docs/trustmanager/x509utils_test.go

207 lines
6.3 KiB
Go

package trustmanager
import (
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/x509"
"io/ioutil"
"strings"
"testing"
"time"
"github.com/docker/notary/tuf/data"
"github.com/stretchr/testify/require"
)
func TestCertsToKeys(t *testing.T) {
// Get root certificate
rootCA, err := LoadCertFromFile("../fixtures/root-ca.crt")
require.NoError(t, err)
// Get intermediate certificate
intermediateCA, err := LoadCertFromFile("../fixtures/intermediate-ca.crt")
require.NoError(t, err)
// Get leaf certificate
leafCert, err := LoadCertFromFile("../fixtures/secure.example.com.crt")
require.NoError(t, err)
// Get our certList with Leaf Cert and Intermediate
certList := []*x509.Certificate{leafCert, intermediateCA, rootCA}
// Call CertsToKEys
keys := CertsToKeys(certList)
require.NotNil(t, keys)
require.Len(t, keys, 3)
// Call GetLeafCerts
newKeys := GetLeafCerts(certList)
require.NotNil(t, newKeys)
require.Len(t, newKeys, 1)
// Call GetIntermediateCerts (checks for certs with IsCA true)
newKeys = GetIntermediateCerts(certList)
require.NotNil(t, newKeys)
require.Len(t, newKeys, 2)
}
func TestNewCertificate(t *testing.T) {
startTime := time.Now()
endTime := startTime.AddDate(10, 0, 0)
cert, err := NewCertificate("docker.com/alpine", startTime, endTime)
require.NoError(t, err)
require.Equal(t, cert.Subject.CommonName, "docker.com/alpine")
require.Equal(t, cert.NotBefore, startTime)
require.Equal(t, cert.NotAfter, endTime)
}
func TestKeyOperations(t *testing.T) {
// Generate our ED25519 private key
edKey, err := GenerateED25519Key(rand.Reader)
require.NoError(t, err)
// Generate our EC private key
ecKey, err := GenerateECDSAKey(rand.Reader)
require.NoError(t, err)
// Generate our RSA private key
rsaKey, err := GenerateRSAKey(rand.Reader, 512)
// Encode our ED private key
edPEM, err := KeyToPEM(edKey, "root")
require.NoError(t, err)
// Encode our EC private key
ecPEM, err := KeyToPEM(ecKey, "root")
require.NoError(t, err)
// Encode our RSA private key
rsaPEM, err := KeyToPEM(rsaKey, "root")
require.NoError(t, err)
// Check to see if ED key it is encoded
stringEncodedEDKey := string(edPEM)
require.True(t, strings.Contains(stringEncodedEDKey, "-----BEGIN ED25519 PRIVATE KEY-----"))
// Check to see if EC key it is encoded
stringEncodedECKey := string(ecPEM)
require.True(t, strings.Contains(stringEncodedECKey, "-----BEGIN EC PRIVATE KEY-----"))
// Check to see if RSA key it is encoded
stringEncodedRSAKey := string(rsaPEM)
require.True(t, strings.Contains(stringEncodedRSAKey, "-----BEGIN RSA PRIVATE KEY-----"))
// Decode our ED Key
decodedEDKey, err := ParsePEMPrivateKey(edPEM, "")
require.NoError(t, err)
require.Equal(t, edKey.Private(), decodedEDKey.Private())
// Decode our EC Key
decodedECKey, err := ParsePEMPrivateKey(ecPEM, "")
require.NoError(t, err)
require.Equal(t, ecKey.Private(), decodedECKey.Private())
// Decode our RSA Key
decodedRSAKey, err := ParsePEMPrivateKey(rsaPEM, "")
require.NoError(t, err)
require.Equal(t, rsaKey.Private(), decodedRSAKey.Private())
// Encrypt our ED Key
encryptedEDKey, err := EncryptPrivateKey(edKey, "root", "ponies")
