2017-08-08 06:02:03 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
"github.com/stretchr/testify/assert"
|
2021-02-25 21:41:00 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2017-08-08 06:02:03 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestHTTP_ACLPolicyList(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-08 06:02:03 +00:00
|
|
|
p1 := mock.ACLPolicy()
|
|
|
|
p2 := mock.ACLPolicy()
|
|
|
|
p3 := mock.ACLPolicy()
|
|
|
|
args := structs.ACLPolicyUpsertRequest{
|
2017-08-21 04:05:28 +00:00
|
|
|
Policies: []*structs.ACLPolicy{p1, p2, p3},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
2017-10-12 22:16:33 +00:00
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
2017-08-21 04:05:28 +00:00
|
|
|
},
|
2017-08-08 06:02:03 +00:00
|
|
|
}
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := s.Agent.RPC("ACL.UpsertPolicies", &args, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/acl/policies", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-08 06:02:03 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLPoliciesRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-KnownLeader") != "true" {
|
|
|
|
t.Fatalf("missing known leader")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-LastContact") == "" {
|
|
|
|
t.Fatalf("missing last contact")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the output
|
|
|
|
n := obj.([]*structs.ACLPolicyListStub)
|
|
|
|
if len(n) != 3 {
|
|
|
|
t.Fatalf("bad: %#v", n)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_ACLPolicyQuery(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-08 06:02:03 +00:00
|
|
|
p1 := mock.ACLPolicy()
|
|
|
|
args := structs.ACLPolicyUpsertRequest{
|
2017-08-21 04:05:28 +00:00
|
|
|
Policies: []*structs.ACLPolicy{p1},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
2017-10-12 22:16:33 +00:00
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
2017-08-21 04:05:28 +00:00
|
|
|
},
|
2017-08-08 06:02:03 +00:00
|
|
|
}
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := s.Agent.RPC("ACL.UpsertPolicies", &args, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/acl/policy/"+p1.Name, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-08 06:02:03 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLPolicySpecificRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-KnownLeader") != "true" {
|
|
|
|
t.Fatalf("missing known leader")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-LastContact") == "" {
|
|
|
|
t.Fatalf("missing last contact")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the output
|
|
|
|
n := obj.(*structs.ACLPolicy)
|
|
|
|
if n.Name != p1.Name {
|
|
|
|
t.Fatalf("bad: %#v", n)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_ACLPolicyCreate(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-08 06:02:03 +00:00
|
|
|
// Make the HTTP request
|
|
|
|
p1 := mock.ACLPolicy()
|
|
|
|
buf := encodeReq(p1)
|
|
|
|
req, err := http.NewRequest("PUT", "/v1/acl/policy/"+p1.Name, buf)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-08 06:02:03 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLPolicySpecificRequest(respW, req)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Nil(t, obj)
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check policy was created
|
|
|
|
state := s.Agent.server.State()
|
|
|
|
out, err := state.ACLPolicyByName(nil, p1.Name)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotNil(t, out)
|
|
|
|
|
|
|
|
p1.CreateIndex, p1.ModifyIndex = out.CreateIndex, out.ModifyIndex
|
|
|
|
assert.Equal(t, p1.Name, out.Name)
|
|
|
|
assert.Equal(t, p1, out)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_ACLPolicyDelete(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-08 06:02:03 +00:00
|
|
|
p1 := mock.ACLPolicy()
|
|
|
|
args := structs.ACLPolicyUpsertRequest{
