|  | 
|  | 1 | +package secrets | 
|  | 2 | + | 
|  | 3 | +import ( | 
|  | 4 | +	"encoding/json" | 
|  | 5 | +	"testing" | 
|  | 6 | + | 
|  | 7 | +	"github.com/stretchr/testify/assert" | 
|  | 8 | +	"github.com/stretchr/testify/require" | 
|  | 9 | +	"gopkg.in/yaml.v2" | 
|  | 10 | +) | 
|  | 11 | + | 
|  | 12 | +func TestSecretField_UnmarshalYAML(t *testing.T) { | 
|  | 13 | +	tests := []struct { | 
|  | 14 | +		name           string | 
|  | 15 | +		yaml           string | 
|  | 16 | +		expectProvider Provider | 
|  | 17 | +		expectErr      string | 
|  | 18 | +	}{ | 
|  | 19 | +		{ | 
|  | 20 | +			name: "Unmarshal plain string into InlineProvider", | 
|  | 21 | +			yaml: `my_secret_value`, | 
|  | 22 | +			expectProvider: &InlineProvider{ | 
|  | 23 | +				secret: "my_secret_value", | 
|  | 24 | +			}, | 
|  | 25 | +		}, | 
|  | 26 | +		{ | 
|  | 27 | +			name: "Unmarshal file provider", | 
|  | 28 | +			yaml: ` | 
|  | 29 | +file: | 
|  | 30 | +  path: /path/to/secret | 
|  | 31 | +`, | 
|  | 32 | +			expectProvider: &FileProvider{ | 
|  | 33 | +				Path: "/path/to/secret", | 
|  | 34 | +			}, | 
|  | 35 | +		}, | 
|  | 36 | +		{ | 
|  | 37 | +			name: "Error on multiple providers", | 
|  | 38 | +			yaml: ` | 
|  | 39 | +file: | 
|  | 40 | +  path: /path/to/secret | 
|  | 41 | +inline: another_secret | 
|  | 42 | +`, | 
|  | 43 | +			expectErr: "secret must contain exactly one provider type, but found 2", | 
|  | 44 | +		}, | 
|  | 45 | +		{ | 
|  | 46 | +			name: "Error on unknown provider", | 
|  | 47 | +			yaml: ` | 
|  | 48 | +gcp_secret_manager: | 
|  | 49 | +  project: my-project | 
|  | 50 | +`, | 
|  | 51 | +			expectErr: `unknown provider type: "gcp_secret_manager"`, | 
|  | 52 | +		}, | 
|  | 53 | +		{ | 
|  | 54 | +			name: "Error on invalid provider config", | 
|  | 55 | +			yaml: ` | 
|  | 56 | +file: | 
|  | 57 | +  path: [ "this", "should", "be", "a", "string" ] | 
|  | 58 | +`, | 
|  | 59 | +			expectErr: "failed to unmarshal into file provider", | 
|  | 60 | +		}, | 
|  | 61 | +	} | 
|  | 62 | + | 
|  | 63 | +	for _, tt := range tests { | 
|  | 64 | +		t.Run(tt.name, func(t *testing.T) { | 
|  | 65 | +			var sf SecretField | 
|  | 66 | +			err := yaml.Unmarshal([]byte(tt.yaml), &sf) | 
|  | 67 | + | 
|  | 68 | +			if tt.expectErr != "" { | 
|  | 69 | +				require.Error(t, err) | 
|  | 70 | +				assert.Contains(t, err.Error(), tt.expectErr) | 
|  | 71 | +			} else { | 
|  | 72 | +				require.NoError(t, err) | 
|  | 73 | +				assert.Equal(t, tt.expectProvider.Name(), sf.provider.Name()) | 
|  | 74 | +				assert.Equal(t, tt.expectProvider, sf.provider) | 
|  | 75 | +			} | 
|  | 76 | +		}) | 
|  | 77 | +	} | 
|  | 78 | +} | 
|  | 79 | + | 
|  | 80 | +func TestSecretField_MarshalYAML(t *testing.T) { | 
|  | 81 | +	t.Run("Marshal non-inline provider", func(t *testing.T) { | 
|  | 82 | +		sf := SecretField{ | 
|  | 83 | +			provider: &FileProvider{Path: "/path/to/token"}, | 
|  | 84 | +		} | 
|  | 85 | +		b, err := yaml.Marshal(sf) | 
|  | 86 | +		require.NoError(t, err) | 
|  | 87 | +		expected := "file:\n  path: /path/to/token\n" | 
|  | 88 | +		assert.Equal(t, expected, string(b)) | 
|  | 89 | +	}) | 
|  | 90 | + | 
|  | 91 | +	t.Run("Marshal inline provider without manager", func(t *testing.T) { | 
|  | 92 | +		sf := SecretField{ | 
|  | 93 | +			provider: &InlineProvider{secret: "my-password"}, | 
|  | 94 | +		} | 
|  | 95 | +		b, err := yaml.Marshal(sf) | 
|  | 96 | +		require.NoError(t, err) | 
|  | 97 | +		expected := "inline: <secret>\n" | 
|  | 98 | +		assert.Equal(t, expected, string(b)) | 
|  | 99 | +	}) | 
|  | 100 | + | 
|  | 101 | +	t.Run("Marshal inline provider with manager and MarshalInlineSecrets=false", func(t *testing.T) { | 
|  | 102 | +		m := &Manager{MarshalInlineSecrets: false} | 
|  | 103 | +		sf := SecretField{ | 
|  | 104 | +			manager:  m, | 
|  | 105 | +			provider: &InlineProvider{secret: "my-password"}, | 
|  | 106 | +		} | 
|  | 107 | +		b, err := yaml.Marshal(sf) | 
|  | 108 | +		require.NoError(t, err) | 
|  | 109 | +		expected := "inline: <secret>\n" | 
|  | 110 | +		assert.Equal(t, expected, string(b)) | 
|  | 111 | +	}) | 
|  | 112 | + | 
|  | 113 | +	t.Run("Marshal inline provider with manager and MarshalInlineSecrets=true", func(t *testing.T) { | 
|  | 114 | +		m := &Manager{MarshalInlineSecrets: true} | 
|  | 115 | +		sf := SecretField{ | 
|  | 116 | +			manager:  m, | 
|  | 117 | +			provider: &InlineProvider{secret: "my-password"}, | 
|  | 118 | +		} | 
|  | 119 | +		b, err := yaml.Marshal(sf) | 
|  | 120 | +		require.NoError(t, err) | 
|  | 121 | +		expected := "my-password\n" // Marshals as a plain string | 
|  | 122 | +		assert.Equal(t, expected, string(b)) | 
|  | 123 | +	}) | 
|  | 124 | +} | 
|  | 125 | + | 
|  | 126 | +func TestSecretField_MarshalJSON(t *testing.T) { | 
|  | 127 | +	// JSON marshaling is just a wrapper around YAML marshaling, so a simple test is sufficient. | 
|  | 128 | +	sf := SecretField{ | 
|  | 129 | +		provider: &FileProvider{Path: "/path/to/token"}, | 
|  | 130 | +	} | 
|  | 131 | +	b, err := json.Marshal(sf) | 
|  | 132 | +	require.NoError(t, err) | 
|  | 133 | +	expected := `{"file":{"path":"/path/to/token"}}` | 
|  | 134 | +	assert.JSONEq(t, expected, string(b)) | 
|  | 135 | +} | 
|  | 136 | + | 
|  | 137 | +func TestSecretField_ManagerPanics(t *testing.T) { | 
|  | 138 | +	sf := SecretField{} // No manager attached | 
|  | 139 | + | 
|  | 140 | +	assert.PanicsWithValue(t, "secret field has not been discovered by a manager; was NewManager(&cfg) called?", func() { sf.Get() }, "Get should panic without a manager") | 
|  | 141 | +	assert.PanicsWithValue(t, "secret field has not been discovered by a manager; was NewManager(&cfg) called?", func() { sf.SetSecretValidation(nil) }, "SetSecretValidation should panic without a manager") | 
|  | 142 | +	assert.PanicsWithValue(t, "secret field has not been discovered by a manager; was NewManager(&cfg) called?", func() { sf.TriggerRefresh() }, "TriggerRefresh should panic without a manager") | 
|  | 143 | +} | 
0 commit comments