Skip to content

Commit

Permalink
Do not try to update type of Secret in selfSignedCertProvider
Browse files Browse the repository at this point in the history
If a cluster used user provided certificate and created a Secret named
antrea-controller-tls of Opaque type, changing to use self-signed
certificate would fail because the type field is immutable.

To support switching the certificate provider, we don't try to update
the type of Secret if it already exists.

Signed-off-by: Quan Tian <quan.tian@broadcom.com>
  • Loading branch information
tnqn committed Apr 9, 2024
1 parent 19caf9c commit 2961d58
Show file tree
Hide file tree
Showing 2 changed files with 23 additions and 1 deletion.
5 changes: 4 additions & 1 deletion pkg/apiserver/certificate/selfsignedcert_provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -317,9 +317,11 @@ func (p *selfSignedCertProvider) saveCertKeyToSecret(secret *corev1.Secret, cert
if bytes.Equal(cert, secret.Data[corev1.TLSCertKey]) && bytes.Equal(key, secret.Data[corev1.TLSPrivateKeyKey]) {
return nil
}
secret.Type = corev1.SecretTypeTLS
// Do not update the existing Secret's type. Otherwise, the update would fail if it's not of type
// "kubernetes.io/tls" as the type field is immutable.
secret.Data[corev1.TLSCertKey] = cert
secret.Data[corev1.TLSPrivateKeyKey] = key
klog.InfoS("Updating Secret to persist self-signed cert", "secret", klog.KObj(secret))
_, err := p.client.CoreV1().Secrets(p.secretNamespace).Update(context.TODO(), secret, metav1.UpdateOptions{})
return err
}
Expand All @@ -331,6 +333,7 @@ func (p *selfSignedCertProvider) saveCertKeyToSecret(secret *corev1.Secret, cert
corev1.TLSPrivateKeyKey: key,
},
}
klog.InfoS("Creating Secret to persist self-signed cert", "secret", klog.KObj(secret))
_, err := p.client.CoreV1().Secrets(p.secretNamespace).Create(context.TODO(), caSecret, metav1.CreateOptions{})
return err
}
19 changes: 19 additions & 0 deletions pkg/apiserver/certificate/selfsignedcert_provider_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -168,6 +168,12 @@ func TestSelfSignedCertProviderRotate(t *testing.T) {
}, 5*time.Second, 100*time.Millisecond)
}

func copyAndMutateSecret(secret *corev1.Secret, mutator func(_ *corev1.Secret)) *corev1.Secret {
s := secret.DeepCopy()
mutator(s)
return s
}

func TestSelfSignedCertProviderRun(t *testing.T) {
t.Setenv(env.PodNamespaceEnvKey, testSecretNamespace)
testSecret := &corev1.Secret{
Expand Down Expand Up @@ -224,6 +230,19 @@ func TestSelfSignedCertProviderRun(t *testing.T) {
expectedCert: testOneYearCert2,
expectedKey: testOneYearKey2,
},
{
name: "should not update secret type when secret is opaque",
tlsSecretName: testSecretName,
existingSecret: copyAndMutateSecret(testSecret, func(s *corev1.Secret) {
s.Type = corev1.SecretTypeOpaque
}),
expectedSecret: copyAndMutateSecret(testSecret2, func(s *corev1.Secret) {
s.Type = corev1.SecretTypeOpaque
}),
minValidDuration: time.Hour * 24 * 370,
expectedCert: testOneYearCert2,
expectedKey: testOneYearKey2,
},
{
name: "should generate TLS and update secret when secret is empty",
tlsSecretName: testSecretName,
Expand Down

0 comments on commit 2961d58

Please sign in to comment.