@@ -38,15 +38,15 @@ func Test_rotateKeys(t *testing.T) {
38
38
clock : clock ,
39
39
logger : logger ,
40
40
features : []database.CryptoKeyFeature {
41
- database .CryptoKeyFeatureWorkspaceApps ,
41
+ database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
42
42
},
43
43
}
44
44
45
45
now := dbnow (clock )
46
46
47
47
// Seed the database with an existing key.
48
48
oldKey := dbgen .CryptoKey (t , db , database.CryptoKey {
49
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
49
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
50
50
StartsAt : now ,
51
51
Sequence : 15 ,
52
52
})
@@ -69,11 +69,11 @@ func Test_rotateKeys(t *testing.T) {
69
69
70
70
// The new key should be created and have a starts_at of the old key's expires_at.
71
71
newKey , err := db .GetCryptoKeyByFeatureAndSequence (ctx , database.GetCryptoKeyByFeatureAndSequenceParams {
72
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
72
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
73
73
Sequence : oldKey .Sequence + 1 ,
74
74
})
75
75
require .NoError (t , err )
76
- requireKey (t , newKey , database .CryptoKeyFeatureWorkspaceApps , oldKey .ExpiresAt (keyDuration ), nullTime , oldKey .Sequence + 1 )
76
+ requireKey (t , newKey , database .CryptoKeyFeatureWorkspaceAppsAPIKey , oldKey .ExpiresAt (keyDuration ), nullTime , oldKey .Sequence + 1 )
77
77
78
78
// Advance the clock just before the keys delete time.
79
79
clock .Advance (oldKey .DeletesAt .Time .UTC ().Sub (now ) - time .Second )
@@ -123,15 +123,15 @@ func Test_rotateKeys(t *testing.T) {
123
123
clock : clock ,
124
124
logger : logger ,
125
125
features : []database.CryptoKeyFeature {
126
- database .CryptoKeyFeatureWorkspaceApps ,
126
+ database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
127
127
},
128
128
}
129
129
130
130
now := dbnow (clock )
131
131
132
132
// Seed the database with an existing key
133
133
existingKey := dbgen .CryptoKey (t , db , database.CryptoKey {
134
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
134
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
135
135
StartsAt : now ,
136
136
Sequence : 123 ,
137
137
})
@@ -179,15 +179,15 @@ func Test_rotateKeys(t *testing.T) {
179
179
clock : clock ,
180
180
logger : logger ,
181
181
features : []database.CryptoKeyFeature {
182
- database .CryptoKeyFeatureWorkspaceApps ,
182
+ database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
183
183
},
184
184
}
185
185
186
186
now := dbnow (clock )
187
187
188
188
// Seed the database with an existing key
189
189
deletingKey := dbgen .CryptoKey (t , db , database.CryptoKey {
190
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
190
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
191
191
StartsAt : now .Add (- keyDuration ),
192
192
Sequence : 789 ,
193
193
DeletesAt : sql.NullTime {
@@ -232,15 +232,15 @@ func Test_rotateKeys(t *testing.T) {
232
232
clock : clock ,
233
233
logger : logger ,
234
234
features : []database.CryptoKeyFeature {
235
- database .CryptoKeyFeatureWorkspaceApps ,
235
+ database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
236
236
},
237
237
}
238
238
239
239
now := dbnow (clock )
240
240
241
241
// Seed the database with an existing key
242
242
deletingKey := dbgen .CryptoKey (t , db , database.CryptoKey {
243
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
243
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
244
244
StartsAt : now ,
245
245
Sequence : 456 ,
246
246
DeletesAt : sql.NullTime {
@@ -281,7 +281,7 @@ func Test_rotateKeys(t *testing.T) {
281
281
clock : clock ,
282
282
logger : logger ,
283
283
features : []database.CryptoKeyFeature {
284
- database .CryptoKeyFeatureWorkspaceApps ,
284
+ database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
285
285
},
286
286
}
287
287
@@ -291,7 +291,7 @@ func Test_rotateKeys(t *testing.T) {
291
291
keys , err := db .GetCryptoKeys (ctx )
292
292
require .NoError (t , err )
293
293
require .Len (t , keys , 1 )
294
- requireKey (t , keys [0 ], database .CryptoKeyFeatureWorkspaceApps , clock .Now ().UTC (), nullTime , 1 )
294
+ requireKey (t , keys [0 ], database .CryptoKeyFeatureWorkspaceAppsAPIKey , clock .Now ().UTC (), nullTime , 1 )
295
295
})
296
296
297
297
// Assert we insert a new key when the only key was manually deleted.
