common.go 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package common
  14. import (
  15. "fmt"
  16. "time"
  17. . "github.com/onsi/ginkgo/v2"
  18. "github.com/onsi/gomega"
  19. v1 "k8s.io/api/core/v1"
  20. "k8s.io/apimachinery/pkg/api/errors"
  21. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  22. "sigs.k8s.io/controller-runtime/pkg/client"
  23. "github.com/external-secrets/external-secrets-e2e/framework"
  24. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  25. )
  26. const (
  27. // Constants.
  28. dockerConfigExampleName = "docker-config-example"
  29. dockerConfigJSONKey = ".dockerconfigjson"
  30. mysecretToStringTemplating = "{{ .mysecret }}"
  31. sshPrivateKey = "ssh-privatekey"
  32. secretValue1 = "{\"foo1\":\"foo1-val\",\"bar1\":\"bar1-val\"}"
  33. secretValue2 = "{\"foo2\":\"foo2-val\",\"bar2\":\"bar2-val\"}"
  34. )
  35. // This case creates multiple secrets with simple key/value pairs and syncs them using multiple .Spec.Data blocks.
  36. // Not supported by: vault.
  37. func SimpleDataSync(f *framework.Framework) (string, func(*framework.TestCase)) {
  38. return "[common] should sync simple secrets from .Data[]", func(tc *framework.TestCase) {
  39. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  40. secretKey2 := fmt.Sprintf("%s-%s", f.Namespace.Name, "other")
  41. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  42. remoteRefKey2 := f.MakeRemoteRefKey(secretKey2)
  43. secretValue := "bar"
  44. tc.Secrets = map[string]framework.SecretEntry{
  45. remoteRefKey1: {Value: secretValue},
  46. remoteRefKey2: {Value: secretValue},
  47. }
  48. tc.ExpectedSecret = &v1.Secret{
  49. Type: v1.SecretTypeOpaque,
  50. Data: map[string][]byte{
  51. secretKey1: []byte(secretValue),
  52. secretKey2: []byte(secretValue),
  53. },
  54. }
  55. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  56. {
  57. SecretKey: secretKey1,
  58. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  59. Key: remoteRefKey1,
  60. },
  61. },
  62. {
  63. SecretKey: secretKey2,
  64. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  65. Key: remoteRefKey2,
  66. },
  67. },
  68. }
  69. }
  70. }
  71. // This case creates a secret with empty target name to test if it defaults to external secret name.
  72. // Not supported by: vault.
  73. func SyncWithoutTargetName(f *framework.Framework) (string, func(*framework.TestCase)) {
  74. return "[common] should sync with empty target name.", func(tc *framework.TestCase) {
  75. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  76. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  77. secretValue := "bar"
  78. tc.Secrets = map[string]framework.SecretEntry{
  79. remoteRefKey1: {Value: secretValue},
  80. }
  81. tc.ExpectedSecret = &v1.Secret{
  82. Type: v1.SecretTypeOpaque,
  83. Data: map[string][]byte{
  84. secretKey1: []byte(secretValue),
  85. },
  86. }
  87. tc.ExternalSecret.Spec.Target.Name = ""
  88. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  89. {
  90. SecretKey: secretKey1,
  91. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  92. Key: remoteRefKey1,
  93. },
  94. },
  95. }
  96. }
  97. }
  98. // This case creates multiple secrets with json values and syncs them using multiple .Spec.Data blocks.
  99. // The data is extracted from the JSON key using ref.Property.
  100. func JSONDataWithProperty(f *framework.Framework) (string, func(*framework.TestCase)) {
  101. return "[common] should sync multiple secrets from .Data[]", func(tc *framework.TestCase) {
  102. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  103. secretKey2 := fmt.Sprintf("%s-%s", f.Namespace.Name, "two")
  104. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  105. remoteRefKey2 := f.MakeRemoteRefKey(secretKey2)
  106. tc.Secrets = map[string]framework.SecretEntry{
  107. remoteRefKey1: {Value: secretValue1},
  108. remoteRefKey2: {Value: secretValue2},
  109. }
  110. tc.ExpectedSecret = &v1.Secret{
  111. Type: v1.SecretTypeOpaque,
  112. Data: map[string][]byte{
  113. secretKey1: []byte("foo1-val"),
  114. secretKey2: []byte("bar2-val"),
  115. },
  116. }
  117. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  118. {
  119. SecretKey: secretKey1,
  120. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  121. Key: remoteRefKey1,
  122. Property: "foo1",
  123. },
  124. },
  125. {
  126. SecretKey: secretKey2,
  127. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  128. Key: remoteRefKey2,
  129. Property: "bar2",
  130. },
  131. },
  132. }
  133. }
  134. }
  135. // This case creates a secret with empty target name to test if it defaults to external secret name.
  136. // The data is extracted from the JSON key using ref.Property.
