diff options
author | techknowlogick <techknowlogick@gitea.io> | 2021-09-28 15:19:22 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-09-28 15:19:22 -0400 |
commit | e9a9c20d52647094355df04c441a1783595a7853 (patch) | |
tree | a52021824a6f842fcc3c2af02691ebff581645ad /modules/activitypub/keypair_test.go | |
parent | 37b29319aaab085001def4bc33b690c9a7a8eb19 (diff) | |
download | gitea-e9a9c20d52647094355df04c441a1783595a7853.tar.gz gitea-e9a9c20d52647094355df04c441a1783595a7853.zip |
Create pub/priv keypair for federation (#17071)
* add logic for creating pub/priv keypair for federation
* Apply suggestions from code review
Co-authored-by: delvh <dev.lh@web.de>
* make fmt
* Update modules/activitypub/keypair.go
Co-authored-by: delvh <dev.lh@web.de>
* add tests
* fix revert
* more tests
* Apply suggestions from code review
Co-authored-by: delvh <dev.lh@web.de>
* make fmt
Co-authored-by: delvh <dev.lh@web.de>
Co-authored-by: 6543 <6543@obermui.de>
Diffstat (limited to 'modules/activitypub/keypair_test.go')
-rw-r--r-- | modules/activitypub/keypair_test.go | 63 |
1 files changed, 63 insertions, 0 deletions
diff --git a/modules/activitypub/keypair_test.go b/modules/activitypub/keypair_test.go new file mode 100644 index 0000000000..5d876937b1 --- /dev/null +++ b/modules/activitypub/keypair_test.go @@ -0,0 +1,63 @@ +// Copyright 2021 The Gitea Authors. All rights reserved. +// Use of this source code is governed by a MIT-style +// license that can be found in the LICENSE file. + +package activitypub + +import ( + "crypto" + "crypto/rand" + "crypto/rsa" + "crypto/sha256" + "crypto/x509" + "encoding/pem" + "regexp" + "testing" + + "github.com/stretchr/testify/assert" +) + +func TestKeygen(t *testing.T) { + priv, pub, err := GenerateKeyPair() + assert.NoError(t, err) + + assert.NotEmpty(t, priv) + assert.NotEmpty(t, pub) + + assert.Regexp(t, regexp.MustCompile("^-----BEGIN RSA PRIVATE KEY-----.*"), priv) + assert.Regexp(t, regexp.MustCompile("^-----BEGIN PUBLIC KEY-----.*"), pub) + +} + +func TestSignUsingKeys(t *testing.T) { + priv, pub, err := GenerateKeyPair() + assert.NoError(t, err) + + privPem, _ := pem.Decode([]byte(priv)) + if privPem == nil || privPem.Type != "RSA PRIVATE KEY" { + t.Fatal("key is wrong type") + } + + privParsed, err := x509.ParsePKCS1PrivateKey(privPem.Bytes) + assert.NoError(t, err) + + pubPem, _ := pem.Decode([]byte(pub)) + if pubPem == nil || pubPem.Type != "PUBLIC KEY" { + t.Fatal("key failed to decode") + } + + pubParsed, err := x509.ParsePKIXPublicKey(pubPem.Bytes) + assert.NoError(t, err) + + // Sign + msg := "activity pub is great!" + h := sha256.New() + h.Write([]byte(msg)) + d := h.Sum(nil) + sig, err := rsa.SignPKCS1v15(rand.Reader, privParsed, crypto.SHA256, d) + assert.NoError(t, err) + + // Verify + err = rsa.VerifyPKCS1v15(pubParsed.(*rsa.PublicKey), crypto.SHA256, d, sig) + assert.NoError(t, err) +} |