policy)) |
| 63 | + assert gateway.wait_until(lambda obj: not obj.is_affected_by(dns_policy)) |
| 64 | + assert gateway2.wait_until(lambda obj: obj.is_affected_by(tls_policy)) |
| 65 | + assert gateway2.wait_until(lambda obj: obj.is_affected_by(dns_policy)) |
| 66 | + |
| 67 | + client2 = hostname2.client() |
| 68 | + |
| 69 | + response = client2.get("/get") |
| 70 | + assert not response.has_cert_verify_error() |
| 71 | + assert not response.has_dns_error() |
| 72 | + assert response.status_code == 200 |
| 73 | + |
| 74 | + client2.close() |
0 commit comments