utils_test.go 34 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package utils
  14. import (
  15. "encoding/json"
  16. "errors"
  17. "reflect"
  18. "testing"
  19. "time"
  20. "github.com/aws/aws-sdk-go-v2/aws"
  21. "github.com/oracle/oci-go-sdk/v65/vault"
  22. "github.com/stretchr/testify/assert"
  23. v1 "k8s.io/api/core/v1"
  24. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  27. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  28. esmetav1 "github.com/external-secrets/external-secrets/apis/meta/v1"
  29. )
  30. const (
  31. base64DecodedValue string = "foo%_?bar"
  32. base64EncodedValue string = "Zm9vJV8/YmFy"
  33. base64URLEncodedValue string = "Zm9vJV8_YmFy"
  34. keyWithEmojis string = "😀foo😁bar😂baz😈bing"
  35. keyWithInvalidChars string = "some-array[0].entity"
  36. keyWithEncodedInvalidChars string = "some-array_U005b_0_U005d_.entity"
  37. )
  38. func TestObjectHash(t *testing.T) {
  39. tests := []struct {
  40. name string
  41. input any
  42. want string
  43. }{
  44. {
  45. name: "A nil should be still working",
  46. input: nil,
  47. want: "c461202a18e99215f121936fb2452e03843828e448a00a53f285a6fc",
  48. },
  49. {
  50. name: "We accept a simple scalar value, i.e. string",
  51. input: "hello there",
  52. want: "f78681ec611ebaeea0689bff6c7812a83ff98a7faba986d9af76c999",
  53. },
  54. {
  55. name: "A complex object like a secret is not an issue",
  56. input: v1.Secret{Data: map[string][]byte{
  57. "xx": []byte("yyy"),
  58. }},
  59. want: "9c717e13e4281db3cdad3f56c6e7faab1d7029c4b4fbbf12fbec9b1e",
  60. },
  61. {
  62. name: "map also works",
  63. input: map[string][]byte{
  64. "foo": []byte("value1"),
  65. "bar": []byte("value2"),
  66. },
  67. want: "1bed8bcbcb4547ffe19a19cd47d9078e84aa6598266d86b99f992d64",
  68. },
  69. }
  70. for _, tt := range tests {
  71. t.Run(tt.name, func(t *testing.T) {
  72. if got := ObjectHash(tt.input); got != tt.want {
  73. t.Errorf("ObjectHash() = %v, want %v", got, tt.want)
  74. }
  75. })
  76. }
  77. }
  78. func TestIsNil(t *testing.T) {
  79. tbl := []struct {
  80. name string
  81. val any
  82. exp bool
  83. }{
  84. {
  85. name: "simple nil val",
  86. val: nil,
  87. exp: true,
  88. },
  89. {
  90. name: "nil slice",
  91. val: (*[]struct{})(nil),
  92. exp: true,
  93. },
  94. {
  95. name: "struct pointer",
  96. val: &testing.T{},
  97. exp: false,
  98. },
  99. {
  100. name: "struct",
  101. val: testing.T{},
  102. exp: false,
  103. },
  104. {
  105. name: "slice of struct",
  106. val: []struct{}{{}},
  107. exp: false,
  108. },
  109. {
  110. name: "slice of ptr",
  111. val: []*testing.T{nil},
  112. exp: false,
  113. },
  114. {
  115. name: "slice",
  116. val: []struct{}(nil),
  117. exp: false,
  118. },
  119. {
  120. name: "int default value",
  121. val: 0,
  122. exp: false,
  123. },
  124. {
  125. name: "empty str",
  126. val: "",
  127. exp: false,
  128. },
  129. {
  130. name: "oracle vault",
  131. val: vault.VaultsClient{},
  132. exp: false,
  133. },
  134. {
  135. name: "func",
  136. val: func() {
  137. // noop for testing and to make linter happy
  138. },
  139. exp: false,
  140. },
  141. {
  142. name: "channel",
  143. val: make(chan struct{}),
  144. exp: false,
  145. },
  146. {
  147. name: "map",
  148. val: map[string]string{},
  149. exp: false,
  150. },
  151. }
  152. for _, row := range tbl {
  153. t.Run(row.name, func(t *testing.T) {
  154. res := IsNil(row.val)
  155. if res != row.exp {
  156. t.Errorf("IsNil(%#v)=%t, expected %t", row.val, res, row.exp)
  157. }
  158. })
  159. }
  160. }
  161. func TestConvertKeys(t *testing.T) {
  162. type args struct {
  163. strategy esv1.ExternalSecretConversionStrategy
  164. in map[string][]byte
  165. }
  166. tests := []struct {
  167. name string
  168. args args
  169. want map[string][]byte
  170. wantErr bool
  171. }{
  172. {
  173. name: "convert with special chars",
  174. args: args{
  175. strategy: esv1.ExternalSecretConversionDefault,
  176. in: map[string][]byte{
  177. "foo$bar%baz*bing": []byte(`noop`),
  178. },
  179. },
  180. want: map[string][]byte{
  181. "foo_bar_baz_bing": []byte(`noop`),
  182. },
  183. },
  184. {
  185. name: "error on collision",
  186. args: args{
  187. strategy: esv1.ExternalSecretConversionDefault,
  188. in: map[string][]byte{
  189. "foo$bar%baz*bing": []byte(`noop`),
  190. "foo_bar_baz$bing": []byte(`noop`),
  191. },
  192. },
  193. wantErr: true,
  194. },
  195. {
  196. name: "convert path",
  197. args: args{
  198. strategy: esv1.ExternalSecretConversionDefault,
  199. in: map[string][]byte{
  200. "/foo/bar/baz/bing": []byte(`noop`),
  201. "foo/bar/baz/bing/": []byte(`noop`),
  202. },
  203. },
  204. want: map[string][]byte{
  205. "_foo_bar_baz_bing": []byte(`noop`),
  206. "foo_bar_baz_bing_": []byte(`noop`),
  207. },
  208. },
  209. {
  210. name: "convert unicode",
  211. args: args{
  212. strategy: esv1.ExternalSecretConversionUnicode,
  213. in: map[string][]byte{
  214. keyWithEmojis: []byte(`noop`),
  215. },
  216. },
  217. want: map[string][]byte{
