2015-03-11 18:52:01 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
2016-04-26 03:10:32 +00:00
|
|
|
"log"
|
|
|
|
"os"
|
2015-03-11 18:57:05 +00:00
|
|
|
"reflect"
|
2015-03-11 18:52:01 +00:00
|
|
|
"testing"
|
2015-03-16 22:28:50 +00:00
|
|
|
"time"
|
2015-03-11 18:52:01 +00:00
|
|
|
|
2016-05-16 20:11:33 +00:00
|
|
|
"github.com/hashicorp/errwrap"
|
2015-12-16 17:56:20 +00:00
|
|
|
"github.com/hashicorp/go-uuid"
|
2015-11-06 22:27:15 +00:00
|
|
|
"github.com/hashicorp/vault/audit"
|
2015-03-15 21:53:41 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
2015-03-11 18:52:01 +00:00
|
|
|
"github.com/hashicorp/vault/physical"
|
|
|
|
)
|
|
|
|
|
2015-03-12 18:20:27 +00:00
|
|
|
var (
|
|
|
|
// invalidKey is used to test Unseal
|
|
|
|
invalidKey = []byte("abcdefghijklmnopqrstuvwxyz")[:17]
|
|
|
|
)
|
|
|
|
|
2015-05-02 20:28:33 +00:00
|
|
|
func TestNewCore_badAdvertiseAddr(t *testing.T) {
|
2016-04-26 03:10:32 +00:00
|
|
|
logger = log.New(os.Stderr, "", log.LstdFlags)
|
2015-05-02 20:28:33 +00:00
|
|
|
conf := &CoreConfig{
|
|
|
|
AdvertiseAddr: "127.0.0.1:8200",
|
2016-04-26 03:10:32 +00:00
|
|
|
Physical: physical.NewInmem(logger),
|
2015-05-02 20:28:33 +00:00
|
|
|
DisableMlock: true,
|
|
|
|
}
|
|
|
|
_, err := NewCore(conf)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatal("should error")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-08 18:05:31 +00:00
|
|
|
func TestSealConfig_Invalid(t *testing.T) {
|
|
|
|
s := &SealConfig{
|
|
|
|
SecretShares: 2,
|
|
|
|
SecretThreshold: 1,
|
|
|
|
}
|
|
|
|
err := s.Validate()
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected err")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-11 21:25:16 +00:00
|
|
|
func TestCore_Unseal_MultiShare(t *testing.T) {
|
2015-03-15 00:47:11 +00:00
|
|
|
c := TestCore(t)
|
2015-03-11 21:25:16 +00:00
|
|
|
|
2015-03-12 18:20:27 +00:00
|
|
|
_, err := c.Unseal(invalidKey)
|
2015-03-11 21:25:16 +00:00
|
|
|
if err != ErrNotInit {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sealConf := &SealConfig{
|
|
|
|
SecretShares: 5,
|
|
|
|
SecretThreshold: 3,
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
res, err := c.Initialize(sealConf, nil)
|
2015-03-11 21:25:16 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sealed, err := c.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !sealed {
|
|
|
|
t.Fatalf("should be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
if prog := c.SecretProgress(); prog != 0 {
|
|
|
|
t.Fatalf("bad progress: %d", prog)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < 5; i++ {
|
|
|
|
unseal, err := c.Unseal(res.SecretShares[i])
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ignore redundant
|
|
|
|
_, err = c.Unseal(res.SecretShares[i])
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if i >= 2 {
|
|
|
|
if !unseal {
|
|
|
|
t.Fatalf("should be unsealed")
|
|
|
|
}
|
|
|
|
if prog := c.SecretProgress(); prog != 0 {
|
|
|
|
t.Fatalf("bad progress: %d", prog)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if unseal {
|
|
|
|
t.Fatalf("should not be unsealed")
|
|
|
|
}
|
|
|
|
if prog := c.SecretProgress(); prog != i+1 {
|
|
|
|
t.Fatalf("bad progress: %d", prog)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sealed, err = c.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatalf("should not be sealed")
|
|
|
|
}
|
|
|
|
|
2015-03-31 16:59:02 +00:00
|
|
|
err = c.Seal(res.RootToken)
|
2015-03-11 21:25:16 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ignore redundant
|
2015-03-31 16:59:02 +00:00
|
|
|
err = c.Seal(res.RootToken)
|
2015-03-11 21:25:16 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sealed, err = c.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !sealed {
|
|
|
|
t.Fatalf("should be sealed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCore_Unseal_Single(t *testing.T) {
|
2015-03-15 00:47:11 +00:00
|
|
|
c := TestCore(t)
|
2015-03-11 21:25:16 +00:00
|
|
|
|
2015-03-12 18:20:27 +00:00
|
|
|
_, err := c.Unseal(invalidKey)
|
2015-03-11 21:25:16 +00:00
|
|
|
if err != ErrNotInit {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sealConf := &SealConfig{
|
|
|
|
SecretShares: 1,
|
|
|
|
SecretThreshold: 1,
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
res, err := c.Initialize(sealConf, nil)
|
2015-03-11 21:25:16 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sealed, err := c.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !sealed {
|
|
|
|
t.Fatalf("should be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
if prog := c.SecretProgress(); prog != 0 {
|
|
|
|
t.Fatalf("bad progress: %d", prog)
|
|
|
|
}
|
|
|
|
|
|
|
|
unseal, err := c.Unseal(res.SecretShares[0])
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !unseal {
|
|
|
|
t.Fatalf("should be unsealed")
|
|
|
|
}
|
|
|
|
if prog := c.SecretProgress(); prog != 0 {
|
|
|
|
t.Fatalf("bad progress: %d", prog)
|
|
|
|
}
|
|
|
|
|
|
|
|
sealed, err = c.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatalf("should not be sealed")
|
|
|
|
}
|
|
|
|
}
|
2015-03-11 21:31:55 +00:00
|
|
|
|
|
|
|
func TestCore_Route_Sealed(t *testing.T) {
|
2015-03-15 00:47:11 +00:00
|
|
|
c := TestCore(t)
|
2015-03-11 21:31:55 +00:00
|
|
|
sealConf := &SealConfig{
|
|
|
|
SecretShares: 1,
|
|
|
|
SecretThreshold: 1,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should not route anything
|
2015-03-15 21:53:41 +00:00
|
|
|
req := &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
2015-03-11 22:19:41 +00:00
|
|
|
Path: "sys/mounts",
|
2015-03-11 21:31:55 +00:00
|
|
|
}
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != ErrSealed {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-04-04 14:44:22 +00:00
|
|
|
res, err := c.Initialize(sealConf, nil)
|
2015-03-11 21:31:55 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
unseal, err := c.Unseal(res.SecretShares[0])
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !unseal {
|
|
|
|
t.Fatalf("should be unsealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should not error after unseal
|
2015-03-24 18:37:07 +00:00
|
|
|
req.ClientToken = res.RootToken
|
2015-03-11 21:31:55 +00:00
|
|
|
_, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2015-03-13 18:16:24 +00:00
|
|
|
|
|
|
|
// Attempt to unseal after doing a first seal
|
|
|
|
func TestCore_SealUnseal(t *testing.T) {
|
2015-03-31 16:59:02 +00:00
|
|
|
c, key, root := TestCoreUnsealed(t)
|
|
|
|
if err := c.Seal(root); err != nil {
|
2015-03-13 18:16:24 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if unseal, err := c.Unseal(key); err != nil || !unseal {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2015-03-16 22:28:50 +00:00
