parameterstore_test.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package parameterstore
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "strings"
  18. "testing"
  19. "github.com/aws/aws-sdk-go/aws"
  20. "github.com/aws/aws-sdk-go/aws/awserr"
  21. "github.com/aws/aws-sdk-go/service/ssm"
  22. "github.com/google/go-cmp/cmp"
  23. corev1 "k8s.io/api/core/v1"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  26. fakeps "github.com/external-secrets/external-secrets/pkg/provider/aws/parameterstore/fake"
  27. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  28. "github.com/external-secrets/external-secrets/pkg/provider/testing/fake"
  29. )
  30. const (
  31. errInvalidProperty = "key INVALPROP does not exist in secret"
  32. invalidProp = "INVALPROP"
  33. )
  34. type parameterstoreTestCase struct {
  35. fakeClient *fakeps.Client
  36. apiInput *ssm.GetParameterInput
  37. apiOutput *ssm.GetParameterOutput
  38. remoteRef *esv1beta1.ExternalSecretDataRemoteRef
  39. apiErr error
  40. expectError string
  41. expectedSecret string
  42. expectedData map[string][]byte
  43. }
  44. func makeValidParameterStoreTestCase() *parameterstoreTestCase {
  45. return &parameterstoreTestCase{
  46. fakeClient: &fakeps.Client{},
  47. apiInput: makeValidAPIInput(),
  48. apiOutput: makeValidAPIOutput(),
  49. remoteRef: makeValidRemoteRef(),
  50. apiErr: nil,
  51. expectError: "",
  52. expectedSecret: "",
  53. expectedData: make(map[string][]byte),
  54. }
  55. }
  56. func makeValidAPIInput() *ssm.GetParameterInput {
  57. return &ssm.GetParameterInput{
  58. Name: aws.String("/baz"),
  59. WithDecryption: aws.Bool(true),
  60. }
  61. }
  62. func makeValidAPIOutput() *ssm.GetParameterOutput {
  63. return &ssm.GetParameterOutput{
  64. Parameter: &ssm.Parameter{
  65. Value: aws.String("RRRRR"),
  66. },
  67. }
  68. }
  69. func makeValidRemoteRef() *esv1beta1.ExternalSecretDataRemoteRef {
  70. return &esv1beta1.ExternalSecretDataRemoteRef{
  71. Key: "/baz",
  72. }
  73. }
  74. func makeValidParameterStoreTestCaseCustom(tweaks ...func(pstc *parameterstoreTestCase)) *parameterstoreTestCase {
  75. pstc := makeValidParameterStoreTestCase()
  76. for _, fn := range tweaks {
  77. fn(pstc)
  78. }
  79. pstc.fakeClient.WithValue(pstc.apiInput, pstc.apiOutput, pstc.apiErr)
  80. return pstc
  81. }
  82. func TestDeleteSecret(t *testing.T) {
  83. fakeClient := fakeps.Client{}
  84. parameterName := "parameter"
  85. managedBy := "managed-by"
  86. manager := "external-secrets"
  87. ssmTag := ssm.Tag{
  88. Key: &managedBy,
  89. Value: &manager,
  90. }
  91. type args struct {
  92. client fakeps.Client
  93. getParameterOutput *ssm.GetParameterOutput
  94. listTagsOutput *ssm.ListTagsForResourceOutput
  95. deleteParameterOutput *ssm.DeleteParameterOutput
  96. getParameterError error
  97. listTagsError error
  98. deleteParameterError error
  99. }
  100. type want struct {
  101. err error
  102. }
  103. type testCase struct {
  104. args args
  105. want want
  106. reason string
  107. }
  108. tests := map[string]testCase{
  109. "Deletes Successfully": {
  110. args: args{
  111. client: fakeClient,
  112. getParameterOutput: &ssm.GetParameterOutput{
  113. Parameter: &ssm.Parameter{
  114. Name: &parameterName,
  115. },
  116. },
  117. listTagsOutput: &ssm.ListTagsForResourceOutput{
  118. TagList: []*ssm.Tag{&ssmTag},
  119. },
  120. deleteParameterOutput: nil,
  121. getParameterError: nil,
  122. listTagsError: nil,
  123. deleteParameterError: nil,
  124. },
  125. want: want{
  126. err: nil,
  127. },
  128. reason: "",
  129. },
  130. "Secret Not Found": {
  131. args: args{
  132. client: fakeClient,
  133. getParameterOutput: nil,
  134. listTagsOutput: nil,
  135. deleteParameterOutput: nil,
  136. getParameterError: awserr.New(ssm.ErrCodeParameterNotFound, "not here, sorry dude", nil),
  137. listTagsError: nil,
  138. deleteParameterError: nil,
  139. },
  140. want: want{
  141. err: nil,
  142. },
  143. reason: "",
  144. },
  145. "No permissions to get secret": {
  146. args: args{
  147. client: fakeClient,
  148. getParameterOutput: nil,
  149. listTagsOutput: nil,
  150. deleteParameterOutput: nil,
  151. getParameterError: errors.New("no permissions"),
  152. listTagsError: nil,
  153. deleteParameterError: nil,
  154. },
  155. want: want{
  156. err: errors.New("no permissions"),
  157. },
  158. reason: "",
  159. },
  160. "No permissions to get tags": {
  161. args: args{
  162. client: fakeClient,
