provider_test.go 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package vault
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "testing"
  19. "github.com/google/go-cmp/cmp"
  20. vault "github.com/hashicorp/vault/api"
  21. corev1 "k8s.io/api/core/v1"
  22. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  23. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  24. "k8s.io/utils/ptr"
  25. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  26. clientfake "sigs.k8s.io/controller-runtime/pkg/client/fake"
  27. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  28. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  29. utilfake "github.com/external-secrets/external-secrets/pkg/provider/util/fake"
  30. "github.com/external-secrets/external-secrets/pkg/provider/vault/fake"
  31. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  32. )
  33. const (
  34. tokenSecretName = "example-secret-token"
  35. secretDataString = "some-creds"
  36. tlsAuthCerts = "tls-auth-certs"
  37. tlsKey = "tls.key"
  38. tlsCrt = "tls.crt"
  39. vaultCert = "vault-cert"
  40. )
  41. var (
  42. secretStorePath = "secret"
  43. )
  44. func makeValidSecretStoreWithVersion(v esv1.VaultKVStoreVersion) *esv1.SecretStore {
  45. return &esv1.SecretStore{
  46. ObjectMeta: metav1.ObjectMeta{
  47. Name: "vault-store",
  48. Namespace: "default",
  49. },
  50. Spec: esv1.SecretStoreSpec{
  51. Provider: &esv1.SecretStoreProvider{
  52. Vault: &esv1.VaultProvider{
  53. Server: "vault.example.com",
  54. Path: &secretStorePath,
  55. Version: v,
  56. Auth: &esv1.VaultAuth{
  57. Kubernetes: &esv1.VaultKubernetesAuth{
  58. Path: "kubernetes",
  59. Role: "kubernetes-auth-role",
  60. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  61. Name: "example-sa",
  62. },
  63. },
  64. },
  65. },
  66. },
  67. },
  68. }
  69. }
  70. func makeValidSecretStore() *esv1.SecretStore {
  71. return makeValidSecretStoreWithVersion(esv1.VaultKVStoreV2)
  72. }
  73. func makeValidSecretStoreWithCerts() *esv1.SecretStore {
  74. return &esv1.SecretStore{
  75. ObjectMeta: metav1.ObjectMeta{
  76. Name: "vault-store",
  77. Namespace: "default",
  78. },
  79. Spec: esv1.SecretStoreSpec{
  80. Provider: &esv1.SecretStoreProvider{
  81. Vault: &esv1.VaultProvider{
  82. Server: "vault.example.com",
  83. Path: &secretStorePath,
  84. Version: esv1.VaultKVStoreV2,
  85. Auth: &esv1.VaultAuth{
  86. Cert: &esv1.VaultCertAuth{
  87. ClientCert: esmeta.SecretKeySelector{
  88. Name: tlsAuthCerts,
  89. Key: tlsCrt,
  90. },
  91. SecretRef: esmeta.SecretKeySelector{
  92. Name: tlsAuthCerts,
  93. Key: tlsKey,
  94. },
  95. },
  96. },
  97. },
  98. },
  99. },
  100. }
  101. }
  102. func makeValidSecretStoreWithK8sCerts(isSecret bool) *esv1.SecretStore {
  103. store := makeSecretStore()
  104. caProvider := &esv1.CAProvider{
  105. Name: vaultCert,
  106. Key: "cert",
  107. }
  108. if isSecret {
  109. caProvider.Type = "Secret"
  110. } else {
  111. caProvider.Type = "ConfigMap"
  112. }
  113. store.Spec.Provider.Vault.CAProvider = caProvider
  114. return store
  115. }
  116. func makeInvalidClusterSecretStoreWithK8sCerts() *esv1.ClusterSecretStore {
  117. return &esv1.ClusterSecretStore{
  118. TypeMeta: metav1.TypeMeta{
  119. Kind: "ClusterSecretStore",
  120. },
  121. ObjectMeta: metav1.ObjectMeta{
