|
@@ -104,6 +104,7 @@ const (
|
|
|
secretName = "example-1"
|
|
secretName = "example-1"
|
|
|
testsecret = "test-secret"
|
|
testsecret = "test-secret"
|
|
|
fakeURL = "noop"
|
|
fakeURL = "noop"
|
|
|
|
|
+ errStore = "Azure.ValidateStore() error = %v, wantErr %v"
|
|
|
)
|
|
)
|
|
|
|
|
|
|
|
func getTagMap() map[string]*string {
|
|
func getTagMap() map[string]*string {
|
|
@@ -682,7 +683,7 @@ func makeValidFind() *esv1beta1.ExternalSecretFind {
|
|
|
|
|
|
|
|
func TestValidateStore(t *testing.T) {
|
|
func TestValidateStore(t *testing.T) {
|
|
|
type args struct {
|
|
type args struct {
|
|
|
- auth esv1beta1.AzureKVAuth
|
|
|
|
|
|
|
+ store *esv1beta1.SecretStore
|
|
|
}
|
|
}
|
|
|
tests := []struct {
|
|
tests := []struct {
|
|
|
name string
|
|
name string
|
|
@@ -690,23 +691,79 @@ func TestValidateStore(t *testing.T) {
|
|
|
wantErr bool
|
|
wantErr bool
|
|
|
}{
|
|
}{
|
|
|
{
|
|
{
|
|
|
|
|
+ name: "storeIsNil",
|
|
|
|
|
+ wantErr: true,
|
|
|
|
|
+ },
|
|
|
|
|
+ {
|
|
|
|
|
+ name: "specIsNil",
|
|
|
|
|
+ wantErr: true,
|
|
|
|
|
+ args: args{
|
|
|
|
|
+ store: &esv1beta1.SecretStore{},
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ {
|
|
|
|
|
+ name: "providerIsNil",
|
|
|
|
|
+ wantErr: true,
|
|
|
|
|
+ args: args{
|
|
|
|
|
+ store: &esv1beta1.SecretStore{
|
|
|
|
|
+ Spec: esv1beta1.SecretStoreSpec{},
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ {
|
|
|
|
|
+ name: "azureKVIsNil",
|
|
|
|
|
+ wantErr: true,
|
|
|
|
|
+ args: args{
|
|
|
|
|
+ store: &esv1beta1.SecretStore{
|
|
|
|
|
+ Spec: esv1beta1.SecretStoreSpec{
|
|
|
|
|
+ Provider: &esv1beta1.SecretStoreProvider{},
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ {
|
|
|
name: "empty auth",
|
|
name: "empty auth",
|
|
|
wantErr: false,
|
|
wantErr: false,
|
|
|
|
|
+ args: args{
|
|
|
|
|
+ store: &esv1beta1.SecretStore{
|
|
|
|
|
+ Spec: esv1beta1.SecretStoreSpec{
|
|
|
|
|
+ Provider: &esv1beta1.SecretStoreProvider{
|
|
|
|
|
+ AzureKV: &esv1beta1.AzureKVProvider{},
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
},
|
|
},
|
|
|
{
|
|
{
|
|
|
name: "empty client id",
|
|
name: "empty client id",
|
|
|
wantErr: false,
|
|
wantErr: false,
|
|
|
args: args{
|
|
args: args{
|
|
|
- auth: esv1beta1.AzureKVAuth{},
|
|
|
|
|
|
|
+ store: &esv1beta1.SecretStore{
|
|
|
|
|
+ Spec: esv1beta1.SecretStoreSpec{
|
|
|
|
|
+ Provider: &esv1beta1.SecretStoreProvider{
|
|
|
|
|
+ AzureKV: &esv1beta1.AzureKVProvider{
|
|
|
|
|
+ AuthSecretRef: &esv1beta1.AzureKVAuth{},
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
