Compare commits

...

38 commits

Author SHA1 Message Date
16119b432e bump: version 0.1.0a17 → 0.1.0a18 2025-04-09 21:28:06 +02:00
d4e3d06cc2 fix: version 2025-04-09 21:28:03 +02:00
a17ae75c59 bump: version 0.1.0a16 → 0.1.0a17 2025-04-09 14:21:34 +02:00
54bdf4861c fix: better error message 2025-04-09 14:20:56 +02:00
71a05d631c bump: version 0.1.0a15 → 0.1.0a16 2025-04-04 08:27:19 +02:00
1d401f7e35 fix: with ROUGAIL_BITWARDEN_MOCK_ENABLE variable, unix_user and password are different 2025-04-04 08:27:05 +02:00
2bb0b0db3a bump: version 0.1.0a14 → 0.1.0a15 2025-03-19 15:32:30 +01:00
c4c7e0da4a fix: support item without username 2025-03-19 15:31:52 +01:00
34963ddca2 bump: version 0.1.0a13 → 0.1.0a14 2025-03-19 10:25:25 +01:00
a273820c84 feat: port to rougail secret_manager 2025-03-19 10:25:09 +01:00
c3a0ecd557 feat: same behavour between bw et rbw 2025-03-01 18:04:38 +01:00
3b72988cb5 bump: version 0.1.0a12 → 0.1.0a13 2025-02-19 09:27:51 +01:00
d3c0f94f86 fix: MOCK 2025-02-19 09:27:47 +01:00
80b1155d2a bump: version 0.1.0a11 → 0.1.0a12 2025-02-19 09:14:00 +01:00
65e318e883 fix: MOCK 2025-02-19 09:13:55 +01:00
e9ef79e80b bump: version 0.1.0a10 → 0.1.0a11 2025-02-19 08:59:22 +01:00
a12cf396fd fix: if mock is active, do not search rbw or bw 2025-02-19 08:59:13 +01:00
4c72346aa6 bump: version 0.1.0a9 → 0.1.0a10 2025-02-17 15:40:59 +01:00
80ddd65206 fix: support hidden attribut 2025-02-17 15:40:55 +01:00
d96f888e48 bump: version 0.1.0a8 → 0.1.0a9 2025-02-17 15:26:20 +01:00
82e0c371a0 fix: support hidden attribut 2025-02-17 15:25:59 +01:00
5d8dd6881f bump: version 0.1.0a7 → 0.1.0a8 2025-02-17 09:40:49 +01:00
4fd27de57e fix: update structural plugin version 2025-02-17 09:40:43 +01:00
76b43846ed bump: version 0.1.0a6 → 0.1.0a7 2025-02-17 09:34:40 +01:00
510b97d7cf feat: support rbw and bw command line 2025-02-17 09:34:26 +01:00
b332195ef3 bump: version 0.1.0a5 → 0.1.0a6 2025-02-13 22:09:30 +01:00
8b180e131e fix: bitwarden key could be an invalid username/secret 2025-02-13 22:09:15 +01:00
52a56476d3 bump: version 0.1.0a4 → 0.1.0a5 2025-02-13 13:31:00 +01:00
7925cdcc6a fix: structural load 2025-02-13 13:30:55 +01:00
01feb985fb bump: version 0.1.0a3 → 0.1.0a4 2025-02-13 13:23:23 +01:00
c16fcdb7fe fix: structural version 2025-02-13 13:23:20 +01:00
b16e71846b bump: version 0.1.0a2 → 0.1.0a3 2025-02-13 13:20:59 +01:00
eea2badb64 bump: version 0.1.0a1 → 0.1.0a2 2025-02-13 13:19:26 +01:00
b6e4744085 fix: separate user-data and structural 2025-02-13 13:16:05 +01:00
653790b9af bump: version 0.1.0a0 → 0.1.0a1 2025-02-12 15:51:19 +01:00
971311e0f5 fix: many improvment 2025-02-12 15:39:53 +01:00
abb4b87924 bump: version 0.0.0 → 0.1.0a0 2025-02-05 11:30:57 +01:00
5682ac96b6 feat: first version 2025-02-05 11:30:51 +01:00
73 changed files with 1595 additions and 0 deletions

