lockbox_test.go 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package lockbox
  13. import (
  14. "context"
  15. b64 "encoding/base64"
  16. "encoding/json"
  17. "testing"
  18. "time"
  19. "github.com/google/uuid"
  20. tassert "github.com/stretchr/testify/assert"
  21. "github.com/yandex-cloud/go-genproto/yandex/cloud/lockbox/v1"
  22. "github.com/yandex-cloud/go-sdk/iamkey"
  23. corev1 "k8s.io/api/core/v1"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. "sigs.k8s.io/controller-runtime/pkg/client"
  26. clientfake "sigs.k8s.io/controller-runtime/pkg/client/fake"
  27. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  28. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  29. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  30. "github.com/external-secrets/external-secrets/pkg/provider/yandex/lockbox/client/fake"
  31. )
  32. func TestNewClient(t *testing.T) {
  33. ctx := context.Background()
  34. const namespace = "namespace"
  35. store := &esv1alpha1.SecretStore{
  36. ObjectMeta: metav1.ObjectMeta{
  37. Namespace: namespace,
  38. },
  39. Spec: esv1alpha1.SecretStoreSpec{
  40. Provider: &esv1alpha1.SecretStoreProvider{
  41. YandexLockbox: &esv1alpha1.YandexLockboxProvider{},
  42. },
  43. },
  44. }
  45. provider, err := schema.GetProvider(store)
  46. tassert.Nil(t, err)
  47. k8sClient := clientfake.NewClientBuilder().Build()
  48. secretClient, err := provider.NewClient(context.Background(), store, k8sClient, namespace)
  49. tassert.EqualError(t, err, "invalid Yandex Lockbox SecretStore resource: missing AuthorizedKey Name")
  50. tassert.Nil(t, secretClient)
  51. store.Spec.Provider.YandexLockbox.Auth = esv1alpha1.YandexLockboxAuth{}
  52. secretClient, err = provider.NewClient(context.Background(), store, k8sClient, namespace)
  53. tassert.EqualError(t, err, "invalid Yandex Lockbox SecretStore resource: missing AuthorizedKey Name")
  54. tassert.Nil(t, secretClient)
  55. store.Spec.Provider.YandexLockbox.Auth.AuthorizedKey = esmeta.SecretKeySelector{}
  56. secretClient, err = provider.NewClient(context.Background(), store, k8sClient, namespace)
  57. tassert.EqualError(t, err, "invalid Yandex Lockbox SecretStore resource: missing AuthorizedKey Name")
  58. tassert.Nil(t, secretClient)
  59. const authorizedKeySecretName = "authorizedKeySecretName"
  60. const authorizedKeySecretKey = "authorizedKeySecretKey"
  61. store.Spec.Provider.YandexLockbox.Auth.AuthorizedKey.Name = authorizedKeySecretName
  62. store.Spec.Provider.YandexLockbox.Auth.AuthorizedKey.Key = authorizedKeySecretKey
  63. secretClient, err = provider.NewClient(context.Background(), store, k8sClient, namespace)
  64. tassert.EqualError(t, err, "could not fetch AuthorizedKey secret: secrets \"authorizedKeySecretName\" not found")
  65. tassert.Nil(t, secretClient)
  66. err = createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, newFakeAuthorizedKey())
  67. tassert.Nil(t, err)
  68. secretClient, err = provider.NewClient(context.Background(), store, k8sClient, namespace)
  69. tassert.EqualError(t, err, "failed to create Yandex Lockbox client: private key parsing failed: Invalid Key: Key must be PEM encoded PKCS1 or PKCS8 private key")
  70. tassert.Nil(t, secretClient)
  71. }
  72. func TestGetSecretForAllEntries(t *testing.T) {
  73. ctx := context.Background()
  74. namespace := uuid.NewString()
  75. authorizedKey := newFakeAuthorizedKey()
  76. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  77. k1, v1 := "k1", "v1"
  78. k2, v2 := "k2", []byte("v2")
  79. secretID, _ := lockboxBackend.CreateSecret(authorizedKey,
  80. textEntry(k1, v1),
  81. binaryEntry(k2, v2),
  82. )
  83. k8sClient := clientfake.NewClientBuilder().Build()
  84. const authorizedKeySecretName = "authorizedKeySecretName"
