open-vault/http/sys_audit_test.go

136 lines
3.4 KiB
Go
Raw Normal View History

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
2015-04-02 01:36:13 +00:00
package http
import (
2016-08-08 20:00:31 +00:00
"encoding/json"
2015-04-02 01:36:13 +00:00
"reflect"
"testing"
"github.com/hashicorp/vault/vault"
)
func TestSysAudit(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
2015-08-22 00:36:19 +00:00
resp := testHttpPost(t, token, addr+"/v1/sys/audit/noop", map[string]interface{}{
2015-04-02 01:36:13 +00:00
"type": "noop",
})
testResponseStatus(t, resp, 204)
2015-08-22 00:36:19 +00:00
resp = testHttpGet(t, token, addr+"/v1/sys/audit")
2015-04-02 01:36:13 +00:00
var actual map[string]interface{}
expected := map[string]interface{}{
2016-08-08 20:00:31 +00:00
"lease_id": "",
"renewable": false,
"lease_duration": json.Number("0"),
"wrap_info": nil,
"warnings": nil,
"auth": nil,
"data": map[string]interface{}{
"noop/": map[string]interface{}{
"path": "noop/",
"type": "noop",
"description": "",
"options": map[string]interface{}{},
"local": false,
2016-08-08 20:00:31 +00:00
},
},
"noop/": map[string]interface{}{
"path": "noop/",
"type": "noop",
"description": "",
"options": map[string]interface{}{},
"local": false,
},
2015-04-02 01:36:13 +00:00
}
testResponseStatus(t, resp, 200)
testResponseBody(t, resp, &actual)
2016-08-08 20:00:31 +00:00
expected["request_id"] = actual["request_id"]
2015-04-02 01:36:13 +00:00
if !reflect.DeepEqual(actual, expected) {
2016-03-14 22:40:12 +00:00
t.Fatalf("bad: expected:\n%#v actual:\n%#v\n", expected, actual)
2015-04-02 01:36:13 +00:00
}
}
func TestSysDisableAudit(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
2015-08-22 00:36:19 +00:00
resp := testHttpPost(t, token, addr+"/v1/sys/audit/foo", map[string]interface{}{
2015-04-02 01:36:13 +00:00
"type": "noop",
})
testResponseStatus(t, resp, 204)
2015-08-22 00:36:19 +00:00
resp = testHttpDelete(t, token, addr+"/v1/sys/audit/foo")
2015-04-02 01:36:13 +00:00
testResponseStatus(t, resp, 204)
2015-08-22 00:36:19 +00:00
resp = testHttpGet(t, token, addr+"/v1/sys/audit")
2015-04-02 01:36:13 +00:00
var actual map[string]interface{}
2016-08-08 20:00:31 +00:00
expected := map[string]interface{}{
"lease_id": "",
"renewable": false,
"lease_duration": json.Number("0"),
"wrap_info": nil,
"warnings": nil,
"auth": nil,
"data": map[string]interface{}{},
}
2015-04-02 01:36:13 +00:00
testResponseStatus(t, resp, 200)
testResponseBody(t, resp, &actual)
2016-08-08 20:00:31 +00:00
expected["request_id"] = actual["request_id"]
2015-04-02 01:36:13 +00:00
if !reflect.DeepEqual(actual, expected) {
2016-08-08 20:00:31 +00:00
t.Fatalf("bad:\nactual: %#v\nexpected: %#v\n", actual, expected)
2015-04-02 01:36:13 +00:00
}
}
func TestSysAuditHash(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
resp := testHttpPost(t, token, addr+"/v1/sys/audit/noop", map[string]interface{}{
"type": "noop",
})
testResponseStatus(t, resp, 204)
resp = testHttpPost(t, token, addr+"/v1/sys/audit-hash/noop", map[string]interface{}{
"input": "bar",
})
var actual map[string]interface{}
expected := map[string]interface{}{
2016-08-08 20:00:31 +00:00
"lease_id": "",
"renewable": false,
"lease_duration": json.Number("0"),
"wrap_info": nil,
"warnings": nil,
"auth": nil,
"data": map[string]interface{}{
"hash": "hmac-sha256:f9320baf0249169e73850cd6156ded0106e2bb6ad8cab01b7bbbebe6d1065317",
},
"hash": "hmac-sha256:f9320baf0249169e73850cd6156ded0106e2bb6ad8cab01b7bbbebe6d1065317",
}
testResponseStatus(t, resp, 200)
testResponseBody(t, resp, &actual)
2016-08-08 20:00:31 +00:00
expected["request_id"] = actual["request_id"]
if !reflect.DeepEqual(actual, expected) {
t.Fatalf("bad: expected:\n%#v\n, got:\n%#v\n", expected, actual)
}
}