mirror of
https://github.com/fluencelabs/js-libp2p
synced 2025-03-30 14:21:04 +00:00
567 lines
22 KiB
TypeScript
567 lines
22 KiB
TypeScript
/* eslint max-nested-callbacks: ["error", 8] */
|
|
/* eslint-env mocha */
|
|
|
|
import { expect } from 'aegir/chai'
|
|
import { fromString as uint8ArrayFromString } from 'uint8arrays/from-string'
|
|
import { toString as uint8ArrayToString } from 'uint8arrays/to-string'
|
|
import { createNode } from '../utils/creators/peer.js'
|
|
import { Key } from 'interface-datastore/key'
|
|
import { MemoryDatastore } from 'datastore-core/memory'
|
|
import { KeyChain, KeyChainInit, KeyInfo } from '../../src/keychain/index.js'
|
|
import { pbkdf2 } from '@libp2p/crypto'
|
|
import { Components } from '@libp2p/components'
|
|
import type { Datastore } from 'interface-datastore'
|
|
import type { PeerId } from '@libp2p/interface-peer-id'
|
|
import { createFromPrivKey } from '@libp2p/peer-id-factory'
|
|
import { unmarshalPrivateKey } from '@libp2p/crypto/keys'
|
|
|
|
describe('keychain', () => {
|
|
const passPhrase = 'this is not a secure phrase'
|
|
const rsaKeyName = 'tajné jméno'
|
|
const renamedRsaKeyName = 'ชื่อลับ'
|
|
let rsaKeyInfo: KeyInfo
|
|
let emptyKeystore: KeyChain
|
|
let ks: KeyChain
|
|
let datastore1: Datastore, datastore2: Datastore
|
|
|
|
before(async () => {
|
|
datastore1 = new MemoryDatastore()
|
|
datastore2 = new MemoryDatastore()
|
|
|
|
ks = new KeyChain(new Components({ datastore: datastore2 }), { pass: passPhrase })
|
|
emptyKeystore = new KeyChain(new Components({ datastore: datastore1 }), { pass: passPhrase })
|
|
|
|
await datastore1.open()
|
|
await datastore2.open()
|
|
})
|
|
|
|
after(async () => {
|
|
await datastore2.close()
|
|
await datastore2.close()
|
|
})
|
|
|
|
it('can start without a password', () => {
|
|
expect(() => new KeyChain(new Components({ datastore: datastore2 }), {})).to.not.throw()
|
|
})
|
|
|
|
it('needs a NIST SP 800-132 non-weak pass phrase', () => {
|
|
expect(() => new KeyChain(new Components({ datastore: datastore2 }), { pass: '< 20 character' })).to.throw()
|
|
})
|
|
|
|
it('has default options', () => {
|
|
expect(KeyChain.options).to.exist()
|
|
})
|
|
|
|
it('supports supported hashing alorithms', () => {
|
|
const ok = new KeyChain(new Components({ datastore: datastore2 }), { pass: passPhrase, dek: { hash: 'sha2-256', salt: 'salt-salt-salt-salt', iterationCount: 1000, keyLength: 14 } })
|
|
expect(ok).to.exist()
|
|
})
|
|
|
|
it('does not support unsupported hashing alorithms', () => {
|
|
expect(() => new KeyChain(new Components({ datastore: datastore2 }), { pass: passPhrase, dek: { hash: 'my-hash', salt: 'salt-salt-salt-salt', iterationCount: 1000, keyLength: 14 } })).to.throw()
|
|
})
|
|
|
|
it('can list keys without a password', async () => {
|
|
const keychain = new KeyChain(new Components({ datastore: datastore2 }), {})
|
|
|
|
expect(await keychain.listKeys()).to.have.lengthOf(0)
|
|
})
|
|
|
|
it('can find a key without a password', async () => {
|
|
const keychain = new KeyChain(new Components({ datastore: datastore2 }), {})
|
|
const keychainWithPassword = new KeyChain(new Components({ datastore: datastore2 }), { pass: `hello-${Date.now()}-${Date.now()}` })
|
|
const name = `key-${Math.random()}`
|
|
|
|
const { id } = await keychainWithPassword.createKey(name, 'Ed25519')
|
|
|
|