  218. "_U1f600_foo_U1f601_bar_U1f602_baz_U1f608_bing": []byte(`noop`),
  219. },
  220. },
  221. }
  222. for _, tt := range tests {
  223. t.Run(tt.name, func(t *testing.T) {
  224. got, err := ConvertKeys(tt.args.strategy, tt.args.in)
  225. if (err != nil) != tt.wantErr {
  226. t.Errorf("ConvertKeys() error = %v, wantErr %v", err, tt.wantErr)
  227. return
  228. }
  229. if !reflect.DeepEqual(got, tt.want) {
  230. t.Errorf("ConvertKeys() = %v, want %v", got, tt.want)
  231. }
  232. })
  233. }
  234. }
  235. func TestReverseKeys(t *testing.T) {
  236. type args struct {
  237. encodingStrategy esv1.ExternalSecretConversionStrategy
  238. decodingStrategy esv1alpha1.PushSecretConversionStrategy
  239. in map[string][]byte
  240. }
  241. tests := []struct {
  242. name string
  243. args args
  244. want map[string][]byte
  245. wantErr bool
  246. }{
  247. {
  248. name: "encoding and decoding strategy are selecting Unicode conversion and reverse unicode, so the in and want should match, this test covers Unicode characters beyond the Basic Multilingual Plane (BMP)",
  249. args: args{
  250. encodingStrategy: esv1.ExternalSecretConversionUnicode,
  251. decodingStrategy: esv1alpha1.PushSecretConversionReverseUnicode,
  252. in: map[string][]byte{
  253. keyWithEmojis: []byte(`noop`),
  254. },
  255. },
  256. want: map[string][]byte{
  257. keyWithEmojis: []byte(`noop`),
  258. },
  259. },
  260. {
  261. name: "encoding and decoding strategy are selecting Unicode conversion and reverse unicode, so the in and want should match, this test covers Unicode characters in the Basic Multilingual Plane (BMP)",
  262. args: args{
  263. encodingStrategy: esv1.ExternalSecretConversionUnicode,
  264. decodingStrategy: esv1alpha1.PushSecretConversionReverseUnicode,
  265. in: map[string][]byte{
  266. keyWithInvalidChars: []byte(`noop`),
  267. },
  268. },
  269. want: map[string][]byte{
  270. keyWithInvalidChars: []byte(`noop`),
  271. },
  272. },
  273. {
  274. name: "the encoding strategy is selecting Unicode conversion, but the decoding strategy is none, so we want an encoded representation of the content",
  275. args: args{
  276. encodingStrategy: esv1.ExternalSecretConversionUnicode,
  277. decodingStrategy: esv1alpha1.PushSecretConversionNone,
  278. in: map[string][]byte{
  279. keyWithInvalidChars: []byte(`noop`),
  280. },
  281. },
  282. want: map[string][]byte{
  283. keyWithEncodedInvalidChars: []byte(`noop`),
  284. },
  285. },
  286. }
  287. for _, tt := range tests {
  288. t.Run(tt.name, func(t *testing.T) {
  289. got, err := ConvertKeys(tt.args.encodingStrategy, tt.args.in)
  290. if (err != nil) != tt.wantErr {
  291. t.Errorf("ConvertKeys() error = %v, wantErr %v", err, tt.wantErr)
  292. return
  293. }
  294. got, err = ReverseKeys(tt.args.decodingStrategy, got)
  295. if (err != nil) != tt.wantErr {
  296. t.Errorf("ReverseKeys() error = %v, wantErr %v", err, tt.wantErr)
  297. return
  298. }
  299. if !reflect.DeepEqual(got, tt.want) {
  300. t.Errorf("ReverseKeys() = %v, want %v", got, tt.want)
  301. }
  302. })
  303. }
  304. }
  305. func TestDecode(t *testing.T) {
  306. type args struct {
  307. strategy esv1.ExternalSecretDecodingStrategy
  308. in map[string][]byte
  309. }
  310. tests := []struct {
  311. name string
  312. args args
  313. want map[string][]byte
  314. wantErr bool
  315. }{
  316. {
  317. name: "base64 decoded",
  318. args: args{
  319. strategy: esv1.ExternalSecretDecodeBase64,
  320. in: map[string][]byte{
  321. "foo": []byte("YmFy"),
  322. },
  323. },
  324. want: map[string][]byte{
  325. "foo": []byte("bar"),
  326. },
  327. },
  328. {
  329. name: "invalid base64",
  330. args: args{
  331. strategy: esv1.ExternalSecretDecodeBase64,
  332. in: map[string][]byte{
  333. "foo": []byte("foo"),
  334. },
  335. },
  336. wantErr: true,
  337. },
  338. {
  339. name: "base64url decoded",
  340. args: args{
  341. strategy: esv1.ExternalSecretDecodeBase64URL,
  342. in: map[string][]byte{
  343. "foo": []byte(base64URLEncodedValue),
  344. },
  345. },
  346. want: map[string][]byte{
  347. "foo": []byte(base64DecodedValue),
  348. },
  349. },
  350. {
  351. name: "invalid base64url",
  352. args: args{
  353. strategy: esv1.ExternalSecretDecodeBase64URL,
  354. in: map[string][]byte{
  355. "foo": []byte("foo"),
  356. },
  357. },
  358. wantErr: true,
  359. },
  360. {
  361. name: "none",
  362. args: args{
  363. strategy: esv1.ExternalSecretDecodeNone,
  364. in: map[string][]byte{
  365. "foo": []byte(base64URLEncodedValue),
  366. },
  367. },
  368. want: map[string][]byte{
  369. "foo": []byte(base64URLEncodedValue),
  370. },
  371. },
  372. {
  373. name: "auto",
  374. args: args{
  375. strategy: esv1.ExternalSecretDecodeAuto,
  376. in: map[string][]byte{
  377. "b64": []byte(base64EncodedValue),
  378. "invalidb64": []byte("foo"),
  379. "b64url": []byte(base64URLEncodedValue),
  380. },
  381. },
  382. want: map[string][]byte{
  383. "b64": []byte(base64DecodedValue),
  384. "invalidb64": []byte("foo"),
  385. "b64url": []byte(base64DecodedValue),
  386. },
