parameterstore_test.go 40 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package parameterstore
  14. import (
  15. "context"
  16. "errors"
  17. "strings"
  18. "testing"
  19. "github.com/aws/aws-sdk-go-v2/aws"
  20. "github.com/aws/aws-sdk-go-v2/service/ssm"
  21. ssmtypes "github.com/aws/aws-sdk-go-v2/service/ssm/types"
  22. "github.com/google/go-cmp/cmp"
  23. "github.com/stretchr/testify/assert"
  24. "github.com/stretchr/testify/require"
  25. corev1 "k8s.io/api/core/v1"
  26. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  27. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  28. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  29. fakeps "github.com/external-secrets/external-secrets/providers/v1/aws/parameterstore/fake"
  30. awsutil "github.com/external-secrets/external-secrets/providers/v1/aws/util"
  31. "github.com/external-secrets/external-secrets/runtime/esutils/metadata"
  32. "github.com/external-secrets/external-secrets/runtime/testing/fake"
  33. )
  34. const (
  35. errInvalidProperty = "key INVALPROP does not exist in secret"
  36. invalidProp = "INVALPROP"
  37. )
  38. var (
  39. fakeSecretKey = "fakeSecretKey"
  40. fakeValue = "fakeValue"
  41. )
  42. type parameterstoreTestCase struct {
  43. fakeClient *fakeps.Client
  44. apiInput *ssm.GetParameterInput
  45. apiOutput *ssm.GetParameterOutput
  46. remoteRef *esv1.ExternalSecretDataRemoteRef
  47. apiErr error
  48. expectError string
  49. expectedSecret string
  50. expectedData map[string][]byte
  51. prefix string
  52. }
  53. func makeValidParameterStoreTestCase() *parameterstoreTestCase {
  54. return &parameterstoreTestCase{
  55. fakeClient: &fakeps.Client{},
  56. apiInput: makeValidAPIInput(),
  57. apiOutput: makeValidAPIOutput(),
  58. remoteRef: makeValidRemoteRef(),
  59. apiErr: nil,
  60. prefix: "",
  61. expectError: "",
  62. expectedSecret: "",
  63. expectedData: make(map[string][]byte),
  64. }
  65. }
  66. func makeValidAPIInput() *ssm.GetParameterInput {
  67. return &ssm.GetParameterInput{
  68. Name: aws.String("/baz"),
  69. WithDecryption: aws.Bool(true),
  70. }
  71. }
  72. func makeValidAPIOutput() *ssm.GetParameterOutput {
  73. return &ssm.GetParameterOutput{
  74. Parameter: &ssmtypes.Parameter{
  75. Value: aws.String("RRRRR"),
  76. },
  77. }
  78. }
  79. func makeValidRemoteRef() *esv1.ExternalSecretDataRemoteRef {
  80. return &esv1.ExternalSecretDataRemoteRef{
  81. Key: "/baz",
  82. }
  83. }
  84. func makeValidParameterStoreTestCaseCustom(tweaks ...func(pstc *parameterstoreTestCase)) *parameterstoreTestCase {
  85. pstc := makeValidParameterStoreTestCase()
  86. for _, fn := range tweaks {
  87. fn(pstc)
  88. }
  89. pstc.fakeClient.WithValue(pstc.apiInput, pstc.apiOutput, pstc.apiErr)
  90. return pstc
  91. }
  92. func TestSSMResolver(t *testing.T) {
  93. endpointEnvKey := SSMEndpointEnv
  94. endpointURL := "http://ssm.foo"
  95. t.Setenv(endpointEnvKey, endpointURL)
  96. f, err := customEndpointResolver{}.ResolveEndpoint(context.Background(), ssm.EndpointParameters{})
  97. assert.Nil(t, err)
  98. assert.Equal(t, endpointURL, f.URI.String())
  99. }
  100. func TestDeleteSecret(t *testing.T) {
  101. fakeClient := fakeps.Client{}
  102. parameterName := "parameter"
  103. managedBy := "managed-by"
  104. manager := "external-secrets"
  105. ssmTag := ssmtypes.Tag{
  106. Key: &managedBy,
  107. Value: &manager,
  108. }
  109. type args struct {
  110. client fakeps.Client
  111. getParameterOutput *ssm.GetParameterOutput
  112. listTagsOutput *ssm.ListTagsForResourceOutput
  113. deleteParameterOutput *ssm.DeleteParameterOutput
  114. getParameterError error
  115. listTagsError error
  116. deleteParameterError error
  117. }
  118. type want struct {
  119. err error
  120. }
  121. type testCase struct {
  122. args args
  123. want want
  124. reason string
  125. }
  126. tests := map[string]testCase{
  127. "Deletes Successfully": {
  128. args: args{
  129. client: fakeClient,
  130. getParameterOutput: &ssm.GetParameterOutput{
  131. Parameter: &ssmtypes.Parameter{
  132. Name: &parameterName,
  133. },
  134. },
  135. listTagsOutput: &ssm.ListTagsForResourceOutput{
  136. TagList: []ssmtypes.Tag{ssmTag},
  137. },
  138. deleteParameterOutput: nil,
  139. getParameterError: nil,
  140. listTagsError: nil,
  141. deleteParameterError: nil,
  142. },
  143. want: want{
  144. err: nil,
  145. },
  146. reason: "",
  147. },
  148. "Secret Not Found": {
  149. args: args{
  150. client: fakeClient,
  151. getParameterOutput: nil,
  152. listTagsOutput: nil,
  153. deleteParameterOutput: nil,
  154. getParameterError: &ssmtypes.ParameterNotFound{
  155. Message: aws.String("not here, sorry dude"),
  156. },
  157. listTagsError: nil,
  158. deleteParameterError: nil,
  159. },
  160. want: want{
  161. err: nil,
  162. },
  163. reason: "",
  164. },
  165. "No permissions to get secret": {
  166. args: args{
  167. client: fakeClient,
  168. getParameterOutput: nil,
  169. listTagsOutput: nil,
  170. deleteParameterOutput: nil,
  171. getParameterError: errors.New("no permissions"),
  172. listTagsError: nil,
  173. deleteParameterError: nil,
  174. },
  175. want: want{
  176. err: errors.New("no permissions"),
  177. },
  178. reason: "",
  179. },
  180. "No permissions to get tags": {
