provider_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package beyondtrust
  14. import (
  15. "context"
  16. "net/http"
  17. "net/http/httptest"
  18. "testing"
  19. "github.com/stretchr/testify/assert"
  20. corev1 "k8s.io/api/core/v1"
  21. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  22. "k8s.io/client-go/tools/clientcmd"
  23. clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
  24. "k8s.io/utils/ptr"
  25. kubeclient "sigs.k8s.io/controller-runtime/pkg/client"
  26. "sigs.k8s.io/controller-runtime/pkg/client/fake"
  27. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  28. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  29. )
  30. const (
  31. errTestCase = "Test case Failed"
  32. fakeAPIURL = "https://example.com:443/BeyondTrust/api/public/v3/"
  33. apiKey = "fakeapikey00fakeapikeydd0000000000065b010f20fakeapikey0000000008700000a93fb5d74fddc0000000000000000000000000000000000000;runas=test_user"
  34. clientID = "12345678-25fg-4b05-9ced-35e7dd5093ae"
  35. clientSecret = "12345678-25fg-4b05-9ced-35e7dd5093ae"
  36. )
  37. func createMockPasswordSafeClient(t *testing.T) kubeclient.Client {
  38. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  39. switch r.URL.Path {
  40. case "/Auth/SignAppin":
  41. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"fake@beyondtrust.com"}`))
  42. if err != nil {
  43. t.Error(errTestCase)
  44. }
  45. case "/Auth/Signout":
  46. _, err := w.Write([]byte(``))
  47. if err != nil {
  48. t.Error(errTestCase)
  49. }
  50. case "/secrets-safe/secrets":
  51. _, err := w.Write([]byte(`[{"SecretType": "FILE", "Password": "credential_in_sub_3_password","Id": "12345678-07d6-4955-175a-08db047219ce","Title": "credential_in_sub_3"}]`))
  52. if err != nil {
  53. t.Error(errTestCase)
  54. }
  55. case "/secrets-safe/secrets/12345678-07d6-4955-175a-08db047219ce/file/download":
  56. _, err := w.Write([]byte(`fake_password`))
  57. if err != nil {
  58. t.Error(errTestCase)
  59. }
  60. default:
  61. http.NotFound(w, r)
  62. }
  63. }))
  64. t.Cleanup(server.Close)
  65. clientConfig := clientcmd.NewDefaultClientConfig(clientcmdapi.Config{
  66. Clusters: map[string]*clientcmdapi.Cluster{
  67. "test": {
  68. Server: server.URL,
  69. },
  70. },
  71. AuthInfos: map[string]*clientcmdapi.AuthInfo{
  72. "test": {
  73. Token: "token",
  74. },
  75. },
  76. Contexts: map[string]*clientcmdapi.Context{
  77. "test": {
  78. Cluster: "test",
  79. AuthInfo: "test",
  80. },
  81. },
  82. CurrentContext: "test",
  83. }, &clientcmd.ConfigOverrides{})
  84. restConfig, err := clientConfig.ClientConfig()
  85. assert.Nil(t, err)
  86. c, err := kubeclient.New(restConfig, kubeclient.Options{})
  87. assert.Nil(t, err)
  88. return c
  89. }
  90. func TestNewClient(t *testing.T) {
  91. type args struct {
  92. store esv1.SecretStore
  93. kube kubeclient.Client
  94. provider esv1.Provider
  95. }
  96. tests := []struct {
  97. name string
  98. nameSpace string
  99. args args
  100. validateErrorNil bool
  101. validateErrorText bool
  102. expectedErrorText string
  103. }{
  104. {
  105. name: "Client ok",
  106. nameSpace: "test",
  107. args: args{
  108. store: esv1.SecretStore{
  109. Spec: esv1.SecretStoreSpec{
  110. Provider: &esv1.SecretStoreProvider{
  111. Beyondtrust: &esv1.BeyondtrustProvider{
  112. Server: &esv1.BeyondtrustServer{
  113. APIURL: fakeAPIURL,
  114. RetrievalType: "SECRET",
  115. },
  116. Auth: &esv1.BeyondtrustAuth{
  117. ClientID: &esv1.BeyondTrustProviderSecretRef{
  118. Value: clientID,
  119. },
  120. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  121. Value: clientSecret,
  122. },
  123. },
  124. },
  125. },
  126. },
  127. },
  128. kube: createMockPasswordSafeClient(t),
  129. provider: &Provider{},
  130. },
  131. validateErrorNil: true,