108
CHANGELOG.md Normal file
View file

@ -0,0 +1,108 @@
## 0.1.0a18 (2025-04-09)
### Fix
- version
## 0.1.0a17 (2025-04-09)
### Fix
- better error message
## 0.1.0a16 (2025-04-04)
### Fix
- with ROUGAIL_BITWARDEN_MOCK_ENABLE variable, unix_user and password are different
## 0.1.0a15 (2025-03-19)
### Fix
- support item without username
## 0.1.0a14 (2025-03-19)
### Feat
- port to rougail secret_manager
- same behavour between bw et rbw
## 0.1.0a13 (2025-02-19)
### Fix
- MOCK
## 0.1.0a12 (2025-02-19)
### Fix
- MOCK
## 0.1.0a11 (2025-02-19)
### Fix
- if mock is active, do not search rbw or bw
## 0.1.0a10 (2025-02-17)
### Fix
- support hidden attribut
## 0.1.0a9 (2025-02-17)
### Fix
- support hidden attribut
## 0.1.0a8 (2025-02-17)
### Fix
- update structural plugin version
## 0.1.0a7 (2025-02-17)
### Feat
- support rbw and bw command line
## 0.1.0a6 (2025-02-13)
### Fix
- bitwarden key could be an invalid username/secret
## 0.1.0a5 (2025-02-13)
### Fix
- structural load
## 0.1.0a4 (2025-02-13)
### Fix
- structural version
## 0.1.0a2 (2025-02-13)
### Fix
- separate user-data and structural
## 0.1.0a1 (2025-02-12)
### Fix
- many improvment
## 0.1.0a0 (2025-02-05)
### Feat
- first version

View file

@ -0,0 +1,127 @@
# SOME DESCRIPTIVE TITLE.
# Copyright (C) YEAR ORGANIZATION
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
msgid ""
msgstr ""
"Project-Id-Version: \n"
"POT-Creation-Date: 2025-04-09 14:13+0200\n"
"PO-Revision-Date: 2025-04-09 14:14+0200\n"
"Last-Translator: \n"
"Language-Team: \n"
"Language: fr\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: pygettext.py 1.5\n"
"X-Generator: Poedit 3.5\n"
#: src/rougail/user_data_bitwarden/data.py:52
msgid "\"bitwarden\" is not set in step.user_data"
msgstr "\"bitwarden\" n'est pas dans step.user_data"
#: src/rougail/user_data_bitwarden/data.py:74
msgid "\"rbw\" or \"bw\""
msgstr "\"rbw\" ou \"bw\""
#: src/rougail/user_data_bitwarden/data.py:76
msgid "\"{0}\""
msgstr "\"{0}\""
#: src/rougail/user_data_bitwarden/data.py:78
msgid "please unlock Bitwarden password database with {0}"
msgstr ""
"veuillez déverrouiller la base de donnée de mot de passe Bitwarden avec {0}"
#: src/rougail/user_data_bitwarden/data.py:79
msgid "cannot find Bitwarden command {0} please install it"
msgstr "ne peut trouver la commande Bitwarden {0} veuillez l'installer"
#: src/rougail/user_data_bitwarden/data.py:153
msgid ""
"the value for \"{0}\" at index {1} is already set while it should be filled "
"in by Bitwarden"
msgstr ""
"la valeur de \"{0}\" à l'index {1} est déjà renseigné alors que celle doit "
"devrait être renseigné par Bitwarden"
#: src/rougail/user_data_bitwarden/data.py:155
msgid ""
"the value for \"{0}\" is already set while it should be filled in by "
"Bitwarden"
msgstr ""
"la valeur de \"{0}\" est déjà renseignée alors que celle doit devrait être "
"renseignée par Bitwarden"
#: src/rougail/user_data_bitwarden/data.py:185
msgid "the default value for \"{0}\" must be the Bitwarden item name"
msgstr ""
"la valeur par défaut pour \"{0}\" doit être un nom d'élément de Bitwarden"
#: src/rougail/user_data_bitwarden/data.py:198
msgid "cannot execute the \"{0}\" commandline from Bitwarden for \"{1}\": {2}"
msgstr ""
"ne peut exécuter la ligne de commande \"{0}\" pour Bitwarden pour \"{1}\": "
"{2}"
#: src/rougail/user_data_bitwarden/data.py:201
msgid "item \"{0}\" in Bitwarden is not found for \"{1}\""
msgstr "l'élément \"{0}\" dans Bitwarden n'est pas trouvé pour \"{1}\""
#: src/rougail/user_data_bitwarden/data.py:208
msgid "several items found with name \"{0}\" in Bitwarden for \"{1}\": \"{2}\""
msgstr ""
"plusieurs éléments trouvés avec le nom \"{0}\" dans Bitwarden pour \"{1}\": "
"\"{2}\""
#: src/rougail/user_data_bitwarden/data.py:219
msgid "unexpected datas \"{0}\" from Bitwarden for \"{1}\": {2}"
msgstr "données inattendues \"{0}\" pour Bitwarden pour \"{1}\": {2}"
#: src/rougail/user_data_bitwarden/data.py:224
msgid "password"
msgstr "de mot de passe"
#: src/rougail/user_data_bitwarden/data.py:226
msgid "username"
msgstr "de nom d'utilisateur"
#: src/rougail/user_data_bitwarden/data.py:227
msgid "item \"{0}\" in Bitwarden has no {1} for \"{2}\""
msgstr "l'élément \"{0}\" dans Bitwarden n'a pas {1} for \"{2}\""
#~ msgid "cannot find {0} \"{1}\" from Bitwarden for \"{2}\""
#~ msgstr "ne peut trouver {0} \"{1}\" pour Bitwarden pour \"{2}\""
#~ msgid ""
#~ "only \"unix_user\" or \"secret\" variable type can have \"bitwarden\" "
#~ "attribute, but \"{0}\" has type \"{1}\""
#~ msgstr ""
#~ "seule une variable de type \"unix_user\" ou \"secret\" peuvent avoir "
#~ "l'attribut \"bitwarden\", mais \"{0}\" a le type \"{1}\""
#~ msgid ""
#~ "the variable \"{0}\" has attribute \"bitwarden\" but is a multi variable"
#~ msgstr ""
#~ "la variable \"{0}\" a un attribut \"bitwarden\" mais est une variable "
#~ "multiple"
#~ msgid ""
#~ "the variable \"{0}\" is a follower and leader variable (\"{1}\") is also "
#~ "in Bitwarden so this variable could not have default value"
#~ msgstr ""
#~ "la variable \"{0}\" est une suiveuse et la variable leader (\"{1}\") est "
#~ "aussi dans Bitwarden donc cette variable ne peut avoir de valeur par "
#~ "défaut"
#~ msgid "the variable \"{0}\" is in Bitwarden so should have default value"
#~ msgstr ""
#~ "la variable \"{0}\" est dans Bitwarden donc doit avoir une valeur par "
#~ "défaut"
#~ msgid "cannot get {0} \"{1}\" from Bitwarden for \"{2}\": {3} ({4})"
#~ msgstr ""
#~ "ne peut récupérer {0} \"{1}\" pour Bitwarden pour \"{2}\": {3} ({4})"
#~ msgid "cannot load {0} \"{1}\" from Bitwarden for \"{2}\": {3}"
#~ msgstr "ne peut charger {0} \"{1}\" pour Bitwarden pour \"{2}\": {3}"