  181. args: args{
  182. client: fakeClient,
  183. getParameterOutput: &ssm.GetParameterOutput{
  184. Parameter: &ssmtypes.Parameter{
  185. Name: &parameterName,
  186. },
  187. },
  188. listTagsOutput: nil,
  189. deleteParameterOutput: nil,
  190. getParameterError: nil,
  191. listTagsError: errors.New("no permissions"),
  192. deleteParameterError: nil,
  193. },
  194. want: want{
  195. err: errors.New("no permissions"),
  196. },
  197. reason: "",
  198. },
  199. "Secret Not Managed by External Secrets": {
  200. args: args{
  201. client: fakeClient,
  202. getParameterOutput: &ssm.GetParameterOutput{
  203. Parameter: &ssmtypes.Parameter{
  204. Name: &parameterName,
  205. },
  206. },
  207. listTagsOutput: &ssm.ListTagsForResourceOutput{
  208. TagList: []ssmtypes.Tag{},
  209. },
  210. deleteParameterOutput: nil,
  211. getParameterError: nil,
  212. listTagsError: nil,
  213. deleteParameterError: nil,
  214. },
  215. want: want{
  216. err: nil,
  217. },
  218. reason: "",
  219. },
  220. "No permissions delete secret": {
  221. args: args{
  222. client: fakeClient,
  223. getParameterOutput: &ssm.GetParameterOutput{
  224. Parameter: &ssmtypes.Parameter{
  225. Name: &parameterName,
  226. },
  227. },
  228. listTagsOutput: &ssm.ListTagsForResourceOutput{
  229. TagList: []ssmtypes.Tag{ssmTag},
  230. },
  231. deleteParameterOutput: nil,
  232. getParameterError: nil,
  233. listTagsError: nil,
  234. deleteParameterError: errors.New("no permissions"),
  235. },
  236. want: want{
  237. err: errors.New("no permissions"),
  238. },
  239. reason: "",
  240. },
  241. }
  242. for name, tc := range tests {
  243. t.Run(name, func(t *testing.T) {
  244. ref := fake.PushSecretData{RemoteKey: remoteKey}
  245. ps := ParameterStore{
  246. client: &tc.args.client,
  247. }
  248. tc.args.client.GetParameterFn = fakeps.NewGetParameterFn(tc.args.getParameterOutput, tc.args.getParameterError)
  249. tc.args.client.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(tc.args.listTagsOutput, tc.args.listTagsError)
  250. tc.args.client.DeleteParameterFn = fakeps.NewDeleteParameterFn(tc.args.deleteParameterOutput, tc.args.deleteParameterError)
  251. err := ps.DeleteSecret(context.TODO(), ref)
  252. // Error nil XOR tc.want.err nil
  253. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  254. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  255. }
  256. // if errors are the same type but their contents do not match
  257. if err != nil && tc.want.err != nil {
  258. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  259. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error got nil", name, tc.reason, tc.want.err)
  260. }
  261. }
  262. })
  263. }
  264. }
  265. const remoteKey = "fake-key"
  266. func TestPushSecret(t *testing.T) {
  267. invalidParameters := &ssmtypes.InvalidParameters{}
  268. alreadyExistsError := &ssmtypes.AlreadyExistsException{}
  269. fakeSecret := &corev1.Secret{
  270. Data: map[string][]byte{
  271. fakeSecretKey: []byte(fakeValue),
  272. },
  273. }
  274. managedByESO := ssmtypes.Tag{
  275. Key: &managedBy,
  276. Value: &externalSecrets,
  277. }
  278. putParameterOutput := &ssm.PutParameterOutput{}
  279. getParameterOutput := &ssm.GetParameterOutput{}
  280. describeParameterOutput := &ssm.DescribeParametersOutput{}
  281. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  282. TagList: []ssmtypes.Tag{managedByESO},
  283. }
  284. noTagsResourceOutput := &ssm.ListTagsForResourceOutput{}
  285. validGetParameterOutput := &ssm.GetParameterOutput{
  286. Parameter: &ssmtypes.Parameter{},
  287. }
  288. sameGetParameterOutput := &ssm.GetParameterOutput{
  289. Parameter: &ssmtypes.Parameter{
  290. Value: &fakeValue,
  291. },
  292. }
  293. type args struct {
  294. store *esv1.AWSProvider
  295. metadata *apiextensionsv1.JSON
  296. client fakeps.Client
  297. }
  298. type want struct {
  299. err error
  300. }
  301. tests := map[string]struct {
  302. reason string
  303. args args
  304. want want
  305. }{
  306. "PutParameterSucceeds": {
  307. reason: "a parameter can be successfully pushed to aws parameter store",
  308. args: args{
  309. store: makeValidParameterStore().Spec.Provider.AWS,
  310. client: fakeps.Client{
  311. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil, func(input *ssm.PutParameterInput) {
  312. assert.Len(t, input.Tags, 1)
  313. assert.Contains(t, input.Tags, managedByESO)
  314. }),
  315. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  316. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  317. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil, func(input *ssm.ListTagsForResourceInput) {
  318. assert.Equal(t, "/external-secrets/parameters/fake-key", input.ResourceId)
  319. }),
  320. RemoveTagsFromResourceFn: fakeps.NewRemoveTagsFromResourceFn(&ssm.RemoveTagsFromResourceOutput{}, nil),
  321. AddTagsToResourceFn: fakeps.NewAddTagsToResourceFn(&ssm.AddTagsToResourceOutput{}, nil),
  322. },
  323. },
  324. want: want{
  325. err: nil,
  326. },
  327. },
  328. "SetParameterFailsWhenNoNameProvided": {
  329. reason: "test push secret with no name gives error",
  330. args: args{
  331. store: makeValidParameterStore().Spec.Provider.AWS,
  332. client: fakeps.Client{
  333. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  334. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, invalidParameters),
  335. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  336. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  337. },
  338. },
  339. want: want{
  340. err: invalidParameters,
  341. },
  342. },
  343. "SetSecretWhenAlreadyExists": {
  344. reason: "test push secret with secret that already exists gives error",
  345. args: args{
  346. store: makeValidParameterStore().Spec.Provider.AWS,
  347. client: fakeps.Client{
  348. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, alreadyExistsError),
  349. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  350. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  351. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  352. },
  353. },
  354. want: want{
  355. err: alreadyExistsError,
  356. },
  357. },
  358. "GetSecretWithValidParameters": {
  359. reason: "Get secret with valid parameters",
  360. args: args{
  361. store: makeValidParameterStore().Spec.Provider.AWS,
  362. client: fakeps.Client{
  363. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  364. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  365. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  366. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  367. },
  368. },
  369. want: want{
  370. err: nil,
  371. },
  372. },
  373. "SetSecretNotManagedByESO": {
  374. reason: "SetSecret to the parameter store but tags are not managed by ESO",
  375. args: args{
  376. store: makeValidParameterStore().Spec.Provider.AWS,
  377. client: fakeps.Client{
  378. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  379. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  380. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  381. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(noTagsResourceOutput, nil),
  382. },
  383. },
  384. want: want{
  385. err: errors.New("secret not managed by external-secrets"),
  386. },
  387. },
  388. "SetSecretGetTagsError": {
  389. reason: "SetSecret to the parameter store returns error while obtaining tags",
  390. args: args{
  391. store: makeValidParameterStore().Spec.Provider.AWS,
  392. client: fakeps.Client{
  393. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  394. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  395. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  396. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(nil, errors.New("you shall not tag")),
  397. },
  398. },
  399. want: want{
  400. err: errors.New("you shall not tag"),
  401. },
  402. },
  403. "SetSecretContentMatches": {
  404. reason: "No ops",
  405. args: args{
  406. store: makeValidParameterStore().Spec.Provider.AWS,
  407. client: fakeps.Client{
  408. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  409. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  410. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  411. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  412. },
  413. },
  414. want: want{
  415. err: nil,
  416. },
  417. },
  418. "SetSecretWithValidMetadata": {
  419. reason: "test push secret with valid parameterStoreType metadata",
  420. args: args{
  421. store: makeValidParameterStore().Spec.Provider.AWS,
  422. metadata: &apiextensionsv1.JSON{
  423. Raw: []byte(`{
  424. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  425. "kind": "PushSecretMetadata",
  426. "spec": {
  427. "secretType": "SecureString",
  428. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c"
  429. }
  430. }`),
  431. },
  432. client: fakeps.Client{
  433. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  434. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  435. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  436. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  437. },
  438. },
  439. want: want{
  440. err: nil,
  441. },
  442. },
  443. "SetSecretWithValidMetadataListString": {
  444. reason: "test push secret with valid parameterStoreType metadata and unused parameterStoreKeyID",
  445. args: args{
  446. store: makeValidParameterStore().Spec.Provider.AWS,
  447. metadata: &apiextensionsv1.JSON{
  448. Raw: []byte(`{
  449. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  450. "kind": "PushSecretMetadata",
  451. "spec": {
  452. "secretType": "StringList"
  453. }
  454. }`),
  455. },
  456. client: fakeps.Client{
  457. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  458. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  459. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  460. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  461. },
  462. },
  463. want: want{
  464. err: nil,
  465. },
  466. },
  467. "SetSecretWithInvalidMetadata": {
  468. reason: "test push secret with invalid metadata structure",
  469. args: args{
  470. store: makeValidParameterStore().Spec.Provider.AWS,
  471. metadata: &apiextensionsv1.JSON{
  472. Raw: []byte(`{ fakeMetadataKey: "" }`),
  473. },
  474. client: fakeps.Client{
  475. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  476. GetParameterFn: fakeps.NewGetParameterFn(sameGetParameterOutput, nil),
  477. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  478. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  479. },
  480. },
  481. want: want{
  482. err: errors.New(
  483. `failed to parse metadata: failed to parse kubernetes.external-secrets.io/v1alpha1 PushSecretMetadata: error unmarshaling JSON: while decoding JSON: json: unknown field "fakeMetadataKey"`,
  484. ),
  485. },
  486. },
  487. "GetRemoteSecretWithoutDecryption": {
  488. reason: "test if push secret's get remote source is encrypted for valid comparison",
  489. args: args{
  490. store: makeValidParameterStore().Spec.Provider.AWS,
  491. metadata: &apiextensionsv1.JSON{
  492. Raw: []byte(`{
  493. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  494. "kind": "PushSecretMetadata",
  495. "spec": {
  496. "secretType": "SecureString",
  497. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c"
  498. }
  499. }`),
  500. },
  501. client: fakeps.Client{
  502. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  503. GetParameterFn: fakeps.NewGetParameterFn(&ssm.GetParameterOutput{
  504. Parameter: &ssmtypes.Parameter{
  505. Type: ssmtypes.ParameterTypeSecureString,
  506. Value: aws.String("sensitive"),
  507. },
  508. }, nil),
  509. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  510. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  511. },
  512. },
  513. want: want{
  514. err: errors.New("unable to compare 'sensitive' result, ensure to request a decrypted value"),
  515. },
  516. },
  517. "SecretWithAdvancedTier": {
  518. reason: "test if we can provide advanced tier policies",
  519. args: args{
  520. store: makeValidParameterStore().Spec.Provider.AWS,
  521. metadata: &apiextensionsv1.JSON{
  522. Raw: []byte(`{
  523. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  524. "kind": "PushSecretMetadata",
  525. "spec": {
  526. "secretType": "SecureString",
  527. "kmsKeyID": "arn:aws:kms:sa-east-1:00000000000:key/bb123123-b2b0-4f60-ac3a-44a13f0e6b6c",
  528. "tier": {
  529. "type": "Advanced",
  530. "policies": [
  531. {
  532. "type": "Expiration",
  533. "version": "1.0",
  534. "attributes": {
  535. "timestamp": "2024-12-02T21:34:33.000Z"
  536. }
  537. },
  538. {
  539. "type": "ExpirationNotification",
  540. "version": "1.0",
  541. "attributes": {
  542. "before": "2",
  543. "unit": "Days"
  544. }
  545. }
  546. ]
  547. }
  548. }
  549. }`),
  550. },
  551. client: fakeps.Client{
  552. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  553. GetParameterFn: fakeps.NewGetParameterFn(&ssm.GetParameterOutput{
  554. Parameter: &ssmtypes.Parameter{
  555. Type: ssmtypes.ParameterTypeSecureString,
  556. Value: aws.String("sensitive"),
  557. },
  558. }, nil),
  559. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  560. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  561. },
  562. },
  563. want: want{
  564. err: errors.New("unable to compare 'sensitive' result, ensure to request a decrypted value"),
  565. },
  566. },
  567. "SecretPatchTags": {
  568. reason: "test if we can configure tags for the secret",
  569. args: args{
  570. store: makeValidParameterStore().Spec.Provider.AWS,
  571. metadata: &apiextensionsv1.JSON{
  572. Raw: []byte(`{
  573. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  574. "kind": "PushSecretMetadata",
  575. "spec": {
  576. "tags": {
  577. "env": "sandbox",
  578. "rotation": "1h"
  579. },
  580. }
  581. }`),
  582. },
  583. client: fakeps.Client{
  584. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil, func(input *ssm.PutParameterInput) {
  585. assert.Len(t, input.Tags, 0)
  586. }),
  587. GetParameterFn: fakeps.NewGetParameterFn(&ssm.GetParameterOutput{
  588. Parameter: &ssmtypes.Parameter{
  589. Value: aws.String("some-value"),
  590. },
  591. }, nil),
  592. DescribeParametersFn: fakeps.NewDescribeParametersFn(&ssm.DescribeParametersOutput{}, nil),
  593. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(&ssm.ListTagsForResourceOutput{
  594. TagList: []ssmtypes.Tag{managedByESO,
  595. {Key: new("team"), Value: new("no-longer-needed")},
  596. {Key: new("rotation"), Value: new("10m")},
  597. },
  598. }, nil),
  599. RemoveTagsFromResourceFn: fakeps.NewRemoveTagsFromResourceFn(&ssm.RemoveTagsFromResourceOutput{}, nil, func(input *ssm.RemoveTagsFromResourceInput) {
  600. assert.Len(t, input.TagKeys, 1)
  601. assert.Equal(t, []string{"team"}, input.TagKeys)
  602. }),
  603. AddTagsToResourceFn: fakeps.NewAddTagsToResourceFn(&ssm.AddTagsToResourceOutput{}, nil, func(input *ssm.AddTagsToResourceInput) {
  604. assert.Len(t, input.Tags, 3)
  605. assert.Contains(t, input.Tags, ssmtypes.Tag{Key: &managedBy, Value: &externalSecrets})
  606. assert.Contains(t, input.Tags, ssmtypes.Tag{Key: new("env"), Value: new("sandbox")})
  607. assert.Contains(t, input.Tags, ssmtypes.Tag{Key: new("rotation"), Value: new("1h")})
  608. }),
  609. },
  610. },
  611. want: want{
  612. err: nil,
  613. },
  614. },
  615. }
  616. for name, tc := range tests {
  617. t.Run(name, func(t *testing.T) {
  618. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  619. if tc.args.metadata != nil {
  620. psd.Metadata = tc.args.metadata
  621. }
  622. ps := ParameterStore{
  623. client: &tc.args.client,
  624. }
  625. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  626. // Error nil XOR tc.want.err nil
  627. if ((err == nil) || (tc.want.err == nil)) && !((err == nil) && (tc.want.err == nil)) {
  628. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %v", name, tc.reason, tc.want.err, err)
  629. }
  630. // if errors are the same type but their contents do not match
  631. if err != nil && tc.want.err != nil {
  632. if !strings.Contains(err.Error(), tc.want.err.Error()) {
  633. t.Errorf("\nTesting SetSecret:\nName: %v\nReason: %v\nWant error: %v\nGot error: %s", name, tc.reason, tc.want.err, err)
  634. }
  635. }
  636. })
  637. }
  638. }
  639. func TestPushSecretWithPrefix(t *testing.T) {
  640. fakeSecret := &corev1.Secret{
  641. Data: map[string][]byte{
  642. fakeSecretKey: []byte(fakeValue),
  643. },
  644. }
  645. managedByESO := ssmtypes.Tag{
  646. Key: &managedBy,
  647. Value: &externalSecrets,
  648. }
  649. putParameterOutput := &ssm.PutParameterOutput{}
  650. getParameterOutput := &ssm.GetParameterOutput{}
  651. describeParameterOutput := &ssm.DescribeParametersOutput{}
  652. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  653. TagList: []ssmtypes.Tag{managedByESO},
  654. }
  655. client := fakeps.Client{
  656. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  657. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  658. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  659. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  660. }
  661. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  662. ps := ParameterStore{
  663. client: &client,
  664. prefix: "/test/this/thing/",
  665. }
  666. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  667. require.NoError(t, err)
  668. input := client.PutParameterFnCalledWith[0][0]
  669. assert.Equal(t, "/test/this/thing/fake-key", *input.Name)
  670. }
  671. func TestPushSecretWithoutKeyAndEncodedAsDecodedTrue(t *testing.T) {
  672. fakeSecret := &corev1.Secret{
  673. Data: map[string][]byte{
  674. fakeSecretKey: []byte(fakeValue),
  675. },
  676. }
  677. managedByESO := ssmtypes.Tag{
  678. Key: &managedBy,
  679. Value: &externalSecrets,
  680. }
  681. putParameterOutput := &ssm.PutParameterOutput{}
  682. getParameterOutput := &ssm.GetParameterOutput{}
  683. describeParameterOutput := &ssm.DescribeParametersOutput{}
  684. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  685. TagList: []ssmtypes.Tag{managedByESO},
  686. }
  687. client := fakeps.Client{
  688. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  689. GetParameterFn: fakeps.NewGetParameterFn(getParameterOutput, nil),
  690. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  691. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  692. }
  693. psd := fake.PushSecretData{RemoteKey: remoteKey, Metadata: &apiextensionsv1.JSON{Raw: []byte(`
  694. apiVersion: kubernetes.external-secrets.io/v1alpha1
  695. kind: PushSecretMetadata
  696. spec:
  697. encodeAsDecoded: true
  698. `)}}
  699. ps := ParameterStore{
  700. client: &client,
  701. prefix: "/test/this/thing/",
  702. }
  703. err := ps.PushSecret(context.TODO(), fakeSecret, psd)
  704. require.NoError(t, err)
  705. input := client.PutParameterFnCalledWith[0][0]
  706. assert.Equal(t, "{\"fakeSecretKey\":\"fakeValue\"}", *input.Value)
  707. }
  708. func TestPushSecretCalledOnlyOnce(t *testing.T) {
  709. fakeSecret := &corev1.Secret{
  710. Data: map[string][]byte{
  711. fakeSecretKey: []byte(fakeValue),
  712. },
  713. }
  714. managedByESO := ssmtypes.Tag{
  715. Key: &managedBy,
  716. Value: &externalSecrets,
  717. }
  718. putParameterOutput := &ssm.PutParameterOutput{}
  719. validGetParameterOutput := &ssm.GetParameterOutput{
  720. Parameter: &ssmtypes.Parameter{
  721. Value: &fakeValue,
  722. },
  723. }
  724. describeParameterOutput := &ssm.DescribeParametersOutput{}
  725. validListTagsForResourceOutput := &ssm.ListTagsForResourceOutput{
  726. TagList: []ssmtypes.Tag{managedByESO},
  727. }
  728. client := fakeps.Client{
  729. PutParameterFn: fakeps.NewPutParameterFn(putParameterOutput, nil),
  730. GetParameterFn: fakeps.NewGetParameterFn(validGetParameterOutput, nil),
  731. DescribeParametersFn: fakeps.NewDescribeParametersFn(describeParameterOutput, nil),
  732. ListTagsForResourceFn: fakeps.NewListTagsForResourceFn(validListTagsForResourceOutput, nil),
  733. }
  734. psd := fake.PushSecretData{SecretKey: fakeSecretKey, RemoteKey: remoteKey}
  735. ps := ParameterStore{
  736. client: &client,
  737. }
  738. require.NoError(t, ps.PushSecret(context.TODO(), fakeSecret, psd))
  739. assert.Equal(t, 0, client.PutParameterCalledN)
  740. }
  741. // test the ssm<->aws interface
  742. // make sure correct values are passed and errors are handled accordingly.
  743. func TestGetSecret(t *testing.T) {
  744. // good case: key is passed in, output is sent back
  745. setSecretString := func(pstc *parameterstoreTestCase) {
  746. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  747. pstc.expectedSecret = "RRRRR"
  748. }
  749. // good case: key is passed in and prefix is set, output is sent back
  750. setSecretStringWithPrefix := func(pstc *parameterstoreTestCase) {
  751. pstc.apiInput = &ssm.GetParameterInput{
  752. Name: aws.String("/test/this/baz"),
  753. WithDecryption: aws.Bool(true),
  754. }
  755. pstc.prefix = "/test/this"
  756. pstc.apiOutput.Parameter.Value = aws.String("RRRRR")
  757. pstc.expectedSecret = "RRRRR"
  758. }
  759. // good case: extract property
  760. setExtractProperty := func(pstc *parameterstoreTestCase) {
  761. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  762. pstc.expectedSecret = "bang"
  763. pstc.remoteRef.Property = "/shmoo"
  764. }
  765. // good case: extract property with `.`
  766. setExtractPropertyWithDot := func(pstc *parameterstoreTestCase) {
  767. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo.boom": "bang"}`)
  768. pstc.expectedSecret = "bang"
  769. pstc.remoteRef.Property = "/shmoo.boom"
  770. }
  771. // bad case: missing property
  772. setMissingProperty := func(pstc *parameterstoreTestCase) {
  773. pstc.apiOutput.Parameter.Value = aws.String(`{"/shmoo": "bang"}`)
  774. pstc.remoteRef.Property = "INVALPROP"
  775. pstc.expectError = "key INVALPROP does not exist in secret"
  776. }
  777. // bad case: parameter.Value not found
  778. setParameterValueNotFound := func(pstc *parameterstoreTestCase) {
  779. pstc.apiOutput.Parameter.Value = aws.String("NONEXISTENT")
  780. pstc.apiErr = esv1.NoSecretErr
  781. pstc.expectError = "Secret does not exist"
  782. }
  783. // bad case: extract property failure due to invalid json
  784. setPropertyFail := func(pstc *parameterstoreTestCase) {
  785. pstc.apiOutput.Parameter.Value = aws.String(`------`)
  786. pstc.remoteRef.Property = invalidProp
  787. pstc.expectError = errInvalidProperty
  788. }
  789. // bad case: parameter.Value may be nil but binary is set
  790. setParameterValueNil := func(pstc *parameterstoreTestCase) {
  791. pstc.apiOutput.Parameter.Value = nil
  792. pstc.expectError = "parameter value is nil for key"
  793. }
  794. // base case: api output return error
  795. setAPIError := func(pstc *parameterstoreTestCase) {
  796. pstc.apiOutput = &ssm.GetParameterOutput{}
  797. pstc.apiErr = errors.New("oh no")
  798. pstc.expectError = "oh no"
  799. }
  800. // good case: metadata returned
  801. setMetadataString := func(pstc *parameterstoreTestCase) {
  802. pstc.remoteRef.MetadataPolicy = esv1.ExternalSecretMetadataPolicyFetch
  803. output := ssm.ListTagsForResourceOutput{
  804. TagList: getTagSlice(),
  805. }
  806. pstc.fakeClient.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(&output, nil)
  807. pstc.expectedSecret, _ = awsutil.ParameterTagsToJSONString(normaliseTags(getTagSlice()))
  808. }
  809. // good case: metadata property returned
  810. setMetadataProperty := func(pstc *parameterstoreTestCase) {
  811. pstc.remoteRef.MetadataPolicy = esv1.ExternalSecretMetadataPolicyFetch
  812. output := ssm.ListTagsForResourceOutput{
  813. TagList: getTagSlice(),
  814. }
  815. pstc.fakeClient.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(&output, nil)
  816. pstc.remoteRef.Property = "tagname2"
  817. pstc.expectedSecret = "tagvalue2"
  818. }
  819. // bad case: metadata property not found
  820. setMetadataMissingProperty := func(pstc *parameterstoreTestCase) {
  821. pstc.remoteRef.MetadataPolicy = esv1.ExternalSecretMetadataPolicyFetch
  822. output := ssm.ListTagsForResourceOutput{
  823. TagList: getTagSlice(),
  824. }
  825. pstc.fakeClient.ListTagsForResourceFn = fakeps.NewListTagsForResourceFn(&output, nil)
  826. pstc.remoteRef.Property = invalidProp
  827. pstc.expectError = errInvalidProperty
  828. }
  829. successCases := []*parameterstoreTestCase{
  830. makeValidParameterStoreTestCaseCustom(setSecretStringWithPrefix),
  831. makeValidParameterStoreTestCaseCustom(setSecretString),
  832. makeValidParameterStoreTestCaseCustom(setExtractProperty),
  833. makeValidParameterStoreTestCaseCustom(setMissingProperty),
  834. makeValidParameterStoreTestCaseCustom(setPropertyFail),
  835. makeValidParameterStoreTestCaseCustom(setParameterValueNil),
  836. makeValidParameterStoreTestCaseCustom(setAPIError),
  837. makeValidParameterStoreTestCaseCustom(setExtractPropertyWithDot),
  838. makeValidParameterStoreTestCaseCustom(setParameterValueNotFound),
  839. makeValidParameterStoreTestCaseCustom(setMetadataString),
  840. makeValidParameterStoreTestCaseCustom(setMetadataProperty),
  841. makeValidParameterStoreTestCaseCustom(setMetadataMissingProperty),
  842. }
  843. ps := ParameterStore{}
  844. for k, v := range successCases {
  845. ps.client = v.fakeClient
  846. ps.prefix = v.prefix
  847. out, err := ps.GetSecret(context.Background(), *v.remoteRef)
  848. if !ErrorContains(err, v.expectError) {
  849. t.Errorf("[%d] unexpected error: %s, expected: '%s'", k, err.Error(), v.expectError)
  850. }
  851. if cmp.Equal(out, v.expectedSecret) {
  852. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedSecret, out)
  853. }
  854. }
  855. }
  856. func TestGetSecretMap(t *testing.T) {
  857. // good case: default version & deserialization
  858. simpleJSON := func(pstc *parameterstoreTestCase) {
  859. pstc.apiOutput.Parameter.Value = aws.String(`{"foo":"bar"}`)
  860. pstc.expectedData["foo"] = []byte("bar")
  861. }
  862. // good case: default version & complex json
  863. complexJSON := func(pstc *parameterstoreTestCase) {
  864. pstc.apiOutput.Parameter.Value = aws.String(`{"int": 42, "str": "str", "nested": {"foo":"bar"}}`)
  865. pstc.expectedData["int"] = []byte("42")
  866. pstc.expectedData["str"] = []byte("str")
  867. pstc.expectedData["nested"] = []byte(`{"foo":"bar"}`)
  868. }
  869. // bad case: api error returned
  870. setAPIError := func(pstc *parameterstoreTestCase) {
  871. pstc.apiOutput.Parameter = &ssmtypes.Parameter{}
  872. pstc.expectError = "some api err"
  873. pstc.apiErr = errors.New("some api err")
  874. }
  875. // bad case: invalid json
  876. setInvalidJSON := func(pstc *parameterstoreTestCase) {
  877. pstc.apiOutput.Parameter.Value = aws.String(`-----------------`)
  878. pstc.expectError = "unable to unmarshal secret"
  879. }
  880. successCases := []*parameterstoreTestCase{
  881. makeValidParameterStoreTestCaseCustom(simpleJSON),
  882. makeValidParameterStoreTestCaseCustom(complexJSON),
  883. makeValidParameterStoreTestCaseCustom(setAPIError),
  884. makeValidParameterStoreTestCaseCustom(setInvalidJSON),
  885. }
  886. ps := ParameterStore{}
  887. for k, v := range successCases {
  888. ps.client = v.fakeClient
  889. out, err := ps.GetSecretMap(context.Background(), *v.remoteRef)
  890. if !ErrorContains(err, v.expectError) {
  891. t.Errorf("[%d] unexpected error: %q, expected: %q", k, err.Error(), v.expectError)
  892. }
  893. if err == nil && !cmp.Equal(out, v.expectedData) {
  894. t.Errorf("[%d] unexpected secret data: expected %#v, got %#v", k, v.expectedData, out)
  895. }
  896. }
  897. }
  898. func makeValidParameterStore() *esv1.SecretStore {
  899. return &esv1.SecretStore{
  900. ObjectMeta: metav1.ObjectMeta{
  901. Name: "aws-parameterstore",
  902. Namespace: "default",
  903. },
  904. Spec: esv1.SecretStoreSpec{
  905. Provider: &esv1.SecretStoreProvider{
  906. AWS: &esv1.AWSProvider{
  907. Service: esv1.AWSServiceParameterStore,
  908. Region: "us-east-1",
  909. },
  910. },
  911. },
  912. }
  913. }
  914. func ErrorContains(out error, want string) bool {
  915. if out == nil {
  916. return want == ""
  917. }
  918. if want == "" {
  919. return false
  920. }
  921. return strings.Contains(out.Error(), want)
  922. }
  923. func getTagSlice() []ssmtypes.Tag {
  924. tagKey1 := "tagname1"
  925. tagValue1 := "tagvalue1"
  926. tagKey2 := "tagname2"
  927. tagValue2 := "tagvalue2"
  928. return []ssmtypes.Tag{
  929. {
  930. Key: &tagKey1,
  931. Value: &tagValue1,
  932. },
  933. {
  934. Key: &tagKey2,
  935. Value: &tagValue2,
  936. },
  937. }
  938. }
  939. func normaliseTags(input []ssmtypes.Tag) map[string]string {
  940. tags := make(map[string]string, len(input))
  941. for _, tag := range input {
  942. if tag.Key != nil && tag.Value != nil {
  943. tags[*tag.Key] = *tag.Value
  944. }
  945. }
  946. return tags
  947. }
  948. func TestSecretExists(t *testing.T) {
  949. parameterOutput := &ssm.GetParameterOutput{
  950. Parameter: &ssmtypes.Parameter{
  951. Value: aws.String("sensitive"),
  952. },
  953. }
  954. blankParameterOutput := &ssm.GetParameterOutput{}
  955. getParameterCorrectErr := ssmtypes.ResourceNotFoundException{}
  956. getParameterWrongErr := ssmtypes.InvalidParameters{}
  957. pushSecretDataWithoutProperty := fake.PushSecretData{SecretKey: "fake-secret-key", RemoteKey: fakeSecretKey, Property: ""}
  958. type args struct {
  959. store *esv1.AWSProvider
  960. client fakeps.Client
  961. pushSecretData fake.PushSecretData
  962. }
  963. type want struct {
  964. err error
  965. wantError bool
  966. }
  967. tests := map[string]struct {
  968. args args
  969. want want
  970. }{
  971. "SecretExistsReturnsTrueForExistingParameter": {
  972. args: args{
  973. store: makeValidParameterStore().Spec.Provider.AWS,
  974. client: fakeps.Client{
  975. GetParameterFn: fakeps.NewGetParameterFn(parameterOutput, nil),
  976. },
  977. pushSecretData: pushSecretDataWithoutProperty,
  978. },
  979. want: want{
  980. err: nil,
  981. wantError: true,
  982. },
  983. },
  984. "SecretExistsReturnsFalseForNonExistingParameter": {
  985. args: args{
  986. store: makeValidParameterStore().Spec.Provider.AWS,
  987. client: fakeps.Client{
  988. GetParameterFn: fakeps.NewGetParameterFn(blankParameterOutput, &getParameterCorrectErr),
  989. },
  990. pushSecretData: pushSecretDataWithoutProperty,
  991. },
  992. want: want{
  993. err: nil,
  994. wantError: false,
  995. },
  996. },
  997. "SecretExistsReturnsFalseForErroredParameter": {
  998. args: args{
  999. store: makeValidParameterStore().Spec.Provider.AWS,
  1000. client: fakeps.Client{
  1001. GetParameterFn: fakeps.NewGetParameterFn(blankParameterOutput, &getParameterWrongErr),
  1002. },
  1003. pushSecretData: pushSecretDataWithoutProperty,
  1004. },
  1005. want: want{
  1006. err: &getParameterWrongErr,
  1007. wantError: false,
  1008. },
  1009. },
  1010. }
  1011. for name, tc := range tests {
  1012. t.Run(name, func(t *testing.T) {
  1013. ps := &ParameterStore{
  1014. client: &tc.args.client,
  1015. }
  1016. got, err := ps.SecretExists(context.Background(), tc.args.pushSecretData)
  1017. assert.Equal(
  1018. t,
  1019. tc.want,
  1020. want{
  1021. err: err,
  1022. wantError: got,
  1023. })
  1024. })
  1025. }
  1026. }
  1027. func TestConstructMetadataWithDefaults(t *testing.T) {
  1028. tests := []struct {
  1029. name string
  1030. input *apiextensionsv1.JSON
  1031. expected *metadata.PushSecretMetadata[PushSecretMetadataSpec]
  1032. expectError bool
  1033. }{
  1034. {
  1035. name: "Valid metadata with multiple fields",
  1036. input: &apiextensionsv1.JSON{Raw: []byte(`{
