talos/pkg/resources/secrets/api_test.go
Andrey Smirnov d8c2bca1b5 feat: reimplement apid certificate generation on top of COSI
This PR can be split into two parts:

* controllers
* apid binding into COSI world

Controllers
-----------

* `k8s.EndpointController` provides control plane endpoints on worker
nodes (it isn't required for now on control plane nodes)
* `secrets.RootController` now provides OS top-level secrets (CA cert)
and secret configuration
* `secrets.APIController` generates API secrets (certificates) in a bit
different way for workers and control plane nodes: controlplane nodes
generate directly, while workers reach out to `trustd` on control plane
nodes via `k8s.Endpoint` resource

apid Binding
------------

Resource `secrets.API` provides binding to protobuf by converting
itself back and forth to protobuf spec.

apid no longer receives machine configuration, instead it receives
gRPC-backed socket to access Resource API. apid watches `secrets.API`
resource, fetches certs and CA from it and uses that in its TLS
configuration.

Signed-off-by: Andrey Smirnov <smirnov.andrey@gmail.com>
2021-06-23 13:07:00 -07:00

46 lines
1.1 KiB
Go

// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
package secrets_test
import (
"testing"
"github.com/cosi-project/runtime/pkg/resource"
"github.com/cosi-project/runtime/pkg/resource/protobuf"
"github.com/stretchr/testify/require"
"github.com/talos-systems/crypto/x509"
"github.com/talos-systems/talos/pkg/resources/secrets"
)
func TestAPIProtobufMarshal(t *testing.T) {
r := secrets.NewAPI()
r.TypedSpec().CA = &x509.PEMEncodedCertificateAndKey{
Crt: []byte("foo"),
}
r.TypedSpec().Client = &x509.PEMEncodedCertificateAndKey{
Crt: []byte("bar"),
Key: []byte("baz"),
}
r.TypedSpec().Server = &x509.PEMEncodedCertificateAndKey{
Crt: []byte("car"),
Key: []byte("caz"),
}
protoR, err := protobuf.FromResource(r)
require.NoError(t, err)
marshaled, err := protoR.Marshal()
require.NoError(t, err)
protoR, err = protobuf.Unmarshal(marshaled)
require.NoError(t, err)
r2, err := protobuf.UnmarshalResource(protoR)
require.NoError(t, err)
require.True(t, resource.Equal(r, r2))
}