mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 17ffe62d0d
			
		
	
	17ffe62d0d
	
	
	
		
			
			* VAULT-22481: Audit filter node (#24465) * Initial commit on adding filter nodes for audit * tests for audit filter * test: longer filter - more conditions * copywrite headers * Check interface for the right type * Add audit filtering feature (#24554) * Support filter nodes in backend factories and add some tests * More tests and cleanup * Attempt to move control of registration for nodes and pipelines to the audit broker (#24505) * invert control of the pipelines/nodes to the audit broker vs. within each backend * update noop audit test code to implement the pipeliner interface * noop mount path has trailing slash * attempting to make NoopAudit more friendly * NoopAudit uses known salt * Refactor audit.ProcessManual to support filter nodes * HasFiltering * rename the pipeliner * use exported AuditEvent in Filter * Add tests for registering and deregistering backends on the audit broker * Add missing licence header to one file, fix a typo in two tests --------- Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com> * Add changelog file * update bexpr datum to use a strong type * go docs updates * test path * PR review comments * handle scenarios/outcomes from broker.send * don't need to re-check the complete sinks * add extra check to deregister to ensure that re-registering non-filtered device sets sink threshold * Ensure that the multierror is appended before attempting to return it --------- Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
		
			
				
	
	
		
			579 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			579 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (c) HashiCorp, Inc.
 | |
| // SPDX-License-Identifier: BUSL-1.1
 | |
| 
 | |
| package file
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"io/ioutil"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"strconv"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/hashicorp/eventlogger"
 | |
| 	"github.com/hashicorp/vault/audit"
 | |
| 	"github.com/hashicorp/vault/helper/namespace"
 | |
| 	"github.com/hashicorp/vault/sdk/helper/salt"
 | |
| 	"github.com/hashicorp/vault/sdk/logical"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| )
 | |
| 
 | |
| func TestAuditFile_fileModeNew(t *testing.T) {
 | |
| 	modeStr := "0777"
 | |
| 	mode, err := strconv.ParseUint(modeStr, 8, 32)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	file := filepath.Join(t.TempDir(), "auditTest.txt")
 | |
| 	config := map[string]string{
 | |
| 		"path": file,
 | |
| 		"mode": modeStr,
 | |
| 	}
 | |
| 
 | |
| 	_, err = Factory(context.Background(), &audit.BackendConfig{
 | |
| 		SaltConfig: &salt.Config{},
 | |
| 		SaltView:   &logical.InmemStorage{},
 | |
| 		Config:     config,
 | |
| 	}, false, nil)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	info, err := os.Stat(file)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Cannot retrieve file mode from `Stat`")
 | |
| 	}
 | |
| 	if info.Mode() != os.FileMode(mode) {
 | |
| 		t.Fatalf("File mode does not match.")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuditFile_fileModeExisting(t *testing.T) {
 | |
| 	f, err := ioutil.TempFile("", "test")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failure to create test file.")
 | |
| 	}
 | |
| 	defer os.Remove(f.Name())
 | |
| 
 | |
| 	err = os.Chmod(f.Name(), 0o777)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failure to chmod temp file for testing.")
 | |
| 	}
 | |
| 
 | |
| 	err = f.Close()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failure to close temp file for test.")
