feat: use user_datas to load datas
This commit is contained in:
parent
0cff9b8691
commit
669c6cce98
9 changed files with 416 additions and 302 deletions
|
|
@ -5,7 +5,7 @@
|
||||||
msgid ""
|
msgid ""
|
||||||
msgstr ""
|
msgstr ""
|
||||||
"Project-Id-Version: PACKAGE VERSION\n"
|
"Project-Id-Version: PACKAGE VERSION\n"
|
||||||
"POT-Creation-Date: 2025-05-12 08:39+0200\n"
|
"POT-Creation-Date: 2025-10-05 21:30+0200\n"
|
||||||
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
|
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
|
||||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||||
"Language-Team: LANGUAGE <LL@li.org>\n"
|
"Language-Team: LANGUAGE <LL@li.org>\n"
|
||||||
|
|
@ -35,43 +35,35 @@ msgstr ""
|
||||||
msgid "cannot find Bitwarden command {0} please install it"
|
msgid "cannot find Bitwarden command {0} please install it"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:175
|
#: src/rougail/user_data_bitwarden/data.py:202
|
||||||
msgid "the value for \"{0}\" at index {1} is already set while it should be filled in by Bitwarden"
|
|
||||||
msgstr ""
|
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:181
|
|
||||||
msgid "the value for \"{0}\" is already set while it should be filled in by Bitwarden"
|
|
||||||
msgstr ""
|
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:219
|
|
||||||
msgid "the default value for \"{0}\" must be the Bitwarden item name"
|
msgid "the default value for \"{0}\" must be the Bitwarden item name"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:236
|
#: src/rougail/user_data_bitwarden/data.py:225
|
||||||
msgid "cannot execute the \"{0}\" commandline from Bitwarden for \"{1}\": {2}"
|
msgid "cannot execute the \"{0}\" commandline from Bitwarden for \"{1}\": {2}"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:243
|
#: src/rougail/user_data_bitwarden/data.py:234
|
||||||
msgid "item \"{0}\" in Bitwarden is not found for \"{1}\""
|
msgid "item \"{0}\" in Bitwarden is not found for \"{1}\""
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:256
|
#: src/rougail/user_data_bitwarden/data.py:249
|
||||||
msgid "several items found with name \"{0}\" in Bitwarden for \"{1}\": \"{2}\""
|
msgid "several items found with name \"{0}\" in Bitwarden for \"{1}\": \"{2}\""
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:271
|
#: src/rougail/user_data_bitwarden/data.py:268
|
||||||
msgid "unexpected datas \"{0}\" from Bitwarden for \"{1}\": {2}"
|
msgid "unexpected datas \"{0}\" from Bitwarden for \"{1}\": {2}"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:279
|
#: src/rougail/user_data_bitwarden/data.py:276
|
||||||
msgid "password"
|
msgid "password"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:281
|
#: src/rougail/user_data_bitwarden/data.py:278
|
||||||
msgid "username"
|
msgid "username"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: src/rougail/user_data_bitwarden/data.py:283
|
#: src/rougail/user_data_bitwarden/data.py:280
|
||||||
msgid "item \"{0}\" in Bitwarden has no {1} for \"{2}\""
|
msgid "item \"{0}\" in Bitwarden has no {1} for \"{2}\""
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -30,7 +30,6 @@ from .i18n import _
|
||||||
|
|
||||||
|
|
||||||
class RougailUserDataBitwarden:
|
class RougailUserDataBitwarden:
|
||||||
force_apply_user_data = True
|
|
||||||
|
|
||||||
def __init__(
|
def __init__(
|
||||||
self,
|
self,
|
||||||
|
|
@ -112,176 +111,186 @@ class RougailUserDataBitwarden:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
self.set_passwords(self.config.forcepermissive)
|
values = {}
|
||||||
return {
|
self.set_passwords(self.config.forcepermissive, values)
|
||||||
"errors": self.errors,
|
return [
|
||||||
"warnings": self.warnings,
|
{
|
||||||
}
|
"source": 'Bitwarden',
|
||||||
|
"errors": self.errors,
|
||||||
|
"warnings": self.warnings,
|
||||||
|
"values": values,
|
||||||
|
"options": {
|
||||||
|
"secret_manager": True,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
def run_commandline(self, cmd) -> str:
|
def set_passwords(self, optiondescription, values):
|
||||||
cpe = run(cmd, capture_output=True)
|
for option in optiondescription.list(uncalculated=True):
|
||||||
err = cpe.stderr.decode("utf8")
|
if option.isoptiondescription():
|
||||||
if cpe.returncode != 0 or err:
|
self.set_passwords(option, values)
|
||||||
raise Exception("{0} ({1})".format(err, cpe.returncode))
|
elif option.information.get("bitwarden", False):
|
||||||
return cpe.stdout.decode("utf8")
|
values[option.path()] = (set_password, self.leader_informations, self.bitwarden_command_line)
|
||||||
|
|