  122. Name: "vault-store",
  123. Namespace: "default",
  124. },
  125. Spec: esv1.SecretStoreSpec{
  126. Provider: &esv1.SecretStoreProvider{
  127. Vault: &esv1.VaultProvider{
  128. Server: "vault.example.com",
  129. Path: &secretStorePath,
  130. Version: "v2",
  131. Auth: &esv1.VaultAuth{
  132. Kubernetes: &esv1.VaultKubernetesAuth{
  133. Path: "kubernetes",
  134. Role: "kubernetes-auth-role",
  135. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  136. Name: "example-sa",
  137. },
  138. },
  139. },
  140. CAProvider: &esv1.CAProvider{
  141. Name: vaultCert,
  142. Key: "cert",
  143. Type: "Secret",
  144. },
  145. },
  146. },
  147. },
  148. }
  149. }
  150. func makeValidSecretStoreWithIamAuthSecret() *esv1.SecretStore {
  151. return &esv1.SecretStore{
  152. ObjectMeta: metav1.ObjectMeta{
  153. Name: "vault-store",
  154. Namespace: "default",
  155. },
  156. Spec: esv1.SecretStoreSpec{
  157. Provider: &esv1.SecretStoreProvider{
  158. Vault: &esv1.VaultProvider{
  159. Server: "https://vault.example.com:8200",
  160. Path: &secretStorePath,
  161. Version: esv1.VaultKVStoreV2,
  162. Auth: &esv1.VaultAuth{
  163. Iam: &esv1.VaultIamAuth{
  164. Path: "aws",
  165. Region: "us-east-1",
  166. Role: "vault-role",
  167. SecretRef: &esv1.VaultAwsAuthSecretRef{
  168. AccessKeyID: esmeta.SecretKeySelector{
  169. Name: "vault-iam-creds-secret",
  170. Key: "access-key",
  171. },
  172. SecretAccessKey: esmeta.SecretKeySelector{
  173. Name: "vault-iam-creds-secret",
  174. Key: "secret-access-key",
  175. },
  176. SessionToken: &esmeta.SecretKeySelector{
  177. Name: "vault-iam-creds-secret",
  178. Key: "secret-session-token",
  179. },
  180. },
  181. },
  182. },
  183. },
  184. },
  185. },
  186. }
  187. }
  188. func makeValidSecretStoreWithIamAuthControllerPod() *esv1.SecretStore {
  189. return &esv1.SecretStore{
  190. ObjectMeta: metav1.ObjectMeta{
  191. Name: "vault-store",
  192. Namespace: "default",
  193. },
  194. Spec: esv1.SecretStoreSpec{
  195. Provider: &esv1.SecretStoreProvider{
  196. Vault: &esv1.VaultProvider{
  197. Server: "https://vault.example.com:8200",
  198. Path: &secretStorePath,
  199. Version: esv1.VaultKVStoreV2,
  200. Auth: &esv1.VaultAuth{
  201. Iam: &esv1.VaultIamAuth{
  202. Path: "aws",
  203. Region: "us-east-1",
  204. Role: "vault-role",
  205. // No JWTAuth or SecretRef - will use controller pod identity
  206. },
  207. },
  208. },
  209. },
  210. },
  211. }
  212. }
  213. type secretStoreTweakFn func(s *esv1.SecretStore)
  214. func makeSecretStore(tweaks ...secretStoreTweakFn) *esv1.SecretStore {
  215. store := makeValidSecretStore()
  216. for _, fn := range tweaks {
  217. fn(store)
  218. }
  219. return store
  220. }
  221. func makeClusterSecretStore(tweaks ...secretStoreTweakFn) *esv1.ClusterSecretStore {
  222. store := makeValidSecretStore()
  223. for _, fn := range tweaks {
  224. fn(store)
  225. }
  226. return &esv1.ClusterSecretStore{
  227. TypeMeta: metav1.TypeMeta{
  228. Kind: esv1.ClusterSecretStoreKind,
  229. },
  230. ObjectMeta: store.ObjectMeta,
  231. Spec: store.Spec,
  232. }
  233. }
  234. type args struct {
  235. newClientFunc func(c *vault.Config) (vaultutil.Client, error)
  236. store esv1.GenericStore
  237. kube kclient.Client
  238. corev1 typedcorev1.CoreV1Interface
  239. ns string
