utils_test.go 27 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package utils
  13. import (
  14. "encoding/json"
  15. "errors"
  16. "reflect"
  17. "testing"
  18. "time"
  19. "github.com/aws/aws-sdk-go/aws"
  20. "github.com/oracle/oci-go-sdk/v65/vault"
  21. v1 "k8s.io/api/core/v1"
  22. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  23. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  24. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  25. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  26. esmetav1 "github.com/external-secrets/external-secrets/apis/meta/v1"
  27. )
  28. const (
  29. base64DecodedValue string = "foo%_?bar"
  30. base64EncodedValue string = "Zm9vJV8/YmFy"
  31. base64URLEncodedValue string = "Zm9vJV8_YmFy"
  32. keyWithEmojis string = "😀foo😁bar😂baz😈bing"
  33. keyWithInvalidChars string = "some-array[0].entity"
  34. keyWithEncodedInvalidChars string = "some-array_U005b_0_U005d_.entity"
  35. )
  36. func TestObjectHash(t *testing.T) {
  37. tests := []struct {
  38. name string
  39. input any
  40. want string
  41. }{
  42. {
  43. name: "A nil should be still working",
  44. input: nil,
  45. want: "60046f14c917c18a9a0f923e191ba0dc",
  46. },
  47. {
  48. name: "We accept a simple scalar value, i.e. string",
  49. input: "hello there",
  50. want: "161bc25962da8fed6d2f59922fb642aa",
  51. },
  52. {
  53. name: "A complex object like a secret is not an issue",
  54. input: v1.Secret{Data: map[string][]byte{
  55. "xx": []byte("yyy"),
  56. }},
  57. want: "85eabdeb376371ffc5a658d7a162eba8",
  58. },
  59. {
  60. name: "map also works",
  61. input: map[string][]byte{
  62. "foo": []byte("value1"),
  63. "bar": []byte("value2"),
  64. },
  65. want: "caa0155759a6a9b3b6ada5a6883ee2bb",
  66. },
  67. }
  68. for _, tt := range tests {
  69. t.Run(tt.name, func(t *testing.T) {
  70. if got := ObjectHash(tt.input); got != tt.want {
  71. t.Errorf("ObjectHash() = %v, want %v", got, tt.want)
  72. }
  73. })
  74. }
  75. }
  76. func TestIsNil(t *testing.T) {
  77. tbl := []struct {
  78. name string
  79. val any
  80. exp bool
  81. }{
  82. {
  83. name: "simple nil val",
  84. val: nil,
  85. exp: true,
  86. },
  87. {
  88. name: "nil slice",
  89. val: (*[]struct{})(nil),
  90. exp: true,
  91. },
  92. {
  93. name: "struct pointer",
  94. val: &testing.T{},
  95. exp: false,
  96. },
  97. {
  98. name: "struct",
  99. val: testing.T{},
  100. exp: false,
  101. },
  102. {
  103. name: "slice of struct",
  104. val: []struct{}{{}},
  105. exp: false,
  106. },
  107. {
  108. name: "slice of ptr",
  109. val: []*testing.T{nil},
  110. exp: false,
  111. },
  112. {
  113. name: "slice",
  114. val: []struct{}(nil),
  115. exp: false,
  116. },
  117. {
  118. name: "int default value",
  119. val: 0,
  120. exp: false,
  121. },
  122. {
  123. name: "empty str",
  124. val: "",
  125. exp: false,
  126. },
  127. {
  128. name: "oracle vault",
  129. val: vault.VaultsClient{},
  130. exp: false,
  131. },
  132. {
  133. name: "func",
  134. val: func() {
  135. // noop for testing and to make linter happy
  136. },
  137. exp: false,
  138. },
  139. {
  140. name: "channel",
  141. val: make(chan struct{}),
  142. exp: false,
  143. },
  144. {
  145. name: "map",
  146. val: map[string]string{},
  147. exp: false,
  148. },
  149. }
  150. for _, row := range tbl {
  151. t.Run(row.name, func(t *testing.T) {
  152. res := IsNil(row.val)
  153. if res != row.exp {
  154. t.Errorf("IsNil(%#v)=%t, expected %t", row.val, res, row.exp)
  155. }
  156. })
  157. }
  158. }
  159. func TestConvertKeys(t *testing.T) {
  160. type args struct {
  161. strategy esv1beta1.ExternalSecretConversionStrategy
  162. in map[string][]byte
  163. }
  164. tests := []struct {
  165. name string
  166. args args
  167. want map[string][]byte
  168. wantErr bool
  169. }{
  170. {
  171. name: "convert with special chars",
