// Verify that we are able to update from non-salted (<0.2) to // using a Salt for the paths func TestBackend_upgradeToSalted(t *testing.T) { inm := new(logical.InmemStorage) // Create some fake keys se, _ := logical.StorageEntryJSON("struct/map/app-id/foo", map[string]string{"value": "test"}) inm.Put(se) se, _ = logical.StorageEntryJSON("struct/map/user-id/bar", map[string]string{"value": "foo"}) inm.Put(se) // Initialize the backend, this should do the automatic upgrade conf := &logical.BackendConfig{ StorageView: inm, } backend, err := Factory(conf) if err != nil { t.Fatalf("err: %v", err) } // Check the keys have been upgraded out, err := inm.Get("struct/map/app-id/foo") if err != nil { t.Fatalf("err: %v", err) } if out != nil { t.Fatalf("unexpected key") } out, err = inm.Get("struct/map/user-id/bar") if err != nil { t.Fatalf("err: %v", err) } if out != nil { t.Fatalf("unexpected key") } // Backend should still be able to resolve req := logical.TestRequest(t, logical.ReadOperation, "map/app-id/foo") req.Storage = inm resp, err := backend.HandleRequest(req) if err != nil { t.Fatalf("err: %v", err) } if resp.Data["value"] != "test" { t.Fatalf("bad: %#v", resp) } req = logical.TestRequest(t, logical.ReadOperation, "map/user-id/bar") req.Storage = inm resp, err = backend.HandleRequest(req) if err != nil { t.Fatalf("err: %v", err) } if resp.Data["value"] != "foo" { t.Fatalf("bad: %#v", resp) } }
func TestPathMap_Salted(t *testing.T) { storage := new(logical.InmemStorage) salt, err := salt.NewSalt(storage, &salt.Config{ HashFunc: salt.SHA1Hash, }) if err != nil { t.Fatalf("err: %v", err) } p := &PathMap{Name: "foo", Salt: salt} var b logical.Backend = &Backend{Paths: p.Paths()} // Write via HTTP _, err = b.HandleRequest(&logical.Request{ Operation: logical.WriteOperation, Path: "map/foo/a", Data: map[string]interface{}{ "value": "bar", }, Storage: storage, }) if err != nil { t.Fatalf("bad: %#v", err) } // Non-salted version should not be there out, err := storage.Get("struct/map/foo/a") if err != nil { t.Fatalf("err: %v", err) } if out != nil { t.Fatalf("non-salted key found") } // Ensure the path is salted expect := salt.SaltID("a") out, err = storage.Get("struct/map/foo/" + expect) if err != nil { t.Fatalf("err: %v", err) } if out == nil { t.Fatalf("missing salted key") } // Read via HTTP resp, err := b.HandleRequest(&logical.Request{ Operation: logical.ReadOperation, Path: "map/foo/a", Storage: storage, }) if err != nil { t.Fatalf("bad: %#v", err) } if resp.Data["value"] != "bar" { t.Fatalf("bad: %#v", resp) } // Read via API v, err := p.Get(storage, "a") if err != nil { t.Fatalf("bad: %#v", err) } if v["value"] != "bar" { t.Fatalf("bad: %#v", v) } // Read via API with other casing v, err = p.Get(storage, "A") if err != nil { t.Fatalf("bad: %#v", err) } if v["value"] != "bar" { t.Fatalf("bad: %#v", v) } // Verify List keys, err := p.List(storage, "") if err != nil { t.Fatalf("bad: %#v", err) } if len(keys) != 1 || keys[0] != expect { t.Fatalf("bad: %#v", keys) } // Delete via HTTP resp, err = b.HandleRequest(&logical.Request{ Operation: logical.DeleteOperation, Path: "map/foo/a", Storage: storage, }) if err != nil { t.Fatalf("bad: %#v", err) } if resp != nil { t.Fatalf("bad: %#v", resp) } // Re-read via HTTP resp, err = b.HandleRequest(&logical.Request{ Operation: logical.ReadOperation, Path: "map/foo/a", Storage: storage, }) if err != nil { t.Fatalf("bad: %#v", err) } if _, ok := resp.Data["value"]; ok { t.Fatalf("bad: %#v", resp) } // Re-read via API v, err = p.Get(storage, "a") if err != nil { t.Fatalf("bad: %#v", err) } if v != nil { t.Fatalf("bad: %#v", v) } }