| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package onepasswordsdk
- import (
- "context"
- "errors"
- "testing"
- "github.com/1password/onepassword-sdk-go"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- corev1 "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- v1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
- "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
- )
- func TestProviderGetSecret(t *testing.T) {
- tests := []struct {
- name string
- ref v1.ExternalSecretDataRemoteRef
- want []byte
- assertError func(t *testing.T, err error)
- client func() *onepassword.Client
- }{
- {
- name: "get secret successfully",
- client: func() *onepassword.Client {
- fc := &fakeClient{
- resolveResult: "secret",
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- }
- },
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- ref: v1.ExternalSecretDataRemoteRef{
- Key: "secret",
- },
- want: []byte("secret"),
- },
- {
- name: "get secret with error",
- client: func() *onepassword.Client {
- fc := &fakeClient{
- resolveError: errors.New("fobar"),
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- }
- },
- assertError: func(t *testing.T, err error) {
- require.ErrorContains(t, err, "fobar")
- },
- ref: v1.ExternalSecretDataRemoteRef{
- Key: "secret",
- },
- },
- {
- name: "get secret version not implemented",
- client: func() *onepassword.Client {
- fc := &fakeClient{
- resolveResult: "secret",
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- }
- },
- ref: v1.ExternalSecretDataRemoteRef{
- Key: "secret",
- Version: "1",
- },
- assertError: func(t *testing.T, err error) {
- require.ErrorContains(t, err, "is not implemented in the 1Password SDK provider")
- },
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- p := &Provider{
- client: tt.client(),
- vaultPrefix: "op://vault/",
- }
- got, err := p.GetSecret(context.Background(), tt.ref)
- tt.assertError(t, err)
- require.Equal(t, string(got), string(tt.want))
- })
- }
- }
- func TestProviderGetSecretMap(t *testing.T) {
- tests := []struct {
- name string
- ref v1.ExternalSecretDataRemoteRef
- want map[string][]byte
- assertError func(t *testing.T, err error)
- client func() *onepassword.Client
- }{
- {
- name: "get secret successfully for files",
- client: func() *onepassword.Client {
- fc := &fakeClient{}
- fl := &fakeLister{
- listAllResult: []onepassword.ItemOverview{
- {
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- },
- },
- getResult: onepassword.Item{
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- Files: []onepassword.ItemFile{
- {
- Attributes: onepassword.FileAttributes{
- Name: "name",
- ID: "id",
- },
- FieldID: "field-id",
- },
- },
- },
- fileLister: &fakeFileLister{
- readContent: []byte("content"),
- },
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- ItemsAPI: fl,
- VaultsAPI: fc,
- }
- },
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- ref: v1.ExternalSecretDataRemoteRef{
- Key: "key",
- Property: "file/name",
- },
- want: map[string][]byte{
- "name": []byte("content"),
- },
- },
- {
- name: "get secret successfully for fields",
- client: func() *onepassword.Client {
- fc := &fakeClient{}
- fl := &fakeLister{
- listAllResult: []onepassword.ItemOverview{
- {
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- },
- },
- getResult: onepassword.Item{
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- Fields: []onepassword.ItemField{
- {
- ID: "field-id",
- Title: "name",
- FieldType: onepassword.ItemFieldTypeConcealed,
- Value: "value",
- },
- },
- },
- fileLister: &fakeFileLister{
- readContent: []byte("content"),
- },
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- ItemsAPI: fl,
- VaultsAPI: fc,
- }
- },
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- ref: v1.ExternalSecretDataRemoteRef{
- Key: "key",
- Property: "field/name",
- },
- want: map[string][]byte{
- "name": []byte("value"),
- },
- },
- {
- name: "get secret fails with fields with same title",
- client: func() *onepassword.Client {
- fc := &fakeClient{}
- fl := &fakeLister{
- listAllResult: []onepassword.ItemOverview{
- {
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- },
- },
- getResult: onepassword.Item{
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- Fields: []onepassword.ItemField{
- {
- ID: "field-id",
- Title: "name",
- FieldType: onepassword.ItemFieldTypeConcealed,
- Value: "value",
- },
- {
- ID: "field-id",
- Title: "name",
- FieldType: onepassword.ItemFieldTypeConcealed,
- Value: "value",
- },
- },
- },
- fileLister: &fakeFileLister{
- readContent: []byte("content"),
- },
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- ItemsAPI: fl,
- VaultsAPI: fc,
- }
- },
- assertError: func(t *testing.T, err error) {
- require.ErrorContains(t, err, "found more than 1 fields with title 'name' in 'key', got 2")
- },
- ref: v1.ExternalSecretDataRemoteRef{
- Key: "key",
- Property: "field/name",
- },
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- p := &Provider{
- client: tt.client(),
- vaultPrefix: "op://vault/",
- }
- got, err := p.GetSecretMap(context.Background(), tt.ref)
- tt.assertError(t, err)
- require.Equal(t, tt.want, got)
- })
- }
- }
- func TestProviderValidate(t *testing.T) {
- tests := []struct {
- name string
- want v1.ValidationResult
- assertError func(t *testing.T, err error)
- client func() *onepassword.Client
- vaultPrefix string
- }{
- {
- name: "validate successfully",
- client: func() *onepassword.Client {
- fc := &fakeClient{
- listAllResult: []onepassword.VaultOverview{
- {
- ID: "test",
- Title: "test",
- },
- },
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- }
- },
- want: v1.ValidationResultReady,
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- vaultPrefix: "op://vault/",
- },
- {
- name: "validate error",
- client: func() *onepassword.Client {
- fc := &fakeClient{
- listAllResult: []onepassword.VaultOverview{},
- listAllError: errors.New("no vaults found when listing"),
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- }
- },
- want: v1.ValidationResultError,
- assertError: func(t *testing.T, err error) {
- require.ErrorContains(t, err, "no vaults found when listing")
- },
- vaultPrefix: "op://vault/",
- },
- {
- name: "validate error missing vault prefix",
- client: func() *onepassword.Client {
- fc := &fakeClient{
- listAllResult: []onepassword.VaultOverview{},
- listAllError: errors.New("no vaults found when listing"),
- }
- return &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- }
- },
- want: v1.ValidationResultError,
- assertError: func(t *testing.T, err error) {
- require.ErrorContains(t, err, "no vaults found when listing")
- },
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- p := &Provider{
- client: tt.client(),
- vaultPrefix: tt.vaultPrefix,
- }
- got, err := p.Validate()
- tt.assertError(t, err)
- require.Equal(t, got, tt.want)
- })
- }
- }
- func TestPushSecret(t *testing.T) {
- fc := &fakeClient{
- listAllResult: []onepassword.VaultOverview{
- {
- ID: "test",
- Title: "test",
- },
- },
- }
- tests := []struct {
- name string
- ref v1alpha1.PushSecretData
- secret *corev1.Secret
- assertError func(t *testing.T, err error)
- lister func() *fakeLister
- assertLister func(t *testing.T, lister *fakeLister)
- }{
- {
- name: "create is called",
- lister: func() *fakeLister {
- return &fakeLister{
