mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-03 20:17:59 +00:00 
			
		
		
		
	* Add some requirements for versioned k/v * Add a warning message when an upgrade is triggered * Add path help values * Make the kv header a const * Add the uid to mount entry instead of options map * Pass the backend aware uuid to the mounts and plugins * Fix comment * Add options to secret/auth enable and tune CLI commands (#4170) * Switch mount/tune options to use TypeKVPairs (#4171) * switching options to TypeKVPairs, adding bool parse for versioned flag * flipping bool check * Fix leases coming back from non-leased pluin kv store * add a test for updating mount options * Fix tests
		
			
				
	
	
		
			385 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			385 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package http
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"reflect"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/hashicorp/vault/vault"
 | 
						|
)
 | 
						|
 | 
						|
func TestSysAuth(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
	TestServerAuth(t, addr, token)
 | 
						|
 | 
						|
	resp := testHttpGet(t, token, addr+"/v1/sys/auth")
 | 
						|
 | 
						|
	var actual map[string]interface{}
 | 
						|
	expected := map[string]interface{}{
 | 
						|
		"lease_id":       "",
 | 
						|
		"renewable":      false,
 | 
						|
		"lease_duration": json.Number("0"),
 | 
						|
		"wrap_info":      nil,
 | 
						|
		"warnings":       nil,
 | 
						|
		"auth":           nil,
 | 
						|
		"data": map[string]interface{}{
 | 
						|
			"token/": map[string]interface{}{
 | 
						|
				"description": "token based credentials",
 | 
						|
				"type":        "token",
 | 
						|
				"config": map[string]interface{}{
 | 
						|
					"default_lease_ttl": json.Number("0"),
 | 
						|
					"max_lease_ttl":     json.Number("0"),
 | 
						|
					"plugin_name":       "",
 | 
						|
				},
 | 
						|
				"local":     false,
 | 
						|
				"seal_wrap": false,
 | 
						|
				"options":   interface{}(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"token/": map[string]interface{}{
 | 
						|
			"description": "token based credentials",
 | 
						|
			"type":        "token",
 | 
						|
			"config": map[string]interface{}{
 | 
						|
				"default_lease_ttl": json.Number("0"),
 | 
						|
				"max_lease_ttl":     json.Number("0"),
 | 
						|
				"plugin_name":       "",
 | 
						|
			},
 | 
						|
			"local":     false,
 | 
						|
			"seal_wrap": false,
 | 
						|
			"options":   interface{}(nil),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	testResponseStatus(t, resp, 200)
 | 
						|
	testResponseBody(t, resp, &actual)
 | 
						|
 | 
						|
	expected["request_id"] = actual["request_id"]
 | 
						|
	for k, v := range actual["data"].(map[string]interface{}) {
 | 
						|
		if v.(map[string]interface{})["accessor"] == "" {
 | 
						|
			t.Fatalf("no accessor from %s", k)
 | 
						|
		}
 | 
						|
		expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
 | 
						|
		expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
 | 
						|
	}
 | 
						|
 | 
						|
	if !reflect.DeepEqual(actual, expected) {
 | 
						|
		t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSysEnableAuth(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
	TestServerAuth(t, addr, token)
 | 
						|
 | 
						|
	resp := testHttpPost(t, token, addr+"/v1/sys/auth/foo", map[string]interface{}{
 | 
						|
		"type":        "noop",
 | 
						|
		"description": "foo",
 | 
						|
	})
 | 
						|
	testResponseStatus(t, resp, 204)
 | 
						|
 | 
						|
	resp = testHttpGet(t, token, addr+"/v1/sys/auth")
 | 
						|
 | 
						|
	var actual map[string]interface{}
 | 
						|
	expected := map[string]interface{}{
 | 
						|
		"lease_id":       "",
 | 
						|
		"renewable":      false,
 | 
						|
		"lease_duration": json.Number("0"),
 | 
						|
		"wrap_info":      nil,
 | 
						|
