open-vault/http/sys_auth_test.go

205 lines
5.8 KiB
Go
Raw Normal View History

2015-04-01 03:24:51 +00:00
package http
import (
"encoding/json"
2015-04-01 03:24:51 +00:00
"reflect"
"testing"
"github.com/hashicorp/vault/vault"
)
func TestSysAuth(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
2015-08-22 00:36:19 +00:00
resp := testHttpGet(t, token, addr+"/v1/sys/auth")
2015-04-01 03:24:51 +00:00
var actual map[string]interface{}
expected := map[string]interface{}{
2016-08-08 20:00:31 +00:00
"lease_id": "",
"renewable": false,
"lease_duration": json.Number("0"),
"wrap_info": nil,
"warnings": nil,
"auth": nil,
"data": map[string]interface{}{
"token/": map[string]interface{}{
"description": "token based credentials",
"type": "token",
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
},
"local": false,
2016-08-08 20:00:31 +00:00
},
},
2015-04-05 00:42:19 +00:00
"token/": map[string]interface{}{
2015-04-01 03:24:51 +00:00
"description": "token based credentials",
"type": "token",
2016-06-20 19:55:21 +00:00
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
2016-06-20 19:55:21 +00:00
},
"local": false,
2015-04-01 03:24:51 +00:00
},
}
testResponseStatus(t, resp, 200)
testResponseBody(t, resp, &actual)
2016-08-08 20:00:31 +00:00
expected["request_id"] = actual["request_id"]
for k, v := range actual["data"].(map[string]interface{}) {
if v.(map[string]interface{})["accessor"] == "" {
t.Fatalf("no accessor from %s", k)
}
expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
}
2016-08-08 20:00:31 +00:00
2015-04-01 03:24:51 +00:00
if !reflect.DeepEqual(actual, expected) {
2016-06-20 19:55:21 +00:00
t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
2015-04-01 03:24:51 +00:00
}
}
func TestSysEnableAuth(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
2015-08-22 00:36:19 +00:00
resp := testHttpPost(t, token, addr+"/v1/sys/auth/foo", map[string]interface{}{
2015-04-01 03:24:51 +00:00
"type": "noop",
"description": "foo",
})
testResponseStatus(t, resp, 204)
2015-08-22 00:36:19 +00:00
resp = testHttpGet(t, token, addr+"/v1/sys/auth")
2015-04-01 03:24:51 +00:00
var actual map[string]interface{}
expected := map[string]interface{}{
2016-08-08 20:00:31 +00:00
"lease_id": "",
"renewable": false,
"lease_duration": json.Number("0"),
"wrap_info": nil,
"warnings": nil,
"auth": nil,
"data": map[string]interface{}{
"foo/": map[string]interface{}{
"description": "foo",
"type": "noop",
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
},
"local": false,
2016-08-08 20:00:31 +00:00
},
"token/": map[string]interface{}{
"description": "token based credentials",
"type": "token",
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
},
"local": false,
2016-08-08 20:00:31 +00:00
},
},
2015-04-05 00:42:19 +00:00
"foo/": map[string]interface{}{
2015-04-01 03:24:51 +00:00
"description": "foo",
"type": "noop",
2016-06-20 19:55:21 +00:00
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
2016-06-20 19:55:21 +00:00
},
"local": false,
2015-04-01 03:24:51 +00:00
},
2015-04-05 00:42:19 +00:00
"token/": map[string]interface{}{
2015-04-01 03:24:51 +00:00
"description": "token based credentials",
"type": "token",
2016-06-20 19:55:21 +00:00
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
2016-06-20 19:55:21 +00:00
},
"local": false,
2015-04-01 03:24:51 +00:00
},
}
testResponseStatus(t, resp, 200)
testResponseBody(t, resp, &actual)
2016-08-08 20:00:31 +00:00
expected["request_id"] = actual["request_id"]
for k, v := range actual["data"].(map[string]interface{}) {
if v.(map[string]interface{})["accessor"] == "" {
t.Fatalf("no accessor from %s", k)
}
expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
}
2016-08-08 20:00:31 +00:00
2015-04-01 03:24:51 +00:00
if !reflect.DeepEqual(actual, expected) {
2016-06-20 19:55:21 +00:00
t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
2015-04-01 03:24:51 +00:00
}
}
func TestSysDisableAuth(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
2015-08-22 00:36:19 +00:00
resp := testHttpPost(t, token, addr+"/v1/sys/auth/foo", map[string]interface{}{
2015-04-01 03:24:51 +00:00
"type": "noop",
"description": "foo",
})
testResponseStatus(t, resp, 204)
2015-08-22 00:36:19 +00:00
resp = testHttpDelete(t, token, addr+"/v1/sys/auth/foo")
2015-04-01 03:24:51 +00:00
testResponseStatus(t, resp, 204)
2015-08-22 00:36:19 +00:00
resp = testHttpGet(t, token, addr+"/v1/sys/auth")
2015-04-01 03:24:51 +00:00
var actual map[string]interface{}
expected := map[string]interface{}{
2016-08-08 20:00:31 +00:00
"lease_id": "",
"renewable": false,
"lease_duration": json.Number("0"),
"wrap_info": nil,
"warnings": nil,
"auth": nil,
"data": map[string]interface{}{
"token/": map[string]interface{}{
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
},
"description": "token based credentials",
"type": "token",
"local": false,
2016-08-08 20:00:31 +00:00
},
},
2015-04-05 00:42:19 +00:00
"token/": map[string]interface{}{
2016-06-20 19:55:21 +00:00
"config": map[string]interface{}{
"default_lease_ttl": json.Number("0"),
"max_lease_ttl": json.Number("0"),
2016-06-20 19:55:21 +00:00
},
2015-04-01 03:24:51 +00:00
"description": "token based credentials",
"type": "token",
"local": false,
2015-04-01 03:24:51 +00:00
},
}
testResponseStatus(t, resp, 200)
testResponseBody(t, resp, &actual)
2016-08-08 20:00:31 +00:00
expected["request_id"] = actual["request_id"]
for k, v := range actual["data"].(map[string]interface{}) {
if v.(map[string]interface{})["accessor"] == "" {
t.Fatalf("no accessor from %s", k)
}
expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
}
2016-08-08 20:00:31 +00:00
2015-04-01 03:24:51 +00:00
if !reflect.DeepEqual(actual, expected) {
2016-06-20 19:55:21 +00:00
t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
2015-04-01 03:24:51 +00:00
}
}