|
|
|
|
2015-06-18 01:23:59 +00:00
|
|
|
// Attempt to shutdown after unseal
|
|
|
|
func TestCore_Shutdown(t *testing.T) {
|
|
|
|
c, _, _ := TestCoreUnsealed(t)
|
|
|
|
if err := c.Shutdown(); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if sealed, err := c.Sealed(); err != nil || !sealed {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-31 17:00:04 +00:00
|
|
|
// Attempt to seal bad token
|
|
|
|
func TestCore_Seal_BadToken(t *testing.T) {
|
|
|
|
c, _, _ := TestCoreUnsealed(t)
|
|
|
|
if err := c.Seal("foo"); err == nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if sealed, err := c.Sealed(); err != nil || sealed {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-08 20:35:32 +00:00
|
|
|
// Ensure we get a LeaseID
|
2015-03-16 22:28:50 +00:00
|
|
|
func TestCore_HandleRequest_Lease(t *testing.T) {
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-03-16 22:28:50 +00:00
|
|
|
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-03-16 22:28:50 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
2015-03-24 18:37:07 +00:00
|
|
|
ClientToken: root,
|
2015-03-16 22:28:50 +00:00
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the key
|
|
|
|
req.Operation = logical.ReadOperation
|
|
|
|
req.Data = nil
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-03-19 22:11:42 +00:00
|
|
|
if resp == nil || resp.Secret == nil || resp.Data == nil {
|
2015-03-16 22:28:50 +00:00
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
2015-08-21 00:47:17 +00:00
|
|
|
if resp.Secret.TTL != time.Hour {
|
2015-03-19 22:11:42 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
2015-03-16 22:28:50 +00:00
|
|
|
}
|
2015-04-08 20:35:32 +00:00
|
|
|
if resp.Secret.LeaseID == "" {
|
2015-03-19 22:11:42 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
2015-03-16 22:28:50 +00:00
|
|
|
}
|
|
|
|
if resp.Data["foo"] != "bar" {
|
|
|
|
t.Fatalf("bad: %#v", resp.Data)
|
|
|
|
}
|
|
|
|
}
|
2015-03-23 20:56:43 +00:00
|
|
|
|
2015-04-03 22:42:34 +00:00
|
|
|
func TestCore_HandleRequest_Lease_MaxLength(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-04-03 22:42:34 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1000h",
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the key
|
|
|
|
req.Operation = logical.ReadOperation
|
|
|
|
req.Data = nil
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Secret == nil || resp.Data == nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
2015-08-27 14:50:16 +00:00
|
|
|
if resp.Secret.TTL != c.maxLeaseTTL {
|
2015-04-03 22:42:34 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
|
|
|
}
|
2015-04-08 20:35:32 +00:00
|
|
|
if resp.Secret.LeaseID == "" {
|
2015-04-03 22:42:34 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
|
|
|
}
|
|
|
|
if resp.Data["foo"] != "bar" {
|
|
|
|
t.Fatalf("bad: %#v", resp.Data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCore_HandleRequest_Lease_DefaultLength(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-04-03 22:42:34 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "0h",
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the key
|
|
|
|
req.Operation = logical.ReadOperation
|
|
|
|
req.Data = nil
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Secret == nil || resp.Data == nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
2015-08-27 14:50:16 +00:00
|
|
|
if resp.Secret.TTL != c.defaultLeaseTTL {
|
2015-04-03 22:42:34 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
|
|
|
}
|
2015-04-08 20:35:32 +00:00
|
|
|
if resp.Secret.LeaseID == "" {
|
2015-04-03 22:42:34 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
|
|
|
}
|
|
|
|
if resp.Data["foo"] != "bar" {
|
|
|
|
t.Fatalf("bad: %#v", resp.Data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-24 18:57:08 +00:00
|
|
|
func TestCore_HandleRequest_MissingToken(t *testing.T) {
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, _ := TestCoreUnsealed(t)
|
2015-03-24 18:57:08 +00:00
|
|
|
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-03-24 18:57:08 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
2016-05-16 20:11:33 +00:00
|
|
|
if err == nil || !errwrap.Contains(err, logical.ErrInvalidRequest.Error()) {
|
2015-03-24 18:57:08 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp.Data["error"] != "missing client token" {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCore_HandleRequest_InvalidToken(t *testing.T) {
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, _ := TestCoreUnsealed(t)
|
2015-03-24 18:57:08 +00:00
|
|
|
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-03-24 18:57:08 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
ClientToken: "foobarbaz",
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
2016-05-16 20:11:33 +00:00
|
|
|
if err == nil || !errwrap.Contains(err, logical.ErrPermissionDenied.Error()) {
|
2015-03-24 18:57:08 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-04-17 18:57:56 +00:00
|
|
|
if resp.Data["error"] != "permission denied" {
|
2015-03-24 18:57:08 +00:00
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-04 03:45:00 +00:00
|
|
|
// Check that standard permissions work
|
|
|
|
func TestCore_HandleRequest_NoSlash(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
req := &logical.Request{
|
|
|
|
Operation: logical.HelpOperation,
|
|
|
|
Path: "secret",
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v, resp: %v", err, resp)
|
|
|
|
}
|
|
|
|
if _, ok := resp.Data["help"]; !ok {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-24 22:52:07 +00:00
|
|
|
// Test a root path is denied if non-root
|
|
|
|
func TestCore_HandleRequest_RootPath(t *testing.T) {
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-12-30 19:30:02 +00:00
|
|
|
testCoreMakeToken(t, c, root, "child", "", []string{"test"})
|
2015-03-24 22:52:07 +00:00
|
|
|
|
|
|
|
req := &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "sys/policy", // root protected!
|
|
|
|
ClientToken: "child",
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
2016-05-16 20:11:33 +00:00
|
|
|
if err == nil || !errwrap.Contains(err, logical.ErrPermissionDenied.Error()) {
|
2015-03-31 16:59:02 +00:00
|
|
|
t.Fatalf("err: %v, resp: %v", err, resp)
|
2015-03-24 22:52:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test a root path is allowed if non-root but with sudo
|
|
|
|
func TestCore_HandleRequest_RootPath_WithSudo(t *testing.T) {
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-03-24 22:52:07 +00:00
|
|
|
|
|
|
|
// Set the 'test' policy object to permit access to sys/policy
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-03-24 22:52:07 +00:00
|
|
|
Path: "sys/policy/test", // root protected!