		"warnings":       nil,
 | 
						|
		"auth":           nil,
 | 
						|
		"data": map[string]interface{}{
 | 
						|
			"foo/": map[string]interface{}{
 | 
						|
				"description": "foo",
 | 
						|
				"type":        "noop",
 | 
						|
				"config": map[string]interface{}{
 | 
						|
					"default_lease_ttl": json.Number("0"),
 | 
						|
					"max_lease_ttl":     json.Number("0"),
 | 
						|
					"plugin_name":       "",
 | 
						|
				},
 | 
						|
				"local":     false,
 | 
						|
				"seal_wrap": false,
 | 
						|
				"options":   map[string]interface{}{},
 | 
						|
			},
 | 
						|
			"token/": map[string]interface{}{
 | 
						|
				"description": "token based credentials",
 | 
						|
				"type":        "token",
 | 
						|
				"config": map[string]interface{}{
 | 
						|
					"default_lease_ttl": json.Number("0"),
 | 
						|
					"max_lease_ttl":     json.Number("0"),
 | 
						|
					"plugin_name":       "",
 | 
						|
				},
 | 
						|
				"local":     false,
 | 
						|
				"seal_wrap": false,
 | 
						|
				"options":   interface{}(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"foo/": map[string]interface{}{
 | 
						|
			"description": "foo",
 | 
						|
			"type":        "noop",
 | 
						|
			"config": map[string]interface{}{
 | 
						|
				"default_lease_ttl": json.Number("0"),
 | 
						|
				"max_lease_ttl":     json.Number("0"),
 | 
						|
				"plugin_name":       "",
 | 
						|
			},
 | 
						|
			"local":     false,
 | 
						|
			"seal_wrap": false,
 | 
						|
			"options":   map[string]interface{}{},
 | 
						|
		},
 | 
						|
		"token/": map[string]interface{}{
 | 
						|
			"description": "token based credentials",
 | 
						|
			"type":        "token",
 | 
						|
			"config": map[string]interface{}{
 | 
						|
				"default_lease_ttl": json.Number("0"),
 | 
						|
				"max_lease_ttl":     json.Number("0"),
 | 
						|
				"plugin_name":       "",
 | 
						|
			},
 | 
						|
			"local":     false,
 | 
						|
			"seal_wrap": false,
 | 
						|
			"options":   interface{}(nil),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	testResponseStatus(t, resp, 200)
 | 
						|
	testResponseBody(t, resp, &actual)
 | 
						|
 | 
						|
	expected["request_id"] = actual["request_id"]
 | 
						|
	for k, v := range actual["data"].(map[string]interface{}) {
 | 
						|
		if v.(map[string]interface{})["accessor"] == "" {
 | 
						|
			t.Fatalf("no accessor from %s", k)
 | 
						|
		}
 | 
						|
		expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
 | 
						|
		expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
 | 
						|
	}
 | 
						|
 | 
						|
	if !reflect.DeepEqual(actual, expected) {
 | 
						|
		t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSysDisableAuth(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
	TestServerAuth(t, addr, token)
 | 
						|
 | 
						|
	resp := testHttpPost(t, token, addr+"/v1/sys/auth/foo", map[string]interface{}{
 | 
						|
		"type":        "noop",
 | 
						|
		"description": "foo",
 | 
						|
	})
 | 
						|
	testResponseStatus(t, resp, 204)
 | 
						|
 | 
						|
	resp = testHttpDelete(t, token, addr+"/v1/sys/auth/foo")
 | 
						|
	testResponseStatus(t, resp, 204)
 | 
						|
 | 
						|
	resp = testHttpGet(t, token, addr+"/v1/sys/auth")
 | 
						|
 | 
						|
	var actual map[string]interface{}
 | 
						|
	expected := map[string]interface{}{
 | 
						|
		"lease_id":       "",
 | 
						|
		"renewable":      false,
 | 
						|
		"lease_duration": json.Number("0"),
 | 
						|
		"wrap_info":      nil,
 | 
						|
		"warnings":       nil,
 | 
						|
		"auth":           nil,
 | 
						|
		"data": map[string]interface{}{
 | 
						|
			"token/": map[string]interface{}{
 | 
						|
				"config": map[string]interface{}{
 | 
						|
					"default_lease_ttl": json.Number("0"),
 | 
						|
					"max_lease_ttl":     json.Number("0"),
 | 
						|
					"plugin_name":       "",
 | 
