provider.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. package scaleway
  2. import (
  3. "github.com/external-secrets/external-secrets-e2e/framework"
  4. "github.com/onsi/gomega"
  5. smapi "github.com/scaleway/scaleway-sdk-go/api/secret/v1beta1"
  6. "github.com/scaleway/scaleway-sdk-go/scw"
  7. )
  8. const remoteRefPrefix = "name:"
  9. const cleanupTag = "eso-e2e" // tag for easy cleanup
  10. type secretStoreProvider struct {
  11. api *smapi.API
  12. cfg *config
  13. }
  14. func (p *secretStoreProvider) init(cfg *config) {
  15. p.cfg = cfg
  16. options := []scw.ClientOption{
  17. scw.WithDefaultRegion(scw.Region(cfg.region)),
  18. scw.WithDefaultProjectID(cfg.projectId),
  19. scw.WithAuth(cfg.accessKey, cfg.secretKey),
  20. }
  21. if cfg.apiUrl != nil {
  22. options = append(options, scw.WithAPIURL(*cfg.apiUrl))
  23. }
  24. scwClient, err := scw.NewClient(options...)
  25. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  26. p.api = smapi.NewAPI(scwClient)
  27. }
  28. // cleanup prevents accumulation of secrets after aborted runs.
  29. func (p *secretStoreProvider) cleanup() {
  30. for {
  31. listResp, err := p.api.ListSecrets(&smapi.ListSecretsRequest{
  32. ProjectID: &p.cfg.projectId,
  33. Tags: []string{cleanupTag},
  34. })
  35. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  36. for _, secret := range listResp.Secrets {
  37. err := p.api.DeleteSecret(&smapi.DeleteSecretRequest{
  38. SecretID: secret.ID,
  39. })
  40. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  41. }
  42. if uint64(len(listResp.Secrets)) == listResp.TotalCount {
  43. break
  44. }
  45. }
  46. }
  47. func (p *secretStoreProvider) CreateSecret(key string, val framework.SecretEntry) {
  48. gomega.Expect(key).To(gomega.HavePrefix(remoteRefPrefix))
  49. secretName := key[len(remoteRefPrefix):]
  50. var tags []string
  51. for tag := range val.Tags {
  52. tags = append(tags, tag)
  53. }
  54. tags = append(tags, cleanupTag)
  55. secret, err := p.api.CreateSecret(&smapi.CreateSecretRequest{
  56. Name: secretName,
  57. Tags: tags,
  58. })
  59. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  60. _, err = p.api.CreateSecretVersion(&smapi.CreateSecretVersionRequest{
  61. SecretID: secret.ID,
  62. Data: []byte(val.Value),
  63. })
  64. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  65. }
  66. func (p *secretStoreProvider) DeleteSecret(key string) {
  67. gomega.Expect(key).To(gomega.HavePrefix(remoteRefPrefix))
  68. secretName := key[len(remoteRefPrefix):]
  69. p.api.GetSecret(&smapi.GetSecretRequest{
  70. Region: "",
  71. SecretID: "",
  72. })
  73. res, err := p.api.ListSecrets(&smapi.ListSecretsRequest{
  74. Name: &secretName,
  75. })
  76. if _, isErrNotFound := err.(*scw.ResourceNotFoundError); isErrNotFound {
  77. return
  78. }
  79. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  80. for _, secret := range res.Secrets {
  81. err = p.api.DeleteSecret(&smapi.DeleteSecretRequest{
  82. SecretID: secret.ID,
  83. })
  84. if _, isErrNotFound := err.(*scw.ResourceNotFoundError); isErrNotFound {
  85. return
  86. }
  87. gomega.Expect(err).ToNot(gomega.HaveOccurred())
  88. }
  89. }