parameterstore_test.go 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package parameterstore
  13. import (
  14. "context"
  15. "errors"
  16. "strings"
  17. "testing"
  18. "github.com/aws/aws-sdk-go/aws"
  19. "github.com/aws/aws-sdk-go/aws/awserr"
  20. "github.com/aws/aws-sdk-go/service/ssm"
  21. "github.com/google/go-cmp/cmp"
  22. "github.com/stretchr/testify/assert"
  23. "github.com/stretchr/testify/require"
  24. corev1 "k8s.io/api/core/v1"
  25. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  26. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  27. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  28. fakeps "github.com/external-secrets/external-secrets/pkg/provider/aws/parameterstore/fake"
  29. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  30. "github.com/external-secrets/external-secrets/pkg/provider/testing/fake"
  31. )
  32. const (
  33. errInvalidProperty = "key INVALPROP does not exist in secret"
  34. invalidProp = "INVALPROP"
  35. )
  36. var (
  37. fakeSecretKey = "fakeSecretKey"
  38. fakeValue = "fakeValue"
  39. )
  40. type parameterstoreTestCase struct {
  41. fakeClient *fakeps.Client
  42. apiInput *ssm.GetParameterInput
  43. apiOutput *ssm.GetParameterOutput
  44. remoteRef *esv1beta1.ExternalSecretDataRemoteRef
  45. apiErr error
  46. expectError string
  47. expectedSecret string
  48. expectedData map[string][]byte
  49. prefix string
  50. }
  51. func makeValidParameterStoreTestCase() *parameterstoreTestCase {
  52. return &parameterstoreTestCase{
  53. fakeClient: &fakeps.Client{},
  54. apiInput: makeValidAPIInput(),
  55. apiOutput: makeValidAPIOutput(),
  56. remoteRef: makeValidRemoteRef(),
  57. apiErr: nil,
  58. prefix: "",
  59. expectError: "",
  60. expectedSecret: "",
  61. expectedData: make(map[string][]byte),
  62. }
  63. }
  64. func makeValidAPIInput() *ssm.GetParameterInput {
  65. return &ssm.GetParameterInput{
  66. Name: aws.String("/baz"),
  67. WithDecryption: aws.Bool(true),
  68. }
  69. }
  70. func makeValidAPIOutput() *ssm.GetParameterOutput {
  71. return &ssm.GetParameterOutput{
  72. Parameter: &ssm.Parameter{
  73. Value: aws.String("RRRRR"),
  74. },
  75. }
  76. }
  77. func makeValidRemoteRef() *esv1beta1.ExternalSecretDataRemoteRef {
  78. return &esv1beta1.ExternalSecretDataRemoteRef{
  79. Key: "/baz",
  80. }
  81. }
  82. func makeValidParameterStoreTestCaseCustom(tweaks ...func(pstc *parameterstoreTestCase)) *parameterstoreTestCase {
  83. pstc := makeValidParameterStoreTestCase()
  84. for _, fn := range tweaks {
  85. fn(pstc)
  86. }
  87. pstc.fakeClient.WithValue(pstc.apiInput, pstc.apiOutput, pstc.apiErr)
  88. return pstc
  89. }
  90. func TestDeleteSecret(t *testing.T) {
  91. fakeClient := fakeps.Client{}
  92. parameterName := "parameter"
  93. managedBy := "managed-by"
  94. manager := "external-secrets"
  95. ssmTag := ssm.Tag{
  96. Key: &managedBy,
  97. Value: &manager,
  98. }
  99. type args struct {
  100. client fakeps.Client
  101. getParameterOutput *ssm.GetParameterOutput
  102. listTagsOutput *ssm.ListTagsForResourceOutput
  103. deleteParameterOutput *ssm.DeleteParameterOutput
  104. getParameterError error
  105. listTagsError error
  106. deleteParameterError error
  107. }
  108. type want struct {
  109. err error
  110. }
  111. type testCase struct {
  112. args args
  113. want want
  114. reason string
  115. }
  116. tests := map[string]testCase{
  117. "Deletes Successfully": {
  118. args: args{
  119. client: fakeClient,
  120. getParameterOutput: &ssm.GetParameterOutput{
  121. Parameter: &ssm.Parameter{
  122. Name: &parameterName,
  123. },
  124. },
  125. listTagsOutput: &ssm.ListTagsForResourceOutput{
  126. TagList: []*ssm.Tag{&ssmTag},
  127. },
  128. deleteParameterOutput: nil,
  129. getParameterError: nil,
  130. listTagsError: nil,
  131. deleteParameterError: nil,
  132. },
  133. want: want{
  134. err: nil,
  135. },
  136. reason: "",
  137. },
  138. "Secret Not Found": {
  139. args: args{
  140. client: fakeClient,
  141. getParameterOutput: nil,
  142. listTagsOutput: nil,
  143. deleteParameterOutput: nil,
  144. getParameterError: awserr.New(ssm.ErrCodeParameterNotFound, "not here, sorry dude", nil),
  145. listTagsError: nil,
  146. deleteParameterError: nil,
