mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	 c48159ea3a
			
		
	
	c48159ea3a
	
	
	
		
			
			* upgrade aws roles * test upgrade aws roles * Initialize aws credential backend at mount time * add a TODO * create end-to-end test for builtin/credential/aws * fix bug in initializer * improve comments * add Initialize() to logical.Backend * use Initialize() in Core.enableCredentialInternal() * use InitializeRequest to call Initialize() * improve unit testing for framework.Backend * call logical.Backend.Initialize() from all of the places that it needs to be called. * implement backend.proto changes for logical.Backend.Initialize() * persist current role storage version when upgrading aws roles * format comments correctly * improve comments * use postUnseal funcs to initialize backends * simplify test suite * improve test suite * simplify logic in aws role upgrade * simplify aws credential initialization logic * simplify logic in aws role upgrade * use the core's activeContext for initialization * refactor builtin/plugin/Backend * use a goroutine to upgrade the aws roles * misc improvements and cleanup * do not run AWS role upgrade on DR Secondary * always call logical.Backend.Initialize() when loading a plugin. * improve comments * on standbys and DR secondaries we do not want to run any kind of upgrade logic * fix awsVersion struct * clarify aws version upgrade * make the upgrade logic for aws auth more explicit * aws upgrade is now called from a switch * fix fallthrough bug * simplify logic * simplify logic * rename things * introduce currentAwsVersion const to track aws version * improve comments * rearrange things once more * conglomerate things into one function * stub out aws auth initialize e2e test * improve aws auth initialize e2e test * finish aws auth initialize e2e test * tinker with aws auth initialize e2e test * tinker with aws auth initialize e2e test * tinker with aws auth initialize e2e test * fix typo in test suite * simplify logic a tad * rearrange assignment * Fix a few lifecycle related issues in #7025 (#7075) * Fix panic when plugin fails to load
		
			
				
	
	
		
			660 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			660 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package framework
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"net/http"
 | |
| 	"reflect"
 | |
| 	"strings"
 | |
| 	"sync/atomic"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/sdk/logical"
 | |
| )
 | |
| 
 | |
| func BenchmarkBackendRoute(b *testing.B) {
 | |
| 	patterns := []string{
 | |
| 		"foo",
 | |
| 		"bar/(?P<name>.+?)",
 | |
| 		"baz/(?P<name>what)",
 | |
| 		`aws/policy/(?P<policy>\w)`,
 | |
| 		`aws/(?P<policy>\w)`,
 | |
| 	}
 | |
| 
 | |
| 	backend := &Backend{Paths: make([]*Path, 0, len(patterns))}
 | |
| 	for _, p := range patterns {
 | |
| 		backend.Paths = append(backend.Paths, &Path{Pattern: p})
 | |
| 	}
 | |
| 
 | |
| 	// Warm any caches
 | |
| 	backend.Route("aws/policy/foo")
 | |
| 
 | |
| 	// Reset the timer since we did a lot above
 | |
| 	b.ResetTimer()
 | |
| 
 | |
| 	// Run through and route. We do a sanity check of the return value
 | |
| 	for i := 0; i < b.N; i++ {
 | |
| 		if p := backend.Route("aws/policy/foo"); p == nil {
 | |
| 			b.Fatal("p should not be nil")
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackend_impl(t *testing.T) {
 | |
| 	var _ logical.Backend = new(Backend)
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest(t *testing.T) {
 | |
| 	callback := func(ctx context.Context, req *logical.Request, data *FieldData) (*logical.Response, error) {
 | |
| 		return &logical.Response{
 | |
| 			Data: map[string]interface{}{
 | |
| 				"value": data.Get("value"),
 | |
| 			},
 | |
| 		}, nil
 | |
| 	}
 | |
| 	handler := func(ctx context.Context, req *logical.Request, data *FieldData) (*logical.Response, error) {
 | |
| 		return &logical.Response{
 | |
| 			Data: map[string]interface{}{
 | |
| 				"amount": data.Get("amount"),
 | |
| 			},
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		Paths: []*Path{
 | |
| 			{
 | |