require.NoError(t, err)
// Encrypt our EC Key
encryptedECKey, err := EncryptPrivateKey(ecKey, "root", "ponies")
require.NoError(t, err)
// Encrypt our RSA Key
encryptedRSAKey, err := EncryptPrivateKey(rsaKey, "root", "ponies")
require.NoError(t, err)
// Check to see if ED key it is encrypted
stringEncryptedEDKey := string(encryptedEDKey)
require.True(t, strings.Contains(stringEncryptedEDKey, "-----BEGIN ED25519 PRIVATE KEY-----"))
require.True(t, strings.Contains(stringEncryptedEDKey, "Proc-Type: 4,ENCRYPTED"))
// Check to see if EC key it is encrypted
stringEncryptedECKey := string(encryptedECKey)
require.True(t, strings.Contains(stringEncryptedECKey, "-----BEGIN EC PRIVATE KEY-----"))
require.True(t, strings.Contains(stringEncryptedECKey, "Proc-Type: 4,ENCRYPTED"))
// Check to see if RSA key it is encrypted
stringEncryptedRSAKey := string(encryptedRSAKey)
require.True(t, strings.Contains(stringEncryptedRSAKey, "-----BEGIN RSA PRIVATE KEY-----"))
require.True(t, strings.Contains(stringEncryptedRSAKey, "Proc-Type: 4,ENCRYPTED"))
// Decrypt our ED Key
decryptedEDKey, err := ParsePEMPrivateKey(encryptedEDKey, "ponies")
require.NoError(t, err)
require.Equal(t, edKey.Private(), decryptedEDKey.Private())
// Decrypt our EC Key
decryptedECKey, err := ParsePEMPrivateKey(encryptedECKey, "ponies")
require.NoError(t, err)
require.Equal(t, ecKey.Private(), decryptedECKey.Private())
// Decrypt our RSA Key
decryptedRSAKey, err := ParsePEMPrivateKey(encryptedRSAKey, "ponies")
require.NoError(t, err)
require.Equal(t, rsaKey.Private(), decryptedRSAKey.Private())
}
// X509PublickeyID returns the public key ID of a RSA X509 key rather than the
// cert ID
func TestRSAX509PublickeyID(t *testing.T) {
fileBytes, err := ioutil.ReadFile("../fixtures/notary-server.key")
require.NoError(t, err)
privKey, err := ParsePEMPrivateKey(fileBytes, "")
require.NoError(t, err)
expectedTufID := privKey.ID()
cert, err := LoadCertFromFile("../fixtures/notary-server.crt")
require.NoError(t, err)
rsaKeyBytes, err := x509.MarshalPKIXPublicKey(cert.PublicKey)
require.NoError(t, err)
sameWayTufID := data.NewPublicKey(data.RSAKey, rsaKeyBytes).ID()
actualTufKey := CertToKey(cert)
actualTufID, err := X509PublicKeyID(actualTufKey)
require.Equal(t, sameWayTufID, actualTufID)
require.Equal(t, expectedTufID, actualTufID)
}
// X509PublickeyID returns the public key ID of an ECDSA X509 key rather than
// the cert ID
func TestECDSAX509PublickeyID(t *testing.T) {
startTime := time.Now()
template, err := NewCertificate("something", startTime, startTime.AddDate(10, 0, 0))
require.NoError(t, err)
template.SignatureAlgorithm = x509.ECDSAWithSHA256
template.PublicKeyAlgorithm = x509.ECDSA
privKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
require.NoError(t, err)
tufPrivKey, err := ECDSAToPrivateKey(privKey)
require.NoError(t, err)
derBytes, err := x509.CreateCertificate(
rand.Reader, template, template, &privKey.PublicKey, privKey)
require.NoError(t, err)
cert, err := x509.ParseCertificate(derBytes)
require.NoError(t, err)
tufKey := CertToKey(cert)
tufID, err := X509PublicKeyID(tufKey)
require.NoError(t, err)
require.Equal(t, tufPrivKey.ID(), tufID)
}