2016-04-06 00:42:26 +00:00
|
|
|
package aws
|
|
|
|
|
|
|
|
import (
|
2016-04-25 14:40:05 +00:00
|
|
|
"encoding/base64"
|
2016-04-11 23:21:53 +00:00
|
|
|
"fmt"
|
|
|
|
"os"
|
2016-04-06 23:25:35 +00:00
|
|
|
"strings"
|
2016-04-06 00:42:26 +00:00
|
|
|
"testing"
|
|
|
|
|
2016-04-06 23:25:35 +00:00
|
|
|
"github.com/hashicorp/vault/helper/policyutil"
|
2016-04-06 00:42:26 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
logicaltest "github.com/hashicorp/vault/logical/testing"
|
|
|
|
)
|
|
|
|
|
2016-04-25 16:13:12 +00:00
|
|
|
func TestBackend_CreateParseVerifyRoleTag(t *testing.T) {
|
|
|
|
// create a backend
|
2016-04-25 15:44:58 +00:00
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 16:13:12 +00:00
|
|
|
// create an entry for ami
|
2016-04-25 15:44:58 +00:00
|
|
|
data := map[string]interface{}{
|
|
|
|
"policies": "p,q,r,s",
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "image/abcd-123",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 16:13:12 +00:00
|
|
|
// read the created image entry
|
2016-04-25 15:44:58 +00:00
|
|
|
imageEntry, err := awsImage(storage, "abcd-123")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 16:13:12 +00:00
|
|
|
// create a nonce for the role tag
|
2016-04-25 15:44:58 +00:00
|
|
|
nonce, err := createRoleTagNonce()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
rTag1 := &roleTag{
|
2016-04-25 15:44:58 +00:00
|
|
|
Version: "v1",
|
|
|
|
AmiID: "abcd-123",
|
|
|
|
Nonce: nonce,
|
|
|
|
Policies: []string{"p", "q", "r"},
|
|
|
|
MaxTTL: 200,
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
|
|
|
|
// create a role tag against the image entry
|
|
|
|
val, err := createRoleTagValue(rTag1, imageEntry)
|
2016-04-25 15:44:58 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if val == "" {
|
|
|
|
t.Fatalf("failed to create role tag")
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
|
|
|
|
// parse the created role tag
|
|
|
|
rTag2, err := parseRoleTagValue(storage, val)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// check the values in parsed role tag
|
|
|
|
if rTag2.Version != "v1" ||
|
|
|
|
rTag2.Nonce != nonce ||
|
|
|
|
rTag2.AmiID != "abcd-123" ||
|
|
|
|
rTag2.MaxTTL != 200 ||
|
|
|
|
!policyutil.EquivalentPolicies(rTag2.Policies, []string{"p", "q", "r"}) ||
|
|
|
|
len(rTag2.HMAC) == 0 {
|
|
|
|
t.Fatalf("parsed role tag is invalid")
|
|
|
|
}
|
|
|
|
|
|
|
|
// verify the tag contents using image specific HMAC key
|
|
|
|
verified, err := verifyRoleTagValue(rTag2, imageEntry)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !verified {
|
|
|
|
t.Fatalf("failed to verify the role tag")
|
|
|
|
}
|
|
|
|
|
|
|
|
// register a different ami
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "image/ami-6789",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// entry for the newly created ami entry
|
|
|
|
imageEntry2, err := awsImage(storage, "ami-6789")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// try to verify the tag created with previous image's HMAC key
|
|
|
|
// with the newly registered entry's HMAC key
|
|
|
|
verified, err = verifyRoleTagValue(rTag2, imageEntry2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if verified {
|
|
|
|
t.Fatalf("verification of role tag should have failed: invalid AMI ID")
|
|
|
|
}
|
|
|
|
|
|
|
|
// modify any value in role tag and try to verify it
|
|
|
|
rTag2.Version = "v2"
|
|
|
|
verified, err = verifyRoleTagValue(rTag2, imageEntry)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if verified {
|
|
|
|
t.Fatalf("verification of role tag should have failed: invalid Version")
|
|
|
|
}
|
2016-04-25 15:44:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestBackend_prepareRoleTagPlaintextValue(t *testing.T) {
|
2016-04-25 16:13:12 +00:00
