@@ -18,15 +18,16 @@ import (
1818var defaultAuthScopes = []string {"email" }
1919
2020type TestConfiguration struct {
21- platformEndpoint string
22- tokenEndpoint string
23- kasEndpoint string
24- npeClientId string
25- npeClientSecret string
26- peUsername string
27- pePassword string
28- testAttribute1 string
29- testAttribute2 string
21+ platformEndpoint string
22+ tokenEndpoint string
23+ kasEndpoint string
24+ npeClientId string
25+ npeClientSecret string
26+ peUsername string
27+ pePassword string
28+ testAttribute1 string
29+ testAttribute2 string
30+ insecureSkipVerify bool
3031}
3132
3233var config = TestConfiguration {
@@ -38,8 +39,9 @@ var config = TestConfiguration{
3839 peUsername : os .Getenv ("TEST_OPENTDF_SECRET_USER_ID" ),
3940 pePassword : os .Getenv ("TEST_OPENTDF_SECRET_USER_PASSWORD" ),
4041 // For default values, we added a helper function
41- testAttribute1 : getEnv ("TEST_OPENTDF_ATTRIBUTE_1" , "https://example.com/attr/attr1/value/value1" ),
42- testAttribute2 : getEnv ("TEST_OPENTDF_ATTRIBUTE_2" , "https://example.com/attr/attr1/value/value2" ),
42+ testAttribute1 : getEnv ("TEST_OPENTDF_ATTRIBUTE_1" , "https://example.com/attr/attr1/value/value1" ),
43+ testAttribute2 : getEnv ("TEST_OPENTDF_ATTRIBUTE_2" , "https://example.com/attr/attr1/value/value2" ),
44+ insecureSkipVerify : getEnv ("INSECURE_SKIP_VERIFY" , "FALSE" ) == "TRUE" ,
4345}
4446
4547/*
@@ -61,7 +63,7 @@ https://stackoverflow.com/q/24493116
6163*/
6264func authHelper (form url.Values , isPEAuth bool ) (TokenAuth , error ) {
6365 tr := & http.Transport {
64- TLSClientConfig : & tls.Config {InsecureSkipVerify : true },
66+ TLSClientConfig : & tls.Config {InsecureSkipVerify : config . insecureSkipVerify },
6567 }
6668 // FIXME: Use a client with TLS verification
6769 // client := http.Client{}
@@ -133,11 +135,12 @@ func getMultiDataAttribute(config TestConfiguration) []string {
133135func doEncryptString (t * testing.T , dataAttributes []string ) {
134136
135137 got , err := EncryptString ("Hello, world" , OpentdfConfig {
136- ClientId : config .npeClientId ,
137- ClientSecret : config .npeClientSecret ,
138- PlatformEndpoint : config .platformEndpoint ,
139- TokenEndpoint : config .tokenEndpoint ,
140- KasUrl : config .kasEndpoint ,
138+ ClientId : config .npeClientId ,
139+ ClientSecret : config .npeClientSecret ,
140+ PlatformEndpoint : config .platformEndpoint ,
141+ TokenEndpoint : config .tokenEndpoint ,
142+ KasUrl : config .kasEndpoint ,
143+ InsecureSkipVerify : config .insecureSkipVerify ,
141144 }, dataAttributes , defaultAuthScopes )
142145 if err != nil {
143146 t .Fatal (err )
@@ -198,11 +201,12 @@ func encrypt_file_NPE(t *testing.T, dataAttributes []string) string {
198201 defer tmpOutputFile .Close ()
199202
200203 got , err := EncryptFile (tmpInputFile .Name (), tmpOutputFile .Name (), OpentdfConfig {
201- ClientId : config .npeClientId ,
202- ClientSecret : config .npeClientSecret ,
203- PlatformEndpoint : config .platformEndpoint ,
