2016-07-26 06:25:33 +00:00
|
|
|
package vault
|
|
|
|
|
2016-08-15 13:42:42 +00:00
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
2016-08-26 21:53:47 +00:00
|
|
|
"os"
|
2016-08-15 13:42:42 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
2016-07-26 06:25:33 +00:00
|
|
|
|
2016-08-19 20:45:17 +00:00
|
|
|
"github.com/hashicorp/vault/helper/logformat"
|
2016-08-15 13:42:42 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/physical"
|
2016-08-19 20:45:17 +00:00
|
|
|
log "github.com/mgutz/logxi/v1"
|
2016-08-15 13:42:42 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestClusterFetching(t *testing.T) {
|
2016-07-26 06:25:33 +00:00
|
|
|
c, _, _ := TestCoreUnsealed(t)
|
2016-08-15 13:42:42 +00:00
|
|
|
|
|
|
|
err := c.setupCluster()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-07-26 14:01:35 +00:00
|
|
|
cluster, err := c.Cluster()
|
2016-07-26 06:25:33 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-08-15 13:42:42 +00:00
|
|
|
// Test whether expected values are found
|
|
|
|
if cluster == nil || cluster.Name == "" || cluster.ID == "" {
|
|
|
|
t.Fatalf("cluster information missing: cluster: %#v", cluster)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestClusterHAFetching(t *testing.T) {
|
2016-08-19 20:45:17 +00:00
|
|
|
logger := logformat.NewVaultLogger(log.LevelTrace)
|
|
|
|
|
2016-08-15 13:42:42 +00:00
|
|
|
redirect := "http://127.0.0.1:8200"
|
|
|
|
|
|
|
|
c, err := NewCore(&CoreConfig{
|
|
|
|
Physical: physical.NewInmemHA(logger),
|
|
|
|
HAPhysical: physical.NewInmemHA(logger),
|
|
|
|
RedirectAddr: redirect,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
key, _ := TestCoreInit(t, c)
|
|
|
|
if _, err := TestCoreUnseal(c, TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err := c.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core to become active
|
|
|
|
TestWaitActive(t, c)
|
|
|
|
|
|
|
|
cluster, err := c.Cluster()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Test whether expected values are found
|
2016-07-26 06:25:33 +00:00
|
|
|
if cluster == nil || cluster.Name == "" || cluster.ID == "" {
|
2016-07-26 14:01:35 +00:00
|
|
|
t.Fatalf("cluster information missing: cluster:%#v", cluster)
|
2016-07-26 06:25:33 +00:00
|
|
|
}
|
|
|
|
}
|
2016-08-15 13:42:42 +00:00
|
|
|
|
|
|
|
func TestCluster_ListenForRequests(t *testing.T) {
|
|
|
|
// Make this nicer for tests
|
|
|
|
manualStepDownSleepPeriod = 5 * time.Second
|
|
|
|
|
|
|
|
cores := TestCluster(t, []http.Handler{nil, nil, nil}, nil, false)
|
|
|
|
for _, core := range cores {
|
|
|
|
defer core.CloseListeners()
|
|
|
|
}
|
|
|
|
|
|
|
|
root := cores[0].Root
|
|
|
|
|
|
|
|
// Wait for core to become active
|
|
|
|
TestWaitActive(t, cores[0].Core)
|
|
|
|
|
2016-08-19 15:03:53 +00:00
|
|
|
// Use this to have a valid config after sealing since ClusterTLSConfig returns nil
|
|
|
|
var lastTLSConfig *tls.Config
|
2016-08-15 13:42:42 +00:00
|
|
|
checkListenersFunc := func(expectFail bool) {
|
|
|
|
tlsConfig, err := cores[0].ClusterTLSConfig()
|
2016-08-19 15:03:53 +00:00
|
|
|
if err != nil {
|
|
|
|
if err.Error() != ErrSealed.Error() {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
tlsConfig = lastTLSConfig
|
|
|
|
} else {
|
|
|
|
tlsConfig.NextProtos = []string{"h2"}
|
|
|
|
lastTLSConfig = tlsConfig
|
2016-08-15 13:42:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, ln := range cores[0].Listeners {
|
|
|
|
tcpAddr, ok := ln.Addr().(*net.TCPAddr)
|
|
|
|
if !ok {
|
|
|
|
t.Fatal("%s not a TCP port", tcpAddr.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
conn, err := tls.Dial("tcp", fmt.Sprintf("%s:%d", tcpAddr.IP.String(), tcpAddr.Port+1), tlsConfig)
|
|
|
|
if err != nil {
|
|
|
|
if expectFail {
|
|
|
|
t.Logf("testing %s:%d unsuccessful as expected", tcpAddr.IP.String(), tcpAddr.Port+1)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
