parameterstore_test.go 39 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package parameterstore
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "strings"
  18. "testing"
  19. "github.com/aws/aws-sdk-go-v2/aws"
  20. "github.com/aws/aws-sdk-go-v2/service/ssm"
  21. ssmtypes "github.com/aws/aws-sdk-go-v2/service/ssm/types"
  22. "github.com/external-secrets/external-secrets/pkg/utils/metadata"
  23. "github.com/google/go-cmp/cmp"
  24. "github.com/stretchr/testify/assert"
  25. "github.com/stretchr/testify/require"
  26. corev1 "k8s.io/api/core/v1"
  27. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  28. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  29. "k8s.io/utils/ptr"
  30. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  31. fakeps "github.com/external-secrets/external-secrets/pkg/provider/aws/parameterstore/fake"
  32. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  33. "github.com/external-secrets/external-secrets/pkg/provider/testing/fake"
  34. )
  35. const (
  36. errInvalidProperty = "key INVALPROP does not exist in secret"
  37. invalidProp = "INVALPROP"
  38. )
  39. var (
  40. fakeSecretKey = "fakeSecretKey"
  41. fakeValue = "fakeValue"
  42. )
  43. type parameterstoreTestCase struct {
  44. fakeClient *fakeps.Client
  45. apiInput *ssm.GetParameterInput
  46. apiOutput *ssm.GetParameterOutput
  47. remoteRef *esv1.ExternalSecretDataRemoteRef
  48. apiErr error
  49. expectError string
  50. expectedSecret string
  51. expectedData map[string][]byte
  52. prefix string
  53. }
  54. func makeValidParameterStoreTestCase() *parameterstoreTestCase {
  55. return &parameterstoreTestCase{
  56. fakeClient: &fakeps.Client{},
  57. apiInput: makeValidAPIInput(),
  58. apiOutput: makeValidAPIOutput(),
  59. remoteRef: makeValidRemoteRef(),
  60. apiErr: nil,
  61. prefix: "",
  62. expectError: "",
  63. expectedSecret: "",
  64. expectedData: make(map[string][]byte),
  65. }
  66. }
  67. func makeValidAPIInput() *ssm.GetParameterInput {
  68. return &ssm.GetParameterInput{
  69. Name: aws.String("/baz"),
  70. WithDecryption: aws.Bool(true),
  71. }
  72. }
  73. func makeValidAPIOutput() *ssm.GetParameterOutput {
  74. return &ssm.GetParameterOutput{
  75. Parameter: &ssmtypes.Parameter{
  76. Value: aws.String("RRRRR"),
  77. },
  78. }
  79. }
  80. func makeValidRemoteRef() *esv1.ExternalSecretDataRemoteRef {
  81. return &esv1.ExternalSecretDataRemoteRef{
  82. Key: "/baz",
  83. }
  84. }
  85. func makeValidParameterStoreTestCaseCustom(tweaks ...func(pstc *parameterstoreTestCase)) *parameterstoreTestCase {
  86. pstc := makeValidParameterStoreTestCase()
  87. for _, fn := range tweaks {
  88. fn(pstc)
  89. }
  90. pstc.fakeClient.WithValue(pstc.apiInput, pstc.apiOutput, pstc.apiErr)
  91. return pstc
  92. }
  93. func TestSSMResolver(t *testing.T) {
  94. endpointEnvKey := SSMEndpointEnv
  95. endpointURL := "http://ssm.foo"
  96. t.Setenv(endpointEnvKey, endpointURL)
  97. f, err := customEndpointResolver{}.ResolveEndpoint(context.Background(), ssm.EndpointParameters{})
  98. assert.Nil(t, err)
  99. assert.Equal(t, endpointURL, f.URI.String())
  100. }
  101. func TestDeleteSecret(t *testing.T) {
  102. fakeClient := fakeps.Client{}
  103. parameterName := "parameter"
  104. managedBy := "managed-by"
  105. manager := "external-secrets"
  106. ssmTag := ssmtypes.Tag{
  107. Key: &managedBy,
  108. Value: &manager,
  109. }
  110. type args struct {
  111. client fakeps.Client
  112. getParameterOutput *ssm.GetParameterOutput
  113. listTagsOutput *ssm.ListTagsForResourceOutput
  114. deleteParameterOutput *ssm.DeleteParameterOutput
  115. getParameterError error
  116. listTagsError error
  117. deleteParameterError error
  118. }
  119. type want struct {
  120. err error
  121. }
  122. type testCase struct {
  123. args args
  124. want want
  125. reason string
  126. }
  127. tests := map[string]testCase{
  128. "Deletes Successfully": {
  129. args: args{
  130. client: fakeClient,
  131. getParameterOutput: &ssm.GetParameterOutput{
  132. Parameter: &ssmtypes.Parameter{
  133. Name: &parameterName,
  134. },
  135. },
  136. listTagsOutput: &ssm.ListTagsForResourceOutput{
  137. TagList: []ssmtypes.Tag{ssmTag},
  138. },
  139. deleteParameterOutput: nil,
  140. getParameterError: nil,
  141. listTagsError: nil,
  142. deleteParameterError: nil,
  143. },
  144. want: want{
  145. err: nil,
  146. },
  147. reason: "",
  148. },
  149. "Secret Not Found": {
  150. args: args{
  151. client: fakeClient,
  152. getParameterOutput: nil,
  153. listTagsOutput: nil,
  154. deleteParameterOutput: nil,
  155. getParameterError: &ssmtypes.ParameterNotFound{
  156. Message: aws.String("not here, sorry dude"),
  157. },
  158. listTagsError: nil,
  159. deleteParameterError: nil,
  160. },
  161. want: want{
  162. err: nil,
  163. },
  164. reason: "",
  165. },
  166. "No permissions to get secret": {
  167. args: args{
  168. client: fakeClient,
  169. getParameterOutput: nil,
  170. listTagsOutput: nil,
  171. deleteParameterOutput: nil,
  172. getParameterError: errors.New("no permissions"),
  173. listTagsError: nil,
  174. deleteParameterError: nil,
  175. },
  176. want: want{
  177. err: errors.New("no permissions"),
  178. },
  179. reason: "",
  180. },
  181. "No permissions to get tags": {
  182. args: args{
  183. client: fakeClient,
  184. getParameterOutput: &ssm.GetParameterOutput{
  185. Parameter: &ssmtypes.Parameter{
  186. Name: &parameterName,
  187. },
  188. },
  189. listTagsOutput: nil,
  190. deleteParameterOutput: nil,
  191. getParameterError: nil,
  192. listTagsError: errors.New("no permissions"),
  193. deleteParameterError: nil,
  194. },
  195. want: want{
  196. err: errors.New("no permissions"),
  197. },
  198. reason: "",
  199. },
  200. "Secret Not Managed by External Secrets": {
  201. args: args{
  202. client: fakeClient,
  203. getParameterOutput: &ssm.GetParameterOutput{
  204. Parameter: &ssmtypes.Parameter{
  205. Name: &parameterName,
  206. },
  207. },
  208. listTagsOutput: &ssm.ListTagsForResourceOutput{
