diff --git a/changelog/13324.txt b/changelog/13324.txt new file mode 100644 index 000000000000..f0bced301614 --- /dev/null +++ b/changelog/13324.txt @@ -0,0 +1,3 @@ +```release-note:improvement +core: Replace "master key" terminology with "root key" +``` diff --git a/command/operator_init.go b/command/operator_init.go index 2cdba009a729..a8b8e5601024 100644 --- a/command/operator_init.go +++ b/command/operator_init.go @@ -57,10 +57,10 @@ Usage: vault operator init [options] same storage backend in HA mode, you only need to initialize one Vault to initialize the storage backend. - During initialization, Vault generates an in-memory master key and applies - Shamir's secret sharing algorithm to disassemble that master key into a + During initialization, Vault generates an in-memory root key and applies + Shamir's secret sharing algorithm to disassemble that root key into a configuration number of key shares such that a configurable subset of those - key shares must come together to regenerate the master key. These keys are + key shares must come together to regenerate the root key. These keys are often called "unseal keys" in Vault's documentation. This command cannot be run against an already-initialized Vault cluster. @@ -105,7 +105,7 @@ func (c *OperatorInitCommand) Flags() *FlagSets { Target: &c.flagKeyShares, Default: defKeyShares, Completion: complete.PredictAnything, - Usage: "Number of key shares to split the generated master key into. " + + Usage: "Number of key shares to split the generated root key into. " + "This is the number of \"unseal keys\" to generate.", }) @@ -115,7 +115,7 @@ func (c *OperatorInitCommand) Flags() *FlagSets { Target: &c.flagKeyThreshold, Default: defKeyThreshold, Completion: complete.PredictAnything, - Usage: "Number of key shares required to reconstruct the master key. " + + Usage: "Number of key shares required to reconstruct the root key. " + "This must be less than or equal to -key-shares.", }) @@ -447,8 +447,8 @@ func (c *OperatorInitCommand) init(client *api.Client, req *api.InitRequest) int c.UI.Output("") c.UI.Output(wrapAtLength(fmt.Sprintf( - "Vault does not store the generated master key. Without at least %d "+ - "keys to reconstruct the master key, Vault will remain permanently "+ + "Vault does not store the generated root key. Without at least %d "+ + "keys to reconstruct the root key, Vault will remain permanently "+ "sealed!", req.SecretThreshold))) diff --git a/command/operator_rekey.go b/command/operator_rekey.go index ca9a316cb3de..b73349405daa 100644 --- a/command/operator_rekey.go +++ b/command/operator_rekey.go @@ -51,7 +51,7 @@ Usage: vault operator rekey [options] [KEY] Generates a new set of unseal keys. This can optionally change the total number of key shares or the required threshold of those key shares to - reconstruct the master key. This operation is zero downtime, but it requires + reconstruct the root key. This operation is zero downtime, but it requires the Vault is unsealed and a quorum of existing unseal keys are provided. An unseal key may be provided directly on the command line as an argument to @@ -129,7 +129,7 @@ func (c *OperatorRekeyCommand) Flags() *FlagSets { Target: &c.flagKeyShares, Default: 5, Completion: complete.PredictAnything, - Usage: "Number of key shares to split the generated master key into. " + + Usage: "Number of key shares to split the generated root key into. " + "This is the number of \"unseal keys\" to generate.", }) @@ -139,7 +139,7 @@ func (c *OperatorRekeyCommand) Flags() *FlagSets { Target: &c.flagKeyThreshold, Default: 3, Completion: complete.PredictAnything, - Usage: "Number of key shares required to reconstruct the master key. " + + Usage: "Number of key shares required to reconstruct the root key. " + "This must be less than or equal to -key-shares.", }) diff --git a/command/operator_seal.go b/command/operator_seal.go index 9f2ec6656ed7..369ec3215d66 100644 --- a/command/operator_seal.go +++ b/command/operator_seal.go @@ -27,11 +27,11 @@ Usage: vault operator seal [options] Seals the Vault server. Sealing tells the Vault server to stop responding to any operations until it is unsealed. When sealed, the Vault server - discards its in-memory master key to unlock the data, so it is physically + discards its in-memory root key to unlock the data, so it is physically blocked from responding to operations unsealed. If an unseal is in progress, sealing the Vault will reset the unsealing - process. Users will have to re-enter their portions of the master key again. + process. Users will have to re-enter their portions of the root key again. This command does nothing if the Vault server is already sealed. diff --git a/command/operator_unseal.go b/command/operator_unseal.go index da8641ba51de..8cdd06d38408 100644 --- a/command/operator_unseal.go +++ b/command/operator_unseal.go @@ -34,9 +34,9 @@ func (c *OperatorUnsealCommand) Help() string { helpText := ` Usage: vault operator unseal [options] [KEY] - Provide a portion of the master key to unseal a Vault server. Vault starts + Provide a portion of the root key to unseal a Vault server. Vault starts in a sealed state. It cannot perform operations until it is unsealed. This - command accepts a portion of the master key (an "unseal key"). + command accepts a portion of the root key (an "unseal key"). The unseal key can be supplied as an argument to the command, but this is not recommended as the unseal key will be available in your history: diff --git a/physical/raft/raft.go b/physical/raft/raft.go index f88d66c5bea0..52826c09c4aa 100644 --- a/physical/raft/raft.go +++ b/physical/raft/raft.go @@ -1144,7 +1144,7 @@ func (b *RaftBackend) SnapshotHTTP(out *logical.HTTPResponseWriter, access *seal // Snapshot takes a raft snapshot, packages it into a archive file and writes it // to the provided writer. Seal access is used to encrypt the SHASUM file so we -// can validate the snapshot was taken using the same master keys or not. +// can validate the snapshot was taken using the same root keys or not. func (b *RaftBackend) Snapshot(out io.Writer, access *seal.Access) error { b.l.RLock() defer b.l.RUnlock() @@ -1167,7 +1167,7 @@ func (b *RaftBackend) Snapshot(out io.Writer, access *seal.Access) error { // WriteSnapshotToTemp reads a snapshot archive off the provided reader, // extracts the data and writes the snapshot to a temporary file. The seal // access is used to decrypt the SHASUM file in the archive to ensure this -// snapshot has the same master key as the running instance. If the provided +// snapshot has the same root key as the running instance. If the provided // access is nil then it will skip that validation. func (b *RaftBackend) WriteSnapshotToTemp(in io.ReadCloser, access *seal.Access) (*os.File, func(), raft.SnapshotMeta, error) { b.l.RLock() diff --git a/vault/barrier.go b/vault/barrier.go index eaa3eb2e7638..a9b4ab9ae4df 100644 --- a/vault/barrier.go +++ b/vault/barrier.go @@ -35,15 +35,15 @@ const ( barrierInitPath = "barrier/init" // keyringPath is the location of the keyring data. This is encrypted - // by the master key. + // by the root key. keyringPath = "core/keyring" keyringPrefix = "core/" // keyringUpgradePrefix is the path used to store keyring update entries. // When running in HA mode, the active instance will install the new key // and re-write the keyring. For standby instances, they need an upgrade - // path from key N to N+1. They cannot just use the master key because - // in the event of a rekey, that master key can no longer decrypt the keyring. + // path from key N to N+1. They cannot just use the root key because + // in the event of a rekey, that root key can no longer decrypt the keyring. // When key N+1 is installed, we create an entry at "prefix/N" which uses // encryption key N to provide the N+1 key. The standby instances scan // for this periodically and refresh their keyring. The upgrade keys @@ -51,17 +51,17 @@ const ( // standby instances to upgrade without causing any disruption. keyringUpgradePrefix = "core/upgrade/" - // masterKeyPath is the location of the master key. This is encrypted + // rootKeyPath is the location of the root key. This is encrypted // by the latest key in the keyring. This is only used by standby instances // to handle the case of a rekey. If the active instance does a rekey, // the standby instances can no longer reload the keyring since they - // have the old master key. This key can be decrypted if you have the - // keyring to discover the new master key. The new master key is then + // have the old root key. This key can be decrypted if you have the + // keyring to discover the new root key. The new root key is then // used to reload the keyring itself. - masterKeyPath = "core/master" + rootKeyPath = "core/master" // shamirKekPath is used with Shamir in v1.3+ to store a copy of the - // unseal key behind the barrier. As with masterKeyPath this is primarily + // unseal key behind the barrier. As with rootKeyPath this is primarily // used by standbys to handle rekeys. It also comes into play when restoring // raft snapshots. shamirKekPath = "core/shamir-kek" @@ -75,14 +75,14 @@ const ( // a Vault. The barrier should only be Unlockable given its key. type SecurityBarrier interface { // Initialized checks if the barrier has been initialized - // and has a master key set. + // and has a root key set. Initialized(ctx context.Context) (bool, error) // Initialize works only if the barrier has not been initialized - // and makes use of the given master key. When sealKey is provided - // it's because we're using a new-style Shamir seal, and masterKey + // and makes use of the given root key. When sealKey is provided + // it's because we're using a new-style Shamir seal, and rootKey // is to be stored using sealKey to encrypt it. - Initialize(ctx context.Context, masterKey []byte, sealKey []byte, random io.Reader) error + Initialize(ctx context.Context, rootKey []byte, sealKey []byte, random io.Reader) error // GenerateKey is used to generate a new key GenerateKey(io.Reader) ([]byte, error) @@ -94,27 +94,27 @@ type SecurityBarrier interface { // is not expected to be able to perform any CRUD until it is unsealed. Sealed() (bool, error) - // Unseal is used to provide the master key which permits the barrier + // Unseal is used to provide the unseal key which permits the barrier // to be unsealed. If the key is not correct, the barrier remains sealed. Unseal(ctx context.Context, key []byte) error - // VerifyMaster is used to check if the given key matches the master key - VerifyMaster(key []byte) error + // VerifyRoot is used to check if the given key matches the root key + VerifyRoot(key []byte) error - // SetMasterKey is used to directly set a new master key. This is used in + // SetRootKey is used to directly set a new root key. This is used in // replicated scenarios due to the chicken and egg problem of reloading the - // keyring from disk before we have the master key to decrypt it. - SetMasterKey(key []byte) error + // keyring from disk before we have the root key to decrypt it. + SetRootKey(key []byte) error // ReloadKeyring is used to re-read the underlying keyring. // This is used for HA deployments to ensure the latest keyring // is present in the leader. ReloadKeyring(ctx context.Context) error - // ReloadMasterKey is used to re-read the underlying masterkey. - // This is used for HA deployments to ensure the latest master key + // ReloadRootKey is used to re-read the underlying root key. + // This is used for HA deployments to ensure the latest root key // is available for keyring reloading. - ReloadMasterKey(ctx context.Context) error + ReloadRootKey(ctx context.Context) error // Seal is used to re-seal the barrier. This requires the barrier to // be unsealed again to perform any further operations. diff --git a/vault/barrier_aes_gcm.go b/vault/barrier_aes_gcm.go index d1c82b1cf206..c4023559bccf 100644 --- a/vault/barrier_aes_gcm.go +++ b/vault/barrier_aes_gcm.go @@ -122,7 +122,7 @@ func NewAESGCMBarrier(physical physical.Backend) (*AESGCMBarrier, error) { } // Initialized checks if the barrier has been initialized -// and has a master key