t.Fatalf("error: %v\nlisteners are\n%#v\n%#v\n", err, cores[0].Listeners[0], cores[0].Listeners[1])
|
|
|
|
}
|
|
|
|
if expectFail {
|
|
|
|
t.Fatalf("testing %s:%d not unsuccessful as expected", tcpAddr.IP.String(), tcpAddr.Port+1)
|
|
|
|
}
|
|
|
|
err = conn.Handshake()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
connState := conn.ConnectionState()
|
|
|
|
switch {
|
|
|
|
case connState.Version != tls.VersionTLS12:
|
|
|
|
t.Fatal("version mismatch")
|
|
|
|
case connState.NegotiatedProtocol != "h2" || !connState.NegotiatedProtocolIsMutual:
|
|
|
|
t.Fatal("bad protocol negotiation")
|
|
|
|
}
|
|
|
|
t.Logf("testing %s:%d successful", tcpAddr.IP.String(), tcpAddr.Port+1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-19 15:03:53 +00:00
|
|
|
time.Sleep(2 * time.Second)
|
2016-08-15 13:42:42 +00:00
|
|
|
checkListenersFunc(false)
|
|
|
|
|
|
|
|
err := cores[0].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// StepDown doesn't wait during actual preSeal so give time for listeners
|
|
|
|
// to close
|
2016-08-19 15:03:53 +00:00
|
|
|
time.Sleep(2 * time.Second)
|
2016-08-15 13:42:42 +00:00
|
|
|
checkListenersFunc(true)
|
|
|
|
|
|
|
|
// After this period it should be active again
|
|
|
|
time.Sleep(manualStepDownSleepPeriod)
|
|
|
|
checkListenersFunc(false)
|
|
|
|
|
|
|
|
err = cores[0].Seal(root)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-08-19 15:03:53 +00:00
|
|
|
time.Sleep(2 * time.Second)
|
2016-08-15 13:42:42 +00:00
|
|
|
// After sealing it should be inactive again
|
|
|
|
checkListenersFunc(true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCluster_ForwardRequests(t *testing.T) {
|
|
|
|
// Make this nicer for tests
|
|
|
|
manualStepDownSleepPeriod = 5 * time.Second
|
|
|
|
|
2016-08-26 21:53:47 +00:00
|
|
|
testCluster_ForwardRequestsCommon(t, false)
|
|
|
|
testCluster_ForwardRequestsCommon(t, true)
|
|
|
|
os.Setenv("VAULT_USE_GRPC_REQUEST_FORWARDING", "")
|
|
|
|
}
|
|
|
|
|
|
|
|
func testCluster_ForwardRequestsCommon(t *testing.T, rpc bool) {
|
|
|
|
if rpc {
|
|
|
|
os.Setenv("VAULT_USE_GRPC_REQUEST_FORWARDING", "1")
|
|
|
|
} else {
|
|
|
|
os.Setenv("VAULT_USE_GRPC_REQUEST_FORWARDING", "")
|
|
|
|
}
|
|
|
|
|
2016-08-15 13:42:42 +00:00
|
|
|
handler1 := http.NewServeMux()
|
|
|
|
handler1.HandleFunc("/core1", func(w http.ResponseWriter, req *http.Request) {
|
2016-08-26 21:53:47 +00:00
|
|
|
w.Header().Add("Content-Type", "application/json")
|
2016-08-15 13:42:42 +00:00
|
|
|
w.WriteHeader(201)
|
|
|
|
w.Write([]byte("core1"))
|
|
|
|
})
|
|
|
|
handler2 := http.NewServeMux()
|
|
|
|
handler2.HandleFunc("/core2", func(w http.ResponseWriter, req *http.Request) {
|
2016-08-26 21:53:47 +00:00
|
|
|
w.Header().Add("Content-Type", "application/json")
|
2016-08-15 13:42:42 +00:00
|
|
|
w.WriteHeader(202)
|
|
|
|
w.Write([]byte("core2"))
|
|
|
|
})
|
|
|
|
handler3 := http.NewServeMux()
|
|
|
|
handler3.HandleFunc("/core3", func(w http.ResponseWriter, req *http.Request) {
|
2016-08-26 21:53:47 +00:00
|
|
|
w.Header().Add("Content-Type", "application/json")
|
2016-08-15 13:42:42 +00:00
|
|
|
w.WriteHeader(203)
|
|
|
|
w.Write([]byte("core3"))
|
|
|
|
})
|
|
|
|
|
|
|
|
cores := TestCluster(t, []http.Handler{handler1, handler2, handler3}, nil, true)
|
|
|
|
for _, core := range cores {
|
|
|
|
defer core.CloseListeners()
|
|
|
|
}
|
|
|
|
|
|
|
|
root := cores[0].Root
|
|
|
|
|
|
|
|
// Wait for core to become active
|
|
|
|
TestWaitActive(t, cores[0].Core)
|
|
|
|
|
|
|
|
// Test forwarding a request. Since we're going directly from core to core
|
|
|
|
// with no fallback we know that if it worked, request handling is working
|
|
|
|
testCluster_ForwardRequests(t, cores[1], "core1")
|
|
|
|
testCluster_ForwardRequests(t, cores[2], "core1")
|
|
|
|
|
|
|
|
//
|
|
|
|
// Now we do a bunch of round-robining. The point is to make sure that as
|
|
|
|
// nodes come and go, we can always successfully forward to the active
|
|
|
|
// node.