  209. TagList: []ssmtypes.Tag{},
  210. },
  211. deleteParameterOutput: nil,
  212. getParameterError: nil,
  213. listTagsError: nil,
  214. deleteParameterError: nil,
  215. },
  216. want: want{
  217. err: nil,
  218. },
  219. reason: "",
  220. },
  221. "No permissions delete secret": {
  222. args: args{
  223. client: fakeClient,
  224. getParameterOutput: &ssm.GetParameterOutput{
  225. Parameter: &ssmtypes.Parameter{
  226. Name: &parameterName,
  227. },
  228. },
  229. listTagsOutput: &ssm.ListTagsForResourceOutput{
  230. TagList: []ssmtypes.Tag{ssmTag},
  231. },
  232. deleteParameterOutput: nil,
  233. getParameterError: nil,
  234. listTagsError: nil,
  235. deleteParameterError: errors.New("no permissions"),
  236. },
  237. want: want{
  238. err: errors.New("no permissions"),
  239. },
  240. reason: "",
  241. },
  242. }
  243. for name, tc := range tests {
  244. t.Run(name, func(t *testing.T) {
  245. ref := fake.PushSecretData{RemoteKey: remoteKey}
  246. ps := ParameterStore{
  247. client: &tc.args.client,
  248. }
  249. tc.args.client.GetParameterFn = fakeps.NewGetParameterFn(tc.args.getParameterOutput, tc.args.getParameterError)
  250. tc.args.client.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(tc.args.listTagsOutput, tc.args.listTagsError)
  251. tc.args.client.DeleteParameterFn = fakeps.NewDeleteParameterFn(tc.args.deleteParameterOutput, tc.args.deleteParameterError)
  252. err := ps.DeleteSecret(context.TODO(), ref)
  253. // Error nil XOR tc.want.err nil
  254. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  255. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  256. }
  257. // if errors are the same type but their contents do not match
  258. if err != nil && tc.want.err != nil {
  259. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  260. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error got nil", name, tc.reason, tc.want.err)
  261. }
  262. }
  263. })
  264. }
  265. }
  266. const remoteKey = "fake-key"
  267. func TestPushSecret(t *testing.T) {
  268. invalidParameters := &ssmtypes.InvalidParameters{}
  269. alreadyExistsError := &ssmtypes.AlreadyExistsException{}
  270. fakeSecret := &corev1.Secret{
  271. Data: map[string][]byte{
  272. fakeSecretKey: []byte(fakeValue),
  273. },
  274. }
  275. managedByESO := ssmtypes.Tag{
  276. Key: &managedBy,
  277. Value: &externalSecrets,
  278. }
  279. putParameterOutput := &ssm.PutParameterOutput{}
  280. getParameterOutput := &ssm.GetParameterOutput{}
  281. describeParameterOutput := &ssm.DescribeParametersOutput{}
  282. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  283. TagList: []ssmtypes.Tag{managedByESO},
  284. }
  285. noTagsResourceOutput := &ssm.ListTagsForResourceOutput{}
  286. validGetParameterOutput := &ssm.GetParameterOutput{
  287. Parameter: &ssmtypes.Parameter{},
  288. }
  289. sameGetParameterOutput := &ssm.GetParameterOutput{
  290. Parameter: &ssmtypes.Parameter{
  291. Value: &fakeValue,
  292. },
  293. }
  294. type args struct {
  295. store *esv1.AWSProvider
  296. metadata *apiextensionsv1.JSON
  297. client fakeps.Client
  298. }
  299. type want struct {
  300. err error
  301. }
  302. tests := map[string]struct {
  303. reason string
  304. args args
  305. want want
  306. }{
  307. "PutParameterSucceeds": {
  308. reason: "a parameter can be successfully pushed to aws parameter store",
  309. args: args{
  310. store: makeValidParameterStore().Spec.Provider.AWS,
  311. client: fakeps.Client{
  312. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  313. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  314. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  315. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  316. RemoveTagsFromResourceFn: fakeps.NewRemoveTagsFromResourceFn(&ssm.RemoveTagsFromResourceOutput{}, nil),
  317. AddTagsToResourceFn: fakeps.NewAddTagsToResourceFn(&ssm.AddTagsToResourceOutput{}, nil),
  318. },
  319. },
  320. want: want{
  321. err: nil,
  322. },
  323. },
  324. "SetParameterFailsWhenNoNameProvided": {
  325. reason: "test push secret with no name gives error",
  326. args: args{
  327. store: makeValidParameterStore().Spec.Provider.AWS,
  328. client: fakeps.Client{
  329. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  330. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, invalidParameters),
  331. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  332. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  333. },
  334. },
  335. want: want{
  336. err: invalidParameters,
  337. },
  338. },
  339. "SetSecretWhenAlreadyExists": {
  340. reason: "test push secret with secret that already exists gives error",
  341. args: args{
  342. store: makeValidParameterStore().Spec.Provider.AWS,
  343. client: fakeps.Client{
  344. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, alreadyExistsError),
  345. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  346. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  347. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  348. },
  349. },
  350. want: want{
  351. err: alreadyExistsError,
  352. },
  353. },
  354. "GetSecretWithValidParameters": {
  355. reason: "Get secret with valid parameters",
  356. args: args{
  357. store: makeValidParameterStore().Spec.Provider.AWS,
  358. client: fakeps.Client{
  359. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  360. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  361. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  362. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  363. },
  364. },
  365. want: want{
  366. err: nil,
  367. },
  368. },
  369. "SetSecretNotManagedByESO": {
  370. reason: "SetSecret to the parameter store but tags are not managed by ESO",
  371. args: args{
  372. store: makeValidParameterStore().Spec.Provider.AWS,
  373. client: fakeps.Client{
  374. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  375. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  376. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  377. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(noTagsResourceOutput, nil),
