mirror of https://github.com/k3s-io/k3s
158 lines
6.1 KiB
Go
158 lines
6.1 KiB
Go
package integration
|
|
|
|
import (
|
|
"fmt"
|
|
"regexp"
|
|
"testing"
|
|
"time"
|
|
|
|
testutil "github.com/k3s-io/k3s/tests/integration"
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
var secretsEncryptionServer *testutil.K3sServer
|
|
var secretsEncryptionDataDir = "/tmp/k3sse"
|
|
var secretsEncryptionServerArgs = []string{"--secrets-encryption", "-d", secretsEncryptionDataDir}
|
|
var testLock int
|
|
|
|
var _ = BeforeSuite(func() {
|
|
if !testutil.IsExistingServer() {
|
|
var err error
|
|
testLock, err = testutil.K3sTestLock()
|
|
Expect(err).ToNot(HaveOccurred())
|
|
secretsEncryptionServer, err = testutil.K3sStartServer(secretsEncryptionServerArgs...)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
}
|
|
})
|
|
|
|
var _ = Describe("secrets encryption rotation", Ordered, func() {
|
|
BeforeEach(func() {
|
|
if testutil.IsExistingServer() {
|
|
Skip("Test does not support running on existing k3s servers")
|
|
}
|
|
})
|
|
When("A server starts with secrets encryption", func() {
|
|
It("starts up with no problems", func() {
|
|
Eventually(func() error {
|
|
return testutil.K3sDefaultDeployments()
|
|
}, "180s", "5s").Should(Succeed())
|
|
})
|
|
It("it creates a encryption key", func() {
|
|
result, err := testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(ContainSubstring("Encryption Status: Enabled"))
|
|
Expect(result).To(ContainSubstring("Current Rotation Stage: start"))
|
|
})
|
|
})
|
|
When("A server rotates encryption keys", func() {
|
|
It("it prepares to rotate", func() {
|
|
Expect(testutil.K3sCmd("secrets-encrypt prepare -d", secretsEncryptionDataDir)).
|
|
To(ContainSubstring("prepare completed successfully"))
|
|
|
|
result, err := testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(ContainSubstring("Current Rotation Stage: prepare"))
|
|
reg, err := regexp.Compile(`AES-CBC.+aescbckey.*`)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
keys := reg.FindAllString(result, -1)
|
|
Expect(keys).To(HaveLen(2))
|
|
Expect(keys[0]).To(ContainSubstring("aescbckey"))
|
|
Expect(keys[1]).To(ContainSubstring("aescbckey-" + fmt.Sprint(time.Now().Year())))
|
|
})
|
|
It("restarts the server", func() {
|
|
var err error
|
|
Expect(testutil.K3sKillServer(secretsEncryptionServer)).To(Succeed())
|
|
secretsEncryptionServer, err = testutil.K3sStartServer(secretsEncryptionServerArgs...)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Eventually(func() error {
|
|
return testutil.K3sDefaultDeployments()
|
|
}, "180s", "5s").Should(Succeed())
|
|
Eventually(func() (string, error) {
|
|
return testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
}, "30s", "5s").Should(ContainSubstring("Current Rotation Stage: prepare"))
|
|
})
|
|
It("rotates the keys", func() {
|
|
Expect(testutil.K3sCmd("secrets-encrypt rotate -d", secretsEncryptionDataDir)).
|
|
To(ContainSubstring("rotate completed successfully"))
|
|
result, err := testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(ContainSubstring("Current Rotation Stage: rotate"))
|
|
reg, err := regexp.Compile(`AES-CBC.+aescbckey.*`)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
keys := reg.FindAllString(result, -1)
|
|
Expect(keys).To(HaveLen(2))
|
|
Expect(keys[0]).To(ContainSubstring("aescbckey-" + fmt.Sprint(time.Now().Year())))
|
|
Expect(keys[1]).To(ContainSubstring("aescbckey"))
|
|
})
|
|
It("restarts the server", func() {
|
|
var err error
|
|
Expect(testutil.K3sKillServer(secretsEncryptionServer)).To(Succeed())
|
|
secretsEncryptionServer, err = testutil.K3sStartServer(secretsEncryptionServerArgs...)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Eventually(func() error {
|
|
return testutil.K3sDefaultDeployments()
|
|
}, "180s", "5s").Should(Succeed())
|
|
time.Sleep(10 * time.Second)
|
|
})
|
|
It("reencrypts the keys", func() {
|
|
Expect(testutil.K3sCmd("secrets-encrypt reencrypt -d", secretsEncryptionDataDir)).
|
|
To(ContainSubstring("reencryption started"))
|
|
Eventually(func() (string, error) {
|
|
return testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
}, "45s", "2s").Should(ContainSubstring("Current Rotation Stage: reencrypt_finished"))
|
|
result, err := testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
reg, err := regexp.Compile(`AES-CBC.+aescbckey.*`)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
keys := reg.FindAllString(result, -1)
|
|
Expect(keys).To(HaveLen(1))
|
|
Expect(keys[0]).To(ContainSubstring("aescbckey-" + fmt.Sprint(time.Now().Year())))
|
|
})
|
|
})
|
|
When("A server disables encryption", func() {
|
|
It("it triggers the disable", func() {
|
|
Expect(testutil.K3sCmd("secrets-encrypt disable -d", secretsEncryptionDataDir)).
|
|
To(ContainSubstring("secrets-encryption disabled"))
|
|
|
|
result, err := testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(ContainSubstring("Encryption Status: Disabled"))
|
|
})
|
|
It("restarts the server", func() {
|
|
var err error
|
|
Expect(testutil.K3sKillServer(secretsEncryptionServer)).To(Succeed())
|
|
secretsEncryptionServer, err = testutil.K3sStartServer(secretsEncryptionServerArgs...)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Eventually(func() error {
|
|
return testutil.K3sDefaultDeployments()
|
|
}, "180s", "5s").Should(Succeed())
|
|
time.Sleep(10 * time.Second)
|
|
})
|
|
It("reencrypts the keys", func() {
|
|
result, err := testutil.K3sCmd("secrets-encrypt reencrypt -f --skip -d", secretsEncryptionDataDir)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(ContainSubstring("reencryption started"))
|
|
|
|
result, err = testutil.K3sCmd("secrets-encrypt status -d", secretsEncryptionDataDir)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(ContainSubstring("Encryption Status: Disabled"))
|
|
})
|
|
})
|
|
})
|
|
|
|
var _ = AfterSuite(func() {
|
|
if !testutil.IsExistingServer() {
|
|
if CurrentSpecReport().Failed() {
|
|
testutil.K3sDumpLog(secretsEncryptionServer)
|
|
}
|
|
Expect(testutil.K3sKillServer(secretsEncryptionServer)).To(Succeed())
|
|
Expect(testutil.K3sCleanup(testLock, secretsEncryptionDataDir)).To(Succeed())
|
|
}
|
|
})
|
|
|
|
func Test_IntegrationSecretsEncryption(t *testing.T) {
|
|
RegisterFailHandler(Fail)
|
|
RunSpecs(t, "Secrets Encryption Suite")
|
|
}
|