Compare commits

...

54 commits

Author SHA1 Message Date
88e7548fa4 bump: version 0.1.0a25 → 0.1.0a26 2025-11-21 08:02:02 +01:00
08e50e8aea fix: ExtentionError => ExtensionError 2025-11-21 08:01:55 +01:00
6f358f88f2 bump: version 0.1.0a24 → 0.1.0a25 2025-11-06 06:26:48 +01:00
2f50351b9d fix: disable config if bitwarden is not selected 2025-11-05 21:38:15 +01:00
495b54dd0f bump: version 0.1.0a23 → 0.1.0a24 2025-10-16 08:21:35 +02:00
ec3b740aea fix: path is uncalculated 2025-10-16 08:20:27 +02:00
1088164eed bump: version 0.1.0a22 → 0.1.0a23 2025-10-16 08:14:38 +02:00
c83675ae7d feat: update rougail-structural-bitwarden 2025-10-16 08:14:25 +02:00
6e3b48de07 bump: version 0.1.0a21 → 0.1.0a22 2025-10-10 08:14:22 +02:00
669c6cce98 feat: use user_datas to load datas 2025-10-05 21:33:44 +02:00
0cff9b8691 bump: version 0.1.0a20 → 0.1.0a21 2025-06-20 07:27:00 +03:00
13abd6ac4d feat: update rougail-structural-bitwarden package version 2025-06-20 07:26:01 +03:00
24fcf6f814 bump: version 0.1.0a19 → 0.1.0a20 2025-05-12 09:10:08 +02:00
72980ca358 fix: black 2025-05-11 19:11:17 +02:00
d30680cbed bump: version 0.1.0a18 → 0.1.0a19 2025-05-02 08:16:26 +02:00
a2fb9e8509 fix: do not force use_data usage 2025-05-02 08:16:24 +02:00
16119b432e bump: version 0.1.0a17 → 0.1.0a18 2025-04-09 21:28:06 +02:00
d4e3d06cc2 fix: version 2025-04-09 21:28:03 +02:00
a17ae75c59 bump: version 0.1.0a16 → 0.1.0a17 2025-04-09 14:21:34 +02:00
54bdf4861c fix: better error message 2025-04-09 14:20:56 +02:00
71a05d631c bump: version 0.1.0a15 → 0.1.0a16 2025-04-04 08:27:19 +02:00
1d401f7e35 fix: with ROUGAIL_BITWARDEN_MOCK_ENABLE variable, unix_user and password are different 2025-04-04 08:27:05 +02:00
2bb0b0db3a bump: version 0.1.0a14 → 0.1.0a15 2025-03-19 15:32:30 +01:00
c4c7e0da4a fix: support item without username 2025-03-19 15:31:52 +01:00
34963ddca2 bump: version 0.1.0a13 → 0.1.0a14 2025-03-19 10:25:25 +01:00
a273820c84 feat: port to rougail secret_manager 2025-03-19 10:25:09 +01:00
c3a0ecd557 feat: same behavour between bw et rbw 2025-03-01 18:04:38 +01:00
3b72988cb5 bump: version 0.1.0a12 → 0.1.0a13 2025-02-19 09:27:51 +01:00
d3c0f94f86 fix: MOCK 2025-02-19 09:27:47 +01:00
80b1155d2a bump: version 0.1.0a11 → 0.1.0a12 2025-02-19 09:14:00 +01:00
65e318e883 fix: MOCK 2025-02-19 09:13:55 +01:00
e9ef79e80b bump: version 0.1.0a10 → 0.1.0a11 2025-02-19 08:59:22 +01:00
a12cf396fd fix: if mock is active, do not search rbw or bw 2025-02-19 08:59:13 +01:00
4c72346aa6 bump: version 0.1.0a9 → 0.1.0a10 2025-02-17 15:40:59 +01:00
80ddd65206 fix: support hidden attribut 2025-02-17 15:40:55 +01:00
d96f888e48 bump: version 0.1.0a8 → 0.1.0a9 2025-02-17 15:26:20 +01:00
82e0c371a0 fix: support hidden attribut 2025-02-17 15:25:59 +01:00
5d8dd6881f bump: version 0.1.0a7 → 0.1.0a8 2025-02-17 09:40:49 +01:00
4fd27de57e fix: update structural plugin version 2025-02-17 09:40:43 +01:00
76b43846ed bump: version 0.1.0a6 → 0.1.0a7 2025-02-17 09:34:40 +01:00
510b97d7cf feat: support rbw and bw command line 2025-02-17 09:34:26 +01:00
b332195ef3 bump: version 0.1.0a5 → 0.1.0a6 2025-02-13 22:09:30 +01:00
8b180e131e fix: bitwarden key could be an invalid username/secret 2025-02-13 22:09:15 +01:00
52a56476d3 bump: version 0.1.0a4 → 0.1.0a5 2025-02-13 13:31:00 +01:00
7925cdcc6a fix: structural load 2025-02-13 13:30:55 +01:00
01feb985fb bump: version 0.1.0a3 → 0.1.0a4 2025-02-13 13:23:23 +01:00
c16fcdb7fe fix: structural version 2025-02-13 13:23:20 +01:00
b16e71846b bump: version 0.1.0a2 → 0.1.0a3 2025-02-13 13:20:59 +01:00
eea2badb64 bump: version 0.1.0a1 → 0.1.0a2 2025-02-13 13:19:26 +01:00
b6e4744085 fix: separate user-data and structural 2025-02-13 13:16:05 +01:00
653790b9af bump: version 0.1.0a0 → 0.1.0a1 2025-02-12 15:51:19 +01:00
971311e0f5 fix: many improvment 2025-02-12 15:39:53 +01:00
abb4b87924 bump: version 0.0.0 → 0.1.0a0 2025-02-05 11:30:57 +01:00
5682ac96b6 feat: first version 2025-02-05 11:30:51 +01:00
76 changed files with 1833 additions and 0 deletions

