2016-01-14 22:01:04 +00:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
2016-04-25 19:39:04 +00:00
|
|
|
"fmt"
|
2016-01-14 22:01:04 +00:00
|
|
|
"reflect"
|
|
|
|
"testing"
|
2016-04-04 14:44:22 +00:00
|
|
|
|
2016-08-19 20:45:17 +00:00
|
|
|
log "github.com/mgutz/logxi/v1"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/helper/logformat"
|
2016-04-04 14:44:22 +00:00
|
|
|
"github.com/hashicorp/vault/physical"
|
2016-01-14 22:01:04 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestCore_Rekey_Lifecycle(t *testing.T) {
|
2016-04-25 19:39:04 +00:00
|
|
|
bc, rc := TestSealDefConfigs()
|
2017-01-17 20:43:10 +00:00
|
|
|
bc.SecretShares = 1
|
|
|
|
bc.SecretThreshold = 1
|
|
|
|
bc.StoredShares = 0
|
2016-04-25 19:39:04 +00:00
|
|
|
c, masterKeys, recoveryKeys, _ := TestCoreUnsealedWithConfigs(t, bc, rc)
|
2017-01-17 20:43:10 +00:00
|
|
|
if len(masterKeys) != 1 {
|
|
|
|
t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
|
|
|
|
}
|
|
|
|
testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
|
|
|
|
|
|
|
|
bc, rc = TestSealDefConfigs()
|
|
|
|
c, masterKeys, recoveryKeys, _ = TestCoreUnsealedWithConfigs(t, bc, rc)
|
2016-04-25 19:39:04 +00:00
|
|
|
if len(masterKeys) != 3 {
|
|
|
|
t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
|
|
|
|
}
|
|
|
|
testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
|
|
|
|
testCore_Rekey_Lifecycle_Common(t, c, recoveryKeys, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
|
2016-01-14 22:01:04 +00:00
|
|
|
// Verify update not allowed
|
2016-04-25 19:39:04 +00:00
|
|
|
if _, err := c.RekeyUpdate(masterKeys[0], "", recovery); err == nil {
|
|
|
|
t.Fatalf("no rekey should be in progress")
|
2016-01-14 22:01:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Should be no progress
|
2016-04-25 19:39:04 +00:00
|
|
|
num, err := c.RekeyProgress(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if num != 0 {
|
|
|
|
t.Fatalf("bad: %d", num)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should be no config
|
2016-04-25 19:39:04 +00:00
|
|
|
conf, err := c.RekeyConfig(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if conf != nil {
|
|
|
|
t.Fatalf("bad: %v", conf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cancel should be idempotent
|
2016-04-04 14:44:22 +00:00
|
|
|
err = c.RekeyCancel(false)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a rekey
|
|
|
|
newConf := &SealConfig{
|
|
|
|
SecretThreshold: 3,
|
|
|
|
SecretShares: 5,
|
|
|
|
}
|
2016-04-25 19:39:04 +00:00
|
|
|
err = c.RekeyInit(newConf, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should get config
|
2016-04-25 19:39:04 +00:00
|
|
|
conf, err = c.RekeyConfig(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
newConf.Nonce = conf.Nonce
|
|
|
|
if !reflect.DeepEqual(conf, newConf) {
|
|
|
|
t.Fatalf("bad: %v", conf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cancel should be clear
|
2016-04-25 19:39:04 +00:00
|
|
|
err = c.RekeyCancel(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should be no config
|
2016-04-25 19:39:04 +00:00
|
|
|
conf, err = c.RekeyConfig(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if conf != nil {
|
|
|
|
t.Fatalf("bad: %v", conf)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCore_Rekey_Init(t *testing.T) {