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"rules": `path "sys/policy" { policy = "sudo" }`,
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Child token (non-root) but with 'test' policy should have access
|
2015-12-30 19:30:02 +00:00
|
|
|
testCoreMakeToken(t, c, root, "child", "", []string{"test"})
|
2015-03-24 22:52:07 +00:00
|
|
|
req = &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "sys/policy", // root protected!
|
|
|
|
ClientToken: "child",
|
|
|
|
}
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
}
|
2015-03-24 18:57:08 +00:00
|
|
|
|
2015-03-24 22:55:27 +00:00
|
|
|
// Check that standard permissions work
|
|
|
|
func TestCore_HandleRequest_PermissionDenied(t *testing.T) {
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-12-30 19:30:02 +00:00
|
|
|
testCoreMakeToken(t, c, root, "child", "", []string{"test"})
|
2015-03-24 22:55:27 +00:00
|
|
|
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-03-24 22:55:27 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
ClientToken: "child",
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
2016-05-16 20:11:33 +00:00
|
|
|
if err == nil || !errwrap.Contains(err, logical.ErrPermissionDenied.Error()) {
|
2015-03-31 16:59:02 +00:00
|
|
|
t.Fatalf("err: %v, resp: %v", err, resp)
|
2015-03-24 22:55:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that standard permissions work
|
|
|
|
func TestCore_HandleRequest_PermissionAllowed(t *testing.T) {
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-12-30 19:30:02 +00:00
|
|
|
testCoreMakeToken(t, c, root, "child", "", []string{"test"})
|
2015-03-24 22:55:27 +00:00
|
|
|
|
|
|
|
// Set the 'test' policy object to permit access to secret/
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-03-24 22:55:27 +00:00
|
|
|
Path: "sys/policy/test",
|
|
|
|
Data: map[string]interface{}{
|
2015-07-05 23:31:41 +00:00
|
|
|
"rules": `path "secret/*" { policy = "write" }`,
|
2015-03-24 22:55:27 +00:00
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write should work now
|
|
|
|
req = &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-03-24 22:55:27 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
ClientToken: "child",
|
|
|
|
}
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
}
|
2015-03-24 18:57:08 +00:00
|
|
|
|
2015-04-03 22:39:56 +00:00
|
|
|
func TestCore_HandleRequest_NoClientToken(t *testing.T) {
|
|
|
|
noop := &NoopBackend{
|
|
|
|
Response: &logical.Response{},
|
|
|
|
}
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.logicalBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-04-03 22:39:56 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the logical backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/mounts/foo")
|
2015-04-03 22:39:56 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.Data["description"] = "foo"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to request with connection data
|
|
|
|
req = &logical.Request{
|
|
|
|
Path: "foo/login",
|
|
|
|
}
|
|
|
|
req.ClientToken = root
|
|
|
|
if _, err := c.HandleRequest(req); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ct := noop.Requests[0].ClientToken
|
|
|
|
if ct == "" || ct == root {
|
|
|
|
t.Fatalf("bad: %#v", noop.Requests)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-31 03:55:01 +00:00
|
|
|
func TestCore_HandleRequest_ConnOnLogin(t *testing.T) {
|
|
|
|
noop := &NoopBackend{
|
|
|
|
Login: []string{"login"},
|
|
|
|
Response: &logical.Response{},
|
|
|
|
}
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.credentialBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-03-31 03:55:01 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the credential backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/auth/foo")
|
2015-03-31 03:55:01 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to request with connection data
|
|
|
|
req = &logical.Request{
|
|
|
|
Path: "auth/foo/login",
|
|
|
|
Connection: &logical.Connection{},
|
|
|
|
}
|
|
|
|
if _, err := c.HandleRequest(req); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if noop.Requests[0].Connection == nil {
|
|
|
|
t.Fatalf("bad: %#v", noop.Requests)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-23 20:56:43 +00:00
|
|
|
// Ensure we get a client token
|
|
|
|
func TestCore_HandleLogin_Token(t *testing.T) {
|
2015-03-31 01:07:05 +00:00
|
|
|
noop := &NoopBackend{
|
2015-03-23 20:56:43 +00:00
|
|
|
Login: []string{"login"},
|
2015-03-31 01:07:05 +00:00
|
|
|
Response: &logical.Response{
|
|
|
|
Auth: &logical.Auth{
|
|
|
|
Policies: []string{"foo", "bar"},
|
|
|
|
Metadata: map[string]string{
|
|
|
|
"user": "armon",
|
|
|
|
},
|
2015-04-15 21:12:34 +00:00
|
|
|
DisplayName: "armon",
|
2015-03-31 01:07:05 +00:00
|
|
|
},
|
2015-03-23 20:56:43 +00:00
|
|
|
},
|
|
|
|
}
|
2015-03-29 23:18:08 +00:00
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-09-18 20:33:52 +00:00
|
|
|
c.credentialBackends["noop"] = func(conf *logical.BackendConfig) (logical.Backend, error) {
|
2015-03-23 20:56:43 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the credential backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/auth/foo")
|
2015-03-23 20:56:43 +00:00
|
|
|
req.Data["type"] = "noop"
|
2015-03-24 18:37:07 +00:00
|
|
|
req.ClientToken = root
|
2015-03-23 20:56:43 +00:00
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to login
|
2015-03-31 03:26:39 +00:00
|
|
|
lreq := &logical.Request{
|
2015-03-23 20:56:43 +00:00
|
|
|
Path: "auth/foo/login",
|
|
|
|
}
|
2015-03-31 03:26:39 +00:00
|
|
|
lresp, err := c.HandleRequest(lreq)
|
2015-03-23 20:56:43 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we got a client token back
|
2015-03-31 03:26:39 +00:00
|
|
|
clientToken := lresp.Auth.ClientToken
|
|
|
|
if clientToken == "" {
|
2015-03-23 20:56:43 +00:00
|
|
|
t.Fatalf("bad: %#v", lresp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the policy and metadata
|
|
|
|
te, err := c.tokenStore.Lookup(clientToken)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
expect := &TokenEntry{
|
|
|
|
ID: clientToken,
|
2016-03-09 18:45:36 +00:00
|
|
|
Accessor: te.Accessor,
|
2015-03-23 20:56:43 +00:00
|
|
|
Parent: "",
|
2016-03-11 03:31:15 +00:00
|
|
|
Policies: []string{"bar", "default", "foo"},
|
2015-03-23 20:56:43 +00:00
|
|
|
Path: "auth/foo/login",
|
2015-03-31 03:26:39 +00:00
|
|
|
Meta: map[string]string{
|
2015-03-23 20:56:43 +00:00
|
|
|
"user": "armon",
|
|
|
|
},
|
2015-09-18 20:33:52 +00:00
|
|
|
DisplayName: "foo-armon",
|
|
|
|
TTL: time.Hour * 24,
|
|
|
|
CreationTime: te.CreationTime,
|
2015-03-23 20:56:43 +00:00
|
|
|
}
|
2015-09-18 20:33:52 +00:00
|
|
|
|
2015-03-23 20:56:43 +00:00
|
|
|
if !reflect.DeepEqual(te, expect) {
|
|
|
|
t.Fatalf("Bad: %#v expect: %#v", te, expect)
|
|
|
|
}
|
|
|
|
|
2015-04-03 00:52:11 +00:00
|
|
|
// Check that we have a lease with default duration
|
2015-09-18 20:33:52 +00:00
|
|
|
if lresp.Auth.TTL != noop.System().DefaultLeaseTTL() {
|
|
|
|
t.Fatalf("bad: %#v, defaultLeaseTTL: %#v", lresp.Auth, c.defaultLeaseTTL)
|