156
CHANGELOG.md Normal file
View file

@ -0,0 +1,156 @@
## 0.1.0a26 (2025-11-21)
### Fix
- ExtentionError => ExtensionError
## 0.1.0a25 (2025-11-06)
### Fix
- disable config if bitwarden is not selected
## 0.1.0a24 (2025-10-16)
### Fix
- path is uncalculated
## 0.1.0a23 (2025-10-16)
### Feat
- update rougail-structural-bitwarden
## 0.1.0a22 (2025-10-10)
### Feat
- use user_datas to load datas
## 0.1.0a21 (2025-06-20)
### Feat
- update rougail-structural-bitwarden package version
## 0.1.0a20 (2025-05-12)
### Fix
- black
## 0.1.0a19 (2025-05-02)
### Fix
- do not force use_data usage
## 0.1.0a18 (2025-04-09)
### Fix
- version
## 0.1.0a17 (2025-04-09)
### Fix
- better error message
## 0.1.0a16 (2025-04-04)
### Fix
- with ROUGAIL_BITWARDEN_MOCK_ENABLE variable, unix_user and password are different
## 0.1.0a15 (2025-03-19)
### Fix
- support item without username
## 0.1.0a14 (2025-03-19)
### Feat
- port to rougail secret_manager
- same behavour between bw et rbw
## 0.1.0a13 (2025-02-19)
### Fix
- MOCK
## 0.1.0a12 (2025-02-19)
### Fix
- MOCK
## 0.1.0a11 (2025-02-19)
### Fix
- if mock is active, do not search rbw or bw
## 0.1.0a10 (2025-02-17)
### Fix
- support hidden attribut
## 0.1.0a9 (2025-02-17)
### Fix
- support hidden attribut
## 0.1.0a8 (2025-02-17)
### Fix
- update structural plugin version
## 0.1.0a7 (2025-02-17)
### Feat
- support rbw and bw command line
## 0.1.0a6 (2025-02-13)
### Fix
- bitwarden key could be an invalid username/secret
## 0.1.0a5 (2025-02-13)
### Fix
- structural load
## 0.1.0a4 (2025-02-13)
### Fix
- structural version
## 0.1.0a2 (2025-02-13)
### Fix
- separate user-data and structural
## 0.1.0a1 (2025-02-12)
### Fix
- many improvment
## 0.1.0a0 (2025-02-05)
### Feat
- first version

