-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Fix the fact that some GCP env vars are immune to WithDisallowEnvVars #250
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
@@ -23,7 +23,6 @@ const ( | |||
// TestGcpKeyIdAfterConfig will test the result of calling the wrapper's KeyId() | |||
// after it's configured with various options | |||
func TestGcpKeyIdAfterConfig(t *testing.T) { | |||
t.Parallel() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was removed as it didn't play nice with the new test case disabling env-vars
} | ||
|
||
func TestGcpCkmsSeal(t *testing.T) { | ||
t.Setenv(EnvGcpCkmsWrapperProject, "") // Make sure at least one required value is not set. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This test worked correctly if it ran by itself but running them all together, if another test ran first and set the appropriate vars would fail as we wouldn't get the failure we expected.
…shicorp#250) Signed-off-by: Alexander Scheel <ascheel@gitlab.com>
* wrappers/transit: support context cancelation (hashicorp#259) This makes the transit client respect context cancelation, which is a critical feature of any I/O API. Original commit: 05c77e8 * Support parseutil.ParsePath for sensitive values in wrapper configs (hashicorp#272) and Use ParsePaths to source sensitive wrapper config values from Env/File if desired (hashicorp#275) * Add support for stdlib ParsePath to sensitive options * wip * wire up QuietParsePath to all remaining wrappers * Add ParsePaths * wip new pattern * bug fixes * remove unused * unit test * mod tidy * remove unnecessary change * remove unnecessary change * Use the new parsepath options * add missing errnoturl check * Update to parsepath 0.1.9 * rollback wrapper changes until we have a tagged top level package * Improve ParsePaths behavior in errors, and add a usage comment Original commit: a1337fd --- * Add support for stdlib ParsePath to sensitive options * wip * wire up QuietParsePath to all remaining wrappers * Add ParsePaths * wip new pattern * bug fixes * remove unused * unit test * mod tidy * remove unnecessary change * remove unnecessary change * Use the new parsepath options * add missing errnoturl check * Update to parsepath 0.1.9 * update go.mods to point to a fixed tag for ParsePath * go mod tidy * pr feedback Original commit: 9aac87b * Facilitate use of User Managed Identities (hashicorp#277) * wip * tidy Original commit: 0ea6bba * Fix the fact that some GCP env vars are immune to disallowEnvVars (hashicorp#250) Original commit: 24f9019 * Fix transit context cancellation test Signed-off-by: Alexander Scheel <ascheel@gitlab.com> * Add wrapping.ParsePaths(...) to pkcs11 Signed-off-by: Alexander Scheel <ascheel@gitlab.com> * Bump openbao/api & openbao/sdk to latest versions Signed-off-by: Alexander Scheel <ascheel@gitlab.com> --------- Signed-off-by: Alexander Scheel <ascheel@gitlab.com> Co-authored-by: Johan Brandhorst-Satzkorn <johan.brandhorst@gmail.com> Co-authored-by: Scott Miller <smiller@hashicorp.com>
No description provided.