  172. args: args{
  173. strategy: esv1beta1.ExternalSecretConversionDefault,
  174. in: map[string][]byte{
  175. "foo$bar%baz*bing": []byte(`noop`),
  176. },
  177. },
  178. want: map[string][]byte{
  179. "foo_bar_baz_bing": []byte(`noop`),
  180. },
  181. },
  182. {
  183. name: "error on collision",
  184. args: args{
  185. strategy: esv1beta1.ExternalSecretConversionDefault,
  186. in: map[string][]byte{
  187. "foo$bar%baz*bing": []byte(`noop`),
  188. "foo_bar_baz$bing": []byte(`noop`),
  189. },
  190. },
  191. wantErr: true,
  192. },
  193. {
  194. name: "convert path",
  195. args: args{
  196. strategy: esv1beta1.ExternalSecretConversionDefault,
  197. in: map[string][]byte{
  198. "/foo/bar/baz/bing": []byte(`noop`),
  199. "foo/bar/baz/bing/": []byte(`noop`),
  200. },
  201. },
  202. want: map[string][]byte{
  203. "_foo_bar_baz_bing": []byte(`noop`),
  204. "foo_bar_baz_bing_": []byte(`noop`),
  205. },
  206. },
  207. {
  208. name: "convert unicode",
  209. args: args{
  210. strategy: esv1beta1.ExternalSecretConversionUnicode,
  211. in: map[string][]byte{
  212. keyWithEmojis: []byte(`noop`),
  213. },
  214. },
  215. want: map[string][]byte{
  216. "_U1f600_foo_U1f601_bar_U1f602_baz_U1f608_bing": []byte(`noop`),
  217. },
  218. },
  219. }
  220. for _, tt := range tests {
  221. t.Run(tt.name, func(t *testing.T) {
  222. got, err := ConvertKeys(tt.args.strategy, tt.args.in)
  223. if (err != nil) != tt.wantErr {
  224. t.Errorf("ConvertKeys() error = %v, wantErr %v", err, tt.wantErr)
  225. return
  226. }
  227. if !reflect.DeepEqual(got, tt.want) {
  228. t.Errorf("ConvertKeys() = %v, want %v", got, tt.want)
  229. }
  230. })
  231. }
  232. }
  233. func TestReverseKeys(t *testing.T) {
  234. type args struct {
  235. encodingStrategy esv1beta1.ExternalSecretConversionStrategy
  236. decodingStrategy esv1alpha1.PushSecretConversionStrategy
  237. in map[string][]byte
  238. }
  239. tests := []struct {
  240. name string
  241. args args
  242. want map[string][]byte
  243. wantErr bool
  244. }{
  245. {
  246. name: "encoding and decoding strategy are selecting Unicode conversion and reverse unicode, so the in and want should match, this test covers Unicode characters beyond the Basic Multilingual Plane (BMP)",
  247. args: args{
  248. encodingStrategy: esv1beta1.ExternalSecretConversionUnicode,
  249. decodingStrategy: esv1alpha1.PushSecretConversionReverseUnicode,
  250. in: map[string][]byte{
  251. keyWithEmojis: []byte(`noop`),
  252. },
  253. },
  254. want: map[string][]byte{
  255. keyWithEmojis: []byte(`noop`),
  256. },
  257. },
  258. {
  259. name: "encoding and decoding strategy are selecting Unicode conversion and reverse unicode, so the in and want should match, this test covers Unicode characters in the Basic Multilingual Plane (BMP)",
  260. args: args{
  261. encodingStrategy: esv1beta1.ExternalSecretConversionUnicode,
  262. decodingStrategy: esv1alpha1.PushSecretConversionReverseUnicode,
  263. in: map[string][]byte{
  264. keyWithInvalidChars: []byte(`noop`),
  265. },
  266. },
  267. want: map[string][]byte{
  268. keyWithInvalidChars: []byte(`noop`),
  269. },
  270. },
  271. {
  272. name: "the encoding strategy is selecting Unicode conversion, but the decoding strategy is none, so we want an encoded representation of the content",
  273. args: args{
  274. encodingStrategy: esv1beta1.ExternalSecretConversionUnicode,
  275. decodingStrategy: esv1alpha1.PushSecretConversionNone,
  276. in: map[string][]byte{
  277. keyWithInvalidChars: []byte(`noop`),
  278. },
  279. },
  280. want: map[string][]byte{
  281. keyWithEncodedInvalidChars: []byte(`noop`),
  282. },
  283. },
  284. }
  285. for _, tt := range tests {
  286. t.Run(tt.name, func(t *testing.T) {
  287. got, err := ConvertKeys(tt.args.encodingStrategy, tt.args.in)
  288. if (err != nil) != tt.wantErr {
  289. t.Errorf("ConvertKeys() error = %v, wantErr %v", err, tt.wantErr)