  240. }
  241. type want struct {
  242. err error
  243. }
  244. type testCase struct {
  245. reason string
  246. args args
  247. want want
  248. }
  249. func TestNewVault(t *testing.T) {
  250. errBoom := errors.New("boom")
  251. secretClientKey := []byte(`-----BEGIN PRIVATE KEY-----
  252. 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
  253. -----END PRIVATE KEY-----`)
  254. clientCrt := []byte(`-----BEGIN CERTIFICATE-----
  255. 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
  256. -----END CERTIFICATE-----`)
  257. secretData := []byte(secretDataString)
  258. cases := map[string]testCase{
  259. "InvalidVaultStore": {
  260. reason: "Should return error if given an invalid vault store.",
  261. args: args{
  262. store: &esv1.SecretStore{},
  263. },
  264. want: want{
  265. err: errors.New(errVaultStore),
  266. },
  267. },
  268. "InvalidRetrySettings": {
  269. reason: "Should return error if given an invalid Retry Interval.",
  270. args: args{
  271. store: makeSecretStore(func(s *esv1.SecretStore) {
  272. s.Spec.RetrySettings = &esv1.SecretStoreRetrySettings{
  273. MaxRetries: ptr.To(int32(3)),
  274. RetryInterval: ptr.To("not-an-interval"),
  275. }
  276. }),
  277. },
  278. want: want{
  279. err: errors.New("time: invalid duration \"not-an-interval\""),
  280. },
  281. },
  282. "ValidRetrySettings": {
  283. reason: "Should return a Vault provider with custom retry settings",
  284. args: args{
  285. store: makeSecretStore(func(s *esv1.SecretStore) {
  286. s.Spec.RetrySettings = &esv1.SecretStoreRetrySettings{
  287. MaxRetries: ptr.To(int32(3)),
  288. RetryInterval: ptr.To("10m"),
  289. }
  290. }),
  291. ns: "default",
  292. kube: clientfake.NewClientBuilder().Build(),
  293. corev1: utilfake.NewCreateTokenMock().WithToken("ok"),
  294. newClientFunc: fake.ClientWithLoginMock,
  295. },
  296. want: want{
  297. err: nil,
  298. },
  299. },
  300. "AddVaultStoreCertsError": {
  301. reason: "Should return error if given an invalid CA certificate.",
  302. args: args{
  303. store: makeSecretStore(func(s *esv1.SecretStore) {
  304. s.Spec.Provider.Vault.CABundle = []byte("badcertdata")
  305. }),
  306. },
  307. want: want{
  308. err: fmt.Errorf("failed to decode ca bundle: %w", errors.New("failed to parse the new certificate, not valid pem data")),
  309. },
  310. },
  311. "VaultAuthFormatError": {
  312. reason: "Should return error if no valid authentication method is given.",
  313. args: args{
  314. store: makeSecretStore(func(s *esv1.SecretStore) {
  315. s.Spec.Provider.Vault.Auth = &esv1.VaultAuth{}
  316. }),
  317. },
  318. want: want{
  319. err: errors.New(errAuthFormat),
  320. },
  321. },
  322. "GetKubeServiceAccountError": {
  323. reason: "Should return error if fetching kubernetes secret fails.",
  324. args: args{
  325. newClientFunc: fake.ClientWithLoginMock,
  326. ns: "default",
  327. kube: clientfake.NewClientBuilder().Build(),
  328. store: makeSecretStore(),
  329. corev1: utilfake.NewCreateTokenMock().WithError(errBoom),
  330. },
  331. want: want{
  332. err: fmt.Errorf(errGetKubeSATokenRequest, "example-sa", fmt.Errorf(errGetKubeSA, "example-sa", fmt.Errorf(errServiceAccountNotFound, "example-sa"))),
  333. },
  334. },
  335. "GetKubeSecretError": {
  336. reason: "Should return error if fetching kubernetes secret fails.",