||||||
def get_key_from_commandline(
|
|
||||||
self, key_bitwarden: str, allow_multiple: bool
|
def set_password(leader_informations, bitwarden_command_line, *, option, warnings, errors):
|
||||||
) -> list[str]:
|
path = option.path()
|
||||||
if self.bitwarden_command_line == "rbw":
|
leader_key = None
|
||||||
keys = []
|
if option.isfollower():
|
||||||
items = self.run_commandline(["rbw", "search", key_bitwarden]).strip()
|
leader_path = option.parent().leader().path()
|
||||||
if items:
|
if leader_path in leader_informations:
|
||||||
items = items.split("\n")
|
leader_key = leader_informations[leader_path][option.index()]
|
||||||
else:
|
if not option.isleader():
|
||||||
items = []
|
return get_values(bitwarden_command_line, option, warnings, errors, leader_key=leader_key)
|
||||||
for item in items:
|
leader_informations[path], option_values = get_values(
|
||||||
# if item.count('@') != 1:
|
bitwarden_command_line, option, warnings, errors, multiple=True, leader_key=option.value.default()[0]
|
||||||
# continue
|
)
|
||||||
if "@" in item:
|
return option_values
|
||||||
keys.append(item.split("@", 1)[-1])
|
|
||||||
else:
|
|
||||||
keys.append(item.rsplit("/", 1)[-1])
|
def get_values(bitwarden_command_line, option, warnings, errors, *, multiple=False, leader_key=None):
|
||||||
if not allow_multiple:
|
if leader_key:
|
||||||
if not items:
|
key = leader_key
|
||||||
return []
|
else:
|
||||||
if len(items) > 1:
|
key = option.value.default()
|
||||||
return [{"name": key} for key in keys]
|
path = option.path()
|
||||||
keys = [key_bitwarden]
|
type_ = option.information.get("type")
|
||||||
datas = []
|
# FIXME retrait du permissive suffit ?
|
||||||
for key in keys:
|
if "validator" not in option.property.get():
|
||||||
data = loads(
|
option.property.add("validator")
|
||||||
self.run_commandline(
|
if not isinstance(key, str):
|
||||||
["rbw", "get", key, "--raw", "--ignorecase"]
|
errors.append(
|
||||||
).strip()
|
_('the default value for "{0}" must be the Bitwarden item name').format(
|
||||||
)
|
path
|
||||||
datas.append({"name": key, "login": data["data"]})
|
|
||||||
return datas
|
|
||||||
return loads(
|
|
||||||
self.run_commandline(
|
|
||||||
["bw", "list", "items", "--search", key_bitwarden, "--nointeraction"]
|
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
|
if multiple:
|
||||||
def set_passwords(self, optiondescription):
|
return [], []
|
||||||
for option in optiondescription:
|
return None
|
||||||
if option.isoptiondescription():
|
if "ROUGAIL_BITWARDEN_MOCK_ENABLE" in environ:
|
||||||
self.set_passwords(option)
|
if type_ == "secret":
|
||||||
elif option.information.get("bitwarden", False):
|
value = "Ex4mpL3_P4ssw0rD"
|
||||||
path = option.path()
|
|
||||||
if not option.owner.isdefault():
|
|
||||||
if option.isfollower():
|
|
||||||
self.errors.append(
|
|
||||||
_(
|
|
||||||
'the value for "{0}" at index {1} is already set while it should be filled in by Bitwarden'
|
|
||||||
).format(path, option.index())
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
self.errors.append(
|
|
||||||
_(
|
|
||||||
'the value for "{0}" is already set while it should be filled in by Bitwarden'
|
|
||||||
).format(path)
|
|
||||||
)
|
|
||||||
continue
|
|
||||||
type_ = option.information.get("type")
|
|
||||||
if option.isleader():
|
|
||||||
leader_values = []
|
|
||||||
self.leader_informations[path] = []
|
|
||||||
values = option.value.get()
|
|
||||||
for val in values:
|
|
||||||
names, values = self.get_values(
|
|
||||||
path, type_, val, allow_multiple=True
|
|
||||||
)
|
|
||||||
if isinstance(values, list):
|
|
||||||
leader_values.extend(values)
|
|
||||||
self.leader_informations[path].extend(names)
|
|
||||||
else:
|
|
||||||
leader_values.append(values)
|
|
||||||
self.leader_informations[path].append(names)
|
|
||||||
option.value.set(leader_values)
|
|
||||||
else:
|
|
||||||
if option.isfollower():
|
|
||||||
leader_path = optiondescription.leader().path()
|
|
||||||
if leader_path in self.leader_informations:
|
|
||||||
key_bitwarden = self.leader_informations[leader_path][
|
|
||||||
option.index()
|
|
||||||
]
|
|
||||||
else:
|
|
||||||
key_bitwarden = option.value.get()
|
|
||||||
else:
|
|
||||||
key_bitwarden = option.value.get()
|
|
||||||
option.value.set(self.get_values(path, type_, key_bitwarden)[1])
|
|
||||||
option.permissive.add("novalidator")
|
|
||||||
|
|
||||||
def get_values(self, path, type_, key_bitwarden, *, allow_multiple=False):
|
|
||||||
if not isinstance(key_bitwarden, str):
|
|
||||||
self.errors.append(
|
|
||||||
