provider_test.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package beyondtrust
  14. import (
  15. "context"
  16. "net/http"
  17. "net/http/httptest"
  18. "testing"
  19. "time"
  20. "github.com/BeyondTrust/go-client-library-passwordsafe/api/authentication"
  21. "github.com/BeyondTrust/go-client-library-passwordsafe/api/logging"
  22. "github.com/BeyondTrust/go-client-library-passwordsafe/api/utils"
  23. "github.com/cenkalti/backoff/v4"
  24. "github.com/stretchr/testify/assert"
  25. "github.com/stretchr/testify/require"
  26. "go.uber.org/zap"
  27. v1 "k8s.io/api/core/v1"
  28. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  29. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  30. "k8s.io/client-go/tools/clientcmd"
  31. clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
  32. "k8s.io/utils/ptr"
  33. kubeclient "sigs.k8s.io/controller-runtime/pkg/client"
  34. "sigs.k8s.io/controller-runtime/pkg/client/fake"
  35. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  36. "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  37. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  38. )
  39. const (
  40. errTestCase = "Test case Failed"
  41. fakeAPIURL = "https://example.com:443/BeyondTrust/api/public/v3/"
  42. apiKey = "fakeapikey00fakeapikeydd0000000000065b010f20fakeapikey0000000008700000a93fb5d74fddc0000000000000000000000000000000000000;runas=test_user"
  43. clientID = "12345678-25fg-4b05-9ced-35e7dd5093ae"
  44. clientSecret = "12345678-25fg-4b05-9ced-35e7dd5093ae"
  45. authConnectTokenPath = "/Auth/connect/token"
  46. authSignAppInPath = "/Auth/SignAppIn"
  47. secretsSafeFoldersPath = "/secrets-safe/folders/"
  48. secretsSafeSecretsPath = "/secrets-safe/secrets"
  49. )
  50. func createMockPasswordSafeClient(t *testing.T) kubeclient.Client {
  51. server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  52. switch r.URL.Path {
  53. case authSignAppInPath:
  54. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"fake@beyondtrust.com"}`))
  55. if err != nil {
  56. t.Error(errTestCase)
  57. }
  58. case "/Auth/Signout":
  59. _, err := w.Write([]byte(``))
  60. if err != nil {
  61. t.Error(errTestCase)
  62. }
  63. case secretsSafeSecretsPath:
  64. _, err := w.Write([]byte(`[{"SecretType": "FILE", "Password": "credential_in_sub_3_password","Id": "12345678-07d6-4955-175a-08db047219ce","Title": "credential_in_sub_3"}]`))
  65. if err != nil {
  66. t.Error(errTestCase)
  67. }
  68. case "/secrets-safe/secrets/12345678-07d6-4955-175a-08db047219ce/file/download":
  69. _, err := w.Write([]byte(`fake_password`))
  70. if err != nil {
  71. t.Error(errTestCase)
  72. }
  73. default:
  74. http.NotFound(w, r)
  75. }
  76. }))
  77. t.Cleanup(server.Close)
  78. clientConfig := clientcmd.NewDefaultClientConfig(clientcmdapi.Config{
  79. Clusters: map[string]*clientcmdapi.Cluster{
  80. "test": {
  81. Server: server.URL,
  82. },
  83. },
  84. AuthInfos: map[string]*clientcmdapi.AuthInfo{
  85. "test": {
  86. Token: "token",
  87. },
  88. },
  89. Contexts: map[string]*clientcmdapi.Context{
  90. "test": {
  91. Cluster: "test",
  92. AuthInfo: "test",
  93. },
  94. },
  95. CurrentContext: "test",
  96. }, &clientcmd.ConfigOverrides{})
  97. restConfig, err := clientConfig.ClientConfig()
  98. assert.Nil(t, err)
  99. c, err := kubeclient.New(restConfig, kubeclient.Options{})
  100. assert.Nil(t, err)
  101. return c
  102. }
  103. func TestNewClient(t *testing.T) {
  104. type args struct {
  105. store esv1.SecretStore
