mirror of
https://github.com/woodpecker-ci/woodpecker.git
synced 2024-12-15 13:06:28 +00:00
181 lines
4 KiB
Go
181 lines
4 KiB
Go
|
// Copyright 2024 Woodpecker Authors
|
||
|
//
|
||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
// you may not use this file except in compliance with the License.
|
||
|
// You may obtain a copy of the License at
|
||
|
//
|
||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||
|
//
|
||
|
// Unless required by applicable law or agreed to in writing, software
|
||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
// See the License for the specific language governing permissions and
|
||
|
// limitations under the License.
|
||
|
|
||
|
package kubernetes
|
||
|
|
||
|
import (
|
||
|
"testing"
|
||
|
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
v1 "k8s.io/api/core/v1"
|
||
|
)
|
||
|
|
||
|
func TestNativeSecretsEnabled(t *testing.T) {
|
||
|
nsp := newNativeSecretsProcessor(&config{
|
||
|
NativeSecretsAllowFromStep: true,
|
||
|
}, nil)
|
||
|
assert.Equal(t, true, nsp.isEnabled())
|
||
|
}
|
||
|
|
||
|
func TestNativeSecretsDisabled(t *testing.T) {
|
||
|
nsp := newNativeSecretsProcessor(&config{
|
||
|
NativeSecretsAllowFromStep: false,
|
||
|
}, []SecretRef{
|
||
|
{
|
||
|
Name: "env-simple",
|
||
|
},
|
||
|
{
|
||
|
Name: "env-advanced",
|
||
|
Key: "key",
|
||
|
Target: SecretTarget{
|
||
|
Env: "ENV_VAR",
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
Name: "env-file",
|
||
|
Key: "cert",
|
||
|
Target: SecretTarget{
|
||
|
File: "/etc/ca/x3.cert",
|
||
|
},
|
||
|
},
|
||
|
})
|
||
|
assert.Equal(t, false, nsp.isEnabled())
|
||
|
|
||
|
err := nsp.process()
|
||
|
assert.NoError(t, err)
|
||
|
assert.Empty(t, nsp.envFromSources)
|
||
|
assert.Empty(t, nsp.envVars)
|
||
|
assert.Empty(t, nsp.volumes)
|
||
|
assert.Empty(t, nsp.mounts)
|
||
|
}
|
||
|
|
||
|
func TestSimpleSecret(t *testing.T) {
|
||
|
nsp := newNativeSecretsProcessor(&config{
|
||
|
NativeSecretsAllowFromStep: true,
|
||
|
}, []SecretRef{
|
||
|
{
|
||
|
Name: "test-secret",
|
||
|
},
|
||
|
})
|
||
|
|
||
|
err := nsp.process()
|
||
|
assert.NoError(t, err)
|
||
|
assert.Empty(t, nsp.envVars)
|
||
|
assert.Empty(t, nsp.volumes)
|
||
|
assert.Empty(t, nsp.mounts)
|
||
|
assert.Equal(t, []v1.EnvFromSource{
|
||
|
{
|
||
|
SecretRef: &v1.SecretEnvSource{
|
||
|
LocalObjectReference: v1.LocalObjectReference{Name: "test-secret"},
|
||
|
},
|
||
|
},
|
||
|
}, nsp.envFromSources)
|
||
|
}
|
||
|
|
||
|
func TestSecretWithKey(t *testing.T) {
|
||
|
nsp := newNativeSecretsProcessor(&config{
|
||
|
NativeSecretsAllowFromStep: true,
|
||
|
}, []SecretRef{
|
||
|
{
|
||
|
Name: "test-secret",
|
||
|
Key: "access_key",
|
||
|
},
|
||
|
})
|
||
|
|
||
|
err := nsp.process()
|
||
|
assert.NoError(t, err)
|
||
|
assert.Empty(t, nsp.envFromSources)
|
||
|
assert.Empty(t, nsp.volumes)
|
||
|
assert.Empty(t, nsp.mounts)
|
||
|
assert.Equal(t, []v1.EnvVar{
|
||
|
{
|
||
|
Name: "ACCESS_KEY",
|
||
|
ValueFrom: &v1.EnvVarSource{
|
||
|
SecretKeyRef: &v1.SecretKeySelector{
|
||
|
LocalObjectReference: v1.LocalObjectReference{Name: "test-secret"},
|
||
|
Key: "access_key",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}, nsp.envVars)
|
||
|
}
|
||
|
|
||
|
func TestSecretWithKeyMapping(t *testing.T) {
|
||
|
nsp := newNativeSecretsProcessor(&config{
|
||
|
NativeSecretsAllowFromStep: true,
|
||
|
}, []SecretRef{
|
||
|
{
|
||
|
Name: "test-secret",
|
||
|
Key: "aws-secret",
|
||
|
Target: SecretTarget{
|
||
|
Env: "AWS_SECRET_ACCESS_KEY",
|
||
|
},
|
||
|
},
|
||
|
})
|
||
|
|
||
|
err := nsp.process()
|
||
|
assert.NoError(t, err)
|
||
|
assert.Empty(t, nsp.envFromSources)
|
||
|
assert.Empty(t, nsp.volumes)
|
||
|
assert.Empty(t, nsp.mounts)
|
||
|
assert.Equal(t, []v1.EnvVar{
|
||
|
{
|
||
|
Name: "AWS_SECRET_ACCESS_KEY",
|
||
|
ValueFrom: &v1.EnvVarSource{
|
||
|
SecretKeyRef: &v1.SecretKeySelector{
|
||
|
LocalObjectReference: v1.LocalObjectReference{Name: "test-secret"},
|
||
|
Key: "aws-secret",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}, nsp.envVars)
|
||
|
}
|
||
|
|
||
|
func TestFileSecret(t *testing.T) {
|
||
|
nsp := newNativeSecretsProcessor(&config{
|
||
|
NativeSecretsAllowFromStep: true,
|
||
|
}, []SecretRef{
|
||
|
{
|
||
|
Name: "reg-cred",
|
||
|
Key: ".dockerconfigjson",
|
||
|
Target: SecretTarget{
|
||
|
File: "~/.docker/config.json",
|
||
|
},
|
||
|
},
|
||
|
})
|
||
|
|
||
|
err := nsp.process()
|
||
|
assert.NoError(t, err)
|
||
|
assert.Empty(t, nsp.envFromSources)
|
||
|
assert.Empty(t, nsp.envVars)
|
||
|
assert.Equal(t, []v1.Volume{
|
||
|
{
|
||
|
Name: "reg-cred",
|
||
|
VolumeSource: v1.VolumeSource{
|
||
|
Secret: &v1.SecretVolumeSource{
|
||
|
SecretName: "reg-cred",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}, nsp.volumes)
|
||
|
assert.Equal(t, []v1.VolumeMount{
|
||
|
{
|
||
|
Name: "reg-cred",
|
||
|
ReadOnly: true,
|
||
|
MountPath: "~/.docker/config.json",
|
||
|
SubPath: ".dockerconfigjson",
|
||
|
},
|
||
|
}, nsp.mounts)
|
||
|
}
|