parameterstore_test.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package parameterstore
  13. import (
  14. "context"
  15. "fmt"
  16. "strings"
  17. "testing"
  18. "github.com/aws/aws-sdk-go/aws"
  19. "github.com/aws/aws-sdk-go/service/ssm"
  20. "github.com/google/go-cmp/cmp"
  21. "github.com/stretchr/testify/assert"
  22. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  23. fake "github.com/external-secrets/external-secrets/pkg/provider/aws/parameterstore/fake"
  24. sess "github.com/external-secrets/external-secrets/pkg/provider/aws/session"
  25. )
  26. func TestConstructor(t *testing.T) {
  27. s, err := sess.New("1111", "2222", "foo", "", nil)
  28. assert.Nil(t, err)
  29. c, err := New(s)
  30. assert.Nil(t, err)
  31. assert.NotNil(t, c.client)
  32. }
  33. type parameterstoreTestCase struct {
  34. fakeClient *fake.Client
  35. apiInput *ssm.GetParameterInput
  36. apiOutput *ssm.GetParameterOutput
  37. remoteRef *esv1alpha1.ExternalSecretDataRemoteRef
  38. apiErr error
  39. expectError string
  40. expectedSecret string
  41. expectedData map[string]string
  42. }
  43. func makeValidParameterStoreTestCase() *parameterstoreTestCase {
  44. return &parameterstoreTestCase{
  45. fakeClient: &fake.Client{},
  46. apiInput: makeValidAPIInput(),
  47. apiOutput: makeValidAPIOutput(),
  48. remoteRef: makeValidRemoteRef(),
  49. apiErr: nil,
  50. expectError: "",
  51. expectedSecret: "",
  52. expectedData: make(map[string]string),
  53. }
  54. }
  55. func makeValidAPIInput() *ssm.GetParameterInput {
  56. return &ssm.GetParameterInput{
  57. Name: aws.String("/baz"),
  58. WithDecryption: aws.Bool(true),
  59. }
  60. }
  61. func makeValidAPIOutput() *ssm.GetParameterOutput {
  62. return &ssm.GetParameterOutput{
  63. Parameter: &ssm.Parameter{
  64. Value: aws.String("RRRRR"),
  65. },
  66. }
  67. }
  68. func makeValidRemoteRef() *esv1alpha1.ExternalSecretDataRemoteRef {
  69. return &esv1alpha1.ExternalSecretDataRemoteRef{
  70. Key: "/baz",
  71. }
  72. }
  73. func makeValidParameterStoreTestCaseCustom(tweaks ...func(pstc *parameterstoreTestCase)) *parameterstoreTestCase {
  74. pstc := makeValidParameterStoreTestCase()
  75. for _, fn := range tweaks {
  76. fn(pstc)
  77. }
  78. pstc.fakeClient.WithValue(pstc.apiInput, pstc.apiOutput, pstc.apiErr)
  79. return pstc
  80. }
  81. // test the ssm<->aws interface
  82. // make sure correct values are passed and errors are handled accordingly.
  83. func TestGetSecret(t *testing.T) {
  84. // good case: key is passed in, output is sent back
  85. setSecretString := func(pstc *parameterstoreTestCase) {
  86. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  87. pstc.expectedSecret = "RRRRR"
  88. }
  89. // good case: extract property
  90. setExtractProperty := func(pstc *parameterstoreTestCase) {
  91. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  92. pstc.expectedSecret = "bang"
  93. pstc.remoteRef.Property = "/shmoo"
  94. }
  95. // bad case: missing property
  96. setMissingProperty := func(pstc *parameterstoreTestCase) {
  97. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  98. pstc.remoteRef.Property = "INVALPROP"
  99. pstc.expectError = "key INVALPROP does not exist in secret"
  100. }
  101. // bad case: extract property failure due to invalid json
  102. setPropertyFail := func(pstc *parameterstoreTestCase) {
  103. pstc.apiOutput.Parameter.Value = aws.String(`------`)
  104. pstc.remoteRef.Property = "INVALPROP"
  105. pstc.expectError = "key INVALPROP does not exist in secret"
  106. }
  107. // bad case: parameter.Value may be nil but binary is set
  108. setParameterValueNil := func(pstc *parameterstoreTestCase) {
  109. pstc.apiOutput.Parameter.Value = nil
  110. pstc.expectError = "parameter value is nil for key"
  111. }
  112. // base case: api output return error
  113. setAPIError := func(pstc *parameterstoreTestCase) {
  114. pstc.apiOutput = &ssm.GetParameterOutput{}
  115. pstc.apiErr = fmt.Errorf("oh no")
  116. pstc.expectError = "oh no"
  117. }
  118. successCases := []*parameterstoreTestCase{
  119. makeValidParameterStoreTestCaseCustom(setSecretString),
  120. makeValidParameterStoreTestCaseCustom(setExtractProperty),
  121. makeValidParameterStoreTestCaseCustom(setMissingProperty),
  122. makeValidParameterStoreTestCaseCustom(setPropertyFail),
  123. makeValidParameterStoreTestCaseCustom(setParameterValueNil),
  124. makeValidParameterStoreTestCaseCustom(setAPIError),
  125. }
  126. ps := ParameterStore{}
  127. for k, v := range successCases {
  128. ps.client = v.fakeClient
  129. out, err := ps.GetSecret(context.Background(), *v.remoteRef)
  130. if !ErrorContains(err, v.expectError) {
  131. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  132. }
  133. if cmp.Equal(out, v.expectedSecret) {
  134. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedSecret, out)
  135. }
  136. }
  137. }
  138. func TestGetSecretMap(t *testing.T) {
  139. // good case: default version & deserialization
  140. setDeserialization := func(pstc *parameterstoreTestCase) {
  141. pstc.apiOutput.Parameter.Value = aws.String(`{"foo":"bar"}`)
  142. pstc.expectedData["foo"] = "bar"
  143. }
  144. // bad case: api error returned
  145. setAPIError := func(pstc *parameterstoreTestCase) {
  146. pstc.apiOutput.Parameter = &ssm.Parameter{}
  147. pstc.expectError = "some api err"
  148. pstc.apiErr = fmt.Errorf("some api err")
  149. }
  150. // bad case: invalid json
  151. setInvalidJSON := func(pstc *parameterstoreTestCase) {
  152. pstc.apiOutput.Parameter.Value = aws.String(`-----------------`)
  153. pstc.expectError = "unable to unmarshal secret"
  154. }
  155. successCases := []*parameterstoreTestCase{
  156. makeValidParameterStoreTestCaseCustom(setDeserialization),
  157. makeValidParameterStoreTestCaseCustom(setAPIError),
  158. makeValidParameterStoreTestCaseCustom(setInvalidJSON),
  159. }
  160. ps := ParameterStore{}
  161. for k, v := range successCases {
  162. ps.client = v.fakeClient
  163. out, err := ps.GetSecretMap(context.Background(), *v.remoteRef)
  164. if !ErrorContains(err, v.expectError) {
  165. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  166. }
  167. if cmp.Equal(out, v.expectedData) {
  168. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedData, out)
  169. }
  170. }
  171. }
  172. func ErrorContains(out error, want string) bool {
  173. if out == nil {
  174. return want == ""
  175. }
  176. if want == "" {
  177. return false
  178. }
  179. return strings.Contains(out.Error(), want)
  180. }