View file

@ -0,0 +1,77 @@
# SOME DESCRIPTIVE TITLE.
# Copyright (C) YEAR ORGANIZATION
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2025-04-09 14:14+0200\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: pygettext.py 1.5\n"
#: src/rougail/user_data_bitwarden/data.py:52
msgid "\"bitwarden\" is not set in step.user_data"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:74
msgid "\"rbw\" or \"bw\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:76
msgid "\"{0}\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:78
msgid "please unlock Bitwarden password database with {0}"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:79
msgid "cannot find Bitwarden command {0} please install it"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:153
msgid "the value for \"{0}\" at index {1} is already set while it should be filled in by Bitwarden"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:155
msgid "the value for \"{0}\" is already set while it should be filled in by Bitwarden"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:185
msgid "the default value for \"{0}\" must be the Bitwarden item name"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:198
msgid "cannot execute the \"{0}\" commandline from Bitwarden for \"{1}\": {2}"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:201
msgid "item \"{0}\" in Bitwarden is not found for \"{1}\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:208
msgid "several items found with name \"{0}\" in Bitwarden for \"{1}\": \"{2}\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:219
msgid "unexpected datas \"{0}\" from Bitwarden for \"{1}\": {2}"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:224
msgid "password"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:226
msgid "username"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:227
msgid "item \"{0}\" in Bitwarden has no {1} for \"{2}\""
msgstr ""

