2015-04-01 03:24:51 +00:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
2016-07-06 16:25:40 +00:00
|
|
|
"encoding/json"
|
2015-04-01 03:24:51 +00:00
|
|
|
"reflect"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/vault"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestSysAuth(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
TestServerAuth(t, addr, token)
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp := testHttpGet(t, token, addr+"/v1/sys/auth")
|
2015-04-01 03:24:51 +00:00
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
2016-08-08 20:00:31 +00:00
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"token/": map[string]interface{}{
|
|
|
|
"description": "token based credentials",
|
|
|
|
"type": "token",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
|
|
|
},
|
2015-04-05 00:42:19 +00:00
|
|
|
"token/": map[string]interface{}{
|
2015-04-01 03:24:51 +00:00
|
|
|
"description": "token based credentials",
|
|
|
|
"type": "token",
|
2016-06-20 19:55:21 +00:00
|
|
|
"config": map[string]interface{}{
|
2016-07-06 16:25:40 +00:00
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-06-20 19:55:21 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2015-04-01 03:24:51 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
2016-08-08 20:00:31 +00:00
|
|
|
|
|
|
|
expected["request_id"] = actual["request_id"]
|
2017-06-26 17:14:36 +00:00
|
|
|
for k, v := range actual["data"].(map[string]interface{}) {
|
|
|
|
if v.(map[string]interface{})["accessor"] == "" {
|
|
|
|
t.Fatalf("no accessor from %s", k)
|
|
|
|
}
|
|
|
|
expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
|
|
|
expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
|
|
|
}
|
2016-08-08 20:00:31 +00:00
|
|
|
|
2015-04-01 03:24:51 +00:00
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
2016-06-20 19:55:21 +00:00
|
|
|
t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
|
2015-04-01 03:24:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSysEnableAuth(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
TestServerAuth(t, addr, token)
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp := testHttpPost(t, token, addr+"/v1/sys/auth/foo", map[string]interface{}{
|
2015-04-01 03:24:51 +00:00
|
|
|
"type": "noop",
|
|
|
|
"description": "foo",
|
|
|
|
})
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp = testHttpGet(t, token, addr+"/v1/sys/auth")
|
2015-04-01 03:24:51 +00:00
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
2016-08-08 20:00:31 +00:00
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"foo/": map[string]interface{}{
|
|
|
|
"description": "foo",
|
|
|
|
"type": "noop",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": map[string]interface{}{},
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
|
|
|
"token/": map[string]interface{}{
|
|
|
|
"description": "token based credentials",
|
|
|
|
"type": "token",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
|
|
|
},
|
2015-04-05 00:42:19 +00:00
|
|
|
"foo/": map[string]interface{}{
|
2015-04-01 03:24:51 +00:00
|
|
|
"description": "foo",
|
|
|
|
"type": "noop",
|
2016-06-20 19:55:21 +00:00
|
|
|
"config": map[string]interface{}{
|
2016-07-06 16:25:40 +00:00
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-06-20 19:55:21 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": map[string]interface{}{},
|
2015-04-01 03:24:51 +00:00
|
|
|
},
|
2015-04-05 00:42:19 +00:00
|
|
|
"token/": map[string]interface{}{
|
2015-04-01 03:24:51 +00:00
|
|
|
"description": "token based credentials",
|
|
|
|
"type": "token",
|
2016-06-20 19:55:21 +00:00
|
|
|
"config": map[string]interface{}{
|
2016-07-06 16:25:40 +00:00
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-06-20 19:55:21 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2015-04-01 03:24:51 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
2016-08-08 20:00:31 +00:00
|
|
|
|
|
|
|
expected["request_id"] = actual["request_id"]
|
2017-06-26 17:14:36 +00:00
|
|
|
for k, v := range actual["data"].(map[string]interface{}) {
|
|
|
|
if v.(map[string]interface{})["accessor"] == "" {
|
|
|
|
t.Fatalf("no accessor from %s", k)
|
|
|
|
}
|
|
|
|
expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
|
|
|
expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
|
|
|
}
|
2016-08-08 20:00:31 +00:00
|
|
|
|
2015-04-01 03:24:51 +00:00
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
2016-06-20 19:55:21 +00:00
|
|
|
t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
|
2015-04-01 03:24:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSysDisableAuth(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
TestServerAuth(t, addr, token)
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp := testHttpPost(t, token, addr+"/v1/sys/auth/foo", map[string]interface{}{
|
2015-04-01 03:24:51 +00:00
|
|
|
"type": "noop",
|
|
|
|
"description": "foo",
|
|
|
|
})
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp = testHttpDelete(t, token, addr+"/v1/sys/auth/foo")
|
2015-04-01 03:24:51 +00:00
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp = testHttpGet(t, token, addr+"/v1/sys/auth")
|
2015-04-01 03:24:51 +00:00
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
2016-08-08 20:00:31 +00:00
