This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch CAMEL-21767 in repository https://gitbox.apache.org/repos/asf/camel.git
commit ae0c8898ab1162c9d7e20833ad2f964778788d28 Author: Andrea Cosentino <[email protected]> AuthorDate: Thu Feb 20 12:11:20 2025 +0100 CAMEL-21767 - Camel-IBM-Secrets-manager: Add more type of secrets for create secret operation Signed-off-by: Andrea Cosentino <[email protected]> --- .../IBMSecretsManagerCreateKVSecretIT.java | 114 +++++++++++++++++++++ 1 file changed, 114 insertions(+) diff --git a/components/camel-ibm-secrets-manager/src/test/java/org/apache/camel/component/ibm/secrets/manager/integration/operations/IBMSecretsManagerCreateKVSecretIT.java b/components/camel-ibm-secrets-manager/src/test/java/org/apache/camel/component/ibm/secrets/manager/integration/operations/IBMSecretsManagerCreateKVSecretIT.java new file mode 100644 index 00000000000..a8851c32908 --- /dev/null +++ b/components/camel-ibm-secrets-manager/src/test/java/org/apache/camel/component/ibm/secrets/manager/integration/operations/IBMSecretsManagerCreateKVSecretIT.java @@ -0,0 +1,114 @@ +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package org.apache.camel.component.ibm.secrets.manager.integration.operations; + +import java.util.HashMap; +import java.util.Map; + +import org.apache.camel.EndpointInject; +import org.apache.camel.Exchange; +import org.apache.camel.Processor; +import org.apache.camel.builder.RouteBuilder; +import org.apache.camel.component.ibm.secrets.manager.IBMSecretsManagerConstants; +import org.apache.camel.component.mock.MockEndpoint; +import org.apache.camel.test.junit5.CamelTestSupport; +import org.junit.jupiter.api.Test; +import org.junit.jupiter.api.condition.EnabledIfSystemProperties; +import org.junit.jupiter.api.condition.EnabledIfSystemProperty; + +import static org.junit.jupiter.api.Assertions.assertEquals; +import static org.junit.jupiter.api.Assertions.assertNotNull; + +// Must be manually tested. Provide your own accessKey and secretKey using -Dsecrets-manager and -Dcamel.ibm.sm.serviceurl +@EnabledIfSystemProperties({ + @EnabledIfSystemProperty(named = "camel.ibm.sm.token", matches = ".*", + disabledReason = "Secrets Manager Token not provided"), + @EnabledIfSystemProperty(named = "camel.ibm.sm.serviceurl", matches = ".*", + disabledReason = "Secrets Manager Service URL not provided") +}) +public class IBMSecretsManagerCreateKVSecretIT extends CamelTestSupport { + + @EndpointInject("mock:result-write") + private MockEndpoint mockWrite; + + @EndpointInject("mock:result-read") + private MockEndpoint mockRead; + + @EndpointInject("mock:result-delete") + private MockEndpoint mockDelete; + + @Test + public void createSecretTest() throws InterruptedException { + HashMap<String, String> secretPayload = new HashMap<String, String>(); + secretPayload.put("username", "admin"); + secretPayload.put("password", "pwd123"); + + mockWrite.expectedMessageCount(1); + mockRead.expectedMessageCount(1); + mockDelete.expectedMessageCount(1); + Exchange createdSec = template.request("direct:createSecret", new Processor() { + @Override + public void process(Exchange exchange) { + exchange.getIn().setBody(secretPayload); + + exchange.getMessage().setHeader(IBMSecretsManagerConstants.SECRET_NAME, "secret-kv"); + } + }); + Exchange readSec = template.request("direct:readSecret", new Processor() { + @Override + public void process(Exchange exchange) { + exchange.getMessage().setHeader(IBMSecretsManagerConstants.SECRET_ID, createdSec.getMessage().getBody()); + } + }); + + template.request("direct:deleteSecret", new Processor() { + @Override + public void process(Exchange exchange) { + exchange.getMessage().setHeader(IBMSecretsManagerConstants.SECRET_ID, createdSec.getMessage().getBody()); + } + }); + + MockEndpoint.assertIsSatisfied(context); + Exchange ret = mockRead.getExchanges().get(0); + assertNotNull(ret); + assertEquals(secretPayload, ret.getMessage().getBody(Map.class)); + Exchange retDelete = mockDelete.getExchanges().get(0); + assertNotNull(retDelete); + } + + @Override + protected RouteBuilder createRouteBuilder() { + return new RouteBuilder() { + @Override + public void configure() { + from("direct:createSecret") + .toF("ibm-secrets-manager://secret?operation=createKVSecret&token=RAW(%s)&serviceUrl=%s", + System.getProperty("camel.ibm.sm.token"), System.getProperty("camel.ibm.sm.serviceurl")) + .to("mock:result-write"); + from("direct:readSecret") + .toF("ibm-secrets-manager://secret?operation=getSecret&token=RAW(%s)&serviceUrl=%s", + System.getProperty("camel.ibm.sm.token"), System.getProperty("camel.ibm.sm.serviceurl")) + .to("mock:result-read"); + from("direct:deleteSecret") + .toF("ibm-secrets-manager://secret?operation=deleteSecret&token=RAW(%s)&serviceUrl=%s", + System.getProperty("camel.ibm.sm.token"), System.getProperty("camel.ibm.sm.serviceurl")) + .to("mock:result-delete"); + } + }; + } +}