|
|
|
// create a nonce for the role tag
|
2016-04-25 14:40:05 +00:00
|
|
|
nonce, err := createRoleTagNonce()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
rTag := &roleTag{
|
|
|
|
Version: "v1",
|
|
|
|
Nonce: nonce,
|
|
|
|
AmiID: "abcd-123",
|
|
|
|
}
|
|
|
|
|
|
|
|
rTag.Version = ""
|
2016-04-25 16:13:12 +00:00
|
|
|
// try to create plaintext part of role tag
|
|
|
|
// without specifying version
|
2016-04-25 14:40:05 +00:00
|
|
|
val, err := prepareRoleTagPlaintextValue(rTag)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected error for missing version")
|
|
|
|
}
|
|
|
|
rTag.Version = "v1"
|
|
|
|
|
|
|
|
rTag.Nonce = ""
|
2016-04-25 16:13:12 +00:00
|
|
|
// try to create plaintext part of role tag
|
|
|
|
// without specifying nonce
|
2016-04-25 14:40:05 +00:00
|
|
|
val, err = prepareRoleTagPlaintextValue(rTag)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected error for missing nonce")
|
|
|
|
}
|
|
|
|
rTag.Nonce = nonce
|
|
|
|
|
|
|
|
rTag.AmiID = ""
|
2016-04-25 16:13:12 +00:00
|
|
|
// try to create plaintext part of role tag
|
|
|
|
// without specifying ami_id
|
2016-04-25 14:40:05 +00:00
|
|
|
val, err = prepareRoleTagPlaintextValue(rTag)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected error for missing ami_id")
|
|
|
|
}
|
|
|
|
rTag.AmiID = "abcd-123"
|
|
|
|
|
2016-04-25 16:13:12 +00:00
|
|
|
// create the plaintext part of the tag
|
2016-04-25 14:40:05 +00:00
|
|
|
val, err = prepareRoleTagPlaintextValue(rTag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
|
|
|
|
// verify if it contains known fields
|
2016-04-25 14:40:05 +00:00
|
|
|
if !strings.Contains(val, "a=") ||
|
|
|
|
!strings.Contains(val, "p=") ||
|
|
|
|
!strings.Contains(val, "d=") ||
|
|
|
|
!strings.HasPrefix(val, "v1") {
|
|
|
|
t.Fatalf("incorrect information in role tag plaintext value")
|
|
|
|
}
|
|
|
|
|
|
|
|
rTag.InstanceID = "instance-123"
|
2016-04-25 16:13:12 +00:00
|
|
|
// create the role tag with instance_id specified
|
2016-04-25 14:40:05 +00:00
|
|
|
val, err = prepareRoleTagPlaintextValue(rTag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
// verify it
|
2016-04-25 14:40:05 +00:00
|
|
|
if !strings.Contains(val, "i=") {
|
|
|
|
t.Fatalf("missing instance ID in role tag plaintext value")
|
|
|
|
}
|
|
|
|
|
|
|
|
rTag.MaxTTL = 200
|
2016-04-25 16:13:12 +00:00
|
|
|
// create the role tag with max_ttl specified
|
2016-04-25 14:40:05 +00:00
|
|
|
val, err = prepareRoleTagPlaintextValue(rTag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
// verify it
|
2016-04-25 14:40:05 +00:00
|
|
|
if !strings.Contains(val, "t=") {
|
|
|
|
t.Fatalf("missing instance ID in role tag plaintext value")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestBackend_CreateRoleTagNonce(t *testing.T) {
|
2016-04-25 16:13:12 +00:00
|
|
|
// create a nonce for the role tag
|
2016-04-25 14:40:05 +00:00
|
|
|
nonce, err := createRoleTagNonce()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if nonce == "" {
|
|
|
|
t.Fatalf("failed to create role tag nonce")
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
|
|
|
|
// verify that the value returned is base64 encoded
|
2016-04-25 14:40:05 +00:00
|
|
|
nonceBytes, err := base64.StdEncoding.DecodeString(nonce)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(nonceBytes) == 0 {
|
|
|
|
t.Fatalf("length of role tag nonce is zero")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-25 11:19:30 +00:00
|
|
|
func TestBackend_ConfigTidyIdentities(t *testing.T) {
|
2016-04-25 16:13:12 +00:00
|
|
|
// create a backend
|
2016-04-25 11:19:30 +00:00
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 16:13:12 +00:00
|
|
|
// configure the tidying behavior of whitelist identities
|
2016-04-25 11:19:30 +00:00
|
|
|
