-
Notifications
You must be signed in to change notification settings - Fork 4.3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Becca Petrin
authored
Nov 7, 2018
1 parent
f63bcdf
commit fb89af7
Showing
88 changed files
with
1,474 additions
and
778 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -220,7 +220,7 @@ func TestBackend_PermittedDNSDomainsIntermediateCA(t *testing.T) { | |
// Sign the intermediate CSR using /pki | ||
secret, err = client.Logical().Write("pki/root/sign-intermediate", map[string]interface{}{ | ||
"permitted_dns_domains": ".myvault.com", | ||
"csr": intermediateCSR, | ||
"csr": intermediateCSR, | ||
}) | ||
if err != nil { | ||
t.Fatal(err) | ||
|
@@ -840,7 +840,7 @@ func TestBackend_CertWrites(t *testing.T) { | |
} | ||
|
||
tc := logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "aaa", ca1, "foo", allowed{}, false), | ||
testAccStepCert(t, "bbb", ca2, "foo", allowed{}, false), | ||
|
@@ -863,7 +863,7 @@ func TestBackend_basic_CA(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -898,7 +898,7 @@ func TestBackend_Basic_CRLs(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCertNoLease(t, "web", ca, "foo"), | ||
testAccStepLoginDefaultLease(t, connState), | ||
|
@@ -923,7 +923,7 @@ func TestBackend_basic_singleCert(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -948,7 +948,7 @@ func TestBackend_common_name_singleCert(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -977,7 +977,7 @@ func TestBackend_ext_singleCert(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{ext: "2.1.1.1:A UTF8String Extension"}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -1032,7 +1032,7 @@ func TestBackend_dns_singleCert(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{dns: "example.com"}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -1063,7 +1063,7 @@ func TestBackend_email_singleCert(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{emails: "[email protected]"}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -1094,7 +1094,7 @@ func TestBackend_organizationalUnit_singleCert(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{organizational_units: "engineering"}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -1123,7 +1123,7 @@ func TestBackend_uri_singleCert(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "web", ca, "foo", allowed{uris: "spiffe://example.com/*"}, false), | ||
testAccStepLogin(t, connState), | ||
|
@@ -1151,7 +1151,7 @@ func TestBackend_mixed_constraints(t *testing.T) { | |
t.Fatalf("err: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepCert(t, "1unconstrained", ca, "foo", allowed{}, false), | ||
testAccStepCert(t, "2matching", ca, "foo", allowed{names: "*.example.com,whatever"}, false), | ||
|
@@ -1172,7 +1172,7 @@ func TestBackend_untrusted(t *testing.T) { | |
t.Fatalf("error testing connection state: %v", err) | ||
} | ||
logicaltest.Test(t, logicaltest.TestCase{ | ||
Backend: testFactory(t), | ||
CredentialBackend: testFactory(t), | ||
Steps: []logicaltest.TestStep{ | ||
testAccStepLoginInvalid(t, connState), | ||
}, | ||
|
Oops, something went wrong.