fake.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package fake
  13. import (
  14. "context"
  15. "sync"
  16. corev1 "k8s.io/api/core/v1"
  17. "sigs.k8s.io/controller-runtime/pkg/client"
  18. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  19. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  20. )
  21. var _ esv1.Provider = &Client{}
  22. type SetSecretCallArgs struct {
  23. Value []byte
  24. RemoteRef esv1.PushSecretRemoteRef
  25. }
  26. // Client is a fake client for testing.
  27. type Client struct {
  28. mu *sync.RWMutex
  29. pushSecretData map[string]SetSecretCallArgs
  30. NewFn func(context.Context, esv1.GenericStore, client.Client, string) (esv1.SecretsClient, error)
  31. GetSecretFn func(context.Context, esv1.ExternalSecretDataRemoteRef) ([]byte, error)
  32. GetSecretMapFn func(context.Context, esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error)
  33. GetAllSecretsFn func(context.Context, esv1.ExternalSecretFind) (map[string][]byte, error)
  34. SecretExistsFn func(context.Context, esv1.PushSecretRemoteRef) (bool, error)
  35. SetSecretFn func() error
  36. DeleteSecretFn func() error
  37. }
  38. // New returns a fake provider/client.
  39. func New() *Client {
  40. v := &Client{
  41. mu: &sync.RWMutex{},
  42. GetSecretFn: func(context.Context, esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  43. return nil, nil
  44. },
  45. GetSecretMapFn: func(context.Context, esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  46. return nil, nil
  47. },
  48. GetAllSecretsFn: func(context.Context, esv1.ExternalSecretFind) (map[string][]byte, error) {
  49. return nil, nil
  50. },
  51. SecretExistsFn: func(context.Context, esv1.PushSecretRemoteRef) (bool, error) {
  52. return false, nil
  53. },
  54. SetSecretFn: func() error {
  55. return nil
  56. },
  57. DeleteSecretFn: func() error {
  58. return nil
  59. },
  60. pushSecretData: map[string]SetSecretCallArgs{},
  61. }
  62. v.NewFn = func(context.Context, esv1.GenericStore, client.Client, string) (esv1.SecretsClient, error) {
  63. return v, nil
  64. }
  65. return v
  66. }
  67. // RegisterAs registers the fake client in the schema.
  68. func (v *Client) RegisterAs(provider *esv1.SecretStoreProvider) {
  69. esv1.ForceRegister(v, provider, esv1.MaintenanceStatusMaintained)
  70. }
  71. // GetAllSecrets implements the provider.Provider interface.
  72. func (v *Client) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  73. return v.GetAllSecretsFn(ctx, ref)
  74. }
  75. func (v *Client) PushSecret(_ context.Context, secret *corev1.Secret, data esv1.PushSecretData) error {
  76. v.mu.Lock()
  77. defer v.mu.Unlock()
  78. v.pushSecretData[data.GetRemoteKey()] = SetSecretCallArgs{
  79. Value: secret.Data[data.GetSecretKey()],
  80. RemoteRef: data,
  81. }
  82. return v.SetSecretFn()
  83. }
  84. // GetPushSecretData safely retrieves the push secret data map for reading.
  85. func (v *Client) GetPushSecretData() map[string]SetSecretCallArgs {
  86. v.mu.RLock()
  87. defer v.mu.RUnlock()
  88. // Create a copy to avoid race conditions
  89. result := make(map[string]SetSecretCallArgs, len(v.pushSecretData))
  90. for k, v := range v.pushSecretData {
  91. result[k] = v
  92. }
  93. return result
  94. }
  95. func (v *Client) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  96. return v.DeleteSecretFn()
  97. }
  98. func (v *Client) SecretExists(ctx context.Context, ref esv1.PushSecretRemoteRef) (bool, error) {
  99. return v.SecretExistsFn(ctx, ref)
  100. }
  101. // GetSecret implements the provider.Provider interface.
  102. func (v *Client) GetSecret(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  103. return v.GetSecretFn(ctx, ref)
  104. }
  105. // WithGetSecret wraps secret data returned by this provider.
  106. func (v *Client) WithGetSecret(secData []byte, err error) *Client {
  107. v.GetSecretFn = func(context.Context, esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  108. return secData, err
  109. }
  110. return v
  111. }
  112. // GetSecretMap implements the provider.Provider interface.
  113. func (v *Client) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  114. return v.GetSecretMapFn(ctx, ref)
  115. }
  116. func (v *Client) Close(_ context.Context) error {
  117. return nil
  118. }
  119. func (v *Client) Validate() (esv1.ValidationResult, error) {
  120. return esv1.ValidationResultReady, nil
  121. }
  122. func (v *Client) ValidateStore(_ esv1.GenericStore) (admission.Warnings, error) {
  123. return nil, nil
  124. }
  125. // WithGetSecretMap wraps the secret data map returned by this fake provider.
  126. func (v *Client) WithGetSecretMap(secData map[string][]byte, err error) *Client {
  127. v.GetSecretMapFn = func(context.Context, esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  128. return secData, err
  129. }
  130. return v
  131. }
  132. // WithGetAllSecrets wraps the secret data map returned by this fake provider.
  133. func (v *Client) WithGetAllSecrets(secData map[string][]byte, err error) *Client {
  134. v.GetAllSecretsFn = func(context.Context, esv1.ExternalSecretFind) (map[string][]byte, error) {
  135. return secData, err
  136. }
  137. return v
  138. }
  139. // WithSetSecret wraps the secret response to the fake provider.
  140. func (v *Client) WithSetSecret(err error) *Client {
  141. v.SetSecretFn = func() error {
  142. return err
  143. }
  144. return v
  145. }
  146. // WithNew wraps the fake provider factory function.
  147. func (v *Client) WithNew(f func(context.Context, esv1.GenericStore, client.Client,
  148. string) (esv1.SecretsClient, error)) *Client {
  149. v.NewFn = f
  150. return v
  151. }
  152. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  153. func (v *Client) Capabilities() esv1.SecretStoreCapabilities {
  154. return esv1.SecretStoreReadOnly
  155. }
  156. // NewClient returns a new fake provider.
  157. func (v *Client) NewClient(ctx context.Context, store esv1.GenericStore, kube client.Client, namespace string) (esv1.SecretsClient, error) {
  158. c, err := v.NewFn(ctx, store, kube, namespace)
  159. if err != nil {
  160. return nil, err
  161. }
  162. return c, nil
  163. }
  164. func (v *Client) Reset() {
  165. v.WithNew(func(context.Context, esv1.GenericStore, client.Client,
  166. string) (esv1.SecretsClient, error) {
  167. return v, nil
  168. })
  169. v.mu.Lock()
  170. defer v.mu.Unlock()
  171. v.pushSecretData = map[string]SetSecretCallArgs{}
  172. }