|
|
|
|
c, _, _ := TestCoreUnsealed(t)
|
2016-04-25 19:39:04 +00:00
|
|
|
testCore_Rekey_Init_Common(t, c, false)
|
2016-01-14 22:01:04 +00:00
|
|
|
|
2016-04-25 19:39:04 +00:00
|
|
|
bc, rc := TestSealDefConfigs()
|
|
|
|
c, _, _, _ = TestCoreUnsealedWithConfigs(t, bc, rc)
|
|
|
|
testCore_Rekey_Init_Common(t, c, false)
|
|
|
|
testCore_Rekey_Init_Common(t, c, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testCore_Rekey_Init_Common(t *testing.T, c *Core, recovery bool) {
|
2016-01-14 22:01:04 +00:00
|
|
|
// Try an invalid config
|
|
|
|
badConf := &SealConfig{
|
|
|
|
SecretThreshold: 5,
|
|
|
|
SecretShares: 1,
|
|
|
|
}
|
2016-04-25 19:39:04 +00:00
|
|
|
err := c.RekeyInit(badConf, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("should fail")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a rekey
|
|
|
|
newConf := &SealConfig{
|
|
|
|
SecretThreshold: 3,
|
|
|
|
SecretShares: 5,
|
|
|
|
}
|
2016-04-25 19:39:04 +00:00
|
|
|
err = c.RekeyInit(newConf, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Second should fail
|
2016-04-25 19:39:04 +00:00
|
|
|
err = c.RekeyInit(newConf, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("should fail")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCore_Rekey_Update(t *testing.T) {
|
2016-04-25 19:39:04 +00:00
|
|
|
bc, rc := TestSealDefConfigs()
|
2017-01-17 20:43:10 +00:00
|
|
|
bc.SecretShares = 1
|
|
|
|
bc.SecretThreshold = 1
|
|
|
|
bc.StoredShares = 0
|
|
|
|
c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, rc)
|
|
|
|
testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
|
|
|
|
|
|
|
|
bc, rc = TestSealDefConfigs()
|
2016-04-25 19:39:04 +00:00
|
|
|
bc.StoredShares = 0
|
|
|
|
c, masterKeys, recoveryKeys, root := TestCoreUnsealedWithConfigs(t, bc, rc)
|
|
|
|
testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
|
|
|
|
testCore_Rekey_Update_Common(t, c, recoveryKeys, root, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testCore_Rekey_Update_Common(t *testing.T, c *Core, keys [][]byte, root string, recovery bool) {
|
2016-01-14 22:01:04 +00:00
|
|
|
// Start a rekey
|
2016-04-28 17:13:03 +00:00
|
|
|
var expType string
|
|
|
|
if recovery {
|
|
|
|
expType = c.seal.RecoveryType()
|
|
|
|
} else {
|
|
|
|
expType = c.seal.BarrierType()
|
|
|
|
}
|
|
|
|
|
2016-01-14 22:01:04 +00:00
|
|
|
newConf := &SealConfig{
|
2016-04-28 17:13:03 +00:00
|
|
|
Type: expType,
|
2016-01-14 22:01:04 +00:00
|
|
|
SecretThreshold: 3,
|
|
|
|
SecretShares: 5,
|
|
|
|
}
|
2016-04-25 19:39:04 +00:00
|
|
|
err := c.RekeyInit(newConf, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch new config with generated nonce
|
2016-04-25 19:39:04 +00:00
|
|
|
rkconf, err := c.RekeyConfig(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if rkconf == nil {
|
|
|
|
t.Fatalf("bad: no rekey config received")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Provide the master
|
2016-04-25 19:39:04 +00:00
|
|
|
var result *RekeyResult
|
|
|
|
for _, key := range keys {
|
|
|
|
result, err = c.RekeyUpdate(key, rkconf.Nonce, recovery)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if result != nil {
|
|
|
|
break
|
|
|
|
}
|
2016-01-14 22:01:04 +00:00
|
|
|
}
|
2017-01-17 20:43:10 +00:00
|
|
|
