provider_test.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package beyondtrust
  14. import (
  15. "context"
  16. "net/http"
  17. "net/http/httptest"
  18. "testing"
  19. "time"
  20. "github.com/BeyondTrust/go-client-library-passwordsafe/api/authentication"
  21. "github.com/BeyondTrust/go-client-library-passwordsafe/api/logging"
  22. "github.com/BeyondTrust/go-client-library-passwordsafe/api/utils"
  23. "github.com/cenkalti/backoff/v4"
  24. "github.com/stretchr/testify/assert"
  25. "github.com/stretchr/testify/require"
  26. "go.uber.org/zap"
  27. v1 "k8s.io/api/core/v1"
  28. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  29. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  30. "k8s.io/client-go/tools/clientcmd"
  31. clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
  32. kubeclient "sigs.k8s.io/controller-runtime/pkg/client"
  33. "sigs.k8s.io/controller-runtime/pkg/client/fake"
  34. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  35. "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  36. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  37. )
  38. const (
  39. errTestCase = "Test case Failed"
  40. fakeAPIURL = "https://example.com:443/BeyondTrust/api/public/v3/"
  41. apiKey = "fakeapikey00fakeapikeydd0000000000065b010f20fakeapikey0000000008700000a93fb5d74fddc0000000000000000000000000000000000000;runas=test_user"
  42. clientID = "12345678-25fg-4b05-9ced-35e7dd5093ae"
  43. clientSecret = "12345678-25fg-4b05-9ced-35e7dd5093ae"
  44. authConnectTokenPath = "/Auth/connect/token"
  45. authSignAppInPath = "/Auth/SignAppIn"
  46. secretsSafeFoldersPath = "/secrets-safe/folders/"
  47. secretsSafeSecretsPath = "/secrets-safe/secrets"
  48. )
  49. func createMockPasswordSafeClient(t *testing.T) kubeclient.Client {
  50. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  51. switch r.URL.Path {
  52. case authSignAppInPath:
  53. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"fake@beyondtrust.com"}`))
  54. if err != nil {
  55. t.Error(errTestCase)
  56. }
  57. case "/Auth/Signout":
  58. _, err := w.Write([]byte(``))
  59. if err != nil {
  60. t.Error(errTestCase)
  61. }
  62. case secretsSafeSecretsPath:
  63. _, err := w.Write([]byte(`[{"SecretType": "FILE", "Password": "credential_in_sub_3_password","Id": "12345678-07d6-4955-175a-08db047219ce","Title": "credential_in_sub_3"}]`))
  64. if err != nil {
  65. t.Error(errTestCase)
  66. }
  67. case "/secrets-safe/secrets/12345678-07d6-4955-175a-08db047219ce/file/download":
  68. _, err := w.Write([]byte(`fake_password`))
  69. if err != nil {
  70. t.Error(errTestCase)
  71. }
  72. default:
  73. http.NotFound(w, r)
  74. }
  75. }))
  76. t.Cleanup(server.Close)
  77. clientConfig := clientcmd.NewDefaultClientConfig(clientcmdapi.Config{
  78. Clusters: map[string]*clientcmdapi.Cluster{
  79. "test": {
  80. Server: server.URL,
  81. },
  82. },
  83. AuthInfos: map[string]*clientcmdapi.AuthInfo{
  84. "test": {
  85. Token: "token",
  86. },
  87. },
  88. Contexts: map[string]*clientcmdapi.Context{
  89. "test": {
  90. Cluster: "test",
  91. AuthInfo: "test",
  92. },
  93. },
  94. CurrentContext: "test",
  95. }, &clientcmd.ConfigOverrides{})
  96. restConfig, err := clientConfig.ClientConfig()
  97. assert.Nil(t, err)
  98. c, err := kubeclient.New(restConfig, kubeclient.Options{})
  99. assert.Nil(t, err)
  100. return c
  101. }
  102. func TestNewClient(t *testing.T) {
  103. type args struct {
  104. store esv1.SecretStore
  105. kube kubeclient.Client
