| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package onepassword
- import (
- "context"
- "errors"
- "fmt"
- "reflect"
- "testing"
- "github.com/1Password/connect-sdk-go/onepassword"
- corev1 "k8s.io/api/core/v1"
- apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- pointer "k8s.io/utils/ptr"
- esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
- esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
- fake "github.com/external-secrets/external-secrets/pkg/provider/onepassword/fake"
- )
- const (
- // vaults and items.
- myVault, myVaultID = "my-vault", "my-vault-id"
- myItem, myItemID = "my-item", "my-item-id"
- mySharedVault, mySharedVaultID = "my-shared-vault", "my-shared-vault-id"
- mySharedItem, mySharedItemID = "my-shared-item", "my-shared-item-id"
- myOtherVault, myOtherVaultID = "my-other-vault", "my-other-vault-id"
- myOtherItem, myOtherItemID = "my-other-item", "my-other-item-id"
- myNonMatchingVault, myNonMatchingVaultID = "my-non-matching-vault", "my-non-matching-vault-id"
- myNonMatchingItem, myNonMatchingItemID = "my-non-matching-item", "my-non-matching-item-id"
- // fields and files.
- key1, key2, key3, key4 = "key1", "key2", "key3", "key4"
- value1, value2, value3, value4 = "value1", "value2", "value3", "value4"
- sharedKey1, sharedValue1 = "sharedkey1", "sharedvalue1"
- otherKey1 = "otherkey1"
- filePNG, filePNGID = "file.png", "file-id"
- myFilePNG, myFilePNGID, myContents = "my-file.png", "my-file-id", "my-contents"
- mySecondFileTXT, mySecondFileTXTID = "my-second-file.txt", "my-second-file-id"
- mySecondContents = "my-second-contents"
- myFile2PNG, myFile2TXT = "my-file-2.png", "my-file-2.txt"
- myFile2ID, myContents2 = "my-file-2-id", "my-contents-2"
- myOtherFilePNG, myOtherFilePNGID = "my-other-file.png", "my-other-file-id"
- myOtherContents = "my-other-contents"
- nonMatchingFilePNG, nonMatchingFilePNGID = "non-matching-file.png", "non-matching-file-id"
- nonMatchingContents = "non-matching-contents"
- // other.
- mySecret, token, password = "my-secret", "token", "password"
- one, two, three = "one", "two", "three"
- connectHost = "https://example.com"
- setupCheckFormat = "Setup: '%s', Check: '%s'"
- getSecretMapErrFormat = "%s: onepassword.GetSecretMap(...): -expected, +got:\n-%#v\n+%#v\n"
- getSecretErrFormat = "%s: onepassword.GetSecret(...): -expected, +got:\n-%#v\n+%#v\n"
- getAllSecretsErrFormat = "%s: onepassword.GetAllSecrets(...): -expected, +got:\n-%#v\n+%#v\n"
- validateStoreErrFormat = "%s: onepassword.validateStore(...): -expected, +got:\n-%#v\n+%#v\n"
- findItemErrFormat = "%s: onepassword.findItem(...): -expected, +got:\n-%#v\n+%#v\n"
- errFromErrMsgF = "%w: %s"
- errDoesNotMatchMsgF = "%s: error did not match: -expected, +got:\\n-%#v\\n+%#v\\n"
- )
- func TestFindItem(t *testing.T) {
- type check struct {
- checkNote string
- findItemName string
- expectedItem *onepassword.Item
- expectedErr error
- }
- type testCase struct {
- setupNote string
- provider *ProviderOnePassword
- checks []check
- }
- testCases := []testCase{
- {
- setupNote: "valid basic: one vault, one item, one field",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1),
- },
- checks: []check{
- {
- checkNote: "pass",
- findItemName: myItem,
- expectedErr: nil,
- expectedItem: &onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myVaultID},
- Fields: []*onepassword.ItemField{
- {
- Label: key1,
- Value: value1,
- },
- },
- },
- },
- },
- },
- {
- setupNote: "multiple vaults, multiple items",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1, mySharedVault: 2},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AddPredictableVault(mySharedVault).
- AddPredictableItemWithField(mySharedVault, mySharedItem, sharedKey1, sharedValue1),
- },
- checks: []check{
- {
- checkNote: "can still get myItem",
- findItemName: myItem,
- expectedErr: nil,
- expectedItem: &onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myVaultID},
- Fields: []*onepassword.ItemField{
- {
- Label: key1,
- Value: value1,
- },
- },
- },
- },
- {
- checkNote: "can also get mySharedItem",
- findItemName: mySharedItem,
- expectedErr: nil,
- expectedItem: &onepassword.Item{
- ID: mySharedItemID,
- Title: mySharedItem,
- Vault: onepassword.ItemVault{ID: mySharedVaultID},
- Fields: []*onepassword.ItemField{
- {
- Label: sharedKey1,
- Value: sharedValue1,
- },
- },
- },
- },
- },
- },
- {
- setupNote: "multiple vault matches when should be one",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1, mySharedVault: 2},
- client: fake.NewMockClient().
- AppendVault(myVault, onepassword.Vault{
- ID: myVaultID,
- Name: myVault,
- }).
- AppendVault(myVault, onepassword.Vault{
- ID: "my-vault-extra-match-id",
- Name: "my-vault-extra-match",
- }),
- },
- checks: []check{
- {
- checkNote: "two vaults",
- findItemName: myItem,
- expectedErr: fmt.Errorf("key not found in 1Password Vaults: my-item in: map[my-shared-vault:2 my-vault:1]"),
- },
- },
- },
- {
- setupNote: "no item matches when should be one",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault),
- },
- checks: []check{
- {
- checkNote: "no exist",
- findItemName: "my-item-no-exist",
- expectedErr: fmt.Errorf("%w: my-item-no-exist in: map[my-vault:1]", ErrKeyNotFound),
- },
- },
- },
- {
- setupNote: "multiple item matches when should be one",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AppendItem(myVaultID, onepassword.Item{
- ID: "asdf",
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myVaultID},
- }),
- },
- checks: []check{
- {
- checkNote: "multiple match",
- findItemName: myItem,
- expectedErr: fmt.Errorf(errFromErrMsgF, ErrExpectedOneItem, "'my-item', got 2"),
- },
- },
- },
- {
- setupNote: "ordered vaults",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1, mySharedVault: 2, myOtherVault: 3},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableVault(mySharedVault).
