mirror of
https://github.com/hashicorp/vault.git
synced 2025-11-14 07:11:11 +01:00
* add fix and tests for importing keys with derivation enabled * add changelog * add check to fix kdf for existing imported keys * only set kdf on derived keys Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
101 lines
2.2 KiB
Go
101 lines
2.2 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
package keysutil
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestImportPolicy(t *testing.T) {
|
|
lm, err := NewLockManager(false, 0)
|
|
require.NoError(t, err)
|
|
|
|
ctx := context.Background()
|
|
storage := &logical.InmemStorage{}
|
|
|
|
testKeys, err := generateTestKeys()
|
|
require.NoError(t, err)
|
|
|
|
testCases := map[string]struct {
|
|
req PolicyRequest
|
|
key []byte
|
|
expectErr bool
|
|
}{
|
|
"import AES key": {
|
|
req: PolicyRequest{
|
|
Name: "test-aes-key",
|
|
KeyType: KeyType_AES256_GCM96,
|
|
Storage: storage,
|
|
IsPrivateKey: true,
|
|
},
|
|
key: testKeys[KeyType_AES256_GCM96],
|
|
},
|
|
"import RSA key": {
|
|
req: PolicyRequest{
|
|
Name: "test-rsa-key",
|
|
KeyType: KeyType_RSA2048,
|
|
Storage: storage,
|
|
IsPrivateKey: true,
|
|
},
|
|
key: testKeys[KeyType_RSA2048],
|
|
},
|
|
"import ECDSA key": {
|
|
req: PolicyRequest{
|
|
Name: "test-ecdsa-key",
|
|
KeyType: KeyType_ECDSA_P256,
|
|
Storage: storage,
|
|
IsPrivateKey: true,
|
|
},
|
|
key: testKeys[KeyType_ECDSA_P256],
|
|
},
|
|
"import ED25519 key": {
|
|
req: PolicyRequest{
|
|
Name: "test-ed25519-key",
|
|
KeyType: KeyType_ED25519,
|
|
Storage: storage,
|
|
IsPrivateKey: true,
|
|
},
|
|
key: testKeys[KeyType_ED25519],
|
|
},
|
|
"import ed25519 with derivation": {
|
|
req: PolicyRequest{
|
|
Name: "ed25519-derived",
|
|
KeyType: KeyType_ED25519,
|
|
Storage: storage,
|
|
IsPrivateKey: true,
|
|
Derived: true,
|
|
},
|
|
key: testKeys[KeyType_ED25519],
|
|
},
|
|
}
|
|
|
|
for name, tt := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
err = lm.ImportPolicy(ctx, tt.req, tt.key, rand.Reader)
|
|
if tt.expectErr {
|
|
require.Error(t, err)
|
|
} else {
|
|
require.NoError(t, err)
|
|
|
|
pol, upserted, err := lm.GetPolicy(ctx, PolicyRequest{Name: tt.req.Name, Storage: storage}, rand.Reader)
|
|
require.NoError(t, err)
|
|
require.False(t, upserted)
|
|
|
|
defer pol.Unlock()
|
|
|
|
require.Equal(t, tt.req.KeyType, pol.Type)
|
|
if tt.req.Derived {
|
|
require.True(t, pol.Derived)
|
|
require.Equal(t, Kdf_hkdf_sha256, pol.KDF)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|