vault_test.go 40 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "io"
  20. "net/http"
  21. "testing"
  22. "github.com/crossplane/crossplane-runtime/pkg/test"
  23. "github.com/google/go-cmp/cmp"
  24. vault "github.com/hashicorp/vault/api"
  25. corev1 "k8s.io/api/core/v1"
  26. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  27. "k8s.io/utils/pointer"
  28. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  29. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  30. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  31. "github.com/external-secrets/external-secrets/pkg/provider/vault/fake"
  32. )
  33. const (
  34. tokenSecretName = "example-secret-token"
  35. secretDataString = "some-creds"
  36. )
  37. var (
  38. secretStorePath = "secret"
  39. )
  40. func makeValidSecretStoreWithVersion(v esv1beta1.VaultKVStoreVersion) *esv1beta1.SecretStore {
  41. return &esv1beta1.SecretStore{
  42. ObjectMeta: metav1.ObjectMeta{
  43. Name: "vault-store",
  44. Namespace: "default",
  45. },
  46. Spec: esv1beta1.SecretStoreSpec{
  47. Provider: &esv1beta1.SecretStoreProvider{
  48. Vault: &esv1beta1.VaultProvider{
  49. Server: "vault.example.com",
  50. Path: &secretStorePath,
  51. Version: v,
  52. Auth: esv1beta1.VaultAuth{
  53. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  54. Path: "kubernetes",
  55. Role: "kubernetes-auth-role",
  56. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  57. Name: "example-sa",
  58. },
  59. },
  60. },
  61. },
  62. },
  63. },
  64. }
  65. }
  66. func makeValidSecretStore() *esv1beta1.SecretStore {
  67. return makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2)
  68. }
  69. func makeValidSecretStoreWithCerts() *esv1beta1.SecretStore {
  70. return &esv1beta1.SecretStore{
  71. ObjectMeta: metav1.ObjectMeta{
  72. Name: "vault-store",
  73. Namespace: "default",
  74. },
  75. Spec: esv1beta1.SecretStoreSpec{
  76. Provider: &esv1beta1.SecretStoreProvider{
  77. Vault: &esv1beta1.VaultProvider{
  78. Server: "vault.example.com",
  79. Path: &secretStorePath,
  80. Version: esv1beta1.VaultKVStoreV2,
  81. Auth: esv1beta1.VaultAuth{
  82. Cert: &esv1beta1.VaultCertAuth{
  83. ClientCert: esmeta.SecretKeySelector{
  84. Name: "tls-auth-certs",
  85. Key: "tls.crt",
  86. },
  87. SecretRef: esmeta.SecretKeySelector{
  88. Name: "tls-auth-certs",
  89. Key: "tls.key",
  90. },
  91. },
  92. },
  93. },
  94. },
  95. },
  96. }
  97. }
  98. func makeValidSecretStoreWithK8sCerts(isSecret bool) *esv1beta1.SecretStore {
  99. store := makeSecretStore()
  100. caProvider := &esv1beta1.CAProvider{
  101. Name: "vault-cert",
  102. Key: "cert",
  103. }
  104. if isSecret {
  105. caProvider.Type = "Secret"
  106. } else {
  107. caProvider.Type = "ConfigMap"
  108. }
  109. store.Spec.Provider.Vault.CAProvider = caProvider
  110. return store
  111. }
  112. func makeInvalidClusterSecretStoreWithK8sCerts() *esv1beta1.ClusterSecretStore {
  113. return &esv1beta1.ClusterSecretStore{
  114. TypeMeta: metav1.TypeMeta{
  115. Kind: "ClusterSecretStore",
  116. },
  117. ObjectMeta: metav1.ObjectMeta{
  118. Name: "vault-store",
  119. Namespace: "default",
  120. },
  121. Spec: esv1beta1.SecretStoreSpec{
  122. Provider: &esv1beta1.SecretStoreProvider{
  123. Vault: &esv1beta1.VaultProvider{
  124. Server: "vault.example.com",
  125. Path: &secretStorePath,
  126. Version: "v2",
  127. Auth: esv1beta1.VaultAuth{
  128. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  129. Path: "kubernetes",
  130. Role: "kubernetes-auth-role",
  131. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  132. Name: "example-sa",
  133. },
  134. },
  135. },
  136. CAProvider: &esv1beta1.CAProvider{
  137. Name: "vault-cert",
  138. Key: "cert",
  139. Type: "Secret",
  140. },
  141. },
  142. },
  143. },
  144. }
  145. }
  146. type secretStoreTweakFn func(s *esv1beta1.SecretStore)
  147. func makeSecretStore(tweaks ...secretStoreTweakFn) *esv1beta1.SecretStore {
  148. store := makeValidSecretStore()
  149. for _, fn := range tweaks {
  150. fn(store)
  151. }
  152. return store
  153. }
  154. func newVaultResponse(data *vault.Secret) *vault.Response {
  155. jsonData, _ := json.Marshal(data)
  156. return &vault.Response{
  157. Response: &http.Response{
  158. Body: io.NopCloser(bytes.NewReader(jsonData)),
  159. },
  160. }
  161. }
  162. func newVaultResponseWithData(data map[string]interface{}) *vault.Response {
  163. return newVaultResponse(&vault.Secret{
  164. Data: data,
  165. })
  166. }
  167. func newVaultResponseWithMetadata(content map[string]interface{}) map[string]fake.VaultListResponse {
  168. ans := make(map[string]fake.VaultListResponse)
  169. for k, v := range content {
  170. t := v.(map[string]interface{})
  171. m := t["metadata"].(map[string]interface{})
  172. listResponse := fake.VaultListResponse{
  173. Data: newVaultResponse(&vault.Secret{
  174. Data: t,
  175. }),
  176. Metadata: newVaultResponse(&vault.Secret{
  177. Data: m,
  178. }),
  179. }
  180. ans[k] = listResponse
  181. }
  182. return ans
  183. }
  184. func newVaultTokenIDResponse(token string) *vault.Response {
