2015-05-11 17:56:41 +00:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
2018-01-19 06:44:44 +00:00
|
|
|
"context"
|
2016-07-06 16:25:40 +00:00
|
|
|
"encoding/json"
|
2015-08-10 17:27:25 +00:00
|
|
|
"errors"
|
2015-05-11 17:56:41 +00:00
|
|
|
"net/http"
|
2015-08-10 17:27:25 +00:00
|
|
|
"net/http/httptest"
|
2018-09-18 03:03:00 +00:00
|
|
|
"net/textproto"
|
2015-05-11 17:56:41 +00:00
|
|
|
"reflect"
|
2017-08-07 14:03:30 +00:00
|
|
|
"strings"
|
2015-05-11 17:56:41 +00:00
|
|
|
"testing"
|
|
|
|
|
2018-10-01 17:33:21 +00:00
|
|
|
"github.com/hashicorp/vault/helper/namespace"
|
|
|
|
|
2015-10-22 18:37:12 +00:00
|
|
|
"github.com/hashicorp/go-cleanhttp"
|
2017-02-16 20:15:02 +00:00
|
|
|
"github.com/hashicorp/vault/helper/consts"
|
2015-08-10 17:27:25 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
2015-05-11 17:56:41 +00:00
|
|
|
"github.com/hashicorp/vault/vault"
|
|
|
|
)
|
|
|
|
|
2018-09-18 03:03:00 +00:00
|
|
|
func TestHandler_parseMFAHandler(t *testing.T) {
|
|
|
|
var err error
|
|
|
|
var expectedMFACreds logical.MFACreds
|
|
|
|
req := &logical.Request{
|
|
|
|
Headers: make(map[string][]string),
|
|
|
|
}
|
|
|
|
|
|
|
|
headerName := textproto.CanonicalMIMEHeaderKey(MFAHeaderName)
|
|
|
|
|
|
|
|
// Set TOTP passcode in the MFA header
|
|
|
|
req.Headers[headerName] = []string{
|
|
|
|
"my_totp:123456",
|
|
|
|
"my_totp:111111",
|
|
|
|
"my_second_mfa:hi=hello",
|
|
|
|
"my_third_mfa",
|
|
|
|
}
|
|
|
|
err = parseMFAHeader(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify that it is being parsed properly
|
|
|
|
expectedMFACreds = logical.MFACreds{
|
|
|
|
"my_totp": []string{
|
|
|
|
"123456",
|
|
|
|
"111111",
|
|
|
|
},
|
|
|
|
"my_second_mfa": []string{
|
|
|
|
"hi=hello",
|
|
|
|
},
|
|
|
|
"my_third_mfa": []string{},
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(expectedMFACreds, req.MFACreds) {
|
|
|
|
t.Fatalf("bad: parsed MFACreds; expected: %#v\n actual: %#v\n", expectedMFACreds, req.MFACreds)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Split the creds of a method type in different headers and check if they
|
|
|
|
// all get merged together
|
|
|
|
req.Headers[headerName] = []string{
|
|
|
|
"my_mfa:passcode=123456",
|
|
|
|
"my_mfa:month=july",
|
|
|
|
"my_mfa:day=tuesday",
|
|
|
|
}
|
|
|
|
err = parseMFAHeader(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
expectedMFACreds = logical.MFACreds{
|
|
|
|
"my_mfa": []string{
|
|
|
|
"passcode=123456",
|
|
|
|
"month=july",
|
|
|
|
"day=tuesday",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(expectedMFACreds, req.MFACreds) {
|
|
|
|
t.Fatalf("bad: parsed MFACreds; expected: %#v\n actual: %#v\n", expectedMFACreds, req.MFACreds)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Header without method name should error out
|
|
|
|
req.Headers[headerName] = []string{
|
|
|
|
":passcode=123456",
|
|
|
|
}
|
|
|
|
err = parseMFAHeader(req)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected an error; actual: %#v\n", req.MFACreds)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Header without method name and method value should error out
|
|
|
|
req.Headers[headerName] = []string{
|
|
|
|
":",
|
|
|
|
}
|
|
|
|
err = parseMFAHeader(req)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected an error; actual: %#v\n", req.MFACreds)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Header without method name and method value should error out
|
|
|
|
req.Headers[headerName] = []string{
|
|
|
|
"my_totp:",
|
|
|
|
}
|
|
|
|
err = parseMFAHeader(req)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected an error; actual: %#v\n", req.MFACreds)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-17 04:04:55 +00:00
|
|
|
func TestHandler_cors(t *testing.T) {
|
|
|
|
core, _, _ := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
// Enable CORS and allow from any origin for testing.
