| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226 |
- /*
- Copyright © 2025 ESO Maintainer Team
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- https://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package v1
- import (
- "testing"
- "k8s.io/apimachinery/pkg/runtime"
- )
- const (
- errExtractFindGenerator = "extract, find, or generatorRef cannot be set at the same time"
- )
- func TestValidateExternalSecret(t *testing.T) {
- tests := []struct {
- name string
- obj runtime.Object
- expectedErr string
- }{
- {
- name: "nil",
- obj: nil,
- expectedErr: "unexpected type",
- },
- {
- name: "deletion policy delete",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- Target: ExternalSecretTarget{
- DeletionPolicy: DeletionPolicyDelete,
- CreationPolicy: CreatePolicyMerge,
- },
- Data: []ExternalSecretData{
- {},
- },
- },
- },
- expectedErr: "deletionPolicy=Delete must not be used when the controller doesn't own the secret. Please set creationPolicy=Owner",
- },
- {
- name: "deletion policy merge",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- Target: ExternalSecretTarget{
- DeletionPolicy: DeletionPolicyMerge,
- CreationPolicy: CreatePolicyNone,
- },
- Data: []ExternalSecretData{
- {},
- },
- },
- },
- expectedErr: "deletionPolicy=Merge must not be used with creationPolicy=None. There is no Secret to merge with",
- },
- {
- name: "both data and data_from are empty",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{},
- },
- expectedErr: "either data or dataFrom should be specified",
- },
- {
- name: "find with extract",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- DataFrom: []ExternalSecretDataFromRemoteRef{
- {
- Find: &ExternalSecretFind{},
- Extract: &ExternalSecretDataRemoteRef{},
- },
- },
- },
- },
- expectedErr: errExtractFindGenerator,
- },
- {
- name: "generator with find",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- DataFrom: []ExternalSecretDataFromRemoteRef{
- {
- Find: &ExternalSecretFind{},
- SourceRef: &StoreGeneratorSourceRef{
- GeneratorRef: &GeneratorRef{},
- },
- },
- },
- },
- },
- expectedErr: errExtractFindGenerator,
- },
- {
- name: "generator with extract",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- DataFrom: []ExternalSecretDataFromRemoteRef{
- {
- Extract: &ExternalSecretDataRemoteRef{},
- SourceRef: &StoreGeneratorSourceRef{
- GeneratorRef: &GeneratorRef{},
- },
- },
- },
- },
- },
- expectedErr: errExtractFindGenerator,
- },
- {
- name: "empty dataFrom",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- DataFrom: []ExternalSecretDataFromRemoteRef{
- {},
- },
- },
- },
- expectedErr: "either extract, find, or sourceRef must be set to dataFrom",
- },
- {
- name: "empty sourceRef",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- DataFrom: []ExternalSecretDataFromRemoteRef{
- {
- SourceRef: &StoreGeneratorSourceRef{},
- },
- },
- },
- },
- expectedErr: "generatorRef or storeRef must be set when using sourceRef in dataFrom",
- },
- {
- name: "multiple errors",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- Target: ExternalSecretTarget{
- DeletionPolicy: DeletionPolicyMerge,
- CreationPolicy: CreatePolicyNone,
- },
- },
- },
- expectedErr: `deletionPolicy=Merge must not be used with creationPolicy=None. There is no Secret to merge with
- either data or dataFrom should be specified`,
- },
- {
- name: "valid",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- DataFrom: []ExternalSecretDataFromRemoteRef{
- {
- SourceRef: &StoreGeneratorSourceRef{
- GeneratorRef: &GeneratorRef{},
- },
- },
- },
- },
- },
- },
- {
- name: "duplicate secretKeys",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- Target: ExternalSecretTarget{
- DeletionPolicy: DeletionPolicyRetain,
- },
- Data: []ExternalSecretData{
- {SecretKey: "SERVICE_NAME"},
- {SecretKey: "SERVICE_NAME"},
- {SecretKey: "SERVICE_NAME-2"},
- {SecretKey: "SERVICE_NAME-2"},
- {SecretKey: "NOT_DUPLICATE"},
- },
- },
- },
- expectedErr: "duplicate secretKey found: SERVICE_NAME\nduplicate secretKey found: SERVICE_NAME-2",
- },
- {
- name: "duplicate secretKey",
- obj: &ExternalSecret{
- Spec: ExternalSecretSpec{
- Target: ExternalSecretTarget{
- DeletionPolicy: DeletionPolicyRetain,
- },
- Data: []ExternalSecretData{
- {SecretKey: "SERVICE_NAME"},
- {SecretKey: "SERVICE_NAME"},
- },
- },
- },
- expectedErr: "duplicate secretKey found: SERVICE_NAME",
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- _, err := validateExternalSecret(tt.obj)
- if err != nil {
- if tt.expectedErr == "" {
- t.Fatalf("validateExternalSecret() returned an unexpected error: %v", err)
- }
- if err.Error() != tt.expectedErr {
- t.Fatalf("validateExternalSecret() returned an unexpected error: got: %v, expected: %v", err, tt.expectedErr)
- }
- return
- }
- if tt.expectedErr != "" {
- t.Errorf("validateExternalSecret() should have returned an error but got nil")
- }
- })
- }
- }
|