  163. getParameterOutput: &ssm.GetParameterOutput{
  164. Parameter: &ssm.Parameter{
  165. Name: &parameterName,
  166. },
  167. },
  168. listTagsOutput: nil,
  169. deleteParameterOutput: nil,
  170. getParameterError: nil,
  171. listTagsError: errors.New("no permissions"),
  172. deleteParameterError: nil,
  173. },
  174. want: want{
  175. err: errors.New("no permissions"),
  176. },
  177. reason: "",
  178. },
  179. "Secret Not Managed by External Secrets": {
  180. args: args{
  181. client: fakeClient,
  182. getParameterOutput: &ssm.GetParameterOutput{
  183. Parameter: &ssm.Parameter{
  184. Name: &parameterName,
  185. },
  186. },
  187. listTagsOutput: &ssm.ListTagsForResourceOutput{
  188. TagList: []*ssm.Tag{},
  189. },
  190. deleteParameterOutput: nil,
  191. getParameterError: nil,
  192. listTagsError: nil,
  193. deleteParameterError: nil,
  194. },
  195. want: want{
  196. err: nil,
  197. },
  198. reason: "",
  199. },
  200. "No permissions delete secret": {
  201. args: args{
  202. client: fakeClient,
  203. getParameterOutput: &ssm.GetParameterOutput{
  204. Parameter: &ssm.Parameter{
  205. Name: &parameterName,
  206. },
  207. },
  208. listTagsOutput: &ssm.ListTagsForResourceOutput{
  209. TagList: []*ssm.Tag{&ssmTag},
  210. },
  211. deleteParameterOutput: nil,
  212. getParameterError: nil,
  213. listTagsError: nil,
  214. deleteParameterError: errors.New("no permissions"),
  215. },
  216. want: want{
  217. err: errors.New("no permissions"),
  218. },
  219. reason: "",
  220. },
  221. }
  222. for name, tc := range tests {
  223. t.Run(name, func(t *testing.T) {
  224. ref := fake.PushSecretData{RemoteKey: "fake-key"}
  225. ps := ParameterStore{
  226. client: &tc.args.client,
  227. }
  228. tc.args.client.GetParameterWithContextFn = fakeps.NewGetParameterWithContextFn(tc.args.getParameterOutput, tc.args.getParameterError)
  229. tc.args.client.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(tc.args.listTagsOutput, tc.args.listTagsError)
  230. tc.args.client.DeleteParameterWithContextFn = fakeps.NewDeleteParameterWithContextFn(tc.args.deleteParameterOutput, tc.args.deleteParameterError)
  231. err := ps.DeleteSecret(context.TODO(), ref)
  232. // Error nil XOR tc.want.err nil
  233. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  234. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  235. }
  236. // if errors are the same type but their contents do not match
  237. if err != nil && tc.want.err != nil {
  238. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  239. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error got nil", name, tc.reason, tc.want.err)
  240. }
  241. }
  242. })
  243. }
  244. }
  245. func TestPushSecret(t *testing.T) {
  246. invalidParameters := errors.New(ssm.ErrCodeInvalidParameters)
  247. alreadyExistsError := errors.New(ssm.ErrCodeAlreadyExistsException)
  248. fakeSecretKey := "fakeSecretKey"
  249. fakeValue := "fakeValue"
  250. fakeSecret := &corev1.Secret{
  251. Data: map[string][]byte{
  252. fakeSecretKey: []byte(fakeValue),
  253. },
  254. }
  255. managedByESO := ssm.Tag{
  256. Key: &managedBy,
  257. Value: &externalSecrets,
  258. }
  259. putParameterOutput := &ssm.PutParameterOutput{}
  260. getParameterOutput := &ssm.GetParameterOutput{}
  261. describeParameterOutput := &ssm.DescribeParametersOutput{}
  262. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  263. TagList: []*ssm.Tag{&managedByESO},
  264. }
  265. noTagsResourceOutput := &ssm.ListTagsForResourceOutput{}
  266. validGetParameterOutput := &ssm.GetParameterOutput{
  267. Parameter: &ssm.Parameter{
  268. ARN: nil,
  269. DataType: nil,
  270. LastModifiedDate: nil,
  271. Name: nil,
  272. Selector: nil,
  273. SourceResult: nil,
  274. Type: nil,
  275. Value: nil,
  276. Version: nil,
  277. },
  278. }
  279. sameGetParameterOutput := &ssm.GetParameterOutput{
  280. Parameter: &ssm.Parameter{
  281. Value: &fakeValue,
  282. },
  283. }
  284. type args struct {
  285. store *esv1beta1.AWSProvider
  286. client fakeps.Client
  287. }
  288. type want struct {
  289. err error
  290. }
  291. tests := map[string]struct {
  292. reason string
  293. args args
  294. want want
  295. }{
  296. "PutParameterSucceeds": {
  297. reason: "a parameter can be successfully pushed to aws parameter store",
  298. args: args{
  299. store: makeValidParameterStore().Spec.Provider.AWS,
  300. client: fakeps.Client{