  387. },
  388. }
  389. for _, tt := range tests {
  390. t.Run(tt.name, func(t *testing.T) {
  391. got, err := DecodeMap(tt.args.strategy, tt.args.in)
  392. if (err != nil) != tt.wantErr {
  393. t.Errorf("DecodeMap() error = %v, wantErr %v", err, tt.wantErr)
  394. return
  395. }
  396. if !reflect.DeepEqual(got, tt.want) {
  397. t.Errorf("DecodeMap() = %v, want %v", got, tt.want)
  398. }
  399. })
  400. }
  401. }
  402. func TestValidate(t *testing.T) {
  403. err := NetworkValidate("http://google.com", 10*time.Second)
  404. if err != nil {
  405. t.Errorf("Connection problem: %v", err)
  406. }
  407. }
  408. func TestRewrite(t *testing.T) {
  409. type args struct {
  410. operations []esv1.ExternalSecretRewrite
  411. in map[string][]byte
  412. }
  413. tests := []struct {
  414. name string
  415. args args
  416. want map[string][]byte
  417. wantErr bool
  418. }{
  419. {
  420. name: "using double merge",
  421. args: args{
  422. operations: []esv1.ExternalSecretRewrite{
  423. {
  424. Merge: &esv1.ExternalSecretRewriteMerge{
  425. Strategy: esv1.ExternalSecretRewriteMergeStrategyJSON,
  426. ConflictPolicy: esv1.ExternalSecretRewriteMergeConflictPolicyIgnore,
  427. Into: "merged",
  428. Priority: []string{"a"},
  429. },
  430. },
  431. {
  432. Merge: &esv1.ExternalSecretRewriteMerge{
  433. Strategy: esv1.ExternalSecretRewriteMergeStrategyExtract,
  434. ConflictPolicy: esv1.ExternalSecretRewriteMergeConflictPolicyIgnore,
  435. Priority: []string{"b"},
  436. },
  437. },
  438. },
  439. in: map[string][]byte{
  440. "a": []byte(`{"host": "dba", "pass": "yola", "port": 123}`),
  441. "b": []byte(`{"host": "dbb", "pass": "yolb"}`),
  442. },
  443. },
  444. want: map[string][]byte{
  445. "host": []byte("dbb"),
  446. "pass": []byte("yolb"),
  447. "port": []byte("123"),
  448. },
  449. },
  450. {
  451. name: "using regexp and merge",
  452. args: args{
  453. operations: []esv1.ExternalSecretRewrite{
  454. {
  455. Regexp: &esv1.ExternalSecretRewriteRegexp{
  456. Source: "db/(.*)",
  457. Target: "$1",
  458. },
  459. },
  460. {
  461. Merge: &esv1.ExternalSecretRewriteMerge{
  462. Strategy: esv1.ExternalSecretRewriteMergeStrategyJSON,
  463. ConflictPolicy: esv1.ExternalSecretRewriteMergeConflictPolicyIgnore,
  464. Into: "merged",
  465. Priority: []string{"a"},
  466. },
  467. },
  468. },
  469. in: map[string][]byte{
  470. "db/a": []byte(`{"host": "dba.example.com"}`),
  471. "db/b": []byte(`{"host": "dbb.example.com", "pass": "yolo"}`),
  472. },
  473. },
  474. want: map[string][]byte{
  475. "a": []byte(`{"host": "dba.example.com"}`),
  476. "b": []byte(`{"host": "dbb.example.com", "pass": "yolo"}`),
  477. "merged": []byte(`{"host":"dba.example.com","pass":"yolo"}`),
  478. },
  479. },
  480. {
  481. name: "replace of a single key",
  482. args: args{
  483. operations: []esv1.ExternalSecretRewrite{
  484. {
  485. Regexp: &esv1.ExternalSecretRewriteRegexp{
  486. Source: "-",
  487. Target: "_",
  488. },
  489. },
  490. },
  491. in: map[string][]byte{
  492. "foo-bar": []byte("bar"),
  493. },
  494. },
  495. want: map[string][]byte{
  496. "foo_bar": []byte("bar"),
  497. },
  498. },
  499. {
  500. name: "no operation",
  501. args: args{
  502. operations: []esv1.ExternalSecretRewrite{
  503. {
  504. Regexp: &esv1.ExternalSecretRewriteRegexp{
  505. Source: "hello",
  506. Target: "world",
  507. },
  508. },
  509. },
  510. in: map[string][]byte{
  511. "foo": []byte("bar"),
  512. },
  513. },
  514. want: map[string][]byte{
  515. "foo": []byte("bar"),
  516. },
  517. },
  518. {
  519. name: "removing prefix from keys",
  520. args: args{
  521. operations: []esv1.ExternalSecretRewrite{
  522. {
  523. Regexp: &esv1.ExternalSecretRewriteRegexp{
  524. Source: "^my/initial/path/",
  525. Target: "",
  526. },
  527. },
  528. },
  529. in: map[string][]byte{
  530. "my/initial/path/foo": []byte("bar"),
  531. },
  532. },
  533. want: map[string][]byte{
  534. "foo": []byte("bar"),
  535. },
  536. },
  537. {
  538. name: "using un-named capture groups",
  539. args: args{
  540. operations: []esv1.ExternalSecretRewrite{
  541. {
  542. Regexp: &esv1.ExternalSecretRewriteRegexp{
  543. Source: "f(.*)o",
  544. Target: "a_new_path_$1",
  545. },
  546. },
  547. },
  548. in: map[string][]byte{
  549. "foo": []byte("bar"),
  550. "foodaloo": []byte("barr"),
  551. },
  552. },
  553. want: map[string][]byte{
  554. "a_new_path_o": []byte("bar"),
  555. "a_new_path_oodalo": []byte("barr"),
  556. },
  557. },
  558. {
  559. name: "using named and numbered capture groups",
  560. args: args{
  561. operations: []esv1.ExternalSecretRewrite{
  562. {
  563. Regexp: &esv1.ExternalSecretRewriteRegexp{
  564. Source: "f(?P<content>.*)o",
  565. Target: "a_new_path_${content}_${1}",
  566. },
  567. },
  568. },
  569. in: map[string][]byte{
  570. "foo": []byte("bar"),
  571. "floo": []byte("barr"),
  572. },
  573. },
  574. want: map[string][]byte{
  575. "a_new_path_o_o": []byte("bar"),
  576. "a_new_path_lo_lo": []byte("barr"),
  577. },
  578. },
  579. {
  580. name: "using sequenced rewrite operations",