47
pyproject.toml Normal file
View file

@ -0,0 +1,47 @@
[build-system]
build-backend = "flit_core.buildapi"
requires = ["flit_core >=3.8.0,<4"]
[project]
name = "rougail.user_data_bitwarden"
version = "0.1.0a18"
authors = [{name = "Emmanuel Garette", email = "gnunux@gnunux.info"}]
readme = "README.md"
description = "Rougail user_data Bitwarden"
requires-python = ">=3.8"
license = {file = "LICENSE"}
classifiers = [
"License :: OSI Approved :: GNU Library or Lesser General Public License (LGPL)",
"Programming Language :: Python",
"Programming Language :: Python :: 3.8",
"Programming Language :: Python :: 3.9",
"Programming Language :: Python :: 3.10",
"Programming Language :: Python :: 3.11",
"Programming Language :: Python :: 3.12",
"Programming Language :: Python :: 3.13",
"Programming Language :: Python :: 3.14",
"Programming Language :: Python :: 3",
"Operating System :: OS Independent",
"Natural Language :: English",
"Natural Language :: French",
]
dependencies = [
"rougail >= 1.1,<2",
"rougail-structural-bitwarden == 0.1.0a3",
]
[project.urls]
Home = "https://forge.cloud.silique.fr/stove/rougail-user-data-bitwarden"
[tool.commitizen]
name = "cz_conventional_commits"
tag_format = "$version"
version_scheme = "pep440"
version_provider = "pep621"
version_files = [
"src/rougail/user_data_bitwarden/__version__.py",
"pyproject.toml:version"
]
update_changelog_on_bump = true
changelog_merge_prerelease = true

View file

@ -0,0 +1,27 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
distribued with GPL-2 or later license
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
"""
from .data import RougailUserDataBitwarden
from .__version__ import __version__
RougailUserData = RougailUserDataBitwarden
__all__ = ('RougailUserDataBitwarden',)

View file

@ -0,0 +1 @@
__version__ = "0.1.0a18"

View file

@ -0,0 +1,57 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
distribued with GPL-2 or later license
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
"""
def get_rougail_config(*,
backward_compatibility=True,
) -> dict:
options = """
step:
structural:
redefine: true
default:
jinja: |-
{% if 'bitwarden' in step.user_data %}
bitwarden
{% endif %}
{% if 'risotto' in step.user_data %}
risotto
{% else %}
directory
{% endif %}
bitwarden:
command:
choices:
- rbw
- bw
mandatory: false
"""
return {'name': 'bitwarden',
'process': 'user data',
"options": options,
'level': 90,
}
__all__ = ('get_rougail_config',)