- AddPredictableVault(myOtherVault).
- // // my-item
- // returned: my-item in my-vault
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- // preempted: my-item in my-shared-vault
- AppendItem(mySharedVaultID, onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: mySharedVaultID},
- }).
- AppendItemField(mySharedVaultID, myItemID, onepassword.ItemField{
- Label: key1,
- Value: "value1-from-my-shared-vault",
- }).
- // preempted: my-item in my-other-vault
- AppendItem(myOtherVaultID, onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myOtherVaultID},
- }).
- AppendItemField(myOtherVaultID, myItemID, onepassword.ItemField{
- Label: key1,
- Value: "value1-from-my-other-vault",
- }).
- // // my-shared-item
- // returned: my-shared-item in my-shared-vault
- AddPredictableItemWithField(mySharedVault, mySharedItem, sharedKey1, "sharedvalue1-from-my-shared-vault").
- // preempted: my-shared-item in my-other-vault
- AppendItem(myOtherVaultID, onepassword.Item{
- ID: mySharedItemID,
- Title: mySharedItem,
- Vault: onepassword.ItemVault{ID: myOtherVaultID},
- }).
- AppendItemField(myOtherVaultID, mySharedItemID, onepassword.ItemField{
- Label: sharedKey1,
- Value: "sharedvalue1-from-my-other-vault",
- }).
- // // my-other-item
- // returned: my-other-item in my-other-vault
- AddPredictableItemWithField(myOtherVault, myOtherItem, otherKey1, "othervalue1-from-my-other-vault"),
- },
- checks: []check{
- {
- // my-item in all three vaults, gets the one from my-vault
- checkNote: "gets item from my-vault",
- findItemName: myItem,
- expectedErr: nil,
- expectedItem: &onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myVaultID},
- Fields: []*onepassword.ItemField{
- {
- Label: key1,
- Value: value1,
- },
- },
- },
- },
- {
- // my-shared-item in my-shared-vault and my-other-vault, gets the one from my-shared-vault
- checkNote: "gets item from my-shared-vault",
- findItemName: mySharedItem,
- expectedErr: nil,
- expectedItem: &onepassword.Item{
- ID: mySharedItemID,
- Title: mySharedItem,
- Vault: onepassword.ItemVault{ID: mySharedVaultID},
- Fields: []*onepassword.ItemField{
- {
- Label: sharedKey1,
- Value: "sharedvalue1-from-my-shared-vault",
- },
- },
- },
- },
- {
- // my-other-item in my-other-vault
- checkNote: "gets item from my-other-vault",
- findItemName: myOtherItem,
- expectedErr: nil,
- expectedItem: &onepassword.Item{
- ID: myOtherItemID,
- Title: myOtherItem,
- Vault: onepassword.ItemVault{ID: myOtherVaultID},
- Fields: []*onepassword.ItemField{
- {
- Label: otherKey1,
- Value: "othervalue1-from-my-other-vault",
- },
- },
- },
- },
- },
- },
- }
- // run the tests
- for _, tc := range testCases {
- for _, check := range tc.checks {
- got, err := tc.provider.findItem(check.findItemName)
- notes := fmt.Sprintf(setupCheckFormat, tc.setupNote, check.checkNote)
- if check.expectedErr == nil && err != nil {
- // expected no error, got one
- t.Errorf(findItemErrFormat, notes, nil, err)
- }
- if check.expectedErr != nil && err == nil {
- // expected an error, didn't get one
- t.Errorf(findItemErrFormat, notes, check.expectedErr.Error(), nil)
- }
- if check.expectedErr != nil && err != nil && err.Error() != check.expectedErr.Error() {
- // expected an error, got the wrong one
- t.Errorf(findItemErrFormat, notes, check.expectedErr.Error(), err.Error())
- }
- if check.expectedItem != nil {
- if !reflect.DeepEqual(check.expectedItem, got) {
- // expected a predefined item, got something else
- t.Errorf(findItemErrFormat, notes, check.expectedItem, got)
- }
- }
- }
- }
- }
- func TestValidateStore(t *testing.T) {
- type testCase struct {
- checkNote string
- store *esv1beta1.SecretStore
- clusterStore *esv1beta1.ClusterSecretStore
- expectedErr error
- }
- testCases := []testCase{
- {
- checkNote: "invalid: nil provider",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: nil,
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpecProvider)),
- },
- {
- checkNote: "invalid: nil OnePassword provider spec",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: nil,
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpecProviderOnePassword)),
- },
- {
- checkNote: "valid secretStore",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- Key: token,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{
- myVault: 1,
- },
- },
- },
- },
- },
- expectedErr: nil,
- },
- {
- checkNote: "invalid: illegal namespace on SecretStore",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- Namespace: pointer.To("my-namespace"),
- Key: token,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{
- myVault: 1,
- myOtherVault: 2,
- },
- },
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf("namespace not allowed with namespaced SecretStore")),
- },
- {
- checkNote: "invalid: more than one vault with the same number",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- Key: token,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{
- myVault: 1,
- myOtherVault: 1,
- },
- },
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNonUniqueVaultNumbers)),
- },
- {
- checkNote: "valid: clusterSecretStore",
- clusterStore: &esv1beta1.ClusterSecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "ClusterSecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- Namespace: pointer.To("my-namespace"),
- Key: token,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{
- myVault: 1,
- },
- },
- },
- },
- },
- expectedErr: nil,
- },
- {
- checkNote: "invalid: clusterSecretStore without namespace",
- clusterStore: &esv1beta1.ClusterSecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "ClusterSecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- Key: token,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{
- myVault: 1,
- myOtherVault: 2,
- },
- },
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf("cluster scope requires namespace")),
- },
- {
