diff --git a/.travis.yml b/.travis.yml index a7ac3d5..2a237c4 100644 --- a/.travis.yml +++ b/.travis.yml @@ -14,9 +14,9 @@ addons: env: - PATH=$PATH:. before_script: - - wget https://releases.hashicorp.com/vault/0.8.2/vault_0.8.2_linux_amd64.zip - - unzip vault_0.8.2_linux_amd64.zip - - rm vault_0.8.2_linux_amd64.zip + - wget https://releases.hashicorp.com/vault/0.8.3/vault_0.8.3_linux_amd64.zip + - unzip vault_0.8.3_linux_amd64.zip + - rm vault_0.8.3_linux_amd64.zip cache: directories: - '$HOME/.m2/repository' diff --git a/CHANGELOG.md b/CHANGELOG.md index 4dd5300..21e7af1 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,7 @@ * [feature] Retrieval of health status via `getHealth()` (#15) * [improvement] `seal()`, `unseal()` are now `void` and throw Exception on error (#12) * [deletion] Removed deprecated `listAppRoleSecretss()` (use `listAppRoleSecrets()`) (#14) +* [test] Tested against Vault 0.8.3 ## 0.6.2 [2017-08-19] * [fix] Prevent potential NPE on SecretResponse getter diff --git a/README.md b/README.md index 6902b3f..a35c391 100644 --- a/README.md +++ b/README.md @@ -31,7 +31,7 @@ Java Vault Connector is a connector library for [Vault](https://www.vaultproject * Raw secret content or JSON decoding * SQL secret handling * Connector Factory with builder pattern -* Tested against Vault 0.8.1 +* Tested against Vault 0.8.3 ## Maven Artifact diff --git a/src/test/java/de/stklcode/jvault/connector/HTTPVaultConnectorTest.java b/src/test/java/de/stklcode/jvault/connector/HTTPVaultConnectorTest.java index 645a030..11b0f85 100644 --- a/src/test/java/de/stklcode/jvault/connector/HTTPVaultConnectorTest.java +++ b/src/test/java/de/stklcode/jvault/connector/HTTPVaultConnectorTest.java @@ -48,7 +48,7 @@ import static org.junit.Assume.*; * @since 0.1 */ public class HTTPVaultConnectorTest { - private static final String VAULT_VERISON = "0.8.2"; // the vault version this test is supposed to run against + private static final String VAULT_VERISON = "0.8.3"; // the vault version this test is supposed to run against private static final String KEY = "81011a8061e5c028bd0d9503eeba40bd9054b9af0408d080cb24f57405c27a61"; private static final String TOKEN_ROOT = "d1bd50e2-587b-6e68-d80b-a9a507625cb7"; private static final String USER_VALID = "validUser"; @@ -519,7 +519,8 @@ public class HTTPVaultConnectorTest { } try { AppRoleResponse res = connector.lookupAppRole(roleName); - assertThat("Role lookuo returned wrong policy count", res.getRole().getPolicies(), hasSize(2)); + // Note: As of Vault 0.8.3 default policy is not added automatically, so this test should return 1, not 2. + assertThat("Role lookuo returned wrong policy count (before Vault 0.8.3 is should be 2)", res.getRole().getPolicies(), hasSize(1)); assertThat("Role lookuo returned wrong policies", res.getRole().getPolicies(), hasItem("testpolicy")); } catch (VaultConnectorException e) { fail("Creation of role by name failed.");