  290. return
  291. }
  292. got, err = ReverseKeys(tt.args.decodingStrategy, got)
  293. if (err != nil) != tt.wantErr {
  294. t.Errorf("ReverseKeys() error = %v, wantErr %v", err, tt.wantErr)
  295. return
  296. }
  297. if !reflect.DeepEqual(got, tt.want) {
  298. t.Errorf("ReverseKeys() = %v, want %v", got, tt.want)
  299. }
  300. })
  301. }
  302. }
  303. func TestDecode(t *testing.T) {
  304. type args struct {
  305. strategy esv1beta1.ExternalSecretDecodingStrategy
  306. in map[string][]byte
  307. }
  308. tests := []struct {
  309. name string
  310. args args
  311. want map[string][]byte
  312. wantErr bool
  313. }{
  314. {
  315. name: "base64 decoded",
  316. args: args{
  317. strategy: esv1beta1.ExternalSecretDecodeBase64,
  318. in: map[string][]byte{
  319. "foo": []byte("YmFy"),
  320. },
  321. },
  322. want: map[string][]byte{
  323. "foo": []byte("bar"),
  324. },
  325. },
  326. {
  327. name: "invalid base64",
  328. args: args{
  329. strategy: esv1beta1.ExternalSecretDecodeBase64,
  330. in: map[string][]byte{
  331. "foo": []byte("foo"),
  332. },
  333. },
  334. wantErr: true,
  335. },
  336. {
  337. name: "base64url decoded",
  338. args: args{
  339. strategy: esv1beta1.ExternalSecretDecodeBase64URL,
  340. in: map[string][]byte{
  341. "foo": []byte(base64URLEncodedValue),
  342. },
  343. },
  344. want: map[string][]byte{
  345. "foo": []byte(base64DecodedValue),
  346. },
  347. },
  348. {
  349. name: "invalid base64url",
  350. args: args{
  351. strategy: esv1beta1.ExternalSecretDecodeBase64URL,
  352. in: map[string][]byte{
  353. "foo": []byte("foo"),
  354. },
  355. },
  356. wantErr: true,
  357. },
  358. {
  359. name: "none",
  360. args: args{
  361. strategy: esv1beta1.ExternalSecretDecodeNone,
  362. in: map[string][]byte{
  363. "foo": []byte(base64URLEncodedValue),
  364. },
  365. },
  366. want: map[string][]byte{
  367. "foo": []byte(base64URLEncodedValue),
  368. },
  369. },
  370. {
  371. name: "auto",
  372. args: args{
  373. strategy: esv1beta1.ExternalSecretDecodeAuto,
  374. in: map[string][]byte{
  375. "b64": []byte(base64EncodedValue),
  376. "invalidb64": []byte("foo"),
  377. "b64url": []byte(base64URLEncodedValue),
  378. },
  379. },
  380. want: map[string][]byte{
  381. "b64": []byte(base64DecodedValue),
  382. "invalidb64": []byte("foo"),
  383. "b64url": []byte(base64DecodedValue),
  384. },
  385. },
  386. }
  387. for _, tt := range tests {
  388. t.Run(tt.name, func(t *testing.T) {
  389. got, err := DecodeMap(tt.args.strategy, tt.args.in)
  390. if (err != nil) != tt.wantErr {
  391. t.Errorf("DecodeMap() error = %v, wantErr %v", err, tt.wantErr)
  392. return
  393. }
  394. if !reflect.DeepEqual(got, tt.want) {
  395. t.Errorf("DecodeMap() = %v, want %v", got, tt.want)
  396. }
  397. })
  398. }
  399. }
  400. func TestValidate(t *testing.T) {
  401. err := NetworkValidate("http://google.com", 10*time.Second)
  402. if err != nil {
  403. t.Errorf("Connection problem: %v", err)
  404. }
  405. }
  406. func TestRewrite(t *testing.T) {
  407. type args struct {
  408. operations []esv1beta1.ExternalSecretRewrite
  409. in map[string][]byte
  410. }
  411. tests := []struct {
  412. name string
  413. args args
  414. want map[string][]byte
  415. wantErr bool
  416. }{
  417. {
  418. name: "replace of a single key",
  419. args: args{
  420. operations: []esv1beta1.ExternalSecretRewrite{
  421. {
  422. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  423. Source: "-",
  424. Target: "_",
  425. },
  426. },
  427. },
  428. in: map[string][]byte{
  429. "foo-bar": []byte("bar"),
  430. },
  431. },
  432. want: map[string][]byte{
  433. "foo_bar": []byte("bar"),
  434. },
  435. },
  436. {
  437. name: "no operation",
  438. args: args{
  439. operations: []esv1beta1.ExternalSecretRewrite{
  440. {