  378. },
  379. },
  380. want: want{
  381. err: errors.New("secret not managed by external-secrets"),
  382. },
  383. },
  384. "SetSecretGetTagsError": {
  385. reason: "SetSecret to the parameter store returns error while obtaining tags",
  386. args: args{
  387. store: makeValidParameterStore().Spec.Provider.AWS,
  388. client: fakeps.Client{
  389. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  390. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  391. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  392. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(nil, errors.New("you shall not tag")),
  393. },
  394. },
  395. want: want{
  396. err: errors.New("you shall not tag"),
  397. },
  398. },
  399. "SetSecretContentMatches": {
  400. reason: "No ops",
  401. args: args{
  402. store: makeValidParameterStore().Spec.Provider.AWS,
  403. client: fakeps.Client{
  404. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  405. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  406. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  407. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  408. },
  409. },
  410. want: want{
  411. err: nil,
  412. },
  413. },
  414. "SetSecretWithValidMetadata": {
  415. reason: "test push secret with valid parameterStoreType metadata",
  416. args: args{
  417. store: makeValidParameterStore().Spec.Provider.AWS,
  418. metadata: &apiextensionsv1.JSON{
  419. Raw: []byte(`{
  420. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  421. "kind": "PushSecretMetadata",
  422. "spec": {
  423. "secretType": "SecureString",
  424. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c"
  425. }
  426. }`),
  427. },
  428. client: fakeps.Client{
  429. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  430. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  431. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  432. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  433. },
  434. },
  435. want: want{
  436. err: nil,
  437. },
  438. },
  439. "SetSecretWithValidMetadataListString": {
  440. reason: "test push secret with valid parameterStoreType metadata and unused parameterStoreKeyID",
  441. args: args{
  442. store: makeValidParameterStore().Spec.Provider.AWS,
  443. metadata: &apiextensionsv1.JSON{
  444. Raw: []byte(`{
  445. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  446. "kind": "PushSecretMetadata",
  447. "spec": {
  448. "secretType": "StringList"
  449. }
  450. }`),
  451. },
  452. client: fakeps.Client{
  453. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  454. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  455. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  456. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  457. },
  458. },
  459. want: want{
  460. err: nil,
  461. },
  462. },
  463. "SetSecretWithInvalidMetadata": {
  464. reason: "test push secret with invalid metadata structure",
  465. args: args{
  466. store: makeValidParameterStore().Spec.Provider.AWS,
  467. metadata: &apiextensionsv1.JSON{
  468. Raw: []byte(`{ fakeMetadataKey: "" }`),
  469. },
  470. client: fakeps.Client{
  471. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  472. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  473. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  474. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  475. },
  476. },
  477. want: want{
  478. err: errors.New(`failed to parse metadata: failed to parse kubernetes.external-secrets.io/v1alpha1 PushSecretMetadata: error unmarshaling JSON: while decoding JSON: json: unknown field "fakeMetadataKey"`),
  479. },
  480. },
  481. "GetRemoteSecretWithoutDecryption": {
  482. reason: "test if push secret's get remote source is encrypted for valid comparison",
  483. args: args{
  484. store: makeValidParameterStore().Spec.Provider.AWS,
  485. metadata: &apiextensionsv1.JSON{
  486. Raw: []byte(`{
  487. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  488. "kind": "PushSecretMetadata",
  489. "spec": {
  490. "secretType": "SecureString",
  491. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c"
  492. }
  493. }`),
  494. },
  495. client: fakeps.Client{
  496. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  497. GetParameterFn: fakeps.NewGetParameterFn(&ssm.GetParameterOutput{
  498. Parameter: &ssmtypes.Parameter{
  499. Type: ssmtypes.ParameterTypeSecureString,
  500. Value: aws.String("sensitive"),
  501. },
  502. }, nil),
  503. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  504. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  505. },
  506. },
  507. want: want{
  508. err: errors.New("unable to compare 'sensitive' result, ensure to request a decrypted value"),
  509. },
  510. },
  511. "SecretWithAdvancedTier": {
  512. reason: "test if we can provide advanced tier policies",
  513. args: args{
  514. store: makeValidParameterStore().Spec.Provider.AWS,
  515. metadata: &apiextensionsv1.JSON{
  516. Raw: []byte(`{
  517. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  518. "kind": "PushSecretMetadata",
  519. "spec": {
  520. "secretType": "SecureString",
  521. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c",
  522. "tier": {
  523. "type": "Advanced",
  524. "policies": [
  525. {
  526. "type": "Expiration",
  527. "version": "1.0",
  528. "attributes": {
  529. "timestamp": "2024-12-02T21:34:33.000Z"
  530. }
  531. },
  532. {
  533. "type": "ExpirationNotification",
  534. "version": "1.0",
  535. "attributes": {
  536. "before": "2",
  537. "unit": "Days"
  538. }
  539. }
  540. ]
  541. }
  542. }
  543. }`),
  544. },
  545. client: fakeps.Client{
  546. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  547. GetParameterFn: fakeps.NewGetParameterFn(&ssm.GetParameterOutput{
  548. Parameter: &ssmtypes.Parameter{
  549. Type: ssmtypes.ParameterTypeSecureString,
  550. Value: aws.String("sensitive"),
  551. },
  552. }, nil),
