| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package scaleway
- import (
- "context"
- "fmt"
- "testing"
- "github.com/stretchr/testify/assert"
- corev1 "k8s.io/api/core/v1"
- esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
- testingfake "github.com/external-secrets/external-secrets/pkg/provider/testing/fake"
- "github.com/external-secrets/external-secrets/pkg/utils"
- )
- var db = buildDB(&fakeSecretAPI{
- secrets: []*fakeSecret{
- {
- name: "secret-1",
- versions: []*fakeSecretVersion{
- {revision: 1},
- {revision: 2},
- {revision: 3, status: "disabled"},
- },
- },
- {
- name: "secret-2",
- tags: []string{"secret-2-tag-1", "secret-2-tag-2"},
- versions: []*fakeSecretVersion{
- {revision: 1},
- {revision: 2},
- },
- },
- {
- name: "push-me",
- versions: []*fakeSecretVersion{},
- },
- {
- name: "not-changed",
- versions: []*fakeSecretVersion{
- {revision: 1},
- },
- },
- {
- name: "disabling-old-versions",
- versions: []*fakeSecretVersion{
- {revision: 1},
- },
- },
- {
- name: "json-data",
- versions: []*fakeSecretVersion{
- {
- revision: 1,
- data: []byte(`{"some_string": "abc def", "some_int": -100, "some_bool": false}`),
- },
- },
- },
- {
- name: "cant-push",
- versions: []*fakeSecretVersion{
- {revision: 1},
- },
- },
- {
- name: "json-nested",
- versions: []*fakeSecretVersion{
- {revision: 1, data: []byte(
- `{"root":{"intermediate":{"leaf":9}}}`,
- )},
- },
- },
- {
- name: "nested-secret",
- path: "/subpath",
- versions: []*fakeSecretVersion{
- {
- revision: 1,
- data: []byte("secret data"),
- },
- },
- },
- },
- })
- func newTestClient() esv1beta1.SecretsClient {
- return &client{
- api: db,
- cache: newCache(),
- }
- }
- func TestGetSecret(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- secret := db.secrets[0]
- testCases := map[string]struct {
- ref esv1beta1.ExternalSecretDataRemoteRef
- response []byte
- err error
- }{
- "empty version should mean latest_enabled": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + secret.id,
- Version: "",
- },
- response: secret.versions[1].data,
- },
- "asking for latest version": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + secret.id,
- Version: "latest",
- },
- response: secret.versions[2].data,
- },
- "asking for latest version by name": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "name:" + secret.name,
- Version: "latest",
- },
- response: secret.versions[2].data,
- },
- "asking for version by revision number": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + secret.id,
- Version: "1",
- },
- response: secret.versions[0].data,
- },
- "asking for version by revision number and name": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "name:" + secret.name,
- Version: "1",
- },
- response: secret.versions[0].data,
- },
- "asking for nested json property": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + db.secret("json-nested").id,
- Property: "root.intermediate.leaf",
- Version: "latest",
- },
- response: []byte("9"),
- },
- "secret in path": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "path:/subpath/nested-secret",
- Version: "latest",
- },
- response: []byte("secret data"),
- },
- "non existing secret id should yield NoSecretErr": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:730aa98d-ec0c-4426-8202-b11aeec8ea1e",
- },
- err: esv1beta1.NoSecretErr,
- },
- "non existing secret name should yield NoSecretErr": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "name:not-a-secret",
- },
- err: esv1beta1.NoSecretErr,
- },
- "non existing revision should yield NoSecretErr": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + secret.id,
- Version: "9999",
- },
- err: esv1beta1.NoSecretErr,
- },
- "non existing json property should yield not found": {
