2022-11-16 14:27:56 +00:00
package command
import (
"bytes"
"encoding/json"
"fmt"
2022-11-23 14:42:19 +00:00
"strings"
2022-11-16 14:27:56 +00:00
"testing"
2022-11-23 14:42:19 +00:00
"time"
2022-11-16 14:27:56 +00:00
"github.com/hashicorp/vault/api"
2022-11-23 14:42:19 +00:00
"github.com/hashicorp/vault/command/healthcheck"
2022-11-16 14:27:56 +00:00
2022-11-23 14:42:19 +00:00
"github.com/mitchellh/cli"
2022-11-16 14:27:56 +00:00
"github.com/stretchr/testify/require"
)
2022-11-23 14:42:19 +00:00
func TestPKIHC_AllGood ( t * testing . T ) {
t . Parallel ( )
2022-11-16 14:27:56 +00:00
2022-11-23 14:42:19 +00:00
client , closer := testVaultServer ( t )
defer closer ( )
if err := client . Sys ( ) . Mount ( "pki" , & api . MountInput {
Type : "pki" ,
Config : api . MountConfigInput {
AuditNonHMACRequestKeys : healthcheck . VisibleReqParams ,
AuditNonHMACResponseKeys : healthcheck . VisibleRespParams ,
PassthroughRequestHeaders : [ ] string { "If-Modified-Since" } ,
AllowedResponseHeaders : [ ] string { "Last-Modified" } ,
MaxLeaseTTL : "36500d" ,
2022-11-16 14:27:56 +00:00
} ,
2022-11-23 14:42:19 +00:00
} ) ; err != nil {
t . Fatalf ( "pki mount error: %#v" , err )
}
if resp , err := client . Logical ( ) . Write ( "pki/root/generate/internal" , map [ string ] interface { } {
"key_type" : "ec" ,
"common_name" : "Root X1" ,
"ttl" : "3650d" ,
} ) ; err != nil || resp == nil {
t . Fatalf ( "failed to prime CA: %v" , err )
}
if _ , err := client . Logical ( ) . Read ( "pki/crl/rotate" ) ; err != nil {
t . Fatalf ( "failed to rotate CRLs: %v" , err )
}
if _ , err := client . Logical ( ) . Write ( "pki/roles/testing" , map [ string ] interface { } {
"allow_any_name" : true ,
"no_store" : true ,
} ) ; err != nil {
t . Fatalf ( "failed to write role: %v" , err )
}
if _ , err := client . Logical ( ) . Write ( "pki/config/auto-tidy" , map [ string ] interface { } {
"enabled" : true ,
"tidy_cert_store" : true ,
} ) ; err != nil {
t . Fatalf ( "failed to write auto-tidy config: %v" , err )
}
if _ , err := client . Logical ( ) . Write ( "pki/tidy" , map [ string ] interface { } {
"tidy_cert_store" : true ,
} ) ; err != nil {
t . Fatalf ( "failed to run tidy: %v" , err )
2022-11-16 14:27:56 +00:00
}
2022-11-23 14:42:19 +00:00
_ , _ , results := execPKIHC ( t , client , true )
validateExpectedPKIHC ( t , expectedAllGood , results )
2022-11-16 14:27:56 +00:00
}
2022-11-23 14:42:19 +00:00
func TestPKIHC_AllBad ( t * testing . T ) {
t . Parallel ( )
2022-11-16 14:27:56 +00:00
client , closer := testVaultServer ( t )
defer closer ( )
if err := client . Sys ( ) . Mount ( "pki" , & api . MountInput {
Type : "pki" ,
} ) ; err != nil {
t . Fatalf ( "pki mount error: %#v" , err )
}
if resp , err := client . Logical ( ) . Write ( "pki/root/generate/internal" , map [ string ] interface { } {
"key_type" : "ec" ,
"common_name" : "Root X1" ,
2022-11-23 14:42:19 +00:00
"ttl" : "35d" ,
2022-11-16 14:27:56 +00:00
} ) ; err != nil || resp == nil {
t . Fatalf ( "failed to prime CA: %v" , err )
}
2022-11-23 14:42:19 +00:00
if _ , err := client . Logical ( ) . Write ( "pki/config/crl" , map [ string ] interface { } {
"expiry" : "5s" ,
} ) ; err != nil {
t . Fatalf ( "failed to issue leaf cert: %v" , err )
}
2022-11-16 14:27:56 +00:00
if _ , err := client . Logical ( ) . Read ( "pki/crl/rotate" ) ; err != nil {
t . Fatalf ( "failed to rotate CRLs: %v" , err )