  147. },
  148. want: want{
  149. err: nil,
  150. },
  151. reason: "",
  152. },
  153. "No permissions to get secret": {
  154. args: args{
  155. client: fakeClient,
  156. getParameterOutput: nil,
  157. listTagsOutput: nil,
  158. deleteParameterOutput: nil,
  159. getParameterError: errors.New("no permissions"),
  160. listTagsError: nil,
  161. deleteParameterError: nil,
  162. },
  163. want: want{
  164. err: errors.New("no permissions"),
  165. },
  166. reason: "",
  167. },
  168. "No permissions to get tags": {
  169. args: args{
  170. client: fakeClient,
  171. getParameterOutput: &ssm.GetParameterOutput{
  172. Parameter: &ssm.Parameter{
  173. Name: &parameterName,
  174. },
  175. },
  176. listTagsOutput: nil,
  177. deleteParameterOutput: nil,
  178. getParameterError: nil,
  179. listTagsError: errors.New("no permissions"),
  180. deleteParameterError: nil,
  181. },
  182. want: want{
  183. err: errors.New("no permissions"),
  184. },
  185. reason: "",
  186. },
  187. "Secret Not Managed by External Secrets": {
  188. args: args{
  189. client: fakeClient,
  190. getParameterOutput: &ssm.GetParameterOutput{
  191. Parameter: &ssm.Parameter{
  192. Name: &parameterName,
  193. },
  194. },
  195. listTagsOutput: &ssm.ListTagsForResourceOutput{
  196. TagList: []*ssm.Tag{},
  197. },
  198. deleteParameterOutput: nil,
  199. getParameterError: nil,
  200. listTagsError: nil,
  201. deleteParameterError: nil,
  202. },
  203. want: want{
  204. err: nil,
  205. },
  206. reason: "",
  207. },
  208. "No permissions delete secret": {
  209. args: args{
  210. client: fakeClient,
  211. getParameterOutput: &ssm.GetParameterOutput{
  212. Parameter: &ssm.Parameter{
  213. Name: &parameterName,
  214. },
  215. },
  216. listTagsOutput: &ssm.ListTagsForResourceOutput{
  217. TagList: []*ssm.Tag{&ssmTag},
  218. },
  219. deleteParameterOutput: nil,
  220. getParameterError: nil,
  221. listTagsError: nil,
  222. deleteParameterError: errors.New("no permissions"),
  223. },
  224. want: want{
  225. err: errors.New("no permissions"),
  226. },
  227. reason: "",
  228. },
  229. }
  230. for name, tc := range tests {
  231. t.Run(name, func(t *testing.T) {
  232. ref := fake.PushSecretData{RemoteKey: remoteKey}
  233. ps := ParameterStore{
  234. client: &tc.args.client,
  235. }
  236. tc.args.client.GetParameterWithContextFn = fakeps.NewGetParameterWithContextFn(tc.args.getParameterOutput, tc.args.getParameterError)
  237. tc.args.client.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(tc.args.listTagsOutput, tc.args.listTagsError)
  238. tc.args.client.DeleteParameterWithContextFn = fakeps.NewDeleteParameterWithContextFn(tc.args.deleteParameterOutput, tc.args.deleteParameterError)
  239. err := ps.DeleteSecret(context.TODO(), ref)
  240. // Error nil XOR tc.want.err nil
  241. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  242. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  243. }
  244. // if errors are the same type but their contents do not match
  245. if err != nil && tc.want.err != nil {
  246. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  247. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error got nil", name, tc.reason, tc.want.err)
  248. }
  249. }
  250. })
  251. }
  252. }
  253. const remoteKey = "fake-key"
  254. func TestPushSecret(t *testing.T) {
  255. invalidParameters := errors.New(ssm.ErrCodeInvalidParameters)
  256. alreadyExistsError := errors.New(ssm.ErrCodeAlreadyExistsException)
  257. fakeSecret := &corev1.Secret{
  258. Data: map[string][]byte{
  259. fakeSecretKey: []byte(fakeValue),
  260. },
  261. }
  262. managedByESO := ssm.Tag{
  263. Key: &managedBy,
  264. Value: &externalSecrets,
  265. }
  266. putParameterOutput := &ssm.PutParameterOutput{}
  267. getParameterOutput := &ssm.GetParameterOutput{}
  268. describeParameterOutput := &ssm.DescribeParametersOutput{}
  269. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  270. TagList: []*ssm.Tag{&managedByESO},
  271. }
  272. noTagsResourceOutput := &ssm.ListTagsForResourceOutput{}
  273. validGetParameterOutput := &ssm.GetParameterOutput{
  274. Parameter: &ssm.Parameter{
  275. ARN: nil,
  276. DataType: nil,
  277. LastModifiedDate: nil,
  278. Name: nil,
