efcdaa43a3
* lib/uplink: encryption context Change-Id: I5c23dca3286a46b713b30c4997e9ae6e630b2280 * lib/uplink: bucket operation examples Change-Id: Ia0f6e69f365dcff0cf11c731f51b30842bce053b * lib/uplink: encryption key sharing test cases Change-Id: I3a172d565f33f4e591402cdcb9460664a7cc7fbe * fix encrypted path prefix restriction issue Change-Id: I8f3921f9d52aaf4b84039de608b8cbbc88769554 * implement panics in libuplink encryption code todo on cipher suite selection as well as an api concern Change-Id: Ifa39eb3cc4b3443f7d96f9304df9b2ac4ec4085d * implement GetProjectInfo api call to get salt Change-Id: Ic5f6b3be9ea35df48c1aa214ab5d355fb328e2cf * some fixes and accessors for encryption store Change-Id: I3bb61f6712a037900e2a96e72ad4029ec1d3f718 * general fixes to builds/tests/etc Change-Id: I9930fa96acb3b221d9a001f8e274af5729cc8a47 * java bindings changes Change-Id: Ia2bd4c9c69739c8d3154d79616cff1f36fb403b6 * get libuplink examples passing Change-Id: I828f09a144160e0a5dd932324f78491ae2ec8a07 * fix proto.lock file Change-Id: I2fbbf4d0976a7d0473c2645e6dcb21aaa3be7651 * fix proto.lock again Change-Id: I92702cf49e1a340eef6379c2be4f7c4a268112a9 * fix golint issues Change-Id: I631ff9f43307a58e3b25a58cbb4a4cc2495f5eb6 * more linting fixes Change-Id: I51f8f30b367b5bca14c94b15417b9a4c9e7aa0ce * bug fixed by structs bump Change-Id: Ibb03c691fce7606c35c08721b3ef0781ab48a38a * retrigger Change-Id: Ieee0470b6a2d07168a1578552e8e7f271ae93a13 * retrigger Change-Id: I753d63853171e6a436c104ce176048892eb974c5 * semantic merge conflict Change-Id: I9419448496de90340569047a6a16a1b858a7978a * update total to match prod defaults Change-Id: I693d55c1ebb28b5803ee1d26e9e198decf82308b * retrigger Change-Id: I28b74d5d6202f61aa3866fe407d423f6a0a14b9e * retrigger Change-Id: I6fd054885c715f602e2cef623fd464c42e88742c * retrigger Change-Id: I6a01bae88c72406d4ed5a8f13bf8a2b3c650bd2d
83 lines
2.1 KiB
Go
83 lines
2.1 KiB
Go
// Copyright (C) 2019 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package setup_test
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"storj.io/storj/internal/testcontext"
|
|
"storj.io/storj/internal/testrand"
|
|
"storj.io/storj/pkg/storj"
|
|
"storj.io/storj/uplink/setup"
|
|
)
|
|
|
|
func TestSaveEncryptionKey(t *testing.T) {
|
|
generateInputKey := func() string {
|
|
return string(testrand.BytesInt(testrand.Intn(storj.KeySize*3) + 1))
|
|
}
|
|
|
|
t.Run("ok", func(t *testing.T) {
|
|
ctx := testcontext.New(t)
|
|
defer ctx.Cleanup()
|
|
|
|
inputKey := generateInputKey()
|
|
filename := ctx.File("storj-test-cmd-uplink", "encryption.key")
|
|
err := setup.SaveEncryptionKey(inputKey, filename)
|
|
require.NoError(t, err)
|
|
|
|
savedKey, err := ioutil.ReadFile(filename)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, inputKey, string(savedKey))
|
|
})
|
|
|
|
t.Run("error: empty input key", func(t *testing.T) {
|
|
ctx := testcontext.New(t)
|
|
defer ctx.Cleanup()
|
|
|
|
filename := ctx.File("storj-test-cmd-uplink", "encryption.key")
|
|
|
|
err := setup.SaveEncryptionKey("", filename)
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("error: empty filepath", func(t *testing.T) {
|
|
inputKey := generateInputKey()
|
|
|
|
err := setup.SaveEncryptionKey(inputKey, "")
|
|
require.Error(t, err)
|
|
})
|
|
|
|
t.Run("error: unexisting dir", func(t *testing.T) {
|
|
// Create a directory and remove it for making sure that the path doesn't
|
|
// exist
|
|
ctx := testcontext.New(t)
|
|
dir := ctx.Dir("storj-test-cmd-uplink")
|
|
ctx.Cleanup()
|
|
|
|
inputKey := generateInputKey()
|
|
filename := filepath.Join(dir, "enc.key")
|
|
err := setup.SaveEncryptionKey(inputKey, filename)
|
|
require.Errorf(t, err, "directory path doesn't exist")
|
|
})
|
|
|
|
t.Run("error: file already exists", func(t *testing.T) {
|
|
ctx := testcontext.New(t)
|
|
defer ctx.Cleanup()
|
|
|
|
inputKey := generateInputKey()
|
|
filename := ctx.File("encryption.key")
|
|
require.NoError(t, ioutil.WriteFile(filename, nil, os.FileMode(0600)))
|
|
|
|
err := setup.SaveEncryptionKey(inputKey, filename)
|
|
require.Errorf(t, err, "file key already exists")
|
|
})
|
|
}
|