secretserver.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. package secretserver
  2. import (
  3. "context"
  4. _ "fmt"
  5. "github.com/external-secrets/external-secrets-e2e/framework"
  6. "github.com/external-secrets/external-secrets-e2e/suites/provider/cases/common"
  7. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  8. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  9. "github.com/onsi/ginkgo/v2"
  10. "github.com/onsi/gomega"
  11. v1 "k8s.io/api/core/v1"
  12. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  13. )
  14. var _ = ginkgo.Describe("[secretserver]", ginkgo.Label("secretserver"), func() {
  15. f := framework.New("eso-secretserver")
  16. // Initialization is deferred so that assertions work.
  17. provider := &secretStoreProvider{}
  18. ginkgo.BeforeEach(func() {
  19. cfg, err := loadConfigFromEnv()
  20. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  21. provider.init(cfg, f)
  22. createResources(context.Background(), f, cfg)
  23. })
  24. ginkgo.DescribeTable("sync secrets", framework.TableFuncWithExternalSecret(f, provider),
  25. ginkgo.Entry(common.JSONDataWithTemplate(f)),
  26. ginkgo.Entry(common.JSONDataWithProperty(f)),
  27. ginkgo.Entry(common.JSONDataWithoutTargetName(f)),
  28. ginkgo.Entry(common.JSONDataWithTemplateFromLiteral(f)),
  29. ginkgo.Entry(common.TemplateFromConfigmaps(f)),
  30. ginkgo.Entry(common.JSONDataFromSync(f)), // <--
  31. ginkgo.Entry(common.JSONDataFromRewrite(f)), // <--
  32. ginkgo.Entry(common.NestedJSONWithGJSON(f)),
  33. ginkgo.Entry(common.DockerJSONConfig(f)),
  34. ginkgo.Entry(common.DataPropertyDockerconfigJSON(f)),
  35. ginkgo.Entry(common.SSHKeySyncDataProperty(f)),
  36. ginkgo.Entry(common.DecodingPolicySync(f)), // <--
  37. )
  38. })
  39. func createResources(ctx context.Context, f *framework.Framework, cfg *config) {
  40. secretName := "secretserver-credential"
  41. secretKey := "password"
  42. // Creating a secret to hold the Delinea client secret.
  43. secretSpec := v1.Secret{
  44. ObjectMeta: metav1.ObjectMeta{
  45. Name: secretName,
  46. Namespace: f.Namespace.Name,
  47. },
  48. StringData: map[string]string{
  49. secretKey: cfg.password,
  50. },
  51. }
  52. err := f.CRClient.Create(ctx, &secretSpec)
  53. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  54. // Creating SecretStore.
  55. secretStoreSpec := esv1.SecretStore{
  56. ObjectMeta: metav1.ObjectMeta{
  57. Name: f.Namespace.Name,
  58. Namespace: f.Namespace.Name,
  59. },
  60. Spec: esv1.SecretStoreSpec{
  61. Provider: &esv1.SecretStoreProvider{
  62. SecretServer: &esv1.SecretServerProvider{
  63. ServerURL: cfg.serverURL,
  64. Username: &esv1.SecretServerProviderRef{
  65. Value: cfg.username,
  66. },
  67. Password: &esv1.SecretServerProviderRef{
  68. SecretRef: &esmeta.SecretKeySelector{
  69. Name: secretName,
  70. Key: secretKey,
  71. },
  72. },
  73. },
  74. },
  75. },
  76. }
  77. err = f.CRClient.Create(ctx, &secretStoreSpec)
  78. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  79. }