  137. func JSONDataWithoutTargetName(f *framework.Framework) (string, func(*framework.TestCase)) {
  138. return "[common] should sync with empty target name, using json.", func(tc *framework.TestCase) {
  139. secretKey := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  140. remoteRefKey := f.MakeRemoteRefKey(secretKey)
  141. secretValue := "{\"foo\":\"foo-val\",\"bar\":\"bar-val\"}"
  142. tc.Secrets = map[string]framework.SecretEntry{
  143. remoteRefKey: {Value: secretValue},
  144. }
  145. tc.ExpectedSecret = &v1.Secret{
  146. Type: v1.SecretTypeOpaque,
  147. Data: map[string][]byte{
  148. secretKey: []byte("foo-val"),
  149. },
  150. }
  151. tc.ExternalSecret.Spec.Target.Name = ""
  152. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  153. {
  154. SecretKey: secretKey,
  155. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  156. Key: remoteRefKey,
  157. Property: "foo",
  158. },
  159. },
  160. }
  161. }
  162. }
  163. // This case creates multiple secrets with json values and renders a template.
  164. // The data is extracted from the JSON key using ref.Property.
  165. func JSONDataWithTemplate(f *framework.Framework) (string, func(*framework.TestCase)) {
  166. return "[common] should sync json secrets with template", func(tc *framework.TestCase) {
  167. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  168. secretKey2 := fmt.Sprintf("%s-%s", f.Namespace.Name, "other")
  169. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  170. remoteRefKey2 := f.MakeRemoteRefKey(secretKey2)
  171. tc.Secrets = map[string]framework.SecretEntry{
  172. remoteRefKey1: {Value: secretValue1},
  173. remoteRefKey2: {Value: secretValue2},
  174. }
  175. tc.ExpectedSecret = &v1.Secret{
  176. Type: v1.SecretTypeOpaque,
  177. ObjectMeta: metav1.ObjectMeta{
  178. Annotations: map[string]string{
  179. "example": "annotation",
  180. },
  181. Labels: map[string]string{
  182. "example": "label",
  183. },
  184. },
  185. Data: map[string][]byte{
  186. "my-data": []byte(`executed: foo1-val|bar2-val`),
  187. },
  188. }
  189. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  190. Metadata: esv1.ExternalSecretTemplateMetadata{
  191. Annotations: map[string]string{
  192. "example": "annotation",
  193. },
  194. Labels: map[string]string{
  195. "example": "label",
  196. },
  197. Finalizers: []string{"example.com/finalizer"},
  198. },
  199. Data: map[string]string{
  200. "my-data": "executed: {{ .one }}|{{ .two }}",
  201. },
  202. }
  203. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  204. {
  205. SecretKey: "one",
  206. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  207. Key: remoteRefKey1,
  208. Property: "foo1",
  209. },
  210. },
  211. {
  212. SecretKey: "two",
  213. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  214. Key: remoteRefKey2,
  215. Property: "bar2",
  216. },
  217. },
  218. }
  219. }
  220. }
  221. // This case creates multiple secrets with json values and renders a template from string.
  222. // The data is extracted from the JSON key using ref.Property.
  223. func JSONDataWithTemplateFromLiteral(f *framework.Framework) (string, func(*framework.TestCase)) {
  224. return "[common] should sync json secrets with template", func(tc *framework.TestCase) {
  225. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  226. secretKey2 := fmt.Sprintf("%s-%s", f.Namespace.Name, "other")
  227. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  228. remoteRefKey2 := f.MakeRemoteRefKey(secretKey2)
  229. tc.Secrets = map[string]framework.SecretEntry{
  230. remoteRefKey1: {Value: secretValue1},
  231. remoteRefKey2: {Value: secretValue2},
  232. }
  233. tc.ExpectedSecret = &v1.Secret{
  234. Type: v1.SecretTypeOpaque,
  235. Data: map[string][]byte{
  236. "executed-foo1-val": []byte(`bar2-val`),
  237. },
  238. }
  239. tplString := `executed-{{ .one }}: {{ .two }}`
  240. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  241. TemplateFrom: []esv1.TemplateFrom{
  242. {
  243. Literal: &tplString,
  244. Target: esv1.TemplateTargetData,
  245. },
  246. },
  247. }
  248. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  249. {
  250. SecretKey: "one",
  251. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  252. Key: remoteRefKey1,
  253. Property: "foo1",
  254. },
  255. },
  256. {
  257. SecretKey: "two",
  258. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  259. Key: remoteRefKey2,
  260. Property: "bar2",
  261. },
  262. },
  263. }
  264. }
  265. }
  266. // This case creates multiple secrets with json values and renders a template from string.
  267. // The data is extracted from the JSON key using ref.Property.