  85. const authorizedKeySecretKey = "authorizedKeySecretKey"
  86. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  87. tassert.Nil(t, err)
  88. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  89. provider := newLockboxProvider(&fake.YandexCloudCreator{
  90. Backend: lockboxBackend,
  91. })
  92. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  93. tassert.Nil(t, err)
  94. data, err := secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID})
  95. tassert.Nil(t, err)
  96. tassert.Equal(
  97. t,
  98. map[string]string{
  99. k1: v1,
  100. k2: base64(v2),
  101. },
  102. unmarshalStringMap(t, data),
  103. )
  104. }
  105. func TestGetSecretForTextEntry(t *testing.T) {
  106. ctx := context.Background()
  107. namespace := uuid.NewString()
  108. authorizedKey := newFakeAuthorizedKey()
  109. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  110. k1, v1 := "k1", "v1"
  111. k2, v2 := "k2", []byte("v2")
  112. secretID, _ := lockboxBackend.CreateSecret(authorizedKey,
  113. textEntry(k1, v1),
  114. binaryEntry(k2, v2),
  115. )
  116. k8sClient := clientfake.NewClientBuilder().Build()
  117. const authorizedKeySecretName = "authorizedKeySecretName"
  118. const authorizedKeySecretKey = "authorizedKeySecretKey"
  119. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  120. tassert.Nil(t, err)
  121. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  122. provider := newLockboxProvider(&fake.YandexCloudCreator{
  123. Backend: lockboxBackend,
  124. })
  125. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  126. tassert.Nil(t, err)
  127. data, err := secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Property: k1})
  128. tassert.Nil(t, err)
  129. tassert.Equal(t, v1, string(data))
  130. }
  131. func TestGetSecretForBinaryEntry(t *testing.T) {
  132. ctx := context.Background()
  133. namespace := uuid.NewString()
  134. authorizedKey := newFakeAuthorizedKey()
  135. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  136. k1, v1 := "k1", "v1"
  137. k2, v2 := "k2", []byte("v2")
  138. secretID, _ := lockboxBackend.CreateSecret(authorizedKey,
  139. textEntry(k1, v1),
  140. binaryEntry(k2, v2),
  141. )
  142. k8sClient := clientfake.NewClientBuilder().Build()
  143. const authorizedKeySecretName = "authorizedKeySecretName"
  144. const authorizedKeySecretKey = "authorizedKeySecretKey"
  145. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  146. tassert.Nil(t, err)
  147. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  148. provider := newLockboxProvider(&fake.YandexCloudCreator{
  149. Backend: lockboxBackend,
  150. })
  151. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  152. tassert.Nil(t, err)
  153. data, err := secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Property: k2})
  154. tassert.Nil(t, err)
  155. tassert.Equal(t, v2, data)
  156. }
  157. func TestGetSecretByVersionID(t *testing.T) {
  158. ctx := context.Background()
  159. namespace := uuid.NewString()
  160. authorizedKey := newFakeAuthorizedKey()
  161. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  162. oldKey, oldVal := "oldKey", "oldVal"
  163. secretID, oldVersionID := lockboxBackend.CreateSecret(authorizedKey,
  164. textEntry(oldKey, oldVal),
  165. )
  166. k8sClient := clientfake.NewClientBuilder().Build()
  167. const authorizedKeySecretName = "authorizedKeySecretName"
  168. const authorizedKeySecretKey = "authorizedKeySecretKey"
  169. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  170. tassert.Nil(t, err)
  171. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  172. provider := newLockboxProvider(&fake.YandexCloudCreator{
  173. Backend: lockboxBackend,
  174. })
  175. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  176. tassert.Nil(t, err)