  441. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  442. Source: "hello",
  443. Target: "world",
  444. },
  445. },
  446. },
  447. in: map[string][]byte{
  448. "foo": []byte("bar"),
  449. },
  450. },
  451. want: map[string][]byte{
  452. "foo": []byte("bar"),
  453. },
  454. },
  455. {
  456. name: "removing prefix from keys",
  457. args: args{
  458. operations: []esv1beta1.ExternalSecretRewrite{
  459. {
  460. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  461. Source: "^my/initial/path/",
  462. Target: "",
  463. },
  464. },
  465. },
  466. in: map[string][]byte{
  467. "my/initial/path/foo": []byte("bar"),
  468. },
  469. },
  470. want: map[string][]byte{
  471. "foo": []byte("bar"),
  472. },
  473. },
  474. {
  475. name: "using un-named capture groups",
  476. args: args{
  477. operations: []esv1beta1.ExternalSecretRewrite{
  478. {
  479. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  480. Source: "f(.*)o",
  481. Target: "a_new_path_$1",
  482. },
  483. },
  484. },
  485. in: map[string][]byte{
  486. "foo": []byte("bar"),
  487. "foodaloo": []byte("barr"),
  488. },
  489. },
  490. want: map[string][]byte{
  491. "a_new_path_o": []byte("bar"),
  492. "a_new_path_oodalo": []byte("barr"),
  493. },
  494. },
  495. {
  496. name: "using named and numbered capture groups",
  497. args: args{
  498. operations: []esv1beta1.ExternalSecretRewrite{
  499. {
  500. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  501. Source: "f(?P<content>.*)o",
  502. Target: "a_new_path_${content}_${1}",
  503. },
  504. },
  505. },
  506. in: map[string][]byte{
  507. "foo": []byte("bar"),
  508. "floo": []byte("barr"),
  509. },
  510. },
  511. want: map[string][]byte{
  512. "a_new_path_o_o": []byte("bar"),
  513. "a_new_path_lo_lo": []byte("barr"),
  514. },
  515. },
  516. {
  517. name: "using sequenced rewrite operations",
  518. args: args{
  519. operations: []esv1beta1.ExternalSecretRewrite{
  520. {
  521. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  522. Source: "my/(.*?)/bar/(.*)",
  523. Target: "$1-$2",
  524. },
  525. },
  526. {
  527. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  528. Source: "-",
  529. Target: "_",
  530. },
  531. },
  532. {
  533. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  534. Source: "ass",
  535. Target: "***",
  536. },
  537. },
  538. },
  539. in: map[string][]byte{
  540. "my/app/bar/key": []byte("bar"),
  541. "my/app/bar/password": []byte("barr"),
  542. },
  543. },
  544. want: map[string][]byte{
  545. "app_key": []byte("bar"),
  546. "app_p***word": []byte("barr"),
  547. },
  548. },
  549. {
  550. name: "using transform rewrite operation to create env var format keys",
  551. args: args{
  552. operations: []esv1beta1.ExternalSecretRewrite{
  553. {
  554. Regexp: &esv1beta1.ExternalSecretRewriteRegexp{
  555. Source: "my/(.*?)/bar/(.*)",
  556. Target: "$1-$2",
  557. },
  558. },
  559. {
  560. Transform: &esv1beta1.ExternalSecretRewriteTransform{
  561. Template: `{{ .value | upper | replace "-" "_" }}`,
  562. },
  563. },
  564. },
  565. in: map[string][]byte{
  566. "my/app/bar/api-key": []byte("bar"),
  567. "my/app/bar/api-password": []byte("barr"),
  568. },
  569. },
  570. want: map[string][]byte{
  571. "APP_API_KEY": []byte("bar"),
  572. "APP_API_PASSWORD": []byte("barr"),
  573. },
  574. },
  575. {
  576. name: "using transform rewrite operation to lower case",
  577. args: args{
  578. operations: []esv1beta1.ExternalSecretRewrite{
  579. {
  580. Transform: &esv1beta1.ExternalSecretRewriteTransform{
  581. Template: `{{ .value | lower }}`,
  582. },
  583. },
  584. },
  585. in: map[string][]byte{
  586. "API_FOO": []byte("bar"),
  587. "KEY_FOO": []byte("barr"),
  588. },
  589. },
  590. want: map[string][]byte{
  591. "api_foo": []byte("bar"),
  592. "key_foo": []byte("barr"),
  593. },
  594. },
  595. }
  596. for _, tt := range tests {
  597. t.Run(tt.name, func(t *testing.T) {
