2018-12-03 16:57:53 +00:00
|
|
|
// +build !enterprise
|
|
|
|
|
2018-10-23 06:34:02 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/base64"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
hclog "github.com/hashicorp/go-hclog"
|
2020-01-11 01:39:52 +00:00
|
|
|
wrapping "github.com/hashicorp/go-kms-wrapping"
|
|
|
|
aeadwrapper "github.com/hashicorp/go-kms-wrapping/wrappers/aead"
|
2018-10-23 06:34:02 +00:00
|
|
|
"github.com/hashicorp/vault/api"
|
|
|
|
vaulthttp "github.com/hashicorp/vault/http"
|
2019-04-13 07:44:06 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/helper/logging"
|
2019-04-12 21:54:35 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/physical"
|
|
|
|
physInmem "github.com/hashicorp/vault/sdk/physical/inmem"
|
2018-10-23 06:34:02 +00:00
|
|
|
"github.com/hashicorp/vault/shamir"
|
|
|
|
"github.com/hashicorp/vault/vault"
|
|
|
|
"github.com/hashicorp/vault/vault/seal"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestSealMigration(t *testing.T) {
|
2019-10-18 18:46:00 +00:00
|
|
|
logger := logging.NewVaultLogger(hclog.Trace).Named(t.Name())
|
2018-10-23 06:34:02 +00:00
|
|
|
phys, err := physInmem.NewInmem(nil, logger)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
haPhys, err := physInmem.NewInmemHA(nil, logger)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-01-11 01:39:52 +00:00
|
|
|
shamirwrapper := vault.NewDefaultSeal(&seal.Access{
|
|
|
|
Wrapper: aeadwrapper.NewWrapper(&wrapping.WrapperOptions{
|
|
|
|
Logger: logger.Named("shamir"),
|
|
|
|
}),
|
|
|
|
})
|
2018-10-23 06:34:02 +00:00
|
|
|
coreConfig := &vault.CoreConfig{
|
2020-01-11 01:39:52 +00:00
|
|
|
Seal: shamirwrapper,
|
2018-10-23 06:34:02 +00:00
|
|
|
Physical: phys,
|
|
|
|
HAPhysical: haPhys.(physical.HABackend),
|
|
|
|
DisableSealWrap: true,
|
|
|
|
}
|
|
|
|
clusterConfig := &vault.TestClusterOptions{
|
|
|
|
Logger: logger,
|
|
|
|
HandlerFunc: vaulthttp.Handler,
|
|
|
|
SkipInit: true,
|
|
|
|
NumCores: 1,
|
|
|
|
}
|
|
|
|
|
2018-11-05 19:06:39 +00:00
|
|
|
ctx := context.Background()
|
2018-10-23 06:34:02 +00:00
|
|
|
var keys []string
|
|
|
|
var rootToken string
|
|
|
|
|
|
|
|
{
|
2019-10-18 18:46:00 +00:00
|
|
|
logger.Info("integ: start up as normal with shamir seal, init it")
|
2018-10-23 06:34:02 +00:00
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, clusterConfig)
|
|
|
|
cluster.Start()
|
|
|
|
defer cluster.Cleanup()
|
|
|
|
|
|
|
|
client := cluster.Cores[0].Client
|
|
|
|
coreConfig = cluster.Cores[0].CoreConfig
|
|
|
|
|
|
|
|
// Init
|
|
|
|
resp, err := client.Sys().Init(&api.InitRequest{
|
|
|
|
SecretShares: 2,
|
|
|
|
SecretThreshold: 2,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
keys = resp.KeysB64
|
|
|
|
rootToken = resp.RootToken
|
|
|
|
|
|
|
|
// Now seal
|
|
|
|
cluster.Cleanup()
|
|
|
|
// This will prevent cleanup from running again on the defer
|
|
|
|
cluster.Cores = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2019-10-18 18:46:00 +00:00
|
|
|
logger.SetLevel(hclog.Trace)
|
|
|
|
logger.Info("integ: start up as normal with shamir seal and unseal, make sure everything is normal")
|
2018-10-23 06:34:02 +00:00
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, clusterConfig)
|
|
|
|
cluster.Start()
|
|
|
|
defer cluster.Cleanup()
|
|
|
|
|
|
|
|
client := cluster.Cores[0].Client
|
|
|
|
client.SetToken(rootToken)
|
|
|
|
|
|
|
|
var resp *api.SealStatusResponse
|
|
|
|
for _, key := range keys {
|
|
|
|
resp, err = client.Sys().Unseal(key)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatal("expected response")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if resp.Sealed {
|
|
|
|
t.Fatal("expected unsealed state")
|
|
|
|
}
|
|
|
|
|
|
|
|
cluster.Cleanup()
|
|
|
|
cluster.Cores = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var autoSeal vault.Seal
|
|
|
|
|
|
|
|
{
|
2019-10-18 18:46:00 +00:00
|
|
|