  268. func TemplateFromConfigmaps(f *framework.Framework) (string, func(*framework.TestCase)) {
  269. return "[common] should sync from templateFrom Configmaps", func(tc *framework.TestCase) {
  270. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  271. secretKey2 := fmt.Sprintf("%s-%s", f.Namespace.Name, "other")
  272. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  273. remoteRefKey2 := f.MakeRemoteRefKey(secretKey2)
  274. tc.AdditionalObjects = []client.Object{
  275. &v1.ConfigMap{
  276. ObjectMeta: metav1.ObjectMeta{
  277. Name: "test",
  278. Namespace: f.Namespace.Name,
  279. },
  280. Data: map[string]string{
  281. "config.json": `executed-{{ .one}}-{{ .two}}`,
  282. "templated": `executed-{{ .one}}: {{ .two}}`,
  283. },
  284. },
  285. }
  286. tc.Secrets = map[string]framework.SecretEntry{
  287. remoteRefKey1: {Value: secretValue1},
  288. remoteRefKey2: {Value: secretValue2},
  289. }
  290. tc.ExpectedSecret = &v1.Secret{
  291. Type: v1.SecretTypeOpaque,
  292. Data: map[string][]byte{
  293. "executed-foo1-val": []byte(`bar2-val`),
  294. "config.json": []byte(`executed-foo1-val-bar2-val`),
  295. },
  296. }
  297. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  298. TemplateFrom: []esv1.TemplateFrom{
  299. {
  300. ConfigMap: &esv1.TemplateRef{
  301. Name: "test",
  302. Items: []esv1.TemplateRefItem{
  303. {
  304. Key: "config.json",
  305. TemplateAs: esv1.TemplateScopeValues,
  306. },
  307. {
  308. Key: "templated",
  309. TemplateAs: esv1.TemplateScopeKeysAndValues,
  310. },
  311. },
  312. },
  313. Target: esv1.TemplateTargetData,
  314. },
  315. },
  316. }
  317. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  318. {
  319. SecretKey: "one",
  320. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  321. Key: remoteRefKey1,
  322. Property: "foo1",
  323. },
  324. },
  325. {
  326. SecretKey: "two",
  327. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  328. Key: remoteRefKey2,
  329. Property: "bar2",
  330. },
  331. },
  332. }
  333. }
  334. }
  335. // This case creates one secret with json values and syncs them using a single .Spec.DataFrom block.
  336. func JSONDataFromSync(f *framework.Framework) (string, func(*framework.TestCase)) {
  337. return "[common] should sync secrets with dataFrom", func(tc *framework.TestCase) {
  338. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  339. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  340. targetSecretKey1 := "name"
  341. targetSecretValue1 := "great-name"
  342. targetSecretKey2 := "surname"
  343. targetSecretValue2 := "great-surname"
  344. secretValue := fmt.Sprintf("{ %q: %q, %q: %q }", targetSecretKey1, targetSecretValue1, targetSecretKey2, targetSecretValue2)
  345. tc.Secrets = map[string]framework.SecretEntry{
  346. remoteRefKey1: {Value: secretValue},
  347. }
  348. tc.ExpectedSecret = &v1.Secret{
  349. Type: v1.SecretTypeOpaque,
  350. Data: map[string][]byte{
  351. targetSecretKey1: []byte(targetSecretValue1),
  352. targetSecretKey2: []byte(targetSecretValue2),
  353. },
  354. }
  355. tc.ExternalSecret.Spec.DataFrom = []esv1.ExternalSecretDataFromRemoteRef{
  356. {
  357. Extract: &esv1.ExternalSecretDataRemoteRef{
  358. Key: remoteRefKey1,
  359. },
  360. },
  361. }
  362. }
  363. }
  364. // This case creates one secret with json values and syncs them using a single .Spec.DataFrom block.
  365. func JSONDataFromRewrite(f *framework.Framework) (string, func(*framework.TestCase)) {
  366. return "[common] should sync and rewrite secrets with dataFrom", func(tc *framework.TestCase) {
  367. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  368. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  369. targetSecretKey1 := "username"
  370. targetSecretValue1 := "myuser.name"
  371. targetSecretKey2 := "address"
  372. targetSecretValue2 := "happy street"
  373. secretValue := fmt.Sprintf("{ %q: %q, %q: %q }", targetSecretKey1, targetSecretValue1, targetSecretKey2, targetSecretValue2)
  374. tc.Secrets = map[string]framework.SecretEntry{
  375. remoteRefKey1: {Value: secretValue},
  376. }
  377. tc.ExpectedSecret = &v1.Secret{
  378. Type: v1.SecretTypeOpaque,
  379. Data: map[string][]byte{
  380. "my_username": []byte(targetSecretValue1),
  381. "my_address": []byte(targetSecretValue2),
  382. },
  383. }
  384. tc.ExternalSecret.Spec.DataFrom = []esv1.ExternalSecretDataFromRemoteRef{
  385. {
  386. Extract: &esv1.ExternalSecretDataRemoteRef{
  387. Key: remoteRefKey1,
  388. },
  389. Rewrite: []esv1.ExternalSecretRewrite{
  390. {
  391. Regexp: &esv1.ExternalSecretRewriteRegexp{
  392. Source: "(.*)",
  393. Target: "my_$1",
  394. },
  395. },
  396. },
  397. },
  398. }
  399. }
  400. }
  401. // This case creates a secret with a nested json value. It is synced into two secrets.
