|
|
|
|
@ -295,10 +295,11 @@ func CreateKvPasswordCredential(t testing.TB, secretPath string, user string, pr
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Escape '@' when prefixed to password. Vault CLI interprets '@' as a file
|
|
|
|
|
var passwordArg string
|
|
|
|
|
if strings.HasPrefix(password, "@") {
|
|
|
|
|
password = fmt.Sprintf("password=\\%s", password)
|
|
|
|
|
passwordArg = fmt.Sprintf("\\%s", password)
|
|
|
|
|
} else {
|
|
|
|
|
password = fmt.Sprintf("password=%s", password)
|
|
|
|
|
passwordArg = password
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Create secret
|
|
|
|
|
@ -308,7 +309,7 @@ func CreateKvPasswordCredential(t testing.TB, secretPath string, user string, pr
|
|
|
|
|
"-mount", secretPath,
|
|
|
|
|
secretName,
|
|
|
|
|
fmt.Sprintf("username=%s", user),
|
|
|
|
|
password,
|
|
|
|
|
fmt.Sprintf("password=%s", passwordArg),
|
|
|
|
|
),
|
|
|
|
|
)
|
|
|
|
|
require.NoError(t, output.Err, string(output.Stderr))
|
|
|
|
|
@ -346,10 +347,11 @@ func CreateKvPasswordDomainCredential(t testing.TB, secretPath string, user stri
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Escape '@' when prefixed to password. Vault CLI interprets '@' as a file
|
|
|
|
|
var passwordArg string
|
|
|
|
|
if strings.HasPrefix(password, "@") {
|
|
|
|
|
password = fmt.Sprintf("password=\\%s", password)
|
|
|
|
|
passwordArg = fmt.Sprintf("\\%s", password)
|
|
|
|
|
} else {
|
|
|
|
|
password = fmt.Sprintf("password=%s", password)
|
|
|
|
|
passwordArg = password
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Create secret
|
|
|
|
|
@ -359,7 +361,7 @@ func CreateKvPasswordDomainCredential(t testing.TB, secretPath string, user stri
|
|
|
|
|
"-mount", secretPath,
|
|
|
|
|
secretName,
|
|
|
|
|
fmt.Sprintf("username=%s", user),
|
|
|
|
|
password,
|
|
|
|
|
fmt.Sprintf("password=%s", passwordArg),
|
|
|
|
|
fmt.Sprintf("domain=%s", domain),
|
|
|
|
|
),
|
|
|
|
|
)
|
|
|
|
|
|