github.com/smithx10/nomad@v0.9.1-rc1/client/vaultclient/vaultclient_testing.go (about)

     1  package vaultclient
     2  
     3  import (
     4  	"sync"
     5  
     6  	"github.com/hashicorp/nomad/helper/uuid"
     7  	"github.com/hashicorp/nomad/nomad/structs"
     8  	vaultapi "github.com/hashicorp/vault/api"
     9  )
    10  
    11  // MockVaultClient is used for testing the vaultclient integration and is safe
    12  // for concurrent access.
    13  type MockVaultClient struct {
    14  	// stoppedTokens tracks the tokens that have stopped renewing
    15  	stoppedTokens []string
    16  
    17  	// renewTokens are the tokens that have been renewed and their error
    18  	// channels
    19  	renewTokens map[string]chan error
    20  
    21  	// renewTokenErrors is used to return an error when the RenewToken is called
    22  	// with the given token
    23  	renewTokenErrors map[string]error
    24  
    25  	// deriveTokenErrors maps an allocation ID and tasks to an error when the
    26  	// token is derived
    27  	deriveTokenErrors map[string]map[string]error
    28  
    29  	// DeriveTokenFn allows the caller to control the DeriveToken function. If
    30  	// not set an error is returned if found in DeriveTokenErrors and otherwise
    31  	// a token is generated and returned
    32  	DeriveTokenFn func(a *structs.Allocation, tasks []string) (map[string]string, error)
    33  
    34  	mu sync.Mutex
    35  }
    36  
    37  // NewMockVaultClient returns a MockVaultClient for testing
    38  func NewMockVaultClient() *MockVaultClient { return &MockVaultClient{} }
    39  
    40  func (vc *MockVaultClient) DeriveToken(a *structs.Allocation, tasks []string) (map[string]string, error) {
    41  	vc.mu.Lock()
    42  	defer vc.mu.Unlock()
    43  
    44  	if vc.DeriveTokenFn != nil {
    45  		return vc.DeriveTokenFn(a, tasks)
    46  	}
    47  
    48  	tokens := make(map[string]string, len(tasks))
    49  	for _, task := range tasks {
    50  		if tasks, ok := vc.deriveTokenErrors[a.ID]; ok {
    51  			if err, ok := tasks[task]; ok {
    52  				return nil, err
    53  			}
    54  		}
    55  
    56  		tokens[task] = uuid.Generate()
    57  	}
    58  
    59  	return tokens, nil
    60  }
    61  
    62  func (vc *MockVaultClient) SetDeriveTokenError(allocID string, tasks []string, err error) {
    63  	vc.mu.Lock()
    64  	defer vc.mu.Unlock()
    65  
    66  	if vc.deriveTokenErrors == nil {
    67  		vc.deriveTokenErrors = make(map[string]map[string]error, 10)
    68  	}
    69  
    70  	if _, ok := vc.renewTokenErrors[allocID]; !ok {
    71  		vc.deriveTokenErrors[allocID] = make(map[string]error, 10)
    72  	}
    73  
    74  	for _, task := range tasks {
    75  		vc.deriveTokenErrors[allocID][task] = err
    76  	}
    77  }
    78  
    79  func (vc *MockVaultClient) RenewToken(token string, interval int) (<-chan error, error) {
    80  	vc.mu.Lock()
    81  	defer vc.mu.Unlock()
    82  
    83  	if err, ok := vc.renewTokenErrors[token]; ok {
    84  		return nil, err
    85  	}
    86  
    87  	renewCh := make(chan error)
    88  	if vc.renewTokens == nil {
    89  		vc.renewTokens = make(map[string]chan error, 10)
    90  	}
    91  	vc.renewTokens[token] = renewCh
    92  	return renewCh, nil
    93  }
    94  
    95  func (vc *MockVaultClient) SetRenewTokenError(token string, err error) {
    96  	vc.mu.Lock()
    97  	defer vc.mu.Unlock()
    98  
    99  	if vc.renewTokenErrors == nil {
   100  		vc.renewTokenErrors = make(map[string]error, 10)
   101  	}
   102  
   103  	vc.renewTokenErrors[token] = err
   104  }
   105  
   106  func (vc *MockVaultClient) StopRenewToken(token string) error {
   107  	vc.mu.Lock()
   108  	defer vc.mu.Unlock()
   109  
   110  	vc.stoppedTokens = append(vc.stoppedTokens, token)
   111  	return nil
   112  }
   113  
   114  func (vc *MockVaultClient) RenewLease(leaseId string, interval int) (<-chan error, error) {
   115  	return nil, nil
   116  }
   117  func (vc *MockVaultClient) StopRenewLease(leaseId string) error                   { return nil }
   118  func (vc *MockVaultClient) Start()                                                {}
   119  func (vc *MockVaultClient) Stop()                                                 {}
   120  func (vc *MockVaultClient) GetConsulACL(string, string) (*vaultapi.Secret, error) { return nil, nil }
   121  
   122  // StoppedTokens tracks the tokens that have stopped renewing
   123  func (vc *MockVaultClient) StoppedTokens() []string {
   124  	vc.mu.Lock()
   125  	defer vc.mu.Unlock()
   126  	return vc.stoppedTokens
   127  }
   128  
   129  // RenewTokens are the tokens that have been renewed and their error
   130  // channels
   131  func (vc *MockVaultClient) RenewTokens() map[string]chan error {
   132  	vc.mu.Lock()
   133  	defer vc.mu.Unlock()
   134  	return vc.renewTokens
   135  }
   136  
   137  // RenewTokenErrors is used to return an error when the RenewToken is called
   138  // with the given token
   139  func (vc *MockVaultClient) RenewTokenErrors() map[string]error {
   140  	vc.mu.Lock()
   141  	defer vc.mu.Unlock()
   142  	return vc.renewTokenErrors
   143  }
   144  
   145  // DeriveTokenErrors maps an allocation ID and tasks to an error when the
   146  // token is derived
   147  func (vc *MockVaultClient) DeriveTokenErrors() map[string]map[string]error {
   148  	vc.mu.Lock()
   149  	defer vc.mu.Unlock()
   150  	return vc.deriveTokenErrors
   151  }