mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			401 lines
		
	
	
		
			7.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			401 lines
		
	
	
		
			7.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package command
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"io/ioutil"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 
 | |
| 	credUserpass "github.com/hashicorp/vault/builtin/credential/userpass"
 | |
| 	"github.com/hashicorp/vault/logical"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/api"
 | |
| 	"github.com/hashicorp/vault/http"
 | |
| 	"github.com/hashicorp/vault/meta"
 | |
| 	"github.com/hashicorp/vault/vault"
 | |
| 	"github.com/mitchellh/cli"
 | |
| )
 | |
| 
 | |
| func TestAuth_methods(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := http.TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 
 | |
| 	testAuthInit(t)
 | |
| 
 | |
| 	ui := new(cli.MockUi)
 | |
| 	c := &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			ClientToken: token,
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args := []string{
 | |
| 		"-address", addr,
 | |
| 		"-methods",
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 
 | |
| 	output := ui.OutputWriter.String()
 | |
| 	if !strings.Contains(output, "token") {
 | |
| 		t.Fatalf("bad: %#v", output)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuth_token(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := http.TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 
 | |
| 	testAuthInit(t)
 | |
| 
 | |
| 	ui := new(cli.MockUi)
 | |
| 	c := &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args := []string{
 | |
| 		"-address", addr,
 | |
| 		token,
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 
 | |
| 	helper, err := c.TokenHelper()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	actual, err := helper.Get()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	if actual != token {
 | |
| 		t.Fatalf("bad: %s", actual)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuth_wrapping(t *testing.T) {
 | |
| 	baseConfig := &vault.CoreConfig{
 | |
| 		CredentialBackends: map[string]logical.Factory{
 | |
| 			"userpass": credUserpass.Factory,
 | |
| 		},
 | |
| 	}
 | |
| 	cluster := vault.NewTestCluster(t, baseConfig, &vault.TestClusterOptions{
 | |
| 		HandlerFunc:       http.Handler,
 | |
| 		BaseListenAddress: "127.0.0.1:8200",
 | |
| 	})
 | |
| 	cluster.Start()
 | |
| 	defer cluster.Cleanup()
 | |
| 
 | |
| 	testAuthInit(t)
 | |
| 
 | |
| 	client := cluster.Cores[0].Client
 | |
| 	err := client.Sys().EnableAuthWithOptions("userpass", &api.EnableAuthOptions{
 | |
| 		Type: "userpass",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	_, err = client.Logical().Write("auth/userpass/users/foo", map[string]interface{}{
 | |
| 		"password": "bar",
 | |
| 		"policies": "zip,zap",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	ui := new(cli.MockUi)
 | |
| 	c := &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 		Handlers: map[string]AuthHandler{
 | |
| 			"userpass": &credUserpass.CLIHandler{DefaultMount: "userpass"},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args := []string{
 | |
| 		"-address",
 | |
| 		"https://127.0.0.1:8200",
 | |
| 		"-tls-skip-verify",
 | |
| 		"-method",
 | |
| 		"userpass",
 | |
| 		"username=foo",
 | |
| 		"password=bar",
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 
 | |
| 	// Test again with wrapping
 | |
| 	ui = new(cli.MockUi)
 | |
| 	c = &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 		Handlers: map[string]AuthHandler{
 | |
| 			"userpass": &credUserpass.CLIHandler{DefaultMount: "userpass"},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args = []string{
 | |
| 		"-address",
 | |
| 		"https://127.0.0.1:8200",
 | |
| 		"-tls-skip-verify",
 | |
| 		"-wrap-ttl",
 | |
| 		"5m",
 | |
| 		"-method",
 | |
| 		"userpass",
 | |
| 		"username=foo",
 | |
| 		"password=bar",
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 
 | |
| 	// Test again with no-store
 | |
| 	ui = new(cli.MockUi)
 | |
| 	c = &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 		Handlers: map[string]AuthHandler{
 | |
| 			"userpass": &credUserpass.CLIHandler{DefaultMount: "userpass"},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args = []string{
 | |
| 		"-address",
 | |
| 		"https://127.0.0.1:8200",
 | |
| 		"-tls-skip-verify",
 | |
| 		"-wrap-ttl",
 | |
| 		"5m",
 | |
| 		"-no-store",
 | |
| 		"-method",
 | |
| 		"userpass",
 | |
| 		"username=foo",
 | |
| 		"password=bar",
