vault_test.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "io/ioutil"
  20. "net/http"
  21. "testing"
  22. "github.com/crossplane/crossplane-runtime/pkg/test"
  23. "github.com/google/go-cmp/cmp"
  24. vault "github.com/hashicorp/vault/api"
  25. corev1 "k8s.io/api/core/v1"
  26. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  27. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  28. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  29. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  30. "github.com/external-secrets/external-secrets/pkg/provider/vault/fake"
  31. )
  32. func makeValidSecretStore() *esv1alpha1.SecretStore {
  33. return &esv1alpha1.SecretStore{
  34. ObjectMeta: metav1.ObjectMeta{
  35. Name: "vault-store",
  36. Namespace: "default",
  37. },
  38. Spec: esv1alpha1.SecretStoreSpec{
  39. Provider: &esv1alpha1.SecretStoreProvider{
  40. Vault: &esv1alpha1.VaultProvider{
  41. Server: "vault.example.com",
  42. Path: "secret",
  43. Version: esv1alpha1.VaultKVStoreV2,
  44. Auth: esv1alpha1.VaultAuth{
  45. Kubernetes: &esv1alpha1.VaultKubernetesAuth{
  46. Path: "kubernetes",
  47. Role: "kubernetes-auth-role",
  48. SecretRef: &esmeta.SecretKeySelector{
  49. Name: "vault-secret",
  50. Key: "key",
  51. },
  52. },
  53. },
  54. },
  55. },
  56. },
  57. }
  58. }
  59. type secretStoreTweakFn func(s *esv1alpha1.SecretStore)
  60. func makeSecretStore(tweaks ...secretStoreTweakFn) *esv1alpha1.SecretStore {
  61. store := makeValidSecretStore()
  62. for _, fn := range tweaks {
  63. fn(store)
  64. }
  65. return store
  66. }
  67. func newVaultResponse(data *vault.Secret) *vault.Response {
  68. jsonData, _ := json.Marshal(data)
  69. return &vault.Response{
  70. Response: &http.Response{
  71. Body: ioutil.NopCloser(bytes.NewReader(jsonData)),
  72. },
  73. }
  74. }
  75. func newVaultTokenIDResponse(token string) *vault.Response {
  76. return newVaultResponse(&vault.Secret{
  77. Data: map[string]interface{}{
  78. "id": token,
  79. },
  80. })
  81. }
  82. func TestNewVault(t *testing.T) {
  83. errBoom := errors.New("boom")
  84. secretData := []byte("some-creds")
  85. type args struct {
  86. newClientFunc func(c *vault.Config) (Client, error)
  87. store esv1alpha1.GenericStore
  88. kube kclient.Client
  89. ns string
  90. }
  91. type want struct {
  92. err error
  93. }
  94. cases := map[string]struct {
  95. reason string
  96. args args
  97. want want
  98. }{
  99. "InvalidVaultStore": {
  100. reason: "Should return error if given an invalid vault store.",
  101. args: args{
  102. store: &esv1alpha1.SecretStore{},
  103. },
  104. want: want{
  105. err: errors.New(errVaultStore),
  106. },
  107. },
  108. "AddVaultStoreCertsError": {
  109. reason: "Should return error if given an invalid CA certificate.",
  110. args: args{
  111. store: makeSecretStore(func(s *esv1alpha1.SecretStore) {
  112. s.Spec.Provider.Vault.CABundle = []byte("badcertdata")
  113. }),
  114. },
  115. want: want{
  116. err: errors.New(errVaultCert),
  117. },
  118. },
  119. "VaultAuthFormatError": {
  120. reason: "Should return error if no valid authentication method is given.",
  121. args: args{
  122. store: makeSecretStore(func(s *esv1alpha1.SecretStore) {
  123. s.Spec.Provider.Vault.Auth = esv1alpha1.VaultAuth{}
  124. }),
  125. },
  126. want: want{
  127. err: errors.New(errAuthFormat),
  128. },
  129. },
  130. "GetKubeSecretError": {
  131. reason: "Should return error if fetching kubernetes secret fails.",
  132. args: args{
  133. store: makeSecretStore(),
  134. kube: &test.MockClient{
  135. MockGet: test.NewMockGetFn(errBoom),
  136. },
  137. },
  138. want: want{
  139. err: fmt.Errorf(errGetKubeSecret, makeSecretStore().Spec.Provider.Vault.Auth.Kubernetes.SecretRef.Name, errBoom),
  140. },
  141. },
  142. "SuccessfulVaultStore": {
  143. reason: "Should return a Vault provider successfully",
  144. args: args{
  145. store: makeSecretStore(),
  146. kube: &test.MockClient{
  147. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  148. if o, ok := obj.(*corev1.Secret); ok {
  149. o.Data = map[string][]byte{
  150. "key": secretData,
  151. }
  152. }
  153. return nil
  154. }),
  155. },
  156. newClientFunc: func(c *vault.Config) (Client, error) {
  157. return &fake.VaultClient{
  158. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  159. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  160. newVaultTokenIDResponse("test-token"), nil, func(got *vault.Request) error {
  161. kubeRole := makeValidSecretStore().Spec.Provider.Vault.Auth.Kubernetes.Role
  162. want := kubeParameters(kubeRole, string(secretData))
  163. if diff := cmp.Diff(want, got.Obj); diff != "" {
  164. t.Errorf("RawRequestWithContext(...): -want, +got:\n%s", diff)
  165. }
  166. return nil
  167. }),
  168. MockSetToken: fake.NewSetTokenFn(),
  169. }, nil
  170. },
  171. },
  172. want: want{
  173. err: nil,
  174. },
  175. },
  176. }
  177. for name, tc := range cases {
  178. t.Run(name, func(t *testing.T) {
  179. conn := &connector{
  180. newVaultClient: tc.args.newClientFunc,
  181. }
  182. if tc.args.newClientFunc == nil {
  183. conn.newVaultClient = newVaultClient
  184. }
  185. _, err := conn.NewClient(context.Background(), tc.args.store, tc.args.kube, tc.args.ns)
  186. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  187. t.Errorf("\n%s\nvault.New(...): -want error, +got error:\n%s", tc.reason, diff)
  188. }
  189. })
  190. }
  191. }
  192. func TestGetSecretMap(t *testing.T) {
  193. errBoom := errors.New("boom")
  194. type args struct {
  195. store *esv1alpha1.VaultProvider
  196. kube kclient.Client
  197. vClient Client
  198. ns string
  199. data esv1alpha1.ExternalSecretDataRemoteRef
  200. }
  201. type want struct {
  202. err error
  203. }
  204. cases := map[string]struct {
  205. reason string
  206. args args
  207. want want
  208. }{
  209. "ReadSecretError": {
  210. reason: "Should return error if vault client fails to read secret.",
  211. args: args{
  212. store: makeSecretStore().Spec.Provider.Vault,
  213. vClient: &fake.VaultClient{
  214. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  215. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(nil, errBoom),
  216. },
  217. },
  218. want: want{
  219. err: fmt.Errorf(errReadSecret, errBoom),
  220. },
  221. },
  222. }
  223. for name, tc := range cases {
  224. t.Run(name, func(t *testing.T) {
  225. vStore := &client{
  226. kube: tc.args.kube,
  227. client: tc.args.vClient,
  228. store: tc.args.store,
  229. namespace: tc.args.ns,
  230. }
  231. _, err := vStore.GetSecretMap(context.Background(), tc.args.data)
  232. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  233. t.Errorf("\n%s\nvault.GetSecretMap(...): -want error, +got error:\n%s", tc.reason, diff)
  234. }
  235. })
  236. }
  237. }