  301. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  302. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, nil),
  303. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  304. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  305. },
  306. },
  307. want: want{
  308. err: nil,
  309. },
  310. },
  311. "SetParameterFailsWhenNoNameProvided": {
  312. reason: "test push secret with no name gives error",
  313. args: args{
  314. store: makeValidParameterStore().Spec.Provider.AWS,
  315. client: fakeps.Client{
  316. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  317. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, invalidParameters),
  318. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  319. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  320. },
  321. },
  322. want: want{
  323. err: invalidParameters,
  324. },
  325. },
  326. "SetSecretWhenAlreadyExists": {
  327. reason: "test push secret with secret that already exists gives error",
  328. args: args{
  329. store: makeValidParameterStore().Spec.Provider.AWS,
  330. client: fakeps.Client{
  331. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, alreadyExistsError),
  332. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, nil),
  333. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  334. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  335. },
  336. },
  337. want: want{
  338. err: alreadyExistsError,
  339. },
  340. },
  341. "GetSecretWithValidParameters": {
  342. reason: "Get secret with valid parameters",
  343. args: args{
  344. store: makeValidParameterStore().Spec.Provider.AWS,
  345. client: fakeps.Client{
  346. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  347. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  348. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  349. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  350. },
  351. },
  352. want: want{
  353. err: nil,
  354. },
  355. },
  356. "SetSecretNotManagedByESO": {
  357. reason: "SetSecret to the parameter store but tags are not managed by ESO",
  358. args: args{
  359. store: makeValidParameterStore().Spec.Provider.AWS,
  360. client: fakeps.Client{
  361. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  362. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  363. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  364. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(noTagsResourceOutput, nil),
  365. },
  366. },
  367. want: want{
  368. err: fmt.Errorf("secret not managed by external-secrets"),
  369. },
  370. },
  371. "SetSecretGetTagsError": {
  372. reason: "SetSecret to the parameter store returns error while obtaining tags",
  373. args: args{
  374. store: makeValidParameterStore().Spec.Provider.AWS,
  375. client: fakeps.Client{
  376. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  377. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  378. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  379. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(nil, fmt.Errorf("you shall not tag")),
  380. },
  381. },
  382. want: want{
  383. err: fmt.Errorf("you shall not tag"),
  384. },
  385. },
  386. "SetSecretContentMatches": {
  387. reason: "No ops",
  388. args: args{
  389. store: makeValidParameterStore().Spec.Provider.AWS,
  390. client: fakeps.Client{
  391. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  392. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  393. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  394. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  395. },
  396. },
  397. want: want{
  398. err: nil,
  399. },
  400. },
  401. }
  402. for name, tc := range tests {
  403. t.Run(name, func(t *testing.T) {
  404. psd := fake.PushSecretData{SecretKey: "fake-secret-key", RemoteKey: "fake-key"}
  405. ps := ParameterStore{
  406. client: &tc.args.client,
  407. }
  408. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  409. // Error nil XOR tc.want.err nil
  410. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  411. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  412. }
  413. // if errors are the same type but their contents do not match
  414. if err != nil && tc.want.err != nil {
  415. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  416. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error got nil", name, tc.reason, tc.want.err)
  417. }
  418. }
  419. })
  420. }
  421. }
  422. // test the ssm<->aws interface
  423. // make sure correct values are passed and errors are handled accordingly.