2015-03-23 20:56:43 +00:00
|
|
|
}
|
|
|
|
}
|
2015-04-01 21:33:48 +00:00
|
|
|
|
|
|
|
func TestCore_HandleRequest_AuditTrail(t *testing.T) {
|
|
|
|
// Create a noop audit backend
|
|
|
|
noop := &NoopAudit{}
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-09-18 21:36:42 +00:00
|
|
|
c.auditBackends["noop"] = func(config *audit.BackendConfig) (audit.Backend, error) {
|
|
|
|
noop = &NoopAudit{
|
|
|
|
Config: config,
|
|
|
|
}
|
2015-04-01 21:33:48 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the audit backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/audit/noop")
|
2015-04-01 21:33:48 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make a request
|
|
|
|
req = &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-04-01 21:33:48 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
req.ClientToken = root
|
|
|
|
if _, err := c.HandleRequest(req); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the audit trail on request and response
|
|
|
|
if len(noop.ReqAuth) != 1 {
|
|
|
|
t.Fatalf("bad: %#v", noop)
|
|
|
|
}
|
|
|
|
auth := noop.ReqAuth[0]
|
|
|
|
if auth.ClientToken != root {
|
|
|
|
t.Fatalf("bad client token: %#v", auth)
|
|
|
|
}
|
|
|
|
if len(auth.Policies) != 1 || auth.Policies[0] != "root" {
|
|
|
|
t.Fatalf("bad: %#v", auth)
|
|
|
|
}
|
|
|
|
if len(noop.Req) != 1 || !reflect.DeepEqual(noop.Req[0], req) {
|
|
|
|
t.Fatalf("Bad: %#v", noop.Req[0])
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(noop.RespAuth) != 2 {
|
|
|
|
t.Fatalf("bad: %#v", noop)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(noop.RespAuth[1], auth) {
|
|
|
|
t.Fatalf("bad: %#v", auth)
|
|
|
|
}
|
|
|
|
if len(noop.RespReq) != 2 || !reflect.DeepEqual(noop.RespReq[1], req) {
|
|
|
|
t.Fatalf("Bad: %#v", noop.RespReq[1])
|
|
|
|
}
|
|
|
|
if len(noop.Resp) != 2 || !reflect.DeepEqual(noop.Resp[1], resp) {
|
|
|
|
t.Fatalf("Bad: %#v", noop.Resp[1])
|
|
|
|
}
|
|
|
|
}
|
2015-04-01 21:48:37 +00:00
|
|
|
|
|
|
|
// Ensure we get a client token
|
|
|
|
func TestCore_HandleLogin_AuditTrail(t *testing.T) {
|
|
|
|
// Create a badass credential backend that always logs in as armon
|
|
|
|
noop := &NoopAudit{}
|
|
|
|
noopBack := &NoopBackend{
|
|
|
|
Login: []string{"login"},
|
|
|
|
Response: &logical.Response{
|
2015-05-09 18:51:58 +00:00
|
|
|
Auth: &logical.Auth{
|
2015-04-09 19:14:04 +00:00
|
|
|
LeaseOptions: logical.LeaseOptions{
|
2015-08-21 00:47:17 +00:00
|
|
|
TTL: time.Hour,
|
2015-04-09 19:14:04 +00:00
|
|
|
},
|
2015-04-01 21:48:37 +00:00
|
|
|
Policies: []string{"foo", "bar"},
|
|
|
|
Metadata: map[string]string{
|
|
|
|
"user": "armon",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.credentialBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-04-01 21:48:37 +00:00
|
|
|
return noopBack, nil
|
|
|
|
}
|
2015-09-18 21:36:42 +00:00
|
|
|
c.auditBackends["noop"] = func(config *audit.BackendConfig) (audit.Backend, error) {
|
|
|
|
noop = &NoopAudit{
|
|
|
|
Config: config,
|
|
|
|
}
|
2015-04-01 21:48:37 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the credential backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/auth/foo")
|
2015-04-01 21:48:37 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the audit backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req = logical.TestRequest(t, logical.UpdateOperation, "sys/audit/noop")
|
2015-04-01 21:48:37 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to login
|
|
|
|
lreq := &logical.Request{
|
|
|
|
Path: "auth/foo/login",
|
|
|
|
}
|
|
|
|
lresp, err := c.HandleRequest(lreq)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we got a client token back
|
|
|
|
clientToken := lresp.Auth.ClientToken
|
|
|
|
if clientToken == "" {
|
|
|
|
t.Fatalf("bad: %#v", lresp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the audit trail on request and response
|
|
|
|
if len(noop.ReqAuth) != 1 {
|
|
|
|
t.Fatalf("bad: %#v", noop)
|
|
|
|
}
|
|
|
|
if len(noop.Req) != 1 || !reflect.DeepEqual(noop.Req[0], lreq) {
|
|
|
|
t.Fatalf("Bad: %#v %#v", noop.Req[0], lreq)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(noop.RespAuth) != 2 {
|
|
|
|
t.Fatalf("bad: %#v", noop)
|
|
|
|
}
|
|
|
|
auth := noop.RespAuth[1]
|
|
|
|
if auth.ClientToken != clientToken {
|
|
|
|
t.Fatalf("bad client token: %#v", auth)
|
|
|
|
}
|
2016-03-11 03:31:15 +00:00
|
|
|
if len(auth.Policies) != 3 || auth.Policies[0] != "bar" || auth.Policies[1] != "default" || auth.Policies[2] != "foo" {
|
2015-04-01 21:48:37 +00:00
|
|
|
t.Fatalf("bad: %#v", auth)
|
|
|
|
}
|
|
|
|
if len(noop.RespReq) != 2 || !reflect.DeepEqual(noop.RespReq[1], lreq) {
|
|
|
|
t.Fatalf("Bad: %#v", noop.RespReq[1])
|
|
|
|
}
|
|
|
|
if len(noop.Resp) != 2 || !reflect.DeepEqual(noop.Resp[1], lresp) {
|
2015-04-01 22:48:56 +00:00
|
|
|
t.Fatalf("Bad: %#v %#v", noop.Resp[1], lresp)
|
2015-04-01 21:48:37 +00:00
|
|
|
}
|
|
|
|
}
|
2015-04-03 01:05:23 +00:00
|
|
|
|
|
|
|
// Check that we register a lease for new tokens
|
|
|
|
func TestCore_HandleRequest_CreateToken_Lease(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
// Create a new credential
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "auth/token/create")
|
2015-04-03 01:05:23 +00:00
|
|
|
req.ClientToken = root
|
|
|
|
req.Data["policies"] = []string{"foo"}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we got a new client token back
|
|
|
|
clientToken := resp.Auth.ClientToken
|
|
|
|
if clientToken == "" {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the policy and metadata
|
|
|
|
te, err := c.tokenStore.Lookup(clientToken)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
expect := &TokenEntry{
|
2015-09-18 20:33:52 +00:00
|
|
|
ID: clientToken,
|
2016-03-09 18:45:36 +00:00
|
|
|
Accessor: te.Accessor,
|
2015-09-18 20:33:52 +00:00
|
|
|
Parent: root,
|
2015-12-30 20:18:30 +00:00
|
|
|
Policies: []string{"default", "foo"},
|
2015-09-18 20:33:52 +00:00
|
|
|
Path: "auth/token/create",
|
|
|
|
DisplayName: "token",
|
|
|
|
CreationTime: te.CreationTime,
|
|
|
|
TTL: time.Hour * 24 * 30,
|
2015-04-03 01:05:23 +00:00
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(te, expect) {
|
|
|
|
t.Fatalf("Bad: %#v expect: %#v", te, expect)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that we have a lease with default duration
|
2015-08-27 14:50:16 +00:00
|
|
|
if resp.Auth.TTL != c.defaultLeaseTTL {
|
2015-04-03 01:05:23 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Auth)
|
|
|
|
}
|
|
|
|
}
|
2015-04-14 23:06:58 +00:00
|
|
|
|
2015-11-09 22:30:50 +00:00
|
|
|
// Check that we handle excluding the default policy
|
|
|
|
func TestCore_HandleRequest_CreateToken_NoDefaultPolicy(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
// Create a new credential
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "auth/token/create")
|
2015-11-09 22:30:50 +00:00
|
|
|
req.ClientToken = root
|
|
|
|
req.Data["policies"] = []string{"foo"}
|
|
|
|
req.Data["no_default_policy"] = true
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we got a new client token back
|
|
|
|
