/* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package vault import ( "bytes" "context" "encoding/json" "errors" "fmt" "io/ioutil" "net/http" "testing" "github.com/crossplane/crossplane-runtime/pkg/test" "github.com/google/go-cmp/cmp" vault "github.com/hashicorp/vault/api" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" kclient "sigs.k8s.io/controller-runtime/pkg/client" esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1" esmeta "github.com/external-secrets/external-secrets/apis/meta/v1" "github.com/external-secrets/external-secrets/pkg/provider/vault/fake" ) const ( tokenSecretName = "example-secret-token" secretDataString = "some-creds" ) var ( secretStorePath = "secret" ) func makeValidSecretStoreWithVersion(v esv1beta1.VaultKVStoreVersion) *esv1beta1.SecretStore { return &esv1beta1.SecretStore{ ObjectMeta: metav1.ObjectMeta{ Name: "vault-store", Namespace: "default", }, Spec: esv1beta1.SecretStoreSpec{ Provider: &esv1beta1.SecretStoreProvider{ Vault: &esv1beta1.VaultProvider{ Server: "vault.example.com", Path: &secretStorePath, Version: v, Auth: esv1beta1.VaultAuth{ Kubernetes: &esv1beta1.VaultKubernetesAuth{ Path: "kubernetes", Role: "kubernetes-auth-role", ServiceAccountRef: &esmeta.ServiceAccountSelector{ Name: "example-sa", }, }, }, }, }, }, } } func makeValidSecretStore() *esv1beta1.SecretStore { return makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2) } func makeValidSecretStoreWithCerts() *esv1beta1.SecretStore { return &esv1beta1.SecretStore{ ObjectMeta: metav1.ObjectMeta{ Name: "vault-store", Namespace: "default", }, Spec: esv1beta1.SecretStoreSpec{ Provider: &esv1beta1.SecretStoreProvider{ Vault: &esv1beta1.VaultProvider{ Server: "vault.example.com", Path: &secretStorePath, Version: esv1beta1.VaultKVStoreV2, Auth: esv1beta1.VaultAuth{ Cert: &esv1beta1.VaultCertAuth{ ClientCert: esmeta.SecretKeySelector{ Name: "tls-auth-certs", Key: "tls.crt", }, SecretRef: esmeta.SecretKeySelector{ Name: "tls-auth-certs", Key: "tls.key", }, }, }, }, }, }, } } func makeValidSecretStoreWithK8sCerts(isSecret bool) *esv1beta1.SecretStore { store := makeSecretStore() caProvider := &esv1beta1.CAProvider{ Name: "vault-cert", Key: "cert", } if isSecret { caProvider.Type = "Secret" } else { caProvider.Type = "ConfigMap" } store.Spec.Provider.Vault.CAProvider = caProvider return store } func makeInvalidClusterSecretStoreWithK8sCerts() *esv1beta1.ClusterSecretStore { return &esv1beta1.ClusterSecretStore{ TypeMeta: metav1.TypeMeta{ Kind: "ClusterSecretStore", }, ObjectMeta: metav1.ObjectMeta{ Name: "vault-store", Namespace: "default", }, Spec: esv1beta1.SecretStoreSpec{ Provider: &esv1beta1.SecretStoreProvider{ Vault: &esv1beta1.VaultProvider{ Server: "vault.example.com", Path: &secretStorePath, Version: "v2", Auth: esv1beta1.VaultAuth{ Kubernetes: &esv1beta1.VaultKubernetesAuth{ Path: "kubernetes", Role: "kubernetes-auth-role", ServiceAccountRef: &esmeta.ServiceAccountSelector{ Name: "example-sa", }, }, }, CAProvider: &esv1beta1.CAProvider{ Name: "vault-cert", Key: "cert", Type: "Secret", }, }, }, }, } } type secretStoreTweakFn func(s *esv1beta1.SecretStore) func makeSecretStore(tweaks ...secretStoreTweakFn) *esv1beta1.SecretStore { store := makeValidSecretStore() for _, fn := range tweaks { fn(store) } return store } func newVaultResponse(data *vault.Secret) *vault.Response { jsonData, _ := json.Marshal(data) return &vault.Response{ Response: &http.Response{ Body: ioutil.NopCloser(bytes.NewReader(jsonData)), }, } } func newVaultResponseWithData(data map[string]interface{}) *vault.Response { return newVaultResponse(&vault.Secret{ Data: data, }) } func newVaultTokenIDResponse(token string) *vault.Response { return newVaultResponseWithData(map[string]interface{}{ "id": token, }) } type args struct { newClientFunc func(c *vault.Config) (Client, error) store esv1beta1.GenericStore kube kclient.Client ns string } type want struct { err error } type testCase struct { reason string args args want want } func clientWithLoginMock(c *vault.Config) (Client, error) { return &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultTokenIDResponse("test-token"), nil, func(got *vault.Request) error { return nil }), MockSetToken: fake.NewSetTokenFn(), }, nil } func kubeMockWithSecretTokenAndServiceAcc(obj kclient.Object) error { if o, ok := obj.