  553. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  554. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  555. },
  556. },
  557. want: want{
  558. err: errors.New("unable to compare 'sensitive' result, ensure to request a decrypted value"),
  559. },
  560. },
  561. "SecretWithTags": {
  562. reason: "test if we can configure tags for the secret",
  563. args: args{
  564. store: makeValidParameterStore().Spec.Provider.AWS,
  565. metadata: &apiextensionsv1.JSON{
  566. Raw: []byte(`{
  567. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  568. "kind": "PushSecretMetadata",
  569. "spec": {
  570. "tags": {
  571. "tagname1": "value1"
  572. },
  573. }
  574. }`),
  575. },
  576. client: fakeps.Client{
  577. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  578. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  579. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  580. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(&ssm.ListTagsForResourceOutput{
  581. TagList: []ssmtypes.Tag{managedByESO, {Key: ptr.To("tagname1"), Value: ptr.To("value1")}},
  582. }, nil),
  583. },
  584. },
  585. want: want{
  586. err: nil,
  587. },
  588. },
  589. }
  590. for name, tc := range tests {
  591. t.Run(name, func(t *testing.T) {
  592. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  593. fmt.Println("line 635:", psd, tc.args.metadata)
  594. if tc.args.metadata != nil {
  595. psd.Metadata = tc.args.metadata
  596. }
  597. ps := ParameterStore{
  598. client: &tc.args.client,
  599. }
  600. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  601. fmt.Println("line 644:", err)
  602. // Error nil XOR tc.want.err nil
  603. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  604. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  605. }
  606. // if errors are the same type but their contents do not match
  607. if err != nil && tc.want.err != nil {
  608. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  609. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %s", name, tc.reason, tc.want.err, err)
  610. }
  611. }
  612. })
  613. }
  614. }
  615. func TestPushSecretWithPrefix(t *testing.T) {
  616. fakeSecret := &corev1.Secret{
  617. Data: map[string][]byte{
  618. fakeSecretKey: []byte(fakeValue),
  619. },
  620. }
  621. managedByESO := ssmtypes.Tag{
  622. Key: &managedBy,
  623. Value: &externalSecrets,
  624. }
  625. putParameterOutput := &ssm.PutParameterOutput{}
  626. getParameterOutput := &ssm.GetParameterOutput{}
  627. describeParameterOutput := &ssm.DescribeParametersOutput{}
  628. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  629. TagList: []ssmtypes.Tag{managedByESO},
  630. }
  631. client := fakeps.Client{
  632. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  633. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  634. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  635. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  636. }
  637. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  638. ps := ParameterStore{
  639. client: &client,
  640. prefix: "/test/this/thing/",
  641. }
  642. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  643. require.NoError(t, err)
  644. input := client.PutParameterFnCalledWith[0][0]
  645. assert.Equal(t, "/test/this/thing/fake-key", *input.Name)
  646. }
  647. func TestPushSecretWithoutKeyAndEncodedAsDecodedTrue(t *testing.T) {
  648. fakeSecret := &corev1.Secret{
  649. Data: map[string][]byte{
  650. fakeSecretKey: []byte(fakeValue),
  651. },
  652. }
  653. managedByESO := ssmtypes.Tag{
  654. Key: &managedBy,
  655. Value: &externalSecrets,
  656. }
  657. putParameterOutput := &ssm.PutParameterOutput{}
  658. getParameterOutput := &ssm.GetParameterOutput{}
  659. describeParameterOutput := &ssm.DescribeParametersOutput{}
  660. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  661. TagList: []ssmtypes.Tag{managedByESO},
  662. }
  663. client := fakeps.Client{
  664. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  665. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  666. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  667. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  668. }
  669. psd := fake.PushSecretData{RemoteKey: remoteKey, Metadata: &apiextensionsv1.JSON{Raw: []byte(`
  670. apiVersion: kubernetes.external-secrets.io/v1alpha1
  671. kind: PushSecretMetadata
  672. spec:
  673. encodeAsDecoded: true
  674. `)}}
  675. ps := ParameterStore{
  676. client: &client,
  677. prefix: "/test/this/thing/",
  678. }
  679. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  680. require.NoError(t, err)
  681. input := client.PutParameterFnCalledWith[0][0]
  682. assert.Equal(t, "{\"fakeSecretKey\":\"fakeValue\"}", *input.Value)
  683. }
  684. func TestPushSecretCalledOnlyOnce(t *testing.T) {
  685. fakeSecret := &corev1.Secret{
  686. Data: map[string][]byte{
  687. fakeSecretKey: []byte(fakeValue),
  688. },
  689. }
  690. managedByESO := ssmtypes.Tag{
  691. Key: &managedBy,
  692. Value: &externalSecrets,
  693. }
  694. putParameterOutput := &ssm.PutParameterOutput{}
  695. validGetParameterOutput := &ssm.GetParameterOutput{
  696. Parameter: &ssmtypes.Parameter{
  697. Value: &fakeValue,
  698. },
  699. }
  700. describeParameterOutput := &ssm.DescribeParametersOutput{}
  701. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  702. TagList: []ssmtypes.Tag{managedByESO},
  703. }
  704. client := fakeps.Client{
  705. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  706. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  707. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  708. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  709. }
  710. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  711. ps := ParameterStore{
  712. client: &client,
  713. }
  714. require.NoError(t, ps.PushSecret(context.TODO(), fakeSecret, psd))
  715. assert.Equal(t, 0, client.PutParameterCalledN)
  716. }
  717. // test the ssm<->aws interface
  718. // make sure correct values are passed and errors are handled accordingly.