  106. kube kubeclient.Client
  107. provider esv1.Provider
  108. }
  109. tests := []struct {
  110. name string
  111. nameSpace string
  112. args args
  113. validateErrorNil bool
  114. validateErrorText bool
  115. expectedErrorText string
  116. }{
  117. {
  118. name: "Client ok",
  119. nameSpace: "test",
  120. args: args{
  121. store: esv1.SecretStore{
  122. Spec: esv1.SecretStoreSpec{
  123. Provider: &esv1.SecretStoreProvider{
  124. Beyondtrust: &esv1.BeyondtrustProvider{
  125. Server: &esv1.BeyondtrustServer{
  126. APIURL: fakeAPIURL,
  127. RetrievalType: "SECRET",
  128. },
  129. Auth: &esv1.BeyondtrustAuth{
  130. ClientID: &esv1.BeyondTrustProviderSecretRef{
  131. Value: clientID,
  132. },
  133. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  134. Value: clientSecret,
  135. },
  136. },
  137. },
  138. },
  139. },
  140. },
  141. kube: createMockPasswordSafeClient(t),
  142. provider: &Provider{},
  143. },
  144. validateErrorNil: true,
  145. validateErrorText: false,
  146. },
  147. {
  148. name: "Bad Client Id",
  149. nameSpace: "test",
  150. args: args{
  151. store: esv1.SecretStore{
  152. Spec: esv1.SecretStoreSpec{
  153. Provider: &esv1.SecretStoreProvider{
  154. Beyondtrust: &esv1.BeyondtrustProvider{
  155. Server: &esv1.BeyondtrustServer{
  156. APIURL: fakeAPIURL,
  157. RetrievalType: "SECRET",
  158. },
  159. Auth: &esv1.BeyondtrustAuth{
  160. ClientID: &esv1.BeyondTrustProviderSecretRef{
  161. Value: "6138d050",
  162. },
  163. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  164. Value: clientSecret,
  165. },
  166. },
  167. },
  168. },
  169. },
  170. },
  171. kube: createMockPasswordSafeClient(t),
  172. provider: &Provider{},
  173. },
  174. validateErrorNil: false,
  175. validateErrorText: true,
  176. expectedErrorText: "error in Inputs: Error in field ClientId : min / 36.",
  177. },
  178. {
  179. name: "Bad Client Secret",
  180. nameSpace: "test",
  181. args: args{
  182. store: esv1.SecretStore{
  183. Spec: esv1.SecretStoreSpec{
  184. Provider: &esv1.SecretStoreProvider{
  185. Beyondtrust: &esv1.BeyondtrustProvider{
  186. Server: &esv1.BeyondtrustServer{
  187. APIURL: fakeAPIURL,
  188. RetrievalType: "SECRET",
  189. },
  190. Auth: &esv1.BeyondtrustAuth{
  191. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  192. Value: "8i7U0Yulabon8mTc",
  193. },
  194. ClientID: &esv1.BeyondTrustProviderSecretRef{
  195. Value: clientID,
  196. },
  197. },
  198. },
  199. },
  200. },
  201. },
  202. kube: createMockPasswordSafeClient(t),
  203. provider: &Provider{},
  204. },
  205. validateErrorNil: false,
  206. validateErrorText: true,
  207. expectedErrorText: "error in Inputs: Error in field ClientSecret : min / 36.",
  208. },
  209. {
  210. name: "Bad Separator",
  211. nameSpace: "test",
  212. args: args{
  213. store: esv1.SecretStore{
  214. Spec: esv1.SecretStoreSpec{
  215. Provider: &esv1.SecretStoreProvider{
  216. Beyondtrust: &esv1.BeyondtrustProvider{
  217. Server: &esv1.BeyondtrustServer{
  218. APIURL: fakeAPIURL,
  219. Separator: "//",
  220. RetrievalType: "SECRET",
  221. },
  222. Auth: &esv1.BeyondtrustAuth{
  223. ClientID: &esv1.BeyondTrustProviderSecretRef{
  224. Value: clientID,
  225. },
  226. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  227. Value: clientSecret,
  228. },
  229. },
  230. },
  231. },
  232. },
  233. },
  234. kube: createMockPasswordSafeClient(t),
  235. provider: &Provider{},
  236. },
  237. validateErrorNil: false,
  238. validateErrorText: true,