  185. return newVaultResponseWithData(map[string]interface{}{
  186. "id": token,
  187. })
  188. }
  189. type args struct {
  190. newClientFunc func(c *vault.Config) (Client, error)
  191. store esv1beta1.GenericStore
  192. kube kclient.Client
  193. ns string
  194. }
  195. type want struct {
  196. err error
  197. }
  198. type testCase struct {
  199. reason string
  200. args args
  201. want want
  202. }
  203. func clientWithLoginMock(c *vault.Config) (Client, error) {
  204. return &fake.VaultClient{
  205. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  206. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  207. newVaultTokenIDResponse("test-token"), nil, func(got *vault.Request) error { return nil }),
  208. MockSetToken: fake.NewSetTokenFn(),
  209. }, nil
  210. }
  211. func kubeMockWithSecretTokenAndServiceAcc(obj kclient.Object) error {
  212. if o, ok := obj.(*corev1.ServiceAccount); ok {
  213. o.Secrets = []corev1.ObjectReference{
  214. {
  215. Name: tokenSecretName,
  216. },
  217. }
  218. return nil
  219. }
  220. if o, ok := obj.(*corev1.Secret); ok {
  221. o.Data = map[string][]byte{
  222. "token": []byte(secretDataString),
  223. }
  224. return nil
  225. }
  226. return nil
  227. }
  228. func TestNewVault(t *testing.T) {
  229. errBoom := errors.New("boom")
  230. secretClientKey := []byte(`-----BEGIN RSA PRIVATE KEY-----
  231. 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
  232. -----END RSA PRIVATE KEY-----`)
  233. clientCrt := []byte(`-----BEGIN CERTIFICATE-----
  234. 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
  235. -----END CERTIFICATE-----
  236. `)
  237. secretData := []byte(secretDataString)
  238. cases := map[string]testCase{
  239. "InvalidVaultStore": {
  240. reason: "Should return error if given an invalid vault store.",
  241. args: args{
  242. store: &esv1beta1.SecretStore{},
  243. },
  244. want: want{
  245. err: errors.New(errVaultStore),
  246. },
  247. },
  248. "AddVaultStoreCertsError": {
  249. reason: "Should return error if given an invalid CA certificate.",
  250. args: args{
  251. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  252. s.Spec.Provider.Vault.CABundle = []byte("badcertdata")
  253. }),
  254. },
  255. want: want{
  256. err: errors.New(errVaultCert),
  257. },
  258. },
  259. "VaultAuthFormatError": {
  260. reason: "Should return error if no valid authentication method is given.",
  261. args: args{
  262. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  263. s.Spec.Provider.Vault.Auth = esv1beta1.VaultAuth{}
  264. }),
  265. },
  266. want: want{
  267. err: errors.New(errAuthFormat),
  268. },
  269. },
  270. "GetKubeServiceAccountError": {
  271. reason: "Should return error if fetching kubernetes secret fails.",
  272. args: args{
  273. store: makeSecretStore(),
  274. kube: &test.MockClient{
  275. MockGet: test.NewMockGetFn(errBoom),
  276. },
  277. },
  278. want: want{
  279. err: fmt.Errorf(errGetKubeSA, "example-sa", errBoom),
  280. },
  281. },
  282. "GetKubeSecretError": {
  283. reason: "Should return error if fetching kubernetes secret fails.",
  284. args: args{
  285. store: makeSecretStore(func(s *esv1beta1.SecretStore) {
  286. s.Spec.Provider.Vault.Auth.Kubernetes.ServiceAccountRef = nil
  287. s.Spec.Provider.Vault.Auth.Kubernetes.SecretRef = &esmeta.SecretKeySelector{
  288. Name: "vault-secret",
  289. Key: "key",
  290. }
  291. }),
  292. kube: &test.MockClient{
  293. MockGet: test.NewMockGetFn(errBoom),
  294. },
  295. },
  296. want: want{
  297. err: fmt.Errorf(errGetKubeSecret, "vault-secret", errBoom),
  298. },
  299. },
  300. "SuccessfulVaultStore": {
  301. reason: "Should return a Vault provider successfully",
  302. args: args{
  303. store: makeSecretStore(),
  304. kube: &test.MockClient{
  305. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  306. },
  307. newClientFunc: func(c *vault.Config) (Client, error) {
  308. return &fake.VaultClient{
  309. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  310. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  311. newVaultTokenIDResponse("test-token"), nil, func(got *vault.Request) error {
  312. kubeRole := makeValidSecretStore().Spec.Provider.Vault.Auth.Kubernetes.Role
  313. want := kubeParameters(kubeRole, string(secretData))
  314. if diff := cmp.Diff(want, got.Obj); diff != "" {
  315. t.Errorf("RawRequestWithContext(...): -want, +got:\n%s", diff)
  316. }
  317. return nil
  318. }),
  319. MockSetToken: fake.NewSetTokenFn(),
  320. MockToken: fake.NewTokenFn(""),
  321. MockClearToken: fake.NewClearTokenFn(),
  322. }, nil
  323. },
  324. },
  325. want: want{
  326. err: nil,
  327. },
  328. },
  329. "SuccessfulVaultStoreWithCertAuth": {
  330. reason: "Should return a Vault provider successfully",
  331. args: args{
  332. store: makeValidSecretStoreWithCerts(),
  333. kube: &test.MockClient{
  334. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  335. if o, ok := obj.(*corev1.Secret); ok {
  336. o.Data = map[string][]byte{
  337. "tls.key": secretClientKey,
  338. "tls.crt": clientCrt,
  339. }
  340. return nil
  341. }
  342. return nil
  343. }),
  344. },