  337. args: args{
  338. ns: "default",
  339. store: makeSecretStore(func(s *esv1.SecretStore) {
  340. s.Spec.Provider.Vault.Auth.Kubernetes.ServiceAccountRef = nil
  341. s.Spec.Provider.Vault.Auth.Kubernetes.SecretRef = &esmeta.SecretKeySelector{
  342. Name: "vault-secret",
  343. Key: "key",
  344. }
  345. }),
  346. kube: clientfake.NewClientBuilder().Build(),
  347. },
  348. want: want{
  349. err: fmt.Errorf(`cannot get Kubernetes secret "vault-secret" from namespace "default": %w`, errors.New(`secrets "vault-secret" not found`)),
  350. },
  351. },
  352. "SuccessfulVaultStoreWithCertAuth": {
  353. reason: "Should return a Vault provider successfully",
  354. args: args{
  355. store: makeValidSecretStoreWithCerts(),
  356. ns: "default",
  357. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  358. ObjectMeta: metav1.ObjectMeta{
  359. Name: tlsAuthCerts,
  360. Namespace: "default",
  361. },
  362. Data: map[string][]byte{
  363. tlsKey: secretClientKey,
  364. tlsCrt: clientCrt,
  365. },
  366. }).Build(),
  367. newClientFunc: fake.ClientWithLoginMock,
  368. },
  369. want: want{
  370. err: nil,
  371. },
  372. },
  373. "SuccessfulVaultStoreWithK8sCertSecret": {
  374. reason: "Should return a Vault provider with the cert from k8s",
  375. args: args{
  376. store: makeValidSecretStoreWithK8sCerts(true),
  377. ns: "default",
  378. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  379. ObjectMeta: metav1.ObjectMeta{
  380. Name: vaultCert,
  381. Namespace: "default",
  382. },
  383. Data: map[string][]byte{
  384. "cert": clientCrt,
  385. "token": secretData,
  386. },
  387. }).Build(),
  388. corev1: utilfake.NewCreateTokenMock().WithToken("ok"),
  389. newClientFunc: fake.ClientWithLoginMock,
  390. },
  391. want: want{
  392. err: nil,
  393. },
  394. },
  395. "GetCertNamespaceMissingError": {
  396. reason: "Should return an error if namespace is missing and is a ClusterSecretStore",
  397. args: args{
  398. store: makeInvalidClusterSecretStoreWithK8sCerts(),
  399. ns: "default",
  400. kube: clientfake.NewClientBuilder().Build(),
  401. },
  402. want: want{
  403. err: errors.New(errCANamespace),
  404. },
  405. },
  406. "GetCertSecretKeyMissingError": {
  407. reason: "Should return an error if the secret key is missing",
  408. args: args{
  409. store: makeValidSecretStoreWithK8sCerts(true),
  410. ns: "default",
  411. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  412. ObjectMeta: metav1.ObjectMeta{
  413. Name: vaultCert,
  414. Namespace: "default",
  415. },
  416. Data: map[string][]byte{},
  417. }).Build(),
  418. newClientFunc: fake.ClientWithLoginMock,
  419. },
  420. want: want{
  421. err: fmt.Errorf("failed to get cert from secret: %w", fmt.Errorf("failed to resolve secret key ref: %w", errors.New("cannot find secret data for key: \"cert\""))),
  422. },
  423. },
  424. "SuccessfulVaultStoreWithIamAuthSecret": {
  425. reason: "Should return a Vault provider successfully",
  426. args: args{
  427. store: makeValidSecretStoreWithIamAuthSecret(),
  428. ns: "default",
  429. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  430. ObjectMeta: metav1.ObjectMeta{
  431. Name: "vault-iam-creds-secret",
  432. Namespace: "default",
  433. },
  434. Data: map[string][]byte{
  435. "access-key": []byte("TESTING"),
