gcp.go 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. limitations under the License.
  10. */
  11. package gcp
  12. import (
  13. "crypto/rand"
  14. "crypto/x509"
  15. "encoding/pem"
  16. "fmt"
  17. // nolint
  18. . "github.com/onsi/ginkgo/v2"
  19. v1 "k8s.io/api/core/v1"
  20. p12 "software.sslmate.com/src/go-pkcs12"
  21. // nolint
  22. "github.com/external-secrets/external-secrets-e2e/framework"
  23. "github.com/external-secrets/external-secrets-e2e/suites/provider/cases/common"
  24. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  25. )
  26. const (
  27. withStaticAuth = "with service account"
  28. withReferentStaticAuth = "with service acount from referent namespace"
  29. )
  30. // This test uses the global ESO.
  31. var _ = Describe("[gcp]", Label("gcp", "secretsmanager"), func() {
  32. f := framework.New("eso-gcp")
  33. prov := NewFromEnv(f, "")
  34. DescribeTable("sync secrets", framework.TableFuncWithExternalSecret(f, prov),
  35. framework.Compose(withStaticAuth, f, common.SimpleDataSync, useStaticAuth),
  36. framework.Compose(withStaticAuth, f, common.JSONDataWithProperty, useStaticAuth),
  37. framework.Compose(withStaticAuth, f, common.JSONDataFromSync, useStaticAuth),
  38. framework.Compose(withStaticAuth, f, common.JSONDataFromRewrite, useStaticAuth),
  39. framework.Compose(withStaticAuth, f, common.NestedJSONWithGJSON, useStaticAuth),
  40. framework.Compose(withStaticAuth, f, common.JSONDataWithTemplate, useStaticAuth),
  41. framework.Compose(withStaticAuth, f, common.DockerJSONConfig, useStaticAuth),
  42. framework.Compose(withStaticAuth, f, common.DataPropertyDockerconfigJSON, useStaticAuth),
  43. framework.Compose(withStaticAuth, f, common.SSHKeySync, useStaticAuth),
  44. framework.Compose(withStaticAuth, f, common.SSHKeySyncDataProperty, useStaticAuth),
  45. framework.Compose(withStaticAuth, f, common.SyncWithoutTargetName, useStaticAuth),
  46. framework.Compose(withStaticAuth, f, common.JSONDataWithoutTargetName, useStaticAuth),
  47. framework.Compose(withStaticAuth, f, common.FindByName, useStaticAuth),
  48. framework.Compose(withStaticAuth, f, common.FindByNameAndRewrite, useStaticAuth),
  49. framework.Compose(withStaticAuth, f, common.FindByNameWithPath, useStaticAuth),
  50. framework.Compose(withStaticAuth, f, common.FindByTag, useStaticAuth),
  51. framework.Compose(withStaticAuth, f, common.FindByTagWithPath, useStaticAuth),
  52. framework.Compose(withStaticAuth, f, common.SyncV1Alpha1, useStaticAuth),
  53. framework.Compose(withStaticAuth, f, p12Cert, useStaticAuth),
  54. // referent auth
  55. framework.Compose(withReferentStaticAuth, f, common.SimpleDataSync, useReferentAuth),
  56. )
  57. })
  58. func useStaticAuth(tc *framework.TestCase) {
  59. tc.ExternalSecret.Spec.SecretStoreRef.Name = tc.Framework.Namespace.Name
  60. if tc.ExternalSecretV1Alpha1 != nil {
  61. tc.ExternalSecretV1Alpha1.Spec.SecretStoreRef.Name = tc.Framework.Namespace.Name
  62. }
  63. }
  64. func useReferentAuth(tc *framework.TestCase) {
  65. tc.ExternalSecret.Spec.SecretStoreRef.Name = referentName(tc.Framework)
  66. tc.ExternalSecret.Spec.SecretStoreRef.Kind = esv1beta1.ClusterSecretStoreKind
  67. }
  68. // P12Cert case creates a secret with a p12 cert containing a privkey and cert bundled together.
  69. // It uses templating to generate a k8s secret of type tls with pem values.
