parameterstore_test.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package parameterstore
  13. import (
  14. "context"
  15. "fmt"
  16. "strings"
  17. "testing"
  18. "github.com/aws/aws-sdk-go/aws"
  19. "github.com/aws/aws-sdk-go/service/ssm"
  20. "github.com/google/go-cmp/cmp"
  21. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  22. fake "github.com/external-secrets/external-secrets/pkg/provider/aws/parameterstore/fake"
  23. )
  24. type parameterstoreTestCase struct {
  25. fakeClient *fake.Client
  26. apiInput *ssm.GetParameterInput
  27. apiOutput *ssm.GetParameterOutput
  28. remoteRef *esv1alpha1.ExternalSecretDataRemoteRef
  29. apiErr error
  30. expectError string
  31. expectedSecret string
  32. expectedData map[string]string
  33. }
  34. func makeValidParameterStoreTestCase() *parameterstoreTestCase {
  35. return &parameterstoreTestCase{
  36. fakeClient: &fake.Client{},
  37. apiInput: makeValidAPIInput(),
  38. apiOutput: makeValidAPIOutput(),
  39. remoteRef: makeValidRemoteRef(),
  40. apiErr: nil,
  41. expectError: "",
  42. expectedSecret: "",
  43. expectedData: make(map[string]string),
  44. }
  45. }
  46. func makeValidAPIInput() *ssm.GetParameterInput {
  47. return &ssm.GetParameterInput{
  48. Name: aws.String("/baz"),
  49. WithDecryption: aws.Bool(true),
  50. }
  51. }
  52. func makeValidAPIOutput() *ssm.GetParameterOutput {
  53. return &ssm.GetParameterOutput{
  54. Parameter: &ssm.Parameter{
  55. Value: aws.String("RRRRR"),
  56. },
  57. }
  58. }
  59. func makeValidRemoteRef() *esv1alpha1.ExternalSecretDataRemoteRef {
  60. return &esv1alpha1.ExternalSecretDataRemoteRef{
  61. Extract: esv1alpha1.ExternalSecretExtract{
  62. Key: "/baz",
  63. },
  64. }
  65. }
  66. func makeValidParameterStoreTestCaseCustom(tweaks ...func(pstc *parameterstoreTestCase)) *parameterstoreTestCase {
  67. pstc := makeValidParameterStoreTestCase()
  68. for _, fn := range tweaks {
  69. fn(pstc)
  70. }
  71. pstc.fakeClient.WithValue(pstc.apiInput, pstc.apiOutput, pstc.apiErr)
  72. return pstc
  73. }
  74. // test the ssm<->aws interface
  75. // make sure correct values are passed and errors are handled accordingly.
  76. func TestGetSecret(t *testing.T) {
  77. // good case: key is passed in, output is sent back
  78. setSecretString := func(pstc *parameterstoreTestCase) {
  79. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  80. pstc.expectedSecret = "RRRRR"
  81. }
  82. // good case: extract property
  83. setExtractProperty := func(pstc *parameterstoreTestCase) {
  84. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  85. pstc.expectedSecret = "bang"
  86. pstc.remoteRef.Extract.Property = "/shmoo"
  87. }
  88. // bad case: missing property
  89. setMissingProperty := func(pstc *parameterstoreTestCase) {
  90. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  91. pstc.remoteRef.Extract.Property = "INVALPROP"
  92. pstc.expectError = "key INVALPROP does not exist in secret"
  93. }
  94. // bad case: extract property failure due to invalid json
  95. setPropertyFail := func(pstc *parameterstoreTestCase) {
  96. pstc.apiOutput.Parameter.Value = aws.String(`------`)
  97. pstc.remoteRef.Extract.Property = "INVALPROP"
  98. pstc.expectError = "key INVALPROP does not exist in secret"
  99. }
  100. // bad case: parameter.Value may be nil but binary is set
  101. setParameterValueNil := func(pstc *parameterstoreTestCase) {
  102. pstc.apiOutput.Parameter.Value = nil
  103. pstc.expectError = "parameter value is nil for key"
  104. }
  105. // base case: api output return error
  106. setAPIError := func(pstc *parameterstoreTestCase) {
  107. pstc.apiOutput = &ssm.GetParameterOutput{}
  108. pstc.apiErr = fmt.Errorf("oh no")
  109. pstc.expectError = "oh no"
  110. }
  111. successCases := []*parameterstoreTestCase{
  112. makeValidParameterStoreTestCaseCustom(setSecretString),
  113. makeValidParameterStoreTestCaseCustom(setExtractProperty),
  114. makeValidParameterStoreTestCaseCustom(setMissingProperty),
  115. makeValidParameterStoreTestCaseCustom(setPropertyFail),
  116. makeValidParameterStoreTestCaseCustom(setParameterValueNil),
  117. makeValidParameterStoreTestCaseCustom(setAPIError),
  118. }
  119. ps := ParameterStore{}
  120. for k, v := range successCases {
  121. ps.client = v.fakeClient
  122. out, err := ps.GetSecret(context.Background(), *v.remoteRef)
  123. if !ErrorContains(err, v.expectError) {
  124. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  125. }
  126. if cmp.Equal(out, v.expectedSecret) {
  127. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedSecret, out)
  128. }
  129. }
  130. }
  131. func TestGetSecretMap(t *testing.T) {
  132. // good case: default version & deserialization
  133. setDeserialization := func(pstc *parameterstoreTestCase) {
  134. pstc.apiOutput.Parameter.Value = aws.String(`{"foo":"bar"}`)
  135. pstc.expectedData["foo"] = "bar"
  136. }
  137. // bad case: api error returned
  138. setAPIError := func(pstc *parameterstoreTestCase) {
  139. pstc.apiOutput.Parameter = &ssm.Parameter{}
  140. pstc.expectError = "some api err"
  141. pstc.apiErr = fmt.Errorf("some api err")
  142. }
  143. // bad case: invalid json
  144. setInvalidJSON := func(pstc *parameterstoreTestCase) {
  145. pstc.apiOutput.Parameter.Value = aws.String(`-----------------`)
  146. pstc.expectError = "unable to unmarshal secret"
  147. }
  148. successCases := []*parameterstoreTestCase{
  149. makeValidParameterStoreTestCaseCustom(setDeserialization),
  150. makeValidParameterStoreTestCaseCustom(setAPIError),
  151. makeValidParameterStoreTestCaseCustom(setInvalidJSON),
  152. }
  153. ps := ParameterStore{}
  154. for k, v := range successCases {
  155. ps.client = v.fakeClient
  156. out, err := ps.GetSecretMap(context.Background(), *v.remoteRef)
  157. if !ErrorContains(err, v.expectError) {
  158. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  159. }
  160. if cmp.Equal(out, v.expectedData) {
  161. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedData, out)
  162. }
  163. }
  164. }
  165. func ErrorContains(out error, want string) bool {
  166. if out == nil {
  167. return want == ""
  168. }
  169. if want == "" {
  170. return false
  171. }
  172. return strings.Contains(out.Error(), want)
  173. }