}
2022-11-23 14:42:19 +00:00
time . Sleep ( 5 * time . Second )
2022-11-17 20:31:58 +00:00
if _ , err := client . Logical ( ) . Write ( "pki/roles/testing" , map [ string ] interface { } {
2022-11-23 14:42:19 +00:00
"allow_localhost" : true ,
"allowed_domains" : "*.example.com" ,
"allow_glob_domains" : true ,
"allow_wildcard_certificates" : true ,
"no_store" : false ,
"key_type" : "ec" ,
"ttl" : "30d" ,
} ) ; err != nil {
t . Fatalf ( "failed to write role: %v" , err )
}
if _ , err := client . Logical ( ) . Write ( "pki/issue/testing" , map [ string ] interface { } {
"common_name" : "something.example.com" ,
} ) ; err != nil {
t . Fatalf ( "failed to issue leaf cert: %v" , err )
}
if _ , err := client . Logical ( ) . Write ( "pki/config/auto-tidy" , map [ string ] interface { } {
"enabled" : false ,
"tidy_cert_store" : false ,
} ) ; err != nil {
t . Fatalf ( "failed to write auto-tidy config: %v" , err )
}
_ , _ , results := execPKIHC ( t , client , true )
validateExpectedPKIHC ( t , expectedAllBad , results )
}
func TestPKIHC_OnlyIssuer ( t * testing . T ) {
t . Parallel ( )
client , closer := testVaultServer ( t )
defer closer ( )
if err := client . Sys ( ) . Mount ( "pki" , & api . MountInput {
Type : "pki" ,
} ) ; err != nil {
t . Fatalf ( "pki mount error: %#v" , err )
}
if resp , err := client . Logical ( ) . Write ( "pki/root/generate/internal" , map [ string ] interface { } {
"key_type" : "ec" ,
"common_name" : "Root X1" ,
"ttl" : "35d" ,
} ) ; err != nil || resp == nil {
t . Fatalf ( "failed to prime CA: %v" , err )
}
_ , _ , results := execPKIHC ( t , client , true )
validateExpectedPKIHC ( t , expectedEmptyWithIssuer , results )
}
func TestPKIHC_NoMount ( t * testing . T ) {
t . Parallel ( )
client , closer := testVaultServer ( t )
defer closer ( )
code , message , _ := execPKIHC ( t , client , false )
if code != 1 {
t . Fatalf ( "Expected return code 1 from invocation on non-existent mount, got %v\nOutput: %v" , code , message )
}
if ! strings . Contains ( message , "route entry not found" ) {
t . Fatalf ( "Expected failure to talk about missing route entry, got exit code %v\nOutput: %v" , code , message )
}
}
func TestPKIHC_ExpectedEmptyMount ( t * testing . T ) {
t . Parallel ( )
client , closer := testVaultServer ( t )
defer closer ( )
if err := client . Sys ( ) . Mount ( "pki" , & api . MountInput {
Type : "pki" ,
} ) ; err != nil {
t . Fatalf ( "pki mount error: %#v" , err )
}
code , message , _ := execPKIHC ( t , client , false )
if code != 1 {
t . Fatalf ( "Expected return code 1 from invocation on empty mount, got %v\nOutput: %v" , code , message )
}
if ! strings . Contains ( message , "lacks any configured issuers," ) {
t . Fatalf ( "Expected failure to talk about no issuers, got exit code %v\nOutput: %v" , code , message )
}
}
func TestPKIHC_NoPerm ( t * testing . T ) {
t . Parallel ( )
client , closer := testVaultServer ( t )
defer closer ( )
if err := client . Sys ( ) . Mount ( "pki" , & api . MountInput {
Type : "pki" ,
} ) ; err != nil {
t . Fatalf ( "pki mount error: %#v" , err )
}
if resp , err := client . Logical ( ) . Write ( "pki/root/generate/internal" , map [ string ] interface { } {
"key_type" : "ec" ,
"common_name" : "Root X1" ,
"ttl" : "35d" ,
} ) ; err != nil || resp == nil {
t . Fatalf ( "failed to prime CA: %v" , err )
}
if _ , err := client . Logical ( ) . Write ( "pki/config/crl" , map [ string ] interface { } {