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + db.secret("json-nested").id,
- Property: "root.intermediate.missing",
- Version: "latest",
- },
- err: esv1beta1.NoSecretErr,
- },
- }
- for tcName, tc := range testCases {
- t.Run(tcName, func(t *testing.T) {
- response, err := c.GetSecret(ctx, tc.ref)
- if tc.err == nil {
- assert.NoError(t, err)
- assert.Equal(t, tc.response, response)
- } else {
- assert.Nil(t, response)
- assert.ErrorIs(t, err, tc.err)
- assert.Equal(t, tc.err, err)
- }
- })
- }
- }
- func TestPushSecret(t *testing.T) {
- secretKey := "secret-key"
- pushSecretData := func(remoteKey string) testingfake.PushSecretData {
- return testingfake.PushSecretData{
- SecretKey: secretKey,
- RemoteKey: remoteKey,
- }
- }
- secret := func(value []byte) *corev1.Secret {
- return &corev1.Secret{
- Data: map[string][]byte{secretKey: value},
- }
- }
- t.Run("to new secret", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- data := []byte("some secret data 6a8ff33b-c69a-4e42-b162-b7b595ee7f5f")
- secretName := "secret-creation-test"
- pushErr := c.PushSecret(ctx, secret(data), pushSecretData(fmt.Sprintf("name:%s", secretName)))
- assert.NoError(t, pushErr)
- assert.Len(t, db.secret(secretName).versions, 1)
- assert.Equal(t, data, db.secret(secretName).versions[0].data)
- })
- t.Run("to secret created by us", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- data := []byte("some secret data a11d416b-9169-4f4a-8c27-d2959b22e189")
- secretName := "secret-update-test"
- assert.NoError(t, c.PushSecret(ctx, secret([]byte("original data")), pushSecretData(fmt.Sprintf("name:%s", secretName))))
- pushErr := c.PushSecret(ctx, secret(data), pushSecretData(fmt.Sprintf("name:%s", secretName)))
- assert.NoError(t, pushErr)
- assert.Len(t, db.secret(secretName).versions, 2)
- assert.Equal(t, data, db.secret(secretName).versions[1].data)
- })
- t.Run("to secret partially created by us with no version", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- data := []byte("some secret data a11d416b-9169-4f4a-8c27-d2959b22e189")
- secretName := "push-me"
- pushErr := c.PushSecret(ctx, secret(data), pushSecretData(fmt.Sprintf("name:%s", secretName)))
- assert.NoError(t, pushErr)
- assert.Len(t, db.secret(secretName).versions, 1)
- assert.Equal(t, data, db.secret(secretName).versions[0].data)
- })
- t.Run("secret created in path", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- data := []byte("some secret data in path")
- secretPath := "/folder"
- secretName := "secret-in-path"
- pushErr := c.PushSecret(ctx, secret(data), pushSecretData(fmt.Sprintf("path:%s/%s", secretPath, secretName)))
- assert.NoError(t, pushErr)
- assert.Len(t, db.secret(secretName).versions, 1)
- assert.Equal(t, data, db.secret(secretName).versions[0].data)
- assert.Equal(t, secretPath, db.secret(secretName).path)
- })
- t.Run("by invalid secret ref is an error", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- pushErr := c.PushSecret(ctx, secret([]byte("some data")), pushSecretData("invalid:abcd"))
- assert.Error(t, pushErr)
- })
- t.Run("by id is an error", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- pushErr := c.PushSecret(ctx, secret([]byte("some data")), pushSecretData(fmt.Sprintf("id:%s", db.secret("cant-push").id)))
- assert.Error(t, pushErr)
- })
- t.Run("without change does not create a version", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- fs := db.secret("not-changed")
- pushErr := c.PushSecret(ctx, secret(fs.versions[0].data), pushSecretData(fmt.Sprintf("name:%s", fs.name)))
- assert.NoError(t, pushErr)
- assert.Equal(t, 1, len(fs.versions))
- })
- t.Run("previous version is disabled", func(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- fs := db.secret("disabling-old-versions")