  106. provider esv1.Provider
  107. }
  108. tests := []struct {
  109. name string
  110. nameSpace string
  111. args args
  112. validateErrorNil bool
  113. validateErrorText bool
  114. expectedErrorText string
  115. }{
  116. {
  117. name: "Client ok",
  118. nameSpace: "test",
  119. args: args{
  120. store: esv1.SecretStore{
  121. Spec: esv1.SecretStoreSpec{
  122. Provider: &esv1.SecretStoreProvider{
  123. Beyondtrust: &esv1.BeyondtrustProvider{
  124. Server: &esv1.BeyondtrustServer{
  125. APIURL: fakeAPIURL,
  126. RetrievalType: "SECRET",
  127. },
  128. Auth: &esv1.BeyondtrustAuth{
  129. ClientID: &esv1.BeyondTrustProviderSecretRef{
  130. Value: clientID,
  131. },
  132. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  133. Value: clientSecret,
  134. },
  135. },
  136. },
  137. },
  138. },
  139. },
  140. kube: createMockPasswordSafeClient(t),
  141. provider: &Provider{},
  142. },
  143. validateErrorNil: true,
  144. validateErrorText: false,
  145. },
  146. {
  147. name: "Bad Client Id",
  148. nameSpace: "test",
  149. args: args{
  150. store: esv1.SecretStore{
  151. Spec: esv1.SecretStoreSpec{
  152. Provider: &esv1.SecretStoreProvider{
  153. Beyondtrust: &esv1.BeyondtrustProvider{
  154. Server: &esv1.BeyondtrustServer{
  155. APIURL: fakeAPIURL,
  156. RetrievalType: "SECRET",
  157. },
  158. Auth: &esv1.BeyondtrustAuth{
  159. ClientID: &esv1.BeyondTrustProviderSecretRef{
  160. Value: "6138d050",
  161. },
  162. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  163. Value: clientSecret,
  164. },
  165. },
  166. },
  167. },
  168. },
  169. },
  170. kube: createMockPasswordSafeClient(t),
  171. provider: &Provider{},
  172. },
  173. validateErrorNil: false,
  174. validateErrorText: true,
  175. expectedErrorText: "error in Inputs: Error in field ClientId : min / 36.",
  176. },
  177. {
  178. name: "Bad Client Secret",
  179. nameSpace: "test",
  180. args: args{
  181. store: esv1.SecretStore{
  182. Spec: esv1.SecretStoreSpec{
  183. Provider: &esv1.SecretStoreProvider{
  184. Beyondtrust: &esv1.BeyondtrustProvider{
  185. Server: &esv1.BeyondtrustServer{
  186. APIURL: fakeAPIURL,
  187. RetrievalType: "SECRET",
  188. },
  189. Auth: &esv1.BeyondtrustAuth{
  190. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  191. Value: "8i7U0Yulabon8mTc",
  192. },
  193. ClientID: &esv1.BeyondTrustProviderSecretRef{
  194. Value: clientID,
  195. },
  196. },
  197. },
  198. },
  199. },
  200. },
  201. kube: createMockPasswordSafeClient(t),
  202. provider: &Provider{},
  203. },
  204. validateErrorNil: false,
  205. validateErrorText: true,
  206. expectedErrorText: "error in Inputs: Error in field ClientSecret : min / 36.",
  207. },
  208. {
  209. name: "Bad Separator",
  210. nameSpace: "test",
  211. args: args{
  212. store: esv1.SecretStore{
  213. Spec: esv1.SecretStoreSpec{
  214. Provider: &esv1.SecretStoreProvider{
  215. Beyondtrust: &esv1.BeyondtrustProvider{
  216. Server: &esv1.BeyondtrustServer{
  217. APIURL: fakeAPIURL,
  218. Separator: "//",
  219. RetrievalType: "SECRET",
  220. },
  221. Auth: &esv1.BeyondtrustAuth{
  222. ClientID: &esv1.BeyondTrustProviderSecretRef{
  223. Value: clientID,
  224. },
  225. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  226. Value: clientSecret,
  227. },
  228. },
  229. },
  230. },
  231. },
  232. },
  233. kube: createMockPasswordSafeClient(t),
  234. provider: &Provider{},
  235. },
  236. validateErrorNil: false,
  237. validateErrorText: true,