(*corev1.ServiceAccount); ok { o.Secrets = []corev1.ObjectReference{ { Name: tokenSecretName, }, } return nil } if o, ok := obj.(*corev1.Secret); ok { o.Data = map[string][]byte{ "token": []byte(secretDataString), } return nil } return nil } func TestNewVault(t *testing.T) { errBoom := errors.New("boom") secretClientKey := []byte(`-----BEGIN RSA PRIVATE KEY----- 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 -----END RSA PRIVATE KEY-----`) clientCrt := []byte(`-----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE----- `) secretData := []byte(secretDataString) cases := map[string]testCase{ "InvalidVaultStore": { reason: "Should return error if given an invalid vault store.", args: args{ store: &esv1beta1.SecretStore{}, }, want: want{ err: errors.New(errVaultStore), }, }, "AddVaultStoreCertsError": { reason: "Should return error if given an invalid CA certificate.", args: args{ store: makeSecretStore(func(s *esv1beta1.SecretStore) { s.Spec.Provider.Vault.CABundle = []byte("badcertdata") }), }, want: want{ err: errors.New(errVaultCert), }, }, "VaultAuthFormatError": { reason: "Should return error if no valid authentication method is given.", args: args{ store: makeSecretStore(func(s *esv1beta1.SecretStore) { s.Spec.Provider.Vault.Auth = esv1beta1.VaultAuth{} }), }, want: want{ err: errors.New(errAuthFormat), }, }, "GetKubeServiceAccountError": { reason: "Should return error if fetching kubernetes secret fails.", args: args{ store: makeSecretStore(), kube: &test.MockClient{ MockGet: test.NewMockGetFn(errBoom), }, }, want: want{ err: fmt.Errorf(errGetKubeSA, "example-sa", errBoom), }, }, "GetKubeSecretError": { reason: "Should return error if fetching kubernetes secret fails.", args: args{ store: makeSecretStore(func(s *esv1beta1.SecretStore) { s.Spec.Provider.Vault.Auth.Kubernetes.ServiceAccountRef = nil s.Spec.Provider.Vault.Auth.Kubernetes.SecretRef = &esmeta.SecretKeySelector{ Name: "vault-secret", Key: "key", } }), kube: &test.MockClient{ MockGet: test.NewMockGetFn(errBoom), }, }, want: want{ err: fmt.Errorf(errGetKubeSecret, "vault-secret", errBoom), }, }, "SuccessfulVaultStore": { reason: "Should return a Vault provider successfully", args: args{ store: makeSecretStore(), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc), }, newClientFunc: func(c *vault.Config) (Client, error) { return &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultTokenIDResponse("test-token"), nil, func(got *vault.Request) error { kubeRole := makeValidSecretStore().Spec.Provider.Vault.Auth.Kubernetes.Role want := kubeParameters(kubeRole, string(secretData)) if diff := cmp.Diff(want, got.Obj); diff != "" { t.Errorf("RawRequestWithContext(...): -want, +got:\n%s", diff) } return nil }), MockSetToken: fake.NewSetTokenFn(), MockToken: fake.NewTokenFn(""), MockClearToken: fake.NewClearTokenFn(), }, nil }, }, want: want{ err: nil, }, }, "SuccessfulVaultStoreWithCertAuth": { reason: "Should return a Vault provider successfully", args: args{ store: makeValidSecretStoreWithCerts(), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error { if o, ok := obj.(*corev1.Secret); ok { o.Data = map[string][]byte{ "tls.key": secretClientKey, "tls.crt": clientCrt, } return nil } return nil }), }, newClientFunc: clientWithLoginMock, }, want: want{ err: nil, }, }, "SuccessfulVaultStoreWithK8sCertSecret": { reason: "Should return a Vault prodvider with the cert from k8s", args: args{ store: makeValidSecretStoreWithK8sCerts(true), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error { if o, ok := obj.(*corev1.Secret); ok { o.Data = map[string][]byte{ "cert": clientCrt, "token": secretData, } return nil } if o, ok := obj.(*corev1.ServiceAccount); ok { o.Secrets = []corev1.ObjectReference{ { Name: tokenSecretName, }, } return nil } return nil }), }, newClientFunc: clientWithLoginMock, }, want: want{ err: nil, }, }, "GetCertNamespaceMissingError": { reason: "Should return an error if namespace is missing and is a ClusterSecretStore", args: args{ store: makeInvalidClusterSecretStoreWithK8sCerts(), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc), }, }, want: want{ err: errors.New(errCANamespace), }, }, "GetCertSecretKeyMissingError": { reason: "Should return an error if the secret key is missing", args: args{ store: makeValidSecretStoreWithK8sCerts(true), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc), }, newClientFunc: clientWithLoginMock, }, want: want{ err: fmt.Errorf(errVaultCert, errors.New(`cannot find secret data for key: "cert"`)), }, }, "SuccessfulVaultStoreWithK8sCertConfigMap": { reason: "Should return a Vault prodvider with the cert from k8s", args: args{ store: makeValidSecretStoreWithK8sCerts(false), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error { if o, ok := obj.