Skip to content
This repository was archived by the owner on Oct 11, 2024. It is now read-only.

Add security policies for Tyk OSS#536

Merged
singhpr merged 55 commits intomasterfrom
TT-3677/security-policies
Jan 9, 2023
Merged

Add security policies for Tyk OSS#536
singhpr merged 55 commits intomasterfrom
TT-3677/security-policies

Conversation

@buraksekili
Copy link

@buraksekili buraksekili commented Nov 25, 2022

Description

This PR adds support for Security Policies API in CE mode. This API was introduced in Tyk GW version 4.1.
With this change, users will be able to manage Policy objects in CE mode.

Related Issue

Resolves #357
https://tyktech.atlassian.net/browse/TT-3677

Motivation and Context

Test Coverage For This Change

  1. Deploy CE testing environment
make boot-ce IMG=tykio/tyk-operator:test
  1. Create an ApiDefinition CR
kubectl apply -f ./config/samples/httpbin_protected.yaml
  1. Create a SecurityPolicy that will access ApiDefinition created above
kubectl apply -f ./config/samples/httpbin_protected_policy.yaml
  1. Do CRUD operations on Security Policy and verify corresponding changes on resources.

Screenshots (if appropriate)

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)

Checklist

  • Make sure you are requesting to pull a topic/feature/bugfix branch (right side). If PRing from your fork, don't come from your master!
  • Make sure you are making a pull request against our master branch (left side). Also, it would be best if you started your change off our latest master.
  • Make sure you are updating CHANGELOG.md based on your changes.
  • My change requires a change to the documentation.
    • If you've changed APIs, describe what needs to be updated in the documentation.
  • I have updated the documentation accordingly.
  • If you've changed API models, please update CRDs.
    • make manifests
    • make helm
  • I have added tests to cover my changes.
  • All new and existing tests passed.
  • Check your code additions will not fail linting checks:
    • gofmt -s -w .
    • go vet ./...
    • golangci-lint run

Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
it will return SecurityPolicy spec.

Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
…gies/tyk-operator into TT-3695/fix-policy-migration
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
@caroltyk caroltyk added this to the v0.13.0 milestone Dec 6, 2022
@caroltyk
Copy link
Collaborator

caroltyk commented Dec 6, 2022

fix #357

…urityPolicy. Add new e2e tests cases for migration

Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Controller.

Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
…gies/tyk-operator into TT-3695/fix-policy-migration
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
…ison with already-defined function. Compare previous and new ID after restoring from drifts. Remove redundant conditions in wait.For() function

Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
…se to decide new Policy ID

Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
@sonarqubecloud
Copy link

sonarqubecloud bot commented Jan 6, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

0.0% 0.0% Coverage
0.0% 0.0% Duplication

@singhpr singhpr merged commit 3852b26 into master Jan 9, 2023
@singhpr singhpr deleted the TT-3677/security-policies branch January 9, 2023 05:32
buger pushed a commit that referenced this pull request May 22, 2024
* Add security policies for tyk oss

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update integration tests

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Add control over gw version for security policy tests

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Add if check to understand the existence of mongo id

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update CHANGELOG

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update current CR based on existing policy

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update create method of SecurityPolicy Reconciler. So that, from now on
it will return SecurityPolicy spec.

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* use CR's AccessRightsArray field instead of generating it

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* add initial e2e tests for securitypolicy controller

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* fix linter issue, add additional error checks for type assertions

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Add a logic to recover from unintended deletes from Dashboard for SecurityPolicy. Add new e2e tests cases for migration

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Fix issues on v3.2

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* generate random name for securitypolicy

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Wait for resource is updated properly

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Add new test cases to cover different scenarios of SecurityPolicy
Controller.

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* remove integration tests

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Merge upstream

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Revert changes and update tests accordingly

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Fix linter issue - remove extra new line

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Use unused StatusID in comparison function. Replace duplicated comparison with already-defined function. Compare previous and new ID after restoring from drifts. Remove redundant conditions in wait.For() function

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update tests cases to prevent direct comparison between IDs

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* remove parsepolicy function to decide policy. Instead, use API response to decide new Policy ID

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Remove redundant white space

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update tests for CE

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Rename helper functions

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Wait for until resources are created on Tyk

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Change comparison value for ID

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Add CHANGELOG entry for new changes

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update Policy documentation

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Run tests against Tyk v4.2

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Skip CE tests for Security Policies if the version is lower than 4.1

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Fix version check in integration tests

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update default Tyk version in e2e tests

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update log statement in e2e test

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Update reconciler logic

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Fix invalid assignment of TYK_VERSION env variable in CE mode.

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Randomize policy names in e2e tests

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* control test flow

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Rename variable according to feedback

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* remove additional reconciliation

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

* Remove redundant retries in e2e tests to  verify Api updates

Signed-off-by: Burak Sekili <buraksekili@gmail.com>

Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[TT-3677] Security Policies not implemented

4 participants