_('the default value for "{0}" must be the Bitwarden item name').format(
|
|
||||||
path
|
|
||||||
)
|
|
||||||
)
|
|
||||||
return None, None
|
|
||||||
if "ROUGAIL_BITWARDEN_MOCK_ENABLE" in environ:
|
|
||||||
if type_ == "secret":
|
|
||||||
value = "Ex4mpL3_P4ssw0rD"
|
|
||||||
else:
|
|
||||||
value = "example_login"
|
|
||||||
if allow_multiple:
|
|
||||||
return [key_bitwarden], [value]
|
|
||||||
return key_bitwarden, value
|
|
||||||
try:
|
|
||||||
data = self.get_key_from_commandline(key_bitwarden, allow_multiple)
|
|
||||||
except Exception as exc:
|
|
||||||
self.errors.append(
|
|
||||||
_(
|
|
||||||
'cannot execute the "{0}" commandline from Bitwarden for "{1}": {2}'
|
|
||||||
).format(self.bitwarden_command_line, path, exc)
|
|
||||||
)
|
|
||||||
return None, None
|
|
||||||
if not data:
|
|
||||||
self.errors.append(
|
|
||||||
_('item "{0}" in Bitwarden is not found for "{1}"').format(
|
|
||||||
key_bitwarden, path
|
|
||||||
)
|
|
||||||
)
|
|
||||||
return None, None
|
|
||||||
if len(data) != 1:
|
|
||||||
names = [d["name"] for d in data]
|
|
||||||
if allow_multiple:
|
|
||||||
ret = []
|
|
||||||
return names, [
|
|
||||||
self.get_value(key_bitwarden, path, type_, d) for d in data
|
|
||||||
]
|
|
||||||
self.errors.append(
|
|
||||||
_(
|
|
||||||
'several items found with name "{0}" in Bitwarden for "{1}": "{2}"'
|
|
||||||
).format(key_bitwarden, path, '", "'.join(names))
|
|
||||||
)
|
|
||||||
return None, None
|
|
||||||
return data[0]["name"], self.get_value(key_bitwarden, path, type_, data[0])
|
|
||||||
|
|
||||||
def get_value(self, key_bitwarden: str, path: str, type_: str, data: dict) -> str:
|
|
||||||
try:
|
|
||||||
if type_ == "secret":
|
|
||||||
value = data["login"]["password"]
|
|
||||||
else:
|
|
||||||
value = data["login"]["username"]
|
|
||||||
except Exception as exc:
|
|
||||||
self.errors.append(
|
|
||||||
_('unexpected datas "{0}" from Bitwarden for "{1}": {2}').format(
|
|
||||||
key_bitwarden, path, exc
|
|
||||||
)
|
|
||||||
)
|
|
||||||
value = None
|
|
||||||
else:
|
else:
|
||||||
if value is None:
|
value = "example_login"
|
||||||
if type_ == "secret":
|
if multiple:
|
||||||
bw_type = _("password")
|
return [key], [value]
|
||||||
else:
|
|
||||||
bw_type = _("username")
|
|
||||||
self.errors.append(
|
|
||||||
_('item "{0}" in Bitwarden has no {1} for "{2}"').format(
|
|
||||||
key_bitwarden, bw_type, path
|
|
||||||
)
|
|
||||||
)
|
|
||||||
return value
|
return value
|
||||||
|
try:
|
||||||
|
if bitwarden_command_line == "rbw":
|
||||||
|
data = get_key_from_rbw(key, multiple)
|
||||||
|
else:
|
||||||
|
data = get_key_from_bw(key)
|
||||||
|
|
||||||
|
except Exception as exc:
|
||||||
|
errors.append(
|
||||||
|
_(
|
||||||
|
'cannot execute the "{0}" commandline from Bitwarden for "{1}": {2}'
|
||||||
|
).format(bitwarden_command_line, path, exc)
|
||||||
|
)
|
||||||
|
if multiple:
|
||||||
|
return [], []
|
||||||
|
return None
|
||||||
|
if not data:
|
||||||
|
errors.append(
|
||||||
|
_('item "{0}" in Bitwarden is not found for "{1}"').format(
|
||||||
|
key, path
|
||||||
|
)
|
||||||
|
)
|
||||||
|
if multiple:
|
||||||
|
return [], []
|
||||||
|
return None
|
||||||
|
if len(data) != 1:
|
||||||
|
names = [d["name"] for d in data]
|
||||||
|
if multiple:
|
||||||
|
ret = []
|
||||||
|
return names, [
|
||||||
|
get_value(key, path, type_, d, errors) for d in data
|
||||||
|
]
|
||||||
|
errors.append(
|
||||||
|
_(
|
||||||
|
'several items found with name "{0}" in Bitwarden for "{1}": "{2}"'
|
||||||
|
).format(key, path, '", "'.join(names))
|
||||||
|
)
|
||||||
|
return None
|
||||||
|
value = get_value(key, path, type_, data[0], errors)
|
||||||
|
if multiple:
|
||||||
|
return [data[0]["name"]], [value]
|
||||||
|
return value
|
||||||
|
|
||||||
|
|
||||||
|
def get_value( key_bitwarden: str, path: str, type_: str, data: dict, errors: dict) -> str:
|
||||||
|
try:
|
||||||
|
if type_ == "secret":
|
||||||
|
value = data["login"]["password"]
|
||||||
|
else:
|
||||||
|
value = data["login"]["username"]
|
||||||
|
except Exception as exc:
|
||||||
|
errors.append(
|
||||||
|
_('unexpected datas "{0}" from Bitwarden for "{1}": {2}').format(
|
||||||
|
key_bitwarden, path, exc
|
||||||
|
)
|
||||||
|
)
|
||||||
|
value = None
|
||||||
|
else:
|
||||||
|
if value is None:
|
||||||
|
if type_ == "secret":
|
||||||
|
bw_type = _("password")
|
||||||
|
else:
|
||||||
|
bw_type = _("username")
|
||||||
|
errors.append(
|
||||||
|
_('item "{0}" in Bitwarden has no {1} for "{2}"').format(
|
||||||
|
key_bitwarden, bw_type, path
|
||||||
|
)
|
||||||
|
)
|
||||||
|
