2015-03-12 17:46:45 +00:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
2015-03-12 18:12:44 +00:00
|
|
|
"encoding/hex"
|
2015-03-12 17:46:45 +00:00
|
|
|
"net/http"
|
|
|
|
"reflect"
|
|
|
|
"testing"
|
2015-03-13 18:11:59 +00:00
|
|
|
|
2016-01-07 20:10:05 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
2015-03-13 18:11:59 +00:00
|
|
|
"github.com/hashicorp/vault/vault"
|
2015-03-12 17:46:45 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestSysSealStatus(t *testing.T) {
|
2015-03-13 18:11:59 +00:00
|
|
|
core := vault.TestCore(t)
|
|
|
|
vault.TestCoreInit(t, core)
|
2015-03-13 18:13:33 +00:00
|
|
|
ln, addr := TestServer(t, core)
|
2015-03-12 17:46:45 +00:00
|
|
|
defer ln.Close()
|
|
|
|
|
2015-03-12 17:47:31 +00:00
|
|
|
resp, err := http.Get(addr + "/v1/sys/seal-status")
|
2015-03-12 17:46:45 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"sealed": true,
|
|
|
|
"t": float64(1),
|
|
|
|
"n": float64(1),
|
|
|
|
"progress": float64(0),
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad: %#v", actual)
|
|
|
|
}
|
|
|
|
}
|
2015-03-12 18:12:44 +00:00
|
|
|
|
2015-03-31 06:36:03 +00:00
|
|
|
func TestSysSealStatus_uninit(t *testing.T) {
|
|
|
|
core := vault.TestCore(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
resp, err := http.Get(addr + "/v1/sys/seal-status")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 400)
|
|
|
|
}
|
|
|
|
|
2015-03-12 18:12:44 +00:00
|
|
|
func TestSysSeal(t *testing.T) {
|
2015-03-31 16:59:02 +00:00
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
2015-03-13 18:13:33 +00:00
|
|
|
ln, addr := TestServer(t, core)
|
2015-03-12 18:12:44 +00:00
|
|
|
defer ln.Close()
|
2015-03-31 16:59:02 +00:00
|
|
|
TestServerAuth(t, addr, token)
|
2015-03-12 18:12:44 +00:00
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp := testHttpPut(t, token, addr+"/v1/sys/seal", nil)
|
2015-03-12 18:12:44 +00:00
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
|
|
|
check, err := core.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if !check {
|
|
|
|
t.Fatal("should be sealed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSysSeal_unsealed(t *testing.T) {
|
2015-03-31 18:45:44 +00:00
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
2015-03-13 18:13:33 +00:00
|
|
|
ln, addr := TestServer(t, core)
|
2015-03-12 18:12:44 +00:00
|
|
|
defer ln.Close()
|
2015-03-31 18:45:44 +00:00
|
|
|
TestServerAuth(t, addr, token)
|
2015-03-12 18:12:44 +00:00
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp := testHttpPut(t, token, addr+"/v1/sys/seal", nil)
|
2015-03-12 18:12:44 +00:00
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
|
|
|
|
check, err := core.Sealed()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if !check {
|
|
|
|
t.Fatal("should be sealed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSysUnseal(t *testing.T) {
|
2015-03-13 18:11:59 +00:00
|
|
|
core := vault.TestCore(t)
|
2015-03-24 23:20:05 +00:00
|
|
|
key, _ := vault.TestCoreInit(t, core)
|
2015-03-13 18:13:33 +00:00
|
|
|
ln, addr := TestServer(t, core)
|
2015-03-12 18:12:44 +00:00
|
|
|
defer ln.Close()
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp := testHttpPut(t, "", addr+"/v1/sys/unseal", map[string]interface{}{
|
2015-03-16 00:10:33 +00:00
|
|
|
"key": hex.EncodeToString(key),
|
2015-03-12 18:12:44 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"sealed": false,
|
|
|
|
"t": float64(1),
|
|
|
|
"n": float64(1),
|
|
|
|
"progress": float64(0),
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad: %#v", actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSysUnseal_badKey(t *testing.T) {
|
2015-03-13 18:11:59 +00:00
|
|
|
core := vault.TestCore(t)
|
|
|
|
vault.TestCoreInit(t, core)
|
2015-03-13 18:13:33 +00:00
|
|
|
ln, addr := TestServer(t, core)
|
2015-03-12 18:12:44 +00:00
|
|
|
defer ln.Close()
|
|
|
|
|
2015-08-22 00:36:19 +00:00
|
|
|
resp := testHttpPut(t, "", addr+"/v1/sys/unseal", map[string]interface{}{
|
2015-03-12 18:26:59 +00:00
|
|
|
"key": "0123",
|
2015-03-12 18:12:44 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"sealed": true,
|
|
|
|
"t": float64(1),
|
|
|
|
"n": float64(1),
|
|
|
|
"progress": float64(0),
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("bad: %#v", actual)
|
|
|
|
}
|
|
|
|
}
|
2015-10-28 19:59:39 +00:00
|
|
|
|
|
|
|
func TestSysUnseal_Reset(t *testing.T) {
|
|
|
|
core := vault.TestCore(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
thresh := 3
|
|
|
|
resp := testHttpPut(t, "", addr+"/v1/sys/init", map[string]interface{}{
|
|
|
|
"secret_shares": 5,
|
|
|
|
"secret_threshold": thresh,
|
|
|
|
})
|
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
keysRaw, ok := actual["keys"]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("no keys: %#v", actual)
|
|
|
|
}
|
|
|
|
for i, key := range keysRaw.([]interface{}) {
|
|
|
|
