mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 df0b95d774
			
		
	
	df0b95d774
	
	
	
		
			
			This requires bumping https://github.com/mitchellh/go-testing-interface. For this new version, we have to create a wrapper to convert the stdlib `testing.TB` interface to the `mitchellh/go-testing-interface` `T` interface, since it uses `Parallel()` now, which is not supported by `testing.TB`. This had to be added to a new package, `benchhelpers`, to avoid a circular dependency in `testhelpers`. We also have to *unbump* https://github.com/armon/go-metrics since updating it breaks our usage of https://github.com/google/go-metrics-stackdriver I verified that the new `pkiCert` template function works with agent injection using annotations like: ```yaml vault.hashicorp.com/agent-inject-secret-sample.crt: "pki/issue/example-dot-com" vault.hashicorp.com/agent-inject-template-sample.crt: | {{ pkiCert "pki/issue/example-dot-com" "common_name=foo.example.com" "ttl=1h" }} ```
		
			
				
	
	
		
			199 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			199 lines
		
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package http
 | |
| 
 | |
| import (
 | |
| 	"encoding/json"
 | |
| 	"io/ioutil"
 | |
| 	"os"
 | |
| 	"reflect"
 | |
| 	"sync"
 | |
| 	"testing"
 | |
| 
 | |
| 	log "github.com/hashicorp/go-hclog"
 | |
| 	"github.com/hashicorp/vault/api"
 | |
| 	bplugin "github.com/hashicorp/vault/builtin/plugin"
 | |
| 	"github.com/hashicorp/vault/helper/benchhelpers"
 | |
| 	"github.com/hashicorp/vault/sdk/helper/consts"
 | |
| 	"github.com/hashicorp/vault/sdk/helper/pluginutil"
 | |
| 	"github.com/hashicorp/vault/sdk/logical"
 | |
| 	"github.com/hashicorp/vault/sdk/physical"
 | |
| 	"github.com/hashicorp/vault/sdk/physical/inmem"
 | |
| 	"github.com/hashicorp/vault/sdk/plugin"
 | |
| 	"github.com/hashicorp/vault/sdk/plugin/mock"
 | |
| 	"github.com/hashicorp/vault/vault"
 | |
| )
 | |
| 
 | |
| func getPluginClusterAndCore(t testing.TB, logger log.Logger) (*vault.TestCluster, *vault.TestClusterCore) {
 | |
| 	inm, err := inmem.NewTransactionalInmem(nil, logger)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	inmha, err := inmem.NewInmemHA(nil, logger)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	os.Setenv(consts.VaultDisableFilePermissionsCheckEnv, "true")
 | |
| 
 | |
| 	coreConfig := &vault.CoreConfig{
 | |
| 		Physical:   inm,
 | |
| 		HAPhysical: inmha.(physical.HABackend),
 | |
| 		LogicalBackends: map[string]logical.Factory{
 | |
| 			"plugin": bplugin.Factory,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	cluster := vault.NewTestCluster(benchhelpers.TBtoT(t), coreConfig, &vault.TestClusterOptions{
 | |
| 		HandlerFunc: Handler,
 | |
| 		Logger:      logger.Named("testclusteroptions"),
 | |
| 	})
 | |
| 	cluster.Start()
 | |
| 
 | |
| 	cores := cluster.Cores
 | |
| 	core := cores[0]
 | |
| 
 | |
| 	os.Setenv(pluginutil.PluginCACertPEMEnv, cluster.CACertPEMFile)
 | |
| 
 | |
| 	vault.TestWaitActive(benchhelpers.TBtoT(t), core.Core)
 | |
| 	vault.TestAddTestPlugin(benchhelpers.TBtoT(t), core.Core, "mock-plugin", consts.PluginTypeSecrets, "TestPlugin_PluginMain", []string{}, "")
 | |
| 
 | |
| 	// Mount the mock plugin
 | |
| 	err = core.Client.Sys().Mount("mock", &api.MountInput{
 | |
| 		Type: "mock-plugin",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	return cluster, core
 | |
| }
 | |
| 
 | |
| func TestPlugin_PluginMain(t *testing.T) {
