diff options
author | Daniel Baumann <daniel@debian.org> | 2024-10-18 20:33:49 +0200 |
---|---|---|
committer | Daniel Baumann <daniel@debian.org> | 2024-12-12 23:57:56 +0100 |
commit | e68b9d00a6e05b3a941f63ffb696f91e554ac5ec (patch) | |
tree | 97775d6c13b0f416af55314eb6a89ef792474615 /modules/keying/keying_test.go | |
parent | Initial commit. (diff) | |
download | forgejo-e68b9d00a6e05b3a941f63ffb696f91e554ac5ec.tar.xz forgejo-e68b9d00a6e05b3a941f63ffb696f91e554ac5ec.zip |
Adding upstream version 9.0.3.
Signed-off-by: Daniel Baumann <daniel@debian.org>
Diffstat (limited to '')
-rw-r--r-- | modules/keying/keying_test.go | 111 |
1 files changed, 111 insertions, 0 deletions
diff --git a/modules/keying/keying_test.go b/modules/keying/keying_test.go new file mode 100644 index 0000000..8a6e8d5 --- /dev/null +++ b/modules/keying/keying_test.go @@ -0,0 +1,111 @@ +// Copyright 2024 The Forgejo Authors. All rights reserved. +// SPDX-License-Identifier: MIT + +package keying_test + +import ( + "math" + "testing" + + "code.gitea.io/gitea/modules/keying" + + "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/require" + "golang.org/x/crypto/chacha20poly1305" +) + +func TestKeying(t *testing.T) { + t.Run("Not initalized", func(t *testing.T) { + assert.Panics(t, func() { + keying.DeriveKey(keying.Context("TESTING")) + }) + }) + + t.Run("Initialization", func(t *testing.T) { + keying.Init([]byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07}) + }) + + t.Run("Context seperation", func(t *testing.T) { + key1 := keying.DeriveKey(keying.Context("TESTING")) + key2 := keying.DeriveKey(keying.Context("TESTING2")) + + ciphertext := key1.Encrypt([]byte("This is for context TESTING"), nil) + + plaintext, err := key2.Decrypt(ciphertext, nil) + require.Error(t, err) + assert.Empty(t, plaintext) + + plaintext, err = key1.Decrypt(ciphertext, nil) + require.NoError(t, err) + assert.EqualValues(t, "This is for context TESTING", plaintext) + }) + + context := keying.Context("TESTING PURPOSES") + plainText := []byte("Forgejo is run by [Redacted]") + var cipherText []byte + t.Run("Encrypt", func(t *testing.T) { + key := keying.DeriveKey(context) + + cipherText = key.Encrypt(plainText, []byte{0x05, 0x06}) + cipherText2 := key.Encrypt(plainText, []byte{0x05, 0x06}) + + // Ensure ciphertexts don't have an determistic output. + assert.NotEqualValues(t, cipherText, cipherText2) + }) + + t.Run("Decrypt", func(t *testing.T) { + key := keying.DeriveKey(context) + + t.Run("Succesful", func(t *testing.T) { + convertedPlainText, err := key.Decrypt(cipherText, []byte{0x05, 0x06}) + require.NoError(t, err) + assert.EqualValues(t, plainText, convertedPlainText) + }) + + t.Run("Not enougn additional data", func(t *testing.T) { + plainText, err := key.Decrypt(cipherText, []byte{0x05}) + require.Error(t, err) + assert.Empty(t, plainText) + }) + + t.Run("Too much additional data", func(t *testing.T) { + plainText, err := key.Decrypt(cipherText, []byte{0x05, 0x06, 0x07}) + require.Error(t, err) + assert.Empty(t, plainText) + }) + + t.Run("Incorrect nonce", func(t *testing.T) { + // Flip the first byte of the nonce. + cipherText[0] = ^cipherText[0] + + plainText, err := key.Decrypt(cipherText, []byte{0x05, 0x06}) + require.Error(t, err) + assert.Empty(t, plainText) + }) + + t.Run("Incorrect ciphertext", func(t *testing.T) { + assert.Panics(t, func() { + key.Decrypt(nil, nil) + }) + + assert.Panics(t, func() { + cipherText := make([]byte, chacha20poly1305.NonceSizeX) + key.Decrypt(cipherText, nil) + }) + }) + }) +} + +func TestKeyingColumnAndID(t *testing.T) { + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x3a, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, keying.ColumnAndID("table", math.MinInt64)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x3a, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, keying.ColumnAndID("table", -1)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x3a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, keying.ColumnAndID("table", 0)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x3a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01}, keying.ColumnAndID("table", 1)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x3a, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, keying.ColumnAndID("table", math.MaxInt64)) + + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x32, 0x3a, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, keying.ColumnAndID("table2", math.MinInt64)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x32, 0x3a, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, keying.ColumnAndID("table2", -1)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x32, 0x3a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, keying.ColumnAndID("table2", 0)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x32, 0x3a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01}, keying.ColumnAndID("table2", 1)) + assert.EqualValues(t, []byte{0x74, 0x61, 0x62, 0x6c, 0x65, 0x32, 0x3a, 0x7f, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, keying.ColumnAndID("table2", math.MaxInt64)) +} |