  598. got, err := RewriteMap(tt.args.operations, tt.args.in)
  599. if (err != nil) != tt.wantErr {
  600. t.Errorf("RewriteMap() error = %v, wantErr %v", err, tt.wantErr)
  601. return
  602. }
  603. if !reflect.DeepEqual(got, tt.want) {
  604. t.Errorf("RewriteMap() = %v, want %v", got, tt.want)
  605. }
  606. })
  607. }
  608. }
  609. func TestReverse(t *testing.T) {
  610. type args struct {
  611. strategy esv1alpha1.PushSecretConversionStrategy
  612. in string
  613. }
  614. tests := []struct {
  615. name string
  616. args args
  617. want string
  618. }{
  619. {
  620. name: "do not change the key when using the None strategy",
  621. args: args{
  622. strategy: esv1alpha1.PushSecretConversionNone,
  623. in: keyWithEncodedInvalidChars,
  624. },
  625. want: keyWithEncodedInvalidChars,
  626. },
  627. {
  628. name: "reverse an unicode encoded key",
  629. args: args{
  630. strategy: esv1alpha1.PushSecretConversionReverseUnicode,
  631. in: keyWithEncodedInvalidChars,
  632. },
  633. want: keyWithInvalidChars,
  634. },
  635. {
  636. name: "do not attempt to decode an invalid unicode representation",
  637. args: args{
  638. strategy: esv1alpha1.PushSecretConversionReverseUnicode,
  639. in: "_U0xxx_x_U005b_",
  640. },
  641. want: "_U0xxx_x[",
  642. },
  643. }
  644. for _, tt := range tests {
  645. t.Run(tt.name, func(t *testing.T) {
  646. if got := reverse(tt.args.strategy, tt.args.in); got != tt.want {
  647. t.Errorf("reverse() = %v, want %v", got, tt.want)
  648. }
  649. })
  650. }
  651. }
  652. func TestFetchValueFromMetadata(t *testing.T) {
  653. type args struct {
  654. key string
  655. data *apiextensionsv1.JSON
  656. def any
  657. }
  658. type testCase struct {
  659. name string
  660. args args
  661. wantT any
  662. wantErr bool
  663. }
  664. tests := []testCase{
  665. {
  666. name: "plain dig for an existing key",
  667. args: args{
  668. key: "key",
  669. data: &apiextensionsv1.JSON{
  670. Raw: []byte(
  671. `{"key": "value"}`,
  672. ),
  673. },
  674. def: "def",
  675. },
  676. wantT: "value",
  677. wantErr: false,
  678. },
  679. {
  680. name: "return default if key not found",
  681. args: args{
  682. key: "key2",
  683. data: &apiextensionsv1.JSON{
  684. Raw: []byte(
  685. `{"key": "value"}`,
  686. ),
  687. },
  688. def: "def",
  689. },
  690. wantT: "def",
  691. wantErr: false,
  692. },
  693. {
  694. name: "use a different type",
  695. args: args{
  696. key: "key",
  697. data: &apiextensionsv1.JSON{
  698. Raw: []byte(
  699. `{"key": 123}`,
  700. ),
  701. },
  702. def: 1234,
  703. },
  704. wantT: float64(123), // unmarshal is always float64
  705. wantErr: false,
  706. },
  707. {
  708. name: "digging deeper",
  709. args: args{
  710. key: "key2",
  711. data: &apiextensionsv1.JSON{
  712. Raw: []byte(
  713. `{"key": {"key2": "value"}}`,
  714. ),
  715. },
  716. def: "",
  717. },
  718. wantT: "value",
  719. wantErr: false,
  720. },
  721. }
  722. for _, tt := range tests {
  723. t.Run(tt.name, func(t *testing.T) {
  724. gotT, err := FetchValueFromMetadata(tt.args.key, tt.args.data, tt.args.def)
  725. if (err != nil) != tt.wantErr {
  726. t.Errorf("FetchValueFromMetadata() error = %v, wantErr %v", err, tt.wantErr)
  727. return
  728. }
  729. if !reflect.DeepEqual(gotT, tt.wantT) {
  730. t.Errorf("FetchValueFromMetadata() gotT = %v, want %v", gotT, tt.wantT)
  731. }
  732. })
  733. }
  734. }
  735. func TestGetByteValue(t *testing.T) {
  736. type args struct {
  737. data any
  738. }
  739. type testCase struct {
  740. name string
  741. args args
  742. want []byte
  743. wantErr bool
  744. }
  745. tests := []testCase{
  746. {
  747. name: "string",
  748. args: args{
  749. data: "value",
  750. },
  751. want: []byte("value"),
  752. wantErr: false,
  753. },
  754. {
  755. name: "map of any",
  756. args: args{