  719. func TestGetSecret(t *testing.T) {
  720. // good case: key is passed in, output is sent back
  721. setSecretString := func(pstc *parameterstoreTestCase) {
  722. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  723. pstc.expectedSecret = "RRRRR"
  724. }
  725. // good case: key is passed in and prefix is set, output is sent back
  726. setSecretStringWithPrefix := func(pstc *parameterstoreTestCase) {
  727. pstc.apiInput = &ssm.GetParameterInput{
  728. Name: aws.String("/test/this/baz"),
  729. WithDecryption: aws.Bool(true),
  730. }
  731. pstc.prefix = "/test/this"
  732. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  733. pstc.expectedSecret = "RRRRR"
  734. }
  735. // good case: extract property
  736. setExtractProperty := func(pstc *parameterstoreTestCase) {
  737. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  738. pstc.expectedSecret = "bang"
  739. pstc.remoteRef.Property = "/shmoo"
  740. }
  741. // good case: extract property with `.`
  742. setExtractPropertyWithDot := func(pstc *parameterstoreTestCase) {
  743. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo.boom": "bang"}`)
  744. pstc.expectedSecret = "bang"
  745. pstc.remoteRef.Property = "/shmoo.boom"
  746. }
  747. // bad case: missing property
  748. setMissingProperty := func(pstc *parameterstoreTestCase) {
  749. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  750. pstc.remoteRef.Property = "INVALPROP"
  751. pstc.expectError = "key INVALPROP does not exist in secret"
  752. }
  753. // bad case: parameter.Value not found
  754. setParameterValueNotFound := func(pstc *parameterstoreTestCase) {
  755. pstc.apiOutput.Parameter.Value = aws.String("NONEXISTENT")
  756. pstc.apiErr = esv1.NoSecretErr
  757. pstc.expectError = "Secret does not exist"
  758. }
  759. // bad case: extract property failure due to invalid json
  760. setPropertyFail := func(pstc *parameterstoreTestCase) {
  761. pstc.apiOutput.Parameter.Value = aws.String(`------`)
  762. pstc.remoteRef.Property = invalidProp
  763. pstc.expectError = errInvalidProperty
  764. }
  765. // bad case: parameter.Value may be nil but binary is set
  766. setParameterValueNil := func(pstc *parameterstoreTestCase) {
  767. pstc.apiOutput.Parameter.Value = nil
  768. pstc.expectError = "parameter value is nil for key"
  769. }
  770. // base case: api output return error
  771. setAPIError := func(pstc *parameterstoreTestCase) {
  772. pstc.apiOutput = &ssm.GetParameterOutput{}
  773. pstc.apiErr = errors.New("oh no")
  774. pstc.expectError = "oh no"
  775. }
  776. // good case: metadata returned
  777. setMetadataString := func(pstc *parameterstoreTestCase) {
  778. pstc.remoteRef.MetadataPolicy = esv1.ExternalSecretMetadataPolicyFetch
  779. output := ssm.ListTagsForResourceOutput{
  780. TagList: getTagSlice(),
  781. }
  782. pstc.fakeClient.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(&output, nil)
  783. pstc.expectedSecret, _ = util.ParameterTagsToJSONString(normaliseTags(getTagSlice()))
  784. }
  785. // good case: metadata property returned
  786. setMetadataProperty := func(pstc *parameterstoreTestCase) {
  787. pstc.remoteRef.MetadataPolicy = esv1.ExternalSecretMetadataPolicyFetch
  788. output := ssm.ListTagsForResourceOutput{
  789. TagList: getTagSlice(),
  790. }
  791. pstc.fakeClient.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(&output, nil)
  792. pstc.remoteRef.Property = "tagname2"
  793. pstc.expectedSecret = "tagvalue2"
  794. }
  795. // bad case: metadata property not found
  796. setMetadataMissingProperty := func(pstc *parameterstoreTestCase) {
  797. pstc.remoteRef.MetadataPolicy = esv1.ExternalSecretMetadataPolicyFetch
  798. output := ssm.ListTagsForResourceOutput{
  799. TagList: getTagSlice(),
  800. }
  801. pstc.fakeClient.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(&output, nil)
  802. pstc.remoteRef.Property = invalidProp
  803. pstc.expectError = errInvalidProperty
  804. }
  805. successCases := []*parameterstoreTestCase{
  806. makeValidParameterStoreTestCaseCustom(setSecretStringWithPrefix),
  807. makeValidParameterStoreTestCaseCustom(setSecretString),
  808. makeValidParameterStoreTestCaseCustom(setExtractProperty),
  809. makeValidParameterStoreTestCaseCustom(setMissingProperty),
  810. makeValidParameterStoreTestCaseCustom(setPropertyFail),
  811. makeValidParameterStoreTestCaseCustom(setParameterValueNil),
  812. makeValidParameterStoreTestCaseCustom(setAPIError),
  813. makeValidParameterStoreTestCaseCustom(setExtractPropertyWithDot),
  814. makeValidParameterStoreTestCaseCustom(setParameterValueNotFound),
  815. makeValidParameterStoreTestCaseCustom(setMetadataString),
  816. makeValidParameterStoreTestCaseCustom(setMetadataProperty),
  817. makeValidParameterStoreTestCaseCustom(setMetadataMissingProperty),
  818. }
  819. ps := ParameterStore{}
  820. for k, v := range successCases {
  821. ps.client = v.fakeClient
  822. ps.prefix = v.prefix
  823. out, err := ps.GetSecret(context.Background(), *v.remoteRef)
  824. if !ErrorContains(err, v.expectError) {
  825. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  826. }
  827. if cmp.Equal(out, v.expectedSecret) {
  828. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedSecret, out)
  829. }
  830. }
  831. }
  832. func TestGetSecretMap(t *testing.T) {
  833. // good case: default version & deserialization
  834. simpleJSON := func(pstc *parameterstoreTestCase) {
  835. pstc.apiOutput.Parameter.Value = aws.String(`{"foo":"bar"}`)
  836. pstc.expectedData["foo"] = []byte("bar")
  837. }
  838. // good case: default version & complex json
  839. complexJSON := func(pstc *parameterstoreTestCase) {
  840. pstc.apiOutput.Parameter.Value = aws.String(`{"int": 42, "str": "str", "nested": {"foo":"bar"}}`)
  841. pstc.expectedData["int"] = []byte("42")
  842. pstc.expectedData["str"] = []byte("str")
  843. pstc.expectedData["nested"] = []byte(`{"foo":"bar"}`)
  844. }
  845. // bad case: api error returned
  846. setAPIError := func(pstc *parameterstoreTestCase) {
  847. pstc.apiOutput.Parameter = &ssmtypes.Parameter{}
  848. pstc.expectError = "some api err"
  849. pstc.apiErr = errors.New("some api err")
  850. }
  851. // bad case: invalid json
  852. setInvalidJSON := func(pstc *parameterstoreTestCase) {
  853. pstc.apiOutput.Parameter.Value = aws.String(`-----------------`)
  854. pstc.expectError = "unable to unmarshal secret"
  855. }
  856. successCases := []*parameterstoreTestCase{
  857. makeValidParameterStoreTestCaseCustom(simpleJSON),
  858. makeValidParameterStoreTestCaseCustom(complexJSON),
  859. makeValidParameterStoreTestCaseCustom(setAPIError),
  860. makeValidParameterStoreTestCaseCustom(setInvalidJSON),
  861. }
  862. ps := ParameterStore{}
  863. for k, v := range successCases {
  864. ps.client = v.fakeClient
  865. out, err := ps.GetSecretMap(context.Background(), *v.remoteRef)
  866. if !ErrorContains(err, v.expectError) {
  867. t.Errorf("[%d] unexpected error: %q, expected: %q", k, err.Error(), v.expectError)
  868. }
  869. if err == nil && !cmp.Equal(out, v.expectedData) {
  870. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedData, out)
  871. }
  872. }
  873. }
  874. func makeValidParameterStore() *esv1.SecretStore {
  875. return &esv1.SecretStore{
  876. ObjectMeta: metav1.ObjectMeta{
  877. Name: "aws-parameterstore",
  878. Namespace: "default",
  879. },
  880. Spec: esv1.SecretStoreSpec{
  881. Provider: &esv1.SecretStoreProvider{
  882. AWS: &esv1.AWSProvider{
  883. Service: esv1.AWSServiceParameterStore,
  884. Region: "us-east-1",
  885. },
  886. },
  887. },
  888. }
  889. }
  890. func ErrorContains(out error, want string) bool {
  891. if out == nil {
  892. return want == ""
  893. }
  894. if want == "" {
  895. return false
  896. }
  897. return strings.Contains(out.Error(), want)
  898. }
  899. func getTagSlice() []ssmtypes.Tag {
  900. tagKey1 := "tagname1"
  901. tagValue1 := "tagvalue1"
  902. tagKey2 := "tagname2"
  903. tagValue2 := "tagvalue2"
  904. return []ssmtypes.Tag{
  905. {
  906. Key: &tagKey1,
  907. Value: &tagValue1,
  908. },
  909. {
  910. Key: &tagKey2,
  911. Value: &tagValue2,
  912. },
  913. }
  914. }
  915. func normaliseTags(input []ssmtypes.Tag) map[string]string {
  916. tags := make(map[string]string, len(input))
  917. for _, tag := range input {
  918. if tag.Key != nil && tag.Value != nil {
  919. tags[*tag.Key] = *tag.Value
  920. }
  921. }
  922. return tags
  923. }
  924. func TestSecretExists(t *testing.T) {
  925. parameterOutput := &ssm.GetParameterOutput{
  926. Parameter: &ssmtypes.Parameter{
  927. Value: aws.String("sensitive"),
  928. },
  929. }
  930. blankParameterOutput := &ssm.GetParameterOutput{}
  931. getParameterCorrectErr := ssmtypes.ResourceNotFoundException{}
  932. getParameterWrongErr := ssmtypes.InvalidParameters{}
  933. pushSecretDataWithoutProperty := fake.PushSecretData{SecretKey: "fake-secret-key", RemoteKey: fakeSecretKey, Property: ""}
  934. type args struct {
  935. store *esv1.AWSProvider
  936. client fakeps.Client
  937. pushSecretData fake.PushSecretData
  938. }
  939. type want struct {
  940. err error
  941. wantError bool
  942. }
  943. tests := map[string]struct {
  944. args args
  945. want want
  946. }{
  947. "SecretExistsReturnsTrueForExistingParameter": {
  948. args: args{
  949. store: makeValidParameterStore().Spec.Provider.AWS,
  950. client: fakeps.Client{
  951. GetParameterFn: fakeps.NewGetParameterFn(parameterOutput, nil),
  952. },
  953. pushSecretData: pushSecretDataWithoutProperty,
  954. },
  955. want: want{
  956. err: nil,
  957. wantError: true,
  958. },
  959. },
  960. "SecretExistsReturnsFalseForNonExistingParameter": {
  961. args: args{
  962. store: makeValidParameterStore().Spec.Provider.AWS,
  963. client: fakeps.Client{
  964. GetParameterFn: fakeps.NewGetParameterFn(blankParameterOutput, &getParameterCorrectErr),
  965. },
  966. pushSecretData: pushSecretDataWithoutProperty,
  967. },
  968. want: want{
  969. err: nil,
  970. wantError: false,
  971. },
  972. },
  973. "SecretExistsReturnsFalseForErroredParameter": {
  974. args: args{
  975. store: makeValidParameterStore().Spec.Provider.AWS,
  976. client: fakeps.Client{
  977. GetParameterFn: fakeps.NewGetParameterFn(blankParameterOutput, &getParameterWrongErr),
  978. },
  979. pushSecretData: pushSecretDataWithoutProperty,
  980. },
  981. want: want{
  982. err: &getParameterWrongErr,
  983. wantError: false,
  984. },
  985. },
  986. }
  987. for name, tc := range tests {
  988. t.Run(name, func(t *testing.T) {
  989. ps := &ParameterStore{
  990. client: &tc.args.client,
  991. }
  992. got, err := ps.SecretExists(context.Background(), tc.args.pushSecretData)
  993. assert.Equal(
  994. t,
  995. tc.want,
  996. want{
  997. err: err,
  998. wantError: got,
  999. })
  1000. })
  1001. }
  1002. }
  1003. func TestConstructMetadataWithDefaults(t *testing.T) {
  1004. tests := []struct {
  1005. name string
  1006. input *apiextensionsv1.JSON
  1007. expected *metadata.PushSecretMetadata[PushSecretMetadataSpec]
  1008. expectError bool
  1009. }{
  1010. {
  1011. name: "Valid metadata with multiple fields",
  1012. input: &apiextensionsv1.JSON{Raw: []byte(`{
  1013. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  1014. "kind": "PushSecretMetadata",
  1015. "spec": {
  1016. "description": "test description",
  1017. "tier": {"type": "Advanced"},
  1018. "secretType":"SecureString",
  1019. "kmsKeyID": "custom-kms-key",
  1020. "tags": {
  1021. "customKey": "customValue"
  1022. },
  1023. }
  1024. }`)},
  1025. expected: &metadata.PushSecretMetadata[PushSecretMetadataSpec]{
  1026. APIVersion: "kubernetes.external-secrets.io/v1alpha1",
  1027. Kind: "PushSecretMetadata",
  1028. Spec: PushSecretMetadataSpec{
  1029. Description: "test description",
  1030. Tier: Tier{
  1031. Type: "Advanced",
  1032. },
  1033. SecretType: "SecureString",
  1034. KMSKeyID: "custom-kms-key",
  1035. Tags: map[string]string{
  1036. "customKey": "customValue",
  1037. "managed-by": "external-secrets",
  1038. },
  1039. },
  1040. },
  1041. },
  1042. {
  1043. name: "Empty metadata, defaults applied",
  1044. input: nil,
  1045. expected: &metadata.PushSecretMetadata[PushSecretMetadataSpec]{
  1046. Spec: PushSecretMetadataSpec{
  1047. Description: "secret 'managed-by:external-secrets'",
  1048. Tier: Tier{
  1049. Type: "Standard",
  1050. },
  1051. SecretType: "String",
  1052. KMSKeyID: "alias/aws/ssm",
  1053. Tags: map[string]string{
  1054. "managed-by": "external-secrets",
  1055. },
  1056. },
  1057. },
  1058. },
  1059. {
  1060. name: "Added default metadata with 'managed-by' tag",
  1061. input: &apiextensionsv1.JSON{Raw: []byte(`{
  1062. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  1063. "kind": "PushSecretMetadata",
  1064. "spec": {
  1065. "description": "adding managed-by tag explicitly",
  1066. "tags": {
  1067. "managed-by": "external-secrets",
  1068. "customKey": "customValue"
  1069. },
  1070. }
  1071. }`)},
  1072. expectError: true,
  1073. },
  1074. {
  1075. name: "Invalid metadata format",
  1076. input: &apiextensionsv1.JSON{Raw: []byte(`invalid-json`)},
  1077. expected: nil,
  1078. expectError: true,