  239. expectedErrorText: "error in Inputs: Error in field ClientId : min / 36.",
  240. },
  241. {
  242. name: "Time Out",
  243. nameSpace: "test",
  244. args: args{
  245. store: esv1.SecretStore{
  246. Spec: esv1.SecretStoreSpec{
  247. Provider: &esv1.SecretStoreProvider{
  248. Beyondtrust: &esv1.BeyondtrustProvider{
  249. Server: &esv1.BeyondtrustServer{
  250. APIURL: fakeAPIURL,
  251. Separator: "/",
  252. ClientTimeOutSeconds: 400,
  253. RetrievalType: "SECRET",
  254. },
  255. Auth: &esv1.BeyondtrustAuth{
  256. ClientID: &esv1.BeyondTrustProviderSecretRef{
  257. Value: clientID,
  258. },
  259. ClientSecret: &esv1.BeyondTrustProviderSecretRef{
  260. Value: clientSecret,
  261. },
  262. },
  263. },
  264. },
  265. },
  266. },
  267. kube: createMockPasswordSafeClient(t),
  268. provider: &Provider{},
  269. },
  270. validateErrorNil: false,
  271. validateErrorText: true,
  272. expectedErrorText: "error in Inputs: Error in field ClientTimeOutinSeconds : lte / 300.",
  273. },
  274. {
  275. name: "ApiKey ok",
  276. nameSpace: "test",
  277. args: args{
  278. store: esv1.SecretStore{
  279. Spec: esv1.SecretStoreSpec{
  280. Provider: &esv1.SecretStoreProvider{
  281. Beyondtrust: &esv1.BeyondtrustProvider{
  282. Server: &esv1.BeyondtrustServer{
  283. APIURL: fakeAPIURL,
  284. RetrievalType: "SECRET",
  285. },
  286. Auth: &esv1.BeyondtrustAuth{
  287. APIKey: &esv1.BeyondTrustProviderSecretRef{
  288. Value: apiKey,
  289. },
  290. },
  291. },
  292. },
  293. },
  294. },
  295. kube: createMockPasswordSafeClient(t),
  296. provider: &Provider{},
  297. },
  298. validateErrorNil: true,
  299. validateErrorText: false,
  300. },
  301. {
  302. name: "Bad ApiKey",
  303. nameSpace: "test",
  304. args: args{
  305. store: esv1.SecretStore{
  306. Spec: esv1.SecretStoreSpec{
  307. Provider: &esv1.SecretStoreProvider{
  308. Beyondtrust: &esv1.BeyondtrustProvider{
  309. Server: &esv1.BeyondtrustServer{
  310. APIURL: fakeAPIURL,
  311. RetrievalType: "SECRET",
  312. },
  313. Auth: &esv1.BeyondtrustAuth{
  314. APIKey: &esv1.BeyondTrustProviderSecretRef{
  315. Value: "bad_api_key",
  316. },
  317. },
  318. },
  319. },
  320. },
  321. },
  322. kube: createMockPasswordSafeClient(t),
  323. provider: &Provider{},
  324. },
  325. validateErrorNil: false,
  326. validateErrorText: true,
  327. expectedErrorText: "error in Inputs: Error in field ApiKey : min / 128.",
  328. },
  329. }
  330. for _, tt := range tests {
  331. t.Run(tt.name, func(t *testing.T) {
  332. _, err := tt.args.provider.NewClient(context.Background(), &tt.args.store, tt.args.kube, tt.nameSpace)
  333. if err != nil && tt.validateErrorNil {
  334. t.Errorf("ProviderBeyondtrust.NewClient() error = %v", err)
  335. }
  336. if err != nil && tt.validateErrorText {
  337. assert.Equal(t, err.Error(), tt.expectedErrorText)
  338. }
  339. })
  340. }
  341. }
  342. func TestLoadConfigSecret_NamespacedStoreCannotCrossNamespace(t *testing.T) {
  343. kube := fake.NewClientBuilder().WithObjects(&v1.Secret{
  344. ObjectMeta: metav1.ObjectMeta{
  345. Namespace: "foo",
  346. Name: "creds",
  347. },
  348. Data: map[string][]byte{
  349. "key": []byte("value"),
  350. },
  351. }).Build()
  352. ref := &esv1.BeyondTrustProviderSecretRef{
  353. SecretRef: &esmeta.SecretKeySelector{
  354. Namespace: ptr.To("foo"),
  355. Name: "creds",
  356. Key: "key",
  357. },
  358. }
  359. // For a namespaced SecretStore, attempting to read from another namespace must fail.