  70. func p12Cert(f *framework.Framework) (string, func(*framework.TestCase)) {
  71. return "should sync p12 encoded cert secret", func(tc *framework.TestCase) {
  72. cloudSecretName := fmt.Sprintf("%s-%s", tc.Framework.Namespace.Name, "p12-cert-example")
  73. certPEM := `-----BEGIN CERTIFICATE-----
  74. MIIFQjCCBCqgAwIBAgISBHszg5W2maz/7CIxGrf7mqukMA0GCSqGSIb3DQEBCwUA
  75. MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
  76. EwJSMzAeFw0yMTA3MjQxMjQyMzNaFw0yMTEwMjIxMjQyMzFaMCgxJjAkBgNVBAMT
  77. HXRlbXBvcmFyeS5leHRlcm5hbC1zZWNyZXRzLmlvMIIBIjANBgkqhkiG9w0BAQEF
  78. AAOCAQ8AMIIBCgKCAQEAyRROdZskA8qnGnoMgQ5Ry5MVY/lgo3HzlhKq02u23J2w
  79. 14w+LiEU2hcSJKYv5OXysbfq7M52u2zXYZXs6krkQZlYNpFw7peZ0JtUbVkSpST/
  80. X4b1GJKDSkRs7fTi+v+pb9OT9rTbtd8jfGe/YCe5rjXEm/ih2DgS13737lKCD5n6
  81. 3QUOG7CR+SKFeRXOGkncqJHAyRkpNfAmS8m1C+ucodfjSFoqAwwVGx7eyEktG4s/
  82. JbwLEb03hGrP15vnnOgxQmiAzWskxhMyHX6vmA71Oq4F3RVsuD3CEjKzgJ2+ghk3
  83. BIY3DZSfSReWSMYM573YFglENi+qJK012XnFmZcevwIDAQABo4ICWjCCAlYwDgYD
  84. VR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV
  85. HRMBAf8EAjAAMB0GA1UdDgQWBBRvn1wGi46XcyhRIIxJkSSUoCyoNzAfBgNVHSME
  86. GDAWgBQULrMXt1hWy65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYB
  87. BQUHMAGGFWh0dHA6Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDov
  88. L3IzLmkubGVuY3Iub3JnLzAoBgNVHREEITAfgh10ZW1wb3JhcnkuZXh0ZXJuYWwt
  89. c2VjcmV0cy5pbzBMBgNVHSAERTBDMAgGBmeBDAECATA3BgsrBgEEAYLfEwEBATAo
  90. MCYGCCsGAQUFBwIBFhpodHRwOi8vY3BzLmxldHNlbmNyeXB0Lm9yZzCCAQYGCisG
  91. AQQB1nkCBAIEgfcEgfQA8gB3APZclC/RdzAiFFQYCDCUVo7jTRMZM7/fDC8gC8xO
  92. 8WTjAAABetjA0asAAAQDAEgwRgIhAPYbBNim7q3P0qmD9IrAx1E1fEClYpoLrAVs
  93. 4LGBkQobAiEA+IaTPWs9eHmqtCwar96PNxE0Iucak0DYkgfcWJT5gfYAdwBvU3as
  94. MfAxGdiZAKRRFf93FRwR2QLBACkGjbIImjfZEwAAAXrYwNJTAAAEAwBIMEYCIQDY
  95. xWJKFljK1AW2z/uVsU7TwcAAcIqUf5/nhS04JAwpfwIhANDTvwvcRvPebU7fv6dq
  96. lNH1g2Oyv/4Vm7W+Vrc5cFD0MA0GCSqGSIb3DQEBCwUAA4IBAQAR29s3pDGZbNPN
  97. 5K+Zqg9UDT8s+P0fb9r97T7hWEFkiUtG4bz7QvGzSoDXhD/DZkdjLmkX7+bLiE3L
  98. hRSSYe+Am+Bw5soyzefX2FHAUeOLeK0mJhOrdiKqrW4nnvOOJWLkcWS799kW2z7j
  99. 2MgUWTOz/xXGUOWHt1KjyoM31G3shoAIB9lg3lHbuVIyDd3yyUpjt0zevVdYrO9G
  100. CgI2mJfv26EiddBvgudzN+R5Ayis9czaFHu8gpplaf9DahaKs1Uys6lg0HnzRn3l
  101. XMYitHfpGhc+DTTiTWMQ13J0b1j4yv8A7ZaG2366aa28oSTD6eQFhmVCBwa54j++
  102. IOwzHn5R
  103. -----END CERTIFICATE-----
  104. `
  105. privkeyPEM := `-----BEGIN PRIVATE KEY-----
  106. MIIEwAIBADANBgkqhkiG9w0BAQEFAASCBKowggSmAgEAAoIBAQDJFE51myQDyqca
  107. egyBDlHLkxVj+WCjcfOWEqrTa7bcnbDXjD4uIRTaFxIkpi/k5fKxt+rszna7bNdh
  108. lezqSuRBmVg2kXDul5nQm1RtWRKlJP9fhvUYkoNKRGzt9OL6/6lv05P2tNu13yN8
  109. Z79gJ7muNcSb+KHYOBLXfvfuUoIPmfrdBQ4bsJH5IoV5Fc4aSdyokcDJGSk18CZL
  110. ybUL65yh1+NIWioDDBUbHt7ISS0biz8lvAsRvTeEas/Xm+ec6DFCaIDNayTGEzId