data := map[string]interface{}{
|
|
|
|
"safety_buffer": "60",
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "config/tidy/identities",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestBackend_ConfigTidyRoleTags(t *testing.T) {
|
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"safety_buffer": "60",
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "config/tidy/roletags",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-04-25 16:13:12 +00:00
|
|
|
|
|
|
|
resp, err := b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "config/tidy/roletags",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-04-25 11:19:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestBackend_TidyIdentities(t *testing.T) {
|
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "tidy/identities",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestBackend_TidyRoleTags(t *testing.T) {
|
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "tidy/roletags",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-06 00:42:26 +00:00
|
|
|
func TestBackend_ConfigClient(t *testing.T) {
|
|
|
|
config := logical.TestBackendConfig()
|
2016-04-06 23:25:35 +00:00
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
2016-04-06 00:42:26 +00:00
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-06 16:27:47 +00:00
|
|
|
data := map[string]interface{}{"access_key": "AKIAJBRHKV6EVTTNXDHA",
|
|
|
|
"secret_key": "mCtSM8ZUEQ3mOFVZYPBQkf2sO6F/W7a5TVzrl3Oj",
|
|
|
|
}
|
|
|
|
|
|
|
|
stepCreate := logicaltest.TestStep{
|
|
|
|
Operation: logical.CreateOperation,
|
|
|
|
Path: "config/client",
|
|
|
|
Data: data,
|
|
|
|
}
|
|
|
|
|
|
|
|
stepUpdate := logicaltest.TestStep{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "config/client",
|
|
|
|
Data: data,
|
|
|
|
}
|
|
|
|
|
|
|
|
data3 := map[string]interface{}{"access_key": "",
|
|
|
|
"secret_key": "mCtSM8ZUEQ3mOFVZYPBQkf2sO6F/W7a5TVzrl3Oj",
|
|
|
|
}
|
|
|
|
stepInvalidAccessKey := logicaltest.TestStep{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "config/client",
|
|
|
|
Data: data3,
|
|
|
|
ErrorOk: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
data4 := map[string]interface{}{"access_key": "accesskey",
|
|
|
|
"secret_key": "",
|
|
|
|
}
|
|
|
|
stepInvalidSecretKey := logicaltest.TestStep{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "config/client",
|
|
|
|
Data: data4,
|
|
|
|
ErrorOk: true,
|
|
|
|
}
|
|
|
|
|
2016-04-06 00:42:26 +00:00
|
|
|
logicaltest.Test(t, logicaltest.TestCase{
|
|
|
|
AcceptanceTest: false,
|
|
|
|
Backend: b,
|
2016-04-06 16:27:47 +00:00
|
|
|
Steps: []logicaltest.TestStep{
|
|
|
|
stepCreate,
|
|
|
|
stepInvalidAccessKey,
|
|
|
|
stepInvalidSecretKey,
|
|
|
|
stepUpdate,
|
|
|
|
},
|
2016-04-06 00:42:26 +00:00
|
|
|
})
|
2016-04-06 16:27:47 +00:00
|
|
|
|
2016-04-07 00:59:05 +00:00
|
|
|
checkFound, exists, err := b.HandleExistenceCheck(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
|
|
|
Path: "config/client",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !checkFound {
|
|
|
|
t.Fatal("existence check not found for path 'config/client'")
|
|
|
|
}
|
|
|
|
if exists {
|
2016-04-07 15:26:10 +00:00
|
|
|
t.Fatal("existence check should have returned 'false' for 'config/client'")
|
2016-04-07 00:59:05 +00:00
|
|
|
}
|
|
|
|
|
2016-04-06 16:27:47 +00:00
|
|
|
configClientCreateRequest := &logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "config/client",
|
|
|
|
Data: data,
|
2016-04-06 23:25:35 +00:00
|
|
|
Storage: storage,
|
2016-04-06 16:27:47 +00:00
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(configClientCreateRequest)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-07 00:59:05 +00:00
|
|
|
checkFound, exists, err = b.HandleExistenceCheck(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
