vault_test.go 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "io/ioutil"
  20. "net/http"
  21. "testing"
  22. "github.com/crossplane/crossplane-runtime/pkg/test"
  23. "github.com/google/go-cmp/cmp"
  24. vault "github.com/hashicorp/vault/api"
  25. corev1 "k8s.io/api/core/v1"
  26. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  27. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  28. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  29. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  30. "github.com/external-secrets/external-secrets/pkg/provider/vault/fake"
  31. )
  32. const (
  33. tokenSecretName = "example-secret-token"
  34. secretDataString = "some-creds"
  35. )
  36. var (
  37. secretStorePath = "secret"
  38. )
  39. func makeValidSecretStoreWithVersion(v esv1beta1.VaultKVStoreVersion) *esv1beta1.SecretStore {
  40. return &esv1beta1.SecretStore{
  41. ObjectMeta: metav1.ObjectMeta{
  42. Name: "vault-store",
  43. Namespace: "default",
  44. },
  45. Spec: esv1beta1.SecretStoreSpec{
  46. Provider: &esv1beta1.SecretStoreProvider{
  47. Vault: &esv1beta1.VaultProvider{
  48. Server: "vault.example.com",
  49. Path: &secretStorePath,
  50. Version: v,
  51. Auth: esv1beta1.VaultAuth{
  52. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  53. Path: "kubernetes",
  54. Role: "kubernetes-auth-role",
  55. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  56. Name: "example-sa",
  57. },
  58. },
  59. },
  60. },
  61. },
  62. },
  63. }
  64. }
  65. func makeValidSecretStore() *esv1beta1.SecretStore {
  66. return makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2)
  67. }
  68. func makeValidSecretStoreWithCerts() *esv1beta1.SecretStore {
  69. return &esv1beta1.SecretStore{
  70. ObjectMeta: metav1.ObjectMeta{
  71. Name: "vault-store",
  72. Namespace: "default",
  73. },
  74. Spec: esv1beta1.SecretStoreSpec{
  75. Provider: &esv1beta1.SecretStoreProvider{
  76. Vault: &esv1beta1.VaultProvider{
  77. Server: "vault.example.com",
  78. Path: &secretStorePath,
  79. Version: esv1beta1.VaultKVStoreV2,
  80. Auth: esv1beta1.VaultAuth{
  81. Cert: &esv1beta1.VaultCertAuth{
  82. ClientCert: esmeta.SecretKeySelector{
  83. Name: "tls-auth-certs",
  84. Key: "tls.crt",
  85. },
  86. SecretRef: esmeta.SecretKeySelector{
  87. Name: "tls-auth-certs",
  88. Key: "tls.key",
  89. },
  90. },
  91. },
  92. },
  93. },
  94. },
  95. }
  96. }
  97. func makeValidSecretStoreWithK8sCerts(isSecret bool) *esv1beta1.SecretStore {
  98. store := makeSecretStore()
  99. caProvider := &esv1beta1.CAProvider{
  100. Name: "vault-cert",
  101. Key: "cert",
  102. }
  103. if isSecret {
  104. caProvider.Type = "Secret"
  105. } else {
  106. caProvider.Type = "ConfigMap"
  107. }
  108. store.Spec.Provider.Vault.CAProvider = caProvider
  109. return store
  110. }
  111. func makeInvalidClusterSecretStoreWithK8sCerts() *esv1beta1.ClusterSecretStore {
  112. return &esv1beta1.ClusterSecretStore{
  113. TypeMeta: metav1.TypeMeta{
  114. Kind: "ClusterSecretStore",
  115. },
  116. ObjectMeta: metav1.ObjectMeta{
  117. Name: "vault-store",
  118. Namespace: "default",
  119. },
  120. Spec: esv1beta1.SecretStoreSpec{
  121. Provider: &esv1beta1.SecretStoreProvider{
  122. Vault: &esv1beta1.VaultProvider{
  123. Server: "vault.example.com",
  124. Path: &secretStorePath,
  125. Version: "v2",
  126. Auth: esv1beta1.VaultAuth{
  127. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  128. Path: "kubernetes",
  129. Role: "kubernetes-auth-role",
  130. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  131. Name: "example-sa",
  132. },
  133. },
  134. },
  135. CAProvider: &esv1beta1.CAProvider{
  136. Name: "vault-cert",
  137. Key: "cert",
  138. Type: "Secret",
  139. },
  140. },
  141. },
  142. },
  143. }
  144. }
  145. type secretStoreTweakFn func(s *esv1beta1.SecretStore)
  146. func makeSecretStore(tweaks ...secretStoreTweakFn) *esv1beta1.SecretStore {
  147. store := makeValidSecretStore()
  148. for _, fn := range tweaks {
  149. fn(store)
  150. }
  151. return store
  152. }
  153. func newVaultResponse(data *vault.Secret) *vault.Response {
  154. jsonData, _ := json.Marshal(data)
  155. return &vault.Response{
  156. Response: &http.Response{
  157. Body: ioutil.NopCloser(bytes.NewReader(jsonData)),
  158. },
  159. }
  160. }
  161. func newVaultResponseWithData(data map[string]interface{}) *vault.Response {
  162. return newVaultResponse(&vault.Secret{
  163. Data: data,
  164. })
  165. }
  166. func newVaultTokenIDResponse(token string) *vault.Response {
  167. return newVaultResponseWithData(map[string]interface{}{
  168. "id": token,
  169. })
  170. }
  171. type args struct {
  172. newClientFunc func(c *vault.Config) (Client, error)
  173. store esv1beta1.GenericStore
  174. kube kclient.Client
  175. ns string
  176. }
  177. type want struct {
  178. err error
  179. }
  180. type testCase struct {
  181. reason string
  182. args args
  183. want want
  184. }
  185. func clientWithLoginMock(c *vault.Config) (Client, error) {
  186. return &fake.VaultClient{
  187. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  188. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  189. newVaultTokenIDResponse("test-token"), nil, func(got *vault.Request) error { return nil }),
  190. MockSetToken: fake.NewSetTokenFn(),
  191. }, nil
  192. }
  193. func kubeMockWithSecretTokenAndServiceAcc(obj kclient.Object) error {
  194. if o, ok := obj.(*corev1.ServiceAccount); ok {
  195. o.Secrets = []corev1.ObjectReference{
  196. {
  197. Name: tokenSecretName,
  198. },
  199. }
  200. return nil
  201. }
  202. if o, ok := obj.(*corev1.Secret); ok {
  203. o.Data = map[string][]byte{
  204. "token": []byte(secretDataString),
  205. }
  206. return nil
  207. }
  208. return nil
  209. }
  210. func TestNewVault(t *testing.T) {
  211. errBoom := errors.New("boom")
  212. secretClientKey := []byte(`-----BEGIN RSA PRIVATE KEY-----
  213. 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
  214. -----END RSA PRIVATE KEY-----`)
  215. clientCrt := []byte(`-----BEGIN CERTIFICATE-----
  216. MIICsTCCAZkCFEJJ4daz5sxkFlzq9n1djLEuG7bmMA0GCSqGSIb3DQEBCwUAMBMxETAPBgNVBAMMCHZhdWx0LWNhMB4XDTIxMDcyMDA4MTQxM1oXDTIyMDcyMDA4MTQxM1owFzEVMBMGA1UEAwwMdmF1bHQtY2xpZW50MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArfZ4HV1obFVlVNiA24tX/UOakqRnEtWXpIvaOsMaPGvvODgGe4XnyJGO32idPv85sIr7vDH9p+OhactVlJV1fu5SZoZ7pg4jTCLqVDCb3IRD++yik2Sw58YayNe3HiaCTsJQWeMXLzfaqOeyk6bEpBCJo09+3QxUWxijgJ7YZCb+Gi8pf3ZWeSZG+rGNNvXHmTs1Yu1H849SYXu+uJOd/R3ZSTw8CxFe4eTLgbCnPf6tgA8Sg2hc+CAZxunPP2JLZWbiJXxjNRoypso6MAJ1FRkx5sTJiLg6UoLvd95/S/lCVOR2PDlM1hg7ox8VEd4QHky7tLx7gji/5hHQKJQSTwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQAsDYKtzScIA7bqIOmqF8rr+oLSjRhPt5OfT+KGNdXk8G3VAy1ED2tyCHaRNC7dPLq4EvcxbIXQnXPy1iZMofriGbFPAcQ2fyWUesAD6bYSpI+bYxwz6Ebb93hU5nc/FyXg8yh0kgiGbY3MrACPjxqP2+z5kcOC3u3hx3SZylgW7TeOXDTdqSbNfH1b+1rR/bVNgQQshjhU9d+c4Yv/t0u07uykBhHLWZDSnYiAeOZ8+mWuOSDkcZHE1zznx74fWgtN0zRDtr0L0w9evT9R2CnNSZGxXcEQxAlQ7SL/Jyw82TFCGEw0L4jj7jjvx0N5J8KX/DulUDE9vuVyQEJ88Epe
  217. -----END CERTIFICATE-----
  218. `)
  219. secretData := []byte(secretDataString)
  220. cases := map[string]testCase{
  221. "InvalidVaultStore": {
  222. reason: "Should return error if given an invalid vault store.",
  223. args: args{
  224. store: &esv1beta1.SecretStore{},
  225. },
  226. want: want{
  227. err: errors.New(errVaultStore),
  228. },
  229. },
  230. "AddVaultStoreCertsError": {
  231. reason: "Should return error if given an invalid CA certificate.",
  232. args: args{
  233. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  234. s.Spec.Provider.Vault.CABundle = []byte("badcertdata")
  235. }),
  236. },
  237. want: want{
  238. err: errors.New(errVaultCert),
  239. },
  240. },
  241. "VaultAuthFormatError": {
  242. reason: "Should return error if no valid authentication method is given.",
  243. args: args{
  244. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  245. s.Spec.Provider.Vault.Auth = esv1beta1.VaultAuth{}
  246. }),
  247. },
  248. want: want{
  249. err: errors.New(errAuthFormat),
  250. },
  251. },
  252. "GetKubeServiceAccountError": {
  253. reason: "Should return error if fetching kubernetes secret fails.",
  254. args: args{
  255. store: makeSecretStore(),
  256. kube: &test.MockClient{
  257. MockGet: test.NewMockGetFn(errBoom),
  258. },
  259. },
  260. want: want{
  261. err: fmt.Errorf(errGetKubeSA, "example-sa", errBoom),
  262. },
  263. },
  264. "GetKubeSecretError": {
  265. reason: "Should return error if fetching kubernetes secret fails.",
  266. args: args{
  267. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  268. s.Spec.Provider.Vault.Auth.Kubernetes.ServiceAccountRef = nil
  269. s.Spec.Provider.Vault.Auth.Kubernetes.SecretRef = &esmeta.SecretKeySelector{
  270. Name: "vault-secret",
  271. Key: "key",
  272. }
  273. }),
  274. kube: &test.MockClient{
  275. MockGet: test.NewMockGetFn(errBoom),
  276. },
  277. },
  278. want: want{
  279. err: fmt.Errorf(errGetKubeSecret, "vault-secret", errBoom),
  280. },
  281. },
  282. "SuccessfulVaultStore": {
  283. reason: "Should return a Vault provider successfully",
  284. args: args{
  285. store: makeSecretStore(),
  286. kube: &test.MockClient{
  287. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  288. },
  289. newClientFunc: func(c *vault.Config) (Client, error) {
  290. return &fake.VaultClient{
  291. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  292. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  293. newVaultTokenIDResponse("test-token"), nil, func(got *vault.Request) error {
  294. kubeRole := makeValidSecretStore().Spec.Provider.Vault.Auth.Kubernetes.Role
  295. want := kubeParameters(kubeRole, string(secretData))
  296. if diff := cmp.Diff(want, got.Obj); diff != "" {
  297. t.Errorf("RawRequestWithContext(...): -want, +got:\n%s", diff)
  298. }
  299. return nil
  300. }),
  301. MockSetToken: fake.NewSetTokenFn(),
  302. MockToken: fake.NewTokenFn(""),
  303. MockClearToken: fake.NewClearTokenFn(),
  304. }, nil
  305. },
  306. },
  307. want: want{
  308. err: nil,
  309. },
  310. },
  311. "SuccessfulVaultStoreWithCertAuth": {
  312. reason: "Should return a Vault provider successfully",
  313. args: args{
  314. store: makeValidSecretStoreWithCerts(),
  315. kube: &test.MockClient{
  316. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  317. if o, ok := obj.(*corev1.Secret); ok {
  318. o.Data = map[string][]byte{
  319. "tls.key": secretClientKey,
  320. "tls.crt": clientCrt,
  321. }
  322. return nil
  323. }
  324. return nil
  325. }),
  326. },
  327. newClientFunc: clientWithLoginMock,
  328. },
  329. want: want{
  330. err: nil,
  331. },
  332. },
  333. "SuccessfulVaultStoreWithK8sCertSecret": {
  334. reason: "Should return a Vault prodvider with the cert from k8s",
  335. args: args{
  336. store: makeValidSecretStoreWithK8sCerts(true),
  337. kube: &test.MockClient{
  338. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  339. if o, ok := obj.(*corev1.Secret); ok {
  340. o.Data = map[string][]byte{
  341. "cert": clientCrt,
  342. "token": secretData,
  343. }
  344. return nil
  345. }
  346. if o, ok := obj.(*corev1.ServiceAccount); ok {
  347. o.Secrets = []corev1.ObjectReference{
  348. {
  349. Name: tokenSecretName,
  350. },
  351. }
  352. return nil
  353. }
  354. return nil
  355. }),
  356. },
  357. newClientFunc: clientWithLoginMock,
  358. },
  359. want: want{
  360. err: nil,
  361. },
  362. },
  363. "GetCertNamespaceMissingError": {
  364. reason: "Should return an error if namespace is missing and is a ClusterSecretStore",
  365. args: args{
  366. store: makeInvalidClusterSecretStoreWithK8sCerts(),
  367. kube: &test.MockClient{
  368. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  369. },
  370. },
  371. want: want{
  372. err: errors.New(errCANamespace),
  373. },
  374. },
  375. "GetCertSecretKeyMissingError": {
  376. reason: "Should return an error if the secret key is missing",
  377. args: args{
  378. store: makeValidSecretStoreWithK8sCerts(true),
  379. kube: &test.MockClient{
  380. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  381. },
  382. newClientFunc: clientWithLoginMock,
  383. },
  384. want: want{
  385. err: fmt.Errorf(errVaultCert, errors.New(`cannot find secret data for key: "cert"`)),
  386. },
  387. },
  388. "SuccessfulVaultStoreWithK8sCertConfigMap": {
  389. reason: "Should return a Vault prodvider with the cert from k8s",
  390. args: args{
  391. store: makeValidSecretStoreWithK8sCerts(false),
  392. kube: &test.MockClient{
  393. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  394. if o, ok := obj.(*corev1.ConfigMap); ok {
  395. o.Data = map[string]string{
  396. "cert": string(clientCrt),
  397. }
  398. return nil
  399. }
  400. if o, ok := obj.(*corev1.ServiceAccount); ok {
  401. o.Secrets = []corev1.ObjectReference{
  402. {
  403. Name: tokenSecretName,
  404. },
  405. }
  406. return nil
  407. }
  408. if o, ok := obj.(*corev1.Secret); ok {
  409. o.Data = map[string][]byte{
  410. "token": secretData,
  411. }
  412. return nil
  413. }
  414. return nil
  415. }),
  416. },
  417. newClientFunc: clientWithLoginMock,
  418. },
  419. want: want{
  420. err: nil,
  421. },
  422. },
  423. "GetCertConfigMapMissingError": {
  424. reason: "Should return an error if the config map key is missing",
  425. args: args{
  426. store: makeValidSecretStoreWithK8sCerts(false),
  427. kube: &test.MockClient{
  428. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  429. if o, ok := obj.(*corev1.ServiceAccount); ok {
  430. o.Secrets = []corev1.ObjectReference{
  431. {
  432. Name: tokenSecretName,
  433. },
  434. }
  435. return nil
  436. }
  437. if o, ok := obj.(*corev1.Secret); ok {
  438. o.Data = map[string][]byte{
  439. "token": secretData,
  440. }
  441. return nil
  442. }
  443. return nil
  444. }),
  445. },
  446. newClientFunc: clientWithLoginMock,
  447. },
  448. want: want{
  449. err: fmt.Errorf(errConfigMapFmt, "cert"),
  450. },
  451. },
  452. "GetCertificateFormatError": {
  453. reason: "Should return error if client certificate is in wrong format.",
  454. args: args{
  455. store: makeValidSecretStoreWithCerts(),
  456. kube: &test.MockClient{
  457. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  458. if o, ok := obj.(*corev1.Secret); ok {
  459. o.Data = map[string][]byte{
  460. "tls.key": secretClientKey,
  461. "tls.crt": []byte("cert with mistak"),
  462. }
  463. return nil
  464. }
  465. return nil
  466. }),
  467. },
  468. newClientFunc: clientWithLoginMock,
  469. },
  470. want: want{
  471. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in certificate input"),
  472. },
  473. },
  474. "GetKeyFormatError": {
  475. reason: "Should return error if client key is in wrong format.",
  476. args: args{
  477. store: makeValidSecretStoreWithCerts(),
  478. kube: &test.MockClient{
  479. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  480. if o, ok := obj.(*corev1.Secret); ok {
  481. o.Data = map[string][]byte{
  482. "tls.key": []byte("key with mistake"),
  483. "tls.crt": clientCrt,
  484. }
  485. return nil
  486. }
  487. return nil
  488. }),
  489. },
  490. newClientFunc: clientWithLoginMock,
  491. },
  492. want: want{
  493. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in key input"),
  494. },
  495. },
  496. }
  497. for name, tc := range cases {
  498. t.Run(name, func(t *testing.T) {
  499. vaultTest(t, name, tc)
  500. })
  501. }
  502. }
  503. func vaultTest(t *testing.T, name string, tc testCase) {
  504. conn := &connector{
  505. newVaultClient: tc.args.newClientFunc,
  506. }
  507. if tc.args.newClientFunc == nil {
  508. conn.newVaultClient = newVaultClient
  509. }
  510. _, err := conn.NewClient(context.Background(), tc.args.store, tc.args.kube, tc.args.ns)
  511. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  512. t.Errorf("\n%s\nvault.New(...): -want error, +got error:\n%s", tc.reason, diff)
  513. }
  514. }
  515. func TestGetSecret(t *testing.T) {
  516. errBoom := errors.New("boom")
  517. secret := map[string]interface{}{
  518. "access_key": "access_key",
  519. "access_secret": "access_secret",
  520. }
  521. secretWithNilVal := map[string]interface{}{
  522. "access_key": "access_key",
  523. "access_secret": "access_secret",
  524. "token": nil,
  525. }
  526. secretWithNestedVal := map[string]interface{}{
  527. "access_key": "access_key",
  528. "access_secret": "access_secret",
  529. "nested": map[string]string{
  530. "foo": "oke",
  531. },
  532. }
  533. type args struct {
  534. store *esv1beta1.VaultProvider
  535. kube kclient.Client
  536. vClient Client
  537. ns string
  538. data esv1beta1.ExternalSecretDataRemoteRef
  539. }
  540. type want struct {
  541. err error
  542. val []byte
  543. }
  544. cases := map[string]struct {
  545. reason string
  546. args args
  547. want want
  548. }{
  549. "ReadSecret": {
  550. reason: "Should return the secret with property",
  551. args: args{
  552. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  553. data: esv1beta1.ExternalSecretDataRemoteRef{
  554. Property: "access_key",
  555. },
  556. vClient: &fake.VaultClient{
  557. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  558. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  559. newVaultResponseWithData(secret), nil,
  560. ),
  561. },
  562. },
  563. want: want{
  564. err: nil,
  565. val: []byte("access_key"),
  566. },
  567. },
  568. "ReadSecretWithNil": {
  569. reason: "Should return the secret with property if it has a nil val",
  570. args: args{
  571. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  572. data: esv1beta1.ExternalSecretDataRemoteRef{
  573. Property: "access_key",
  574. },
  575. vClient: &fake.VaultClient{
  576. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  577. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  578. newVaultResponseWithData(secretWithNilVal), nil,
  579. ),
  580. },
  581. },
  582. want: want{
  583. err: nil,
  584. val: []byte("access_key"),
  585. },
  586. },
  587. "ReadSecretWithoutProperty": {
  588. reason: "Should return the json encoded secret without property",
  589. args: args{
  590. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  591. data: esv1beta1.ExternalSecretDataRemoteRef{},
  592. vClient: &fake.VaultClient{
  593. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  594. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  595. newVaultResponseWithData(secret), nil,
  596. ),
  597. },
  598. },
  599. want: want{
  600. err: nil,
  601. val: []byte(`{"access_key":"access_key","access_secret":"access_secret"}`),
  602. },
  603. },
  604. "ReadSecretWithNestedValue": {
  605. reason: "Should return a nested property",
  606. args: args{
  607. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  608. data: esv1beta1.ExternalSecretDataRemoteRef{
  609. Property: "nested.foo",
  610. },
  611. vClient: &fake.VaultClient{
  612. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  613. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  614. newVaultResponseWithData(secretWithNestedVal), nil,
  615. ),
  616. },
  617. },
  618. want: want{
  619. err: nil,
  620. val: []byte("oke"),
  621. },
  622. },
  623. "NonexistentProperty": {
  624. reason: "Should return error property does not exist.",
  625. args: args{
  626. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  627. data: esv1beta1.ExternalSecretDataRemoteRef{
  628. Property: "nop.doesnt.exist",
  629. },
  630. vClient: &fake.VaultClient{
  631. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  632. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  633. newVaultResponseWithData(secretWithNestedVal), nil,
  634. ),
  635. },
  636. },
  637. want: want{
  638. err: fmt.Errorf(errSecretKeyFmt, "nop.doesnt.exist"),
  639. },
  640. },
  641. "ReadSecretError": {
  642. reason: "Should return error if vault client fails to read secret.",
  643. args: args{
  644. store: makeSecretStore().Spec.Provider.Vault,
  645. vClient: &fake.VaultClient{
  646. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  647. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(nil, errBoom),
  648. },
  649. },
  650. want: want{
  651. err: fmt.Errorf(errReadSecret, errBoom),
  652. },
  653. },
  654. }
  655. for name, tc := range cases {
  656. t.Run(name, func(t *testing.T) {
  657. vStore := &client{
  658. kube: tc.args.kube,
  659. client: tc.args.vClient,
  660. store: tc.args.store,
  661. namespace: tc.args.ns,
  662. }
  663. val, err := vStore.GetSecret(context.Background(), tc.args.data)
  664. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  665. t.Errorf("\n%s\nvault.GetSecret(...): -want error, +got error:\n%s", tc.reason, diff)
  666. }
  667. if diff := cmp.Diff(string(tc.want.val), string(val)); diff != "" {
  668. t.Errorf("\n%s\nvault.GetSecret(...): -want val, +got val:\n%s", tc.reason, diff)
  669. }
  670. })
  671. }
  672. }
  673. func TestGetSecretMap(t *testing.T) {
  674. errBoom := errors.New("boom")
  675. secret := map[string]interface{}{
  676. "access_key": "access_key",
  677. "access_secret": "access_secret",
  678. }
  679. secretWithNilVal := map[string]interface{}{
  680. "access_key": "access_key",
  681. "access_secret": "access_secret",
  682. "token": nil,
  683. }
  684. secretWithNestedVal := map[string]interface{}{
  685. "access_key": "access_key",
  686. "access_secret": "access_secret",
  687. "nested": map[string]interface{}{
  688. "foo": map[string]string{
  689. "oke": "yup",
  690. "mhkeih": "yada yada",
  691. },
  692. },
  693. }
  694. secretWithTypes := map[string]interface{}{
  695. "access_secret": "access_secret",
  696. "f32": float32(2.12),
  697. "f64": float64(2.1234534153423423),
  698. "int": 42,
  699. "bool": true,
  700. "bt": []byte("foobar"),
  701. }
  702. type args struct {
  703. store *esv1beta1.VaultProvider
  704. kube kclient.Client
  705. vClient Client
  706. ns string
  707. data esv1beta1.ExternalSecretDataRemoteRef
  708. }
  709. type want struct {
  710. err error
  711. val map[string][]byte
  712. }
  713. cases := map[string]struct {
  714. reason string
  715. args args
  716. want want
  717. }{
  718. "ReadSecretKV1": {
  719. reason: "Should map the secret even if it has a nil value",
  720. args: args{
  721. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  722. vClient: &fake.VaultClient{
  723. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  724. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  725. newVaultResponseWithData(secret), nil,
  726. ),
  727. },
  728. },
  729. want: want{
  730. err: nil,
  731. val: map[string][]byte{
  732. "access_key": []byte("access_key"),
  733. "access_secret": []byte("access_secret"),
  734. },
  735. },
  736. },
  737. "ReadSecretKV2": {
  738. reason: "Should map the secret even if it has a nil value",
  739. args: args{
  740. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  741. vClient: &fake.VaultClient{
  742. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  743. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  744. newVaultResponseWithData(
  745. map[string]interface{}{
  746. "data": secret,
  747. },
  748. ), nil,
  749. ),
  750. },
  751. },
  752. want: want{
  753. err: nil,
  754. val: map[string][]byte{
  755. "access_key": []byte("access_key"),
  756. "access_secret": []byte("access_secret"),
  757. },
  758. },
  759. },
  760. "ReadSecretWithNilValueKV1": {
  761. reason: "Should map the secret even if it has a nil value",
  762. args: args{
  763. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  764. vClient: &fake.VaultClient{
  765. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  766. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  767. newVaultResponseWithData(secretWithNilVal), nil,
  768. ),
  769. },
  770. },
  771. want: want{
  772. err: nil,
  773. val: map[string][]byte{
  774. "access_key": []byte("access_key"),
  775. "access_secret": []byte("access_secret"),
  776. "token": []byte(nil),
  777. },
  778. },
  779. },
  780. "ReadSecretWithNilValueKV2": {
  781. reason: "Should map the secret even if it has a nil value",
  782. args: args{
  783. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  784. vClient: &fake.VaultClient{
  785. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  786. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  787. newVaultResponseWithData(
  788. map[string]interface{}{
  789. "data": secretWithNilVal,
  790. },
  791. ), nil,
  792. ),
  793. },
  794. },
  795. want: want{
  796. err: nil,
  797. val: map[string][]byte{
  798. "access_key": []byte("access_key"),
  799. "access_secret": []byte("access_secret"),
  800. "token": []byte(nil),
  801. },
  802. },
  803. },
  804. "ReadSecretWithTypesKV2": {
  805. reason: "Should map the secret even if it has other types",
  806. args: args{
  807. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  808. vClient: &fake.VaultClient{
  809. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  810. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  811. newVaultResponseWithData(
  812. map[string]interface{}{
  813. "data": secretWithTypes,
  814. },
  815. ), nil,
  816. ),
  817. },
  818. },
  819. want: want{
  820. err: nil,
  821. val: map[string][]byte{
  822. "access_secret": []byte("access_secret"),
  823. "f32": []byte("2.12"),
  824. "f64": []byte("2.1234534153423423"),
  825. "int": []byte("42"),
  826. "bool": []byte("true"),
  827. "bt": []byte("Zm9vYmFy"), // base64
  828. },
  829. },
  830. },
  831. "ReadNestedSecret": {
  832. reason: "Should map the secret for deeply nested property",
  833. args: args{
  834. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  835. data: esv1beta1.ExternalSecretDataRemoteRef{
  836. Property: "nested",
  837. },
  838. vClient: &fake.VaultClient{
  839. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  840. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  841. newVaultResponseWithData(
  842. map[string]interface{}{
  843. "data": secretWithNestedVal,
  844. },
  845. ), nil,
  846. ),
  847. },
  848. },
  849. want: want{
  850. err: nil,
  851. val: map[string][]byte{
  852. "foo": []byte(`{"mhkeih":"yada yada","oke":"yup"}`),
  853. },
  854. },
  855. },
  856. "ReadDeeplyNestedSecret": {
  857. reason: "Should map the secret for deeply nested property",
  858. args: args{
  859. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  860. data: esv1beta1.ExternalSecretDataRemoteRef{
  861. Property: "nested.foo",
  862. },
  863. vClient: &fake.VaultClient{
  864. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  865. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  866. newVaultResponseWithData(
  867. map[string]interface{}{
  868. "data": secretWithNestedVal,
  869. },
  870. ), nil,
  871. ),
  872. },
  873. },
  874. want: want{
  875. err: nil,