- pushErr := c.PushSecret(ctx, secret([]byte("some new data")), pushSecretData(fmt.Sprintf("name:%s", fs.name)))
- assert.NoError(t, pushErr)
- assert.Equal(t, 2, len(fs.versions))
- assert.Equal(t, "disabled", fs.versions[0].status)
- })
- }
- func TestGetSecretMap(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- values, getErr := c.GetSecretMap(ctx, esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + db.secret("json-data").id,
- Version: "latest",
- })
- assert.NoError(t, getErr)
- assert.Equal(t, map[string][]byte{
- "some_string": []byte("abc def"),
- "some_int": []byte("-100"),
- "some_bool": []byte("false"),
- }, values)
- }
- func TestGetSecretMapNested(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- values, getErr := c.GetSecretMap(ctx, esv1beta1.ExternalSecretDataRemoteRef{
- Key: "id:" + db.secret("json-nested").id,
- Property: "root.intermediate",
- Version: "latest",
- })
- assert.NoError(t, getErr)
- assert.Equal(t, map[string][]byte{
- "leaf": []byte("9"),
- }, values)
- }
- func TestGetAllSecrets(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- testCases := map[string]struct {
- ref esv1beta1.ExternalSecretFind
- response map[string][]byte
- err error
- }{
- "find secrets by name": {
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{RegExp: "secret-.*"},
- },
- response: map[string][]byte{
- db.secret("secret-1").name: db.secret("secret-1").mustGetVersion("latest_enabled").data,
- db.secret("secret-2").name: db.secret("secret-2").mustGetVersion("latest_enabled").data,
- },
- },
- "find secrets by tags": {
- ref: esv1beta1.ExternalSecretFind{
- Tags: map[string]string{"secret-2-tag-1": "ignored-value"},
- },
- response: map[string][]byte{
- db.secrets[1].name: db.secrets[1].mustGetVersion("latest").data,
- },
- },
- "find secrets by path": {
- ref: esv1beta1.ExternalSecretFind{
- Path: utils.Ptr("/subpath"),
- },
- response: map[string][]byte{
- db.secret("nested-secret").name: db.secret("nested-secret").mustGetVersion("latest_enabled").data,
- },
- },
- }
- for tcName, tc := range testCases {
- t.Run(tcName, func(t *testing.T) {
- response, err := c.GetAllSecrets(ctx, tc.ref)
- if tc.err == nil {
- assert.NoError(t, err)
- assert.Equal(t, tc.response, response)
- } else {
- assert.Nil(t, response)
- assert.ErrorIs(t, err, tc.err)
- assert.Equal(t, tc.err, err)
- }
- })
- }
- }
- func TestDeleteSecret(t *testing.T) {
- ctx := context.Background()
- c := newTestClient()
- secret := db.secrets[0]
- byPath := db.secret("nested-secret")
- testCases := map[string]struct {
- ref testingfake.PushSecretData
- err error
- }{
- "Delete Successfully": {
- ref: testingfake.PushSecretData{RemoteKey: "name:" + secret.name},
- err: nil,
- },
- "Delete by path": {
- ref: testingfake.PushSecretData{RemoteKey: "path:" + byPath.path + "/" + byPath.name},
- err: nil,
- },
- "Secret Not Found": {
- ref: testingfake.PushSecretData{RemoteKey: "name:not-a-secret"},
- err: nil,
- },
- }
- for tcName, tc := range testCases {
- t.Run(tcName, func(t *testing.T) {
- err := c.DeleteSecret(ctx, tc.ref)
- if tc.err == nil {
- assert.NoError(t, err)
- } else {
- assert.ErrorIs(t, err, tc.err)
- assert.Equal(t, tc.err, err)
- }
- })
- }
- }
- func TestSplitNameAndPath(t *testing.T) {
- type test struct {
- in string
- name string
- path string
- ok bool
- }
- tests := []test{
- {
- in: "/foo",
- name: "foo",
- path: "/",
- ok: true,
- },
- {
- in: "",
- name: "",
- path: "",
- },
- {
- in: "/foo/bar",
- name: "bar",
- path: "/foo",
- ok: true,
- },
- }
- for _, tc := range tests {
- t.Run(tc.in, func(t *testing.T) {
- name, path, ok := splitNameAndPath(tc.in)
- assert.Equal(t, tc.ok, ok, "bad ref")
- if tc.ok {
- assert.Equal(t, tc.name, name, "wrong name")
- assert.Equal(t, tc.path, path, "wrong path")
- }
- })
- }
- }
|