View file

@ -0,0 +1,133 @@
# SOME DESCRIPTIVE TITLE.
# Copyright (C) YEAR ORGANIZATION
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
msgid ""
msgstr ""
"Project-Id-Version: \n"
"POT-Creation-Date: 2025-11-05 08:24+0100\n"
"PO-Revision-Date: 2025-11-05 08:24+0100\n"
"Last-Translator: \n"
"Language-Team: \n"
"Language: fr\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: pygettext.py 1.5\n"
"X-Generator: Poedit 3.7\n"
#: src/rougail/user_data_bitwarden/config.py:46
msgid "Configuration rougail-user-data-bitwarden"
msgstr "Configuration de rougail-user-data-bitwarden"
#: src/rougail/user_data_bitwarden/config.py:54
msgid "Application used to retrieve secrets"
msgstr "Application utilisé pour récupérer des secrets"
#: src/rougail/user_data_bitwarden/data.py:53
msgid "\"bitwarden\" is not set in step.user_data"
msgstr "\"bitwarden\" n'est pas dans step.user_data"
#: src/rougail/user_data_bitwarden/data.py:75
msgid "\"rbw\" or \"bw\""
msgstr "\"rbw\" ou \"bw\""
#: src/rougail/user_data_bitwarden/data.py:77
msgid "\"{0}\""
msgstr "\"{0}\""
#: src/rougail/user_data_bitwarden/data.py:80
msgid "please unlock Bitwarden password database with {0}"
msgstr ""
"veuillez déverrouiller la base de donnée de mot de passe Bitwarden avec {0}"
#: src/rougail/user_data_bitwarden/data.py:85
msgid "cannot find Bitwarden command {0} please install it"
msgstr "ne peut trouver la commande Bitwarden {0} veuillez l'installer"
#: src/rougail/user_data_bitwarden/data.py:163
msgid "the default value for \"{0}\" must be the Bitwarden item name"
msgstr ""
"la valeur par défaut pour \"{0}\" doit être un nom d'élément de Bitwarden"
#: src/rougail/user_data_bitwarden/data.py:186
msgid "cannot execute the \"{0}\" commandline from Bitwarden for \"{1}\": {2}"
msgstr ""
"ne peut exécuter la ligne de commande \"{0}\" pour Bitwarden pour \"{1}\": "
"{2}"
#: src/rougail/user_data_bitwarden/data.py:195
msgid "item \"{0}\" in Bitwarden is not found for \"{1}\""
msgstr "l'élément \"{0}\" dans Bitwarden n'est pas trouvé pour \"{1}\""
#: src/rougail/user_data_bitwarden/data.py:210
msgid "several items found with name \"{0}\" in Bitwarden for \"{1}\": \"{2}\""
msgstr ""
"plusieurs éléments trouvés avec le nom \"{0}\" dans Bitwarden pour \"{1}\": "
"\"{2}\""
#: src/rougail/user_data_bitwarden/data.py:229
msgid "unexpected datas \"{0}\" from Bitwarden for \"{1}\": {2}"
msgstr "données inattendues \"{0}\" pour Bitwarden pour \"{1}\": {2}"
#: src/rougail/user_data_bitwarden/data.py:237
msgid "password"
msgstr "de mot de passe"
#: src/rougail/user_data_bitwarden/data.py:239
msgid "username"
msgstr "de nom d'utilisateur"
#: src/rougail/user_data_bitwarden/data.py:241
msgid "item \"{0}\" in Bitwarden has no {1} for \"{2}\""
msgstr "l'élément \"{0}\" dans Bitwarden n'a pas {1} for \"{2}\""
#~ msgid ""
#~ "the value for \"{0}\" at index {1} is already set while it should be "
#~ "filled in by Bitwarden"
#~ msgstr ""
#~ "la valeur de \"{0}\" à l'index {1} est déjà renseigné alors que celle "
#~ "doit devrait être renseigné par Bitwarden"
#~ msgid ""
#~ "the value for \"{0}\" is already set while it should be filled in by "
#~ "Bitwarden"
#~ msgstr ""
#~ "la valeur de \"{0}\" est déjà renseignée alors que celle doit devrait "
#~ "être renseignée par Bitwarden"
#~ msgid "cannot find {0} \"{1}\" from Bitwarden for \"{2}\""
#~ msgstr "ne peut trouver {0} \"{1}\" pour Bitwarden pour \"{2}\""
#~ msgid ""
#~ "only \"unix_user\" or \"secret\" variable type can have \"bitwarden\" "
#~ "attribute, but \"{0}\" has type \"{1}\""
#~ msgstr ""
#~ "seule une variable de type \"unix_user\" ou \"secret\" peuvent avoir "
#~ "l'attribut \"bitwarden\", mais \"{0}\" a le type \"{1}\""
#~ msgid ""
#~ "the variable \"{0}\" has attribute \"bitwarden\" but is a multi variable"
#~ msgstr ""
#~ "la variable \"{0}\" a un attribut \"bitwarden\" mais est une variable "
#~ "multiple"
#~ msgid ""
#~ "the variable \"{0}\" is a follower and leader variable (\"{1}\") is also "
#~ "in Bitwarden so this variable could not have default value"
#~ msgstr ""
#~ "la variable \"{0}\" est une suiveuse et la variable leader (\"{1}\") est "
#~ "aussi dans Bitwarden donc cette variable ne peut avoir de valeur par "
#~ "défaut"
#~ msgid "the variable \"{0}\" is in Bitwarden so should have default value"
#~ msgstr ""
#~ "la variable \"{0}\" est dans Bitwarden donc doit avoir une valeur par "
#~ "défaut"
#~ msgid "cannot get {0} \"{1}\" from Bitwarden for \"{2}\": {3} ({4})"
#~ msgstr ""
#~ "ne peut récupérer {0} \"{1}\" pour Bitwarden pour \"{2}\": {3} ({4})"
#~ msgid "cannot load {0} \"{1}\" from Bitwarden for \"{2}\": {3}"
#~ msgstr "ne peut charger {0} \"{1}\" pour Bitwarden pour \"{2}\": {3}"

View file

@ -0,0 +1,77 @@
# SOME DESCRIPTIVE TITLE.
# Copyright (C) YEAR ORGANIZATION
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2025-11-05 08:24+0100\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: pygettext.py 1.5\n"
#: src/rougail/user_data_bitwarden/config.py:46
msgid "Configuration rougail-user-data-bitwarden"
msgstr ""
#: src/rougail/user_data_bitwarden/config.py:54
msgid "Application used to retrieve secrets"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:53
msgid "\"bitwarden\" is not set in step.user_data"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:75
msgid "\"rbw\" or \"bw\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:77
msgid "\"{0}\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:80
msgid "please unlock Bitwarden password database with {0}"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:85
msgid "cannot find Bitwarden command {0} please install it"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:163
msgid "the default value for \"{0}\" must be the Bitwarden item name"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:186
msgid "cannot execute the \"{0}\" commandline from Bitwarden for \"{1}\": {2}"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:195
msgid "item \"{0}\" in Bitwarden is not found for \"{1}\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:210
msgid "several items found with name \"{0}\" in Bitwarden for \"{1}\": \"{2}\""
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:229
msgid "unexpected datas \"{0}\" from Bitwarden for \"{1}\": {2}"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:237
msgid "password"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:239
msgid "username"
msgstr ""
#: src/rougail/user_data_bitwarden/data.py:241
msgid "item \"{0}\" in Bitwarden has no {1} for \"{2}\""
msgstr ""

44
pyproject.toml Normal file
View file

@ -0,0 +1,44 @@
[build-system]
build-backend = "flit_core.buildapi"
requires = ["flit_core >=3.8.0,<4"]
[project]
name = "rougail.user_data_bitwarden"
version = "0.1.0a26"
authors = [{name = "Emmanuel Garette", email = "gnunux@gnunux.info"}]
readme = "README.md"
description = "Rougail user_data Bitwarden"
requires-python = ">=3.8"
license = {file = "LICENSE"}
classifiers = [
"License :: OSI Approved :: GNU Library or Lesser General Public License (LGPL)",
"Programming Language :: Python",
"Programming Language :: Python :: 3.11",
"Programming Language :: Python :: 3.12",
"Programming Language :: Python :: 3.13",
"Programming Language :: Python :: 3.14",
"Programming Language :: Python :: 3",
"Operating System :: OS Independent",
"Natural Language :: English",
"Natural Language :: French",
]
dependencies = [
"rougail >= 1.1,<2",
"rougail-structural-bitwarden == 0.1.0a6",
]
[project.urls]
Home = "https://forge.cloud.silique.fr/stove/rougail-user-data-bitwarden"
[tool.commitizen]
name = "cz_conventional_commits"
tag_format = "$version"
version_scheme = "pep440"
version_provider = "pep621"
version_files = [
"src/rougail/user_data_bitwarden/__version__.py",
"pyproject.toml:version"
]
update_changelog_on_bump = true
changelog_merge_prerelease = true