 | |
| 	}
 | |
| 
 | |
| 	config := map[string]string{
 | |
| 		"path": f.Name(),
 | |
| 	}
 | |
| 
 | |
| 	_, err = Factory(context.Background(), &audit.BackendConfig{
 | |
| 		Config:     config,
 | |
| 		SaltConfig: &salt.Config{},
 | |
| 		SaltView:   &logical.InmemStorage{},
 | |
| 	}, false, nil)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	info, err := os.Stat(f.Name())
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("cannot retrieve file mode from `Stat`")
 | |
| 	}
 | |
| 	if info.Mode() != os.FileMode(0o600) {
 | |
| 		t.Fatalf("File mode does not match.")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuditFile_fileMode0000(t *testing.T) {
 | |
| 	f, err := ioutil.TempFile("", "test")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failure to create test file. The error is %v", err)
 | |
| 	}
 | |
| 	defer os.Remove(f.Name())
 | |
| 
 | |
| 	err = os.Chmod(f.Name(), 0o777)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failure to chmod temp file for testing. The error is %v", err)
 | |
| 	}
 | |
| 
 | |
| 	err = f.Close()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failure to close temp file for test. The error is %v", err)
 | |
| 	}
 | |
| 
 | |
| 	config := map[string]string{
 | |
| 		"path": f.Name(),
 | |
| 		"mode": "0000",
 | |
| 	}
 | |
| 
 | |
| 	_, err = Factory(context.Background(), &audit.BackendConfig{
 | |
| 		Config:     config,
 | |
| 		SaltConfig: &salt.Config{},
 | |
| 		SaltView:   &logical.InmemStorage{},
 | |
| 	}, false, nil)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	info, err := os.Stat(f.Name())
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("cannot retrieve file mode from `Stat`. The error is %v", err)
 | |
| 	}
 | |
| 	if info.Mode() != os.FileMode(0o777) {
 | |
| 		t.Fatalf("File mode does not match.")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestAuditFile_EventLogger_fileModeNew verifies that the Factory function
 | |
| // correctly sets the file mode when the useEventLogger argument is set to
 | |
| // true.
 | |
| func TestAuditFile_EventLogger_fileModeNew(t *testing.T) {
 | |
| 	modeStr := "0777"
 | |
| 	mode, err := strconv.ParseUint(modeStr, 8, 32)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	file := filepath.Join(t.TempDir(), "auditTest.txt")
 | |
| 	config := map[string]string{
 | |
| 		"path": file,
 | |
| 		"mode": modeStr,
 | |
| 	}
 | |
| 
 | |
| 	_, err = Factory(context.Background(), &audit.BackendConfig{
 | |
| 		MountPath:  "foo/bar",
 | |
| 		SaltConfig: &salt.Config{},
 | |
| 		SaltView:   &logical.InmemStorage{},
 | |
| 		Config:     config,
 | |
| 	}, true, nil)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	info, err := os.Stat(file)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Cannot retrieve file mode from `Stat`")
 | |
| 	}
 | |
| 	if info.Mode() != os.FileMode(mode) {
 | |
| 		t.Fatalf("File mode does not match.")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func BenchmarkAuditFile_request(b *testing.B) {
 | |
| 	config := map[string]string{
 | |
| 		"path": "/dev/null",
 | |
| 	}
 | |
| 	sink, err := Factory(context.Background(), &audit.BackendConfig{
 | |
| 		Config:     config,
 | |
| 		SaltConfig: &salt.Config{},
 | |
| 		SaltView:   &logical.InmemStorage{},
 | |
| 	}, false, nil)
 | |
| 	if err != nil {
 | |
| 		b.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	in := &logical.LogInput{
 | |
| 		Auth: &logical.Auth{
 | |
| 			ClientToken:     "foo",
 | |
| 			Accessor:        "bar",
 | |
| 			EntityID:        "foobarentity",
 | |
| 			DisplayName:     "testtoken",
 | |
| 			NoDefaultPolicy: true,
 | |
| 			Policies:        []string{"root"},
 | |
| 			TokenType:       logical.TokenTypeService,
 | |
| 		},
 | |
| 		Request: &logical.Request{
 | |
| 			Operation: logical.UpdateOperation,
 | |
| 			Path:      "/foo",
 | |
| 			Connection: &logical.Connection{
 | |
| 				RemoteAddr: "127.0.0.1",
 | |
| 			},
 | |
| 			WrapInfo: &logical.RequestWrapInfo{
 | |
| 				TTL: 60 * time.Second,
 | |
| 			},
 | |
| 			Headers: map[string][]string{
 | |
| 				"foo": {"bar"},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	ctx := namespace.RootContext(context.Background())
 | |
| 	b.ResetTimer()
 | |
| 	b.RunParallel(func(pb *testing.PB) {
 | |
| 		for pb.Next() {
 | |
| 			if err := sink.LogRequest(ctx, in); err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 		}
 | |
| 	})
 | |
| }
 | |
| 
 | |
| // TestBackend_formatterConfig ensures that all the configuration values are parsed correctly.
