Rename ParseDedupAndSortStrings to ParseDedupLowercaseAndSortStrings (#2614)
This commit is contained in:
parent
938eab37b6
commit
847c86f788
|
@ -1895,7 +1895,7 @@ func (b *backend) handleRoleSecretIDCommon(req *logical.Request, data *framework
|
|||
}
|
||||
|
||||
// Parse the CIDR blocks into a slice
|
||||
secretIDCIDRs := strutil.ParseDedupAndSortStrings(cidrList, ",")
|
||||
secretIDCIDRs := strutil.ParseDedupLowercaseAndSortStrings(cidrList, ",")
|
||||
|
||||
// Ensure that the CIDRs on the secret ID are a subset of that of role's
|
||||
if err := verifyCIDRRoleSecretIDSubset(secretIDCIDRs, role.BoundCIDRList); err != nil {
|
||||
|
|
|
@ -273,7 +273,7 @@ func (b *backend) validateBindSecretID(req *logical.Request, roleName, secretID,
|
|||
func verifyCIDRRoleSecretIDSubset(secretIDCIDRs []string, roleBoundCIDRList string) error {
|
||||
if len(secretIDCIDRs) != 0 {
|
||||
// Parse the CIDRs on role as a slice
|
||||
roleCIDRs := strutil.ParseDedupAndSortStrings(roleBoundCIDRList, ",")
|
||||
roleCIDRs := strutil.ParseDedupLowercaseAndSortStrings(roleBoundCIDRList, ",")
|
||||
|
||||
// If there are no CIDR blocks on the role, then the subset
|
||||
// requirement would be satisfied
|
||||
|
|
|
@ -1471,7 +1471,7 @@ func generateRoleSteps(t *testing.T, useCSRs bool) []logicaltest.TestStep {
|
|||
}
|
||||
cert := parsedCertBundle.Certificate
|
||||
|
||||
expected := strutil.ParseDedupAndSortStrings(role.OU, ",")
|
||||
expected := strutil.ParseDedupLowercaseAndSortStrings(role.OU, ",")
|
||||
if !reflect.DeepEqual(cert.Subject.OrganizationalUnit, expected) {
|
||||
return fmt.Errorf("Error: returned certificate has OU of %s but %s was specified in the role.", cert.Subject.OrganizationalUnit, expected)
|
||||
}
|
||||
|
@ -1492,7 +1492,7 @@ func generateRoleSteps(t *testing.T, useCSRs bool) []logicaltest.TestStep {
|
|||
}
|
||||
cert := parsedCertBundle.Certificate
|
||||
|
||||
expected := strutil.ParseDedupAndSortStrings(role.Organization, ",")
|
||||
expected := strutil.ParseDedupLowercaseAndSortStrings(role.Organization, ",")
|
||||
if !reflect.DeepEqual(cert.Subject.Organization, expected) {
|
||||
return fmt.Errorf("Error: returned certificate has Organization of %s but %s was specified in the role.", cert.Subject.Organization, expected)
|
||||
}
|
||||
|
|
|
@ -597,7 +597,7 @@ func generateCreationBundle(b *backend,
|
|||
if csr == nil || !role.UseCSRSANs {
|
||||
cnAltRaw, ok := data.GetOk("alt_names")
|
||||
if ok {
|
||||
cnAlt := strutil.ParseDedupAndSortStrings(cnAltRaw.(string), ",")
|
||||
cnAlt := strutil.ParseDedupLowercaseAndSortStrings(cnAltRaw.(string), ",")
|
||||
for _, v := range cnAlt {
|
||||
if strings.Contains(v, "@") {
|
||||
emailAddresses = append(emailAddresses, v)
|
||||
|
|
|
@ -52,7 +52,7 @@ func IPBelongsToCIDRBlocksString(ipAddr string, cidrList, separator string) (boo
|
|||
return false, fmt.Errorf("invalid IP address")
|
||||
}
|
||||
|
||||
return IPBelongsToCIDRBlocksSlice(ipAddr, strutil.ParseDedupAndSortStrings(cidrList, separator))
|
||||
return IPBelongsToCIDRBlocksSlice(ipAddr, strutil.ParseDedupLowercaseAndSortStrings(cidrList, separator))
|
||||
}
|
||||
|
||||
// IPBelongsToCIDRBlocksSlice checks if the given IP is encompassed by any of the given
|
||||
|
@ -95,7 +95,7 @@ func ValidateCIDRListString(cidrList string, separator string) (bool, error) {
|
|||
return false, fmt.Errorf("missing separator")
|
||||
}
|
||||
|
||||
return ValidateCIDRListSlice(strutil.ParseDedupAndSortStrings(cidrList, separator))
|
||||
return ValidateCIDRListSlice(strutil.ParseDedupLowercaseAndSortStrings(cidrList, separator))
|
||||
}
|
||||
|
||||
// ValidateCIDRListSlice checks if the given list of CIDR blocks are valid
|
||||
|
|
|
@ -32,7 +32,7 @@ func StrListSubset(super, sub []string) bool {
|
|||
// Parses a comma separated list of strings into a slice of strings.
|
||||
// The return slice will be sorted and will not contain duplicate or
|
||||
// empty items. The values will be converted to lower case.
|
||||
func ParseDedupAndSortStrings(input string, sep string) []string {
|
||||
func ParseDedupLowercaseAndSortStrings(input string, sep string) []string {
|
||||
input = strings.TrimSpace(input)
|
||||
parsed := []string{}
|
||||
if input == "" {
|
||||
|
@ -49,7 +49,7 @@ func ParseKeyValues(input string, out map[string]string, sep string) error {
|
|||
return fmt.Errorf("'out is nil")
|
||||
}
|
||||
|
||||
keyValues := ParseDedupAndSortStrings(input, sep)
|
||||
keyValues := ParseDedupLowercaseAndSortStrings(input, sep)
|
||||
if len(keyValues) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
|
|
@ -233,7 +233,7 @@ func newConsulBackend(conf map[string]string, logger log.Logger) (Backend, error
|
|||
kv: client.KV(),
|
||||
permitPool: NewPermitPool(maxParInt),
|
||||
serviceName: service,
|
||||
serviceTags: strutil.ParseDedupAndSortStrings(tags, ","),
|
||||
serviceTags: strutil.ParseDedupLowercaseAndSortStrings(tags, ","),
|
||||
checkTimeout: checkTimeout,
|
||||
disableRegistration: disableRegistration,
|
||||
consistencyMode: consistencyMode,
|
||||
|
|
|
@ -2202,9 +2202,9 @@ func (ts *TokenStore) tokenStoreRoleCreateUpdate(
|
|||
|
||||
disallowedPoliciesStr, ok := data.GetOk("disallowed_policies")
|
||||
if ok {
|
||||
entry.DisallowedPolicies = strutil.ParseDedupAndSortStrings(disallowedPoliciesStr.(string), ",")
|
||||
entry.DisallowedPolicies = strutil.ParseDedupLowercaseAndSortStrings(disallowedPoliciesStr.(string), ",")
|
||||
} else if req.Operation == logical.CreateOperation {
|
||||
entry.DisallowedPolicies = strutil.ParseDedupAndSortStrings(data.Get("disallowed_policies").(string), ",")
|
||||
entry.DisallowedPolicies = strutil.ParseDedupLowercaseAndSortStrings(data.Get("disallowed_policies").(string), ",")
|
||||
}
|
||||
|
||||
// Store it
|
||||
|
|
Loading…
Reference in New Issue