  360. _, err := loadConfigSecret(t.Context(), ref, kube, "ns2", esv1.SecretStoreKind)
  361. if err == nil {
  362. t.Fatalf("expected error when accessing secret across namespaces with SecretStore, got nil")
  363. }
  364. // For a namespaced SecretStore, attempting to read from the right namespace must not fail.
  365. val, err := loadConfigSecret(t.Context(), ref, kube, "foo", esv1.SecretStoreKind)
  366. if err != nil {
  367. t.Fatalf("expected error when accessing secret across namespaces with SecretStore, got nil")
  368. }
  369. if val != "value" {
  370. t.Fatalf("expected value, got %q", val)
  371. }
  372. }
  373. func TestPushSecret(t *testing.T) {
  374. type testCase struct {
  375. name string
  376. serverHandler http.HandlerFunc
  377. metadata apiextensionsv1.JSON
  378. expectedError bool
  379. }
  380. tests := []testCase{
  381. {
  382. name: "successfully pushes credential secret",
  383. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  384. switch r.URL.Path {
  385. case authConnectTokenPath:
  386. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  387. if err != nil {
  388. t.Error(err)
  389. }
  390. case authSignAppInPath:
  391. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  392. if err != nil {
  393. t.Error(err)
  394. }
  395. case secretsSafeFoldersPath:
  396. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  397. if err != nil {
  398. t.Error(err)
  399. }
  400. case "/secrets-safe/folders/cb871861-8b40-4556-820c-1ca6d522adfa/secrets":
  401. _, err := w.Write([]byte(`{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}`))
  402. if err != nil {
  403. t.Error(err)
  404. }
  405. default:
  406. http.Error(w, "not found", http.StatusNotFound)
  407. }
  408. },
  409. expectedError: false,
  410. metadata: apiextensionsv1.JSON{
  411. Raw: []byte(`{
  412. "title": "Test Credential",
  413. "username": "admin",
  414. "description": "Test Credential Secret description",
  415. "secret_type": "CREDENTIAL",
  416. "folder_name": "folder1"
  417. }`),
  418. },
  419. },
  420. {
  421. name: "successfully pushes file secret",
  422. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  423. switch r.URL.Path {
  424. case authConnectTokenPath:
  425. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  426. if err != nil {
  427. t.Error(err)
  428. }
  429. case authSignAppInPath:
  430. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  431. if err != nil {
  432. t.Error(err)
  433. }
  434. case secretsSafeFoldersPath:
  435. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  436. if err != nil {
  437. t.Error(err)
  438. }
  439. case "/secrets-safe/folders/cb871861-8b40-4556-820c-1ca6d522adfa/secrets/file":
  440. _, err := w.Write([]byte(`{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}`))
  441. if err != nil {
  442. t.Error(err)
  443. }
  444. default:
  445. http.Error(w, "not found", http.StatusNotFound)
  446. }
  447. },
  448. expectedError: false,
  449. metadata: apiextensionsv1.JSON{
  450. Raw: []byte(`{
  451. "title": "Test File Secret",
  452. "username": "admin",
  453. "description": "Test File Secret description",
  454. "secret_type": "FILE",
  455. "folder_name": "folder1",
  456. "file_name": "credentials.txt"
  457. }`),
  458. },
  459. },
  460. {
  461. name: "successfully pushes text secret",
  462. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  463. switch r.URL.Path {
  464. case authConnectTokenPath:
  465. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  466. if err != nil {
  467. t.Error(err)
  468. }
  469. case authSignAppInPath:
  470. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  471. if err != nil {