 | |
| func TestBackend_formatterConfig(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	tests := map[string]struct {
 | |
| 		config          map[string]string
 | |
| 		want            audit.FormatterConfig
 | |
| 		wantErr         bool
 | |
| 		expectedMessage string
 | |
| 	}{
 | |
| 		"happy-path-json": {
 | |
| 			config: map[string]string{
 | |
| 				"format":               audit.JSONFormat.String(),
 | |
| 				"hmac_accessor":        "true",
 | |
| 				"log_raw":              "true",
 | |
| 				"elide_list_responses": "true",
 | |
| 			},
 | |
| 			want: audit.FormatterConfig{
 | |
| 				Raw:                true,
 | |
| 				HMACAccessor:       true,
 | |
| 				ElideListResponses: true,
 | |
| 				RequiredFormat:     "json",
 | |
| 			}, wantErr: false,
 | |
| 		},
 | |
| 		"happy-path-jsonx": {
 | |
| 			config: map[string]string{
 | |
| 				"format":               audit.JSONxFormat.String(),
 | |
| 				"hmac_accessor":        "true",
 | |
| 				"log_raw":              "true",
 | |
| 				"elide_list_responses": "true",
 | |
| 			},
 | |
| 			want: audit.FormatterConfig{
 | |
| 				Raw:                true,
 | |
| 				HMACAccessor:       true,
 | |
| 				ElideListResponses: true,
 | |
| 				RequiredFormat:     "jsonx",
 | |
| 			},
 | |
| 			wantErr: false,
 | |
| 		},
 | |
| 		"invalid-format": {
 | |
| 			config: map[string]string{
 | |
| 				"format":               " squiggly ",
 | |
| 				"hmac_accessor":        "true",
 | |
| 				"log_raw":              "true",
 | |
| 				"elide_list_responses": "true",
 | |
| 			},
 | |
| 			want:            audit.FormatterConfig{},
 | |
| 			wantErr:         true,
 | |
| 			expectedMessage: "audit.NewFormatterConfig: error applying options: audit.(format).validate: 'squiggly' is not a valid format: invalid parameter",
 | |
| 		},
 | |
| 		"invalid-hmac-accessor": {
 | |
| 			config: map[string]string{
 | |
| 				"format":        audit.JSONFormat.String(),
 | |
| 				"hmac_accessor": "maybe",
 | |
| 			},
 | |
| 			want:            audit.FormatterConfig{},
 | |
| 			wantErr:         true,
 | |
| 			expectedMessage: "file.formatterConfig: unable to parse 'hmac_accessor': strconv.ParseBool: parsing \"maybe\": invalid syntax",
 | |
| 		},
 | |
| 		"invalid-log-raw": {
 | |
| 			config: map[string]string{
 | |
| 				"format":        audit.JSONFormat.String(),
 | |
| 				"hmac_accessor": "true",
 | |
| 				"log_raw":       "maybe",
 | |
| 			},
 | |
| 			want:            audit.FormatterConfig{},
 | |
| 			wantErr:         true,
 | |
| 			expectedMessage: "file.formatterConfig: unable to parse 'log_raw': strconv.ParseBool: parsing \"maybe\": invalid syntax",
 | |
| 		},
 | |
| 		"invalid-elide-bool": {
 | |
| 			config: map[string]string{
 | |
| 				"format":               audit.JSONFormat.String(),
 | |
| 				"hmac_accessor":        "true",
 | |
| 				"log_raw":              "true",
 | |
| 				"elide_list_responses": "maybe",
 | |
| 			},
 | |
| 			want:            audit.FormatterConfig{},
 | |
| 			wantErr:         true,
 | |
| 			expectedMessage: "file.formatterConfig: unable to parse 'elide_list_responses': strconv.ParseBool: parsing \"maybe\": invalid syntax",
 | |
| 		},
 | |
| 	}
 | |
| 	for name, tc := range tests {
 | |
| 		name := name
 | |
| 		tc := tc
 | |
| 		t.Run(name, func(t *testing.T) {
 | |
| 			t.Parallel()
 | |
| 
 | |
| 			got, err := formatterConfig(tc.config)
 | |
| 			if tc.wantErr {
 | |
| 				require.Error(t, err)
 | |
| 				require.EqualError(t, err, tc.expectedMessage)
 | |
| 			} else {
 | |
| 				require.NoError(t, err)
 | |
| 			}
 | |
| 			require.Equal(t, tc.want, got)
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestBackend_configureFilterNode ensures that configureFilterNode handles various
 | |
| // filter values as expected. Empty (including whitespace) strings should return
 | |
| // no error but skip configuration of the node.