  345. newClientFunc: clientWithLoginMock,
  346. },
  347. want: want{
  348. err: nil,
  349. },
  350. },
  351. "SuccessfulVaultStoreWithK8sCertSecret": {
  352. reason: "Should return a Vault prodvider with the cert from k8s",
  353. args: args{
  354. store: makeValidSecretStoreWithK8sCerts(true),
  355. kube: &test.MockClient{
  356. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  357. if o, ok := obj.(*corev1.Secret); ok {
  358. o.Data = map[string][]byte{
  359. "cert": clientCrt,
  360. "token": secretData,
  361. }
  362. return nil
  363. }
  364. if o, ok := obj.(*corev1.ServiceAccount); ok {
  365. o.Secrets = []corev1.ObjectReference{
  366. {
  367. Name: tokenSecretName,
  368. },
  369. }
  370. return nil
  371. }
  372. return nil
  373. }),
  374. },
  375. newClientFunc: clientWithLoginMock,
  376. },
  377. want: want{
  378. err: nil,
  379. },
  380. },
  381. "GetCertNamespaceMissingError": {
  382. reason: "Should return an error if namespace is missing and is a ClusterSecretStore",
  383. args: args{
  384. store: makeInvalidClusterSecretStoreWithK8sCerts(),
  385. kube: &test.MockClient{
  386. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  387. },
  388. },
  389. want: want{
  390. err: errors.New(errCANamespace),
  391. },
  392. },
  393. "GetCertSecretKeyMissingError": {
  394. reason: "Should return an error if the secret key is missing",
  395. args: args{
  396. store: makeValidSecretStoreWithK8sCerts(true),
  397. kube: &test.MockClient{
  398. MockGet: test.NewMockGetFn(nil, kubeMockWithSecretTokenAndServiceAcc),
  399. },
  400. newClientFunc: clientWithLoginMock,
  401. },
  402. want: want{
  403. err: fmt.Errorf(errVaultCert, errors.New(`cannot find secret data for key: "cert"`)),
  404. },
  405. },
  406. "SuccessfulVaultStoreWithK8sCertConfigMap": {
  407. reason: "Should return a Vault prodvider with the cert from k8s",
  408. args: args{
  409. store: makeValidSecretStoreWithK8sCerts(false),
  410. kube: &test.MockClient{
  411. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  412. if o, ok := obj.(*corev1.ConfigMap); ok {
  413. o.Data = map[string]string{
  414. "cert": string(clientCrt),
  415. }
  416. return nil
  417. }
  418. if o, ok := obj.(*corev1.ServiceAccount); ok {
  419. o.Secrets = []corev1.ObjectReference{
  420. {
  421. Name: tokenSecretName,
  422. },
  423. }
  424. return nil
  425. }
  426. if o, ok := obj.(*corev1.Secret); ok {
  427. o.Data = map[string][]byte{
  428. "token": secretData,
  429. }
  430. return nil
  431. }
  432. return nil
  433. }),
  434. },
  435. newClientFunc: clientWithLoginMock,
  436. },
  437. want: want{
  438. err: nil,
  439. },
  440. },
  441. "GetCertConfigMapMissingError": {
  442. reason: "Should return an error if the config map key is missing",
  443. args: args{
  444. store: makeValidSecretStoreWithK8sCerts(false),
  445. kube: &test.MockClient{
  446. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  447. if o, ok := obj.(*corev1.ServiceAccount); ok {
  448. o.Secrets = []corev1.ObjectReference{
  449. {
  450. Name: tokenSecretName,
  451. },
  452. }
  453. return nil
  454. }
  455. if o, ok := obj.(*corev1.Secret); ok {
  456. o.Data = map[string][]byte{
  457. "token": secretData,
  458. }
  459. return nil
  460. }
  461. return nil
  462. }),
  463. },
  464. newClientFunc: clientWithLoginMock,
  465. },
  466. want: want{
  467. err: fmt.Errorf(errConfigMapFmt, "cert"),
  468. },
  469. },
  470. "GetCertificateFormatError": {
  471. reason: "Should return error if client certificate is in wrong format.",
  472. args: args{
  473. store: makeValidSecretStoreWithCerts(),
  474. kube: &test.MockClient{
  475. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  476. if o, ok := obj.(*corev1.Secret); ok {
  477. o.Data = map[string][]byte{
  478. "tls.key": secretClientKey,
  479. "tls.crt": []byte("cert with mistak"),
  480. }
  481. return nil
  482. }
  483. return nil
  484. }),
  485. },
  486. newClientFunc: clientWithLoginMock,
  487. },
  488. want: want{
  489. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in certificate input"),
  490. },
  491. },
  492. "GetKeyFormatError": {
  493. reason: "Should return error if client key is in wrong format.",
  494. args: args{
  495. store: makeValidSecretStoreWithCerts(),
  496. kube: &test.MockClient{
  497. MockGet: test.NewMockGetFn(nil, func(obj kclient.Object) error {
  498. if o, ok := obj.(*corev1.Secret); ok {
  499. o.Data = map[string][]byte{
  500. "tls.key": []byte("key with mistake"),
  501. "tls.crt": clientCrt,
  502. }
  503. return nil
  504. }
  505. return nil
  506. }),
  507. },
  508. newClientFunc: clientWithLoginMock,
  509. },
  510. want: want{
  511. err: fmt.Errorf(errClientTLSAuth, "tls: failed to find any PEM data in key input"),
  512. },
  513. },
  514. }
  515. for name, tc := range cases {
  516. t.Run(name, func(t *testing.T) {
  517. vaultTest(t, name, tc)
  518. })
  519. }
  520. }
  521. func vaultTest(t *testing.T, name string, tc testCase) {
  522. conn := &connector{
  523. newVaultClient: tc.args.newClientFunc,
  524. }
  525. if tc.args.newClientFunc == nil {
