mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 02:28:09 +00:00 
			
		
		
		
	![hashicorp-copywrite[bot]](/assets/img/avatar_default.png) 0b12cdcfd1
			
		
	
	0b12cdcfd1
	
	
	
		
			
			* Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Adding explicit MPL license for sub-package. This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository. * Updating the license from MPL to Business Source License. Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at https://hashi.co/bsl-blog, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl. * add missing license headers * Update copyright file headers to BUS-1.1 * Fix test that expected exact offset on hcl file --------- Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com> Co-authored-by: Sarah Thompson <sthompson@hashicorp.com> Co-authored-by: Brian Kassouf <bkassouf@hashicorp.com>
		
			
				
	
	
		
			214 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			214 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (c) HashiCorp, Inc.
 | |
| // SPDX-License-Identifier: BUSL-1.1
 | |
| 
 | |
| package github
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	logicaltest "github.com/hashicorp/vault/helper/testhelpers/logical"
 | |
| 	"github.com/hashicorp/vault/sdk/logical"
 | |
| )
 | |
| 
 | |
| func TestBackend_Config(t *testing.T) {
 | |
| 	defaultLeaseTTLVal := time.Hour * 24
 | |
| 	maxLeaseTTLVal := time.Hour * 24 * 2
 | |
| 	b, err := Factory(context.Background(), &logical.BackendConfig{
 | |
| 		Logger: nil,
 | |
| 		System: &logical.StaticSystemView{
 | |
| 			DefaultLeaseTTLVal: defaultLeaseTTLVal,
 | |
| 			MaxLeaseTTLVal:     maxLeaseTTLVal,
 | |
| 		},
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Unable to create backend: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	login_data := map[string]interface{}{
 | |
| 		// This token has to be replaced with a working token for the test to work.
 | |
| 		"token": os.Getenv("GITHUB_TOKEN"),
 | |
| 	}
 | |
| 	config_data1 := map[string]interface{}{
 | |
| 		"organization": os.Getenv("GITHUB_ORG"),
 | |
| 		"ttl":          "",
 | |
| 		"max_ttl":      "",
 | |
| 	}
 | |
| 	expectedTTL1 := 24 * time.Hour
 | |
| 	config_data2 := map[string]interface{}{
 | |
| 		"organization": os.Getenv("GITHUB_ORG"),
 | |
| 		"ttl":          "1h",
 | |
| 		"max_ttl":      "2h",
 | |
| 	}
 | |
| 	expectedTTL2 := time.Hour
 | |
| 	config_data3 := map[string]interface{}{
 | |
| 		"organization": os.Getenv("GITHUB_ORG"),
 | |
| 		"ttl":          "50h",
 | |
| 		"max_ttl":      "50h",
 | |
| 	}
 | |
| 	expectedTTL3 := 48 * time.Hour
 | |
| 
 | |
| 	logicaltest.Test(t, logicaltest.TestCase{
 | |
| 		PreCheck:          func() { testAccPreCheck(t) },
 | |
| 		CredentialBackend: b,
 | |
| 		Steps: []logicaltest.TestStep{
 | |
| 			testConfigWrite(t, config_data1),
 | |
| 			testLoginWrite(t, login_data, expectedTTL1, false),
 | |
| 			testConfigWrite(t, config_data2),
 | |
| 			testLoginWrite(t, login_data, expectedTTL2, false),
 | |
| 			testConfigWrite(t, config_data3),
 | |
| 			testLoginWrite(t, login_data, expectedTTL3, true),
 | |
| 		},
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func testLoginWrite(t *testing.T, d map[string]interface{}, expectedTTL time.Duration, expectFail bool) logicaltest.TestStep {
 | |
| 	return logicaltest.TestStep{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "login",
 | |
| 		ErrorOk:   true,
 | |
| 		Data:      d,
 | |
| 		Check: func(resp *logical.Response) error {
 | |
| 			if resp == nil {
 | |
| 				return errors.New("expected a response but got nil")
 | |
| 			}
 | |
| 			if resp.IsError() && expectFail {
 | |
| 				return nil
 | |
| 			}
 | |
| 			actualTTL := resp.Auth.LeaseOptions.TTL
 | |
| 			if actualTTL != expectedTTL {
 | |
| 				return fmt.Errorf("TTL mismatched. Expected: %d Actual: %d", expectedTTL, resp.Auth.LeaseOptions.TTL)
 | |
| 			}
 | |
| 			return nil
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testConfigWrite(t *testing.T, d map[string]interface{}) logicaltest.TestStep {
 | |
| 	return logicaltest.TestStep{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "config",