 | |
| func TestBackend_configureFilterNode(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	tests := map[string]struct {
 | |
| 		filter           string
 | |
| 		shouldSkipNode   bool
 | |
| 		wantErr          bool
 | |
| 		expectedErrorMsg string
 | |
| 	}{
 | |
| 		"happy": {
 | |
| 			filter: "foo == bar",
 | |
| 		},
 | |
| 		"empty": {
 | |
| 			filter:         "",
 | |
| 			shouldSkipNode: true,
 | |
| 		},
 | |
| 		"spacey": {
 | |
| 			filter:         "    ",
 | |
| 			shouldSkipNode: true,
 | |
| 		},
 | |
| 		"bad": {
 | |
| 			filter:           "___qwerty",
 | |
| 			wantErr:          true,
 | |
| 			expectedErrorMsg: "file.(Backend).configureFilterNode: error creating filter node: audit.NewEntryFilter: cannot create new audit filter",
 | |
| 		},
 | |
| 	}
 | |
| 	for name, tc := range tests {
 | |
| 		name := name
 | |
| 		tc := tc
 | |
| 		t.Run(name, func(t *testing.T) {
 | |
| 			t.Parallel()
 | |
| 
 | |
| 			b := &Backend{
 | |
| 				nodeIDList: []eventlogger.NodeID{},
 | |
| 				nodeMap:    map[eventlogger.NodeID]eventlogger.Node{},
 | |
| 			}
 | |
| 
 | |
| 			err := b.configureFilterNode(tc.filter)
 | |
| 
 | |
| 			switch {
 | |
| 			case tc.wantErr:
 | |
| 				require.Error(t, err)
 | |
| 				require.ErrorContains(t, err, tc.expectedErrorMsg)
 | |
| 				require.Len(t, b.nodeIDList, 0)
 | |
| 				require.Len(t, b.nodeMap, 0)
 | |
| 			case tc.shouldSkipNode:
 | |
| 				require.NoError(t, err)
 | |
| 				require.Len(t, b.nodeIDList, 0)
 | |
| 				require.Len(t, b.nodeMap, 0)
 | |
| 			default:
 | |
| 				require.NoError(t, err)
 | |
| 				require.Len(t, b.nodeIDList, 1)
 | |
| 				require.Len(t, b.nodeMap, 1)
 | |
| 				id := b.nodeIDList[0]
 | |
| 				node := b.nodeMap[id]
 | |
| 				require.Equal(t, eventlogger.NodeTypeFilter, node.Type())
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestBackend_configureFormatterNode ensures that configureFormatterNode
 | |
| // populates the nodeIDList and nodeMap on Backend when given valid formatConfig.
