sshgen_test.go 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. package sshgen
  2. import (
  3. "crypto/rand"
  4. "crypto/rsa"
  5. "encoding/json"
  6. "fmt"
  7. "io"
  8. "io/ioutil"
  9. "net/http"
  10. "net/http/httptest"
  11. "net/url"
  12. "os"
  13. "testing"
  14. "time"
  15. "github.com/cloudflare/cloudflared/cmd/cloudflared/config"
  16. cfpath "github.com/cloudflare/cloudflared/cmd/cloudflared/path"
  17. "github.com/coreos/go-oidc/jose"
  18. "github.com/stretchr/testify/assert"
  19. )
  20. const (
  21. audTest = "cf-test-aud"
  22. nonceTest = "asfd"
  23. )
  24. type signingArguments struct {
  25. Principals []string `json:"principals"`
  26. ClientPubKey string `json:"public_key"`
  27. Duration string `json:"duration"`
  28. }
  29. func TestCertGenSuccess(t *testing.T) {
  30. url, _ := url.Parse("https://cf-test-access.com/testpath")
  31. token := tokenGenerator()
  32. fullName, err := cfpath.GenerateFilePathFromURL(url, keyName)
  33. assert.NoError(t, err)
  34. pubKeyName := fullName + ".pub"
  35. certKeyName := fullName + "-cert.pub"
  36. defer func() {
  37. os.Remove(fullName)
  38. os.Remove(pubKeyName)
  39. os.Remove(certKeyName)
  40. }()
  41. resp := signingArguments{
  42. Principals: []string{"dalton"},
  43. ClientPubKey: "ecdsa-sha2-nistp256-cert-v01@openssh.com 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",
  44. Duration: "3m",
  45. }
  46. w := httptest.NewRecorder()
  47. respJson, err := json.Marshal(resp)
  48. assert.NoError(t, err)
  49. w.Write(respJson)
  50. mockRequest = func(url, contentType string, body io.Reader) (*http.Response, error) {
  51. assert.Contains(t, "/cdn-cgi/access/cert_sign", url)
  52. assert.Equal(t, "application/json", contentType)
  53. buf, err := ioutil.ReadAll(body)
  54. assert.NoError(t, err)
  55. assert.NotEmpty(t, buf)
  56. return w.Result(), nil
  57. }
  58. err = GenerateShortLivedCertificate(url, token)
  59. assert.NoError(t, err)
  60. exist, err := config.FileExists(fullName)
  61. assert.NoError(t, err)
  62. if !exist {
  63. assert.FailNow(t, fmt.Sprintf("key should exist at: %s", fullName), fullName)
  64. return
  65. }
  66. exist, err = config.FileExists(pubKeyName)
  67. assert.NoError(t, err)
  68. if !exist {
  69. assert.FailNow(t, fmt.Sprintf("key should exist at: %s", pubKeyName), pubKeyName)
  70. return
  71. }
  72. exist, err = config.FileExists(certKeyName)
  73. assert.NoError(t, err)
  74. if !exist {
  75. assert.FailNow(t, fmt.Sprintf("key should exist at: %s", certKeyName), certKeyName)
  76. return
  77. }
  78. }
  79. func tokenGenerator() string {
  80. iat := time.Now().Unix()
  81. exp := time.Now().Add(time.Minute * 5).Unix()
  82. claims := jose.Claims{}
  83. claims.Add("aud", audTest)
  84. claims.Add("iat", iat)
  85. claims.Add("nonce", nonceTest)
  86. claims.Add("exp", exp)
  87. k, err := rsa.GenerateKey(rand.Reader, 512)
  88. if err != nil {
  89. return ""
  90. }
  91. signer := jose.NewSignerRSA("asdf", *k)
  92. token, terr := jose.NewSignedJWT(claims, signer)
  93. if terr != nil {
  94. return ""
  95. }
  96. return token.Encode()
  97. }