|
|
|
Path: "config/client",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !checkFound {
|
|
|
|
t.Fatal("existence check not found for path 'config/client'")
|
|
|
|
}
|
|
|
|
if !exists {
|
2016-04-07 15:26:10 +00:00
|
|
|
t.Fatal("existence check should have returned 'true' for 'config/client'")
|
2016-04-07 00:59:05 +00:00
|
|
|
}
|
|
|
|
|
2016-04-06 23:25:35 +00:00
|
|
|
clientConfig, err := clientConfigEntry(storage)
|
2016-04-06 16:27:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if clientConfig.AccessKey != data["access_key"] ||
|
2016-04-14 16:42:18 +00:00
|
|
|
clientConfig.SecretKey != data["secret_key"] {
|
2016-04-06 16:27:47 +00:00
|
|
|
t.Fatalf("bad: expected: %#v\ngot: %#v\n", data, clientConfig)
|
|
|
|
}
|
2016-04-06 00:42:26 +00:00
|
|
|
}
|
|
|
|
|
2016-04-07 00:59:05 +00:00
|
|
|
func TestBackend_PathConfigCertificate(t *testing.T) {
|
2016-04-07 15:26:10 +00:00
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
checkFound, exists, err := b.HandleExistenceCheck(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
2016-04-14 16:42:18 +00:00
|
|
|
Path: "config/certificate/cert1",
|
2016-04-07 15:26:10 +00:00
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !checkFound {
|
2016-04-14 16:42:18 +00:00
|
|
|
t.Fatal("existence check not found for path 'config/certificate/cert1'")
|
2016-04-07 15:26:10 +00:00
|
|
|
}
|
|
|
|
if exists {
|
2016-04-14 16:42:18 +00:00
|
|
|
t.Fatal("existence check should have returned 'false' for 'config/certificate/cert1'")
|
2016-04-07 15:26:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"aws_public_cert": `LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM3VENDQXEwQ0NRQ1d1a2paNVY0YVp6QUpC
|
|
|
|
Z2NxaGtqT09BUURNRnd4Q3pBSkJnTlZCQVlUQWxWVE1Sa3cKRndZRFZRUUlFeEJYWVhOb2FXNW5k
|
|
|
|
Rzl1SUZOMFlYUmxNUkF3RGdZRFZRUUhFd2RUWldGMGRHeGxNU0F3SGdZRApWUVFLRXhkQmJXRjZi
|
|
|
|
MjRnVjJWaUlGTmxjblpwWTJWeklFeE1RekFlRncweE1qQXhNRFV4TWpVMk1USmFGdzB6Ck9EQXhN
|
|
|
|
RFV4TWpVMk1USmFNRnd4Q3pBSkJnTlZCQVlUQWxWVE1Sa3dGd1lEVlFRSUV4QlhZWE5vYVc1bmRH
|
|
|
|
OXUKSUZOMFlYUmxNUkF3RGdZRFZRUUhFd2RUWldGMGRHeGxNU0F3SGdZRFZRUUtFeGRCYldGNmIy
|
|
|
|
NGdWMlZpSUZObApjblpwWTJWeklFeE1RekNDQWJjd2dnRXNCZ2NxaGtqT09BUUJNSUlCSHdLQmdR
|
|
|
|
Q2prdmNTMmJiMVZRNHl0LzVlCmloNU9PNmtLL24xTHpsbHI3RDhad3RRUDhmT0VwcDVFMm5nK0Q2
|
|
|
|
VWQxWjFnWWlwcjU4S2ozbnNzU05wSTZiWDMKVnlJUXpLN3dMY2xuZC9Zb3pxTk5tZ0l5WmVjTjdF
|
|
|
|
Z2xLOUlUSEpMUCt4OEZ0VXB0M1FieVlYSmRtVk1lZ042UApodmlZdDVKSC9uWWw0aGgzUGExSEpk
|
|
|
|
c2tnUUlWQUxWSjNFUjExK0tvNHRQNm53dkh3aDYrRVJZUkFvR0JBSTFqCmsrdGtxTVZIdUFGY3ZB
|
|
|
|
R0tvY1Rnc2pKZW02LzVxb216SnVLRG1iSk51OVF4dzNyQW90WGF1OFFlK01CY0psL1UKaGh5MUtI
|
|
|
|
VnBDR2w5ZnVlUTJzNklMMENhTy9idXljVTFDaVlRazQwS05IQ2NIZk5pWmJkbHgxRTlycFVwN2Ju
|
|
|
|
RgpsUmEydjFudE1YM2NhUlZEZGJ0UEVXbWR4U0NZc1lGRGs0bVpyT0xCQTRHRUFBS0JnRWJtZXZl
|
|
|
|
NWY4TElFL0dmCk1ObVA5Q001ZW92UU9HeDVobzhXcUQrYVRlYnMrazJ0bjkyQkJQcWVacXBXUmE1
|
|
|
|
UC8ranJkS21sMXF4NGxsSFcKTVhyczNJZ0liNitoVUlCK1M4ZHo4L21tTzBicHI3NlJvWlZDWFlh
|
|
|
|
YjJDWmVkRnV0N3FjM1dVSDkrRVVBSDVtdwp2U2VEQ09VTVlRUjdSOUxJTll3b3VISXppcVFZTUFr
|
|
|
|
R0J5cUdTTTQ0QkFNREx3QXdMQUlVV1hCbGs0MHhUd1N3CjdIWDMyTXhYWXJ1c2U5QUNGQk5HbWRY
|
|
|
|
MlpCclZOR3JOOU4yZjZST2swazlLCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K
|
|
|
|
`,
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
2016-04-14 16:42:18 +00:00
|
|
|
Path: "config/certificate/cert1",
|
2016-04-07 15:26:10 +00:00
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
checkFound, exists, err = b.HandleExistenceCheck(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
2016-04-14 16:42:18 +00:00
|
|
|
Path: "config/certificate/cert1",
|
2016-04-07 15:26:10 +00:00
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !checkFound {
|
2016-04-14 16:42:18 +00:00
|
|
|