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"token/": map[string]interface{}{
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
|
|
|
"description": "token based credentials",
|
|
|
|
"type": "token",
|
2017-02-16 20:15:02 +00:00
|
|
|
"local": false,
|
2017-11-13 16:22:22 +00:00
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
|
|
|
},
|
2015-04-05 00:42:19 +00:00
|
|
|
"token/": map[string]interface{}{
|
2016-06-20 19:55:21 +00:00
|
|
|
"config": map[string]interface{}{
|
2016-07-06 16:25:40 +00:00
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2018-03-09 19:32:28 +00:00
|
|
|
"plugin_name": "",
|
2016-06-20 19:55:21 +00:00
|
|
|
},
|
2015-04-01 03:24:51 +00:00
|
|
|
"description": "token based credentials",
|
|
|
|
"type": "token",
|
2017-02-16 20:15:02 +00:00
|
|
|
"local": false,
|
2017-11-13 16:22:22 +00:00
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2015-04-01 03:24:51 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
2016-08-08 20:00:31 +00:00
|
|
|
|
|
|
|
expected["request_id"] = actual["request_id"]
|
2017-06-26 17:14:36 +00:00
|
|
|
for k, v := range actual["data"].(map[string]interface{}) {
|
|
|
|
if v.(map[string]interface{})["accessor"] == "" {
|
|
|
|
t.Fatalf("no accessor from %s", k)
|
|
|
|
}
|
|
|
|
expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
|
|
|
expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
|
|
|
}
|
2016-08-08 20:00:31 +00:00
|
|
|
|
2015-04-01 03:24:51 +00:00
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
2016-06-20 19:55:21 +00:00
|
|
|
t.Fatalf("bad: expected:%#v\nactual:%#v", expected, actual)
|
2015-04-01 03:24:51 +00:00
|
|
|
}
|
|
|
|
}
|
2018-03-20 03:16:33 +00:00
|
|
|
|
|
|
|
func TestSysTuneAuth_nonHMACKeys(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
TestServerAuth(t, addr, token)
|
|
|
|
|
|
|
|
// Mount-tune the audit_non_hmac_request_keys
|
|
|
|
resp := testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
|
|
|
|
"audit_non_hmac_request_keys": "foo",
|
|
|
|
})
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
|
|
|
// Mount-tune the audit_non_hmac_response_keys
|
|
|
|
resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
|
|
|
|
"audit_non_hmac_response_keys": "bar",
|
|
|
|
})
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
|
|
|
// Check results
|
|
|
|
resp = testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
|
|
|
|
actual := map[string]interface{}{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"audit_non_hmac_request_keys": []interface{}{"foo"},
|
|
|
|
"audit_non_hmac_response_keys": []interface{}{"bar"},
|
|
|
|
},
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"audit_non_hmac_request_keys": []interface{}{"foo"},
|
|
|
|
"audit_non_hmac_response_keys": []interface{}{"bar"},
|
|
|
|
}
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
expected["request_id"] = actual["request_id"]
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unset those mount tune values
|
|
|
|
resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
|
|
|
|
"audit_non_hmac_request_keys": "",
|
|
|
|
})
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
|
|
|
resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
|
|
|
|
"audit_non_hmac_response_keys": "",
|
|
|
|
})
|
|
|
|
|
|
|
|
// Check results
|
|
|
|
resp = testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
|
|
|
|
actual = map[string]interface{}{}
|
|
|
|
expected = map[string]interface{}{
|
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
},
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
}
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
expected["request_id"] = actual["request_id"]
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSysTuneAuth_showUIMount(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
TestServerAuth(t, addr, token)
|
|
|
|
|
|
|
|
// Get original tune values, ensure that listing_visibility is not set
|
|
|
|
resp := testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
|
|
|
|
actual := map[string]interface{}{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
},
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
}
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
expected["request_id"] = actual["request_id"]
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mount-tune the listing_visibility
|
|
|
|
resp = testHttpPost(t, token, addr+"/v1/sys/auth/token/tune", map[string]interface{}{
|
|
|
|
"listing_visibility": "unauth",
|
|
|
|
})
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
|
|
|
// Check results
|
|
|
|
resp = testHttpGet(t, token, addr+"/v1/sys/auth/token/tune")
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
|
|
|
|
actual = map[string]interface{}{}
|
|
|
|
expected = map[string]interface{}{
|
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"listing_visibility": "unauth",
|
|
|
|
},
|
|
|
|
"default_lease_ttl": json.Number("2764800"),
|
|
|
|
"max_lease_ttl": json.Number("2764800"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"listing_visibility": "unauth",
|
|
|
|
}
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
expected["request_id"] = actual["request_id"]
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual)
|
|
|
|
}
|
|
|
|
}
|