-
Notifications
You must be signed in to change notification settings - Fork 112
Expand file tree
/
Copy pathtest_key.py
More file actions
130 lines (106 loc) · 5.16 KB
/
test_key.py
File metadata and controls
130 lines (106 loc) · 5.16 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
# -*- coding: utf-8 -*-
"""
Unit tests for the Deis api app.
Run the tests with "./manage.py test api"
"""
from __future__ import unicode_literals
import json
from django.contrib.auth.models import User
from django.test import TestCase
from rest_framework.authtoken.models import Token
from api.models import Key
from api.utils import fingerprint
RSA_PUBKEY = (
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCfQkkUUoxpvcNMkvv7jqnfodgs37M2eBO"
"APgLK+KNBMaZaaKB4GF1QhTCMfFhoiTW3rqa0J75bHJcdkoobtTHlK8XUrFqsquWyg3XhsT"
"Yr/3RQQXvO86e2sF7SVDJqVtpnbQGc5SgNrHCeHJmf5HTbXSIjCO/AJSvIjnituT/SIAMGe"
"Bw0Nq/iSltwYAek1hiKO7wSmLcIQ8U4A00KEUtalaumf2aHOcfjgPfzlbZGP0S0cuBwSqLr"
"8b5XGPmkASNdUiuJY4MJOce7bFU14B7oMAy2xacODUs1momUeYtGI9T7X2WMowJaO7tP3Gl"
"sgBMP81VfYTfYChAyJpKp2yoP autotest@autotesting comment"
)
ECDSA_PUBKEY = (
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAAB"
"BBCGB0x9lmubbLJTF5NekCI0Cgjyip6jJh/t/qQQi1LAZisbREBJ8Wy+hwSn3tnbf/Imh9X"
"+MQnrrza0jaQ3QUAQ= autotest@autotesting comment"
)
BAD_KEY = (
"ssh-rsa foo_bar"
)
class KeyTest(TestCase):
"""Tests cloud provider credentials"""
fixtures = ['tests.json']
def setUp(self):
self.user = User.objects.get(username='autotest')
self.token = Token.objects.get(user=self.user).key
def _check_key(self, pubkey):
"""
Test that a user can add, remove and manage their SSH public keys
"""
url = '/v1/keys'
body = {'id': 'mykey@box.local', 'public': pubkey}
response = self.client.post(url, json.dumps(body), content_type='application/json',
HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 201)
key_id = response.data['id']
response = self.client.get(url, HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 200)
self.assertEqual(len(response.data['results']), 1)
url = '/v1/keys/{key_id}'.format(**locals())
response = self.client.get(url, HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 200)
self.assertEqual(body['id'], response.data['id'])
self.assertEqual(body['public'], response.data['public'])
response = self.client.delete(url, HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 204)
def _check_bad_key(self, pubkey):
"""
Test that a user cannot add invalid SSH public keys
"""
url = '/v1/keys'
body = {'id': 'mykey@box.local', 'public': pubkey}
response = self.client.post(url, json.dumps(body), content_type='application/json',
HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 400)
return response
def test_rsa_key(self):
self._check_key(RSA_PUBKEY)
def test_ecdsa_key(self):
self._check_key(ECDSA_PUBKEY)
def test_bad_key(self):
response = self._check_bad_key(BAD_KEY)
self.assertEqual(response.data, {'public': ['Incorrect padding']})
def _check_duplicate_key(self, pubkey):
"""
Test that a user cannot add a duplicate key
"""
url = '/v1/keys'
body = {'id': 'mykey@box.local', 'public': pubkey}
response = self.client.post(url, json.dumps(body), content_type='application/json',
HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 201)
response = self.client.post(url, json.dumps(body), content_type='application/json',
HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 400)
def test_rsa_duplicate_key(self):
self._check_duplicate_key(RSA_PUBKEY)
def test_ecdsa_duplicate_key(self):
self._check_duplicate_key(ECDSA_PUBKEY)
def test_rsa_key_str(self):
"""Test the text representation of a key"""
url = '/v1/keys'
body = {'id': 'autotest', 'public':
'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDzqPAwHN70xsB0LXG//KzO'
'gcPikyhdN/KRc4x3j/RA0pmFj63Ywv0PJ2b1LcMSqfR8F11WBlrW8c9xFua0'
'ZAKzI+gEk5uqvOR78bs/SITOtKPomW4e/1d2xEkJqOmYH30u94+NZZYwEBqY'
'aRb34fhtrnJS70XeGF0RhXE5Qea5eh7DBbeLxPfSYd8rfHgzMSb/wmx3h2vm'
'HdQGho20pfJktNu7DxeVkTHn9REMUphf85su7slTgTlWKq++3fASE8PdmFGz'
'b6PkOR4c+LS5WWXd2oM6HyBQBxxiwXbA2lSgQxOdgDiM2FzT0GVSFMUklkUH'
'MdsaG6/HJDw9QckTS0vN autotest@deis.io'}
response = self.client.post(url, json.dumps(body), content_type='application/json',
HTTP_AUTHORIZATION='token {}'.format(self.token))
self.assertEqual(response.status_code, 201)
key = Key.objects.get(uuid=response.data['uuid'])
self.assertEqual(str(key), 'ssh-rsa AAAAB3NzaC.../HJDw9QckTS0vN autotest@deis.io')
def test_rsa_key_fingerprint(self):
fp = fingerprint(RSA_PUBKEY)
self.assertEquals(fp, '54:6d:da:1f:91:b5:2b:6f:a2:83:90:c4:f9:73:76:f5')