  177. data, err := secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Version: oldVersionID})
  178. tassert.Nil(t, err)
  179. tassert.Equal(t, map[string]string{oldKey: oldVal}, unmarshalStringMap(t, data))
  180. newKey, newVal := "newKey", "newVal"
  181. newVersionID := lockboxBackend.AddVersion(secretID,
  182. textEntry(newKey, newVal),
  183. )
  184. data, err = secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Version: oldVersionID})
  185. tassert.Nil(t, err)
  186. tassert.Equal(t, map[string]string{oldKey: oldVal}, unmarshalStringMap(t, data))
  187. data, err = secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Version: newVersionID})
  188. tassert.Nil(t, err)
  189. tassert.Equal(t, map[string]string{newKey: newVal}, unmarshalStringMap(t, data))
  190. }
  191. func TestGetSecretUnauthorized(t *testing.T) {
  192. ctx := context.Background()
  193. namespace := uuid.NewString()
  194. authorizedKeyA := newFakeAuthorizedKey()
  195. authorizedKeyB := newFakeAuthorizedKey()
  196. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  197. secretID, _ := lockboxBackend.CreateSecret(authorizedKeyA,
  198. textEntry("k1", "v1"),
  199. )
  200. k8sClient := clientfake.NewClientBuilder().Build()
  201. const authorizedKeySecretName = "authorizedKeySecretName"
  202. const authorizedKeySecretKey = "authorizedKeySecretKey"
  203. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKeyB)
  204. tassert.Nil(t, err)
  205. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  206. provider := newLockboxProvider(&fake.YandexCloudCreator{
  207. Backend: lockboxBackend,
  208. })
  209. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  210. tassert.Nil(t, err)
  211. _, err = secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID})
  212. tassert.EqualError(t, err, "unable to request secret payload to get secret: permission denied")
  213. }
  214. func TestGetSecretNotFound(t *testing.T) {
  215. ctx := context.Background()
  216. namespace := uuid.NewString()
  217. authorizedKey := newFakeAuthorizedKey()
  218. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  219. k8sClient := clientfake.NewClientBuilder().Build()
  220. const authorizedKeySecretName = "authorizedKeySecretName"
  221. const authorizedKeySecretKey = "authorizedKeySecretKey"
  222. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  223. tassert.Nil(t, err)
  224. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  225. provider := newLockboxProvider(&fake.YandexCloudCreator{
  226. Backend: lockboxBackend,
  227. })
  228. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  229. tassert.Nil(t, err)
  230. _, err = secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: "no-secret-with-this-id"})
  231. tassert.EqualError(t, err, "unable to request secret payload to get secret: secret not found")
  232. secretID, _ := lockboxBackend.CreateSecret(authorizedKey,
  233. textEntry("k1", "v1"),
  234. )
  235. _, err = secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Version: "no-version-with-this-id"})
  236. tassert.EqualError(t, err, "unable to request secret payload to get secret: version not found")
  237. }
  238. func TestGetSecretWithTwoNamespaces(t *testing.T) {
  239. ctx := context.Background()
  240. namespace1 := uuid.NewString()
  241. namespace2 := uuid.NewString()
  242. authorizedKey1 := newFakeAuthorizedKey()
  243. authorizedKey2 := newFakeAuthorizedKey()
  244. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  245. k1, v1 := "k1", "v1"
  246. secretID1, _ := lockboxBackend.CreateSecret(authorizedKey1,
  247. textEntry(k1, v1),
  248. )
  249. k2, v2 := "k2", "v2"
  250. secretID2, _ := lockboxBackend.CreateSecret(authorizedKey2,
  251. textEntry(k2, v2),
