Skip to content

Commit eb4813e

Browse files
authored
fix: add tests for raw rsa keyring node (aws#142)
1 parent 896883a commit eb4813e

File tree

1 file changed

+182
-0
lines changed

1 file changed

+182
-0
lines changed
Lines changed: 182 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,182 @@
1+
/*
2+
* Copyright 2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
3+
*
4+
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use
5+
* this file except in compliance with the License. A copy of the License is
6+
* located at
7+
*
8+
* http://aws.amazon.com/apache2.0/
9+
*
10+
* or in the "license" file accompanying this file. This file is distributed on an
11+
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
12+
* implied. See the License for the specific language governing permissions and
13+
* limitations under the License.
14+
*/
15+
16+
/* eslint-env mocha */
17+
18+
import * as chai from 'chai'
19+
import chaiAsPromised from 'chai-as-promised'
20+
import 'mocha'
21+
import {
22+
RawRsaKeyringNode
23+
} from '../src/index'
24+
import {
25+
KeyringNode,
26+
NodeEncryptionMaterial,
27+
NodeAlgorithmSuite,
28+
AlgorithmSuiteIdentifier,
29+
EncryptedDataKey, // eslint-disable-line no-unused-vars
30+
NodeDecryptionMaterial
31+
} from '@aws-crypto/material-management-node'
32+
33+
chai.use(chaiAsPromised)
34+
const { expect } = chai
35+
36+
/* RSA Keys to test.
37+
* These keys are *Public*!
38+
* *DO NOT USE*
39+
*
40+
* to recrate
41+
crypto.generateKeyPair('rsa', {
42+
modulusLength: 4096,
43+
publicKeyEncoding: {
44+
type: 'spki',
45+
format: 'pem'
46+
},
47+
privateKeyEncoding: {
48+
type: 'pkcs8',
49+
format: 'pem'
50+
}
51+
}, (e, p, v) => {
52+
public = p
53+
private = v
54+
})
55+
*/
56+
const publicPem = '-----BEGIN PUBLIC KEY-----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\nMqsi59G6k0Ik3PjcwZ0gmv8CAwEAAQ==\n-----END PUBLIC KEY-----\n'
57+
const privatePem = '-----BEGIN PRIVATE KEY-----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\nnUwWh19LU+597M0VXIKm2/H3v4up\n-----END PRIVATE KEY-----\n'
58+
59+
describe('RawRsaKeyringWebCrypto::constructor', () => {
60+
const keyName = 'keyName'
61+
const keyNamespace = 'keyNamespace'
62+
63+
it('constructor decorates', async () => {
64+
const test = new RawRsaKeyringNode({
65+
rsaKey: {
66+
privateKey: privatePem,
67+
publicKey: publicPem
68+
},
69+
keyName,
70+
keyNamespace
71+
})
72+
73+
expect(test.keyName).to.equal(keyName)
74+
expect(test.keyNamespace).to.equal(keyNamespace)
75+
expect(test._wrapKey).to.be.a('function')
76+
expect(test._unwrapKey).to.be.a('function')
77+
expect(test).to.be.instanceOf(KeyringNode)
78+
})
79+
80+
it('can construct with only public key', () => {
81+
const testPublicOnly = new RawRsaKeyringNode({
82+
rsaKey: {
83+
publicKey: publicPem
84+
},
85+
keyName,
86+
keyNamespace
87+
})
88+
expect(testPublicOnly).to.be.instanceOf(RawRsaKeyringNode)
89+
})
90+
91+
it('can construct with only private key', () => {
92+
const testPrivateOnly = new RawRsaKeyringNode({
93+
rsaKey: {
94+
privateKey: privatePem
95+
},
96+
keyName,
97+
keyNamespace
98+
})
99+
expect(testPrivateOnly).to.be.instanceOf(RawRsaKeyringNode)
100+
})
101+
102+
it('Precondition: RsaKeyringNode needs either a public or a private key to operate.', () => {
103+
expect(() => new RawRsaKeyringNode({
104+
keyName,
105+
keyNamespace,
106+
rsaKey: {}
107+
})).to.throw()
108+
})
109+
110+
it('Precondition: RsaKeyringNode needs identifying information for encrypt and decrypt.', () => {
111+
// @ts-ignore Typescript is trying to save us.
112+
expect(() => new RawRsaKeyringNode({
113+
rsaKey: { privateKey: privatePem, publicKey: publicPem }
114+
})).to.throw()
115+
// @ts-ignore Typescript is trying to save us.
116+
expect(() => new RawRsaKeyringNode({
117+
rsaKey: { privateKey: privatePem, publicKey: publicPem },
118+
keyNamespace
119+
})).to.throw()
120+
// @ts-ignore Typescript is trying to save us.
121+
expect(() => new RawRsaKeyringNode({
122+
rsaKey: { privateKey: privatePem, publicKey: publicPem },
123+
keyName
124+
})).to.throw()
125+
})
126+
})
127+
128+
describe('RawRsaKeyringWebCrypto encrypt/decrypt', () => {
129+
const keyNamespace = 'keyNamespace'
130+
const keyName = 'keyName'
131+
const keyring = new RawRsaKeyringNode({
132+
rsaKey: { privateKey: privatePem, publicKey: publicPem },
133+
keyName,
134+
keyNamespace
135+
})
136+
let encryptedDataKey: EncryptedDataKey
137+
138+
it('can encrypt and create unencrypted data key', async () => {
139+
const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256)
140+
const material = new NodeEncryptionMaterial(suite)
141+
const test = await keyring.onEncrypt(material)
142+
expect(test.hasValidKey()).to.equal(true)
143+
const udk = test.getUnencryptedDataKey()
144+
expect(udk).to.have.lengthOf(suite.keyLengthBytes)
145+
expect(test.encryptedDataKeys).to.have.lengthOf(1)
146+
const [edk] = test.encryptedDataKeys
147+
expect(edk.providerId).to.equal(keyNamespace)
148+
encryptedDataKey = edk
149+
})
150+
151+
it('can decrypt an EncryptedDataKey', async () => {
152+
const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256)
153+
const material = new NodeDecryptionMaterial(suite)
154+
const test = await keyring.onDecrypt(material, [encryptedDataKey])
155+
expect(test.hasValidKey()).to.equal(true)
156+
})
157+
158+
it('Precondition: Public key must be defined to support encrypt.', async () => {
159+
const keyring = new RawRsaKeyringNode({
160+
rsaKey: { privateKey: privatePem },
161+
keyName,
162+
keyNamespace
163+
})
164+
165+
const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256)
166+
const material = new NodeEncryptionMaterial(suite)
167+
expect(keyring.onEncrypt(material)).to.rejectedWith(Error)
168+
})
169+
170+
it('Precondition: Private key must be defined to support decrypt.', async () => {
171+
const keyring = new RawRsaKeyringNode({
172+
rsaKey: { publicKey: publicPem },
173+
keyName,
174+
keyNamespace
175+
})
176+
177+
const suite = new NodeAlgorithmSuite(AlgorithmSuiteIdentifier.ALG_AES256_GCM_IV12_TAG16_HKDF_SHA256)
178+
const material = new NodeDecryptionMaterial(suite)
179+
await keyring.onDecrypt(material, [encryptedDataKey])
180+
expect(keyring.onDecrypt(material, [encryptedDataKey])).to.rejectedWith(Error)
181+
})
182+
})

0 commit comments

Comments
 (0)