Fix up PGP tests from earlier code fixes

This commit is contained in:
Jeff Mitchell 2016-01-08 22:21:41 -05:00
parent a99787afeb
commit a2bd31d493
2 changed files with 13 additions and 5 deletions

View File

@ -7,6 +7,7 @@ import (
"io/ioutil"
"reflect"
"regexp"
"sort"
"testing"
"github.com/hashicorp/vault/vault"
@ -58,7 +59,7 @@ func getPubKeyFiles(t *testing.T) (string, []string, error) {
func parseDecryptAndTestUnsealKeys(t *testing.T,
input, rootToken string,
fingerprints bool,
backupKeys map[string]string,
backupKeys map[string][]string,
core *vault.Core) {
decoder := base64.StdEncoding
priv1Bytes, err := decoder.DecodeString(privKey1)
@ -112,9 +113,10 @@ func parseDecryptAndTestUnsealKeys(t *testing.T,
}
if backupKeys != nil && len(matchedFingerprints) != 0 {
testMap := map[string]string{}
testMap := map[string][]string{}
for i, v := range matchedFingerprints {
testMap[v] = encodedKeys[i]
testMap[v] = append(testMap[v], encodedKeys[i])
sort.Strings(testMap[v])
}
if !reflect.DeepEqual(testMap, backupKeys) {
t.Fatalf("test map and backup map do not match, test map is\n%#v\nbackup map is\n%#v", testMap, backupKeys)

View File

@ -3,6 +3,7 @@ package command
import (
"encoding/hex"
"os"
"sort"
"strings"
"testing"
"time"
@ -223,7 +224,7 @@ func TestRekey_init_pgp(t *testing.T) {
}
type backupStruct struct {
Keys map[string]string
Keys map[string][]string
}
backupVals := &backupStruct{}
@ -242,7 +243,7 @@ func TestRekey_init_pgp(t *testing.T) {
t.Fatalf("nonce mismatch between rekey and backed-up keys")
}
backupVals.Keys = resp.Data["keys"].(map[string]string)
backupVals.Keys = resp.Data["keys"].(map[string][]string)
// Now delete and try again; the values should be inaccessible
req = logical.TestRequest(t, logical.DeleteOperation, "rekey/backup")
@ -262,5 +263,10 @@ func TestRekey_init_pgp(t *testing.T) {
t.Fatalf("keys found when they should have been deleted")
}
// Sort, because it'll be tested with DeepEqual later
for k, _ := range backupVals.Keys {
sort.Strings(backupVals.Keys[k])
}
parseDecryptAndTestUnsealKeys(t, ui.OutputWriter.String(), token, true, backupVals.Keys, core)
}