  581. args: args{
  582. operations: []esv1.ExternalSecretRewrite{
  583. {
  584. Regexp: &esv1.ExternalSecretRewriteRegexp{
  585. Source: "my/(.*?)/bar/(.*)",
  586. Target: "$1-$2",
  587. },
  588. },
  589. {
  590. Regexp: &esv1.ExternalSecretRewriteRegexp{
  591. Source: "-",
  592. Target: "_",
  593. },
  594. },
  595. {
  596. Regexp: &esv1.ExternalSecretRewriteRegexp{
  597. Source: "ass",
  598. Target: "***",
  599. },
  600. },
  601. },
  602. in: map[string][]byte{
  603. "my/app/bar/key": []byte("bar"),
  604. "my/app/bar/password": []byte("barr"),
  605. },
  606. },
  607. want: map[string][]byte{
  608. "app_key": []byte("bar"),
  609. "app_p***word": []byte("barr"),
  610. },
  611. },
  612. {
  613. name: "using transform rewrite operation to create env var format keys",
  614. args: args{
  615. operations: []esv1.ExternalSecretRewrite{
  616. {
  617. Regexp: &esv1.ExternalSecretRewriteRegexp{
  618. Source: "my/(.*?)/bar/(.*)",
  619. Target: "$1-$2",
  620. },
  621. },
  622. {
  623. Transform: &esv1.ExternalSecretRewriteTransform{
  624. Template: `{{ .value | upper | replace "-" "_" }}`,
  625. },
  626. },
  627. },
  628. in: map[string][]byte{
  629. "my/app/bar/key": []byte("bar"),
  630. },
  631. },
  632. want: map[string][]byte{
  633. "APP_KEY": []byte("bar"),
  634. },
  635. },
  636. }
  637. for _, tt := range tests {
  638. t.Run(tt.name, func(t *testing.T) {
  639. got, err := RewriteMap(tt.args.operations, tt.args.in)
  640. if (err != nil) != tt.wantErr {
  641. t.Errorf("RewriteMap() error = %v, wantErr %v", err, tt.wantErr)
  642. return
  643. }
  644. if !reflect.DeepEqual(got, tt.want) {
  645. t.Errorf("RewriteMap() = %v, want %v", got, tt.want)
  646. }
  647. })
  648. }
  649. }
  650. func TestRewriteMerge(t *testing.T) {
  651. type args struct {
  652. operation esv1.ExternalSecretRewriteMerge
  653. in map[string][]byte
  654. }
  655. tests := []struct {
  656. name string
  657. args args
  658. want map[string][]byte
  659. wantErr bool
  660. }{
  661. {
  662. name: "using empty merge",
  663. args: args{
  664. operation: esv1.ExternalSecretRewriteMerge{},
  665. in: map[string][]byte{
  666. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  667. "redis-credentials": []byte(`{"host": "redis.example.com", "port": "6379"}`),
  668. },
  669. },
  670. want: map[string][]byte{
  671. "username": []byte("foz"),
  672. "password": []byte("baz"),
  673. "host": []byte("redis.example.com"),
  674. "port": []byte("6379"),
  675. },
  676. wantErr: false,
  677. },
  678. {
  679. name: "using priority",
  680. args: args{
  681. operation: esv1.ExternalSecretRewriteMerge{
  682. ConflictPolicy: esv1.ExternalSecretRewriteMergeConflictPolicyIgnore,
  683. Priority: []string{"mongo-credentials", "redis-credentials"},
  684. },
  685. in: map[string][]byte{
  686. "redis-credentials": []byte(`{"host": "redis.example.com", "port": "6379"}`),
  687. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  688. "other-credentials": []byte(`{"key": "value", "host": "other.example.com"}`),
  689. },
  690. },
  691. want: map[string][]byte{
  692. "username": []byte("foz"),
  693. "password": []byte("baz"),
  694. "host": []byte("redis.example.com"),
  695. "port": []byte("6379"),
  696. "key": []byte("value"),
  697. },
  698. wantErr: false,
  699. },
  700. {
  701. name: "using priority with keys not in input (default strict)",
  702. args: args{
  703. operation: esv1.ExternalSecretRewriteMerge{
  704. ConflictPolicy: esv1.ExternalSecretRewriteMergeConflictPolicyIgnore,
  705. Priority: []string{"non-existent-key", "another-missing-key", "mongo-credentials"},
  706. },
  707. in: map[string][]byte{
  708. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  709. "redis-credentials": []byte(`{"host": "redis.example.com", "port": "6379"}`),
  710. },
  711. },
  712. want: nil,
  713. wantErr: true,
  714. },
  715. {
  716. name: "using priority with keys not in input and ignore policy",
  717. args: args{
  718. operation: esv1.ExternalSecretRewriteMerge{
  719. ConflictPolicy: esv1.ExternalSecretRewriteMergeConflictPolicyIgnore,
  720. Priority: []string{"non-existent-key", "mongo-credentials"},
  721. PriorityPolicy: esv1.ExternalSecretRewriteMergePriorityPolicyIgnoreNotFound,
  722. },
  723. in: map[string][]byte{
  724. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  725. "redis-credentials": []byte(`{"host": "redis.example.com", "port": "6379"}`),
  726. },
  727. },
  728. want: map[string][]byte{
  729. "username": []byte("foz"),
  730. "password": []byte("baz"),
  731. "host": []byte("redis.example.com"),
  732. "port": []byte("6379"),
  733. },
  734. wantErr: false,
  735. },
  736. {
  737. name: "using conflict policy error",
  738. args: args{
  739. operation: esv1.ExternalSecretRewriteMerge{
  740. ConflictPolicy: esv1.ExternalSecretRewriteMergeConflictPolicyError,
  741. },
  742. in: map[string][]byte{
  743. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  744. "redis-credentials": []byte(`{"username": "redis", "port": "6379"}`),
  745. },