(*corev1.ConfigMap); ok { o.Data = map[string]string{ "cert": string(clientCrt), } return nil } if o, ok := obj.(*corev1.ServiceAccount); ok { o.Secrets = []corev1.ObjectReference{ { Name: tokenSecretName, }, } return nil } if o, ok := obj.(*corev1.Secret); ok { o.Data = map[string][]byte{ "token": secretData, } return nil } return nil }), }, newClientFunc: clientWithLoginMock, }, want: want{ err: nil, }, }, "GetCertConfigMapMissingError": { reason: "Should return an error if the config map key is missing", args: args{ store: makeValidSecretStoreWithK8sCerts(false), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error { if o, ok := obj.(*corev1.ServiceAccount); ok { o.Secrets = []corev1.ObjectReference{ { Name: tokenSecretName, }, } return nil } if o, ok := obj.(*corev1.Secret); ok { o.Data = map[string][]byte{ "token": secretData, } return nil } return nil }), }, newClientFunc: clientWithLoginMock, }, want: want{ err: fmt.Errorf(errConfigMapFmt, "cert"), }, }, "GetCertificateFormatError": { reason: "Should return error if client certificate is in wrong format.", args: args{ store: makeValidSecretStoreWithCerts(), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error { if o, ok := obj.(*corev1.Secret); ok { o.Data = map[string][]byte{ "tls.key": secretClientKey, "tls.crt": []byte("cert with mistak"), } return nil } return nil }), }, newClientFunc: clientWithLoginMock, }, want: want{ err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in certificate input"), }, }, "GetKeyFormatError": { reason: "Should return error if client key is in wrong format.", args: args{ store: makeValidSecretStoreWithCerts(), kube: &test.MockClient{ MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error { if o, ok := obj.(*corev1.Secret); ok { o.Data = map[string][]byte{ "tls.key": []byte("key with mistake"), "tls.crt": clientCrt, } return nil } return nil }), }, newClientFunc: clientWithLoginMock, }, want: want{ err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in key input"), }, }, } for name, tc := range cases { t.Run(name, func(t *testing.T) { vaultTest(t, name, tc) }) } } func vaultTest(t *testing.T, name string, tc testCase) { conn := &connector{ newVaultClient: tc.args.newClientFunc, } if tc.args.newClientFunc == nil { conn.newVaultClient = newVaultClient } _, err := conn.NewClient(context.Background(), tc.args.store, tc.args.kube, tc.args.ns) if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" { t.Errorf("\n%s\nvault.New(...): -want error, +got error:\n%s", tc.reason, diff) } } func TestGetSecret(t *testing.T) { errBoom := errors.New("boom") secret := map[string]interface{}{ "access_key": "access_key", "access_secret": "access_secret", } secretWithNilVal := map[string]interface{}{ "access_key": "access_key", "access_secret": "access_secret", "token": nil, } secretWithNestedVal := map[string]interface{}{ "access_key": "access_key", "access_secret": "access_secret", "nested": map[string]string{ "foo": "oke", }, } type args struct { store *esv1beta1.VaultProvider kube kclient.Client vClient Client ns string data esv1beta1.ExternalSecretDataRemoteRef } type want struct { err error val []byte } cases := map[string]struct { reason string args args want want }{ "ReadSecret": { reason: "Should return the secret with property", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault, data: esv1beta1.ExternalSecretDataRemoteRef{ Property: "access_key", }, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData(secret), nil, ), }, }, want: want{ err: nil, val: []byte("access_key"), }, }, "ReadSecretWithNil": { reason: "Should return the secret with property if it has a nil val", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault, data: esv1beta1.ExternalSecretDataRemoteRef{ Property: "access_key", }, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData(secretWithNilVal), nil, ), }, }, want: want{ err: nil, val: []byte("access_key"), }, }, "ReadSecretWithoutProperty": { reason: "Should return the json encoded secret without property", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault, data: esv1beta1.ExternalSecretDataRemoteRef{}, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData(secret), nil, ), }, }, want: want{ err: nil, val: []byte(`{"access_key":"access_key","access_secret":"access_secret"}`), }, }, "ReadSecretWithNestedValue": { reason: "Should return a nested property", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault, data: esv1beta1.ExternalSecretDataRemoteRef{ Property: "nested.foo", }, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData(secretWithNestedVal), nil, ), }, }, want: want{ err: nil, val: []byte("oke"), }, }, "NonexistentProperty": { reason: "Should return error property does not exist.", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault, data: esv1beta1.ExternalSecretDataRemoteRef{ Property: "nop.doesnt.exist", }, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData(secretWithNestedVal), nil, ), }, }, want: want{ err: fmt.Errorf(errSecretKeyFmt, "nop.doesnt.exist"), }, }, "ReadSecretError": { reason: "Should return error if vault client fails to read secret.", args: args{ store: makeSecretStore().Spec.Provider.Vault, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(nil, errBoom), }, }, want: want{ err: fmt.Errorf(errReadSecret, errBoom), }, }, } for name, tc := range cases { t.Run(name, func(t *testing.T) { vStore := &client{ kube: tc.args.kube, client: tc.args.vClient, store: tc.args.store, namespace: tc.args.ns, } val, err := vStore.GetSecret(context.Background(), tc.args.data) if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" { t.Errorf("\n%s\nvault.GetSecret(...): -want error, +got error:\n%s", tc.reason, diff) } if diff := cmp.Diff(string(tc.want.val), string(val)); diff != "" { t.Errorf("\n%s\nvault.GetSecret(...): -want val, +got val:\n%s", tc.reason, diff) } }) } } func TestGetSecretMap(t *testing.T) { errBoom := errors.New("boom") secret := map[string]interface{}{ "access_key": "access_key", "access_secret": "access_secret", } secretWithNilVal := map[string]interface{}{ "access_key": "access_key", "access_secret": "access_secret", "token": nil, } secretWithNestedVal := map[string]interface{}{ "access_key": "access_key", "access_secret": "access_secret", "nested": map[string]interface{}{ "foo": map[string]string{ "oke": "yup", "mhkeih": "yada yada", }, }, } secretWithTypes := map[string]interface{}{ "access_secret": "access_secret", "f32": float32(2.12), "f64": float64(2.1234534153423423), "int": 42, "bool": true, "bt": []byte("foobar"), } type args struct { store *esv1beta1.VaultProvider kube kclient.Client vClient Client ns string data esv1beta1.ExternalSecretDataRemoteRef } type want struct { err error val map[string][]byte } cases := map[string]struct { reason string args args want want }{ "ReadSecretKV1": { reason: "Should map the secret even if it has a nil value", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData(secret), nil, ), }, }, want: want{ err: nil, val: map[string][]byte{ "access_key": []byte("access_key"), "access_secret": []byte("access_secret"), }, }, }, "ReadSecretKV2": { reason: "Should map the secret even if it has a nil value", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData( map[string]interface{}{ "data": secret, }, ), nil, ), }, }, want: want{ err: nil, val: map[string][]byte{ "access_key": []byte("access_key"), "access_secret": []byte("access_secret"), }, }, }, "ReadSecretWithNilValueKV1": { reason: "Should map the secret even if it has a nil value", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData(secretWithNilVal), nil, ), }, }, want: want{ err: nil, val: map[string][]byte{ "access_key": []byte("access_key"), "access_secret": []byte("access_secret"), "token": []byte(nil), }, }, }, "ReadSecretWithNilValueKV2": { reason: "Should map the secret even if it has a nil value", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData( map[string]interface{}{ "data": secretWithNilVal, }, ), nil, ), }, }, want: want{ err: nil, val: map[string][]byte{ "access_key": []byte("access_key"), "access_secret": []byte("access_secret"), "token": []byte(nil), }, }, }, "ReadSecretWithTypesKV2": { reason: "Should map