  436. "secret-access-key": []byte("ABCDEF"),
  437. "secret-session-token": []byte("c2VjcmV0LXNlc3Npb24tdG9rZW4K"),
  438. },
  439. }).Build(),
  440. corev1: utilfake.NewCreateTokenMock().WithToken("ok"),
  441. newClientFunc: fake.ClientWithLoginMock,
  442. },
  443. want: want{
  444. err: nil,
  445. },
  446. },
  447. "SuccessfulVaultStoreWithK8sCertConfigMap": {
  448. reason: "Should return a Vault prodvider with the cert from k8s",
  449. args: args{
  450. store: makeValidSecretStoreWithK8sCerts(false),
  451. ns: "default",
  452. kube: clientfake.NewClientBuilder().WithObjects(&corev1.ConfigMap{
  453. ObjectMeta: metav1.ObjectMeta{
  454. Name: vaultCert,
  455. Namespace: "default",
  456. },
  457. Data: map[string]string{
  458. "cert": string(clientCrt),
  459. },
  460. }).Build(),
  461. corev1: utilfake.NewCreateTokenMock().WithToken("ok"),
  462. newClientFunc: fake.ClientWithLoginMock,
  463. },
  464. want: want{
  465. err: nil,
  466. },
  467. },
  468. "GetCertConfigMapMissingError": {
  469. reason: "Should return an error if the config map key is missing",
  470. args: args{
  471. store: makeValidSecretStoreWithK8sCerts(false),
  472. ns: "default",
  473. kube: clientfake.NewClientBuilder().WithObjects(&corev1.ServiceAccount{
  474. ObjectMeta: metav1.ObjectMeta{
  475. Name: "example-sa",
  476. Namespace: "default",
  477. },
  478. Secrets: []corev1.ObjectReference{
  479. {
  480. Name: tokenSecretName,
  481. },
  482. },
  483. }, &corev1.ConfigMap{
  484. ObjectMeta: metav1.ObjectMeta{
  485. Name: vaultCert,
  486. Namespace: "default",
  487. },
  488. Data: map[string]string{},
  489. }).Build(),
  490. newClientFunc: fake.ClientWithLoginMock,
  491. },
  492. want: want{
  493. err: fmt.Errorf("failed to get cert from configmap: %w", errors.New("failed to get caProvider configMap vault-cert -> cert")),
  494. },
  495. },
  496. "GetCertificateFormatError": {
  497. reason: "Should return error if client certificate is in wrong format.",
  498. args: args{
  499. store: makeValidSecretStoreWithCerts(),
  500. ns: "default",
  501. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  502. ObjectMeta: metav1.ObjectMeta{
  503. Name: tlsAuthCerts,
  504. Namespace: "default",
  505. },
  506. Data: map[string][]byte{
  507. tlsKey: secretClientKey,
  508. tlsCrt: []byte("cert with mistake"),
  509. },
  510. }).Build(),
  511. newClientFunc: fake.ClientWithLoginMock,
  512. },
  513. want: want{
  514. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in certificate input"),
  515. },
  516. },
  517. "GetKeyFormatError": {
  518. reason: "Should return error if client key is in wrong format.",
  519. args: args{
  520. store: makeValidSecretStoreWithCerts(),
  521. ns: "default",
  522. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  523. ObjectMeta: metav1.ObjectMeta{
  524. Name: tlsAuthCerts,
  525. Namespace: "default",
  526. },
  527. Data: map[string][]byte{
  528. tlsKey: []byte("key with mistake"),
  529. tlsCrt: clientCrt,
  530. },
  531. }).Build(),
  532. newClientFunc: fake.ClientWithLoginMock,
  533. },
  534. want: want{
  535. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in key input"),
  536. },
  537. },
  538. "ClientTlsInvalidCertificatesError": {
  539. reason: "Should return error if client key is in wrong format.",
  540. args: args{
