use envseal::keychain::MasterKey;
use envseal::vault::Vault;
use std::sync::Arc;
#[test]
fn concurrent_store_same_name() {
let dir = crate::common::vault_tempdir();
let key = MasterKey::from_test_bytes([0x77; 32]);
let vault = Arc::new(Vault::open_with_key(dir.path(), key).unwrap());
let mut handles = Vec::new();
for i in 0..20 {
let v = Arc::clone(&vault);
handles.push(std::thread::spawn(move || {
let value = format!("value-{i}");
v.store("contested", value.as_bytes(), true).unwrap();
}));
}
for h in handles {
h.join().unwrap();
}
let result = vault.decrypt("contested");
assert!(
result.is_ok(),
"Fix: contested secret must be readable after concurrent writes"
);
}