|
2017-08-21 04:05:28 +00:00
|
|
|
Policies: []*structs.ACLPolicy{p1},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
2017-10-12 22:16:33 +00:00
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
2017-08-21 04:05:28 +00:00
|
|
|
},
|
2017-08-08 06:02:03 +00:00
|
|
|
}
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := s.Agent.RPC("ACL.UpsertPolicies", &args, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("DELETE", "/v1/acl/policy/"+p1.Name, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-08 06:02:03 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLPolicySpecificRequest(respW, req)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Nil(t, obj)
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check policy was created
|
|
|
|
state := s.Agent.server.State()
|
|
|
|
out, err := state.ACLPolicyByName(nil, p1.Name)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Nil(t, out)
|
|
|
|
})
|
|
|
|
}
|
2017-08-12 23:08:00 +00:00
|
|
|
|
2017-08-21 01:31:22 +00:00
|
|
|
func TestHTTP_ACLTokenBootstrap(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
conf := func(c *Config) {
|
|
|
|
c.ACL.Enabled = true
|
|
|
|
c.ACL.PolicyTTL = 0 // Special flag to disable auto-bootstrap
|
|
|
|
}
|
|
|
|
httpTest(t, conf, func(s *TestAgent) {
|
2017-08-21 01:31:22 +00:00
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("PUT", "/v1/acl/bootstrap", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLTokenBootstrap(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the output
|
|
|
|
n := obj.(*structs.ACLToken)
|
|
|
|
assert.NotNil(t, n)
|
|
|
|
assert.Equal(t, "Bootstrap Token", n.Name)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-08-12 23:08:00 +00:00
|
|
|
func TestHTTP_ACLTokenList(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-12 23:08:00 +00:00
|
|
|
p1 := mock.ACLToken()
|
2017-08-13 21:30:31 +00:00
|
|
|
p1.AccessorID = ""
|
2017-08-12 23:08:00 +00:00
|
|
|
p2 := mock.ACLToken()
|
2017-08-13 21:30:31 +00:00
|
|
|
p2.AccessorID = ""
|
2017-08-12 23:08:00 +00:00
|
|
|
p3 := mock.ACLToken()
|
2017-08-13 21:30:31 +00:00
|
|
|
p3.AccessorID = ""
|
2017-08-12 23:08:00 +00:00
|
|
|
args := structs.ACLTokenUpsertRequest{
|
2017-08-21 04:05:28 +00:00
|
|
|
Tokens: []*structs.ACLToken{p1, p2, p3},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
2017-10-12 22:16:33 +00:00
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
2017-08-21 04:05:28 +00:00
|
|
|
},
|
2017-08-12 23:08:00 +00:00
|
|
|
}
|
2017-08-13 21:30:31 +00:00
|
|
|
var resp structs.ACLTokenUpsertResponse
|
2017-08-12 23:08:00 +00:00
|
|
|
if err := s.Agent.RPC("ACL.UpsertTokens", &args, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/acl/tokens", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-12 23:08:00 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLTokensRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-KnownLeader") != "true" {
|
|
|
|
t.Fatalf("missing known leader")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-LastContact") == "" {
|
|
|
|
t.Fatalf("missing last contact")
|
|
|
|
}
|
|
|
|
|
2018-03-11 17:43:19 +00:00
|
|
|
// Check the output (includes bootstrap token)
|
2017-08-12 23:08:00 +00:00
|
|
|
n := obj.([]*structs.ACLTokenListStub)
|
2017-08-21 02:59:25 +00:00
|
|
|
if len(n) != 4 {
|
2017-08-12 23:08:00 +00:00
|
|
|
t.Fatalf("bad: %#v", n)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_ACLTokenQuery(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-12 23:08:00 +00:00
|
|
|
p1 := mock.ACLToken()
|
2017-08-13 21:30:31 +00:00
|
|
|
p1.AccessorID = ""
|
2017-08-12 23:08:00 +00:00
|
|
|
args := structs.ACLTokenUpsertRequest{
|
2017-08-21 04:05:28 +00:00
|
|
|
Tokens: []*structs.ACLToken{p1},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
2017-10-12 22:16:33 +00:00