|
|
|
|
corsConfig := core.CORSConfig()
|
2018-01-19 06:44:44 +00:00
|
|
|
err := corsConfig.Enable(context.Background(), []string{addr}, nil)
|
2017-06-17 04:04:55 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error enabling CORS: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err := http.NewRequest(http.MethodOptions, addr+"/v1/sys/seal-status", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
req.Header.Set("Origin", "BAD ORIGIN")
|
|
|
|
|
|
|
|
// Requests from unacceptable origins will be rejected with a 403.
|
|
|
|
client := cleanhttp.DefaultClient()
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusForbidden {
|
|
|
|
t.Fatalf("Bad status:\nexpected: 403 Forbidden\nactual: %s", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Test preflight requests
|
|
|
|
//
|
|
|
|
|
|
|
|
// Set a valid origin
|
|
|
|
req.Header.Set("Origin", addr)
|
|
|
|
|
|
|
|
// Server should NOT accept arbitrary methods.
|
|
|
|
req.Header.Set("Access-Control-Request-Method", "FOO")
|
|
|
|
|
|
|
|
client = cleanhttp.DefaultClient()
|
|
|
|
resp, err = client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fail if an arbitrary method is accepted.
|
|
|
|
if resp.StatusCode != http.StatusMethodNotAllowed {
|
|
|
|
t.Fatalf("Bad status:\nexpected: 405 Method Not Allowed\nactual: %s", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Server SHOULD accept acceptable methods.
|
|
|
|
req.Header.Set("Access-Control-Request-Method", http.MethodPost)
|
|
|
|
|
|
|
|
client = cleanhttp.DefaultClient()
|
|
|
|
resp, err = client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Test that the CORS headers are applied correctly.
|
|
|
|
//
|
|
|
|
expHeaders := map[string]string{
|
|
|
|
"Access-Control-Allow-Origin": addr,
|
2017-08-07 19:02:08 +00:00
|
|
|
"Access-Control-Allow-Headers": strings.Join(vault.StdAllowedHeaders, ","),
|
2017-06-17 04:04:55 +00:00
|
|
|
"Access-Control-Max-Age": "300",
|
2018-10-01 17:33:21 +00:00
|
|
|
"Vary": "Origin",
|
2017-06-17 04:04:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for expHeader, expected := range expHeaders {
|
|
|
|
actual := resp.Header.Get(expHeader)
|
|
|
|
if actual == "" {
|
|
|
|
t.Fatalf("bad:\nHeader: %#v was not on response.", expHeader)
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual != expected {
|
|
|
|
t.Fatalf("bad:\nExpected: %#v\nActual: %#v\n", expected, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-15 22:53:07 +00:00
|
|
|
func TestHandler_CacheControlNoStore(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
req, err := http.NewRequest("GET", addr+"/v1/sys/mounts", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
req.Header.Set(consts.AuthHeaderName, token)
|
2016-12-15 22:53:07 +00:00
|
|
|
req.Header.Set(WrapTTLHeaderName, "60s")
|
|
|
|
|
|
|
|
client := cleanhttp.DefaultClient()
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatalf("nil response")
|
|
|
|
}
|
|
|
|
|
|
|
|
actual := resp.Header.Get("Cache-Control")
|
|
|
|
|
|
|
|
if actual == "" {
|
|
|
|
t.Fatalf("missing 'Cache-Control' header entry in response writer")
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual != "no-store" {
|
|
|
|
t.Fatalf("bad: Cache-Control. Expected: 'no-store', Actual: %q", actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-11 19:45:09 +00:00
|
|
|
func TestHandler_Accepted(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
req, err := http.NewRequest("POST", addr+"/v1/auth/token/tidy", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
req.Header.Set(consts.AuthHeaderName, token)
|
2018-07-11 19:45:09 +00:00
|
|
|
|
|
|
|
client := cleanhttp.DefaultClient()
