// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: BUSL-1.1 package bindingrulelist import ( "encoding/json" "fmt" "strings" "testing" "github.com/hashicorp/consul/agent" "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/testrpc" "github.com/mitchellh/cli" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" // activate testing auth method _ "github.com/hashicorp/consul/agent/consul/authmethod/testauth" ) func TestBindingRuleListCommand_noTabs(t *testing.T) { t.Parallel() if strings.ContainsRune(New(cli.NewMockUi()).Help(), '\t') { t.Fatal("help has tabs") } } func TestBindingRuleListCommand(t *testing.T) { if testing.Short() { t.Skip("too slow for testing.Short") } t.Parallel() a := agent.NewTestAgent(t, ` primary_datacenter = "dc1" acl { enabled = true tokens { initial_management = "root" } }`) defer a.Shutdown() testrpc.WaitForLeader(t, a.RPC, "dc1") client := a.Client() { _, _, err := client.ACL().AuthMethodCreate( &api.ACLAuthMethod{ Name: "test-1", Type: "testing", }, &api.WriteOptions{Token: "root"}, ) require.NoError(t, err) _, _, err = client.ACL().AuthMethodCreate( &api.ACLAuthMethod{ Name: "test-2", Type: "testing", }, &api.WriteOptions{Token: "root"}, ) require.NoError(t, err) } createRule := func(t *testing.T, methodName, description string) string { rule, _, err := client.ACL().BindingRuleCreate( &api.ACLBindingRule{ AuthMethod: methodName, Description: description, BindType: api.BindingRuleBindTypeService, BindName: "test-${serviceaccount.name}", Selector: "serviceaccount.namespace==default", }, &api.WriteOptions{Token: "root"}, ) require.NoError(t, err) return rule.ID } var ruleIDs []string for i := 0; i < 10; i++ { name := fmt.Sprintf("test-rule-%d", i) var methodName string if i%2 == 0 { methodName = "test-1" } else { methodName = "test-2" } id := createRule(t, methodName, name) ruleIDs = append(ruleIDs, id) } t.Run("normal", func(t *testing.T) { args := []string{ "-http-addr=" + a.HTTPAddr(), "-token=root", } ui := cli.NewMockUi() cmd := New(ui) code := cmd.Run(args) require.Equal(t, code, 0) require.Empty(t, ui.ErrorWriter.String()) output := ui.OutputWriter.String() for i, v := range ruleIDs { require.Contains(t, output, fmt.Sprintf("test-rule-%d", i)) require.Contains(t, output, v) } }) t.Run("filter by method 1", func(t *testing.T) { args := []string{ "-http-addr=" + a.HTTPAddr(), "-token=root", "-method=test-1", } ui := cli.NewMockUi() cmd := New(ui) code := cmd.Run(args) require.Equal(t, code, 0) require.Empty(t, ui.ErrorWriter.String()) output := ui.OutputWriter.String() for i, v := range ruleIDs { if i%2 == 0 { require.Contains(t, output, fmt.Sprintf("test-rule-%d", i)) require.Contains(t, output, v) } } }) t.Run("filter by method 2", func(t *testing.T) { args := []string{ "-http-addr=" + a.HTTPAddr(), "-token=root", "-method=test-2", } ui := cli.NewMockUi() cmd := New(ui) code := cmd.Run(args) require.Equal(t, code, 0) require.Empty(t, ui.ErrorWriter.String()) output := ui.OutputWriter.String() for i, v := range ruleIDs { if i%2 == 1 { require.Contains(t, output, fmt.Sprintf("test-rule-%d", i)) require.Contains(t, output, v) } } }) t.Run("normal json formatted", func(t *testing.T) { args := []string{ "-http-addr=" + a.HTTPAddr(), "-token=root", "-format=json", } ui := cli.NewMockUi() cmd := New(ui) code := cmd.Run(args) require.Equal(t, code, 0) require.Empty(t, ui.ErrorWriter.String()) output := ui.OutputWriter.String() for i, v := range ruleIDs { require.Contains(t, output, fmt.Sprintf("test-rule-%d", i)) require.Contains(t, output, v) } var jsonOutput json.RawMessage err := json.Unmarshal([]byte(output), &jsonOutput) assert.NoError(t, err) }) }