e0ce2195cc
* upgrade aws roles * test upgrade aws roles * Initialize aws credential backend at mount time * add a TODO * create end-to-end test for builtin/credential/aws * fix bug in initializer * improve comments * add Initialize() to logical.Backend * use Initialize() in Core.enableCredentialInternal() * use InitializeRequest to call Initialize() * improve unit testing for framework.Backend * call logical.Backend.Initialize() from all of the places that it needs to be called. * implement backend.proto changes for logical.Backend.Initialize() * persist current role storage version when upgrading aws roles * format comments correctly * improve comments * use postUnseal funcs to initialize backends * simplify test suite * improve test suite * simplify logic in aws role upgrade * simplify aws credential initialization logic * simplify logic in aws role upgrade * use the core's activeContext for initialization * refactor builtin/plugin/Backend * use a goroutine to upgrade the aws roles * misc improvements and cleanup * do not run AWS role upgrade on DR Secondary * always call logical.Backend.Initialize() when loading a plugin. * improve comments * on standbys and DR secondaries we do not want to run any kind of upgrade logic * fix awsVersion struct * clarify aws version upgrade * make the upgrade logic for aws auth more explicit * aws upgrade is now called from a switch * fix fallthrough bug * simplify logic * simplify logic * rename things * introduce currentAwsVersion const to track aws version * improve comments * rearrange things once more * conglomerate things into one function * stub out aws auth initialize e2e test * improve aws auth initialize e2e test * finish aws auth initialize e2e test * tinker with aws auth initialize e2e test * tinker with aws auth initialize e2e test * tinker with aws auth initialize e2e test * fix typo in test suite * simplify logic a tad * rearrange assignment * Fix a few lifecycle related issues in #7025 (#7075) * Fix panic when plugin fails to load
188 lines
4 KiB
Go
188 lines
4 KiB
Go
package plugin
|
|
|
|
import (
|
|
"context"
|
|
"os"
|
|
"testing"
|
|
"time"
|
|
|
|
log "github.com/hashicorp/go-hclog"
|
|
gplugin "github.com/hashicorp/go-plugin"
|
|
"github.com/hashicorp/vault/sdk/helper/logging"
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
"github.com/hashicorp/vault/sdk/plugin/mock"
|
|
)
|
|
|
|
func TestGRPCBackendPlugin_impl(t *testing.T) {
|
|
var _ gplugin.Plugin = new(GRPCBackendPlugin)
|
|
var _ logical.Backend = new(backendGRPCPluginClient)
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_HandleRequest(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
resp, err := b.HandleRequest(context.Background(), &logical.Request{
|
|
Operation: logical.CreateOperation,
|
|
Path: "kv/foo",
|
|
Data: map[string]interface{}{
|
|
"value": "bar",
|
|
},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.Data["value"] != "bar" {
|
|
t.Fatalf("bad: %#v", resp)
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_SpecialPaths(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
paths := b.SpecialPaths()
|
|
if paths == nil {
|
|
t.Fatal("SpecialPaths() returned nil")
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_System(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
sys := b.System()
|
|
if sys == nil {
|
|
t.Fatal("System() returned nil")
|
|
}
|
|
|
|
actual := sys.DefaultLeaseTTL()
|
|
expected := 300 * time.Second
|
|
|
|
if actual != expected {
|
|
t.Fatalf("bad: %v, expected %v", actual, expected)
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Logger(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
logger := b.Logger()
|
|
if logger == nil {
|
|
t.Fatal("Logger() returned nil")
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_HandleExistenceCheck(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
checkFound, exists, err := b.HandleExistenceCheck(context.Background(), &logical.Request{
|
|
Operation: logical.CreateOperation,
|
|
Path: "kv/foo",
|
|
Data: map[string]interface{}{"value": "bar"},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !checkFound {
|
|
t.Fatal("existence check not found for path 'kv/foo")
|
|
}
|
|
if exists {
|
|
t.Fatal("existence check should have returned 'false' for 'kv/foo'")
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Cleanup(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
b.Cleanup(context.Background())
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_InvalidateKey(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
ctx := context.Background()
|
|
|
|
resp, err := b.HandleRequest(ctx, &logical.Request{
|
|
Operation: logical.ReadOperation,
|
|
Path: "internal",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.Data["value"] == "" {
|
|
t.Fatalf("bad: %#v, expected non-empty value", resp)
|
|
}
|
|
|
|
b.InvalidateKey(ctx, "internal")
|
|
|
|
resp, err = b.HandleRequest(ctx, &logical.Request{
|
|
Operation: logical.ReadOperation,
|
|
Path: "internal",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.Data["value"] != "" {
|
|
t.Fatalf("bad: expected empty response data, got %#v", resp)
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Setup(t *testing.T) {
|
|
_, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Initialize(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
err := b.Initialize(context.Background(), &logical.InitializationRequest{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func testGRPCBackend(t *testing.T) (logical.Backend, func()) {
|
|
// Create a mock provider
|
|
pluginMap := map[string]gplugin.Plugin{
|
|
"backend": &GRPCBackendPlugin{
|
|
Factory: mock.Factory,
|
|
Logger: log.New(&log.LoggerOptions{
|
|
Level: log.Debug,
|
|
Output: os.Stderr,
|
|
JSONFormat: true,
|
|
}),
|
|
},
|
|
}
|
|
client, _ := gplugin.TestPluginGRPCConn(t, pluginMap)
|
|
cleanup := func() {
|
|
client.Close()
|
|
}
|
|
|
|
// Request the backend
|
|
raw, err := client.Dispense(BackendPluginName)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
b := raw.(logical.Backend)
|
|
|
|
err = b.Setup(context.Background(), &logical.BackendConfig{
|
|
Logger: logging.NewVaultLogger(log.Debug),
|
|
System: &logical.StaticSystemView{
|
|
DefaultLeaseTTLVal: 300 * time.Second,
|
|
MaxLeaseTTLVal: 1800 * time.Second,
|
|
},
|
|
StorageView: &logical.InmemStorage{},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
return b, cleanup
|
|
}
|