forked from hashicorp/vault
-
Notifications
You must be signed in to change notification settings - Fork 0
/
sys_lease_test.go
73 lines (62 loc) · 1.94 KB
/
sys_lease_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
package http
import (
"testing"
"github.com/hashicorp/vault/sdk/helper/jsonutil"
"github.com/hashicorp/vault/vault"
)
func TestSysRenew(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
// write secret
resp := testHttpPut(t, token, addr+"/v1/secret/foo", map[string]interface{}{
"data": "bar",
"lease": "1h",
})
testResponseStatus(t, resp, 204)
// read secret
resp = testHttpGet(t, token, addr+"/v1/secret/foo")
var result struct {
LeaseID string `json:"lease_id"`
}
if err := jsonutil.DecodeJSONFromReader(resp.Body, &result); err != nil {
t.Fatalf("bad: %s", err)
}
var renewResult struct {
LeaseID string `json:"lease_id"`
Data map[string]interface{} `json:"data"`
}
resp = testHttpPut(t, token, addr+"/v1/sys/renew/"+result.LeaseID, nil)
testResponseStatus(t, resp, 200)
if err := jsonutil.DecodeJSONFromReader(resp.Body, &renewResult); err != nil {
t.Fatal(err)
}
if result.LeaseID != renewResult.LeaseID {
t.Fatal("lease id changed in renew request")
}
resp = testHttpPut(t, token, addr+"/v1/sys/leases/renew/"+result.LeaseID, nil)
testResponseStatus(t, resp, 200)
if err := jsonutil.DecodeJSONFromReader(resp.Body, &renewResult); err != nil {
t.Fatal(err)
}
if result.LeaseID != renewResult.LeaseID {
t.Fatal("lease id changed in renew request")
}
}
func TestSysRevoke(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
resp := testHttpPut(t, token, addr+"/v1/sys/revoke/secret/foo/1234", nil)
testResponseStatus(t, resp, 204)
}
func TestSysRevokePrefix(t *testing.T) {
core, _, token := vault.TestCoreUnsealed(t)
ln, addr := TestServer(t, core)
defer ln.Close()
TestServerAuth(t, addr, token)
resp := testHttpPut(t, token, addr+"/v1/sys/revoke-prefix/secret/foo/1234", nil)
testResponseStatus(t, resp, 204)
}