  424. func TestGetSecret(t *testing.T) {
  425. // good case: key is passed in, output is sent back
  426. setSecretString := func(pstc *parameterstoreTestCase) {
  427. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  428. pstc.expectedSecret = "RRRRR"
  429. }
  430. // good case: extract property
  431. setExtractProperty := func(pstc *parameterstoreTestCase) {
  432. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  433. pstc.expectedSecret = "bang"
  434. pstc.remoteRef.Property = "/shmoo"
  435. }
  436. // good case: extract property with `.`
  437. setExtractPropertyWithDot := func(pstc *parameterstoreTestCase) {
  438. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo.boom": "bang"}`)
  439. pstc.expectedSecret = "bang"
  440. pstc.remoteRef.Property = "/shmoo.boom"
  441. }
  442. // bad case: missing property
  443. setMissingProperty := func(pstc *parameterstoreTestCase) {
  444. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  445. pstc.remoteRef.Property = "INVALPROP"
  446. pstc.expectError = "key INVALPROP does not exist in secret"
  447. }
  448. // bad case: parameter.Value not found
  449. setParameterValueNotFound := func(pstc *parameterstoreTestCase) {
  450. pstc.apiOutput.Parameter.Value = aws.String("NONEXISTENT")
  451. pstc.apiErr = esv1beta1.NoSecretErr
  452. pstc.expectError = "Secret does not exist"
  453. }
  454. // bad case: extract property failure due to invalid json
  455. setPropertyFail := func(pstc *parameterstoreTestCase) {
  456. pstc.apiOutput.Parameter.Value = aws.String(`------`)
  457. pstc.remoteRef.Property = invalidProp
  458. pstc.expectError = errInvalidProperty
  459. }
  460. // bad case: parameter.Value may be nil but binary is set
  461. setParameterValueNil := func(pstc *parameterstoreTestCase) {
  462. pstc.apiOutput.Parameter.Value = nil
  463. pstc.expectError = "parameter value is nil for key"
  464. }
  465. // base case: api output return error
  466. setAPIError := func(pstc *parameterstoreTestCase) {
  467. pstc.apiOutput = &ssm.GetParameterOutput{}
  468. pstc.apiErr = fmt.Errorf("oh no")
  469. pstc.expectError = "oh no"
  470. }
  471. // good case: metadata returned
  472. setMetadataString := func(pstc *parameterstoreTestCase) {
  473. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  474. output := ssm.ListTagsForResourceOutput{
  475. TagList: getTagSlice(),
  476. }
  477. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  478. pstc.expectedSecret, _ = util.ParameterTagsToJSONString(getTagSlice())
  479. }
  480. // good case: metadata property returned
  481. setMetadataProperty := func(pstc *parameterstoreTestCase) {
  482. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  483. output := ssm.ListTagsForResourceOutput{
  484. TagList: getTagSlice(),
  485. }
  486. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  487. pstc.remoteRef.Property = "tagname2"
  488. pstc.expectedSecret = "tagvalue2"
  489. }
  490. // bad case: metadata property not found
  491. setMetadataMissingProperty := func(pstc *parameterstoreTestCase) {
  492. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  493. output := ssm.ListTagsForResourceOutput{
  494. TagList: getTagSlice(),
  495. }
  496. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  497. pstc.remoteRef.Property = invalidProp
  498. pstc.expectError = errInvalidProperty
  499. }
  500. successCases := []*parameterstoreTestCase{
  501. makeValidParameterStoreTestCaseCustom(setSecretString),
  502. makeValidParameterStoreTestCaseCustom(setExtractProperty),
  503. makeValidParameterStoreTestCaseCustom(setMissingProperty),
  504. makeValidParameterStoreTestCaseCustom(setPropertyFail),
  505. makeValidParameterStoreTestCaseCustom(setParameterValueNil),
