Add missing cert auth ocsp read data (#20154)
* Add missing OCSP cert auth fields Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com> * Add test to ensure OCSP values are persisted Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com> * Add changelog entry Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com> --------- Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
This commit is contained in:
parent
c0b8a9eddb
commit
10e02aca02
|
@ -1968,6 +1968,27 @@ func testAccStepCertWithExtraParams(t *testing.T, name string, cert []byte, poli
|
|||
}
|
||||
}
|
||||
|
||||
func testAccStepReadCertPolicy(t *testing.T, name string, expectError bool, expected map[string]interface{}) logicaltest.TestStep {
|
||||
return logicaltest.TestStep{
|
||||
Operation: logical.ReadOperation,
|
||||
Path: "certs/" + name,
|
||||
ErrorOk: expectError,
|
||||
Data: nil,
|
||||
Check: func(resp *logical.Response) error {
|
||||
if (resp == nil || len(resp.Data) == 0) && expectError {
|
||||
return fmt.Errorf("expected error but received nil")
|
||||
}
|
||||
for key, expectedValue := range expected {
|
||||
actualValue := resp.Data[key]
|
||||
if expectedValue != actualValue {
|
||||
return fmt.Errorf("Expected to get [%v]=[%v] but read [%v]=[%v] from server for certs/%v: %v", key, expectedValue, key, actualValue, name, resp)
|
||||
}
|
||||
}
|
||||
return nil
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func testAccStepCertLease(
|
||||
t *testing.T, name string, cert []byte, policies string,
|
||||
) logicaltest.TestStep {
|
||||
|
|
|
@ -288,6 +288,11 @@ func (b *backend) pathCertRead(ctx context.Context, req *logical.Request, d *fra
|
|||
"allowed_organizational_units": cert.AllowedOrganizationalUnits,
|
||||
"required_extensions": cert.RequiredExtensions,
|
||||
"allowed_metadata_extensions": cert.AllowedMetadataExtensions,
|
||||
"ocsp_ca_certificates": cert.OcspCaCertificates,
|
||||
"ocsp_enabled": cert.OcspEnabled,
|
||||
"ocsp_servers_override": cert.OcspServersOverride,
|
||||
"ocsp_fail_open": cert.OcspFailOpen,
|
||||
"ocsp_query_all_servers": cert.OcspQueryAllServers,
|
||||
}
|
||||
cert.PopulateTokenData(data)
|
||||
|
||||
|
|
|
@ -348,6 +348,7 @@ func TestCert_RoleResolveOCSP(t *testing.T) {
|
|||
Steps: []logicaltest.TestStep{
|
||||
testAccStepCertWithExtraParams(t, "web", ca, "foo", allowed{dns: "example.com"}, false,
|
||||
map[string]interface{}{"ocsp_enabled": true, "ocsp_fail_open": c.failOpen}),
|
||||
testAccStepReadCertPolicy(t, "web", false, map[string]interface{}{"ocsp_enabled": true, "ocsp_fail_open": c.failOpen}),
|
||||
loginStep,
|
||||
resolveStep,
|
||||
},
|
||||
|
|
|
@ -0,0 +1,2 @@
|
|||
```release-note:bug
|
||||
auth/cert: Include OCSP parameters in read CA certificate role response.
|
Loading…
Reference in New Issue