t.Fatal("existence check not found for path 'config/certificate/cert1'")
|
2016-04-07 15:26:10 +00:00
|
|
|
}
|
|
|
|
if !exists {
|
2016-04-14 16:42:18 +00:00
|
|
|
t.Fatal("existence check should have returned 'true' for 'config/certificate/cert1'")
|
2016-04-07 15:26:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
2016-04-14 16:42:18 +00:00
|
|
|
Path: "config/certificate/cert1",
|
2016-04-07 15:26:10 +00:00
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
expectedCert := `-----BEGIN CERTIFICATE-----
|
|
|
|
MIIC7TCCAq0CCQCWukjZ5V4aZzAJBgcqhkjOOAQDMFwxCzAJBgNVBAYTAlVTMRkw
|
|
|
|
FwYDVQQIExBXYXNoaW5ndG9uIFN0YXRlMRAwDgYDVQQHEwdTZWF0dGxlMSAwHgYD
|
|
|
|
VQQKExdBbWF6b24gV2ViIFNlcnZpY2VzIExMQzAeFw0xMjAxMDUxMjU2MTJaFw0z
|
|
|
|
ODAxMDUxMjU2MTJaMFwxCzAJBgNVBAYTAlVTMRkwFwYDVQQIExBXYXNoaW5ndG9u
|
|
|
|
IFN0YXRlMRAwDgYDVQQHEwdTZWF0dGxlMSAwHgYDVQQKExdBbWF6b24gV2ViIFNl
|
|
|
|
cnZpY2VzIExMQzCCAbcwggEsBgcqhkjOOAQBMIIBHwKBgQCjkvcS2bb1VQ4yt/5e
|
|
|
|
ih5OO6kK/n1Lzllr7D8ZwtQP8fOEpp5E2ng+D6Ud1Z1gYipr58Kj3nssSNpI6bX3
|
|
|
|
VyIQzK7wLclnd/YozqNNmgIyZecN7EglK9ITHJLP+x8FtUpt3QbyYXJdmVMegN6P
|
|
|
|
hviYt5JH/nYl4hh3Pa1HJdskgQIVALVJ3ER11+Ko4tP6nwvHwh6+ERYRAoGBAI1j
|
|
|
|
k+tkqMVHuAFcvAGKocTgsjJem6/5qomzJuKDmbJNu9Qxw3rAotXau8Qe+MBcJl/U
|
|
|
|
hhy1KHVpCGl9fueQ2s6IL0CaO/buycU1CiYQk40KNHCcHfNiZbdlx1E9rpUp7bnF
|
|
|
|
lRa2v1ntMX3caRVDdbtPEWmdxSCYsYFDk4mZrOLBA4GEAAKBgEbmeve5f8LIE/Gf
|
|
|
|
MNmP9CM5eovQOGx5ho8WqD+aTebs+k2tn92BBPqeZqpWRa5P/+jrdKml1qx4llHW
|
|
|
|
MXrs3IgIb6+hUIB+S8dz8/mmO0bpr76RoZVCXYab2CZedFut7qc3WUH9+EUAH5mw
|
|
|
|
vSeDCOUMYQR7R9LINYwouHIziqQYMAkGByqGSM44BAMDLwAwLAIUWXBlk40xTwSw
|
|
|
|
7HX32MxXYruse9ACFBNGmdX2ZBrVNGrN9N2f6ROk0k9K
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
`
|
|
|
|
if resp.Data["aws_public_cert"].(string) != expectedCert {
|
|
|
|
t.Fatal("bad: expected:%s\n got:%s\n", expectedCert, resp.Data["aws_public_cert"].(string))
|
|
|
|
}
|
2016-04-07 00:59:05 +00:00
|
|
|
}
|
|
|
|
|
2016-04-06 23:25:35 +00:00
|
|
|
func TestBackend_PathImage(t *testing.T) {
|
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"policies": "p,q,r,s",
|
|
|
|
"max_ttl": "2h",
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
|
|
|
Path: "image/ami-abcd123",
|
|
|
|
Data: data,
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "image/ami-abcd123",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !policyutil.EquivalentPolicies(strings.Split(data["policies"].(string), ","), resp.Data["policies"].([]string)) {
|
|
|
|
t.Fatalf("bad: policies: expected: %#v\ngot: %#v\n", data, resp.Data)
|
|
|
|
}
|
|
|
|
|
|
|
|
data["allow_instance_migration"] = true
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "image/ami-abcd123",
|
|
|
|
Data: data,
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "image/ami-abcd123",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !resp.Data["allow_instance_migration"].(bool) {
|
|
|
|
t.Fatal("bad: allow_instance_migration: expected:true got:false\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.DeleteOperation,
|
|
|
|
Path: "image/ami-abcd123",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "image/ami-abcd123",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: response: expected:nil actual:%#v\n", resp)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-06 00:42:26 +00:00
|
|
|
func TestBackend_parseRoleTagValue(t *testing.T) {
|
2016-04-25 14:40:05 +00:00
|
|
|
// create a backend
|
2016-04-08 18:56:27 +00:00
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
b, err := Factory(config)
|
2016-04-06 00:42:26 +00:00
|
|
|
if err != nil {
|
2016-04-08 18:56:27 +00:00
|
|
|
t.Fatal(err)
|
2016-04-06 00:42:26 +00:00
|
|
|
}
|
2016-04-08 18:56:27 +00:00
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// create an entry for an AMI