  279. Selector: nil,
  280. SourceResult: nil,
  281. Type: nil,
  282. Value: nil,
  283. Version: nil,
  284. },
  285. }
  286. sameGetParameterOutput := &ssm.GetParameterOutput{
  287. Parameter: &ssm.Parameter{
  288. Value: &fakeValue,
  289. },
  290. }
  291. type args struct {
  292. store *esv1beta1.AWSProvider
  293. metadata *apiextensionsv1.JSON
  294. client fakeps.Client
  295. }
  296. type want struct {
  297. err error
  298. }
  299. tests := map[string]struct {
  300. reason string
  301. args args
  302. want want
  303. }{
  304. "PutParameterSucceeds": {
  305. reason: "a parameter can be successfully pushed to aws parameter store",
  306. args: args{
  307. store: makeValidParameterStore().Spec.Provider.AWS,
  308. client: fakeps.Client{
  309. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  310. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, nil),
  311. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  312. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  313. },
  314. },
  315. want: want{
  316. err: nil,
  317. },
  318. },
  319. "SetParameterFailsWhenNoNameProvided": {
  320. reason: "test push secret with no name gives error",
  321. args: args{
  322. store: makeValidParameterStore().Spec.Provider.AWS,
  323. client: fakeps.Client{
  324. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  325. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, invalidParameters),
  326. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  327. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  328. },
  329. },
  330. want: want{
  331. err: invalidParameters,
  332. },
  333. },
  334. "SetSecretWhenAlreadyExists": {
  335. reason: "test push secret with secret that already exists gives error",
  336. args: args{
  337. store: makeValidParameterStore().Spec.Provider.AWS,
  338. client: fakeps.Client{
  339. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, alreadyExistsError),
  340. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, nil),
  341. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  342. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  343. },
  344. },
  345. want: want{
  346. err: alreadyExistsError,
  347. },
  348. },
  349. "GetSecretWithValidParameters": {
  350. reason: "Get secret with valid parameters",
  351. args: args{
  352. store: makeValidParameterStore().Spec.Provider.AWS,
  353. client: fakeps.Client{
  354. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  355. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  356. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  357. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  358. },
  359. },
  360. want: want{
  361. err: nil,
  362. },
  363. },
  364. "SetSecretNotManagedByESO": {
  365. reason: "SetSecret to the parameter store but tags are not managed by ESO",
  366. args: args{
  367. store: makeValidParameterStore().Spec.Provider.AWS,
  368. client: fakeps.Client{
  369. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  370. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  371. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  372. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(noTagsResourceOutput, nil),
  373. },
  374. },
  375. want: want{
  376. err: errors.New("secret not managed by external-secrets"),
  377. },
  378. },
  379. "SetSecretGetTagsError": {
  380. reason: "SetSecret to the parameter store returns error while obtaining tags",
  381. args: args{
  382. store: makeValidParameterStore().Spec.Provider.AWS,
  383. client: fakeps.Client{
  384. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  385. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  386. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  387. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(nil, errors.New("you shall not tag")),
  388. },
  389. },
  390. want: want{
  391. err: errors.New("you shall not tag"),
  392. },
  393. },
  394. "SetSecretContentMatches": {
  395. reason: "No ops",
  396. args: args{
  397. store: makeValidParameterStore().Spec.Provider.AWS,
  398. client: fakeps.Client{
  399. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  400. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  401. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  402. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  403. },