- checkNote: "invalid: missing connectTokenSecretRef.name",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Key: token,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{
- myVault: 1,
- myOtherVault: 2,
- },
- },
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreMissingRefName)),
- },
- {
- checkNote: "invalid: missing connectTokenSecretRef.key",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{
- myVault: 1,
- myOtherVault: 2,
- },
- },
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreMissingRefKey)),
- },
- {
- checkNote: "invalid: at least one vault",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- Key: token,
- },
- },
- },
- ConnectHost: connectHost,
- Vaults: map[string]int{},
- },
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreAtLeastOneVault)),
- },
- {
- checkNote: "invalid: url",
- store: &esv1beta1.SecretStore{
- TypeMeta: metav1.TypeMeta{
- Kind: "SecretStore",
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- OnePassword: &esv1beta1.OnePasswordProvider{
- Auth: &esv1beta1.OnePasswordAuth{
- SecretRef: &esv1beta1.OnePasswordAuthSecretRef{
- ConnectToken: esmeta.SecretKeySelector{
- Name: mySecret,
- Key: token,
- },
- },
- },
- ConnectHost: ":/invalid.invalid",
- Vaults: map[string]int{
- myVault: 1,
- },
- },
- },
- },
- },
- expectedErr: fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreInvalidConnectHost, fmt.Errorf("parse \":/invalid.invalid\": missing protocol scheme"))),
- },
- }
- // run the tests
- for _, tc := range testCases {
- var err error
- if tc.store == nil {
- err = validateStore(tc.clusterStore)
- } else {
- err = validateStore(tc.store)
- }
- notes := fmt.Sprintf("Check: '%s'", tc.checkNote)
- if tc.expectedErr == nil && err != nil {
- // expected no error, got one
- t.Errorf(validateStoreErrFormat, notes, nil, err)
- }
- if tc.expectedErr != nil && err == nil {
- // expected an error, didn't get one
- t.Errorf(validateStoreErrFormat, notes, tc.expectedErr.Error(), nil)
- }
- if tc.expectedErr != nil && err != nil && err.Error() != tc.expectedErr.Error() {
- // expected an error, got the wrong one
- t.Errorf(validateStoreErrFormat, notes, tc.expectedErr.Error(), err.Error())
- }
- }
- }
- // most functionality is tested in TestFindItem
- //
- // here we just check that an empty Property defaults to "password",
- // files are loaded, and
- // the data or errors are properly returned
- func TestGetSecret(t *testing.T) {
- type check struct {
- checkNote string
- ref esv1beta1.ExternalSecretDataRemoteRef
- expectedValue string
- expectedErr error
- }
- type testCase struct {
- setupNote string
- provider *ProviderOnePassword
- checks []check
- }
- testCases := []testCase{
- {
- setupNote: "one vault, one item, two fields",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AppendItemField(myVaultID, myItemID, onepassword.ItemField{
- Label: password,
- Value: value2,
- }),
- },
- checks: []check{
- {
- checkNote: key1,
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: key1,
- },
- expectedValue: value1,
- expectedErr: nil,
- },
- {
- checkNote: "'password' (defaulted property)",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- },
- expectedValue: value2,
- expectedErr: nil,
- },
- {
- checkNote: "'ref.version' not implemented",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: key1,
- Version: "123",
- },
- expectedErr: fmt.Errorf(errVersionNotImplemented),
- },
- },
- },
- {
- setupNote: "files are loaded",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AppendItem(myVaultID, onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: myFilePNGID,
- Name: myFilePNG,
- },
- },
- }).
- SetFileContents(myFilePNG, []byte(myContents)),
- },
- checks: []check{
- {
- checkNote: "file named my-file.png",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: myFilePNG,
- },
- expectedValue: myContents,
- expectedErr: nil,
- },
- {
- checkNote: "empty ref.Property",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- },
- expectedValue: myContents,
- expectedErr: nil,
- },
- {
- checkNote: "file non existent",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: "you-cant-find-me.png",
- },
- expectedErr: fmt.Errorf(errDocumentNotFound, fmt.Errorf("'my-item', 'you-cant-find-me.png'")),
- },
- },
- },
- {
- setupNote: "one vault, one item, two fields w/ same Label",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AppendItemField(myVaultID, myItemID, onepassword.ItemField{
- Label: key1,
- Value: value2,
- }),
- },
- checks: []check{
- {
- checkNote: key1,
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: key1,
- },
- expectedErr: fmt.Errorf(errFromErrMsgF, ErrExpectedOneField, "'key1' in 'my-item', got 2"),
- },
- },
- },
- }
- // run the tests
- for _, tc := range testCases {
- for _, check := range tc.checks {
- got, err := tc.provider.GetSecret(context.Background(), check.ref)
- notes := fmt.Sprintf(setupCheckFormat, tc.setupNote, check.checkNote)
- if check.expectedErr == nil && err != nil {
- // expected no error, got one
- t.Errorf(getSecretErrFormat, notes, nil, err)
- }
- if check.expectedErr != nil && err == nil {
- // expected an error, didn't get one
- t.Errorf(getSecretErrFormat, notes, check.expectedErr.Error(), nil)
- }
- if check.expectedErr != nil && err != nil && err.Error() != check.expectedErr.Error() {
- // expected an error, got the wrong one
- t.Errorf(getSecretErrFormat, notes, check.expectedErr.Error(), err.Error())
- }
- if check.expectedValue != "" {
- if check.expectedValue != string(got) {
- // expected a predefined value, got something else
- t.Errorf(getSecretErrFormat, notes, check.expectedValue, string(got))
- }
- }
- }
- }
- }
- // most functionality is tested in TestFindItem. here we just check:
- //
- // all keys are fetched and the map is compiled correctly,
- // files are loaded, and the data or errors are properly returned.
