Skip to content

Commit

Permalink
Fix KVV2 datasource upon retrieval of soft deleted secrets (#1760)
Browse files Browse the repository at this point in the history
  • Loading branch information
vinay-gopalan authored Feb 16, 2023
1 parent 04819e3 commit 38a7250
Show file tree
Hide file tree
Showing 2 changed files with 69 additions and 2 deletions.
6 changes: 4 additions & 2 deletions vault/data_source_kv_secret_v2.go
Original file line number Diff line number Diff line change
Expand Up @@ -137,8 +137,10 @@ func kvSecretV2DataSourceRead(_ context.Context, d *schema.ResourceData, meta in
return diag.FromErr(err)
}

if err := d.Set(consts.FieldData, serializeDataMapToString(data.(map[string]interface{}))); err != nil {
return diag.FromErr(err)
if v, ok := data.(map[string]interface{}); ok {
if err := d.Set(consts.FieldData, serializeDataMapToString(v)); err != nil {
return diag.FromErr(err)
}
}

if v, ok := secret.Data["metadata"]; ok {
Expand Down
65 changes: 65 additions & 0 deletions vault/data_source_kv_secret_v2_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,10 @@ import (

"github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/vault/api"

"github.com/hashicorp/terraform-provider-vault/internal/consts"
"github.com/hashicorp/terraform-provider-vault/internal/provider"
"github.com/hashicorp/terraform-provider-vault/testutil"
)

Expand Down Expand Up @@ -59,6 +61,60 @@ func TestDataSourceKVV2Secret(t *testing.T) {
})
}

func TestDataSourceKVV2Secret_deletedSecret(t *testing.T) {
mount := acctest.RandomWithPrefix("tf-kv")
name := acctest.RandomWithPrefix("foo")

resource.Test(t, resource.TestCase{
Providers: testProviders,
PreCheck: func() { testutil.TestAccPreCheck(t) },
Steps: []resource.TestStep{
{
PreConfig: func() {
client := testProvider.Meta().(*provider.ProviderMeta).GetClient()

err := client.Sys().Mount(mount, &api.MountInput{
Type: "kv-v2",
Description: "Mount for testing KV datasource",
})
if err != nil {
t.Fatalf(fmt.Sprintf("error mounting kvv2 engine; err=%s", err))
}

m := map[string]interface{}{
"foo": "bar",
"baz": "qux",
}

data := map[string]interface{}{
consts.FieldData: m,
}

// Write data at path
path := fmt.Sprintf("%s/data/%s", mount, name)
resp, err := client.Logical().Write(path, data)
if err != nil {
t.Fatalf(fmt.Sprintf("error writing to Vault; err=%s", err))
}

if resp == nil {
t.Fatalf("empty response")
}

// Soft Delete KV V2 secret at path
// Secret data returned from Vault is nil
// confirm that plan does not result in panic
_, err = client.Logical().Delete(path)
if err != nil {
}
},
Config: kvV2DatasourceConfig(mount, name),
PlanOnly: true,
},
},
})
}

func testDataSourceKVV2SecretConfig(mount, name string) string {
return fmt.Sprintf(`
%s
Expand Down Expand Up @@ -113,3 +169,12 @@ data "vault_kv_secret_v2" "test" {
version = 1
}`, kvV2MountConfig(mount), name)
}

func kvV2DatasourceConfig(mount, name string) string {
return fmt.Sprintf(`
data "vault_kv_secret_v2" "test" {
mount = "%s"
name = "%s"
}
`, mount, name)
}

0 comments on commit 38a7250

Please sign in to comment.