@@ -312,14 +312,14 @@ func Test_rotateKeys(t *testing.T) {
312
312
clock : clock ,
313
313
logger : logger ,
314
314
features : []database.CryptoKeyFeature {
315
- database .CryptoKeyFeatureWorkspaceApps ,
315
+ database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
316
316
},
317
317
}
318
318
319
319
now := dbnow (clock )
320
320
321
321
deletedkey := dbgen .CryptoKey (t , db , database.CryptoKey {
322
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
322
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
323
323
StartsAt : now ,
324
324
Sequence : 19 ,
325
325
DeletesAt : sql.NullTime {
@@ -338,7 +338,7 @@ func Test_rotateKeys(t *testing.T) {
338
338
keys , err := db .GetCryptoKeys (ctx )
339
339
require .NoError (t , err )
340
340
require .Len (t , keys , 1 )
341
- requireKey (t , keys [0 ], database .CryptoKeyFeatureWorkspaceApps , now , nullTime , deletedkey .Sequence + 1 )
341
+ requireKey (t , keys [0 ], database .CryptoKeyFeatureWorkspaceAppsAPIKey , now , nullTime , deletedkey .Sequence + 1 )
342
342
})
343
343
344
344
// This tests ensures that rotation works with multiple
@@ -389,14 +389,14 @@ func Test_rotateKeys(t *testing.T) {
389
389
390
390
// Insert a key that should be rotated.
391
391
rotatedKey := dbgen .CryptoKey (t , db , database.CryptoKey {
392
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
392
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
393
393
StartsAt : now .Add (- keyDuration + time .Hour ),
394
394
Sequence : 42 ,
395
395
})
396
396
397
397
// Insert a key that should not trigger an action.
398
398
validKey := dbgen .CryptoKey (t , db , database.CryptoKey {
399
- Feature : database .CryptoKeyFeatureOidcConvert ,
399
+ Feature : database .CryptoKeyFeatureOIDCConvert ,
400
400
StartsAt : now ,
401
401
Sequence : 17 ,
402
402
})
@@ -412,29 +412,29 @@ func Test_rotateKeys(t *testing.T) {
412
412
require .NoError (t , err )
413
413
414
414
// No actions on OIDC convert.
415
- require .Len (t , kbf [database .CryptoKeyFeatureOidcConvert ], 1 )
415
+ require .Len (t , kbf [database .CryptoKeyFeatureOIDCConvert ], 1 )
416
416
// Workspace apps should have been rotated.
417
- require .Len (t , kbf [database .CryptoKeyFeatureWorkspaceApps ], 2 )
417
+ require .Len (t , kbf [database .CryptoKeyFeatureWorkspaceAppsAPIKey ], 2 )
418
418
// No existing key for tailnet resume should've
419
419
// caused a key to be inserted.