  132. validateErrorText: false,
  133. },
  134. {
  135. name: "Bad Client Id",
  136. nameSpace: "test",
  137. args: args{
  138. store: esv1.SecretStore{
  139. Spec: esv1.SecretStoreSpec{
  140. Provider: &esv1.SecretStoreProvider{
  141. Beyondtrust: &esv1.BeyondtrustProvider{
  142. Server: &esv1.BeyondtrustServer{
  143. APIURL: fakeAPIURL,
  144. RetrievalType: "SECRET",
  145. },
  146. Auth: &esv1.BeyondtrustAuth{
  147. ClientID: &esv1.BeyondTrustProviderSecretRef{
  148. Value: "6138d050",
  149. },
  150. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  151. Value: clientSecret,
  152. },
  153. },
  154. },
  155. },
  156. },
  157. },
  158. kube: createMockPasswordSafeClient(t),
  159. provider: &Provider{},
  160. },
  161. validateErrorNil: false,
  162. validateErrorText: true,
  163. expectedErrorText: "error in Inputs: Error in field ClientId : min / 36.",
  164. },
  165. {
  166. name: "Bad Client Secret",
  167. nameSpace: "test",
  168. args: args{
  169. store: esv1.SecretStore{
  170. Spec: esv1.SecretStoreSpec{
  171. Provider: &esv1.SecretStoreProvider{
  172. Beyondtrust: &esv1.BeyondtrustProvider{
  173. Server: &esv1.BeyondtrustServer{
  174. APIURL: fakeAPIURL,
  175. RetrievalType: "SECRET",
  176. },
  177. Auth: &esv1.BeyondtrustAuth{
  178. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  179. Value: "8i7U0Yulabon8mTc",
  180. },
  181. ClientID: &esv1.BeyondTrustProviderSecretRef{
  182. Value: clientID,
  183. },
  184. },
  185. },
  186. },
  187. },
  188. },
  189. kube: createMockPasswordSafeClient(t),
  190. provider: &Provider{},
  191. },
  192. validateErrorNil: false,
  193. validateErrorText: true,
  194. expectedErrorText: "error in Inputs: Error in field ClientSecret : min / 36.",
  195. },
  196. {
  197. name: "Bad Separator",
  198. nameSpace: "test",
  199. args: args{
  200. store: esv1.SecretStore{
  201. Spec: esv1.SecretStoreSpec{
  202. Provider: &esv1.SecretStoreProvider{
  203. Beyondtrust: &esv1.BeyondtrustProvider{
  204. Server: &esv1.BeyondtrustServer{
  205. APIURL: fakeAPIURL,
  206. Separator: "//",
  207. RetrievalType: "SECRET",
  208. },
  209. Auth: &esv1.BeyondtrustAuth{
  210. ClientID: &esv1.BeyondTrustProviderSecretRef{
  211. Value: clientID,
  212. },
  213. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  214. Value: clientSecret,
  215. },
  216. },
  217. },
  218. },
  219. },
  220. },
  221. kube: createMockPasswordSafeClient(t),
  222. provider: &Provider{},
  223. },
  224. validateErrorNil: false,
  225. validateErrorText: true,
  226. expectedErrorText: "error in Inputs: Error in field ClientId : min / 36.",
  227. },
  228. {
  229. name: "Time Out",
  230. nameSpace: "test",
  231. args: args{
  232. store: esv1.SecretStore{
  233. Spec: esv1.SecretStoreSpec{
  234. Provider: &esv1.SecretStoreProvider{
  235. Beyondtrust: &esv1.BeyondtrustProvider{
  236. Server: &esv1.BeyondtrustServer{
  237. APIURL: fakeAPIURL,
  238. Separator: "/",
  239. ClientTimeOutSeconds: 400,
  240. RetrievalType: "SECRET",
  241. },
  242. Auth: &esv1.BeyondtrustAuth{
  243. ClientID: &esv1.BeyondTrustProviderSecretRef{
  244. Value: clientID,
  245. },
  246. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  247. Value: clientSecret,
  248. },
  249. },
  250. },
  251. },
  252. },
  253. },
  254. kube: createMockPasswordSafeClient(t),
  255. provider: &Provider{},
  256. },
  257. validateErrorNil: false,
  258. validateErrorText: true,
  259. expectedErrorText: "error in Inputs: Error in field ClientTimeOutinSeconds : lte / 300.",
  260. },
  261. {
  262. name: "ApiKey ok",
  263. nameSpace: "test",
  264. args: args{
  265. store: esv1.SecretStore{
  266. Spec: esv1.SecretStoreSpec{
  267. Provider: &esv1.SecretStoreProvider{
  268. Beyondtrust: &esv1.BeyondtrustProvider{
