| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package secretmanager
- import (
- "context"
- "errors"
- "fmt"
- "testing"
- smsV2 "github.com/cloudru-tech/secret-manager-sdk/api/v2"
- "github.com/google/uuid"
- tassert "github.com/stretchr/testify/assert"
- esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
- "github.com/external-secrets/external-secrets/pkg/provider/cloudru/secretmanager/fake"
- )
- const (
- keyID = "50000000-4000-3000-2000-100000000001"
- anotherKeyID = "50000000-4000-3000-2000-100000000002"
- )
- var (
- errInvalidSecretID = errors.New("secret id is invalid")
- errInternal = errors.New("internal server error")
- )
- func TestClientGetSecret(t *testing.T) {
- tests := []struct {
- name string
- ref esv1beta1.ExternalSecretDataRemoteRef
- setup func(mock *fake.MockSecretProvider)
- wantPayload []byte
- wantErr error
- }{
- {
- name: "success",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: uuid.NewString(),
- Version: "1",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion([]byte("secret"), nil)
- },
- wantPayload: []byte("secret"),
- wantErr: nil,
- },
- {
- name: "success_named_secret",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "very_secret",
- Version: "1",
- },
- setup: func(mock *fake.MockSecretProvider) {
- // before it should find the secret by the name.
- mock.MockListSecrets([]*smsV2.Secret{
- {
- Id: keyID,
- Name: "very_secret",
- },
- }, nil)
- mock.MockAccessSecretVersion([]byte("secret"), nil)
- },
- wantPayload: []byte("secret"),
- wantErr: nil,
- },
- {
- name: "success_multikv",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: uuid.NewString(),
- Version: "1",
- Property: "another.secret",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion([]byte(`{"some": "value", "another": {"secret": "another_value"}}`), nil)
- },
- wantPayload: []byte("another_value"),
- wantErr: nil,
- },
- {
- name: "error_access_secret",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: uuid.NewString(),
- Version: "1",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion(nil, errInvalidSecretID)
- },
- wantPayload: nil,
- wantErr: errInvalidSecretID,
- },
- {
- name: "error_access_named_secret",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "very_secret",
- Version: "1",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersionPath(nil, errInternal)
- },
- wantPayload: nil,
- wantErr: errInternal,
- },
- {
- name: "error_access_named_secret:invalid_version",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "very_secret",
- Version: "hello",
- },
- setup: func(mock *fake.MockSecretProvider) {
- },
- wantPayload: nil,
- wantErr: ErrInvalidSecretVersion,
- },
- {
- name: "error_multikv:invalid_json",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: keyID,
- Version: "1",
- Property: "some",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion([]byte(`"some": "value"`), nil)
- },
- wantPayload: nil,
- wantErr: fmt.Errorf(`expecting the secret %q in JSON format, could not access property "some"`, keyID),
- },
- {
- name: "error_multikv:not_found",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: keyID,
- Version: "1",
- Property: "unexpected",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion([]byte(`{"some": "value"}`), nil)
- },
- wantPayload: nil,
- wantErr: fmt.Errorf(`the requested property "unexpected" does not exist in secret %q`, keyID),
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- mock := &fake.MockSecretProvider{}
- tt.setup(mock)
- c := &Client{
- apiClient: mock,
- projectID: "123",
- }
- got, gotErr := c.GetSecret(context.Background(), tt.ref)
- tassert.Equal(t, tt.wantPayload, got)
- tassert.Equal(t, tt.wantErr, gotErr)
- })
- }
- }
- func TestClientGetSecretMap(t *testing.T) {
- tests := []struct {
- name string
- ref esv1beta1.ExternalSecretDataRemoteRef
- setup func(mock *fake.MockSecretProvider)
- wantPayload map[string][]byte
- wantErr error
- }{
- {
- name: "success",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: keyID,
