package vault import ( "context" "encoding/json" "reflect" "strings" "testing" "time" "github.com/armon/go-metrics" "github.com/go-test/deep" "github.com/hashicorp/vault/audit" "github.com/hashicorp/vault/helper/metricsutil" "github.com/hashicorp/vault/helper/namespace" "github.com/hashicorp/vault/sdk/helper/compressutil" "github.com/hashicorp/vault/sdk/helper/jsonutil" "github.com/hashicorp/vault/sdk/logical" ) func TestMount_ReadOnlyViewDuringMount(t *testing.T) { c, _, _ := TestCoreUnsealed(t) c.logicalBackends["noop"] = func(ctx context.Context, config *logical.BackendConfig) (logical.Backend, error) { err := config.StorageView.Put(ctx, &logical.StorageEntry{ Key: "bar", Value: []byte("baz"), }) if err == nil || !strings.Contains(err.Error(), logical.ErrSetupReadOnly.Error()) { t.Fatalf("expected a read-only error") } return &NoopBackend{}, nil } me := &MountEntry{ Table: mountTableType, Path: "foo", Type: "noop", } err := c.mount(namespace.RootContext(nil), me) if err != nil { t.Fatalf("err: %v", err) } } func TestLogicalMountMetrics(t *testing.T) { c, _, _, _ := TestCoreUnsealedWithMetrics(t) c.logicalBackends["noop"] = func(ctx context.Context, config *logical.BackendConfig) (logical.Backend, error) { return &NoopBackend{ BackendType: logical.TypeLogical, }, nil } mountKeyName := "core.mount_table.num_entries.type|logical||local|false||" mountMetrics := &c.metricsHelper.LoopMetrics.Metrics loadMetric, ok := mountMetrics.Load(mountKeyName) var numEntriesMetric metricsutil.GaugeMetric = loadMetric.(metricsutil.GaugeMetric) // 3 default nonlocal logical backends if !ok || numEntriesMetric.Value != 3 { t.Fatalf("Auth values should be: %+v", numEntriesMetric) } me := &MountEntry{ Table: mountTableType, Path: "foo", Type: "noop", } err := c.mount(namespace.RootContext(nil), me) if err != nil { t.Fatalf("err: %v", err) } mountMetrics = &c.metricsHelper.LoopMetrics.Metrics loadMetric, ok = mountMetrics.Load(mountKeyName) numEntriesMetric = loadMetric.(metricsutil.GaugeMetric) if !ok || numEntriesMetric.Value != 4 { t.Fatalf("mount metrics for num entries do not match true values") } if len(numEntriesMetric.Key) != 3 || numEntriesMetric.Key[0] != "core" || numEntriesMetric.Key[1] != "mount_table" || numEntriesMetric.Key[2] != "num_entries" { t.Fatalf("mount metrics for num entries have wrong key") } if len(numEntriesMetric.Labels) != 2 || numEntriesMetric.Labels[0].Name != "type" || numEntriesMetric.Labels[0].Value != "logical" || numEntriesMetric.Labels[1].Name != "local" || numEntriesMetric.Labels[1].Value != "false" { t.Fatalf("mount metrics for num entries have wrong labels") } mountSizeKeyName := "core.mount_table.size.type|logical||local|false||" loadMetric, ok = mountMetrics.Load(mountSizeKeyName) sizeMetric := loadMetric.(metricsutil.GaugeMetric) if !ok { t.Fatalf("mount metrics for size do not match exist") } if len(sizeMetric.Key) != 3 || sizeMetric.Key[0] != "core" || sizeMetric.Key[1] != "mount_table" || sizeMetric.Key[2] != "size" { t.Fatalf("mount metrics for size have wrong key") } if len(sizeMetric.Labels) != 2 || sizeMetric.Labels[0].Name != "type" || sizeMetric.Labels[0].Value != "logical" || sizeMetric.Labels[1].Name != "local" || sizeMetric.Labels[1].Value != "false" { t.Fatalf("mount metrics for size have wrong labels") } } func TestCore_DefaultMountTable(t *testing.T) { c, keys, _ := TestCoreUnsealed(t) verifyDefaultTable(t, c.mounts, 4) // Start a second core with same physical inmemSink := metrics.NewInmemSink(1000000*time.Hour, 2000000*time.Hour) conf := &CoreConfig{ Physical: c.physical, DisableMlock: true, BuiltinRegistry: NewMockBuiltinRegistry(), MetricSink: metricsutil.NewClusterMetricSink("test-cluster", inmemSink), MetricsHelper: metricsutil.NewMetricsHelper(inmemSink, false), } c2, err := NewCore(conf) if err != nil { t.Fatalf("err: %v", err) } defer c2.Shutdown() for i, key := range keys { unseal, err := TestCoreUnseal(c2, key) if err != nil { t.Fatalf("err: %v", err) } if i+1 == len(keys) && !unseal { t.Fatalf("should be unsealed") } } if diff := deep.Equal(c.mounts.sortEntriesByPath(), c2.mounts.sortEntriesByPath()); len(diff) > 0 { t.Fatalf("mismatch: %v", diff) } } func TestCore_Mount(t *testing.T) { c, keys, _ := TestCoreUnsealed(t) me := &MountEntry{ Table: mountTableType, Path: "foo", Type: "kv", } err := c.mount(namespace.RootContext(nil), me) if err != nil { t.Fatalf("err: %v", err) } match := c.router.MatchingMount(namespace.RootContext(nil), "foo/bar") if match != "foo/" { t.Fatalf("missing mount") } inmemSink := metrics.NewInmemSink(1000000*time.Hour, 2000000*time.Hour) conf := &CoreConfig{ Physical: c.physical, DisableMlock: true, BuiltinRegistry: NewMockBuiltinRegistry(), MetricSink: metricsutil.NewClusterMetricSink("test-cluster", inmemSink), MetricsHelper: metricsutil.NewMetricsHelper(inmemSink, false), } c2, err := NewCore(conf) if err != nil { t.Fatalf("err: %v", err) } defer c2.Shutdown() for i, key := range keys { unseal, err := TestCoreUnseal(c2, key) if err != nil { t.Fatalf("err: %v", err) } if i+1 == len(keys) && !unseal { t.Fatalf("should be unsealed") } } // Verify matching mount tables if diff := deep.Equal(c.mounts.sortEntriesByPath(), c2.mounts.sortEntriesByPath()); len(diff) > 0 { t.Fatalf("mismatch: %v", diff) } } func TestCore_Mount_secrets_builtin_RunningVersion(t *testing.T) { c, _, _ := TestCoreUnsealed(t) me := &MountEntry{ Table: mountTableType, Path: "foo", Type: "generic", } err := c.mount(namespace.RootContext(nil), me) if err != nil { t.Fatalf("err: %v", err) } match := c.router.MatchingMount(namespace.RootContext(nil), "foo/bar") if match != "foo/" { t.Fatalf("missing mount") } raw, _ := c.router.root.Get(match) // we override the running version of builtins if !strings.Contains(raw.(*routeEntry).mountEntry.RunningVersion, "builtin") { t.Errorf("Expected mount to have builtin version but got %s", raw.(*routeEntry).mountEntry.RunningVersion) } } // TestCore_Mount_kv_generic tests that we can successfully mount kv using the // kv alias "generic" func TestCore_Mount_kv_generic(t *testing.T) { c, keys, _ := TestCoreUnsealed(t) me := &MountEntry{ Table: mountTableType, Path: "foo", Type: "generic", } err := c.mount(namespace.RootContext(nil), me) if err != nil { t.Fatalf("err: %v", err) } match := c.router.MatchingMount(namespace.RootContext(nil), "foo/bar") if match != "foo/" { t.Fatalf("missing mount") } inmemSink := metrics.NewInmemSink(1000000*time.Hour, 2000000*time.Hour) conf := &CoreConfig{ Physical: c.physical, DisableMlock: true, BuiltinRegistry: NewMockBuiltinRegistry(), MetricSink: metricsutil.NewClusterMetricSink("test-cluster", inmemSink), MetricsHelper: metricsutil.NewMetricsHelper(inmemSink, false), } c2, err := NewCore(conf) if err != nil { t.Fatalf("err: %v", err) } defer c2.Shutdown() for i, key := range keys { unseal, err := TestCoreUnseal(c2, key) if err != nil { t.Fatalf("err: %v", err) } if i+1 == len(keys) && !unseal { t.Fatalf("should be unsealed") } } // Verify matching mount tables if diff := deep.Equal(c.mounts.sortEntriesByPath(), c2.mounts.sortEntriesByPath()); len(diff) > 