View file

@ -0,0 +1,27 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
distribued with GPL-2 or later license
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
"""
from .data import RougailUserDataBitwarden
from .__version__ import __version__
RougailUserData = RougailUserDataBitwarden
__all__ = ("RougailUserDataBitwarden",)

View file

@ -0,0 +1 @@
__version__ = "0.1.0a26"

View file

@ -0,0 +1,68 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
distribued with GPL-2 or later license
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
"""
from .i18n import _
def get_rougail_config(
*,
backward_compatibility=True,
) -> dict:
options = f"""
step:
structural:
redefine: true
default:
jinja: |-
{{% if step.user_data is not propertyerror and 'bitwarden' in step.user_data %}}
bitwarden
{{% endif %}}
{{% if step.user_data is not propertyerror and 'risotto' in step.user_data %}}
risotto
{{% else %}}
directory
{{% endif %}}
bitwarden:
description: {_("Configuration rougail-user-data-bitwarden")}
disabled:
jinja: |
{{% if step.user_data is propertyerror or 'bitwarden' not in step.user_data %}}
disabled
{{% endif %}}
command:
description: {_("Application used to retrieve secrets")}
choices:
- rbw
- bw
mandatory: false
"""
return {
"name": "bitwarden",
"process": "user data",
"options": options,
"level": 90,
}
__all__ = ("get_rougail_config",)

View file

@ -0,0 +1,296 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
distribued with GPL-2 or later license
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
"""
from subprocess import run
from json import loads
from os import environ
from shutil import which
from rougail.error import ExtensionError
from .i18n import _
class RougailUserDataBitwarden:
def __init__(
self,
config: "Config",
*,
rougailconfig: "RougailConfig" = None,
):
# this is the tiramisu config object
self.config = config
if rougailconfig is None:
from rougail.config import RougailConfig
rougailconfig = RougailConfig
user_data = rougailconfig["step.user_data"]
if "bitwarden" not in user_data:
user_data.append("bitwarden")
rougailconfig["step.user_data"] = user_data
user_data = rougailconfig["step.user_data"]
self.rougailconfig = rougailconfig
if "bitwarden" not in user_data:
raise ExtensionError(_('"bitwarden" is not set in step.user_data'))
self.errors = []
self.warnings = []
self.leader_informations = {}
self.bitwarden_command_line = self.get_command(rougailconfig)
def get_command(self, rougailconfig):
if "ROUGAIL_BITWARDEN_MOCK_ENABLE" in environ:
return None
one_is_find = False
force_command = rougailconfig["bitwarden.command"]
if force_command:
commands = [force_command]
else:
commands = ["rbw", "bw"]
for command in commands:
status = self.test_command(command)
if status is False:
one_is_find = True
elif status:
return command
if not force_command:
command_string = _('"rbw" or "bw"')
else:
command_string = _('"{0}"').format(force_command)
if one_is_find:
raise ExtensionError(
_("please unlock Bitwarden password database with {0}").format(
command_string
)
)
raise ExtensionError(
_("cannot find Bitwarden command {0} please install it").format(
command_string
)
)
def test_command(self, command):
if not which(command):
return None
if command == "rbw":
cmd = ["rbw", "unlocked"]
else:
cmd = ["bw", "status"]
try:
cpe = run(cmd, capture_output=True)
except Exception as exc:
return False
if cpe.returncode != 0:
return False
if command == "rbw":
return True
try:
data = loads(cpe.stdout.decode("utf8"))
if data["status"] == "unlocked":
return True
except:
pass
return False
def run(self):
values = {}
self.set_passwords(self.config.forcepermissive, values)
return [
{
"source": 'Bitwarden',
"errors": self.errors,
"warnings": self.warnings,
"values": values,
"options": {
"secret_manager": True,
}
}
]
def set_passwords(self, optiondescription, values):
for option in optiondescription.list(uncalculated=True):
if option.isoptiondescription():
self.set_passwords(option, values)
elif option.information.get("bitwarden", False):
values[option.path(uncalculated=True)] = (set_password, self.leader_informations, self.bitwarden_command_line)
def set_password(leader_informations, bitwarden_command_line, *, option, warnings, errors):
path = option.path()
leader_key = None
if option.isfollower():
leader_path = option.parent().leader().path()
if leader_path in leader_informations:
leader_key = leader_informations[leader_path][option.index()]
if not option.isleader():
return get_values(bitwarden_command_line, option, warnings, errors, leader_key=leader_key)
leader_informations[path], option_values = get_values(
bitwarden_command_line, option, warnings, errors, multiple=True, leader_key=option.value.default()[0]
)
return option_values
def get_values(bitwarden_command_line, option, warnings, errors, *, multiple=False, leader_key=None):
if leader_key:
key = leader_key
else:
key = option.value.default()
path = option.path()
type_ = option.information.get("type")
# FIXME retrait du permissive suffit ?
if "validator" not in option.property.get():
option.property.add("validator")
if not isinstance(key, str):
errors.append(
_('the default value for "{0}" must be the Bitwarden item name').format(
path
)
)
if multiple:
return [], []
return None
if "ROUGAIL_BITWARDEN_MOCK_ENABLE" in environ:
if type_ == "secret":
value = "Ex4mpL3_P4ssw0rD"
else:
value = "example_login"
if multiple:
return [key], [value]
return value
try:
if bitwarden_command_line == "rbw":
data = get_key_from_rbw(key, multiple)
else:
data = get_key_from_bw(key)
except Exception as exc:
errors.append(
_(
'cannot execute the "{0}" commandline from Bitwarden for "{1}": {2}'
).format(bitwarden_command_line, path, exc)
)
if multiple:
return [], []
return None
if not data:
errors.append(
_('item "{0}" in Bitwarden is not found for "{1}"').format(
key, path
)
)
if multiple:
return [], []
return None
if len(data) != 1:
names = [d["name"] for d in data]
if multiple:
ret = []
return names, [
get_value(key, path, type_, d, errors) for d in data
]
errors.append(
_(
'several items found with name "{0}" in Bitwarden for "{1}": "{2}"'
).format(key, path, '", "'.join(names))
)
return None
value = get_value(key, path, type_, data[0], errors)
if multiple:
return [data[0]["name"]], [value]
return value
def get_value( key_bitwarden: str, path: str, type_: str, data: dict, errors: dict) -> str:
try:
if type_ == "secret":
value = data["login"]["password"]
else:
value = data["login"]["username"]
except Exception as exc:
errors.append(
_('unexpected datas "{0}" from Bitwarden for "{1}": {2}').format(
key_bitwarden, path, exc
)
)
value = None
else:
if value is None:
if type_ == "secret":
bw_type = _("password")
else:
bw_type = _("username")
errors.append(
_('item "{0}" in Bitwarden has no {1} for "{2}"').format(
key_bitwarden, bw_type, path
)
)
return value
def get_key_from_rbw(
key_bitwarden: str, multiple: bool
):
keys = []
items = run_commandline(["rbw", "search", key_bitwarden]).strip()
if items:
items = items.split("\n")
else:
items = []
for item in items:
# if item.count('@') != 1:
# continue
if "@" in item:
keys.append(item.split("@", 1)[-1])
else:
keys.append(item.rsplit("/", 1)[-1])
if not multiple:
if not items:
return []
if len(items) > 1:
return [{"name": key} for key in keys]
keys = [key_bitwarden]
datas = []
for key in keys:
data = loads(
run_commandline(
["rbw", "get", key, "--raw", "--ignorecase"]
).strip()
)
datas.append({"name": key, "login": data["data"]})
return datas
def get_key_from_bw(
key_bitwarden: str,
):
return loads(
run_commandline(
["bw", "list", "items", "--search", key_bitwarden, "--nointeraction"]
)
)
def run_commandline(cmd) -> str:
cpe = run(cmd, capture_output=True)
err = cpe.stderr.decode("utf8")
if cpe.returncode != 0 or err:
raise ExtensionError("{0} ({1})".format(err, cpe.returncode))
return cpe.stdout.decode("utf8")

