318 lines
8 KiB
Go
318 lines
8 KiB
Go
package accessbox
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"testing"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/bearer"
|
|
frostfsecdsa "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/crypto/ecdsa"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/eacl"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/session"
|
|
"github.com/google/uuid"
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func assertBearerToken(t *testing.T, exp, act bearer.Token) {
|
|
// compare binary representations since deep equal is not guaranteed
|
|
require.Equal(t, exp.Marshal(), act.Marshal())
|
|
}
|
|
|
|
func TestTokensEncryptDecrypt(t *testing.T) {
|
|
var (
|
|
tkn bearer.Token
|
|
tkn2 bearer.Token
|
|
)
|
|
sec, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
tkn.SetEACLTable(*eacl.NewTable())
|
|
require.NoError(t, tkn.Sign(sec.PrivateKey))
|
|
|
|
data, err := encrypt(cred, cred.PublicKey(), tkn.Marshal())
|
|
require.NoError(t, err)
|
|
|
|
rawTkn2, err := decrypt(cred, cred.PublicKey(), data)
|
|
require.NoError(t, err)
|
|
|
|
err = tkn2.Unmarshal(rawTkn2)
|
|
require.NoError(t, err)
|
|
|
|
assertBearerToken(t, tkn, tkn2)
|
|
}
|
|
|
|
func TestBearerTokenInAccessBox(t *testing.T) {
|
|
var (
|
|
box *AccessBox
|
|
box2 AccessBox
|
|
tkn bearer.Token
|
|
)
|
|
|
|
sec, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
tkn.SetEACLTable(*eacl.NewTable())
|
|
require.NoError(t, tkn.Sign(sec.PrivateKey))
|
|
|
|
gate := NewGateData(cred.PublicKey(), &tkn)
|
|
box, _, err = PackTokens([]*GateData{gate}, nil)
|
|
require.NoError(t, err)
|
|
|
|
data, err := box.Marshal()
|
|
require.NoError(t, err)
|
|
|
|
err = box2.Unmarshal(data)
|
|
require.NoError(t, err)
|
|
|
|
tkns, err := box2.GetTokens(cred)
|
|
require.NoError(t, err)
|
|
|
|
assertBearerToken(t, tkn, *tkns.BearerToken)
|
|
}
|
|
|
|
func TestSessionTokenInAccessBox(t *testing.T) {
|
|
var (
|
|
box *AccessBox
|
|
box2 AccessBox
|
|
tkn = new(session.Container)
|
|
)
|
|
|
|
sec, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
tkn.SetID(uuid.New())
|
|
tkn.SetAuthKey((*frostfsecdsa.PublicKey)(sec.PublicKey()))
|
|
require.NoError(t, tkn.Sign(sec.PrivateKey))
|
|
|
|
var newTkn bearer.Token
|
|
gate := NewGateData(cred.PublicKey(), &newTkn)
|
|
gate.SessionTokens = []*session.Container{tkn}
|
|
box, _, err = PackTokens([]*GateData{gate}, nil)
|
|
require.NoError(t, err)
|
|
|
|
data, err := box.Marshal()
|
|
require.NoError(t, err)
|
|
|
|
err = box2.Unmarshal(data)
|
|
require.NoError(t, err)
|
|
|
|
tkns, err := box2.GetTokens(cred)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, []*session.Container{tkn}, tkns.SessionTokens)
|
|
}
|
|
|
|
func TestAccessboxMultipleKeys(t *testing.T) {
|
|
var (
|
|
box *AccessBox
|
|
tkn bearer.Token
|
|
)
|
|
|
|
sec, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
tkn.SetEACLTable(*eacl.NewTable())
|
|
require.NoError(t, tkn.Sign(sec.PrivateKey))
|
|
|
|
count := 10
|
|
gates := make([]*GateData, 0, count)
|
|
privateKeys := make([]*keys.PrivateKey, 0, count)
|
|
{ // generate keys
|
|
for i := 0; i < count; i++ {
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
gates = append(gates, NewGateData(cred.PublicKey(), &tkn))
|
|
privateKeys = append(privateKeys, cred)
|
|
}
|
|
}
|
|
|
|
box, _, err = PackTokens(gates, nil)
|
|
require.NoError(t, err)
|
|
|
|
for i, k := range privateKeys {
|
|
tkns, err := box.GetTokens(k)
|
|
require.NoError(t, err, "key #%d: %s failed", i, k)
|
|
assertBearerToken(t, tkn, *tkns.BearerToken)
|
|
}
|
|
}
|
|
|
|
func TestUnknownKey(t *testing.T) {
|
|
var (
|
|
box *AccessBox
|
|
tkn bearer.Token
|
|
)
|
|
|
|
sec, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
wrongCred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
tkn.SetEACLTable(*eacl.NewTable())
|
|
require.NoError(t, tkn.Sign(sec.PrivateKey))
|
|
|
|
gate := NewGateData(cred.PublicKey(), &tkn)
|
|
box, _, err = PackTokens([]*GateData{gate}, nil)
|
|
require.NoError(t, err)
|
|
|
|
_, err = box.GetTokens(wrongCred)
|
|
require.Error(t, err)
|
|
}
|
|
|
|
func TestGateDataSessionToken(t *testing.T) {
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
var tkn bearer.Token
|
|
gate := NewGateData(cred.PublicKey(), &tkn)
|
|
require.Equal(t, cred.PublicKey(), gate.GateKey)