0 { t.Fatalf("mismatch: %v", diff) } } // Test that the local table actually gets populated as expected with local // entries, and that upon reading the entries from both are recombined // correctly func TestCore_Mount_Local(t *testing.T) { c, _, _ := TestCoreUnsealed(t) c.mounts = &MountTable{ Type: mountTableType, Entries: []*MountEntry{ { Table: mountTableType, Path: "noop/", Type: "kv", UUID: "abcd", Accessor: "kv-abcd", BackendAwareUUID: "abcde", NamespaceID: namespace.RootNamespaceID, namespace: namespace.RootNamespace, }, { Table: mountTableType, Path: "noop2/", Type: "kv", UUID: "bcde", Accessor: "kv-bcde", BackendAwareUUID: "bcdea", NamespaceID: namespace.RootNamespaceID, namespace: namespace.RootNamespace, }, }, } // Both should set up successfully err := c.setupMounts(namespace.RootContext(nil)) if err != nil { t.Fatal(err) } if len(c.mounts.Entries) != 2 { t.Fatalf("expected two entries, got %d", len(c.mounts.Entries)) } rawLocal, err := c.barrier.Get(context.Background(), coreLocalMountConfigPath) if err != nil { t.Fatal(err) } if rawLocal == nil { t.Fatal("expected non-nil local mounts") } localMountsTable := &MountTable{} if err := jsonutil.DecodeJSON(rawLocal.Value, localMountsTable); err != nil { t.Fatal(err) } if len(localMountsTable.Entries) != 1 || localMountsTable.Entries[0].Type != "cubbyhole" { t.Fatalf("expected only cubbyhole entry in local mount table, got %#v", localMountsTable) } c.mounts.Entries[1].Local = true if err := c.persistMounts(context.Background(), c.mounts, nil); err != nil { t.Fatal(err) } rawLocal, err = c.barrier.Get(context.Background(), coreLocalMountConfigPath) if err != nil { t.Fatal(err) } if rawLocal == nil { t.Fatal("expected non-nil local mount") } localMountsTable = &MountTable{} if err := jsonutil.DecodeJSON(rawLocal.Value, localMountsTable); err != nil { t.Fatal(err) } // This requires some explanation: because we're directly munging the mount // table, the table initially when core unseals contains cubbyhole as per // above, but then we overwrite it with our own table with one local entry, // so we should now only expect the noop2 entry if len(localMountsTable.Entries) != 1 || localMountsTable.Entries[0].Path != "noop2/" { t.Fatalf("expected one entry in local mount table, got %#v", localMountsTable) } oldMounts := c.mounts if err := c.loadMounts(context.Background()); err != nil { t.Fatal(err) } compEntries := c.mounts.Entries[:0] // Filter out required mounts for _, v := range c.mounts.Entries { if v.Type == "kv" { compEntries = append(compEntries, v) } } c.mounts.Entries = compEntries if !reflect.DeepEqual(oldMounts, c.mounts) { t.Fatalf("expected\n%#v\ngot\n%#v\n", oldMounts, c.mounts) } if len(c.mounts.Entries) != 2 { t.Fatalf("expected two mount entries, got %#v", localMountsTable) } } func TestCore_FindOps(t *testing.T) { c, _, _ := TestCoreUnsealed(t) uuid1 := "80DA741F-3997-4179-B531-EBD7371DFA86" uuid2 := "0178594D-F267-445A-89A3-5B5DFC4A4C0F" path1 := "kv1" path2 := "kv2" c.mounts = &MountTable{ Type: mountTableType, Entries: []*MountEntry{ { Table: mountTableType, Path: path1, Type: "kv", UUID: "abcd", Accessor: "kv-abcd", BackendAwareUUID: uuid1, NamespaceID: namespace.RootNamespaceID, namespace: namespace.RootNamespace, }, { Table: mountTableType, Path: path2, Type: "kv", UUID: "bcde", Accessor: "kv-bcde", BackendAwareUUID: uuid2, NamespaceID: namespace.RootNamespaceID, namespace: namespace.RootNamespace, }, }, } // Both should set up successfully if err := c.setupMounts(namespace.RootContext(nil)); err != nil { t.Fatal(err) } if len(c.mounts.Entries) != 2 { t.Fatalf("expected two entries, got %d", len(c.mounts.Entries)) } // Unknown uuids/paths should return nil, nil entry, err := c.mounts.findByBackendUUID(namespace.RootContext(nil), "unknown") if err != nil || entry != nil { t.Fatalf("expected no errors nor matches got, error: %#v entry: %#v", err, entry) } entry, err = c.mounts.find(namespace.RootContext(nil), "unknown") if err != nil || entry != nil { t.Fatalf("expected no errors nor matches got, error: %#v entry: %#v", err, entry) } // Find our entry by its uuid entry, err = c.mounts.findByBackendUUID(namespace.RootContext(nil), uuid1) if err != nil || entry == nil { t.Fatalf("failed finding entry by uuid error: %#v entry: %#v", err, entry) } if entry.Path != path1 { t.Fatalf("found incorrect entry by uuid, entry should had a path of '%s': %#v", path1, entry) } // Find another entry by its path entry, err = c.mounts.find(namespace.RootContext(nil), path2) if err != nil || entry == nil { t.Fatalf("failed finding entry by path error: %#v entry: %#v", err, entry) } if entry.BackendAwareUUID != uuid2 { t.Fatalf("found incorrect entry by path, entry should had a uuid of '%s': %#v", uuid2, entry) } } func TestCore_Unmount(t *testing.T) { c, keys, _ := TestCoreUnsealed(t) err := c.unmount(namespace.RootContext(nil), "secret") if err != nil { t.Fatalf("err: %v", err) } match := c.router.MatchingMount(namespace.RootContext(nil), "secret/foo") if match != "" { t.Fatalf("backend present") } inmemSink := metrics.NewInmemSink(1000000*time.Hour, 2000000*time.Hour) conf := &CoreConfig{ Physical: c.physical, DisableMlock: true, BuiltinRegistry: NewMockBuiltinRegistry(), MetricSink: metricsutil.NewClusterMetricSink("test-cluster", inmemSink), MetricsHelper: metricsutil.NewMetricsHelper(inmemSink, false), } c2, err := NewCore(conf) if err != nil { t.Fatalf("err: %v", err) } defer c2.Shutdown() for i, key := range keys { unseal, err := TestCoreUnseal(c2, key) if err != nil { t.Fatalf("err: %v", err) } if i+1 == len(keys) && !unseal { t.Fatalf("should be unsealed") } } // Verify matching mount tables if diff := deep.Equal(c.mounts, c2.mounts); len(diff) > 0 { t.Fatalf("mismatch: %v", diff) } } func TestCore_Unmount_Cleanup(t *testing.T) { testCore_Unmount_Cleanup(t, false) testCore_Unmount_Cleanup(t, true) } func testCore_Unmount_Cleanup(t *testing.T, causeFailure bool) { noop := &NoopBackend{} c, _, root := TestCoreUnsealed(t) c.logicalBackends["noop"] = func(context.Context, *logical.BackendConfig) (logical.Backend, error) { return noop, nil } // Mount the noop backend me := &MountEntry{ Table: mountTableType, Path: "test/", Type: "noop", } if err := c.mount(namespace.RootContext(nil), me); err != nil { t.Fatalf("err: %v", err) } // Store the view view := c.router.MatchingStorageByAPIPath(namespace.RootContext(nil), "test/") // Inject data se := &logical.StorageEntry{ Key: "plstodelete", Value: []byte("test"), } if err := view.Put(context.Background(), se); err != nil { t.Fatalf("err: %v", err) } // Setup response resp := &logical.Response{ Secret: &logical.Secret{ LeaseOptions: logical.LeaseOptions{ TTL: time.Hour, }, }, Data: map[string]interface{}{ "foo": "bar", }, } noop.Response = resp // Generate leased secret r := &logical.Request{ Operation: logical.ReadOperation, Path: "test/foo", ClientToken: root, } r.SetTokenEntry(&logical.TokenEntry{ID: root, NamespaceID: "root", Policies: []string{"root"}}) resp, err := c.HandleRequest(namespace.RootContext(nil), r) if err != nil { t.Fatalf("err: %v", err) } if resp.Secret.LeaseID == "" { t.Fatalf("bad: %#v", resp) } if causeFailure { view.