View file

@ -0,0 +1,228 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
distribued with GPL-2 or later license
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
"""
from subprocess import run
from json import loads
from os import environ
from shutil import which
from rougail.error import ExtentionError
from .i18n import _
class RougailUserDataBitwarden:
force_apply_user_data = True
def __init__(self,
config: 'Config',
*,
rougailconfig: "RougailConfig"=None,
):
# this is the tiramisu config object
self.config = config
if rougailconfig is None:
from rougail.config import RougailConfig
rougailconfig = RougailConfig
user_data = rougailconfig['step.user_data']
if 'bitwarden' not in user_data:
user_data.append('bitwarden')
rougailconfig['step.user_data'] = user_data
user_data = rougailconfig['step.user_data']
self.rougailconfig = rougailconfig
if 'bitwarden' not in user_data:
raise ExtentionError(_('"bitwarden" is not set in step.user_data'))
self.errors = []
self.warnings = []
self.leader_informations = {}
self.bitwarden_command_line = self.get_command(rougailconfig)
def get_command(self, rougailconfig):
if 'ROUGAIL_BITWARDEN_MOCK_ENABLE' in environ:
return None
one_is_find = False
force_command = rougailconfig["bitwarden.command"]
if force_command:
commands = [force_command]
else:
commands = ['rbw', 'bw']
for command in commands:
status = self.test_command(command)
if status is False:
one_is_find = True
elif status:
return command
if not force_command:
command_string = _('"rbw" or "bw"')
else:
command_string = _('"{0}"').format(force_command)
if one_is_find:
raise ExtentionError(_('please unlock Bitwarden password database with {0}').format(command_string))
raise ExtentionError(_('cannot find Bitwarden command {0} please install it').format(command_string))
def test_command(self, command):
if not which(command):
return None
if command == 'rbw':
cmd = ['rbw', 'unlocked']
else:
cmd = ['bw', 'status']
try:
cpe = run(cmd, capture_output=True)
except Exception as exc:
return False
if cpe.returncode != 0:
return False
if command == 'rbw':
return True
try:
data = loads(cpe.stdout.decode('utf8'))
if data["status"] == "unlocked":
return True
except:
pass
return False
def run(self):
self.set_passwords(self.config.forcepermissive)
return {'errors': self.errors,
'warnings': self.warnings,
}
def run_commandline(self, cmd) -> str:
cpe = run(cmd, capture_output=True)
err = cpe.stderr.decode('utf8')
if cpe.returncode != 0 or err:
raise Exception('{0} ({1})'.format(err, cpe.returncode))
return cpe.stdout.decode('utf8')
def get_key_from_commandline(self, key_bitwarden: str, allow_multiple: bool) -> list[str]:
if self.bitwarden_command_line == 'rbw':
keys = []
items = self.run_commandline(["rbw", "search", key_bitwarden]).strip()
if items:
items = items.split('\n')
else:
items = []
for item in items:
#if item.count('@') != 1:
# continue
if "@" in item:
keys.append(item.split('@', 1)[-1])
else:
keys.append(item.rsplit('/', 1)[-1])
if not allow_multiple:
if not items:
return []
if len(items) > 1:
return [{'name': key} for key in keys]
keys = [key_bitwarden]
datas = []
for key in keys:
data = loads(self.run_commandline(["rbw", "get", key, '--raw', '--ignorecase']).strip())
datas.append({'name': key, 'login': data["data"]})
return datas
return loads(self.run_commandline(["bw", "list", "items", "--search", key_bitwarden, '--nointeraction']))
def set_passwords(self, optiondescription):
for option in optiondescription:
if option.isoptiondescription():
self.set_passwords(option)
elif option.information.get('bitwarden', False):
path = option.path()
if not option.owner.isdefault():
if option.isfollower():
self.errors.append(_('the value for "{0}" at index {1} is already set while it should be filled in by Bitwarden').format(path, option.index()))
else:
self.errors.append(_('the value for "{0}" is already set while it should be filled in by Bitwarden').format(path))
continue
type_ = option.information.get('type')
if option.isleader():
leader_values = []
self.leader_informations[path] = []
values = option.value.get()
for val in values:
names, values = self.get_values(path, type_, val, allow_multiple=True)
if isinstance(values, list):
leader_values.extend(values)
self.leader_informations[path].extend(names)
else:
leader_values.append(values)
self.leader_informations[path].append(names)
option.value.set(leader_values)
else:
if option.isfollower():
leader_path = optiondescription.leader().path()
if leader_path in self.leader_informations:
key_bitwarden = self.leader_informations[leader_path][option.index()]
else:
key_bitwarden = option.value.get()
else:
key_bitwarden = option.value.get()
option.value.set(self.get_values(path, type_, key_bitwarden)[1])
option.permissive.add('novalidator')
def get_values(self, path, type_, key_bitwarden, *, allow_multiple=False):
if not isinstance(key_bitwarden, str):
self.errors.append(_('the default value for "{0}" must be the Bitwarden item name').format(path))
return None, None
if 'ROUGAIL_BITWARDEN_MOCK_ENABLE' in environ:
if type_ == 'secret':
value = 'Ex4mpL3_P4ssw0rD'
else:
value = 'example_login'
if allow_multiple:
return [key_bitwarden], [value]
return key_bitwarden, value
try:
data = self.get_key_from_commandline(key_bitwarden, allow_multiple)
except Exception as exc:
self.errors.append(_('cannot execute the "{0}" commandline from Bitwarden for "{1}": {2}').format(self.bitwarden_command_line, path, exc))
return None, None
if not data:
self.errors.append(_('item "{0}" in Bitwarden is not found for "{1}"').format(key_bitwarden, path))
return None, None
if len(data) != 1:
names = [d["name"] for d in data]
if allow_multiple:
ret = []
return names, [self.get_value(key_bitwarden, path, type_, d) for d in data]
self.errors.append(_('several items found with name "{0}" in Bitwarden for "{1}": "{2}"').format(key_bitwarden, path, "\", \"".join(names)))
return None, None
return data[0]['name'], self.get_value(key_bitwarden, path, type_, data[0])
def get_value(self, key_bitwarden: str, path: str, type_: str, data: dict) -> str:
try:
if type_ == 'secret':
value = data['login']['password']
else:
value = data['login']['username']
except Exception as exc:
self.errors.append(_('unexpected datas "{0}" from Bitwarden for "{1}": {2}').format(key_bitwarden, path, exc))
value = None
else:
if value is None:
if type_ == 'secret':
bw_type = _('password')
else:
bw_type = _('username')
self.errors.append(_('item "{0}" in Bitwarden has no {1} for "{2}"').format(key_bitwarden, bw_type, path))
return value

View file

@ -0,0 +1,26 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
This program is free software: you can redistribute it and/or modify it
under the terms of the GNU Lesser General Public License as published by the
Free Software Foundation, either version 3 of the License, or (at your
option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
details.
You should have received a copy of the GNU Lesser General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
"""
from gettext import translation
from pathlib import Path
t = translation(
"rougail_user_data_bitwarden", str(Path(__file__).parent / "locale"), fallback=True
)
_ = t.gettext