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 
 | |
| 	// Test again with wrapping and token-only
 | |
| 	ui = new(cli.MockUi)
 | |
| 	c = &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 		Handlers: map[string]AuthHandler{
 | |
| 			"userpass": &credUserpass.CLIHandler{DefaultMount: "userpass"},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args = []string{
 | |
| 		"-address",
 | |
| 		"https://127.0.0.1:8200",
 | |
| 		"-tls-skip-verify",
 | |
| 		"-wrap-ttl",
 | |
| 		"5m",
 | |
| 		"-token-only",
 | |
| 		"-method",
 | |
| 		"userpass",
 | |
| 		"username=foo",
 | |
| 		"password=bar",
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 	token := strings.TrimSpace(ui.OutputWriter.String())
 | |
| 	if token == "" {
 | |
| 		t.Fatal("expected to find token in output")
 | |
| 	}
 | |
| 	secret, err := client.Logical().Unwrap(token)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if secret.Auth.ClientToken == "" {
 | |
| 		t.Fatal("no client token found")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuth_token_nostore(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := http.TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 
 | |
| 	testAuthInit(t)
 | |
| 
 | |
| 	ui := new(cli.MockUi)
 | |
| 	c := &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args := []string{
 | |
| 		"-address", addr,
 | |
| 		"-no-store",
 | |
| 		token,
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 
 | |
| 	helper, err := c.TokenHelper()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	actual, err := helper.Get()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	if actual != "" {
 | |
| 		t.Fatalf("bad: %s", actual)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuth_stdin(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := http.TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 
 | |
| 	testAuthInit(t)
 | |
| 
 | |
| 	stdinR, stdinW := io.Pipe()
 | |
| 	ui := new(cli.MockUi)
 | |
| 	c := &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 		testStdin: stdinR,
 | |
| 	}
 | |
| 
 | |
| 	go func() {
 | |
| 		stdinW.Write([]byte(token))
 | |
| 		stdinW.Close()
 | |
| 	}()
 | |
| 
 | |
| 	args := []string{
 | |
| 		"-address", addr,
 | |
| 		"-",
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuth_badToken(t *testing.T) {
 | |
| 	core, _, _ := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := http.TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 
 | |
| 	testAuthInit(t)
 | |
| 
 | |
| 	ui := new(cli.MockUi)
 | |
| 	c := &AuthCommand{
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args := []string{
 | |
| 		"-address", addr,
 | |
| 		"not-a-valid-token",
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 1 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuth_method(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := http.TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 
 | |
| 	testAuthInit(t)
 | |
| 
 | |
| 	ui := new(cli.MockUi)
 | |
| 	c := &AuthCommand{
 | |
| 		Handlers: map[string]AuthHandler{
 | |
| 			"test": &testAuthHandler{},
 | |
| 		},
 | |
| 		Meta: meta.Meta{
 | |
| 			Ui:          ui,
 | |
| 			TokenHelper: DefaultTokenHelper,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	args := []string{
 | |
| 		"-address", addr,
 | |
| 		"-method=test",
 | |
| 		"foo=" + token,
 | |
| 	}
 | |
| 	if code := c.Run(args); code != 0 {
 | |
| 		t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
 | |
| 	}
 | |
| 
 | |
| 	helper, err := c.TokenHelper()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	actual, err := helper.Get()
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	if actual != token {
 | |
| 		t.Fatalf("bad: %s", actual)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testAuthInit(t *testing.T) {
 | |
| 	td, err := ioutil.TempDir("", "vault")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// Set the HOME env var so we get that right
 | |
| 	os.Setenv("HOME", td)
 | |
| 
 | |
| 	// Write a .vault config to use our custom token helper
 | |
| 	config := fmt.Sprintf(
 | |
| 		"token_helper = \"\"\n")
 | |
| 	ioutil.WriteFile(filepath.Join(td, ".vault"), []byte(config), 0644)
 | |
| }
 | |
| 
 | |
| type testAuthHandler struct{}
 | |
| 
 | |
| func (h *testAuthHandler) Auth(c *api.Client, m map[string]string) (*api.Secret, error) {
 | |
| 	return &api.Secret{
 | |
| 		Auth: &api.SecretAuth{
 | |
| 			ClientToken: m["foo"],
 | |
| 		},
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func (h *testAuthHandler) Help() string { return "" }
 | 
