123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115 |
- # -*- coding: utf-8 -*-
- '''
- Integration tests for the vault modules
- '''
- # Import Python Libs
- from __future__ import absolute_import, print_function, unicode_literals
- import inspect
- import time
- # Import Salt Testing Libs
- from tests.support.unit import skipIf
- from tests.support.case import ModuleCase, ShellCase
- from tests.support.helpers import destructiveTest, flaky
- from tests.support.paths import FILES
- # Import Salt Libs
- import salt.utils.path
- @destructiveTest
- @skipIf(not salt.utils.path.which('dockerd'), 'Docker not installed')
- @skipIf(not salt.utils.path.which('vault'), 'Vault not installed')
- class VaultTestCase(ModuleCase, ShellCase):
- '''
- Test vault module
- '''
- count = 0
- def setUp(self):
- '''
- SetUp vault container
- '''
- if VaultTestCase.count == 0:
- config = '{"backend": {"file": {"path": "/vault/file"}}, "default_lease_ttl": "168h", "max_lease_ttl": "720h"}'
- self.run_state('docker_image.present', name='vault', tag='0.9.6')
- self.run_state(
- 'docker_container.running',
- name='vault',
- image='vault:0.9.6',
- port_bindings='8200:8200',
- environment={
- 'VAULT_DEV_ROOT_TOKEN_ID': 'testsecret',
- 'VAULT_LOCAL_CONFIG': config,
- },
- cap_add='IPC_LOCK',
- )
- time.sleep(5)
- ret = self.run_function(
- 'cmd.retcode',
- cmd='/usr/local/bin/vault login token=testsecret',
- env={'VAULT_ADDR': 'http://127.0.0.1:8200'},
- )
- login_attempts = 1
- # If the login failed, container might have stopped
- # attempt again, maximum of three times before
- # skipping.
- while ret != 0:
- self.run_state(
- 'docker_container.running',
- name='vault',
- image='vault:0.9.6',
- port_bindings='8200:8200',
- environment={
- 'VAULT_DEV_ROOT_TOKEN_ID': 'testsecret',
- 'VAULT_LOCAL_CONFIG': config,
- },
- cap_add='IPC_LOCK',
- )
- time.sleep(5)
- ret = self.run_function(
- 'cmd.retcode',
- cmd='/usr/local/bin/vault login token=testsecret',
- env={'VAULT_ADDR': 'http://127.0.0.1:8200'},
- )
- login_attempts += 1
- if login_attempts >= 3:
- self.skipTest('unable to login to vault')
- ret = self.run_function(
- 'cmd.retcode',
- cmd='/usr/local/bin/vault policy write testpolicy {0}/vault.hcl'.format(FILES),
- env={'VAULT_ADDR': 'http://127.0.0.1:8200'},
- )
- if ret != 0:
- self.skipTest('unable to assign policy to vault')
- VaultTestCase.count += 1
- def tearDown(self):
- '''
- TearDown vault container
- '''
- def count_tests(funcobj):
- return inspect.ismethod(funcobj) or \
- inspect.isfunction(funcobj) and \
- funcobj.__name__.startswith('test_')
- numtests = len(inspect.getmembers(VaultTestCase, predicate=count_tests))
- if VaultTestCase.count >= numtests:
- self.run_state('docker_container.stopped', name='vault')
- self.run_state('docker_container.absent', name='vault')
- self.run_state('docker_image.absent', name='vault', force=True)
- @flaky
- def test_sdb(self):
- assert self.run_function('sdb.set', uri='sdb://sdbvault/secret/test/test_sdb/foo', value='bar') is True
- assert self.run_function('sdb.get', arg=['sdb://sdbvault/secret/test/test_sdb/foo']) == 'bar'
- @flaky
- def test_sdb_runner(self):
- assert self.run_run('sdb.set sdb://sdbvault/secret/test/test_sdb_runner/foo bar') == ['True']
- assert self.run_run('sdb.get sdb://sdbvault/secret/test/test_sdb_runner/foo') == ['bar']
- @flaky
- def test_config(self):
- assert self.run_function('sdb.set', uri='sdb://sdbvault/secret/test/test_pillar_sdb/foo', value='bar') is True
- assert self.run_function('config.get', arg=['test_vault_pillar_sdb']) == 'bar'
|