return value
|
||||||
|
|
||||||
|
|
||||||
|
def get_key_from_rbw(
|
||||||
|
key_bitwarden: str, multiple: bool
|
||||||
|
):
|
||||||
|
keys = []
|
||||||
|
items = run_commandline(["rbw", "search", key_bitwarden]).strip()
|
||||||
|
if items:
|
||||||
|
items = items.split("\n")
|
||||||
|
else:
|
||||||
|
items = []
|
||||||
|
for item in items:
|
||||||
|
# if item.count('@') != 1:
|
||||||
|
# continue
|
||||||
|
if "@" in item:
|
||||||
|
keys.append(item.split("@", 1)[-1])
|
||||||
|
else:
|
||||||
|
keys.append(item.rsplit("/", 1)[-1])
|
||||||
|
if not multiple:
|
||||||
|
if not items:
|
||||||
|
return []
|
||||||
|
if len(items) > 1:
|
||||||
|
return [{"name": key} for key in keys]
|
||||||
|
keys = [key_bitwarden]
|
||||||
|
datas = []
|
||||||
|
for key in keys:
|
||||||
|
data = loads(
|
||||||
|
run_commandline(
|
||||||
|
["rbw", "get", key, "--raw", "--ignorecase"]
|
||||||
|
).strip()
|
||||||
|
)
|
||||||
|
datas.append({"name": key, "login": data["data"]})
|
||||||
|
return datas
|
||||||
|
|
||||||
|
|
||||||
|
def get_key_from_bw(
|
||||||
|
key_bitwarden: str,
|
||||||
|
):
|
||||||
|
return loads(
|
||||||
|
run_commandline(
|
||||||
|
["bw", "list", "items", "--search", key_bitwarden, "--nointeraction"]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def run_commandline(cmd) -> str:
|
||||||
|
cpe = run(cmd, capture_output=True)
|
||||||
|
err = cpe.stderr.decode("utf8")
|
||||||
|
if cpe.returncode != 0 or err:
|
||||||
|
raise Exception("{0} ({1})".format(err, cpe.returncode))
|
||||||
|
return cpe.stdout.decode("utf8")
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,6 @@
|
||||||
|
{
|
||||||
|
"errors": [],
|
||||||
|
"warnings": [
|
||||||
|
"variable or family \"rougail.modified_variable_single\" does not exist, it will be ignored when loading from By Hand"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
@ -0,0 +1,10 @@
|
||||||
|
{
|
||||||
|
"rougail.host": "test",
|
||||||
|
"rougail.project": "5_secret_calc",
|
||||||
|
"rougail.environment": "environment",
|
||||||
|
"rougail.service": "service",
|
||||||
|
"rougail.modified_variable": ["user_1", "user_2"],
|
||||||
|
"rougail.dyn_user_1.secret": "bitwarden_password",
|
||||||
|
"rougail.dyn_user_2.secret": "bitwarden_password_2"
|
||||||
|
|
||||||
|
}
|
||||||
|
|
@ -0,0 +1,6 @@
|
||||||
|
{
|
||||||
|
"errors": [],
|
||||||
|
"warnings": [
|
||||||
|
"variable or family \"rougail.modified_variable\" does not exist, it will be ignored when loading from By Hand"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
@ -0,0 +1,8 @@
|
||||||
|
{
|
||||||
|
"rougail.host": "test",
|
||||||
|
"rougail.project": "5_secret_calc",
|
||||||
|
"rougail.environment": "environment",
|
||||||
|
"rougail.service": "service",
|
||||||
|
"rougail.modified_variable_single": "user_2",
|
||||||
|
"rougail.secret": "bitwarden_password_2"
|
||||||
|
}
|
||||||
39
tests/structures/5_secret_calc_other_user_data/00-base.yml
Normal file
39
tests/structures/5_secret_calc_other_user_data/00-base.yml
Normal file
|
|
@ -0,0 +1,39 @@
|
||||||
|
---
|
||||||
|
version: 1.1
|
||||||
|
|
||||||
|
host:
|
||||||
|
description: hostname
|
||||||
|
default: test
|
||||||
|
|
||||||
|
project:
|
||||||
|
description: the project
|
||||||
|
default: 5_secret_calc
|
||||||
|
|
||||||
|
environment:
|
||||||
|
description: the environment
|
||||||
|
default: environment
|
||||||
|
|
||||||
|
service:
|
||||||
|
description: the service
|
||||||
|
default: service
|
||||||
|
|
||||||
|
modified_variable: [] # a variable modified
|
||||||
|
|
||||||
|
dyn_{{ identifier }}:
|
||||||
|
dynamic:
|
||||||
|
variable: _.modified_variable
|
||||||
|
|
||||||
|
secret:
|
||||||
|
description: the second secret
|
||||||
|
type: secret
|
||||||
|
secret_manager:
|
||||||
|
host:
|
||||||
|
variable: __.host
|
||||||
|
project:
|
||||||
|
variable: __.project
|
||||||
|
environment:
|
||||||
|
variable: __.environment
|
||||||
|
service:
|
||||||
|
variable: __.service
|
||||||
|
user:
|
||||||
|
type: identifier
|
||||||
35
tests/structures/5_secret_calc_other_user_data2/00-base.yml
Normal file
35
tests/structures/5_secret_calc_other_user_data2/00-base.yml
Normal file
|
|
@ -0,0 +1,35 @@
|
||||||
|
---
|
||||||
|
version: 1.1
|
||||||
|
|
||||||
|
host:
|
||||||
|
description: hostname
|
||||||
|
default: test
|
||||||
|
|
||||||
|
project:
|
||||||
|
description: the project
|
||||||
|
default: 5_secret_calc
|
||||||
|
|
||||||
|
environment:
|
||||||
|
description: the environment
|
||||||
|
default: environment
|
||||||
|
|
||||||
|
service:
|
||||||
|
description: the service