  252. )
  253. k8sClient := clientfake.NewClientBuilder().Build()
  254. const authorizedKeySecretName = "authorizedKeySecretName"
  255. const authorizedKeySecretKey = "authorizedKeySecretKey"
  256. err := createK8sSecret(ctx, k8sClient, namespace1, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey1)
  257. tassert.Nil(t, err)
  258. err = createK8sSecret(ctx, k8sClient, namespace2, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey2)
  259. tassert.Nil(t, err)
  260. store1 := newYandexLockboxSecretStore("", namespace1, authorizedKeySecretName, authorizedKeySecretKey)
  261. store2 := newYandexLockboxSecretStore("", namespace2, authorizedKeySecretName, authorizedKeySecretKey)
  262. provider := newLockboxProvider(&fake.YandexCloudCreator{
  263. Backend: lockboxBackend,
  264. })
  265. secretsClient1, err := provider.NewClient(ctx, store1, k8sClient, namespace1)
  266. tassert.Nil(t, err)
  267. secretsClient2, err := provider.NewClient(ctx, store2, k8sClient, namespace2)
  268. tassert.Nil(t, err)
  269. data, err := secretsClient1.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID1, Property: k1})
  270. tassert.Equal(t, v1, string(data))
  271. tassert.Nil(t, err)
  272. data, err = secretsClient1.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID2, Property: k2})
  273. tassert.Nil(t, data)
  274. tassert.EqualError(t, err, "unable to request secret payload to get secret: permission denied")
  275. data, err = secretsClient2.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID1, Property: k1})
  276. tassert.Nil(t, data)
  277. tassert.EqualError(t, err, "unable to request secret payload to get secret: permission denied")
  278. data, err = secretsClient2.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID2, Property: k2})
  279. tassert.Equal(t, v2, string(data))
  280. tassert.Nil(t, err)
  281. }
  282. func TestGetSecretWithTwoApiEndpoints(t *testing.T) {
  283. ctx := context.Background()
  284. apiEndpoint1 := uuid.NewString()
  285. apiEndpoint2 := uuid.NewString()
  286. namespace := uuid.NewString()
  287. authorizedKey1 := newFakeAuthorizedKey()
  288. authorizedKey2 := newFakeAuthorizedKey()
  289. lockboxBackend1 := fake.NewLockboxBackend(time.Hour)
  290. k1, v1 := "k1", "v1"
  291. secretID1, _ := lockboxBackend1.CreateSecret(authorizedKey1,
  292. textEntry(k1, v1),
  293. )
  294. lockboxBackend2 := fake.NewLockboxBackend(time.Hour)
  295. k2, v2 := "k2", "v2"
  296. secretID2, _ := lockboxBackend2.CreateSecret(authorizedKey2,
  297. textEntry(k2, v2),
  298. )
  299. k8sClient := clientfake.NewClientBuilder().Build()
  300. const authorizedKeySecretName1 = "authorizedKeySecretName1"
  301. const authorizedKeySecretKey1 = "authorizedKeySecretKey1"
  302. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName1, authorizedKeySecretKey1, authorizedKey1)
  303. tassert.Nil(t, err)
  304. const authorizedKeySecretName2 = "authorizedKeySecretName2"
  305. const authorizedKeySecretKey2 = "authorizedKeySecretKey2"
  306. err = createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName2, authorizedKeySecretKey2, authorizedKey2)
  307. tassert.Nil(t, err)
  308. store1 := newYandexLockboxSecretStore(apiEndpoint1, namespace, authorizedKeySecretName1, authorizedKeySecretKey1)
  309. store2 := newYandexLockboxSecretStore(apiEndpoint2, namespace, authorizedKeySecretName2, authorizedKeySecretKey2)
  310. provider1 := newLockboxProvider(&fake.YandexCloudCreator{
  311. Backend: lockboxBackend1,
  312. })
  313. provider2 := newLockboxProvider(&fake.YandexCloudCreator{
  314. Backend: lockboxBackend2,
  315. })
  316. secretsClient1, err := provider1.NewClient(ctx, store1, k8sClient, namespace)
  317. tassert.Nil(t, err)
  318. secretsClient2, err := provider2.NewClient(ctx, store2, k8sClient, namespace)
