|
| 1 | +package com.sksamuel.hoplite.aws2 |
| 2 | + |
| 3 | +import com.sksamuel.hoplite.ConfigLoaderBuilder |
| 4 | +import com.sksamuel.hoplite.parsers.PropsPropertySource |
| 5 | +import io.kotest.core.extensions.install |
| 6 | +import io.kotest.core.spec.style.FunSpec |
| 7 | +import io.kotest.extensions.testcontainers.ContainerExtension |
| 8 | +import io.kotest.matchers.shouldBe |
| 9 | +import kotlinx.serialization.json.Json |
| 10 | +import org.testcontainers.containers.localstack.LocalStackContainer |
| 11 | +import org.testcontainers.utility.DockerImageName |
| 12 | +import software.amazon.awssdk.auth.credentials.AwsBasicCredentials |
| 13 | +import software.amazon.awssdk.regions.Region |
| 14 | +import software.amazon.awssdk.services.secretsmanager.SecretsManagerClient |
| 15 | +import java.util.Properties |
| 16 | + |
| 17 | +class AwsSecretsManagerPreprocessorTest : FunSpec() { |
| 18 | + private val localstack = LocalStackContainer(DockerImageName.parse("localstack/localstack:3.6.0")) |
| 19 | + .withServices(LocalStackContainer.Service.SECRETSMANAGER) |
| 20 | + .withEnv("SKIP_SSL_CERT_DOWNLOAD", "true") |
| 21 | + |
| 22 | + init { |
| 23 | + |
| 24 | + install(ContainerExtension(localstack)) |
| 25 | + |
| 26 | + val client = SecretsManagerClient.builder() |
| 27 | + .region(Region.US_EAST_1) |
| 28 | + .endpointOverride(localstack.getEndpointOverride(LocalStackContainer.Service.SECRETSMANAGER)) |
| 29 | + .credentialsProvider { AwsBasicCredentials.create(localstack.accessKey, localstack.secretKey) } |
| 30 | + .build() |
| 31 | + |
| 32 | + test("should support secret with unquoted number when isLenient is set") { |
| 33 | + client.createSecret { |
| 34 | + it.name("unquoted") |
| 35 | + it.secretString("""{"port": 5432}""") |
| 36 | + } |
| 37 | + val props = Properties() |
| 38 | + props["port"] = "awssm://unquoted[port]" |
| 39 | + |
| 40 | + val json = Json { isLenient = true } |
| 41 | + ConfigLoaderBuilder.default() |
| 42 | + .addPreprocessor(AwsSecretsManagerPreprocessor(json = json) { client }) |
| 43 | + .addPropertySource(PropsPropertySource(props)) |
| 44 | + .build() |
| 45 | + .loadConfigOrThrow<PortHolder>() |
| 46 | + .port.shouldBe(5432) |
| 47 | + } |
| 48 | + |
| 49 | + test("should support secret with quoted number for default Json serde") { |
| 50 | + client.createSecret { |
| 51 | + it.name("quoted") |
| 52 | + it.secretString("""{"port": "5432"}""") |
| 53 | + } |
| 54 | + val props = Properties() |
| 55 | + props["port"] = "awssm://quoted[port]" |
| 56 | + ConfigLoaderBuilder.default() |
| 57 | + .addPreprocessor(AwsSecretsManagerPreprocessor { client }) |
| 58 | + .addPropertySource(PropsPropertySource(props)) |
| 59 | + .build() |
| 60 | + .loadConfigOrThrow<PortHolder>() |
| 61 | + .port.shouldBe(5432) |
| 62 | + } |
| 63 | + } |
| 64 | + |
| 65 | + data class PortHolder(val port: Int) |
| 66 | +} |
0 commit comments