Skip to content

Commit

Permalink
Fix azure sync
Browse files Browse the repository at this point in the history
  • Loading branch information
helderjs committed Aug 8, 2023
1 parent 2649b9f commit aedf90b
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 3 deletions.
1 change: 1 addition & 0 deletions pkg/api/v1/encryption_at_rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -94,5 +94,6 @@ func (az AzureKeyVault) ToAtlas() mongodbatlas.AzureKeyVault {
KeyVaultName: az.KeyVaultName,
KeyIdentifier: az.KeyIdentifier,
TenantID: az.TenantID,
Secret: az.Secret,
}
}
4 changes: 3 additions & 1 deletion pkg/controller/atlasproject/encryption_at_rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -103,14 +103,16 @@ func readAndFillGoogleSecret(kubeClient client.Client, parentNs string, gkms *md
}

func readAndFillAzureSecret(kubeClient client.Client, parentNs string, azureVault *mdbv1.AzureKeyVault) (*watch.WatchedObject, error) {
fieldData, watchObj, err := readSecretData(kubeClient, azureVault.SecretRef, parentNs, "ClientID", "AzureEnvironment", "SubscriptionID", "ResourceGroupName", "KeyVaultName", "KeyIdentifier")
fieldData, watchObj, err := readSecretData(kubeClient, azureVault.SecretRef, parentNs, "ClientID", "Secret", "AzureEnvironment", "SubscriptionID", "ResourceGroupName", "KeyVaultName", "KeyIdentifier", "TenantID")
if err != nil {
return watchObj, err
}

azureVault.ClientID = fieldData["ClientID"]
azureVault.Secret = fieldData["Secret"]
azureVault.AzureEnvironment = fieldData["AzureEnvironment"]
azureVault.SubscriptionID = fieldData["SubscriptionID"]
azureVault.TenantID = fieldData["TenantID"]
azureVault.ResourceGroupName = fieldData["ResourceGroupName"]
azureVault.KeyVaultName = fieldData["KeyVaultName"]
azureVault.KeyIdentifier = fieldData["KeyIdentifier"]
Expand Down
8 changes: 6 additions & 2 deletions pkg/controller/atlasproject/encryption_at_rest_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -211,8 +211,10 @@ func TestReadEncryptionAtRestSecrets(t *testing.T) {
t.Run("Azure with correct secret data", func(t *testing.T) {
secretData := map[string][]byte{
"ClientID": []byte("testClientID"),
"Secret": []byte("testClientSecret"),
"AzureEnvironment": []byte("testAzureEnvironment"),
"SubscriptionID": []byte("testSubscriptionID"),
"TenantID": []byte("testTenantID"),
"ResourceGroupName": []byte("testResourceGroupName"),
"KeyVaultName": []byte("testKeyVaultName"),
"KeyIdentifier": []byte("testKeyIdentifier"),
Expand All @@ -226,7 +228,7 @@ func TestReadEncryptionAtRestSecrets(t *testing.T) {
APIVersion: "v1",
},
ObjectMeta: metav1.ObjectMeta{
Name: "gcp-secret",
Name: "azure-secret",
Namespace: "test",
},
},
Expand All @@ -238,7 +240,7 @@ func TestReadEncryptionAtRestSecrets(t *testing.T) {
AzureKeyVault: mdbv1.AzureKeyVault{
Enabled: toptr.MakePtr(true),
SecretRef: common.ResourceRefNamespaced{
Name: "gcp-secret",
Name: "azure-secret",
},
},
}
Expand All @@ -247,8 +249,10 @@ func TestReadEncryptionAtRestSecrets(t *testing.T) {
assert.Nil(t, err)

assert.Equal(t, string(secretData["ClientID"]), encRest.AzureKeyVault.ClientID)
assert.Equal(t, string(secretData["Secret"]), encRest.AzureKeyVault.Secret)
assert.Equal(t, string(secretData["AzureEnvironment"]), encRest.AzureKeyVault.AzureEnvironment)
assert.Equal(t, string(secretData["SubscriptionID"]), encRest.AzureKeyVault.SubscriptionID)
assert.Equal(t, string(secretData["TenantID"]), encRest.AzureKeyVault.TenantID)
assert.Equal(t, string(secretData["ResourceGroupName"]), encRest.AzureKeyVault.ResourceGroupName)
assert.Equal(t, string(secretData["KeyVaultName"]), encRest.AzureKeyVault.KeyVaultName)
assert.Equal(t, string(secretData["KeyIdentifier"]), encRest.AzureKeyVault.KeyIdentifier)
Expand Down

0 comments on commit aedf90b

Please sign in to comment.