parameterstore_test.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package parameterstore
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "strings"
  18. "testing"
  19. "github.com/aws/aws-sdk-go/aws"
  20. "github.com/aws/aws-sdk-go/aws/awserr"
  21. "github.com/aws/aws-sdk-go/service/ssm"
  22. "github.com/google/go-cmp/cmp"
  23. corev1 "k8s.io/api/core/v1"
  24. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. fakeps "github.com/external-secrets/external-secrets/pkg/provider/aws/parameterstore/fake"
  28. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  29. "github.com/external-secrets/external-secrets/pkg/provider/testing/fake"
  30. )
  31. const (
  32. errInvalidProperty = "key INVALPROP does not exist in secret"
  33. invalidProp = "INVALPROP"
  34. )
  35. type parameterstoreTestCase struct {
  36. fakeClient *fakeps.Client
  37. apiInput *ssm.GetParameterInput
  38. apiOutput *ssm.GetParameterOutput
  39. remoteRef *esv1beta1.ExternalSecretDataRemoteRef
  40. apiErr error
  41. expectError string
  42. expectedSecret string
  43. expectedData map[string][]byte
  44. }
  45. func makeValidParameterStoreTestCase() *parameterstoreTestCase {
  46. return &parameterstoreTestCase{
  47. fakeClient: &fakeps.Client{},
  48. apiInput: makeValidAPIInput(),
  49. apiOutput: makeValidAPIOutput(),
  50. remoteRef: makeValidRemoteRef(),
  51. apiErr: nil,
  52. expectError: "",
  53. expectedSecret: "",
  54. expectedData: make(map[string][]byte),
  55. }
  56. }
  57. func makeValidAPIInput() *ssm.GetParameterInput {
  58. return &ssm.GetParameterInput{
  59. Name: aws.String("/baz"),
  60. WithDecryption: aws.Bool(true),
  61. }
  62. }
  63. func makeValidAPIOutput() *ssm.GetParameterOutput {
  64. return &ssm.GetParameterOutput{
  65. Parameter: &ssm.Parameter{
  66. Value: aws.String("RRRRR"),
  67. },
  68. }
  69. }
  70. func makeValidRemoteRef() *esv1beta1.ExternalSecretDataRemoteRef {
  71. return &esv1beta1.ExternalSecretDataRemoteRef{
  72. Key: "/baz",
  73. }
  74. }
  75. func makeValidParameterStoreTestCaseCustom(tweaks ...func(pstc *parameterstoreTestCase)) *parameterstoreTestCase {
  76. pstc := makeValidParameterStoreTestCase()
  77. for _, fn := range tweaks {
  78. fn(pstc)
  79. }
  80. pstc.fakeClient.WithValue(pstc.apiInput, pstc.apiOutput, pstc.apiErr)
  81. return pstc
  82. }
  83. func TestDeleteSecret(t *testing.T) {
  84. fakeClient := fakeps.Client{}
  85. parameterName := "parameter"
  86. managedBy := "managed-by"
  87. manager := "external-secrets"
  88. ssmTag := ssm.Tag{
  89. Key: &managedBy,
  90. Value: &manager,
  91. }
  92. type args struct {
  93. client fakeps.Client
  94. getParameterOutput *ssm.GetParameterOutput
  95. listTagsOutput *ssm.ListTagsForResourceOutput
  96. deleteParameterOutput *ssm.DeleteParameterOutput
  97. getParameterError error
  98. listTagsError error
  99. deleteParameterError error
  100. }
  101. type want struct {
  102. err error
  103. }
  104. type testCase struct {
  105. args args
  106. want want
  107. reason string
  108. }
  109. tests := map[string]testCase{
  110. "Deletes Successfully": {
  111. args: args{
  112. client: fakeClient,
  113. getParameterOutput: &ssm.GetParameterOutput{
  114. Parameter: &ssm.Parameter{
  115. Name: &parameterName,
  116. },
  117. },
  118. listTagsOutput: &ssm.ListTagsForResourceOutput{
  119. TagList: []*ssm.Tag{&ssmTag},
  120. },
  121. deleteParameterOutput: nil,
  122. getParameterError: nil,
  123. listTagsError: nil,
  124. deleteParameterError: nil,
  125. },
  126. want: want{
  127. err: nil,
  128. },
  129. reason: "",
  130. },
  131. "Secret Not Found": {
  132. args: args{
  133. client: fakeClient,
  134. getParameterOutput: nil,
  135. listTagsOutput: nil,
  136. deleteParameterOutput: nil,
  137. getParameterError: awserr.New(ssm.ErrCodeParameterNotFound, "not here, sorry dude", nil),
  138. listTagsError: nil,
  139. deleteParameterError: nil,
  140. },
  141. want: want{
  142. err: nil,
  143. },
  144. reason: "",
  145. },
