Uploaded image for project: 'OpenShift Kueue'
  1. OpenShift Kueue
  2. OCPKUEUE-456

[Upstream] Add e2e tests for TLS profile validation

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • None
    • None

      Add end-to-end tests to verify TLS endpoints respect configured profiles.

      Test file to create:

      • test/e2e/tls_test.go

      Test scenarios:

      • Deploy Kueue with default TLS settings, verify Intermediate profile is used
      • Deploy Kueue with TLS 1.3 minimum, verify TLS 1.2 connections are rejected
      • Deploy Kueue with specific cipher suites, verify only those ciphers are accepted
      • Test metrics endpoint TLS configuration
      • Test webhook endpoint TLS configuration
      • Test visibility API endpoint TLS configuration (if VisibilityOnDemand feature enabled)

      Tools:

      • Use openssl s_client or similar TLS scanner to verify settings
      • Consider using testssl.sh or similar for comprehensive scanning

      Acceptance Criteria:

      • E2E tests verify TLS settings on all HTTPS endpoints
      • Tests run in CI pipeline
      • Tests cover default and custom TLS configurations

      Depends on: OCPKUEUE-455 (unit tests)

              harpatil@redhat.com Harshal Patil
              harpatil@redhat.com Harshal Patil
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: