vault_test.go 37 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "strings"
  18. "testing"
  19. "github.com/crossplane/crossplane-runtime/pkg/test"
  20. "github.com/google/go-cmp/cmp"
  21. vault "github.com/hashicorp/vault/api"
  22. corev1 "k8s.io/api/core/v1"
  23. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  24. "k8s.io/utils/pointer"
  25. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  26. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  28. "github.com/external-secrets/external-secrets/pkg/provider/vault/fake"
  29. )
  30. const (
  31. tokenSecretName = "example-secret-token"
  32. secretDataString = "some-creds"
  33. )
  34. var (
  35. secretStorePath = "secret"
  36. )
  37. func makeValidSecretStoreWithVersion(v esv1beta1.VaultKVStoreVersion) *esv1beta1.SecretStore {
  38. return &esv1beta1.SecretStore{
  39. ObjectMeta: metav1.ObjectMeta{
  40. Name: "vault-store",
  41. Namespace: "default",
  42. },
  43. Spec: esv1beta1.SecretStoreSpec{
  44. Provider: &esv1beta1.SecretStoreProvider{
  45. Vault: &esv1beta1.VaultProvider{
  46. Server: "vault.example.com",
  47. Path: &secretStorePath,
  48. Version: v,
  49. Auth: esv1beta1.VaultAuth{
  50. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  51. Path: "kubernetes",
  52. Role: "kubernetes-auth-role",
  53. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  54. Name: "example-sa",
  55. },
  56. },
  57. },
  58. },
  59. },
  60. },
  61. }
  62. }
  63. func makeValidSecretStore() *esv1beta1.SecretStore {
  64. return makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2)
  65. }
  66. func makeValidSecretStoreWithCerts() *esv1beta1.SecretStore {
  67. return &esv1beta1.SecretStore{
  68. ObjectMeta: metav1.ObjectMeta{
  69. Name: "vault-store",
  70. Namespace: "default",
  71. },
  72. Spec: esv1beta1.SecretStoreSpec{
  73. Provider: &esv1beta1.SecretStoreProvider{
  74. Vault: &esv1beta1.VaultProvider{
  75. Server: "vault.example.com",
  76. Path: &secretStorePath,
  77. Version: esv1beta1.VaultKVStoreV2,
  78. Auth: esv1beta1.VaultAuth{
  79. Cert: &esv1beta1.VaultCertAuth{
  80. ClientCert: esmeta.SecretKeySelector{
  81. Name: "tls-auth-certs",
  82. Key: "tls.crt",
  83. },
  84. SecretRef: esmeta.SecretKeySelector{
  85. Name: "tls-auth-certs",
  86. Key: "tls.key",
  87. },
  88. },
  89. },
  90. },
  91. },
  92. },
  93. }
  94. }
  95. func makeValidSecretStoreWithK8sCerts(isSecret bool) *esv1beta1.SecretStore {
  96. store := makeSecretStore()
  97. caProvider := &esv1beta1.CAProvider{
  98. Name: "vault-cert",
  99. Key: "cert",
  100. }
  101. if isSecret {
  102. caProvider.Type = "Secret"
  103. } else {
  104. caProvider.Type = "ConfigMap"
  105. }
  106. store.Spec.Provider.Vault.CAProvider = caProvider
  107. return store
  108. }
  109. func makeInvalidClusterSecretStoreWithK8sCerts() *esv1beta1.ClusterSecretStore {
  110. return &esv1beta1.ClusterSecretStore{
  111. TypeMeta: metav1.TypeMeta{
  112. Kind: "ClusterSecretStore",
  113. },
  114. ObjectMeta: metav1.ObjectMeta{
  115. Name: "vault-store",
  116. Namespace: "default",
  117. },
  118. Spec: esv1beta1.SecretStoreSpec{
  119. Provider: &esv1beta1.SecretStoreProvider{
  120. Vault: &esv1beta1.VaultProvider{
  121. Server: "vault.example.com",
  122. Path: &secretStorePath,
  123. Version: "v2",
  124. Auth: esv1beta1.VaultAuth{
  125. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  126. Path: "kubernetes",
  127. Role: "kubernetes-auth-role",
  128. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  129. Name: "example-sa",
  130. },
  131. },
  132. },
  133. CAProvider: &esv1beta1.CAProvider{
  134. Name: "vault-cert",
  135. Key: "cert",
  136. Type: "Secret",
  137. },
  138. },
  139. },
  140. },
  141. }
  142. }
  143. type secretStoreTweakFn func(s *esv1beta1.SecretStore)
  144. func makeSecretStore(tweaks ...secretStoreTweakFn) *esv1beta1.SecretStore {
  145. store := makeValidSecretStore()
  146. for _, fn := range tweaks {
  147. fn(store)
  148. }
  149. return store
  150. }
  151. type args struct {
  152. newClientFunc func(c *vault.Config) (Client, error)
  153. store esv1beta1.GenericStore
  154. kube kclient.Client
  155. ns string
  156. }
  157. type want struct {
  158. err error
  159. }
  160. type testCase struct {
  161. reason string
  162. args args
  163. want want
  164. }
  165. func clientWithLoginMock(c *vault.Config) (Client, error) {
  166. cl := fake.VaultClient{
  167. MockSetToken: fake.NewSetTokenFn(),
  168. MockAuth: fake.NewVaultAuth(),
  169. MockLogical: fake.NewVaultLogical(),
  170. }
  171. auth := cl.Auth()
  172. token := cl.AuthToken()
  173. logical := cl.Logical()
  174. out := VClient{
  175. setToken: cl.SetToken,
  176. token: cl.Token,
  177. clearToken: cl.ClearToken,
  178. auth: auth,
  179. authToken: token,
  180. logical: logical,
  181. setNamespace: cl.SetNamespace,
  182. addHeader: cl.AddHeader,
  183. }
  184. return out, nil
  185. }
  186. func kubeMockWithSecretTokenAndServiceAcc(obj kclient.Object) error {
  187. if o, ok := obj.(*corev1.ServiceAccount); ok {
  188. o.Secrets = []corev1.ObjectReference{
  189. {
  190. Name: tokenSecretName,
  191. },
  192. }
  193. return nil
  194. }
  195. if o, ok := obj.(*corev1.Secret); ok {
  196. o.Data = map[string][]byte{
  197. "token": []byte(secretDataString),
  198. }
  199. return nil
  200. }
  201. return nil
  202. }
  203. func TestNewVault(t *testing.T) {
  204. errBoom := errors.New("boom")
  205. secretClientKey := []byte(`-----BEGIN RSA PRIVATE KEY-----
  206. MIIEpAIBAAKCAQEArfZ4HV1obFVlVNiA24tX/UOakqRnEtWXpIvaOsMaPGvvODgGe4XnyJGO32idPv85sIr7vDH9p+OhactVlJV1fu5SZoZ7pg4jTCLqVDCb3IRD++yik2Sw58YayNe3HiaCTsJQWeMXLzfaqOeyk6bEpBCJo09+3QxUWxijgJ7YZCb+Gi8pf3ZWeSZG+rGNNvXHmTs1Yu1H849SYXu+uJOd/R3ZSTw8CxFe4eTLgbCnPf6tgA8Sg2hc+CAZxunPP2JLZWbiJXxjNRoypso6MAJ1FRkx5sTJiLg6UoLvd95/S/lCVOR2PDlM1hg7ox8VEd4QHky7tLx7gji/5hHQKJQSTwIDAQABAoIBAQCYPICQ8hVX+MNcpLrfZenycR7sBYNOMC0silbH5cUn6yzFfgHuRxi3pOnrCJnTb3cE0BvMbdMVAVdYReD2znSsR9NEdZvvjZ/GGSgH1SIQsI7t//+mDQ/jRLJb4KsXb4vJcLLwdpLrd22bMmhMXjzndrF8gSz8NLX9omozPM8RlLxjzPzYOdlX/Zw8V68qQH2Ic04KbtnCwyAUIgAJxYtn/uYB8lzILBkyzQqwhQKkDDZQ0wbZT0hP6z+HgsdifwQvHG1GZAgCuzzyXrL/4TgDaDhYdMVoBA4+HPmzqm5MkBvjH4oqroxjRofUroVix0OGXZJMI1OJ0z/ubzmwCq5BAoGBANqbwzAydUJs0P+GFL94K/Y6tXULKA2c9N0crbxoxheobRpuJvhpW1ZE/9UGpaYX1Rw3nW4x+Jwvt83YkgHAlR4LgEwDvdJPZobybfqifQDiraUO0t62Crn8mSxOsFCugtRIFniwnX67w3uKxiSdCZYbJGs9JEDTpxRG/PSWq3QlAoGBAMu3zOv1PJAhOky7VcxFxWQPEMY+t2PA/sneD01/qgGuhlTwL4QlpywmBqXcI070dcvcBkP0flnWI7y5cnuE1+55twmsrvfaS8s1+AYje0b35DsaF2vtKuJrXC0AGKP+/eiycd9cbvVW2GWOxE7Ui76Mj95MARK8ZNjt0wJagQhjAoGASm9dD80uhhadN1RFPkjB1054OMk6sx/tdFhug8e9I5MSyzwUguME2aQW5EcmIh7dToVVUo8rUqsgz7NdS8FyRM+vuLJRcQneJDbp4bxwCdwlOh2JCZI8psVutlp4yJATNgrxs9iXV+7BChDflNnvyK+nP+iKrpQiwNHHEdU3vg0CgYEAvEpwD4+loJn1psJn9NxwK6F5IaMKIhtZ4/9pKXpcCh3jb1JouL2MnFOxRVAJGor87aW57Mlol2RDt8W4OM56PqMlOL3xIokUEQka66GT6e5pdu8QwuJ9BrWwhq9WFw4yZQe6FHb836qbbJLegvYVC9QjjZW2UDjtBUwcAkrghH0CgYBUMmMOCwIfMEtMaWxZRGdxRabazLhn7TXhBpVTuv7WouPaXYd7ZGjCTMKAuVa/E4afBlxgemnqBuX90gHpK/dDmn9l+lp8GZey0grJ7G0x5HEMiKziaX5PrgAcKbQ70m9ZNZ1deYhsC05X8rHNexZB6ns7Yms9L7qnlAy51ZH2zw==
  207. -----END RSA PRIVATE KEY-----`)
  208. clientCrt := []byte(`-----BEGIN CERTIFICATE-----
  209. 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
  210. -----END CERTIFICATE-----
  211. `)
  212. secretData := []byte(secretDataString)
  213. cases := map[string]testCase{
  214. "InvalidVaultStore": {
  215. reason: "Should return error if given an invalid vault store.",
  216. args: args{
  217. store: &esv1beta1.SecretStore{},
  218. },
  219. want: want{
  220. err: errors.New(errVaultStore),
  221. },
  222. },
  223. "AddVaultStoreCertsError": {
  224. reason: "Should return error if given an invalid CA certificate.",
  225. args: args{
  226. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  227. s.Spec.Provider.Vault.CABundle = []byte("badcertdata")
  228. }),
  229. },
  230. want: want{
  231. err: errors.New(errVaultCert),
  232. },
  233. },
  234. "VaultAuthFormatError": {
  235. reason: "Should return error if no valid authentication method is given.",
  236. args: args{
  237. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  238. s.Spec.Provider.Vault.Auth = esv1beta1.VaultAuth{}
  239. }),
  240. },
  241. want: want{
  242. err: errors.New(errAuthFormat),
  243. },
  244. },
  245. "GetKubeServiceAccountError": {
  246. reason: "Should return error if fetching kubernetes secret fails.",
  247. args: args{
  248. store: makeSecretStore(),
  249. kube: &test.MockClient{
  250. MockGet: test.NewMockGetFn(errBoom),
  251. },
  252. },
  253. want: want{
  254. err: fmt.Errorf(errGetKubeSA, "example-sa", errBoom),
  255. },
  256. },
  257. "GetKubeSecretError": {
  258. reason: "Should return error if fetching kubernetes secret fails.",
  259. args: args{
  260. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  261. s.Spec.Provider.Vault.Auth.Kubernetes.ServiceAccountRef = nil
  262. s.Spec.Provider.Vault.Auth.Kubernetes.SecretRef = &esmeta.SecretKeySelector{
  263. Name: "vault-secret",
  264. Key: "key",
  265. }
  266. }),
  267. kube: &test.MockClient{
  268. MockGet: test.NewMockGetFn(errBoom),
  269. },
  270. },
  271. want: want{
  272. err: fmt.Errorf(errGetKubeSecret, "vault-secret", errBoom),
  273. },
  274. },
  275. "SuccessfulVaultStoreWithCertAuth": {
  276. reason: "Should return a Vault provider successfully",
  277. args: args{
  278. store: makeValidSecretStoreWithCerts(),
  279. kube: &test.MockClient{
  280. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  281. if o, ok := obj.(*corev1.Secret); ok {
  282. o.Data = map[string][]byte{
  283. "tls.key": secretClientKey,
  284. "tls.crt": clientCrt,
  285. }
  286. return nil
  287. }
  288. return nil
  289. }),
  290. },
  291. newClientFunc: clientWithLoginMock,
  292. },
  293. want: want{
  294. err: nil,
  295. },
  296. },
  297. "SuccessfulVaultStoreWithK8sCertSecret": {
  298. reason: "Should return a Vault prodvider with the cert from k8s",
  299. args: args{
  300. store: makeValidSecretStoreWithK8sCerts(true),
  301. kube: &test.MockClient{
  302. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  303. if o, ok := obj.(*corev1.Secret); ok {
  304. o.Data = map[string][]byte{
  305. "cert": clientCrt,
  306. "token": secretData,
  307. }
  308. return nil
  309. }
  310. if o, ok := obj.(*corev1.ServiceAccount); ok {
  311. o.Secrets = []corev1.ObjectReference{
  312. {
  313. Name: tokenSecretName,
  314. },
  315. }
  316. return nil
  317. }
  318. return nil
  319. }),
  320. },
  321. newClientFunc: clientWithLoginMock,
  322. },
  323. want: want{
  324. err: nil,
  325. },
  326. },
  327. "GetCertNamespaceMissingError": {
  328. reason: "Should return an error if namespace is missing and is a ClusterSecretStore",
  329. args: args{
  330. store: makeInvalidClusterSecretStoreWithK8sCerts(),
  331. kube: &test.MockClient{
  332. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  333. },
  334. },
  335. want: want{
  336. err: errors.New(errCANamespace),
  337. },
  338. },
  339. "GetCertSecretKeyMissingError": {
  340. reason: "Should return an error if the secret key is missing",
  341. args: args{
  342. store: makeValidSecretStoreWithK8sCerts(true),
  343. kube: &test.MockClient{
  344. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  345. },
  346. newClientFunc: clientWithLoginMock,
  347. },
  348. want: want{
  349. err: fmt.Errorf(errVaultCert, errors.New(`cannot find secret data for key: "cert"`)),
  350. },
  351. },
  352. "SuccessfulVaultStoreWithK8sCertConfigMap": {
  353. reason: "Should return a Vault prodvider with the cert from k8s",
  354. args: args{
  355. store: makeValidSecretStoreWithK8sCerts(false),
  356. kube: &test.MockClient{
  357. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  358. if o, ok := obj.(*corev1.ConfigMap); ok {
  359. o.Data = map[string]string{
  360. "cert": string(clientCrt),
  361. }
  362. return nil
  363. }
  364. if o, ok := obj.(*corev1.ServiceAccount); ok {
  365. o.Secrets = []corev1.ObjectReference{
  366. {
  367. Name: tokenSecretName,
  368. },
  369. }
  370. return nil
  371. }
  372. if o, ok := obj.(*corev1.Secret); ok {
  373. o.Data = map[string][]byte{
  374. "token": secretData,
  375. }
  376. return nil
  377. }
  378. return nil
  379. }),
  380. },
  381. newClientFunc: clientWithLoginMock,
  382. },
  383. want: want{
  384. err: nil,
  385. },
  386. },
  387. "GetCertConfigMapMissingError": {
  388. reason: "Should return an error if the config map key is missing",
  389. args: args{
  390. store: makeValidSecretStoreWithK8sCerts(false),
  391. kube: &test.MockClient{
  392. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  393. if o, ok := obj.(*corev1.ServiceAccount); ok {
  394. o.Secrets = []corev1.ObjectReference{
  395. {
  396. Name: tokenSecretName,
  397. },
  398. }
  399. return nil
  400. }
  401. if o, ok := obj.(*corev1.Secret); ok {
  402. o.Data = map[string][]byte{
  403. "token": secretData,
  404. }
  405. return nil
  406. }
  407. return nil
  408. }),
  409. },
  410. newClientFunc: clientWithLoginMock,
  411. },
  412. want: want{
  413. err: fmt.Errorf(errConfigMapFmt, "cert"),
  414. },
  415. },
  416. "GetCertificateFormatError": {
  417. reason: "Should return error if client certificate is in wrong format.",
  418. args: args{
  419. store: makeValidSecretStoreWithCerts(),
  420. kube: &test.MockClient{
  421. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  422. if o, ok := obj.(*corev1.Secret); ok {
  423. o.Data = map[string][]byte{
  424. "tls.key": secretClientKey,
  425. "tls.crt": []byte("cert with mistak"),
  426. }
  427. return nil
  428. }
  429. return nil
  430. }),
  431. },
  432. newClientFunc: clientWithLoginMock,
  433. },
  434. want: want{
  435. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in certificate input"),
  436. },
  437. },
  438. "GetKeyFormatError": {
  439. reason: "Should return error if client key is in wrong format.",
  440. args: args{
  441. store: makeValidSecretStoreWithCerts(),
  442. kube: &test.MockClient{
  443. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  444. if o, ok := obj.(*corev1.Secret); ok {
  445. o.Data = map[string][]byte{
  446. "tls.key": []byte("key with mistake"),
  447. "tls.crt": clientCrt,
  448. }
  449. return nil
  450. }
  451. return nil
  452. }),
  453. },
  454. newClientFunc: clientWithLoginMock,
  455. },
  456. want: want{
  457. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in key input"),
  458. },
  459. },
  460. }
  461. for name, tc := range cases {
  462. t.Run(name, func(t *testing.T) {
  463. vaultTest(t, name, tc)
  464. })
  465. }
  466. }
  467. func vaultTest(t *testing.T, name string, tc testCase) {
  468. conn := &connector{
  469. newVaultClient: tc.args.newClientFunc,
  470. }
  471. if tc.args.newClientFunc == nil {
  472. conn.newVaultClient = newVaultClient
  473. }
  474. _, err := conn.newClient(context.Background(), tc.args.store, tc.args.kube, nil, tc.args.ns)
  475. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  476. t.Errorf("\n%s\nvault.New(...): -want error, +got error:\n%s", tc.reason, diff)
  477. }
  478. }
  479. func TestGetSecret(t *testing.T) {
  480. errBoom := errors.New("boom")
  481. secret := map[string]interface{}{
  482. "access_key": "access_key",
  483. "access_secret": "access_secret",
  484. }
  485. secretWithNilVal := map[string]interface{}{
  486. "access_key": "access_key",
  487. "access_secret": "access_secret",
  488. "token": nil,
  489. }
  490. secretWithNestedVal := map[string]interface{}{
  491. "access_key": "access_key",
  492. "access_secret": "access_secret",
  493. "nested.bar": "something different",
  494. "nested": map[string]string{
  495. "foo": "oke",
  496. "bar": "also ok?",
  497. },
  498. }
  499. type args struct {
  500. store *esv1beta1.VaultProvider
  501. kube kclient.Client
  502. vLogical Logical
  503. ns string
  504. data esv1beta1.ExternalSecretDataRemoteRef
  505. }
  506. type want struct {
  507. err error
  508. val []byte
  509. }
  510. cases := map[string]struct {
  511. reason string
  512. args args
  513. want want
  514. }{
  515. "ReadSecret": {
  516. reason: "Should return the secret with property",
  517. args: args{
  518. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  519. data: esv1beta1.ExternalSecretDataRemoteRef{
  520. Property: "access_key",
  521. },
  522. vLogical: &fake.Logical{
  523. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secret, nil),
  524. },
  525. },
  526. want: want{
  527. err: nil,
  528. val: []byte("access_key"),
  529. },
  530. },
  531. "ReadSecretWithNil": {
  532. reason: "Should return the secret with property if it has a nil val",
  533. args: args{
  534. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  535. data: esv1beta1.ExternalSecretDataRemoteRef{
  536. Property: "access_key",
  537. },
  538. vLogical: &fake.Logical{
  539. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secretWithNilVal, nil),
  540. },
  541. },
  542. want: want{
  543. err: nil,
  544. val: []byte("access_key"),
  545. },
  546. },
  547. "ReadSecretWithoutProperty": {
  548. reason: "Should return the json encoded secret without property",
  549. args: args{
  550. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  551. data: esv1beta1.ExternalSecretDataRemoteRef{},
  552. vLogical: &fake.Logical{
  553. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secret, nil),
  554. },
  555. },
  556. want: want{
  557. err: nil,
  558. val: []byte(`{"access_key":"access_key","access_secret":"access_secret"}`),
  559. },
  560. },
  561. "ReadSecretWithNestedValue": {
  562. reason: "Should return a nested property",
  563. args: args{
  564. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  565. data: esv1beta1.ExternalSecretDataRemoteRef{
  566. Property: "nested.foo",
  567. },
  568. vLogical: &fake.Logical{
  569. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secretWithNestedVal, nil),
  570. },
  571. },
  572. want: want{
  573. err: nil,
  574. val: []byte("oke"),
  575. },
  576. },
  577. "ReadSecretWithNestedValueFromData": {
  578. reason: "Should return a nested property",
  579. args: args{
  580. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  581. data: esv1beta1.ExternalSecretDataRemoteRef{
  582. //
  583. Property: "nested.bar",
  584. },
  585. vLogical: &fake.Logical{
  586. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secretWithNestedVal, nil),
  587. },
  588. },
  589. want: want{
  590. err: nil,
  591. val: []byte("something different"),
  592. },
  593. },
  594. "NonexistentProperty": {
  595. reason: "Should return error property does not exist.",
  596. args: args{
  597. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  598. data: esv1beta1.ExternalSecretDataRemoteRef{
  599. Property: "nop.doesnt.exist",
  600. },
  601. vLogical: &fake.Logical{
  602. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secretWithNestedVal, nil),
  603. },
  604. },
  605. want: want{
  606. err: fmt.Errorf(errSecretKeyFmt, "nop.doesnt.exist"),
  607. },
  608. },
  609. "ReadSecretError": {
  610. reason: "Should return error if vault client fails to read secret.",
  611. args: args{
  612. store: makeSecretStore().Spec.Provider.Vault,
  613. vLogical: &fake.Logical{
  614. ReadWithDataWithContextFn: fake.NewReadWithContextFn(nil, errBoom),
  615. },
  616. },
  617. want: want{
  618. err: fmt.Errorf(errReadSecret, errBoom),
  619. },
  620. },
  621. }
  622. for name, tc := range cases {
  623. t.Run(name, func(t *testing.T) {
  624. vStore := &client{
  625. kube: tc.args.kube,
  626. logical: tc.args.vLogical,
  627. store: tc.args.store,
  628. namespace: tc.args.ns,
  629. }
  630. val, err := vStore.GetSecret(context.Background(), tc.args.data)
  631. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  632. t.Errorf("\n%s\nvault.GetSecret(...): -want error, +got error:\n%s", tc.reason, diff)
  633. }
  634. if diff := cmp.Diff(string(tc.want.val), string(val)); diff != "" {
  635. t.Errorf("\n%s\nvault.GetSecret(...): -want val, +got val:\n%s", tc.reason, diff)
  636. }
  637. })
  638. }
  639. }
  640. func TestGetSecretMap(t *testing.T) {
  641. errBoom := errors.New("boom")
  642. secret := map[string]interface{}{
  643. "access_key": "access_key",
  644. "access_secret": "access_secret",
  645. }
  646. secretWithNilVal := map[string]interface{}{
  647. "access_key": "access_key",
  648. "access_secret": "access_secret",
  649. "token": nil,
  650. }
  651. secretWithNestedVal := map[string]interface{}{
  652. "access_key": "access_key",
  653. "access_secret": "access_secret",
  654. "nested": map[string]interface{}{
  655. "foo": map[string]string{
  656. "oke": "yup",
  657. "mhkeih": "yada yada",
  658. },
  659. },
  660. }
  661. secretWithTypes := map[string]interface{}{
  662. "access_secret": "access_secret",
  663. "f32": float32(2.12),
  664. "f64": float64(2.1234534153423423),
  665. "int": 42,
  666. "bool": true,
  667. "bt": []byte("foobar"),
  668. }
  669. type args struct {
  670. store *esv1beta1.VaultProvider
  671. kube kclient.Client
  672. vClient Logical
  673. ns string
  674. data esv1beta1.ExternalSecretDataRemoteRef
  675. }
  676. type want struct {
  677. err error
  678. val map[string][]byte
  679. }
  680. cases := map[string]struct {
  681. reason string
  682. args args
  683. want want
  684. }{
  685. "ReadSecretKV1": {
  686. reason: "Should map the secret even if it has a nil value",
  687. args: args{
  688. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  689. vClient: &fake.Logical{
  690. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secret, nil),
  691. },
  692. },
  693. want: want{
  694. err: nil,
  695. val: map[string][]byte{
  696. "access_key": []byte("access_key"),
  697. "access_secret": []byte("access_secret"),
  698. },
  699. },
  700. },
  701. "ReadSecretKV2": {
  702. reason: "Should map the secret even if it has a nil value",
  703. args: args{
  704. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  705. vClient: &fake.Logical{
  706. ReadWithDataWithContextFn: fake.NewReadWithContextFn(map[string]interface{}{
  707. "data": secret,
  708. }, nil),
  709. },
  710. },
  711. want: want{
  712. err: nil,
  713. val: map[string][]byte{
  714. "access_key": []byte("access_key"),
  715. "access_secret": []byte("access_secret"),
  716. },
  717. },
  718. },
  719. "ReadSecretWithNilValueKV1": {
  720. reason: "Should map the secret even if it has a nil value",
  721. args: args{
  722. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  723. vClient: &fake.Logical{
  724. ReadWithDataWithContextFn: fake.NewReadWithContextFn(secretWithNilVal, nil),
  725. },
  726. },
  727. want: want{
  728. err: nil,
  729. val: map[string][]byte{
  730. "access_key": []byte("access_key"),
  731. "access_secret": []byte("access_secret"),
  732. "token": []byte(nil),
  733. },
  734. },
  735. },
  736. "ReadSecretWithNilValueKV2": {
  737. reason: "Should map the secret even if it has a nil value",
  738. args: args{
  739. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  740. vClient: &fake.Logical{
  741. ReadWithDataWithContextFn: fake.NewReadWithContextFn(map[string]interface{}{
  742. "data": secretWithNilVal}, nil),
  743. },
  744. },
  745. want: want{
  746. err: nil,
  747. val: map[string][]byte{
  748. "access_key": []byte("access_key"),
  749. "access_secret": []byte("access_secret"),
  750. "token": []byte(nil),
  751. },
  752. },
  753. },
  754. "ReadSecretWithTypesKV2": {
  755. reason: "Should map the secret even if it has other types",
  756. args: args{
  757. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  758. vClient: &fake.Logical{
  759. ReadWithDataWithContextFn: fake.NewReadWithContextFn(map[string]interface{}{
  760. "data": secretWithTypes}, nil),
  761. },
  762. },
  763. want: want{
  764. err: nil,
  765. val: map[string][]byte{
  766. "access_secret": []byte("access_secret"),
  767. "f32": []byte("2.12"),
  768. "f64": []byte("2.1234534153423423"),
  769. "int": []byte("42"),
  770. "bool": []byte("true"),
  771. "bt": []byte("Zm9vYmFy"), // base64
  772. },
  773. },
  774. },
  775. "ReadNestedSecret": {
  776. reason: "Should map the secret for deeply nested property",
  777. args: args{
  778. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  779. data: esv1beta1.ExternalSecretDataRemoteRef{
  780. Property: "nested",
  781. },
  782. vClient: &fake.Logical{
  783. ReadWithDataWithContextFn: fake.NewReadWithContextFn(map[string]interface{}{
  784. "data": secretWithNestedVal}, nil),
  785. },
  786. },
  787. want: want{
  788. err: nil,
  789. val: map[string][]byte{
  790. "foo": []byte(`{"mhkeih":"yada yada","oke":"yup"}`),
  791. },
  792. },
  793. },
  794. "ReadDeeplyNestedSecret": {
  795. reason: "Should map the secret for deeply nested property",
  796. args: args{
  797. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  798. data: esv1beta1.ExternalSecretDataRemoteRef{
  799. Property: "nested.foo",
  800. },
  801. vClient: &fake.Logical{
  802. ReadWithDataWithContextFn: fake.NewReadWithContextFn(map[string]interface{}{
  803. "data": secretWithNestedVal}, nil),
  804. },
  805. },
  806. want: want{
  807. err: nil,
  808. val: map[string][]byte{
  809. "oke": []byte("yup"),
  810. "mhkeih": []byte("yada yada"),
  811. },
  812. },
  813. },
  814. "ReadSecretError": {
  815. reason: "Should return error if vault client fails to read secret.",
  816. args: args{
  817. store: makeSecretStore().Spec.Provider.Vault,
  818. vClient: &fake.Logical{
  819. ReadWithDataWithContextFn: fake.NewReadWithContextFn(nil, errBoom),
  820. },
  821. },
  822. want: want{
  823. err: fmt.Errorf(errReadSecret, errBoom),
  824. },
  825. },
  826. }
  827. for name, tc := range cases {
  828. t.Run(name, func(t *testing.T) {
  829. vStore := &client{
  830. kube: tc.args.kube,
  831. logical: tc.args.vClient,
  832. store: tc.args.store,
  833. namespace: tc.args.ns,
  834. }
  835. val, err := vStore.GetSecretMap(context.Background(), tc.args.data)
  836. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  837. t.Errorf("\n%s\nvault.GetSecretMap(...): -want error, +got error:\n%s", tc.reason, diff)
  838. }
  839. if diff := cmp.Diff(tc.want.val, val); diff != "" {
  840. t.Errorf("\n%s\nvault.GetSecretMap(...): -want val, +got val:\n%s", tc.reason, diff)
  841. }
  842. })
  843. }
  844. }
  845. func newListWithContextFn(secrets map[string]interface{}) func(ctx context.Context, path string) (*vault.Secret, error) {
  846. return func(ctx context.Context, path string) (*vault.Secret, error) {
  847. path = strings.TrimPrefix(path, "secret/metadata/")
  848. if path == "" {
  849. path = "default"
  850. }
  851. data, ok := secrets[path]
  852. if !ok {
  853. return nil, errors.New("Secret not found")
  854. }
  855. meta := data.(map[string]interface{})
  856. ans := meta["metadata"].(map[string]interface{})
  857. secret := &vault.Secret{
  858. Data: map[string]interface{}{
  859. "keys": ans["keys"],
  860. },
  861. }
  862. return secret, nil
  863. }
  864. }
  865. func newReadtWithContextFn(secrets map[string]interface{}) func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  866. return func(ctx context.Context, path string, d map[string][]string) (*vault.Secret, error) {
  867. path = strings.TrimPrefix(path, "secret/data/")
  868. path = strings.TrimPrefix(path, "secret/metadata/")
  869. if path == "" {
  870. path = "default"
  871. }
  872. data, ok := secrets[path]
  873. if !ok {
  874. return nil, errors.New("Secret not found")
  875. }
  876. meta := data.(map[string]interface{})
  877. metadata := meta["metadata"].(map[string]interface{})
  878. content := map[string]interface{}{
  879. "data": meta["data"],
  880. "custom_metadata": metadata["custom_metadata"],
  881. }
  882. secret := &vault.Secret{
  883. Data: content,
  884. }
  885. return secret, nil
  886. }
  887. }
  888. func TestGetAllSecrets(t *testing.T) {
  889. secret1Bytes := []byte("{\"access_key\":\"access_key\",\"access_secret\":\"access_secret\"}")
  890. secret2Bytes := []byte("{\"access_key\":\"access_key2\",\"access_secret\":\"access_secret2\"}")
  891. path1Bytes := []byte("{\"access_key\":\"path1\",\"access_secret\":\"path1\"}")
  892. path2Bytes := []byte("{\"access_key\":\"path2\",\"access_secret\":\"path2\"}")
  893. tagBytes := []byte("{\"access_key\":\"unfetched\",\"access_secret\":\"unfetched\"}")
  894. path := "path"
  895. secret := map[string]interface{}{
  896. "secret1": map[string]interface{}{
  897. "metadata": map[string]interface{}{
  898. "custom_metadata": map[string]interface{}{
  899. "foo": "bar",
  900. },
  901. },
  902. "data": map[string]interface{}{
  903. "access_key": "access_key",
  904. "access_secret": "access_secret",
  905. },
  906. },
  907. "secret2": map[string]interface{}{
  908. "metadata": map[string]interface{}{
  909. "custom_metadata": map[string]interface{}{
  910. "foo": "baz",
  911. },
  912. },
  913. "data": map[string]interface{}{
  914. "access_key": "access_key2",
  915. "access_secret": "access_secret2",
  916. },
  917. },
  918. "tag": map[string]interface{}{
  919. "metadata": map[string]interface{}{
  920. "custom_metadata": map[string]interface{}{
  921. "foo": "baz",
  922. },
  923. },
  924. "data": map[string]interface{}{
  925. "access_key": "unfetched",
  926. "access_secret": "unfetched",
  927. },
  928. },
  929. "path/1": map[string]interface{}{
  930. "metadata": map[string]interface{}{
  931. "custom_metadata": map[string]interface{}{
  932. "foo": "path",
  933. },
  934. },
  935. "data": map[string]interface{}{
  936. "access_key": "path1",
  937. "access_secret": "path1",
  938. },
  939. },
  940. "path/2": map[string]interface{}{
  941. "metadata": map[string]interface{}{
  942. "custom_metadata": map[string]interface{}{
  943. "foo": "path",
  944. },
  945. },
  946. "data": map[string]interface{}{
  947. "access_key": "path2",
  948. "access_secret": "path2",
  949. },
  950. },
  951. "default": map[string]interface{}{
  952. "data": map[string]interface{}{
  953. "empty": "true",
  954. },
  955. "metadata": map[string]interface{}{
  956. "keys": []interface{}{"secret1", "secret2", "tag", "path/"},
  957. },
  958. },
  959. "path/": map[string]interface{}{
  960. "data": map[string]interface{}{
  961. "empty": "true",
  962. },
  963. "metadata": map[string]interface{}{
  964. "keys": []interface{}{"1", "2"},
  965. },
  966. },
  967. }
  968. type args struct {
  969. store *esv1beta1.VaultProvider
  970. kube kclient.Client
  971. vLogical Logical
  972. ns string
  973. data esv1beta1.ExternalSecretFind
  974. }
  975. type want struct {
  976. err error
  977. val map[string][]byte
  978. }
  979. cases := map[string]struct {
  980. reason string
  981. args args
  982. want want
  983. }{
  984. "FindByName": {
  985. reason: "should map multiple secrets matching name",
  986. args: args{
  987. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  988. vLogical: &fake.Logical{
  989. ListWithContextFn: newListWithContextFn(secret),
  990. ReadWithDataWithContextFn: newReadtWithContextFn(secret),
  991. },
  992. data: esv1beta1.ExternalSecretFind{
  993. Name: &esv1beta1.FindName{
  994. RegExp: "secret.*",
  995. },
  996. },
  997. },
  998. want: want{
  999. err: nil,
  1000. val: map[string][]byte{
  1001. "secret1": secret1Bytes,
  1002. "secret2": secret2Bytes,
  1003. },
  1004. },
  1005. },
  1006. "FindByTag": {
  1007. reason: "should map multiple secrets matching tags",
  1008. args: args{
  1009. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  1010. vLogical: &fake.Logical{
  1011. ListWithContextFn: newListWithContextFn(secret),
  1012. ReadWithDataWithContextFn: newReadtWithContextFn(secret),
  1013. },
  1014. data: esv1beta1.ExternalSecretFind{
  1015. Tags: map[string]string{
  1016. "foo": "baz",
  1017. },
  1018. },
  1019. },
  1020. want: want{
  1021. err: nil,
  1022. val: map[string][]byte{
  1023. "tag": tagBytes,
  1024. "secret2": secret2Bytes,
  1025. },
  1026. },
  1027. },
  1028. "FilterByPath": {
  1029. reason: "should filter secrets based on path",
  1030. args: args{
  1031. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  1032. vLogical: &fake.Logical{
  1033. ListWithContextFn: newListWithContextFn(secret),
  1034. ReadWithDataWithContextFn: newReadtWithContextFn(secret),
  1035. },
  1036. data: esv1beta1.ExternalSecretFind{
  1037. Path: &path,
  1038. Tags: map[string]string{
  1039. "foo": "path",
  1040. },
  1041. },
  1042. },
  1043. want: want{
  1044. err: nil,
  1045. val: map[string][]byte{
  1046. "path/1": path1Bytes,
  1047. "path/2": path2Bytes,
  1048. },
  1049. },
  1050. },
  1051. "FailIfKv1": {
  1052. reason: "should not work if using kv1 store",
  1053. args: args{
  1054. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  1055. vLogical: &fake.Logical{
  1056. ListWithContextFn: newListWithContextFn(secret),
  1057. ReadWithDataWithContextFn: newReadtWithContextFn(secret),
  1058. },
  1059. data: esv1beta1.ExternalSecretFind{
  1060. Tags: map[string]string{
  1061. "foo": "baz",
  1062. },
  1063. },
  1064. },
  1065. want: want{
  1066. err: errors.New(errUnsupportedKvVersion),
  1067. },
  1068. },
  1069. }
  1070. for name, tc := range cases {
  1071. t.Run(name, func(t *testing.T) {
  1072. vStore := &client{
  1073. kube: tc.args.kube,
  1074. logical: tc.args.vLogical,
  1075. store: tc.args.store,
  1076. namespace: tc.args.ns,
  1077. }
  1078. val, err := vStore.GetAllSecrets(context.Background(), tc.args.data)
  1079. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  1080. t.Errorf("\n%s\nvault.GetSecretMap(...): -want error, +got error:\n%s", tc.reason, diff)
  1081. }
  1082. if diff := cmp.Diff(tc.want.val, val); diff != "" {
  1083. t.Errorf("\n%s\nvault.GetSecretMap(...): -want val, +got val:\n%s", tc.reason, diff)
  1084. }
  1085. })
  1086. }
  1087. }
  1088. func TestGetSecretPath(t *testing.T) {
  1089. storeV2 := makeValidSecretStore()
  1090. storeV2NoPath := storeV2.DeepCopy()
  1091. storeV2NoPath.Spec.Provider.Vault.Path = nil
  1092. storeV1 := makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1)
  1093. storeV1NoPath := storeV1.DeepCopy()
  1094. storeV1NoPath.Spec.Provider.Vault.Path = nil
  1095. type args struct {
  1096. store *esv1beta1.VaultProvider
  1097. path string
  1098. expected string
  1099. }
  1100. cases := map[string]struct {
  1101. reason string
  1102. args args
  1103. }{
  1104. "PathWithoutFormatV2": {
  1105. reason: "Data needs to be found in path",
  1106. args: args{
  1107. store: storeV2.Spec.Provider.Vault,
  1108. path: "secret/test",
  1109. expected: "secret/data/test",
  1110. },
  1111. },
  1112. "PathWithDataV2": {
  1113. reason: "Data needs to be found only once in path",
  1114. args: args{
  1115. store: storeV2.Spec.Provider.Vault,
  1116. path: "secret/data/test",
  1117. expected: "secret/data/test",
  1118. },
  1119. },
  1120. "PathWithoutFormatV2_NoPath": {
