client_test.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package keepersecurity
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "reflect"
  18. "testing"
  19. ksm "github.com/keeper-security/secrets-manager-go/core"
  20. corev1 "k8s.io/api/core/v1"
  21. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  22. "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  23. "github.com/external-secrets/external-secrets/pkg/provider/keepersecurity/fake"
  24. testingfake "github.com/external-secrets/external-secrets/pkg/provider/testing/fake"
  25. )
  26. const (
  27. folderID = "a8ekf031k"
  28. validExistingRecord = "record0/login"
  29. invalidRecord = "record5/login"
  30. outputRecord0 = "{\"title\":\"record0\",\"type\":\"login\",\"fields\":[{\"type\":\"login\",\"value\":[\"foo\"]},{\"type\":\"password\",\"value\":[\"bar\"]}],\"custom\":[{\"type\":\"host\",\"label\":\"host0\",\"value\":[{\"hostName\":\"mysql\",\"port\":\"3306\"}]}],\"files\":null}"
  31. outputRecord1 = "{\"title\":\"record1\",\"type\":\"login\",\"fields\":[{\"type\":\"login\",\"value\":[\"foo\"]},{\"type\":\"password\",\"value\":[\"bar\"]}],\"custom\":[{\"type\":\"host\",\"label\":\"host1\",\"value\":[{\"hostName\":\"mysql\",\"port\":\"3306\"}]}],\"files\":null}"
  32. outputRecord2 = "{\"title\":\"record2\",\"type\":\"login\",\"fields\":[{\"type\":\"login\",\"value\":[\"foo\"]},{\"type\":\"password\",\"value\":[\"bar\"]}],\"custom\":[{\"type\":\"host\",\"label\":\"host2\",\"value\":[{\"hostName\":\"mysql\",\"port\":\"3306\"}]}],\"files\":null}"
  33. record0 = "record0"
  34. record1 = "record1"
  35. record2 = "record2"
  36. LoginKey = "login"
  37. PasswordKey = "password"
  38. HostKeyFormat = "host%d"
  39. RecordNameFormat = "record%d"
  40. )
  41. func TestClientDeleteSecret(t *testing.T) {
  42. type fields struct {
  43. ksmClient SecurityClient
  44. folderID string
  45. }
  46. type args struct {
  47. ctx context.Context
  48. remoteRef esv1.PushSecretRemoteRef
  49. }
  50. tests := []struct {
  51. name string
  52. fields fields
  53. args args
  54. wantErr bool
  55. }{
  56. {
  57. name: "Delete valid secret",
  58. fields: fields{
  59. ksmClient: &fake.MockKeeperClient{
  60. DeleteSecretsFn: func(recrecordUids []string) (map[string]string, error) {
  61. return map[string]string{
  62. record0: record0,
  63. }, nil
  64. },
  65. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  66. return generateRecords()[:1], nil
  67. },
  68. },
  69. folderID: folderID,
  70. },
  71. args: args{
  72. context.Background(),
  73. &v1alpha1.PushSecretRemoteRef{
  74. RemoteKey: validExistingRecord,
  75. },
  76. },
  77. wantErr: false,
  78. },
  79. {
  80. name: "Delete secret with multiple matches by Name",
  81. fields: fields{
  82. ksmClient: &fake.MockKeeperClient{
  83. DeleteSecretsFn: func(recrecordUids []string) (map[string]string, error) {
  84. return map[string]string{
  85. record0: record0,
  86. }, nil
  87. },
  88. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  89. return []*ksm.Record{generateRecords()[0], generateRecords()[0]}, nil
  90. },
  91. },
  92. folderID: folderID,
  93. },
  94. args: args{
  95. context.Background(),
  96. &v1alpha1.PushSecretRemoteRef{
  97. RemoteKey: validExistingRecord,
  98. },
  99. },
  100. wantErr: true,
  101. },
  102. {
  103. name: "Delete non existing secret",
  104. fields: fields{
  105. ksmClient: &fake.MockKeeperClient{
  106. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  107. return nil, errors.New("failed")
  108. },
  109. },
  110. folderID: folderID,
  111. },
  112. args: args{
  113. context.Background(),
  114. &v1alpha1.PushSecretRemoteRef{
  115. RemoteKey: invalidRecord,
  116. },
  117. },
  118. wantErr: true,
  119. },
  120. }