  319. tassert.Nil(t, err)
  320. var data []byte
  321. data, err = secretsClient1.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID1, Property: k1})
  322. tassert.Equal(t, v1, string(data))
  323. tassert.Nil(t, err)
  324. data, err = secretsClient1.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID2, Property: k2})
  325. tassert.Nil(t, data)
  326. tassert.EqualError(t, err, "unable to request secret payload to get secret: secret not found")
  327. data, err = secretsClient2.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID1, Property: k1})
  328. tassert.Nil(t, data)
  329. tassert.EqualError(t, err, "unable to request secret payload to get secret: secret not found")
  330. data, err = secretsClient2.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID2, Property: k2})
  331. tassert.Equal(t, v2, string(data))
  332. tassert.Nil(t, err)
  333. }
  334. func TestGetSecretWithIamTokenExpiration(t *testing.T) {
  335. ctx := context.Background()
  336. namespace := uuid.NewString()
  337. authorizedKey := newFakeAuthorizedKey()
  338. tokenExpirationTime := time.Hour
  339. lockboxBackend := fake.NewLockboxBackend(tokenExpirationTime)
  340. k1, v1 := "k1", "v1"
  341. secretID, _ := lockboxBackend.CreateSecret(authorizedKey,
  342. textEntry(k1, v1),
  343. )
  344. k8sClient := clientfake.NewClientBuilder().Build()
  345. const authorizedKeySecretName = "authorizedKeySecretName"
  346. const authorizedKeySecretKey = "authorizedKeySecretKey"
  347. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  348. tassert.Nil(t, err)
  349. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  350. provider := newLockboxProvider(&fake.YandexCloudCreator{
  351. Backend: lockboxBackend,
  352. })
  353. var data []byte
  354. oldSecretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  355. tassert.Nil(t, err)
  356. data, err = oldSecretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Property: k1})
  357. tassert.Equal(t, v1, string(data))
  358. tassert.Nil(t, err)
  359. lockboxBackend.AdvanceClock(2 * tokenExpirationTime)
  360. data, err = oldSecretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Property: k1})
  361. tassert.Nil(t, data)
  362. tassert.EqualError(t, err, "unable to request secret payload to get secret: iam token expired")
  363. newSecretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  364. tassert.Nil(t, err)
  365. data, err = newSecretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Property: k1})
  366. tassert.Equal(t, v1, string(data))
  367. tassert.Nil(t, err)
  368. }
  369. func TestGetSecretWithIamTokenCleanup(t *testing.T) {
  370. ctx := context.Background()
  371. namespace := uuid.NewString()
  372. authorizedKey1 := newFakeAuthorizedKey()
  373. authorizedKey2 := newFakeAuthorizedKey()
  374. tokenExpirationDuration := time.Hour
  375. lockboxBackend := fake.NewLockboxBackend(tokenExpirationDuration)
  376. secretID1, _ := lockboxBackend.CreateSecret(authorizedKey1,
  377. textEntry("k1", "v1"),
  378. )
  379. secretID2, _ := lockboxBackend.CreateSecret(authorizedKey2,
  380. textEntry("k2", "v2"),
  381. )
  382. var err error
  383. k8sClient := clientfake.NewClientBuilder().Build()
  384. const authorizedKeySecretName1 = "authorizedKeySecretName1"
  385. const authorizedKeySecretKey1 = "authorizedKeySecretKey1"
  386. err = createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName1, authorizedKeySecretKey1, authorizedKey1)
  387. tassert.Nil(t, err)
  388. const authorizedKeySecretName2 = "authorizedKeySecretName2"
  389. const authorizedKeySecretKey2 = "authorizedKeySecretKey2"
  390. err = createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName2, authorizedKeySecretKey2, authorizedKey2)