  506. makeValidParameterStoreTestCaseCustom(setAPIError),
  507. makeValidParameterStoreTestCaseCustom(setExtractPropertyWithDot),
  508. makeValidParameterStoreTestCaseCustom(setParameterValueNotFound),
  509. makeValidParameterStoreTestCaseCustom(setMetadataString),
  510. makeValidParameterStoreTestCaseCustom(setMetadataProperty),
  511. makeValidParameterStoreTestCaseCustom(setMetadataMissingProperty),
  512. }
  513. ps := ParameterStore{}
  514. for k, v := range successCases {
  515. ps.client = v.fakeClient
  516. out, err := ps.GetSecret(context.Background(), *v.remoteRef)
  517. if !ErrorContains(err, v.expectError) {
  518. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  519. }
  520. if cmp.Equal(out, v.expectedSecret) {
  521. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedSecret, out)
  522. }
  523. }
  524. }
  525. func TestGetSecretMap(t *testing.T) {
  526. // good case: default version & deserialization
  527. simpleJSON := func(pstc *parameterstoreTestCase) {
  528. pstc.apiOutput.Parameter.Value = aws.String(`{"foo":"bar"}`)
  529. pstc.expectedData["foo"] = []byte("bar")
  530. }
  531. // good case: default version & complex json
  532. complexJSON := func(pstc *parameterstoreTestCase) {
  533. pstc.apiOutput.Parameter.Value = aws.String(`{"int": 42, "str": "str", "nested": {"foo":"bar"}}`)
  534. pstc.expectedData["int"] = []byte("42")
  535. pstc.expectedData["str"] = []byte("str")
  536. pstc.expectedData["nested"] = []byte(`{"foo":"bar"}`)
  537. }
  538. // bad case: api error returned
  539. setAPIError := func(pstc *parameterstoreTestCase) {
  540. pstc.apiOutput.Parameter = &ssm.Parameter{}
  541. pstc.expectError = "some api err"
  542. pstc.apiErr = fmt.Errorf("some api err")
  543. }
  544. // bad case: invalid json
  545. setInvalidJSON := func(pstc *parameterstoreTestCase) {
  546. pstc.apiOutput.Parameter.Value = aws.String(`-----------------`)
  547. pstc.expectError = "unable to unmarshal secret"
  548. }
  549. successCases := []*parameterstoreTestCase{
  550. makeValidParameterStoreTestCaseCustom(simpleJSON),
  551. makeValidParameterStoreTestCaseCustom(complexJSON),
  552. makeValidParameterStoreTestCaseCustom(setAPIError),
  553. makeValidParameterStoreTestCaseCustom(setInvalidJSON),
  554. }
  555. ps := ParameterStore{}
  556. for k, v := range successCases {
  557. ps.client = v.fakeClient
  558. out, err := ps.GetSecretMap(context.Background(), *v.remoteRef)
  559. if !ErrorContains(err, v.expectError) {
  560. t.Errorf("[%d] unexpected error: %q, expected: %q", k, err.Error(), v.expectError)
  561. }
  562. if err == nil && !cmp.Equal(out, v.expectedData) {
  563. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedData, out)
  564. }
  565. }
  566. }
  567. func makeValidParameterStore() *esv1beta1.SecretStore {
  568. return &esv1beta1.SecretStore{
  569. ObjectMeta: metav1.ObjectMeta{
  570. Name: "aws-parameterstore",
  571. Namespace: "default",
  572. },
  573. Spec: esv1beta1.SecretStoreSpec{
  574. Provider: &esv1beta1.SecretStoreProvider{
  575. AWS: &esv1beta1.AWSProvider{
  576. Service: esv1beta1.AWSServiceParameterStore,
  577. Region: "us-east-1",
  578. },
  579. },
  580. },
  581. }
  582. }
  583. func ErrorContains(out error, want string) bool {
  584. if out == nil {
  585. return want == ""
  586. }
  587. if want == "" {
  588. return false
  589. }
  590. return strings.Contains(out.Error(), want)
  591. }
  592. func getTagSlice() []*ssm.Tag {
  593. tagKey1 := "tagname1"
  594. tagValue1 := "tagvalue1"
  595. tagKey2 := "tagname2"
  596. tagValue2 := "tagvalue2"
  597. return []*ssm.Tag{
  598. {
  599. Key: &tagKey1,
  600. Value: &tagValue1,
  601. },
  602. {
  603. Key: &tagKey2,
  604. Value: &tagValue2,
  605. },
  606. }
  607. }