| 				Pattern: "foo/bar",
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"value": &FieldSchema{Type: TypeInt},
 | |
| 				},
 | |
| 				Callbacks: map[logical.Operation]OperationFunc{
 | |
| 					logical.ReadOperation: callback,
 | |
| 				},
 | |
| 			},
 | |
| 			{
 | |
| 				Pattern: "foo/baz/handler",
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"amount": &FieldSchema{Type: TypeInt},
 | |
| 				},
 | |
| 				Operations: map[logical.Operation]OperationHandler{
 | |
| 					logical.ReadOperation: &PathOperation{Callback: handler},
 | |
| 				},
 | |
| 			},
 | |
| 			{
 | |
| 				Pattern: "foo/both/handler",
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"amount": &FieldSchema{Type: TypeInt},
 | |
| 				},
 | |
| 				Callbacks: map[logical.Operation]OperationFunc{
 | |
| 					logical.ReadOperation: callback,
 | |
| 				},
 | |
| 				Operations: map[logical.Operation]OperationHandler{
 | |
| 					logical.ReadOperation: &PathOperation{Callback: handler},
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, path := range []string{"foo/bar", "foo/baz/handler", "foo/both/handler"} {
 | |
| 		key := "value"
 | |
| 		if strings.Contains(path, "handler") {
 | |
| 			key = "amount"
 | |
| 		}
 | |
| 		resp, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 			Operation: logical.ReadOperation,
 | |
| 			Path:      path,
 | |
| 			Data:      map[string]interface{}{key: "42"},
 | |
| 		})
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("err: %s", err)
 | |
| 		}
 | |
| 		if resp.Data[key] != 42 {
 | |
| 			t.Fatalf("bad: %#v", resp)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_badwrite(t *testing.T) {
 | |
| 	callback := func(ctx context.Context, req *logical.Request, data *FieldData) (*logical.Response, error) {
 | |
| 		return &logical.Response{
 | |
| 			Data: map[string]interface{}{
 | |
| 				"value": data.Get("value").(bool),
 | |
| 			},
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		Paths: []*Path{
 | |
| 			&Path{
 | |
| 				Pattern: "foo/bar",
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"value": &FieldSchema{Type: TypeBool},
 | |
| 				},
 | |
| 				Callbacks: map[logical.Operation]OperationFunc{
 | |
| 					logical.UpdateOperation: callback,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "foo/bar",
 | |
| 		Data:      map[string]interface{}{"value": "3false3"},
 | |
| 	})
 | |
| 
 | |
| 	if err == nil {
 | |
| 		t.Fatalf("should have thrown a conversion error")
 | |
| 	}
 | |
| 
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_404(t *testing.T) {
 | |
| 	callback := func(ctx context.Context, req *logical.Request, data *FieldData) (*logical.Response, error) {
 | |
| 		return &logical.Response{
 | |
| 			Data: map[string]interface{}{
 | |
| 				"value": data.Get("value"),
 | |
| 			},
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		Paths: []*Path{
 | |
| 			&Path{
 | |
| 				Pattern: `foo/bar`,
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"value": &FieldSchema{Type: TypeInt},
 | |
| 				},
 | |
| 				Callbacks: map[logical.Operation]OperationFunc{
 | |
| 					logical.ReadOperation: callback,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.ReadOperation,
 | |
| 		Path:      "foo/baz",
 | |
| 		Data:      map[string]interface{}{"value": "84"},
 | |
| 	})
 | |
| 	if err != logical.ErrUnsupportedPath {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_help(t *testing.T) {
 | |
| 	b := &Backend{
 | |
| 		Paths: []*Path{
 | |
| 			&Path{
 | |
| 				Pattern: "foo/bar",
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"value": &FieldSchema{Type: TypeInt},
 | |
| 				},
 | |
| 				HelpSynopsis:    "foo",
 | |
| 				HelpDescription: "bar",
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	resp, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.HelpOperation,
 | |
| 		Path:      "foo/bar",
 | |
| 		Data:      map[string]interface{}{"value": "42"},
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if resp.Data["help"] == nil {
 | |
| 		t.Fatalf("bad: %#v", resp)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_helpRoot(t *testing.T) {