 | |
| 	if os.Getenv(pluginutil.PluginVaultVersionEnv) == "" {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	caPEM := os.Getenv(pluginutil.PluginCACertPEMEnv)
 | |
| 	if caPEM == "" {
 | |
| 		t.Fatal("CA cert not passed in")
 | |
| 	}
 | |
| 
 | |
| 	args := []string{"--ca-cert=" + caPEM}
 | |
| 
 | |
| 	apiClientMeta := &api.PluginAPIClientMeta{}
 | |
| 	flags := apiClientMeta.FlagSet()
 | |
| 	flags.Parse(args)
 | |
| 
 | |
| 	tlsConfig := apiClientMeta.GetTLSConfig()
 | |
| 	tlsProviderFunc := api.VaultPluginTLSProvider(tlsConfig)
 | |
| 
 | |
| 	factoryFunc := mock.FactoryType(logical.TypeLogical)
 | |
| 
 | |
| 	err := plugin.Serve(&plugin.ServeOpts{
 | |
| 		BackendFactoryFunc: factoryFunc,
 | |
| 		TLSProviderFunc:    tlsProviderFunc,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	t.Fatal("Why are we here")
 | |
| }
 | |
| 
 | |
| func TestPlugin_MockList(t *testing.T) {
 | |
| 	logger := log.New(&log.LoggerOptions{
 | |
| 		Mutex: &sync.Mutex{},
 | |
| 	})
 | |
| 	cluster, core := getPluginClusterAndCore(t, logger)
 | |
| 	defer cluster.Cleanup()
 | |
| 
 | |
| 	_, err := core.Client.Logical().Write("mock/kv/foo", map[string]interface{}{
 | |
| 		"value": "baz",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	keys, err := core.Client.Logical().List("mock/kv/")
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if keys.Data["keys"].([]interface{})[0].(string) != "foo" {
 | |
| 		t.Fatal(keys)
 | |
| 	}
 | |
| 
 | |
| 	_, err = core.Client.Logical().Write("mock/kv/zoo", map[string]interface{}{
 | |
| 		"value": "baz",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	keys, err = core.Client.Logical().List("mock/kv/")
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if keys.Data["keys"].([]interface{})[0].(string) != "foo" || keys.Data["keys"].([]interface{})[1].(string) != "zoo" {
 | |
| 		t.Fatal(keys)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestPlugin_MockRawResponse(t *testing.T) {
 | |
| 	logger := log.New(&log.LoggerOptions{
 | |
| 		Mutex: &sync.Mutex{},
 | |
| 	})
 | |
| 	cluster, core := getPluginClusterAndCore(t, logger)
 | |
| 	defer cluster.Cleanup()
 | |
| 
 | |
| 	resp, err := core.Client.RawRequest(core.Client.NewRequest("GET", "/v1/mock/raw"))
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	if string(body[:]) != "Response" {
 | |
| 		t.Fatal("bad body")
 | |
| 	}
 | |
| 
 | |
| 	if resp.StatusCode != 200 {
 | |
| 		t.Fatal("bad status")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestPlugin_GetParams(t *testing.T) {
 | |
| 	logger := log.New(&log.LoggerOptions{
 | |
| 		Mutex: &sync.Mutex{},
 | |
| 	})
 | |
| 	cluster, core := getPluginClusterAndCore(t, logger)
 | |
| 	defer cluster.Cleanup()
 | |
| 
 | |
| 	_, err := core.Client.Logical().Write("mock/kv/foo", map[string]interface{}{
 | |
| 		"value": "baz",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	r := core.Client.NewRequest("GET", "/v1/mock/kv/foo")
 | |
| 	r.Params.Add("version", "12")
 | |
| 	resp, err := core.Client.RawRequest(r)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	secret, err := api.ParseSecret(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 
 | |
| 	expected := map[string]interface{}{
 | |
| 		"value":   "baz",
 | |
| 		"version": json.Number("12"),
 | |
| 	}
 | |
| 
 | |
| 	if !reflect.DeepEqual(secret.Data, expected) {
 | |
| 		t.Fatal(secret.Data)
 | |
| 	}
 | |
| }
 |