|
||||||
|
default: service
|
||||||
|
|
||||||
|
modified_variable_single: # a variable modified
|
||||||
|
|
||||||
|
secret:
|
||||||
|
description: the second secret
|
||||||
|
type: secret
|
||||||
|
secret_manager:
|
||||||
|
host:
|
||||||
|
variable: _.host
|
||||||
|
project:
|
||||||
|
variable: _.project
|
||||||
|
environment:
|
||||||
|
variable: _.environment
|
||||||
|
service:
|
||||||
|
variable: _.service
|
||||||
|
user:
|
||||||
|
variable: _.modified_variable_single
|
||||||
|
|
@ -16,16 +16,19 @@ from rougail_tests.utils import config_to_dict
|
||||||
test_dir = Path(__file__).parent / 'structures'
|
test_dir = Path(__file__).parent / 'structures'
|
||||||
|
|
||||||
|
|
||||||
def _test_dictionaries(test_dir, command, env=False):
|
def _test_structural_files(test_dir, command, *, env=False, modified=False):
|
||||||
rougailconfig = RougailConfig.copy()
|
rougailconfig = RougailConfig.copy()
|
||||||
rougailconfig['main_dictionaries'] = [str(test_dir)]
|
rougailconfig['main_structural_directories'] = [str(test_dir)]
|
||||||
# rougailconfig['tiramisu_cache'] = "cache.py"
|
# rougailconfig['tiramisu_cache'] = "cache.py"
|
||||||
rougailconfig['step.user_data'] = ['bitwarden']
|
rougailconfig['step.user_data'] = ['bitwarden']
|
||||||
rougailconfig['bitwarden.command'] = command
|
rougailconfig['bitwarden.command'] = command
|
||||||
rougail = Rougail(rougailconfig)
|
rougail = Rougail(rougailconfig)
|
||||||
config = rougail.run()
|
config = rougail.run()
|
||||||
# loads variables in the tiramisu config
|
# loads variables in the tiramisu config
|
||||||
errors = RougailUserData(config, rougailconfig=rougailconfig).run()
|
generated_user_data = RougailUserData(config, rougailconfig=rougailconfig).run()
|
||||||
|
if modified:
|
||||||
|
generated_user_data.insert(0, {'source': 'By Hand', 'errors': [], 'warnings': [], 'values': {'rougail.modified_variable': ['user_1', 'user_2'], 'rougail.modified_variable_single': 'user_2'}})
|
||||||
|
errors = rougail.user_datas(generated_user_data)
|
||||||
#expected output
|
#expected output
|
||||||
config_dict = dict(config_to_dict(config.forcepermissive.value.get()))
|
config_dict = dict(config_to_dict(config.forcepermissive.value.get()))
|
||||||
if not env:
|
if not env:
|
||||||
|
|
@ -50,322 +53,328 @@ def _test_dictionaries(test_dir, command, env=False):
|
||||||
dump(errors, json_file, indent=4)
|
dump(errors, json_file, indent=4)
|
||||||
with open(errors_file) as json_file:
|
with open(errors_file) as json_file:
|
||||||
expected_errors = load(json_file)
|
expected_errors = load(json_file)
|
||||||
# expected_errors = {
|
assert expected_errors == errors, errors_file
|
||||||
# 'errors': [],
|
|
||||||
# 'warnings': [],
|
|
||||||
# }
|
|
||||||
assert expected_errors == errors
|
|
||||||
#
|
#
|
||||||
assert expected == config_dict
|
assert expected == config_dict, ok_file
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_1_secret_rbw():
|
def test_structural_files_1_secret_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '1_secret', 'rbw')
|
_test_structural_files(test_dir / '1_secret', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_1_secret_bw():
|
def test_structural_files_1_secret_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '1_secret', 'bw')
|
_test_structural_files(test_dir / '1_secret', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_1_secret_unknown_rbw():
|
def test_structural_files_1_secret_unknown_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '1_secret_unknown', 'rbw')
|
_test_structural_files(test_dir / '1_secret_unknown', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_1_secret_unknown_bw():
|
def test_structural_files_1_secret_unknown_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '1_secret_unknown', 'bw')
|
_test_structural_files(test_dir / '1_secret_unknown', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_rbw():
|
def test_structural_files_2_username_secret_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret', 'rbw')
|
_test_structural_files(test_dir / '2_username_secret', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_bw():
|
def test_structural_files_2_username_secret_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret', 'bw')
|
_test_structural_files(test_dir / '2_username_secret', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_upper_rbw():
|
def test_structural_files_2_username_secret_upper_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret_upper', 'rbw')
|
_test_structural_files(test_dir / '2_username_secret_upper', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_upper_bw():