  402. // The values from the nested data are extracted using gjson.
  403. // not supported by: vault.
  404. func NestedJSONWithGJSON(f *framework.Framework) (string, func(*framework.TestCase)) {
  405. return "[common] should sync nested json secrets and get inner keys", func(tc *framework.TestCase) {
  406. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  407. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  408. targetSecretKey1 := "firstname"
  409. targetSecretValue1 := "Tom"
  410. targetSecretKey2 := "first_friend"
  411. targetSecretValue2 := "Roger"
  412. secretValue := fmt.Sprintf(
  413. `{
  414. "name": {"first": "%s", "last": "Anderson"},
  415. "friends":
  416. [
  417. {"first": "Dale", "last": "Murphy"},
  418. {"first": "%s", "last": "Craig"},
  419. {"first": "Jane", "last": "Murphy"}
  420. ]
  421. }`, targetSecretValue1, targetSecretValue2)
  422. tc.Secrets = map[string]framework.SecretEntry{
  423. remoteRefKey1: {Value: secretValue},
  424. }
  425. tc.ExpectedSecret = &v1.Secret{
  426. Type: v1.SecretTypeOpaque,
  427. Data: map[string][]byte{
  428. targetSecretKey1: []byte(targetSecretValue1),
  429. targetSecretKey2: []byte(targetSecretValue2),
  430. },
  431. }
  432. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  433. {
  434. SecretKey: targetSecretKey1,
  435. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  436. Key: remoteRefKey1,
  437. Property: "name.first",
  438. },
  439. },
  440. {
  441. SecretKey: targetSecretKey2,
  442. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  443. Key: remoteRefKey1,
  444. Property: "friends.1.first",
  445. },
  446. },
  447. }
  448. }
  449. }
  450. // This case creates a secret with a Docker json configuration value.
  451. // The values from the nested data are extracted using gjson.
  452. // not supported by: vault.
  453. func DockerJSONConfig(f *framework.Framework) (string, func(*framework.TestCase)) {
  454. return "[common] should sync docker configurated json secrets with template simple", func(tc *framework.TestCase) {
  455. cloudSecretName := fmt.Sprintf("%s-%s", f.Namespace.Name, dockerConfigExampleName)
  456. cloudRemoteRefKey := f.MakeRemoteRefKey(cloudSecretName)
  457. dockerconfig := `{"auths":{"https://index.docker.io/v1/":{"auth":"c3R...zE2"}}}`
  458. cloudSecretValue := fmt.Sprintf(`{"dockerconfig": %s}`, dockerconfig)
  459. tc.Secrets = map[string]framework.SecretEntry{
  460. cloudRemoteRefKey: {Value: cloudSecretValue},
  461. }
  462. tc.ExpectedSecret = &v1.Secret{
  463. Type: v1.SecretTypeOpaque,
  464. Data: map[string][]byte{
  465. dockerConfigJSONKey: []byte(dockerconfig),
  466. },
  467. }
  468. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  469. {
  470. SecretKey: "mysecret",
  471. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  472. Key: cloudRemoteRefKey,
  473. Property: "dockerconfig",
  474. },
  475. },
  476. }
  477. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  478. Data: map[string]string{
  479. dockerConfigJSONKey: mysecretToStringTemplating,
  480. },
  481. }
  482. }
  483. }
  484. // This case creates a secret with a Docker json configuration value.
  485. // The values from the nested data are extracted using gjson.
  486. // Need to have a key holding dockerconfig to be supported by vault.
  487. func DataPropertyDockerconfigJSON(f *framework.Framework) (string, func(*framework.TestCase)) {
  488. return "[common] should sync docker configurated json secrets with template", func(tc *framework.TestCase) {
  489. cloudSecretName := fmt.Sprintf("%s-%s", f.Namespace.Name, dockerConfigExampleName)
  490. cloudRemoteRefKey := f.MakeRemoteRefKey(cloudSecretName)
  491. dockerconfigString := `"{\"auths\":{\"https://index.docker.io/v1/\": {\"auth\": \"c3R...zE2\"}}}"`
  492. dockerconfig := `{"auths":{"https://index.docker.io/v1/": {"auth": "c3R...zE2"}}}`
  493. cloudSecretValue := fmt.Sprintf(`{"dockerconfig": %s}`, dockerconfigString)
  494. tc.Secrets = map[string]framework.SecretEntry{
  495. cloudRemoteRefKey: {Value: cloudSecretValue},
  496. }
  497. tc.ExpectedSecret = &v1.Secret{
  498. Type: v1.SecretTypeDockerConfigJson,
  499. Data: map[string][]byte{
  500. dockerConfigJSONKey: []byte(dockerconfig),
  501. },
  502. }
  503. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  504. {
  505. SecretKey: "mysecret",
  506. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  507. Key: cloudRemoteRefKey,
  508. Property: "dockerconfig",
  509. },
  510. },
  511. }
  512. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  513. Type: v1.SecretTypeDockerConfigJson,
  514. Data: map[string]string{
  515. dockerConfigJSONKey: mysecretToStringTemplating,
  516. },
  517. }
  518. }
  519. }
  520. // This case adds an ssh private key secret and synchronizes it.