set. +// and has a root key set. func (b *AESGCMBarrier) Initialized(ctx context.Context) (bool, error) { if b.initialized.Load() { return true, nil @@ -148,7 +148,7 @@ func (b *AESGCMBarrier) Initialized(ctx context.Context) (bool, error) { } // Initialize works only if the barrier has not been initialized -// and makes use of the given master key. +// and makes use of the given root key. func (b *AESGCMBarrier) Initialize(ctx context.Context, key, sealKey []byte, reader io.Reader) error { // Verify the key size min, max := b.KeyLength() @@ -171,7 +171,7 @@ func (b *AESGCMBarrier) Initialize(ctx context.Context, key, sealKey []byte, rea // Create a new keyring, install the keys keyring := NewKeyring() - keyring = keyring.SetMasterKey(key) + keyring = keyring.SetRootKey(key) keyring, err = keyring.AddKey(&Key{ Term: 1, Version: 1, @@ -205,7 +205,7 @@ func (b *AESGCMBarrier) Initialize(ctx context.Context, key, sealKey []byte, rea } // persistKeyring is used to write out the keyring using the -// master key to encrypt it. +// root key to encrypt it. func (b *AESGCMBarrier) persistKeyring(ctx context.Context, keyring *Keyring) error { // Create the keyring entry keyringBuf, err := keyring.Serialize() @@ -215,7 +215,7 @@ func (b *AESGCMBarrier) persistKeyring(ctx context.Context, keyring *Keyring) er } // Create the AES-GCM - gcm, err := b.aeadFromKey(keyring.MasterKey()) + gcm, err := b.aeadFromKey(keyring.RootKey()) if err != nil { return err } @@ -235,36 +235,36 @@ func (b *AESGCMBarrier) persistKeyring(ctx context.Context, keyring *Keyring) er return fmt.Errorf("failed to persist keyring: %w", err) } - // Serialize the master key value + // Serialize the root key value key := &Key{ Term: 1, Version: 1, - Value: keyring.MasterKey(), + Value: keyring.RootKey(), } keyBuf, err := key.Serialize() defer memzero(keyBuf) if err != nil { - return fmt.Errorf("failed to serialize master key: %w", err) + return fmt.Errorf("failed to serialize root key: %w", err) } - // Encrypt the master key + // Encrypt the root key activeKey := keyring.ActiveKey() aead, err := b.aeadFromKey(activeKey.Value) if err != nil { return err } - value, err = b.encryptTracked(masterKeyPath, activeKey.Term, aead, keyBuf) + value, err = b.encryptTracked(rootKeyPath, activeKey.Term, aead, keyBuf) if err != nil { return err } - // Update the masterKeyPath for standby instances + // Update the rootKeyPath for standby instances pe = &physical.Entry{ - Key: masterKeyPath, + Key: rootKeyPath, Value: value, } if err := b.backend.Put(ctx, pe); err != nil { - return fmt.Errorf("failed to persist master key: %w", err) + return fmt.Errorf("failed to persist root key: %w", err) } return nil } @@ -292,14 +292,14 @@ func (b *AESGCMBarrier) Sealed() (bool, error) { return sealed, nil } -// VerifyMaster is used to check if the given key matches the master key -func (b *AESGCMBarrier) VerifyMaster(key []byte) error { +// VerifyRoot is used to check if the given key matches the root key +func (b *AESGCMBarrier) VerifyRoot(key []byte) error { b.l.RLock() defer b.l.RUnlock() if b.sealed { return ErrBarrierSealed } - if subtle.ConstantTimeCompare(key, b.keyring.MasterKey()) != 1 { + if subtle.ConstantTimeCompare(key, b.keyring.RootKey()) != 1 { return ErrBarrierInvalidKey } return nil @@ -313,7 +313,7 @@ func (b *AESGCMBarrier) ReloadKeyring(ctx context.Context) error { defer b.l.Unlock() // Create the AES-GCM - gcm, err := b.aeadFromKey(b.keyring.MasterKey()) + gcm, err := b.aeadFromKey(b.keyring.RootKey()) if err != nil { return err } @@ -367,19 +367,19 @@ func (b *AESGCMBarrier) recoverKeyring(plaintext []byte) error { return nil } -// ReloadMasterKey is used to re-read the underlying masterkey. -// This is used for HA deployments to ensure the latest master key +// ReloadRootKey is used to re-read the underlying root key. +// This is used for HA deployments to ensure the latest root key // is available for keyring reloading. -func (b *AESGCMBarrier) ReloadMasterKey(ctx context.Context) error { - // Read the masterKeyPath upgrade - out, err := b.Get(ctx, masterKeyPath) +func (b *AESGCMBarrier) ReloadRootKey(ctx context.Context) error { + // Read the rootKeyPath upgrade + out, err := b.Get(ctx, rootKeyPath) if err != nil { - return fmt.Errorf("failed to read master key path: %w", err) + return fmt.Errorf("failed to read root key path: %w", err) } - // The masterKeyPath could be missing (backwards incompatible), + // The rootKeyPath could be missing (backwards incompatible), // we can ignore this and attempt to make progress with the current - // master key. + // root key. if out == nil { return nil } @@ -388,35 +388,35 @@ func (b *AESGCMBarrier) ReloadMasterKey(ctx context.Context) error { b.l.Lock() defer b.l.Unlock() - out, err = b.lockSwitchedGet(ctx, masterKeyPath, false) + out, err = b.lockSwitchedGet(ctx, rootKeyPath, false) if err != nil { - return fmt.Errorf("failed to read master key path: %w", err) + return fmt.Errorf("failed to read root key path: %w", err) } if out == nil { return nil } - // Deserialize the master key + // Deserialize the root key key, err := DeserializeKey(out.Value) memzero(out.Value) if err != nil { return fmt.Errorf("failed to deserialize key: %w", err) } - // Check if the master key is the same - if subtle.ConstantTimeCompare(b.keyring.MasterKey(), key.Value) == 1 { + // Check if the root key is the same + if subtle.ConstantTimeCompare(b.keyring.RootKey(), key.Value) == 1 { return nil } - // Update the master key + // Update the root key oldKeyring := b.keyring - b.keyring = b.keyring.SetMasterKey(key.Value) + b.keyring = b.keyring.SetRootKey(key.Value) oldKeyring.Zeroize(false) return nil } -// Unseal is used to provide the master key which permits the barrier +// Unseal is used to provide the root key which permits the barrier // to be unsealed. If the key is not correct, the barrier remains sealed. func (b *AESGCMBarrier) Unseal(ctx context.Context, key []byte) error { b.l.Lock() @@ -499,9 +499,9 @@ func (b *AESGCMBarrier) Unseal(ctx context.Context, key []byte) error { // Setup a new keyring, this