 | |
| 	b := &Backend{
 | |
| 		Help: "42",
 | |
| 	}
 | |
| 
 | |
| 	resp, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.HelpOperation,
 | |
| 		Path:      "",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if resp.Data["help"] == nil {
 | |
| 		t.Fatalf("bad: %#v", resp)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_renewAuth(t *testing.T) {
 | |
| 	b := &Backend{}
 | |
| 
 | |
| 	resp, err := b.HandleRequest(context.Background(), logical.RenewAuthRequest("/foo", &logical.Auth{}, nil))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if !resp.IsError() {
 | |
| 		t.Fatalf("bad: %#v", resp)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_renewAuthCallback(t *testing.T) {
 | |
| 	called := new(uint32)
 | |
| 	callback := func(context.Context, *logical.Request, *FieldData) (*logical.Response, error) {
 | |
| 		atomic.AddUint32(called, 1)
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		AuthRenew: callback,
 | |
| 	}
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), logical.RenewAuthRequest("/foo", &logical.Auth{}, nil))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if v := atomic.LoadUint32(called); v != 1 {
 | |
| 		t.Fatalf("bad: %#v", v)
 | |
| 	}
 | |
| }
 | |
| func TestBackendHandleRequest_renew(t *testing.T) {
 | |
| 	called := new(uint32)
 | |
| 	callback := func(context.Context, *logical.Request, *FieldData) (*logical.Response, error) {
 | |
| 		atomic.AddUint32(called, 1)
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	secret := &Secret{
 | |
| 		Type:  "foo",
 | |
| 		Renew: callback,
 | |
| 	}
 | |
| 	b := &Backend{
 | |
| 		Secrets: []*Secret{secret},
 | |
| 	}
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), logical.RenewRequest("/foo", secret.Response(nil, nil).Secret, nil))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if v := atomic.LoadUint32(called); v != 1 {
 | |
| 		t.Fatalf("bad: %#v", v)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_revoke(t *testing.T) {
 | |
| 	called := new(uint32)
 | |
| 	callback := func(context.Context, *logical.Request, *FieldData) (*logical.Response, error) {
 | |
| 		atomic.AddUint32(called, 1)
 | |
| 		return nil, nil
 | |
| 	}
 | |
| 
 | |
| 	secret := &Secret{
 | |
| 		Type:   "foo",
 | |
| 		Revoke: callback,
 | |
| 	}
 | |
| 	b := &Backend{
 | |
| 		Secrets: []*Secret{secret},
 | |
| 	}
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), logical.RevokeRequest("/foo", secret.Response(nil, nil).Secret, nil))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if v := atomic.LoadUint32(called); v != 1 {
 | |
| 		t.Fatalf("bad: %#v", v)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_rollback(t *testing.T) {
 | |
| 	called := new(uint32)
 | |
| 	callback := func(_ context.Context, req *logical.Request, kind string, data interface{}) error {
 | |
| 		if data == "foo" {
 | |
| 			atomic.AddUint32(called, 1)
 | |
| 		}
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		WALRollback:       callback,
 | |
| 		WALRollbackMinAge: 1 * time.Millisecond,
 | |
| 	}
 | |
| 
 | |
| 	storage := new(logical.InmemStorage)
 | |
| 	if _, err := PutWAL(context.Background(), storage, "kind", "foo"); err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	time.Sleep(10 * time.Millisecond)
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.RollbackOperation,
 | |
| 		Path:      "",
 | |
| 		Storage:   storage,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if v := atomic.LoadUint32(called); v != 1 {
 | |
| 		t.Fatalf("bad: %#v", v)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_rollbackMinAge(t *testing.T) {
 | |
| 	called := new(uint32)
 | |
| 	callback := func(_ context.Context, req *logical.Request, kind string, data interface{}) error {
 | |
| 		if data == "foo" {
 | |
| 			atomic.AddUint32(called, 1)
 | |
| 		}
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		WALRollback:       callback,
 | |
| 		WALRollbackMinAge: 5 * time.Second,
 | |
| 	}
 | |
| 
 | |
| 	storage := new(logical.InmemStorage)
 | |
