secretserver.go 2.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. package secretserver
  2. import (
  3. "context"
  4. _"fmt"
  5. "github.com/external-secrets/external-secrets-e2e/framework"
  6. "github.com/external-secrets/external-secrets-e2e/suites/provider/cases/common"
  7. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  8. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  9. "github.com/onsi/ginkgo/v2"
  10. "github.com/onsi/gomega"
  11. v1 "k8s.io/api/core/v1"
  12. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  13. )
  14. var _ = ginkgo.Describe("[secretserver]", ginkgo.Label("secretserver"), func() {
  15. f := framework.New("eso-secretserver")
  16. // Initialization is deferred so that assertions work.
  17. provider := &secretStoreProvider{}
  18. ginkgo.BeforeEach(func() {
  19. cfg, err := loadConfigFromEnv()
  20. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  21. provider.init(cfg, f)
  22. createResources(context.Background(), f, cfg)
  23. })
  24. ginkgo.DescribeTable("sync secrets", framework.TableFuncWithExternalSecret(f, provider),
  25. ginkgo.Entry(common.JSONDataWithTemplate(f)),
  26. ginkgo.Entry(common.JSONDataWithProperty(f)),
  27. ginkgo.Entry(common.JSONDataWithoutTargetName(f)),
  28. ginkgo.Entry(common.JSONDataWithTemplateFromLiteral(f)),
  29. ginkgo.Entry(common.TemplateFromConfigmaps(f)),
  30. ginkgo.Entry(common.JSONDataFromSync(f)), // <--
  31. ginkgo.Entry(common.JSONDataFromRewrite(f)), // <--
  32. ginkgo.Entry(common.NestedJSONWithGJSON(f)),
  33. ginkgo.Entry(common.DockerJSONConfig(f)),
  34. ginkgo.Entry(common.DataPropertyDockerconfigJSON(f)),
  35. ginkgo.Entry(common.SSHKeySyncDataProperty(f)),
  36. ginkgo.Entry(common.DecodingPolicySync(f)), // <--
  37. )
  38. })
  39. func createResources(ctx context.Context, f *framework.Framework, cfg *config) {
  40. secretName := "secretserver-credential"
  41. secretKey := "password"
  42. // Creating a secret to hold the Delinea client secret.
  43. secretSpec := v1.Secret{
  44. ObjectMeta: metav1.ObjectMeta{
  45. Name: secretName,
  46. Namespace: f.Namespace.Name,
  47. },
  48. StringData: map[string]string{
  49. secretKey: cfg.password,
  50. },
  51. }
  52. err := f.CRClient.Create(ctx, &secretSpec)
  53. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  54. // Creating SecretStore.
  55. secretStoreSpec := esv1beta1.SecretStore{
  56. ObjectMeta: metav1.ObjectMeta{
  57. Name: f.Namespace.Name,
  58. Namespace: f.Namespace.Name,
  59. },
  60. Spec: esv1beta1.SecretStoreSpec{
  61. Provider: &esv1beta1.SecretStoreProvider{
  62. SecretServer: &esv1beta1.SecretServerProvider{
  63. ServerURL: cfg.serverURL,
  64. Username: &esv1beta1.SecretServerProviderRef{
  65. Value: cfg.username,
  66. },
  67. Password: &esv1beta1.SecretServerProviderRef{
  68. SecretRef: &esmeta.SecretKeySelector{
  69. Name: secretName,
  70. Key: secretKey,
  71. },
  72. },
  73. },
  74. },
  75. },
  76. }
  77. err = f.CRClient.Create(ctx, &secretStoreSpec)
  78. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  79. }