  757. data: map[string]any{
  758. "key": "value",
  759. },
  760. },
  761. want: []byte(`{"key":"value"}`),
  762. wantErr: false,
  763. },
  764. {
  765. name: "slice of string",
  766. args: args{
  767. data: []string{"value1", "value2"},
  768. },
  769. want: []byte("value1\nvalue2"),
  770. wantErr: false,
  771. },
  772. {
  773. name: "json.RawMessage",
  774. args: args{
  775. data: json.RawMessage(`{"key":"value"}`),
  776. },
  777. want: []byte(`{"key":"value"}`),
  778. wantErr: false,
  779. },
  780. {
  781. name: "float64",
  782. args: args{
  783. data: 123.45,
  784. },
  785. want: []byte("123.45"),
  786. wantErr: false,
  787. },
  788. {
  789. name: "json.Number",
  790. args: args{
  791. data: json.Number("123.45"),
  792. },
  793. want: []byte("123.45"),
  794. wantErr: false,
  795. },
  796. {
  797. name: "slice of any",
  798. args: args{
  799. data: []any{"value1", "value2"},
  800. },
  801. want: []byte(`["value1","value2"]`),
  802. wantErr: false,
  803. },
  804. {
  805. name: "boolean",
  806. args: args{
  807. data: true,
  808. },
  809. want: []byte("true"),
  810. wantErr: false,
  811. },
  812. {
  813. name: "nil",
  814. args: args{
  815. data: nil,
  816. },
  817. want: []byte(nil),
  818. wantErr: false,
  819. },
  820. }
  821. for _, tt := range tests {
  822. t.Run(tt.name, func(t *testing.T) {
  823. got, err := GetByteValue(tt.args.data)
  824. if (err != nil) != tt.wantErr {
  825. t.Errorf("GetByteValue() error = %v, wantErr %v", err, tt.wantErr)
  826. return
  827. }
  828. if !reflect.DeepEqual(got, tt.want) {
  829. t.Errorf("GetByteValue() = %v, want %v", got, tt.want)
  830. }
  831. })
  832. }
  833. }
  834. func TestCompareStringAndByteSlices(t *testing.T) {
  835. type args struct {
  836. stringValue *string
  837. byteValueSlice []byte
  838. }
  839. type testCase struct {
  840. name string
  841. args args
  842. want bool
  843. wantErr bool
  844. }
  845. tests := []testCase{
  846. {
  847. name: "same contents",
  848. args: args{
  849. stringValue: aws.String("value"),
  850. byteValueSlice: []byte("value"),
  851. },
  852. want: true,
  853. wantErr: true,
  854. }, {
  855. name: "different contents",
  856. args: args{
  857. stringValue: aws.String("value89"),
  858. byteValueSlice: []byte("value"),
  859. },
  860. want: true,
  861. wantErr: false,
  862. }, {
  863. name: "same contents with random",
  864. args: args{
  865. stringValue: aws.String("value89!3#@212"),
  866. byteValueSlice: []byte("value89!3#@212"),
  867. },
  868. want: true,
  869. wantErr: true,
  870. }, {
  871. name: "check Nil",
  872. args: args{
  873. stringValue: nil,
  874. byteValueSlice: []byte("value89!3#@212"),
  875. },
  876. want: false,
  877. wantErr: false,
  878. },
  879. }
  880. for _, tt := range tests {
  881. t.Run(tt.name, func(t *testing.T) {
  882. got := CompareStringAndByteSlices(tt.args.stringValue, tt.args.byteValueSlice)
  883. if got != tt.wantErr {
  884. t.Errorf("CompareStringAndByteSlices() got = %v, want = %v", got, tt.wantErr)
  885. return
  886. }
  887. })
  888. }
  889. }
  890. func TestValidateSecretSelector(t *testing.T) {
  891. tests := []struct {
  892. desc string
  893. store esv1beta1.GenericStore
  894. ref esmetav1.SecretKeySelector
  895. expected error
  896. }{
  897. {
  898. desc: "cluster secret store with namespace reference",
  899. store: &esv1beta1.ClusterSecretStore{
  900. TypeMeta: metav1.TypeMeta{
  901. Kind: esv1beta1.ClusterSecretStoreKind,
  902. },
  903. },
  904. ref: esmetav1.SecretKeySelector{
  905. Namespace: Ptr("test"),
  906. },
  907. expected: nil,
  908. },
  909. {
  910. desc: "secret store without namespace reference",
  911. store: &esv1beta1.SecretStore{
  912. TypeMeta: metav1.TypeMeta{
  913. Kind: esv1beta1.SecretStoreKind,
  914. },
  915. },
  916. ref: esmetav1.SecretKeySelector{},
  917. expected: nil,
  918. },