420
420
require .Len (t , kbf [database .CryptoKeyFeatureTailnetResume ], 1 )
421
421
422
- oidcKey := kbf [database .CryptoKeyFeatureOidcConvert ][0 ]
422
+ oidcKey := kbf [database .CryptoKeyFeatureOIDCConvert ][0 ]
423
423
tailnetKey := kbf [database .CryptoKeyFeatureTailnetResume ][0 ]
424
- requireKey (t , oidcKey , database .CryptoKeyFeatureOidcConvert , now , nullTime , validKey .Sequence )
424
+ requireKey (t , oidcKey , database .CryptoKeyFeatureOIDCConvert , now , nullTime , validKey .Sequence )
425
425
requireKey (t , tailnetKey , database .CryptoKeyFeatureTailnetResume , now , nullTime , deletedKey .Sequence + 1 )
426
426
427
- newKey := kbf [database .CryptoKeyFeatureWorkspaceApps ][0 ]
428
- oldKey := kbf [database .CryptoKeyFeatureWorkspaceApps ][1 ]
427
+ newKey := kbf [database .CryptoKeyFeatureWorkspaceAppsAPIKey ][0 ]
428
+ oldKey := kbf [database .CryptoKeyFeatureWorkspaceAppsAPIKey ][1 ]
429
429
if newKey .Sequence == rotatedKey .Sequence {
430
430
oldKey , newKey = newKey , oldKey
431
431
}
432
432
deletesAt := sql.NullTime {
433
433
Time : rotatedKey .ExpiresAt (keyDuration ).Add (WorkspaceAppsTokenDuration + time .Hour ),
434
434
Valid : true ,
435
435
}
436
- requireKey (t , oldKey , database .CryptoKeyFeatureWorkspaceApps , rotatedKey .StartsAt .UTC (), deletesAt , rotatedKey .Sequence )
437
- requireKey (t , newKey , database .CryptoKeyFeatureWorkspaceApps , rotatedKey .ExpiresAt (keyDuration ), nullTime , rotatedKey .Sequence + 1 )
436
+ requireKey (t , oldKey , database .CryptoKeyFeatureWorkspaceAppsAPIKey , rotatedKey .StartsAt .UTC (), deletesAt , rotatedKey .Sequence )
437
+ requireKey (t , newKey , database .CryptoKeyFeatureWorkspaceAppsAPIKey , rotatedKey .ExpiresAt (keyDuration ), nullTime , rotatedKey .Sequence + 1 )
438
438
})
439
439
440
440
t .Run ("UnknownFeature" , func (t * testing.T ) {
@@ -478,11 +478,11 @@ func Test_rotateKeys(t *testing.T) {
478
478
keyDuration : keyDuration ,
479
479
clock : clock ,
480
480
logger : logger ,
481
- features : []database.CryptoKeyFeature {database .CryptoKeyFeatureWorkspaceApps },
481
+ features : []database.CryptoKeyFeature {database .CryptoKeyFeatureWorkspaceAppsAPIKey },
482
482
}
483
483
484
484
expiringKey := dbgen .CryptoKey (t , db , database.CryptoKey {
485
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
485
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
486
486
StartsAt : now .Add (- keyDuration ),
487
487
Sequence : 345 ,
488
488
})
@@ -522,19 +522,19 @@ func Test_rotateKeys(t *testing.T) {
522
522
keyDuration : keyDuration ,
523
523
clock : clock ,
524
524
logger : logger ,
525
- features : []database.CryptoKeyFeature {database .CryptoKeyFeatureWorkspaceApps },
525
+ features : []database.CryptoKeyFeature {database .CryptoKeyFeatureWorkspaceAppsAPIKey },
526
526
}
527
527
528
528
now := dbnow (clock )
529
529
530
530
expiredKey := dbgen .CryptoKey (t , db , database.CryptoKey {
531
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
531
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
532
532
StartsAt : now .Add (- keyDuration - 2 * time .Hour ),
533
533
Sequence : 19 ,
534
534
})
535
535
536
536
deletedKey := dbgen .CryptoKey (t , db , database.CryptoKey {
537
- Feature : database .CryptoKeyFeatureWorkspaceApps ,
537
+ Feature : database .CryptoKeyFeatureWorkspaceAppsAPIKey ,
538
538
StartsAt : now ,
539
539
Sequence : 20 ,
540
540
Secret : sql.NullString {
@@ -587,9 +587,9 @@ func requireKey(t *testing.T, key database.CryptoKey, feature database.CryptoKey
587
587
require .NoError (t , err )
588
588
589
589
switch key .Feature {
590
- case database .CryptoKeyFeatureOidcConvert :
590
+ case database .CryptoKeyFeatureOIDCConvert :
591
591
require .Len (t , secret , 64 )
592
- case database .CryptoKeyFeatureWorkspaceApps :
592
+ case database .CryptoKeyFeatureWorkspaceAppsAPIKey :
593
593
require .Len (t , secret , 32 )
594
594
case database .CryptoKeyFeatureTailnetResume :
595
595
require .Len (t , secret , 64 )
0 commit comments