  746. },
  747. want: nil,
  748. wantErr: true,
  749. },
  750. {
  751. name: "using JSON strategy",
  752. args: args{
  753. operation: esv1.ExternalSecretRewriteMerge{
  754. Strategy: esv1.ExternalSecretRewriteMergeStrategyJSON,
  755. Into: "credentials",
  756. },
  757. in: map[string][]byte{
  758. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  759. "redis-credentials": []byte(`{"host": "redis.example.com", "port": "6379"}`),
  760. },
  761. },
  762. want: map[string][]byte{
  763. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  764. "redis-credentials": []byte(`{"host": "redis.example.com", "port": "6379"}`),
  765. "credentials": func() []byte {
  766. expected := map[string]interface{}{
  767. "username": "foz",
  768. "password": "baz",
  769. "host": "redis.example.com",
  770. "port": "6379",
  771. }
  772. b, _ := json.Marshal(expected)
  773. return b
  774. }(),
  775. },
  776. wantErr: false,
  777. },
  778. {
  779. name: "using JSON strategy without into",
  780. args: args{
  781. operation: esv1.ExternalSecretRewriteMerge{
  782. Strategy: esv1.ExternalSecretRewriteMergeStrategyJSON,
  783. },
  784. in: map[string][]byte{
  785. "mongo-credentials": []byte(`{"username": "foz", "password": "baz"}`),
  786. "redis-credentials": []byte(`{"host": "redis.example.com", "port": "6379"}`),
  787. },
  788. },
  789. want: nil,
  790. wantErr: true,
  791. },
  792. {
  793. name: "with invalid JSON",
  794. args: args{
  795. operation: esv1.ExternalSecretRewriteMerge{},
  796. in: map[string][]byte{
  797. "invalid-json": []byte(`{"username": "foz", "password": "baz"`),
  798. },
  799. },
  800. want: nil,
  801. wantErr: true,
  802. },
  803. }
  804. for _, tt := range tests {
  805. t.Run(tt.name, func(t *testing.T) {
  806. got, err := RewriteMerge(tt.args.operation, tt.args.in)
  807. if (err != nil) != tt.wantErr {
  808. t.Errorf("RewriteMerge() error = %v, wantErr %v", err, tt.wantErr)
  809. return
  810. }
  811. if !reflect.DeepEqual(got, tt.want) {
  812. t.Errorf("RewriteMerge() = %v, want %v", got, tt.want)
  813. }
  814. })
  815. }
  816. }
  817. func TestReverse(t *testing.T) {
  818. type args struct {
  819. strategy esv1alpha1.PushSecretConversionStrategy
  820. in string
  821. }
  822. tests := []struct {
  823. name string
  824. args args
  825. want string
  826. }{
  827. {
  828. name: "do not change the key when using the None strategy",
  829. args: args{
  830. strategy: esv1alpha1.PushSecretConversionNone,
  831. in: keyWithEncodedInvalidChars,
  832. },
  833. want: keyWithEncodedInvalidChars,
  834. },
  835. {
  836. name: "reverse an unicode encoded key",
  837. args: args{
  838. strategy: esv1alpha1.PushSecretConversionReverseUnicode,
  839. in: keyWithEncodedInvalidChars,
  840. },
  841. want: keyWithInvalidChars,
  842. },
  843. {
  844. name: "do not attempt to decode an invalid unicode representation",
  845. args: args{
  846. strategy: esv1alpha1.PushSecretConversionReverseUnicode,
  847. in: "_U0xxx_x_U005b_",
  848. },
  849. want: "_U0xxx_x[",
  850. },
  851. }
  852. for _, tt := range tests {
  853. t.Run(tt.name, func(t *testing.T) {
  854. if got := reverse(tt.args.strategy, tt.args.in); got != tt.want {
  855. t.Errorf("reverse() = %v, want %v", got, tt.want)
  856. }
  857. })
  858. }
  859. }
  860. func TestFetchValueFromMetadata(t *testing.T) {
  861. type args struct {
  862. key string
  863. data *apiextensionsv1.JSON
  864. def any
  865. }
  866. type testCase struct {
  867. name string
  868. args args
  869. wantT any
  870. wantErr bool
  871. }
  872. tests := []testCase{
  873. {
  874. name: "plain dig for an existing key",
  875. args: args{
  876. key: "key",
  877. data: &apiextensionsv1.JSON{
  878. Raw: []byte(
  879. `{"key": "value"}`,
  880. ),
  881. },
  882. def: "def",
  883. },
  884. wantT: "value",
  885. wantErr: false,
  886. },
  887. {
  888. name: "return default if key not found",
  889. args: args{
  890. key: "key2",
  891. data: &apiextensionsv1.JSON{
  892. Raw: []byte(
  893. `{"key": "value"}`,
  894. ),
  895. },
  896. def: "def",
  897. },
  898. wantT: "def",
  899. wantErr: false,
  900. },
  901. {
  902. name: "use a different type",
  903. args: args{
  904. key: "key",
  905. data: &apiextensionsv1.JSON{
  906. Raw: []byte(
  907. `{"key": 123}`,
  908. ),
  909. },
  910. def: 1234,
  911. },
  912. wantT: float64(123), // unmarshal is always float64
  913. wantErr: false,
  914. },
  915. {
  916. name: "digging deeper",
  917. args: args{
  918. key: "key2",
  919. data: &apiextensionsv1.JSON{
  920. Raw: []byte(
  921. `{"key": {"key2": "value"}}`,
  922. ),
  923. },
  924. def: "",
  925. },
  926. wantT: "value",
  927. wantErr: false,
  928. },
  929. {
  930. name: "digging for a slice",
  931. args: args{
  932. key: "topics",
  933. data: &apiextensionsv1.JSON{
  934. Raw: []byte(
  935. `{"topics": ["topic1", "topic2"]}`,
  936. ),
  937. },
  938. def: []string{},
  939. },
  940. wantT: []any{"topic1", "topic2"}, // we don't have deep type matching so it's not an []string{} but []any.