204- TokenEndpoint : config .tokenEndpoint ,
205- KasUrl : config .kasEndpoint ,
204+ ClientId : config .npeClientId ,
205+ ClientSecret : config .npeClientSecret ,
206+ PlatformEndpoint : config .platformEndpoint ,
207+ TokenEndpoint : config .tokenEndpoint ,
208+ KasUrl : config .kasEndpoint ,
209+ InsecureSkipVerify : config .insecureSkipVerify ,
206210 }, dataAttributes , defaultAuthScopes )
207211 if err != nil {
208212 t .Error ("Failed to EncryptFile()!" )
@@ -244,11 +248,12 @@ func encrypt_file_PE(t *testing.T, dataAttributes []string, tokenAuth TokenAuth)
244248 defer tmpOutputFile .Close ()
245249
246250 got , err := EncryptFilePE (tmpInputFile .Name (), tmpOutputFile .Name (), OpentdfConfig {
247- ClientId : config .npeClientId ,
248- ClientSecret : config .npeClientSecret ,
249- PlatformEndpoint : config .platformEndpoint ,
250- TokenEndpoint : config .tokenEndpoint ,
251- KasUrl : config .kasEndpoint ,
251+ ClientId : config .npeClientId ,
252+ ClientSecret : config .npeClientSecret ,
253+ PlatformEndpoint : config .platformEndpoint ,
254+ TokenEndpoint : config .tokenEndpoint ,
255+ KasUrl : config .kasEndpoint ,
256+ InsecureSkipVerify : config .insecureSkipVerify ,
252257 }, tokenAuth , dataAttributes , defaultAuthScopes )
253258 if err != nil {
254259 t .Fatal ("Failed to EncryptFilePE()!" )
@@ -301,11 +306,12 @@ func e2e_test_as_PE(t *testing.T, dataAttributes []string) {
301306 t .Error (err )
302307 }
303308 got , err := DecryptFilePE (input_TDF_path , plaintext_output_path .Name (), OpentdfConfig {
304- ClientId : config .npeClientId ,
305- ClientSecret : config .npeClientSecret ,
306- PlatformEndpoint : config .platformEndpoint ,
307- TokenEndpoint : config .tokenEndpoint ,
308- KasUrl : config .kasEndpoint ,
309+ ClientId : config .npeClientId ,
310+ ClientSecret : config .npeClientSecret ,
311+ PlatformEndpoint : config .platformEndpoint ,
312+ TokenEndpoint : config .tokenEndpoint ,
313+ KasUrl : config .kasEndpoint ,
314+ InsecureSkipVerify : config .insecureSkipVerify ,
309315 }, token_for_decrypt , defaultAuthScopes )
310316 if err != nil {
311317 t .Fatal (err )
@@ -376,11 +382,12 @@ func Test_Multifile_NPE_Encrypt_Files_In_Dir_Nil_Attributes(t *testing.T) {
376382 }
377383
378384 cfg := OpentdfConfig {
379- ClientId : config .npeClientId ,
380- ClientSecret : config .npeClientSecret ,
381- PlatformEndpoint : config .platformEndpoint ,
382- TokenEndpoint : config .tokenEndpoint ,
383- KasUrl : config .kasEndpoint ,
385+ ClientId : config .npeClientId ,
386+ ClientSecret : config .npeClientSecret ,
387+ PlatformEndpoint : config .platformEndpoint ,
388+ TokenEndpoint : config .tokenEndpoint ,
389+ KasUrl : config .kasEndpoint ,
390+ InsecureSkipVerify : config .insecureSkipVerify ,
384391 }
385392
386393 got , err := EncryptFilesWithExtensionsNPE (tmpDir , []string {".txt" , ".csv" }, cfg , nil , defaultAuthScopes )
@@ -409,11 +416,12 @@ func Test_Multifile_NPE_Encrypt_Files_With_Extensions_Nil_Attributes(t *testing.