  121. for _, tt := range tests {
  122. t.Run(tt.name, func(t *testing.T) {
  123. c := &Client{
  124. ksmClient: tt.fields.ksmClient,
  125. folderID: tt.fields.folderID,
  126. }
  127. if err := c.DeleteSecret(tt.args.ctx, tt.args.remoteRef); (err != nil) != tt.wantErr {
  128. t.Errorf("DeleteSecret() error = %v, wantErr %v", err, tt.wantErr)
  129. }
  130. })
  131. }
  132. }
  133. func TestClientGetAllSecrets(t *testing.T) {
  134. type fields struct {
  135. ksmClient SecurityClient
  136. folderID string
  137. }
  138. type args struct {
  139. ctx context.Context
  140. ref esv1.ExternalSecretFind
  141. }
  142. var path = "path_to_fail"
  143. tests := []struct {
  144. name string
  145. fields fields
  146. args args
  147. want map[string][]byte
  148. wantErr bool
  149. }{
  150. {
  151. name: "Tags not Implemented",
  152. fields: fields{
  153. ksmClient: &fake.MockKeeperClient{},
  154. folderID: folderID,
  155. },
  156. args: args{
  157. ctx: context.Background(),
  158. ref: esv1.ExternalSecretFind{
  159. Tags: map[string]string{
  160. "xxx": "yyy",
  161. },
  162. },
  163. },
  164. wantErr: true,
  165. },
  166. {
  167. name: "Path not Implemented",
  168. fields: fields{
  169. ksmClient: &fake.MockKeeperClient{},
  170. folderID: folderID,
  171. },
  172. args: args{
  173. ctx: context.Background(),
  174. ref: esv1.ExternalSecretFind{
  175. Path: &path,
  176. },
  177. },
  178. wantErr: true,
  179. },
  180. {
  181. name: "Get secrets with matching regex",
  182. fields: fields{
  183. ksmClient: &fake.MockKeeperClient{
  184. GetSecretsFn: func(strings []string) ([]*ksm.Record, error) {
  185. return generateRecords(), nil
  186. },
  187. },
  188. folderID: folderID,
  189. },
  190. args: args{
  191. ctx: context.Background(),
  192. ref: esv1.ExternalSecretFind{
  193. Name: &esv1.FindName{
  194. RegExp: "record",
  195. },
  196. },
  197. },
  198. want: map[string][]byte{
  199. record0: []byte(outputRecord0),
  200. record1: []byte(outputRecord1),
  201. record2: []byte(outputRecord2),
  202. },
  203. wantErr: false,
  204. },
  205. {
  206. name: "Get 1 secret with matching regex",
  207. fields: fields{
  208. ksmClient: &fake.MockKeeperClient{
  209. GetSecretsFn: func(strings []string) ([]*ksm.Record, error) {
  210. return generateRecords(), nil
  211. },
  212. },
  213. folderID: folderID,
  214. },
  215. args: args{
  216. ctx: context.Background(),
  217. ref: esv1.ExternalSecretFind{
  218. Name: &esv1.FindName{
  219. RegExp: record0,
  220. },
  221. },
  222. },
  223. want: map[string][]byte{
  224. record0: []byte(outputRecord0),
  225. },
  226. wantErr: false,
  227. },
  228. }
  229. for _, tt := range tests {
  230. t.Run(tt.name, func(t *testing.T) {
  231. c := &Client{
  232. ksmClient: tt.fields.ksmClient,
  233. folderID: tt.fields.folderID,
  234. }
  235. got, err := c.GetAllSecrets(tt.args.ctx, tt.args.ref)
  236. if (err != nil) != tt.wantErr {
  237. t.Errorf("GetAllSecrets() error = %v, wantErr %v", err, tt.wantErr)
  238. return
  239. }
  240. if !reflect.DeepEqual(got, tt.want) {
  241. t.Errorf("GetAllSecrets() got = %v, want %v", got, tt.want)
  242. }
  243. })
  244. }
  245. }
  246. func TestClientGetSecret(t *testing.T) {
  247. type fields struct {
  248. ksmClient SecurityClient
  249. folderID string
  250. }
  251. type args struct {
  252. ctx context.Context
  253. ref esv1.ExternalSecretDataRemoteRef
  254. }
  255. tests := []struct {
  256. name string
  257. fields fields
  258. args args
  259. want []byte
  260. wantErr bool
  261. }{
  262. {
  263. name: "Get Secret with a property",
  264. fields: fields{
  265. ksmClient: &fake.MockKeeperClient{
  266. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  267. return []*ksm.Record{generateRecords()[0]}, nil