  111. fq+YDvU6rgXdFWy4PcISMrOAnb6CGTcEhjcNlJ9JF5ZIxgznvdgWCUQ2L6okrTXZ
  112. ecWZlx6/AgMBAAECggEBAI9sDX5zFuAhdsk6zppqtUrn8TTq1dQe3ihnzjKYvMhl
  113. LZLA9EUA0ZexJv6/DqBMp6u9TDJ2HVgYDRQM1PxUSLTFhJb/bDayKUMS18ha5SKn
  114. 3gKsBzvsnPqnDa84oYF4Q8mAdyRb4e66ZtxAP8985kLtFPxO/llzvXS5mmwBq8Ul
  115. wlLOg5xAXubm3vgLyFm2GW9qI6ZvY9mmh1mv5ZLP8/8hikRjwJijnX3dyqqIAYnc
  116. DHjJYy2I1VxGJybqVQRquG++Tl4qLXbOUZ/lhKe62ARx/MBR9lEst5TURc9N7U3D
  117. Mgsu7FcFwqjVkig3P0XiNRWwCu0HrYee5rLXmtDnF9kCgYEA69+OuJM/RIsrLQQd
  118. 1alppgT+SFyaJM3X1MJD3yxW6Vqqvkhqe7+XCWnmVYcpHPcilWmZnnQ3PiWqPJ8A
  119. 3mIMp+Xg0ddFQXb3n7z4D0Mg4IPzvSKnlieTT1rDhhHRv/xArw1UBkF6kqcnZizZ
  120. FcWcOIt/dYodTWZzPJtLtf7QW0sCgYEA2jy0vJ5rg0/CSinkccreegC6gbbd+oE9
  121. uR/aGeu1XmnULoYYMMy7BLqd8/OiXvujbgUSUWnzbEclR88dPDkiRxDL7mYiaCn+
  122. l9jPuVB1W5x6irJdG/7lpSnLuijpkzey177ZKrlfGsOjtVZsc1ytnqTCWsF1r9eY
  123. yXCSvkJQjd0CgYEA5+vl0hh+MfBA4L9WcnpkNehc+luK+LspB7qHr81SG5qZngVo
  124. JgspAAmPf/Mo+qEI8S5m7MVKeCHitD6HRSHVXdUK7GklYIwQSJEuuxr/HaLAquyD
  125. KYH6NyGAdLfarFHka/rH7mq9kasnczCPtveZdoO7LKBD1ZHxptrvY6CLz+cCgYEA
  126. yEq2xfXPTrDA7DgOhbFfBjHs+mfOyr4a2/Czxt5hkskmB5ziTsdXTTvJA8Ay4WGp
  127. 2Kum6DmJQ3L4cDNR7ZeyMe7ke2QZZ+hC1TITU0zYqL+wZ+LTOYJzWWZGqBAsbwTL
  128. it6JiYCgHHw5n5A18Jq6bcNg7NJpJH2GqDo9M4jBTbECgYEAlMuvNExEXGVzWrGF
  129. NXHpAev64RJ2jTq59jtmxWrNvzeWJREOWd/Nt+0t+bE0sHMfgaMrhNFWiR8oesrF
  130. Jdx0ECYawviQoreDAyIXV6HouoeRbDtLZ9AJvxMoIjGcjAR2FQHc3yx4h/lf3Tfx
  131. x6HaRh+EUwU51von6M9lEF9/p5Q=
  132. -----END PRIVATE KEY-----
  133. `
  134. blockCert, _ := pem.Decode([]byte(certPEM))
  135. cert, _ := x509.ParseCertificate(blockCert.Bytes)
  136. blockPrivKey, _ := pem.Decode([]byte(privkeyPEM))
  137. privkey, _ := x509.ParsePKCS8PrivateKey(blockPrivKey.Bytes)
  138. emptyCACerts := []*x509.Certificate{}
  139. p12Cert, _ := p12.Encode(rand.Reader, privkey, cert, emptyCACerts, "")
  140. tc.Secrets = map[string]framework.SecretEntry{
  141. cloudSecretName: {Value: string(p12Cert)},
  142. }
  143. tc.ExpectedSecret = &v1.Secret{
  144. Type: v1.SecretTypeTLS,
  145. Data: map[string][]byte{
  146. "tls.crt": []byte(certPEM),
  147. "tls.key": []byte(privkeyPEM),
  148. },
  149. }
  150. tc.ExternalSecret.Spec.Data = []esv1beta1.ExternalSecretData{
  151. {
  152. SecretKey: "mysecret",
  153. RemoteRef: esv1beta1.ExternalSecretDataRemoteRef{
  154. Key: cloudSecretName,
  155. },
  156. },
  157. }
  158. tc.ExternalSecret.Spec.Target.Template = &esv1beta1.ExternalSecretTemplate{
  159. Type: v1.SecretTypeTLS,
  160. EngineVersion: esv1beta1.TemplateEngineV1,
  161. Data: map[string]string{
  162. "tls.crt": "{{ .mysecret | pkcs12cert | pemCertificate }}",
  163. "tls.key": "{{ .mysecret | pkcs12key | pemPrivateKey }}",
  164. },
  165. }
  166. }
  167. }