						|
				},
 | 
						|
				"description": "token based credentials",
 | 
						|
				"type":        "token",
 | 
						|
				"local":       false,
 | 
						|
				"seal_wrap":   false,
 | 
						|
				"options":     interface{}(nil),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"token/": map[string]interface{}{
 | 
						|
			"config": map[string]interface{}{
 | 
						|
				"default_lease_ttl": json.Number("0"),
 | 
						|
				"max_lease_ttl":     json.Number("0"),
 | 
						|
				"plugin_name":       "",
 | 
						|
			},
 | 
						|
			"description": "token based credentials",
 | 
						|
			"type":        "token",
 | 
						|
			"local":       false,
 | 
						|
			"seal_wrap":   false,
 | 
						|
			"options":     interface{}(nil),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	testResponseStatus(t, resp, 200)
 | 
						|
	testResponseBody(t, resp, &actual)
 | 
						|
 | 
						|
	expected["request_id"] = actual["request_id"]
 | 
						|
	for k, v := range actual["data"].(map[string]interface{}) {
 | 
						|
		if v.(map[string]interface{})["accessor"] == "" {
 | 
						|
			t.Fatalf("no accessor from %s", k)
 | 
						|
		}
 | 
						|
		expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
 | 
						|
		expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
 | 
						|
	}
 | 
						|
 | 
						|
	if !reflect.DeepEqual(actual, expected) {
 | 
						|
		t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSysTuneAuth_nonHMACKeys(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
	TestServerAuth(t, addr, token)
 | 
						|
 | 
						|
	// Mount-tune the audit_non_hmac_request_keys
 | 
						|
	resp := testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
 | 
						|
		"audit_non_hmac_request_keys": "foo",
 | 
						|
	})
 | 
						|
	testResponseStatus(t, resp, 204)
 | 
						|
 | 
						|
	// Mount-tune the audit_non_hmac_response_keys
 | 
						|
	resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
 | 
						|
		"audit_non_hmac_response_keys": "bar",
 | 
						|
	})
 | 
						|
	testResponseStatus(t, resp, 204)
 | 
						|
 | 
						|
	// Check results
 | 
						|
	resp = testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
 | 
						|
	testResponseStatus(t, resp, 200)
 | 
						|
 | 
						|
	actual := map[string]interface{}{}
 | 
						|
	expected := map[string]interface{}{
 | 
						|
		"lease_id":       "",
 | 
						|
		"renewable":      false,
 | 
						|
		"lease_duration": json.Number("0"),
 | 
						|
		"wrap_info":      nil,
 | 
						|
		"warnings":       nil,
 | 
						|
		"auth":           nil,
 | 
						|
		"data": map[string]interface{}{
 | 
						|
			"default_lease_ttl":            json.Number("2764800"),
 | 
						|
			"max_lease_ttl":                json.Number("2764800"),
 | 
						|
			"force_no_cache":               false,
 | 
						|
			"audit_non_hmac_request_keys":  []interface{}{"foo"},
 | 
						|
			"audit_non_hmac_response_keys": []interface{}{"bar"},
 | 
						|
		},
 | 
						|
		"default_lease_ttl":            json.Number("2764800"),
 | 
						|
		"max_lease_ttl":                json.Number("2764800"),
 | 
						|
		"force_no_cache":               false,
 | 
						|
		"audit_non_hmac_request_keys":  []interface{}{"foo"},
 | 
						|
		"audit_non_hmac_response_keys": []interface{}{"bar"},
 | 
						|
	}
 | 
						|
	testResponseBody(t, resp, &actual)
 | 
						|
	expected["request_id"] = actual["request_id"]
 | 
						|
	if !reflect.DeepEqual(actual, expected) {
 | 
						|
		t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
 | 
						|
	}
 | 
						|
 | 
						|
	// Unset those mount tune values
 | 
						|
	resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
 | 
						|
		"audit_non_hmac_request_keys": "",
 | 
						|
	})
 | 
						|
	testResponseStatus(t, resp, 204)
 | 
						|
 | 
						|
	resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
 | 
						|
		"audit_non_hmac_response_keys": "",
 | 
						|
	})