 | |
| 		Data:      d,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackend_basic(t *testing.T) {
 | |
| 	defaultLeaseTTLVal := time.Hour * 24
 | |
| 	maxLeaseTTLVal := time.Hour * 24 * 32
 | |
| 	b, err := Factory(context.Background(), &logical.BackendConfig{
 | |
| 		Logger: nil,
 | |
| 		System: &logical.StaticSystemView{
 | |
| 			DefaultLeaseTTLVal: defaultLeaseTTLVal,
 | |
| 			MaxLeaseTTLVal:     maxLeaseTTLVal,
 | |
| 		},
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Unable to create backend: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	logicaltest.Test(t, logicaltest.TestCase{
 | |
| 		PreCheck:          func() { testAccPreCheck(t) },
 | |
| 		CredentialBackend: b,
 | |
| 		Steps: []logicaltest.TestStep{
 | |
| 			testAccStepConfig(t, false),
 | |
| 			testAccMap(t, "default", "fakepol"),
 | |
| 			testAccMap(t, "oWnErs", "fakepol"),
 | |
| 			testAccLogin(t, []string{"default", "abc", "fakepol"}),
 | |
| 			testAccStepConfig(t, true),
 | |
| 			testAccMap(t, "default", "fakepol"),
 | |
| 			testAccMap(t, "oWnErs", "fakepol"),
 | |
| 			testAccLogin(t, []string{"default", "abc", "fakepol"}),
 | |
| 			testAccStepConfigWithBaseURL(t),
 | |
| 			testAccMap(t, "default", "fakepol"),
 | |
| 			testAccMap(t, "oWnErs", "fakepol"),
 | |
| 			testAccLogin(t, []string{"default", "abc", "fakepol"}),
 | |
| 			testAccMap(t, "default", "fakepol"),
 | |
| 			testAccStepConfig(t, true),
 | |
| 			mapUserToPolicy(t, os.Getenv("GITHUB_USER"), "userpolicy"),
 | |
| 			testAccLogin(t, []string{"default", "abc", "fakepol", "userpolicy"}),
 | |
| 		},
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func testAccPreCheck(t *testing.T) {
 | |
| 	if v := os.Getenv("GITHUB_TOKEN"); v == "" {
 | |
| 		t.Skip("GITHUB_TOKEN must be set for acceptance tests")
 | |
| 	}
 | |
| 
 | |
| 	if v := os.Getenv("GITHUB_USER"); v == "" {
 | |
| 		t.Skip("GITHUB_USER must be set for acceptance tests")
 | |
| 	}
 | |
| 
 | |
| 	if v := os.Getenv("GITHUB_ORG"); v == "" {
 | |
| 		t.Skip("GITHUB_ORG must be set for acceptance tests")
 | |
| 	}
 | |
| 
 | |
| 	if v := os.Getenv("GITHUB_BASEURL"); v == "" {
 | |
| 		t.Skip("GITHUB_BASEURL must be set for acceptance tests (use 'https://api.github.com' if you don't know what you're doing)")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testAccStepConfig(t *testing.T, upper bool) logicaltest.TestStep {
 | |
| 	ts := logicaltest.TestStep{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "config",
 | |
| 		Data: map[string]interface{}{
 | |
| 			"organization":   os.Getenv("GITHUB_ORG"),
 | |
| 			"token_policies": []string{"abc"},
 | |
| 		},
 | |
| 	}
 | |
| 	if upper {
 | |
| 		ts.Data["organization"] = strings.ToUpper(os.Getenv("GITHUB_ORG"))
 | |
| 	}
 | |
| 	return ts
 | |
| }
 | |
| 
 | |
| func testAccStepConfigWithBaseURL(t *testing.T) logicaltest.TestStep {
 | |
| 	return logicaltest.TestStep{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "config",
 | |
| 		Data: map[string]interface{}{
 | |
| 			"organization": os.Getenv("GITHUB_ORG"),
 | |
| 			"base_url":     os.Getenv("GITHUB_BASEURL"),
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testAccMap(t *testing.T, k string, v string) logicaltest.TestStep {
 | |
| 	return logicaltest.TestStep{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "map/teams/" + k,
 | |
| 		Data: map[string]interface{}{
 | |
| 			"value": v,
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func mapUserToPolicy(t *testing.T, k string, v string) logicaltest.TestStep {
 | |
| 	return logicaltest.TestStep{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "map/users/" + k,
 | |
| 		Data: map[string]interface{}{
 | |
| 			"value": v,
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testAccLogin(t *testing.T, policies []string) logicaltest.TestStep {
 | |
| 	return logicaltest.TestStep{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "login",
 | |
| 		Data: map[string]interface{}{
 | |
| 			"token": os.Getenv("GITHUB_TOKEN"),
 | |
| 		},
 | |
| 		Unauthenticated: true,
 | |
| 
 | |
| 		Check: logicaltest.TestCheckAuth(policies),
 | |
| 	}
 | |
| }
 |