 | |
| func TestBackend_configureFormatterNode(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		nodeIDList: []eventlogger.NodeID{},
 | |
| 		nodeMap:    map[eventlogger.NodeID]eventlogger.Node{},
 | |
| 	}
 | |
| 
 | |
| 	formatConfig, err := audit.NewFormatterConfig()
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	err = b.configureFormatterNode(formatConfig)
 | |
| 
 | |
| 	require.NoError(t, err)
 | |
| 	require.Len(t, b.nodeIDList, 1)
 | |
| 	require.Len(t, b.nodeMap, 1)
 | |
| 	id := b.nodeIDList[0]
 | |
| 	node := b.nodeMap[id]
 | |
| 	require.Equal(t, eventlogger.NodeTypeFormatter, node.Type())
 | |
| }
 | |
| 
 | |
| // TestBackend_configureSinkNode ensures that we can correctly configure the sink
 | |
| // node on the Backend, and any incorrect parameters result in the relevant errors.
 | |
| func TestBackend_configureSinkNode(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	tests := map[string]struct {
 | |
| 		name           string
 | |
| 		filePath       string
 | |
| 		mode           string
 | |
| 		format         string
 | |
| 		wantErr        bool
 | |
| 		expectedErrMsg string
 | |
| 		expectedName   string
 | |
| 	}{
 | |
| 		"name-empty": {
 | |
| 			name:           "",
 | |
| 			wantErr:        true,
 | |
| 			expectedErrMsg: "file.(Backend).configureSinkNode: name is required: invalid parameter",
 | |
| 		},
 | |
| 		"name-whitespace": {
 | |
| 			name:           "   ",
 | |
| 			wantErr:        true,
 | |
| 			expectedErrMsg: "file.(Backend).configureSinkNode: name is required: invalid parameter",
 | |
| 		},
 | |
| 		"filePath-empty": {
 | |
| 			name:           "foo",
 | |
| 			filePath:       "",
 | |
| 			wantErr:        true,
 | |
| 			expectedErrMsg: "file.(Backend).configureSinkNode: file path is required: invalid parameter",
 | |
| 		},
 | |
| 		"filePath-whitespace": {
 | |
| 			name:           "foo",
 | |
| 			filePath:       "   ",
 | |
| 			wantErr:        true,
 | |
| 			expectedErrMsg: "file.(Backend).configureSinkNode: file path is required: invalid parameter",
 | |
| 		},
 | |
| 		"filePath-stdout-lower": {
 | |
| 			name:         "foo",
 | |
| 			expectedName: "stdout",
 | |
| 			filePath:     "stdout",
 | |
| 			format:       "json",
 | |
| 		},
 | |
| 		"filePath-stdout-upper": {
 | |
| 			name:         "foo",
 | |
| 			expectedName: "stdout",
 | |
| 			filePath:     "STDOUT",
 | |
| 			format:       "json",
 | |
| 		},
 | |
| 		"filePath-stdout-mixed": {
 | |
| 			name:         "foo",
 | |
| 			expectedName: "stdout",
 | |
| 			filePath:     "StdOut",
 | |
| 			format:       "json",
 | |
| 		},
 | |
| 		"filePath-discard-lower": {
 | |
| 			name:         "foo",
 | |
| 			expectedName: "discard",
 | |
| 			filePath:     "discard",
 | |
| 			format:       "json",
 | |
| 		},
 | |
| 		"filePath-discard-upper": {
 | |
| 			name:         "foo",
 | |
| 			expectedName: "discard",
 | |
| 			filePath:     "DISCARD",
 | |
| 			format:       "json",
 | |
| 		},
 | |
| 		"filePath-discard-mixed": {
 | |
| 			name:         "foo",
 | |
| 			expectedName: "discard",
 | |
| 			filePath:     "DisCArd",
 | |
| 			format:       "json",
 | |
| 		},
 | |
| 		"format-empty": {
 | |
| 			name:           "foo",
 | |
| 			filePath:       "/tmp/",
 | |
| 			format:         "",
 | |
| 			wantErr:        true,
 | |
| 			expectedErrMsg: "file.(Backend).configureSinkNode: format is required: invalid parameter",
 | |
| 		},
 | |