  146. "No permissions to get secret": {
  147. args: args{
  148. client: fakeClient,
  149. getParameterOutput: nil,
  150. listTagsOutput: nil,
  151. deleteParameterOutput: nil,
  152. getParameterError: errors.New("no permissions"),
  153. listTagsError: nil,
  154. deleteParameterError: nil,
  155. },
  156. want: want{
  157. err: errors.New("no permissions"),
  158. },
  159. reason: "",
  160. },
  161. "No permissions to get tags": {
  162. args: args{
  163. client: fakeClient,
  164. getParameterOutput: &ssm.GetParameterOutput{
  165. Parameter: &ssm.Parameter{
  166. Name: &parameterName,
  167. },
  168. },
  169. listTagsOutput: nil,
  170. deleteParameterOutput: nil,
  171. getParameterError: nil,
  172. listTagsError: errors.New("no permissions"),
  173. deleteParameterError: nil,
  174. },
  175. want: want{
  176. err: errors.New("no permissions"),
  177. },
  178. reason: "",
  179. },
  180. "Secret Not Managed by External Secrets": {
  181. args: args{
  182. client: fakeClient,
  183. getParameterOutput: &ssm.GetParameterOutput{
  184. Parameter: &ssm.Parameter{
  185. Name: &parameterName,
  186. },
  187. },
  188. listTagsOutput: &ssm.ListTagsForResourceOutput{
  189. TagList: []*ssm.Tag{},
  190. },
  191. deleteParameterOutput: nil,
  192. getParameterError: nil,
  193. listTagsError: nil,
  194. deleteParameterError: nil,
  195. },
  196. want: want{
  197. err: nil,
  198. },
  199. reason: "",
  200. },
  201. "No permissions delete secret": {
  202. args: args{
  203. client: fakeClient,
  204. getParameterOutput: &ssm.GetParameterOutput{
  205. Parameter: &ssm.Parameter{
  206. Name: &parameterName,
  207. },
  208. },
  209. listTagsOutput: &ssm.ListTagsForResourceOutput{
  210. TagList: []*ssm.Tag{&ssmTag},
  211. },
  212. deleteParameterOutput: nil,
  213. getParameterError: nil,
  214. listTagsError: nil,
  215. deleteParameterError: errors.New("no permissions"),
  216. },
  217. want: want{
  218. err: errors.New("no permissions"),
  219. },
  220. reason: "",
  221. },
  222. }
  223. for name, tc := range tests {
  224. t.Run(name, func(t *testing.T) {
  225. ref := fake.PushSecretData{RemoteKey: "fake-key"}
  226. ps := ParameterStore{
  227. client: &tc.args.client,
  228. }
  229. tc.args.client.GetParameterWithContextFn = fakeps.NewGetParameterWithContextFn(tc.args.getParameterOutput, tc.args.getParameterError)
  230. tc.args.client.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(tc.args.listTagsOutput, tc.args.listTagsError)
  231. tc.args.client.DeleteParameterWithContextFn = fakeps.NewDeleteParameterWithContextFn(tc.args.deleteParameterOutput, tc.args.deleteParameterError)
  232. err := ps.DeleteSecret(context.TODO(), ref)
  233. // Error nil XOR tc.want.err nil
  234. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  235. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  236. }
  237. // if errors are the same type but their contents do not match
  238. if err != nil && tc.want.err != nil {
  239. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  240. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error got nil", name, tc.reason, tc.want.err)
  241. }
  242. }
  243. })
  244. }
  245. }
  246. func TestPushSecret(t *testing.T) {
  247. invalidParameters := errors.New(ssm.ErrCodeInvalidParameters)
  248. alreadyExistsError := errors.New(ssm.ErrCodeAlreadyExistsException)
  249. fakeSecretKey := "fakeSecretKey"
  250. fakeValue := "fakeValue"
  251. fakeSecret := &corev1.Secret{
  252. Data: map[string][]byte{
  253. fakeSecretKey: []byte(fakeValue),
  254. },
  255. }
  256. managedByESO := ssm.Tag{
  257. Key: &managedBy,
  258. Value: &externalSecrets,
  259. }
  260. putParameterOutput := &ssm.PutParameterOutput{}
  261. getParameterOutput := &ssm.GetParameterOutput{}
  262. describeParameterOutput := &ssm.DescribeParametersOutput{}
  263. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  264. TagList: []*ssm.Tag{&managedByESO},
  265. }
  266. noTagsResourceOutput := &ssm.ListTagsForResourceOutput{}