|
2016-04-08 18:56:27 +00:00
|
|
|
data := map[string]interface{}{
|
|
|
|
"policies": "p,q,r,s",
|
|
|
|
"max_ttl": "120s",
|
|
|
|
"role_tag": "VaultRole",
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
|
|
|
Path: "image/abcd-123",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
2016-04-06 00:42:26 +00:00
|
|
|
}
|
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// verify that the entry is created
|
2016-04-08 18:56:27 +00:00
|
|
|
resp, err := b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "image/abcd-123",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatalf("expected an image entry for abcd-123")
|
2016-04-06 00:42:26 +00:00
|
|
|
}
|
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// create a role tag
|
2016-04-08 18:56:27 +00:00
|
|
|
data2 := map[string]interface{}{
|
|
|
|
"policies": "p,q,r,s",
|
2016-04-06 00:42:26 +00:00
|
|
|
}
|
2016-04-08 18:56:27 +00:00
|
|
|
resp, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
2016-04-14 16:42:18 +00:00
|
|
|
Path: "image/abcd-123/roletag",
|
2016-04-08 18:56:27 +00:00
|
|
|
Storage: storage,
|
|
|
|
Data: data2,
|
|
|
|
})
|
2016-04-06 00:42:26 +00:00
|
|
|
if err != nil {
|
2016-04-08 18:56:27 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp.Data["tag_key"].(string) == "" ||
|
|
|
|
resp.Data["tag_value"].(string) == "" {
|
|
|
|
t.Fatalf("invalid tag response: %#v\n", resp)
|
2016-04-06 00:42:26 +00:00
|
|
|
}
|
2016-04-08 18:56:27 +00:00
|
|
|
tagValue := resp.Data["tag_value"].(string)
|
2016-04-06 00:42:26 +00:00
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// parse the value and check if the verifiable values match
|
2016-04-08 18:56:27 +00:00
|
|
|
rTag, err := parseRoleTagValue(storage, tagValue)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if rTag == nil {
|
|
|
|
t.Fatalf("failed to parse role tag")
|
|
|
|
}
|
|
|
|
if rTag.Version != "v1" ||
|
|
|
|
!policyutil.EquivalentPolicies(rTag.Policies, []string{"p", "q", "r", "s"}) ||
|
2016-04-14 16:42:18 +00:00
|
|
|
rTag.AmiID != "abcd-123" {
|
2016-04-08 18:56:27 +00:00
|
|
|
t.Fatalf("bad: parsed role tag contains incorrect values. Got: %#v\n", rTag)
|
2016-04-06 00:42:26 +00:00
|
|
|
}
|
|
|
|
}
|
2016-04-08 19:43:24 +00:00
|
|
|
|
|
|
|
func TestBackend_PathImageTag(t *testing.T) {
|
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config.StorageView = storage
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"policies": "p,q,r,s",
|
|
|
|
"max_ttl": "120s",
|
|
|
|
"role_tag": "VaultRole",
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
|
|
|
Path: "image/abcd-123",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "image/abcd-123",
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatalf("failed to find an entry for ami_id: abcd-123")
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
2016-04-14 16:42:18 +00:00
|
|
|
Path: "image/abcd-123/roletag",
|
2016-04-08 19:43:24 +00:00
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Data == nil {
|
|
|
|
t.Fatalf("failed to create a tag on ami_id: abcd-123")
|
|
|
|
}
|
|
|
|
if resp.IsError() {
|
|
|
|
t.Fatalf("failed to create a tag on ami_id: abcd-123: %s\n", resp.Data["error"])
|
|
|
|
}
|
|
|
|
if resp.Data["tag_value"].(string) == "" {
|
|
|
|
t.Fatalf("role tag not present in the response data: %#v\n", resp.Data)
|
|
|
|
}
|
|
|
|
}
|
2016-04-11 20:18:41 +00:00
|
|
|
|
|
|
|
func TestBackend_PathBlacklistRoleTag(t *testing.T) {
|
2016-04-25 11:19:30 +00:00
|
|
|
// create the backend
|
2016-04-11 20:18:41 +00:00
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
config.StorageView = storage
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 11:19:30 +00:00
|
|
|
// create an image entry
|
2016-04-11 20:18:41 +00:00
|
|
|
data := map[string]interface{}{