  941. wantErr: false,
  942. },
  943. }
  944. for _, tt := range tests {
  945. t.Run(tt.name, func(t *testing.T) {
  946. gotT, err := FetchValueFromMetadata(tt.args.key, tt.args.data, tt.args.def)
  947. if (err != nil) != tt.wantErr {
  948. t.Errorf("FetchValueFromMetadata() error = %v, wantErr %v", err, tt.wantErr)
  949. return
  950. }
  951. assert.Equal(t, tt.wantT, gotT)
  952. })
  953. }
  954. }
  955. func TestGetByteValue(t *testing.T) {
  956. type args struct {
  957. data any
  958. }
  959. type testCase struct {
  960. name string
  961. args args
  962. want []byte
  963. wantErr bool
  964. }
  965. tests := []testCase{
  966. {
  967. name: "string",
  968. args: args{
  969. data: "value",
  970. },
  971. want: []byte("value"),
  972. wantErr: false,
  973. },
  974. {
  975. name: "map of any",
  976. args: args{
  977. data: map[string]any{
  978. "key": "value",
  979. },
  980. },
  981. want: []byte(`{"key":"value"}`),
  982. wantErr: false,
  983. },
  984. {
  985. name: "slice of string",
  986. args: args{
  987. data: []string{"value1", "value2"},
  988. },
  989. want: []byte("value1\nvalue2"),
  990. wantErr: false,
  991. },
  992. {
  993. name: "json.RawMessage",
  994. args: args{
  995. data: json.RawMessage(`{"key":"value"}`),
  996. },
  997. want: []byte(`{"key":"value"}`),
  998. wantErr: false,
  999. },
  1000. {
  1001. name: "float64",
  1002. args: args{
  1003. data: 123.45,
  1004. },
  1005. want: []byte("123.45"),
  1006. wantErr: false,
  1007. },
  1008. {
  1009. name: "json.Number",
  1010. args: args{
  1011. data: json.Number("123.45"),
  1012. },
  1013. want: []byte("123.45"),
  1014. wantErr: false,
  1015. },
  1016. {
  1017. name: "slice of any",
  1018. args: args{
  1019. data: []any{"value1", "value2"},
  1020. },
  1021. want: []byte(`["value1","value2"]`),
  1022. wantErr: false,
  1023. },
  1024. {
  1025. name: "boolean",
  1026. args: args{
  1027. data: true,
  1028. },
  1029. want: []byte("true"),
  1030. wantErr: false,
  1031. },
  1032. {
  1033. name: "nil",
  1034. args: args{
  1035. data: nil,
  1036. },
  1037. want: []byte(nil),
  1038. wantErr: false,
  1039. },
  1040. }
  1041. for _, tt := range tests {
  1042. t.Run(tt.name, func(t *testing.T) {
  1043. got, err := GetByteValue(tt.args.data)
  1044. if (err != nil) != tt.wantErr {
  1045. t.Errorf("GetByteValue() error = %v, wantErr %v", err, tt.wantErr)
  1046. return
  1047. }
  1048. if !reflect.DeepEqual(got, tt.want) {
  1049. t.Errorf("GetByteValue() = %v, want %v", got, tt.want)
  1050. }
  1051. })
  1052. }
  1053. }
  1054. func TestCompareStringAndByteSlices(t *testing.T) {
  1055. type args struct {
  1056. stringValue *string
  1057. byteValueSlice []byte
  1058. }
  1059. type testCase struct {
  1060. name string
  1061. args args
  1062. want bool
  1063. wantErr bool
  1064. }
  1065. tests := []testCase{
  1066. {
  1067. name: "same contents",
  1068. args: args{
  1069. stringValue: aws.String("value"),
  1070. byteValueSlice: []byte("value"),
  1071. },
  1072. want: true,
  1073. wantErr: true,
  1074. }, {
  1075. name: "different contents",
  1076. args: args{
  1077. stringValue: aws.String("value89"),
  1078. byteValueSlice: []byte("value"),
  1079. },
  1080. want: true,
  1081. wantErr: false,
  1082. }, {
  1083. name: "same contents with random",
  1084. args: args{
  1085. stringValue: aws.String("value89!3#@212"),
  1086. byteValueSlice: []byte("value89!3#@212"),
  1087. },
  1088. want: true,
  1089. wantErr: true,
  1090. }, {
  1091. name: "check Nil",
  1092. args: args{
  1093. stringValue: nil,
  1094. byteValueSlice: []byte("value89!3#@212"),
  1095. },
  1096. want: false,
  1097. wantErr: false,
  1098. },
  1099. }
  1100. for _, tt := range tests {
  1101. t.Run(tt.name, func(t *testing.T) {
  1102. got := CompareStringAndByteSlices(tt.args.stringValue, tt.args.byteValueSlice)
  1103. if got != tt.wantErr {
  1104. t.Errorf("CompareStringAndByteSlices() got = %v, want = %v", got, tt.wantErr)
  1105. return
  1106. }
  1107. })
  1108. }
  1109. }
  1110. func TestValidateSecretSelector(t *testing.T) {
  1111. tests := []struct {
  1112. desc string
  1113. store esv1.GenericStore
  1114. ref esmetav1.SecretKeySelector
  1115. expected error
  1116. }{
  1117. {
  1118. desc: "cluster secret store with namespace reference",
  1119. store: &esv1.ClusterSecretStore{
  1120. TypeMeta: metav1.TypeMeta{
  1121. Kind: esv1.ClusterSecretStoreKind,
  1122. },
  1123. },
  1124. ref: esmetav1.SecretKeySelector{
  1125. Namespace: Ptr("test"),