  267. validGetParameterOutput := &ssm.GetParameterOutput{
  268. Parameter: &ssm.Parameter{
  269. ARN: nil,
  270. DataType: nil,
  271. LastModifiedDate: nil,
  272. Name: nil,
  273. Selector: nil,
  274. SourceResult: nil,
  275. Type: nil,
  276. Value: nil,
  277. Version: nil,
  278. },
  279. }
  280. sameGetParameterOutput := &ssm.GetParameterOutput{
  281. Parameter: &ssm.Parameter{
  282. Value: &fakeValue,
  283. },
  284. }
  285. type args struct {
  286. store *esv1beta1.AWSProvider
  287. metadata *apiextensionsv1.JSON
  288. client fakeps.Client
  289. }
  290. type want struct {
  291. err error
  292. }
  293. tests := map[string]struct {
  294. reason string
  295. args args
  296. want want
  297. }{
  298. "PutParameterSucceeds": {
  299. reason: "a parameter can be successfully pushed to aws parameter store",
  300. args: args{
  301. store: makeValidParameterStore().Spec.Provider.AWS,
  302. client: fakeps.Client{
  303. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  304. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, nil),
  305. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  306. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  307. },
  308. },
  309. want: want{
  310. err: nil,
  311. },
  312. },
  313. "SetParameterFailsWhenNoNameProvided": {
  314. reason: "test push secret with no name gives error",
  315. args: args{
  316. store: makeValidParameterStore().Spec.Provider.AWS,
  317. client: fakeps.Client{
  318. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  319. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, invalidParameters),
  320. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  321. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  322. },
  323. },
  324. want: want{
  325. err: invalidParameters,
  326. },
  327. },
  328. "SetSecretWhenAlreadyExists": {
  329. reason: "test push secret with secret that already exists gives error",
  330. args: args{
  331. store: makeValidParameterStore().Spec.Provider.AWS,
  332. client: fakeps.Client{
  333. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, alreadyExistsError),
  334. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(getParameterOutput, nil),
  335. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  336. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  337. },
  338. },
  339. want: want{
  340. err: alreadyExistsError,
  341. },
  342. },
  343. "GetSecretWithValidParameters": {
  344. reason: "Get secret with valid parameters",
  345. args: args{
  346. store: makeValidParameterStore().Spec.Provider.AWS,
  347. client: fakeps.Client{
  348. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  349. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  350. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  351. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  352. },
  353. },
  354. want: want{
  355. err: nil,
  356. },
  357. },
  358. "SetSecretNotManagedByESO": {
  359. reason: "SetSecret to the parameter store but tags are not managed by ESO",
  360. args: args{
  361. store: makeValidParameterStore().Spec.Provider.AWS,
  362. client: fakeps.Client{
  363. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  364. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  365. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  366. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(noTagsResourceOutput, nil),
  367. },
  368. },
  369. want: want{
  370. err: fmt.Errorf("secret not managed by external-secrets"),
  371. },
  372. },
  373. "SetSecretGetTagsError": {
  374. reason: "SetSecret to the parameter store returns error while obtaining tags",
  375. args: args{
  376. store: makeValidParameterStore().Spec.Provider.AWS,
  377. client: fakeps.Client{
  378. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  379. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(validGetParameterOutput, nil),
  380. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  381. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(nil, fmt.Errorf("you shall not tag")),