  526. conn.newVaultClient = newVaultClient
  527. }
  528. _, err := conn.NewClient(context.Background(), tc.args.store, tc.args.kube, tc.args.ns)
  529. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  530. t.Errorf("\n%s\nvault.New(...): -want error, +got error:\n%s", tc.reason, diff)
  531. }
  532. }
  533. func TestGetSecret(t *testing.T) {
  534. errBoom := errors.New("boom")
  535. secret := map[string]interface{}{
  536. "access_key": "access_key",
  537. "access_secret": "access_secret",
  538. }
  539. secretWithNilVal := map[string]interface{}{
  540. "access_key": "access_key",
  541. "access_secret": "access_secret",
  542. "token": nil,
  543. }
  544. secretWithNestedVal := map[string]interface{}{
  545. "access_key": "access_key",
  546. "access_secret": "access_secret",
  547. "nested.bar": "something different",
  548. "nested": map[string]string{
  549. "foo": "oke",
  550. "bar": "also ok?",
  551. },
  552. }
  553. type args struct {
  554. store *esv1beta1.VaultProvider
  555. kube kclient.Client
  556. vClient Client
  557. ns string
  558. data esv1beta1.ExternalSecretDataRemoteRef
  559. }
  560. type want struct {
  561. err error
  562. val []byte
  563. }
  564. cases := map[string]struct {
  565. reason string
  566. args args
  567. want want
  568. }{
  569. "ReadSecret": {
  570. reason: "Should return the secret with property",
  571. args: args{
  572. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  573. data: esv1beta1.ExternalSecretDataRemoteRef{
  574. Property: "access_key",
  575. },
  576. vClient: &fake.VaultClient{
  577. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  578. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  579. newVaultResponseWithData(secret), nil,
  580. ),
  581. },
  582. },
  583. want: want{
  584. err: nil,
  585. val: []byte("access_key"),
  586. },
  587. },
  588. "ReadSecretWithNil": {
  589. reason: "Should return the secret with property if it has a nil val",
  590. args: args{
  591. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  592. data: esv1beta1.ExternalSecretDataRemoteRef{
  593. Property: "access_key",
  594. },
  595. vClient: &fake.VaultClient{
  596. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  597. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  598. newVaultResponseWithData(secretWithNilVal), nil,
  599. ),
  600. },
  601. },
  602. want: want{
  603. err: nil,
  604. val: []byte("access_key"),
  605. },
  606. },
  607. "ReadSecretWithoutProperty": {
  608. reason: "Should return the json encoded secret without property",
  609. args: args{
  610. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  611. data: esv1beta1.ExternalSecretDataRemoteRef{},
  612. vClient: &fake.VaultClient{
  613. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  614. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  615. newVaultResponseWithData(secret), nil,
  616. ),
  617. },
  618. },
  619. want: want{
  620. err: nil,
  621. val: []byte(`{"access_key":"access_key","access_secret":"access_secret"}`),
  622. },
  623. },
  624. "ReadSecretWithNestedValue": {
  625. reason: "Should return a nested property",
  626. args: args{
  627. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  628. data: esv1beta1.ExternalSecretDataRemoteRef{
  629. Property: "nested.foo",
  630. },
  631. vClient: &fake.VaultClient{
  632. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  633. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  634. newVaultResponseWithData(secretWithNestedVal), nil,
  635. ),
  636. },
  637. },
  638. want: want{
  639. err: nil,
  640. val: []byte("oke"),
  641. },
  642. },
  643. "ReadSecretWithNestedValueFromData": {
  644. reason: "Should return a nested property",
  645. args: args{
  646. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  647. data: esv1beta1.ExternalSecretDataRemoteRef{
  648. //
  649. Property: "nested.bar",
  650. },
  651. vClient: &fake.VaultClient{
  652. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  653. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  654. newVaultResponseWithData(secretWithNestedVal), nil,
  655. ),
  656. },
  657. },
  658. want: want{
  659. err: nil,
  660. val: []byte("something different"),
  661. },
  662. },
  663. "NonexistentProperty": {
  664. reason: "Should return error property does not exist.",
  665. args: args{
  666. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  667. data: esv1beta1.ExternalSecretDataRemoteRef{
  668. Property: "nop.doesnt.exist",
  669. },
  670. vClient: &fake.VaultClient{
  671. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  672. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  673. newVaultResponseWithData(secretWithNestedVal), nil,
  674. ),
  675. },
  676. },
  677. want: want{
  678. err: fmt.Errorf(errSecretKeyFmt, "nop.doesnt.exist"),
  679. },
  680. },
  681. "ReadSecretError": {
  682. reason: "Should return error if vault client fails to read secret.",
  683. args: args{
  684. store: makeSecretStore().Spec.Provider.Vault,
  685. vClient: &fake.VaultClient{
  686. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  687. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(nil, errBoom),