| 		"format-whitespace": {
 | |
| 			name:           "foo",
 | |
| 			filePath:       "/tmp/",
 | |
| 			format:         "   ",
 | |
| 			wantErr:        true,
 | |
| 			expectedErrMsg: "file.(Backend).configureSinkNode: format is required: invalid parameter",
 | |
| 		},
 | |
| 		"filePath-weird-with-mode-zero": {
 | |
| 			name:           "foo",
 | |
| 			filePath:       "/tmp/qwerty",
 | |
| 			format:         "json",
 | |
| 			mode:           "0",
 | |
| 			wantErr:        true,
 | |
| 			expectedErrMsg: "file.(Backend).configureSinkNode: file sink creation failed for path \"/tmp/qwerty\": event.NewFileSink: unable to determine existing file mode: stat /tmp/qwerty: no such file or directory",
 | |
| 		},
 | |
| 		"happy": {
 | |
| 			name:         "foo",
 | |
| 			filePath:     "/tmp/audit.log",
 | |
| 			mode:         "",
 | |
| 			format:       "json",
 | |
| 			wantErr:      false,
 | |
| 			expectedName: "foo",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for name, tc := range tests {
 | |
| 		name := name
 | |
| 		tc := tc
 | |
| 		t.Run(name, func(t *testing.T) {
 | |
| 			t.Parallel()
 | |
| 
 | |
| 			b := &Backend{
 | |
| 				nodeIDList: []eventlogger.NodeID{},
 | |
| 				nodeMap:    map[eventlogger.NodeID]eventlogger.Node{},
 | |
| 			}
 | |
| 
 | |
| 			err := b.configureSinkNode(tc.name, tc.filePath, tc.mode, tc.format)
 | |
| 
 | |
| 			if tc.wantErr {
 | |
| 				require.Error(t, err)
 | |
| 				require.EqualError(t, err, tc.expectedErrMsg)
 | |
| 				require.Len(t, b.nodeIDList, 0)
 | |
| 				require.Len(t, b.nodeMap, 0)
 | |
| 			} else {
 | |
| 				require.NoError(t, err)
 | |
| 				require.Len(t, b.nodeIDList, 1)
 | |
| 				require.Len(t, b.nodeMap, 1)
 | |
| 				id := b.nodeIDList[0]
 | |
| 				node := b.nodeMap[id]
 | |
| 				require.Equal(t, eventlogger.NodeTypeSink, node.Type())
 | |
| 				sw, ok := node.(*audit.SinkWrapper)
 | |
| 				require.True(t, ok)
 | |
| 				require.Equal(t, tc.expectedName, sw.Name)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestBackend_configureFilterFormatterSink ensures that configuring all three
 | |
| // types of nodes on a Backend works as expected, i.e. we have all three nodes
 | |
| // at the end and nothing gets overwritten. The order of calls influences the
 | |
| // slice of IDs on the Backend.
 | |
| func TestBackend_configureFilterFormatterSink(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		nodeIDList: []eventlogger.NodeID{},
 | |
| 		nodeMap:    map[eventlogger.NodeID]eventlogger.Node{},
 | |
| 	}
 | |
| 
 | |
| 	formatConfig, err := audit.NewFormatterConfig()
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	err = b.configureFilterNode("foo == bar")
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	err = b.configureFormatterNode(formatConfig)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	err = b.configureSinkNode("foo", "/tmp/foo", "0777", "json")
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	require.Len(t, b.nodeIDList, 3)
 | |
| 	require.Len(t, b.nodeMap, 3)
 | |
| 
 | |
| 	id := b.nodeIDList[0]
 | |
| 	node := b.nodeMap[id]
 | |
| 	require.Equal(t, eventlogger.NodeTypeFilter, node.Type())
 | |
| 
 | |
| 	id = b.nodeIDList[1]
 | |
| 	node = b.nodeMap[id]
 | |
| 	require.Equal(t, eventlogger.NodeTypeFormatter, node.Type())
 | |
| 
 | |
| 	id = b.nodeIDList[2]
 | |
| 	node = b.nodeMap[id]
 | |
| 	require.Equal(t, eventlogger.NodeTypeSink, node.Type())
 | |
| }
 |