  541. store: makeSecretStore(func(s *esv1.SecretStore) {
  542. s.Spec.Provider.Vault.ClientTLS = esv1.VaultClientTLS{
  543. CertSecretRef: &esmeta.SecretKeySelector{
  544. Name: tlsAuthCerts,
  545. },
  546. KeySecretRef: &esmeta.SecretKeySelector{
  547. Name: tlsAuthCerts,
  548. },
  549. }
  550. }),
  551. ns: "default",
  552. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  553. ObjectMeta: metav1.ObjectMeta{
  554. Name: tlsAuthCerts,
  555. Namespace: "default",
  556. },
  557. Data: map[string][]byte{
  558. tlsKey: []byte("key with mistake"),
  559. tlsCrt: clientCrt,
  560. },
  561. }).Build(),
  562. corev1: utilfake.NewCreateTokenMock().WithToken("ok"),
  563. newClientFunc: fake.ClientWithLoginMock,
  564. },
  565. want: want{
  566. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in key input"),
  567. },
  568. },
  569. "SuccessfulVaultStoreValidClientTls": {
  570. reason: "Should return a Vault provider with the cert from k8s",
  571. args: args{
  572. store: makeSecretStore(func(s *esv1.SecretStore) {
  573. s.Spec.Provider.Vault.ClientTLS = esv1.VaultClientTLS{
  574. CertSecretRef: &esmeta.SecretKeySelector{
  575. Name: tlsAuthCerts,
  576. },
  577. KeySecretRef: &esmeta.SecretKeySelector{
  578. Name: tlsAuthCerts,
  579. },
  580. }
  581. }),
  582. ns: "default",
  583. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  584. ObjectMeta: metav1.ObjectMeta{
  585. Name: tlsAuthCerts,
  586. Namespace: "default",
  587. },
  588. Data: map[string][]byte{
  589. tlsKey: secretClientKey,
  590. tlsCrt: clientCrt,
  591. },
  592. }).Build(),
  593. corev1: utilfake.NewCreateTokenMock().WithToken("ok"),
  594. newClientFunc: fake.ClientWithLoginMock,
  595. },
  596. want: want{
  597. err: nil,
  598. },
  599. },
  600. "SuccessfulVaultStoreWithSecretRef": {
  601. reason: "Should return a Vault provider with secret ref auth",
  602. args: args{
  603. store: makeClusterSecretStore(func(s *esv1.SecretStore) {
  604. s.Spec.Provider.Vault.Auth.Kubernetes = nil
  605. s.Spec.Provider.Vault.Auth.TokenSecretRef = &esmeta.SecretKeySelector{
  606. Name: "vault-token",
  607. Namespace: ptr.To("default"),
  608. Key: "token",
  609. }
  610. }),
  611. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  612. ObjectMeta: metav1.ObjectMeta{
  613. Name: "vault-token",
  614. Namespace: "default",
  615. },
  616. Data: map[string][]byte{
  617. "token": []byte("token"),
  618. },
  619. }).Build(),
  620. // no need to mock the secret as it is not used
  621. newClientFunc: fake.ClientWithLoginMock,
  622. },
  623. want: want{},
  624. },
  625. "SuccessfulVaultStoreWithApproleRef": {
  626. reason: "Should return a Vault provider with approle auth",
  627. args: args{
  628. store: makeSecretStore(func(s *esv1.SecretStore) {
  629. s.Spec.Provider.Vault.Auth.Kubernetes = nil
  630. s.Spec.Provider.Vault.Auth.AppRole = &esv1.VaultAppRole{
  631. SecretRef: esmeta.SecretKeySelector{
  632. Name: "vault-secret-id",
  633. Key: "secret-id",
  634. },
  635. RoleRef: &esmeta.SecretKeySelector{
  636. Name: "vault-secret-id",
  637. Key: "approle",
  638. },
  639. }
  640. }),
  641. ns: "default",
  642. kube: clientfake.NewClientBuilder().WithObjects(&corev1.Secret{
  643. ObjectMeta: metav1.ObjectMeta{
  644. Name: "vault-secret-id",
  645. Namespace: "default",
  646. },
