415 lines
9.2 KiB
Go
415 lines
9.2 KiB
Go
package transit
|
|
|
|
import (
|
|
"fmt"
|
|
"reflect"
|
|
"strconv"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/vault/logical"
|
|
)
|
|
|
|
func TestTransit_Export_KeyVersion_ExportsCorrectVersion(t *testing.T) {
|
|
verifyExportsCorrectVersion(t, "encryption-key", "aes256-gcm96")
|
|
verifyExportsCorrectVersion(t, "signing-key", "ecdsa-p256")
|
|
verifyExportsCorrectVersion(t, "signing-key", "ed25519")
|
|
verifyExportsCorrectVersion(t, "hmac-key", "aes256-gcm96")
|
|
verifyExportsCorrectVersion(t, "hmac-key", "ecdsa-p256")
|
|
verifyExportsCorrectVersion(t, "hmac-key", "ed25519")
|
|
}
|
|
|
|
func verifyExportsCorrectVersion(t *testing.T, exportType, keyType string) {
|
|
var b *backend
|
|
sysView := logical.TestSystemView()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
b = Backend(&logical.BackendConfig{
|
|
StorageView: storage,
|
|
System: sysView,
|
|
})
|
|
|
|
// First create a key, v1
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"exportable": true,
|
|
"type": keyType,
|
|
}
|
|
_, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
verifyVersion := func(versionRequest string, expectedVersion int) {
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.ReadOperation,
|
|
Path: fmt.Sprintf("export/%s/foo/%s", exportType, versionRequest),
|
|
}
|
|
rsp, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
typRaw, ok := rsp.Data["type"]
|
|
if !ok {
|
|
t.Fatal("no type returned from export")
|
|
}
|
|
typ, ok := typRaw.(string)
|
|
if !ok {
|
|
t.Fatalf("could not find key type, resp data is %#v", rsp.Data)
|
|
}
|
|
if typ != keyType {
|
|
t.Fatalf("key type mismatch; %q vs %q", typ, keyType)
|
|
}
|
|
|
|
keysRaw, ok := rsp.Data["keys"]
|
|
if !ok {
|
|
t.Fatal("could not find keys value")
|
|
}
|
|
keys, ok := keysRaw.(map[string]string)
|
|
if !ok {
|
|
t.Fatal("could not cast to keys map")
|
|
}
|
|
if len(keys) != 1 {
|
|
t.Fatal("unexpected number of keys found")
|
|
}
|
|
|
|
for k, _ := range keys {
|
|
if k != strconv.Itoa(expectedVersion) {
|
|
t.Fatalf("expected version %q, received version %q", strconv.Itoa(expectedVersion), k)
|
|
}
|
|
}
|
|
}
|
|
|
|
verifyVersion("v1", 1)
|
|
verifyVersion("1", 1)
|
|
verifyVersion("latest", 1)
|
|
|
|
req.Path = "keys/foo/rotate"
|
|
// v2
|
|
_, err = b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
verifyVersion("v1", 1)
|
|
verifyVersion("1", 1)
|
|
verifyVersion("v2", 2)
|
|
verifyVersion("2", 2)
|
|
verifyVersion("latest", 2)
|
|
|
|
// v3
|
|
_, err = b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
verifyVersion("v1", 1)
|
|
verifyVersion("1", 1)
|
|
verifyVersion("v3", 3)
|
|
verifyVersion("3", 3)
|
|
verifyVersion("latest", 3)
|
|
}
|
|
|
|
func TestTransit_Export_ValidVersionsOnly(t *testing.T) {
|
|
var b *backend
|
|
sysView := logical.TestSystemView()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
b = Backend(&logical.BackendConfig{
|
|
StorageView: storage,
|
|
System: sysView,
|
|
})
|
|
|
|
// First create a key, v1
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"exportable": true,
|
|
}
|
|
_, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req.Path = "keys/foo/rotate"
|
|
// v2
|
|
_, err = b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
// v3
|
|
_, err = b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
verifyExport := func(validVersions []int) {
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.ReadOperation,
|
|
Path: "export/encryption-key/foo",
|
|
}
|
|
rsp, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if _, ok := rsp.Data["keys"]; !ok {
|
|
t.Error("no keys returned from export")
|
|
}
|
|
|
|
keys, ok := rsp.Data["keys"].(map[string]string)
|
|
if !ok {
|
|
t.Error("could not cast to keys object")
|
|
}
|
|
if len(keys) != len(validVersions) {
|
|
t.Errorf("expected %d key count, received %d", len(validVersions), len(keys))
|
|
}
|
|
for _, version := range validVersions {
|
|
if _, ok := keys[strconv.Itoa(version)]; !ok {
|
|
t.Errorf("expecting to find key version %d, not found", version)
|
|
}
|
|
}
|
|
}
|
|
|
|
verifyExport([]int{1, 2, 3})
|
|
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo/config",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"min_decryption_version": 3,
|
|
}
|
|
_, err = b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
verifyExport([]int{3})
|
|
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo/config",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"min_decryption_version": 2,
|
|
}
|
|
_, err = b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
verifyExport([]int{2, 3})
|
|
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo/rotate",
|
|
}
|
|
// v4
|
|
_, err = b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
verifyExport([]int{2, 3, 4})
|
|
}
|
|
|
|
func TestTransit_Export_KeysNotMarkedExportable_ReturnsError(t *testing.T) {
|
|
var b *backend
|
|
sysView := logical.TestSystemView()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
b = Backend(&logical.BackendConfig{
|
|
StorageView: storage,
|
|
System: sysView,
|
|
})
|
|
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"exportable": false,
|
|
}
|
|
_, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.ReadOperation,
|
|
Path: "export/encryption-key/foo",
|
|
}
|
|
rsp, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !rsp.IsError() {
|
|
t.Fatal("Key not marked as exportble but was exported.")