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testResponseStatus(t, resp, 202)
|
|
|
|
}
|
|
|
|
|
2015-05-11 17:56:41 +00:00
|
|
|
// We use this test to verify header auth
|
|
|
|
func TestSysMounts_headerAuth(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
req, err := http.NewRequest("GET", addr+"/v1/sys/mounts", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
req.Header.Set(consts.AuthHeaderName, token)
|
2015-05-11 17:56:41 +00:00
|
|
|
|
2015-10-22 18:37:12 +00:00
|
|
|
client := cleanhttp.DefaultClient()
|
2015-05-11 17:56:41 +00:00
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
2016-08-08 20:00:31 +00:00
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"wrap_info": nil,
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
"data": map[string]interface{}{
|
|
|
|
"secret/": map[string]interface{}{
|
2017-09-15 13:02:29 +00:00
|
|
|
"description": "key/value secret storage",
|
|
|
|
"type": "kv",
|
2016-08-08 20:00:31 +00:00
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2017-03-08 14:20:09 +00:00
|
|
|
"force_no_cache": false,
|
2017-10-23 21:39:21 +00:00
|
|
|
"plugin_name": "",
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-04-09 20:14:44 +00:00
|
|
|
"options": map[string]interface{}{"version": "1"},
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
|
|
|
"sys/": map[string]interface{}{
|
|
|
|
"description": "system endpoints used for control, policy and debugging",
|
|
|
|
"type": "system",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2017-03-08 14:20:09 +00:00
|
|
|
"force_no_cache": false,
|
2017-10-23 21:39:21 +00:00
|
|
|
"plugin_name": "",
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
|
|
|
"cubbyhole/": map[string]interface{}{
|
|
|
|
"description": "per-token private secret storage",
|
|
|
|
"type": "cubbyhole",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
2017-03-08 14:20:09 +00:00
|
|
|
"force_no_cache": false,
|
2017-10-23 21:39:21 +00:00
|
|
|
"plugin_name": "",
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": true,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2017-10-11 17:21:20 +00:00
|
|
|
"identity/": map[string]interface{}{
|
|
|
|
"description": "identity store",
|
|
|
|
"type": "identity",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
|
|
|
"force_no_cache": false,
|
2017-10-23 21:39:21 +00:00
|
|
|
"plugin_name": "",
|
2017-10-11 17:21:20 +00:00
|
|
|
},
|
2017-11-13 16:22:22 +00:00
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
2018-03-21 19:04:27 +00:00
|
|
|
"options": interface{}(nil),
|
2017-10-11 17:21:20 +00:00
|
|
|
},
|
2016-08-08 20:00:31 +00:00
|
|
|
},
|
2018-09-05 15:45:17 +00:00
|
|
|
"secret/": map[string]interface{}{
|
|
|
|
"description": "key/value secret storage",
|
|
|
|
"type": "kv",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"plugin_name": "",
|
|
|
|
},
|
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
|
|
|
"options": map[string]interface{}{"version": "1"},
|
|
|
|
},
|
|
|
|
"sys/": map[string]interface{}{
|
|
|
|
"description": "system endpoints used for control, policy and debugging",
|
|
|
|
"type": "system",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"plugin_name": "",
|
|
|
|
},
|
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
|
|
|
"options": interface{}(nil),
|
|
|
|
},
|
|
|
|
"cubbyhole/": map[string]interface{}{
|
|
|
|
"description": "per-token private secret storage",
|
|
|
|
"type": "cubbyhole",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"plugin_name": "",
|
|
|
|
},
|
|
|
|
"local": true,
|
|
|
|
"seal_wrap": false,
|
|
|
|
"options": interface{}(nil),
|
|
|
|
},
|
|
|
|
"identity/": map[string]interface{}{
|
|
|
|
"description": "identity store",