clientToken := resp.Auth.ClientToken
|
|
|
|
if clientToken == "" {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the policy and metadata
|
|
|
|
te, err := c.tokenStore.Lookup(clientToken)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
expect := &TokenEntry{
|
|
|
|
ID: clientToken,
|
2016-03-09 18:45:36 +00:00
|
|
|
Accessor: te.Accessor,
|
2015-11-09 22:30:50 +00:00
|
|
|
Parent: root,
|
|
|
|
Policies: []string{"foo"},
|
|
|
|
Path: "auth/token/create",
|
|
|
|
DisplayName: "token",
|
|
|
|
CreationTime: te.CreationTime,
|
|
|
|
TTL: time.Hour * 24 * 30,
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(te, expect) {
|
|
|
|
t.Fatalf("Bad: %#v expect: %#v", te, expect)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-17 18:57:56 +00:00
|
|
|
func TestCore_LimitedUseToken(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
// Create a new credential
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "auth/token/create")
|
2015-04-17 18:57:56 +00:00
|
|
|
req.ClientToken = root
|
|
|
|
req.Data["num_uses"] = "1"
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Put a secret
|
|
|
|
req = &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-04-17 18:57:56 +00:00
|
|
|
Path: "secret/foo",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
ClientToken: resp.Auth.ClientToken,
|
|
|
|
}
|
|
|
|
_, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Second operation should fail
|
|
|
|
_, err = c.HandleRequest(req)
|
2016-05-16 20:11:33 +00:00
|
|
|
if err == nil || !errwrap.Contains(err, logical.ErrPermissionDenied.Error()) {
|
2015-04-17 18:57:56 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-03 17:28:01 +00:00
|
|
|
func TestCore_Standby_Seal(t *testing.T) {
|
|
|
|
// Create the first core and initialize it
|
2016-04-26 03:10:32 +00:00
|
|
|
logger = log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
inm := physical.NewInmem(logger)
|
|
|
|
inmha := physical.NewInmemHA(logger)
|
2016-02-03 17:28:01 +00:00
|
|
|
advertiseOriginal := "http://127.0.0.1:8200"
|
|
|
|
core, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
|
|
|
HAPhysical: inmha,
|
|
|
|
AdvertiseAddr: advertiseOriginal,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
key, root := TestCoreInit(t, core)
|
|
|
|
if _, err := core.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err := core.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core to become active
|
|
|
|
testWaitActive(t, core)
|
|
|
|
|
|
|
|
// Check the leader is local
|
|
|
|
isLeader, advertise, err := core.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the second core and initialize it
|
|
|
|
advertiseOriginal2 := "http://127.0.0.1:8500"
|
|
|
|
core2, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
|
|
|
HAPhysical: inmha,
|
|
|
|
AdvertiseAddr: advertiseOriginal2,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := core2.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err = core2.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Core2 should be in standby
|
|
|
|
standby, err := core2.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is not local
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if isLeader {
|
|
|
|
t.Fatalf("should not be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seal the standby core with the correct token. Shouldn't go down
|
|
|
|
err = core2.Seal(root)
|
2016-02-03 20:06:18 +00:00
|
|
|
if err == nil {
|
|
|
|
t.Fatal("should not be sealed")
|
2016-02-03 17:28:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
keyUUID, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Seal the standby core with an invalid token. Shouldn't go down
|
|
|
|
err = core2.Seal(keyUUID)
|
2016-02-03 20:06:18 +00:00
|
|
|
if err == nil {
|
|
|
|
t.Fatal("should not be sealed")
|
2016-02-03 17:28:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-27 00:43:55 +00:00
|
|
|
func TestCore_StepDown(t *testing.T) {
|
|
|
|
// Create the first core and initialize it
|
2016-04-26 03:10:32 +00:00
|
|
|
logger = log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
inm := physical.NewInmem(logger)
|
|
|
|
inmha := physical.NewInmemHA(logger)
|
2016-02-27 00:43:55 +00:00
|
|
|
advertiseOriginal := "http://127.0.0.1:8200"
|
|
|
|
core, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
|
|
|
HAPhysical: inmha,
|
|
|
|
AdvertiseAddr: advertiseOriginal,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
key, root := TestCoreInit(t, core)
|
|
|
|
if _, err := core.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err := core.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core to become active
|
|
|
|
testWaitActive(t, core)
|
|
|
|
|
|
|
|
// Check the leader is local
|
|
|
|
isLeader, advertise, err := core.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the second core and initialize it
|
|
|
|
advertiseOriginal2 := "http://127.0.0.1:8500"
|
|
|
|
core2, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
|
|
|
HAPhysical: inmha,
|
|
|
|
AdvertiseAddr: advertiseOriginal2,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := core2.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err = core2.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Core2 should be in standby
|
|
|
|
standby, err := core2.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is not local
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if isLeader {
|
|
|
|
t.Fatalf("should not be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
2016-05-20 17:03:54 +00:00
|
|
|
req := &logical.Request{
|
|
|
|
ClientToken: root,
|
|
|
|
Path: "sys/step-down",
|
|
|
|
}
|
|
|
|
|
2016-07-24 01:46:28 +00:00
|
|
|
// Create an identifier for the request
|
|
|
|
req.ID, err = uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to generate identifier for the request: path: %s err: %v", req.Path, err)
|
|
|
|
}
|
|
|
|
|
2016-02-27 00:43:55 +00:00
|
|
|
// Step down core
|
2016-05-20 17:03:54 +00:00
|
|
|
err = core.StepDown(req)
|
2016-02-27 00:43:55 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("error stepping down core 1")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Give time to switch leaders
|
2016-05-15 14:29:36 +00:00
|
|
|
time.Sleep(5 * time.Second)
|
2016-02-27 00:43:55 +00:00
|
|
|
|
|
|
|
// Core1 should be in standby
|
|
|
|
standby, err = core.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is core2
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal2 {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is not local
|
|
|
|
isLeader, advertise, err = core.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if isLeader {
|
|
|
|
t.Fatalf("should not be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal2 {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Step down core2
|
2016-05-20 17:03:54 +00:00
|
|
|
err = core2.StepDown(req)
|
2016-02-27 00:43:55 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("error stepping down core 1")
|
|
|
|
}
|
|
|
|
|
2016-02-29 02:35:32 +00:00
|
|
|
// Give time to switch leaders -- core 1 will still be waiting on its
