2023-02-09 21:18:58 +00:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-02-17 19:38:03 +00:00
|
|
|
"fmt"
|
2023-02-10 20:56:00 +00:00
|
|
|
"net/http"
|
2023-02-09 21:18:58 +00:00
|
|
|
"strings"
|
|
|
|
"sync/atomic"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/hashicorp/go-uuid"
|
2023-02-20 16:24:27 +00:00
|
|
|
"github.com/hashicorp/vault/api"
|
2023-02-09 21:18:58 +00:00
|
|
|
"github.com/hashicorp/vault/helper/namespace"
|
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
|
|
"github.com/hashicorp/vault/vault"
|
|
|
|
"nhooyr.io/websocket"
|
|
|
|
)
|
|
|
|
|
|
|
|
// TestEventsSubscribe tests the websocket endpoint for subscribing to events
|
|
|
|
// by generating some events.
|
|
|
|
func TestEventsSubscribe(t *testing.T) {
|
|
|
|
core := vault.TestCore(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
2023-02-10 20:56:00 +00:00
|
|
|
// unseal the core
|
|
|
|
keys, token := vault.TestCoreInit(t, core)
|
|
|
|
for _, key := range keys {
|
|
|
|
_, err := core.Unseal(key)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-09 21:18:58 +00:00
|
|
|
stop := atomic.Bool{}
|
|
|
|
|
2023-02-20 16:24:27 +00:00
|
|
|
const eventType = "abc"
|
2023-02-09 21:18:58 +00:00
|
|
|
|
|
|
|
// send some events
|
|
|
|
go func() {
|
|
|
|
for !stop.Load() {
|
|
|
|
id, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
core.Logger().Info("Error generating UUID, exiting sender", "error", err)
|
|
|
|
}
|
2023-02-20 16:24:27 +00:00
|
|
|
pluginInfo := &logical.EventPluginInfo{
|
|
|
|
MountPath: "secret",
|
|
|
|
}
|
|
|
|
err = core.Events().SendInternal(namespace.RootContext(context.Background()), namespace.RootNamespace, pluginInfo, logical.EventType(eventType), &logical.EventData{
|
2023-02-09 21:18:58 +00:00
|
|
|
Id: id,
|
|
|
|
Metadata: nil,
|
|
|
|
EntityIds: nil,
|
|
|
|
Note: "testing",
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
core.Logger().Info("Error sending event, exiting sender", "error", err)
|
|
|
|
}
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
t.Cleanup(func() {
|
|
|
|
stop.Store(true)
|
|
|
|
})
|
|
|
|
|
2023-02-20 16:24:27 +00:00
|
|
|
ctx := context.Background()
|
2023-02-09 21:18:58 +00:00
|
|
|
wsAddr := strings.Replace(addr, "http", "ws", 1)
|
2023-02-10 20:56:00 +00:00
|
|
|
|
2023-02-17 19:38:03 +00:00
|
|
|
testCases := []struct {
|
|
|
|
json bool
|
|
|
|
}{{true}, {false}}
|
2023-02-10 20:56:00 +00:00
|
|
|
|
2023-02-17 19:38:03 +00:00
|
|
|
for _, testCase := range testCases {
|
|
|
|
url := fmt.Sprintf("%s/v1/sys/events/subscribe/%s?json=%v", wsAddr, eventType, testCase.json)
|
|
|
|
conn, _, err := websocket.Dial(ctx, url, &websocket.DialOptions{
|
|
|
|
HTTPHeader: http.Header{"x-vault-token": []string{token}},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
t.Cleanup(func() {
|
|
|
|
conn.Close(websocket.StatusNormalClosure, "")
|
|
|
|
})
|
|
|
|
|
|
|
|
_, msg, err := conn.Read(ctx)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if testCase.json {
|
|
|
|
msgJson := strings.TrimSpace(string(msg))
|
|
|
|
if !strings.HasPrefix(msgJson, "{") || !strings.HasSuffix(msgJson, "}") {
|
|
|
|
t.Errorf("Expected to get JSON event but got: %v", msgJson)
|
|
|
|
}
|
|
|
|
}
|
2023-02-09 21:18:58 +00:00
|
|
|
}
|
|
|
|
}
|
2023-02-20 16:24:27 +00:00
|
|
|
|
|
|
|
// TestEventsSubscribeAuth tests that unauthenticated and unauthorized subscriptions
|
|
|
|
// fail correctly.
|
|
|
|
func TestEventsSubscribeAuth(t *testing.T) {
|
|
|
|
core := vault.TestCore(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
// unseal the core
|
|
|
|
keys, root := vault.TestCoreInit(t, core)
|
|
|
|
for _, key := range keys {
|
|
|
|
_, err := core.Unseal(key)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var nonPrivilegedToken string
|
|
|
|
// Fetch a valid non privileged token.
|
|
|
|
{
|
|
|
|
config := api.DefaultConfig()
|
|
|
|
config.Address = addr
|
|
|
|
|
|
|
|
client, err := api.NewClient(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
client.SetToken(root)
|
|
|
|
|
|
|
|
secret, err := client.Auth().Token().Create(&api.TokenCreateRequest{Policies: []string{"default"}})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if secret.Auth.ClientToken == "" {
|
|
|
|
t.Fatal("Failed to fetch a non privileged token")
|
|
|
|
}
|
|
|
|
nonPrivilegedToken = secret.Auth.ClientToken
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
wsAddr := strings.Replace(addr, "http", "ws", 1)
|
|
|
|
|
|
|
|
// Get a 403 with no token.
|
|
|
|
_, resp, err := websocket.Dial(ctx, wsAddr+"/v1/sys/events/subscribe/abc", nil)
|
|
|
|
if err == nil {
|
|
|
|
t.Error("Expected websocket error but got none")
|
|
|
|
}
|
|
|
|
if resp == nil || resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Expected 403 but got %+v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get a 403 with a non privileged token.
|
|
|
|
_, resp, err = websocket.Dial(ctx, wsAddr+"/v1/sys/events/subscribe/abc", &websocket.DialOptions{
|
|
|
|
HTTPHeader: http.Header{"x-vault-token": []string{nonPrivilegedToken}},
|
|
|
|
})
|
|
|
|
if err == nil {
|
|
|
|
t.Error("Expected websocket error but got none")
|
|
|
|
}
|
|
|
|
if resp == nil || resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Errorf("Expected 403 but got %+v", resp)
|
|
|
|
}
|
|
|
|
}
|