mirror of
https://codeberg.org/forgejo/forgejo
synced 2024-12-05 02:54:46 +01:00
65 lines
2.2 KiB
Go
65 lines
2.2 KiB
Go
|
// Copyright 2014 The Go Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style
|
||
|
// license that can be found in the LICENSE file.
|
||
|
|
||
|
// IMPLEMENTOR NOTE: To avoid a package loop, this file is in three places:
|
||
|
// ssh/, ssh/agent, and ssh/test/. It should be kept in sync across all three
|
||
|
// instances.
|
||
|
|
||
|
package test
|
||
|
|
||
|
import (
|
||
|
"crypto/rand"
|
||
|
"fmt"
|
||
|
|
||
|
"golang.org/x/crypto/ssh"
|
||
|
"golang.org/x/crypto/ssh/testdata"
|
||
|
)
|
||
|
|
||
|
var (
|
||
|
testPrivateKeys map[string]interface{}
|
||
|
testSigners map[string]ssh.Signer
|
||
|
testPublicKeys map[string]ssh.PublicKey
|
||
|
)
|
||
|
|
||
|
func init() {
|
||
|
var err error
|
||
|
|
||
|
n := len(testdata.PEMBytes)
|
||
|
testPrivateKeys = make(map[string]interface{}, n)
|
||
|
testSigners = make(map[string]ssh.Signer, n)
|
||
|
testPublicKeys = make(map[string]ssh.PublicKey, n)
|
||
|
for t, k := range testdata.PEMBytes {
|
||
|
testPrivateKeys[t], err = ssh.ParseRawPrivateKey(k)
|
||
|
if err != nil {
|
||
|
panic(fmt.Sprintf("Unable to parse test key %s: %v", t, err))
|
||
|
}
|
||
|
testSigners[t], err = ssh.NewSignerFromKey(testPrivateKeys[t])
|
||
|
if err != nil {
|
||
|
panic(fmt.Sprintf("Unable to create signer for test key %s: %v", t, err))
|
||
|
}
|
||
|
testPublicKeys[t] = testSigners[t].PublicKey()
|
||
|
}
|
||
|
|
||
|
// Create a cert and sign it for use in tests.
|
||
|
testCert := &ssh.Certificate{
|
||
|
Nonce: []byte{}, // To pass reflect.DeepEqual after marshal & parse, this must be non-nil
|
||
|
ValidPrincipals: []string{"gopher1", "gopher2"}, // increases test coverage
|
||
|
ValidAfter: 0, // unix epoch
|
||
|
ValidBefore: ssh.CertTimeInfinity, // The end of currently representable time.
|
||
|
Reserved: []byte{}, // To pass reflect.DeepEqual after marshal & parse, this must be non-nil
|
||
|
Key: testPublicKeys["ecdsa"],
|
||
|
SignatureKey: testPublicKeys["rsa"],
|
||
|
Permissions: ssh.Permissions{
|
||
|
CriticalOptions: map[string]string{},
|
||
|
Extensions: map[string]string{},
|
||
|
},
|
||
|
}
|
||
|
testCert.SignCert(rand.Reader, testSigners["rsa"])
|
||
|
testPrivateKeys["cert"] = testPrivateKeys["ecdsa"]
|
||
|
testSigners["cert"], err = ssh.NewCertSigner(testCert, testSigners["ecdsa"])
|
||
|
if err != nil {
|
||
|
panic(fmt.Sprintf("Unable to create certificate signer: %v", err))
|
||
|
}
|
||
|
}
|