|
|
|
|
"ami_id": "abcd-123",
|
|
|
|
"policies": "p,q,r,s",
|
|
|
|
"role_tag": "VaultRole",
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.CreateOperation,
|
|
|
|
Path: "image/abcd-123",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 11:19:30 +00:00
|
|
|
// create a role tag against an image registered before
|
2016-04-11 20:18:41 +00:00
|
|
|
data2 := map[string]interface{}{
|
|
|
|
"policies": "p,q,r,s",
|
|
|
|
}
|
|
|
|
resp, err := b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
2016-04-14 16:42:18 +00:00
|
|
|
Path: "image/abcd-123/roletag",
|
2016-04-11 20:18:41 +00:00
|
|
|
Storage: storage,
|
|
|
|
Data: data2,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Data == nil {
|
|
|
|
t.Fatalf("failed to create a tag on ami_id: abcd-123")
|
|
|
|
}
|
|
|
|
if resp.IsError() {
|
|
|
|
t.Fatalf("failed to create a tag on ami_id: abcd-123: %s\n", resp.Data["error"])
|
|
|
|
}
|
|
|
|
tag := resp.Data["tag_value"].(string)
|
|
|
|
if tag == "" {
|
|
|
|
t.Fatalf("role tag not present in the response data: %#v\n", resp.Data)
|
|
|
|
}
|
|
|
|
|
2016-04-25 11:19:30 +00:00
|
|
|
// blacklist that role tag
|
2016-04-11 20:18:41 +00:00
|
|
|
resp, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "blacklist/roletag/" + tag,
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("failed to blacklist the roletag: %s\n", tag)
|
|
|
|
}
|
|
|
|
|
2016-04-25 11:19:30 +00:00
|
|
|
// read the blacklist entry
|
2016-04-11 20:18:41 +00:00
|
|
|
resp, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "blacklist/roletag/" + tag,
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Data == nil {
|
|
|
|
t.Fatalf("failed to read the blacklisted role tag: %s\n", tag)
|
|
|
|
}
|
|
|
|
if resp.IsError() {
|
|
|
|
t.Fatalf("failed to read the blacklisted role tag:%s. Err: %s\n", tag, resp.Data["error"])
|
|
|
|
}
|
|
|
|
|
2016-04-25 11:19:30 +00:00
|
|
|
// delete the blacklisted entry
|
2016-04-11 20:18:41 +00:00
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.DeleteOperation,
|
|
|
|
Path: "blacklist/roletag/" + tag,
|
|
|
|
Storage: storage,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 11:19:30 +00:00
|
|
|
// try to read the deleted entry
|
2016-04-11 20:18:41 +00:00
|
|
|
tagEntry, err := blacklistRoleTagEntry(storage, tag)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if tagEntry != nil {
|
|
|
|
t.Fatalf("role tag should not have been present: %s\n", tag)
|
|
|
|
}
|
|
|
|
}
|
2016-04-11 23:21:53 +00:00
|
|
|
|
|
|
|
// This is an acceptance test.
|
|
|
|
func TestBackendAcc_LoginAndWhitelistIdentity(t *testing.T) {
|
|
|
|
if os.Getenv(logicaltest.TestEnvVar) == "" {
|
|
|
|
t.Skip(fmt.Sprintf("Acceptance tests skipped unless env '%s' set", logicaltest.TestEnvVar))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// create the backend
|
2016-04-11 23:21:53 +00:00
|
|
|
storage := &logical.InmemStorage{}
|
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
config.StorageView = storage
|
|
|
|
b, err := Factory(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// get the API credentials from env vars
|
2016-04-11 23:21:53 +00:00
|
|
|
clientConfig := map[string]interface{}{
|
2016-04-14 16:42:18 +00:00
|
|
|
"access_key": os.Getenv("AWS_ACCESS_KEY"),
|
|
|
|
"secret_key": os.Getenv("AWS_SECRET_KEY"),
|
2016-04-11 23:21:53 +00:00
|
|
|
}
|
|
|
|
if clientConfig["access_key"] == "" ||
|
|
|
|
clientConfig["secret_key"] == "" {
|
|
|
|
t.Fatalf("credentials not configured")
|
|
|
|
}
|
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// store the credentials
|
2016-04-11 23:21:53 +00:00
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Storage: storage,
|
|
|
|
Path: "config/client",
|
|
|
|
Data: clientConfig,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-04-25 14:40:05 +00:00
