2015-04-13 21:12:03 +00:00
package audit
import (
"bytes"
2016-01-07 20:10:05 +00:00
"encoding/json"
2015-08-05 14:44:48 +00:00
"strings"
2015-04-13 21:12:03 +00:00
"testing"
2016-05-08 01:08:13 +00:00
"time"
2015-04-13 21:12:03 +00:00
2015-06-19 03:14:20 +00:00
"errors"
2016-01-07 20:10:05 +00:00
2016-07-06 16:25:40 +00:00
"github.com/hashicorp/vault/helper/jsonutil"
2016-09-21 14:29:42 +00:00
"github.com/hashicorp/vault/helper/salt"
2016-01-07 20:10:05 +00:00
"github.com/hashicorp/vault/logical"
2015-04-13 21:12:03 +00:00
)
func TestFormatJSON_formatRequest ( t * testing . T ) {
2017-05-24 00:36:20 +00:00
salter , err := salt . NewSalt ( nil , nil )
if err != nil {
t . Fatal ( err )
}
saltFunc := func ( ) ( * salt . Salt , error ) {
return salter , nil
}
2015-04-13 21:12:03 +00:00
cases := map [ string ] struct {
Auth * logical . Auth
Req * logical . Request
2015-06-19 03:14:20 +00:00
Err error
2017-02-11 00:56:28 +00:00
Prefix string
2015-04-13 21:12:03 +00:00
Result string
} {
"auth, request" : {
& logical . Auth { ClientToken : "foo" , Policies : [ ] string { "root" } } ,
& logical . Request {
2016-01-07 15:30:47 +00:00
Operation : logical . UpdateOperation ,
2015-04-13 21:12:03 +00:00
Path : "/foo" ,
2015-06-19 03:14:20 +00:00
Connection : & logical . Connection {
RemoteAddr : "127.0.0.1" ,
} ,
2017-01-04 21:44:03 +00:00
WrapInfo : & logical . RequestWrapInfo {
TTL : 60 * time . Second ,
} ,
2017-02-02 19:49:20 +00:00
Headers : map [ string ] [ ] string {
"foo" : [ ] string { "bar" } ,
} ,
2015-04-13 21:12:03 +00:00
} ,
2015-06-19 03:14:20 +00:00
errors . New ( "this is an error" ) ,
2017-02-11 00:56:28 +00:00
"" ,
testFormatJSONReqBasicStr ,
} ,
"auth, request with prefix" : {
& logical . Auth { ClientToken : "foo" , Policies : [ ] string { "root" } } ,
& logical . Request {
Operation : logical . UpdateOperation ,
Path : "/foo" ,
Connection : & logical . Connection {
RemoteAddr : "127.0.0.1" ,
} ,
WrapInfo : & logical . RequestWrapInfo {
TTL : 60 * time . Second ,
} ,
Headers : map [ string ] [ ] string {
"foo" : [ ] string { "bar" } ,
} ,
} ,
errors . New ( "this is an error" ) ,
"@cee: " ,
2015-04-13 21:12:03 +00:00
testFormatJSONReqBasicStr ,
} ,
}
for name , tc := range cases {
var buf bytes . Buffer
2016-09-21 14:29:42 +00:00
formatter := AuditFormatter {
2017-02-11 00:56:28 +00:00
AuditFormatWriter : & JSONFormatWriter {
2017-05-24 00:36:20 +00:00
Prefix : tc . Prefix ,
SaltFunc : saltFunc ,
2017-02-11 00:56:28 +00:00
} ,
2016-09-21 14:29:42 +00:00
}
2017-05-24 00:36:20 +00:00
config := FormatterConfig { }
2016-09-21 14:29:42 +00:00
if err := formatter . FormatRequest ( & buf , config , tc . Auth , tc . Req , tc . Err ) ; err != nil {
2015-04-13 21:12:03 +00:00
t . Fatalf ( "bad: %s\nerr: %s" , name , err )
}
2017-02-11 00:56:28 +00:00
if ! strings . HasPrefix ( buf . String ( ) , tc . Prefix ) {
t . Fatalf ( "no prefix: %s \n log: %s\nprefix: %s" , name , tc . Result , tc . Prefix )
}
2016-09-21 14:29:42 +00:00
var expectedjson = new ( AuditRequestEntry )
2016-07-06 16:25:40 +00:00
if err := jsonutil . DecodeJSON ( [ ] byte ( tc . Result ) , & expectedjson ) ; err != nil {
2015-08-05 14:44:48 +00:00
t . Fatalf ( "bad json: %s" , err )
}
2016-09-21 14:29:42 +00:00
var actualjson = new ( AuditRequestEntry )
2017-02-11 00:56:28 +00:00
if err := jsonutil . DecodeJSON ( [ ] byte ( buf . String ( ) ) [ len ( tc . Prefix ) : ] , & actualjson ) ; err != nil {
2015-08-05 14:44:48 +00:00
t . Fatalf ( "bad json: %s" , err )
}
expectedjson . Time = actualjson . Time
expectedBytes , err := json . Marshal ( expectedjson )
if err != nil {
t . Fatalf ( "unable to marshal json: %s" , err )
}
2017-02-11 00:56:28 +00:00
if ! strings . HasSuffix ( strings . TrimSpace ( buf . String ( ) ) , string ( expectedBytes ) ) {
2015-04-13 21:12:03 +00:00
t . Fatalf (
2015-08-05 14:44:48 +00:00
"bad: %s\nResult:\n\n'%s'\n\nExpected:\n\n'%s'" ,
name , buf . String ( ) , string ( expectedBytes ) )
2015-04-13 21:12:03 +00:00
}
}
}
2017-02-02 19:49:20 +00:00
const testFormatJSONReqBasicStr = ` { "time" : "2015-08-05T13:45:46Z" , "type" : "request" , "auth" : { "display_name" : "" , "policies" : [ "root" ] , "metadata" : null } , "request" : { "operation" : "update" , "path" : "/foo" , "data" : null , "wrap_ttl" : 60 , "remote_address" : "127.0.0.1" , "headers" : { "foo" : [ "bar" ] } } , "error" : "this is an error" }
2015-04-13 21:12:03 +00:00
`