  268. },
  269. },
  270. folderID: folderID,
  271. },
  272. args: args{
  273. ctx: context.Background(),
  274. ref: esv1.ExternalSecretDataRemoteRef{
  275. Key: record0,
  276. Property: LoginKey,
  277. },
  278. },
  279. want: []byte("foo"),
  280. wantErr: false,
  281. },
  282. {
  283. name: "Get Secret without property",
  284. fields: fields{
  285. ksmClient: &fake.MockKeeperClient{
  286. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  287. return []*ksm.Record{generateRecords()[0]}, nil
  288. },
  289. },
  290. folderID: folderID,
  291. },
  292. args: args{
  293. ctx: context.Background(),
  294. ref: esv1.ExternalSecretDataRemoteRef{
  295. Key: record0,
  296. },
  297. },
  298. want: []byte(outputRecord0),
  299. wantErr: false,
  300. },
  301. {
  302. name: "Get secret with multiple matches by ID",
  303. fields: fields{
  304. ksmClient: &fake.MockKeeperClient{
  305. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  306. return []*ksm.Record{generateRecords()[0], generateRecords()[0]}, nil
  307. },
  308. },
  309. folderID: folderID,
  310. },
  311. args: args{
  312. ctx: context.Background(),
  313. ref: esv1.ExternalSecretDataRemoteRef{
  314. Key: record0,
  315. },
  316. },
  317. wantErr: true,
  318. },
  319. {
  320. name: "Get non existing secret",
  321. fields: fields{
  322. ksmClient: &fake.MockKeeperClient{
  323. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  324. return nil, errors.New("not found")
  325. },
  326. },
  327. folderID: folderID,
  328. },
  329. args: args{
  330. ctx: context.Background(),
  331. ref: esv1.ExternalSecretDataRemoteRef{
  332. Key: "record5",
  333. },
  334. },
  335. wantErr: true,
  336. },
  337. {
  338. name: "Get valid secret with non existing property",
  339. fields: fields{
  340. ksmClient: &fake.MockKeeperClient{
  341. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  342. return []*ksm.Record{generateRecords()[0]}, nil
  343. },
  344. },
  345. folderID: folderID,
  346. },
  347. args: args{
  348. ctx: context.Background(),
  349. ref: esv1.ExternalSecretDataRemoteRef{
  350. Key: record0,
  351. Property: "invalid",
  352. },
  353. },
  354. wantErr: true,
  355. },
  356. }
  357. for _, tt := range tests {
  358. t.Run(tt.name, func(t *testing.T) {
  359. c := &Client{
  360. ksmClient: tt.fields.ksmClient,
  361. folderID: tt.fields.folderID,
  362. }
  363. got, err := c.GetSecret(tt.args.ctx, tt.args.ref)
  364. if (err != nil) != tt.wantErr {
  365. t.Errorf("GetSecret() error = %v, wantErr %v", err, tt.wantErr)
  366. return
  367. }
  368. if !reflect.DeepEqual(got, tt.want) {
  369. t.Errorf("GetSecret() got = %v, want %v", got, tt.want)
  370. }
  371. })
  372. }
  373. }
  374. func TestClientGetSecretMap(t *testing.T) {
  375. type fields struct {
  376. ksmClient SecurityClient
  377. folderID string
  378. }
  379. type args struct {
  380. ctx context.Context
  381. ref esv1.ExternalSecretDataRemoteRef
  382. }
  383. tests := []struct {
  384. name string
  385. fields fields
  386. args args
  387. want map[string][]byte
  388. wantErr bool
  389. }{
  390. {
  391. name: "Get Secret with valid property",
  392. fields: fields{
  393. ksmClient: &fake.MockKeeperClient{
  394. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  395. return []*ksm.Record{generateRecords()[0]}, nil
  396. },
  397. },
  398. folderID: folderID,
  399. },
  400. args: args{
  401. ctx: context.Background(),
  402. ref: esv1.ExternalSecretDataRemoteRef{
  403. Key: record0,
  404. Property: LoginKey,
  405. },
  406. },
  407. want: map[string][]byte{
  408. LoginKey: []byte("foo"),
  409. },
  410. wantErr: false,
  411. },
  412. {
  413. name: "Get Secret without property",
