2024-09-18 12:20:54 -04:00
|
|
|
package delegation_test
|
|
|
|
|
|
|
|
|
|
import (
|
2024-10-31 18:24:54 +01:00
|
|
|
"encoding/base64"
|
2024-09-18 12:20:54 -04:00
|
|
|
"testing"
|
2024-09-18 15:54:46 -04:00
|
|
|
"time"
|
2024-09-18 12:20:54 -04:00
|
|
|
|
|
|
|
|
"github.com/libp2p/go-libp2p/core/crypto"
|
|
|
|
|
"github.com/stretchr/testify/require"
|
2024-09-19 10:48:25 +02:00
|
|
|
"gotest.tools/v3/golden"
|
|
|
|
|
|
2024-09-18 12:20:54 -04:00
|
|
|
"github.com/ucan-wg/go-ucan/did"
|
2024-09-24 11:40:28 -04:00
|
|
|
"github.com/ucan-wg/go-ucan/pkg/command"
|
|
|
|
|
"github.com/ucan-wg/go-ucan/pkg/policy"
|
2024-10-01 17:02:49 +02:00
|
|
|
"github.com/ucan-wg/go-ucan/token/delegation"
|
2024-09-18 12:20:54 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
const (
|
|
|
|
|
nonce = "6roDhGi0kiNriQAz7J3d+bOeoI/tj8ENikmQNbtjnD0"
|
|
|
|
|
|
|
|
|
|
AudiencePrivKeyCfg = "CAESQL1hvbXpiuk2pWr/XFbfHJcZNpJ7S90iTA3wSCTc/BPRneCwPnCZb6c0vlD6ytDWqaOt0HEOPYnqEpnzoBDprSM="
|
|
|
|
|
AudienceDID = "did:key:z6Mkq5YmbJcTrPExNDi26imrTCpKhepjBFBSHqrBDN2ArPkv"
|
|
|
|
|
|
|
|
|
|
issuerPrivKeyCfg = "CAESQLSql38oDmQXIihFFaYIjb73mwbPsc7MIqn4o8PN4kRNnKfHkw5gRP1IV9b6d0estqkZayGZ2vqMAbhRixjgkDU="
|
|
|
|
|
issuerDID = "did:key:z6Mkpzn2n3ZGT2VaqMGSQC3tzmzV4TS9S71iFsDXE1WnoNH2"
|
|
|
|
|
|
|
|
|
|
subjectPrivKeyCfg = "CAESQL9RtjZ4dQBeXtvDe53UyvslSd64kSGevjdNiA1IP+hey5i/3PfRXSuDr71UeJUo1fLzZ7mGldZCOZL3gsIQz5c="
|
|
|
|
|
subjectDID = "did:key:z6MktA1uBdCpq4uJBqE9jjMiLyxZBg9a6xgPPKJjMqss6Zc2"
|
|
|
|
|
subJectCmd = "/foo/bar"
|
|
|
|
|
subjectPol = `
|
|
|
|
|
[
|
|
|
|
|
[
|
|
|
|
|
"==",
|
|
|
|
|
".status",
|
|
|
|
|
"draft"
|
|
|
|
|
],
|
|
|
|
|
[
|
|
|
|
|
"all",
|
|
|
|
|
".reviewer",
|
|
|
|
|
[
|
|
|
|
|
"like",
|
|
|
|
|
".email",
|
|
|
|
|
"*@example.com"
|
|
|
|
|
]
|
|
|
|
|
],
|
|
|
|
|
[
|
|
|
|
|
"any",
|
|
|
|
|
".tags",
|
|
|
|
|
[
|
|
|
|
|
"or",
|
|
|
|
|
[
|
|
|
|
|
[
|
|
|
|
|
"==",
|
|
|
|
|
".",
|
|
|
|
|
"news"
|
|
|
|
|
],
|
|
|
|
|
[
|
|
|
|
|
"==",
|
|
|
|
|
".",
|
|
|
|
|
"press"
|
|
|
|
|
]
|
|
|
|
|
]
|
|
|
|
|
]
|
|
|
|
|
]
|
|
|
|
|
]
|
|
|
|
|
`
|
2024-09-19 13:29:33 -04:00
|
|
|
|
|
|
|
|
newCID = "zdpuAn9JgGPvnt2WCmTaKktZdbuvcVGTg9bUT5kQaufwUtZ6e"
|
|
|
|
|
rootCID = "zdpuAkgGmUp5JrXvehGuuw9JA8DLQKDaxtK3R8brDQQVC2i5X"
|
2024-10-31 18:24:54 +01:00
|
|
|
|
|
|
|
|
aesKey = "xQklMmNTnVrmaPBq/0pwV5fEwuv/iClF5HWak9MsgI8="
|
2024-09-18 12:20:54 -04:00
|
|
|
)
|
|
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
func TestConstructors(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
privKey := privKey(t, issuerPrivKeyCfg)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
aud, err := did.Parse(AudienceDID)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
sub, err := did.Parse(subjectDID)
|
|
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
cmd, err := command.Parse(subJectCmd)
|
|
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
pol, err := policy.FromDagJson(subjectPol)
|
|
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
exp, err := time.Parse(time.RFC3339, "2200-01-01T00:00:00Z")
|
|
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
t.Run("New", func(t *testing.T) {
|
2024-09-24 08:20:42 -04:00
|
|
|
tkn, err := delegation.New(privKey, aud, cmd, pol,
|
2024-09-19 11:16:33 +02:00
|
|
|
delegation.WithNonce([]byte(nonce)),
|
2024-09-19 10:48:25 +02:00
|
|
|
delegation.WithSubject(sub),
|
|
|
|
|
delegation.WithExpiration(exp),
|
|
|
|
|
delegation.WithMeta("foo", "fooo"),
|
|
|
|
|
delegation.WithMeta("bar", "barr"),
|
|
|
|
|
)
|
2024-09-18 15:54:46 -04:00
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-24 08:20:42 -04:00
|
|
|
data, err := tkn.ToDagJson(privKey)
|
2024-09-18 15:54:46 -04:00
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
golden.Assert(t, string(data), "new.dagjson")
|
|
|
|
|
})
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
t.Run("Root", func(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-24 08:20:42 -04:00
|
|
|
tkn, err := delegation.Root(privKey, aud, cmd, pol,
|
2024-09-19 11:16:33 +02:00
|
|
|
delegation.WithNonce([]byte(nonce)),
|
2024-09-19 10:48:25 +02:00
|
|
|
delegation.WithExpiration(exp),
|
|
|
|
|
delegation.WithMeta("foo", "fooo"),
|
|
|
|
|
delegation.WithMeta("bar", "barr"),
|
|
|
|
|
)
|
2024-09-18 15:54:46 -04:00