  382. },
  383. },
  384. want: want{
  385. err: fmt.Errorf("you shall not tag"),
  386. },
  387. },
  388. "SetSecretContentMatches": {
  389. reason: "No ops",
  390. args: args{
  391. store: makeValidParameterStore().Spec.Provider.AWS,
  392. client: fakeps.Client{
  393. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  394. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  395. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  396. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  397. },
  398. },
  399. want: want{
  400. err: nil,
  401. },
  402. },
  403. "SetSecretWithValidMetadata": {
  404. reason: "test push secret with valid parameterStoreType metadata",
  405. args: args{
  406. store: makeValidParameterStore().Spec.Provider.AWS,
  407. metadata: &apiextensionsv1.JSON{
  408. Raw: []byte(`
  409. {
  410. "parameterStoreType": "SecureString",
  411. "parameterStoreKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c"
  412. }
  413. `),
  414. },
  415. client: fakeps.Client{
  416. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  417. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  418. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  419. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  420. },
  421. },
  422. want: want{
  423. err: nil,
  424. },
  425. },
  426. "SetSecretWithValidMetadataListString": {
  427. reason: "test push secret with valid parameterStoreType metadata and unused parameterStoreKeyID",
  428. args: args{
  429. store: makeValidParameterStore().Spec.Provider.AWS,
  430. metadata: &apiextensionsv1.JSON{
  431. Raw: []byte(`{"parameterStoreType": "StringList", "parameterStoreKeyID": "alias/aws/ssm"}`),
  432. },
  433. client: fakeps.Client{
  434. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  435. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  436. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  437. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  438. },
  439. },
  440. want: want{
  441. err: nil,
  442. },
  443. },
  444. "SetSecretWithInvalidMetadata": {
  445. reason: "test push secret with invalid metadata structure",
  446. args: args{
  447. store: makeValidParameterStore().Spec.Provider.AWS,
  448. metadata: &apiextensionsv1.JSON{
  449. Raw: []byte(`{ fakeMetadataKey: "" }`),
  450. },
  451. client: fakeps.Client{
  452. PutParameterWithContextFn: fakeps.NewPutParameterWithContextFn(putParameterOutput, nil),
  453. GetParameterWithContextFn: fakeps.NewGetParameterWithContextFn(sameGetParameterOutput, nil),
  454. DescribeParametersWithContextFn: fakeps.NewDescribeParametersWithContextFn(describeParameterOutput, nil),
  455. ListTagsForResourceWithContextFn: fakeps.NewListTagsForResourceWithContextFn(validListTagsForResourceOutput, nil),
  456. },
  457. },
  458. want: want{
  459. err: fmt.Errorf("failed to parse metadata: failed to parse JSON raw data: invalid character 'f' looking for beginning of object key string"),
  460. },
  461. },
  462. }
  463. for name, tc := range tests {
  464. t.Run(name, func(t *testing.T) {
  465. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: "fake-key"}
  466. if tc.args.metadata != nil {
  467. psd.Metadata = tc.args.metadata
  468. }
  469. ps := ParameterStore{
  470. client: &tc.args.client,
  471. }
  472. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  473. // Error nil XOR tc.want.err nil
  474. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  475. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  476. }
  477. // if errors are the same type but their contents do not match
  478. if err != nil && tc.want.err != nil {
  479. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  480. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error got nil", name, tc.reason, tc.want.err)
  481. }
  482. }
  483. })
  484. }
  485. }
  486. // test the ssm<->aws interface
  487. // make sure correct values are passed and errors are handled accordingly.
