1291380611
Signed-off-by: aram price <pricear@vmware.com>
111 lines
3.7 KiB
Go
111 lines
3.7 KiB
Go
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package dynamiccodec
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestCodec(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
keys func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte)
|
|
wantEncoderErrorPrefix string
|
|
wantDecoderError string
|
|
}{
|
|
{
|
|
name: "good signing and encryption keys",
|
|
},
|
|
{
|
|
name: "good signing keys and no encryption key",
|
|
keys: func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte) {
|
|
*encoderEncryptionKey = nil
|
|
*decoderEncryptionKey = nil
|
|
},
|
|
},
|
|
{
|
|
name: "good signing keys and bad encoding encryption key",
|
|
keys: func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte) {
|
|
*encoderEncryptionKey = []byte("this-secret-is-not-16-bytes")
|
|
},
|
|
wantEncoderErrorPrefix: "securecookie: error - caused by: crypto/aes: invalid key size 27",
|
|
},
|
|
{
|
|
name: "good signing keys and bad decoding encryption key",
|
|
keys: func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte) {
|
|
*decoderEncryptionKey = []byte("this-secret-is-not-16-bytes")
|
|
},
|
|
wantDecoderError: "securecookie: error - caused by: crypto/aes: invalid key size 27",
|
|
},
|
|
{
|
|
name: "bad encoder signing key",
|
|
keys: func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte) {
|
|
*encoderSigningKey = nil
|
|
},
|
|
wantEncoderErrorPrefix: "securecookie: hash key is not set",
|
|
},
|
|
{
|
|
name: "bad decoder signing key",
|
|
keys: func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte) {
|
|
*decoderSigningKey = nil
|
|
},
|
|
wantDecoderError: "securecookie: hash key is not set",
|
|
},
|
|
{
|
|
name: "signing key mismatch",
|
|
keys: func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte) {
|
|
*encoderSigningKey = []byte("this key does not match the decoder key")
|
|
},
|
|
wantDecoderError: "securecookie: the value is not valid",
|
|
},
|
|
{
|
|
name: "encryption key mismatch",
|
|
keys: func(encoderSigningKey, encoderEncryptionKey, decoderSigningKey, decoderEncryptionKey *[]byte) {
|
|
*encoderEncryptionKey = []byte("16-byte-no-match")
|
|
},
|
|
wantDecoderError: "securecookie: error - caused by: securecookie: error - caused by: invalid character '",
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
test := test
|
|
t.Run(test.name, func(t *testing.T) {
|
|
var (
|
|
encoderSigningKey = []byte("some-signing-key")
|
|
encoderEncryptionKey = []byte("16-byte-encr-key")
|
|
decoderSigningKey = []byte("some-signing-key")
|
|
decoderEncryptionKey = []byte("16-byte-encr-key")
|
|
)
|
|
if test.keys != nil {
|
|
test.keys(&encoderSigningKey, &encoderEncryptionKey, &decoderSigningKey, &decoderEncryptionKey)
|
|
}
|
|
encoder := New(func() []byte { return encoderSigningKey },
|
|
func() []byte { return encoderEncryptionKey })
|
|
|
|
encoded, err := encoder.Encode("some-name", "some-message")
|
|
if test.wantEncoderErrorPrefix != "" {
|
|
require.EqualError(t, err, test.wantEncoderErrorPrefix)
|
|
return
|
|
}
|
|
require.NoError(t, err)
|
|
|
|
decoder := New(func() []byte { return decoderSigningKey },
|
|
func() []byte { return decoderEncryptionKey })
|
|
|
|
var decoded string
|
|
err = decoder.Decode("some-name", encoded, &decoded)
|
|
if test.wantDecoderError != "" {
|
|
require.Error(t, err)
|
|
require.True(t, strings.HasPrefix(err.Error(), test.wantDecoderError))
|
|
return
|
|
}
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, "some-message", decoded)
|
|
})
|
|
}
|
|
}
|