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
2017-08-21 04:05:28 +00:00
|
|
|
},
|
2017-08-12 23:08:00 +00:00
|
|
|
}
|
2017-08-13 21:30:31 +00:00
|
|
|
var resp structs.ACLTokenUpsertResponse
|
2017-08-12 23:08:00 +00:00
|
|
|
if err := s.Agent.RPC("ACL.UpsertTokens", &args, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2017-08-13 21:30:31 +00:00
|
|
|
out := resp.Tokens[0]
|
2017-08-12 23:08:00 +00:00
|
|
|
|
|
|
|
// Make the HTTP request
|
2017-08-13 21:30:31 +00:00
|
|
|
req, err := http.NewRequest("GET", "/v1/acl/token/"+out.AccessorID, nil)
|
2017-08-12 23:08:00 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-12 23:08:00 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLTokenSpecificRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-KnownLeader") != "true" {
|
|
|
|
t.Fatalf("missing known leader")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-LastContact") == "" {
|
|
|
|
t.Fatalf("missing last contact")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the output
|
2017-10-13 20:10:26 +00:00
|
|
|
n := obj.(*structs.ACLToken)
|
|
|
|
assert.Equal(t, out, n)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_ACLTokenSelf(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
p1 := mock.ACLToken()
|
|
|
|
p1.AccessorID = ""
|
|
|
|
args := structs.ACLTokenUpsertRequest{
|
|
|
|
Tokens: []*structs.ACLToken{p1},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp structs.ACLTokenUpsertResponse
|
|
|
|
if err := s.Agent.RPC("ACL.UpsertTokens", &args, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
out := resp.Tokens[0]
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/acl/token/self", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
setToken(req, out)
|
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLTokenSpecificRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-KnownLeader") != "true" {
|
|
|
|
t.Fatalf("missing known leader")
|
|
|
|
}
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-LastContact") == "" {
|
|
|
|
t.Fatalf("missing last contact")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the output
|
2017-08-12 23:08:00 +00:00
|
|
|
n := obj.(*structs.ACLToken)
|
2017-08-13 21:30:31 +00:00
|
|
|
assert.Equal(t, out, n)
|
2017-08-12 23:08:00 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_ACLTokenCreate(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-12 23:08:00 +00:00
|
|
|
// Make the HTTP request
|
|
|
|
p1 := mock.ACLToken()
|
2017-08-13 21:30:31 +00:00
|
|
|
p1.AccessorID = ""
|
2017-08-12 23:08:00 +00:00
|
|
|
buf := encodeReq(p1)
|
|
|
|
req, err := http.NewRequest("PUT", "/v1/acl/token", buf)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-12 23:08:00 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLTokenSpecificRequest(respW, req)
|
|
|
|
assert.Nil(t, err)
|
2017-08-13 21:30:31 +00:00
|
|
|
assert.NotNil(t, obj)
|
|
|
|
outTK := obj.(*structs.ACLToken)
|
2017-08-12 23:08:00 +00:00
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check token was created
|
|
|
|
state := s.Agent.server.State()
|
2017-08-13 21:30:31 +00:00
|
|
|
out, err := state.ACLTokenByAccessorID(nil, outTK.AccessorID)
|
2017-08-12 23:08:00 +00:00
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotNil(t, out)
|
2017-08-13 21:30:31 +00:00
|
|
|
assert.Equal(t, outTK, out)
|
2017-08-12 23:08:00 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_ACLTokenDelete(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-08-21 02:59:25 +00:00
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
2017-08-12 23:08:00 +00:00
|
|
|
p1 := mock.ACLToken()
|
2017-08-13 21:30:31 +00:00
|
|
|
p1.AccessorID = ""
|
2017-08-12 23:08:00 +00:00
|
|
|
args := structs.ACLTokenUpsertRequest{
|
2017-08-21 04:05:28 +00:00
|
|
|