- Version: "1",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion([]byte(`{"some": "value", "another": "value", "foo": {"bar": "baz"}}`), nil)
- },
- wantPayload: map[string][]byte{
- "some": []byte("value"),
- "another": []byte("value"),
- "foo": []byte(`{"bar": "baz"}`),
- },
- wantErr: nil,
- },
- {
- name: "error_access_secret",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: keyID,
- Version: "1",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion(nil, errInvalidSecretID)
- },
- wantPayload: nil,
- wantErr: errInvalidSecretID,
- },
- {
- name: "error_not_json",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: keyID,
- Version: "1",
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockAccessSecretVersion([]byte(`top_secret`), nil)
- },
- wantPayload: nil,
- wantErr: fmt.Errorf(`expecting the secret %q in JSON format`, keyID),
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- mock := &fake.MockSecretProvider{}
- tt.setup(mock)
- c := &Client{
- apiClient: mock,
- projectID: "123",
- }
- got, gotErr := c.GetSecretMap(context.Background(), tt.ref)
- tassert.Equal(t, tt.wantErr, gotErr)
- tassert.Equal(t, len(tt.wantPayload), len(got))
- for k, v := range tt.wantPayload {
- tassert.Equal(t, v, got[k])
- }
- })
- }
- }
- func TestClientGetAllSecrets(t *testing.T) {
- tests := []struct {
- name string
- ref esv1beta1.ExternalSecretFind
- setup func(mock *fake.MockSecretProvider)
- wantPayload map[string][]byte
- wantErr error
- }{
- {
- name: "success",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{RegExp: "secret.*"},
- Tags: map[string]string{
- "env": "prod",
- },
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockListSecrets([]*smsV2.Secret{
- {Id: keyID, Name: "secret1", Path: "secret1"},
- {Id: anotherKeyID, Name: "secret", Path: "storage/secret"},
- }, nil)
- mock.MockAccessSecretVersion([]byte(`{"some": "value", "another": "value", "foo": {"bar": "baz"}}`), nil)
- mock.MockAccessSecretVersion([]byte(`{"second_secret": "prop_value"}`), nil)
- },
- wantPayload: map[string][]byte{
- "secret1": []byte(`{"some": "value", "another": "value", "foo": {"bar": "baz"}}`),
- "storage/secret": []byte(`{"second_secret": "prop_value"}`),
- },
- wantErr: nil,
- },
- {
- name: "success_not_json",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{RegExp: "secr.*"},
- Tags: map[string]string{
- "env": "prod",
- },
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockListSecrets([]*smsV2.Secret{
- {Id: keyID, Name: "secret", Path: "secret"},
- {Id: anotherKeyID, Name: "secret2", Path: "storage/secret"},
- }, nil)
- mock.MockListSecrets(nil, nil) // mock next call
- mock.MockAccessSecretVersion([]byte(`{"some": "value", "another": "value", "foo": {"bar": "baz"}}`), nil)
- mock.MockAccessSecretVersion([]byte(`top_secret`), nil)
- },
- wantPayload: map[string][]byte{
- "secret": []byte(`{"some": "value", "another": "value", "foo": {"bar": "baz"}}`),
- "storage/secret": []byte(`top_secret`),
- },
- wantErr: nil,
- },
- {
- name: "error_no_filters",
- ref: esv1beta1.ExternalSecretFind{},
- wantPayload: nil,
- wantErr: errors.New("at least one of the following fields must be set: tags, name"),
- },
- {
- name: "error_list_secrets",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{RegExp: "label.*"},
- Tags: map[string]string{
- "env": "prod",
- },
- },
- setup: func(mock *fake.MockSecretProvider) {
- mock.MockListSecrets(nil, errInternal)
- },
- wantPayload: nil,
- wantErr: fmt.Errorf("failed to list secrets: %w", errInternal),
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- mock := &fake.MockSecretProvider{}
- if tt.setup != nil {
- tt.setup(mock)
- }
- c := &Client{
- apiClient: mock,
- projectID: "123",
- }
- got, gotErr := c.GetAllSecrets(context.Background(), tt.ref)
- tassert.Equal(t, tt.wantErr, gotErr)
- tassert.Equal(t, len(tt.wantPayload), len(got))
- for k, v := range tt.wantPayload {
- tassert.Equal(t, v, got[k])
- }
- })
- }
- }
|