mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 1ba440febc
			
		
	
	1ba440febc
	
	
	
		
			
			* add ability to customize IAM usernames based on templates * add changelog * remove unnecessary logs * patch: add test for readConfig * patch: add default STS Template * patch: remove unnecessary if cases * patch: add regex checks in username test * patch: update genUsername to return an error instead of warnings * patch: separate tests for default and custom templates * patch: return truncate warning from genUsername and trigger a 400 response on errors * patch: truncate midString to 42 chars in default template * docs: add new username_template field to aws docs
		
			
				
	
	
		
			56 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			56 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package aws
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/sdk/logical"
 | |
| )
 | |
| 
 | |
| func TestBackend_PathConfigRoot(t *testing.T) {
 | |
| 	config := logical.TestBackendConfig()
 | |
| 	config.StorageView = &logical.InmemStorage{}
 | |
| 
 | |
| 	b := Backend()
 | |
| 	if err := b.Setup(context.Background(), config); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	configData := map[string]interface{}{
 | |
| 		"access_key":        "AKIAEXAMPLE",
 | |
| 		"secret_key":        "RandomData",
 | |
| 		"region":            "us-west-2",
 | |
| 		"iam_endpoint":      "https://iam.amazonaws.com",
 | |
| 		"sts_endpoint":      "https://sts.us-west-2.amazonaws.com",
 | |
| 		"max_retries":       10,
 | |
| 		"username_template": defaultUserNameTemplate,
 | |
| 	}
 | |
| 
 | |
| 	configReq := &logical.Request{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Storage:   config.StorageView,
 | |
| 		Path:      "config/root",
 | |
| 		Data:      configData,
 | |
| 	}
 | |
| 
 | |
| 	resp, err := b.HandleRequest(context.Background(), configReq)
 | |
| 	if err != nil || (resp != nil && resp.IsError()) {
 | |
| 		t.Fatalf("bad: config writing failed: resp:%#v\n err: %v", resp, err)
 | |
| 	}
 | |
| 
 | |
| 	resp, err = b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.ReadOperation,
 | |
| 		Storage:   config.StorageView,
 | |
| 		Path:      "config/root",
 | |
| 	})
 | |
| 	if err != nil || (resp != nil && resp.IsError()) {
 | |
| 		t.Fatalf("bad: config reading failed: resp:%#v\n err: %v", resp, err)
 | |
| 	}
 | |
| 
 | |
| 	delete(configData, "secret_key")
 | |
| 	if !reflect.DeepEqual(resp.Data, configData) {
 | |
| 		t.Errorf("bad: expected to read config root as %#v, got %#v instead", configData, resp.Data)
 | |
| 	}
 | |
| }
 |