1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
external-secrets/pkg/controllers/clusterexternalsecret/clusterexternalsecret_controller_test.go
Shuhei Kitagawa 43a7a16baf
Update Go and golangci-lint version (#3396)
Signed-off-by: shuheiktgw <s-kitagawa@mercari.com>
Co-authored-by: Gustavo Fernandes de Carvalho <gusfcarvalho@gmail.com>
2024-04-25 06:36:11 -03:00

814 lines
28 KiB
Go

/*
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package clusterexternalsecret
import (
"context"
"fmt"
"math/rand"
"sort"
"time"
v1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
crclient "sigs.k8s.io/controller-runtime/pkg/client"
esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
"github.com/external-secrets/external-secrets/pkg/controllers/clusterexternalsecret/cesmetrics"
ctrlmetrics "github.com/external-secrets/external-secrets/pkg/controllers/metrics"
. "github.com/onsi/ginkgo/v2"
. "github.com/onsi/gomega"
)
func init() {
ctrlmetrics.SetUpLabelNames(false)
cesmetrics.SetUpMetrics()
}
var (
timeout = time.Second * 10
interval = time.Millisecond * 250
)
type testCase struct {
namespaces []v1.Namespace
clusterExternalSecret func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret
beforeCheck func(ctx context.Context, namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret)
expectedClusterExternalSecret func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret
expectedExternalSecrets func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret
}
var _ = Describe("ClusterExternalSecret controller", func() {
defaultClusterExternalSecret := func() *esv1beta1.ClusterExternalSecret {
return &esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: fmt.Sprintf("test-ces-%s", randString(10)),
},
Spec: esv1beta1.ClusterExternalSecretSpec{
ExternalSecretSpec: esv1beta1.ExternalSecretSpec{
SecretStoreRef: esv1beta1.SecretStoreRef{
Name: "test-store",
},
Target: esv1beta1.ExternalSecretTarget{
Name: "test-secret",
},
Data: []esv1beta1.ExternalSecretData{
{
SecretKey: "test-secret-key",
RemoteRef: esv1beta1.ExternalSecretDataRemoteRef{
Key: "test-remote-key",
},
},
},
},
},
}
}
DescribeTable("When reconciling a ClusterExternal Secret",
func(tc testCase) {
ctx := context.Background()
By("creating namespaces")
var namespaces []v1.Namespace
for _, ns := range tc.namespaces {
err := k8sClient.Create(ctx, &ns)
Expect(err).ShouldNot(HaveOccurred())
namespaces = append(namespaces, ns)
}
By("creating a cluster external secret")
ces := tc.clusterExternalSecret(tc.namespaces)
err := k8sClient.Create(ctx, &ces)
Expect(err).ShouldNot(HaveOccurred())
By("running before check")
if tc.beforeCheck != nil {
tc.beforeCheck(ctx, namespaces, ces)
}
// the before check above may have updated the namespaces, so refresh them
for i, ns := range namespaces {
err := k8sClient.Get(ctx, types.NamespacedName{Name: ns.Name}, &ns)
Expect(err).ShouldNot(HaveOccurred())
namespaces[i] = ns
}
By("checking the cluster external secret")
expectedCES := tc.expectedClusterExternalSecret(namespaces, ces)
Eventually(func(g Gomega) {
key := types.NamespacedName{Name: expectedCES.Name}
var gotCes esv1beta1.ClusterExternalSecret
err = k8sClient.Get(ctx, key, &gotCes)
g.Expect(err).ShouldNot(HaveOccurred())
g.Expect(gotCes.Labels).To(Equal(expectedCES.Labels))
g.Expect(gotCes.Annotations).To(Equal(expectedCES.Annotations))
g.Expect(gotCes.Spec).To(Equal(expectedCES.Spec))
g.Expect(gotCes.Status).To(Equal(expectedCES.Status))
}).WithTimeout(timeout).WithPolling(interval).Should(Succeed())
By("checking the external secrets")
expectedESs := tc.expectedExternalSecrets(namespaces, ces)
Eventually(func(g Gomega) {
var gotESs []esv1beta1.ExternalSecret
for _, ns := range namespaces {
var externalSecrets esv1beta1.ExternalSecretList
err := k8sClient.List(ctx, &externalSecrets, crclient.InNamespace(ns.Name))
g.Expect(err).ShouldNot(HaveOccurred())
gotESs = append(gotESs, externalSecrets.Items...)
}
g.Expect(len(gotESs)).Should(Equal(len(expectedESs)))
for _, gotES := range gotESs {
found := false
for _, expectedES := range expectedESs {
if gotES.Namespace == expectedES.Namespace && gotES.Name == expectedES.Name {
found = true
g.Expect(gotES.Labels).To(Equal(expectedES.Labels))
g.Expect(gotES.Annotations).To(Equal(expectedES.Annotations))
g.Expect(gotES.Spec).To(Equal(expectedES.Spec))
}
}
g.Expect(found).To(Equal(true))
}
}).WithTimeout(timeout).WithPolling(interval).Should(Succeed())
},
Entry("Should use cluster external secret name if external secret name isn't defined", testCase{
namespaces: []v1.Namespace{
{ObjectMeta: metav1.ObjectMeta{Name: randomNamespaceName()}},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"kubernetes.io/metadata.name": namespaces[0].Name},
}
return *ces
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
ProvisionedNamespaces: []string{namespaces[0].Name},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[0].Name,
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}),
Entry("Should set external secret name and metadata if the fields are set", testCase{
namespaces: []v1.Namespace{
{ObjectMeta: metav1.ObjectMeta{Name: randomNamespaceName()}},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"kubernetes.io/metadata.name": namespaces[0].Name},
}
ces.Spec.ExternalSecretName = "test-es"
ces.Spec.ExternalSecretMetadata = esv1beta1.ExternalSecretMetadata{
Labels: map[string]string{"test-label-key1": "test-label-value1", "test-label-key2": "test-label-value2"},
Annotations: map[string]string{"test-annotation-key1": "test-annotation-value1", "test-annotation-key2": "test-annotation-value2"},
}
return *ces
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: "test-es",
ProvisionedNamespaces: []string{namespaces[0].Name},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[0].Name,
Name: "test-es",
Labels: map[string]string{"test-label-key1": "test-label-value1", "test-label-key2": "test-label-value2"},
Annotations: map[string]string{"test-annotation-key1": "test-annotation-value1", "test-annotation-key2": "test-annotation-value2"},
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}),
Entry("Should delete old external secrets if name has changed", testCase{
namespaces: []v1.Namespace{
{ObjectMeta: metav1.ObjectMeta{Name: randomNamespaceName()}},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"kubernetes.io/metadata.name": namespaces[0].Name},
}
ces.Spec.ExternalSecretName = "old-es-name"
return *ces
},
beforeCheck: func(ctx context.Context, namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) {
// Wait until the external secret is provisioned
var es esv1beta1.ExternalSecret
Eventually(func(g Gomega) {
key := types.NamespacedName{Namespace: namespaces[0].Name, Name: "old-es-name"}
g.Expect(k8sClient.Get(ctx, key, &es)).ShouldNot(HaveOccurred())
}).WithTimeout(timeout).WithPolling(interval).Should(Succeed())
copied := created.DeepCopy()
copied.Spec.ExternalSecretName = "new-es-name"
Expect(k8sClient.Patch(ctx, copied, crclient.MergeFrom(created.DeepCopy()))).ShouldNot(HaveOccurred())
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
updatedSpec := created.Spec.DeepCopy()
updatedSpec.ExternalSecretName = "new-es-name"
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: *updatedSpec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: "new-es-name",
ProvisionedNamespaces: []string{namespaces[0].Name},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[0].Name,
Name: "new-es-name",
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}),
Entry("Should update external secret if the fields change", testCase{
namespaces: []v1.Namespace{
{ObjectMeta: metav1.ObjectMeta{Name: randomNamespaceName()}},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"kubernetes.io/metadata.name": namespaces[0].Name},
}
return *ces
},
beforeCheck: func(ctx context.Context, namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) {
// Wait until the external secret is provisioned
var es esv1beta1.ExternalSecret
Eventually(func(g Gomega) {
key := types.NamespacedName{Namespace: namespaces[0].Name, Name: created.Name}
g.Expect(k8sClient.Get(ctx, key, &es)).ShouldNot(HaveOccurred())
g.Expect(len(es.Labels)).Should(Equal(0))
g.Expect(len(es.Annotations)).Should(Equal(0))
g.Expect(es.Spec).Should(Equal(created.Spec.ExternalSecretSpec))
}).WithTimeout(timeout).WithPolling(interval).Should(Succeed())
copied := created.DeepCopy()
copied.Spec.ExternalSecretMetadata = esv1beta1.ExternalSecretMetadata{
Labels: map[string]string{"test-label-key": "test-label-value"},
Annotations: map[string]string{"test-annotation-key": "test-annotation-value"},
}
