7050c1ca41
* Add grpc plugins * Add grpc plugins * Translate wrap info to/from proto * Add nil checks * Fix nil marshaling errors * Provide logging through the go-plugin logger * handle errors in the messages * Update the TLS config so bidirectional connections work * Add connectivity checks * Restart plugin and add timeouts where context is not availible * Add the response wrap data into the grpc system implementation * Add leaseoptions to pb.Auth * Add an error translator * Add tests for translating the proto objects * Fix rename of function * Add tracing to plugins for easier debugging * Handle plugin crashes with the go-plugin context * Add test for grpcStorage * Add tests for backend and system * Bump go-plugin for GRPCBroker * Remove RegisterLicense * Add casing translations for new proto messages * Use doneCtx in grpcClient * Use doneCtx in grpcClient * s/shutdown/shut down/
76 lines
2 KiB
Go
76 lines
2 KiB
Go
package mock
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/rpc"
|
|
|
|
"github.com/hashicorp/vault/helper/errutil"
|
|
"github.com/hashicorp/vault/logical"
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
"github.com/hashicorp/vault/logical/plugin/pb"
|
|
)
|
|
|
|
// pathInternal is used to test viewing internal backend values. In this case,
|
|
// it is used to test the invalidate func.
|
|
func errorPaths(b *backend) []*framework.Path {
|
|
return []*framework.Path{
|
|
&framework.Path{
|
|
Pattern: "errors/rpc",
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
logical.ReadOperation: b.pathErrorRPCRead,
|
|
},
|
|
},
|
|
&framework.Path{
|
|
Pattern: "errors/kill",
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
logical.ReadOperation: b.pathErrorRPCRead,
|
|
},
|
|
},
|
|
&framework.Path{
|
|
Pattern: "errors/type",
|
|
Fields: map[string]*framework.FieldSchema{
|
|
"err_type": &framework.FieldSchema{Type: framework.TypeInt},
|
|
},
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
|
logical.CreateOperation: b.pathErrorRPCRead,
|
|
logical.UpdateOperation: b.pathErrorRPCRead,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func (b *backend) pathErrorRPCRead(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {
|
|
errTypeRaw, ok := data.GetOk("err_type")
|
|
if !ok {
|
|
return nil, rpc.ErrShutdown
|
|
}
|
|
|
|
var err error
|
|
switch uint32(errTypeRaw.(int)) {
|
|
case pb.ErrTypeUnknown:
|
|
err = errors.New("test")
|
|
case pb.ErrTypeUserError:
|
|
err = errutil.UserError{Err: "test"}
|
|
case pb.ErrTypeInternalError:
|
|
err = errutil.InternalError{Err: "test"}
|
|
case pb.ErrTypeCodedError:
|
|
err = logical.CodedError(403, "test")
|
|
case pb.ErrTypeStatusBadRequest:
|
|
err = &logical.StatusBadRequest{Err: "test"}
|
|
case pb.ErrTypeUnsupportedOperation:
|
|
err = logical.ErrUnsupportedOperation
|
|
case pb.ErrTypeUnsupportedPath:
|
|
err = logical.ErrUnsupportedPath
|
|
case pb.ErrTypeInvalidRequest:
|
|
err = logical.ErrInvalidRequest
|
|
case pb.ErrTypePermissionDenied:
|
|
err = logical.ErrPermissionDenied
|
|
case pb.ErrTypeMultiAuthzPending:
|
|
err = logical.ErrMultiAuthzPending
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|