  688. },
  689. },
  690. want: want{
  691. err: fmt.Errorf(errReadSecret, errBoom),
  692. },
  693. },
  694. }
  695. for name, tc := range cases {
  696. t.Run(name, func(t *testing.T) {
  697. vStore := &client{
  698. kube: tc.args.kube,
  699. client: tc.args.vClient,
  700. store: tc.args.store,
  701. namespace: tc.args.ns,
  702. }
  703. val, err := vStore.GetSecret(context.Background(), tc.args.data)
  704. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  705. t.Errorf("\n%s\nvault.GetSecret(...): -want error, +got error:\n%s", tc.reason, diff)
  706. }
  707. if diff := cmp.Diff(string(tc.want.val), string(val)); diff != "" {
  708. t.Errorf("\n%s\nvault.GetSecret(...): -want val, +got val:\n%s", tc.reason, diff)
  709. }
  710. })
  711. }
  712. }
  713. func TestGetSecretMap(t *testing.T) {
  714. errBoom := errors.New("boom")
  715. secret := map[string]interface{}{
  716. "access_key": "access_key",
  717. "access_secret": "access_secret",
  718. }
  719. secretWithNilVal := map[string]interface{}{
  720. "access_key": "access_key",
  721. "access_secret": "access_secret",
  722. "token": nil,
  723. }
  724. secretWithNestedVal := map[string]interface{}{
  725. "access_key": "access_key",
  726. "access_secret": "access_secret",
  727. "nested": map[string]interface{}{
  728. "foo": map[string]string{
  729. "oke": "yup",
  730. "mhkeih": "yada yada",
  731. },
  732. },
  733. }
  734. secretWithTypes := map[string]interface{}{
  735. "access_secret": "access_secret",
  736. "f32": float32(2.12),
  737. "f64": float64(2.1234534153423423),
  738. "int": 42,
  739. "bool": true,
  740. "bt": []byte("foobar"),
  741. }
  742. type args struct {
  743. store *esv1beta1.VaultProvider
  744. kube kclient.Client
  745. vClient Client
  746. ns string
  747. data esv1beta1.ExternalSecretDataRemoteRef
  748. }
  749. type want struct {
  750. err error
  751. val map[string][]byte
  752. }
  753. cases := map[string]struct {
  754. reason string
  755. args args
  756. want want
  757. }{
  758. "ReadSecretKV1": {
  759. reason: "Should map the secret even if it has a nil value",
  760. args: args{
  761. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  762. vClient: &fake.VaultClient{
  763. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  764. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  765. newVaultResponseWithData(secret), nil,
  766. ),
  767. },
  768. },
  769. want: want{
  770. err: nil,
  771. val: map[string][]byte{
  772. "access_key": []byte("access_key"),
  773. "access_secret": []byte("access_secret"),
  774. },
  775. },
  776. },
  777. "ReadSecretKV2": {
  778. reason: "Should map the secret even if it has a nil value",
  779. args: args{
  780. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  781. vClient: &fake.VaultClient{
  782. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  783. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  784. newVaultResponseWithData(
  785. map[string]interface{}{
  786. "data": secret,
  787. },
  788. ), nil,
  789. ),
  790. },
  791. },
  792. want: want{
  793. err: nil,
  794. val: map[string][]byte{
  795. "access_key": []byte("access_key"),
  796. "access_secret": []byte("access_secret"),
  797. },
  798. },
  799. },
  800. "ReadSecretWithNilValueKV1": {
  801. reason: "Should map the secret even if it has a nil value",
  802. args: args{
  803. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  804. vClient: &fake.VaultClient{
  805. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  806. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  807. newVaultResponseWithData(secretWithNilVal), nil,
  808. ),
  809. },
  810. },
  811. want: want{
  812. err: nil,
  813. val: map[string][]byte{
  814. "access_key": []byte("access_key"),
  815. "access_secret": []byte("access_secret"),
  816. "token": []byte(nil),
  817. },
  818. },
  819. },
  820. "ReadSecretWithNilValueKV2": {
  821. reason: "Should map the secret even if it has a nil value",
  822. args: args{
  823. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  824. vClient: &fake.VaultClient{
  825. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  826. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  827. newVaultResponseWithData(
  828. map[string]interface{}{
  829. "data": secretWithNilVal,
  830. },
  831. ), nil,
  832. ),
  833. },
  834. },
  835. want: want{
  836. err: nil,
  837. val: map[string][]byte{
  838. "access_key": []byte("access_key"),
  839. "access_secret": []byte("access_secret"),
  840. "token": []byte(nil),
  841. },
  842. },
  843. },
  844. "ReadSecretWithTypesKV2": {
  845. reason: "Should map the secret even if it has other types",
  846. args: args{
  847. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  848. vClient: &fake.VaultClient{
  849. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  850. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  851. newVaultResponseWithData(
  852. map[string]interface{}{
  853. "data": secretWithTypes,
  854. },
  855. ), nil,
  856. ),
  857. },
  858. },
  859. want: want{
  860. err: nil,