|
def test_structural_files_2_username_secret_upper_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret_upper', 'bw')
|
_test_structural_files(test_dir / '2_username_secret_upper', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_invalid_rbw():
|
def test_structural_files_2_username_secret_invalid_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret_invalid', 'rbw')
|
_test_structural_files(test_dir / '2_username_secret_invalid', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_invalid_bw():
|
def test_structural_files_2_username_secret_invalid_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret_invalid', 'bw')
|
_test_structural_files(test_dir / '2_username_secret_invalid', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_hidden_rbw():
|
def test_structural_files_2_username_secret_hidden_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret_hidden', 'rbw')
|
_test_structural_files(test_dir / '2_username_secret_hidden', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_2_username_secret_hidden_bw():
|
def test_structural_files_2_username_secret_hidden_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '2_username_secret_hidden', 'bw')
|
_test_structural_files(test_dir / '2_username_secret_hidden', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_3_leadership_secret_rbw():
|
def test_structural_files_3_leadership_secret_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret', 'rbw')
|
_test_structural_files(test_dir / '3_leadership_secret', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_3_leadership_secret_bw():
|
def test_structural_files_3_leadership_secret_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret', 'bw')
|
_test_structural_files(test_dir / '3_leadership_secret', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_3_leadership_secret_several_rbw():
|
def test_structural_files_3_leadership_secret_several_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret_several', 'rbw')
|
_test_structural_files(test_dir / '3_leadership_secret_several', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_3_leadership_secret_several_bw():
|
def test_structural_files_3_leadership_secret_several_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret_several', 'bw')
|
_test_structural_files(test_dir / '3_leadership_secret_several', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_4_several_secrets_rbw():
|
def test_structural_files_4_several_secrets_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '4_several_secrets', 'rbw')
|
_test_structural_files(test_dir / '4_several_secrets', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_4_several_secrets_bw():
|
def test_structural_files_4_several_secrets_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '4_several_secrets', 'bw')
|
_test_structural_files(test_dir / '4_several_secrets', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_4_several_secrets_upper_rbw():
|
def test_structural_files_4_several_secrets_upper_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '4_several_secrets_upper', 'rbw')
|
_test_structural_files(test_dir / '4_several_secrets_upper', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_4_several_secrets_upper_bw():
|
def test_structural_files_4_several_secrets_upper_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '4_several_secrets_upper', 'bw')
|
_test_structural_files(test_dir / '4_several_secrets_upper', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_5_secret_calc_rbw():
|
def test_structural_files_5_secret_calc_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '5_secret_calc', 'rbw')
|
_test_structural_files(test_dir / '5_secret_calc', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_5_secret_calc_bw():
|
def test_structural_files_5_secret_calc_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '5_secret_calc', 'bw')
|
_test_structural_files(test_dir / '5_secret_calc', 'bw')
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_6_no_username_rbw():
|
def test_structural_files_5_secret_calc_other_user_data_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '6_no_username', 'rbw')
|
_test_structural_files(test_dir / '5_secret_calc_other_user_data', 'rbw', modified=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_6_no_username_bw():
|
def test_structural_files_5_secret_calc_other_user_data2_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
_test_dictionaries(test_dir / '6_no_username', 'bw')
|
_test_structural_files(test_dir / '5_secret_calc_other_user_data2', 'rbw', modified=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_8_multi_variable_rbw():