},
|
|
},
|
|
|
},
|
|
},
|
|
|
{
|
|
{
|
|
|
name: "invalid client id",
|
|
name: "invalid client id",
|
|
|
wantErr: true,
|
|
wantErr: true,
|
|
|
args: args{
|
|
args: args{
|
|
|
- auth: esv1beta1.AzureKVAuth{
|
|
|
|
|
- ClientID: &v1.SecretKeySelector{
|
|
|
|
|
- Namespace: pointer.StringPtr("invalid"),
|
|
|
|
|
|
|
+ store: &esv1beta1.SecretStore{
|
|
|
|
|
+ Spec: esv1beta1.SecretStoreSpec{
|
|
|
|
|
+ Provider: &esv1beta1.SecretStoreProvider{
|
|
|
|
|
+ AzureKV: &esv1beta1.AzureKVProvider{
|
|
|
|
|
+ AuthSecretRef: &esv1beta1.AzureKVAuth{
|
|
|
|
|
+ ClientID: &v1.SecretKeySelector{
|
|
|
|
|
+ Namespace: pointer.StringPtr("invalid"),
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
},
|
|
},
|
|
|
},
|
|
},
|
|
|
},
|
|
},
|
|
@@ -715,28 +772,32 @@ func TestValidateStore(t *testing.T) {
|
|
|
name: "invalid client secret",
|
|
name: "invalid client secret",
|
|
|
wantErr: true,
|
|
wantErr: true,
|
|
|
args: args{
|
|
args: args{
|
|
|
- auth: esv1beta1.AzureKVAuth{
|
|
|
|
|
- ClientSecret: &v1.SecretKeySelector{
|
|
|
|
|
- Namespace: pointer.StringPtr("invalid"),
|
|
|
|
|
|
|
+ store: &esv1beta1.SecretStore{
|
|
|
|
|
+ Spec: esv1beta1.SecretStoreSpec{
|
|
|
|
|
+ Provider: &esv1beta1.SecretStoreProvider{
|
|
|
|
|
+ AzureKV: &esv1beta1.AzureKVProvider{
|
|
|
|
|
+ AuthSecretRef: &esv1beta1.AzureKVAuth{
|
|
|
|
|
+ ClientSecret: &v1.SecretKeySelector{
|
|
|
|
|
+ Namespace: pointer.StringPtr("invalid"),
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
},
|
|
},
|
|
|
},
|
|
},
|
|
|
},
|
|
},
|
|
|
},
|
|
},
|
|
|
}
|
|
}
|
|
|
|
|
+
|
|
|
for _, tt := range tests {
|
|
for _, tt := range tests {
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
a := &Azure{}
|
|
a := &Azure{}
|
|
|
- store := &esv1beta1.SecretStore{
|
|
|
|
|
- Spec: esv1beta1.SecretStoreSpec{
|
|
|
|
|
- Provider: &esv1beta1.SecretStoreProvider{
|
|
|
|
|
- AzureKV: &esv1beta1.AzureKVProvider{
|
|
|
|
|
- AuthSecretRef: &tt.args.auth,
|
|
|
|
|
- },
|
|
|
|
|
- },
|
|
|
|
|
- },
|
|
|
|
|
- }
|
|
|
|
|
- if err := a.ValidateStore(store); (err != nil) != tt.wantErr {
|
|
|
|
|
- t.Errorf("Azure.ValidateStore() error = %v, wantErr %v", err, tt.wantErr)
|
|
|
|
|
|
|
+ if tt.name == "storeIsNil" {
|
|
|
|
|
+ if err := a.ValidateStore(nil); (err != nil) != tt.wantErr {
|
|
|
|
|
+ t.Errorf(errStore, err, tt.wantErr)
|
|
|
|
|
+ }
|
|
|
|
|
+ } else if err := a.ValidateStore(tt.args.store); (err != nil) != tt.wantErr {
|
|
|
|
|
+ t.Errorf(errStore, err, tt.wantErr)
|
|
|
}
|
|
}
|
|
|
})
|
|
})
|
|
|
}
|
|
}
|