vault.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package fake
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "reflect"
  18. "strings"
  19. "sync"
  20. vault "github.com/hashicorp/vault/api"
  21. util "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  22. )
  23. type LoginFn func(ctx context.Context, authMethod vault.AuthMethod) (*vault.Secret, error)
  24. type Auth struct {
  25. LoginFn LoginFn
  26. }
  27. func (f Auth) Login(ctx context.Context, authMethod vault.AuthMethod) (*vault.Secret, error) {
  28. return f.LoginFn(ctx, authMethod)
  29. }
  30. type ReadWithDataWithContextFn func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error)
  31. type ListWithContextFn func(ctx context.Context, path string) (*vault.Secret, error)
  32. type WriteWithContextFn func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error)
  33. type DeleteWithContextFn func(ctx context.Context, path string) (*vault.Secret, error)
  34. type Logical struct {
  35. ReadWithDataWithContextFn ReadWithDataWithContextFn
  36. ListWithContextFn ListWithContextFn
  37. WriteWithContextFn WriteWithContextFn
  38. DeleteWithContextFn DeleteWithContextFn
  39. }
  40. func (f Logical) DeleteWithContext(ctx context.Context, path string) (*vault.Secret, error) {
  41. return f.DeleteWithContextFn(ctx, path)
  42. }
  43. func NewDeleteWithContextFn(secret map[string]any, err error) DeleteWithContextFn {
  44. return func(ctx context.Context, path string) (*vault.Secret, error) {
  45. vault := &vault.Secret{
  46. Data: secret,
  47. }
  48. return vault, err
  49. }
  50. }
  51. func NewReadWithContextFn(secret map[string]any, err error) ReadWithDataWithContextFn {
  52. return func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  53. if secret == nil {
  54. return nil, err
  55. }
  56. vault := &vault.Secret{
  57. Data: secret,
  58. }
  59. return vault, err
  60. }
  61. }
  62. func NewReadMetadataWithContextFn(secret map[string]any, err error) ReadWithDataWithContextFn {
  63. return func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  64. if secret == nil {
  65. return nil, err
  66. }
  67. metadata := make(map[string]any)
  68. metadata["custom_metadata"] = secret
  69. vault := &vault.Secret{
  70. Data: metadata,
  71. }
  72. return vault, err
  73. }
  74. }
  75. func NewWriteWithContextFn(secret map[string]any, err error) WriteWithContextFn {
  76. return func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  77. return &vault.Secret{Data: secret}, err
  78. }
  79. }
  80. func ExpectWriteWithContextValue(expected map[string]any) WriteWithContextFn {
  81. return func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  82. if strings.Contains(path, "metadata") {
  83. return &vault.Secret{Data: data}, nil
  84. }
  85. if !reflect.DeepEqual(expected, data) {
  86. return nil, fmt.Errorf("expected: %v, got: %v", expected, data)
  87. }
  88. return &vault.Secret{Data: data}, nil
  89. }
  90. }
  91. func ExpectWriteWithContextNoCall() WriteWithContextFn {
  92. return func(_ context.Context, path string, data map[string]any) (*vault.Secret, error) {
  93. return nil, errors.New("fail")
  94. }
  95. }
  96. func ExpectDeleteWithContextNoCall() DeleteWithContextFn {
  97. return func(ctx context.Context, path string) (*vault.Secret, error) {
  98. return nil, errors.New("fail")
  99. }
  100. }
  101. func WriteChangingReadContext(secret map[string]any, l Logical) WriteWithContextFn {
  102. v := &vault.Secret{
  103. Data: secret,
  104. }
  105. return func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  106. l.ReadWithDataWithContextFn = func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  107. return v, nil
  108. }
  109. return v, nil
  110. }
  111. }
  112. func (f Logical) ReadWithDataWithContext(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  113. return f.ReadWithDataWithContextFn(ctx, path, data)
  114. }
  115. func (f Logical) ListWithContext(ctx context.Context, path string) (*vault.Secret, error) {
  116. return f.ListWithContextFn(ctx, path)
  117. }
  118. func (f Logical) WriteWithContext(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  119. return f.WriteWithContextFn(ctx, path, data)
  120. }