|
|
|
|
"type": "identity",
|
|
|
|
"config": map[string]interface{}{
|
|
|
|
"default_lease_ttl": json.Number("0"),
|
|
|
|
"max_lease_ttl": json.Number("0"),
|
|
|
|
"force_no_cache": false,
|
|
|
|
"plugin_name": "",
|
|
|
|
},
|
|
|
|
"local": false,
|
|
|
|
"seal_wrap": false,
|
|
|
|
"options": interface{}(nil),
|
|
|
|
},
|
2015-05-11 17:56:41 +00:00
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
2016-08-08 20:00:31 +00:00
|
|
|
|
|
|
|
expected["request_id"] = actual["request_id"]
|
2017-06-26 17:14:36 +00:00
|
|
|
for k, v := range actual["data"].(map[string]interface{}) {
|
|
|
|
if v.(map[string]interface{})["accessor"] == "" {
|
|
|
|
t.Fatalf("no accessor from %s", k)
|
|
|
|
}
|
2018-09-05 15:45:17 +00:00
|
|
|
expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
2017-06-26 17:14:36 +00:00
|
|
|
expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"]
|
|
|
|
}
|
2016-08-08 20:00:31 +00:00
|
|
|
|
2015-05-11 17:56:41 +00:00
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
2015-08-31 18:27:49 +00:00
|
|
|
t.Fatalf("bad:\nExpected: %#v\nActual: %#v\n", expected, actual)
|
2015-05-11 17:56:41 +00:00
|
|
|
}
|
|
|
|
}
|
2015-05-19 07:59:19 +00:00
|
|
|
|
2016-05-08 01:08:13 +00:00
|
|
|
// We use this test to verify header auth wrapping
|
|
|
|
func TestSysMounts_headerAuth_Wrapped(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
req, err := http.NewRequest("GET", addr+"/v1/sys/mounts", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
req.Header.Set(consts.AuthHeaderName, token)
|
2016-05-08 01:08:13 +00:00
|
|
|
req.Header.Set(WrapTTLHeaderName, "60s")
|
|
|
|
|
|
|
|
client := cleanhttp.DefaultClient()
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-08-08 20:00:31 +00:00
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"request_id": "",
|
|
|
|
"lease_id": "",
|
|
|
|
"renewable": false,
|
|
|
|
"lease_duration": json.Number("0"),
|
|
|
|
"data": nil,
|
|
|
|
"wrap_info": map[string]interface{}{
|
|
|
|
"ttl": json.Number("60"),
|
|
|
|
},
|
|
|
|
"warnings": nil,
|
|
|
|
"auth": nil,
|
|
|
|
}
|
|
|
|
|
2016-05-08 01:08:13 +00:00
|
|
|
testResponseStatus(t, resp, 200)
|
2016-08-08 20:00:31 +00:00
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
|
|
|
|
actualToken, ok := actual["wrap_info"].(map[string]interface{})["token"]
|
|
|
|
if !ok || actualToken == "" {
|
|
|
|
t.Fatal("token missing in wrap info")
|
|
|
|
}
|
|
|
|
expected["wrap_info"].(map[string]interface{})["token"] = actualToken
|
|
|
|
|
|
|
|
actualCreationTime, ok := actual["wrap_info"].(map[string]interface{})["creation_time"]
|
|
|
|
if !ok || actualCreationTime == "" {
|
|
|
|
t.Fatal("creation_time missing in wrap info")
|
|
|
|
}
|
|
|
|
expected["wrap_info"].(map[string]interface{})["creation_time"] = actualCreationTime
|
|
|
|
|
2017-08-02 22:28:58 +00:00
|
|
|
actualCreationPath, ok := actual["wrap_info"].(map[string]interface{})["creation_path"]
|
|
|
|
if !ok || actualCreationPath == "" {
|
|
|
|
t.Fatal("creation_path missing in wrap info")
|
|
|
|
}
|
|
|
|
expected["wrap_info"].(map[string]interface{})["creation_path"] = actualCreationPath
|
|
|
|
|
2017-11-13 20:31:32 +00:00
|
|
|
actualAccessor, ok := actual["wrap_info"].(map[string]interface{})["accessor"]
|
|
|
|
if !ok || actualAccessor == "" {
|
|
|
|
t.Fatal("accessor missing in wrap info")
|
|
|
|
}
|
|
|
|
expected["wrap_info"].(map[string]interface{})["accessor"] = actualAccessor
|
|
|
|
|
2016-08-08 20:00:31 +00:00
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad:\nExpected: %#v\nActual: %#v\n%T %T", expected, actual, actual["warnings"], actual["data"])
|
2016-05-08 01:08:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-19 07:59:19 +00:00