Tokens: []*structs.ACLToken{p1},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
2017-10-12 22:16:33 +00:00
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
2017-08-21 04:05:28 +00:00
|
|
|
},
|
2017-08-12 23:08:00 +00:00
|
|
|
}
|
2017-08-13 21:30:31 +00:00
|
|
|
var resp structs.ACLTokenUpsertResponse
|
2017-08-12 23:08:00 +00:00
|
|
|
if err := s.Agent.RPC("ACL.UpsertTokens", &args, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2017-08-13 21:30:31 +00:00
|
|
|
ID := resp.Tokens[0].AccessorID
|
2017-08-12 23:08:00 +00:00
|
|
|
|
|
|
|
// Make the HTTP request
|
2017-08-13 21:30:31 +00:00
|
|
|
req, err := http.NewRequest("DELETE", "/v1/acl/token/"+ID, nil)
|
2017-08-12 23:08:00 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-04 22:06:21 +00:00
|
|
|
setToken(req, s.RootToken)
|
2017-08-12 23:08:00 +00:00
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.ACLTokenSpecificRequest(respW, req)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Nil(t, obj)
|
|
|
|
|
|
|
|
// Check for the index
|
|
|
|
if respW.HeaderMap.Get("X-Nomad-Index") == "" {
|
|
|
|
t.Fatalf("missing index")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check token was created
|
|
|
|
state := s.Agent.server.State()
|
2017-08-13 21:30:31 +00:00
|
|
|
out, err := state.ACLTokenByAccessorID(nil, ID)
|
2017-08-12 23:08:00 +00:00
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Nil(t, out)
|
|
|
|
})
|
|
|
|
}
|
2021-02-25 21:41:00 +00:00
|
|
|
|
|
|
|
func TestHTTP_OneTimeToken(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
|
|
|
|
// Setup the ACL token
|
|
|
|
|
|
|
|
p1 := mock.ACLToken()
|
|
|
|
p1.AccessorID = ""
|
|
|
|
args := structs.ACLTokenUpsertRequest{
|
|
|
|
Tokens: []*structs.ACLToken{p1},
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Region: "global",
|
|
|
|
AuthToken: s.RootToken.SecretID,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp structs.ACLTokenUpsertResponse
|
|
|
|
err := s.Agent.RPC("ACL.UpsertTokens", &args, &resp)
|
|
|
|
require.NoError(t, err)
|
|
|
|
aclID := resp.Tokens[0].AccessorID
|
|
|
|
aclSecret := resp.Tokens[0].SecretID
|
|
|
|
|
|
|
|
// Make a HTTP request to get a one-time token
|
|
|
|
|
|
|
|
req, err := http.NewRequest("POST", "/v1/acl/token/onetime", nil)
|
|
|
|
require.NoError(t, err)
|
|
|
|
req.Header.Set("X-Nomad-Token", aclSecret)
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
obj, err := s.Server.UpsertOneTimeToken(respW, req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, obj)
|
|
|
|
|
|
|
|
ott := obj.(structs.OneTimeTokenUpsertResponse)
|
|
|
|
require.Equal(t, aclID, ott.OneTimeToken.AccessorID)
|
|
|
|
require.NotEqual(t, "", ott.OneTimeToken.OneTimeSecretID)
|
|
|
|
|
|
|
|
// Make a HTTP request to exchange that token
|
|
|
|
|
|
|
|
buf := encodeReq(structs.OneTimeTokenExchangeRequest{
|
|
|
|
OneTimeSecretID: ott.OneTimeToken.OneTimeSecretID})
|
|
|
|
req, err = http.NewRequest("POST", "/v1/acl/token/onetime/exchange", buf)
|
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
|
|
|
|
obj, err = s.Server.ExchangeOneTimeToken(respW, req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, obj)
|
|
|
|
|
|
|
|
token := obj.(structs.OneTimeTokenExchangeResponse)
|
|
|
|
require.Equal(t, aclID, token.Token.AccessorID)
|
|
|
|
require.Equal(t, aclSecret, token.Token.SecretID)
|
|
|
|
|
|
|
|
// Making the same request a second time should return an error
|
|
|
|
|
|
|
|
buf = encodeReq(structs.OneTimeTokenExchangeRequest{
|
|
|
|
OneTimeSecretID: ott.OneTimeToken.OneTimeSecretID})
|
|
|
|
req, err = http.NewRequest("POST", "/v1/acl/token/onetime/exchange", buf)
|
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
|
|
|
|
obj, err = s.Server.ExchangeOneTimeToken(respW, req)
|
|
|
|
require.EqualError(t, err, structs.ErrPermissionDenied.Error())
|
|
|
|
})
|
|
|
|
}
|