  647. Data: map[string][]byte{
  648. "secret-id": []byte("myid"),
  649. "approle": []byte("myrole"),
  650. },
  651. }).Build(),
  652. // no need to mock the secret as it is not used
  653. newClientFunc: fake.ClientWithLoginMock,
  654. },
  655. want: want{},
  656. },
  657. "SuccessfulVaultStoreWithSecretRefAndReferentSpec": {
  658. reason: "Should return a Vault provider with secret ref auth",
  659. args: args{
  660. store: makeClusterSecretStore(func(s *esv1.SecretStore) {
  661. s.Spec.Provider.Vault.Auth.TokenSecretRef = &esmeta.SecretKeySelector{
  662. Name: "vault-token",
  663. Key: "token",
  664. }
  665. }),
  666. // no need to mock the secret as it is not used
  667. newClientFunc: fake.ClientWithLoginMock,
  668. },
  669. want: want{},
  670. },
  671. "SuccessfulVaultStoreWithJwtAuthAndReferentSpec": {
  672. reason: "Should return a Vault provider with jwt auth",
  673. args: args{
  674. store: makeClusterSecretStore(func(s *esv1.SecretStore) {
  675. s.Spec.Provider.Vault.Auth.Kubernetes = nil
  676. s.Spec.Provider.Vault.Auth.Jwt = &esv1.VaultJwtAuth{
  677. Role: "test-role",
  678. SecretRef: &esmeta.SecretKeySelector{
  679. Name: "vault-token",
  680. },
  681. }
  682. }),
  683. // no need to mock the secret as it is not used
  684. newClientFunc: fake.ClientWithLoginMock,
  685. },
  686. want: want{},
  687. },
  688. "IamAuthControllerPodNoEnvVars": {
  689. reason: "Should return error when IAM controller pod auth has no AWS environment variables",
  690. args: args{
  691. store: makeValidSecretStoreWithIamAuthControllerPod(),
  692. ns: "default",
  693. kube: clientfake.NewClientBuilder().Build(),
  694. corev1: utilfake.NewCreateTokenMock().WithToken("ok"),
  695. newClientFunc: fake.ClientWithLoginMock,
  696. },
  697. want: want{
  698. err: errors.New(errNoAWSAuthMethodFound),
  699. },
  700. },
  701. }
  702. for name, tc := range cases {
  703. t.Run(name, func(t *testing.T) {
  704. vaultTest(t, name, tc)
  705. })
  706. }
  707. }
  708. func vaultTest(t *testing.T, _ string, tc testCase) {
  709. prov := &Provider{
  710. NewVaultClient: tc.args.newClientFunc,
  711. }
  712. if tc.args.newClientFunc == nil {
  713. prov.NewVaultClient = NewVaultClient
  714. }
  715. _, err := prov.newClient(context.Background(), tc.args.store, tc.args.kube, tc.args.corev1, tc.args.ns)
  716. if diff := cmp.Diff(tc.want.err, err, EquateErrors()); diff != "" {
  717. t.Errorf("\n%s\nvault.New(...): -want error, +got error:\n%s", tc.reason, diff)
  718. }
  719. }
  720. func TestGetControllerPodCredentials(t *testing.T) {
  721. client := &client{storeKind: esv1.SecretStoreKind}
  722. ctx := context.Background()
  723. region := "us-east-1"
  724. kube := clientfake.NewClientBuilder().Build()
  725. t.Run("PodIdentityEnvVars", func(t *testing.T) {
  726. t.Setenv("AWS_CONTAINER_CREDENTIALS_FULL_URI", "http://169.254.170.23/v1/credentials")
  727. creds, err := client.getControllerPodCredentials(ctx, region, kube, nil)
  728. // Should succeed and return nil (indicating AWS SDK should handle it)
  729. if err != nil {
  730. t.Errorf("Expected no error, got: %v", err)
  731. }
  732. if creds != nil {
  733. t.Errorf("Expected nil credentials for Pod Identity, got: %v", creds)
  734. }
  735. })
  736. t.Run("NoEnvVars", func(t *testing.T) {
  737. // Pod Identity URI is not set.