(*BarrierView).setReadOnlyErr(logical.ErrSetupReadOnly) } // Unmount, this should cleanup err = c.unmount(namespace.RootContext(nil), "test/") switch { case err != nil && causeFailure: case err == nil && causeFailure: t.Fatal("expected error") case err != nil: t.Fatalf("err: %v", err) } // Rollback should be invoked if noop.Requests[1].Operation != logical.RollbackOperation { t.Fatalf("bad: %#v", noop.Requests) } // Revoke should be invoked if noop.Requests[2].Operation != logical.RevokeOperation { t.Fatalf("bad: %#v", noop.Requests) } if noop.Requests[2].Path != "foo" { t.Fatalf("bad: %#v", noop.Requests) } // View should be empty out, err := logical.CollectKeys(context.Background(), view) if err != nil { t.Fatalf("err: %v", err) } switch { case len(out) == 1 && causeFailure: case len(out) == 0 && causeFailure: t.Fatal("expected a value") case len(out) != 0: t.Fatalf("bad: %#v", out) case !causeFailure: return } // At this point just in the failure case, check mounting if err := c.mount(namespace.RootContext(nil), me); err == nil { t.Fatal("expected error") } else { if !strings.Contains(err.Error(), "path is already in use at") { t.Fatalf("expected a path is already in use error, got %v", err) } } } func TestCore_Remount(t *testing.T) { c, keys, _ := TestCoreUnsealed(t) err := c.remountSecretsEngineCurrentNamespace(namespace.RootContext(nil), "secret", "foo", true) if err != nil { t.Fatalf("err: %v", err) } match := c.router.MatchingMount(namespace.RootContext(nil), "foo/bar") if match != "foo/" { t.Fatalf("failed remount") } c.sealInternal() for i, key := range keys { unseal, err := TestCoreUnseal(c, key) if err != nil { t.Fatalf("err: %v", err) } if i+1 == len(keys) && !unseal { t.Fatalf("should be unsealed") } } match = c.router.MatchingMount(namespace.RootContext(nil), "foo/bar") if match != "foo/" { t.Fatalf("failed remount") } } func TestCore_Remount_Cleanup(t *testing.T) { noop := &NoopBackend{} c, _, root := TestCoreUnsealed(t) c.logicalBackends["noop"] = func(context.Context, *logical.BackendConfig) (logical.Backend, error) { return noop, nil } // Mount the noop backend me := &MountEntry{ Table: mountTableType, Path: "test/", Type: "noop", } if err := c.mount(namespace.RootContext(nil), me); err != nil { t.Fatalf("err: %v", err) } // Store the view view := c.router.MatchingStorageByAPIPath(namespace.RootContext(nil), "test/") // Inject data se := &logical.StorageEntry{ Key: "plstokeep", Value: []byte("test"), } if err := view.Put(context.Background(), se); err != nil { t.Fatalf("err: %v", err) } // Setup response resp := &logical.Response{ Secret: &logical.Secret{ LeaseOptions: logical.LeaseOptions{ TTL: time.Hour, }, }, Data: map[string]interface{}{ "foo": "bar", }, } noop.Response = resp // Generate leased secret r := &logical.Request{ Operation: logical.ReadOperation, Path: "test/foo", ClientToken: root, } r.SetTokenEntry(&logical.TokenEntry{ID: root, NamespaceID: "root", Policies: []string{"root"}}) resp, err := c.HandleRequest(namespace.RootContext(nil), r) if err != nil { t.Fatalf("err: %v", err) } if resp.Secret.LeaseID == "" { t.Fatalf("bad: %#v", resp) } // Remount, this should cleanup if err := c.remountSecretsEngineCurrentNamespace(namespace.RootContext(nil), "test/", "new/", true); err != nil { t.Fatalf("err: %v", err) } // Rollback should be invoked if noop.Requests[1].Operation != logical.RollbackOperation { t.Fatalf("bad: %#v", noop.Requests) } // Revoke should be invoked if noop.Requests[2].Operation != logical.RevokeOperation { t.Fatalf("bad: %#v", noop.Requests) } if noop.Requests[2].Path != "foo" { t.Fatalf("bad: %#v", noop.Requests) } // View should not be empty out, err := logical.CollectKeys(context.Background(), view) if err != nil { t.Fatalf("err: %v", err) } if len(out) != 1 && out[0] != "plstokeep" { t.Fatalf("bad: %#v", out) } } func TestCore_Remount_Protected(t *testing.T) { c, _, _ := TestCoreUnsealed(t) err := c.remountSecretsEngineCurrentNamespace(namespace.RootContext(nil), "sys", "foo", true) if err.Error() != `cannot remount "sys/"` { t.Fatalf("err: %v", err) } } func TestDefaultMountTable(t *testing.T) { c, _, _ := TestCoreUnsealed(t) table := c.defaultMountTable() verifyDefaultTable(t, table, 3) } func TestCore_MountTable_UpgradeToTyped(t *testing.T) { c, _, _ := TestCoreUnsealed(t) c.auditBackends["noop"] = func(ctx context.Context, config *audit.BackendConfig) (audit.Backend, error) { return &NoopAudit{ Config: config, }, nil } me := &MountEntry{ Table: auditTableType, Path: "foo", Type: "noop", } err := c.enableAudit(namespace.RootContext(nil), me, true) if err != nil { t.Fatalf("err: %v", err) } c.credentialBackends["noop"] = func(context.Context, *logical.BackendConfig) (logical.Backend, error) { return &NoopBackend{ BackendType: logical.TypeCredential, }, nil } me = &MountEntry{ Table: credentialTableType, Path: "foo", Type: "noop", } err = c.enableCredential(namespace.RootContext(nil), me) if err != nil { t.Fatalf("err: %v", err) } testCore_MountTable_UpgradeToTyped_Common(t, c, "mounts") testCore_MountTable_UpgradeToTyped_Common(t, c, "audits") testCore_MountTable_UpgradeToTyped_Common(t, c, "credentials") } func testCore_MountTable_UpgradeToTyped_Common( t *testing.T, c *Core, testType string, ) { var path string var mt *MountTable switch testType { case "mounts": path = coreMountConfigPath mt = c.mounts case "audits": path = coreAuditConfigPath mt = c.audit case "credentials": path = coreAuthConfigPath mt = c.auth } // We filter out local entries here since the logic is rather dumb // (straight JSON comparison) and doesn't seal well with the separate // locations newEntries := mt.Entries[:0] for _, entry := range mt.Entries { if !entry.Local { newEntries = append(newEntries, entry) } } mt.Entries = newEntries // Save the expected table goodJson, err := json.Marshal(mt) if err != nil { t.Fatal(err) } // Create a pre-typed version mt.Type = "" for _, entry := range mt.Entries { entry.Table = "" } raw, err := json.Marshal(mt) if err != nil { t.Fatal(err) } if reflect.DeepEqual(raw, goodJson) { t.Fatalf("bad: values here should be different") } entry := &logical.StorageEntry{ Key: path, Value: raw, } if err := c.barrier.Put(context.Background(), entry); err != nil { t.Fatal(err) } var persistFunc func(context.Context, *MountTable, *bool) error // It should load successfully and be upgraded and persisted switch testType { case "mounts": err = c.loadMounts(context.Background()) persistFunc = c.persistMounts mt = c.mounts case "credentials": err = c.loadCredentials(context.Background()) persistFunc = c.persistAuth mt = c.auth case "audits": err = c.loadAudits(context.Background()) persistFunc = func(ctx context.Context, mt *MountTable, b *bool) error { if b == nil { b = new(bool) *b = false } return c.persistAudit(ctx, mt, *b) } mt = c.audit } if err != nil { t.Fatal(err) } entry, err = c.barrier.Get(context.Background(), path) if err != nil { t.Fatal(err) } if entry == nil { t.Fatal("nil value") } decompressedBytes, uncompressed, err := compressutil.Decompress(entry.Value) if err != nil { t.Fatal(err) } actual := decompressedBytes if uncompressed { actual = entry.Value } if strings.TrimSpace(string(actual)) != strings.TrimSpace(string(goodJson)) { t.Fatalf("bad: expected\n%s\nactual\n%s\n", string(goodJson), string(actual)) } // Now try saving invalid versions origTableType := mt.Type mt.Type = "foo" if err := persistFunc(context.Background(), mt, nil); err == nil { t.Fatal("expected error") } if len(mt.Entries) > 0 { mt.Type = origTableType mt.Entries[0].Table = "bar" if err := persistFunc(context.Background(), mt, nil); err == nil { t.Fatal("expected error") } mt.Entries[0].Table = mt.Type if err := persistFunc(context.Background(), mt, nil); err != nil { t.Fatal(err) } } } func verifyDefaultTable(t *testing.T, table *MountTable, expected int) { if len(table.Entries) != expected { t.Fatalf("bad: %v", table.Entries) } table.sortEntriesByPath() for _, entry := range table.Entries { switch entry.Path { case "cubbyhole/": if entry.Type != "cubbyhole" { t.Fatalf("bad: %v", entry) } case "secret/": if entry.Type != "kv" { t.Fatalf("bad: %v", entry) } case "sys/": if entry.Type != "system" { t.Fatalf("bad: %v", entry) } if !entry.SealWrap { t.Fatalf("expected SealWrap to be enabled: %v", entry) } case "identity/": if entry.Type != "identity" { t.Fatalf("bad: %v", entry) } } if entry.Table != mountTableType { t.Fatalf("bad: %v", entry) } if entry.Description == "" { t.Fatalf("bad: %v", entry) } if entry.UUID == "" { t.Fatalf("bad: %v", entry) } } } func TestSingletonMountTableFunc(t *testing.T) { c, _, _ := TestCoreUnsealed(t) mounts, auth := c.singletonMountTables() if len(mounts.Entries) != 2 { t.Fatalf("length of mounts is wrong; expected 2, got %d", len(mounts.Entries)) } for _, entry := range mounts.Entries { switch entry.Type { case "system": case "identity": default: t.Fatalf("unknown type %s", entry.Type) } } if len(auth.Entries) != 1 { t.Fatal("length of auth is wrong") } if auth.Entries[0].Type != "token" { t.Fatal("unexpected entry type for auth") } } func TestCore_MountInitialize(t *testing.T) { { backend := &InitializableBackend{ &NoopBackend{ BackendType: logical.TypeLogical, }, false, } c, _, _ := TestCoreUnsealed(t) c.logicalBackends["initable"] = func(context.Context, *logical.BackendConfig) (logical.Backend, error) { return backend, nil } // Mount the noop backend me := &MountEntry{ Table: mountTableType, Path: "foo/", Type: "initable", } if err := c.mount(namespace.RootContext(nil), me); err != nil { t.Fatalf("err: %v", err) } if !backend.isInitialized { t.Fatal("backend is not initialized") } } { backend := &InitializableBackend{ &NoopBackend{ BackendType: logical.TypeLogical, }, false, } c, _, _ := TestCoreUnsealed(t) c.logicalBackends["initable"] = func(context.Context, *logical.BackendConfig) (logical.Backend, error) { return backend, nil } c.mounts = &MountTable{ Type: mountTableType, Entries: []*MountEntry{ { Table: mountTableType, Path: "foo/", Type: "initable", UUID: "abcd", Accessor: "initable-abcd", BackendAwareUUID: "abcde", NamespaceID: namespace.RootNamespaceID, namespace: namespace.RootNamespace, }, }, } err := c.setupMounts(namespace.RootContext(nil)) if err != nil { t.Fatal(err) } // run the postUnseal funcs, so that the backend will be inited for _, f := range c.postUnsealFuncs { f() } if !backend.isInitialized { t.Fatal("backend is not initialized") } } }