- func TestGetSecretMap(t *testing.T) {
- type check struct {
- checkNote string
- ref esv1beta1.ExternalSecretDataRemoteRef
- expectedMap map[string][]byte
- expectedErr error
- }
- type testCase struct {
- setupNote string
- provider *ProviderOnePassword
- checks []check
- }
- testCases := []testCase{
- {
- setupNote: "one vault, one item, two fields",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AppendItemField(myVaultID, myItemID, onepassword.ItemField{
- Label: password,
- Value: value2,
- }),
- },
- checks: []check{
- {
- checkNote: "all Properties",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- },
- expectedMap: map[string][]byte{
- key1: []byte(value1),
- password: []byte(value2),
- },
- expectedErr: nil,
- },
- {
- checkNote: "limit by Property",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: password,
- },
- expectedMap: map[string][]byte{
- password: []byte(value2),
- },
- expectedErr: nil,
- },
- {
- checkNote: "'ref.version' not implemented",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: key1,
- Version: "123",
- },
- expectedErr: fmt.Errorf(errVersionNotImplemented),
- },
- },
- },
- {
- setupNote: "files",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AppendItem(myVaultID, onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: myFilePNGID,
- Name: myFilePNG,
- },
- {
- ID: myFile2ID,
- Name: myFile2PNG,
- },
- },
- }).
- SetFileContents(myFilePNG, []byte(myContents)).
- SetFileContents(myFile2PNG, []byte(myContents2)),
- },
- checks: []check{
- {
- checkNote: "all Properties",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- },
- expectedMap: map[string][]byte{
- myFilePNG: []byte(myContents),
- myFile2PNG: []byte(myContents2),
- },
- expectedErr: nil,
- },
- {
- checkNote: "limit by Property",
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- Property: myFilePNG,
- },
- expectedMap: map[string][]byte{
- myFilePNG: []byte(myContents),
- },
- expectedErr: nil,
- },
- },
- },
- {
- setupNote: "one vault, one item, two fields w/ same Label",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AppendItemField(myVaultID, myItemID, onepassword.ItemField{
- Label: key1,
- Value: value2,
- }),
- },
- checks: []check{
- {
- checkNote: key1,
- ref: esv1beta1.ExternalSecretDataRemoteRef{
- Key: myItem,
- },
- expectedMap: nil,
- expectedErr: fmt.Errorf(errFromErrMsgF, ErrExpectedOneField, "'key1' in 'my-item', got 2"),
- },
- },
- },
- }
- // run the tests
- for _, tc := range testCases {
- for _, check := range tc.checks {
- gotMap, err := tc.provider.GetSecretMap(context.Background(), check.ref)
- notes := fmt.Sprintf(setupCheckFormat, tc.setupNote, check.checkNote)
- if check.expectedErr == nil && err != nil {
- // expected no error, got one
- t.Errorf(getSecretMapErrFormat, notes, nil, err)
- }
- if check.expectedErr != nil && err == nil {
- // expected an error, didn't get one
- t.Errorf(getSecretMapErrFormat, notes, check.expectedErr.Error(), nil)
- }
- if check.expectedErr != nil && err != nil && err.Error() != check.expectedErr.Error() {
- // expected an error, got the wrong one
- t.Errorf(getSecretMapErrFormat, notes, check.expectedErr.Error(), err.Error())
- }
- if !reflect.DeepEqual(check.expectedMap, gotMap) {
- // expected a predefined map, got something else
- t.Errorf(getSecretMapErrFormat, notes, check.expectedMap, gotMap)
- }
- }
- }
- }
- func TestGetAllSecrets(t *testing.T) {
- type check struct {
- checkNote string
- ref esv1beta1.ExternalSecretFind
- expectedMap map[string][]byte
- expectedErr error
- }
- type testCase struct {
- setupNote string
- provider *ProviderOnePassword
- checks []check
- }
- testCases := []testCase{
- {
- setupNote: "three vaults, three items, all different field Labels",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1, myOtherVault: 2, myNonMatchingVault: 3},
- client: fake.NewMockClient().
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AppendItemField(myVaultID, myItemID, onepassword.ItemField{
- Label: key2,
- Value: value2,
- }).
- AddPredictableVault(myOtherVault).
- AddPredictableItemWithField(myOtherVault, myOtherItem, key3, value3).
- AppendItemField(myOtherVaultID, myOtherItemID, onepassword.ItemField{
- Label: key4,
- Value: value4,
- }).
- AddPredictableVault(myNonMatchingVault).
- AddPredictableItemWithField(myNonMatchingVault, myNonMatchingItem, "non-matching5", "value5").
- AppendItemField(myNonMatchingVaultID, myNonMatchingItemID, onepassword.ItemField{
- Label: "non-matching6",
- Value: "value6",
- }),
- },
- checks: []check{
- {
- checkNote: "find some with path only",
- ref: esv1beta1.ExternalSecretFind{
- Path: pointer.To(myItem),
- },
- expectedMap: map[string][]byte{
- key1: []byte(value1),
- key2: []byte(value2),
- },
- expectedErr: nil,
- },
- {
- checkNote: "find most with regex 'key*'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "key*",
- },
- },
- expectedMap: map[string][]byte{
- key1: []byte(value1),
- key2: []byte(value2),
- key3: []byte(value3),
- key4: []byte(value4),
- },
- expectedErr: nil,
- },
- {
- checkNote: "find some with regex 'key*' and path 'my-other-item'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "key*",
- },
- Path: pointer.To(myOtherItem),
- },
- expectedMap: map[string][]byte{
- key3: []byte(value3),
- key4: []byte(value4),
- },
- expectedErr: nil,
- },
- {
- checkNote: "find none with regex 'asdf*'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "asdf*",
- },
- },
- expectedMap: map[string][]byte{},
- expectedErr: nil,
- },
- {
- checkNote: "find none with path 'no-exist'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "key*",
- },
- Path: pointer.To("no-exist"),
- },
- expectedMap: map[string][]byte{},
- expectedErr: nil,
- },
- {
- checkNote: "error when find.tags",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "key*",
- },
- Tags: map[string]string{
- "asdf": "fdas",
- },
- },
- expectedErr: fmt.Errorf(errTagsNotImplemented),
- },
- },
- },
- {
- setupNote: "3 vaults, 4 items, 5 files",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1, myOtherVault: 2, myNonMatchingVault: 3},
- client: fake.NewMockClient().
