mirror of
https://github.com/external-secrets/external-secrets.git
synced 2024-12-14 11:57:59 +00:00
ed0ceb8d84
* fix: parameter store should decode complex json values Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
279 lines
6.1 KiB
Go
279 lines
6.1 KiB
Go
/*
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
package kubernetes
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
corev1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
|
|
)
|
|
|
|
const (
|
|
errSomethingWentWrong = "Something went wrong"
|
|
)
|
|
|
|
type fakeClient struct {
|
|
t *testing.T
|
|
secretMap map[string]corev1.Secret
|
|
expectedListOptions metav1.ListOptions
|
|
}
|
|
|
|
func (fk fakeClient) Get(ctx context.Context, name string, opts metav1.GetOptions) (*corev1.Secret, error) {
|
|
secret, ok := fk.secretMap[name]
|
|
|
|
if !ok {
|
|
return nil, errors.New(errSomethingWentWrong)
|
|
}
|
|
return &secret, nil
|
|
}
|
|
|
|
func (fk fakeClient) List(ctx context.Context, opts metav1.ListOptions) (*corev1.SecretList, error) {
|
|
assert.Equal(fk.t, fk.expectedListOptions, opts)
|
|
list := &corev1.SecretList{}
|
|
for _, v := range fk.secretMap {
|
|
list.Items = append(list.Items, v)
|
|
}
|
|
return list, nil
|
|
}
|
|
|
|
func TestGetSecret(t *testing.T) {
|
|
type fields struct {
|
|
Client KClient
|
|
ReviewClient RClient
|
|
Namespace string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
ref esv1beta1.ExternalSecretDataRemoteRef
|
|
|
|
want []byte
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "err GetSecretMap",
|
|
fields: fields{
|
|
Client: fakeClient{
|
|
t: t,
|
|
secretMap: map[string]corev1.Secret{},
|
|
},
|
|
Namespace: "default",
|
|
},
|
|
ref: esv1beta1.ExternalSecretDataRemoteRef{
|
|
Key: "mysec",
|
|
Property: "token",
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "wrong property",
|
|
fields: fields{
|
|
Client: fakeClient{
|
|
t: t,
|
|
secretMap: map[string]corev1.Secret{
|
|
"mysec": {
|
|
Data: map[string][]byte{
|
|
"token": []byte(`foobar`),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
Namespace: "default",
|
|
},
|
|
ref: esv1beta1.ExternalSecretDataRemoteRef{
|
|
Key: "mysec",
|
|
Property: "not-the-token",
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "successful case",
|
|
fields: fields{
|
|
Client: fakeClient{
|
|
t: t,
|
|
secretMap: map[string]corev1.Secret{
|
|
"mysec": {
|
|
Data: map[string][]byte{
|
|
"token": []byte(`foobar`),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
Namespace: "default",
|
|
},
|
|
ref: esv1beta1.ExternalSecretDataRemoteRef{
|
|
Key: "mysec",
|
|
Property: "token",
|
|
},
|
|
want: []byte(`foobar`),
|
|
},
|
|
{
|
|
name: "successful case without property",
|
|
fields: fields{
|
|
Client: fakeClient{
|
|
t: t,
|
|
secretMap: map[string]corev1.Secret{
|
|
"mysec": {
|
|
Data: map[string][]byte{
|
|
"token": []byte(`foobar`),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
Namespace: "default",
|
|
},
|
|
ref: esv1beta1.ExternalSecretDataRemoteRef{
|
|
Key: "mysec",
|
|
},
|
|
want: []byte(`{"token":"foobar"}`),
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
p := &Client{
|
|
userSecretClient: tt.fields.Client,
|
|
userReviewClient: tt.fields.ReviewClient,
|
|
namespace: tt.fields.Namespace,
|
|
}
|
|
got, err := p.GetSecret(context.Background(), tt.ref)
|
|
if (err != nil) != tt.wantErr {
|
|
t.Errorf("ProviderKubernetes.GetSecret() error = %v, wantErr %v", err, tt.wantErr)
|
|
return
|
|
}
|
|
if !reflect.DeepEqual(got, tt.want) {
|
|
t.Errorf("ProviderKubernetes.GetSecret() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetAllSecrets(t *testing.T) {
|
|
type fields struct {
|
|
Client KClient
|
|
ReviewClient RClient
|
|
Namespace string
|
|
}
|
|
type args struct {
|
|
ctx context.Context
|
|
ref esv1beta1.ExternalSecretFind
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
args args
|
|
want map[string][]byte
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "use regex",
|
|
fields: fields{
|
|
Client: fakeClient{
|
|
t: t,
|
|
secretMap: map[string]corev1.Secret{
|
|
"mysec": {
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mysec",
|
|
},
|
|
Data: map[string][]byte{
|
|
"token": []byte(`foo`),
|
|
},
|
|
},
|
|
"other": {
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "other",
|
|
},
|
|
Data: map[string][]byte{
|
|
"token": []byte(`bar`),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
args: args{
|
|
ref: esv1beta1.ExternalSecretFind{
|
|
Name: &esv1beta1.FindName{
|
|
RegExp: "other",
|
|
},
|
|
},
|
|
},
|
|
want: map[string][]byte{
|
|
"other": []byte(`{"token":"bar"}`),
|
|
},
|
|
},
|
|
{
|
|
name: "use tags/labels",
|
|
fields: fields{
|
|
Client: fakeClient{
|
|
t: t,
|
|
expectedListOptions: metav1.ListOptions{
|
|
LabelSelector: "app=foobar",
|
|
},
|
|
secretMap: map[string]corev1.Secret{
|
|
"mysec": {
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mysec",
|
|
},
|
|
Data: map[string][]byte{
|
|
"token": []byte(`foo`),
|
|
},
|
|
},
|
|
"other": {
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "other",
|
|
},
|
|
Data: map[string][]byte{
|
|
"token": []byte(`bar`),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
args: args{
|
|
ref: esv1beta1.ExternalSecretFind{
|
|
Tags: map[string]string{
|
|
"app": "foobar",
|
|
},
|
|
},
|
|
},
|
|
want: map[string][]byte{
|
|
"mysec": []byte(`{"token":"foo"}`),
|
|
"other": []byte(`{"token":"bar"}`),
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
p := &Client{
|
|
userSecretClient: tt.fields.Client,
|
|
userReviewClient: tt.fields.ReviewClient,
|
|
namespace: tt.fields.Namespace,
|
|
}
|
|
got, err := p.GetAllSecrets(tt.args.ctx, tt.args.ref)
|
|
if (err != nil) != tt.wantErr {
|
|
t.Errorf("ProviderKubernetes.GetAllSecrets() error = %v, wantErr %v", err, tt.wantErr)
|
|
return
|
|
}
|
|
if !reflect.DeepEqual(got, tt.want) {
|
|
t.Errorf("ProviderKubernetes.GetAllSecrets() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|