mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-01 19:17:58 +00:00
parallelize other tests (#26494)
This commit is contained in:
@@ -77,13 +77,15 @@ func mockAuditedHeadersConfig(t *testing.T) *HeadersConfig {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestAuditedHeadersConfig_CRUD(t *testing.T) {
|
func TestAuditedHeadersConfig_CRUD(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
conf := mockAuditedHeadersConfig(t)
|
conf := mockAuditedHeadersConfig(t)
|
||||||
|
|
||||||
testAuditedHeadersConfig_Add(t, conf)
|
testAddHeaders(t, conf)
|
||||||
testAuditedHeadersConfig_Remove(t, conf)
|
testRemoveHeaders(t, conf)
|
||||||
}
|
}
|
||||||
|
|
||||||
func testAuditedHeadersConfig_Add(t *testing.T, conf *HeadersConfig) {
|
func testAddHeaders(t *testing.T, conf *HeadersConfig) {
|
||||||
err := conf.Add(context.Background(), "X-Test-Header", false)
|
err := conf.Add(context.Background(), "X-Test-Header", false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Error when adding header to config: %s", err)
|
t.Fatalf("Error when adding header to config: %s", err)
|
||||||
@@ -159,7 +161,7 @@ func testAuditedHeadersConfig_Add(t *testing.T, conf *HeadersConfig) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func testAuditedHeadersConfig_Remove(t *testing.T, conf *HeadersConfig) {
|
func testRemoveHeaders(t *testing.T, conf *HeadersConfig) {
|
||||||
err := conf.Remove(context.Background(), "X-Test-Header")
|
err := conf.Remove(context.Background(), "X-Test-Header")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Error when adding header to config: %s", err)
|
t.Fatalf("Error when adding header to config: %s", err)
|
||||||
@@ -226,6 +228,8 @@ func testAuditedHeadersConfig_Remove(t *testing.T, conf *HeadersConfig) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestAuditedHeadersConfig_ApplyConfig(t *testing.T) {
|
func TestAuditedHeadersConfig_ApplyConfig(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
conf := mockAuditedHeadersConfig(t)
|
conf := mockAuditedHeadersConfig(t)
|
||||||
|
|
||||||
conf.Add(context.Background(), "X-TesT-Header", false)
|
conf.Add(context.Background(), "X-TesT-Header", false)
|
||||||
@@ -288,6 +292,8 @@ func TestAuditedHeadersConfig_ApplyConfig(t *testing.T) {
|
|||||||
// TestAuditedHeadersConfig_ApplyConfig_NoHeaders tests the case where there are
|
// TestAuditedHeadersConfig_ApplyConfig_NoHeaders tests the case where there are
|
||||||
// no headers in the request.
|
// no headers in the request.
|
||||||
func TestAuditedHeadersConfig_ApplyConfig_NoRequestHeaders(t *testing.T) {
|
func TestAuditedHeadersConfig_ApplyConfig_NoRequestHeaders(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
conf := mockAuditedHeadersConfig(t)
|
conf := mockAuditedHeadersConfig(t)
|
||||||
|
|
||||||
err := conf.Add(context.Background(), "X-TesT-Header", false)
|
err := conf.Add(context.Background(), "X-TesT-Header", false)
|
||||||
@@ -309,6 +315,8 @@ func TestAuditedHeadersConfig_ApplyConfig_NoRequestHeaders(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestAuditedHeadersConfig_ApplyConfig_NoConfiguredHeaders(t *testing.T) {
|
func TestAuditedHeadersConfig_ApplyConfig_NoConfiguredHeaders(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
conf := mockAuditedHeadersConfig(t)
|
conf := mockAuditedHeadersConfig(t)
|
||||||
|
|
||||||
reqHeaders := map[string][]string{
|
reqHeaders := map[string][]string{
|
||||||
@@ -352,6 +360,8 @@ func (s *FailingSalter) Salt(context.Context) (*salt.Salt, error) {
|
|||||||
// TestAuditedHeadersConfig_ApplyConfig_HashStringError tests the case where
|
// TestAuditedHeadersConfig_ApplyConfig_HashStringError tests the case where
|
||||||
// an error is returned from HashString instead of a map of headers.
|
// an error is returned from HashString instead of a map of headers.
|
||||||
func TestAuditedHeadersConfig_ApplyConfig_HashStringError(t *testing.T) {
|
func TestAuditedHeadersConfig_ApplyConfig_HashStringError(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
conf := mockAuditedHeadersConfig(t)
|
conf := mockAuditedHeadersConfig(t)
|
||||||
|
|
||||||
conf.Add(context.Background(), "X-TesT-Header", false)
|
conf.Add(context.Background(), "X-TesT-Header", false)
|
||||||
@@ -400,12 +410,16 @@ func BenchmarkAuditedHeaderConfig_ApplyConfig(b *testing.B) {
|
|||||||
// TestAuditedHeaders_auditedHeadersKey is used to check the key we use to handle
|
// TestAuditedHeaders_auditedHeadersKey is used to check the key we use to handle
|
||||||
// invalidation doesn't change when we weren't expecting it to.