- // my-vault
- AddPredictableVault(myVault).
- AppendItem(myVaultID, onepassword.Item{
- ID: myItemID,
- Title: myItem,
- Vault: onepassword.ItemVault{ID: myVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: myFilePNGID,
- Name: myFilePNG,
- },
- {
- ID: mySecondFileTXTID,
- Name: mySecondFileTXT,
- },
- },
- }).
- SetFileContents(myFilePNG, []byte(myContents)).
- SetFileContents(mySecondFileTXT, []byte(mySecondContents)).
- AppendItem(myVaultID, onepassword.Item{
- ID: "my-item-2-id",
- Title: "my-item-2",
- Vault: onepassword.ItemVault{ID: myVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: myFile2ID,
- Name: myFile2TXT,
- },
- },
- }).
- SetFileContents(myFile2TXT, []byte(myContents2)).
- // my-other-vault
- AddPredictableVault(myOtherVault).
- AppendItem(myOtherVaultID, onepassword.Item{
- ID: myOtherItemID,
- Title: myOtherItem,
- Vault: onepassword.ItemVault{ID: myOtherVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: myOtherFilePNGID,
- Name: myOtherFilePNG,
- },
- },
- }).
- SetFileContents(myOtherFilePNG, []byte(myOtherContents)).
- // my-non-matching-vault
- AddPredictableVault(myNonMatchingVault).
- AppendItem(myNonMatchingVaultID, onepassword.Item{
- ID: myNonMatchingItemID,
- Title: myNonMatchingItem,
- Vault: onepassword.ItemVault{ID: myNonMatchingVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: nonMatchingFilePNGID,
- Name: nonMatchingFilePNG,
- },
- },
- }).
- SetFileContents(nonMatchingFilePNG, []byte(nonMatchingContents)),
- },
- checks: []check{
- {
- checkNote: "find most with regex '^my-*'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "^my-*",
- },
- },
- expectedMap: map[string][]byte{
- myFilePNG: []byte(myContents),
- mySecondFileTXT: []byte(mySecondContents),
- myFile2TXT: []byte(myContents2),
- myOtherFilePNG: []byte(myOtherContents),
- },
- expectedErr: nil,
- },
- {
- checkNote: "find some with regex '^my-*' and path 'my-other-item'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "^my-*",
- },
- Path: pointer.To(myOtherItem),
- },
- expectedMap: map[string][]byte{
- myOtherFilePNG: []byte(myOtherContents),
- },
- expectedErr: nil,
- },
- {
- checkNote: "find none with regex '^asdf*'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "^asdf*",
- },
- },
- expectedMap: map[string][]byte{},
- expectedErr: nil,
- },
- {
- checkNote: "find none with path 'no-exist'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "^my-*",
- },
- Path: pointer.To("no-exist"),
- },
- expectedMap: map[string][]byte{},
- expectedErr: nil,
- },
- },
- },
- {
- setupNote: "two fields/files with same name, first one wins",
- provider: &ProviderOnePassword{
- vaults: map[string]int{myVault: 1, myOtherVault: 2},
- client: fake.NewMockClient().
- // my-vault
- AddPredictableVault(myVault).
- AddPredictableItemWithField(myVault, myItem, key1, value1).
- AddPredictableItemWithField(myVault, "my-second-item", key1, "value-second").
- AppendItem(myVaultID, onepassword.Item{
- ID: "file-item-id",
- Title: "file-item",
- Vault: onepassword.ItemVault{ID: myVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: filePNGID,
- Name: filePNG,
- },
- },
- }).
- SetFileContents(filePNG, []byte(myContents)).
- AppendItem(myVaultID, onepassword.Item{
- ID: "file-item-2-id",
- Title: "file-item-2",
- Vault: onepassword.ItemVault{ID: myVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: "file-2-id",
- Name: filePNG,
- },
- },
- }).
- // my-other-vault
- AddPredictableVault(myOtherVault).
- AddPredictableItemWithField(myOtherVault, myOtherItem, key1, "value-other").
- AppendItem(myOtherVaultID, onepassword.Item{
- ID: "file-item-other-id",
- Title: "file-item-other",
- Vault: onepassword.ItemVault{ID: myOtherVaultID},
- Category: documentCategory,
- Files: []*onepassword.File{
- {
- ID: "other-file-id",
- Name: filePNG,
- },
- },
- }),
- },
- checks: []check{
- {
- checkNote: "find fields with regex '^key*'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "^key*",
- },
- },
- expectedMap: map[string][]byte{
- key1: []byte(value1),
- },
- expectedErr: nil,
- },
- {
- checkNote: "find files with regex '^file*item*'",
- ref: esv1beta1.ExternalSecretFind{
- Name: &esv1beta1.FindName{
- RegExp: "^file*",
- },
- },
- expectedMap: map[string][]byte{
- filePNG: []byte(myContents),
- },
- expectedErr: nil,
- },
- },
- },
- }
- // run the tests
- for _, tc := range testCases {
- for _, check := range tc.checks {
- gotMap, err := tc.provider.GetAllSecrets(context.Background(), check.ref)
- notes := fmt.Sprintf(setupCheckFormat, tc.setupNote, check.checkNote)
- if check.expectedErr == nil && err != nil {
- // expected no error, got one
- t.Fatalf(getAllSecretsErrFormat, notes, nil, err)
- }
- if check.expectedErr != nil && err == nil {
- // expected an error, didn't get one
- t.Errorf(getAllSecretsErrFormat, notes, check.expectedErr.Error(), nil)
- }
- if check.expectedErr != nil && err != nil && err.Error() != check.expectedErr.Error() {
- // expected an error, got the wrong one
- t.Errorf(getAllSecretsErrFormat, notes, check.expectedErr.Error(), err.Error())
- }
- if !reflect.DeepEqual(check.expectedMap, gotMap) {
- // expected a predefined map, got something else
- t.Errorf(getAllSecretsErrFormat, notes, check.expectedMap, gotMap)
- }
- }
- }
- }
- func TestSortVaults(t *testing.T) {
- type testCase struct {
- vaults map[string]int
- expected []string
- }
- testCases := []testCase{
- {
- vaults: map[string]int{
- one: 1,
- three: 3,
- two: 2,
- },
- expected: []string{
- one,
- two,
- three,
- },
- },
- {
- vaults: map[string]int{