View file

@ -0,0 +1,26 @@
"""
Silique (https://www.silique.fr)
Copyright (C) 2025
This program is free software: you can redistribute it and/or modify it
under the terms of the GNU Lesser General Public License as published by the
Free Software Foundation, either version 3 of the License, or (at your
option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
details.
You should have received a copy of the GNU Lesser General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
"""
from gettext import translation
from pathlib import Path
t = translation(
"rougail_user_data_bitwarden", str(Path(__file__).parent / "locale"), fallback=True
)
_ = t.gettext

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "bitwarden_password"
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"item \"1_secret_unknown - environment - service - user\" in Bitwarden is not found for \"rougail.secret\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": null
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "bitwarden_username",
"rougail.secret": "bitwarden_password"
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "example_login",
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "up_secret_error_1",
"rougail.secret": "up_secret_error_pass_1"
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "example_login",
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "bitwarden_username",
"rougail.secret": "bitwarden_password"
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": "example_login",
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,12 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "bitwarden_username",
"rougail.leader.secret": "bitwarden_password"
},
{
"rougail.leader.username": "bitwarden_username_2",
"rougail.leader.secret": "bitwarden_password_2"
}
]
}

View file

@ -0,0 +1,8 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "example_login",
"rougail.leader.secret": "Ex4mpL3_P4ssw0rD"
}
]
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,12 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "bitwarden_username",
"rougail.leader.secret": "bitwarden_password"
},
{
"rougail.leader.username": "bitwarden_username_2",
"rougail.leader.secret": "bitwarden_password_2"
}
]
}

View file

@ -0,0 +1,12 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "bitwarden_username_2",
"rougail.leader.secret": "bitwarden_password_2"
},
{
"rougail.leader.username": "bitwarden_username",
"rougail.leader.secret": "bitwarden_password"
}
]
}

View file

@ -0,0 +1,8 @@
{
"rougail.leader.username": [
{
"rougail.leader.username": "example_login",
"rougail.leader.secret": "Ex4mpL3_P4ssw0rD"
}
]
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"several items found with name \"4_several_secrets - environment - service - user\" in Bitwarden for \"rougail.secret\": \"4_several_secrets - environment - service - user_1\", \"4_several_secrets - environment - service - user_2\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": null
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"several items found with name \"3_leadership_secret - ENVIRONMENT - SERVICE - USER\" in Bitwarden for \"rougail.secret\": \"3_leadership_secret - environment - service - user_1\", \"3_leadership_secret - environment - service - user_2\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": null
}

