gcp.go 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. limitations under the License.
  10. */
  11. package gcp
  12. import (
  13. "crypto/rand"
  14. "crypto/x509"
  15. "encoding/pem"
  16. "fmt"
  17. // nolint
  18. . "github.com/onsi/ginkgo/v2"
  19. v1 "k8s.io/api/core/v1"
  20. p12 "software.sslmate.com/src/go-pkcs12"
  21. // nolint
  22. "github.com/external-secrets/external-secrets-e2e/framework"
  23. "github.com/external-secrets/external-secrets-e2e/suites/provider/cases/common"
  24. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  25. )
  26. const (
  27. withStaticAuth = "with service account"
  28. withReferentStaticAuth = "with service acount from referent namespace"
  29. )
  30. // This test uses the global ESO.
  31. var _ = Describe("[gcp]", Label("gcp", "secretsmanager"), func() {
  32. f := framework.New("eso-gcp")
  33. prov := NewFromEnv(f, "")
  34. DescribeTable("sync secrets", framework.TableFuncWithExternalSecret(f, prov),
  35. framework.Compose(withStaticAuth, f, common.SimpleDataSync, useStaticAuth),
  36. framework.Compose(withStaticAuth, f, common.JSONDataWithProperty, useStaticAuth),
  37. framework.Compose(withStaticAuth, f, common.JSONDataFromSync, useStaticAuth),
  38. framework.Compose(withStaticAuth, f, common.JSONDataFromRewrite, useStaticAuth),
  39. framework.Compose(withStaticAuth, f, common.NestedJSONWithGJSON, useStaticAuth),
  40. framework.Compose(withStaticAuth, f, common.JSONDataWithTemplate, useStaticAuth),
  41. framework.Compose(withStaticAuth, f, common.DockerJSONConfig, useStaticAuth),
  42. framework.Compose(withStaticAuth, f, common.DataPropertyDockerconfigJSON, useStaticAuth),
  43. framework.Compose(withStaticAuth, f, common.SSHKeySync, useStaticAuth),
  44. framework.Compose(withStaticAuth, f, common.SSHKeySyncDataProperty, useStaticAuth),
  45. framework.Compose(withStaticAuth, f, common.SyncWithoutTargetName, useStaticAuth),
  46. framework.Compose(withStaticAuth, f, common.JSONDataWithoutTargetName, useStaticAuth),
  47. framework.Compose(withStaticAuth, f, common.FindByName, useStaticAuth),
  48. framework.Compose(withStaticAuth, f, common.FindByNameAndRewrite, useStaticAuth),
  49. framework.Compose(withStaticAuth, f, common.FindByNameWithPath, useStaticAuth),
  50. framework.Compose(withStaticAuth, f, common.FindByTag, useStaticAuth),
  51. framework.Compose(withStaticAuth, f, common.FindByTagWithPath, useStaticAuth),
  52. framework.Compose(withStaticAuth, f, p12Cert, useStaticAuth),
  53. // referent auth
  54. framework.Compose(withReferentStaticAuth, f, common.SimpleDataSync, useReferentAuth),
  55. )
  56. })
  57. func useStaticAuth(tc *framework.TestCase) {
  58. tc.ExternalSecret.Spec.SecretStoreRef.Name = tc.Framework.Namespace.Name
  59. }
  60. func useReferentAuth(tc *framework.TestCase) {
  61. tc.ExternalSecret.Spec.SecretStoreRef.Name = referentName(tc.Framework)
  62. tc.ExternalSecret.Spec.SecretStoreRef.Kind = esv1.ClusterSecretStoreKind
  63. }
  64. // P12Cert case creates a secret with a p12 cert containing a privkey and cert bundled together.
  65. // It uses templating to generate a k8s secret of type tls with pem values.