if i > thresh-2 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := testHttpPut(t, "", addr+"/v1/sys/unseal", map[string]interface{}{
|
|
|
|
"key": key.(string),
|
|
|
|
})
|
|
|
|
|
|
|
|
var actual map[string]interface{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"sealed": true,
|
|
|
|
"t": float64(3),
|
|
|
|
"n": float64(5),
|
|
|
|
"progress": float64(i + 1),
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("\nexpected:\n%#v\nactual:\n%#v\n", expected, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = testHttpPut(t, "", addr+"/v1/sys/unseal", map[string]interface{}{
|
|
|
|
"reset": true,
|
|
|
|
})
|
|
|
|
|
|
|
|
actual = map[string]interface{}{}
|
|
|
|
expected := map[string]interface{}{
|
|
|
|
"sealed": true,
|
|
|
|
"t": float64(3),
|
|
|
|
"n": float64(5),
|
|
|
|
"progress": float64(0),
|
|
|
|
}
|
|
|
|
testResponseStatus(t, resp, 200)
|
|
|
|
testResponseBody(t, resp, &actual)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
|
|
t.Fatalf("\nexpected:\n%#v\nactual:\n%#v\n", expected, actual)
|
|
|
|
}
|
2016-01-07 20:10:05 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test Seal's permissions logic, which is slightly different than normal code
|
|
|
|
// paths in that it queries the ACL rather than having checkToken do it. This
|
|
|
|
// is because it was abusing RootPaths in logical_system, but that caused some
|
|
|
|
// haywire with code paths that expected there to be an actual corresponding
|
|
|
|
// logical.Path for it. This way is less hacky, but this test ensures that we
|
|
|
|
// have not opened up a permissions hole.
|
|
|
|
func TestSysSeal_Permissions(t *testing.T) {
|
|
|
|
core, _, root := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
TestServerAuth(t, addr, root)
|
|
|
|
|
|
|
|
// Set the 'test' policy object to permit write access to sys/seal
|
|
|
|
req := &logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/policy/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"rules": `path "sys/seal" { capabilities = ["read"] }`,
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err := core.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a non-root token with access to that policy
|
|
|
|
req.Path = "auth/token/create"
|
|
|
|
req.Data = map[string]interface{}{
|
|
|
|
"id": "child",
|
|
|
|
"policies": []string{"test"},
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err = core.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v %v", err, resp)
|
|
|
|
}
|
|
|
|
if resp.Auth.ClientToken != "child" {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We must go through the HTTP interface since seal doesn't go through HandleRequest
|
|
|
|
|
|
|
|
// We expect this to fail since it needs update and sudo
|
|
|
|
httpResp := testHttpPut(t, "child", addr+"/v1/sys/seal", nil)
|
|
|
|
testResponseStatus(t, httpResp, 500)
|
|
|
|
|
|
|
|
// Now modify to add update capability
|
|
|
|
req = &logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/policy/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"rules": `path "sys/seal" { capabilities = ["update"] }`,
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err = core.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We expect this to fail since it needs sudo
|
|
|
|
httpResp = testHttpPut(t, "child", addr+"/v1/sys/seal", nil)
|
|
|
|
testResponseStatus(t, httpResp, 500)
|
|
|
|
|
|
|
|
// Now modify to just sudo capability
|
|
|
|
req = &logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/policy/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"rules": `path "sys/seal" { capabilities = ["sudo"] }`,
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err = core.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We expect this to fail since it needs update
|
|
|
|
httpResp = testHttpPut(t, "child", addr+"/v1/sys/seal", nil)
|
|
|
|
testResponseStatus(t, httpResp, 500)
|
|
|
|
|
|
|
|
// Now modify to add all needed capabilities
|
|
|
|
req = &logical.Request{
|
|
|
|
Operation: logical.UpdateOperation,
|
|
|
|
Path: "sys/policy/test",
|
|
|
|
Data: map[string]interface{}{
|
|
|
|
"rules": `path "sys/seal" { capabilities = ["update", "sudo"] }`,
|
|
|
|
},
|
|
|
|
ClientToken: root,
|
|
|
|
}
|
|
|
|
resp, err = core.HandleRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// We expect this to work
|
|
|
|
httpResp = testHttpPut(t, "child", addr+"/v1/sys/seal", nil)
|
|
|
|
testResponseStatus(t, httpResp, 204)
|
2015-10-28 19:59:39 +00:00
|
|
|
}
|
2016-02-27 00:43:55 +00:00
|
|
|
|
|
|
|
func TestSysStepDown(t *testing.T) {
|
|
|
|
core, _, token := vault.TestCoreUnsealed(t)
|
|
|
|
ln, addr := TestServer(t, core)
|
|
|
|
defer ln.Close()
|
|
|
|
TestServerAuth(t, addr, token)
|
|
|
|
|
|
|
|
resp := testHttpPut(t, token, addr+"/v1/sys/step-down", nil)
|
|
|
|
testResponseStatus(t, resp, 204)
|
|
|
|
}
|