  404. },
  405. want: want{
  406. err: nil,
  407. },
  408. },
  409. "SetSecretWithValidMetadata": {
  410. reason: "test push secret with valid parameterStoreType metadata",
  411. args: args{
  412. store: makeValidParameterStore().Spec.Provider.AWS,
  413. metadata: &apiextensionsv1.JSON{
  414. Raw: []byte(`{
  415. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  416. "kind": "PushSecretMetadata",
  417. "spec": {
  418. "secretType": "SecureString",
  419. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c"
  420. }
  421. }`),
  422. },
  423. client: fakeps.Client{
  424. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  425. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  426. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  427. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  428. },
  429. },
  430. want: want{
  431. err: nil,
  432. },
  433. },
  434. "SetSecretWithValidMetadataListString": {
  435. reason: "test push secret with valid parameterStoreType metadata and unused parameterStoreKeyID",
  436. args: args{
  437. store: makeValidParameterStore().Spec.Provider.AWS,
  438. metadata: &apiextensionsv1.JSON{
  439. Raw: []byte(`{
  440. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  441. "kind": "PushSecretMetadata",
  442. "spec": {
  443. "secretType": "StringList"
  444. }
  445. }`),
  446. },
  447. client: fakeps.Client{
  448. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  449. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  450. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  451. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  452. },
  453. },
  454. want: want{
  455. err: nil,
  456. },
  457. },
  458. "SetSecretWithInvalidMetadata": {
  459. reason: "test push secret with invalid metadata structure",
  460. args: args{
  461. store: makeValidParameterStore().Spec.Provider.AWS,
  462. metadata: &apiextensionsv1.JSON{
  463. Raw: []byte(`{ fakeMetadataKey: "" }`),
  464. },
  465. client: fakeps.Client{
  466. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  467. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  468. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  469. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  470. },
  471. },
  472. want: want{
  473. err: errors.New(`failed to parse metadata: failed to parse kubernetes.external-secrets.io/v1alpha1 PushSecretMetadata: error unmarshaling JSON: while decoding JSON: json: unknown field "fakeMetadataKey"`),
  474. },
  475. },
  476. "GetRemoteSecretWithoutDecryption": {
  477. reason: "test if push secret's get remote source is encrypted for valid comparison",
  478. args: args{
  479. store: makeValidParameterStore().Spec.Provider.AWS,
  480. metadata: &apiextensionsv1.JSON{
  481. Raw: []byte(`{
  482. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  483. "kind": "PushSecretMetadata",
  484. "spec": {
  485. "secretType": "SecureString",
  486. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c"
  487. }
  488. }`),
  489. },
  490. client: fakeps.Client{
  491. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  492. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(&ssm.GetParameterOutput{
  493. Parameter: &ssm.Parameter{
  494. Type: aws.String("SecureString"),
  495. Value: aws.String("sensitive"),
  496. },
  497. }, nil),
  498. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  499. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  500. },
  501. },
  502. want: want{
  503. err: errors.New("unable to compare 'sensitive' result, ensure to request a decrypted value"),
  504. },
  505. },
  506. "SecretWithAdvancedTier": {
  507. reason: "test if we can provide advanced tier policies",
  508. args: args{
  509. store: makeValidParameterStore().Spec.Provider.AWS,
  510. metadata: &apiextensionsv1.JSON{
  511. Raw: []byte(`{
  512. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  513. "kind": "PushSecretMetadata",
  514. "spec": {
  515. "secretType": "SecureString",
  516. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c",
  517. "tier": {
  518. "type": "Advanced",
  519. "policies": [
  520. {
  521. "type": "Expiration",
  522. "version": "1.0",
