101 lines
2.4 KiB
Go
101 lines
2.4 KiB
Go
package vault
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
)
|
|
|
|
func TestCapabilitiesAccessor(t *testing.T) {
|
|
c, _, token := TestCoreUnsealed(t)
|
|
|
|
// Lookup the token in the store to get root token's accessor
|
|
tokenEntry, err := c.tokenStore.Lookup(token)
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
accessor := tokenEntry.Accessor
|
|
|
|
// Use the accessor to fetch the capabilities
|
|
actual, err := c.CapabilitiesAccessor(accessor, "path")
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
expected := []string{"root"}
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
|
|
}
|
|
|
|
// Create a policy
|
|
policy, _ := Parse(aclPolicy)
|
|
err = c.policyStore.SetPolicy(policy)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
// Create a token for the policy
|
|
ent := &TokenEntry{
|
|
ID: "capabilitiestoken",
|
|
Path: "testpath",
|
|
Policies: []string{"dev"},
|
|
}
|
|
if err := c.tokenStore.create(ent); err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
// Lookup the token in the store to get token's accessor
|
|
tokenEntry, err = c.tokenStore.Lookup("capabilitiestoken")
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
accessor = tokenEntry.Accessor
|
|
|
|
// Use the accessor to fetch the capabilities
|
|
actual, err = c.CapabilitiesAccessor(accessor, "foo/bar")
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
expected = []string{"sudo", "read", "create"}
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
|
|
}
|
|
}
|
|
|
|
func TestCapabilities(t *testing.T) {
|
|
c, _, token := TestCoreUnsealed(t)
|
|
|
|
actual, err := c.Capabilities(token, "path")
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
expected := []string{"root"}
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
|
|
}
|
|
|
|
// Create a policy
|
|
policy, _ := Parse(aclPolicy)
|
|
err = c.policyStore.SetPolicy(policy)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
// Create a token for the policy
|
|
ent := &TokenEntry{
|
|
ID: "capabilitiestoken",
|
|
Path: "testpath",
|
|
Policies: []string{"dev"},
|
|
}
|
|
if err := c.tokenStore.create(ent); err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
actual, err = c.Capabilities("capabilitiestoken", "foo/bar")
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
expected = []string{"sudo", "read", "create"}
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("bad: got\n%#v\nexpected\n%#v\n", actual, expected)
|
|
}
|
|
}
|