  66. func p12Cert(f *framework.Framework) (string, func(*framework.TestCase)) {
  67. return "should sync p12 encoded cert secret", func(tc *framework.TestCase) {
  68. cloudSecretName := fmt.Sprintf("%s-%s", tc.Framework.Namespace.Name, "p12-cert-example")
  69. certPEM := `-----BEGIN CERTIFICATE-----
  70. MIIFQjCCBCqgAwIBAgISBHszg5W2maz/7CIxGrf7mqukMA0GCSqGSIb3DQEBCwUA
  71. MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
  72. EwJSMzAeFw0yMTA3MjQxMjQyMzNaFw0yMTEwMjIxMjQyMzFaMCgxJjAkBgNVBAMT
  73. HXRlbXBvcmFyeS5leHRlcm5hbC1zZWNyZXRzLmlvMIIBIjANBgkqhkiG9w0BAQEF
  74. AAOCAQ8AMIIBCgKCAQEAyRROdZskA8qnGnoMgQ5Ry5MVY/lgo3HzlhKq02u23J2w
  75. 14w+LiEU2hcSJKYv5OXysbfq7M52u2zXYZXs6krkQZlYNpFw7peZ0JtUbVkSpST/
  76. X4b1GJKDSkRs7fTi+v+pb9OT9rTbtd8jfGe/YCe5rjXEm/ih2DgS13737lKCD5n6
  77. 3QUOG7CR+SKFeRXOGkncqJHAyRkpNfAmS8m1C+ucodfjSFoqAwwVGx7eyEktG4s/
  78. JbwLEb03hGrP15vnnOgxQmiAzWskxhMyHX6vmA71Oq4F3RVsuD3CEjKzgJ2+ghk3
  79. BIY3DZSfSReWSMYM573YFglENi+qJK012XnFmZcevwIDAQABo4ICWjCCAlYwDgYD
  80. VR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV
  81. HRMBAf8EAjAAMB0GA1UdDgQWBBRvn1wGi46XcyhRIIxJkSSUoCyoNzAfBgNVHSME
  82. GDAWgBQULrMXt1hWy65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYB
  83. BQUHMAGGFWh0dHA6Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDov
  84. L3IzLmkubGVuY3Iub3JnLzAoBgNVHREEITAfgh10ZW1wb3JhcnkuZXh0ZXJuYWwt
  85. c2VjcmV0cy5pbzBMBgNVHSAERTBDMAgGBmeBDAECATA3BgsrBgEEAYLfEwEBATAo
  86. MCYGCCsGAQUFBwIBFhpodHRwOi8vY3BzLmxldHNlbmNyeXB0Lm9yZzCCAQYGCisG
  87. AQQB1nkCBAIEgfcEgfQA8gB3APZclC/RdzAiFFQYCDCUVo7jTRMZM7/fDC8gC8xO
  88. 8WTjAAABetjA0asAAAQDAEgwRgIhAPYbBNim7q3P0qmD9IrAx1E1fEClYpoLrAVs
  89. 4LGBkQobAiEA+IaTPWs9eHmqtCwar96PNxE0Iucak0DYkgfcWJT5gfYAdwBvU3as
  90. MfAxGdiZAKRRFf93FRwR2QLBACkGjbIImjfZEwAAAXrYwNJTAAAEAwBIMEYCIQDY
  91. xWJKFljK1AW2z/uVsU7TwcAAcIqUf5/nhS04JAwpfwIhANDTvwvcRvPebU7fv6dq
  92. lNH1g2Oyv/4Vm7W+Vrc5cFD0MA0GCSqGSIb3DQEBCwUAA4IBAQAR29s3pDGZbNPN
  93. 5K+Zqg9UDT8s+P0fb9r97T7hWEFkiUtG4bz7QvGzSoDXhD/DZkdjLmkX7+bLiE3L
  94. hRSSYe+Am+Bw5soyzefX2FHAUeOLeK0mJhOrdiKqrW4nnvOOJWLkcWS799kW2z7j
  95. 2MgUWTOz/xXGUOWHt1KjyoM31G3shoAIB9lg3lHbuVIyDd3yyUpjt0zevVdYrO9G
  96. CgI2mJfv26EiddBvgudzN+R5Ayis9czaFHu8gpplaf9DahaKs1Uys6lg0HnzRn3l
  97. XMYitHfpGhc+DTTiTWMQ13J0b1j4yv8A7ZaG2366aa28oSTD6eQFhmVCBwa54j++
  98. IOwzHn5R
  99. -----END CERTIFICATE-----
  100. `
  101. privkeyPEM := `-----BEGIN PRIVATE KEY-----
  102. MIIEwAIBADANBgkqhkiG9w0BAQEFAASCBKowggSmAgEAAoIBAQDJFE51myQDyqca
  103. egyBDlHLkxVj+WCjcfOWEqrTa7bcnbDXjD4uIRTaFxIkpi/k5fKxt+rszna7bNdh
  104. lezqSuRBmVg2kXDul5nQm1RtWRKlJP9fhvUYkoNKRGzt9OL6/6lv05P2tNu13yN8
  105. Z79gJ7muNcSb+KHYOBLXfvfuUoIPmfrdBQ4bsJH5IoV5Fc4aSdyokcDJGSk18CZL
  106. ybUL65yh1+NIWioDDBUbHt7ISS0biz8lvAsRvTeEas/Xm+ec6DFCaIDNayTGEzId