  521. // Not supported by: vault. Json parsing error.
  522. func SSHKeySync(f *framework.Framework) (string, func(*framework.TestCase)) {
  523. return "[common] should sync ssh key secret", func(tc *framework.TestCase) {
  524. sshSecretName := fmt.Sprintf("%s-%s", f.Namespace.Name, "ssh-priv-key-example")
  525. sshSecretValue := `-----BEGIN OPENSSH PRIVATE KEY-----
  526. b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
  527. NhAAAAAwEAAQAAAYEAsARoZUqo6L5dd0WRjZ2QPq/kKlbjtUY1njzJ01UtdC1u1eSJFUnV
  528. K1J+9b1kEqI4lgAaItaYbpJNSgCe97z6DRxEMTUQ3VhB+X+mPfcN2/I0bYklRxh59OTJcL
  529. FsPX0oCR/5eLXz9MCmelxDX7H8XDh9hP6PThooYP60oaDt0xsZvEyo6OQ43n5FuorSg4vL
  530. aMIQYK/znhBq9kR6XKMO8mULoDa+LnhOWsAY8kJ3fowF/UsQmh6PY/w4DJaypm85+a6Sak
  531. Lpn80ur7L6nV7yTqufYqXa4hgNsJHmJ7NGKqOxT/8vcvVRqRadNLl79g9bRRavBiYt/8fy
  532. DJGxOuutcVTzYlzS593Vo95In853cT+HuK4guaWkQdTrThG7jHAi0wVueaEDCTnDkuTk2h
  533. 7PXFBkYTUwE3y+NHo1X+nTE3LhiUJ0RBr3aaj5UBYKHK1uMo1C4zZH3GMvB5K2KmXwG/oB
  534. gCcD1j5hlp6QwOzBVfXsXBF4ewtf7g3RQF8DS3mBAAAFkDc7Drc3Ow63AAAAB3NzaC1yc2
  535. EAAAGBALAEaGVKqOi+XXdFkY2dkD6v5CpW47VGNZ48ydNVLXQtbtXkiRVJ1StSfvW9ZBKi
  536. OJYAGiLWmG6STUoAnve8+g0cRDE1EN1YQfl/pj33DdvyNG2JJUcYefTkyXCxbD19KAkf+X
  537. i18/TApnpcQ1+x/Fw4fYT+j04aKGD+tKGg7dMbGbxMqOjkON5+RbqK0oOLy2jCEGCv854Q
  538. avZEelyjDvJlC6A2vi54TlrAGPJCd36MBf1LEJoej2P8OAyWsqZvOfmukmpC6Z/NLq+y+p
  539. 1e8k6rn2Kl2uIYDbCR5iezRiqjsU//L3L1UakWnTS5e/YPW0UWrwYmLf/H8gyRsTrrrXFU
  540. 82Jc0ufd1aPeSJ/Od3E/h7iuILmlpEHU604Ru4xwItMFbnmhAwk5w5Lk5Noez1xQZGE1MB
  541. N8vjR6NV/p0xNy4YlCdEQa92mo+VAWChytbjKNQuM2R9xjLweStipl8Bv6AYAnA9Y+YZae
  542. kMDswVX17FwReHsLX+4N0UBfA0t5gQAAAAMBAAEAAAGAey4agQiGvJq8fkPJYPnrgHNHkf
  543. nM0YeY7mxMMgFiFfPVpQqShLtu2yqYfxFTf1bXkuHvaIIVmwv32tokZetycspdTrJ8Yurp
  544. ANo8VREYOdx+pEleNSsD7kZOUvdXcJCt+/TMeZWcbKSF3QvEeqvsl/1Qmkorr9TOfVLCxn
  545. oA9cP5drWPX6yXv91OnwWX3UdvyphFLeT08KE8uauilkHmq+va/vxQi+TVsNzOmHu7dGw5
  546. pNFrhO/uGWLhNq4fyCn9l33vpHZdMe2h/N32MnKZgjFOWLqyHy2Cx5BDJTfXyHwjVTqGN1
  547. 8fzrC+o3OuFsR1pPugwlYUW8B9XaxPI6h+Ke6GIxacNtVvOe67GrkdYbQkyrs4/EMqbXTl
  548. /BG/JZIMuchk0Da0TKDDjBwchMjAiwjsFp/wawlL9Y0dJIG0muEuHXxjInEa7xQoisAUCf
  549. B7lasXeUPOy/Z76qFwjVvyfkiVgWygncjGL44b0rgEC81L/dTZUyvNoCM9Bn7wSbuBAAAA
  550. wQDHw6NkJCvGOYa9lt2lMou6hSudokHejOo+J9jJCJdUlMXIbHhBUzrmSh47OSkgpAo4qf
  551. iVGHvBO55pZ5pI7o4woTQxaPFM8a/5BhMWcZ2LDMqU5iov9C2Dz8yKUyQmAodNkOGacQJU
  552. MDAVBJYeBFJSu04bj2EEhEd+9rIazeqVl91qkV1uGTz4aJ360PSmLuLAFT12BYGjIBfHrS
  553. yom+1HbBoUziG4a/kzzbJGTC7U66YTjpHAMEtz4mbpU0AhNg4AAADBANgTs8yjrEkL4pcC
  554. gfUr9oR42/BVl3ZxaFQ7PAvs9m0aut7b/ZRmsSF8F2TAl0H4H9M8uUKTTOhqRtdnTtDqm9
  555. QBUIQBzA6Blb5oP+yL+Eiez4gMFd9HumFXG3JoRu/JmDE19KviHaldV47QcvG6B3p0eb5Q
  556. hgVcNsrOGyBUZA0kBmzQBwv6gUoo++ETQMH89BlljZVCiPW7F6FCrPxHp7EB5txYJ62Qpu
  557. 2U40qgb2ONiUOuiI84EYRAgmDTbboMPQAAAMEA0Inn71l7LsYv81vstbmMQz0qLvhHkBcp
  558. mMhh6tyzI0dvLZabBLTPhIT4R/0VDMJGsH5X1cEaap47XDpu0/g3mfOV6PToUfYA2Ugw7N