is for backwards compatibility keyringNew := NewKeyring() - keyring := keyringNew.SetMasterKey(key) + keyring := keyringNew.SetRootKey(key) - // AddKey reuses the master, so we are only zeroizing after this call + // AddKey reuses the root, so we are only zeroizing after this call defer keyringNew.Zeroize(false) keyring, err = keyring.AddKey(&Key{ @@ -719,12 +719,12 @@ func (b *AESGCMBarrier) ActiveKeyInfo() (*KeyInfo, error) { return info, nil } -// Rekey is used to change the master key used to protect the keyring +// Rekey is used to change the root key used to protect the keyring func (b *AESGCMBarrier) Rekey(ctx context.Context, key []byte) error { b.l.Lock() defer b.l.Unlock() - newKeyring, err := b.updateMasterKeyCommon(key) + newKeyring, err := b.updateRootKeyCommon(key) if err != nil { return err } @@ -741,13 +741,13 @@ func (b *AESGCMBarrier) Rekey(ctx context.Context, key []byte) error { return nil } -// SetMasterKey updates the keyring's in-memory master key but does not persist +// SetRootKey updates the keyring's in-memory root key but does not persist // anything to storage -func (b *AESGCMBarrier) SetMasterKey(key []byte) error { +func (b *AESGCMBarrier) SetRootKey(key []byte) error { b.l.Lock() defer b.l.Unlock() - newKeyring, err := b.updateMasterKeyCommon(key) + newKeyring, err := b.updateRootKeyCommon(key) if err != nil { return err } @@ -759,9 +759,9 @@ func (b *AESGCMBarrier) SetMasterKey(key []byte) error { return nil } -// Performs common tasks related to updating the master key; note that the lock +// Performs common tasks related to updating the root key; note that the lock // must be held before calling this function -func (b *AESGCMBarrier) updateMasterKeyCommon(key []byte) (*Keyring, error) { +func (b *AESGCMBarrier) updateRootKeyCommon(key []byte) (*Keyring, error) { if b.sealed { return nil, ErrBarrierSealed } @@ -772,7 +772,7 @@ func (b *AESGCMBarrier) updateMasterKeyCommon(key []byte) (*Keyring, error) { return nil, fmt.Errorf("key size must be %d or %d", min, max) } - return b.keyring.SetMasterKey(key), nil + return b.keyring.SetRootKey(key), nil } // Put is used to insert or update an entry diff --git a/vault/barrier_test.go b/vault/barrier_test.go index 14f9b8317f3b..2c66fe748f87 100644 --- a/vault/barrier_test.go +++ b/vault/barrier_test.go @@ -245,8 +245,8 @@ func testInitAndUnseal(t *testing.T, b SecurityBarrier) (error, *logical.Storage t.Fatalf("should be unsealed") } - // Verify the master key - if err := b.VerifyMaster(key); err != nil { + // Verify the root key + if err := b.VerifyRoot(key); err != nil { t.Fatalf("err: %v", err) } return err, e, key @@ -374,7 +374,7 @@ func testBarrier_Rekey(t *testing.T, b SecurityBarrier) { } // Verify the master key - if err := b.VerifyMaster(key); err != nil { + if err := b.VerifyRoot(key); err != nil { t.Fatalf("err: %v", err) } @@ -386,12 +386,12 @@ func testBarrier_Rekey(t *testing.T, b SecurityBarrier) { } // Verify the old master key - if err := b.VerifyMaster(key); err != ErrBarrierInvalidKey { + if err := b.VerifyRoot(key); err != ErrBarrierInvalidKey { t.Fatalf("err: %v", err) } // Verify the new master key - if err := b.VerifyMaster(newKey); err != nil { + if err := b.VerifyRoot(newKey); err != nil { t.Fatalf("err: %v", err) } @@ -530,7 +530,7 @@ func testBarrier_Upgrade_Rekey(t *testing.T, b1, b2 SecurityBarrier) { } // Reload the master key - err = b2.ReloadMasterKey(context.Background()) + err = b2.ReloadRootKey(context.Background()) if err != nil { t.Fatalf("err: %v", err) } diff --git a/vault/core.go b/vault/core.go index d7a5e91cd5f0..a37718e044a2 100644 --- a/vault/core.go +++ b/vault/core.go @@ -2547,7 +2547,7 @@ func (c *Core) adjustSealConfigDuringMigration(existBarrierSealConfig, existReco } } -func (c *Core) unsealKeyToMasterKeyPostUnseal(ctx context.Context, combinedKey []byte) ([]byte, error) { +func (c *Core) unsealKeyToRootKeyPostUnseal(ctx context.Context, combinedKey []byte) ([]byte, error) { return c.unsealKeyToMasterKey(ctx, c.seal, combinedKey, true, false) } @@ -2586,7 +2586,7 @@ func (c *Core) unsealKeyToMasterKey(ctx context.Context, seal Seal, combinedKey } return storedKeys[0], nil - case vaultseal.StoredKeysSupportedShamirMaster: + case vaultseal.StoredKeysSupportedShamirRoot: if useTestSeal { testseal := NewDefaultSeal(&vaultseal.Access{ Wrapper: aeadwrapper.NewShamirWrapper(&wrapping.WrapperOptions{ diff --git a/vault/generate_root.go b/vault/generate_root.go index b701e5bfe51d..b556d7d7b47e 100644 --- a/vault/generate_root.go +++ b/vault/generate_root.go @@ -38,12 +38,12 @@ type GenerateRootStrategy interface { type generateStandardRootToken struct{} func (g generateStandardRootToken) authenticate(ctx context.Context, c *Core, combinedKey []byte) error { - masterKey, err := c.unsealKeyToMasterKeyPostUnseal(ctx, combinedKey) + rootKey, err := c.unsealKeyToRootKeyPostUnseal(ctx, combinedKey) if err != nil { return fmt.Errorf("unable to authenticate: %w", err) } - if err := c.barrier.VerifyMaster(masterKey); err != nil { - return fmt.Errorf("master key verification failed: %w", err) + if err := c.barrier.VerifyRoot(rootKey); err != nil { + return fmt.Errorf("root key verification failed: %w", err) } return nil @@ -303,7 +303,7 @@ func (c *Core) GenerateRootUpdate(ctx context.Context, key []byte, nonce string, combinedKey, err = shamir.Combine(c.generateRootProgress) c.generateRootProgress = nil if err != nil { - return nil, fmt.Errorf("failed to compute master key: %w", err) + return nil, fmt.Errorf("failed to compute root key: %w", err) } } diff --git a/vault/generate_root_recovery.go b/vault/generate_root_recovery.go index a457fd71c37f..afafb5c59955 100644 --- a/vault/generate_root_recovery.go +++ b/vault/generate_root_recovery.go @@ -21,12 +21,12 @@ type generateRecoveryToken struct { } func (g *generateRecoveryToken) authenticate(ctx context.Context, c *Core, combinedKey []byte) error { - key, err := c.unsealKeyToMasterKeyPostUnseal(ctx, combinedKey) + key, err := c.unsealKeyToRootKeyPostUnseal(ctx, combinedKey) if err != nil { return fmt.Errorf("unable to