  523. "attributes": {
  524. "timestamp": "2024-12-02T21:34:33.000Z"
  525. }
  526. },
  527. {
  528. "type": "ExpirationNotification",
  529. "version": "1.0",
  530. "attributes": {
  531. "before": "2",
  532. "unit": "Days"
  533. }
  534. }
  535. ]
  536. }
  537. }
  538. }`),
  539. },
  540. client: fakeps.Client{
  541. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  542. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(&ssm.GetParameterOutput{
  543. Parameter: &ssm.Parameter{
  544. Type: aws.String("SecureString"),
  545. Value: aws.String("sensitive"),
  546. },
  547. }, nil),
  548. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  549. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  550. },
  551. },
  552. want: want{
  553. err: errors.New("unable to compare 'sensitive' result, ensure to request a decrypted value"),
  554. },
  555. },
  556. }
  557. for name, tc := range tests {
  558. t.Run(name, func(t *testing.T) {
  559. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  560. if tc.args.metadata != nil {
  561. psd.Metadata = tc.args.metadata
  562. }
  563. ps := ParameterStore{
  564. client: &tc.args.client,
  565. }
  566. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  567. // Error nil XOR tc.want.err nil
  568. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  569. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  570. }
  571. // if errors are the same type but their contents do not match
  572. if err != nil && tc.want.err != nil {
  573. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  574. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %s", name, tc.reason, tc.want.err, err)
  575. }
  576. }
  577. })
  578. }
  579. }
  580. func TestPushSecretWithPrefix(t *testing.T) {
  581. fakeSecret := &corev1.Secret{
  582. Data: map[string][]byte{
  583. fakeSecretKey: []byte(fakeValue),
  584. },
  585. }
  586. managedByESO := ssm.Tag{
  587. Key: &managedBy,
  588. Value: &externalSecrets,
  589. }
  590. putParameterOutput := &ssm.PutParameterOutput{}
  591. getParameterOutput := &ssm.GetParameterOutput{}
  592. describeParameterOutput := &ssm.DescribeParametersOutput{}
  593. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  594. TagList: []*ssm.Tag{&managedByESO},
  595. }
  596. client := fakeps.Client{
  597. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  598. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, nil),
  599. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  600. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  601. }
  602. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  603. ps := ParameterStore{
  604. client: &client,
  605. prefix: "/test/this/thing/",
  606. }
  607. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  608. require.NoError(t, err)
  609. input := client.PutParameterWithContextFnCalledWith[0][0]
  610. assert.Equal(t, "/test/this/thing/fake-key", *input.Name)
  611. }
  612. func TestPushSecretCalledOnlyOnce(t *testing.T) {
  613. fakeSecret := &corev1.Secret{
  614. Data: map[string][]byte{
  615. fakeSecretKey: []byte(fakeValue),
  616. },
  617. }
  618. managedByESO := ssm.Tag{
  619. Key: &managedBy,
  620. Value: &externalSecrets,
  621. }
  622. putParameterOutput := &ssm.PutParameterOutput{}
  623. validGetParameterOutput := &ssm.GetParameterOutput{
  624. Parameter: &ssm.Parameter{
  625. Value: &fakeValue,
  626. },
  627. }
  628. describeParameterOutput := &ssm.DescribeParametersOutput{}
  629. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  630. TagList: []*ssm.Tag{&managedByESO},
  631. }
  632. client := fakeps.Client{
  633. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  634. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  635. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  636. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  637. }
  638. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  639. ps := ParameterStore{
  640. client: &client,
  641. }
  642. require.NoError(t, ps.PushSecret(context.TODO(), fakeSecret, psd))
  643. assert.Equal(t, 0, client.PutParameterWithContextCalledN)
  644. }
  645. // test the ssm<->aws interface
  646. // make sure correct values are passed and errors are handled accordingly.