View file

@ -0,0 +1,3 @@
{
"rougail.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"errors": [],
"warnings": []
}

View file

@ -0,0 +1,10 @@
{
"rougail.host": "test",
"rougail.project": "5_secret_calc",
"rougail.environment": "environment",
"rougail.service": "service",
"rougail.user": "user_1",
"rougail.secret": "bitwarden_password",
"rougail.dyn_user_1.secret": "bitwarden_password",
"rougail.dyn_user_2.secret": "bitwarden_password_2"
}

View file

@ -0,0 +1,10 @@
{
"rougail.host": "test",
"rougail.project": "5_secret_calc",
"rougail.environment": "environment",
"rougail.service": "service",
"rougail.user": "user_1",
"rougail.secret": "Ex4mpL3_P4ssw0rD",
"rougail.dyn_user_1.secret": "Ex4mpL3_P4ssw0rD",
"rougail.dyn_user_2.secret": "Ex4mpL3_P4ssw0rD"
}

View file

@ -0,0 +1,6 @@
{
"errors": [],
"warnings": [
"variable or family \"rougail.modified_variable_single\" does not exist, it will be ignored when loading from By Hand"
]
}

View file

@ -0,0 +1,12 @@
{
"rougail.host": "test",
"rougail.project": "5_secret_calc",
"rougail.environment": "environment",
"rougail.service": "service",
"rougail.modified_variable": [
"user_1",
"user_2"
],
"rougail.dyn_user_1.secret": "bitwarden_password",
"rougail.dyn_user_2.secret": "bitwarden_password_2"
}

View file

@ -0,0 +1,6 @@
{
"errors": [],
"warnings": [
"variable or family \"rougail.modified_variable\" does not exist, it will be ignored when loading from By Hand"
]
}

View file

@ -0,0 +1,8 @@
{
"rougail.host": "test",
"rougail.project": "5_secret_calc",
"rougail.environment": "environment",
"rougail.service": "service",
"rougail.modified_variable_single": "user_2",
"rougail.secret": "bitwarden_password_2"
}

View file

@ -0,0 +1,6 @@
{
"errors": [],
"warnings": [
"variable or family \"rougail.modified_variable\" does not exist, it will be ignored when loading from By Hand"
]
}

View file

@ -0,0 +1,4 @@
{
"rougail.modified_variable_single": "user_2",
"rougail.secret": "bitwarden_password_2"
}

View file

@ -0,0 +1,6 @@
{
"errors": [
"item \"6_no_username - environment - service - user_1\" in Bitwarden has no username for \"rougail.username\""
],
"warnings": []
}

View file

@ -0,0 +1,4 @@
{
"rougail.username": null,
"rougail.secret": "ET6RrpdZv5bNZu"
}

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 1_secret
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 1_secret_unknown
environment: environment
service: service
user: user

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 2_username_secret
environment: environment
service: service
user: user_1
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 2_username_secret
environment: environment
service: service
user: user_1

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 2_username_secret_invalid
environment: environment
service: service
user: UP SECRET 1
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 2_username_secret_invalid
environment: environment
service: service
user: UP SECRET 1

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: TEST
project: 2_USERNAME_SECRET_UPPER
environment: ENVIRONMENT
service: SERVICE
user: USER_1
secret:
description: the secret
type: secret
secret_manager:
host: TEST
project: 2_USERNAME_SECRET_UPPER
environment: ENVIRONMENT
service: SERVICE
user: USER_1

View file

@ -0,0 +1,25 @@
---
version: 1.1
leader:
type: leadership
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 3_leadership_secret
environment: environment
service: service
user: user
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 3_leadership_secret
environment: environment
service: service
user: user

View file

@ -0,0 +1,25 @@
---
version: 1.1
leader:
type: leadership
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 3_leadership_secret_several
environment: environment
service: service
user: user
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 3_leadership_secret_several
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 4_several_secrets
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the second variable
type: secret
secret_manager:
host: test
project: 3_leadership_secret
environment: ENVIRONMENT
service: SERVICE
user: USER

View file

@ -0,0 +1,57 @@
---
version: 1.1
host:
description: hostname
default: test
project:
description: the project
default: 5_secret_calc
environment:
description: the environment
default: environment
service:
description: the service
default: service
user:
description: the user
default: user_1
secret:
description: the secret
type: secret
secret_manager:
host:
variable: _.host
project:
variable: _.project
environment:
variable: _.environment
service:
variable: _.service
user:
variable: _.user
dyn_{{ identifier }}:
dynamic:
- user_1
- user_2
secret:
description: the second secret
type: secret
secret_manager:
host:
variable: __.host
project:
variable: __.project
environment:
variable: __.environment
service:
variable: __.service
user:
type: identifier

View file

@ -0,0 +1,39 @@
---
version: 1.1
host:
description: hostname
default: test
project:
description: the project
default: 5_secret_calc
environment:
description: the environment
default: environment
service:
description: the service
default: service
modified_variable: [] # a variable modified
dyn_{{ identifier }}:
dynamic:
variable: _.modified_variable
secret:
description: the second secret
type: secret
secret_manager:
host:
variable: __.host
project:
variable: __.project
environment:
variable: __.environment
service:
variable: __.service
user:
type: identifier