|
|
|
|
// cooling off period so give it a full 10 seconds to recover
|
|
|
|
time.Sleep(10 * time.Second)
|
2016-02-27 00:43:55 +00:00
|
|
|
|
|
|
|
// Core2 should be in standby
|
|
|
|
standby, err = core2.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is core1
|
|
|
|
isLeader, advertise, err = core.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is not local
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if isLeader {
|
|
|
|
t.Fatalf("should not be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-08 17:47:21 +00:00
|
|
|
func TestCore_CleanLeaderPrefix(t *testing.T) {
|
|
|
|
// Create the first core and initialize it
|
2016-04-26 03:10:32 +00:00
|
|
|
logger = log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
inm := physical.NewInmem(logger)
|
|
|
|
inmha := physical.NewInmemHA(logger)
|
2015-10-08 17:47:21 +00:00
|
|
|
advertiseOriginal := "http://127.0.0.1:8200"
|
|
|
|
core, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
2015-12-11 20:58:10 +00:00
|
|
|
HAPhysical: inmha,
|
2015-10-08 17:47:21 +00:00
|
|
|
AdvertiseAddr: advertiseOriginal,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
key, root := TestCoreInit(t, core)
|
|
|
|
if _, err := core.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err := core.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core to become active
|
|
|
|
testWaitActive(t, core)
|
|
|
|
|
|
|
|
// Ensure that the original clean function has stopped running
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
|
|
|
|
// Put several random entries
|
|
|
|
for i := 0; i < 5; i++ {
|
2016-01-13 18:40:08 +00:00
|
|
|
keyUUID, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
valueUUID, err := uuid.GenerateUUID()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2015-10-08 17:47:21 +00:00
|
|
|
core.barrier.Put(&Entry{
|
2016-01-13 18:40:08 +00:00
|
|
|
Key: coreLeaderPrefix + keyUUID,
|
|
|
|
Value: []byte(valueUUID),
|
2015-10-08 17:47:21 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
entries, err := core.barrier.List(coreLeaderPrefix)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if len(entries) != 6 {
|
|
|
|
t.Fatalf("wrong number of core leader prefix entries, got %d", len(entries))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is local
|
|
|
|
isLeader, advertise, err := core.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a second core, attached to same in-memory store
|
|
|
|
advertiseOriginal2 := "http://127.0.0.1:8500"
|
|
|
|
core2, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
2015-12-11 20:58:10 +00:00
|
|
|
HAPhysical: inmha,
|
2015-10-08 17:47:21 +00:00
|
|
|
AdvertiseAddr: advertiseOriginal2,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := core2.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err = core2.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Core2 should be in standby
|
|
|
|
standby, err := core2.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the leader is not local
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if isLeader {
|
|
|
|
t.Fatalf("should not be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seal the first core, should step down
|
|
|
|
err = core.Seal(root)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Core should be in standby
|
|
|
|
standby, err = core.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core2 to become active
|
|
|
|
testWaitActive(t, core2)
|
|
|
|
|
|
|
|
// Check the leader is local
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
|
|
|
if advertise != advertiseOriginal2 {
|
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Give time for the entries to clear out; it is conservative at 1/second
|
2015-10-08 18:34:10 +00:00
|
|
|
time.Sleep(10 * leaderPrefixCleanDelay)
|
2015-10-08 17:47:21 +00:00
|
|
|
|
|
|
|
entries, err = core2.barrier.List(coreLeaderPrefix)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if len(entries) != 1 {
|
|
|
|
t.Fatalf("wrong number of core leader prefix entries, got %d", len(entries))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-14 23:06:58 +00:00
|
|
|
func TestCore_Standby(t *testing.T) {
|
2016-04-26 03:10:32 +00:00
|
|
|
logger = log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
inmha := physical.NewInmemHA(logger)
|
2015-12-14 22:58:30 +00:00
|
|
|
testCore_Standby_Common(t, inmha, inmha)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCore_Standby_SeparateHA(t *testing.T) {
|
2016-04-26 03:10:32 +00:00
|
|
|
logger = log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
testCore_Standby_Common(t, physical.NewInmemHA(logger), physical.NewInmemHA(logger))
|
2015-12-14 22:58:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func testCore_Standby_Common(t *testing.T, inm physical.Backend, inmha physical.HABackend) {
|
|
|
|
// Create the first core and initialize it
|
2015-05-02 20:28:33 +00:00
|
|
|
advertiseOriginal := "http://127.0.0.1:8200"
|
2015-04-29 01:12:57 +00:00
|
|
|
core, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
2015-12-11 20:58:10 +00:00
|
|
|
HAPhysical: inmha,
|
2015-05-02 20:28:33 +00:00
|
|
|
AdvertiseAddr: advertiseOriginal,
|
2015-04-29 01:12:57 +00:00
|
|
|
DisableMlock: true,
|
|
|
|
})
|
2015-04-14 23:06:58 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
key, root := TestCoreInit(t, core)
|
|
|
|
if _, err := core.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err := core.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core to become active
|
2015-05-29 19:16:34 +00:00
|
|
|
testWaitActive(t, core)
|
2015-04-14 23:06:58 +00:00
|
|
|
|
|
|
|
// Put a secret
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-04-14 23:06:58 +00:00
|
|
|
Path: "secret/foo",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
_, err = core.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-04-14 23:53:40 +00:00
|
|
|
// Check the leader is local
|
|
|
|
isLeader, advertise, err := core.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
2015-05-02 20:28:33 +00:00
|
|
|
if advertise != advertiseOriginal {
|
2015-04-14 23:53:40 +00:00
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
2015-04-14 23:06:58 +00:00
|
|
|
// Create a second core, attached to same in-memory store
|
2015-05-02 20:28:33 +00:00
|
|
|
advertiseOriginal2 := "http://127.0.0.1:8500"
|
2015-04-29 01:12:57 +00:00
|
|
|
core2, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
2015-12-11 20:58:10 +00:00
|
|
|
HAPhysical: inmha,
|
2015-05-02 20:28:33 +00:00
|
|
|
AdvertiseAddr: advertiseOriginal2,
|
2015-04-29 01:12:57 +00:00
|
|
|
DisableMlock: true,
|
|
|
|
})
|
2015-04-14 23:06:58 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := core2.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify unsealed
|
|
|
|
sealed, err = core2.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err checking seal status: %s", err)
|
|
|
|
}
|
|
|
|
if sealed {
|
|
|
|
t.Fatal("should not be sealed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Core2 should be in standby
|
2015-05-29 19:16:34 +00:00
|
|
|
