mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-03 12:07:54 +00:00
Database gRPC plugins (#3666)
* Start work on context aware backends * Start work on moving the database plugins to gRPC in order to pass context * Add context to builtin database plugins * use byte slice instead of string * Context all the things * Move proto messages to the dbplugin package * Add a grpc mechanism for running backend plugins * Serve the GRPC plugin * Add backwards compatibility to the database plugins * Remove backend plugin changes * Remove backend plugin changes * Cleanup the transport implementations * If grpc connection is in an unexpected state restart the plugin * Fix tests * Fix tests * Remove context from the request object, replace it with context.TODO * Add a test to verify netRPC plugins still work * Remove unused mapstructure call * Code review fixes * Code review fixes * Code review fixes
This commit is contained in:
@@ -192,8 +192,7 @@ func TestBackendHandleRequest_helpRoot(t *testing.T) {
|
||||
func TestBackendHandleRequest_renewAuth(t *testing.T) {
|
||||
b := &Backend{}
|
||||
|
||||
resp, err := b.HandleRequest(logical.RenewAuthRequest(
|
||||
"/foo", &logical.Auth{}, nil))
|
||||
resp, err := b.HandleRequest(logical.RenewAuthRequest("/foo", &logical.Auth{}, nil))
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
}
|
||||
@@ -213,8 +212,7 @@ func TestBackendHandleRequest_renewAuthCallback(t *testing.T) {
|
||||
AuthRenew: callback,
|
||||
}
|
||||
|
||||
_, err := b.HandleRequest(logical.RenewAuthRequest(
|
||||
"/foo", &logical.Auth{}, nil))
|
||||
_, err := b.HandleRequest(logical.RenewAuthRequest("/foo", &logical.Auth{}, nil))
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
}
|
||||
@@ -237,8 +235,7 @@ func TestBackendHandleRequest_renew(t *testing.T) {
|
||||
Secrets: []*Secret{secret},
|
||||
}
|
||||
|
||||
_, err := b.HandleRequest(logical.RenewRequest(
|
||||
"/foo", secret.Response(nil, nil).Secret, nil))
|
||||
_, err := b.HandleRequest(logical.RenewRequest("/foo", secret.Response(nil, nil).Secret, nil))
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
}
|
||||
@@ -293,8 +290,7 @@ func TestBackendHandleRequest_revoke(t *testing.T) {
|
||||
Secrets: []*Secret{secret},
|
||||
}
|
||||
|
||||
_, err := b.HandleRequest(logical.RevokeRequest(
|
||||
"/foo", secret.Response(nil, nil).Secret, nil))
|
||||
_, err := b.HandleRequest(logical.RevokeRequest("/foo", secret.Response(nil, nil).Secret, nil))
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user