authenticate: %w", err) } - // Use the retrieved master key to unseal the barrier + // Use the retrieved root key to unseal the barrier if err := c.barrier.Unseal(ctx, key); err != nil { return fmt.Errorf("recovery operation token generation failed, cannot unseal barrier: %w", err) } diff --git a/vault/ha.go b/vault/ha.go index 54d518991fc2..83ca3604f21a 100644 --- a/vault/ha.go +++ b/vault/ha.go @@ -825,9 +825,9 @@ func (c *Core) checkKeyUpgrades(ctx context.Context) error { return nil } -func (c *Core) reloadMasterKey(ctx context.Context) error { - if err := c.barrier.ReloadMasterKey(ctx); err != nil { - return fmt.Errorf("error reloading master key: %w", err) +func (c *Core) reloadRootKey(ctx context.Context) error { + if err := c.barrier.ReloadRootKey(ctx); err != nil { + return fmt.Errorf("error reloading root key: %w", err) } return nil } @@ -841,7 +841,7 @@ func (c *Core) reloadShamirKey(ctx context.Context) error { switch c.seal.StoredKeysSupported() { case seal.StoredKeysSupportedGeneric: return nil - case seal.StoredKeysSupportedShamirMaster: + case seal.StoredKeysSupportedShamirRoot: entry, err := c.barrier.Get(ctx, shamirKekPath) if err != nil { return err @@ -855,7 +855,7 @@ func (c *Core) reloadShamirKey(ctx context.Context) error { if err != nil { return fmt.Errorf("failed to update seal access: %w", err) } - shamirKey = keyring.masterKey + shamirKey = keyring.rootKey } return c.seal.GetAccess().Wrapper.(*aeadwrapper.ShamirWrapper).SetAESGCMKeyBytes(shamirKey) } @@ -865,8 +865,8 @@ func (c *Core) performKeyUpgrades(ctx context.Context) error { return fmt.Errorf("error checking for key upgrades: %w", err) } - if err := c.reloadMasterKey(ctx); err != nil { - return fmt.Errorf("error reloading master key: %w", err) + if err := c.reloadRootKey(ctx); err != nil { + return fmt.Errorf("error reloading root key: %w", err) } if err := c.barrier.ReloadKeyring(ctx); err != nil { diff --git a/vault/init.go b/vault/init.go index 24ea18120d0b..6efbcd826753 100644 --- a/vault/init.go +++ b/vault/init.go @@ -122,19 +122,19 @@ func (c *Core) InitializedLocally(ctx context.Context) (bool, error) { } func (c *Core) generateShares(sc *SealConfig) ([]byte, [][]byte, error) { - // Generate a master key - masterKey, err := c.barrier.GenerateKey(c.secureRandomReader) + // Generate a root key + rootKey, err := c.barrier.GenerateKey(c.secureRandomReader) if err != nil { return nil, nil, fmt.Errorf("key generation failed: %w", err) } - // Return the master key if only a single key part is used + // Return the root key if only a single key part is used var unsealKeys [][]byte if sc.SecretShares == 1 { - unsealKeys = append(unsealKeys, masterKey) + unsealKeys = append(unsealKeys, rootKey) } else { - // Split the master key using the Shamir algorithm - shares, err := shamir.Split(masterKey, sc.SecretShares, sc.SecretThreshold) + // Split the root key using the Shamir algorithm + shares, err := shamir.Split(rootKey, sc.SecretShares, sc.SecretThreshold) if err != nil { return nil, nil, fmt.Errorf("failed to generate barrier shares: %w", err) } @@ -154,7 +154,7 @@ func (c *Core) generateShares(sc *SealConfig) ([]byte, [][]byte, error) { unsealKeys = encryptedShares } - return masterKey, unsealKeys, nil + return rootKey, unsealKeys, nil } // Initialize is used to initialize the Vault with the given @@ -172,7 +172,7 @@ func (c *Core) Initialize(ctx context.Context, initParams *InitParams) (*InitRes // N.B. Although the core is capable of handling situations where some keys // are stored and some aren't, in practice, replication + HSMs makes this // extremely hard to reason about, to the point that it will probably never - // be supported. The reason is that each HSM needs to encode the master key + // be supported. The reason is that each HSM needs to encode the root key // separately, which means the shares must be generated independently, // which means both that the shares will be different *AND* there would // need to be a way to actually allow fetching of the generated keys by @@ -322,7 +322,7 @@ func (c *Core) Initialize(ctx context.Context, initParams *InitParams) (*InitRes // If we are storing shares, pop them out of the returned results and push // them through the seal switch c.seal.StoredKeysSupported() { - case seal.StoredKeysSupportedShamirMaster: + case seal.StoredKeysSupportedShamirRoot: keysToStore := [][]byte{barrierKey} if err := c.seal.GetAccess().Wrapper.(*aeadwrapper.ShamirWrapper).SetAESGCMKeyBytes(sealKey); err != nil { c.logger.Error("failed to set seal key", "error", err) diff --git a/vault/keyring.go b/vault/keyring.go index 7db04a7c8650..4fa74145391c 100644 --- a/vault/keyring.go +++ b/vault/keyring.go @@ -31,11 +31,11 @@ var ( // The term used to encrypt a key is prefixed to the key written out. // All data is encrypted with the latest key, but storing the old keys // allows for decryption of keys written previously. Along with the encryption -// keys, the keyring also tracks the master key. This is necessary so that -// when a new key is added to the keyring, we can encrypt with the master key +// keys, the keyring also tracks the root key. This is necessary so that +// when a new key is added to the keyring, we can encrypt with the root key // and write out the new keyring. type Keyring struct { - masterKey []byte + rootKey []byte keys map[uint32]*Key activeTerm uint32 rotationConfig KeyRotationConfig @@ -90,7 +90,7 @@ func NewKeyring() *Keyring { // Clone returns a new copy of the keyring func (k *Keyring) Clone() *Keyring { clone := &Keyring{ - masterKey: k.masterKey, + rootKey: k.rootKey, keys: make(map[uint32]*Key, len(k.keys)), activeTerm: k.activeTerm, rotationConfig: k.rotationConfig, @@ -170,25 +170,25 @@ func (k *Keyring) TermKey(term uint32) *Key { return k.keys[term] } -// SetMasterKey is used to update the master key -func (k *Keyring) SetMasterKey(val []byte) *Keyring { +// SetRootKey is used to update the root key +func (k *Keyring) SetRootKey(val []byte) *Keyring { valCopy := make([]byte, len(val)) copy(valCopy, val) clone := k.Clone() - clone.masterKey = valCopy + clone.rootKey = valCopy return clone } -// MasterKey returns the master key -func (k *Keyring) MasterKey() []byte { - return k.masterKey +// RootKey returns the root key +func (k *Keyring) RootKey() []byte { + return k.rootKey } // Serialize is used to create a byte encoded keyring func (k *Keyring) Serialize() ([]byte, error) { // Create the encoded entry enc := EncodedKeyring{ - MasterKey: k.masterKey, + MasterKey: k.rootKey, RotationConfig: k.rotationConfig, } for _, key := range k.keys { @@ -210,7 +210,7 @@ func DeserializeKeyring(buf []byte) (*Keyring, error) { // Create a new keyring k := NewKeyring() - k.masterKey = enc.MasterKey + k.rootKey = enc.MasterKey k.rotationConfig = enc.RotationConfig k.rotationConfig.Sanitize() for _, key := range enc.Keys { @@ -229,8 +229,8 @@ func (k *Keyring) Zeroize(keysToo bool) { if k == nil { return } - if k.masterKey != nil { - memzero(k.masterKey) + if k.rootKey != nil { + memzero(k.rootKey) } if !keysToo || k.keys == nil { return diff --git a/vault/keyring_test.go b/vault/keyring_test.go index aaac35b61901..bb6a5047598d 100644 --- a/vault/keyring_test.go +++ b/vault/keyring_test.go @@ -113,21 +113,21 @@ func TestKeyring_MasterKey(t *testing.T) { master2 := []byte("test2") // Check no master - out := k.MasterKey() + out := k.RootKey() if out != nil { t.Fatalf("bad: %v", out) } // Set master - k = k.SetMasterKey(master) - out = k.MasterKey() + k = k.SetRootKey(master) + out = k.RootKey() if !bytes.Equal(out, master) { t.Fatalf("bad: %v", out) } // Update master - k = k.SetMasterKey(master2) - out = k.MasterKey() + k = k.SetRootKey(master2) + out = k.RootKey() if !bytes.Equal(out, master2) { t.Fatalf("bad: %v", out) } @@ -136,7 +136,7 @@ func TestKeyring_MasterKey(t *testing.T) { func TestKeyring_Serialize(t *testing.T) { k := NewKeyring() master := []byte("test") - k = k.SetMasterKey(master) + k = k.SetRootKey(master) now := time.Now() testKey := []byte("testing") @@ -154,7 +154,7 @@ func TestKeyring_Serialize(t *testing.T) { t.Fatalf("err: %v", err) } - out := k2.MasterKey() + out := k2.RootKey() if !bytes.Equal(out, master) { t.Fatalf("bad: %v", out) } diff --git a/vault/logical_system_paths.go b/vault/logical_system_paths.go index 06fae5226a79..48173bd2115d 100644 --- a/vault/logical_system_paths.go +++ b/vault/logical_system_paths.go @@ -156,7 +156,7 @@ func (b *SystemBackend) configPaths() []*framework.Path { Fields: map[string]*framework.FieldSchema{ "key": { Type: framework.TypeString, - Description: "Specifies a single master key share.", + Description: "Specifies a single unseal key share.", }, "nonce": { Type: framework.TypeString, @@ -165,8 +165,8 @@ func (b *SystemBackend) configPaths() []*framework.Path { }, Operations: map[logical.Operation]framework.OperationHandler{ logical.UpdateOperation: &framework.PathOperation{ - Summary: "Enter a single master key share to progress the root generation attempt.", - Description: "If the threshold number of master key shares is reached, Vault will complete the root generation and issue the new token. Otherwise, this API must be called multiple times until that threshold is met. The attempt nonce must be provided with each call.", + Summary: "Enter a single unseal key share to progress the root generation attempt.", + Description: "If the threshold number of unseal key shares is reached, Vault will complete the root generation and issue the new token. Otherwise, this API must be called multiple times until that threshold is met. The attempt nonce must be provided with each call.", }, }, @@ -239,11 +239,11 @@ func (b *SystemBackend) configPaths() []*framework.Path { }, "secret_shares": { Type: framework.TypeInt, - Description: "Specifies the number of shares to split the master key into.", + Description: "Specifies the number of shares to split the unseal key into.", }, "secret_threshold": { Type: framework.TypeInt, - Description: "Specifies the number of shares required to reconstruct the master key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as `secret_shares`.", + Description: "Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as `secret_shares`.", }, "stored_shares": { Type: framework.TypeInt, @@ -299,11 +299,11 @@ func (b *SystemBackend) rekeyPaths() []*framework.Path { Fields: map[string]*framework.FieldSchema{ "secret_shares": { Type: framework.TypeInt, - Description: "Specifies the number of shares to split the master key into.", + Description: "Specifies the number of shares to split the unseal key into.", }, "secret_threshold": { Type: framework.TypeInt, - Description: "Specifies the number of shares required to reconstruct the master key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as secret_shares.", + Description: "Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as secret_shares.", }, "pgp_keys": { Type: framework.TypeCommaStringSlice, @@ -372,7 +372,7 @@ func (b *SystemBackend) rekeyPaths() []*framework.Path { Fields: map[string]*framework.FieldSchema{ "key": { Type: framework.TypeString, - Description: "Specifies a single master key share.", + Description: "Specifies a single unseal key share.", }, "nonce": { Type: framework.TypeString, @@ -382,7 +382,7 @@ func (b *SystemBackend) rekeyPaths() []*framework.Path { Operations: map[logical.Operation]framework.OperationHandler{ logical.UpdateOperation: &framework.PathOperation{ - Summary: "Enter a single master key share to progress the rekey of the Vault.", + Summary: "Enter a single unseal key share to progress the rekey of the Vault.", }, }, }, @@ -392,7 +392,7 @@ func (b *SystemBackend) rekeyPaths() []*framework.Path { Fields: map[string]*framework.FieldSchema{ "key": { Type: framework.TypeString, - Description: "Specifies a single master share key from the new set of shares.", + Description: "Specifies a single unseal share key from the new set of shares.", }, "nonce": { Type: framework.TypeString, @@ -430,7 +430,7 @@ func (b *SystemBackend) rekeyPaths() []*framework.Path { Fields: map[string]*framework.FieldSchema{ "key": { Type: framework.TypeString, - Description: "Specifies a single