// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: MPL-2.0 package http import ( "encoding/json" "fmt" "reflect" "testing" "time" "github.com/fatih/structs" "github.com/go-test/deep" "github.com/hashicorp/vault/helper/testhelpers/corehelpers" "github.com/hashicorp/vault/helper/versions" "github.com/hashicorp/vault/sdk/helper/consts" "github.com/hashicorp/vault/vault" ) func TestSysMounts(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) resp := testHttpGet(t, token, addr+"/v1/sys/mounts") var actual map[string]interface{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] for k, v := range actual["data"].(map[string]interface{}) { if v.(map[string]interface{})["accessor"] == "" { t.Fatalf("no accessor from %s", k) } if v.(map[string]interface{})["uuid"] == "" { t.Fatalf("no uuid from %s", k) } expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] } if diff := deep.Equal(actual, expected); len(diff) > 0 { t.Fatalf("bad, diff: %#v", diff) } } func TestSysMount(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) resp := testHttpPost(t, token, addr+"/v1/sys/mounts/foo", map[string]interface{}{ "type": "kv", "description": "foo", "options": map[string]string{ "version": "1", }, }) testResponseStatus(t, resp, 204) resp = testHttpGet(t, token, addr+"/v1/sys/mounts") var actual map[string]interface{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "foo/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, }, "foo/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] for k, v := range actual["data"].(map[string]interface{}) { if v.(map[string]interface{})["accessor"] == "" { t.Fatalf("no accessor from %s", k) } if v.(map[string]interface{})["uuid"] == "" { t.Fatalf("no uuid from %s", k) } expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] } if diff := deep.Equal(actual, expected); len(diff) > 0 { t.Fatalf("bad, diff: %#v", diff) } } func TestSysMount_put(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) resp := testHttpPut(t, token, addr+"/v1/sys/mounts/foo", map[string]interface{}{ "type": "kv", "description": "foo", }) testResponseStatus(t, resp, 204) // The TestSysMount test tests the thing is actually created. See that test // for more info. } func TestSysRemount(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) resp := testHttpPost(t, token, addr+"/v1/sys/mounts/foo", map[string]interface{}{ "type": "kv", "description": "foo", }) testResponseStatus(t, resp, 204) resp = testHttpPost(t, token, addr+"/v1/sys/remount", map[string]interface{}{ "from": "foo", "to": "bar", }) testResponseStatus(t, resp, 200) // Poll until the remount succeeds var remountResp map[string]interface{} testResponseBody(t, resp, &remountResp) corehelpers.RetryUntil(t, 5*time.Second, func() error { resp = testHttpGet(t, token, addr+"/v1/sys/remount/status/"+remountResp["migration_id"].(string)) testResponseStatus(t, resp, 200) var remountStatusResp map[string]interface{} testResponseBody(t, resp, &remountStatusResp) status := remountStatusResp["data"].(map[string]interface{})["migration_info"].(map[string]interface{})["status"] if status != "success" { return fmt.Errorf("Expected migration status to be successful, got %q", status) } return nil }) resp = testHttpGet(t, token, addr+"/v1/sys/mounts") var actual map[string]interface{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "bar/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, }, "bar/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] for k, v := range actual["data"].(map[string]interface{}) { if v.(map[string]interface{})["accessor"] == "" { t.Fatalf("no accessor from %s", k) } if v.(map[string]interface{})["uuid"] == "" { t.Fatalf("no uuid from %s", k) } expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] } if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual: %#v\n", expected, actual) } } func TestSysUnmount(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) resp := testHttpPost(t, token, addr+"/v1/sys/mounts/foo", map[string]interface{}{ "type": "kv", "description": "foo", }) testResponseStatus(t, resp, 204) resp = testHttpDelete(t, token, addr+"/v1/sys/mounts/foo") testResponseStatus(t, resp, 204) resp = testHttpGet(t, token, addr+"/v1/sys/mounts") var actual map[string]interface{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] for k, v := range actual["data"].(map[string]interface{}) { if v.(map[string]interface{})["accessor"] == "" { t.Fatalf("no accessor from %s", k) } if v.(map[string]interface{})["uuid"] == "" { t.Fatalf("no uuid from %s", k) } expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] } if diff := deep.Equal(actual, expected); len(diff) > 0 { t.Fatalf("bad, diff: %#v", diff) } } func TestSysTuneMount_Options(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) resp := testHttpPost(t, token, addr+"/v1/sys/mounts/foo", map[string]interface{}{ "type": "kv", "description": "foo", }) testResponseStatus(t, resp, 204) // Mount-tune the options resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "options": map[string]string{ "test": "true", }, }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/foo/tune") testResponseStatus(t, resp, 200) actual := map[string]interface{}{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "foo", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"test": "true"}, }, "description": "foo", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"test": "true"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } // Check that we're not allowed to unset the options map once that's set resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "options": map[string]string{}, }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/foo/tune") testResponseStatus(t, resp, 200) actual = map[string]interface{}{} expected = map[string]interface{}{ "description": "foo", "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "foo", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"test": "true"}, }, "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"test": "true"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } } func TestSysTuneMount(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) resp := testHttpPost(t, token, addr+"/v1/sys/mounts/foo", map[string]interface{}{ "type": "kv", "description": "foo", }) testResponseStatus(t, resp, 204) resp = testHttpGet(t, token, addr+"/v1/sys/mounts") var actual map[string]interface{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "foo/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, }, "foo/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] for k, v := range actual["data"].(map[string]interface{}) { if v.(map[string]interface{})["accessor"] == "" { t.Fatalf("no accessor from %s", k) } if v.(map[string]interface{})["uuid"] == "" { t.Fatalf("no uuid from %s", k) } expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] } if diff := deep.Equal(actual, expected); len(diff) > 0 { t.Fatalf("bad, diff: %#v", diff) } // Shorter than system default resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "default_lease_ttl": "72h", }) testResponseStatus(t, resp, 204) // Longer than system max resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "default_lease_ttl": "72000h", }) testResponseStatus(t, resp, 204) // Longer than system default resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "max_lease_ttl": "72000h", }) testResponseStatus(t, resp, 204) // Longer than backend max resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "default_lease_ttl": "72001h", }) testResponseStatus(t, resp, 400) // Shorter than backend default resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "max_lease_ttl": "1h", }) testResponseStatus(t, resp, 400) // Shorter than backend max, longer than system max resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "default_lease_ttl": "71999h", }) testResponseStatus(t, resp, 204) // mark as versioned resp = testHttpPost(t, token, addr+"/v1/sys/mounts/foo/tune", map[string]interface{}{ "options": map[string]string{ "version": "1", }, }) testResponseStatus(t, resp, 200) resp = testHttpGet(t, token, addr+"/v1/sys/mounts") expected = map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "foo/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("259196400"), "max_lease_ttl": json.Number("259200000"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.DefaultBuiltinVersion, }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, }, "foo/": map[string]interface{}{ "description": "foo", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("259196400"), "max_lease_ttl": json.Number("259200000"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "secret/": map[string]interface{}{ "description": "key/value secret storage", "type": "kv", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": false, "seal_wrap": false, "options": map[string]interface{}{"version": "1"}, "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "sys/": map[string]interface{}{ "description": "system endpoints used for control, policy and debugging", "type": "system", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Accept"}, }, "local": false, "seal_wrap": true, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "kv"), }, "cubbyhole/": map[string]interface{}{ "description": "per-token private secret storage", "type": "cubbyhole", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, }, "local": true, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "cubbyhole"), }, "identity/": map[string]interface{}{ "description": "identity store", "type": "identity", "external_entropy_access": false, "config": map[string]interface{}{ "default_lease_ttl": json.Number("0"), "max_lease_ttl": json.Number("0"), "force_no_cache": false, "passthrough_request_headers": []interface{}{"Authorization"}, }, "local": false, "seal_wrap": false, "options": interface{}(nil), "plugin_version": "", "running_sha256": "", "running_plugin_version": versions.GetBuiltinVersion(consts.PluginTypeSecrets, "identity"), }, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] for k, v := range actual["data"].(map[string]interface{}) { if v.(map[string]interface{})["accessor"] == "" { t.Fatalf("no accessor from %s", k) } if v.(map[string]interface{})["uuid"] == "" { t.Fatalf("no uuid from %s", k) } expected[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["accessor"] = v.(map[string]interface{})["accessor"] expected["data"].(map[string]interface{})[k].(map[string]interface{})["uuid"] = v.(map[string]interface{})["uuid"] } if diff := deep.Equal(actual, expected); len(diff) > 0 { t.Fatalf("bad, diff: %#v", diff) } // Check simple configuration endpoint resp = testHttpGet(t, token, addr+"/v1/sys/mounts/foo/tune") actual = map[string]interface{}{} expected = map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "foo", "default_lease_ttl": json.Number("259196400"), "max_lease_ttl": json.Number("259200000"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, }, "description": "foo", "default_lease_ttl": json.Number("259196400"), "max_lease_ttl": json.Number("259200000"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } // Set a low max resp = testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "description": "foobar", "default_lease_ttl": "40s", "max_lease_ttl": "80s", }) testResponseStatus(t, resp, 204) resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") actual = map[string]interface{}{} expected = map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "foobar", "default_lease_ttl": json.Number("40"), "max_lease_ttl": json.Number("80"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, }, "description": "foobar", "default_lease_ttl": json.Number("40"), "max_lease_ttl": json.Number("80"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, } testResponseStatus(t, resp, 200) testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } // First try with lease above backend max resp = testHttpPut(t, token, addr+"/v1/secret/foo", map[string]interface{}{ "data": "bar", "ttl": "28347h", }) testResponseStatus(t, resp, 204) // read secret resp = testHttpGet(t, token, addr+"/v1/secret/foo") var result struct { LeaseID string `json:"lease_id" structs:"lease_id"` LeaseDuration int `json:"lease_duration" structs:"lease_duration"` } testResponseBody(t, resp, &result) expected = map[string]interface{}{ "lease_duration": int(80), "lease_id": result.LeaseID, } if !reflect.DeepEqual(structs.Map(result), expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, structs.Map(result)) } // Now with lease TTL unspecified resp = testHttpPut(t, token, addr+"/v1/secret/foo", map[string]interface{}{ "data": "bar", }) testResponseStatus(t, resp, 204) // read secret resp = testHttpGet(t, token, addr+"/v1/secret/foo") testResponseBody(t, resp, &result) expected = map[string]interface{}{ "lease_duration": int(40), "lease_id": result.LeaseID, } if !reflect.DeepEqual(structs.Map(result), expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, structs.Map(result)) } } func TestSysTuneMount_nonHMACKeys(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) // Mount-tune the audit_non_hmac_request_keys resp := testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "audit_non_hmac_request_keys": "foo", }) testResponseStatus(t, resp, 204) // Mount-tune the audit_non_hmac_response_keys resp = testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "audit_non_hmac_response_keys": "bar", }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual := map[string]interface{}{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "audit_non_hmac_request_keys": []interface{}{"foo"}, "audit_non_hmac_response_keys": []interface{}{"bar"}, "options": map[string]interface{}{"version": "1"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "audit_non_hmac_request_keys": []interface{}{"foo"}, "audit_non_hmac_response_keys": []interface{}{"bar"}, "options": map[string]interface{}{"version": "1"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } // Unset those mount tune values resp = testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "audit_non_hmac_request_keys": "", }) testResponseStatus(t, resp, 204) resp = testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "audit_non_hmac_response_keys": "", }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual = map[string]interface{}{} expected = map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } } func TestSysTuneMount_listingVisibility(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) // Get original tune values, ensure that listing_visibility is not set resp := testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual := map[string]interface{}{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } // Mount-tune the listing_visibility resp = testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "listing_visibility": "unauth", }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual = map[string]interface{}{} expected = map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "listing_visibility": "unauth", "options": map[string]interface{}{"version": "1"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "listing_visibility": "unauth", "options": map[string]interface{}{"version": "1"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } } func TestSysTuneMount_passthroughRequestHeaders(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) // Mount-tune the audit_non_hmac_request_keys resp := testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "passthrough_request_headers": "X-Vault-Foo", }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual := map[string]interface{}{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "options": map[string]interface{}{"version": "1"}, "force_no_cache": false, "passthrough_request_headers": []interface{}{"X-Vault-Foo"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "options": map[string]interface{}{"version": "1"}, "force_no_cache": false, "passthrough_request_headers": []interface{}{"X-Vault-Foo"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } // Unset the mount tune value resp = testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "passthrough_request_headers": "", }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual = map[string]interface{}{} expected = map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } } func TestSysTuneMount_allowedManagedKeys(t *testing.T) { core, _, token := vault.TestCoreUnsealed(t) ln, addr := TestServer(t, core) defer ln.Close() TestServerAuth(t, addr, token) // Mount-tune the allowed_managed_keys resp := testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "allowed_managed_keys": "test_key", }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual := map[string]interface{}{} expected := map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "options": map[string]interface{}{"version": "1"}, "force_no_cache": false, "allowed_managed_keys": []interface{}{"test_key"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "options": map[string]interface{}{"version": "1"}, "force_no_cache": false, "allowed_managed_keys": []interface{}{"test_key"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } // Unset the mount tune value resp = testHttpPost(t, token, addr+"/v1/sys/mounts/secret/tune", map[string]interface{}{ "allowed_managed_keys": "", }) testResponseStatus(t, resp, 204) // Check results resp = testHttpGet(t, token, addr+"/v1/sys/mounts/secret/tune") testResponseStatus(t, resp, 200) actual = map[string]interface{}{} expected = map[string]interface{}{ "lease_id": "", "renewable": false, "lease_duration": json.Number("0"), "wrap_info": nil, "warnings": nil, "auth": nil, "data": map[string]interface{}{ "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, }, "description": "key/value secret storage", "default_lease_ttl": json.Number("2764800"), "max_lease_ttl": json.Number("2764800"), "force_no_cache": false, "options": map[string]interface{}{"version": "1"}, } testResponseBody(t, resp, &actual) expected["request_id"] = actual["request_id"] if !reflect.DeepEqual(actual, expected) { t.Fatalf("bad:\nExpected: %#v\nActual:%#v", expected, actual) } }