-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Daniel Nephin <[email protected]>
- Loading branch information
Showing
6 changed files
with
130 additions
and
133 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
package daemon | ||
|
||
import ( | ||
"encoding/json" | ||
"encoding/pem" | ||
"fmt" | ||
"os" | ||
"path/filepath" | ||
|
||
"github.com/docker/docker/pkg/ioutils" | ||
"github.com/docker/docker/pkg/system" | ||
"github.com/docker/libtrust" | ||
) | ||
|
||
// LoadOrCreateTrustKey attempts to load the libtrust key at the given path, | ||
// otherwise generates a new one | ||
// TODO: this should use more of libtrust.LoadOrCreateTrustKey which may need | ||
// a refactor or this function to be moved into libtrust | ||
func loadOrCreateTrustKey(trustKeyPath string) (libtrust.PrivateKey, error) { | ||
err := system.MkdirAll(filepath.Dir(trustKeyPath), 0700, "") | ||
if err != nil { | ||
return nil, err | ||
} | ||
trustKey, err := libtrust.LoadKeyFile(trustKeyPath) | ||
if err == libtrust.ErrKeyFileDoesNotExist { | ||
trustKey, err = libtrust.GenerateECP256PrivateKey() | ||
if err != nil { | ||
return nil, fmt.Errorf("Error generating key: %s", err) | ||
} | ||
encodedKey, err := serializePrivateKey(trustKey, filepath.Ext(trustKeyPath)) | ||
if err != nil { | ||
return nil, fmt.Errorf("Error serializing key: %s", err) | ||
} | ||
if err := ioutils.AtomicWriteFile(trustKeyPath, encodedKey, os.FileMode(0600)); err != nil { | ||
return nil, fmt.Errorf("Error saving key file: %s", err) | ||
} | ||
} else if err != nil { | ||
return nil, fmt.Errorf("Error loading key file %s: %s", trustKeyPath, err) | ||
} | ||
return trustKey, nil | ||
} | ||
|
||
func serializePrivateKey(key libtrust.PrivateKey, ext string) (encoded []byte, err error) { | ||
if ext == ".json" || ext == ".jwk" { | ||
encoded, err = json.Marshal(key) | ||
if err != nil { | ||
return nil, fmt.Errorf("unable to encode private key JWK: %s", err) | ||
} | ||
} else { | ||
pemBlock, err := key.PEMBlock() | ||
if err != nil { | ||
return nil, fmt.Errorf("unable to encode private key PEM: %s", err) | ||
} | ||
encoded = pem.EncodeToMemory(pemBlock) | ||
} | ||
return | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,72 @@ | ||
package daemon | ||
|
||
import ( | ||
"io/ioutil" | ||
"os" | ||
"path/filepath" | ||
"testing" | ||
|
||
"github.com/docker/docker/internal/testutil" | ||
"github.com/gotestyourself/gotestyourself/fs" | ||
"github.com/stretchr/testify/assert" | ||
"github.com/stretchr/testify/require" | ||
) | ||
|
||
// LoadOrCreateTrustKey | ||
func TestLoadOrCreateTrustKeyInvalidKeyFile(t *testing.T) { | ||
tmpKeyFolderPath, err := ioutil.TempDir("", "api-trustkey-test") | ||
require.NoError(t, err) | ||
defer os.RemoveAll(tmpKeyFolderPath) | ||
|
||
tmpKeyFile, err := ioutil.TempFile(tmpKeyFolderPath, "keyfile") | ||
require.NoError(t, err) | ||
|
||
_, err = loadOrCreateTrustKey(tmpKeyFile.Name()) | ||
testutil.ErrorContains(t, err, "Error loading key file") | ||
} | ||
|
||
func TestLoadOrCreateTrustKeyCreateKeyWhenFileDoesNotExist(t *testing.T) { | ||
tmpKeyFolderPath := fs.NewDir(t, "api-trustkey-test") | ||
defer tmpKeyFolderPath.Remove() | ||
|
||
// Without the need to create the folder hierarchy | ||
tmpKeyFile := tmpKeyFolderPath.Join("keyfile") | ||
|
||
key, err := loadOrCreateTrustKey(tmpKeyFile) | ||
require.NoError(t, err) | ||
assert.NotNil(t, key) | ||
|
||
_, err = os.Stat(tmpKeyFile) | ||
require.NoError(t, err, "key file doesn't exist") | ||
} | ||
|
||
func TestLoadOrCreateTrustKeyCreateKeyWhenDirectoryDoesNotExist(t *testing.T) { | ||
tmpKeyFolderPath := fs.NewDir(t, "api-trustkey-test") | ||
defer tmpKeyFolderPath.Remove() | ||
tmpKeyFile := tmpKeyFolderPath.Join("folder/hierarchy/keyfile") | ||
|
||
key, err := loadOrCreateTrustKey(tmpKeyFile) | ||
require.NoError(t, err) | ||
assert.NotNil(t, key) | ||
|
||
_, err = os.Stat(tmpKeyFile) | ||
require.NoError(t, err, "key file doesn't exist") | ||
} | ||
|
||
func TestLoadOrCreateTrustKeyCreateKeyNoPath(t *testing.T) { | ||
defer os.Remove("keyfile") | ||
key, err := loadOrCreateTrustKey("keyfile") | ||
require.NoError(t, err) | ||
assert.NotNil(t, key) | ||
|
||
_, err = os.Stat("keyfile") | ||
require.NoError(t, err, "key file doesn't exist") | ||
} | ||
|
||
func TestLoadOrCreateTrustKeyLoadValidKey(t *testing.T) { | ||
tmpKeyFile := filepath.Join("testdata", "keyfile") | ||
key, err := loadOrCreateTrustKey(tmpKeyFile) | ||
require.NoError(t, err) | ||
expected := "AWX2:I27X:WQFX:IOMK:CNAK:O7PW:VYNB:ZLKC:CVAE:YJP2:SI4A:XXAY" | ||
assert.Contains(t, key.String(), expected) | ||
} |