- "four": 100,
- one: 1,
- three: 3,
- two: 2,
- },
- expected: []string{
- one,
- two,
- three,
- "four",
- },
- },
- }
- // run the tests
- for _, tc := range testCases {
- got := sortVaults(tc.vaults)
- if !reflect.DeepEqual(got, tc.expected) {
- t.Errorf("onepassword.sortVaults(...): -expected, +got:\n-%#v\n+%#v\n", tc.expected, got)
- }
- }
- }
- func TestHasUniqueVaultNumbers(t *testing.T) {
- type testCase struct {
- vaults map[string]int
- expected bool
- }
- testCases := []testCase{
- {
- vaults: map[string]int{
- one: 1,
- three: 3,
- two: 2,
- },
- expected: true,
- },
- {
- vaults: map[string]int{
- "four": 100,
- one: 1,
- three: 3,
- two: 2,
- "eight": 100,
- },
- expected: false,
- },
- {
- vaults: map[string]int{
- one: 1,
- "1": 1,
- three: 3,
- two: 2,
- },
- expected: false,
- },
- }
- // run the tests
- for _, tc := range testCases {
- got := hasUniqueVaultNumbers(tc.vaults)
- if got != tc.expected {
- t.Errorf("onepassword.hasUniqueVaultNumbers(...): -expected, +got:\n-%#v\n+%#v\n", tc.expected, got)
- }
- }
- }
- type fakeRef struct {
- key string
- prop string
- secretKey string
- }
- func (f fakeRef) GetRemoteKey() string {
- return f.key
- }
- func (f fakeRef) GetProperty() string {
- return f.prop
- }
- func (f fakeRef) GetSecretKey() string {
- return f.secretKey
- }
- func (f fakeRef) GetMetadata() *apiextensionsv1.JSON {
- return nil
- }
- func validateItem(t *testing.T, expectedItem, actualItem *onepassword.Item) {
- t.Helper()
- if !reflect.DeepEqual(expectedItem, actualItem) {
- t.Errorf("expected item %v, got %v", expectedItem, actualItem)
- }
- }
- func TestProviderOnePasswordCreateItem(t *testing.T) {
- type testCase struct {
- vaults map[string]int
- expectedErr error
- setupNote string
- val []byte
- createValidateFunc func(*testing.T, *onepassword.Item, string) (*onepassword.Item, error)
- ref esv1beta1.PushSecretData
- }
- const vaultName = "vault1"
- thridPartyErr := errors.New("third party error")
- testCases := []testCase{
- {
- setupNote: "standard create",
- val: []byte("value"),
- ref: fakeRef{
- key: "testing",
- prop: "prop",
- },
- expectedErr: nil,
- vaults: map[string]int{
- vaultName: 1,
- },
- createValidateFunc: func(t *testing.T, item *onepassword.Item, s string) (*onepassword.Item, error) {
- validateItem(t, &onepassword.Item{
- Title: "testing",
- Category: onepassword.Server,
- Vault: onepassword.ItemVault{
- ID: vaultName,
- },
- Fields: []*onepassword.ItemField{
- generateNewItemField("prop", "value"),
- },
- }, item)
- return item, nil
- },
- },
- {
- setupNote: "standard create with no property",
- val: []byte("value2"),
- ref: fakeRef{
- key: "testing2",
- prop: "",
- },
- vaults: map[string]int{
- vaultName: 2,
- },
- createValidateFunc: func(t *testing.T, item *onepassword.Item, s string) (*onepassword.Item, error) {
- validateItem(t, &onepassword.Item{
- Title: "testing2",
- Category: onepassword.Server,
- Vault: onepassword.ItemVault{
- ID: vaultName,
- },
- Fields: []*onepassword.ItemField{
- generateNewItemField("password", "value2"),
- },
- }, item)
- return item, nil
- },
- },
- {
- setupNote: "no vaults",
- val: []byte("value"),
- ref: fakeRef{
- key: "testing",
- prop: "prop",
- },
- vaults: map[string]int{},
- expectedErr: ErrNoVaults,
- createValidateFunc: func(t *testing.T, item *onepassword.Item, s string) (*onepassword.Item, error) {
- t.Errorf("onepassword.createItem(...): should not have been called")
- return nil, nil
- },
- },
- {
- setupNote: "error on create",
- val: []byte("testing"),
- ref: fakeRef{
- key: "another",
- prop: "property",
- },
- vaults: map[string]int{
- vaultName: 1,
- },
- expectedErr: thridPartyErr,
- createValidateFunc: func(t *testing.T, item *onepassword.Item, s string) (*onepassword.Item, error) {
- validateItem(t, &onepassword.Item{
- Title: "another",
- Category: onepassword.Server,
- Vault: onepassword.ItemVault{
- ID: vaultName,
- },
- Fields: []*onepassword.ItemField{
- generateNewItemField("property", "testing"),
- },
- }, item)
- return nil, thridPartyErr
- },
- },
- }
- provider := &ProviderOnePassword{}
- for _, tc := range testCases {
- // setup
- mockClient := fake.NewMockClient()
- mockClient.CreateItemValidateFunc = func(item *onepassword.Item, s string) (*onepassword.Item, error) {
- i, e := tc.createValidateFunc(t, item, s)
- return i, e
- }
- provider.client = mockClient
- provider.vaults = tc.vaults
- err := provider.createItem(tc.val, tc.ref)
- if !errors.Is(err, tc.expectedErr) {
- t.Errorf(errDoesNotMatchMsgF, tc.setupNote, tc.expectedErr, err)
- }
- }
- }
- func TestProviderOnePasswordDeleteItem(t *testing.T) {
- type testCase struct {
- inputFields []*onepassword.ItemField
- fieldName string
- expectedErr error
- expectedFields []*onepassword.ItemField
- setupNote string
- }
- field1, field2, field3, field4 := "field1", "field2", "field3", "field4"
- testCases := []testCase{
- {
- setupNote: "one field to remove",
- inputFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Type: onepassword.FieldTypeString,
- },
- {
- ID: field3,
- Label: field3,
- Type: onepassword.FieldTypeConcealed,
- },
- },
- fieldName: field2,
- expectedFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field3,
- Label: field3,
- Type: onepassword.FieldTypeConcealed,
- },
- },
- },
- {
- setupNote: "no fields to remove",
- inputFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Type: onepassword.FieldTypeString,
- },
- {
- ID: field3,
- Label: field3,
- Type: onepassword.FieldTypeConcealed,
- },
- },
- expectedErr: nil,
- fieldName: field4,
- expectedFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Type: onepassword.FieldTypeString,
- },
- {
- ID: field3,
- Label: field3,
- Type: onepassword.FieldTypeConcealed,
- },
- },
- },
- {
- setupNote: "multiple fields to remove",
- inputFields: []*onepassword.ItemField{
- {
- ID: field3,
- Label: field3,
- Type: onepassword.FieldTypeConcealed,
- },
- {
- ID: field1,
- Label: field1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field3,
- Label: field3,
- Type: onepassword.FieldTypeCreditCardType,
- },
- {
- ID: field2,
- Label: field2,
- Type: onepassword.FieldTypeString,
- },
- {
- ID: field3,
- Label: field3,
- Type: onepassword.FieldTypeGender,
- },
- },
- fieldName: field3,
- expectedErr: ErrExpectedOneField,
- expectedFields: nil,
- },
- }
- // run the tests
- for _, tc := range testCases {
- actualOutput, err := deleteField(tc.inputFields, tc.fieldName)
- if len(actualOutput) != len(tc.expectedFields) {
- t.Errorf("%s: length fields did not match: -expected, +got:\n-%#v\n+%#v\n", tc.setupNote, tc.expectedFields, actualOutput)
- return
- }
- if !errors.Is(err, tc.expectedErr) {
- t.Errorf(errDoesNotMatchMsgF, tc.setupNote, tc.expectedErr, err)
- }
- for i, check := range tc.expectedFields {
- if len(actualOutput) <= i {
- continue
- }
- if !reflect.DeepEqual(check, actualOutput[i]) {
- t.Errorf("%s: fields at position %d did not match: -expected, +got:\n-%#v\n+%#v\n", tc.setupNote, i, check, actualOutput[i])
- }
- }
- }
- }
- func TestUpdateFields(t *testing.T) {
- type testCase struct {
- inputFields []*onepassword.ItemField
- fieldName string
- newVal string
- expectedErr error
- expectedFields []*onepassword.ItemField
- setupNote string
- }
- field1, field2, field3, field4 := "field1", "field2", "field3", "field4"
- testCases := []testCase{
- {
- setupNote: "one field to update",
- inputFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Value: value1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Value: value2,
- Type: onepassword.FieldTypeString,
- },
- {
- ID: field3,
- Label: field3,
- Value: value3,
- Type: onepassword.FieldTypeConcealed,
- },
- },
- fieldName: field2,
- newVal: "testing",
- expectedFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Value: value1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Value: "testing",
- Type: onepassword.FieldTypeString,
- },
- {
- ID: field3,
- Label: field3,
- Value: value3,
- Type: onepassword.FieldTypeConcealed,
- },
- },
- },
- {
- setupNote: "add field",
- inputFields: []*onepassword.ItemField{
- {
- ID: field1,
- Value: value1,
- Label: field1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Value: value2,
- Type: onepassword.FieldTypeString,
- },
- },
- fieldName: field4,
- newVal: value4,
- expectedFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Value: value1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Value: value2,
- Type: onepassword.FieldTypeString,
- },
- {
- Label: field4,
- Value: value4,
- Type: onepassword.FieldTypeConcealed,
- },
- },
- },
- {
- setupNote: "no changes",
- inputFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Value: value1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Value: value2,
- Type: onepassword.FieldTypeString,
- },
- },
- fieldName: field1,
- newVal: value1,
- expectedErr: nil,
- expectedFields: []*onepassword.ItemField{
- {
- ID: field1,
- Label: field1,
- Value: value1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field2,
- Label: field2,
- Value: value2,
- Type: onepassword.FieldTypeString,
- },
- },
- },
- {
- setupNote: "multiple fields to remove",
- inputFields: []*onepassword.ItemField{
- {
- ID: field3,
- Label: field3,
- Value: value3,
- Type: onepassword.FieldTypeConcealed,
- },
- {
- ID: field1,
- Label: field1,
- Value: value1,
- Type: onepassword.FieldTypeAddress,
- },
- {
- ID: field3,
- Label: field3,
- Value: value3,
- Type: onepassword.FieldTypeCreditCardType,
- },
- {
- ID: field2,
- Label: field2,
- Value: value2,
- Type: onepassword.FieldTypeString,
- },
- {
- ID: field3,
- Label: field3,
- Value: value3,
- Type: onepassword.FieldTypeGender,
- },
- },
- fieldName: field3,
- expectedErr: ErrExpectedOneField,
- expectedFields: nil,
- },
- }
- // run the tests
- for _, tc := range testCases {
- actualOutput, err := updateFieldValue(tc.inputFields, tc.fieldName, tc.newVal)
- if len(actualOutput) != len(tc.expectedFields) {
- t.Errorf("%s: length fields did not match: -expected, +got:\n-%#v\n+%#v\n", tc.setupNote, tc.expectedFields, actualOutput)
- return
- }
- if !errors.Is(err, tc.expectedErr) {
- t.Errorf(errDoesNotMatchMsgF, tc.setupNote, tc.expectedErr, err)
- }
- for i, check := range tc.expectedFields {
- if len(actualOutput) <= i {
- continue
- }
- if !reflect.DeepEqual(check, actualOutput[i]) {
- t.Errorf("%s: fields at position %d did not match: -expected, +got:\n-%#v\n+%#v\n", tc.setupNote, i, check, actualOutput[i])
- }
- }
- }
- }
- func TestGenerateNewItemField(t *testing.T) {
- field := generateNewItemField("property", "testing")
- if !reflect.DeepEqual(field, &onepassword.ItemField{
- Label: "property",
- Type: onepassword.FieldTypeConcealed,
- Value: "testing",
- }) {
- t.Errorf("field did not match: -expected, +got:\n-%#v\n+%#v\n", &onepassword.ItemField{
- Label: "property",
- Type: onepassword.FieldTypeConcealed,
- Value: "testing",
- }, field)
- }
- }
- func TestProviderOnePasswordPushSecret(t *testing.T) {
- // Most logic is tested in the createItem and updateField functions
- // This test is just to make sure the correct functions are called.