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "bitwarden_password"
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"item \"1_secret_unknown - environment - service - user\" in Bitwarden is not found for \"rougail.secret\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": null
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "bitwarden_username",
"rougail.secret": "bitwarden_password"
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "example_login",
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "bitwarden_username",
"rougail.secret": "bitwarden_password"
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "example_login",
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "up_secret_error_1",
"rougail.secret": "up_secret_error_pass_1"
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "example_login",
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "bitwarden_username",
"rougail.secret": "bitwarden_password"
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "example_login",
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,12 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "bitwarden_username",
"rougail.leader.secret": "bitwarden_password"
},
{
"rougail.leader.username": "bitwarden_username_2",
"rougail.leader.secret": "bitwarden_password_2"
}
]
}

View file

@ -0,0 +1,8 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "example_login",
"rougail.leader.secret": "Ex4mpL3_P4ssw0rD"
}
]
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,12 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "bitwarden_username",
"rougail.leader.secret": "bitwarden_password"
},
{
"rougail.leader.username": "bitwarden_username_2",
"rougail.leader.secret": "bitwarden_password_2"
}
]
}

View file

@ -0,0 +1,12 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "bitwarden_username_2",
"rougail.leader.secret": "bitwarden_password_2"
},
{
"rougail.leader.username": "bitwarden_username",
"rougail.leader.secret": "bitwarden_password"
}
]
}

View file

@ -0,0 +1,8 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "example_login",
"rougail.leader.secret": "Ex4mpL3_P4ssw0rD"
}
]
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"several items found with name \"4_several_secrets - environment - service - user\" in Bitwarden for \"rougail.secret\": \"4_several_secrets - environment - service - user_1\", \"4_several_secrets - environment - service - user_2\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": null
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"several items found with name \"3_leadership_secret - ENVIRONMENT - SERVICE - USER\" in Bitwarden for \"rougail.secret\": \"3_leadership_secret - environment - service - user_1\", \"3_leadership_secret - environment - service - user_2\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": null
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,10 @@
{
"rougail.host": "test",
"rougail.project": "5_secret_calc",
"rougail.environment": "environment",
"rougail.service": "service",
"rougail.user": "user_1",
"rougail.secret": "bitwarden_password",
"rougail.dyn_user_1.secret": "bitwarden_password",
"rougail.dyn_user_2.secret": "bitwarden_password_2"
}

View file

@ -0,0 +1,10 @@
{
"rougail.host": "test",
"rougail.project": "5_secret_calc",
"rougail.environment": "environment",
"rougail.service": "service",
"rougail.user": "user_1",
"rougail.secret": "Ex4mpL3_P4ssw0rD",
"rougail.dyn_user_1.secret": "Ex4mpL3_P4ssw0rD",
"rougail.dyn_user_2.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"item \"6_no_username - environment - service - user_1\" in Bitwarden has no username for \"rougail.username\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": null,
"rougail.secret": "ET6RrpdZv5bNZu"
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret.bitwarden": true
}

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 1_secret
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 1_secret_unknown
environment: environment
service: service
user: user

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 2_username_secret
environment: environment
service: service
user: user_1
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 2_username_secret
environment: environment
service: service
user: user_1

View file

@ -0,0 +1,23 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 2_username_secret_hidden
environment: environment
service: service
user: user
secret:
description: the secret
type: secret
hidden: true
secret_manager:
host: test
project: 2_username_secret_hidden
environment: environment
service: service
user: user

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 2_username_secret_invalid
environment: environment
service: service
user: UP SECRET 1
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 2_username_secret_invalid
environment: environment
service: service
user: UP SECRET 1

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: TEST
project: 2_USERNAME_SECRET_UPPER
environment: ENVIRONMENT
service: SERVICE
user: USER_1
secret:
description: the secret
type: secret
secret_manager:
host: TEST
project: 2_USERNAME_SECRET_UPPER
environment: ENVIRONMENT
service: SERVICE
user: USER_1

View file

@ -0,0 +1,25 @@
---
version: 1.1
leader:
type: leadership
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 3_leadership_secret
environment: environment
service: service
user: user
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 3_leadership_secret
environment: environment
service: service
user: user

View file

@ -0,0 +1,25 @@
---
version: 1.1
leader:
type: leadership
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 3_leadership_secret_several
environment: environment
service: service
user: user
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 3_leadership_secret_several
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 4_several_secrets
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 3_leadership_secret
environment: ENVIRONMENT
service: SERVICE
user: USER

View file

@ -0,0 +1,57 @@
---
version: 1.1
host:
description: hostname
default: test
project:
description: the project
default: 5_secret_calc
environment:
description: the environment
default: environment
service:
description: the service
default: service
user:
description: the user
default: user_1
secret:
description: the secret
type: secret
secret_manager:
host:
variable: _.host
project:
variable: _.project
environment:
variable: _.environment
service:
variable: _.service
user:
variable: _.user
dyn_{{ identifier }}:
dynamic:
- user_1
- user_2
secret:
description: the second secret
type: secret
secret_manager:
host:
variable: __.host
project:
variable: __.project
environment:
variable: __.environment
service:
variable: __.service
user:
type: identifier

