in proxy_agent/src/key_keeper/key.rs [843:902]
fn key_status_v1_test() {
let status_response_v1 = r#"{
"authorizationScheme": "Azure-HMAC-SHA256",
"keyDeliveryMethod": "http",
"keyGuid": null,
"requiredClaimsHeaderPairs": null,
"secureChannelState": "Wireserver",
"version": "1.0"
}"#;
let status_v1: KeyStatus = serde_json::from_str(status_response_v1).unwrap();
assert_eq!(
constants::AUTHORIZATION_SCHEME,
status_v1.authorizationScheme,
"authorizationScheme mismatch"
);
assert_eq!(
"http", status_v1.keyDeliveryMethod,
"keyDeliveryMethod mismatch"
);
assert_eq!(None, status_v1.keyGuid, "keyGuid must be None");
assert_eq!(
None, status_v1.requiredClaimsHeaderPairs,
"requiredClaimsHeaderPairs must be None"
);
assert_eq!(
Some("Wireserver".to_string()),
status_v1.secureChannelState,
"secureChannelState mismatch"
);
assert!(
status_v1.keyIncarnationId.is_none(),
"keyIncarnationId must be None"
);
assert_eq!("1.0".to_string(), status_v1.version, "version 1.0 mismatch");
assert!(
status_v1.validate().unwrap(),
"Key status validation must be true"
);
assert!(
status_v1.secureChannelEnabled.is_none(),
"secureChannelEnabled must be None in version 1.0"
);
assert_eq!(
"",
status_v1.get_imds_rule_id(),
"IMDS rule id must be empty"
);
assert_eq!(
"",
status_v1.get_wireserver_rule_id(),
"WireServer rule id must be empty"
);
assert_eq!(
status_v1.get_wire_server_mode(),
"enforce",
"WireServer mode mismatch"
);
assert_eq!(status_v1.get_imds_mode(), "audit", "IMDS mode mismatch");
}