  738. _, err := client.getControllerPodCredentials(ctx, region, kube, nil)
  739. expectedErr := fmt.Errorf(errNoAWSAuthMethodFound)
  740. if diff := cmp.Diff(expectedErr, err, EquateErrors()); diff != "" {
  741. t.Errorf("TestGetControllerPodCredentials/NoEnvVars: -want error, +got error:\n%s", diff)
  742. }
  743. })
  744. }
  745. func TestCache(t *testing.T) {
  746. t.Cleanup(resetCache)
  747. enableCache = true
  748. initCache(defaultCacheSize)
  749. prov := &Provider{
  750. NewVaultClient: fake.ClientWithLoginMock,
  751. }
  752. namespace := "default"
  753. store := makeClusterSecretStore(func(s *esv1.SecretStore) {
  754. s.Spec.Provider.Vault.Auth.Kubernetes.ServiceAccountRef = &esmeta.ServiceAccountSelector{
  755. Name: "vault-sa",
  756. Namespace: &namespace, // fixed namespace!
  757. }
  758. })
  759. // first request creates a new client:
  760. c1, err := getVaultClient(prov, store, nil, namespace)
  761. if err != nil {
  762. t.Fatal(err)
  763. }
  764. // seconds request should retrieve cached client instance:
  765. c2, err := getVaultClient(prov, store, nil, namespace)
  766. if err != nil {
  767. t.Fatal(err)
  768. }
  769. if c1 != c2 {
  770. t.Fatal("Expected a cached client instance")
  771. }
  772. // third request should retrieve cached client instance even when using a different namespace,
  773. // because the ClusterSecretStore references a ServiceAccount of a specific namespace:
  774. c3, err := getVaultClient(prov, store, nil, "another-namespace")
  775. if err != nil {
  776. t.Fatal(err)
  777. }
  778. if c3 != c1 {
  779. t.Fatal("Expected a cached client instance")
  780. }
  781. }
  782. func TestCacheWithReferentSpec(t *testing.T) {
  783. t.Cleanup(resetCache)
  784. enableCache = true
  785. initCache(defaultCacheSize)
  786. prov := &Provider{
  787. NewVaultClient: fake.ClientWithLoginMock,
  788. }
  789. store := makeClusterSecretStore(func(s *esv1.SecretStore) {
  790. s.Spec.Provider.Vault.Auth.Kubernetes.ServiceAccountRef = &esmeta.ServiceAccountSelector{
  791. Name: "vault-sa",
  792. // No fixed namespace!
  793. }
  794. })
  795. // first request creates a new client:
  796. c1, err := getVaultClient(prov, store, nil, "default")
  797. if err != nil {
  798. t.Fatal(err)
  799. }
  800. // seconds request should retrieve cached client instance:
  801. c2, err := getVaultClient(prov, store, nil, "default")
  802. if err != nil {
  803. t.Fatal(err)
  804. }
  805. if c1 != c2 {
  806. t.Fatal("Expected a cached client instance")
  807. }
  808. // third request should retrieve a new client instance,
  809. // because the ServiceAccount namespace depends on the namespace of the referent:
  810. c3, err := getVaultClient(prov, store, nil, "another-namespace")
  811. if err != nil {
  812. t.Fatal(err)
  813. }
  814. if c3 == c1 {
  815. t.Fatal("Expected a new client instance")
  816. }
  817. }
  818. func resetCache() {
  819. enableCache = false
  820. clientCache = nil
  821. }