  1037. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  1038. "kind": "PushSecretMetadata",
  1039. "spec": {
  1040. "description": "test description",
  1041. "tier": {"type": "Advanced"},
  1042. "secretType":"SecureString",
  1043. "kmsKeyID": "custom-kms-key",
  1044. "tags": {
  1045. "customKey": "customValue"
  1046. },
  1047. }
  1048. }`)},
  1049. expected: &metadata.PushSecretMetadata[PushSecretMetadataSpec]{
  1050. APIVersion: "kubernetes.external-secrets.io/v1alpha1",
  1051. Kind: "PushSecretMetadata",
  1052. Spec: PushSecretMetadataSpec{
  1053. Description: "test description",
  1054. Tier: Tier{
  1055. Type: "Advanced",
  1056. },
  1057. SecretType: "SecureString",
  1058. KMSKeyID: "custom-kms-key",
  1059. Tags: map[string]string{
  1060. "customKey": "customValue",
  1061. "managed-by": "external-secrets",
  1062. },
  1063. },
  1064. },
  1065. },
  1066. {
  1067. name: "Empty metadata, defaults applied",
  1068. input: nil,
  1069. expected: &metadata.PushSecretMetadata[PushSecretMetadataSpec]{
  1070. Spec: PushSecretMetadataSpec{
  1071. Description: "secret 'managed-by:external-secrets'",
  1072. Tier: Tier{
  1073. Type: "Standard",
  1074. },
  1075. SecretType: "String",
  1076. KMSKeyID: "alias/aws/ssm",
  1077. Tags: map[string]string{
  1078. "managed-by": "external-secrets",
  1079. },
  1080. },
  1081. },
  1082. },
  1083. {
  1084. name: "Added default metadata with 'managed-by' tag",
  1085. input: &apiextensionsv1.JSON{Raw: []byte(`{
  1086. "apiVersion": "kubernetes.external-secrets.io/v1alpha1",
  1087. "kind": "PushSecretMetadata",
  1088. "spec": {
  1089. "description": "adding managed-by tag explicitly",
  1090. "tags": {
  1091. "managed-by": "external-secrets",
  1092. "customKey": "customValue"
  1093. },
  1094. }
  1095. }`)},
  1096. expectError: true,
  1097. },
  1098. {
  1099. name: "Invalid metadata format",
  1100. input: &apiextensionsv1.JSON{Raw: []byte(`invalid-json`)},
  1101. expected: nil,
  1102. expectError: true,
  1103. },
  1104. {
  1105. name: "Metadata with 'managed-by' tag specified",
  1106. input: &apiextensionsv1.JSON{Raw: []byte(`{"tags":{"managed-by":"invalid"}}`)},
  1107. expected: nil,
  1108. expectError: true,
  1109. },
  1110. }
  1111. for _, tt := range tests {
  1112. t.Run(tt.name, func(t *testing.T) {
  1113. result, err := (&ParameterStore{}).constructMetadataWithDefaults(tt.input)
  1114. if tt.expectError {
  1115. assert.Error(t, err)
  1116. } else {
  1117. assert.NoError(t, err)
  1118. assert.Equal(t, tt.expected, result)
  1119. }
  1120. })
  1121. }
  1122. }
  1123. func TestComputeTagsToUpdate(t *testing.T) {
  1124. tests := []struct {
  1125. name string
  1126. tags map[string]string
  1127. metaTags map[string]string
  1128. expected []ssmtypes.Tag
  1129. modified bool
  1130. }{
  1131. {
  1132. name: "No tags to update",
  1133. tags: map[string]string{
  1134. "key1": "value1",
  1135. "key2": "value2",
  1136. },
  1137. metaTags: map[string]string{
  1138. "key1": "value1",
  1139. "key2": "value2",
  1140. },
  1141. expected: []ssmtypes.Tag{
  1142. {Key: new("key1"), Value: new("value1")},
  1143. {Key: new("key2"), Value: new("value2")},
  1144. },
  1145. modified: false,
  1146. },
  1147. {
  1148. name: "No tags to update as managed-by tag is ignored",
  1149. tags: map[string]string{
  1150. "key1": "value1",
  1151. "key2": "value2",
  1152. },
  1153. metaTags: map[string]string{
  1154. "key1": "value1",
  1155. "key2": "value2",
  1156. managedBy: externalSecrets,
  1157. },
  1158. expected: []ssmtypes.Tag{
  1159. {Key: new("key1"), Value: new("value1")},
  1160. {Key: new("key2"), Value: new("value2")},
  1161. {Key: new(managedBy), Value: new(externalSecrets)},
  1162. },
  1163. modified: false,
  1164. },
  1165. {
  1166. name: "Add new tag",
  1167. tags: map[string]string{
  1168. "key1": "value1",
  1169. },
  1170. metaTags: map[string]string{
  1171. "key1": "value1",
  1172. "key2": "value2",
  1173. },
  1174. expected: []ssmtypes.Tag{
  1175. {Key: new("key1"), Value: new("value1")},
  1176. {Key: new("key2"), Value: new("value2")},
  1177. },
  1178. modified: true,
  1179. },
  1180. {
  1181. name: "Update existing tag value",
  1182. tags: map[string]string{
  1183. "key1": "value1",
  1184. },
  1185. metaTags: map[string]string{
  1186. "key1": "newValue",
  1187. },
  1188. expected: []ssmtypes.Tag{
  1189. {Key: new("key1"), Value: new("newValue")},
  1190. },
  1191. modified: true,
  1192. },
  1193. {
  1194. name: "Empty tags and metaTags",
  1195. tags: map[string]string{},
  1196. metaTags: map[string]string{},
  1197. expected: []ssmtypes.Tag{},
  1198. modified: false,
  1199. },
  1200. {
  1201. name: "Empty tags with non-empty metaTags",
  1202. tags: map[string]string{},
  1203. metaTags: map[string]string{
  1204. "key1": "value1",
  1205. },
  1206. expected: []ssmtypes.Tag{
  1207. {Key: new("key1"), Value: new("value1")},
  1208. },
  1209. modified: true,
  1210. },
  1211. }
  1212. for _, tt := range tests {
  1213. t.Run(tt.name, func(t *testing.T) {
  1214. result, modified := computeTagsToUpdate(tt.tags, tt.metaTags)
  1215. assert.ElementsMatch(t, tt.expected, result)
  1216. assert.Equal(t, tt.modified, modified)
  1217. })
  1218. }
  1219. }