summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/hashicorp/memberlist/keyring_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/hashicorp/memberlist/keyring_test.go')
-rw-r--r--vendor/github.com/hashicorp/memberlist/keyring_test.go154
1 files changed, 0 insertions, 154 deletions
diff --git a/vendor/github.com/hashicorp/memberlist/keyring_test.go b/vendor/github.com/hashicorp/memberlist/keyring_test.go
deleted file mode 100644
index eec699fd0..000000000
--- a/vendor/github.com/hashicorp/memberlist/keyring_test.go
+++ /dev/null
@@ -1,154 +0,0 @@
-package memberlist
-
-import (
- "bytes"
- "testing"
-)
-
-var TestKeys [][]byte = [][]byte{
- []byte{0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15},
- []byte{15, 14, 13, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0},
- []byte{8, 9, 10, 11, 12, 13, 14, 15, 0, 1, 2, 3, 4, 5, 6, 7},
-}
-
-func TestKeyring_EmptyRing(t *testing.T) {
- // Keyrings can be created with no encryption keys (disabled encryption)
- keyring, err := NewKeyring(nil, nil)
- if err != nil {
- t.Fatalf("err: %s", err)
- }
-
- keys := keyring.GetKeys()
- if len(keys) != 0 {
- t.Fatalf("Expected 0 keys but have %d", len(keys))
- }
-}
-
-func TestKeyring_PrimaryOnly(t *testing.T) {
- // Keyrings can be created using only a primary key
- keyring, err := NewKeyring(nil, TestKeys[0])
- if err != nil {
- t.Fatalf("err: %s", err)
- }
-
- keys := keyring.GetKeys()
- if len(keys) != 1 {
- t.Fatalf("Expected 1 key but have %d", len(keys))
- }
-}
-
-func TestKeyring_GetPrimaryKey(t *testing.T) {
- keyring, err := NewKeyring(TestKeys, TestKeys[1])
- if err != nil {
- t.Fatalf("err: %s", err)
- }
-
- // GetPrimaryKey returns correct key
- primaryKey := keyring.GetPrimaryKey()
- if !bytes.Equal(primaryKey, TestKeys[1]) {
- t.Fatalf("Unexpected primary key: %v", primaryKey)
- }
-}
-
-func TestKeyring_AddRemoveUse(t *testing.T) {
- keyring, err := NewKeyring(nil, TestKeys[1])
- if err != nil {
- t.Fatalf("err :%s", err)
- }
-
- // Use non-existent key throws error
- if err := keyring.UseKey(TestKeys[2]); err == nil {
- t.Fatalf("Expected key not installed error")
- }
-
- // Add key to ring
- if err := keyring.AddKey(TestKeys[2]); err != nil {
- t.Fatalf("err: %s", err)
- }
-
- keys := keyring.GetKeys()
- if !bytes.Equal(keys[0], TestKeys[1]) {
- t.Fatalf("Unexpected primary key change")
- }
-
- if len(keys) != 2 {
- t.Fatalf("Expected 2 keys but have %d", len(keys))
- }
-
- // Use key that exists should succeed
- if err := keyring.UseKey(TestKeys[2]); err != nil {
- t.Fatalf("err: %s", err)
- }
-
- primaryKey := keyring.GetPrimaryKey()
- if !bytes.Equal(primaryKey, TestKeys[2]) {
- t.Fatalf("Unexpected primary key: %v", primaryKey)
- }
-
- // Removing primary key should fail
- if err := keyring.RemoveKey(TestKeys[2]); err == nil {
- t.Fatalf("Expected primary key removal error")
- }
-
- // Removing non-primary key should succeed
- if err := keyring.RemoveKey(TestKeys[1]); err != nil {
- t.Fatalf("err: %s", err)
- }
-
- keys = keyring.GetKeys()
- if len(keys) != 1 {
- t.Fatalf("Expected 1 key but have %d", len(keys))
- }
-}
-
-func TestKeyRing_MultiKeyEncryptDecrypt(t *testing.T) {
- plaintext := []byte("this is a plain text message")
- extra := []byte("random data")
-
- keyring, err := NewKeyring(TestKeys, TestKeys[0])
- if err != nil {
- t.Fatalf("err: %s", err)
- }
-
- // First encrypt using the primary key and make sure we can decrypt
- var buf bytes.Buffer
- err = encryptPayload(1, TestKeys[0], plaintext, extra, &buf)
- if err != nil {
- t.Fatalf("err: %v", err)
- }
-
- msg, err := decryptPayload(keyring.GetKeys(), buf.Bytes(), extra)
- if err != nil {
- t.Fatalf("err: %v", err)
- }
-
- if !bytes.Equal(msg, plaintext) {
- t.Fatalf("bad: %v", msg)
- }
-
- // Now encrypt with a secondary key and try decrypting again.
- buf.Reset()
- err = encryptPayload(1, TestKeys[2], plaintext, extra, &buf)
- if err != nil {
- t.Fatalf("err: %v", err)
- }
-
- msg, err = decryptPayload(keyring.GetKeys(), buf.Bytes(), extra)
- if err != nil {
- t.Fatalf("err: %v", err)
- }
-
- if !bytes.Equal(msg, plaintext) {
- t.Fatalf("bad: %v", msg)
- }
-
- // Remove a key from the ring, and then try decrypting again
- if err := keyring.RemoveKey(TestKeys[2]); err != nil {
- t.Fatalf("err: %s", err)
- }
-
- msg, err = decryptPayload(keyring.GetKeys(), buf.Bytes(), extra)
- if err == nil {
- t.Fatalf("Expected no keys to decrypt message")
- }
-}