  861. val: map[string][]byte{
  862. "access_secret": []byte("access_secret"),
  863. "f32": []byte("2.12"),
  864. "f64": []byte("2.1234534153423423"),
  865. "int": []byte("42"),
  866. "bool": []byte("true"),
  867. "bt": []byte("Zm9vYmFy"), // base64
  868. },
  869. },
  870. },
  871. "ReadNestedSecret": {
  872. reason: "Should map the secret for deeply nested property",
  873. args: args{
  874. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  875. data: esv1beta1.ExternalSecretDataRemoteRef{
  876. Property: "nested",
  877. },
  878. vClient: &fake.VaultClient{
  879. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  880. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  881. newVaultResponseWithData(
  882. map[string]interface{}{
  883. "data": secretWithNestedVal,
  884. },
  885. ), nil,
  886. ),
  887. },
  888. },
  889. want: want{
  890. err: nil,
  891. val: map[string][]byte{
  892. "foo": []byte(`{"mhkeih":"yada yada","oke":"yup"}`),
  893. },
  894. },
  895. },
  896. "ReadDeeplyNestedSecret": {
  897. reason: "Should map the secret for deeply nested property",
  898. args: args{
  899. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  900. data: esv1beta1.ExternalSecretDataRemoteRef{
  901. Property: "nested.foo",
  902. },
  903. vClient: &fake.VaultClient{
  904. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  905. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(
  906. newVaultResponseWithData(
  907. map[string]interface{}{
  908. "data": secretWithNestedVal,
  909. },
  910. ), nil,
  911. ),
  912. },
  913. },
  914. want: want{
  915. err: nil,
  916. val: map[string][]byte{
  917. "oke": []byte("yup"),
  918. "mhkeih": []byte("yada yada"),
  919. },
  920. },
  921. },
  922. "ReadSecretError": {
  923. reason: "Should return error if vault client fails to read secret.",
  924. args: args{
  925. store: makeSecretStore().Spec.Provider.Vault,
  926. vClient: &fake.VaultClient{
  927. MockNewRequest: fake.NewMockNewRequestFn(&vault.Request{}),
  928. MockRawRequestWithContext: fake.NewMockRawRequestWithContextFn(nil, errBoom),
  929. },
  930. },
  931. want: want{
  932. err: fmt.Errorf(errReadSecret, errBoom),
  933. },
  934. },
  935. }
  936. for name, tc := range cases {
  937. t.Run(name, func(t *testing.T) {
  938. vStore := &client{
  939. kube: tc.args.kube,
  940. client: tc.args.vClient,
  941. store: tc.args.store,
  942. namespace: tc.args.ns,
  943. }
  944. val, err := vStore.GetSecretMap(context.Background(), tc.args.data)
  945. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  946. t.Errorf("\n%s\nvault.GetSecretMap(...): -want error, +got error:\n%s", tc.reason, diff)
  947. }
  948. if diff := cmp.Diff(tc.want.val, val); diff != "" {
  949. t.Errorf("\n%s\nvault.GetSecretMap(...): -want val, +got val:\n%s", tc.reason, diff)
  950. }
  951. })
  952. }
  953. }
  954. func TestGetAllSecrets(t *testing.T) {
  955. secret1Bytes := []byte("{\"access_key\":\"access_key\",\"access_secret\":\"access_secret\"}")
  956. secret2Bytes := []byte("{\"access_key\":\"access_key2\",\"access_secret\":\"access_secret2\"}")
  957. path1Bytes := []byte("{\"access_key\":\"path1\",\"access_secret\":\"path1\"}")
  958. path2Bytes := []byte("{\"access_key\":\"path2\",\"access_secret\":\"path2\"}")
  959. tagBytes := []byte("{\"access_key\":\"unfetched\",\"access_secret\":\"unfetched\"}")
  960. path := "path"
  961. secret := map[string]interface{}{
  962. "secret1": map[string]interface{}{
  963. "data": map[string]interface{}{
  964. "access_key": "access_key",
  965. "access_secret": "access_secret",
  966. },
  967. "metadata": map[string]interface{}{
  968. "custom_metadata": map[string]interface{}{
  969. "foo": "bar",
  970. },
  971. },
  972. },
  973. "secret2": map[string]interface{}{
  974. "data": map[string]interface{}{
  975. "access_key": "access_key2",
  976. "access_secret": "access_secret2",
  977. },
  978. "metadata": map[string]interface{}{
  979. "custom_metadata": map[string]interface{}{
  980. "foo": "baz",
  981. },
  982. },
  983. },
  984. "tag": map[string]interface{}{
  985. "data": map[string]interface{}{
  986. "access_key": "unfetched",
  987. "access_secret": "unfetched",
  988. },
  989. "metadata": map[string]interface{}{
  990. "custom_metadata": map[string]interface{}{
  991. "foo": "baz",
  992. },
  993. },
  994. },
  995. "path/1": map[string]interface{}{
  996. "data": map[string]interface{}{
  997. "access_key": "path1",
  998. "access_secret": "path1",
  999. },
  1000. "metadata": map[string]interface{}{
  1001. "custom_metadata": map[string]interface{}{
  1002. "foo": "path",
  1003. },
  1004. },
  1005. },
  1006. "path/2": map[string]interface{}{
  1007. "data": map[string]interface{}{
  1008. "access_key": "path2",
  1009. "access_secret": "path2",
  1010. },
  1011. "metadata": map[string]interface{}{
  1012. "custom_metadata": map[string]interface{}{
  1013. "foo": "path",
  1014. },
  1015. },
  1016. },
  1017. "default": map[string]interface{}{
  1018. "data": map[string]interface{}{
  1019. "empty": "true",
  1020. },
  1021. "metadata": map[string]interface{}{
