open-vault/command/init_test.go

249 lines
5.0 KiB
Go
Raw Normal View History

2015-03-13 18:18:42 +00:00
package command
import (
"os"
2015-03-13 18:18:42 +00:00
"reflect"
"regexp"
2015-03-13 18:18:42 +00:00
"testing"
2015-12-16 21:56:15 +00:00
"github.com/hashicorp/vault/helper/pgpkeys"
2015-03-13 18:18:42 +00:00
"github.com/hashicorp/vault/http"
2016-04-01 17:16:05 +00:00
"github.com/hashicorp/vault/meta"
2015-03-13 18:18:42 +00:00
"github.com/hashicorp/vault/vault"
"github.com/mitchellh/cli"
)
func TestInit(t *testing.T) {
ui := new(cli.MockUi)
c := &InitCommand{
2016-04-01 17:16:05 +00:00
Meta: meta.Meta{
2015-03-13 18:18:42 +00:00
Ui: ui,
},
}
core := vault.TestCore(t)
ln, addr := http.TestServer(t, core)
defer ln.Close()
init, err := core.Initialized()
if err != nil {
t.Fatalf("err: %s", err)
}
if init {
t.Fatal("should not be initialized")
}
args := []string{"-address", addr}
if code := c.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
init, err = core.Initialized()
if err != nil {
t.Fatalf("err: %s", err)
}
if !init {
t.Fatal("should be initialized")
}
2016-04-04 14:44:22 +00:00
sealConf, err := core.SealAccess().BarrierConfig()
2015-03-13 18:18:42 +00:00
if err != nil {
t.Fatalf("err: %s", err)
}
expected := &vault.SealConfig{
Type: "shamir",
2015-03-13 18:18:42 +00:00
SecretShares: 5,
SecretThreshold: 3,
}
if !reflect.DeepEqual(expected, sealConf) {
2016-04-04 14:44:22 +00:00
t.Fatalf("expected:\n%#v\ngot:\n%#v\n", expected, sealConf)
2015-03-13 18:18:42 +00:00
}
}
2016-01-22 18:06:40 +00:00
func TestInit_Check(t *testing.T) {
ui := new(cli.MockUi)
c := &InitCommand{
2016-04-01 17:16:05 +00:00
Meta: meta.Meta{
2016-01-22 18:06:40 +00:00
Ui: ui,
},
}
core := vault.TestCore(t)
ln, addr := http.TestServer(t, core)
defer ln.Close()
// Should return 2, not initialized
args := []string{"-address", addr, "-check"}
if code := c.Run(args); code != 2 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
// Now initialize it
args = []string{"-address", addr}
if code := c.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
// Should return 0, initialized
args = []string{"-address", addr, "-check"}
if code := c.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
init, err := core.Initialized()
if err != nil {
t.Fatalf("err: %s", err)
}
if !init {
t.Fatal("should be initialized")
}
}
2015-03-13 18:18:42 +00:00
func TestInit_custom(t *testing.T) {
ui := new(cli.MockUi)
c := &InitCommand{
2016-04-01 17:16:05 +00:00
Meta: meta.Meta{
2015-03-13 18:18:42 +00:00
Ui: ui,
},
}
core := vault.TestCore(t)
ln, addr := http.TestServer(t, core)
defer ln.Close()
init, err := core.Initialized()
if err != nil {
t.Fatalf("err: %s", err)
}
if init {
t.Fatal("should not be initialized")
}
args := []string{
"-address", addr,
"-key-shares", "7",
"-key-threshold", "3",
}
if code := c.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
init, err = core.Initialized()
if err != nil {
t.Fatalf("err: %s", err)
}
if !init {
t.Fatal("should be initialized")
}
2016-04-04 14:44:22 +00:00
sealConf, err := core.SealAccess().BarrierConfig()
2015-03-13 18:18:42 +00:00
if err != nil {
t.Fatalf("err: %s", err)
}
expected := &vault.SealConfig{
Type: "shamir",
2015-03-13 18:18:42 +00:00
SecretShares: 7,
SecretThreshold: 3,
}
if !reflect.DeepEqual(expected, sealConf) {
2016-04-04 14:44:22 +00:00
t.Fatalf("expected:\n%#v\ngot:\n%#v\n", expected, sealConf)
2015-03-13 18:18:42 +00:00
}
}
func TestInit_PGP(t *testing.T) {
ui := new(cli.MockUi)
c := &InitCommand{
2016-04-01 17:16:05 +00:00
Meta: meta.Meta{
Ui: ui,
},
}
core := vault.TestCore(t)
ln, addr := http.TestServer(t, core)
defer ln.Close()
init, err := core.Initialized()
if err != nil {
t.Fatalf("err: %s", err)
}
if init {
t.Fatal("should not be initialized")
}
tempDir, pubFiles, err := getPubKeyFiles(t)
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(tempDir)
args := []string{
"-address", addr,
"-key-shares", "2",
"-pgp-keys", pubFiles[0] + ",@" + pubFiles[1] + "," + pubFiles[2],
"-key-threshold", "2",
}
// This should fail, as key-shares does not match pgp-keys size
if code := c.Run(args); code == 0 {
t.Fatalf("bad (command should have failed): %d\n\n%s", code, ui.ErrorWriter.String())
}
args = []string{
"-address", addr,
"-key-shares", "4",
"-pgp-keys", pubFiles[0] + ",@" + pubFiles[1] + "," + pubFiles[2] + "," + pubFiles[3],
"-key-threshold", "2",
}
ui.OutputWriter.Reset()
if code := c.Run(args); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
init, err = core.Initialized()
if err != nil {
t.Fatalf("err: %s", err)
}
if !init {
t.Fatal("should be initialized")
}
2016-04-04 14:44:22 +00:00
sealConf, err := core.SealAccess().BarrierConfig()
if err != nil {
t.Fatalf("err: %s", err)
}
2015-12-16 21:56:15 +00:00
pgpKeys := []string{}
for _, pubFile := range pubFiles {
pub, err := pgpkeys.ReadPGPFile(pubFile)
if err != nil {
t.Fatalf("bad: %v", err)
}
pgpKeys = append(pgpKeys, pub)
}
expected := &vault.SealConfig{
Type: "shamir",
SecretShares: 4,
SecretThreshold: 2,
2015-12-16 21:56:15 +00:00
PGPKeys: pgpKeys,
}
if !reflect.DeepEqual(expected, sealConf) {
2016-04-04 14:44:22 +00:00
t.Fatalf("expected:\n%#v\ngot:\n%#v\n", expected, sealConf)
}
2015-08-25 22:33:58 +00:00
re, err := regexp.Compile("\\s+Initial Root Token:\\s+(.*)")
if err != nil {
t.Fatalf("Error compiling regex: %s", err)
}
matches := re.FindAllStringSubmatch(ui.OutputWriter.String(), -1)
if len(matches) != 1 {
t.Fatalf("Unexpected number of tokens found, got %d", len(matches))
}
rootToken := matches[0][1]
2015-12-16 21:56:15 +00:00
parseDecryptAndTestUnsealKeys(t, ui.OutputWriter.String(), rootToken, false, nil, core)
}