  559. bs23UlVH1n0zL2x0QOMHX/Fkfc3OdIuc97ZHoMeW6Nf7Ii0iH7slIpH4hPVYcGXk/bX6wt
  560. PKDc8xGEXdd4A6jnwJBifJs+UpPrHAh0c63KfjO3rryDycvmxeWRnyU1yRCUjIuH31vi+L
  561. OkcGfqTaOoz2KVAAAAFGtpYW5AREVTS1RPUC1TNFI5S1JQAQIDBAUG
  562. -----END OPENSSH PRIVATE KEY-----`
  563. sshRemoteRefKey := f.MakeRemoteRefKey(sshSecretName)
  564. tc.Secrets = map[string]framework.SecretEntry{
  565. sshRemoteRefKey: {Value: sshSecretValue},
  566. }
  567. tc.ExpectedSecret = &v1.Secret{
  568. Type: v1.SecretTypeSSHAuth,
  569. Data: map[string][]byte{
  570. sshPrivateKey: []byte(sshSecretValue),
  571. },
  572. }
  573. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  574. {
  575. SecretKey: "mysecret",
  576. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  577. Key: sshRemoteRefKey,
  578. },
  579. },
  580. }
  581. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  582. Type: v1.SecretTypeSSHAuth,
  583. Data: map[string]string{
  584. sshPrivateKey: mysecretToStringTemplating,
  585. },
  586. }
  587. }
  588. }
  589. // This case adds an ssh private key secret and syncs it.
  590. func SSHKeySyncDataProperty(f *framework.Framework) (string, func(*framework.TestCase)) {
  591. return "[common] should sync ssh key with provider.", func(tc *framework.TestCase) {
  592. cloudSecretName := fmt.Sprintf("%s-%s", f.Namespace.Name, dockerConfigExampleName)
  593. cloudRemoteRefKey := f.MakeRemoteRefKey(cloudSecretName)
  594. SSHKey := `-----BEGIN OPENSSH PRIVATE KEY-----
  595. b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
  596. NhAAAAAwEAAQAAAYEAsARoZUqo6L5dd0WRjZ2QPq/kKlbjtUY1njzJ01UtdC1u1eSJFUnV
  597. K1J+9b1kEqI4lgAaItaYbpJNSgCe97z6DRxEMTUQ3VhB+X+mPfcN2/I0bYklRxh59OTJcL
  598. FsPX0oCR/5eLXz9MCmelxDX7H8XDh9hP6PThooYP60oaDt0xsZvEyo6OQ43n5FuorSg4vL
  599. aMIQYK/znhBq9kR6XKMO8mULoDa+LnhOWsAY8kJ3fowF/UsQmh6PY/w4DJaypm85+a6Sak
  600. Lpn80ur7L6nV7yTqufYqXa4hgNsJHmJ7NGKqOxT/8vcvVRqRadNLl79g9bRRavBiYt/8fy
  601. DJGxOuutcVTzYlzS593Vo95In853cT+HuK4guaWkQdTrThG7jHAi0wVueaEDCTnDkuTk2h
  602. 7PXFBkYTUwE3y+NHo1X+nTE3LhiUJ0RBr3aaj5UBYKHK1uMo1C4zZH3GMvB5K2KmXwG/oB
  603. gCcD1j5hlp6QwOzBVfXsXBF4ewtf7g3RQF8DS3mBAAAFkDc7Drc3Ow63AAAAB3NzaC1yc2
  604. EAAAGBALAEaGVKqOi+XXdFkY2dkD6v5CpW47VGNZ48ydNVLXQtbtXkiRVJ1StSfvW9ZBKi
  605. OJYAGiLWmG6STUoAnve8+g0cRDE1EN1YQfl/pj33DdvyNG2JJUcYefTkyXCxbD19KAkf+X
  606. i18/TApnpcQ1+x/Fw4fYT+j04aKGD+tKGg7dMbGbxMqOjkON5+RbqK0oOLy2jCEGCv854Q
  607. avZEelyjDvJlC6A2vi54TlrAGPJCd36MBf1LEJoej2P8OAyWsqZvOfmukmpC6Z/NLq+y+p
  608. 1e8k6rn2Kl2uIYDbCR5iezRiqjsU//L3L1UakWnTS5e/YPW0UWrwYmLf/H8gyRsTrrrXFU
  609. 82Jc0ufd1aPeSJ/Od3E/h7iuILmlpEHU604Ru4xwItMFbnmhAwk5w5Lk5Noez1xQZGE1MB
  610. N8vjR6NV/p0xNy4YlCdEQa92mo+VAWChytbjKNQuM2R9xjLweStipl8Bv6AYAnA9Y+YZae
  611. kMDswVX17FwReHsLX+4N0UBfA0t5gQAAAAMBAAEAAAGAey4agQiGvJq8fkPJYPnrgHNHkf
  612. nM0YeY7mxMMgFiFfPVpQqShLtu2yqYfxFTf1bXkuHvaIIVmwv32tokZetycspdTrJ8Yurp
  613. ANo8VREYOdx+pEleNSsD7kZOUvdXcJCt+/TMeZWcbKSF3QvEeqvsl/1Qmkorr9TOfVLCxn
  614. oA9cP5drWPX6yXv91OnwWX3UdvyphFLeT08KE8uauilkHmq+va/vxQi+TVsNzOmHu7dGw5
  615. pNFrhO/uGWLhNq4fyCn9l33vpHZdMe2h/N32MnKZgjFOWLqyHy2Cx5BDJTfXyHwjVTqGN1
  616. 8fzrC+o3OuFsR1pPugwlYUW8B9XaxPI6h+Ke6GIxacNtVvOe67GrkdYbQkyrs4/EMqbXTl
  617. /BG/JZIMuchk0Da0TKDDjBwchMjAiwjsFp/wawlL9Y0dJIG0muEuHXxjInEa7xQoisAUCf
  618. B7lasXeUPOy/Z76qFwjVvyfkiVgWygncjGL44b0rgEC81L/dTZUyvNoCM9Bn7wSbuBAAAA
  619. wQDHw6NkJCvGOYa9lt2lMou6hSudokHejOo+J9jJCJdUlMXIbHhBUzrmSh47OSkgpAo4qf
  620. iVGHvBO55pZ5pI7o4woTQxaPFM8a/5BhMWcZ2LDMqU5iov9C2Dz8yKUyQmAodNkOGacQJU
  621. MDAVBJYeBFJSu04bj2EEhEd+9rIazeqVl91qkV1uGTz4aJ360PSmLuLAFT12BYGjIBfHrS
  622. yom+1HbBoUziG4a/kzzbJGTC7U66YTjpHAMEtz4mbpU0AhNg4AAADBANgTs8yjrEkL4pcC
  623. gfUr9oR42/BVl3ZxaFQ7PAvs9m0aut7b/ZRmsSF8F2TAl0H4H9M8uUKTTOhqRtdnTtDqm9
  624. QBUIQBzA6Blb5oP+yL+Eiez4gMFd9HumFXG3JoRu/JmDE19KviHaldV47QcvG6B3p0eb5Q
  625. hgVcNsrOGyBUZA0kBmzQBwv6gUoo++ETQMH89BlljZVCiPW7F6FCrPxHp7EB5txYJ62Qpu
  626. 2U40qgb2ONiUOuiI84EYRAgmDTbboMPQAAAMEA0Inn71l7LsYv81vstbmMQz0qLvhHkBcp
  627. mMhh6tyzI0dvLZabBLTPhIT4R/0VDMJGsH5X1cEaap47XDpu0/g3mfOV6PToUfYA2Ugw7N
  628. bs23UlVH1n0zL2x0QOMHX/Fkfc3OdIuc97ZHoMeW6Nf7Ii0iH7slIpH4hPVYcGXk/bX6wt
  629. PKDc8xGEXdd4A6jnwJBifJs+UpPrHAh0c63KfjO3rryDycvmxeWRnyU1yRCUjIuH31vi+L
  630. OkcGfqTaOoz2KVAAAAFGtpYW5AREVTS1RPUC1TNFI5S1JQAQIDBAUG
  631. -----END OPENSSH PRIVATE KEY-----`
  632. cloudSecretValue := fmt.Sprintf(`{"ssh-auth": %q}`, SSHKey)
  633. tc.Secrets = map[string]framework.SecretEntry{
  634. cloudRemoteRefKey: {Value: cloudSecretValue},
  635. }
  636. tc.ExpectedSecret = &v1.Secret{
  637. Type: v1.SecretTypeSSHAuth,
  638. Data: map[string][]byte{
  639. sshPrivateKey: []byte(SSHKey),
  640. },
  641. }
  642. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  643. {
  644. SecretKey: "mysecret",
  645. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  646. Key: cloudRemoteRefKey,
  647. Property: "ssh-auth",
  648. },
  649. },
  650. }
  651. tc.ExternalSecret.Spec.Target.Template = &esv1.ExternalSecretTemplate{
  652. Type: v1.SecretTypeSSHAuth,
  653. Data: map[string]string{
  654. sshPrivateKey: mysecretToStringTemplating,
  655. },
  656. }
  657. }
  658. }
  659. func DeletionPolicyDelete(f *framework.Framework) (string, func(*framework.TestCase)) {
  660. return "[common] should delete secret when provider secret was deleted using .data[]", func(tc *framework.TestCase) {
  661. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  662. secretKey2 := fmt.Sprintf("%s-%s", f.Namespace.Name, "other")
  663. remoteRefKey1 := f.MakeRemoteRefKey(secretKey1)
  664. remoteRefKey2 := f.MakeRemoteRefKey(secretKey2)
  665. secretValue := "bazz"
  666. tc.Secrets = map[string]framework.SecretEntry{
  667. remoteRefKey1: {Value: secretValue},
  668. remoteRefKey2: {Value: secretValue},
  669. }
  670. tc.ExpectedSecret = &v1.Secret{
  671. Type: v1.SecretTypeOpaque,
  672. Data: map[string][]byte{
