Skip to content

Commit

Permalink
Merge pull request #1419 from jroyal/jroyal/audit-ssh-settings
Browse files Browse the repository at this point in the history
Add support for setting ssh encryption key in Zero Trust
  • Loading branch information
jacobbednarz committed Oct 11, 2023
2 parents 3e3863b + 99ac207 commit beb67e4
Show file tree
Hide file tree
Showing 3 changed files with 180 additions and 0 deletions.
3 changes: 3 additions & 0 deletions .changelog/1419.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:enhancement
teams: Add `audit_ssh_settings` endpoints
```
86 changes: 86 additions & 0 deletions teams_audit_ssh_settings.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,86 @@
package cloudflare

import (
"context"
"fmt"
"net/http"
"time"

"github.com/goccy/go-json"
)

// TeamsList represents a Teams List.
type AuditSSHSettings struct {
PublicKey string `json:"public_key"`
SeedUUID string `json:"seed_id"`
CreatedAt *time.Time `json:"created_at"`
UpdatedAt *time.Time `json:"updated_at"`
}

type AuditSSHSettingsResponse struct {
Result AuditSSHSettings `json:"result"`
Response
ResultInfo `json:"result_info"`
}

type GetAuditSSHSettingsParams struct{}

type UpdateAuditSSHSettingsParams struct {
PublicKey string `json:"public_key"`
}

// GetAuditSSHSettings returns the accounts zt audit ssh settings.
//
// API reference: https://api.cloudflare.com/#zero-trust-get-audit-ssh-settings
func (api *API) GetAuditSSHSettings(ctx context.Context, rc *ResourceContainer, params GetAuditSSHSettingsParams) (AuditSSHSettings, ResultInfo, error) {
if rc.Level != AccountRouteLevel {
return AuditSSHSettings{}, ResultInfo{}, fmt.Errorf(errInvalidResourceContainerAccess, rc.Level)
}

uri := fmt.Sprintf("/%s/%s/gateway/audit_ssh_settings", rc.Level, rc.Identifier)

res, err := api.makeRequestContext(ctx, http.MethodGet, uri, nil)
if err != nil {
return AuditSSHSettings{}, ResultInfo{}, err
}

var auditSSHSettingsResponse AuditSSHSettingsResponse
err = json.Unmarshal(res, &auditSSHSettingsResponse)
if err != nil {
return AuditSSHSettings{}, ResultInfo{}, fmt.Errorf("%s: %w", errUnmarshalError, err)
}

return auditSSHSettingsResponse.Result, auditSSHSettingsResponse.ResultInfo, nil
}

// UpdateAuditSSHSettings updates an existing zt audit ssh setting.
//
// API reference: https://api.cloudflare.com/#zero-trust-update-audit-ssh-settings
func (api *API) UpdateAuditSSHSettings(ctx context.Context, rc *ResourceContainer, params UpdateAuditSSHSettingsParams) (AuditSSHSettings, error) {
if rc.Level != AccountRouteLevel {
return AuditSSHSettings{}, fmt.Errorf(errInvalidResourceContainerAccess, rc.Level)
}

if rc.Identifier == "" {
return AuditSSHSettings{}, ErrMissingAccountID
}

uri := fmt.Sprintf(
"/%s/%s/gateway/audit_ssh_settings",
rc.Level,
rc.Identifier,
)

res, err := api.makeRequestContext(ctx, http.MethodPut, uri, params)
if err != nil {
return AuditSSHSettings{}, err
}

var auditSSHSettingsResponse AuditSSHSettingsResponse
err = json.Unmarshal(res, &auditSSHSettingsResponse)
if err != nil {
return AuditSSHSettings{}, fmt.Errorf("%s: %w", errUnmarshalError, err)
}

return auditSSHSettingsResponse.Result, nil
}
91 changes: 91 additions & 0 deletions teams_audit_ssh_settings_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,91 @@
package cloudflare

import (
"context"
"fmt"
"net/http"
"testing"
"time"

"github.com/stretchr/testify/assert"
)

func TestGetAuditSSHSettings(t *testing.T) {
setup()
defer teardown()

handler := func(w http.ResponseWriter, r *http.Request) {
assert.Equal(t, http.MethodGet, r.Method, "Expected method 'GET', got %s", r.Method)
w.Header().Set("content-type", "application/json")
fmt.Fprintf(w, `{
"success": true,
"errors": [],
"messages": [],
"result": {
"public_key": "1pyl6I1tL7xfJuFYVzXlUW8uXXlpxegHXBzGCBKaSFA=",
"seed_id": "f1f968a9-83e7-401a-8abc-e0efe128425c",
"created_at": "2014-01-01T05:20:00.12345Z",
"updated_at": "2014-01-01T05:20:00.12345Z"
}
}
`)
}

createdAt, _ := time.Parse(time.RFC3339, "2014-01-01T05:20:00.12345Z")
updatedAt, _ := time.Parse(time.RFC3339, "2014-01-01T05:20:00.12345Z")

want := AuditSSHSettings{
PublicKey: "1pyl6I1tL7xfJuFYVzXlUW8uXXlpxegHXBzGCBKaSFA=",
SeedUUID: "f1f968a9-83e7-401a-8abc-e0efe128425c",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
}

mux.HandleFunc("/accounts/"+testAccountID+"/gateway/audit_ssh_settings", handler)

actual, _, err := client.GetAuditSSHSettings(context.Background(), AccountIdentifier(testAccountID), GetAuditSSHSettingsParams{})

if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}

func TestUpdateAuditSSHSettings(t *testing.T) {
setup()
defer teardown()

handler := func(w http.ResponseWriter, r *http.Request) {
assert.Equal(t, http.MethodPut, r.Method, "Expected method 'PUT', got %s", r.Method)
w.Header().Set("content-type", "application/json")
fmt.Fprintf(w, `{
"success": true,
"errors": [],
"messages": [],
"result": {
"public_key": "updated1tL7xfJuFYVzXlUW8uXXlpxegHXBzGCBKaSFA=",
"seed_id": "f1f968a9-83e7-401a-8abc-e0efe128425c",
"created_at": "2014-01-01T05:20:00.12345Z",
"updated_at": "2014-01-01T05:20:00.12345Z"
}
}
`)
}

createdAt, _ := time.Parse(time.RFC3339, "2014-01-01T05:20:00.12345Z")
updatedAt, _ := time.Parse(time.RFC3339, "2014-01-01T05:20:00.12345Z")

want := AuditSSHSettings{
PublicKey: "updated1tL7xfJuFYVzXlUW8uXXlpxegHXBzGCBKaSFA=",
SeedUUID: "f1f968a9-83e7-401a-8abc-e0efe128425c",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
}

mux.HandleFunc("/accounts/"+testAccountID+"/gateway/audit_ssh_settings", handler)

actual, err := client.UpdateAuditSSHSettings(context.Background(), AccountIdentifier(testAccountID), UpdateAuditSSHSettingsParams{PublicKey: "updated1tL7xfJuFYVzXlUW8uXXlpxegHXBzGCBKaSFA="})

if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}

0 comments on commit beb67e4

Please sign in to comment.