vault.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package fake
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "reflect"
  18. "strings"
  19. "sync"
  20. vault "github.com/hashicorp/vault/api"
  21. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  22. )
  23. type LoginFn func(ctx context.Context, authMethod vault.AuthMethod) (*vault.Secret, error)
  24. type Auth struct {
  25. LoginFn LoginFn
  26. }
  27. func (f Auth) Login(ctx context.Context, authMethod vault.AuthMethod) (*vault.Secret, error) {
  28. return f.LoginFn(ctx, authMethod)
  29. }
  30. type ReadWithDataWithContextFn func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error)
  31. type ListWithContextFn func(ctx context.Context, path string) (*vault.Secret, error)
  32. type WriteWithContextFn func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error)
  33. type DeleteWithContextFn func(ctx context.Context, path string) (*vault.Secret, error)
  34. type Logical struct {
  35. ReadWithDataWithContextFn ReadWithDataWithContextFn
  36. ListWithContextFn ListWithContextFn
  37. WriteWithContextFn WriteWithContextFn
  38. DeleteWithContextFn DeleteWithContextFn
  39. }
  40. func (f Logical) DeleteWithContext(ctx context.Context, path string) (*vault.Secret, error) {
  41. return f.DeleteWithContextFn(ctx, path)
  42. }
  43. func NewDeleteWithContextFn(secret map[string]any, err error) DeleteWithContextFn {
  44. return func(ctx context.Context, path string) (*vault.Secret, error) {
  45. vault := &vault.Secret{
  46. Data: secret,
  47. }
  48. return vault, err
  49. }
  50. }
  51. func buildDataResponse(secret map[string]any, err error) (*vault.Secret, error) {
  52. if secret == nil {
  53. return nil, err
  54. }
  55. return &vault.Secret{Data: secret}, err
  56. }
  57. func buildMetadataResponse(secret map[string]any, err error) (*vault.Secret, error) {
  58. if secret == nil {
  59. return nil, err
  60. }
  61. // If the secret already has the expected metadata structure, return as-is
  62. if _, hasCustomMetadata := secret["custom_metadata"]; hasCustomMetadata {
  63. return &vault.Secret{Data: secret}, err
  64. }
  65. // Otherwise, wrap in custom_metadata for backwards compatibility
  66. metadata := make(map[string]any)
  67. metadata["custom_metadata"] = secret
  68. return &vault.Secret{Data: metadata}, err
  69. }
  70. func NewReadWithContextFn(secret map[string]any, err error) ReadWithDataWithContextFn {
  71. return func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  72. return buildDataResponse(secret, err)
  73. }
  74. }
  75. func NewReadMetadataWithContextFn(secret map[string]any, err error) ReadWithDataWithContextFn {
  76. return func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  77. return buildMetadataResponse(secret, err)
  78. }
  79. }
  80. func NewReadWithDataAndMetadataFn(dataSecret, metadataSecret map[string]any, dataErr, metadataErr error) ReadWithDataWithContextFn {
  81. return func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  82. // Check if this is a metadata path request
  83. if strings.Contains(path, "/metadata/") {
  84. return buildMetadataResponse(metadataSecret, metadataErr)
  85. }
  86. // This is a data path request
  87. return buildDataResponse(dataSecret, dataErr)
  88. }
  89. }
  90. func NewWriteWithContextFn(secret map[string]any, err error) WriteWithContextFn {
  91. return func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  92. return &vault.Secret{Data: secret}, err
  93. }
  94. }
  95. func ExpectWriteWithContextValue(expected map[string]any) WriteWithContextFn {
  96. return func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  97. if strings.Contains(path, "metadata") {
  98. return &vault.Secret{Data: data}, nil
  99. }
  100. if !reflect.DeepEqual(expected, data) {
  101. return nil, fmt.Errorf("expected: %v, got: %v", expected, data)
  102. }
  103. return &vault.Secret{Data: data}, nil
  104. }
  105. }
  106. func ExpectWriteWithContextNoCall() WriteWithContextFn {
  107. return func(_ context.Context, path string, data map[string]any) (*vault.Secret, error) {
  108. return nil, errors.New("fail")
  109. }
  110. }
  111. func ExpectDeleteWithContextNoCall() DeleteWithContextFn {
  112. return func(ctx context.Context, path string) (*vault.Secret, error) {
  113. return nil, errors.New("fail")
  114. }
  115. }
  116. func WriteChangingReadContext(secret map[string]any, l Logical) WriteWithContextFn {
  117. v := &vault.Secret{
  118. Data: secret,
  119. }
  120. return func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  121. l.ReadWithDataWithContextFn = func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  122. return v, nil
  123. }
  124. return v, nil
  125. }
  126. }
  127. func (f Logical) ReadWithDataWithContext(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  128. return f.ReadWithDataWithContextFn(ctx, path, data)
  129. }
  130. func (f Logical) ListWithContext(ctx context.Context, path string) (*vault.Secret, error) {
  131. return f.ListWithContextFn(ctx, path)
  132. }
  133. func (f Logical) WriteWithContext(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  134. return f.WriteWithContextFn(ctx, path, data)
  135. }
  136. type RevokeSelfWithContextFn func(ctx context.Context, token string) error
  137. type LookupSelfWithContextFn func(ctx context.Context) (*vault.Secret, error)
  138. type Token struct {
  139. RevokeSelfWithContextFn RevokeSelfWithContextFn
  140. LookupSelfWithContextFn LookupSelfWithContextFn
  141. }
  142. func (f Token) RevokeSelfWithContext(ctx context.Context, token string) error {
  143. return f.RevokeSelfWithContextFn(ctx, token)
  144. }
  145. func (f Token) LookupSelfWithContext(ctx context.Context) (*vault.Secret, error) {
  146. return f.LookupSelfWithContextFn(ctx)
  147. }
  148. type MockSetTokenFn func(v string)
  149. type MockTokenFn func() string
  150. type MockClearTokenFn func()
  151. type MockNamespaceFn func() string
  152. type MockSetNamespaceFn func(namespace string)
  153. type MockAddHeaderFn func(key, value string)
  154. type VaultListResponse struct {
  155. Metadata *vault.Response
  156. Data *vault.Response
  157. }
  158. func NewAuthTokenFn() Token {
  159. return Token{nil, func(ctx context.Context) (*vault.Secret, error) {
  160. return &(vault.Secret{}), nil
  161. }}
  162. }
  163. func NewSetTokenFn(ofn ...func(v string)) MockSetTokenFn {
  164. return func(v string) {
  165. for _, fn := range ofn {
  166. fn(v)
  167. }
  168. }
  169. }
  170. func NewTokenFn(v string) MockTokenFn {
  171. return func() string {
  172. return v
  173. }
  174. }
  175. func NewClearTokenFn() MockClearTokenFn {
  176. return func() {
  177. // no-op
  178. }
  179. }
  180. func NewAddHeaderFn() MockAddHeaderFn {
  181. return func(key, value string) {
  182. // no header
  183. }
  184. }
  185. type VaultClient struct {
  186. MockLogical Logical
  187. MockAuth Auth
  188. MockAuthToken Token
  189. MockSetToken MockSetTokenFn
  190. MockToken MockTokenFn
  191. MockClearToken MockClearTokenFn
  192. MockNamespace MockNamespaceFn
  193. MockSetNamespace MockSetNamespaceFn
  194. MockAddHeader MockAddHeaderFn
  195. namespace string
  196. lock sync.RWMutex
  197. }
  198. func (c *VaultClient) Logical() Logical {
  199. return c.MockLogical
  200. }
  201. func NewVaultLogical() Logical {
  202. logical := Logical{
  203. ReadWithDataWithContextFn: func(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error) {
  204. return nil, nil
  205. },
  206. ListWithContextFn: func(ctx context.Context, path string) (*vault.Secret, error) {
  207. return nil, nil
  208. },
  209. WriteWithContextFn: func(ctx context.Context, path string, data map[string]any) (*vault.Secret, error) {
  210. return nil, nil
  211. },
  212. }
  213. return logical
  214. }
  215. func (c *VaultClient) Auth() Auth {
  216. return c.MockAuth
  217. }
  218. func NewVaultAuth() Auth {
  219. auth := Auth{
  220. LoginFn: func(ctx context.Context, authMethod vault.AuthMethod) (*vault.Secret, error) {
  221. return nil, nil
  222. },
  223. }
  224. return auth
  225. }
  226. func (c *VaultClient) AuthToken() Token {
  227. return c.MockAuthToken
  228. }
  229. func (c *VaultClient) SetToken(v string) {
  230. c.MockSetToken(v)
  231. }
  232. func (c *VaultClient) Token() string {
  233. return c.MockToken()
  234. }
  235. func (c *VaultClient) ClearToken() {
  236. c.MockClearToken()
  237. }
  238. func (c *VaultClient) Namespace() string {
  239. c.lock.RLock()
  240. defer c.lock.RUnlock()
  241. ns := c.namespace
  242. return ns
  243. }
  244. func (c *VaultClient) SetNamespace(namespace string) {
  245. c.lock.Lock()
  246. defer c.lock.Unlock()
  247. c.namespace = namespace
  248. }
  249. func (c *VaultClient) AddHeader(key, value string) {
  250. c.MockAddHeader(key, value)
  251. }
  252. func ClientWithLoginMock(config *vault.Config) (util.Client, error) {
  253. return clientWithLoginMockOptions(config)
  254. }
  255. func ModifiableClientWithLoginMock(opts ...func(cl *VaultClient)) func(config *vault.Config) (util.Client, error) {
  256. return func(config *vault.Config) (util.Client, error) {
  257. return clientWithLoginMockOptions(config, opts...)
  258. }
  259. }
  260. func clientWithLoginMockOptions(_ *vault.Config, opts ...func(cl *VaultClient)) (util.Client, error) {
  261. cl := &VaultClient{
  262. MockAuthToken: NewAuthTokenFn(),
  263. MockSetToken: NewSetTokenFn(),
  264. MockToken: NewTokenFn(""),
  265. MockAuth: NewVaultAuth(),
  266. MockLogical: NewVaultLogical(),
  267. }
  268. for _, opt := range opts {
  269. opt(cl)
  270. }
  271. return &util.VaultClient{
  272. SetTokenFunc: cl.SetToken,
  273. TokenFunc: cl.Token,
  274. ClearTokenFunc: cl.ClearToken,
  275. AuthField: cl.Auth(),
  276. AuthTokenField: cl.AuthToken(),
  277. LogicalField: cl.Logical(),
  278. NamespaceFunc: cl.Namespace,
  279. SetNamespaceFunc: cl.SetNamespace,
  280. AddHeaderFunc: cl.AddHeader,
  281. }, nil
  282. }