Talos now supports new type of encryption keys which rely on Sealing/Unsealing randomly generated bytes with a KMS server: ``` systemDiskEncryption: ephemeral: keys: - kms: endpoint: https://1.2.3.4:443 slot: 0 ``` gRPC API definitions and a simple reference implementation of the KMS server can be found in this [repository](https://github.com/siderolabs/kms-client/blob/main/cmd/kms-server/main.go). Signed-off-by: Artem Chernyshev <artem.chernyshev@talos-systems.com>
82 lines
2.4 KiB
Go
82 lines
2.4 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
package endpoint_test
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/siderolabs/talos/internal/pkg/endpoint"
|
|
)
|
|
|
|
func TestParseEndpoint(t *testing.T) {
|
|
t.Run("parses a join token from a complete URL without error", func(t *testing.T) {
|
|
// when
|
|
endpoint, err := endpoint.Parse("grpc://10.5.0.2:3445?jointoken=ttt")
|
|
|
|
// then
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "10.5.0.2:3445", endpoint.Host)
|
|
assert.True(t, endpoint.Insecure)
|
|
assert.Equal(t, "ttt", endpoint.GetParam("jointoken"))
|
|
})
|
|
|
|
t.Run("parses a join token from a secure URL without error", func(t *testing.T) {
|
|
// when
|
|
endpoint, err := endpoint.Parse("https://10.5.0.2:3445?jointoken=ttt&jointoken=xxx")
|
|
|
|
// then
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "10.5.0.2:3445", endpoint.Host)
|
|
assert.False(t, endpoint.Insecure)
|
|
assert.Equal(t, "ttt", endpoint.GetParam("jointoken"))
|
|
})
|
|
|
|
t.Run("parses a join token from a secure URL without port", func(t *testing.T) {
|
|
// when
|
|
endpoint, err := endpoint.Parse("https://10.5.0.2?jointoken=ttt&jointoken=xxx")
|
|
|
|
// then
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "10.5.0.2:443", endpoint.Host)
|
|
assert.False(t, endpoint.Insecure)
|
|
assert.Equal(t, "ttt", endpoint.GetParam("jointoken"))
|
|
})
|
|
|
|
t.Run("parses a join token from an URL without a scheme", func(t *testing.T) {
|
|
// when
|
|
endpoint, err := endpoint.Parse("10.5.0.2:3445?jointoken=ttt")
|
|
|
|
// then
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "10.5.0.2:3445", endpoint.Host)
|
|
assert.True(t, endpoint.Insecure)
|
|
assert.Equal(t, "ttt", endpoint.GetParam("jointoken"))
|
|
})
|
|
|
|
t.Run("does not error if there is no join token in a complete URL", func(t *testing.T) {
|
|
// when
|
|
endpoint, err := endpoint.Parse("grpc://10.5.0.2:3445")
|
|
|
|
// then
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "10.5.0.2:3445", endpoint.Host)
|
|
assert.True(t, endpoint.Insecure)
|
|
assert.Equal(t, "", endpoint.GetParam("jointoken"))
|
|
})
|
|
|
|
t.Run("does not error if there is no join token in an URL without a scheme", func(t *testing.T) {
|
|
// when
|
|
endpoint, err := endpoint.Parse("10.5.0.2:3445")
|
|
|
|
// then
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "10.5.0.2:3445", endpoint.Host)
|
|
assert.True(t, endpoint.Insecure)
|
|
assert.Equal(t, "", endpoint.GetParam("jointoken"))
|
|
})
|
|
}
|