  238. expectedErrorText: "error in Inputs: Error in field ClientId : min / 36.",
  239. },
  240. {
  241. name: "Time Out",
  242. nameSpace: "test",
  243. args: args{
  244. store: esv1.SecretStore{
  245. Spec: esv1.SecretStoreSpec{
  246. Provider: &esv1.SecretStoreProvider{
  247. Beyondtrust: &esv1.BeyondtrustProvider{
  248. Server: &esv1.BeyondtrustServer{
  249. APIURL: fakeAPIURL,
  250. Separator: "/",
  251. ClientTimeOutSeconds: 400,
  252. RetrievalType: "SECRET",
  253. },
  254. Auth: &esv1.BeyondtrustAuth{
  255. ClientID: &esv1.BeyondTrustProviderSecretRef{
  256. Value: clientID,
  257. },
  258. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  259. Value: clientSecret,
  260. },
  261. },
  262. },
  263. },
  264. },
  265. },
  266. kube: createMockPasswordSafeClient(t),
  267. provider: &Provider{},
  268. },
  269. validateErrorNil: false,
  270. validateErrorText: true,
  271. expectedErrorText: "error in Inputs: Error in field ClientTimeOutinSeconds : lte / 300.",
  272. },
  273. {
  274. name: "ApiKey ok",
  275. nameSpace: "test",
  276. args: args{
  277. store: esv1.SecretStore{
  278. Spec: esv1.SecretStoreSpec{
  279. Provider: &esv1.SecretStoreProvider{
  280. Beyondtrust: &esv1.BeyondtrustProvider{
  281. Server: &esv1.BeyondtrustServer{
  282. APIURL: fakeAPIURL,
  283. RetrievalType: "SECRET",
  284. },
  285. Auth: &esv1.BeyondtrustAuth{
  286. APIKey: &esv1.BeyondTrustProviderSecretRef{
  287. Value: apiKey,
  288. },
  289. },
  290. },
  291. },
  292. },
  293. },
  294. kube: createMockPasswordSafeClient(t),
  295. provider: &Provider{},
  296. },
  297. validateErrorNil: true,
  298. validateErrorText: false,
  299. },
  300. {
  301. name: "Bad ApiKey",
  302. nameSpace: "test",
  303. args: args{
  304. store: esv1.SecretStore{
  305. Spec: esv1.SecretStoreSpec{
  306. Provider: &esv1.SecretStoreProvider{
  307. Beyondtrust: &esv1.BeyondtrustProvider{
  308. Server: &esv1.BeyondtrustServer{
  309. APIURL: fakeAPIURL,
  310. RetrievalType: "SECRET",
  311. },
  312. Auth: &esv1.BeyondtrustAuth{
  313. APIKey: &esv1.BeyondTrustProviderSecretRef{
  314. Value: "bad_api_key",
  315. },
  316. },
  317. },
  318. },
  319. },
  320. },
  321. kube: createMockPasswordSafeClient(t),
  322. provider: &Provider{},
  323. },
  324. validateErrorNil: false,
  325. validateErrorText: true,
  326. expectedErrorText: "error in Inputs: Error in field ApiKey : min / 128.",
  327. },
  328. }
  329. for _, tt := range tests {
  330. t.Run(tt.name, func(t *testing.T) {
  331. _, err := tt.args.provider.NewClient(context.Background(), &tt.args.store, tt.args.kube, tt.nameSpace)
  332. if err != nil && tt.validateErrorNil {
  333. t.Errorf("ProviderBeyondtrust.NewClient() error = %v", err)
  334. }
  335. if err != nil && tt.validateErrorText {
  336. assert.Equal(t, err.Error(), tt.expectedErrorText)
  337. }
  338. })
  339. }
  340. }
  341. func TestLoadConfigSecret_NamespacedStoreCannotCrossNamespace(t *testing.T) {
  342. kube := fake.NewClientBuilder().WithObjects(&v1.Secret{
  343. ObjectMeta: metav1.ObjectMeta{
  344. Namespace: "foo",
  345. Name: "creds",
  346. },
  347. Data: map[string][]byte{
  348. "key": []byte("value"),
  349. },
  350. }).Build()
  351. ref := &esv1.BeyondTrustProviderSecretRef{
  352. SecretRef: &esmeta.SecretKeySelector{
  353. Namespace: new("foo"),
  354. Name: "creds",
  355. Key: "key",
  356. },
  357. }
  358. // For a namespaced SecretStore, attempting to read from another namespace must fail.