  488. func TestGetSecret(t *testing.T) {
  489. // good case: key is passed in, output is sent back
  490. setSecretString := func(pstc *parameterstoreTestCase) {
  491. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  492. pstc.expectedSecret = "RRRRR"
  493. }
  494. // good case: extract property
  495. setExtractProperty := func(pstc *parameterstoreTestCase) {
  496. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  497. pstc.expectedSecret = "bang"
  498. pstc.remoteRef.Property = "/shmoo"
  499. }
  500. // good case: extract property with `.`
  501. setExtractPropertyWithDot := func(pstc *parameterstoreTestCase) {
  502. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo.boom": "bang"}`)
  503. pstc.expectedSecret = "bang"
  504. pstc.remoteRef.Property = "/shmoo.boom"
  505. }
  506. // bad case: missing property
  507. setMissingProperty := func(pstc *parameterstoreTestCase) {
  508. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  509. pstc.remoteRef.Property = "INVALPROP"
  510. pstc.expectError = "key INVALPROP does not exist in secret"
  511. }
  512. // bad case: parameter.Value not found
  513. setParameterValueNotFound := func(pstc *parameterstoreTestCase) {
  514. pstc.apiOutput.Parameter.Value = aws.String("NONEXISTENT")
  515. pstc.apiErr = esv1beta1.NoSecretErr
  516. pstc.expectError = "Secret does not exist"
  517. }
  518. // bad case: extract property failure due to invalid json
  519. setPropertyFail := func(pstc *parameterstoreTestCase) {
  520. pstc.apiOutput.Parameter.Value = aws.String(`------`)
  521. pstc.remoteRef.Property = invalidProp
  522. pstc.expectError = errInvalidProperty
  523. }
  524. // bad case: parameter.Value may be nil but binary is set
  525. setParameterValueNil := func(pstc *parameterstoreTestCase) {
  526. pstc.apiOutput.Parameter.Value = nil
  527. pstc.expectError = "parameter value is nil for key"
  528. }
  529. // base case: api output return error
  530. setAPIError := func(pstc *parameterstoreTestCase) {
  531. pstc.apiOutput = &ssm.GetParameterOutput{}
  532. pstc.apiErr = fmt.Errorf("oh no")
  533. pstc.expectError = "oh no"
  534. }
  535. // good case: metadata returned
  536. setMetadataString := func(pstc *parameterstoreTestCase) {
  537. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  538. output := ssm.ListTagsForResourceOutput{
  539. TagList: getTagSlice(),
  540. }
  541. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  542. pstc.expectedSecret, _ = util.ParameterTagsToJSONString(getTagSlice())
  543. }
  544. // good case: metadata property returned
  545. setMetadataProperty := func(pstc *parameterstoreTestCase) {
  546. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  547. output := ssm.ListTagsForResourceOutput{
  548. TagList: getTagSlice(),
  549. }
  550. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  551. pstc.remoteRef.Property = "tagname2"
  552. pstc.expectedSecret = "tagvalue2"
  553. }
  554. // bad case: metadata property not found
  555. setMetadataMissingProperty := func(pstc *parameterstoreTestCase) {
  556. pstc.remoteRef.MetadataPolicy = esv1beta1.ExternalSecretMetadataPolicyFetch
  557. output := ssm.ListTagsForResourceOutput{
  558. TagList: getTagSlice(),
  559. }
  560. pstc.fakeClient.ListTagsForResourceWithContextFn = fakeps.NewListTagsForResourceWithContextFn(&output, nil)
  561. pstc.remoteRef.Property = invalidProp
  562. pstc.expectError = errInvalidProperty
  563. }
  564. successCases := []*parameterstoreTestCase{
  565. makeValidParameterStoreTestCaseCustom(setSecretString),
  566. makeValidParameterStoreTestCaseCustom(setExtractProperty),
  567. makeValidParameterStoreTestCaseCustom(setMissingProperty),
  568. makeValidParameterStoreTestCaseCustom(setPropertyFail),
  569. makeValidParameterStoreTestCaseCustom(setParameterValueNil),
