2022-04-11 09:35:06 +00:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/elliptic"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/sha512"
|
|
|
|
"encoding/base64"
|
|
|
|
"encoding/hex"
|
2022-07-12 08:01:21 +00:00
|
|
|
"math"
|
2022-04-11 09:35:06 +00:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
|
2022-07-12 08:01:21 +00:00
|
|
|
"github.com/nspcc-dev/neofs-api-go/v2/acl"
|
2022-04-11 09:35:06 +00:00
|
|
|
"github.com/nspcc-dev/neofs-rest-gw/gen/models"
|
2022-04-29 06:39:24 +00:00
|
|
|
"github.com/nspcc-dev/neofs-rest-gw/internal/util"
|
2022-07-12 08:01:21 +00:00
|
|
|
"github.com/nspcc-dev/neofs-sdk-go/user"
|
2022-04-11 09:35:06 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
const devenvPrivateKey = "1dd37fba80fec4e6a6f13fd708d8dcb3b29def768017052f6c930fa1c5d90bbb"
|
|
|
|
|
|
|
|
func TestSign(t *testing.T) {
|
|
|
|
key, err := keys.NewPrivateKeyFromHex(devenvPrivateKey)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
pubKeyHex := hex.EncodeToString(key.PublicKey().Bytes())
|
|
|
|
|
2022-07-07 09:02:05 +00:00
|
|
|
records := []*models.Record{{
|
|
|
|
Operation: models.NewOperation(models.OperationPUT),
|
|
|
|
Action: models.NewAction(models.ActionALLOW),
|
|
|
|
Filters: []*models.Filter{},
|
|
|
|
Targets: []*models.Target{{
|
|
|
|
Role: models.NewRole(models.RoleOTHERS),
|
|
|
|
Keys: []string{},
|
2022-04-11 09:35:06 +00:00
|
|
|
}},
|
2022-07-07 09:02:05 +00:00
|
|
|
}}
|
2022-04-11 09:35:06 +00:00
|
|
|
|
2022-07-07 09:02:05 +00:00
|
|
|
btoken, err := util.ToNativeObjectToken(records)
|
2022-04-11 09:35:06 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2022-07-12 08:01:21 +00:00
|
|
|
btoken.SetExp(math.MaxInt64)
|
|
|
|
|
2022-04-11 09:35:06 +00:00
|
|
|
ownerKey, err := keys.NewPublicKeyFromString(pubKeyHex)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2022-07-12 08:01:21 +00:00
|
|
|
var owner user.ID
|
|
|
|
user.IDFromKey(&owner, *(*ecdsa.PublicKey)(ownerKey))
|
|
|
|
btoken.ForUser(owner)
|
2022-04-11 09:35:06 +00:00
|
|
|
|
2022-07-12 08:01:21 +00:00
|
|
|
var v2token acl.BearerToken
|
|
|
|
btoken.WriteToV2(&v2token)
|
2022-04-11 09:35:06 +00:00
|
|
|
|
2022-07-12 08:01:21 +00:00
|
|
|
binaryBearer := v2token.GetBody().StableMarshal(nil)
|
2022-04-11 09:35:06 +00:00
|
|
|
bearerBase64 := base64.StdEncoding.EncodeToString(binaryBearer)
|
|
|
|
|
|
|
|
h := sha512.Sum512(binaryBearer)
|
|
|
|
x, y, err := ecdsa.Sign(rand.Reader, &key.PrivateKey, h[:])
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
signatureData := elliptic.Marshal(elliptic.P256(), x, y)
|
|
|
|
|
|
|
|
bt := &BearerToken{
|
|
|
|
Token: bearerBase64,
|
2022-06-16 09:12:26 +00:00
|
|
|
Signature: hex.EncodeToString(signatureData),
|
2022-04-11 09:35:06 +00:00
|
|
|
Key: pubKeyHex,
|
|
|
|
}
|
|
|
|
|
2022-04-20 14:10:43 +00:00
|
|
|
_, err = prepareBearerToken(bt, false)
|
2022-04-11 09:35:06 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
}
|