testcase.go 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package framework
  13. import (
  14. "context"
  15. "time"
  16. //nolint
  17. "github.com/external-secrets/external-secrets-e2e/framework/log"
  18. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  19. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  20. . "github.com/onsi/gomega"
  21. v1 "k8s.io/api/core/v1"
  22. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  23. "sigs.k8s.io/controller-runtime/pkg/client"
  24. )
  25. var TargetSecretName = "target-secret"
  26. // TestCase contains the test infra to run a table driven test.
  27. type TestCase struct {
  28. Framework *Framework
  29. ExternalSecret *esv1beta1.ExternalSecret
  30. ExternalSecretV1Alpha1 *esv1alpha1.ExternalSecret
  31. AdditionalObjects []client.Object
  32. Secrets map[string]SecretEntry
  33. ExpectedSecret *v1.Secret
  34. AfterSync func(SecretStoreProvider, *v1.Secret)
  35. }
  36. type SecretEntry struct {
  37. Value string
  38. Tags map[string]string
  39. }
  40. // SecretStoreProvider is a interface that must be implemented
  41. // by a provider that runs the e2e test.
  42. type SecretStoreProvider interface {
  43. CreateSecret(key string, val SecretEntry)
  44. DeleteSecret(key string)
  45. }
  46. // TableFunc returns the main func that runs a TestCase in a table driven test.
  47. func TableFunc(f *Framework, prov SecretStoreProvider) func(...func(*TestCase)) {
  48. return func(tweaks ...func(*TestCase)) {
  49. var err error
  50. // make default test case
  51. // and apply customization to it
  52. tc := makeDefaultTestCase(f)
  53. for _, tweak := range tweaks {
  54. tweak(tc)
  55. }
  56. // create secrets & defer delete
  57. for k, v := range tc.Secrets {
  58. key := k
  59. prov.CreateSecret(key, v)
  60. defer func() {
  61. prov.DeleteSecret(key)
  62. }()
  63. }
  64. // create v1alpha1 external secret, if provided
  65. if tc.ExternalSecretV1Alpha1 != nil {
  66. err = tc.Framework.CRClient.Create(context.Background(), tc.ExternalSecretV1Alpha1)
  67. Expect(err).ToNot(HaveOccurred())
  68. } else if tc.ExternalSecret != nil {
  69. // create v1beta1 external secret otherwise
  70. err = tc.Framework.CRClient.Create(context.Background(), tc.ExternalSecret)
  71. Expect(err).ToNot(HaveOccurred())
  72. }
  73. if tc.AdditionalObjects != nil {
  74. for _, obj := range tc.AdditionalObjects {
  75. err = tc.Framework.CRClient.Create(context.Background(), obj)
  76. Expect(err).ToNot(HaveOccurred())
  77. }
  78. }
  79. // in case target name is empty
  80. if tc.ExternalSecret != nil && tc.ExternalSecret.Spec.Target.Name == "" {
  81. TargetSecretName = tc.ExternalSecret.ObjectMeta.Name
  82. }
  83. // wait for Kind=Secret to have the expected data
  84. if tc.ExpectedSecret != nil {
  85. secret, err := tc.Framework.WaitForSecretValue(tc.Framework.Namespace.Name, TargetSecretName, tc.ExpectedSecret)
  86. if err != nil {
  87. f.printESDebugLogs(tc.ExternalSecret.Name, tc.ExternalSecret.Namespace)
  88. log.Logf("Did not match. Expected: %+v, Got: %+v", tc.ExpectedSecret, secret)
  89. }
  90. Expect(err).ToNot(HaveOccurred())
  91. tc.AfterSync(prov, secret)
  92. } else {
  93. tc.AfterSync(prov, nil)
  94. }
  95. }
  96. }
  97. func makeDefaultTestCase(f *Framework) *TestCase {
  98. return &TestCase{
  99. AfterSync: func(ssp SecretStoreProvider, s *v1.Secret) {},
  100. Framework: f,
  101. ExternalSecret: &esv1beta1.ExternalSecret{
  102. ObjectMeta: metav1.ObjectMeta{
  103. Name: "e2e-es",
  104. Namespace: f.Namespace.Name,
  105. },
  106. Spec: esv1beta1.ExternalSecretSpec{
  107. RefreshInterval: &metav1.Duration{Duration: time.Second * 5},
  108. SecretStoreRef: esv1beta1.SecretStoreRef{
  109. Name: f.Namespace.Name,
  110. },
  111. Target: esv1beta1.ExternalSecretTarget{
  112. Name: TargetSecretName,
  113. },
  114. },
  115. },
  116. }
  117. }