This repository was archived by the owner on Nov 24, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 11
/
Copy pathpath_config_test.go
115 lines (94 loc) · 3 KB
/
path_config_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
package kerberos
import (
"context"
"reflect"
"strings"
"testing"
"time"
"github.com/hashicorp/vault/logical"
)
func getTestBackend(t *testing.T) (logical.Backend, logical.Storage) {
defaultLeaseTTLVal := time.Hour * 12
maxLeaseTTLVal := time.Hour * 24
config := &logical.BackendConfig{
Logger: nil,
System: &logical.StaticSystemView{
DefaultLeaseTTLVal: defaultLeaseTTLVal,
MaxLeaseTTLVal: maxLeaseTTLVal,
},
StorageView: &logical.InmemStorage{},
}
b := Backend()
err := b.Setup(context.Background(), config)
if err != nil {
t.Fatalf("unable to create backend: %v", err)
}
return b, config.StorageView
}
func TestConfig_ReadWrite(t *testing.T) {
b, storage := getTestBackend(t)
data := map[string]interface{}{
"keytab": testValidKeytab,
"service_account": "testuser",
}
req := &logical.Request{
Operation: logical.UpdateOperation,
Path: configPath,
Storage: storage,
Data: data,
}
resp, err := b.HandleRequest(context.Background(), req)
if err != nil || (resp != nil && resp.IsError()) {
t.Fatalf("err: %s resp: %#v\n", err, resp)
}
req = &logical.Request{
Operation: logical.ReadOperation,
Path: configPath,
Storage: storage,
Data: nil,
}
resp, err = b.HandleRequest(context.Background(), req)
if err != nil || (resp != nil && resp.IsError()) {
t.Fatalf("err: %s resp: %#v\n", err, resp)
}
// TODO: do we really want to return the keytab?
if !reflect.DeepEqual(resp.Data, data) {
t.Fatalf("Expected did not equal actual: expected %#v\n got %#v\n", data, resp.Data)
}
}
func TestConfig_RejectsBadWrites(t *testing.T) {
b, storage := getTestBackend(t)
testConfigWriteError(t, b, storage, map[string]interface{}{
"keytab": testValidKeytab,
}, "data does not contain service_account")
testConfigWriteError(t, b, storage, map[string]interface{}{
"service_account": "testuser",
}, "data does not contain keytab")
testConfigWriteError(t, b, storage, map[string]interface{}{
"service_account": "testuser",
"keytab": testNotBase64Keytab,
}, "could not base64 decode keytab")
testConfigWriteError(t, b, storage, map[string]interface{}{
"service_account": "testuser",
"keytab": testInvalidKeytab,
}, "invalid keytab")
}
func testConfigWriteError(t *testing.T, b logical.Backend, storage logical.Storage,
data map[string]interface{}, e string) {
req := &logical.Request{
Operation: logical.UpdateOperation,
Path: configPath,
Storage: storage,
Data: data,
}
_, err := b.HandleRequest(context.Background(), req)
if err == nil {
t.Fatal("expected error")
}
if !strings.HasPrefix(err.Error(), e) {
t.Fatalf("got unexpected error: %v, expected %v", err.Error(), e)
}
}
var testValidKeytab string = "BQIAAABFAAEAC1RFU1QuR09LUkI1AAdzeXNIVFRQAAAAAVkNxa8CABIAIEN2NwKGiXjRttkaNnBLmH4n5RclAFW9/EC4prOEjZqu"
var testNotBase64Keytab string = "NOT_VALID_BASE64"
var testInvalidKeytab string = "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"