|
def test_structural_files_6_no_username_rbw():
|
||||||
|
"tests the output"
|
||||||
|
_test_structural_files(test_dir / '6_no_username', 'rbw')
|
||||||
|
|
||||||
|
|
||||||
|
def test_structural_files_6_no_username_bw():
|
||||||
|
"tests the output"
|
||||||
|
_test_structural_files(test_dir / '6_no_username', 'bw')
|
||||||
|
|
||||||
|
|
||||||
|
def test_structural_files_8_multi_variable_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '8_multi_variable', 'rbw')
|
_test_structural_files(test_dir / '8_multi_variable', 'rbw')
|
||||||
assert err.value.errno == 57
|
assert err.value.errno == 57
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_8_multi_variable_bw():
|
def test_structural_files_8_multi_variable_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '8_multi_variable', 'bw')
|
_test_structural_files(test_dir / '8_multi_variable', 'bw')
|
||||||
assert err.value.errno == 57
|
assert err.value.errno == 57
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_9_unknown_type_rbw():
|
def test_structural_files_9_unknown_type_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '9_unknown_type', 'rbw')
|
_test_structural_files(test_dir / '9_unknown_type', 'rbw')
|
||||||
assert err.value.errno == 56
|
assert err.value.errno == 56
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_9_unknown_type_bw():
|
def test_structural_files_9_unknown_type_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '9_unknown_type', 'bw')
|
_test_structural_files(test_dir / '9_unknown_type', 'bw')
|
||||||
assert err.value.errno == 56
|
assert err.value.errno == 56
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_1_secret_rbw():
|
def test_structural_files_env_1_secret_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '1_secret', 'rbw', True)
|
_test_structural_files(test_dir / '1_secret', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_1_secret_bw():
|
def test_structural_files_env_1_secret_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '1_secret', 'bw', True)
|
_test_structural_files(test_dir / '1_secret', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_1_secret_unknown_rbw():
|
def test_structural_files_env_1_secret_unknown_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '1_secret_unknown', 'rbw', True)
|
_test_structural_files(test_dir / '1_secret_unknown', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_1_secret_unknown_bw():
|
def test_structural_files_env_1_secret_unknown_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '1_secret_unknown', 'bw', True)
|
_test_structural_files(test_dir / '1_secret_unknown', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_rbw():
|
def test_structural_files_env_2_username_secret_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret', 'rbw', True)
|
_test_structural_files(test_dir / '2_username_secret', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_bw():
|
def test_structural_files_env_2_username_secret_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret', 'bw', True)
|
_test_structural_files(test_dir / '2_username_secret', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_upper_rbw():
|
def test_structural_files_env_2_username_secret_upper_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret_upper', 'rbw', True)
|
_test_structural_files(test_dir / '2_username_secret_upper', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_upper_bw():
|
def test_structural_files_env_2_username_secret_upper_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret_upper', 'bw', True)
|
_test_structural_files(test_dir / '2_username_secret_upper', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_invalid_rbw():
|
def test_structural_files_env_2_username_secret_invalid_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret_invalid', 'rbw', True)
|
_test_structural_files(test_dir / '2_username_secret_invalid', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_invalid_bw():
|
def test_structural_files_env_2_username_secret_invalid_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret_invalid', 'bw', True)
|
_test_structural_files(test_dir / '2_username_secret_invalid', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_hidden_rbw():
|
def test_structural_files_env_2_username_secret_hidden_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret_hidden', 'rbw', True)
|
_test_structural_files(test_dir / '2_username_secret_hidden', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_2_username_secret_hidden_bw():
|
def test_structural_files_env_2_username_secret_hidden_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '2_username_secret_hidden', 'bw', True)
