aboutsummaryrefslogtreecommitdiff
path: root/core/https/crypto_test.go
diff options
context:
space:
mode:
authorGravatar Miek Gieben <miek@miek.nl> 2016-08-19 17:14:17 -0700
committerGravatar GitHub <noreply@github.com> 2016-08-19 17:14:17 -0700
commit9ac3cab1b7b1b1e78f86ce3c6a80fbee312162e6 (patch)
tree437e9755927c33af16276ad2602a6da115f948cb /core/https/crypto_test.go
parenta1989c35231b0e5ea271b2f68d82c1a63e697cd0 (diff)
downloadcoredns-9ac3cab1b7b1b1e78f86ce3c6a80fbee312162e6.tar.gz
coredns-9ac3cab1b7b1b1e78f86ce3c6a80fbee312162e6.tar.zst
coredns-9ac3cab1b7b1b1e78f86ce3c6a80fbee312162e6.zip
Make CoreDNS a server type plugin for Caddy (#220)
* Make CoreDNS a server type plugin for Caddy Remove code we don't need and port all middleware over. Fix all tests and rework the documentation. Also make `go generate` build a caddy binary which we then copy into our directory. This means `go build`-builds remain working as-is. And new etc instances in each etcd test for better isolation. Fix more tests and rework test.Server with the newer support Caddy offers. Fix Makefile to support new mode of operation.
Diffstat (limited to 'core/https/crypto_test.go')
-rw-r--r--core/https/crypto_test.go111
1 files changed, 0 insertions, 111 deletions
diff --git a/core/https/crypto_test.go b/core/https/crypto_test.go
deleted file mode 100644
index 07d2af5c7..000000000
--- a/core/https/crypto_test.go
+++ /dev/null
@@ -1,111 +0,0 @@
-package https
-
-import (
- "bytes"
- "crypto"
- "crypto/ecdsa"
- "crypto/elliptic"
- "crypto/rand"
- "crypto/rsa"
- "crypto/x509"
- "os"
- "runtime"
- "testing"
-)
-
-func TestSaveAndLoadRSAPrivateKey(t *testing.T) {
- keyFile := "test.key"
- defer os.Remove(keyFile)
-
- privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
- if err != nil {
- t.Fatal(err)
- }
-
- // test save
- err = savePrivateKey(privateKey, keyFile)
- if err != nil {
- t.Fatal("error saving private key:", err)
- }
-
- // it doesn't make sense to test file permission on windows
- if runtime.GOOS != "windows" {
- // get info of the key file
- info, err := os.Stat(keyFile)
- if err != nil {
- t.Fatal("error stating private key:", err)
- }
- // verify permission of key file is correct
- if info.Mode().Perm() != 0600 {
- t.Error("Expected key file to have permission 0600, but it wasn't")
- }
- }
-
- // test load
- loadedKey, err := loadPrivateKey(keyFile)
- if err != nil {
- t.Error("error loading private key:", err)
- }
-
- // verify loaded key is correct
- if !PrivateKeysSame(privateKey, loadedKey) {
- t.Error("Expected key bytes to be the same, but they weren't")
- }
-}
-
-func TestSaveAndLoadECCPrivateKey(t *testing.T) {
- keyFile := "test.key"
- defer os.Remove(keyFile)
-
- privateKey, err := ecdsa.GenerateKey(elliptic.P384(), rand.Reader)
- if err != nil {
- t.Fatal(err)
- }
-
- // test save
- err = savePrivateKey(privateKey, keyFile)
- if err != nil {
- t.Fatal("error saving private key:", err)
- }
-
- // it doesn't make sense to test file permission on windows
- if runtime.GOOS != "windows" {
- // get info of the key file
- info, err := os.Stat(keyFile)
- if err != nil {
- t.Fatal("error stating private key:", err)
- }
- // verify permission of key file is correct
- if info.Mode().Perm() != 0600 {
- t.Error("Expected key file to have permission 0600, but it wasn't")
- }
- }
-
- // test load
- loadedKey, err := loadPrivateKey(keyFile)
- if err != nil {
- t.Error("error loading private key:", err)
- }
-
- // verify loaded key is correct
- if !PrivateKeysSame(privateKey, loadedKey) {
- t.Error("Expected key bytes to be the same, but they weren't")
- }
-}
-
-// PrivateKeysSame compares the bytes of a and b and returns true if they are the same.
-func PrivateKeysSame(a, b crypto.PrivateKey) bool {
- return bytes.Equal(PrivateKeyBytes(a), PrivateKeyBytes(b))
-}
-
-// PrivateKeyBytes returns the bytes of DER-encoded key.
-func PrivateKeyBytes(key crypto.PrivateKey) []byte {
- var keyBytes []byte
- switch key := key.(type) {
- case *rsa.PrivateKey:
- keyBytes = x509.MarshalPKCS1PrivateKey(key)
- case *ecdsa.PrivateKey:
- keyBytes, _ = x509.MarshalECPrivateKey(key)
- }
- return keyBytes
-}