logger.SetLevel(hclog.Trace)
|
|
|
|
logger.Info("integ: creating an autoseal and activating migration")
|
2018-10-23 06:34:02 +00:00
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, clusterConfig)
|
|
|
|
cluster.Start()
|
|
|
|
defer cluster.Cleanup()
|
|
|
|
|
|
|
|
core := cluster.Cores[0].Core
|
|
|
|
|
2019-02-01 19:29:55 +00:00
|
|
|
newSeal := vault.NewAutoSeal(seal.NewTestSeal(nil))
|
2018-10-23 06:34:02 +00:00
|
|
|
newSeal.SetCore(core)
|
|
|
|
autoSeal = newSeal
|
2019-06-20 19:14:58 +00:00
|
|
|
if err := adjustCoreForSealMigration(logger, core, newSeal, nil); err != nil {
|
2018-10-23 06:34:02 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
client := cluster.Cores[0].Client
|
|
|
|
client.SetToken(rootToken)
|
|
|
|
|
|
|
|
var resp *api.SealStatusResponse
|
|
|
|
unsealOpts := &api.UnsealOpts{}
|
|
|
|
for _, key := range keys {
|
|
|
|
unsealOpts.Key = key
|
|
|
|
unsealOpts.Migrate = false
|
|
|
|
resp, err = client.Sys().UnsealWithOptions(unsealOpts)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatal("expected error due to lack of migrate parameter")
|
|
|
|
}
|
|
|
|
unsealOpts.Migrate = true
|
|
|
|
resp, err = client.Sys().UnsealWithOptions(unsealOpts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatal("expected response")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if resp.Sealed {
|
|
|
|
t.Fatalf("expected unsealed state; got %#v", *resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
cluster.Cleanup()
|
|
|
|
cluster.Cores = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2019-10-18 18:46:00 +00:00
|
|
|
logger.SetLevel(hclog.Trace)
|
|
|
|
logger.Info("integ: verify autoseal and recovery key usage")
|
2018-10-23 06:34:02 +00:00
|
|
|
coreConfig.Seal = autoSeal
|
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, clusterConfig)
|
|
|
|
cluster.Start()
|
|
|
|
defer cluster.Cleanup()
|
|
|
|
|
|
|
|
core := cluster.Cores[0].Core
|
|
|
|
client := cluster.Cores[0].Client
|
|
|
|
client.SetToken(rootToken)
|
|
|
|
|
2018-11-05 19:06:39 +00:00
|
|
|
if err := core.UnsealWithStoredKeys(ctx); err != nil {
|
2018-10-23 06:34:02 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp, err := client.Sys().SealStatus()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatal("expected response")
|
|
|
|
}
|
|
|
|
if resp.Sealed {
|
|
|
|
t.Fatalf("expected unsealed state; got %#v", *resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
keyParts := [][]byte{}
|
|
|
|
for _, key := range keys {
|
|
|
|
raw, err := base64.StdEncoding.DecodeString(key)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
keyParts = append(keyParts, raw)
|
|
|
|
}
|
|
|
|
recoveredKey, err := shamir.Combine(keyParts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
sealAccess := core.SealAccess()
|
2018-11-05 19:06:39 +00:00
|
|
|
if err := sealAccess.VerifyRecoveryKey(ctx, recoveredKey); err != nil {
|
2018-10-23 06:34:02 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cluster.Cleanup()
|
|
|
|
cluster.Cores = nil
|
|
|
|
}
|
|
|
|
|
2019-03-04 22:11:56 +00:00
|
|
|
// We should see stored barrier keys; after the sixth test, we shouldn't
|
2018-11-05 19:06:39 +00:00
|
|
|
if entry, err := phys.Get(ctx, vault.StoredBarrierKeysPath); err != nil || entry == nil {
|
|
|
|
t.Fatalf("expected nil error and non-nil entry, got error %#v and entry %#v", err, entry)
|
|
|
|
}
|
|
|
|
|
2019-03-04 22:11:56 +00:00
|
|
|
altTestSeal := seal.NewTestSeal(nil)
|
2020-01-11 01:39:52 +00:00
|
|
|
altTestSeal.SetType("test-alternate")
|
2019-03-04 22:11:56 +00:00
|
|
|
altSeal := vault.NewAutoSeal(altTestSeal)
|
|
|
|
|
2018-10-23 06:34:02 +00:00
|
|
|
{
|
2019-10-18 18:46:00 +00:00
|
|
|
logger.SetLevel(hclog.Trace)
|
|
|
|
logger.Info("integ: migrate from auto-seal to auto-seal")
|
2018-10-23 06:34:02 +00:00
|
|
|
coreConfig.Seal = autoSeal
|
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, clusterConfig)
|
|
|
|
cluster.Start()
|
|
|
|
defer cluster.Cleanup()
|
|
|
|
|
|
|
|
core := cluster.Cores[0].Core
|
|
|
|
|
2019-06-20 19:14:58 +00:00
|
|
|
if err := adjustCoreForSealMigration(logger, core, altSeal, autoSeal); err != nil {
|
2019-03-04 22:11:56 +00:00
|
|
|
t.Fatal(err)
|
2018-10-23 06:34:02 +00:00
|
|
|
}
|
|
|
|
|
2019-03-04 22:11:56 +00:00
|
|
|
client := cluster.Cores[0].Client
|
|
|
|
client.SetToken(rootToken)
|
|
|
|
|
|
|
|
var resp *api.SealStatusResponse
|
|
|
|
unsealOpts := &api.UnsealOpts{}
|
|
|
|
for _, key := range keys {
|
|
|
|
unsealOpts.Key = key
|
|
|
|
unsealOpts.Migrate = true
|
|
|
|
resp, err = client.Sys().UnsealWithOptions(unsealOpts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatal("expected response")
|
|
|
|
}
|
2018-10-23 06:34:02 +00:00
|
|
|
}
|
2019-03-04 22:11:56 +00:00
|
|
|
if resp.Sealed {
|
|
|
|
t.Fatalf("expected unsealed state; got %#v", *resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
cluster.Cleanup()
|
|
|
|
cluster.Cores = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2019-10-18 18:46:00 +00:00
|
|
|
logger.SetLevel(hclog.Trace)
|
|
|
|
logger.Info("integ: create a Shamir seal and activate migration; verify it doesn't work if disabled isn't set.")
|
2019-03-04 22:11:56 +00:00
|
|
|
coreConfig.Seal = altSeal
|
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, clusterConfig)
|
|
|
|
cluster.Start()
|
|
|
|
defer cluster.Cleanup()
|
|
|
|
|
|
|
|
core := cluster.Cores[0].Core
|
|
|
|
|
2020-01-11 01:39:52 +00:00
|
|
|
if err := adjustCoreForSealMigration(logger, core, shamirwrapper, altSeal); err != nil {
|
2018-10-23 06:34:02 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
client := cluster.Cores[0].Client
|
|
|
|
client.SetToken(rootToken)
|
|
|
|
|
|
|
|
var resp *api.SealStatusResponse
|
|
|
|
unsealOpts := &api.UnsealOpts{}
|
|
|
|
for _, key := range keys {
|
|
|
|
unsealOpts.Key = key
|
|
|
|
unsealOpts.Migrate = false
|
|
|
|
resp, err = client.Sys().UnsealWithOptions(unsealOpts)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatal("expected error due to lack of migrate parameter")
|
|
|
|
}
|
|
|
|
unsealOpts.Migrate = true
|
|
|
|
resp, err = client.Sys().UnsealWithOptions(unsealOpts)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatal("expected response")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if resp.Sealed {
|
|
|
|
t.Fatalf("expected unsealed state; got %#v", *resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
cluster.Cleanup()
|
|
|
|
cluster.Cores = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2019-10-18 18:46:00 +00:00
|
|
|
logger.SetLevel(hclog.Trace)
|
|
|
|
logger.Info("integ: verify autoseal is off and the expected key shares work")
|
2020-01-11 01:39:52 +00:00
|
|
|
coreConfig.Seal = shamirwrapper
|
2018-10-23 06:34:02 +00:00
|
|
|
cluster := vault.NewTestCluster(t, coreConfig, clusterConfig)
|
|
|
|
cluster.Start()
|
|
|
|
defer cluster.Cleanup()
|
|
|
|
|
|
|
|
core := cluster.Cores[0].Core
|
|
|
|
client := cluster.Cores[0].Client
|
|
|
|
client.SetToken(rootToken)
|
|
|
|
|
2018-11-05 19:06:39 +00:00
|
|
|
if err := core.UnsealWithStoredKeys(ctx); err != nil {
|
2018-10-23 06:34:02 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp, err := client.Sys().SealStatus()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatal("expected response")
|
|
|
|
}
|
|
|
|
if !resp.Sealed {
|
|
|
|
t.Fatalf("expected sealed state; got %#v", *resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, key := range keys {
|
|
|
|
resp, err = client.Sys().Unseal(key)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatal("expected response")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if resp.Sealed {
|
|
|
|
t.Fatal("expected unsealed state")
|
|
|
|
}
|
|
|
|
|
|
|
|
cluster.Cleanup()
|
|
|
|
cluster.Cores = nil
|
|
|
|
}
|
|
|
|
}
|