|
|
assertBearerToken(t, tkn, *gate.BearerToken)
|
|
|
|
t.Run("session token for put", func(t *testing.T) {
|
|
gate.SessionTokens = []*session.Container{}
|
|
sessionTkn := gate.SessionTokenForPut()
|
|
require.Nil(t, sessionTkn)
|
|
|
|
sessionTknPut := new(session.Container)
|
|
sessionTknPut.ForVerb(session.VerbContainerPut)
|
|
gate.SessionTokens = []*session.Container{sessionTknPut}
|
|
sessionTkn = gate.SessionTokenForPut()
|
|
require.Equal(t, sessionTknPut, sessionTkn)
|
|
})
|
|
|
|
t.Run("session token for delete", func(t *testing.T) {
|
|
gate.SessionTokens = []*session.Container{}
|
|
sessionTkn := gate.SessionTokenForDelete()
|
|
require.Nil(t, sessionTkn)
|
|
|
|
sessionTknDelete := new(session.Container)
|
|
sessionTknDelete.ForVerb(session.VerbContainerDelete)
|
|
gate.SessionTokens = []*session.Container{sessionTknDelete}
|
|
sessionTkn = gate.SessionTokenForDelete()
|
|
require.Equal(t, sessionTknDelete, sessionTkn)
|
|
})
|
|
|
|
t.Run("session token for set eACL", func(t *testing.T) {
|
|
gate.SessionTokens = []*session.Container{}
|
|
sessionTkn := gate.SessionTokenForSetEACL()
|
|
require.Nil(t, sessionTkn)
|
|
|
|
sessionTknSetEACL := new(session.Container)
|
|
sessionTknSetEACL.ForVerb(session.VerbContainerSetEACL)
|
|
gate.SessionTokens = []*session.Container{sessionTknSetEACL}
|
|
sessionTkn = gate.SessionTokenForSetEACL()
|
|
require.Equal(t, sessionTknSetEACL, sessionTkn)
|
|
})
|
|
|
|
t.Run("session token", func(t *testing.T) {
|
|
gate.SessionTokens = []*session.Container{}
|
|
sessionTkn := gate.SessionToken()
|
|
require.Nil(t, sessionTkn)
|
|
|
|
sessionTknPut := new(session.Container)
|
|
sessionTknPut.ForVerb(session.VerbContainerPut)
|
|
gate.SessionTokens = []*session.Container{sessionTknPut}
|
|
sessionTkn = gate.SessionToken()
|
|
require.Equal(t, sessionTkn, sessionTknPut)
|
|
})
|
|
}
|
|
|
|
func TestGetBox(t *testing.T) {
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
var tkn bearer.Token
|
|
gate := NewGateData(cred.PublicKey(), &tkn)
|
|
|
|
secret := []byte("secret")
|
|
accessBox, _, err := PackTokens([]*GateData{gate}, secret)
|
|
require.NoError(t, err)
|
|
|
|
box, err := accessBox.GetBox(cred)
|
|
require.NoError(t, err)
|
|
require.Equal(t, hex.EncodeToString(secret), box.Gate.SecretKey)
|
|
}
|
|
|
|
func TestAccessBox(t *testing.T) {
|
|
cred, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
var tkn bearer.Token
|
|
gate := NewGateData(cred.PublicKey(), &tkn)
|
|
|
|
accessBox, _, err := PackTokens([]*GateData{gate}, nil)
|
|
require.NoError(t, err)
|
|
|
|
t.Run("invalid owner", func(t *testing.T) {
|
|
randomKey, err := keys.NewPrivateKey()
|
|
require.NoError(t, err)
|
|
|
|
_, err = accessBox.GetTokens(randomKey)
|
|
require.Error(t, err)
|
|
|
|
_, err = accessBox.GetBox(randomKey)
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("empty placement policy", func(t *testing.T) {
|
|
policy, err := accessBox.GetPlacementPolicy()
|
|
require.NoError(t, err)
|
|
require.Nil(t, policy)
|
|
})
|
|
|
|
t.Run("get correct placement policy", func(t *testing.T) {
|
|
policy := &AccessBox_ContainerPolicy{LocationConstraint: "locationConstraint"}
|
|
accessBox.ContainerPolicy = []*AccessBox_ContainerPolicy{policy}
|
|
|
|
policies, err := accessBox.GetPlacementPolicy()
|
|
require.NoError(t, err)
|
|
require.Len(t, policies, 1)
|
|
require.Equal(t, policy.LocationConstraint, policies[0].LocationConstraint)
|
|
})
|
|
|
|
t.Run("get incorrect placement policy", func(t *testing.T) {
|
|
policy := &AccessBox_ContainerPolicy{
|
|
LocationConstraint: "locationConstraint",
|
|
Policy: []byte("policy"),
|
|
}
|
|
accessBox.ContainerPolicy = []*AccessBox_ContainerPolicy{policy}
|
|
|
|
_, err = accessBox.GetPlacementPolicy()
|
|
require.Error(t, err)
|
|
|
|
_, err = accessBox.GetBox(cred)
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("empty seed key", func(t *testing.T) {
|
|
accessBox.SeedKey = nil
|
|
|
|
_, err = accessBox.GetTokens(cred)
|
|
require.Error(t, err)
|
|
|
|
_, err = accessBox.GetBox(cred)
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("invalid gate key", func(t *testing.T) {
|
|
gate = &GateData{
|
|
BearerToken: &tkn,
|
|
GateKey: &keys.PublicKey{},
|
|
}
|
|
_, _, err = PackTokens([]*GateData{gate}, nil)
|
|
require.Error(t, err)
|
|
})
|
|
}
|