|
|
|
func TestHandler_sealed(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
core.Seal(token)
|
|
|
|
|
|
|
|
resp, err := http.Get(addr + "/v1/secret/foo")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 503)
|
|
|
|
}
|
2015-08-10 17:27:25 +00:00
|
|
|
|
2018-09-18 03:03:00 +00:00
|
|
|
func TestHandler_ui_default(t *testing.T) {
|
|
|
|
core := vault.TestCoreUI(t, false)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
resp, err := http.Get(addr + "/ui/")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 404)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHandler_ui_enabled(t *testing.T) {
|
|
|
|
core := vault.TestCoreUI(t, true)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
resp, err := http.Get(addr + "/ui/")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
}
|
|
|
|
|
2015-08-10 17:27:25 +00:00
|
|
|
func TestHandler_error(t *testing.T) {
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
|
2018-04-09 18:35:21 +00:00
|
|
|
respondError(w, 500, errors.New("test Error"))
|
2015-08-10 17:27:25 +00:00
|
|
|
|
|
|
|
if w.Code != 500 {
|
|
|
|
t.Fatalf("expected 500, got %d", w.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
// The code inside of the error should override
|
|
|
|
// the argument to respondError
|
|
|
|
w2 := httptest.NewRecorder()
|
|
|
|
e := logical.CodedError(403, "error text")
|
|
|
|
|
|
|
|
respondError(w2, 500, e)
|
|
|
|
|
|
|
|
if w2.Code != 403 {
|
|
|
|
t.Fatalf("expected 403, got %d", w2.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
// vault.ErrSealed is a special case
|
|
|
|
w3 := httptest.NewRecorder()
|
|
|
|
|
2017-02-16 20:15:02 +00:00
|
|
|
respondError(w3, 400, consts.ErrSealed)
|
2015-08-10 17:27:25 +00:00
|
|
|
|
|
|
|
if w3.Code != 503 {
|
|
|
|
t.Fatalf("expected 503, got %d", w3.Code)
|
|
|
|
}
|
2017-12-16 01:19:37 +00:00
|
|
|
}
|
|
|
|
|
2018-10-01 17:33:21 +00:00
|
|
|
func TestHandler_requestAuth(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
rootCtx := namespace.RootContext(nil)
|
|
|
|
te, err := core.LookupToken(rootCtx, token)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
rWithAuthorization, err := http.NewRequest("GET", "v1/test/path", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
rWithAuthorization.Header.Set("Authorization", "Bearer "+token)
|
|
|
|
|
|
|
|
rWithVault, err := http.NewRequest("GET", "v1/test/path", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
rWithVault.Header.Set(consts.AuthHeaderName, token)
|
|
|
|
|
|
|
|
for _, r := range []*http.Request{rWithVault, rWithAuthorization} {
|
|
|
|
req := logical.TestRequest(t, logical.ReadOperation, "test/path")
|
|
|
|
r = r.WithContext(rootCtx)
|
|
|
|
req, err = requestAuth(core, r, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.ClientToken != token {
|
|
|
|
t.Fatalf("client token should be filled with %s, got %s", token, req.ClientToken)
|
|
|
|
}
|
|
|
|
if req.TokenEntry() == nil {
|
|
|
|
t.Fatal("token entry should not be nil")
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(req.TokenEntry(), te) {
|
|
|
|
t.Fatalf("token entry should be the same as the core")
|
|
|
|
}
|
|
|
|
if req.ClientTokenAccessor == "" {
|
|
|
|
t.Fatal("token accessor should not be empty")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rInvalidScheme, err := http.NewRequest("GET", "v1/test/path", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
rInvalidScheme.Header.Set("Authorization", "invalid_scheme something")
|
|
|
|
req := logical.TestRequest(t, logical.ReadOperation, "test/path")
|
|
|
|
|
|
|
|
_, err = requestAuth(core, rInvalidScheme, req)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected an error, got none")