the secret even if it has other types", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData( map[string]interface{}{ "data": secretWithTypes, }, ), nil, ), }, }, want: want{ err: nil, val: map[string][]byte{ "access_secret": []byte("access_secret"), "f32": []byte("2.12"), "f64": []byte("2.1234534153423423"), "int": []byte("42"), "bool": []byte("true"), "bt": []byte("Zm9vYmFy"), // base64 }, }, }, "ReadNestedSecret": { reason: "Should map the secret for deeply nested property", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault, data: esv1beta1.ExternalSecretDataRemoteRef{ Property: "nested", }, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData( map[string]interface{}{ "data": secretWithNestedVal, }, ), nil, ), }, }, want: want{ err: nil, val: map[string][]byte{ "foo": []byte(`{"mhkeih":"yada yada","oke":"yup"}`), }, }, }, "ReadDeeplyNestedSecret": { reason: "Should map the secret for deeply nested property", args: args{ store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault, data: esv1beta1.ExternalSecretDataRemoteRef{ Property: "nested.foo", }, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn( newVaultResponseWithData( map[string]interface{}{ "data": secretWithNestedVal, }, ), nil, ), }, }, want: want{ err: nil, val: map[string][]byte{ "oke": []byte("yup"), "mhkeih": []byte("yada yada"), }, }, }, "ReadSecretError": { reason: "Should return error if vault client fails to read secret.", args: args{ store: makeSecretStore().Spec.Provider.Vault, vClient: &fake.VaultClient{ MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}), MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(nil, errBoom), }, }, want: want{ err: fmt.Errorf(errReadSecret, errBoom), }, }, } for name, tc := range cases { t.Run(name, func(t *testing.T) { vStore := &client{ kube: tc.args.kube, client: tc.args.vClient, store: tc.args.store, namespace: tc.args.ns, } val, err := vStore.GetSecretMap(context.Background(), tc.args.data) if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" { t.Errorf("\n%s\nvault.GetSecretMap(...): -want error, +got error:\n%s", tc.reason, diff) } if diff := cmp.Diff(tc.want.val, val); diff != "" { t.Errorf("\n%s\nvault.GetSecretMap(...): -want val, +got val:\n%s", tc.reason, diff) } }) } } func TestGetSecretPath(t *testing.T) { storeV2 := makeValidSecretStore() storeV2NoPath := storeV2.DeepCopy() storeV2NoPath.Spec.Provider.Vault.Path = nil storeV1 := makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1) storeV1NoPath := storeV1.DeepCopy() storeV1NoPath.Spec.Provider.Vault.Path = nil type args struct { store *esv1beta1.VaultProvider path string expected string } cases := map[string]struct { reason string args args }{ "PathWithoutFormatV2": { reason: "Data needs to be found in path", args: args{ store: storeV2.Spec.Provider.Vault, path: "secret/test", expected: "secret/data/test", }, }, "PathWithDataV2": { reason: "Data needs to be found only once in path", args: args{ store: storeV2.Spec.Provider.Vault, path: "secret/data/test", expected: "secret/data/test", }, }, "PathWithoutFormatV2_NoPath": { reason: "Data needs to be found in path and correct mountpoint is set", args: args{ store: storeV2NoPath.Spec.Provider.Vault, path: "secret/test", expected: "secret/data/test", }, }, "PathWithoutFormatV1": { reason: "Data needs to be found in path", args: args{ store: storeV1.Spec.Provider.Vault, path: "secret/test", expected: "secret/test", }, }, "PathWithoutFormatV1_NoPath": { reason: "Data needs to be found in path and correct mountpoint is set", args: args{ store: storeV1NoPath.Spec.Provider.Vault, path: "secret/test", expected: "secret/test", }, }, "WithoutPathButMountpointV2": { reason: "Mountpoint needs to be set in addition to data", args: args{ store: storeV2.Spec.Provider.Vault, path: "test", expected: "secret/data/test", }, }, "WithoutPathButMountpointV1": { reason: "Mountpoint needs to be set in addition to data", args: args{ store: storeV1.Spec.Provider.Vault, path: "test", expected: "secret/test", }, }, } for name, tc := range cases { t.Run(name, func(t *testing.T) { vStore := &client{ store: tc.args.store, } want := vStore.buildPath(tc.args.path) if diff := cmp.Diff(want, tc.args.expected); diff != "" { t.Errorf("\n%s\nvault.buildPath(...): -want expected, +got error:\n%s", tc.reason, diff) } }) } }