  570. makeValidParameterStoreTestCaseCustom(setAPIError),
  571. makeValidParameterStoreTestCaseCustom(setExtractPropertyWithDot),
  572. makeValidParameterStoreTestCaseCustom(setParameterValueNotFound),
  573. makeValidParameterStoreTestCaseCustom(setMetadataString),
  574. makeValidParameterStoreTestCaseCustom(setMetadataProperty),
  575. makeValidParameterStoreTestCaseCustom(setMetadataMissingProperty),
  576. }
  577. ps := ParameterStore{}
  578. for k, v := range successCases {
  579. ps.client = v.fakeClient
  580. out, err := ps.GetSecret(context.Background(), *v.remoteRef)
  581. if !ErrorContains(err, v.expectError) {
  582. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  583. }
  584. if cmp.Equal(out, v.expectedSecret) {
  585. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedSecret, out)
  586. }
  587. }
  588. }
  589. func TestGetSecretMap(t *testing.T) {
  590. // good case: default version & deserialization
  591. simpleJSON := func(pstc *parameterstoreTestCase) {
  592. pstc.apiOutput.Parameter.Value = aws.String(`{"foo":"bar"}`)
  593. pstc.expectedData["foo"] = []byte("bar")
  594. }
  595. // good case: default version & complex json
  596. complexJSON := func(pstc *parameterstoreTestCase) {
  597. pstc.apiOutput.Parameter.Value = aws.String(`{"int": 42, "str": "str", "nested": {"foo":"bar"}}`)
  598. pstc.expectedData["int"] = []byte("42")
  599. pstc.expectedData["str"] = []byte("str")
  600. pstc.expectedData["nested"] = []byte(`{"foo":"bar"}`)
  601. }
  602. // bad case: api error returned
  603. setAPIError := func(pstc *parameterstoreTestCase) {
  604. pstc.apiOutput.Parameter = &ssm.Parameter{}
  605. pstc.expectError = "some api err"
  606. pstc.apiErr = fmt.Errorf("some api err")
  607. }
  608. // bad case: invalid json
  609. setInvalidJSON := func(pstc *parameterstoreTestCase) {
  610. pstc.apiOutput.Parameter.Value = aws.String(`-----------------`)
  611. pstc.expectError = "unable to unmarshal secret"
  612. }
  613. successCases := []*parameterstoreTestCase{
  614. makeValidParameterStoreTestCaseCustom(simpleJSON),
  615. makeValidParameterStoreTestCaseCustom(complexJSON),
  616. makeValidParameterStoreTestCaseCustom(setAPIError),
  617. makeValidParameterStoreTestCaseCustom(setInvalidJSON),
  618. }
  619. ps := ParameterStore{}
  620. for k, v := range successCases {
  621. ps.client = v.fakeClient
  622. out, err := ps.GetSecretMap(context.Background(), *v.remoteRef)
  623. if !ErrorContains(err, v.expectError) {
  624. t.Errorf("[%d] unexpected error: %q, expected: %q", k, err.Error(), v.expectError)
  625. }
  626. if err == nil && !cmp.Equal(out, v.expectedData) {
  627. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedData, out)
  628. }
  629. }
  630. }
  631. func makeValidParameterStore() *esv1beta1.SecretStore {
  632. return &esv1beta1.SecretStore{
  633. ObjectMeta: metav1.ObjectMeta{
  634. Name: "aws-parameterstore",
  635. Namespace: "default",
  636. },
  637. Spec: esv1beta1.SecretStoreSpec{
  638. Provider: &esv1beta1.SecretStoreProvider{
  639. AWS: &esv1beta1.AWSProvider{
  640. Service: esv1beta1.AWSServiceParameterStore,
  641. Region: "us-east-1",
  642. },
  643. },
  644. },
  645. }
  646. }
  647. func ErrorContains(out error, want string) bool {
  648. if out == nil {
  649. return want == ""
  650. }
  651. if want == "" {
  652. return false
  653. }
  654. return strings.Contains(out.Error(), want)
  655. }
  656. func getTagSlice() []*ssm.Tag {
  657. tagKey1 := "tagname1"
  658. tagValue1 := "tagvalue1"
  659. tagKey2 := "tagname2"
  660. tagValue2 := "tagvalue2"
  661. return []*ssm.Tag{
  662. {
  663. Key: &tagKey1,
  664. Value: &tagValue1,
  665. },
  666. {
  667. Key: &tagKey2,
  668. Value: &tagValue2,
  669. },
  670. }
  671. }