  269. Server: &esv1.BeyondtrustServer{
  270. APIURL: fakeAPIURL,
  271. RetrievalType: "SECRET",
  272. },
  273. Auth: &esv1.BeyondtrustAuth{
  274. APIKey: &esv1.BeyondTrustProviderSecretRef{
  275. Value: apiKey,
  276. },
  277. },
  278. },
  279. },
  280. },
  281. },
  282. kube: createMockPasswordSafeClient(t),
  283. provider: &Provider{},
  284. },
  285. validateErrorNil: true,
  286. validateErrorText: false,
  287. },
  288. {
  289. name: "Bad ApiKey",
  290. nameSpace: "test",
  291. args: args{
  292. store: esv1.SecretStore{
  293. Spec: esv1.SecretStoreSpec{
  294. Provider: &esv1.SecretStoreProvider{
  295. Beyondtrust: &esv1.BeyondtrustProvider{
  296. Server: &esv1.BeyondtrustServer{
  297. APIURL: fakeAPIURL,
  298. RetrievalType: "SECRET",
  299. },
  300. Auth: &esv1.BeyondtrustAuth{
  301. APIKey: &esv1.BeyondTrustProviderSecretRef{
  302. Value: "bad_api_key",
  303. },
  304. },
  305. },
  306. },
  307. },
  308. },
  309. kube: createMockPasswordSafeClient(t),
  310. provider: &Provider{},
  311. },
  312. validateErrorNil: false,
  313. validateErrorText: true,
  314. expectedErrorText: "error in Inputs: Error in field ApiKey : min / 128.",
  315. },
  316. }
  317. for _, tt := range tests {
  318. t.Run(tt.name, func(t *testing.T) {
  319. _, err := tt.args.provider.NewClient(context.Background(), &tt.args.store, tt.args.kube, tt.nameSpace)
  320. if err != nil && tt.validateErrorNil {
  321. t.Errorf("ProviderBeyondtrust.NewClient() error = %v", err)
  322. }
  323. if err != nil && tt.validateErrorText {
  324. assert.Equal(t, err.Error(), tt.expectedErrorText)
  325. }
  326. })
  327. }
  328. }
  329. func TestLoadConfigSecret_NamespacedStoreCannotCrossNamespace(t *testing.T) {
  330. kube := fake.NewClientBuilder().WithObjects(&corev1.Secret{
  331. ObjectMeta: metav1.ObjectMeta{
  332. Namespace: "foo",
  333. Name: "creds",
  334. },
  335. Data: map[string][]byte{
  336. "key": []byte("value"),
  337. },
  338. }).Build()
  339. ref := &esv1.BeyondTrustProviderSecretRef{
  340. SecretRef: &esmeta.SecretKeySelector{
  341. Namespace: ptr.To("foo"),
  342. Name: "creds",
  343. Key: "key",
  344. },
  345. }
  346. // For a namespaced SecretStore, attempting to read from another namespace must fail.
  347. _, err := loadConfigSecret(t.Context(), ref, kube, "ns2", esv1.SecretStoreKind)
  348. if err == nil {
  349. t.Fatalf("expected error when accessing secret across namespaces with SecretStore, got nil")
  350. }
  351. // For a namespaced SecretStore, attempting to read from the right namespace must not fail.
  352. val, err := loadConfigSecret(t.Context(), ref, kube, "foo", esv1.SecretStoreKind)
  353. if err != nil {
  354. t.Fatalf("expected error when accessing secret across namespaces with SecretStore, got nil")
  355. }
  356. if val != "value" {
  357. t.Fatalf("expected value, got %q", val)
  358. }
  359. }
  360. func TestLoadConfigSecret_ClusterStoreCanAccessOtherNamespace(t *testing.T) {
  361. kube := fake.NewClientBuilder().WithObjects(&corev1.Secret{
  362. ObjectMeta: metav1.ObjectMeta{
  363. Namespace: "foo",
  364. Name: "creds",
  365. },
  366. Data: map[string][]byte{
  367. "key": []byte("value"),
  368. },
  369. }).Build()
  370. ref := &esv1.BeyondTrustProviderSecretRef{
  371. SecretRef: &esmeta.SecretKeySelector{
  372. Namespace: ptr.To("foo"),
  373. Name: "creds",
  374. Key: "key",
  375. },
  376. }
  377. // ClusterSecretStore may access across namespaces when a namespace is provided in the selector.
  378. val, err := loadConfigSecret(t.Context(), ref, kube, "unrelated-namespace", esv1.ClusterSecretStoreKind)
  379. if err != nil {
  380. t.Fatalf("unexpected error: %v", err)
  381. }
  382. if val != "value" {
  383. t.Fatalf("expected valueA, got %q", val)
  384. }
  385. }