1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
package main
import (
"bytes"
"crypto/rand"
"crypto/rsa"
"encoding/json"
"fmt"
"net/http"
"net/http/httptest"
"testing"
"github.com/nsheridan/cashier/lib"
"github.com/nsheridan/cashier/testdata"
"golang.org/x/crypto/ssh"
"golang.org/x/crypto/ssh/agent"
)
func TestLoadCert(t *testing.T) {
priv, _ := ssh.ParseRawPrivateKey(testdata.Priv)
key := priv.(*rsa.PrivateKey)
pub, _ := ssh.NewPublicKey(&key.PublicKey)
c := &ssh.Certificate{
Key: pub,
CertType: ssh.UserCert,
ValidBefore: ssh.CertTimeInfinity,
ValidAfter: 0,
}
signer, err := ssh.NewSignerFromKey(key)
if err != nil {
t.Fatal(err)
}
c.SignCert(rand.Reader, signer)
a := agent.NewKeyring()
if err := installCert(a, c, key); err != nil {
t.Fatal(err)
}
listedKeys, err := a.List()
if err != nil {
t.Fatalf("Error reading from agent: %v", err)
}
if len(listedKeys) != 1 {
t.Fatalf("Expected 1 key, got %d", len(listedKeys))
}
if !bytes.Equal(listedKeys[0].Marshal(), c.Marshal()) {
t.Fatal("Certs not equal")
}
}
func TestSignGood(t *testing.T) {
res := &lib.SignResponse{
Status: "ok",
Response: string(testdata.Cert),
}
j, _ := json.Marshal(res)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
fmt.Fprintln(w, string(j))
}))
defer ts.Close()
*url = ts.URL
_, err := send([]byte(`{}`), "token")
if err != nil {
t.Fatal(err)
}
k, _, _, _, err := ssh.ParseAuthorizedKey(testdata.Pub)
if err != nil {
t.Fatal(err)
}
cert, err := sign(k, "token")
if cert == nil && err != nil {
t.Fatal(err)
}
}
func TestSignBad(t *testing.T) {
res := &lib.SignResponse{
Status: "error",
Response: `{"response": "error"}`,
}
j, _ := json.Marshal(res)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
fmt.Fprintln(w, string(j))
}))
defer ts.Close()
*url = ts.URL
_, err := send([]byte(`{}`), "token")
if err != nil {
t.Fatal(err)
}
k, _, _, _, err := ssh.ParseAuthorizedKey(testdata.Pub)
if err != nil {
t.Fatal(err)
}
cert, err := sign(k, "token")
if cert != nil && err == nil {
t.Fatal(err)
}
}
|