1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89
|
package kp
import (
"os"
"testing"
"github.com/cloudflare/cfssl/csr"
"github.com/cloudflare/cfssl/transport/core"
)
const (
testKey = "testdata/test.key"
testCert = "testdata/test.pem"
)
var testIdentity = &core.Identity{
Request: &csr.CertificateRequest{
CN: "localhost test certificate",
},
Profiles: map[string]map[string]string{
"paths": {
"private_key": testKey,
"certificate": testCert,
},
},
}
func removeIfPresent(path string) error {
if _, err := os.Stat(path); !os.IsNotExist(err) {
return os.Remove(path)
}
return nil
}
func TestMain(m *testing.M) {
exitCode := m.Run()
err := removeIfPresent(testKey)
if err == nil {
err = removeIfPresent(testCert)
}
if err != nil {
os.Exit(1)
}
os.Exit(exitCode)
}
var kp KeyProvider
func TestNewStandardProvider(t *testing.T) {
var err error
kp, err = NewStandardProvider(testIdentity)
if err != nil {
t.Fatalf("%v", err)
}
if kp.Ready() {
t.Fatalf("key provider should not be ready yet")
}
if err = kp.Check(); err != nil {
t.Fatalf("calling check should return no error")
}
if nil != kp.Certificate() {
t.Fatal("key provider should not have a certificate yet")
}
if kp.Ready() {
t.Fatal("key provider should not be ready")
}
if !kp.Persistent() {
t.Fatal("key provider should be persistent")
}
}
func TestGenerate(t *testing.T) {
err := kp.Load()
if err == nil {
t.Fatal("key provider shouldn't have a key yet")
}
err = kp.Generate("ecdsa", 256)
if err != nil {
t.Fatalf("key provider couldn't generate key: %v", err)
}
}
|