View file

@ -0,0 +1,35 @@
---
version: 1.1
host:
description: hostname
default: test
project:
description: the project
default: 5_secret_calc
environment:
description: the environment
default: environment
service:
description: the service
default: service
modified_variable_single: # a variable modified
secret:
description: the second secret
type: secret
secret_manager:
host:
variable: _.host
project:
variable: _.project
environment:
variable: _.environment
service:
variable: _.service
user:
variable: _.modified_variable_single

View file

@ -0,0 +1,41 @@
%YAML 1.2
---
version: 1.1
host:
description: hostname
default: test
hidden: true
project:
description: the project
default: 5_secret_calc
hidden: true
environment:
description: the environment
default: environment
hidden: true
service:
description: the service
default: service
hidden: true
modified_variable_single: # a variable modified
secret:
description: the second secret
type: secret
secret_manager:
host:
variable: _.host
project:
variable: _.project
environment:
variable: _.environment
service:
variable: _.service
user:
variable: _.modified_variable_single
...

View file

@ -0,0 +1,22 @@
---
version: 1.1
username:
description: the username
type: unix_user
secret_manager:
host: test
project: 6_no_username
environment: environment
service: service
user: user_1
secret:
description: the secret
type: secret
secret_manager:
host: test
project: 6_no_username
environment: environment
service: service
user: user_1

View file

@ -0,0 +1,13 @@
---
version: 1.1
secret:
description: the secret variable
type: secret
multi: true
secret_manager:
host: test
project: 8_multi_variable
environment: environment
service: service
user: user

View file

@ -0,0 +1,12 @@
---
version: 1.1
secret:
description: the first variable
type: string
secret_manager:
host: test
project: 9_unknown_type
environment: environment
service: service
user: user