  647. func TestGetSecret(t *testing.T) {
  648. // good case: key is passed in, output is sent back
  649. setSecretString := func(pstc *parameterstoreTestCase) {
  650. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  651. pstc.expectedSecret = "RRRRR"
  652. }
  653. // good case: key is passed in and prefix is set, output is sent back
  654. setSecretStringWithPrefix := func(pstc *parameterstoreTestCase) {
  655. pstc.apiInput = &ssm.GetParameterInput{
  656. Name: aws.String("/test/this/baz"),
  657. WithDecryption: aws.Bool(true),
  658. }
  659. pstc.prefix = "/test/this"
  660. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  661. pstc.expectedSecret = "RRRRR"
  662. }
  663. // good case: extract property
  664. setExtractProperty := func(pstc *parameterstoreTestCase) {
  665. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  666. pstc.expectedSecret = "bang"
  667. pstc.remoteRef.Property = "/shmoo"
  668. }
  669. // good case: extract property with `.`
  670. setExtractPropertyWithDot := func(pstc *parameterstoreTestCase) {
  671. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo.boom": "bang"}`)
  672. pstc.expectedSecret = "bang"
  673. pstc.remoteRef.Property = "/shmoo.boom"
  674. }
  675. // bad case: missing property
  676. setMissingProperty := func(pstc *parameterstoreTestCase) {
  677. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  678. pstc.remoteRef.Property = "INVALPROP"
  679. pstc.expectError = "key INVALPROP does not exist in secret"
  680. }
  681. // bad case: parameter.Value not found
  682. setParameterValueNotFound := func(pstc *parameterstoreTestCase) {
  683. pstc.apiOutput.Parameter.Value = aws.String("NONEXISTENT")
  684. pstc.apiErr = esv1beta1.NoSecretErr
  685. pstc.expectError = "Secret does not exist"
  686. }
  687. // bad case: extract property failure due to invalid json
  688. setPropertyFail := func(pstc *parameterstoreTestCase) {
  689. pstc.apiOutput.Parameter.Value = aws.String(`------`)
  690. pstc.remoteRef.Property = invalidProp
  691. pstc.expectError = errInvalidProperty
  692. }
  693. // bad case: parameter.Value may be nil but binary is set
  694. setParameterValueNil := func(pstc *parameterstoreTestCase) {
  695. pstc.apiOutput.Parameter.Value = nil
  696. pstc.expectError = "parameter value is nil for key"
  697. }
  698. // base case: api output return error
  699. setAPIError := func(pstc *parameterstoreTestCase) {
  700. pstc.apiOutput = &ssm.GetParameterOutput{}
  701. pstc.apiErr = errors.New("oh no")
  702. pstc.expectError = "oh no"
  703. }
  704. // good case: metadata returned
  705. setMetadataString := func(pstc *parameterstoreTestCase) {
  706. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  707. output := ssm.ListTagsForResourceOutput{
  708. TagList: getTagSlice(),
  709. }
  710. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  711. pstc.expectedSecret, _ = util.ParameterTagsToJSONString(getTagSlice())
  712. }
  713. // good case: metadata property returned
  714. setMetadataProperty := func(pstc *parameterstoreTestCase) {
  715. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  716. output := ssm.ListTagsForResourceOutput{
  717. TagList: getTagSlice(),
  718. }
  719. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  720. pstc.remoteRef.Property = "tagname2"
  721. pstc.expectedSecret = "tagvalue2"
  722. }
  723. // bad case: metadata property not found
  724. setMetadataMissingProperty := func(pstc *parameterstoreTestCase) {
  725. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  726. output := ssm.ListTagsForResourceOutput{
  727. TagList: getTagSlice(),
  728. }
  729. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  730. pstc.remoteRef.Property = invalidProp
  731. pstc.expectError = errInvalidProperty
  732. }
  733. successCases := []*parameterstoreTestCase{
  734. makeValidParameterStoreTestCaseCustom(setSecretStringWithPrefix),
  735. makeValidParameterStoreTestCaseCustom(setSecretString),
  736. makeValidParameterStoreTestCaseCustom(setExtractProperty),