  359. _, err := loadConfigSecret(t.Context(), ref, kube, "ns2", esv1.SecretStoreKind)
  360. if err == nil {
  361. t.Fatalf("expected error when accessing secret across namespaces with SecretStore, got nil")
  362. }
  363. // For a namespaced SecretStore, attempting to read from the right namespace must not fail.
  364. val, err := loadConfigSecret(t.Context(), ref, kube, "foo", esv1.SecretStoreKind)
  365. if err != nil {
  366. t.Fatalf("expected error when accessing secret across namespaces with SecretStore, got nil")
  367. }
  368. if val != "value" {
  369. t.Fatalf("expected value, got %q", val)
  370. }
  371. }
  372. func TestPushSecret(t *testing.T) {
  373. type testCase struct {
  374. name string
  375. serverHandler http.HandlerFunc
  376. metadata apiextensionsv1.JSON
  377. expectedError bool
  378. }
  379. tests := []testCase{
  380. {
  381. name: "successfully pushes credential secret",
  382. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  383. switch r.URL.Path {
  384. case authConnectTokenPath:
  385. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  386. if err != nil {
  387. t.Error(err)
  388. }
  389. case authSignAppInPath:
  390. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  391. if err != nil {
  392. t.Error(err)
  393. }
  394. case secretsSafeFoldersPath:
  395. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  396. if err != nil {
  397. t.Error(err)
  398. }
  399. case "/secrets-safe/folders/cb871861-8b40-4556-820c-1ca6d522adfa/secrets":
  400. _, err := w.Write([]byte(`{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}`))
  401. if err != nil {
  402. t.Error(err)
  403. }
  404. default:
  405. http.Error(w, "not found", http.StatusNotFound)
  406. }
  407. },
  408. expectedError: false,
  409. metadata: apiextensionsv1.JSON{
  410. Raw: []byte(`{
  411. "title": "Test Credential",
  412. "username": "admin",
  413. "description": "Test Credential Secret description",
  414. "secret_type": "CREDENTIAL",
  415. "folder_name": "folder1"
  416. }`),
  417. },
  418. },
  419. {
  420. name: "successfully pushes file secret",
  421. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  422. switch r.URL.Path {
  423. case authConnectTokenPath:
  424. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  425. if err != nil {
  426. t.Error(err)
  427. }
  428. case authSignAppInPath:
  429. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  430. if err != nil {
  431. t.Error(err)
  432. }
  433. case secretsSafeFoldersPath:
  434. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  435. if err != nil {
  436. t.Error(err)
  437. }
  438. case "/secrets-safe/folders/cb871861-8b40-4556-820c-1ca6d522adfa/secrets/file":
  439. _, err := w.Write([]byte(`{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}`))
  440. if err != nil {
  441. t.Error(err)
  442. }
  443. default:
  444. http.Error(w, "not found", http.StatusNotFound)
  445. }
  446. },
  447. expectedError: false,
  448. metadata: apiextensionsv1.JSON{
  449. Raw: []byte(`{
  450. "title": "Test File Secret",
  451. "username": "admin",
  452. "description": "Test File Secret description",
  453. "secret_type": "FILE",
  454. "folder_name": "folder1",
  455. "file_name": "credentials.txt"
  456. }`),
  457. },
  458. },
  459. {
  460. name: "successfully pushes text secret",
  461. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  462. switch r.URL.Path {
  463. case authConnectTokenPath:
  464. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  465. if err != nil {
  466. t.Error(err)
  467. }
  468. case authSignAppInPath:
  469. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  470. if err != nil {
  471. t.Error(err)
  472. }
  473. case secretsSafeFoldersPath:
  474. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  475. if err != nil {
  476. t.Error(err)
  477. }
  478. case "/secrets-safe/folders/cb871861-8b40-4556-820c-1ca6d522adfa/secrets/text":
  479. _, err := w.Write([]byte(`{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}`))
  480. if err != nil {
  481. t.Error(err)
  482. }
  483. default:
  484. http.Error(w, "not found", http.StatusNotFound)
  485. }
  486. },
  487. expectedError: false,
  488. metadata: apiextensionsv1.JSON{
  489. Raw: []byte(`{
  490. "title": "Test Text Secret",
  491. "username": "admin",
  492. "description": "Test File Secret description",
  493. "secret_type": "TEXT",
  494. "folder_name": "folder1"
  495. }`),
  496. },
  497. },
  498. {
  499. name: "successfully pushes text secret - 404 error",
  500. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  501. switch r.URL.Path {
  502. case authConnectTokenPath:
  503. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  504. if err != nil {
  505. t.Error(err)
  506. }
  507. case authSignAppInPath:
  508. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  509. if err != nil {
  510. t.Error(err)
  511. }
  512. case secretsSafeFoldersPath:
  513. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  514. if err != nil {
  515. t.Error(err)
  516. }
  517. default:
  518. http.Error(w, "not found", http.StatusNotFound)
  519. }
  520. },
  521. expectedError: true,
  522. metadata: apiextensionsv1.JSON{
  523. Raw: []byte(`{
  524. "title": "Test Text Secret",
  525. "username": "admin",
  526. "description": "Test File Secret description",
  527. "secret_type": "TEXT",
  528. "folder_name": "folder1"
  529. }`),
  530. },
  531. },
  532. {
  533. name: "fails authentication",
  534. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  535. http.Error(w, "unauthorized", http.StatusUnauthorized)
  536. },
  537. expectedError: true,
  538. },
  539. }
  540. for _, tt := range tests {
  541. t.Run(tt.name, func(t *testing.T) {
  542. fakeServer := httptest.NewServer(tt.serverHandler)
  543. defer fakeServer.Close()
  544. logger, err := zap.NewDevelopment()
  545. if err != nil {
  546. t.Error(err)
  547. }
  548. zapLogger := logging.NewZapLogger(logger)
  549. clientTimeout := 30
  550. verifyCa := true
  551. retryMaxElapsedTimeMinutes := 2
  552. backoffDefinition := backoff.NewExponentialBackOff()
  553. backoffDefinition.InitialInterval = 1 * time.Second
  554. backoffDefinition.MaxElapsedTime = time.Duration(retryMaxElapsedTimeMinutes) * time.Second
  555. backoffDefinition.RandomizationFactor = 0.5
  556. httpClientObj, err := utils.GetHttpClient(clientTimeout, verifyCa, "", "", zapLogger)
  557. if err != nil {
  558. t.Error(err)
  559. }
  560. params := authentication.AuthenticationParametersObj{
  561. HTTPClient: *httpClientObj,
  562. BackoffDefinition: backoffDefinition,
  563. EndpointURL: fakeServer.URL,
  564. APIVersion: "3.1",
  565. ClientID: "fake_clinet_id",
  566. ClientSecret: "fake_client_secret",
  567. Logger: zapLogger,
  568. RetryMaxElapsedTimeSeconds: 30,
  569. }
  570. authObj, err := authentication.Authenticate(params)
  571. require.NoError(t, err)
  572. p := &Provider{authenticate: *authObj}
  573. secret := &v1.Secret{
  574. Data: map[string][]byte{"password": []byte("supersecret")},
  575. }
  576. metadataJSON := &tt.metadata
  577. psd := v1alpha1.PushSecretData{
  578. Match: v1alpha1.PushSecretMatch{