  919. {
  920. desc: "secret store with the same namespace reference",
  921. store: &esv1beta1.SecretStore{
  922. TypeMeta: metav1.TypeMeta{
  923. Kind: esv1beta1.SecretStoreKind,
  924. },
  925. ObjectMeta: metav1.ObjectMeta{
  926. Namespace: "test",
  927. },
  928. },
  929. ref: esmetav1.SecretKeySelector{
  930. Namespace: Ptr("test"),
  931. },
  932. expected: nil,
  933. },
  934. {
  935. desc: "cluster secret store without namespace reference",
  936. store: &esv1beta1.ClusterSecretStore{
  937. TypeMeta: metav1.TypeMeta{
  938. Kind: esv1beta1.ClusterSecretStoreKind,
  939. },
  940. },
  941. ref: esmetav1.SecretKeySelector{},
  942. expected: errRequireNamespace,
  943. },
  944. {
  945. desc: "secret store with the different namespace reference",
  946. store: &esv1beta1.SecretStore{
  947. TypeMeta: metav1.TypeMeta{
  948. Kind: esv1beta1.SecretStoreKind,
  949. },
  950. ObjectMeta: metav1.ObjectMeta{
  951. Namespace: "test",
  952. },
  953. },
  954. ref: esmetav1.SecretKeySelector{
  955. Namespace: Ptr("different"),
  956. },
  957. expected: errNamespaceNotAllowed,
  958. },
  959. }
  960. for _, tt := range tests {
  961. t.Run(tt.desc, func(t *testing.T) {
  962. got := ValidateSecretSelector(tt.store, tt.ref)
  963. if !errors.Is(got, tt.expected) {
  964. t.Errorf("ValidateSecretSelector() got = %v, want = %v", got, tt.expected)
  965. return
  966. }
  967. })
  968. }
  969. }
  970. func TestValidateReferentSecretSelector(t *testing.T) {
  971. tests := []struct {
  972. desc string
  973. store esv1beta1.GenericStore
  974. ref esmetav1.SecretKeySelector
  975. expected error
  976. }{
  977. {
  978. desc: "cluster secret store with namespace reference",
  979. store: &esv1beta1.ClusterSecretStore{
  980. TypeMeta: metav1.TypeMeta{
  981. Kind: esv1beta1.ClusterSecretStoreKind,
  982. },
  983. },
  984. ref: esmetav1.SecretKeySelector{
  985. Namespace: Ptr("test"),
  986. },
  987. expected: nil,
  988. },
  989. {
  990. desc: "secret store without namespace reference",
  991. store: &esv1beta1.SecretStore{
  992. TypeMeta: metav1.TypeMeta{
  993. Kind: esv1beta1.SecretStoreKind,
  994. },
  995. },
  996. ref: esmetav1.SecretKeySelector{},
  997. expected: nil,
  998. },
  999. {
  1000. desc: "secret store with the same namespace reference",
  1001. store: &esv1beta1.SecretStore{
  1002. TypeMeta: metav1.TypeMeta{
  1003. Kind: esv1beta1.SecretStoreKind,
  1004. },
  1005. ObjectMeta: metav1.ObjectMeta{
  1006. Namespace: "test",
  1007. },
  1008. },
  1009. ref: esmetav1.SecretKeySelector{
  1010. Namespace: Ptr("test"),
  1011. },
  1012. expected: nil,
  1013. },
  1014. {
  1015. desc: "secret store with the different namespace reference",
  1016. store: &esv1beta1.SecretStore{
  1017. TypeMeta: metav1.TypeMeta{
  1018. Kind: esv1beta1.SecretStoreKind,
  1019. },
  1020. ObjectMeta: metav1.ObjectMeta{
  1021. Namespace: "test",
  1022. },
  1023. },
  1024. ref: esmetav1.SecretKeySelector{
  1025. Namespace: Ptr("different"),
  1026. },
  1027. expected: errNamespaceNotAllowed,
  1028. },
  1029. }
  1030. for _, tt := range tests {
  1031. t.Run(tt.desc, func(t *testing.T) {
  1032. got := ValidateReferentSecretSelector(tt.store, tt.ref)
  1033. if !errors.Is(got, tt.expected) {
  1034. t.Errorf("ValidateReferentSecretSelector() got = %v, want = %v", got, tt.expected)
  1035. return
  1036. }
  1037. })
  1038. }
  1039. }
  1040. func TestValidateServiceAccountSelector(t *testing.T) {
  1041. tests := []struct {
  1042. desc string
  1043. store esv1beta1.GenericStore
  1044. ref esmetav1.ServiceAccountSelector
  1045. expected error
  1046. }{
  1047. {
  1048. desc: "cluster secret store with namespace reference",
  1049. store: &esv1beta1.ClusterSecretStore{
  1050. TypeMeta: metav1.TypeMeta{
  1051. Kind: esv1beta1.ClusterSecretStoreKind,
  1052. },
  1053. },
  1054. ref: esmetav1.ServiceAccountSelector{
