mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 02:28:09 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			238 lines
		
	
	
		
			6.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			238 lines
		
	
	
		
			6.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package http
 | |
| 
 | |
| import (
 | |
| 	"encoding/hex"
 | |
| 	"encoding/json"
 | |
| 	"net/http"
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/vault"
 | |
| )
 | |
| 
 | |
| // Test to check if the API errors out when wrong number of PGP keys are
 | |
| // supplied for rekey
 | |
| func TestSysRekeyInit_pgpKeysEntriesForRekey(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPut(t, token, addr+"/v1/sys/rekey/init", map[string]interface{}{
 | |
| 		"secret_shares":    5,
 | |
| 		"secret_threshold": 3,
 | |
| 		"pgp_keys":         []string{"pgpkey1"},
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 400)
 | |
| }
 | |
| 
 | |
| func TestSysRekeyInit_Status(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp, err := http.Get(addr + "/v1/sys/rekey/init")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"started":          false,
 | |
| 		"t":                json.Number("0"),
 | |
| 		"n":                json.Number("0"),
 | |
| 		"progress":         json.Number("0"),
 | |
| 		"required":         json.Number("1"),
 | |
| 		"pgp_fingerprints": interface{}(nil),
 | |
| 		"backup":           false,
 | |
| 		"nonce":            "",
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("\nexpected: %#v\nactual: %#v", expected, actual)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSysRekeyInit_Setup(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPut(t, token, addr+"/v1/sys/rekey/init", map[string]interface{}{
 | |
| 		"secret_shares":    5,
 | |
| 		"secret_threshold": 3,
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"started":          true,
 | |
| 		"t":                json.Number("3"),
 | |
| 		"n":                json.Number("5"),
 | |
| 		"progress":         json.Number("0"),
 | |
| 		"required":         json.Number("1"),
 | |
| 		"pgp_fingerprints": interface{}(nil),
 | |
| 		"backup":           false,
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	if actual["nonce"].(string) == "" {
 | |
| 		t.Fatalf("nonce was empty")
 | |
| 	}
 | |
| 	expected["nonce"] = actual["nonce"]
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("\nexpected: %#v\nactual: %#v", expected, actual)
 | |
| 	}
 | |
| 
 | |
| 	resp = testHttpGet(t, token, addr+"/v1/sys/rekey/init")
 | |
| 
 | |
| 	actual = map[string]interface{}{}
 | |
| 	expected = map[string]interface{}{
 | |
| 		"started":          true,
 | |
| 		"t":                json.Number("3"),
 | |
| 		"n":                json.Number("5"),
 | |
| 		"progress":         json.Number("0"),
 | |
| 		"required":         json.Number("1"),
 | |
| 		"pgp_fingerprints": interface{}(nil),
 | |
| 		"backup":           false,
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	if actual["nonce"].(string) == "" {
 | |
| 		t.Fatalf("nonce was empty")
 | |
| 	}
 | |
| 	if actual["nonce"].(string) == "" {
 | |
| 		t.Fatalf("nonce was empty")
 | |
| 	}
 | |
| 	expected["nonce"] = actual["nonce"]
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("\nexpected: %#v\nactual: %#v", expected, actual)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSysRekeyInit_Cancel(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPut(t, token, addr+"/v1/sys/rekey/init", map[string]interface{}{
 | |
| 		"secret_shares":    5,
 | |
| 		"secret_threshold": 3,
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 
 | |
| 	resp = testHttpDelete(t, token, addr+"/v1/sys/rekey/init")
 | |
| 	testResponseStatus(t, resp, 204)
 | |
| 
 | |
| 	resp, err := http.Get(addr + "/v1/sys/rekey/init")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"started":          false,
 | |
| 		"t":                json.Number("0"),
 | |
| 		"n":                json.Number("0"),
 | |
| 		"progress":         json.Number("0"),
 | |
| 		"required":         json.Number("1"),
 | |
| 		"pgp_fingerprints": interface{}(nil),
 | |
| 		"backup":           false,
 | |
| 		"nonce":            "",
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("\nexpected: %#v\nactual: %#v", expected, actual)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSysRekey_badKey(t *testing.T) {
 | |
| 	core, _, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPut(t, token, addr+"/v1/sys/rekey/update", map[string]interface{}{
 | |
| 		"key": "0123",
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 400)
 | |
| }
 | |
| 
 | |
| func TestSysRekey_Update(t *testing.T) {
 | |
| 	core, master, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPut(t, token, addr+"/v1/sys/rekey/init", map[string]interface{}{
 | |
| 		"secret_shares":    5,
 | |
| 		"secret_threshold": 3,
 | |
| 	})
 | |
| 	var rekeyStatus map[string]interface{}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &rekeyStatus)
 | |
| 
 | |
| 	resp = testHttpPut(t, token, addr+"/v1/sys/rekey/update", map[string]interface{}{
 | |
| 		"nonce": rekeyStatus["nonce"].(string),
 | |
| 		"key":   hex.EncodeToString(master),
 | |
| 	})
 | |
| 
 | |
| 	var actual map[string]interface{}
 | |
| 	expected := map[string]interface{}{
 | |
| 		"complete":         true,
 | |
| 		"nonce":            rekeyStatus["nonce"].(string),
 | |
| 		"backup":           false,
 | |
| 		"pgp_fingerprints": interface{}(nil),
 | |
| 	}
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 	testResponseBody(t, resp, &actual)
 | |
| 
 | |
| 	keys := actual["keys"].([]interface{})
 | |
| 	if len(keys) != 5 {
 | |
| 		t.Fatalf("bad: %#v", keys)
 | |
| 	}
 | |
| 	keysB64 := actual["keys_base64"].([]interface{})
 | |
| 	if len(keysB64) != 5 {
 | |
| 		t.Fatalf("bad: %#v", keysB64)
 | |
| 	}
 | |
| 
 | |
| 	delete(actual, "keys")
 | |
| 	delete(actual, "keys_base64")
 | |
| 	if !reflect.DeepEqual(actual, expected) {
 | |
| 		t.Fatalf("\nexpected: %#v\nactual: %#v", expected, actual)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSysRekey_ReInitUpdate(t *testing.T) {
 | |
| 	core, master, token := vault.TestCoreUnsealed(t)
 | |
| 	ln, addr := TestServer(t, core)
 | |
| 	defer ln.Close()
 | |
| 	TestServerAuth(t, addr, token)
 | |
| 
 | |
| 	resp := testHttpPut(t, token, addr+"/v1/sys/rekey/init", map[string]interface{}{
 | |
| 		"secret_shares":    5,
 | |
| 		"secret_threshold": 3,
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 
 | |
| 	resp = testHttpDelete(t, token, addr+"/v1/sys/rekey/init")
 | |
| 	testResponseStatus(t, resp, 204)
 | |
| 
 | |
| 	resp = testHttpPut(t, token, addr+"/v1/sys/rekey/init", map[string]interface{}{
 | |
| 		"secret_shares":    5,
 | |
| 		"secret_threshold": 3,
 | |
| 	})
 | |
| 	testResponseStatus(t, resp, 200)
 | |
| 
 | |
| 	resp = testHttpPut(t, token, addr+"/v1/sys/rekey/update", map[string]interface{}{
 | |
| 		"key": hex.EncodeToString(master),
 | |
| 	})
 | |
| 
 | |
| 	testResponseStatus(t, resp, 400)
 | |
| }
 | 