  579. SecretKey: "password",
  580. RemoteRef: v1alpha1.PushSecretRemoteRef{
  581. RemoteKey: "test-credential",
  582. },
  583. },
  584. Metadata: metadataJSON,
  585. }
  586. err = p.PushSecret(context.Background(), secret, psd)
  587. if tt.expectedError {
  588. require.Error(t, err)
  589. } else {
  590. require.NoError(t, err)
  591. }
  592. })
  593. }
  594. }
  595. func TestSecretExists(t *testing.T) {
  596. type testCase struct {
  597. name string
  598. serverHandler http.HandlerFunc
  599. expectedExisting bool
  600. }
  601. tests := []testCase{
  602. {
  603. name: "Secret Exists",
  604. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  605. switch r.URL.Path {
  606. case authConnectTokenPath:
  607. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  608. if err != nil {
  609. t.Error(err)
  610. }
  611. case authSignAppInPath:
  612. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  613. if err != nil {
  614. t.Error(err)
  615. }
  616. case secretsSafeSecretsPath:
  617. _, err := w.Write([]byte(`[{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}]`))
  618. if err != nil {
  619. t.Error(err)
  620. }
  621. default:
  622. http.Error(w, "not found", http.StatusNotFound)
  623. }
  624. },
  625. expectedExisting: true,
  626. },
  627. {
  628. name: "Secret does not Exist",
  629. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  630. switch r.URL.Path {
  631. case authConnectTokenPath:
  632. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  633. if err != nil {
  634. t.Error(err)
  635. }
  636. case authSignAppInPath:
  637. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  638. if err != nil {
  639. t.Error(err)
  640. }
  641. case secretsSafeSecretsPath:
  642. http.Error(w, "secret was not found", http.StatusNotFound)
  643. default:
  644. http.Error(w, "not found", http.StatusNotFound)
  645. }
  646. },
  647. expectedExisting: false,
  648. },
  649. }
  650. for _, tt := range tests {
  651. t.Run(tt.name, func(t *testing.T) {
  652. fakeServer := httptest.NewServer(tt.serverHandler)
  653. defer fakeServer.Close()
  654. logger, err := zap.NewDevelopment()
  655. if err != nil {
  656. t.Error(err)
  657. }
  658. zapLogger := logging.NewZapLogger(logger)
  659. clientTimeout := 30
  660. verifyCa := true
  661. retryMaxElapsedTimeMinutes := 2
  662. backoffDefinition := backoff.NewExponentialBackOff()
  663. backoffDefinition.InitialInterval = 1 * time.Second
  664. backoffDefinition.MaxElapsedTime = time.Duration(retryMaxElapsedTimeMinutes) * time.Second
  665. backoffDefinition.RandomizationFactor = 0.5
  666. httpClientObj, err := utils.GetHttpClient(clientTimeout, verifyCa, "", "", zapLogger)
  667. if err != nil {
  668. t.Error(err)
  669. }
  670. params := authentication.AuthenticationParametersObj{
  671. HTTPClient: *httpClientObj,
  672. BackoffDefinition: backoffDefinition,
  673. EndpointURL: fakeServer.URL,
  674. APIVersion: "3.1",
  675. ClientID: "fake_clinet_id",
  676. ClientSecret: "fake_client_secret",
  677. Logger: zapLogger,
  678. RetryMaxElapsedTimeSeconds: 30,
  679. }
  680. authObj, err := authentication.Authenticate(params)
  681. require.NoError(t, err)
  682. p := &Provider{authenticate: *authObj}
  683. remoteRef := v1alpha1.PushSecretRemoteRef{
  684. RemoteKey: "test-credential",
  685. }
  686. exists, err := p.SecretExists(context.Background(), remoteRef)
  687. if err != nil {
  688. t.Error(err)
  689. }
  690. if tt.expectedExisting {
  691. assert.True(t, exists)
  692. } else {
  693. assert.False(t, exists)
  694. }
  695. })
  696. }
  697. }