|
|
|
|
}
|
|
|
|
|
|
|
|
rNothing, err := http.NewRequest("GET", "v1/test/path", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
req = logical.TestRequest(t, logical.ReadOperation, "test/path")
|
|
|
|
|
|
|
|
req, err = requestAuth(core, rNothing, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("expected no error, got %s", err)
|
|
|
|
}
|
|
|
|
if req.ClientToken != "" {
|
|
|
|
t.Fatalf("client token should not be filled, got %s", req.ClientToken)
|
|
|
|
}
|
|
|
|
|
|
|
|
rFragmentedHeader, err := http.NewRequest("GET", "v1/test/path", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
rFragmentedHeader.Header.Set("Authorization", "Bearer something somewhat")
|
|
|
|
req = logical.TestRequest(t, logical.ReadOperation, "test/path")
|
|
|
|
|
|
|
|
_, err = requestAuth(core, rFragmentedHeader, req)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected an error, got none")
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHandler_getTokenFromReq(t *testing.T) {
|
|
|
|
r := http.Request{Header: http.Header{}}
|
|
|
|
|
|
|
|
if tok, err := getTokenFromReq(&r); err != nil {
|
|
|
|
t.Fatalf("expected no error, got %s", err)
|
|
|
|
} else if tok != "" {
|
|
|
|
t.Fatalf("expected '' as result, got '%s'", tok)
|
|
|
|
}
|
|
|
|
|
|
|
|
r.Header.Set("Authorization", "Bearer TOKEN NOT_GOOD_TOKEN")
|
|
|
|
if tok, err := getTokenFromReq(&r); err == nil {
|
|
|
|
t.Fatalf("expected an error, got none")
|
|
|
|
} else if tok != "" {
|
|
|
|
t.Fatalf("expected '' as result, got '%s'", tok)
|
|
|
|
}
|
|
|
|
|
|
|
|
r.Header.Set(consts.AuthHeaderName, "NEWTOKEN")
|
|
|
|
if tok, err := getTokenFromReq(&r); err != nil {
|
|
|
|
t.Fatalf("expected no error, got %s", err)
|
|
|
|
} else if tok == "TOKEN" {
|
|
|
|
t.Fatalf("%s header should be prioritized", consts.AuthHeaderName)
|
|
|
|
} else if tok != "NEWTOKEN" {
|
|
|
|
t.Fatalf("expected 'NEWTOKEN' as result, got '%s'", tok)
|
|
|
|
}
|
|
|
|
|
|
|
|
r.Header = http.Header{}
|
|
|
|
r.Header.Set("Authorization", "Basic TOKEN")
|
|
|
|
if tok, err := getTokenFromReq(&r); err == nil {
|
|
|
|
t.Fatal("expected error, got none")
|
|
|
|
} else if tok != "" {
|
|
|
|
t.Fatalf("expected '' as result, got '%s'", tok)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-12-16 01:19:37 +00:00
|
|
|
func TestHandler_nonPrintableChars(t *testing.T) {
|
2018-07-12 20:29:36 +00:00
|
|
|
testNonPrintable(t, false)
|
|
|
|
testNonPrintable(t, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testNonPrintable(t *testing.T, disable bool) {
|
2017-12-16 01:19:37 +00:00
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
2018-07-12 20:29:36 +00:00
|
|
|
ln, addr := TestListener(t)
|
|
|
|
props := &vault.HandlerProperties{
|
|
|
|
Core: core,
|
|
|
|
MaxRequestSize: DefaultMaxRequestSize,
|
|
|
|
DisablePrintableCheck: disable,
|
|
|
|
}
|
|
|
|
TestServerWithListenerAndProperties(t, ln, addr, core, props)
|
2017-12-16 01:19:37 +00:00
|
|
|
defer ln.Close()
|
|
|
|
|
2018-07-12 20:29:36 +00:00
|
|
|
req, err := http.NewRequest("PUT", addr+"/v1/cubbyhole/foo\u2028bar", strings.NewReader(`{"zip": "zap"}`))
|
2017-12-16 01:19:37 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2018-09-18 03:03:00 +00:00
|
|
|
req.Header.Set(consts.AuthHeaderName, token)
|
2017-12-16 01:19:37 +00:00
|
|
|
|
|
|
|
client := cleanhttp.DefaultClient()
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2015-08-10 17:27:25 +00:00
|
|
|
|
2018-07-12 20:29:36 +00:00
|
|
|
if disable {
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
} else {
|
|
|
|
testResponseStatus(t, resp, 400)
|
|
|
|
}
|
2015-08-10 17:27:25 +00:00
|
|
|
}
|