  391. tassert.Nil(t, err)
  392. store1 := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName1, authorizedKeySecretKey1)
  393. store2 := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName2, authorizedKeySecretKey2)
  394. provider := newLockboxProvider(&fake.YandexCloudCreator{
  395. Backend: lockboxBackend,
  396. })
  397. tassert.False(t, provider.isIamTokenCached(authorizedKey1))
  398. tassert.False(t, provider.isIamTokenCached(authorizedKey2))
  399. // Access secretID1 with authorizedKey1, IAM token for authorizedKey1 should be cached
  400. secretsClient, err := provider.NewClient(ctx, store1, k8sClient, namespace)
  401. tassert.Nil(t, err)
  402. _, err = secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID1})
  403. tassert.Nil(t, err)
  404. tassert.True(t, provider.isIamTokenCached(authorizedKey1))
  405. tassert.False(t, provider.isIamTokenCached(authorizedKey2))
  406. lockboxBackend.AdvanceClock(tokenExpirationDuration * 2)
  407. // Access secretID2 with authorizedKey2, IAM token for authorizedKey2 should be cached
  408. secretsClient, err = provider.NewClient(ctx, store2, k8sClient, namespace)
  409. tassert.Nil(t, err)
  410. _, err = secretsClient.GetSecret(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID2})
  411. tassert.Nil(t, err)
  412. tassert.True(t, provider.isIamTokenCached(authorizedKey1))
  413. tassert.True(t, provider.isIamTokenCached(authorizedKey2))
  414. lockboxBackend.AdvanceClock(tokenExpirationDuration)
  415. tassert.True(t, provider.isIamTokenCached(authorizedKey1))
  416. tassert.True(t, provider.isIamTokenCached(authorizedKey2))
  417. provider.cleanUpIamTokenMap()
  418. tassert.False(t, provider.isIamTokenCached(authorizedKey1))
  419. tassert.True(t, provider.isIamTokenCached(authorizedKey2))
  420. lockboxBackend.AdvanceClock(tokenExpirationDuration)
  421. tassert.False(t, provider.isIamTokenCached(authorizedKey1))
  422. tassert.True(t, provider.isIamTokenCached(authorizedKey2))
  423. provider.cleanUpIamTokenMap()
  424. tassert.False(t, provider.isIamTokenCached(authorizedKey1))
  425. tassert.False(t, provider.isIamTokenCached(authorizedKey2))
  426. }
  427. func TestGetSecretMap(t *testing.T) {
  428. ctx := context.Background()
  429. namespace := uuid.NewString()
  430. authorizedKey := newFakeAuthorizedKey()
  431. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  432. k1, v1 := "k1", "v1"
  433. k2, v2 := "k2", []byte("v2")
  434. secretID, _ := lockboxBackend.CreateSecret(authorizedKey,
  435. textEntry(k1, v1),
  436. binaryEntry(k2, v2),
  437. )
  438. k8sClient := clientfake.NewClientBuilder().Build()
  439. const authorizedKeySecretName = "authorizedKeySecretName"
  440. const authorizedKeySecretKey = "authorizedKeySecretKey"
  441. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  442. tassert.Nil(t, err)
  443. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  444. provider := newLockboxProvider(&fake.YandexCloudCreator{
  445. Backend: lockboxBackend,
  446. })
  447. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  448. tassert.Nil(t, err)
  449. data, err := secretsClient.GetSecretMap(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID})
  450. tassert.Nil(t, err)
  451. tassert.Equal(
  452. t,
  453. map[string][]byte{
  454. k1: []byte(v1),
  455. k2: v2,
  456. },
  457. data,
  458. )
  459. }
  460. func TestGetSecretMapByVersionID(t *testing.T) {
  461. ctx := context.Background()
  462. namespace := uuid.NewString()
  463. authorizedKey := newFakeAuthorizedKey()
  464. lockboxBackend := fake.NewLockboxBackend(time.Hour)
  465. oldKey, oldVal := "oldKey", "oldVal"
  466. secretID, oldVersionID := lockboxBackend.CreateSecret(authorizedKey,
  467. textEntry(oldKey, oldVal),
  468. )