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 6_no_username
environment: environment
service: service
user: user_1
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 6_no_username
environment: environment
service: service
user: user_1

View file

@ -0,0 +1,13 @@
---
version: 1.1
secret:
description: the secret variable
type: secret
multi: true
secret_manager:
host: test
project: 8_multi_variable
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the first variable
type: string
secret_manager:
host: test
project: 9_unknown_type
environment: environment
service: service
user: user

371
tests/test_load.py Normal file
View file

@ -0,0 +1,371 @@
import os
from pathlib import Path
from rougail import Rougail, RougailConfig
from rougail.error import DictConsistencyError
#########################
from rougail.user_data_bitwarden import RougailUserDataBitwarden as RougailUserData
from json import load, dump
#########################
from pytest import raises
from unittest import mock
from rougail_tests.utils import config_to_dict
test_dir = Path(__file__).parent / 'structures'
def _test_dictionaries(test_dir, command, env=False):
rougailconfig = RougailConfig.copy()
rougailconfig['main_dictionaries'] = [str(test_dir)]
# rougailconfig['tiramisu_cache'] = "cache.py"
rougailconfig['step.user_data'] = ['bitwarden']
rougailconfig['bitwarden.command'] = command
rougail = Rougail(rougailconfig)
config = rougail.run()
# loads variables in the tiramisu config
errors = RougailUserData(config, rougailconfig=rougailconfig).run()
#expected output
config_dict = dict(config_to_dict(config.forcepermissive.value.get()))
if not env:
base_filename = 'bitwarden.json'
else:
base_filename = 'bitwarden_env.json'
ok_file = Path('tests') / 'results' / test_dir.name / 'makedict' / (base_filename + '.' + command)
if not ok_file.is_file():
ok_file = Path('tests') / 'results' / test_dir.name / 'makedict' / base_filename
if not ok_file.is_file():
ok_file.parent.mkdir(parents=True, exist_ok=True)
with open(ok_file, 'a') as json_file:
dump(config_dict, json_file, indent=4)
with open(ok_file) as json_file:
expected = load(json_file)
errors_file = Path('tests') / 'results' / test_dir.name / 'errors' / (base_filename + '.' + command)
if not errors_file.is_file():
errors_file = Path('tests') / 'results' / test_dir.name / 'errors' / base_filename
if not errors_file.is_file():
errors_file.parent.mkdir(parents=True, exist_ok=True)
with open(errors_file, 'a') as json_file:
dump(errors, json_file, indent=4)
with open(errors_file) as json_file:
expected_errors = load(json_file)
# expected_errors = {
# 'errors': [],
# 'warnings': [],
# }
assert expected_errors == errors
#
assert expected == config_dict
def test_dictionaries_1_secret_rbw():
"tests the output"
_test_dictionaries(test_dir / '1_secret', 'rbw')
def test_dictionaries_1_secret_bw():
"tests the output"
_test_dictionaries(test_dir / '1_secret', 'bw')
def test_dictionaries_1_secret_unknown_rbw():
"tests the output"
_test_dictionaries(test_dir / '1_secret_unknown', 'rbw')
def test_dictionaries_1_secret_unknown_bw():
"tests the output"
_test_dictionaries(test_dir / '1_secret_unknown', 'bw')
def test_dictionaries_2_username_secret_rbw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret', 'rbw')
def test_dictionaries_2_username_secret_bw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret', 'bw')
def test_dictionaries_2_username_secret_upper_rbw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret_upper', 'rbw')
def test_dictionaries_2_username_secret_upper_bw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret_upper', 'bw')
def test_dictionaries_2_username_secret_invalid_rbw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret_invalid', 'rbw')
def test_dictionaries_2_username_secret_invalid_bw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret_invalid', 'bw')
def test_dictionaries_2_username_secret_hidden_rbw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret_hidden', 'rbw')
def test_dictionaries_2_username_secret_hidden_bw():
"tests the output"
_test_dictionaries(test_dir / '2_username_secret_hidden', 'bw')
def test_dictionaries_3_leadership_secret_rbw():
"tests the output"
_test_dictionaries(test_dir / '3_leadership_secret', 'rbw')
def test_dictionaries_3_leadership_secret_bw():
"tests the output"
_test_dictionaries(test_dir / '3_leadership_secret', 'bw')
def test_dictionaries_3_leadership_secret_several_rbw():
"tests the output"
_test_dictionaries(test_dir / '3_leadership_secret_several', 'rbw')
def test_dictionaries_3_leadership_secret_several_bw():
"tests the output"
_test_dictionaries(test_dir / '3_leadership_secret_several', 'bw')
def test_dictionaries_4_several_secrets_rbw():
"tests the output"
_test_dictionaries(test_dir / '4_several_secrets', 'rbw')
def test_dictionaries_4_several_secrets_bw():
"tests the output"
_test_dictionaries(test_dir / '4_several_secrets', 'bw')