  876. val: map[string][]byte{
  877. "oke": []byte("yup"),
  878. "mhkeih": []byte("yada yada"),
  879. },
  880. },
  881. },
  882. "ReadSecretError": {
  883. reason: "Should return error if vault client fails to read secret.",
  884. args: args{
  885. store: makeSecretStore().Spec.Provider.Vault,
  886. vClient: &fake.VaultClient{
  887. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  888. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(nil, errBoom),
  889. },
  890. },
  891. want: want{
  892. err: fmt.Errorf(errReadSecret, errBoom),
  893. },
  894. },
  895. }
  896. for name, tc := range cases {
  897. t.Run(name, func(t *testing.T) {
  898. vStore := &client{
  899. kube: tc.args.kube,
  900. client: tc.args.vClient,
  901. store: tc.args.store,
  902. namespace: tc.args.ns,
  903. }
  904. val, err := vStore.GetSecretMap(context.Background(), tc.args.data)
  905. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  906. t.Errorf("\n%s\nvault.GetSecretMap(...): -want error, +got error:\n%s", tc.reason, diff)
  907. }
  908. if diff := cmp.Diff(tc.want.val, val); diff != "" {
  909. t.Errorf("\n%s\nvault.GetSecretMap(...): -want val, +got val:\n%s", tc.reason, diff)
  910. }
  911. })
  912. }
  913. }
  914. func TestGetSecretPath(t *testing.T) {
  915. storeV2 := makeValidSecretStore()
  916. storeV2NoPath := storeV2.DeepCopy()
  917. storeV2NoPath.Spec.Provider.Vault.Path = nil
  918. storeV1 := makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1)
  919. storeV1NoPath := storeV1.DeepCopy()
  920. storeV1NoPath.Spec.Provider.Vault.Path = nil
  921. type args struct {
  922. store *esv1beta1.VaultProvider
  923. path string
  924. expected string
  925. }
  926. cases := map[string]struct {
  927. reason string
  928. args args
  929. }{
  930. "PathWithoutFormatV2": {
  931. reason: "Data needs to be found in path",
  932. args: args{
  933. store: storeV2.Spec.Provider.Vault,
  934. path: "secret/test",
  935. expected: "secret/data/test",
  936. },
  937. },
  938. "PathWithDataV2": {
  939. reason: "Data needs to be found only once in path",
  940. args: args{
  941. store: storeV2.Spec.Provider.Vault,
  942. path: "secret/data/test",
  943. expected: "secret/data/test",
  944. },
  945. },
  946. "PathWithoutFormatV2_NoPath": {
  947. reason: "Data needs to be found in path and correct mountpoint is set",
  948. args: args{
  949. store: storeV2NoPath.Spec.Provider.Vault,
  950. path: "secret/test",
  951. expected: "secret/data/test",
  952. },
  953. },
  954. "PathWithoutFormatV1": {
  955. reason: "Data needs to be found in path",
  956. args: args{
  957. store: storeV1.Spec.Provider.Vault,
  958. path: "secret/test",
  959. expected: "secret/test",
  960. },
  961. },
  962. "PathWithoutFormatV1_NoPath": {
  963. reason: "Data needs to be found in path and correct mountpoint is set",
  964. args: args{
  965. store: storeV1NoPath.Spec.Provider.Vault,
  966. path: "secret/test",
  967. expected: "secret/test",
  968. },
  969. },
  970. "WithoutPathButMountpointV2": {
  971. reason: "Mountpoint needs to be set in addition to data",
  972. args: args{
  973. store: storeV2.Spec.Provider.Vault,
  974. path: "test",
  975. expected: "secret/data/test",
  976. },
  977. },
  978. "WithoutPathButMountpointV1": {
  979. reason: "Mountpoint needs to be set in addition to data",
  980. args: args{
  981. store: storeV1.Spec.Provider.Vault,
  982. path: "test",
  983. expected: "secret/test",
  984. },
  985. },
  986. }
  987. for name, tc := range cases {
  988. t.Run(name, func(t *testing.T) {
  989. vStore := &client{
  990. store: tc.args.store,
  991. }
  992. want := vStore.buildPath(tc.args.path)
  993. if diff := cmp.Diff(want, tc.args.expected); diff != "" {
  994. t.Errorf("\n%s\nvault.buildPath(...): -want expected, +got error:\n%s", tc.reason, diff)
  995. }
  996. })
  997. }
  998. }