  414. fields: fields{
  415. ksmClient: &fake.MockKeeperClient{
  416. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  417. return []*ksm.Record{generateRecords()[0]}, nil
  418. },
  419. },
  420. folderID: folderID,
  421. },
  422. args: args{
  423. ctx: context.Background(),
  424. ref: esv1.ExternalSecretDataRemoteRef{
  425. Key: record0,
  426. },
  427. },
  428. want: map[string][]byte{
  429. LoginKey: []byte("foo"),
  430. PasswordKey: []byte("bar"),
  431. fmt.Sprintf(HostKeyFormat, 0): []byte("{\"hostName\":\"mysql\",\"port\":\"3306\"}"),
  432. },
  433. wantErr: false,
  434. },
  435. {
  436. name: "Get non existing secret",
  437. fields: fields{
  438. ksmClient: &fake.MockKeeperClient{
  439. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  440. return nil, errors.New("not found")
  441. },
  442. },
  443. folderID: folderID,
  444. },
  445. args: args{
  446. ctx: context.Background(),
  447. ref: esv1.ExternalSecretDataRemoteRef{
  448. Key: "record5",
  449. },
  450. },
  451. wantErr: true,
  452. },
  453. {
  454. name: "Get Secret with invalid property",
  455. fields: fields{
  456. ksmClient: &fake.MockKeeperClient{
  457. GetSecretsFn: func(filter []string) ([]*ksm.Record, error) {
  458. return []*ksm.Record{generateRecords()[0]}, nil
  459. },
  460. },
  461. folderID: folderID,
  462. },
  463. args: args{
  464. ctx: context.Background(),
  465. ref: esv1.ExternalSecretDataRemoteRef{
  466. Key: record0,
  467. Property: "invalid",
  468. },
  469. },
  470. wantErr: true,
  471. },
  472. }
  473. for _, tt := range tests {
  474. t.Run(tt.name, func(t *testing.T) {
  475. c := &Client{
  476. ksmClient: tt.fields.ksmClient,
  477. folderID: tt.fields.folderID,
  478. }
  479. got, err := c.GetSecretMap(tt.args.ctx, tt.args.ref)
  480. if (err != nil) != tt.wantErr {
  481. t.Errorf("GetSecretMap() error = %v, wantErr %v", err, tt.wantErr)
  482. return
  483. }
  484. if !reflect.DeepEqual(got, tt.want) {
  485. t.Errorf("GetSecretMap() got = %v, want %v", got, tt.want)
  486. }
  487. })
  488. }
  489. }
  490. func TestClientPushSecret(t *testing.T) {
  491. secretKey := "secret-key"
  492. type fields struct {
  493. ksmClient SecurityClient
  494. folderID string
  495. }
  496. type args struct {
  497. value []byte
  498. data testingfake.PushSecretData
  499. }
  500. tests := []struct {
  501. name string
  502. fields fields
  503. args args
  504. wantErr bool
  505. }{
  506. {
  507. name: "Invalid remote ref",
  508. fields: fields{
  509. ksmClient: &fake.MockKeeperClient{},
  510. folderID: folderID,
  511. },
  512. args: args{
  513. data: testingfake.PushSecretData{
  514. SecretKey: secretKey,
  515. RemoteKey: record0,
  516. },
  517. value: []byte("foo"),
  518. },
  519. wantErr: true,
  520. },
  521. {
  522. name: "Push new valid secret",
  523. fields: fields{
  524. ksmClient: &fake.MockKeeperClient{
  525. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  526. return generateRecords()[0:0], nil
  527. },
  528. CreateSecretWithRecordDataFn: func(recUID, folderUid string, recordData *ksm.RecordCreate) (string, error) {
  529. return "record5", nil
  530. },
  531. },
  532. folderID: folderID,
  533. },
  534. args: args{
  535. data: testingfake.PushSecretData{
  536. SecretKey: secretKey,
  537. RemoteKey: invalidRecord,
  538. },
  539. value: []byte("foo"),
  540. },
  541. wantErr: false,
  542. },
  543. {
  544. name: "Push existing valid secret",
  545. fields: fields{
  546. ksmClient: &fake.MockKeeperClient{
  547. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  548. return generateRecords()[0:1], nil
  549. },
  550. SaveFn: func(record *ksm.Record) error {
  551. return nil
  552. },
  553. },