master key share. This is required unless reset is true.", + Description: "Specifies a single unseal key share. This is required unless reset is true.", }, "reset": { Type: framework.TypeBool, diff --git a/vault/raft.go b/vault/raft.go index 8c5c6ed0c07b..7ac373700264 100644 --- a/vault/raft.go +++ b/vault/raft.go @@ -605,7 +605,7 @@ func (c *Core) checkRaftTLSKeyUpgrades(ctx context.Context) error { // handleSnapshotRestore is for the raft backend to hook back into core after a // snapshot is restored so we can clear the necessary caches and handle changing -// keyrings or master keys +// keyrings or root keys func (c *Core) raftSnapshotRestoreCallback(grabLock bool, sealNode bool) func(context.Context) error { return func(ctx context.Context) (retErr error) { c.logger.Info("running post snapshot restore invalidations") @@ -635,10 +635,10 @@ func (c *Core) raftSnapshotRestoreCallback(grabLock bool, sealNode bool) func(co c.physicalCache.Purge(ctx) // Reload the keyring in case it changed. If this fails it's likely - // we've changed master keys. + // we've changed root keys. err := c.performKeyUpgrades(ctx) if err != nil { - // The snapshot contained a master key or keyring we couldn't + // The snapshot contained a root key or keyring we couldn't // recover switch c.seal.BarrierType() { case wrapping.Shamir: @@ -667,7 +667,7 @@ func (c *Core) raftSnapshotRestoreCallback(grabLock bool, sealNode bool) func(co c.logger.Error("raft snapshot restore failed to unseal barrier", "error", err) return err } - c.logger.Info("done reloading master key using auto seal") + c.logger.Info("done reloading root key using auto seal") } } diff --git a/vault/rekey.go b/vault/rekey.go index 4ce863856764..9ee4c466337d 100644 --- a/vault/rekey.go +++ b/vault/rekey.go @@ -331,7 +331,7 @@ func (c *Core) BarrierRekeyUpdate(ctx context.Context, key []byte, nonce string) // Get the seal configuration var existingConfig *SealConfig var err error - var useRecovery bool // Determines whether recovery key is being used to rekey the master key + var useRecovery bool // Determines whether recovery key is being used to rekey the root key if c.seal.StoredKeysSupported() == seal.StoredKeysSupportedGeneric && c.seal.RecoveryKeySupported() { existingConfig, err = c.seal.RecoveryConfig(ctx) useRecovery = true @@ -377,7 +377,7 @@ func (c *Core) BarrierRekeyUpdate(ctx context.Context, key []byte, nonce string) return nil, nil } - // Recover the master key or recovery key + // Recover the root key or recovery key var recoveredKey []byte if existingConfig.SecretThreshold == 1 { recoveredKey = c.barrierRekeyConfig.RekeyProgress[0] @@ -386,7 +386,7 @@ func (c *Core) BarrierRekeyUpdate(ctx context.Context, key []byte, nonce string) recoveredKey, err = shamir.Combine(c.barrierRekeyConfig.RekeyProgress) c.barrierRekeyConfig.RekeyProgress = nil if err != nil { - return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to compute master key: %w", err).Error()) + return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to compute root key: %w", err).Error()) } } @@ -397,7 +397,7 @@ func (c *Core) BarrierRekeyUpdate(ctx context.Context, key []byte, nonce string) return nil, logical.CodedError(http.StatusBadRequest, fmt.Errorf("recovery key verification failed: %w", err).Error()) } case c.seal.BarrierType() == wrapping.Shamir: - if c.seal.StoredKeysSupported() == seal.StoredKeysSupportedShamirMaster { + if c.seal.StoredKeysSupported() == seal.StoredKeysSupportedShamirRoot { testseal := NewDefaultSeal(&seal.Access{ Wrapper: aeadwrapper.NewShamirWrapper(&wrapping.WrapperOptions{ Logger: c.logger.Named("testseal"), @@ -415,23 +415,23 @@ func (c *Core) BarrierRekeyUpdate(ctx context.Context, key []byte, nonce string) testseal.SetCachedBarrierConfig(cfg) stored, err := testseal.GetStoredKeys(ctx) if err != nil { - return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to read master key: %w", err).Error()) + return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to read root key: %w", err).Error()) } recoveredKey = stored[0] } - if err := c.barrier.VerifyMaster(recoveredKey); err != nil { - c.logger.Error("master key verification failed", "error", err) - return nil, logical.CodedError(http.StatusBadRequest, fmt.Errorf("master key verification failed: %w", err).Error()) + if err := c.barrier.VerifyRoot(recoveredKey); err != nil { + c.logger.Error("root key verification failed", "error", err) + return nil, logical.CodedError(http.StatusBadRequest, fmt.Errorf("rootter key verification failed: %w", err).Error()) } } - // Generate a new key: for AutoUnseal, this is a new master key; for Shamir, + // Generate a new key: for AutoUnseal, this is a new root key; for Shamir, // this is a new unseal key, and performBarrierRekey will also generate a - // new master key. + // new root key. newKey, err := c.barrier.GenerateKey(c.secureRandomReader) if err != nil { - c.logger.Error("failed to generate master key", "error", err) - return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("master key generation failed: %w", err).Error()) + c.logger.Error("failed to generate root key", "error", err) + return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("root key generation failed: %w", err).Error()) } results := &RekeyResult{ @@ -538,17 +538,17 @@ func (c *Core) performBarrierRekey(ctx context.Context, newSealKey []byte) logic } } - newMasterKey, err := c.barrier.GenerateKey(c.secureRandomReader) + newRootKey, err := c.barrier.GenerateKey(c.secureRandomReader) if err != nil { return logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to perform rekey: %w", err).Error()) } - if err := c.seal.SetStoredKeys(ctx, [][]byte{newMasterKey}); err != nil { + if err := c.seal.SetStoredKeys(ctx, [][]byte{newRootKey}); err != nil { c.logger.Error("failed to store keys", "error", err) return logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to store keys: %w", err).Error()) } // Rekey the barrier - if err := c.barrier.Rekey(ctx, newMasterKey); err != nil { + if err := c.barrier.Rekey(ctx, newRootKey); err != nil { c.logger.Error("failed to