1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
|
package client
import (
"bytes"
"crypto/rand"
"crypto/rsa"
"encoding/json"
"fmt"
"net/http"
"net/http/httptest"
"testing"
"time"
"github.com/nsheridan/cashier/lib"
"github.com/nsheridan/cashier/testdata"
"golang.org/x/crypto/ssh"
"golang.org/x/crypto/ssh/agent"
)
func TestLoadCert(t *testing.T) {
priv, _ := ssh.ParseRawPrivateKey(testdata.Priv)
key := priv.(*rsa.PrivateKey)
pub, _ := ssh.NewPublicKey(&key.PublicKey)
c := &ssh.Certificate{
KeyId: "test_key_12345",
Key: pub,
CertType: ssh.UserCert,
ValidBefore: ssh.CertTimeInfinity,
ValidAfter: 0,
}
signer, err := ssh.NewSignerFromKey(key)
if err != nil {
t.Error(err)
}
c.SignCert(rand.Reader, signer)
a := agent.NewKeyring()
if err := InstallCert(a, c, key); err != nil {
t.Error(err)
}
listedKeys, err := a.List()
if err != nil {
t.Errorf("Error reading from agent: %v", err)
}
if len(listedKeys) != 2 {
t.Errorf("Expected 2 keys, got %d", len(listedKeys))
}
if !bytes.Equal(listedKeys[0].Marshal(), c.Marshal()) {
t.Error("Certs not equal")
}
for _, k := range listedKeys {
exp := time.Unix(int64(c.ValidBefore), 0).String()
want := fmt.Sprintf("%s [Expires %s]", c.KeyId, exp)
if k.Comment != want {
t.Errorf("key comment:\nwanted:%s\ngot: %s", want, k.Comment)
}
}
}
func TestSignGood(t *testing.T) {
res := &lib.SignResponse{
Status: "ok",
Response: string(testdata.Cert),
}
j, _ := json.Marshal(res)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
fmt.Fprintln(w, string(j))
}))
defer ts.Close()
_, err := send([]byte(`{}`), "token", ts.URL, true)
if err != nil {
t.Error(err)
}
k, _, _, _, err := ssh.ParseAuthorizedKey(testdata.Pub)
if err != nil {
t.Error(err)
}
c := &Config{
CA: ts.URL,
Validity: "24h",
}
cert, err := Sign(k, "token", "message", c)
if cert == nil && err != nil {
t.Error(err)
}
}
func TestSignBad(t *testing.T) {
res := &lib.SignResponse{
Status: "error",
Response: `{"response": "error"}`,
}
j, _ := json.Marshal(res)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
fmt.Fprintln(w, string(j))
}))
defer ts.Close()
_, err := send([]byte(`{}`), "token", ts.URL, true)
if err != nil {
t.Error(err)
}
k, _, _, _, err := ssh.ParseAuthorizedKey(testdata.Pub)
if err != nil {
t.Error(err)
}
c := &Config{
CA: ts.URL,
Validity: "24h",
}
cert, err := Sign(k, "token", "message", c)
if cert != nil && err == nil {
t.Error(err)
}
}
|