  1022. "keys": []string{"secret1", "secret2", "tag", "path/"},
  1023. },
  1024. },
  1025. "path/": map[string]interface{}{
  1026. "data": map[string]interface{}{
  1027. "empty": "true",
  1028. },
  1029. "metadata": map[string]interface{}{
  1030. "keys": []string{"1", "2"},
  1031. },
  1032. },
  1033. }
  1034. type args struct {
  1035. store *esv1beta1.VaultProvider
  1036. kube kclient.Client
  1037. vClient Client
  1038. ns string
  1039. data esv1beta1.ExternalSecretFind
  1040. }
  1041. type want struct {
  1042. err error
  1043. val map[string][]byte
  1044. }
  1045. cases := map[string]struct {
  1046. reason string
  1047. args args
  1048. want want
  1049. }{
  1050. "FindByName": {
  1051. reason: "should map multiple secrets matching name",
  1052. args: args{
  1053. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  1054. vClient: &fake.VaultClient{
  1055. MockNewRequest: fake.NewMockNewRequestListFn(&vault.Request{}),
  1056. MockRawRequestWithContext: fake.NewMockRawRequestListWithContextFn(
  1057. newVaultResponseWithMetadata(secret), nil,
  1058. ),
  1059. },
  1060. data: esv1beta1.ExternalSecretFind{
  1061. Name: &esv1beta1.FindName{
  1062. RegExp: "secret.*",
  1063. },
  1064. },
  1065. },
  1066. want: want{
  1067. err: nil,
  1068. val: map[string][]byte{
  1069. "secret1": secret1Bytes,
  1070. "secret2": secret2Bytes,
  1071. },
  1072. },
  1073. },
  1074. "FindByTag": {
  1075. reason: "should map multiple secrets matching tags",
  1076. args: args{
  1077. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  1078. vClient: &fake.VaultClient{
  1079. MockNewRequest: fake.NewMockNewRequestListFn(&vault.Request{}),
  1080. MockRawRequestWithContext: fake.NewMockRawRequestListWithContextFn(
  1081. newVaultResponseWithMetadata(secret), nil,
  1082. ),
  1083. },
  1084. data: esv1beta1.ExternalSecretFind{
  1085. Tags: map[string]string{
  1086. "foo": "baz",
  1087. },
  1088. },
  1089. },
  1090. want: want{
  1091. err: nil,
  1092. val: map[string][]byte{
  1093. "tag": tagBytes,
  1094. "secret2": secret2Bytes,
  1095. },
  1096. },
  1097. },
  1098. "FilterByPath": {
  1099. reason: "should filter secrets based on path",
  1100. args: args{
  1101. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV2).Spec.Provider.Vault,
  1102. vClient: &fake.VaultClient{
  1103. MockNewRequest: fake.NewMockNewRequestListFn(&vault.Request{}),
  1104. MockRawRequestWithContext: fake.NewMockRawRequestListWithContextFn(
  1105. newVaultResponseWithMetadata(secret), nil,
  1106. ),
  1107. },
  1108. data: esv1beta1.ExternalSecretFind{
  1109. Path: &path,
  1110. Tags: map[string]string{
  1111. "foo": "path",
  1112. },
  1113. },
  1114. },
  1115. want: want{
  1116. err: nil,
  1117. val: map[string][]byte{
  1118. "1": path1Bytes,
  1119. "2": path2Bytes,
  1120. },
  1121. },
  1122. },
  1123. "FailIfKv1": {
  1124. reason: "should not work if using kv1 store",
  1125. args: args{
  1126. store: makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1).Spec.Provider.Vault,
  1127. vClient: &fake.VaultClient{
  1128. MockNewRequest: fake.NewMockNewRequestListFn(&vault.Request{}),
  1129. MockRawRequestWithContext: fake.NewMockRawRequestListWithContextFn(
  1130. newVaultResponseWithMetadata(secret), nil,
  1131. ),
  1132. },
  1133. data: esv1beta1.ExternalSecretFind{
  1134. Tags: map[string]string{
  1135. "foo": "baz",
  1136. },
  1137. },
  1138. },
  1139. want: want{
  1140. err: errors.New(errUnsupportedKvVersion),
  1141. },
  1142. },
  1143. }
  1144. for name, tc := range cases {
  1145. t.Run(name, func(t *testing.T) {
  1146. vStore := &client{
  1147. kube: tc.args.kube,
  1148. client: tc.args.vClient,
  1149. store: tc.args.store,
  1150. namespace: tc.args.ns,
  1151. }
  1152. val, err := vStore.GetAllSecrets(context.Background(), tc.args.data)
  1153. if diff := cmp.Diff(tc.want.err, err, test.EquateErrors()); diff != "" {
  1154. t.Errorf("\n%s\nvault.GetSecretMap(...): -want error, +got error:\n%s", tc.reason, diff)
  1155. }
  1156. if diff := cmp.Diff(tc.want.val, val); diff != "" {
  1157. t.Errorf("\n%s\nvault.GetSecretMap(...): -want val, +got val:\n%s", tc.reason, diff)
  1158. }
  1159. })
  1160. }
  1161. }
  1162. func TestGetSecretPath(t *testing.T) {
  1163. storeV2 := makeValidSecretStore()
  1164. storeV2NoPath := storeV2.DeepCopy()
  1165. storeV2NoPath.Spec.Provider.Vault.Path = nil
  1166. storeV1 := makeValidSecretStoreWithVersion(esv1beta1.VaultKVStoreV1)
  1167. storeV1NoPath := storeV1.DeepCopy()
  1168. storeV1NoPath.Spec.Provider.Vault.Path = nil
  1169. type args struct {
  1170. store *esv1beta1.VaultProvider
  1171. path string
  1172. expected string
  1173. }
  1174. cases := map[string]struct {
  1175. reason string
  1176. args args
  1177. }{
  1178. "PathWithoutFormatV2": {
  1179. reason: "Data needs to be found in path",
  1180. args: args{
  1181. store: storeV2.Spec.Provider.Vault,
  1182. path: "secret/test",
  1183. expected: "secret/data/test",
  1184. },
  1185. },
  1186. "PathWithDataV2": {
  1187. reason: "Data needs to be found only once in path",
  1188. args: args{
  1189. store: storeV2.Spec.Provider.Vault,