  469. k8sClient := clientfake.NewClientBuilder().Build()
  470. const authorizedKeySecretName = "authorizedKeySecretName"
  471. const authorizedKeySecretKey = "authorizedKeySecretKey"
  472. err := createK8sSecret(ctx, k8sClient, namespace, authorizedKeySecretName, authorizedKeySecretKey, authorizedKey)
  473. tassert.Nil(t, err)
  474. store := newYandexLockboxSecretStore("", namespace, authorizedKeySecretName, authorizedKeySecretKey)
  475. provider := newLockboxProvider(&fake.YandexCloudCreator{
  476. Backend: lockboxBackend,
  477. })
  478. secretsClient, err := provider.NewClient(ctx, store, k8sClient, namespace)
  479. tassert.Nil(t, err)
  480. data, err := secretsClient.GetSecretMap(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Version: oldVersionID})
  481. tassert.Nil(t, err)
  482. tassert.Equal(t, map[string][]byte{oldKey: []byte(oldVal)}, data)
  483. newKey, newVal := "newKey", "newVal"
  484. newVersionID := lockboxBackend.AddVersion(secretID,
  485. textEntry(newKey, newVal),
  486. )
  487. data, err = secretsClient.GetSecretMap(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Version: oldVersionID})
  488. tassert.Nil(t, err)
  489. tassert.Equal(t, map[string][]byte{oldKey: []byte(oldVal)}, data)
  490. data, err = secretsClient.GetSecretMap(ctx, esv1alpha1.ExternalSecretDataRemoteRef{Key: secretID, Version: newVersionID})
  491. tassert.Nil(t, err)
  492. tassert.Equal(t, map[string][]byte{newKey: []byte(newVal)}, data)
  493. }
  494. // helper functions
  495. func newYandexLockboxSecretStore(apiEndpoint, namespace, authorizedKeySecretName, authorizedKeySecretKey string) esv1alpha1.GenericStore {
  496. return &esv1alpha1.SecretStore{
  497. ObjectMeta: metav1.ObjectMeta{
  498. Namespace: namespace,
  499. },
  500. Spec: esv1alpha1.SecretStoreSpec{
  501. Provider: &esv1alpha1.SecretStoreProvider{
  502. YandexLockbox: &esv1alpha1.YandexLockboxProvider{
  503. APIEndpoint: apiEndpoint,
  504. Auth: esv1alpha1.YandexLockboxAuth{
  505. AuthorizedKey: esmeta.SecretKeySelector{
  506. Name: authorizedKeySecretName,
  507. Key: authorizedKeySecretKey,
  508. },
  509. },
  510. },
  511. },
  512. },
  513. }
  514. }
  515. func createK8sSecret(ctx context.Context, k8sClient client.Client, namespace, secretName, secretKey string, secretContent interface{}) error {
  516. data, err := json.Marshal(secretContent)
  517. if err != nil {
  518. return err
  519. }
  520. err = k8sClient.Create(ctx, &corev1.Secret{
  521. ObjectMeta: metav1.ObjectMeta{
  522. Namespace: namespace,
  523. Name: secretName,
  524. },
  525. Data: map[string][]byte{secretKey: data},
  526. })
  527. if err != nil {
  528. return err
  529. }
  530. return nil
  531. }
  532. func newFakeAuthorizedKey() *iamkey.Key {
  533. uniqueLabel := uuid.NewString()
  534. return &iamkey.Key{
  535. Id: uniqueLabel,
  536. Subject: &iamkey.Key_ServiceAccountId{
  537. ServiceAccountId: uniqueLabel,
  538. },
  539. PrivateKey: uniqueLabel,
  540. }
  541. }
  542. func textEntry(key, value string) *lockbox.Payload_Entry {
  543. return &lockbox.Payload_Entry{
  544. Key: key,
  545. Value: &lockbox.Payload_Entry_TextValue{
  546. TextValue: value,
  547. },
  548. }
  549. }
  550. func binaryEntry(key string, value []byte) *lockbox.Payload_Entry {
  551. return &lockbox.Payload_Entry{
  552. Key: key,
  553. Value: &lockbox.Payload_Entry_BinaryValue{
  554. BinaryValue: value,
  555. },
  556. }
  557. }
  558. func unmarshalStringMap(t *testing.T, data []byte) map[string]string {
  559. stringMap := make(map[string]string)
  560. err := json.Unmarshal(data, &stringMap)
  561. tassert.Nil(t, err)
  562. return stringMap
  563. }
  564. func base64(data []byte) string {
  565. return b64.StdEncoding.EncodeToString(data)
  566. }