409416
410417 // Call the EncryptFilesWithExtensionsNPE function
411418 got , err := EncryptFilesWithExtensionsNPE (tmpDir , []string {".txt" , ".csv" , ".pdf" }, OpentdfConfig {
412- ClientId : config .npeClientId ,
413- ClientSecret : config .npeClientSecret ,
414- PlatformEndpoint : config .platformEndpoint ,
415- TokenEndpoint : config .tokenEndpoint ,
416- KasUrl : config .kasEndpoint ,
419+ ClientId : config .npeClientId ,
420+ ClientSecret : config .npeClientSecret ,
421+ PlatformEndpoint : config .platformEndpoint ,
422+ TokenEndpoint : config .tokenEndpoint ,
423+ KasUrl : config .kasEndpoint ,
424+ InsecureSkipVerify : config .insecureSkipVerify ,
417425 }, nil , defaultAuthScopes )
418426 if err != nil {
419427 t .Fatal ("Failed to EncryptFilesWithExtensionsNPE()!" , err )
@@ -440,23 +448,25 @@ func Test_Multifile_NPE_Decrypt_Files_In_Dir_Nil_Attributes(t *testing.T) {
440448
441449 // Encrypt the file
442450 _ , err = EncryptFilesInDirNPE (tmpDir , OpentdfConfig {
443- ClientId : config .npeClientId ,
444- ClientSecret : config .npeClientSecret ,
445- PlatformEndpoint : config .platformEndpoint ,
446- TokenEndpoint : config .tokenEndpoint ,
447- KasUrl : config .kasEndpoint ,
451+ ClientId : config .npeClientId ,
452+ ClientSecret : config .npeClientSecret ,
453+ PlatformEndpoint : config .platformEndpoint ,
454+ TokenEndpoint : config .tokenEndpoint ,
455+ KasUrl : config .kasEndpoint ,
456+ InsecureSkipVerify : config .insecureSkipVerify ,
448457 }, nil , defaultAuthScopes )
449458 if err != nil {
450459 t .Fatal ("Failed to EncryptFilesInDirNPE()!" , err )
451460 }
452461
453462 // Call the DecryptFilesInDirNPE function
454463 got , err := DecryptFilesInDirNPE (tmpDir , OpentdfConfig {
455- ClientId : config .npeClientId ,
456- ClientSecret : config .npeClientSecret ,
457- PlatformEndpoint : config .platformEndpoint ,
458- TokenEndpoint : config .tokenEndpoint ,
459- KasUrl : config .kasEndpoint ,
464+ ClientId : config .npeClientId ,
465+ ClientSecret : config .npeClientSecret ,
466+ PlatformEndpoint : config .platformEndpoint ,
467+ TokenEndpoint : config .tokenEndpoint ,
468+ KasUrl : config .kasEndpoint ,
469+ InsecureSkipVerify : config .insecureSkipVerify ,
460470 }, defaultAuthScopes )
461471 if err != nil {
462472 t .Fatal ("Failed to DecryptFilesInDirNPE()!" , err )
@@ -482,23 +492,25 @@ func Test_Multifile_NPE_Decrypt_Files_With_Extensions_Nil_Attributes(t *testing.
482492
483493 // Encrypt the files
484494 _ , err = EncryptFilesWithExtensionsNPE (tmpDir , []string {".txt" , ".csv" , ".pdf" }, OpentdfConfig {
485- ClientId : config .npeClientId ,
486- ClientSecret : config .npeClientSecret ,
487- PlatformEndpoint : config .platformEndpoint ,
488- TokenEndpoint : config .tokenEndpoint ,
489- KasUrl : config .kasEndpoint ,
495+ ClientId : config .npeClientId ,
496+ ClientSecret : config .npeClientSecret ,
497+ PlatformEndpoint : config .platformEndpoint ,
498+ TokenEndpoint : config .tokenEndpoint ,
499+ KasUrl : config .kasEndpoint ,
500+ InsecureSkipVerify : config .insecureSkipVerify ,
490501 }, nil , defaultAuthScopes )
491502 if err != nil {
492503 t .Fatal ("Failed to EncryptFilesWithExtensionsNPE()!" , err )
493504 }
494505
495506 // Call the DecryptFilesWithExtensionsNPE function
496507 got , err := DecryptFilesWithExtensionsNPE (tmpDir , []string {".tdf" }, OpentdfConfig {
497- ClientId : config .npeClientId ,
498- ClientSecret : config .npeClientSecret ,
499- PlatformEndpoint : config .platformEndpoint ,
500- TokenEndpoint : config .tokenEndpoint ,
501- KasUrl : config .kasEndpoint ,
508+ ClientId : config .npeClientId ,
509+ ClientSecret : config .npeClientSecret ,
510+ PlatformEndpoint : config .platformEndpoint ,
511+ TokenEndpoint : config .tokenEndpoint ,
512+ KasUrl : config .kasEndpoint ,
513+ InsecureSkipVerify : config .insecureSkipVerify ,
502514 }, defaultAuthScopes )
503515 if err != nil {
504516 t .Fatal ("Failed to DecryptFilesWithExtensionsNPE()!" , err )
0 commit comments