- // the correct values are passed to them, and errors are propagated
- type testCase struct {
- vaults map[string]int
- expectedErr error
- setupNote string
- existingItems []onepassword.Item
- val *corev1.Secret
- existingItemsFields map[string][]*onepassword.ItemField
- createValidateFunc func(*onepassword.Item, string) (*onepassword.Item, error)
- updateValidateFunc func(*onepassword.Item, string) (*onepassword.Item, error)
- ref fakeRef
- }
- var (
- vaultName = "vault1"
- vault = onepassword.Vault{
- ID: vaultName,
- }
- )
- testCases := []testCase{
- {
- vaults: map[string]int{
- vaultName: 1,
- },
- expectedErr: ErrExpectedOneItem,
- setupNote: "find item error",
- existingItems: []onepassword.Item{
- {
- Title: key1,
- }, {
- Title: key1,
- }, // can be empty, testing for error with length
- },
- ref: fakeRef{
- key: key1,
- secretKey: key1,
- },
- val: &corev1.Secret{Data: map[string][]byte{key1: []byte("testing")}},
- },
- {
- setupNote: "create item error",
- expectedErr: ErrNoVaults,
- val: &corev1.Secret{Data: map[string][]byte{key1: []byte("testing")}},
- ref: fakeRef{secretKey: key1},
- vaults: nil,
- },
- {
- setupNote: "key not in data",
- expectedErr: ErrKeyNotFound,
- val: &corev1.Secret{Data: map[string][]byte{}},
- ref: fakeRef{secretKey: key1},
- vaults: nil,
- },
- {
- setupNote: "create item success",
- expectedErr: nil,
- val: &corev1.Secret{Data: map[string][]byte{
- key1: []byte("testing"),
- }},
- ref: fakeRef{
- key: key1,
- prop: "prop",
- secretKey: key1,
- },
- vaults: map[string]int{
- vaultName: 1,
- },
- createValidateFunc: func(item *onepassword.Item, s string) (*onepassword.Item, error) {
- validateItem(t, &onepassword.Item{
- Title: key1,
- Category: onepassword.Server,
- Vault: onepassword.ItemVault{
- ID: vaultName,
- },
- Fields: []*onepassword.ItemField{
- generateNewItemField("prop", "testing"),
- },
- }, item)
- return item, nil
- },
- },
- {
- setupNote: "update fields error",
- expectedErr: ErrExpectedOneField,
- val: &corev1.Secret{Data: map[string][]byte{
- "key2": []byte("testing"),
- }},
- ref: fakeRef{
- key: key1,
- prop: "prop",
- secretKey: "key2",
- },
- vaults: map[string]int{
- vaultName: 1,
- },
- existingItemsFields: map[string][]*onepassword.ItemField{
- key1: {
- {
- Label: "prop",
- },
- {
- Label: "prop",
- },
- },
- },
- existingItems: []onepassword.Item{
- {
- Vault: onepassword.ItemVault{
- ID: vaultName,
- },
- ID: key1,
- Title: key1,
- },
- },
- },
- {
- setupNote: "standard update",
- expectedErr: nil,
- val: &corev1.Secret{Data: map[string][]byte{
- "key3": []byte("testing2"),
- }},
- ref: fakeRef{
- key: key1,
- prop: "",
- secretKey: "key3",
- },
- vaults: map[string]int{
- vaultName: 1,
- },
- existingItemsFields: map[string][]*onepassword.ItemField{
- key1: {
- {
- Label: "not-prop",
- },
- },
- },
- updateValidateFunc: func(item *onepassword.Item, s string) (*onepassword.Item, error) {
- validateItem(t, &onepassword.Item{
- Vault: onepassword.ItemVault{
- ID: vaultName,
- },
- ID: key1,
- Title: key1,
- Fields: []*onepassword.ItemField{
- {
- Label: "not-prop",
- },
- {
- Label: "password",
- Value: "testing2",
- Type: onepassword.FieldTypeConcealed,
- },
- },
- }, item)
- return nil, nil
- },
- existingItems: []onepassword.Item{
- {
- Vault: onepassword.ItemVault{
- ID: vaultName,
- },
- ID: key1,
- Title: key1,
- },
- },
- },
- }
- provider := &ProviderOnePassword{}
- for _, tc := range testCases {
- t.Run(tc.setupNote, func(t *testing.T) {
- // setup
- mockClient := fake.NewMockClient()
- mockClient.MockVaults = map[string][]onepassword.Vault{
- vaultName: {vault},
- }
- mockClient.MockItems = map[string][]onepassword.Item{
- vaultName: tc.existingItems,
- }
- mockClient.MockItemFields = map[string]map[string][]*onepassword.ItemField{
- vaultName: tc.existingItemsFields,
- }
- mockClient.CreateItemValidateFunc = func(item *onepassword.Item, s string) (*onepassword.Item, error) {
- return tc.createValidateFunc(item, s)
- }
- mockClient.UpdateItemValidateFunc = func(item *onepassword.Item, s string) (*onepassword.Item, error) {
- return tc.updateValidateFunc(item, s)
- }
- provider.client = mockClient
- provider.vaults = tc.vaults
- err := provider.PushSecret(context.Background(), tc.val, tc.ref)
- if !errors.Is(err, tc.expectedErr) {
- t.Errorf(errDoesNotMatchMsgF, tc.setupNote, tc.expectedErr, err)
- }
- })
- }
- }
|