if result == nil || len(result.SecretShares) != newConf.SecretShares {
|
2016-01-14 22:01:04 +00:00
|
|
|
t.Fatalf("Bad: %#v", result)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should be no progress
|
2016-04-25 19:39:04 +00:00
|
|
|
num, err := c.RekeyProgress(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if num != 0 {
|
|
|
|
t.Fatalf("bad: %d", num)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should be no config
|
2016-04-25 19:39:04 +00:00
|
|
|
conf, err := c.RekeyConfig(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if conf != nil {
|
|
|
|
t.Fatalf("bad: %v", conf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SealConfig should update
|
2016-04-25 19:39:04 +00:00
|
|
|
var sealConf *SealConfig
|
|
|
|
if recovery {
|
|
|
|
sealConf, err = c.seal.RecoveryConfig()
|
|
|
|
} else {
|
|
|
|
sealConf, err = c.seal.BarrierConfig()
|
|
|
|
}
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
if sealConf == nil {
|
|
|
|
t.Fatal("seal configuration is nil")
|
|
|
|
}
|
2016-01-14 22:01:04 +00:00
|
|
|
|
|
|
|
newConf.Nonce = rkconf.Nonce
|
2016-04-04 14:44:22 +00:00
|
|
|
if !reflect.DeepEqual(sealConf, newConf) {
|
2016-04-28 17:13:03 +00:00
|
|
|
t.Fatalf("\nexpected: %#v\nactual: %#v\nexpType: %s\nrecovery: %t", newConf, sealConf, expType, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
}
|
|
|
|
|
2016-04-25 19:39:04 +00:00
|
|
|
// Attempt unseal if this was not recovery mode
|
|
|
|
if !recovery {
|
|
|
|
err = c.Seal(root)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-04-25 19:39:04 +00:00
|
|
|
for i := 0; i < 3; i++ {
|
2017-02-17 04:09:39 +00:00
|
|
|
_, err = TestCoreUnseal(c, TestKeyCopy(result.SecretShares[i]))
|
2016-04-25 19:39:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if sealed, _ := c.Sealed(); sealed {
|
|
|
|
t.Fatalf("should be unsealed")
|
|
|
|
}
|
2016-01-14 22:01:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start another rekey, this time we require a quorum!
|
|
|
|
newConf = &SealConfig{
|
2016-04-28 17:13:03 +00:00
|
|
|
Type: expType,
|
2016-01-14 22:01:04 +00:00
|
|
|
SecretThreshold: 1,
|
|
|
|
SecretShares: 1,
|
|
|
|
}
|
2016-04-25 19:39:04 +00:00
|
|
|
err = c.RekeyInit(newConf, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch new config with generated nonce
|
2016-04-25 19:39:04 +00:00
|
|
|
rkconf, err = c.RekeyConfig(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if rkconf == nil {
|
|
|
|
t.Fatalf("bad: no rekey config received")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Provide the parts master
|
|
|
|
oldResult := result
|
|
|
|
for i := 0; i < 3; i++ {
|
2017-02-17 04:09:39 +00:00
|
|
|
result, err = c.RekeyUpdate(TestKeyCopy(oldResult.SecretShares[i]), rkconf.Nonce, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should be progress
|
2016-04-25 19:39:04 +00:00
|
|
|
num, err := c.RekeyProgress(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if (i == 2 && num != 0) || (i != 2 && num != i+1) {
|
|
|
|
t.Fatalf("bad: %d", num)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if result == nil || len(result.SecretShares) != 1 {
|
|
|
|
t.Fatalf("Bad: %#v", result)
|
|
|
|
}
|
|
|
|
|
2016-04-25 19:39:04 +00:00
|
|
|
// Attempt unseal if this was not recovery mode
|
|
|
|
if !recovery {
|
|
|
|
err = c.Seal(root)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-08-15 13:42:42 +00:00
|
|
|
unseal, err := TestCoreUnseal(c, result.SecretShares[0])
|
2016-04-25 19:39:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !unseal {
|
|
|
|
t.Fatalf("should be unsealed")
|
|
|
|
}
|
2016-01-14 22:01:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// SealConfig should update
|
2016-04-25 19:39:04 +00:00
|
|
|
if recovery {
|
|
|
|
sealConf, err = c.seal.RecoveryConfig()
|
|
|
|
} else {
|
|
|
|
sealConf, err = c.seal.BarrierConfig()
|
|
|
|
}
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
|
2016-01-14 22:01:04 +00:00
|
|
|
newConf.Nonce = rkconf.Nonce
|
2016-04-04 14:44:22 +00:00
|
|
|
if !reflect.DeepEqual(sealConf, newConf) {
|
|
|
|
t.Fatalf("bad: %#v", sealConf)
|
2016-01-14 22:01:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-25 19:39:04 +00:00
|
|
|
func TestCore_Rekey_Invalid(t *testing.T) {
|
|
|
|
bc, rc := TestSealDefConfigs()
|
|
|
|
bc.StoredShares = 0
|
|
|
|
bc.SecretShares = 1
|
|
|
|
bc.SecretThreshold = 1
|
|
|
|
rc.SecretShares = 1
|
|
|
|
rc.SecretThreshold = 1
|
|
|
|
c, masterKeys, recoveryKeys, _ := TestCoreUnsealedWithConfigs(t, bc, rc)
|
|
|
|
testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
|
|
|
testCore_Rekey_Invalid_Common(t, c, recoveryKeys, true)
|
|
|
|
}
|
2016-01-14 22:01:04 +00:00
|
|
|
|
2016-04-25 19:39:04 +00:00
|
|
|
func testCore_Rekey_Invalid_Common(t *testing.T, c *Core, keys [][]byte, recovery bool) {
|
2016-01-14 22:01:04 +00:00
|
|
|
// Start a rekey
|
|
|
|
newConf := &SealConfig{
|
|
|
|
SecretThreshold: 3,
|
|
|
|
SecretShares: 5,
|
|
|
|
}
|
2016-04-25 19:39:04 +00:00
|
|
|
err := c.RekeyInit(newConf, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch new config with generated nonce
|
2016-04-25 19:39:04 +00:00
|
|
|
rkconf, err := c.RekeyConfig(recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if rkconf == nil {
|
|
|
|
t.Fatalf("bad: no rekey config received")
|
|
|
|
}
|
|
|
|
|
2016-04-25 19:39:04 +00:00
|
|
|
// Provide the nonce (invalid)
|
|
|
|
_, err = c.RekeyUpdate(keys[0], "abcd", recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected error")
|
|
|
|
}
|
|
|
|
|
2016-04-25 19:39:04 +00:00
|
|
|
// Provide the key (invalid)
|
|
|
|
key := keys[0]
|
|
|
|
oldkeystr := fmt.Sprintf("%#v", key)
|
|
|
|
key[0]++
|
|
|
|
newkeystr := fmt.Sprintf("%#v", key)
|
|
|
|
ret, err := c.RekeyUpdate(key, rkconf.Nonce, recovery)
|
2016-01-14 22:01:04 +00:00
|
|
|
if err == nil {
|
2016-04-25 19:39:04 +00:00
|
|
|
t.Fatalf("expected error, ret is %#v\noldkeystr: %s\nnewkeystr: %s", *ret, oldkeystr, newkeystr)
|
2016-01-14 22:01:04 +00:00
|
|
|
}
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
|
|
|
|
func TestCore_Standby_Rekey(t *testing.T) {
|
|
|
|
// Create the first core and initialize it
|
2016-08-19 20:45:17 +00:00
|
|
|
logger := logformat.NewVaultLogger(log.LevelTrace)
|
|
|
|
|
2016-04-26 03:10:32 +00:00
|
|
|
inm := physical.NewInmem(logger)
|
|
|
|
inmha := physical.NewInmemHA(logger)
|
2016-08-15 13:42:42 +00:00
|
|
|
redirectOriginal := "http://127.0.0.1:8200"
|
2016-04-04 14:44:22 +00:00
|
|
|
core, err := NewCore(&CoreConfig{
|
2016-08-15 13:42:42 +00:00
|
|
|
Physical: inm,
|
|
|
|
HAPhysical: inmha,
|
|
|
|
RedirectAddr: redirectOriginal,
|
|
|
|
DisableMlock: true,
|
2017-01-17 20:43:10 +00:00
|
|
|
DisableCache: true,
|
2016-04-04 14:44:22 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2017-01-17 20:43:10 +00:00
|
|
|
keys, root := TestCoreInit(t, core)
|
|
|
|
for _, key := range keys {
|
|
|
|
if _, err := TestCoreUnseal(core, TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core to become active
|
2016-08-15 13:42:42 +00:00
|
|
|
TestWaitActive(t, core)
|
2016-04-04 14:44:22 +00:00
|
|
|
|
|
|
|
// Create a second core, attached to same in-memory store
|
2016-08-15 13:42:42 +00:00
|
|
|
redirectOriginal2 := "http://127.0.0.1:8500"
|
2016-04-04 14:44:22 +00:00
|
|
|
core2, err := NewCore(&CoreConfig{
|
2016-08-15 13:42:42 +00:00
|
|
|
Physical: inm,
|
|
|
|
HAPhysical: inmha,
|
|
|
|
RedirectAddr: redirectOriginal2,
|
|
|
|
DisableMlock: true,
|
2017-01-17 20:43:10 +00:00
|
|
|
DisableCache: true,
|
2016-04-04 14:44:22 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2017-01-17 20:43:10 +00:00
|
|
|
for _, key := range keys {
|
|
|
|
if _, err := TestCoreUnseal(core2, TestKeyCopy(key)); err != nil {
|
|
|
|
t.Fatalf("unseal err: %s", err)
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Rekey the master key
|
|
|
|
newConf := &SealConfig{
|
|
|
|
SecretShares: 1,
|
|
|
|
SecretThreshold: 1,
|
|
|
|
}
|
|
|
|
err = core.RekeyInit(newConf, false)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
// Fetch new config with generated nonce
|
|
|
|
rkconf, err := core.RekeyConfig(false)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if rkconf == nil {
|
|
|
|
t.Fatalf("bad: no rekey config received")
|
|
|
|
}
|
2017-01-17 20:43:10 +00:00
|
|
|
var rekeyResult *RekeyResult
|
|
|
|
for _, key := range keys {
|
|
|
|
rekeyResult, err = core.RekeyUpdate(key, rkconf.Nonce, false)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-04-04 14:44:22 +00:00
|
|
|
}
|
2017-01-17 20:43:10 +00:00
|
|
|
if rekeyResult == nil {
|
2016-04-04 14:44:22 +00:00
|
|
|
t.Fatalf("rekey failed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seal the first core, should step down
|
|
|
|
err = core.Seal(root)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for core2 to become active
|
2016-08-15 13:42:42 +00:00
|
|
|
TestWaitActive(t, core2)
|
2016-04-04 14:44:22 +00:00
|
|
|
|
|
|
|
// Rekey the master key again
|
|
|
|
err = core2.RekeyInit(newConf, false)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
// Fetch new config with generated nonce
|
|
|
|
rkconf, err = core2.RekeyConfig(false)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if rkconf == nil {
|
|
|
|
t.Fatalf("bad: no rekey config received")
|
|
|
|
}
|
2017-01-17 20:43:10 +00:00
|
|
|
var rekeyResult2 *RekeyResult
|
|
|
|
for _, key := range rekeyResult.SecretShares {
|
|
|
|
rekeyResult2, err = core2.RekeyUpdate(key, rkconf.Nonce, false)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if rekeyResult2 == nil {
|
|
|
|
t.Fatalf("rekey failed")
|
|
|
|
}
|
|
|
|
|
2016-04-04 14:44:22 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2017-01-17 20:43:10 +00:00
|
|
|
if rekeyResult2 == nil {
|
2016-04-04 14:44:22 +00:00
|
|
|
t.Fatalf("rekey failed")
|
|
|
|
}
|
|
|
|
}
|