|
|
|
|
//
|
|
|
|
|
|
|
|
// Ensure active core is cores[1] and test
|
|
|
|
err := cores[0].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
_ = cores[2].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
TestWaitActive(t, cores[1].Core)
|
|
|
|
testCluster_ForwardRequests(t, cores[0], "core2")
|
|
|
|
testCluster_ForwardRequests(t, cores[2], "core2")
|
|
|
|
|
|
|
|
// Ensure active core is cores[2] and test
|
|
|
|
err = cores[1].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
_ = cores[0].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
TestWaitActive(t, cores[2].Core)
|
|
|
|
testCluster_ForwardRequests(t, cores[0], "core3")
|
|
|
|
testCluster_ForwardRequests(t, cores[1], "core3")
|
|
|
|
|
|
|
|
// Ensure active core is cores[0] and test
|
|
|
|
err = cores[2].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
_ = cores[1].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
TestWaitActive(t, cores[0].Core)
|
|
|
|
testCluster_ForwardRequests(t, cores[1], "core1")
|
|
|
|
testCluster_ForwardRequests(t, cores[2], "core1")
|
|
|
|
|
|
|
|
// Ensure active core is cores[1] and test
|
|
|
|
err = cores[0].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
_ = cores[2].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
TestWaitActive(t, cores[1].Core)
|
|
|
|
testCluster_ForwardRequests(t, cores[0], "core2")
|
|
|
|
testCluster_ForwardRequests(t, cores[2], "core2")
|
|
|
|
|
|
|
|
// Ensure active core is cores[2] and test
|
|
|
|
err = cores[1].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
_ = cores[0].StepDown(&logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
ClientToken: root,
|
|
|
|
})
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
TestWaitActive(t, cores[2].Core)
|
|
|
|
testCluster_ForwardRequests(t, cores[0], "core3")
|
|
|
|
testCluster_ForwardRequests(t, cores[1], "core3")
|
|
|
|
}
|
|
|
|
|
|
|
|
func testCluster_ForwardRequests(t *testing.T, c *TestClusterCore, remoteCoreID string) {
|
|
|
|
standby, err := c.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatal("expected core to be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// We need to call Leader as that refreshes the connection info
|
|
|
|
isLeader, _, err := c.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if isLeader {
|
|
|
|
t.Fatal("core should not be leader")
|
|
|
|
}
|
|
|
|
|
|
|
|
bodBuf := bytes.NewReader([]byte(`{ "foo": "bar", "zip": "zap" }`))
|
|
|
|
req, err := http.NewRequest("PUT", "https://pushit.real.good:9281/"+remoteCoreID, bodBuf)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
req.Header.Add("X-Vault-Token", c.Root)
|
|
|
|
|
2016-08-26 21:53:47 +00:00
|
|
|
statusCode, header, respBytes, err := c.ForwardRequest(req)
|
2016-08-15 13:42:42 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-08-26 21:53:47 +00:00
|
|
|
|
|
|
|
if header == nil {
|
|
|
|
t.Fatal("err: expected at least a content-type header")
|
|
|
|
}
|
|
|
|
if header.Get("Content-Type") != "application/json" {
|
|
|
|
t.Fatalf("bad content-type: %s", header.Get("Content-Type"))
|
|
|
|
}
|
|
|
|
|
2016-08-19 15:03:53 +00:00
|
|
|
body := string(respBytes)
|
2016-08-15 13:42:42 +00:00
|
|
|
|
2016-08-19 15:03:53 +00:00
|
|
|
if body != remoteCoreID {
|
|
|
|
t.Fatalf("expected %s, got %s", remoteCoreID, body)
|
2016-08-15 13:42:42 +00:00
|
|
|
}
|
2016-08-19 15:03:53 +00:00
|
|
|
switch body {
|
2016-08-15 13:42:42 +00:00
|
|
|
case "core1":
|
2016-08-19 15:03:53 +00:00
|
|
|
if statusCode != 201 {
|
2016-08-15 13:42:42 +00:00
|
|
|
t.Fatal("bad response")
|
|
|
|
}
|
|
|
|
case "core2":
|
2016-08-19 15:03:53 +00:00
|
|
|
if statusCode != 202 {
|
2016-08-15 13:42:42 +00:00
|
|
|
t.Fatal("bad response")
|
|
|
|
}
|
|
|
|
case "core3":
|
2016-08-19 15:03:53 +00:00
|
|
|
if statusCode != 203 {
|
2016-08-15 13:42:42 +00:00
|
|
|
t.Fatal("bad response")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|