  472. t.Error(err)
  473. }
  474. case secretsSafeFoldersPath:
  475. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  476. if err != nil {
  477. t.Error(err)
  478. }
  479. case "/secrets-safe/folders/cb871861-8b40-4556-820c-1ca6d522adfa/secrets/text":
  480. _, err := w.Write([]byte(`{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}`))
  481. if err != nil {
  482. t.Error(err)
  483. }
  484. default:
  485. http.Error(w, "not found", http.StatusNotFound)
  486. }
  487. },
  488. expectedError: false,
  489. metadata: apiextensionsv1.JSON{
  490. Raw: []byte(`{
  491. "title": "Test Text Secret",
  492. "username": "admin",
  493. "description": "Test File Secret description",
  494. "secret_type": "TEXT",
  495. "folder_name": "folder1"
  496. }`),
  497. },
  498. },
  499. {
  500. name: "successfully pushes text secret - 404 error",
  501. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  502. switch r.URL.Path {
  503. case authConnectTokenPath:
  504. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  505. if err != nil {
  506. t.Error(err)
  507. }
  508. case authSignAppInPath:
  509. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  510. if err != nil {
  511. t.Error(err)
  512. }
  513. case secretsSafeFoldersPath:
  514. _, err := w.Write([]byte(`[{"Id": "cb871861-8b40-4556-820c-1ca6d522adfa","Name": "folder1"}]`))
  515. if err != nil {
  516. t.Error(err)
  517. }
  518. default:
  519. http.Error(w, "not found", http.StatusNotFound)
  520. }
  521. },
  522. expectedError: true,
  523. metadata: apiextensionsv1.JSON{
  524. Raw: []byte(`{
  525. "title": "Test Text Secret",
  526. "username": "admin",
  527. "description": "Test File Secret description",
  528. "secret_type": "TEXT",
  529. "folder_name": "folder1"
  530. }`),
  531. },
  532. },
  533. {
  534. name: "fails authentication",
  535. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  536. http.Error(w, "unauthorized", http.StatusUnauthorized)
  537. },
  538. expectedError: true,
  539. },
  540. }
  541. for _, tt := range tests {
  542. t.Run(tt.name, func(t *testing.T) {
  543. fakeServer := httptest.NewServer(tt.serverHandler)
  544. defer fakeServer.Close()
  545. logger, err := zap.NewDevelopment()
  546. if err != nil {
  547. t.Error(err)
  548. }
  549. zapLogger := logging.NewZapLogger(logger)
  550. clientTimeout := 30
  551. verifyCa := true
  552. retryMaxElapsedTimeMinutes := 2
  553. backoffDefinition := backoff.NewExponentialBackOff()
  554. backoffDefinition.InitialInterval = 1 * time.Second
  555. backoffDefinition.MaxElapsedTime = time.Duration(retryMaxElapsedTimeMinutes) * time.Second
  556. backoffDefinition.RandomizationFactor = 0.5
  557. httpClientObj, err := utils.GetHttpClient(clientTimeout, verifyCa, "", "", zapLogger)
  558. if err != nil {
  559. t.Error(err)
  560. }
  561. params := authentication.AuthenticationParametersObj{
  562. HTTPClient: *httpClientObj,
  563. BackoffDefinition: backoffDefinition,
  564. EndpointURL: fakeServer.URL,
  565. APIVersion: "3.1",
  566. ClientID: "fake_clinet_id",
  567. ClientSecret: "fake_client_secret",
  568. Logger: zapLogger,
  569. RetryMaxElapsedTimeSeconds: 30,
  570. }
  571. authObj, err := authentication.Authenticate(params)
  572. require.NoError(t, err)
  573. p := &Provider{authenticate: *authObj}
  574. secret := &v1.Secret{
  575. Data: map[string][]byte{"password": []byte("supersecret")},
  576. }
  577. metadataJSON := &tt.metadata
  578. psd := v1alpha1.PushSecretData{
  579. Match: v1alpha1.PushSecretMatch{
  580. SecretKey: "password",
  581. RemoteRef: v1alpha1.PushSecretRemoteRef{
