mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			160 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			160 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package api
 | 
						|
 | 
						|
import (
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/hashicorp/vault/http"
 | 
						|
	"github.com/hashicorp/vault/vault"
 | 
						|
)
 | 
						|
 | 
						|
func TestAuthTokenCreate(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := http.TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
 | 
						|
	config := DefaultConfig()
 | 
						|
	config.Address = addr
 | 
						|
 | 
						|
	client, err := NewClient(config)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	client.SetToken(token)
 | 
						|
 | 
						|
	secret, err := client.Auth().Token().Create(&TokenCreateRequest{
 | 
						|
		Lease: "1h",
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	if secret.Auth.LeaseDuration != 3600 {
 | 
						|
		t.Errorf("expected 1h, got %q", secret.Auth.LeaseDuration)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAuthTokenLookup(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := http.TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
 | 
						|
	config := DefaultConfig()
 | 
						|
	config.Address = addr
 | 
						|
 | 
						|
	client, err := NewClient(config)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	client.SetToken(token)
 | 
						|
 | 
						|
	// Create a new token ...
 | 
						|
	secret2, err := client.Auth().Token().Create(&TokenCreateRequest{
 | 
						|
		Lease: "1h",
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// lookup details of this token
 | 
						|
	secret, err := client.Auth().Token().Lookup(secret2.Auth.ClientToken)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unable to lookup details of token, err = %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if secret.Data["id"] != secret2.Auth.ClientToken {
 | 
						|
		t.Errorf("Did not get back details about our provided token, id returned=%s", secret.Data["id"])
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestAuthTokenLookupSelf(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := http.TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
 | 
						|
	config := DefaultConfig()
 | 
						|
	config.Address = addr
 | 
						|
 | 
						|
	client, err := NewClient(config)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	client.SetToken(token)
 | 
						|
 | 
						|
	// you should be able to lookup your own token
 | 
						|
	secret, err := client.Auth().Token().LookupSelf()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("should be allowed to lookup self, err = %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if secret.Data["id"] != token {
 | 
						|
		t.Errorf("Did not get back details about our own (self) token, id returned=%s", secret.Data["id"])
 | 
						|
	}
 | 
						|
	if secret.Data["display_name"] != "root" {
 | 
						|
		t.Errorf("Did not get back details about our own (self) token, display_name returned=%s", secret.Data["display_name"])
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestAuthTokenRenew(t *testing.T) {
 | 
						|
	core, _, token := vault.TestCoreUnsealed(t)
 | 
						|
	ln, addr := http.TestServer(t, core)
 | 
						|
	defer ln.Close()
 | 
						|
 | 
						|
	config := DefaultConfig()
 | 
						|
	config.Address = addr
 | 
						|
 | 
						|
	client, err := NewClient(config)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	client.SetToken(token)
 | 
						|
 | 
						|
	// The default root token is not renewable, so this should not work
 | 
						|
	_, err = client.Auth().Token().Renew(token, 0)
 | 
						|
	if err == nil {
 | 
						|
		t.Fatal("should not be allowed to renew root token")
 | 
						|
	}
 | 
						|
	if !strings.Contains(err.Error(), "lease is not renewable") {
 | 
						|
		t.Fatalf("wrong error; got %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Create a new token that should be renewable
 | 
						|
	secret, err := client.Auth().Token().Create(&TokenCreateRequest{
 | 
						|
		Lease: "1h",
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	client.SetToken(secret.Auth.ClientToken)
 | 
						|
 | 
						|
	// Now attempt a renew with the new token
 | 
						|
	secret, err = client.Auth().Token().Renew(secret.Auth.ClientToken, 3600)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	if secret.Auth.LeaseDuration != 3600 {
 | 
						|
		t.Errorf("expected 1h, got %v", secret.Auth.LeaseDuration)
 | 
						|
	}
 | 
						|
 | 
						|
	if secret.Auth.Renewable != true {
 | 
						|
		t.Error("expected lease to be renewable")
 | 
						|
	}
 | 
						|
 | 
						|
	// Do the same thing with the self variant
 | 
						|
	secret, err = client.Auth().Token().RenewSelf(3600)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	if secret.Auth.LeaseDuration != 3600 {
 | 
						|
		t.Errorf("expected 1h, got %v", secret.Auth.LeaseDuration)
 | 
						|
	}
 | 
						|
 | 
						|
	if secret.Auth.Renewable != true {
 | 
						|
		t.Error("expected lease to be renewable")
 | 
						|
	}
 | 
						|
}
 |