|
|
|
// write an entry for an ami
|
2016-04-11 23:21:53 +00:00
|
|
|
data := map[string]interface{}{
|
|
|
|
"policies": "root",
|
|
|
|
"max_ttl": "120s",
|
|
|
|
}
|
|
|
|
_, err = b.HandleRequest(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "image/ami-fce3c696",
|
|
|
|
Storage: storage,
|
|
|
|
Data: data,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
loginInput := map[string]interface{}{"pkcs7": `MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAaCAJIAEggGmewog
|
|
|
|
ICJkZXZwYXlQcm9kdWN0Q29kZXMiIDogbnVsbCwKICAicHJpdmF0ZUlwIiA6ICIxNzIuMzEuNjMu
|
|
|
|
NjAiLAogICJhdmFpbGFiaWxpdHlab25lIiA6ICJ1cy1lYXN0LTFjIiwKICAidmVyc2lvbiIgOiAi
|
|
|
|
MjAxMC0wOC0zMSIsCiAgImluc3RhbmNlSWQiIDogImktZGUwZjEzNDQiLAogICJiaWxsaW5nUHJv
|
|
|
|
ZHVjdHMiIDogbnVsbCwKICAiaW5zdGFuY2VUeXBlIiA6ICJ0Mi5taWNybyIsCiAgImFjY291bnRJ
|
|
|
|
ZCIgOiAiMjQxNjU2NjE1ODU5IiwKICAiaW1hZ2VJZCIgOiAiYW1pLWZjZTNjNjk2IiwKICAicGVu
|
|
|
|
ZGluZ1RpbWUiIDogIjIwMTYtMDQtMDVUMTY6MjY6NTVaIiwKICAiYXJjaGl0ZWN0dXJlIiA6ICJ4
|
|
|
|
ODZfNjQiLAogICJrZXJuZWxJZCIgOiBudWxsLAogICJyYW1kaXNrSWQiIDogbnVsbCwKICAicmVn
|
|
|
|
aW9uIiA6ICJ1cy1lYXN0LTEiCn0AAAAAAAAxggEXMIIBEwIBATBpMFwxCzAJBgNVBAYTAlVTMRkw
|
|
|
|
FwYDVQQIExBXYXNoaW5ndG9uIFN0YXRlMRAwDgYDVQQHEwdTZWF0dGxlMSAwHgYDVQQKExdBbWF6
|
|
|
|
b24gV2ViIFNlcnZpY2VzIExMQwIJAJa6SNnlXhpnMAkGBSsOAwIaBQCgXTAYBgkqhkiG9w0BCQMx
|
|
|
|
CwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xNjA0MDUxNjI3MDBaMCMGCSqGSIb3DQEJBDEW
|
|
|
|
BBRtiynzMTNfTw1TV/d8NvfgVw+XfTAJBgcqhkjOOAQDBC4wLAIUVfpVcNYoOKzN1c+h1Vsm/c5U
|
|
|
|
0tQCFAK/K72idWrONIqMOVJ8Uen0wYg4AAAAAAAA`,
|
|
|
|
"nonce": "vault-client-nonce",
|
|
|
|
}
|
|
|
|
|
|
|
|
loginRequest := &logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "login",
|
|
|
|
Storage: storage,
|
|
|
|
Data: loginInput,
|
|
|
|
}
|
|
|
|
resp, err := b.HandleRequest(loginRequest)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Auth == nil {
|
|
|
|
t.Fatalf("login attempt failed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// try to login again and see if it succeeds
|
|
|
|
resp, err = b.HandleRequest(loginRequest)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Auth == nil {
|
|
|
|
t.Fatalf("login attempt failed")
|
|
|
|
}
|
|
|
|
|
|
|
|
//instanceID := resp.Auth.Metadata.(map[string]string)["instance_id"]
|
|
|
|
instanceID := resp.Auth.Metadata["instance_id"]
|
|
|
|
if instanceID == "" {
|
|
|
|
t.Fatalf("instance ID not present in the response object")
|
|
|
|
}
|
|
|
|
|
|
|
|
loginInput["nonce"] = "changed-vault-client-nonce"
|
|
|
|
// try to login again with changed nonce
|
|
|
|
resp, err = b.HandleRequest(loginRequest)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil || !resp.IsError() {
|
|
|
|
t.Fatalf("login attempt should have failed due to client nonce mismatch")
|
|
|
|
}
|
|
|
|
|
|
|
|
wlRequest := &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "whitelist/identity/" + instanceID,
|
|
|
|
Storage: storage,
|
|
|
|
}
|
|
|
|
resp, err = b.HandleRequest(wlRequest)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-04-11 23:46:44 +00:00
|
|
|
if resp == nil || resp.Data == nil || resp.Data["ami_id"] != "ami-fce3c696" {
|
2016-04-11 23:21:53 +00:00
|
|
|
t.Fatalf("failed to read whitelist identity")
|
|
|
|
}
|
|
|
|
|
|
|
|
wlRequest.Operation = logical.DeleteOperation
|
|
|
|
resp, err = b.HandleRequest(wlRequest)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp.IsError() {
|
|
|
|
t.Fatalf("failed to delete whitelist identity")
|
|
|
|
}
|
|
|
|
|
|
|
|
// try to login again and see if it succeeds
|
|
|
|
resp, err = b.HandleRequest(loginRequest)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Auth == nil {
|
|
|
|
t.Fatalf("login attempt failed")
|
|
|
|
}
|
|
|
|
}
|