mirror of
https://github.com/coder/coder.git
synced 2025-07-03 16:13:58 +00:00
See also: https://github.com/coder/coder/pull/9522 - Adds commands `server dbcrypt {rotate,decrypt,delete}` to re-encrypt, decrypt, or delete encrypted data, respectively. - Plumbs through dbcrypt in enterprise/coderd (including unit tests). - Adds documentation in admin/encryption.md. This enables dbcrypt by default, but the feature is soft-enforced on supplying external token encryption keys. Without specifying any keys, encryption/decryption is a no-op.
63 lines
2.2 KiB
Go
63 lines
2.2 KiB
Go
package coderd_test
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/coder/coder/v2/coderd/coderdtest"
|
|
"github.com/coder/coder/v2/testutil"
|
|
)
|
|
|
|
func TestDeploymentValues(t *testing.T) {
|
|
t.Parallel()
|
|
hi := "hi"
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
defer cancel()
|
|
cfg := coderdtest.DeploymentValues(t)
|
|
// values should be returned
|
|
cfg.BrowserOnly = true
|
|
// values should not be returned
|
|
cfg.OAuth2.Github.ClientSecret.Set(hi)
|
|
cfg.OIDC.ClientSecret.Set(hi)
|
|
cfg.OIDC.AuthURLParams.Set(`{"foo":"bar"}`)
|
|
cfg.OIDC.EmailField.Set("some_random_field_you_never_expected")
|
|
cfg.PostgresURL.Set(hi)
|
|
cfg.SCIMAPIKey.Set(hi)
|
|
cfg.ExternalTokenEncryptionKeys.Set("the_random_key_we_never_expected,an_other_key_we_never_unexpected")
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
DeploymentValues: cfg,
|
|
})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
scrubbed, err := client.DeploymentConfig(ctx)
|
|
require.NoError(t, err)
|
|
// ensure normal values pass through
|
|
require.EqualValues(t, true, scrubbed.Values.BrowserOnly.Value())
|
|
require.NotEmpty(t, cfg.OIDC.AuthURLParams)
|
|
require.EqualValues(t, cfg.OIDC.AuthURLParams, scrubbed.Values.OIDC.AuthURLParams)
|
|
require.NotEmpty(t, cfg.OIDC.EmailField)
|
|
require.EqualValues(t, cfg.OIDC.EmailField, scrubbed.Values.OIDC.EmailField)
|
|
// ensure secrets are removed
|
|
require.Empty(t, scrubbed.Values.OAuth2.Github.ClientSecret.Value())
|
|
require.Empty(t, scrubbed.Values.OIDC.ClientSecret.Value())
|
|
require.Empty(t, scrubbed.Values.PostgresURL.Value())
|
|
require.Empty(t, scrubbed.Values.SCIMAPIKey.Value())
|
|
require.Empty(t, scrubbed.Values.ExternalTokenEncryptionKeys.Value())
|
|
}
|
|
|
|
func TestDeploymentStats(t *testing.T) {
|
|
t.Parallel()
|
|
t.Log("This test is time-sensitive. It may fail if the deployment is not ready in time.")
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
defer cancel()
|
|
client := coderdtest.New(t, &coderdtest.Options{})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
assert.True(t, testutil.Eventually(ctx, t, func(tctx context.Context) bool {
|
|
_, err := client.DeploymentStats(tctx)
|
|
return err == nil
|
|
}, testutil.IntervalMedium), "failed to get deployment stats in time")
|
|
}
|