sshgen_test.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. package sshgen
  2. import (
  3. "crypto/rand"
  4. "crypto/rsa"
  5. "encoding/json"
  6. "fmt"
  7. "io"
  8. "io/ioutil"
  9. "net/http"
  10. "net/http/httptest"
  11. "os"
  12. "testing"
  13. "time"
  14. "github.com/coreos/go-oidc/jose"
  15. "github.com/stretchr/testify/assert"
  16. "github.com/cloudflare/cloudflared/config"
  17. cfpath "github.com/cloudflare/cloudflared/token"
  18. )
  19. const (
  20. audTest = "cf-test-aud"
  21. nonceTest = "asfd"
  22. )
  23. type signingArguments struct {
  24. Principals []string `json:"principals"`
  25. ClientPubKey string `json:"public_key"`
  26. Duration string `json:"duration"`
  27. }
  28. func TestCertGenSuccess(t *testing.T) {
  29. appInfo := &cfpath.AppInfo{AppAUD: "abcd1234", AppDomain: "mySite.com"}
  30. token := tokenGenerator()
  31. fullName, err := cfpath.GenerateAppTokenFilePathFromURL(appInfo.AppDomain, appInfo.AppAUD, keyName)
  32. assert.NoError(t, err)
  33. pubKeyName := fullName + ".pub"
  34. certKeyName := fullName + "-cert.pub"
  35. defer func() {
  36. os.Remove(fullName)
  37. os.Remove(pubKeyName)
  38. os.Remove(certKeyName)
  39. }()
  40. resp := signingArguments{
  41. Principals: []string{"dalton"},
  42. ClientPubKey: "ecdsa-sha2-nistp256-cert-v01@openssh.com AAAAKGVjZHNhLXNoYTItbmlzdHAyNTYtY2VydC12MDFAb3BlbnNzaC5jb20AAAAg+0rYq4mNGIAHiH1xPOJXfmOpTEwFIcyXzGJieTOhRs8AAAAIbmlzdHAyNTYAAABBBJIcsq02e8ZaofJXOZKp7yQdKW/JIouJ90lybr76hHIRrZBL1t4JEimfLvNDphPrTW9VDQaIcBSKNaxRqHOS8jezoJbhFGWhqQAAAAEAAAAgZWU5OTliNGRkZmFmNjgxNDEwMTVhMDJiY2ZhMTdiN2UAAAAKAAAABmF1c3RpbgAAAABc1KFoAAAAAFzUohwAAAAAAAAARwAAABdwZXJtaXQtYWdlbnQtZm9yd2FyZGluZwAAAAAAAAAKcGVybWl0LXB0eQAAAAAAAAAOcGVybWl0LXVzZXItcmMAAAAAAAAAAAAAAGgAAAATZWNkc2Etc2hhMi1uaXN0cDI1NgAAAAhuaXN0cDI1NgAAAEEEeAuYR56XaxvH5Z1p0hDCTQ7wC4dbj0Gc+LOKu1f94og2ilZTv9tutg8cZrqAT97REmGH6j9KIOVLGsPVjajSKAAAAGQAAAATZWNkc2Etc2hhMi1uaXN0cDI1NgAAAEkAAAAhAORY9ZO3TQsrUm6ajnVW+arbnVfTkxYBYFlVoeOEXKZuAAAAIG96A8nQnTuprWXLSemWL68RXC1NVKnBOIPD2Z7UIOB1",
  43. Duration: "3m",
  44. }
  45. w := httptest.NewRecorder()
  46. respJson, err := json.Marshal(resp)
  47. assert.NoError(t, err)
  48. w.Write(respJson)
  49. mockRequest = func(url, contentType string, body io.Reader) (*http.Response, error) {
  50. assert.Contains(t, "/cdn-cgi/access/cert_sign", url)
  51. assert.Equal(t, "application/json", contentType)
  52. buf, err := ioutil.ReadAll(body)
  53. assert.NoError(t, err)
  54. assert.NotEmpty(t, buf)
  55. return w.Result(), nil
  56. }
  57. err = GenerateShortLivedCertificate(appInfo, token)
  58. assert.NoError(t, err)
  59. exist, err := config.FileExists(fullName)
  60. assert.NoError(t, err)
  61. if !exist {
  62. assert.FailNow(t, fmt.Sprintf("key should exist at: %s", fullName), fullName)
  63. return
  64. }
  65. exist, err = config.FileExists(pubKeyName)
  66. assert.NoError(t, err)
  67. if !exist {
  68. assert.FailNow(t, fmt.Sprintf("key should exist at: %s", pubKeyName), pubKeyName)
  69. return
  70. }
  71. exist, err = config.FileExists(certKeyName)
  72. assert.NoError(t, err)
  73. if !exist {
  74. assert.FailNow(t, fmt.Sprintf("key should exist at: %s", certKeyName), certKeyName)
  75. return
  76. }
  77. }
  78. func tokenGenerator() string {
  79. iat := time.Now().Unix()
  80. exp := time.Now().Add(time.Minute * 5).Unix()
  81. claims := jose.Claims{}
  82. claims.Add("aud", audTest)
  83. claims.Add("iat", iat)
  84. claims.Add("nonce", nonceTest)
  85. claims.Add("exp", exp)
  86. k, err := rsa.GenerateKey(rand.Reader, 512)
  87. if err != nil {
  88. return ""
  89. }
  90. signer := jose.NewSignerRSA("asdf", *k)
  91. token, terr := jose.NewSignedJWT(claims, signer)
  92. if terr != nil {
  93. return ""
  94. }
  95. return token.Encode()
  96. }