| 	if _, err := PutWAL(context.Background(), storage, "kind", "foo"); err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.RollbackOperation,
 | |
| 		Path:      "",
 | |
| 		Storage:   storage,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if v := atomic.LoadUint32(called); v != 0 {
 | |
| 		t.Fatalf("bad: %#v", v)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_unsupportedOperation(t *testing.T) {
 | |
| 	callback := func(ctx context.Context, req *logical.Request, data *FieldData) (*logical.Response, error) {
 | |
| 		return &logical.Response{
 | |
| 			Data: map[string]interface{}{
 | |
| 				"value": data.Get("value"),
 | |
| 			},
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		Paths: []*Path{
 | |
| 			&Path{
 | |
| 				Pattern: `foo/bar`,
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"value": &FieldSchema{Type: TypeInt},
 | |
| 				},
 | |
| 				Callbacks: map[logical.Operation]OperationFunc{
 | |
| 					logical.ReadOperation: callback,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	_, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.UpdateOperation,
 | |
| 		Path:      "foo/bar",
 | |
| 		Data:      map[string]interface{}{"value": "84"},
 | |
| 	})
 | |
| 	if err != logical.ErrUnsupportedOperation {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendHandleRequest_urlPriority(t *testing.T) {
 | |
| 	callback := func(ctx context.Context, req *logical.Request, data *FieldData) (*logical.Response, error) {
 | |
| 		return &logical.Response{
 | |
| 			Data: map[string]interface{}{
 | |
| 				"value": data.Get("value"),
 | |
| 			},
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	b := &Backend{
 | |
| 		Paths: []*Path{
 | |
| 			&Path{
 | |
| 				Pattern: `foo/(?P<value>\d+)`,
 | |
| 				Fields: map[string]*FieldSchema{
 | |
| 					"value": &FieldSchema{Type: TypeInt},
 | |
| 				},
 | |
| 				Callbacks: map[logical.Operation]OperationFunc{
 | |
| 					logical.ReadOperation: callback,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	resp, err := b.HandleRequest(context.Background(), &logical.Request{
 | |
| 		Operation: logical.ReadOperation,
 | |
| 		Path:      "foo/42",
 | |
| 		Data:      map[string]interface{}{"value": "84"},
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 	if resp.Data["value"] != 42 {
 | |
| 		t.Fatalf("bad: %#v", resp)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendRoute(t *testing.T) {
 | |
| 	cases := map[string]struct {
 | |
| 		Patterns []string
 | |
| 		Path     string
 | |
| 		Match    string
 | |
| 	}{
 | |
| 		"no match": {
 | |
| 			[]string{"foo"},
 | |
| 			"bar",
 | |
| 			"",
 | |
| 		},
 | |
| 
 | |
| 		"exact": {
 | |
| 			[]string{"foo"},
 | |
| 			"foo",
 | |
| 			"^foo$",
 | |
| 		},
 | |
| 
 | |
| 		"regexp": {
 | |
| 			[]string{"fo+"},
 | |
| 			"foo",
 | |
| 			"^fo+$",
 | |
| 		},
 | |
| 
 | |
| 		"anchor-start": {
 | |
| 			[]string{"bar"},
 | |
| 			"foobar",
 | |
| 			"",
 | |
| 		},
 | |
| 
 | |
| 		"anchor-end": {
 | |
| 			[]string{"bar"},
 | |
| 			"barfoo",
 | |
| 			"",
 | |
| 		},
 | |
| 
 | |
| 		"anchor-ambiguous": {
 | |
| 			[]string{"mounts", "sys/mounts"},
 | |
| 			"sys/mounts",
 | |
| 			"^sys/mounts$",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for n, tc := range cases {
 | |
| 		paths := make([]*Path, len(tc.Patterns))
 | |
| 		for i, pattern := range tc.Patterns {
 | |
| 			paths[i] = &Path{Pattern: pattern}
 | |
| 		}
 | |
| 
 | |
| 		b := &Backend{Paths: paths}
 | |
| 		result := b.Route(tc.Path)
 | |
| 		match := ""
 | |
| 		if result != nil {
 | |
| 			match = result.Pattern
 | |
| 		}
 | |
| 
 | |
| 		if match != tc.Match {
 | |
| 			t.Fatalf("bad: %s\n\nExpected: %s\nGot: %s",
 | |
| 				n, tc.Match, match)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBackendSecret(t *testing.T) {
 | |
| 	cases := map[string]struct {
 | |
| 		Secrets []*Secret
 | |
| 		Search  string
 | |
| 		Match   bool
 | |
| 	}{
 | |
| 		"no match": {
 | |
| 			[]*Secret{&Secret{Type: "foo"}},
 | |
| 			"bar",
 | |
| 			false,
 | |
| 		},
 | |
| 
 | |
| 		"match": {
 | |
| 			[]*Secret{&Secret{Type: "foo"}},
 | |
| 			"foo",
 | |