|
// invalidation doesn't change when we weren't expecting it to.
|
||||||
func TestAuditedHeaders_auditedHeadersKey(t *testing.T) {
|
func TestAuditedHeaders_auditedHeadersKey(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
require.Equal(t, "audited-headers-config/audited-headers", AuditedHeadersKey())
|
require.Equal(t, "audited-headers-config/audited-headers", AuditedHeadersKey())
|
||||||
}
|
}
|
||||||
|
|
||||||
// TestAuditedHeaders_NewAuditedHeadersConfig checks supplying incorrect params to
|
// TestAuditedHeaders_NewAuditedHeadersConfig checks supplying incorrect params to
|
||||||
// the constructor for HeadersConfig returns an error.
|
// the constructor for HeadersConfig returns an error.
|
||||||
func TestAuditedHeaders_NewAuditedHeadersConfig(t *testing.T) {
|
func TestAuditedHeaders_NewAuditedHeadersConfig(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
ac, err := NewHeadersConfig(nil)
|
ac, err := NewHeadersConfig(nil)
|
||||||
require.Error(t, err)
|
require.Error(t, err)
|
||||||
require.Nil(t, ac)
|
require.Nil(t, ac)
|
||||||
@@ -418,6 +432,8 @@ func TestAuditedHeaders_NewAuditedHeadersConfig(t *testing.T) {
|
|||||||
// TestAuditedHeaders_invalidate ensures that we can update the headers on HeadersConfig
|
// TestAuditedHeaders_invalidate ensures that we can update the headers on HeadersConfig
|
||||||
// when we invalidate, and load the updated headers from the view/storage.
|
// when we invalidate, and load the updated headers from the view/storage.
|
||||||
func TestAuditedHeaders_invalidate(t *testing.T) {
|
func TestAuditedHeaders_invalidate(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
view := newMockStorage(t)
|
view := newMockStorage(t)
|
||||||
ahc, err := NewHeadersConfig(view)
|
ahc, err := NewHeadersConfig(view)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
@@ -460,6 +476,8 @@ func TestAuditedHeaders_invalidate(t *testing.T) {
|
|||||||
// TestAuditedHeaders_invalidate_nil_view ensures that we invalidate the headers
|
// TestAuditedHeaders_invalidate_nil_view ensures that we invalidate the headers
|
||||||
// correctly (clear them) when we get nil for the storage entry from the view.
|
// correctly (clear them) when we get nil for the storage entry from the view.
|
||||||
func TestAuditedHeaders_invalidate_nil_view(t *testing.T) {
|
func TestAuditedHeaders_invalidate_nil_view(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
view := newMockStorage(t)
|
view := newMockStorage(t)
|
||||||
ahc, err := NewHeadersConfig(view)
|
ahc, err := NewHeadersConfig(view)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
@@ -495,6 +513,8 @@ func TestAuditedHeaders_invalidate_nil_view(t *testing.T) {
|
|||||||
// TestAuditedHeaders_invalidate_bad_data ensures that we correctly error if the
|
// TestAuditedHeaders_invalidate_bad_data ensures that we correctly error if the
|
||||||
// underlying data cannot be parsed as expected.
|
// underlying data cannot be parsed as expected.
|
||||||
func TestAuditedHeaders_invalidate_bad_data(t *testing.T) {
|
func TestAuditedHeaders_invalidate_bad_data(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
view := newMockStorage(t)
|
view := newMockStorage(t)
|
||||||
ahc, err := NewHeadersConfig(view)
|
ahc, err := NewHeadersConfig(view)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
@@ -515,6 +535,8 @@ func TestAuditedHeaders_invalidate_bad_data(t *testing.T) {
|
|||||||
// TestAuditedHeaders_header checks we can return a copy of settings associated with
|
// TestAuditedHeaders_header checks we can return a copy of settings associated with
|
||||||
// an existing header, and we also know when a header wasn't found.
|
// an existing header, and we also know when a header wasn't found.
|
||||||
func TestAuditedHeaders_header(t *testing.T) {
|
func TestAuditedHeaders_header(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
view := newMockStorage(t)
|
view := newMockStorage(t)
|
||||||
ahc, err := NewHeadersConfig(view)
|
ahc, err := NewHeadersConfig(view)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
@@ -535,6 +557,8 @@ func TestAuditedHeaders_header(t *testing.T) {
|
|||||||
// TestAuditedHeaders_headers checks we are able to return a copy of the existing
|
// TestAuditedHeaders_headers checks we are able to return a copy of the existing
|
||||||
// configured headers.
|
// configured headers.
|
||||||
func TestAuditedHeaders_headers(t *testing.T) {
|
func TestAuditedHeaders_headers(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
view := newMockStorage(t)
|
view := newMockStorage(t)
|
||||||
ahc, err := NewHeadersConfig(view)
|
ahc, err := NewHeadersConfig(view)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|||||||
Reference in New Issue
Block a user