- listAllResult: []onepassword.ItemOverview{},
- }
- },
- secret: &corev1.Secret{
- Data: map[string][]byte{
- "foo": []byte("bar"),
- },
- ObjectMeta: metav1.ObjectMeta{
- Name: "secret",
- Namespace: "default",
- },
- },
- ref: v1alpha1.PushSecretData{
- Match: v1alpha1.PushSecretMatch{
- SecretKey: "foo",
- RemoteRef: v1alpha1.PushSecretRemoteRef{
- RemoteKey: "key",
- },
- },
- },
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- assertLister: func(t *testing.T, lister *fakeLister) {
- assert.True(t, lister.createCalled)
- },
- },
- {
- name: "update is called",
- lister: func() *fakeLister {
- return &fakeLister{
- listAllResult: []onepassword.ItemOverview{
- {
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- },
- },
- }
- },
- secret: &corev1.Secret{
- Data: map[string][]byte{
- "foo": []byte("bar"),
- },
- ObjectMeta: metav1.ObjectMeta{
- Name: "secret",
- Namespace: "default",
- },
- },
- ref: v1alpha1.PushSecretData{
- Match: v1alpha1.PushSecretMatch{
- SecretKey: "foo",
- RemoteRef: v1alpha1.PushSecretRemoteRef{
- RemoteKey: "key",
- },
- },
- },
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- assertLister: func(t *testing.T, lister *fakeLister) {
- assert.True(t, lister.putCalled)
- },
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- ctx := context.Background()
- lister := tt.lister()
- p := &Provider{
- client: &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- ItemsAPI: lister,
- },
- }
- err := p.PushSecret(ctx, tt.secret, tt.ref)
- tt.assertError(t, err)
- tt.assertLister(t, lister)
- })
- }
- }
- func TestDeleteItemField(t *testing.T) {
- fc := &fakeClient{
- listAllResult: []onepassword.VaultOverview{
- {
- ID: "test",
- Title: "test",
- },
- },
- }
- testCases := []struct {
- name string
- lister func() *fakeLister
- ref *v1alpha1.PushSecretRemoteRef
- assertError func(t *testing.T, err error)
- assertLister func(t *testing.T, lister *fakeLister)
- }{
- {
- name: "update is called",
- ref: &v1alpha1.PushSecretRemoteRef{
- RemoteKey: "key",
- Property: "password",
- },
- assertLister: func(t *testing.T, lister *fakeLister) {
- require.True(t, lister.putCalled)
- },
- lister: func() *fakeLister {
- fl := &fakeLister{
- listAllResult: []onepassword.ItemOverview{
- {
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- },
- },
- getResult: onepassword.Item{
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- Fields: []onepassword.ItemField{
- {
- ID: "field-1",
- Title: "password",
- FieldType: onepassword.ItemFieldTypeConcealed,
- Value: "password",
- },
- {
- ID: "field-2",
- Title: "other-field",
- FieldType: onepassword.ItemFieldTypeConcealed,
- Value: "username",
- },
- },
- },
- }
- return fl
- },
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- },
- {
- name: "delete is called",
- ref: &v1alpha1.PushSecretRemoteRef{
- RemoteKey: "key",
- Property: "password",
- },
- assertLister: func(t *testing.T, lister *fakeLister) {
- require.True(t, lister.deleteCalled, "delete should have been called as the item should have existed")
- },
- lister: func() *fakeLister {
- fl := &fakeLister{
- listAllResult: []onepassword.ItemOverview{
- {
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- },
- },
- getResult: onepassword.Item{
- ID: "test-item-id",
- Title: "key",
- Category: "login",
- VaultID: "vault-id",
- Fields: []onepassword.ItemField{
- {
- ID: "field-1",
- Title: "password",
- FieldType: onepassword.ItemFieldTypeConcealed,
- Value: "password",
- },
- },
- },
- }
- return fl
- },
- assertError: func(t *testing.T, err error) {
- require.NoError(t, err)
- },
- },
- }
- for _, testCase := range testCases {
- t.Run(testCase.name, func(t *testing.T) {