  107. fq+YDvU6rgXdFWy4PcISMrOAnb6CGTcEhjcNlJ9JF5ZIxgznvdgWCUQ2L6okrTXZ
  108. ecWZlx6/AgMBAAECggEBAI9sDX5zFuAhdsk6zppqtUrn8TTq1dQe3ihnzjKYvMhl
  109. LZLA9EUA0ZexJv6/DqBMp6u9TDJ2HVgYDRQM1PxUSLTFhJb/bDayKUMS18ha5SKn
  110. 3gKsBzvsnPqnDa84oYF4Q8mAdyRb4e66ZtxAP8985kLtFPxO/llzvXS5mmwBq8Ul
  111. wlLOg5xAXubm3vgLyFm2GW9qI6ZvY9mmh1mv5ZLP8/8hikRjwJijnX3dyqqIAYnc
  112. DHjJYy2I1VxGJybqVQRquG++Tl4qLXbOUZ/lhKe62ARx/MBR9lEst5TURc9N7U3D
  113. Mgsu7FcFwqjVkig3P0XiNRWwCu0HrYee5rLXmtDnF9kCgYEA69+OuJM/RIsrLQQd
  114. 1alppgT+SFyaJM3X1MJD3yxW6Vqqvkhqe7+XCWnmVYcpHPcilWmZnnQ3PiWqPJ8A
  115. 3mIMp+Xg0ddFQXb3n7z4D0Mg4IPzvSKnlieTT1rDhhHRv/xArw1UBkF6kqcnZizZ
  116. FcWcOIt/dYodTWZzPJtLtf7QW0sCgYEA2jy0vJ5rg0/CSinkccreegC6gbbd+oE9
  117. uR/aGeu1XmnULoYYMMy7BLqd8/OiXvujbgUSUWnzbEclR88dPDkiRxDL7mYiaCn+
  118. l9jPuVB1W5x6irJdG/7lpSnLuijpkzey177ZKrlfGsOjtVZsc1ytnqTCWsF1r9eY
  119. yXCSvkJQjd0CgYEA5+vl0hh+MfBA4L9WcnpkNehc+luK+LspB7qHr81SG5qZngVo
  120. JgspAAmPf/Mo+qEI8S5m7MVKeCHitD6HRSHVXdUK7GklYIwQSJEuuxr/HaLAquyD
  121. KYH6NyGAdLfarFHka/rH7mq9kasnczCPtveZdoO7LKBD1ZHxptrvY6CLz+cCgYEA
  122. yEq2xfXPTrDA7DgOhbFfBjHs+mfOyr4a2/Czxt5hkskmB5ziTsdXTTvJA8Ay4WGp
  123. 2Kum6DmJQ3L4cDNR7ZeyMe7ke2QZZ+hC1TITU0zYqL+wZ+LTOYJzWWZGqBAsbwTL
  124. it6JiYCgHHw5n5A18Jq6bcNg7NJpJH2GqDo9M4jBTbECgYEAlMuvNExEXGVzWrGF
  125. NXHpAev64RJ2jTq59jtmxWrNvzeWJREOWd/Nt+0t+bE0sHMfgaMrhNFWiR8oesrF
  126. Jdx0ECYawviQoreDAyIXV6HouoeRbDtLZ9AJvxMoIjGcjAR2FQHc3yx4h/lf3Tfx
  127. x6HaRh+EUwU51von6M9lEF9/p5Q=
  128. -----END PRIVATE KEY-----
  129. `
  130. blockCert, _ := pem.Decode([]byte(certPEM))
  131. cert, _ := x509.ParseCertificate(blockCert.Bytes)
  132. blockPrivKey, _ := pem.Decode([]byte(privkeyPEM))
  133. privkey, _ := x509.ParsePKCS8PrivateKey(blockPrivKey.Bytes)
  134. emptyCACerts := []*x509.Certificate{}
  135. p12Cert, _ := p12.Encode(rand.Reader, privkey, cert, emptyCACerts, "")
  136. tc.Secrets = map[string]framework.SecretEntry{
  137. cloudSecretName: {Value: string(p12Cert)},
  138. }
  139. tc.ExpectedSecret = &v1.Secret{
  140. Type: v1.SecretTypeTLS,
  141. Data: map[string][]byte{
  142. "tls.crt": []byte(certPEM),
  143. "tls.key": []byte(privkeyPEM),
  144. },
  145. }
  146. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  147. {
  148. SecretKey: "mysecret",
  149. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  150. Key: cloudSecretName,
  151. },
  152. },
  153. }
  154. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  155. Type: v1.SecretTypeTLS,
  156. EngineVersion: esv1.TemplateEngineV2,
  157. Data: map[string]string{
  158. "tls.crt": "{{ .mysecret | pkcs12cert }}",
  159. "tls.key": "{{ .mysecret | pkcs12key }}",
  160. },
  161. }
  162. }
  163. }