def test_dictionaries_4_several_secrets_upper_rbw():
"tests the output"
_test_dictionaries(test_dir / '4_several_secrets_upper', 'rbw')
def test_dictionaries_4_several_secrets_upper_bw():
"tests the output"
_test_dictionaries(test_dir / '4_several_secrets_upper', 'bw')
def test_dictionaries_5_secret_calc_rbw():
"tests the output"
_test_dictionaries(test_dir / '5_secret_calc', 'rbw')
def test_dictionaries_5_secret_calc_bw():
"tests the output"
_test_dictionaries(test_dir / '5_secret_calc', 'bw')
def test_dictionaries_6_no_username_rbw():
"tests the output"
_test_dictionaries(test_dir / '6_no_username', 'rbw')
def test_dictionaries_6_no_username_bw():
"tests the output"
_test_dictionaries(test_dir / '6_no_username', 'bw')
def test_dictionaries_8_multi_variable_rbw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '8_multi_variable', 'rbw')
assert err.value.errno == 57
def test_dictionaries_8_multi_variable_bw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '8_multi_variable', 'bw')
assert err.value.errno == 57
def test_dictionaries_9_unknown_type_rbw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '9_unknown_type', 'rbw')
assert err.value.errno == 56
def test_dictionaries_9_unknown_type_bw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '9_unknown_type', 'bw')
assert err.value.errno == 56
def test_dictionaries_env_1_secret_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '1_secret', 'rbw', True)
def test_dictionaries_env_1_secret_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '1_secret', 'bw', True)
def test_dictionaries_env_1_secret_unknown_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '1_secret_unknown', 'rbw', True)
def test_dictionaries_env_1_secret_unknown_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '1_secret_unknown', 'bw', True)
def test_dictionaries_env_2_username_secret_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret', 'rbw', True)
def test_dictionaries_env_2_username_secret_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret', 'bw', True)
def test_dictionaries_env_2_username_secret_upper_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret_upper', 'rbw', True)
def test_dictionaries_env_2_username_secret_upper_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret_upper', 'bw', True)
def test_dictionaries_env_2_username_secret_invalid_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret_invalid', 'rbw', True)
def test_dictionaries_env_2_username_secret_invalid_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret_invalid', 'bw', True)
def test_dictionaries_env_2_username_secret_hidden_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret_hidden', 'rbw', True)
def test_dictionaries_env_2_username_secret_hidden_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '2_username_secret_hidden', 'bw', True)
def test_dictionaries_env_3_leadership_secret_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '3_leadership_secret', 'rbw', True)
def test_dictionaries_env_3_leadership_secret_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '3_leadership_secret', 'bw', True)
def test_dictionaries_env_3_leadership_secret_several_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '3_leadership_secret_several', 'rbw', True)
def test_dictionaries_env_3_leadership_secret_several_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '3_leadership_secret_several', 'bw', True)
def test_dictionaries_env_4_several_secrets_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '4_several_secrets', 'rbw', True)
def test_dictionaries_env_4_several_secrets_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '4_several_secrets', 'bw', True)
def test_dictionaries_env_4_several_secrets_upper_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '4_several_secrets_upper', 'rbw', True)
def test_dictionaries_env_4_several_secrets_upper_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '4_several_secrets_upper', 'bw', True)
def test_dictionaries_env_5_secret_calc_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '5_secret_calc', 'rbw', True)
def test_dictionaries_env_5_secret_calc_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_dictionaries(test_dir / '5_secret_calc', 'bw', True)
def test_dictionaries_env_8_multi_variable_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '8_multi_variable', 'rbw', True)
assert err.value.errno == 57
def test_dictionaries_env_8_multi_variable_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '8_multi_variable', 'bw', True)
assert err.value.errno == 57
def test_dictionaries_env_9_unknown_type_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '9_unknown_type', 'rbw', True)
assert err.value.errno == 56
def test_dictionaries_env_9_unknown_type_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_dictionaries(test_dir / '9_unknown_type', 'bw', True)
assert err.value.errno == 56