|
|
}
|
|
}
|
|
|
|
func TestTransit_Export_SigningDoesNotSupportSigning_ReturnsError(t *testing.T) {
|
|
var b *backend
|
|
sysView := logical.TestSystemView()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
b = Backend(&logical.BackendConfig{
|
|
StorageView: storage,
|
|
System: sysView,
|
|
})
|
|
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"exportable": true,
|
|
"type": "aes256-gcm96",
|
|
}
|
|
_, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.ReadOperation,
|
|
Path: "export/signing-key/foo",
|
|
}
|
|
_, err = b.HandleRequest(req)
|
|
if err == nil {
|
|
t.Fatal("Key does not support signing but was exported without error.")
|
|
}
|
|
}
|
|
|
|
func TestTransit_Export_EncryptionDoesNotSupportEncryption_ReturnsError(t *testing.T) {
|
|
testTransit_Export_EncryptionDoesNotSupportEncryption_ReturnsError(t, "ecdsa-p256")
|
|
testTransit_Export_EncryptionDoesNotSupportEncryption_ReturnsError(t, "ed25519")
|
|
}
|
|
|
|
func testTransit_Export_EncryptionDoesNotSupportEncryption_ReturnsError(t *testing.T, keyType string) {
|
|
var b *backend
|
|
sysView := logical.TestSystemView()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
b = Backend(&logical.BackendConfig{
|
|
StorageView: storage,
|
|
System: sysView,
|
|
})
|
|
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"exportable": true,
|
|
"type": keyType,
|
|
}
|
|
_, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.ReadOperation,
|
|
Path: "export/encryption-key/foo",
|
|
}
|
|
_, err = b.HandleRequest(req)
|
|
if err == nil {
|
|
t.Fatal("Key does not support encryption but was exported without error.")
|
|
}
|
|
}
|
|
|
|
func TestTransit_Export_KeysDoesNotExist_ReturnsNotFound(t *testing.T) {
|
|
var b *backend
|
|
sysView := logical.TestSystemView()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
b = Backend(&logical.BackendConfig{
|
|
StorageView: storage,
|
|
System: sysView,
|
|
})
|
|
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.ReadOperation,
|
|
Path: "export/encryption-key/foo",
|
|
}
|
|
rsp, err := b.HandleRequest(req)
|
|
|
|
if !(rsp == nil && err == nil) {
|
|
t.Fatal("Key does not exist but does not return not found")
|
|
}
|
|
}
|
|
|
|
func TestTransit_Export_EncryptionKey_DoesNotExportHMACKey(t *testing.T) {
|
|
var b *backend
|
|
sysView := logical.TestSystemView()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
b = Backend(&logical.BackendConfig{
|
|
StorageView: storage,
|
|
System: sysView,
|
|
})
|
|
|
|
req := &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.UpdateOperation,
|
|
Path: "keys/foo",
|
|
}
|
|
req.Data = map[string]interface{}{
|
|
"exportable": true,
|
|
"type": "aes256-gcm96",
|
|
}
|
|
_, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req = &logical.Request{
|
|
Storage: storage,
|
|
Operation: logical.ReadOperation,
|
|
Path: "export/encryption-key/foo",
|
|
}
|
|
encryptionKeyRsp, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
req.Path = "export/hmac-key/foo"
|
|
hmacKeyRsp, err := b.HandleRequest(req)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
encryptionKeys, ok := encryptionKeyRsp.Data["keys"].(map[string]string)
|
|
if !ok {
|
|
t.Error("could not cast to keys object")
|
|
}
|
|
hmacKeys, ok := hmacKeyRsp.Data["keys"].(map[string]string)
|
|
if !ok {
|
|
t.Error("could not cast to keys object")
|
|
}
|
|
if len(hmacKeys) != len(encryptionKeys) {
|
|
t.Errorf("hmac (%d) and encyryption (%d) key count don't match",
|
|
len(hmacKeys), len(encryptionKeys))
|
|
}
|
|
|
|
if reflect.DeepEqual(encryptionKeyRsp.Data, hmacKeyRsp.Data) {
|
|
t.Fatal("Encryption key data matched hmac key data")
|
|
}
|
|
}
|