mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-11 09:07:00 +02:00
* Add grpc plugins * Add grpc plugins * Translate wrap info to/from proto * Add nil checks * Fix nil marshaling errors * Provide logging through the go-plugin logger * handle errors in the messages * Update the TLS config so bidirectional connections work * Add connectivity checks * Restart plugin and add timeouts where context is not availible * Add the response wrap data into the grpc system implementation * Add leaseoptions to pb.Auth * Add an error translator * Add tests for translating the proto objects * Fix rename of function * Add tracing to plugins for easier debugging * Handle plugin crashes with the go-plugin context * Add test for grpcStorage * Add tests for backend and system * Bump go-plugin for GRPCBroker * Remove RegisterLicense * Add casing translations for new proto messages * Use doneCtx in grpcClient * Use doneCtx in grpcClient * s/shutdown/shut down/
187 lines
3.9 KiB
Go
187 lines
3.9 KiB
Go
package plugin
|
|
|
|
import (
|
|
"context"
|
|
"os"
|
|
"testing"
|
|
"time"
|
|
|
|
hclog "github.com/hashicorp/go-hclog"
|
|
gplugin "github.com/hashicorp/go-plugin"
|
|
"github.com/hashicorp/vault/helper/logformat"
|
|
"github.com/hashicorp/vault/logical"
|
|
"github.com/hashicorp/vault/logical/plugin/mock"
|
|
log "github.com/mgutz/logxi/v1"
|
|
)
|
|
|
|
func TestGRPCBackendPlugin_impl(t *testing.T) {
|
|
var _ gplugin.Plugin = new(BackendPlugin)
|
|
var _ logical.Backend = new(backendPluginClient)
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_HandleRequest(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
resp, err := b.HandleRequest(context.Background(), &logical.Request{
|
|
Operation: logical.CreateOperation,
|
|
Path: "kv/foo",
|
|
Data: map[string]interface{}{
|
|
"value": "bar",
|
|
},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.Data["value"] != "bar" {
|
|
t.Fatalf("bad: %#v", resp)
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_SpecialPaths(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
paths := b.SpecialPaths()
|
|
if paths == nil {
|
|
t.Fatal("SpecialPaths() returned nil")
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_System(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
sys := b.System()
|
|
if sys == nil {
|
|
t.Fatal("System() returned nil")
|
|
}
|
|
|
|
actual := sys.DefaultLeaseTTL()
|
|
expected := 300 * time.Second
|
|
|
|
if actual != expected {
|
|
t.Fatalf("bad: %v, expected %v", actual, expected)
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Logger(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
logger := b.Logger()
|
|
if logger == nil {
|
|
t.Fatal("Logger() returned nil")
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_HandleExistenceCheck(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
checkFound, exists, err := b.HandleExistenceCheck(context.Background(), &logical.Request{
|
|
Operation: logical.CreateOperation,
|
|
Path: "kv/foo",
|
|
Data: map[string]interface{}{"value": "bar"},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !checkFound {
|
|
t.Fatal("existence check not found for path 'kv/foo")
|
|
}
|
|
if exists {
|
|
t.Fatal("existence check should have returned 'false' for 'kv/foo'")
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Cleanup(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
b.Cleanup()
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Initialize(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
err := b.Initialize()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_InvalidateKey(t *testing.T) {
|
|
b, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
|
|
resp, err := b.HandleRequest(context.Background(), &logical.Request{
|
|
Operation: logical.ReadOperation,
|
|
Path: "internal",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.Data["value"] == "" {
|
|
t.Fatalf("bad: %#v, expected non-empty value", resp)
|
|
}
|
|
|
|
b.InvalidateKey("internal")
|
|
|
|
resp, err = b.HandleRequest(context.Background(), &logical.Request{
|
|
Operation: logical.ReadOperation,
|
|
Path: "internal",
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.Data["value"] != "" {
|
|
t.Fatalf("bad: expected empty response data, got %#v", resp)
|
|
}
|
|
}
|
|
|
|
func TestGRPCBackendPlugin_Setup(t *testing.T) {
|
|
_, cleanup := testGRPCBackend(t)
|
|
defer cleanup()
|
|
}
|
|
|
|
func testGRPCBackend(t *testing.T) (logical.Backend, func()) {
|
|
// Create a mock provider
|
|
pluginMap := map[string]gplugin.Plugin{
|
|
"backend": &BackendPlugin{
|
|
Factory: mock.Factory,
|
|
Logger: hclog.New(&hclog.LoggerOptions{
|
|
Level: hclog.Trace,
|
|
Output: os.Stderr,
|
|
JSONFormat: true,
|
|
}),
|
|
},
|
|
}
|
|
client, _ := gplugin.TestPluginGRPCConn(t, pluginMap)
|
|
cleanup := func() {
|
|
client.Close()
|
|
}
|
|
|
|
// Request the backend
|
|
raw, err := client.Dispense(BackendPluginName)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
b := raw.(logical.Backend)
|
|
|
|
err = b.Setup(&logical.BackendConfig{
|
|
Logger: logformat.NewVaultLogger(log.LevelTrace),
|
|
System: &logical.StaticSystemView{
|
|
DefaultLeaseTTLVal: 300 * time.Second,
|
|
MaxLeaseTTLVal: 1800 * time.Second,
|
|
},
|
|
StorageView: &logical.InmemStorage{},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
return b, cleanup
|
|
}
|