standby, err := core2.Standby()
|
2015-04-14 23:06:58 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
2015-04-14 23:08:14 +00:00
|
|
|
// Request should fail in standby mode
|
|
|
|
_, err = core2.HandleRequest(req)
|
|
|
|
if err != ErrStandby {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-04-14 23:53:40 +00:00
|
|
|
// Check the leader is not local
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if isLeader {
|
|
|
|
t.Fatalf("should not be leader")
|
|
|
|
}
|
2015-05-02 20:28:33 +00:00
|
|
|
if advertise != advertiseOriginal {
|
2015-04-14 23:53:40 +00:00
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
|
|
|
|
2015-04-14 23:06:58 +00:00
|
|
|
// Seal the first core, should step down
|
|
|
|
err = core.Seal(root)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Core should be in standby
|
|
|
|
standby, err = core.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
t.Fatalf("should be standby")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core2 to become active
|
2015-05-29 19:16:34 +00:00
|
|
|
testWaitActive(t, core2)
|
2015-04-14 23:06:58 +00:00
|
|
|
|
|
|
|
// Read the secret
|
|
|
|
req = &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "secret/foo",
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := core2.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the response
|
|
|
|
if resp.Data["foo"] != "bar" {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
2015-04-14 23:53:40 +00:00
|
|
|
|
|
|
|
// Check the leader is local
|
|
|
|
isLeader, advertise, err = core2.Leader()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !isLeader {
|
|
|
|
t.Fatalf("should be leader")
|
|
|
|
}
|
2015-05-02 20:28:33 +00:00
|
|
|
if advertise != advertiseOriginal2 {
|
2015-04-14 23:53:40 +00:00
|
|
|
t.Fatalf("Bad advertise: %v", advertise)
|
|
|
|
}
|
2015-12-15 01:48:22 +00:00
|
|
|
|
|
|
|
if inm.(*physical.InmemHABackend) == inmha.(*physical.InmemHABackend) {
|
|
|
|
lockSize := inm.(*physical.InmemHABackend).LockMapSize()
|
|
|
|
if lockSize == 0 {
|
|
|
|
t.Fatalf("locks not used with only one HA backend")
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
lockSize := inmha.(*physical.InmemHABackend).LockMapSize()
|
|
|
|
if lockSize == 0 {
|
|
|
|
t.Fatalf("locks not used with expected HA backend")
|
|
|
|
}
|
|
|
|
|
|
|
|
lockSize = inm.(*physical.InmemHABackend).LockMapSize()
|
|
|
|
if lockSize != 0 {
|
|
|
|
t.Fatalf("locks used with unexpected HA backend")
|
|
|
|
}
|
|
|
|
}
|
2015-04-14 23:06:58 +00:00
|
|
|
}
|
2015-05-09 18:47:46 +00:00
|
|
|
|
|
|
|
// Ensure that InternalData is never returned
|
|
|
|
func TestCore_HandleRequest_Login_InternalData(t *testing.T) {
|
|
|
|
noop := &NoopBackend{
|
|
|
|
Login: []string{"login"},
|
|
|
|
Response: &logical.Response{
|
|
|
|
Auth: &logical.Auth{
|
|
|
|
Policies: []string{"foo", "bar"},
|
|
|
|
InternalData: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.credentialBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-05-09 18:47:46 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the credential backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/auth/foo")
|
2015-05-09 18:47:46 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to login
|
|
|
|
lreq := &logical.Request{
|
|
|
|
Path: "auth/foo/login",
|
|
|
|
}
|
|
|
|
lresp, err := c.HandleRequest(lreq)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we do not get the internal data
|
|
|
|
if lresp.Auth.InternalData != nil {
|
|
|
|
t.Fatalf("bad: %#v", lresp)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that InternalData is never returned
|
|
|
|
func TestCore_HandleRequest_InternalData(t *testing.T) {
|
|
|
|
noop := &NoopBackend{
|
|
|
|
Response: &logical.Response{
|
|
|
|
Secret: &logical.Secret{
|
|
|
|
InternalData: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.logicalBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-05-09 18:47:46 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the credential backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/mounts/foo")
|
2015-05-09 18:47:46 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to read
|
|
|
|
lreq := &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "foo/test",
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
lresp, err := c.HandleRequest(lreq)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we do not get the internal data
|
|
|
|
if lresp.Secret.InternalData != nil {
|
|
|
|
t.Fatalf("bad: %#v", lresp)
|
|
|
|
}
|
|
|
|
}
|
2015-05-11 18:16:21 +00:00
|
|
|
|
|
|
|
// Ensure login does not return a secret
|
|
|
|
func TestCore_HandleLogin_ReturnSecret(t *testing.T) {
|
|
|
|
// Create a badass credential backend that always logs in as armon
|
|
|
|
noopBack := &NoopBackend{
|
|
|
|
Login: []string{"login"},
|
|
|
|
Response: &logical.Response{
|
|
|
|
Secret: &logical.Secret{},
|
|
|
|
Auth: &logical.Auth{
|
|
|
|
Policies: []string{"foo", "bar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.credentialBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-05-11 18:16:21 +00:00
|
|
|
return noopBack, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the credential backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/auth/foo")
|
2015-05-11 18:16:21 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to login
|
|
|
|
lreq := &logical.Request{
|
|
|
|
Path: "auth/foo/login",
|
|
|
|
}
|
|
|
|
_, err = c.HandleRequest(lreq)
|
|
|
|
if err != ErrInternalError {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2015-05-16 00:19:41 +00:00
|
|
|
|
2015-05-16 00:47:39 +00:00
|
|
|
// Renew should return the same lease back
|
|
|
|
func TestCore_RenewSameLease(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
// Create a leasable secret
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-05-16 00:47:39 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the key
|
|
|
|
req.Operation = logical.ReadOperation
|
|
|
|
req.Data = nil
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Secret == nil || resp.Secret.LeaseID == "" {
|
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
|
|
|
}
|
|
|
|
original := resp.Secret.LeaseID
|
|
|
|
|
|
|
|
// Renew the lease
|
2016-01-07 15:30:47 +00:00
|
|
|
req = logical.TestRequest(t, logical.UpdateOperation, "sys/renew/"+resp.Secret.LeaseID)
|
2015-05-16 00:47:39 +00:00
|
|
|
req.ClientToken = root
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the lease did not change
|
|
|
|
if resp.Secret.LeaseID != original {
|
|
|
|
t.Fatalf("lease id changed: %s %s", original, resp.Secret.LeaseID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-17 22:22:50 +00:00
|
|
|
// Renew of a token should not create a new lease
|
|
|
|
func TestCore_RenewToken_SingleRegister(t *testing.T) {
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
|
|
|
|
|
|
|
// Create a new token
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-06-17 22:22:50 +00:00
|
|
|
Path: "auth/token/create",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
newClient := resp.Auth.ClientToken