  1079. },
  1080. {
  1081. name: "Metadata with 'managed-by' tag specified",
  1082. input: &apiextensionsv1.JSON{Raw: []byte(`{"tags":{"managed-by":"invalid"}}`)},
  1083. expected: nil,
  1084. expectError: true,
  1085. },
  1086. }
  1087. for _, tt := range tests {
  1088. t.Run(tt.name, func(t *testing.T) {
  1089. result, err := (&ParameterStore{}).constructMetadataWithDefaults(tt.input)
  1090. if tt.expectError {
  1091. assert.Error(t, err)
  1092. } else {
  1093. assert.NoError(t, err)
  1094. assert.Equal(t, tt.expected, result)
  1095. }
  1096. })
  1097. }
  1098. }
  1099. func TestFindTagKeysToRemove(t *testing.T) {
  1100. tests := []struct {
  1101. name string
  1102. tags map[string]string
  1103. metaTags map[string]string
  1104. expected []string
  1105. }{
  1106. {
  1107. name: "No tags to remove",
  1108. tags: map[string]string{
  1109. "key1": "value1",
  1110. "key2": "value2",
  1111. },
  1112. metaTags: map[string]string{
  1113. "key1": "value1",
  1114. "key2": "value2",
  1115. },
  1116. expected: []string{},
  1117. },
  1118. {
  1119. name: "Some tags to remove",
  1120. tags: map[string]string{
  1121. "key1": "value1",
  1122. "key2": "value2",
  1123. "key3": "value3",
  1124. },
  1125. metaTags: map[string]string{
  1126. "key1": "value1",
  1127. "key2": "value2",
  1128. },
  1129. expected: []string{"key3"},
  1130. },
  1131. {
  1132. name: "All tags to remove",
  1133. tags: map[string]string{
  1134. "key1": "value1",
  1135. "key2": "value2",
  1136. },
  1137. metaTags: map[string]string{},
  1138. expected: []string{"key1", "key2"},
  1139. },
  1140. {
  1141. name: "Empty tags and metaTags",
  1142. tags: map[string]string{},
  1143. metaTags: map[string]string{},
  1144. expected: []string{},
  1145. },
  1146. {
  1147. name: "Empty metaTags with non-empty tags",
  1148. tags: map[string]string{
  1149. "key1": "value1",
  1150. },
  1151. metaTags: map[string]string{},
  1152. expected: []string{"key1"},
  1153. },
  1154. }
  1155. for _, tt := range tests {
  1156. t.Run(tt.name, func(t *testing.T) {
  1157. result := findTagKeysToRemove(tt.tags, tt.metaTags)
  1158. assert.ElementsMatch(t, tt.expected, result)
  1159. })
  1160. }
  1161. }
  1162. func TestComputeTagsToUpdate(t *testing.T) {
  1163. tests := []struct {
  1164. name string
  1165. tags map[string]string
  1166. metaTags map[string]string
  1167. expected []ssmtypes.Tag
  1168. modified bool
  1169. }{
  1170. {
  1171. name: "No tags to update",
  1172. tags: map[string]string{
  1173. "key1": "value1",
  1174. "key2": "value2",
  1175. },
  1176. metaTags: map[string]string{
  1177. "key1": "value1",
  1178. "key2": "value2",
  1179. },
  1180. expected: []ssmtypes.Tag{
  1181. {Key: ptr.To("key1"), Value: ptr.To("value1")},
  1182. {Key: ptr.To("key2"), Value: ptr.To("value2")},
  1183. },
  1184. modified: false,
  1185. },
  1186. {
  1187. name: "Add new tag",
  1188. tags: map[string]string{
  1189. "key1": "value1",
  1190. },
  1191. metaTags: map[string]string{
  1192. "key1": "value1",
  1193. "key2": "value2",
  1194. },
  1195. expected: []ssmtypes.Tag{
  1196. {Key: ptr.To("key1"), Value: ptr.To("value1")},
  1197. {Key: ptr.To("key2"), Value: ptr.To("value2")},
  1198. },
  1199. modified: true,
  1200. },
  1201. {
  1202. name: "Update existing tag value",
  1203. tags: map[string]string{
  1204. "key1": "value1",
  1205. },
  1206. metaTags: map[string]string{
  1207. "key1": "newValue",
  1208. },
  1209. expected: []ssmtypes.Tag{
  1210. {Key: ptr.To("key1"), Value: ptr.To("newValue")},
  1211. },
  1212. modified: true,
  1213. },
  1214. {
  1215. name: "Empty tags and metaTags",
  1216. tags: map[string]string{},
  1217. metaTags: map[string]string{},
  1218. expected: []ssmtypes.Tag{},
  1219. modified: false,
  1220. },
  1221. {
  1222. name: "Empty tags with non-empty metaTags",
  1223. tags: map[string]string{},
  1224. metaTags: map[string]string{
  1225. "key1": "value1",
  1226. },
  1227. expected: []ssmtypes.Tag{
  1228. {Key: ptr.To("key1"), Value: ptr.To("value1")},
  1229. },
  1230. modified: true,
  1231. },
  1232. }
  1233. for _, tt := range tests {
  1234. t.Run(tt.name, func(t *testing.T) {
  1235. result, modified := computeTagsToUpdate(tt.tags, tt.metaTags)
  1236. assert.ElementsMatch(t, tt.expected, result)
  1237. assert.Equal(t, tt.modified, modified)
  1238. })
  1239. }
  1240. }