364
tests/test_load.py Normal file
View file

@ -0,0 +1,364 @@
import os
from pathlib import Path
from rougail import Rougail, RougailConfig
from rougail.error import DictConsistencyError
#########################
from rougail.user_data_bitwarden import RougailUserDataBitwarden as RougailUserData
from json import load, dump
#########################
from pytest import raises
from unittest import mock
from rougail_tests.utils import config_to_dict
test_dir = Path(__file__).parent / 'structures'
def _test_structural_files(test_dir, command, *, env=False, modified=False):
rougailconfig = RougailConfig.copy()
rougailconfig['main_structural_directories'] = [str(test_dir)]
# rougailconfig['tiramisu_cache'] = "cache.py"
rougailconfig['step.user_data'] = ['bitwarden']
rougailconfig['bitwarden.command'] = command
rougail = Rougail(rougailconfig)
config = rougail.run()
config.property.read_write()
# loads variables in the tiramisu config
generated_user_data = RougailUserData(config, rougailconfig=rougailconfig).run()
if modified:
generated_user_data.insert(0, {'source': 'By Hand', 'errors': [], 'warnings': [], 'values': {'rougail.modified_variable': ['user_1', 'user_2'], 'rougail.modified_variable_single': 'user_2'}})
errors = rougail.user_datas(generated_user_data)
#expected output
config_dict = dict(config_to_dict(config.value.get()))
if not env:
base_filename = 'bitwarden.json'
else:
base_filename = 'bitwarden_env.json'
ok_file = Path('tests') / 'results' / test_dir.name / 'makedict' / (base_filename + '.' + command)
if not ok_file.is_file():
ok_file = Path('tests') / 'results' / test_dir.name / 'makedict' / base_filename
if not ok_file.is_file():
ok_file.parent.mkdir(parents=True, exist_ok=True)
with open(ok_file, 'a') as json_file:
dump(config_dict, json_file, indent=4)
with open(ok_file) as json_file:
expected = load(json_file)
errors_file = Path('tests') / 'results' / test_dir.name / 'errors' / (base_filename + '.' + command)
if not errors_file.is_file():
errors_file = Path('tests') / 'results' / test_dir.name / 'errors' / base_filename
if not errors_file.is_file():
errors_file.parent.mkdir(parents=True, exist_ok=True)
with open(errors_file, 'a') as json_file:
dump(errors, json_file, indent=4)
with open(errors_file) as json_file:
expected_errors = load(json_file)
assert expected_errors == errors, errors_file
#
assert expected == config_dict, ok_file
def test_structural_files_1_secret_rbw():
"tests the output"
_test_structural_files(test_dir / '1_secret', 'rbw')
def test_structural_files_1_secret_bw():
"tests the output"
_test_structural_files(test_dir / '1_secret', 'bw')
def test_structural_files_1_secret_unknown_rbw():
"tests the output"
_test_structural_files(test_dir / '1_secret_unknown', 'rbw')
def test_structural_files_1_secret_unknown_bw():
"tests the output"
_test_structural_files(test_dir / '1_secret_unknown', 'bw')
def test_structural_files_2_username_secret_rbw():
"tests the output"
_test_structural_files(test_dir / '2_username_secret', 'rbw')
def test_structural_files_2_username_secret_bw():
"tests the output"
_test_structural_files(test_dir / '2_username_secret', 'bw')
def test_structural_files_2_username_secret_upper_rbw():
"tests the output"
_test_structural_files(test_dir / '2_username_secret_upper', 'rbw')
def test_structural_files_2_username_secret_upper_bw():
"tests the output"
_test_structural_files(test_dir / '2_username_secret_upper', 'bw')
def test_structural_files_2_username_secret_invalid_rbw():
"tests the output"
_test_structural_files(test_dir / '2_username_secret_invalid', 'rbw')
def test_structural_files_2_username_secret_invalid_bw():
"tests the output"
_test_structural_files(test_dir / '2_username_secret_invalid', 'bw')
def test_structural_files_3_leadership_secret_rbw():
"tests the output"
_test_structural_files(test_dir / '3_leadership_secret', 'rbw')
def test_structural_files_3_leadership_secret_bw():
"tests the output"
_test_structural_files(test_dir / '3_leadership_secret', 'bw')
def test_structural_files_3_leadership_secret_several_rbw():
"tests the output"
_test_structural_files(test_dir / '3_leadership_secret_several', 'rbw')
def test_structural_files_3_leadership_secret_several_bw():
"tests the output"
_test_structural_files(test_dir / '3_leadership_secret_several', 'bw')
def test_structural_files_4_several_secrets_rbw():
"tests the output"
_test_structural_files(test_dir / '4_several_secrets', 'rbw')
def test_structural_files_4_several_secrets_bw():
"tests the output"
_test_structural_files(test_dir / '4_several_secrets', 'bw')
def test_structural_files_4_several_secrets_upper_rbw():
"tests the output"
_test_structural_files(test_dir / '4_several_secrets_upper', 'rbw')
def test_structural_files_4_several_secrets_upper_bw():
"tests the output"
_test_structural_files(test_dir / '4_several_secrets_upper', 'bw')
def test_structural_files_5_secret_calc_rbw():
"tests the output"
_test_structural_files(test_dir / '5_secret_calc', 'rbw')
def test_structural_files_5_secret_calc_bw():
"tests the output"
_test_structural_files(test_dir / '5_secret_calc', 'bw')
def test_structural_files_5_secret_calc_other_user_data_rbw():
"tests the output"
_test_structural_files(test_dir / '5_secret_calc_other_user_data', 'rbw', modified=True)
def test_structural_files_5_secret_calc_other_user_data2_rbw():
"tests the output"
_test_structural_files(test_dir / '5_secret_calc_other_user_data2', 'rbw', modified=True)
def test_structural_files_5_secret_calc_other_user_data3_rbw():
"tests the output"
_test_structural_files(test_dir / '5_secret_calc_other_user_data3', 'rbw', modified=True)
def test_structural_files_6_no_username_rbw():
"tests the output"
_test_structural_files(test_dir / '6_no_username', 'rbw')
def test_structural_files_6_no_username_bw():
"tests the output"
_test_structural_files(test_dir / '6_no_username', 'bw')
def test_structural_files_8_multi_variable_rbw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '8_multi_variable', 'rbw')
assert err.value.errno == 57
def test_structural_files_8_multi_variable_bw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '8_multi_variable', 'bw')
assert err.value.errno == 57
def test_structural_files_9_unknown_type_rbw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '9_unknown_type', 'rbw')
assert err.value.errno == 56
def test_structural_files_9_unknown_type_bw():
"tests the output"
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '9_unknown_type', 'bw')
assert err.value.errno == 56
def test_structural_files_env_1_secret_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '1_secret', 'rbw', env=True)
def test_structural_files_env_1_secret_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '1_secret', 'bw', env=True)
def test_structural_files_env_1_secret_unknown_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '1_secret_unknown', 'rbw', env=True)
def test_structural_files_env_1_secret_unknown_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '1_secret_unknown', 'bw', env=True)
def test_structural_files_env_2_username_secret_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '2_username_secret', 'rbw', env=True)
def test_structural_files_env_2_username_secret_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '2_username_secret', 'bw', env=True)
def test_structural_files_env_2_username_secret_upper_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '2_username_secret_upper', 'rbw', env=True)
def test_structural_files_env_2_username_secret_upper_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '2_username_secret_upper', 'bw', env=True)
def test_structural_files_env_2_username_secret_invalid_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '2_username_secret_invalid', 'rbw', env=True)
def test_structural_files_env_2_username_secret_invalid_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '2_username_secret_invalid', 'bw', env=True)
def test_structural_files_env_3_leadership_secret_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '3_leadership_secret', 'rbw', env=True)
def test_structural_files_env_3_leadership_secret_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '3_leadership_secret', 'bw', env=True)
def test_structural_files_env_3_leadership_secret_several_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '3_leadership_secret_several', 'rbw', env=True)
def test_structural_files_env_3_leadership_secret_several_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '3_leadership_secret_several', 'bw', env=True)
def test_structural_files_env_4_several_secrets_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '4_several_secrets', 'rbw', env=True)
def test_structural_files_env_4_several_secrets_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '4_several_secrets', 'bw', env=True)
def test_structural_files_env_4_several_secrets_upper_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '4_several_secrets_upper', 'rbw', env=True)
def test_structural_files_env_4_several_secrets_upper_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '4_several_secrets_upper', 'bw', env=True)
def test_structural_files_env_5_secret_calc_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '5_secret_calc', 'rbw', env=True)
def test_structural_files_env_5_secret_calc_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
_test_structural_files(test_dir / '5_secret_calc', 'bw', env=True)
def test_structural_files_env_8_multi_variable_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '8_multi_variable', 'rbw', env=True)
assert err.value.errno == 57
def test_structural_files_env_8_multi_variable_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '8_multi_variable', 'bw', env=True)
assert err.value.errno == 57
def test_structural_files_env_9_unknown_type_rbw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '9_unknown_type', 'rbw', env=True)
assert err.value.errno == 56
def test_structural_files_env_9_unknown_type_bw():
"tests the output"
with mock.patch.dict(os.environ, {'ROUGAIL_BITWARDEN_MOCK_ENABLE': '1'}):
with raises(DictConsistencyError) as err:
_test_structural_files(test_dir / '9_unknown_type', 'bw', env=True)
assert err.value.errno == 56