signer_key_pair_test.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. package signers
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io/ioutil"
  6. "net/http"
  7. "strconv"
  8. "testing"
  9. "github.com/stretchr/testify/assert"
  10. "github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/credentials"
  11. "github.com/aliyun/alibaba-cloud-sdk-go/sdk/requests"
  12. "github.com/aliyun/alibaba-cloud-sdk-go/sdk/responses"
  13. )
  14. func TestKeyPairError(t *testing.T) {
  15. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 1)
  16. _, err := NewSignerKeyPair(c, nil)
  17. assert.NotNil(t, err)
  18. assert.Equal(t, "[SDK.InvalidParam] Key Pair session duration should be in the range of 15min - 1Hr", err.Error())
  19. }
  20. func TestKeyPairOk(t *testing.T) {
  21. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 0)
  22. s, err := NewSignerKeyPair(c, nil)
  23. assert.Nil(t, err)
  24. assert.NotNil(t, s)
  25. assert.Equal(t, 3600, s.credentialExpiration)
  26. c = credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 3500)
  27. s, err = NewSignerKeyPair(c, nil)
  28. assert.Nil(t, err)
  29. assert.NotNil(t, s)
  30. assert.Equal(t, 3500, s.credentialExpiration)
  31. assert.Equal(t, "HMAC-SHA1", s.GetName())
  32. assert.Equal(t, "1.0", s.GetVersion())
  33. assert.Equal(t, "", s.GetType())
  34. assert.Len(t, s.GetExtraParam(), 0)
  35. }
  36. func Test_buildCommonRequest(t *testing.T) {
  37. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 0)
  38. s, err := NewSignerKeyPair(c, func(*requests.CommonRequest, interface{}) (response *responses.CommonResponse, err error) {
  39. return nil, fmt.Errorf("common api fails")
  40. })
  41. assert.Nil(t, err)
  42. request, err := s.buildCommonRequest()
  43. assert.Nil(t, err)
  44. assert.NotNil(t, request)
  45. assert.Equal(t, "Sts", request.Product)
  46. assert.Equal(t, "2015-04-01", request.Version)
  47. assert.Equal(t, "GenerateSessionAccessKey", request.ApiName)
  48. assert.Equal(t, "HTTPS", request.Scheme)
  49. assert.Equal(t, "publicKey", request.QueryParams["PublicKeyId"])
  50. assert.Equal(t, "3600", request.QueryParams["DurationSeconds"])
  51. }
  52. func TestGetAccessKeyId(t *testing.T) {
  53. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 0)
  54. s, err := NewSignerKeyPair(c, func(*requests.CommonRequest, interface{}) (response *responses.CommonResponse, err error) {
  55. return nil, fmt.Errorf("common api fails")
  56. })
  57. assert.Nil(t, err)
  58. assert.NotNil(t, s)
  59. accessKeyId, err := s.GetAccessKeyId()
  60. assert.Equal(t, "common api fails", err.Error())
  61. assert.Equal(t, "", accessKeyId)
  62. }
  63. func TestGetAccessKeyId2(t *testing.T) {
  64. // default response is not OK
  65. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 0)
  66. s, err := NewSignerKeyPair(c, func(*requests.CommonRequest, interface{}) (response *responses.CommonResponse, err error) {
  67. return responses.NewCommonResponse(), nil
  68. })
  69. assert.Nil(t, err)
  70. assert.NotNil(t, s)
  71. // s.lastUpdateTimestamp = time.Now().Unix() - 1000
  72. accessKeyId, err := s.GetAccessKeyId()
  73. assert.Equal(t, "SDK.ServerError\nErrorCode: \nRecommend: refresh session AccessKey failed\nRequestId: \nMessage: ", err.Error())
  74. assert.Equal(t, "", accessKeyId)
  75. }
  76. func TestGetAccessKeyId3(t *testing.T) {
  77. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 0)
  78. // Mock the 200 response and invalid json
  79. s, err := NewSignerKeyPair(c, func(*requests.CommonRequest, interface{}) (response *responses.CommonResponse, err error) {
  80. res := responses.NewCommonResponse()
  81. statusCode := 200
  82. header := make(http.Header)
  83. status := strconv.Itoa(statusCode)
  84. httpresp := &http.Response{
  85. Proto: "HTTP/1.1",
  86. ProtoMajor: 1,
  87. Header: header,
  88. StatusCode: statusCode,
  89. Status: status + " " + http.StatusText(statusCode),
  90. }
  91. httpresp.Header = make(http.Header)
  92. httpresp.Body = ioutil.NopCloser(bytes.NewReader([]byte("invalid json")))
  93. responses.Unmarshal(res, httpresp, "JSON")
  94. return res, nil
  95. })
  96. assert.Nil(t, err)
  97. assert.NotNil(t, s)
  98. // s.lastUpdateTimestamp = time.Now().Unix() - 1000
  99. accessKeyId, err := s.GetAccessKeyId()
  100. assert.NotNil(t, err)
  101. assert.Equal(t, "refresh KeyPair err, json.Unmarshal fail: invalid character 'i' looking for beginning of value", err.Error())
  102. assert.Equal(t, "", accessKeyId)
  103. }
  104. func TestGetAccessKeyId4(t *testing.T) {
  105. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 0)
  106. // mock 200 response and valid json, but no data
  107. s, err := NewSignerKeyPair(c, func(*requests.CommonRequest, interface{}) (response *responses.CommonResponse, err error) {
  108. res := responses.NewCommonResponse()
  109. statusCode := 200
  110. header := make(http.Header)
  111. status := strconv.Itoa(statusCode)
  112. httpresp := &http.Response{
  113. Proto: "HTTP/1.1",
  114. ProtoMajor: 1,
  115. Header: header,
  116. StatusCode: statusCode,
  117. Status: status + " " + http.StatusText(statusCode),
  118. }
  119. httpresp.Header = make(http.Header)
  120. httpresp.Body = ioutil.NopCloser(bytes.NewReader([]byte("{}")))
  121. responses.Unmarshal(res, httpresp, "JSON")
  122. return res, nil
  123. })
  124. assert.Nil(t, err)
  125. assert.NotNil(t, s)
  126. // s.lastUpdateTimestamp = time.Now().Unix() - 1000
  127. accessKeyId, err := s.GetAccessKeyId()
  128. assert.Nil(t, err)
  129. assert.Equal(t, "", accessKeyId)
  130. }
  131. func TestGetAccessKeyIdAndSign(t *testing.T) {
  132. c := credentials.NewRsaKeyPairCredential("privateKey", "publicKey", 0)
  133. // mock 200 response and valid json and valid result
  134. s, err := NewSignerKeyPair(c, func(*requests.CommonRequest, interface{}) (response *responses.CommonResponse, err error) {
  135. res := responses.NewCommonResponse()
  136. statusCode := 200
  137. header := make(http.Header)
  138. status := strconv.Itoa(statusCode)
  139. httpresp := &http.Response{
  140. Proto: "HTTP/1.1",
  141. ProtoMajor: 1,
  142. Header: header,
  143. StatusCode: statusCode,
  144. Status: status + " " + http.StatusText(statusCode),
  145. }
  146. httpresp.Header = make(http.Header)
  147. json := `{"SessionAccessKey":{"SessionAccessKeyId":"session access key id","SessionAccessKeySecret": "session access key secret"}}`
  148. httpresp.Body = ioutil.NopCloser(bytes.NewReader([]byte(json)))
  149. responses.Unmarshal(res, httpresp, "JSON")
  150. return res, nil
  151. })
  152. assert.Nil(t, err)
  153. assert.NotNil(t, s)
  154. // s.lastUpdateTimestamp = time.Now().Unix() - 1000
  155. accessKeyId, err := s.GetAccessKeyId()
  156. assert.Nil(t, err)
  157. assert.Equal(t, "session access key id", accessKeyId)
  158. // no need update
  159. err = s.ensureCredential()
  160. assert.Nil(t, err)
  161. signature := s.Sign("string to sign", "/")
  162. assert.Equal(t, "cgoenM6nl61t2wFdlaHVySuGAgY=", signature)
  163. }