mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 f943c37a83
			
		
	
	f943c37a83
	
	
	
		
			
			* VAULT-19237 Add mount_type to secret response * VAULT-19237 changelog * VAULT-19237 make MountType generic * VAULT-19237 clean up comment * VAULT-19237 update changelog * VAULT-19237 update test, remove mounttype from wrapped responses * VAULT-19237 fix a lot of tests * VAULT-19237 standby test
		
			
				
	
	
		
			164 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			164 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (c) HashiCorp, Inc.
 | |
| // SPDX-License-Identifier: BUSL-1.1
 | |
| 
 | |
| package http
 | |
| 
 | |
| import (
 | |
| 	"encoding/json"
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/vault"
 | |
| )
 | |
| 
 | |
| func TestSysPolicies(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpGet(t, token, addr+"/v1/sys/policy")
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"lease_id":       "",
 | |
| 		"renewable":      false,
 | |
| 		"lease_duration": json.Number("0"),
 | |
| 		"wrap_info":      nil,
 | |
| 		"warnings":       nil,
 | |
| 		"auth":           nil,
 | |
| 		"mount_type":     "system",
 | |
| 		"data": map[string]interface{}{
 | |
| 			"policies": []interface{}{"default", "root"},
 | |
| 			"keys":     []interface{}{"default", "root"},
 | |
| 		},
 | |
| 		"policies": []interface{}{"default", "root"},
 | |
| 		"keys":     []interface{}{"default", "root"},
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	expected["request_id"] = actual["request_id"]
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSysReadPolicy(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpGet(t, token, addr+"/v1/sys/policy/root")
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"lease_id":       "",
 | |
| 		"renewable":      false,
 | |
| 		"lease_duration": json.Number("0"),
 | |
| 		"wrap_info":      nil,
 | |
| 		"warnings":       nil,
 | |
| 		"auth":           nil,
 | |
| 		"mount_type":     "system",
 | |
| 		"data": map[string]interface{}{
 | |
| 			"name":  "root",
 | |
| 			"rules": "",
 | |
| 		},
 | |
| 		"name":  "root",
 | |
| 		"rules": "",
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	expected["request_id"] = actual["request_id"]
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSysWritePolicy(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPost(t, token, addr+"/v1/sys/policy/foo", map[string]interface{}{
 | |
| 		"rules": `path "*" { capabilities = ["read"] }`,
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 
 | |
| 	resp = testHttpGet(t, token, addr+"/v1/sys/policy")
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"lease_id":       "",
 | |
| 		"renewable":      false,
 | |
| 		"lease_duration": json.Number("0"),
 | |
| 		"wrap_info":      nil,
 | |
| 		"warnings":       nil,
 | |
| 		"auth":           nil,
 | |
| 		"mount_type":     "system",
 | |
| 		"data": map[string]interface{}{
 | |
| 			"policies": []interface{}{"default", "foo", "root"},
 | |
| 			"keys":     []interface{}{"default", "foo", "root"},
 | |
| 		},
 | |
| 		"policies": []interface{}{"default", "foo", "root"},
 | |
| 		"keys":     []interface{}{"default", "foo", "root"},
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	expected["request_id"] = actual["request_id"]
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
 | |
| 	}
 | |
| 
 | |
| 	resp = testHttpPost(t, token, addr+"/v1/sys/policy/response-wrapping", map[string]interface{}{
 | |
| 		"rules": ``,
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 400)
 | |
| }
 | |
| 
 | |
| func TestSysDeletePolicy(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPost(t, token, addr+"/v1/sys/policy/foo", map[string]interface{}{
 | |
| 		"rules": `path "*" { capabilities = ["read"] }`,
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 
 | |
| 	resp = testHttpDelete(t, token, addr+"/v1/sys/policy/foo")
 | |
| 	testResponseStatus(t, resp, 204)
 | |
| 
 | |
| 	// Also attempt to delete these since they should not be allowed (ignore
 | |
| 	// responses, if they exist later that's sufficient)
 | |
| 	resp = testHttpDelete(t, token, addr+"/v1/sys/policy/default")
 | |
| 	resp = testHttpDelete(t, token, addr+"/v1/sys/policy/response-wrapping")
 | |
| 
 | |
| 	resp = testHttpGet(t, token, addr+"/v1/sys/policy")
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"lease_id":       "",
 | |
| 		"renewable":      false,
 | |
| 		"lease_duration": json.Number("0"),
 | |
| 		"wrap_info":      nil,
 | |
| 		"warnings":       nil,
 | |
| 		"auth":           nil,
 | |
| 		"mount_type":     "system",
 | |
| 		"data": map[string]interface{}{
 | |
| 			"policies": []interface{}{"default", "root"},
 | |
| 			"keys":     []interface{}{"default", "root"},
 | |
| 		},
 | |
| 		"policies": []interface{}{"default", "root"},
 | |
| 		"keys":     []interface{}{"default", "root"},
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	expected["request_id"] = actual["request_id"]
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
 | |
| 	}
 | |
| }
 |