  1055. Namespace: Ptr("test"),
  1056. },
  1057. expected: nil,
  1058. },
  1059. {
  1060. desc: "secret store without namespace reference",
  1061. store: &esv1beta1.SecretStore{
  1062. TypeMeta: metav1.TypeMeta{
  1063. Kind: esv1beta1.SecretStoreKind,
  1064. },
  1065. },
  1066. ref: esmetav1.ServiceAccountSelector{},
  1067. expected: nil,
  1068. },
  1069. {
  1070. desc: "secret store with the same namespace reference",
  1071. store: &esv1beta1.SecretStore{
  1072. TypeMeta: metav1.TypeMeta{
  1073. Kind: esv1beta1.SecretStoreKind,
  1074. },
  1075. ObjectMeta: metav1.ObjectMeta{
  1076. Namespace: "test",
  1077. },
  1078. },
  1079. ref: esmetav1.ServiceAccountSelector{
  1080. Namespace: Ptr("test"),
  1081. },
  1082. expected: nil,
  1083. },
  1084. {
  1085. desc: "cluster secret store without namespace reference",
  1086. store: &esv1beta1.ClusterSecretStore{
  1087. TypeMeta: metav1.TypeMeta{
  1088. Kind: esv1beta1.ClusterSecretStoreKind,
  1089. },
  1090. },
  1091. ref: esmetav1.ServiceAccountSelector{},
  1092. expected: errRequireNamespace,
  1093. },
  1094. {
  1095. desc: "secret store with the different namespace reference",
  1096. store: &esv1beta1.SecretStore{
  1097. TypeMeta: metav1.TypeMeta{
  1098. Kind: esv1beta1.SecretStoreKind,
  1099. },
  1100. ObjectMeta: metav1.ObjectMeta{
  1101. Namespace: "test",
  1102. },
  1103. },
  1104. ref: esmetav1.ServiceAccountSelector{
  1105. Namespace: Ptr("different"),
  1106. },
  1107. expected: errNamespaceNotAllowed,
  1108. },
  1109. }
  1110. for _, tt := range tests {
  1111. t.Run(tt.desc, func(t *testing.T) {
  1112. got := ValidateServiceAccountSelector(tt.store, tt.ref)
  1113. if !errors.Is(got, tt.expected) {
  1114. t.Errorf("ValidateServiceAccountSelector() got = %v, want = %v", got, tt.expected)
  1115. return
  1116. }
  1117. })
  1118. }
  1119. }
  1120. func TestValidateReferentServiceAccountSelector(t *testing.T) {
  1121. tests := []struct {
  1122. desc string
  1123. store esv1beta1.GenericStore
  1124. ref esmetav1.ServiceAccountSelector
  1125. expected error
  1126. }{
  1127. {
  1128. desc: "cluster secret store with namespace reference",
  1129. store: &esv1beta1.ClusterSecretStore{
  1130. TypeMeta: metav1.TypeMeta{
  1131. Kind: esv1beta1.ClusterSecretStoreKind,
  1132. },
  1133. },
  1134. ref: esmetav1.ServiceAccountSelector{
  1135. Namespace: Ptr("test"),
  1136. },
  1137. expected: nil,
  1138. },
  1139. {
  1140. desc: "secret store without namespace reference",
  1141. store: &esv1beta1.SecretStore{
  1142. TypeMeta: metav1.TypeMeta{
  1143. Kind: esv1beta1.SecretStoreKind,
  1144. },
  1145. },
  1146. ref: esmetav1.ServiceAccountSelector{},
  1147. expected: nil,
  1148. },
  1149. {
  1150. desc: "secret store with the same namespace reference",
  1151. store: &esv1beta1.SecretStore{
  1152. TypeMeta: metav1.TypeMeta{
  1153. Kind: esv1beta1.SecretStoreKind,
  1154. },
  1155. ObjectMeta: metav1.ObjectMeta{
  1156. Namespace: "test",
  1157. },
  1158. },
  1159. ref: esmetav1.ServiceAccountSelector{
  1160. Namespace: Ptr("test"),
  1161. },
  1162. expected: nil,
  1163. },
  1164. {
  1165. desc: "secret store with the different namespace reference",
  1166. store: &esv1beta1.SecretStore{
  1167. TypeMeta: metav1.TypeMeta{
  1168. Kind: esv1beta1.SecretStoreKind,
  1169. },
  1170. ObjectMeta: metav1.ObjectMeta{
  1171. Namespace: "test",
  1172. },
  1173. },
  1174. ref: esmetav1.ServiceAccountSelector{
  1175. Namespace: Ptr("different"),
  1176. },
  1177. expected: errNamespaceNotAllowed,
  1178. },
  1179. }
  1180. for _, tt := range tests {
  1181. t.Run(tt.desc, func(t *testing.T) {
  1182. got := ValidateReferentServiceAccountSelector(tt.store, tt.ref)
  1183. if !errors.Is(got, tt.expected) {
  1184. t.Errorf("ValidateReferentServiceAccountSelector() got = %v, want = %v", got, tt.expected)
  1185. return
  1186. }
  1187. })
  1188. }
  1189. }