Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 1 | package rt |
| 2 | |
| 3 | import ( |
| 4 | "crypto/ecdsa" |
| 5 | "crypto/elliptic" |
| 6 | "crypto/rand" |
| 7 | "fmt" |
| 8 | "io/ioutil" |
| 9 | "os" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 10 | "testing" |
| 11 | |
Jiri Simsa | 519c507 | 2014-09-17 21:37:57 -0700 | [diff] [blame] | 12 | "veyron.io/veyron/veyron2/security" |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 13 | ) |
| 14 | |
| 15 | type s []string |
| 16 | |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 17 | type rootsTester struct { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 18 | k1, k2, k3 security.PublicKey |
| 19 | } |
| 20 | |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 21 | func (t *rootsTester) testAdd(br security.BlessingRoots) error { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 22 | testdata := []struct { |
| 23 | root security.PublicKey |
| 24 | pattern security.BlessingPattern |
| 25 | }{ |
| 26 | {t.k1, "veyron/..."}, |
| 27 | {t.k2, "google/foo/..."}, |
| 28 | {t.k1, "google"}, |
| 29 | } |
| 30 | for _, d := range testdata { |
| 31 | if err := br.Add(d.root, d.pattern); err != nil { |
| 32 | return fmt.Errorf("%v.Add(%v, %q) failed: %s", br, d.root, d.pattern, err) |
| 33 | } |
| 34 | } |
| 35 | return nil |
| 36 | } |
| 37 | |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 38 | func (t *rootsTester) testRecognized(br security.BlessingRoots) error { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 39 | testdata := []struct { |
| 40 | root security.PublicKey |
| 41 | recognized []string |
| 42 | notRecognized []string |
| 43 | }{ |
| 44 | {t.k1, s{"veyron", "veyron/foo", "veyron/foo/bar", "google"}, s{"google/foo", "foo", "foo/bar"}}, |
| 45 | {t.k2, s{"google", "google/foo", "google/foo/bar"}, s{"google/bar", "veyron", "veyron/foo", "foo", "foo/bar"}}, |
| 46 | {t.k3, s{}, s{"veyron", "veyron/foo", "veyron/bar", "google", "google/foo", "google/bar", "foo", "foo/bar"}}, |
| 47 | } |
| 48 | for _, d := range testdata { |
| 49 | for _, b := range d.recognized { |
| 50 | if err := br.Recognized(d.root, b); err != nil { |
| 51 | return fmt.Errorf("%v.Recognized(%v, %q): got: %v, want nil", br, d.root, b, err) |
| 52 | } |
| 53 | } |
| 54 | for _, b := range d.notRecognized { |
| 55 | if err := matchesError(br.Recognized(d.root, b), "not a recognized root"); err != nil { |
| 56 | return fmt.Errorf("%v.Recognized(%v, %q): %v", br, d.root, b, err) |
| 57 | } |
| 58 | } |
| 59 | } |
| 60 | return nil |
| 61 | } |
| 62 | |
| 63 | func mkKey() security.PublicKey { |
| 64 | s, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) |
| 65 | if err != nil { |
| 66 | panic(err) |
| 67 | } |
| 68 | return security.NewECDSAPublicKey(&s.PublicKey) |
| 69 | } |
| 70 | |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 71 | func TestInMemoryBlessingRoots(t *testing.T) { |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 72 | br := newInMemoryBlessingRoots() |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 73 | rootsTester := rootsTester{mkKey(), mkKey(), mkKey()} |
| 74 | if err := rootsTester.testAdd(br); err != nil { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 75 | t.Error(err) |
| 76 | } |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 77 | if err := rootsTester.testRecognized(br); err != nil { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 78 | t.Error(err) |
| 79 | } |
| 80 | } |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 81 | |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 82 | func TestPersistingBlessingRoots(t *testing.T) { |
| 83 | newTempDir := func(name string) string { |
| 84 | dir, err := ioutil.TempDir("", name) |
| 85 | if err != nil { |
| 86 | t.Fatal(err) |
| 87 | } |
| 88 | return dir |
| 89 | } |
| 90 | |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 91 | rootsTester := rootsTester{mkKey(), mkKey(), mkKey()} |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 92 | |
| 93 | // Create a new persisting BlessingRoots and add key k1 as an authority over |
| 94 | // blessings matching "veyron/...". |
| 95 | dir := newTempDir("blessingstore") |
| 96 | defer os.RemoveAll(dir) |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 97 | signer := newPrincipal(t) |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 98 | br, err := newPersistingBlessingRoots(dir, signer) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 99 | if err != nil { |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 100 | t.Fatalf("newPersistingBlessingRoots failed: %s", err) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 101 | } |
| 102 | |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 103 | if err := rootsTester.testAdd(br); err != nil { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 104 | t.Error(err) |
| 105 | } |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 106 | if err := rootsTester.testRecognized(br); err != nil { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 107 | t.Error(err) |
| 108 | } |
| 109 | |
| 110 | // Test that all mutations are appropriately reflected in a BlessingRoots |
| 111 | // constructed from same directory and signer. |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 112 | br, err = newPersistingBlessingRoots(dir, signer) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 113 | if err != nil { |
Ankur | 7c89059 | 2014-10-02 11:36:28 -0700 | [diff] [blame] | 114 | t.Fatalf("newPersistingBlessingRoots failed: %s", err) |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 115 | } |
Ankur | b4f03a1 | 2014-09-24 10:19:03 -0700 | [diff] [blame] | 116 | if err := rootsTester.testRecognized(br); err != nil { |
Ankur | 100eb27 | 2014-09-15 16:48:12 -0700 | [diff] [blame] | 117 | t.Error(err) |
| 118 | } |
| 119 | } |