  1126. },
  1127. expected: nil,
  1128. },
  1129. {
  1130. desc: "secret store without namespace reference",
  1131. store: &esv1.SecretStore{
  1132. TypeMeta: metav1.TypeMeta{
  1133. Kind: esv1.SecretStoreKind,
  1134. },
  1135. },
  1136. ref: esmetav1.SecretKeySelector{},
  1137. expected: nil,
  1138. },
  1139. {
  1140. desc: "secret store with the same namespace reference",
  1141. store: &esv1.SecretStore{
  1142. TypeMeta: metav1.TypeMeta{
  1143. Kind: esv1.SecretStoreKind,
  1144. },
  1145. ObjectMeta: metav1.ObjectMeta{
  1146. Namespace: "test",
  1147. },
  1148. },
  1149. ref: esmetav1.SecretKeySelector{
  1150. Namespace: Ptr("test"),
  1151. },
  1152. expected: nil,
  1153. },
  1154. {
  1155. desc: "cluster secret store without namespace reference",
  1156. store: &esv1.ClusterSecretStore{
  1157. TypeMeta: metav1.TypeMeta{
  1158. Kind: esv1.ClusterSecretStoreKind,
  1159. },
  1160. },
  1161. ref: esmetav1.SecretKeySelector{},
  1162. expected: errRequireNamespace,
  1163. },
  1164. {
  1165. desc: "secret store with the different namespace reference",
  1166. store: &esv1.SecretStore{
  1167. TypeMeta: metav1.TypeMeta{
  1168. Kind: esv1.SecretStoreKind,
  1169. },
  1170. ObjectMeta: metav1.ObjectMeta{
  1171. Namespace: "test",
  1172. },
  1173. },
  1174. ref: esmetav1.SecretKeySelector{
  1175. Namespace: Ptr("different"),
  1176. },
  1177. expected: errNamespaceNotAllowed,
  1178. },
  1179. }
  1180. for _, tt := range tests {
  1181. t.Run(tt.desc, func(t *testing.T) {
  1182. got := ValidateSecretSelector(tt.store, tt.ref)
  1183. if !errors.Is(got, tt.expected) {
  1184. t.Errorf("ValidateSecretSelector() got = %v, want = %v", got, tt.expected)
  1185. return
  1186. }
  1187. })
  1188. }
  1189. }
  1190. func TestValidateReferentSecretSelector(t *testing.T) {
  1191. tests := []struct {
  1192. desc string
  1193. store esv1.GenericStore
  1194. ref esmetav1.SecretKeySelector
  1195. expected error
  1196. }{
  1197. {
  1198. desc: "cluster secret store with namespace reference",
  1199. store: &esv1.ClusterSecretStore{
  1200. TypeMeta: metav1.TypeMeta{
  1201. Kind: esv1.ClusterSecretStoreKind,
  1202. },
  1203. },
  1204. ref: esmetav1.SecretKeySelector{
  1205. Namespace: Ptr("test"),
  1206. },
  1207. expected: nil,
  1208. },
  1209. {
  1210. desc: "secret store without namespace reference",
  1211. store: &esv1.SecretStore{
  1212. TypeMeta: metav1.TypeMeta{
  1213. Kind: esv1.SecretStoreKind,
  1214. },
  1215. },
  1216. ref: esmetav1.SecretKeySelector{},
  1217. expected: nil,
  1218. },
  1219. {
  1220. desc: "secret store with the same namespace reference",
  1221. store: &esv1.SecretStore{
  1222. TypeMeta: metav1.TypeMeta{
  1223. Kind: esv1.SecretStoreKind,
  1224. },
  1225. ObjectMeta: metav1.ObjectMeta{
  1226. Namespace: "test",
  1227. },
  1228. },
  1229. ref: esmetav1.SecretKeySelector{
  1230. Namespace: Ptr("test"),
  1231. },
  1232. expected: nil,
  1233. },
  1234. {
  1235. desc: "secret store with the different namespace reference",
  1236. store: &esv1.SecretStore{
  1237. TypeMeta: metav1.TypeMeta{
  1238. Kind: esv1.SecretStoreKind,
  1239. },
  1240. ObjectMeta: metav1.ObjectMeta{
  1241. Namespace: "test",
  1242. },
  1243. },
  1244. ref: esmetav1.SecretKeySelector{
  1245. Namespace: Ptr("different"),
  1246. },
  1247. expected: errNamespaceNotAllowed,
  1248. },
  1249. }
  1250. for _, tt := range tests {
  1251. t.Run(tt.desc, func(t *testing.T) {
  1252. got := ValidateReferentSecretSelector(tt.store, tt.ref)
  1253. if !errors.Is(got, tt.expected) {
  1254. t.Errorf("ValidateReferentSecretSelector() got = %v, want = %v", got, tt.expected)
  1255. return
  1256. }
  1257. })
  1258. }
  1259. }
  1260. func TestValidateServiceAccountSelector(t *testing.T) {
  1261. tests := []struct {
  1262. desc string
  1263. store esv1.GenericStore
  1264. ref esmetav1.ServiceAccountSelector
  1265. expected error
  1266. }{
  1267. {
  1268. desc: "cluster secret store with namespace reference",
  1269. store: &esv1.ClusterSecretStore{
  1270. TypeMeta: metav1.TypeMeta{
  1271. Kind: esv1.ClusterSecretStoreKind,
  1272. },
  1273. },
  1274. ref: esmetav1.ServiceAccountSelector{
  1275. Namespace: Ptr("test"),
  1276. },
  1277. expected: nil,
  1278. },
  1279. {
  1280. desc: "secret store without namespace reference",
  1281. store: &esv1.SecretStore{
  1282. TypeMeta: metav1.TypeMeta{
  1283. Kind: esv1.SecretStoreKind,
  1284. },
  1285. },
  1286. ref: esmetav1.ServiceAccountSelector{},
  1287. expected: nil,