  737. makeValidParameterStoreTestCaseCustom(setMissingProperty),
  738. makeValidParameterStoreTestCaseCustom(setPropertyFail),
  739. makeValidParameterStoreTestCaseCustom(setParameterValueNil),
  740. makeValidParameterStoreTestCaseCustom(setAPIError),
  741. makeValidParameterStoreTestCaseCustom(setExtractPropertyWithDot),
  742. makeValidParameterStoreTestCaseCustom(setParameterValueNotFound),
  743. makeValidParameterStoreTestCaseCustom(setMetadataString),
  744. makeValidParameterStoreTestCaseCustom(setMetadataProperty),
  745. makeValidParameterStoreTestCaseCustom(setMetadataMissingProperty),
  746. }
  747. ps := ParameterStore{}
  748. for k, v := range successCases {
  749. ps.client = v.fakeClient
  750. ps.prefix = v.prefix
  751. out, err := ps.GetSecret(context.Background(), *v.remoteRef)
  752. if !ErrorContains(err, v.expectError) {
  753. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  754. }
  755. if cmp.Equal(out, v.expectedSecret) {
  756. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedSecret, out)
  757. }
  758. }
  759. }
  760. func TestGetSecretMap(t *testing.T) {
  761. // good case: default version & deserialization
  762. simpleJSON := func(pstc *parameterstoreTestCase) {
  763. pstc.apiOutput.Parameter.Value = aws.String(`{"foo":"bar"}`)
  764. pstc.expectedData["foo"] = []byte("bar")
  765. }
  766. // good case: default version & complex json
  767. complexJSON := func(pstc *parameterstoreTestCase) {
  768. pstc.apiOutput.Parameter.Value = aws.String(`{"int": 42, "str": "str", "nested": {"foo":"bar"}}`)
  769. pstc.expectedData["int"] = []byte("42")
  770. pstc.expectedData["str"] = []byte("str")
  771. pstc.expectedData["nested"] = []byte(`{"foo":"bar"}`)
  772. }
  773. // bad case: api error returned
  774. setAPIError := func(pstc *parameterstoreTestCase) {
  775. pstc.apiOutput.Parameter = &ssm.Parameter{}
  776. pstc.expectError = "some api err"
  777. pstc.apiErr = errors.New("some api err")
  778. }
  779. // bad case: invalid json
  780. setInvalidJSON := func(pstc *parameterstoreTestCase) {
  781. pstc.apiOutput.Parameter.Value = aws.String(`-----------------`)
  782. pstc.expectError = "unable to unmarshal secret"
  783. }
  784. successCases := []*parameterstoreTestCase{
  785. makeValidParameterStoreTestCaseCustom(simpleJSON),
  786. makeValidParameterStoreTestCaseCustom(complexJSON),
  787. makeValidParameterStoreTestCaseCustom(setAPIError),
  788. makeValidParameterStoreTestCaseCustom(setInvalidJSON),
  789. }
  790. ps := ParameterStore{}
  791. for k, v := range successCases {
  792. ps.client = v.fakeClient
  793. out, err := ps.GetSecretMap(context.Background(), *v.remoteRef)
  794. if !ErrorContains(err, v.expectError) {
  795. t.Errorf("[%d] unexpected error: %q, expected: %q", k, err.Error(), v.expectError)
  796. }
  797. if err == nil && !cmp.Equal(out, v.expectedData) {
  798. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedData, out)
  799. }
  800. }
  801. }
  802. func makeValidParameterStore() *esv1beta1.SecretStore {
  803. return &esv1beta1.SecretStore{
  804. ObjectMeta: metav1.ObjectMeta{
  805. Name: "aws-parameterstore",
  806. Namespace: "default",
  807. },
  808. Spec: esv1beta1.SecretStoreSpec{
  809. Provider: &esv1beta1.SecretStoreProvider{
  810. AWS: &esv1beta1.AWSProvider{
  811. Service: esv1beta1.AWSServiceParameterStore,
  812. Region: "us-east-1",
  813. },
  814. },
  815. },
  816. }
  817. }
  818. func ErrorContains(out error, want string) bool {
  819. if out == nil {
  820. return want == ""
  821. }
  822. if want == "" {
  823. return false
  824. }
  825. return strings.Contains(out.Error(), want)
  826. }
  827. func getTagSlice() []*ssm.Tag {
  828. tagKey1 := "tagname1"
  829. tagValue1 := "tagvalue1"
  830. tagKey2 := "tagname2"
  831. tagValue2 := "tagvalue2"
  832. return []*ssm.Tag{
  833. {
  834. Key: &tagKey1,
  835. Value: &tagValue1,
  836. },
  837. {
  838. Key: &tagKey2,
  839. Value: &tagValue2,
  840. },
  841. }
  842. }