| 			true,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for n, tc := range cases {
 | |
| 		b := &Backend{Secrets: tc.Secrets}
 | |
| 		result := b.Secret(tc.Search)
 | |
| 		if tc.Match != (result != nil) {
 | |
| 			t.Fatalf("bad: %s\n\nExpected match: %v", n, tc.Match)
 | |
| 		}
 | |
| 		if result != nil && result.Type != tc.Search {
 | |
| 			t.Fatalf("bad: %s\n\nExpected matching type: %#v", n, result)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestFieldSchemaDefaultOrZero(t *testing.T) {
 | |
| 	cases := map[string]struct {
 | |
| 		Schema *FieldSchema
 | |
| 		Value  interface{}
 | |
| 	}{
 | |
| 		"default set": {
 | |
| 			&FieldSchema{Type: TypeString, Default: "foo"},
 | |
| 			"foo",
 | |
| 		},
 | |
| 
 | |
| 		"default not set": {
 | |
| 			&FieldSchema{Type: TypeString},
 | |
| 			"",
 | |
| 		},
 | |
| 
 | |
| 		"default duration set": {
 | |
| 			&FieldSchema{Type: TypeDurationSecond, Default: 60},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"default duration int64": {
 | |
| 			&FieldSchema{Type: TypeDurationSecond, Default: int64(60)},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"default duration string": {
 | |
| 			&FieldSchema{Type: TypeDurationSecond, Default: "60s"},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"illegal default duration string": {
 | |
| 			&FieldSchema{Type: TypeDurationSecond, Default: "h1"},
 | |
| 			0,
 | |
| 		},
 | |
| 
 | |
| 		"default duration time.Duration": {
 | |
| 			&FieldSchema{Type: TypeDurationSecond, Default: 60 * time.Second},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"default duration not set": {
 | |
| 			&FieldSchema{Type: TypeDurationSecond},
 | |
| 			0,
 | |
| 		},
 | |
| 
 | |
| 		"default signed positive duration set": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: 60},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"default signed positive duration int64": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: int64(60)},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"default signed positive duration string": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: "60s"},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"illegal default signed duration string": {
 | |
| 			&FieldSchema{Type: TypeDurationSecond, Default: "-h1"},
 | |
| 			0,
 | |
| 		},
 | |
| 
 | |
| 		"default signed positive duration time.Duration": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: 60 * time.Second},
 | |
| 			60,
 | |
| 		},
 | |
| 
 | |
| 		"default signed negative duration set": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: -60},
 | |
| 			-60,
 | |
| 		},
 | |
| 
 | |
| 		"default signed negative duration int64": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: int64(-60)},
 | |
| 			-60,
 | |
| 		},
 | |
| 
 | |
| 		"default signed negative duration string": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: "-60s"},
 | |
| 			-60,
 | |
| 		},
 | |
| 
 | |
| 		"default signed negative duration time.Duration": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond, Default: -60 * time.Second},
 | |
| 			-60,
 | |
| 		},
 | |
| 
 | |
| 		"default signed negative duration not set": {
 | |
| 			&FieldSchema{Type: TypeSignedDurationSecond},
 | |
| 			0,
 | |
| 		},
 | |
| 		"default header not set": {
 | |
| 			&FieldSchema{Type: TypeHeader},
 | |
| 			http.Header{},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for name, tc := range cases {
 | |
| 		actual := tc.Schema.DefaultOrZero()
 | |
| 		if !reflect.DeepEqual(actual, tc.Value) {
 | |
| 			t.Errorf("bad: %s\n\nExpected: %#v\nGot: %#v",
 | |
| 				name, tc.Value, actual)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestInitializeBackend(t *testing.T) {
 | |
| 
 | |
| 	var inited bool
 | |
| 	backend := &Backend{InitializeFunc: func(context.Context, *logical.InitializationRequest) error {
 | |
| 		inited = true
 | |
| 		return nil
 | |
| 	}}
 | |
| 
 | |
| 	backend.Initialize(nil, &logical.InitializationRequest{Storage: nil})
 | |
| 
 | |
| 	if !inited {
 | |
| 		t.Fatal("backend should be open")
 | |
| 	}
 | |
| }
 |