  673. secretKey1: []byte(secretValue),
  674. secretKey2: []byte(secretValue),
  675. },
  676. }
  677. tc.ExternalSecret.Spec.Target.DeletionPolicy = esv1.DeletionPolicyDelete
  678. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  679. {
  680. SecretKey: secretKey1,
  681. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  682. Key: remoteRefKey1,
  683. },
  684. },
  685. {
  686. SecretKey: secretKey2,
  687. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  688. Key: remoteRefKey2,
  689. },
  690. },
  691. }
  692. tc.AfterSync = func(prov framework.SecretStoreProvider, secret *v1.Secret) {
  693. prov.DeleteSecret(remoteRefKey1)
  694. prov.DeleteSecret(remoteRefKey2)
  695. gomega.Eventually(func() bool {
  696. _, err := f.KubeClientSet.CoreV1().Secrets(f.Namespace.Name).Get(GinkgoT().Context(), secret.Name, metav1.GetOptions{})
  697. return errors.IsNotFound(err)
  698. }, time.Minute*5, time.Second*5).Should(gomega.BeTrue())
  699. }
  700. }
  701. }
  702. func DecodingPolicySync(f *framework.Framework) (string, func(*framework.TestCase)) {
  703. return "[common] should decode secrets with data and dataFrom", func(tc *framework.TestCase) {
  704. secretKey1 := fmt.Sprintf("%s-%s", f.Namespace.Name, "one")
  705. targetSecretKey1 := "name"
  706. targetSecretValue1 := "Z3JlYXQtbmFtZQ=="
  707. targetSecretKey2 := "surname"
  708. targetSecretValue2 := "Z3JlYXQtc3VybmFtZQ=="
  709. targetSecretKey3 := "address"
  710. targetSecretValue3 := "happy calm street No. 1"
  711. secretValue := fmt.Sprintf("{ %q: %q, %q: %q, %q: %q }", targetSecretKey1, targetSecretValue1, targetSecretKey2, targetSecretValue2, targetSecretKey3, targetSecretValue3)
  712. tc.Secrets = map[string]framework.SecretEntry{
  713. secretKey1: {Value: secretValue},
  714. }
  715. tc.ExpectedSecret = &v1.Secret{
  716. Type: v1.SecretTypeOpaque,
  717. Data: map[string][]byte{
  718. targetSecretKey1: []byte("great-name"),
  719. targetSecretKey2: []byte("great-surname"),
  720. targetSecretKey3: []byte(targetSecretValue3),
  721. "base64": []byte("great-name"),
  722. "none": []byte(targetSecretValue1),
  723. },
  724. }
  725. tc.ExternalSecret.Spec.DataFrom = []esv1.ExternalSecretDataFromRemoteRef{
  726. {
  727. Extract: &esv1.ExternalSecretDataRemoteRef{
  728. Key: secretKey1,
  729. DecodingStrategy: esv1.ExternalSecretDecodeAuto,
  730. },
  731. },
  732. }
  733. tc.ExternalSecret.Spec.Data = []esv1.ExternalSecretData{
  734. {
  735. SecretKey: "base64",
  736. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  737. Key: secretKey1,
  738. Property: targetSecretKey1,
  739. DecodingStrategy: esv1.ExternalSecretDecodeBase64,
  740. },
  741. },
  742. {
  743. SecretKey: "none",
  744. RemoteRef: esv1.ExternalSecretDataRemoteRef{
  745. Key: secretKey1,
  746. Property: targetSecretKey1,
  747. DecodingStrategy: esv1.ExternalSecretDecodeNone,
  748. },
  749. },
  750. }
  751. }
  752. }