  554. folderID: folderID,
  555. },
  556. args: args{
  557. data: testingfake.PushSecretData{
  558. SecretKey: secretKey,
  559. RemoteKey: validExistingRecord,
  560. },
  561. value: []byte("foo2"),
  562. },
  563. wantErr: false,
  564. },
  565. {
  566. name: "Unable to push new valid secret with multiple matches by Name",
  567. fields: fields{
  568. ksmClient: &fake.MockKeeperClient{
  569. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  570. return []*ksm.Record{generateRecords()[0], generateRecords()[0]}, nil
  571. },
  572. },
  573. folderID: folderID,
  574. },
  575. args: args{
  576. data: testingfake.PushSecretData{
  577. SecretKey: secretKey,
  578. RemoteKey: validExistingRecord,
  579. },
  580. value: []byte("foo"),
  581. },
  582. wantErr: true,
  583. },
  584. {
  585. name: "Unable to push new valid secret",
  586. fields: fields{
  587. ksmClient: &fake.MockKeeperClient{
  588. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  589. return nil, errors.New("NotFound")
  590. },
  591. CreateSecretWithRecordDataFn: func(recUID, folderUID string, recordData *ksm.RecordCreate) (string, error) {
  592. return "", errors.New("Unable to push")
  593. },
  594. },
  595. folderID: folderID,
  596. },
  597. args: args{
  598. data: testingfake.PushSecretData{
  599. SecretKey: secretKey,
  600. RemoteKey: invalidRecord,
  601. },
  602. value: []byte("foo"),
  603. },
  604. wantErr: true,
  605. },
  606. {
  607. name: "Unable to save existing valid secret",
  608. fields: fields{
  609. ksmClient: &fake.MockKeeperClient{
  610. GetSecretByTitleFn: func(recordTitle string) (*ksm.Record, error) {
  611. return generateRecords()[0], nil
  612. },
  613. GetSecretsByTitleFn: func(recordTitle string) (records []*ksm.Record, err error) {
  614. return generateRecords()[0:1], nil
  615. },
  616. SaveFn: func(record *ksm.Record) error {
  617. return errors.New("Unable to save")
  618. },
  619. },
  620. folderID: folderID,
  621. },
  622. args: args{
  623. data: testingfake.PushSecretData{
  624. SecretKey: secretKey,
  625. RemoteKey: validExistingRecord,
  626. },
  627. value: []byte("foo2"),
  628. },
  629. wantErr: true,
  630. },
  631. }
  632. for _, tt := range tests {
  633. t.Run(tt.name, func(t *testing.T) {
  634. c := &Client{
  635. ksmClient: tt.fields.ksmClient,
  636. folderID: tt.fields.folderID,
  637. }
  638. s := &corev1.Secret{Data: map[string][]byte{secretKey: tt.args.value}}
  639. if err := c.PushSecret(context.Background(), s, tt.args.data); (err != nil) != tt.wantErr {
  640. t.Errorf("PushSecret() error = %v, wantErr %v", err, tt.wantErr)
  641. }
  642. })
  643. }
  644. }
  645. func generateRecords() []*ksm.Record {
  646. var records []*ksm.Record
  647. for i := 0; i < 3; i++ {
  648. var record ksm.Record
  649. if i == 0 {
  650. record = ksm.Record{
  651. Uid: fmt.Sprintf(RecordNameFormat, i),
  652. RecordDict: map[string]any{
  653. "type": externalSecretType,
  654. "folderUID": folderID,
  655. },
  656. }
  657. } else {
  658. record = ksm.Record{
  659. Uid: fmt.Sprintf(RecordNameFormat, i),
  660. RecordDict: map[string]any{
  661. "type": LoginType,
  662. "folderUID": folderID,
  663. },
  664. }
  665. }
  666. sec := fmt.Sprintf("{\"title\":\"record%d\",\"type\":\"login\",\"fields\":[{\"type\":\"login\",\"value\":[\"foo\"]},{\"type\":\"password\",\"value\":[\"bar\"]}],\"custom\":[{\"type\":\"host\",\"label\":\"host%d\",\"value\":[{\"hostName\":\"mysql\",\"port\":\"3306\"}]}]}", i, i)
  667. record.SetTitle(fmt.Sprintf(RecordNameFormat, i))
  668. record.SetStandardFieldValue(LoginKey, "foo")
  669. record.SetStandardFieldValue(PasswordKey, "bar")
  670. record.RawJson = sec
  671. records = append(records, &record)
  672. }
  673. return records
  674. }