blob: fee6b03ac61a835b3fb3c88cf810c25136ba8799 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apche.nifi.pgp.service.standard;
import org.apache.nifi.pgp.service.standard.StandardPGPPrivateKeyService;
import org.apache.nifi.pgp.util.PGPFileUtils;
import org.apache.nifi.processor.Processor;
import org.apache.nifi.util.TestRunner;
import org.apache.nifi.util.TestRunners;
import org.apache.nifi.pgp.util.PGPSecretKeyGenerator;
import org.bouncycastle.openpgp.PGPPrivateKey;
import org.bouncycastle.openpgp.PGPSecretKey;
import org.bouncycastle.openpgp.PGPSecretKeyRing;
import org.junit.jupiter.api.BeforeAll;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import java.io.File;
import java.nio.charset.StandardCharsets;
import java.util.Optional;
import java.util.UUID;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertTrue;
import static org.mockito.Mockito.mock;
public class StandardPGPPrivateKeyServiceTest {
private static final String SERVICE_ID = StandardPGPPrivateKeyService.class.getSimpleName();
private static final String KEY_ENCRYPTION_PASSWORD = UUID.randomUUID().toString();
private static PGPSecretKey rsaSecretKey;
private static File rsaKeyringFileAscii;
private static File rsaKeyringFileBinary;
private static String rsaKeyAscii;
private static PGPSecretKeyRing elGamalKeyring;
private static String elGamalKeyringAscii;
private StandardPGPPrivateKeyService service;
private TestRunner runner;
@BeforeAll
public static void setKey() throws Exception {
rsaSecretKey = PGPSecretKeyGenerator.generateRsaSecretKey(KEY_ENCRYPTION_PASSWORD.toCharArray());
final byte[] secretKeyEncoded = rsaSecretKey.getEncoded();
rsaKeyAscii = PGPFileUtils.getArmored(secretKeyEncoded);
rsaKeyringFileAscii = PGPFileUtils.getKeyFile(rsaKeyAscii.getBytes(StandardCharsets.US_ASCII));
rsaKeyringFileBinary = PGPFileUtils.getKeyFile(secretKeyEncoded);
elGamalKeyring = PGPSecretKeyGenerator.generateDsaElGamalSecretKeyRing(KEY_ENCRYPTION_PASSWORD.toCharArray());
elGamalKeyringAscii = PGPFileUtils.getArmored(elGamalKeyring.getEncoded());
}
@BeforeEach
public void setService() {
service = new StandardPGPPrivateKeyService();
final Processor processor = mock(Processor.class);
runner = TestRunners.newTestRunner(processor);
}
@Test
public void testMissingRequiredProperties() throws Exception {
runner.addControllerService(SERVICE_ID, service);
runner.assertNotValid(service);
}
@Test
public void testEnableInvalidPassword() throws Exception {
runner.addControllerService(SERVICE_ID, service);
runner.setProperty(service, StandardPGPPrivateKeyService.KEYRING_FILE, rsaKeyringFileBinary.getAbsolutePath());
runner.setProperty(service, StandardPGPPrivateKeyService.KEY_PASSWORD, String.class.getSimpleName());
runner.assertNotValid(service);
}
@Test
public void testFindPrivateKeyRsaBinaryKeyring() throws Exception {
runner.addControllerService(SERVICE_ID, service);
runner.setProperty(service, StandardPGPPrivateKeyService.KEYRING_FILE, rsaKeyringFileBinary.getAbsolutePath());
runner.setProperty(service, StandardPGPPrivateKeyService.KEY_PASSWORD, KEY_ENCRYPTION_PASSWORD);
runner.assertValid(service);
runner.enableControllerService(service);
assertPrivateKeyFound(rsaSecretKey);
}
@Test
public void testFindPrivateKeyRsaAsciiKeyring() throws Exception {
runner.addControllerService(SERVICE_ID, service);
runner.setProperty(service, StandardPGPPrivateKeyService.KEYRING_FILE, rsaKeyringFileAscii.getAbsolutePath());
runner.setProperty(service, StandardPGPPrivateKeyService.KEY_PASSWORD, KEY_ENCRYPTION_PASSWORD);
runner.assertValid(service);
runner.enableControllerService(service);
assertPrivateKeyFound(rsaSecretKey);
}
@Test
public void testFindPrivateKeyRsaAsciiKey() throws Exception {
runner.addControllerService(SERVICE_ID, service);
runner.setProperty(service, StandardPGPPrivateKeyService.KEYRING, rsaKeyAscii);
runner.setProperty(service, StandardPGPPrivateKeyService.KEY_PASSWORD, KEY_ENCRYPTION_PASSWORD);
runner.assertValid(service);
runner.enableControllerService(service);
assertPrivateKeyFound(rsaSecretKey);
}
@Test
public void testFindPrivateKeyElGamalAsciiKeyring() throws Exception {
runner.addControllerService(SERVICE_ID, service);
runner.setProperty(service, StandardPGPPrivateKeyService.KEYRING, elGamalKeyringAscii);
runner.setProperty(service, StandardPGPPrivateKeyService.KEY_PASSWORD, KEY_ENCRYPTION_PASSWORD);
runner.assertValid(service);
runner.enableControllerService(service);
for (final PGPSecretKey secretKey : elGamalKeyring) {
assertPrivateKeyFound(secretKey);
}
}
@Test
public void testFindPrivateKeyRsaBinaryKeyringFileAndElGamalAsciiKeyring() throws Exception {
runner.addControllerService(SERVICE_ID, service);
runner.setProperty(service, StandardPGPPrivateKeyService.KEYRING_FILE, rsaKeyringFileBinary.getAbsolutePath());
runner.setProperty(service, StandardPGPPrivateKeyService.KEYRING, elGamalKeyringAscii);
runner.setProperty(service, StandardPGPPrivateKeyService.KEY_PASSWORD, KEY_ENCRYPTION_PASSWORD);
runner.assertValid(service);
runner.enableControllerService(service);
assertPrivateKeyFound(rsaSecretKey);
for (final PGPSecretKey secretKey : elGamalKeyring) {
assertPrivateKeyFound(secretKey);
}
}
private void assertPrivateKeyFound(final PGPSecretKey pgpSecretKey) {
final long keyIdentifier = pgpSecretKey.getKeyID();
final Optional<PGPPrivateKey> optionalPrivateKey = service.findPrivateKey(keyIdentifier);
assertTrue(optionalPrivateKey.isPresent());
final PGPPrivateKey privateKey = optionalPrivateKey.get();
assertEquals(keyIdentifier, privateKey.getKeyID());
}
}