1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102
|
package tls
import (
"crypto/x509"
"encoding/pem"
"os"
"path/filepath"
"testing"
"github.com/lxc/incus/v6/shared/util"
)
// A new key pair is generated if none exists and saved to the appropriate files.
func TestKeyPairAndCA(t *testing.T) {
dir, err := os.MkdirTemp("", "incus-shared-test-")
if err != nil {
t.Errorf("failed to create temporary dir: %v", err)
}
defer func() { _ = os.RemoveAll(dir) }()
info, err := KeyPairAndCA(dir, "test", CertServer, true)
if err != nil {
t.Errorf("initial call to KeyPairAndCA failed: %v", err)
}
if info.CA() != nil {
t.Errorf("expected CA certificate to be nil")
}
if len(info.KeyPair().Certificate) == 0 {
t.Errorf("expected key pair to be non-empty")
}
if !util.PathExists(filepath.Join(dir, "test.crt")) {
t.Errorf("no public key file was saved")
}
if !util.PathExists(filepath.Join(dir, "test.key")) {
t.Errorf("no secret key file was saved")
}
cert, err := x509.ParseCertificate(info.KeyPair().Certificate[0])
if err != nil {
t.Errorf("failed to parse generated public x509 key cert: %v", err)
}
if cert.ExtKeyUsage[0] != x509.ExtKeyUsageServerAuth {
t.Errorf("expected to find server auth key usage extension")
}
block, _ := pem.Decode(info.PublicKey())
if block == nil {
t.Errorf("expected PublicKey to be decodable")
return
}
_, err = x509.ParseCertificate(block.Bytes)
if err != nil {
t.Errorf("failed to parse encoded public x509 key cert: %v", err)
}
}
func TestGenerateMemCert(t *testing.T) {
if testing.Short() {
t.Skip("skipping cert generation in short mode")
}
cert, key, err := GenerateMemCert(false, true)
if err != nil {
t.Error(err)
return
}
if cert == nil {
t.Error("GenerateMemCert returned a nil cert")
return
}
if key == nil {
t.Error("GenerateMemCert returned a nil key")
return
}
block, rest := pem.Decode(cert)
if len(rest) != 0 {
t.Errorf("GenerateMemCert returned a cert with trailing content: %q", string(rest))
}
if block.Type != "CERTIFICATE" {
t.Errorf("GenerateMemCert returned a cert with Type %q not \"CERTIFICATE\"", block.Type)
}
block, rest = pem.Decode(key)
if len(rest) != 0 {
t.Errorf("GenerateMemCert returned a key with trailing content: %q", string(rest))
}
if block.Type != "EC PRIVATE KEY" {
t.Errorf("GenerateMemCert returned a cert with Type %q not \"EC PRIVATE KEY\"", block.Type)
}
}
|