@@ -3,7 +3,6 @@ package csr
33import (
44 "crypto/x509"
55 "crypto/x509/pkix"
6- "fmt"
76 "net/url"
87 "testing"
98 "time"
@@ -268,16 +267,20 @@ func TestCertificate_validateCSR(t *testing.T) {
268267 wantErr bool
269268 }{
270269 {
271- name : "empty" ,
270+ name : "empty csr " ,
272271 fields : fields {
273- SignerName : certv1 .KubeletServingSignerName ,
272+ v1 : & certv1.CertificateSigningRequest {
273+ Spec : certv1.CertificateSigningRequestSpec {},
274+ },
274275 },
275276 wantErr : true ,
276277 },
277278 {
278279 name : "empty signer" ,
279280 fields : fields {
280- SignerName : "" ,
281+ v1 : & certv1.CertificateSigningRequest {
282+ Spec : certv1.CertificateSigningRequestSpec {},
283+ },
281284 },
282285 args : args {
283286 csr : & x509.CertificateRequest {},
@@ -287,7 +290,11 @@ func TestCertificate_validateCSR(t *testing.T) {
287290 {
288291 name : "no validation" ,
289292 fields : fields {
290- SignerName : certv1 .KubeAPIServerClientKubeletSignerName ,
293+ v1 : & certv1.CertificateSigningRequest {
294+ Spec : certv1.CertificateSigningRequestSpec {
295+ SignerName : certv1 .KubeAPIServerClientKubeletSignerName ,
296+ },
297+ },
291298 },
292299 args : args {
293300 csr : & x509.CertificateRequest {},
@@ -296,7 +303,11 @@ func TestCertificate_validateCSR(t *testing.T) {
296303 {
297304 name : "empty sn for serving CSR" ,
298305 fields : fields {
299- SignerName : certv1 .KubeletServingSignerName ,
306+ v1 : & certv1.CertificateSigningRequest {
307+ Spec : certv1.CertificateSigningRequestSpec {
308+ SignerName : certv1 .KubeletServingSignerName ,
309+ },
310+ },
300311 },
301312 args : args {
302313 csr : & x509.CertificateRequest {},
@@ -306,7 +317,11 @@ func TestCertificate_validateCSR(t *testing.T) {
306317 {
307318 name : "not empty URI for serving CSR" ,
308319 fields : fields {
309- SignerName : certv1 .KubeletServingSignerName ,
320+ v1 : & certv1.CertificateSigningRequest {
321+ Spec : certv1.CertificateSigningRequestSpec {
322+ SignerName : certv1 .KubeletServingSignerName ,
323+ },
324+ },
310325 },
311326 args : args {
312327 csr : & x509.CertificateRequest {
@@ -323,7 +338,11 @@ func TestCertificate_validateCSR(t *testing.T) {
323338 {
324339 name : "not empty Emails for serving CSR" ,
325340 fields : fields {
326- SignerName : certv1 .KubeletServingSignerName ,
341+ v1 : & certv1.CertificateSigningRequest {
342+ Spec : certv1.CertificateSigningRequestSpec {
343+ SignerName : certv1 .KubeletServingSignerName ,
344+ },
345+ },
327346 },
328347 args : args {
329348 csr : & x509.CertificateRequest {
@@ -340,7 +359,11 @@ func TestCertificate_validateCSR(t *testing.T) {
340359 {
341360 name : "empty Usages for serving CSR" ,
342361 fields : fields {
343- SignerName : certv1 .KubeletServingSignerName ,
362+ v1 : & certv1.CertificateSigningRequest {
363+ Spec : certv1.CertificateSigningRequestSpec {
364+ SignerName : certv1 .KubeletServingSignerName ,
365+ },
366+ },
344367 },
345368 args : args {
346369 csr : & x509.CertificateRequest {
@@ -355,8 +378,12 @@ func TestCertificate_validateCSR(t *testing.T) {
355378 {
356379 name : "wrong usages for serving CSR" ,
357380 fields : fields {
358- SignerName : certv1 .KubeletServingSignerName ,
359- Usages : []string {fmt .Sprintf ("%v" , certv1 .UsageServerAuth ), "wrong" },
381+ v1 : & certv1.CertificateSigningRequest {
382+ Spec : certv1.CertificateSigningRequestSpec {
383+ SignerName : certv1 .KubeletServingSignerName ,
384+ Usages : []certv1.KeyUsage {certv1 .UsageServerAuth , "wrong" },
385+ },
386+ },
360387 },
361388 args : args {
362389 csr : & x509.CertificateRequest {
0 commit comments