"expiry" : "5s" ,
} ) ; err != nil {
t . Fatalf ( "failed to issue leaf cert: %v" , err )
}
if _ , err := client . Logical ( ) . Read ( "pki/crl/rotate" ) ; err != nil {
t . Fatalf ( "failed to rotate CRLs: %v" , err )
}
time . Sleep ( 5 * time . Second )
if _ , err := client . Logical ( ) . Write ( "pki/roles/testing" , map [ string ] interface { } {
"allow_localhost" : true ,
"allowed_domains" : "*.example.com" ,
"allow_glob_domains" : true ,
"allow_wildcard_certificates" : true ,
"no_store" : false ,
"key_type" : "ec" ,
"ttl" : "30d" ,
2022-11-17 20:31:58 +00:00
} ) ; err != nil {
t . Fatalf ( "failed to write role: %v" , err )
}
2022-11-23 14:42:19 +00:00
if _ , err := client . Logical ( ) . Write ( "pki/issue/testing" , map [ string ] interface { } {
"common_name" : "something.example.com" ,
} ) ; err != nil {
t . Fatalf ( "failed to issue leaf cert: %v" , err )
}
if _ , err := client . Logical ( ) . Write ( "pki/config/auto-tidy" , map [ string ] interface { } {
"enabled" : false ,
"tidy_cert_store" : false ,
} ) ; err != nil {
t . Fatalf ( "failed to write auto-tidy config: %v" , err )
}
// Remove client token.
client . ClearToken ( )
_ , _ , results := execPKIHC ( t , client , true )
validateExpectedPKIHC ( t , expectedNoPerm , results )
}
func testPKIHealthCheckCommand ( tb testing . TB ) ( * cli . MockUi , * PKIHealthCheckCommand ) {
tb . Helper ( )
ui := cli . NewMockUi ( )
return ui , & PKIHealthCheckCommand {
BaseCommand : & BaseCommand {
UI : ui ,
} ,
}
}
func execPKIHC ( t * testing . T , client * api . Client , ok bool ) ( int , string , map [ string ] [ ] map [ string ] interface { } ) {
2022-11-16 14:27:56 +00:00
stdout := bytes . NewBuffer ( nil )
stderr := bytes . NewBuffer ( nil )
runOpts := & RunOptions {
Stdout : stdout ,
Stderr : stderr ,
Client : client ,
}
code := RunCustom ( [ ] string { "pki" , "health-check" , "-format=json" , "pki" } , runOpts )
combined := stdout . String ( ) + stderr . String ( )
var results map [ string ] [ ] map [ string ] interface { }
if err := json . Unmarshal ( [ ] byte ( combined ) , & results ) ; err != nil {
2022-11-23 14:42:19 +00:00
if ok {
t . Fatalf ( "failed to decode json (ret %v): %v\njson:\n%v" , code , err , combined )
}
2022-11-16 14:27:56 +00:00
}
t . Log ( combined )
2022-11-23 14:42:19 +00:00
return code , combined , results
}
2022-11-16 14:27:56 +00:00
2022-11-23 14:42:19 +00:00
func validateExpectedPKIHC ( t * testing . T , expected , results map [ string ] [ ] map [ string ] interface { } ) {
2022-11-16 14:27:56 +00:00
for test , subtest := range expected {
actual , ok := results [ test ]
require . True ( t , ok , fmt . Sprintf ( "expected top-level test %v to be present" , test ) )
2022-11-23 14:42:19 +00:00
if subtest == nil {
continue
}
2022-11-16 14:27:56 +00:00
require . NotNil ( t , actual , fmt . Sprintf ( "expected top-level test %v to be non-empty; wanted wireframe format %v" , test , subtest ) )
require . Equal ( t , len ( subtest ) , len ( actual ) , fmt . Sprintf ( "top-level test %v has different number of results %v in wireframe, %v in test output\nwireframe: %v\noutput: %v\n" , test , len ( subtest ) , len ( actual ) , subtest , actual ) )
for index , subset := range subtest {
for key , value := range subset {
a_value , present := actual [ index ] [ key ]
require . True ( t , present )
if value != nil {
2022-11-23 14:42:19 +00:00
require . Equal ( t , value , a_value , fmt . Sprintf ( "in test: %v / result %v - when validating key %v\nWanted: %v\nGot: %v" , test , index , key , subset , actual [ index ] ) )
2022-11-16 14:27:56 +00:00
}
}
}
}
2022-11-23 14:42:19 +00:00
for name := range results {
if _ , present := expected [ name ] ; ! present {
t . Fatalf ( "got unexpected health check: %v\n%v" , name , results [ name ] )
}
}
}
var expectedAllGood = map [ string ] [ ] map [ string ] interface { } {
"ca_validity_period" : {
{
"status" : "ok" ,
} ,
} ,
"crl_validity_period" : {
{
"status" : "ok" ,
} ,
{
"status" : "ok" ,
} ,
} ,
"allow_if_modified_since" : {
{
"status" : "ok" ,
} ,
} ,
"audit_visibility" : {
{
"status" : "ok" ,
} ,
} ,
"enable_auto_tidy" : {
{
"status" : "ok" ,
} ,
} ,
"role_allows_glob_wildcards" : {
{
"status" : "ok" ,
} ,
} ,
"role_allows_localhost" : {
{
"status" : "ok" ,
} ,
} ,
"role_no_store_false" : {
{
"status" : "ok" ,
} ,
} ,
"root_issued_leaves" : {
{
"status" : "ok" ,
} ,
} ,
"tidy_last_run" : {
{
"status" : "ok" ,
} ,
} ,
"too_many_certs" : {
{
"status" : "ok" ,
} ,
} ,
}
var expectedAllBad = map [ string ] [ ] map [ string ] interface { } {
"ca_validity_period" : {
{
"status" : "critical" ,
} ,
} ,
"crl_validity_period" : {
{
"status" : "critical" ,
} ,
{
"status" : "critical" ,
} ,
} ,
"allow_if_modified_since" : {
{
"status" : "informational" ,
} ,
} ,
"audit_visibility" : {
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
{
"status" : "informational" ,
} ,
} ,
"enable_auto_tidy" : {
{
"status" : "informational" ,
} ,
} ,
"role_allows_glob_wildcards" : {
{
"status" : "warning" ,
} ,
} ,
"role_allows_localhost" : {
{
"status" : "warning" ,
} ,
} ,
"role_no_store_false" : {
{
"status" : "warning" ,
} ,
} ,
"root_issued_leaves" : {
{
"status" : "warning" ,
} ,
} ,
"tidy_last_run" : {
{
"status" : "critical" ,
} ,
} ,
"too_many_certs" : {
{
"status" : "ok" ,
} ,
} ,
}
var expectedEmptyWithIssuer = map [ string ] [ ] map [ string ] interface { } {
"ca_validity_period" : {
{
"status" : "critical" ,
} ,
} ,
"crl_validity_period" : {
{
"status" : "ok" ,
} ,
{
"status" : "ok" ,
} ,
} ,
"allow_if_modified_since" : nil ,
"audit_visibility" : nil ,
"enable_auto_tidy" : {
{
"status" : "informational" ,
} ,
} ,
"role_allows_glob_wildcards" : nil ,
"role_allows_localhost" : nil ,
"role_no_store_false" : nil ,
"root_issued_leaves" : {
{
"status" : "ok" ,
} ,
} ,
"tidy_last_run" : {
{
"status" : "critical" ,
} ,
} ,
"too_many_certs" : {
{
"status" : "ok" ,
} ,
} ,
}
var expectedNoPerm = map [ string ] [ ] map [ string ] interface { } {
"ca_validity_period" : {
{
"status" : "critical" ,
} ,
} ,
"crl_validity_period" : {
{
"status" : "insufficient_permissions" ,
} ,
{
"status" : "critical" ,
} ,
{
"status" : "critical" ,
} ,
} ,
"allow_if_modified_since" : nil ,
"audit_visibility" : nil ,
"enable_auto_tidy" : {
{
"status" : "insufficient_permissions" ,
} ,
} ,
"role_allows_glob_wildcards" : {
{
"status" : "insufficient_permissions" ,
} ,
} ,
"role_allows_localhost" : {
{
"status" : "insufficient_permissions" ,
} ,
} ,
"role_no_store_false" : {
{
"status" : "insufficient_permissions" ,
} ,
} ,
"root_issued_leaves" : {
{
"status" : "ok" ,
} ,
} ,
"tidy_last_run" : {
{
"status" : "insufficient_permissions" ,
} ,
} ,
"too_many_certs" : {
{
"status" : "ok" ,
} ,
} ,
2022-11-16 14:27:56 +00:00
}