rekey barrier", "error", err) return logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to rekey barrier: %w", err).Error()) } @@ -655,7 +655,7 @@ func (c *Core) RecoveryRekeyUpdate(ctx context.Context, key []byte, nonce string return nil, nil } - // Recover the master key + // Recover the root key var recoveryKey []byte if existingConfig.SecretThreshold == 1 { recoveryKey = c.recoveryRekeyConfig.RekeyProgress[0] @@ -674,23 +674,23 @@ func (c *Core) RecoveryRekeyUpdate(ctx context.Context, key []byte, nonce string return nil, logical.CodedError(http.StatusBadRequest, fmt.Errorf("recovery key verification failed: %w", err).Error()) } - // Generate a new master key - newMasterKey, err := c.barrier.GenerateKey(c.secureRandomReader) + // Generate a new root key + newRecoveryKey, err := c.barrier.GenerateKey(c.secureRandomReader) if err != nil { c.logger.Error("failed to generate recovery key", "error", err) return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("recovery key generation failed: %w", err).Error()) } - // Return the master key if only a single key part is used + // Return the root key if only a single key part is used results := &RekeyResult{ Backup: c.recoveryRekeyConfig.Backup, } if c.recoveryRekeyConfig.SecretShares == 1 { - results.SecretShares = append(results.SecretShares, newMasterKey) + results.SecretShares = append(results.SecretShares, newRecoveryKey) } else { - // Split the master key using the Shamir algorithm - shares, err := shamir.Split(newMasterKey, c.recoveryRekeyConfig.SecretShares, c.recoveryRekeyConfig.SecretThreshold) + // Split the root key using the Shamir algorithm + shares, err := shamir.Split(newRecoveryKey, c.recoveryRekeyConfig.SecretShares, c.recoveryRekeyConfig.SecretThreshold) if err != nil { c.logger.Error("failed to generate shares", "error", err) return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to generate shares: %w", err).Error()) @@ -748,14 +748,14 @@ func (c *Core) RecoveryRekeyUpdate(ctx context.Context, key []byte, nonce string return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to generate verification nonce: %w", err).Error()) } c.recoveryRekeyConfig.VerificationNonce = nonce - c.recoveryRekeyConfig.VerificationKey = newMasterKey + c.recoveryRekeyConfig.VerificationKey = newRecoveryKey results.VerificationRequired = true results.VerificationNonce = nonce return results, nil } - if err := c.performRecoveryRekey(ctx, newMasterKey); err != nil { + if err := c.performRecoveryRekey(ctx, newRecoveryKey); err != nil { return nil, logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to perform recovery rekey: %w", err).Error()) } @@ -763,8 +763,8 @@ func (c *Core) RecoveryRekeyUpdate(ctx context.Context, key []byte, nonce string return results, nil } -func (c *Core) performRecoveryRekey(ctx context.Context, newMasterKey []byte) logical.HTTPCodedError { - if err := c.seal.SetRecoveryKey(ctx, newMasterKey); err != nil { +func (c *Core) performRecoveryRekey(ctx context.Context, newRootKey []byte) logical.HTTPCodedError { + if err := c.seal.SetRecoveryKey(ctx, newRootKey); err != nil { c.logger.Error("failed to set recovery key", "error", err) return logical.CodedError(http.StatusInternalServerError, fmt.Errorf("failed to set recovery key: %w", err).Error()) } @@ -867,7 +867,7 @@ func (c *Core) RekeyVerify(ctx context.Context, key []byte, nonce string, recove } }() - // Recover the master key or recovery key + // Recover the root key or recovery key var recoveredKey []byte if config.SecretThreshold == 1 { recoveredKey = config.VerificationProgress[0] diff --git a/vault/seal.go b/vault/seal.go index 675b9a347c30..12476100ac50 100644 --- a/vault/seal.go +++ b/vault/seal.go @@ -23,7 +23,7 @@ const ( // barrierSealConfigPath is the path used to store our seal configuration. // This value is stored in plaintext, since we must be able to read it even // with the Vault sealed. This is required so that we know how many secret - // parts must be used to reconstruct the master key. + // parts must be used to reconstruct the unseal key. barrierSealConfigPath = "core/seal-config" // recoverySealConfigPath is the path to the recovery key seal @@ -132,7 +132,7 @@ func (d *defaultSeal) StoredKeysSupported() seal.StoredKeysSupport { case d.LegacySeal(): return seal.StoredKeysNotSupported default: - return seal.StoredKeysSupportedShamirMaster + return seal.StoredKeysSupportedShamirRoot } } diff --git a/vault/seal/seal.go b/vault/seal/seal.go index 2b318cfd863c..009e775b9e0b 100644 --- a/vault/seal/seal.go +++ b/vault/seal/seal.go @@ -15,7 +15,7 @@ const ( StoredKeysInvalid StoredKeysSupport = iota StoredKeysNotSupported StoredKeysSupportedGeneric - StoredKeysSupportedShamirMaster + StoredKeysSupportedShamirRoot ) func (s StoredKeysSupport) String() string { @@ -24,7 +24,7 @@ func (s StoredKeysSupport) String() string { return "Old-style Shamir" case StoredKeysSupportedGeneric: return "AutoUnseal" - case StoredKeysSupportedShamirMaster: + case StoredKeysSupportedShamirRoot: return "New-style Shamir" default: return "Invalid StoredKeys type" diff --git a/vault/seal_testing.go b/vault/seal_testing.go index 5c1baccb4059..982b44a3434b 100644 --- a/vault/seal_testing.go +++ b/vault/seal_testing.go @@ -12,7 +12,7 @@ func TestCoreUnsealedWithConfigs(t testing.T, barrierConf, recoveryConf *SealCon t.Helper() opts := &seal.TestSealOpts{} if recoveryConf == nil { - opts.StoredKeys = seal.StoredKeysSupportedShamirMaster + opts.StoredKeys = seal.StoredKeysSupportedShamirRoot } return TestCoreUnsealedWithConfigSealOpts(t, barrierConf, recoveryConf, opts) } diff --git a/vault/seal_testing_util.go b/vault/seal_testing_util.go index b5379f3ae672..193ec62dd92b 100644 --- a/vault/seal_testing_util.go +++ b/vault/seal_testing_util.go @@ -19,7 +19,7 @@ func NewTestSeal(t testing.T, opts *seal.TestSealOpts) Seal { } switch opts.StoredKeys { - case seal.StoredKeysSupportedShamirMaster: + case seal.StoredKeysSupportedShamirRoot: newSeal := NewDefaultSeal(&seal.Access{ Wrapper: aeadwrapper.NewShamirWrapper(&wrapping.WrapperOptions{ Logger: opts.Logger,