  1190. path: "secret/data/test",
  1191. expected: "secret/data/test",
  1192. },
  1193. },
  1194. "PathWithoutFormatV2_NoPath": {
  1195. reason: "Data needs to be found in path and correct mountpoint is set",
  1196. args: args{
  1197. store: storeV2NoPath.Spec.Provider.Vault,
  1198. path: "secret/test",
  1199. expected: "secret/data/test",
  1200. },
  1201. },
  1202. "PathWithoutFormatV1": {
  1203. reason: "Data needs to be found in path",
  1204. args: args{
  1205. store: storeV1.Spec.Provider.Vault,
  1206. path: "secret/test",
  1207. expected: "secret/test",
  1208. },
  1209. },
  1210. "PathWithoutFormatV1_NoPath": {
  1211. reason: "Data needs to be found in path and correct mountpoint is set",
  1212. args: args{
  1213. store: storeV1NoPath.Spec.Provider.Vault,
  1214. path: "secret/test",
  1215. expected: "secret/test",
  1216. },
  1217. },
  1218. "WithoutPathButMountpointV2": {
  1219. reason: "Mountpoint needs to be set in addition to data",
  1220. args: args{
  1221. store: storeV2.Spec.Provider.Vault,
  1222. path: "test",
  1223. expected: "secret/data/test",
  1224. },
  1225. },
  1226. "WithoutPathButMountpointV1": {
  1227. reason: "Mountpoint needs to be set in addition to data",
  1228. args: args{
  1229. store: storeV1.Spec.Provider.Vault,
  1230. path: "test",
  1231. expected: "secret/test",
  1232. },
  1233. },
  1234. }
  1235. for name, tc := range cases {
  1236. t.Run(name, func(t *testing.T) {
  1237. vStore := &client{
  1238. store: tc.args.store,
  1239. }
  1240. want := vStore.buildPath(tc.args.path)
  1241. if diff := cmp.Diff(want, tc.args.expected); diff != "" {
  1242. t.Errorf("\n%s\nvault.buildPath(...): -want expected, +got error:\n%s", tc.reason, diff)
  1243. }
  1244. })
  1245. }
  1246. }
  1247. func TestValidateStore(t *testing.T) {
  1248. type args struct {
  1249. auth esv1beta1.VaultAuth
  1250. }
  1251. tests := []struct {
  1252. name string
  1253. args args
  1254. wantErr bool
  1255. }{
  1256. {
  1257. name: "empty auth",
  1258. args: args{},
  1259. },
  1260. {
  1261. name: "invalid approle with namespace",
  1262. args: args{
  1263. auth: esv1beta1.VaultAuth{
  1264. AppRole: &esv1beta1.VaultAppRole{
  1265. SecretRef: esmeta.SecretKeySelector{
  1266. Namespace: pointer.StringPtr("invalid"),
  1267. },
  1268. },
  1269. },
  1270. },
  1271. wantErr: true,
  1272. },
  1273. {
  1274. name: "invalid clientcert",
  1275. args: args{
  1276. auth: esv1beta1.VaultAuth{
  1277. Cert: &esv1beta1.VaultCertAuth{
  1278. ClientCert: esmeta.SecretKeySelector{
  1279. Namespace: pointer.StringPtr("invalid"),
  1280. },
  1281. },
  1282. },
  1283. },
  1284. wantErr: true,
  1285. },
  1286. {
  1287. name: "invalid cert secret",
  1288. args: args{
  1289. auth: esv1beta1.VaultAuth{
  1290. Cert: &esv1beta1.VaultCertAuth{
  1291. SecretRef: esmeta.SecretKeySelector{
  1292. Namespace: pointer.StringPtr("invalid"),
  1293. },
  1294. },
  1295. },
  1296. },
  1297. wantErr: true,
  1298. },
  1299. {
  1300. name: "invalid jwt secret",
  1301. args: args{
  1302. auth: esv1beta1.VaultAuth{
  1303. Jwt: &esv1beta1.VaultJwtAuth{
  1304. SecretRef: esmeta.SecretKeySelector{
  1305. Namespace: pointer.StringPtr("invalid"),
  1306. },
  1307. },
  1308. },
  1309. },
  1310. wantErr: true,
  1311. },
  1312. {
  1313. name: "invalid kubernetes sa",
  1314. args: args{
  1315. auth: esv1beta1.VaultAuth{
  1316. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  1317. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  1318. Namespace: pointer.StringPtr("invalid"),
  1319. },
  1320. },
  1321. },
  1322. },
  1323. wantErr: true,
  1324. },
  1325. {
  1326. name: "invalid kubernetes secret",
  1327. args: args{
  1328. auth: esv1beta1.VaultAuth{
  1329. Kubernetes: &esv1beta1.VaultKubernetesAuth{
  1330. SecretRef: &esmeta.SecretKeySelector{
  1331. Namespace: pointer.StringPtr("invalid"),
  1332. },
  1333. },
  1334. },
  1335. },
  1336. wantErr: true,
  1337. },
  1338. {
  1339. name: "invalid ldap secret",
  1340. args: args{
  1341. auth: esv1beta1.VaultAuth{
  1342. Ldap: &esv1beta1.VaultLdapAuth{
  1343. SecretRef: esmeta.SecretKeySelector{
  1344. Namespace: pointer.StringPtr("invalid"),
  1345. },
  1346. },
  1347. },
  1348. },
  1349. wantErr: true,
  1350. },
  1351. {
  1352. name: "invalid token secret",
  1353. args: args{
  1354. auth: esv1beta1.VaultAuth{
  1355. TokenSecretRef: &esmeta.SecretKeySelector{
  1356. Namespace: pointer.StringPtr("invalid"),
  1357. },
  1358. },
  1359. },
  1360. wantErr: true,
  1361. },
  1362. }
  1363. for _, tt := range tests {
  1364. t.Run(tt.name, func(t *testing.T) {
  1365. c := &connector{
  1366. newVaultClient: nil,
  1367. }
  1368. store := &esv1beta1.SecretStore{
  1369. Spec: esv1beta1.SecretStoreSpec{
  1370. Provider: &esv1beta1.SecretStoreProvider{
  1371. Vault: &esv1beta1.VaultProvider{
  1372. Auth: tt.args.auth,
  1373. },
  1374. },
  1375. },
  1376. }
  1377. if err := c.ValidateStore(store); (err != nil) != tt.wantErr {
  1378. t.Errorf("connector.ValidateStore() error = %v, wantErr %v", err, tt.wantErr)
  1379. }
  1380. })
  1381. }
  1382. }