  1121. reason: "Data needs to be found in path and correct mountpoint is set",
  1122. args: args{
  1123. store: storeV2NoPath.Spec.Provider.Vault,
  1124. path: "secret/test",
  1125. expected: "secret/data/test",
  1126. },
  1127. },
  1128. "PathWithoutFormatV1": {
  1129. reason: "Data needs to be found in path",
  1130. args: args{
  1131. store: storeV1.Spec.Provider.Vault,
  1132. path: "secret/test",
  1133. expected: "secret/test",
  1134. },
  1135. },
  1136. "PathWithoutFormatV1_NoPath": {
  1137. reason: "Data needs to be found in path and correct mountpoint is set",
  1138. args: args{
  1139. store: storeV1NoPath.Spec.Provider.Vault,
  1140. path: "secret/test",
  1141. expected: "secret/test",
  1142. },
  1143. },
  1144. "WithoutPathButMountpointV2": {
  1145. reason: "Mountpoint needs to be set in addition to data",
  1146. args: args{
  1147. store: storeV2.Spec.Provider.Vault,
  1148. path: "test",
  1149. expected: "secret/data/test",
  1150. },
  1151. },
  1152. "WithoutPathButMountpointV1": {
  1153. reason: "Mountpoint needs to be set in addition to data",
  1154. args: args{
  1155. store: storeV1.Spec.Provider.Vault,
  1156. path: "test",
  1157. expected: "secret/test",
  1158. },
  1159. },
  1160. }
  1161. for name, tc := range cases {
  1162. t.Run(name, func(t *testing.T) {
  1163. vStore := &client{
  1164. store: tc.args.store,
  1165. }
  1166. want := vStore.buildPath(tc.args.path)
  1167. if diff := cmp.Diff(want, tc.args.expected); diff != "" {
  1168. t.Errorf("\n%s\nvault.buildPath(...): -want expected, +got error:\n%s", tc.reason, diff)
  1169. }
  1170. })
  1171. }
  1172. }
  1173. func TestValidateStore(t *testing.T) {
  1174. type args struct {
  1175. auth esv1beta1.VaultAuth
  1176. }
  1177. tests := []struct {
  1178. name string
  1179. args args
  1180. wantErr bool
  1181. }{
  1182. {
  1183. name: "empty auth",
  1184. args: args{},
  1185. },
  1186. {
  1187. name: "invalid approle with namespace",
  1188. args: args{
  1189. auth: esv1beta1.VaultAuth{
  1190. AppRole: &esv1beta1.VaultAppRole{
  1191. SecretRef: esmeta.SecretKeySelector{
  1192. Namespace: pointer.StringPtr("invalid"),
  1193. },
  1194. },
  1195. },
  1196. },
  1197. wantErr: true,
  1198. },
  1199. {
  1200. name: "invalid clientcert",
  1201. args: args{
  1202. auth: esv1beta1.VaultAuth{
  1203. Cert: &esv1beta1.VaultCertAuth{
  1204. ClientCert: esmeta.SecretKeySelector{
  1205. Namespace: pointer.StringPtr("invalid"),
  1206. },
  1207. },
  1208. },
  1209. },
  1210. wantErr: true,
  1211. },
  1212. {
  1213. name: "invalid cert secret",
  1214. args: args{
  1215. auth: esv1beta1.VaultAuth{
  1216. Cert: &esv1beta1.VaultCertAuth{
  1217. SecretRef: esmeta.SecretKeySelector{
  1218. Namespace: pointer.StringPtr("invalid"),
  1219. },
  1220. },
  1221. },
  1222. },
  1223. wantErr: true,
  1224. },
  1225. {
  1226. name: "invalid jwt secret",
  1227. args: args{
  1228. auth: esv1beta1.VaultAuth{
  1229. Jwt: &esv1beta1.VaultJwtAuth{
  1230. SecretRef: &esmeta.SecretKeySelector{
  1231. Namespace: pointer.StringPtr("invalid"),
  1232. },
  1233. },
  1234. },
  1235. },
  1236. wantErr: true,
  1237. },
  1238. {
  1239. name: "invalid kubernetes sa",
  1240. args: args{
  1241. auth: esv1beta1.VaultAuth{
  1242. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  1243. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  1244. Namespace: pointer.StringPtr("invalid"),
  1245. },
  1246. },
  1247. },
  1248. },
  1249. wantErr: true,
  1250. },
  1251. {
  1252. name: "invalid kubernetes secret",
  1253. args: args{
  1254. auth: esv1beta1.VaultAuth{
  1255. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  1256. SecretRef: &esmeta.SecretKeySelector{
  1257. Namespace: pointer.StringPtr("invalid"),
  1258. },
  1259. },
  1260. },
  1261. },
  1262. wantErr: true,
  1263. },
  1264. {
  1265. name: "invalid ldap secret",
  1266. args: args{
  1267. auth: esv1beta1.VaultAuth{
  1268. Ldap: &esv1beta1.VaultLdapAuth{
  1269. SecretRef: esmeta.SecretKeySelector{
  1270. Namespace: pointer.StringPtr("invalid"),
  1271. },
  1272. },
  1273. },
  1274. },
  1275. wantErr: true,
  1276. },
  1277. {
  1278. name: "invalid token secret",
  1279. args: args{
  1280. auth: esv1beta1.VaultAuth{
  1281. TokenSecretRef: &esmeta.SecretKeySelector{
  1282. Namespace: pointer.StringPtr("invalid"),
  1283. },
  1284. },
  1285. },
  1286. wantErr: true,
  1287. },
  1288. }
  1289. for _, tt := range tests {
  1290. t.Run(tt.name, func(t *testing.T) {
  1291. c := &connector{
  1292. newVaultClient: nil,
  1293. }
  1294. store := &esv1beta1.SecretStore{
  1295. Spec: esv1beta1.SecretStoreSpec{
  1296. Provider: &esv1beta1.SecretStoreProvider{
  1297. Vault: &esv1beta1.VaultProvider{
  1298. Auth: tt.args.auth,
  1299. },
  1300. },
  1301. },
  1302. }
  1303. if err := c.ValidateStore(store); (err != nil) != tt.wantErr {
  1304. t.Errorf("connector.ValidateStore() error = %v, wantErr %v", err, tt.wantErr)
  1305. }
  1306. })
  1307. }
  1308. }