|
_test_structural_files(test_dir / '2_username_secret_hidden', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_3_leadership_secret_rbw():
|
def test_structural_files_env_3_leadership_secret_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret', 'rbw', True)
|
_test_structural_files(test_dir / '3_leadership_secret', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_3_leadership_secret_bw():
|
def test_structural_files_env_3_leadership_secret_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret', 'bw', True)
|
_test_structural_files(test_dir / '3_leadership_secret', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_3_leadership_secret_several_rbw():
|
def test_structural_files_env_3_leadership_secret_several_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret_several', 'rbw', True)
|
_test_structural_files(test_dir / '3_leadership_secret_several', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_3_leadership_secret_several_bw():
|
def test_structural_files_env_3_leadership_secret_several_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '3_leadership_secret_several', 'bw', True)
|
_test_structural_files(test_dir / '3_leadership_secret_several', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_4_several_secrets_rbw():
|
def test_structural_files_env_4_several_secrets_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '4_several_secrets', 'rbw', True)
|
_test_structural_files(test_dir / '4_several_secrets', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_4_several_secrets_bw():
|
def test_structural_files_env_4_several_secrets_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '4_several_secrets', 'bw', True)
|
_test_structural_files(test_dir / '4_several_secrets', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_4_several_secrets_upper_rbw():
|
def test_structural_files_env_4_several_secrets_upper_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '4_several_secrets_upper', 'rbw', True)
|
_test_structural_files(test_dir / '4_several_secrets_upper', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_4_several_secrets_upper_bw():
|
def test_structural_files_env_4_several_secrets_upper_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '4_several_secrets_upper', 'bw', True)
|
_test_structural_files(test_dir / '4_several_secrets_upper', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_5_secret_calc_rbw():
|
def test_structural_files_env_5_secret_calc_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '5_secret_calc', 'rbw', True)
|
_test_structural_files(test_dir / '5_secret_calc', 'rbw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_5_secret_calc_bw():
|
def test_structural_files_env_5_secret_calc_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
_test_dictionaries(test_dir / '5_secret_calc', 'bw', True)
|
_test_structural_files(test_dir / '5_secret_calc', 'bw', env=True)
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_8_multi_variable_rbw():
|
def test_structural_files_env_8_multi_variable_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '8_multi_variable', 'rbw', True)
|
_test_structural_files(test_dir / '8_multi_variable', 'rbw', env=True)
|
||||||
assert err.value.errno == 57
|
assert err.value.errno == 57
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_8_multi_variable_bw():
|
def test_structural_files_env_8_multi_variable_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '8_multi_variable', 'bw', True)
|
_test_structural_files(test_dir / '8_multi_variable', 'bw', env=True)
|
||||||
assert err.value.errno == 57
|
assert err.value.errno == 57
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_9_unknown_type_rbw():
|
def test_structural_files_env_9_unknown_type_rbw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '9_unknown_type', 'rbw', True)
|
_test_structural_files(test_dir / '9_unknown_type', 'rbw', env=True)
|
||||||
assert err.value.errno == 56
|
assert err.value.errno == 56
|
||||||
|
|
||||||
|
|
||||||
def test_dictionaries_env_9_unknown_type_bw():
|
def test_structural_files_env_9_unknown_type_bw():
|
||||||
"tests the output"
|
"tests the output"
|
||||||
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
|
||||||
with raises(DictConsistencyError) as err:
|
with raises(DictConsistencyError) as err:
|
||||||
_test_dictionaries(test_dir / '9_unknown_type', 'bw', True)
|
_test_structural_files(test_dir / '9_unknown_type', 'bw', env=True)
|
||||||
assert err.value.errno == 56
|
assert err.value.errno == 56
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue