03cf302e9a
* logbridge with hclog and identical output * Initial search & replace This compiles, but there is a fair amount of TODO and commented out code, especially around the plugin logclient/logserver code. * strip logbridge * fix majority of tests * update logxi aliases * WIP fixing tests * more test fixes * Update test to hclog * Fix format * Rename hclog -> log * WIP making hclog and logxi love each other * update logger_test.go * clean up merged comments * Replace RawLogger interface with a Logger * Add some logger names * Replace Trace with Debug * update builtin logical logging patterns * Fix build errors * More log updates * update log approach in command and builtin * More log updates * update helper, http, and logical directories * Update loggers * Log updates * Update logging * Update logging * Update logging * Update logging * update logging in physical * prefixing and lowercase * Update logging * Move phyisical logging name to server command * Fix som tests * address jims feedback so far * incorporate brians feedback so far * strip comments * move vault.go to logging package * update Debug to Trace * Update go-plugin deps * Update logging based on review comments * Updates from review * Unvendor logxi * Remove null_logger.go
94 lines
2.1 KiB
Go
94 lines
2.1 KiB
Go
package command
|
|
|
|
import (
|
|
"testing"
|
|
|
|
log "github.com/hashicorp/go-hclog"
|
|
"github.com/hashicorp/vault/api"
|
|
vaulthttp "github.com/hashicorp/vault/http"
|
|
"github.com/hashicorp/vault/logical"
|
|
"github.com/hashicorp/vault/vault"
|
|
|
|
credAppId "github.com/hashicorp/vault/builtin/credential/app-id"
|
|
)
|
|
|
|
func TestPathMap_Upgrade_API(t *testing.T) {
|
|
var err error
|
|
coreConfig := &vault.CoreConfig{
|
|
DisableMlock: true,
|
|
DisableCache: true,
|
|
Logger: log.NewNullLogger(),
|
|
CredentialBackends: map[string]logical.Factory{
|
|
"app-id": credAppId.Factory,
|
|
},
|
|
}
|
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, &vault.TestClusterOptions{
|
|
HandlerFunc: vaulthttp.Handler,
|
|
})
|
|
|
|
cluster.Start()
|
|
defer cluster.Cleanup()
|
|
|
|
cores := cluster.Cores
|
|
|
|
vault.TestWaitActive(t, cores[0].Core)
|
|
|
|
client := cores[0].Client
|
|
|
|
// Enable the app-id method
|
|
err = client.Sys().EnableAuthWithOptions("app-id", &api.EnableAuthOptions{
|
|
Type: "app-id",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Create an app-id
|
|
_, err = client.Logical().Write("auth/app-id/map/app-id/test-app-id", map[string]interface{}{
|
|
"policy": "test-policy",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Create a user-id
|
|
_, err = client.Logical().Write("auth/app-id/map/user-id/test-user-id", map[string]interface{}{
|
|
"value": "test-app-id",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Perform a login. It should succeed.
|
|
_, err = client.Logical().Write("auth/app-id/login", map[string]interface{}{
|
|
"app_id": "test-app-id",
|
|
"user_id": "test-user-id",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// List the hashed app-ids in the storage
|
|
secret, err := client.Logical().List("auth/app-id/map/app-id")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
hashedAppID := secret.Data["keys"].([]interface{})[0].(string)
|
|
|
|
// Try reading it. This used to cause an issue which is fixed in [GH-3806].
|
|
_, err = client.Logical().Read("auth/app-id/map/app-id/" + hashedAppID)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Ensure that there was no issue by performing another login
|
|
_, err = client.Logical().Write("auth/app-id/login", map[string]interface{}{
|
|
"app_id": "test-app-id",
|
|
"user_id": "test-user-id",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|