|
1 | 1 | require "test_helper"
|
2 | 2 |
|
3 | 3 | class AwsSecretsManagerAdapterTest < SecretAdapterTestCase
|
| 4 | + test "fails when errors are present" do |
| 5 | + stub_ticks.with("aws --version 2> /dev/null") |
| 6 | + stub_ticks |
| 7 | + .with("aws secretsmanager batch-get-secret-value --secret-id-list unknown1 unknown2 --profile default") |
| 8 | + .returns(<<~JSON) |
| 9 | + { |
| 10 | + "SecretValues": [], |
| 11 | + "Errors": [ |
| 12 | + { |
| 13 | + "SecretId": "unknown1", |
| 14 | + "ErrorCode": "ResourceNotFoundException", |
| 15 | + "Message": "Secrets Manager can't find the specified secret." |
| 16 | + }, |
| 17 | + { |
| 18 | + "SecretId": "unknown2", |
| 19 | + "ErrorCode": "ResourceNotFoundException", |
| 20 | + "Message": "Secrets Manager can't find the specified secret." |
| 21 | + } |
| 22 | + ] |
| 23 | + } |
| 24 | + JSON |
| 25 | + |
| 26 | + error = assert_raises RuntimeError do |
| 27 | + JSON.parse(shellunescape(run_command("fetch", "unknown1", "unknown2"))) |
| 28 | + end |
| 29 | + |
| 30 | + assert_equal [ "unknown1: Secrets Manager can't find the specified secret.", "unknown2: Secrets Manager can't find the specified secret." ].join(" "), error.message |
| 31 | + end |
| 32 | + |
4 | 33 | test "fetch" do
|
5 | 34 | stub_ticks.with("aws --version 2> /dev/null")
|
6 | 35 | stub_ticks
|
@@ -44,6 +73,48 @@ class AwsSecretsManagerAdapterTest < SecretAdapterTestCase
|
44 | 73 | assert_equal expected_json, json
|
45 | 74 | end
|
46 | 75 |
|
| 76 | + test "fetch with string value" do |
| 77 | + stub_ticks.with("aws --version 2> /dev/null") |
| 78 | + stub_ticks |
| 79 | + .with("aws secretsmanager batch-get-secret-value --secret-id-list secret secret2/KEY1 --profile default") |
| 80 | + .returns(<<~JSON) |
| 81 | + { |
| 82 | + "SecretValues": [ |
| 83 | + { |
| 84 | + "ARN": "arn:aws:secretsmanager:us-east-1:aaaaaaaaaaaa:secret:secret", |
| 85 | + "Name": "secret", |
| 86 | + "VersionId": "vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv", |
| 87 | + "SecretString": "a-string-secret", |
| 88 | + "VersionStages": [ |
| 89 | + "AWSCURRENT" |
| 90 | + ], |
| 91 | + "CreatedDate": "2024-01-01T00:00:00.000000" |
| 92 | + }, |
| 93 | + { |
| 94 | + "ARN": "arn:aws:secretsmanager:us-east-1:aaaaaaaaaaaa:secret:secret2", |
| 95 | + "Name": "secret2", |
| 96 | + "VersionId": "vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv", |
| 97 | + "SecretString": "{\\"KEY2\\":\\"VALUE2\\"}", |
| 98 | + "VersionStages": [ |
| 99 | + "AWSCURRENT" |
| 100 | + ], |
| 101 | + "CreatedDate": "2024-01-01T00:00:00.000000" |
| 102 | + } |
| 103 | + ], |
| 104 | + "Errors": [] |
| 105 | + } |
| 106 | + JSON |
| 107 | + |
| 108 | + json = JSON.parse(shellunescape(run_command("fetch", "secret", "secret2/KEY1"))) |
| 109 | + |
| 110 | + expected_json = { |
| 111 | + "secret"=>"a-string-secret", |
| 112 | + "secret2/KEY2"=>"VALUE2" |
| 113 | + } |
| 114 | + |
| 115 | + assert_equal expected_json, json |
| 116 | + end |
| 117 | + |
47 | 118 | test "fetch with secret names" do
|
48 | 119 | stub_ticks.with("aws --version 2> /dev/null")
|
49 | 120 | stub_ticks
|
|
0 commit comments