- ctx := context.Background()
- lister := testCase.lister()
- p := &Provider{
- client: &onepassword.Client{
- SecretsAPI: fc,
- VaultsAPI: fc,
- ItemsAPI: lister,
- },
- }
- testCase.assertError(t, p.DeleteSecret(ctx, testCase.ref))
- testCase.assertLister(t, lister)
- })
- }
- }
- func TestGetVault(t *testing.T) {
- fc := &fakeClient{
- listAllResult: []onepassword.VaultOverview{
- {
- ID: "vault-id",
- Title: "vault-title",
- },
- },
- }
- p := &Provider{
- client: &onepassword.Client{
- VaultsAPI: fc,
- },
- }
- titleOrUuids := []string{"vault-title", "vault-id"}
- for _, titleOrUuid := range titleOrUuids {
- t.Run(titleOrUuid, func(t *testing.T) {
- vaultID, err := p.GetVault(context.Background(), titleOrUuid)
- require.NoError(t, err)
- require.Equal(t, fc.listAllResult[0].ID, vaultID)
- })
- }
- }
- type fakeLister struct {
- listAllResult []onepassword.ItemOverview
- createCalled bool
- putCalled bool
- deleteCalled bool
- getResult onepassword.Item
- fileLister onepassword.ItemsFilesAPI
- }
- func (f *fakeLister) Create(ctx context.Context, params onepassword.ItemCreateParams) (onepassword.Item, error) {
- f.createCalled = true
- return onepassword.Item{}, nil
- }
- func (f *fakeLister) Get(ctx context.Context, vaultID, itemID string) (onepassword.Item, error) {
- return f.getResult, nil
- }
- func (f *fakeLister) Put(ctx context.Context, item onepassword.Item) (onepassword.Item, error) {
- f.putCalled = true
- return onepassword.Item{}, nil
- }
- func (f *fakeLister) Delete(ctx context.Context, vaultID, itemID string) error {
- f.deleteCalled = true
- return nil
- }
- func (f *fakeLister) Archive(ctx context.Context, vaultID, itemID string) error {
- return nil
- }
- func (f *fakeLister) List(ctx context.Context, vaultID string, opts ...onepassword.ItemListFilter) ([]onepassword.ItemOverview, error) {
- return f.listAllResult, nil
- }
- func (f *fakeLister) Shares() onepassword.ItemsSharesAPI {
- return nil
- }
- func (f *fakeLister) Files() onepassword.ItemsFilesAPI {
- return f.fileLister
- }
- type fakeFileLister struct {
- readContent []byte
- }
- func (f *fakeFileLister) Attach(ctx context.Context, item onepassword.Item, fileParams onepassword.FileCreateParams) (onepassword.Item, error) {
- return onepassword.Item{}, nil
- }
- func (f *fakeFileLister) Read(ctx context.Context, vaultID, itemID string, attr onepassword.FileAttributes) ([]byte, error) {
- return f.readContent, nil
- }
- func (f *fakeFileLister) Delete(ctx context.Context, item onepassword.Item, sectionID, fieldID string) (onepassword.Item, error) {
- return onepassword.Item{}, nil
- }
- func (f *fakeFileLister) ReplaceDocument(ctx context.Context, item onepassword.Item, docParams onepassword.DocumentCreateParams) (onepassword.Item, error) {
- return onepassword.Item{}, nil
- }
- var _ onepassword.ItemsFilesAPI = (*fakeFileLister)(nil)
- type fakeClient struct {
- resolveResult string
- resolveError error
- resolveAll onepassword.ResolveAllResponse
- resolveAllError error
- listAllResult []onepassword.VaultOverview
- listAllError error
- }
- func (f *fakeClient) List(ctx context.Context) ([]onepassword.VaultOverview, error) {
- return f.listAllResult, f.listAllError
- }
- func (f *fakeClient) Resolve(ctx context.Context, secretReference string) (string, error) {
- return f.resolveResult, f.resolveError
- }
- func (f *fakeClient) ResolveAll(ctx context.Context, secretReferences []string) (onepassword.ResolveAllResponse, error) {
- return f.resolveAll, f.resolveAllError
- }
- var _ onepassword.SecretsAPI = &fakeClient{}
- var _ onepassword.VaultsAPI = &fakeClient{}
- var _ onepassword.ItemsAPI = &fakeLister{}
|