  1288. },
  1289. {
  1290. desc: "secret store with the same namespace reference",
  1291. store: &esv1.SecretStore{
  1292. TypeMeta: metav1.TypeMeta{
  1293. Kind: esv1.SecretStoreKind,
  1294. },
  1295. ObjectMeta: metav1.ObjectMeta{
  1296. Namespace: "test",
  1297. },
  1298. },
  1299. ref: esmetav1.ServiceAccountSelector{
  1300. Namespace: Ptr("test"),
  1301. },
  1302. expected: nil,
  1303. },
  1304. {
  1305. desc: "cluster secret store without namespace reference",
  1306. store: &esv1.ClusterSecretStore{
  1307. TypeMeta: metav1.TypeMeta{
  1308. Kind: esv1.ClusterSecretStoreKind,
  1309. },
  1310. },
  1311. ref: esmetav1.ServiceAccountSelector{},
  1312. expected: errRequireNamespace,
  1313. },
  1314. {
  1315. desc: "secret store with the different namespace reference",
  1316. store: &esv1.SecretStore{
  1317. TypeMeta: metav1.TypeMeta{
  1318. Kind: esv1.SecretStoreKind,
  1319. },
  1320. ObjectMeta: metav1.ObjectMeta{
  1321. Namespace: "test",
  1322. },
  1323. },
  1324. ref: esmetav1.ServiceAccountSelector{
  1325. Namespace: Ptr("different"),
  1326. },
  1327. expected: errNamespaceNotAllowed,
  1328. },
  1329. }
  1330. for _, tt := range tests {
  1331. t.Run(tt.desc, func(t *testing.T) {
  1332. got := ValidateServiceAccountSelector(tt.store, tt.ref)
  1333. if !errors.Is(got, tt.expected) {
  1334. t.Errorf("ValidateServiceAccountSelector() got = %v, want = %v", got, tt.expected)
  1335. return
  1336. }
  1337. })
  1338. }
  1339. }
  1340. func TestValidateReferentServiceAccountSelector(t *testing.T) {
  1341. tests := []struct {
  1342. desc string
  1343. store esv1.GenericStore
  1344. ref esmetav1.ServiceAccountSelector
  1345. expected error
  1346. }{
  1347. {
  1348. desc: "cluster secret store with namespace reference",
  1349. store: &esv1.ClusterSecretStore{
  1350. TypeMeta: metav1.TypeMeta{
  1351. Kind: esv1.ClusterSecretStoreKind,
  1352. },
  1353. },
  1354. ref: esmetav1.ServiceAccountSelector{
  1355. Namespace: Ptr("test"),
  1356. },
  1357. expected: nil,
  1358. },
  1359. {
  1360. desc: "secret store without namespace reference",
  1361. store: &esv1.SecretStore{
  1362. TypeMeta: metav1.TypeMeta{
  1363. Kind: esv1.SecretStoreKind,
  1364. },
  1365. },
  1366. ref: esmetav1.ServiceAccountSelector{},
  1367. expected: nil,
  1368. },
  1369. {
  1370. desc: "secret store with the same namespace reference",
  1371. store: &esv1.SecretStore{
  1372. TypeMeta: metav1.TypeMeta{
  1373. Kind: esv1.SecretStoreKind,
  1374. },
  1375. ObjectMeta: metav1.ObjectMeta{
  1376. Namespace: "test",
  1377. },
  1378. },
  1379. ref: esmetav1.ServiceAccountSelector{
  1380. Namespace: Ptr("test"),
  1381. },
  1382. expected: nil,
  1383. },
  1384. {
  1385. desc: "secret store with the different namespace reference",
  1386. store: &esv1.SecretStore{
  1387. TypeMeta: metav1.TypeMeta{
  1388. Kind: esv1.SecretStoreKind,
  1389. },
  1390. ObjectMeta: metav1.ObjectMeta{
  1391. Namespace: "test",
  1392. },
  1393. },
  1394. ref: esmetav1.ServiceAccountSelector{
  1395. Namespace: Ptr("different"),
  1396. },
  1397. expected: errNamespaceNotAllowed,
  1398. },
  1399. }
  1400. for _, tt := range tests {
  1401. t.Run(tt.desc, func(t *testing.T) {
  1402. got := ValidateReferentServiceAccountSelector(tt.store, tt.ref)
  1403. if !errors.Is(got, tt.expected) {
  1404. t.Errorf("ValidateReferentServiceAccountSelector() got = %v, want = %v", got, tt.expected)
  1405. return
  1406. }
  1407. })
  1408. }
  1409. }
  1410. const mockJWTToken = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiZXhwIjoxNzAwMDAwMDAwfQ.signature"
  1411. func TestParseJWTClaims(t *testing.T) {
  1412. // Mock JWT token with known payload
  1413. mockToken := mockJWTToken
  1414. claims, err := ParseJWTClaims(mockToken)
  1415. if err != nil {
  1416. t.Fatalf("Failed to get claims: %v", err)
  1417. }
  1418. if claims["sub"] != "1234567890" {
  1419. t.Errorf("Expected sub claim to be '1234567890', got %v", claims["sub"])
  1420. }
  1421. if claims["name"] != "John Doe" {
  1422. t.Errorf("Expected name claim to be 'John Doe', got %v", claims["name"])
  1423. }
  1424. }
  1425. func TestExtractJWTExpiration(t *testing.T) {
  1426. // Mock JWT token with known exp claim
  1427. mockToken := mockJWTToken
  1428. exp, err := ExtractJWTExpiration(mockToken)
  1429. if err != nil {
  1430. t.Fatalf("Failed to get token expiration: %v", err)
  1431. }
  1432. if exp != "1700000000" {
  1433. t.Errorf("Expected expiration to be '1700000000', got %s", exp)
  1434. }
  1435. }