Browse Source

agent: rename authorize param ClientID to ClientCertURI

pull/4275/head
Mitchell Hashimoto 7 years ago
parent
commit
95da20ffd7
No known key found for this signature in database
GPG Key ID: 744E147AA52F5B0A
  1. 2
      agent/agent_endpoint.go
  2. 14
      agent/agent_endpoint_test.go
  3. 4
      agent/structs/connect.go

2
agent/agent_endpoint.go

@ -906,7 +906,7 @@ func (s *HTTPServer) AgentConnectAuthorize(resp http.ResponseWriter, req *http.R
}
// Parse the certificate URI from the client ID
uriRaw, err := url.Parse(authReq.ClientID)
uriRaw, err := url.Parse(authReq.ClientCertURI)
if err != nil {
return &connectAuthorizeResp{
Authorized: false,

14
agent/agent_endpoint_test.go

@ -2173,7 +2173,7 @@ func TestAgentConnectAuthorize_idInvalidFormat(t *testing.T) {
args := &structs.ConnectAuthorizeRequest{
Target: "web",
ClientID: "tubes",
ClientCertURI: "tubes",
}
req, _ := http.NewRequest("POST", "/v1/agent/connect/authorize", jsonReader(args))
resp := httptest.NewRecorder()
@ -2196,7 +2196,7 @@ func TestAgentConnectAuthorize_idNotService(t *testing.T) {
args := &structs.ConnectAuthorizeRequest{
Target: "web",
ClientID: "spiffe://1234.consul",
ClientCertURI: "spiffe://1234.consul",
}
req, _ := http.NewRequest("POST", "/v1/agent/connect/authorize", jsonReader(args))
resp := httptest.NewRecorder()
@ -2238,7 +2238,7 @@ func TestAgentConnectAuthorize_allow(t *testing.T) {
args := &structs.ConnectAuthorizeRequest{
Target: target,
ClientID: connect.TestSpiffeIDService(t, "web").URI().String(),
ClientCertURI: connect.TestSpiffeIDService(t, "web").URI().String(),
}
req, _ := http.NewRequest("POST", "/v1/agent/connect/authorize", jsonReader(args))
resp := httptest.NewRecorder()
@ -2280,7 +2280,7 @@ func TestAgentConnectAuthorize_deny(t *testing.T) {
args := &structs.ConnectAuthorizeRequest{
Target: target,
ClientID: connect.TestSpiffeIDService(t, "web").URI().String(),
ClientCertURI: connect.TestSpiffeIDService(t, "web").URI().String(),
}
req, _ := http.NewRequest("POST", "/v1/agent/connect/authorize", jsonReader(args))
resp := httptest.NewRecorder()
@ -2321,7 +2321,7 @@ func TestAgentConnectAuthorize_serviceWrite(t *testing.T) {
args := &structs.ConnectAuthorizeRequest{
Target: "foo",
ClientID: connect.TestSpiffeIDService(t, "web").URI().String(),
ClientCertURI: connect.TestSpiffeIDService(t, "web").URI().String(),
}
req, _ := http.NewRequest("POST",
"/v1/agent/connect/authorize?token="+token, jsonReader(args))
@ -2340,7 +2340,7 @@ func TestAgentConnectAuthorize_defaultDeny(t *testing.T) {
args := &structs.ConnectAuthorizeRequest{
Target: "foo",
ClientID: connect.TestSpiffeIDService(t, "web").URI().String(),
ClientCertURI: connect.TestSpiffeIDService(t, "web").URI().String(),
}
req, _ := http.NewRequest("POST", "/v1/agent/connect/authorize?token=root", jsonReader(args))
resp := httptest.NewRecorder()
@ -2370,7 +2370,7 @@ func TestAgentConnectAuthorize_defaultAllow(t *testing.T) {
args := &structs.ConnectAuthorizeRequest{
Target: "foo",
ClientID: connect.TestSpiffeIDService(t, "web").URI().String(),
ClientCertURI: connect.TestSpiffeIDService(t, "web").URI().String(),
}
req, _ := http.NewRequest("POST", "/v1/agent/connect/authorize?token=root", jsonReader(args))
resp := httptest.NewRecorder()

4
agent/structs/connect.go

@ -6,12 +6,12 @@ type ConnectAuthorizeRequest struct {
// Target is the name of the service that is being requested.
Target string
// ClientID is a unique identifier for the requesting client. This
// ClientCertURI is a unique identifier for the requesting client. This
// is currently the URI SAN from the TLS client certificate.
//
// ClientCertSerial is a colon-hex-encoded of the serial number for
// the requesting client cert. This is used to check against revocation
// lists.
ClientID string
ClientCertURI string
ClientCertSerial string
}

Loading…
Cancel
Save