deb.open-vault/vault/expiration_testing_util_com...

135 lines
3.3 KiB
Go

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package vault
import (
"context"
"fmt"
"math/rand"
"path"
"time"
uuid "github.com/hashicorp/go-uuid"
"github.com/hashicorp/vault/helper/namespace"
"github.com/hashicorp/vault/sdk/logical"
)
type basicLeaseTestInfo struct {
id string
mount string
expire time.Time
}
// add an irrevocable lease for test purposes
// returns the lease ID and expire time
func (c *Core) AddIrrevocableLease(ctx context.Context, pathPrefix string) (*basicLeaseTestInfo, error) {
exp := c.expiration
uuid, err := uuid.GenerateUUID()
if err != nil {
return nil, fmt.Errorf("error generating uuid: %w", err)
}
ns, err := namespace.FromContext(ctx)
if err != nil {
return nil, fmt.Errorf("error getting namespace from context: %w", err)
}
if ns == nil {
ns = namespace.RootNamespace
}
leaseID := path.Join(pathPrefix, "lease"+uuid)
if ns != namespace.RootNamespace {
leaseID = fmt.Sprintf("%s.%s", leaseID, ns.ID)
}
randomTimeDelta := time.Duration(rand.Int31n(24))
le := &leaseEntry{
LeaseID: leaseID,
Path: pathPrefix,
namespace: ns,
IssueTime: time.Now(),
ExpireTime: time.Now().Add(randomTimeDelta * time.Hour),
RevokeErr: "some error message",
}
exp.pendingLock.Lock()
defer exp.pendingLock.Unlock()
if err := exp.persistEntry(context.Background(), le); err != nil {
return nil, fmt.Errorf("error persisting irrevocable lease: %w", err)
}
exp.updatePendingInternal(le)
return &basicLeaseTestInfo{
id: le.LeaseID,
expire: le.ExpireTime,
}, nil
}
// InjectIrrevocableLeases injects `count` irrevocable leases (currently to a
// single mount).
// It returns a map of the mount accessor to the number of leases stored there
func (c *Core) InjectIrrevocableLeases(ctx context.Context, count int) (map[string]int, error) {
out := make(map[string]int)
for i := 0; i < count; i++ {
le, err := c.AddIrrevocableLease(ctx, "foo/")
if err != nil {
return nil, err
}
mountAccessor := c.expiration.getLeaseMountAccessor(ctx, le.id)
if _, ok := out[mountAccessor]; !ok {
out[mountAccessor] = 0
}
out[mountAccessor]++
}
return out, nil
}
type backend struct {
path string
ns *namespace.Namespace
}
// set up multiple mounts, and return a mapping of the path to the mount accessor
func mountNoopBackends(c *Core, backends []*backend) (map[string]string, error) {
// enable the noop backend
c.logicalBackends["noop"] = func(ctx context.Context, config *logical.BackendConfig) (logical.Backend, error) {
return &NoopBackend{}, nil
}
pathToMount := make(map[string]string)
for _, backend := range backends {
me := &MountEntry{
Table: mountTableType,
Path: backend.path,
Type: "noop",
}
nsCtx := namespace.ContextWithNamespace(context.Background(), backend.ns)
if err := c.mount(nsCtx, me); err != nil {
return nil, fmt.Errorf("error mounting backend %s: %w", backend.path, err)
}
mount := c.router.MatchingMountEntry(nsCtx, backend.path)
if mount == nil {
return nil, fmt.Errorf("couldn't find mount for path %s", backend.path)
}
pathToMount[backend.path] = mount.Accessor
}
return pathToMount, nil
}
func (c *Core) FetchLeaseCountToRevoke() int {
c.expiration.pendingLock.RLock()
defer c.expiration.pendingLock.RUnlock()
return c.expiration.leaseCount
}