copied.Spec.ExternalSecretSpec.SecretStoreRef.Name = "updated-test-store" //nolint:goconst
Expect(k8sClient.Patch(ctx, copied, crclient.MergeFrom(created.DeepCopy()))).ShouldNot(HaveOccurred())
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
updatedSpec := created.Spec.DeepCopy()
updatedSpec.ExternalSecretMetadata = esv1beta1.ExternalSecretMetadata{
Labels: map[string]string{"test-label-key": "test-label-value"},
Annotations: map[string]string{"test-annotation-key": "test-annotation-value"},
}
updatedSpec.ExternalSecretSpec.SecretStoreRef.Name = "updated-test-store"
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: *updatedSpec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
ProvisionedNamespaces: []string{namespaces[0].Name},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
updatedSpec := created.Spec.ExternalSecretSpec.DeepCopy()
updatedSpec.SecretStoreRef.Name = "updated-test-store"
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[0].Name,
Name: created.Name,
Labels: map[string]string{"test-label-key": "test-label-value"},
Annotations: map[string]string{"test-annotation-key": "test-annotation-value"},
},
Spec: *updatedSpec,
},
}
},
}),
Entry("Should not overwrite existing external secrets and error out if one is present", testCase{
namespaces: []v1.Namespace{
{ObjectMeta: metav1.ObjectMeta{Name: randomNamespaceName()}},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"kubernetes.io/metadata.name": namespaces[0].Name},
}
es := &esv1beta1.ExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: ces.Name,
Namespace: namespaces[0].Name,
},
}
Expect(k8sClient.Create(context.Background(), es)).ShouldNot(HaveOccurred())
return *ces
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
FailedNamespaces: []esv1beta1.ClusterExternalSecretNamespaceFailure{
{
Namespace: namespaces[0].Name,
Reason: "external secret already exists in namespace",
},
},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionFalse,
Message: "one or more namespaces failed",
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[0].Name,
Name: created.Name,
},
Spec: esv1beta1.ExternalSecretSpec{
Target: esv1beta1.ExternalSecretTarget{
CreationPolicy: "Owner",
DeletionPolicy: "Retain",
},
RefreshInterval: &metav1.Duration{Duration: time.Hour},
},
},
}
},
}),
Entry("Should crate an external secret if one with the same name has been deleted", testCase{
namespaces: []v1.Namespace{
{ObjectMeta: metav1.ObjectMeta{Name: randomNamespaceName()}},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"kubernetes.io/metadata.name": namespaces[0].Name},
}
es := &esv1beta1.ExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: ces.Name,
Namespace: namespaces[0].Name,
},
}
Expect(k8sClient.Create(context.Background(), es)).ShouldNot(HaveOccurred())
return *ces
},
beforeCheck: func(ctx context.Context, namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) {
ces := esv1beta1.ClusterExternalSecret{}
Eventually(func(g Gomega) {
key := types.NamespacedName{Namespace: created.Namespace, Name: created.Name}
g.Expect(k8sClient.Get(ctx, key, &ces)).ShouldNot(HaveOccurred())
g.Expect(len(ces.Status.FailedNamespaces)).Should(Equal(1))
}).WithTimeout(timeout).WithPolling(interval).Should(Succeed())
es := &esv1beta1.ExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: ces.Name,
Namespace: namespaces[0].Name,
},
}
Expect(k8sClient.Delete(ctx, es)).ShouldNot(HaveOccurred())
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
ProvisionedNamespaces: []string{namespaces[0].Name},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[0].Name,
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}),
Entry("Should delete external secrets when namespaces no longer match", testCase{
namespaces: []v1.Namespace{
{
ObjectMeta: metav1.ObjectMeta{
Name: randomNamespaceName(),
Labels: map[string]string{"no-longer-match-label-key": "no-longer-match-label-value"},
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: randomNamespaceName(),
Labels: map[string]string{"no-longer-match-label-key": "no-longer-match-label-value"},
},
},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.RefreshInterval = &metav1.Duration{Duration: 100 * time.Millisecond}
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"no-longer-match-label-key": "no-longer-match-label-value"},
}
return *ces
},
beforeCheck: func(ctx context.Context, namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) {
// Wait until the target ESs have been created
Eventually(func(g Gomega) {
for _, ns := range namespaces {
key := types.NamespacedName{Namespace: ns.Name, Name: created.Name}
g.Expect(k8sClient.Get(ctx, key, &esv1beta1.ExternalSecret{})).ShouldNot(HaveOccurred())
}
}).WithTimeout(timeout).WithPolling(interval).Should(Succeed())
namespaces[0].Labels = map[string]string{}
Expect(k8sClient.Update(ctx, &namespaces[0])).ShouldNot(HaveOccurred())
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
ProvisionedNamespaces: []string{namespaces[1].Name},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[1].Name,
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}),
Entry("Should sync with match expression", testCase{
namespaces: []v1.Namespace{
{
ObjectMeta: metav1.ObjectMeta{
Name: randomNamespaceName(),
Labels: map[string]string{"prefix": "foo"},
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: randomNamespaceName(),
Labels: map[string]string{"prefix": "bar"},
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: randomNamespaceName(),
Labels: map[string]string{"prefix": "baz"},
},
},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.RefreshInterval = &metav1.Duration{Duration: 100 * time.Millisecond}
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{
{
Key: "prefix",
Operator: metav1.LabelSelectorOpIn,
Values: []string{"foo", "bar"}, // "baz" is excluded
},
},
}
return *ces
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
provisionedNamespaces := []string{namespaces[0].Name, namespaces[1].Name}
sort.Strings(provisionedNamespaces)
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
ProvisionedNamespaces: provisionedNamespaces,
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[0].Name,
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespaces[1].Name,
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}),
Entry("Should be ready if no namespace matches", testCase{
namespaces: []v1.Namespace{
{
ObjectMeta: metav1.ObjectMeta{
Name: randomNamespaceName(),
},
},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelector = &metav1.LabelSelector{
MatchLabels: map[string]string{"kubernetes.io/metadata.name": "no-namespace-matches"},
}
return *ces
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{}
},
}),
Entry("Should be ready if namespace is selected via the namespace selectors", testCase{
namespaces: []v1.Namespace{
{
ObjectMeta: metav1.ObjectMeta{
Name: "namespace1",
Labels: map[string]string{
"key": "value1",
},
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: "namespace2",
Labels: map[string]string{
"key": "value2",
},
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: "namespace3",
Labels: map[string]string{
"key": "value3",
},
},
},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
ces.Spec.NamespaceSelectors = []*metav1.LabelSelector{
{
MatchLabels: map[string]string{"key": "value1"},
},
{
MatchLabels: map[string]string{"key": "value2"},
},
}
return *ces
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
ProvisionedNamespaces: []string{
"namespace1",
"namespace2",
},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: "namespace1",
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
{
ObjectMeta: metav1.ObjectMeta{
Namespace: "namespace2",
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}),
Entry("Should be ready if namespace is selected via namespaces", testCase{
namespaces: []v1.Namespace{
{
ObjectMeta: metav1.ObjectMeta{
Name: "not-matching-namespace",
},
},
},
clusterExternalSecret: func(namespaces []v1.Namespace) esv1beta1.ClusterExternalSecret {
ces := defaultClusterExternalSecret()
// does-not-exists tests that we would continue on to the next and not stop if the
// namespace hasn't been created yet.
ces.Spec.Namespaces = []string{"does-not-exist", "not-matching-namespace"}
return *ces
},
expectedClusterExternalSecret: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) esv1beta1.ClusterExternalSecret {
return esv1beta1.ClusterExternalSecret{
ObjectMeta: metav1.ObjectMeta{
Name: created.Name,
},
Spec: created.Spec,
Status: esv1beta1.ClusterExternalSecretStatus{
ExternalSecretName: created.Name,
ProvisionedNamespaces: []string{
"not-matching-namespace",
},
Conditions: []esv1beta1.ClusterExternalSecretStatusCondition{
{
Type: esv1beta1.ClusterExternalSecretReady,
Status: v1.ConditionTrue,
},
},
},
}
},
expectedExternalSecrets: func(namespaces []v1.Namespace, created esv1beta1.ClusterExternalSecret) []esv1beta1.ExternalSecret {
return []esv1beta1.ExternalSecret{
{
ObjectMeta: metav1.ObjectMeta{
Namespace: "not-matching-namespace",
Name: created.Name,
},
Spec: created.Spec.ExternalSecretSpec,
},
}
},
}))
})
var letterRunes = []rune("abcdefghijklmnopqrstuvwxyz")
func randString(n int) string {
b := make([]rune, n)
for i := range b {
b[i] = letterRunes[rand.Intn(len(letterRunes))]
}
return string(b)
}
func randomNamespaceName() string {
return fmt.Sprintf("testns-%s", randString(10))
}