  582. RemoteKey: "test-credential",
  583. },
  584. },
  585. Metadata: metadataJSON,
  586. }
  587. err = p.PushSecret(context.Background(), secret, psd)
  588. if tt.expectedError {
  589. require.Error(t, err)
  590. } else {
  591. require.NoError(t, err)
  592. }
  593. })
  594. }
  595. }
  596. func TestSecretExists(t *testing.T) {
  597. type testCase struct {
  598. name string
  599. serverHandler http.HandlerFunc
  600. expectedExisting bool
  601. }
  602. tests := []testCase{
  603. {
  604. name: "Secret Exists",
  605. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  606. switch r.URL.Path {
  607. case authConnectTokenPath:
  608. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  609. if err != nil {
  610. t.Error(err)
  611. }
  612. case authSignAppInPath:
  613. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  614. if err != nil {
  615. t.Error(err)
  616. }
  617. case secretsSafeSecretsPath:
  618. _, err := w.Write([]byte(`[{"Id": "01ca9cf3-0751-4a90-4856-08dcf22d7472","Title": "Secret Title"}]`))
  619. if err != nil {
  620. t.Error(err)
  621. }
  622. default:
  623. http.Error(w, "not found", http.StatusNotFound)
  624. }
  625. },
  626. expectedExisting: true,
  627. },
  628. {
  629. name: "Secret does not Exist",
  630. serverHandler: func(w http.ResponseWriter, r *http.Request) {
  631. switch r.URL.Path {
  632. case authConnectTokenPath:
  633. _, err := w.Write([]byte(`{"access_token": "fake_token", "expires_in": 600, "token_type": "Bearer"}`))
  634. if err != nil {
  635. t.Error(err)
  636. }
  637. case authSignAppInPath:
  638. _, err := w.Write([]byte(`{"UserId":1, "EmailAddress":"test@beyondtrust.com"}`))
  639. if err != nil {
  640. t.Error(err)
  641. }
  642. case secretsSafeSecretsPath:
  643. http.Error(w, "secret was not found", http.StatusNotFound)
  644. default:
  645. http.Error(w, "not found", http.StatusNotFound)
  646. }
  647. },
  648. expectedExisting: false,
  649. },
  650. }
  651. for _, tt := range tests {
  652. t.Run(tt.name, func(t *testing.T) {
  653. fakeServer := httptest.NewServer(tt.serverHandler)
  654. defer fakeServer.Close()
  655. logger, err := zap.NewDevelopment()
  656. if err != nil {
  657. t.Error(err)
  658. }
  659. zapLogger := logging.NewZapLogger(logger)
  660. clientTimeout := 30
  661. verifyCa := true
  662. retryMaxElapsedTimeMinutes := 2
  663. backoffDefinition := backoff.NewExponentialBackOff()
  664. backoffDefinition.InitialInterval = 1 * time.Second
  665. backoffDefinition.MaxElapsedTime = time.Duration(retryMaxElapsedTimeMinutes) * time.Second
  666. backoffDefinition.RandomizationFactor = 0.5
  667. httpClientObj, err := utils.GetHttpClient(clientTimeout, verifyCa, "", "", zapLogger)
  668. if err != nil {
  669. t.Error(err)
  670. }
  671. params := authentication.AuthenticationParametersObj{
  672. HTTPClient: *httpClientObj,
  673. BackoffDefinition: backoffDefinition,
  674. EndpointURL: fakeServer.URL,
  675. APIVersion: "3.1",
  676. ClientID: "fake_clinet_id",
  677. ClientSecret: "fake_client_secret",
  678. Logger: zapLogger,
  679. RetryMaxElapsedTimeSeconds: 30,
  680. }
  681. authObj, err := authentication.Authenticate(params)
  682. require.NoError(t, err)
  683. p := &Provider{authenticate: *authObj}
  684. remoteRef := v1alpha1.PushSecretRemoteRef{
  685. RemoteKey: "test-credential",
  686. }
  687. exists, err := p.SecretExists(context.Background(), remoteRef)
  688. if err != nil {
  689. t.Error(err)
  690. }
  691. if tt.expectedExisting {
  692. assert.True(t, exists)
  693. } else {
  694. assert.False(t, exists)
  695. }
  696. })
  697. }
  698. }