 | 
						|
 | 
						|
	// Check results
 | 
						|
	resp = testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
 | 
						|
	testResponseStatus(t, resp, 200)
 | 
						|
 | 
						|
	actual = map[string]interface{}{}
 | 
						|
	expected = map[string]interface{}{
 | 
						|
		"lease_id":       "",
 | 
						|
		"renewable":      false,
 | 
						|
		"lease_duration": json.Number("0"),
 | 
						|
		"wrap_info":      nil,
 | 
						|
		"warnings":       nil,
 | 
						|
		"auth":           nil,
 | 
						|
		"data": map[string]interface{}{
 | 
						|
			"default_lease_ttl": json.Number("2764800"),
 | 
						|
			"max_lease_ttl":     json.Number("2764800"),
 | 
						|
			"force_no_cache":    false,
 | 
						|
		},
 | 
						|
		"default_lease_ttl": json.Number("2764800"),
 | 
						|
		"max_lease_ttl":     json.Number("2764800"),
 | 
						|
		"force_no_cache":    false,
 | 
						|
	}
 | 
						|
	testResponseBody(t, resp, &actual)
 | 
						|
	expected["request_id"] = actual["request_id"]
 | 
						|
	if !reflect.DeepEqual(actual, expected) {
 | 
						|
		t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSysTuneAuth_showUIMount(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
	TestServerAuth(t, addr, token)
 | 
						|
 | 
						|
	// Get original tune values, ensure that listing_visibility is not set
 | 
						|
	resp := testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
 | 
						|
	testResponseStatus(t, resp, 200)
 | 
						|
 | 
						|
	actual := map[string]interface{}{}
 | 
						|
	expected := map[string]interface{}{
 | 
						|
		"lease_id":       "",
 | 
						|
		"renewable":      false,
 | 
						|
		"lease_duration": json.Number("0"),
 | 
						|
		"wrap_info":      nil,
 | 
						|
		"warnings":       nil,
 | 
						|
		"auth":           nil,
 | 
						|
		"data": map[string]interface{}{
 | 
						|
			"default_lease_ttl": json.Number("2764800"),
 | 
						|
			"max_lease_ttl":     json.Number("2764800"),
 | 
						|
			"force_no_cache":    false,
 | 
						|
		},
 | 
						|
		"default_lease_ttl": json.Number("2764800"),
 | 
						|
		"max_lease_ttl":     json.Number("2764800"),
 | 
						|
		"force_no_cache":    false,
 | 
						|
	}
 | 
						|
	testResponseBody(t, resp, &actual)
 | 
						|
	expected["request_id"] = actual["request_id"]
 | 
						|
	if !reflect.DeepEqual(actual, expected) {
 | 
						|
		t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
 | 
						|
	}
 | 
						|
 | 
						|
	// Mount-tune the listing_visibility
 | 
						|
	resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
 | 
						|
		"listing_visibility": "unauth",
 | 
						|
	})
 | 
						|
	testResponseStatus(t, resp, 204)
 | 
						|
 | 
						|
	// Check results
 | 
						|
	resp = testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
 | 
						|
	testResponseStatus(t, resp, 200)
 | 
						|
 | 
						|
	actual = map[string]interface{}{}
 | 
						|
	expected = map[string]interface{}{
 | 
						|
		"lease_id":       "",
 | 
						|
		"renewable":      false,
 | 
						|
		"lease_duration": json.Number("0"),
 | 
						|
		"wrap_info":      nil,
 | 
						|
		"warnings":       nil,
 | 
						|
		"auth":           nil,
 | 
						|
		"data": map[string]interface{}{
 | 
						|
			"default_lease_ttl":  json.Number("2764800"),
 | 
						|
			"max_lease_ttl":      json.Number("2764800"),
 | 
						|
			"force_no_cache":     false,
 | 
						|
			"listing_visibility": "unauth",
 | 
						|
		},
 | 
						|
		"default_lease_ttl":  json.Number("2764800"),
 | 
						|
		"max_lease_ttl":      json.Number("2764800"),
 | 
						|
		"force_no_cache":     false,
 | 
						|
		"listing_visibility": "unauth",
 | 
						|
	}
 | 
						|
	testResponseBody(t, resp, &actual)
 | 
						|
	expected["request_id"] = actual["request_id"]
 | 
						|
	if !reflect.DeepEqual(actual, expected) {
 | 
						|
		t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
 | 
						|
	}
 | 
						|
}
 |