  121. type RevokeSelfWithContextFn func(ctx context.Context, token string) error
  122. type LookupSelfWithContextFn func(ctx context.Context) (*vault.Secret, error)
  123. type Token struct {
  124. RevokeSelfWithContextFn RevokeSelfWithContextFn
  125. LookupSelfWithContextFn LookupSelfWithContextFn
  126. }
  127. func (f Token) RevokeSelfWithContext(ctx context.Context, token string) error {
  128. return f.RevokeSelfWithContextFn(ctx, token)
  129. }
  130. func (f Token) LookupSelfWithContext(ctx context.Context) (*vault.Secret, error) {
  131. return f.LookupSelfWithContextFn(ctx)
  132. }
  133. type MockSetTokenFn func(v string)
  134. type MockTokenFn func() string
  135. type MockClearTokenFn func()
  136. type MockNamespaceFn func() string
  137. type MockSetNamespaceFn func(namespace string)
  138. type MockAddHeaderFn func(key, value string)
  139. type VaultListResponse struct {
  140. Metadata *vault.Response
  141. Data *vault.Response
  142. }
  143. func NewAuthTokenFn() Token {
  144. return Token{nil, func(ctx context.Context) (*vault.Secret, error) {
  145. return &(vault.Secret{}), nil
  146. }}
  147. }
  148. func NewSetTokenFn(ofn ...func(v string)) MockSetTokenFn {
  149. return func(v string) {
  150. for _, fn := range ofn {
  151. fn(v)
  152. }
  153. }
  154. }
  155. func NewTokenFn(v string) MockTokenFn {
  156. return func() string {
  157. return v
  158. }
  159. }
  160. func NewClearTokenFn() MockClearTokenFn {
  161. return func() {}
  162. }
  163. func NewAddHeaderFn() MockAddHeaderFn {
  164. return func(key, value string) {}
  165. }
  166. type VaultClient struct {
  167. MockLogical Logical
  168. MockAuth Auth
  169. MockAuthToken Token
  170. MockSetToken MockSetTokenFn
  171. MockToken MockTokenFn
  172. MockClearToken MockClearTokenFn
  173. MockNamespace MockNamespaceFn
  174. MockSetNamespace MockSetNamespaceFn
  175. MockAddHeader MockAddHeaderFn
  176. namespace string
  177. lock sync.RWMutex
  178. }
  179. func (c *VaultClient) Logical() Logical {
  180. return c.MockLogical
  181. }
  182. func NewVaultLogical() Logical {
  183. logical := Logical{
  184. ReadWithDataWithContextFn: func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  185. return nil, nil
  186. },
  187. ListWithContextFn: func(ctx context.Context, path string) (*vault.Secret, error) {
  188. return nil, nil
  189. },
  190. WriteWithContextFn: func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  191. return nil, nil
  192. },
  193. }
  194. return logical
  195. }
  196. func (c *VaultClient) Auth() Auth {
  197. return c.MockAuth
  198. }
  199. func NewVaultAuth() Auth {
  200. auth := Auth{
  201. LoginFn: func(ctx context.Context, authMethod vault.AuthMethod) (*vault.Secret, error) {
  202. return nil, nil
  203. },
  204. }
  205. return auth
  206. }
  207. func (c *VaultClient) AuthToken() Token {
  208. return c.MockAuthToken
  209. }
  210. func (c *VaultClient) SetToken(v string) {
  211. c.MockSetToken(v)
  212. }
  213. func (c *VaultClient) Token() string {
  214. return c.MockToken()
  215. }
  216. func (c *VaultClient) ClearToken() {
  217. c.MockClearToken()
  218. }
  219. func (c *VaultClient) Namespace() string {
  220. c.lock.RLock()
  221. defer c.lock.RUnlock()
  222. ns := c.namespace
  223. return ns
  224. }
  225. func (c *VaultClient) SetNamespace(namespace string) {
  226. c.lock.Lock()
  227. defer c.lock.Unlock()
  228. c.namespace = namespace
  229. }
  230. func (c *VaultClient) AddHeader(key, value string) {
  231. c.MockAddHeader(key, value)
  232. }
  233. func ClientWithLoginMock(_ *vault.Config) (util.Client, error) {
  234. cl := VaultClient{
  235. MockAuthToken: NewAuthTokenFn(),
  236. MockSetToken: NewSetTokenFn(),
  237. MockToken: NewTokenFn(""),
  238. MockAuth: NewVaultAuth(),
  239. MockLogical: NewVaultLogical(),
  240. }
  241. return &util.VaultClient{
  242. SetTokenFunc: cl.SetToken,
  243. TokenFunc: cl.Token,
  244. ClearTokenFunc: cl.ClearToken,
  245. AuthField: cl.Auth(),
  246. AuthTokenField: cl.AuthToken(),
  247. LogicalField: cl.Logical(),
  248. NamespaceFunc: cl.Namespace,
  249. SetNamespaceFunc: cl.SetNamespace,
  250. AddHeaderFunc: cl.AddHeader,
  251. }, nil
  252. }