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-24 08:20:42 -04:00
|
|
|
data, err := tkn.ToDagJson(privKey)
|
2024-09-18 15:54:46 -04:00
|
|
|
require.NoError(t, err)
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-09-18 15:54:46 -04:00
|
|
|
golden.Assert(t, string(data), "root.dagjson")
|
|
|
|
|
})
|
|
|
|
|
}
|
2024-09-18 12:20:54 -04:00
|
|
|
|
2024-10-31 18:24:54 +01:00
|
|
|
func TestEncryptedMeta(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
|
|
privKey := privKey(t, issuerPrivKeyCfg)
|
|
|
|
|
aud, err := did.Parse(AudienceDID)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
cmd, err := command.Parse(subJectCmd)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
pol, err := policy.FromDagJson(subjectPol)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
encryptionKey, err := base64.StdEncoding.DecodeString(aesKey)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
require.Len(t, encryptionKey, 32)
|
|
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
key string
|
|
|
|
|
value string
|
|
|
|
|
expectError bool
|
|
|
|
|
}{
|
|
|
|
|
{
|
|
|
|
|
name: "simple string",
|
|
|
|
|
key: "secret1",
|
|
|
|
|
value: "hello world",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "empty string",
|
|
|
|
|
key: "secret2",
|
|
|
|
|
value: "",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "special characters",
|
|
|
|
|
key: "secret3",
|
|
|
|
|
value: "!@#$%^&*()_+-=[]{}|;:,.<>?",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "unicode characters",
|
|
|
|
|
key: "secret4",
|
|
|
|
|
value: "Hello, 世界! 👋",
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
tt := tt
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
|
|
tkn, err := delegation.New(privKey, aud, cmd, pol,
|
2024-11-12 16:07:39 +01:00
|
|
|
delegation.WithEncryptedMetaString(tt.key, tt.value, encryptionKey),
|
2024-10-31 18:24:54 +01:00
|
|
|
)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
data, err := tkn.ToDagCbor(privKey)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
decodedTkn, _, err := delegation.FromSealed(data)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
2024-11-12 16:37:53 +01:00
|
|
|
_, err = decodedTkn.Meta().GetString(tt.key)
|
|
|
|
|
require.Error(t, err)
|
2024-10-31 18:24:54 +01:00
|
|
|
|
|
|
|
|
decrypted, err := decodedTkn.Meta().GetEncryptedString(tt.key, encryptionKey)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
// Verify the decrypted value is equal to the original
|
|
|
|
|
require.Equal(t, tt.value, decrypted)
|
|
|
|
|
|
|
|
|
|
// Try to decrypt with wrong key
|
|
|
|
|
wrongKey := make([]byte, 32)
|
|
|
|
|
_, err = decodedTkn.Meta().GetEncryptedString(tt.key, wrongKey)
|
|
|
|
|
require.Error(t, err)
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
t.Run("multiple encrypted values in the same token", func(t *testing.T) {
|
|
|
|
|
values := map[string]string{
|
|
|
|
|
"secret1": "value1",
|
|
|
|
|
"secret2": "value2",
|
|
|
|
|
"secret3": "value3",
|
|
|
|
|
}
|
2024-11-04 19:11:25 +01:00
|
|
|
var opts []delegation.Option
|
|
|
|
|
for k, v := range values {
|
2024-11-12 16:07:39 +01:00
|
|
|
opts = append(opts, delegation.WithEncryptedMetaString(k, v, encryptionKey))
|
2024-11-04 19:11:25 +01:00
|
|
|
}
|
2024-10-31 18:24:54 +01:00
|
|
|
|
|
|
|
|
// Create token with multiple encrypted values
|
2024-11-04 19:11:25 +01:00
|
|
|
tkn, err := delegation.New(privKey, aud, cmd, pol, opts...)
|
2024-10-31 18:24:54 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
data, err := tkn.ToDagCbor(privKey)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
decodedTkn, _, err := delegation.FromSealed(data)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
for k, v := range values {
|
|
|
|
|
decrypted, err := decodedTkn.Meta().GetEncryptedString(k, encryptionKey)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
require.Equal(t, v, decrypted)
|
|
|
|
|
}
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
2024-09-24 14:09:36 +02:00
|
|
|
func privKey(t require.TestingT, privKeyCfg string) crypto.PrivKey {
|
2024-09-18 12:20:54 -04:00
|
|
|
privKeyMar, err := crypto.ConfigDecodeKey(privKeyCfg)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
privKey, err := crypto.UnmarshalPrivateKey(privKeyMar)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
|
|
return privKey
|
|
|
|
|
}
|