|
|
|
|
|
|
|
|
// Renew the token
|
2016-01-07 15:30:47 +00:00
|
|
|
req = logical.TestRequest(t, logical.UpdateOperation, "auth/token/renew/"+newClient)
|
2015-06-17 22:22:50 +00:00
|
|
|
req.ClientToken = newClient
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Revoke using the renew prefix
|
2016-01-07 15:30:47 +00:00
|
|
|
req = logical.TestRequest(t, logical.UpdateOperation, "sys/revoke-prefix/auth/token/renew/")
|
2015-06-17 22:22:50 +00:00
|
|
|
req.ClientToken = root
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify our token is still valid (e.g. we did not get invalided by the revoke)
|
|
|
|
req = logical.TestRequest(t, logical.ReadOperation, "auth/token/lookup/"+newClient)
|
|
|
|
req.ClientToken = newClient
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the token exists
|
|
|
|
if resp.Data["id"] != newClient {
|
|
|
|
t.Fatalf("bad: %#v", resp.Data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-16 00:19:41 +00:00
|
|
|
// Based on bug GH-203, attempt to disable a credential backend with leased secrets
|
|
|
|
func TestCore_EnableDisableCred_WithLease(t *testing.T) {
|
|
|
|
// Create a badass credential backend that always logs in as armon
|
|
|
|
noopBack := &NoopBackend{
|
|
|
|
Login: []string{"login"},
|
|
|
|
Response: &logical.Response{
|
|
|
|
Auth: &logical.Auth{
|
|
|
|
Policies: []string{"root"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.credentialBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-05-16 00:19:41 +00:00
|
|
|
return noopBack, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the credential backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/auth/foo")
|
2015-05-16 00:19:41 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to login
|
|
|
|
lreq := &logical.Request{
|
|
|
|
Path: "auth/foo/login",
|
|
|
|
}
|
|
|
|
lresp, err := c.HandleRequest(lreq)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a leasable secret
|
|
|
|
req = &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-05-16 00:19:41 +00:00
|
|
|
Path: "secret/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"lease": "1h",
|
|
|
|
},
|
|
|
|
ClientToken: lresp.Auth.ClientToken,
|
|
|
|
}
|
|
|
|
resp, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the key
|
|
|
|
req.Operation = logical.ReadOperation
|
|
|
|
req.Data = nil
|
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp == nil || resp.Secret == nil || resp.Secret.LeaseID == "" {
|
|
|
|
t.Fatalf("bad: %#v", resp.Secret)
|
|
|
|
}
|
|
|
|
|
2015-05-16 00:48:03 +00:00
|
|
|
// Renew the lease
|
2016-01-07 15:30:47 +00:00
|
|
|
req = logical.TestRequest(t, logical.UpdateOperation, "sys/renew/"+resp.Secret.LeaseID)
|
2015-05-16 00:48:03 +00:00
|
|
|
req.ClientToken = lresp.Auth.ClientToken
|
|
|
|
_, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-05-16 00:19:41 +00:00
|
|
|
// Disable the credential backend
|
|
|
|
req = logical.TestRequest(t, logical.DeleteOperation, "sys/auth/foo")
|
2015-05-16 00:48:03 +00:00
|
|
|
req.ClientToken = lresp.Auth.ClientToken
|
2015-05-16 00:19:41 +00:00
|
|
|
resp, err = c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v %#v", err, resp)
|
|
|
|
}
|
|
|
|
}
|
2015-05-27 18:46:42 +00:00
|
|
|
|
|
|
|
func TestCore_HandleRequest_MountPoint(t *testing.T) {
|
|
|
|
noop := &NoopBackend{
|
|
|
|
Response: &logical.Response{},
|
|
|
|
}
|
|
|
|
c, _, root := TestCoreUnsealed(t)
|
2015-07-01 00:30:43 +00:00
|
|
|
c.logicalBackends["noop"] = func(*logical.BackendConfig) (logical.Backend, error) {
|
2015-05-27 18:46:42 +00:00
|
|
|
return noop, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable the logical backend
|
2016-01-07 15:30:47 +00:00
|
|
|
req := logical.TestRequest(t, logical.UpdateOperation, "sys/mounts/foo")
|
2015-05-27 18:46:42 +00:00
|
|
|
req.Data["type"] = "noop"
|
|
|
|
req.Data["description"] = "foo"
|
|
|
|
req.ClientToken = root
|
|
|
|
_, err := c.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to request
|
|
|
|
req = &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "foo/test",
|
|
|
|
Connection: &logical.Connection{},
|
|
|
|
}
|
|
|
|
req.ClientToken = root
|
|
|
|
if _, err := c.HandleRequest(req); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify Path and MountPoint
|
|
|
|
if noop.Requests[0].Path != "test" {
|
|
|
|
t.Fatalf("bad: %#v", noop.Requests)
|
|
|
|
}
|
|
|
|
if noop.Requests[0].MountPoint != "foo/" {
|
|
|
|
t.Fatalf("bad: %#v", noop.Requests)
|
|
|
|
}
|
|
|
|
}
|
2015-05-28 19:02:30 +00:00
|
|
|
|
2015-05-29 19:16:34 +00:00
|
|
|
func testWaitActive(t *testing.T, core *Core) {
|
|
|
|
start := time.Now()
|
|
|
|
var standby bool
|
|
|
|
var err error
|
|
|
|
for time.Now().Sub(start) < time.Second {
|
|
|
|
standby, err = core.Standby()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !standby {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if standby {
|
|
|
|
t.Fatalf("should not be in standby mode")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCore_Standby_Rotate(t *testing.T) {
|
|
|
|
// Create the first core and initialize it
|
2016-04-26 03:10:32 +00:00
|
|
|
logger = log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
inm := physical.NewInmem(logger)
|
|
|
|
inmha := physical.NewInmemHA(logger)
|
2015-05-29 19:16:34 +00:00
|
|
|
advertiseOriginal := "http://127.0.0.1:8200"
|
|
|
|
core, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
2015-12-11 20:58:10 +00:00
|
|
|
HAPhysical: inmha,
|
2015-05-29 19:16:34 +00:00
|
|
|
AdvertiseAddr: advertiseOriginal,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
key, root := TestCoreInit(t, core)
|
|
|
|
if _, err := core.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core to become active
|
|
|
|
testWaitActive(t, core)
|
|
|
|
|
|
|
|
// Create a second core, attached to same in-memory store
|
|
|
|
advertiseOriginal2 := "http://127.0.0.1:8500"
|
|
|
|
core2, err := NewCore(&CoreConfig{
|
|
|
|
Physical: inm,
|
2015-12-11 20:58:10 +00:00
|
|
|
HAPhysical: inmha,
|
2015-05-29 19:16:34 +00:00
|
|
|
AdvertiseAddr: advertiseOriginal2,
|
|
|
|
DisableMlock: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := core2.Unseal(TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Rotate the encryption key
|
|
|
|
req := &logical.Request{
|
2016-01-07 15:30:47 +00:00
|
|
|
Operation: logical.UpdateOperation,
|
2015-05-29 19:16:34 +00:00
|
|
|
Path: "sys/rotate",
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
_, err = core.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seal the first core, should step down
|
|
|
|
err = core.Seal(root)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core2 to become active
|
|
|
|
testWaitActive(t, core2)
|
|
|
|
|
|
|
|
// Read the key status
|
|
|
|
req = &logical.Request{
|
|
|
|
Operation: logical.ReadOperation,
|
|
|
|
Path: "sys/key-status",
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := core2.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the response
|
|
|
|
if resp.Data["term"] != 2 {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
}
|