await expect(keychain.findKeyById(id)).to.eventually.be.ok()
|
|
})
|
|
|
|
it('can remove a key without a password', async () => {
|
|
const keychainWithoutPassword = new KeyChain(new Components({ datastore: datastore2 }), {})
|
|
const keychainWithPassword = new KeyChain(new Components({ datastore: datastore2 }), { pass: `hello-${Date.now()}-${Date.now()}` })
|
|
const name = `key-${Math.random()}`
|
|
|
|
expect(await keychainWithPassword.createKey(name, 'Ed25519')).to.have.property('name', name)
|
|
expect(await keychainWithoutPassword.findKeyByName(name)).to.have.property('name', name)
|
|
await keychainWithoutPassword.removeKey(name)
|
|
await expect(keychainWithoutPassword.findKeyByName(name)).to.be.rejectedWith(/does not exist/)
|
|
})
|
|
|
|
it('requires a name to create a password', async () => {
|
|
const keychain = new KeyChain(new Components({ datastore: datastore2 }), {})
|
|
|
|
// @ts-expect-error invalid parameters
|
|
await expect(keychain.createKey(undefined, 'derp')).to.be.rejected()
|
|
})
|
|
|
|
it('can generate options', () => {
|
|
const options = KeyChain.generateOptions()
|
|
options.pass = passPhrase
|
|
const chain = new KeyChain(new Components({ datastore: datastore2 }), options)
|
|
expect(chain).to.exist()
|
|
})
|
|
|
|
describe('key name', () => {
|
|
it('is a valid filename and non-ASCII', async () => {
|
|
const errors = await Promise.all([
|
|
ks.removeKey('../../nasty').catch(err => err),
|
|
ks.removeKey('').catch(err => err),
|
|
ks.removeKey(' ').catch(err => err),
|
|
// @ts-expect-error invalid parameters
|
|
ks.removeKey(null).catch(err => err),
|
|
// @ts-expect-error invalid parameters
|
|
ks.removeKey(undefined).catch(err => err)
|
|
])
|
|
|
|
expect(errors).to.have.length(5)
|
|
errors.forEach(error => {
|
|
expect(error).to.have.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('key', () => {
|
|
it('can be an RSA key', async () => {
|
|
rsaKeyInfo = await ks.createKey(rsaKeyName, 'RSA', 2048)
|
|
expect(rsaKeyInfo).to.exist()
|
|
expect(rsaKeyInfo).to.have.property('name', rsaKeyName)
|
|
expect(rsaKeyInfo).to.have.property('id')
|
|
})
|
|
|
|
it('is encrypted PEM encoded PKCS #8', async () => {
|
|
const pem = await ks.getPrivateKey(rsaKeyName)
|
|
return expect(pem).to.startsWith('-----BEGIN ENCRYPTED PRIVATE KEY-----')
|
|
})
|
|
|
|
it('throws if an invalid private key name is given', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.getPrivateKey(undefined)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
|
|
it('throws if a private key cant be found', async () => {
|
|
await expect(ks.getPrivateKey('not real')).to.eventually.be.rejected.with.property('code', 'ERR_KEY_NOT_FOUND')
|
|
})
|
|
|
|
it('does not overwrite existing key', async () => {
|
|
await expect(ks.createKey(rsaKeyName, 'RSA', 2048)).to.eventually.be.rejected.with.property('code', 'ERR_KEY_ALREADY_EXISTS')
|
|
})
|
|
|
|
it('cannot create the "self" key', async () => {
|
|
await expect(ks.createKey('self', 'RSA', 2048)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
|
|
it('should validate name is string', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.createKey(5, 'rsa', 2048)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
|
|
it('should validate type is string', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.createKey(`TEST-${Date.now()}`, null, 2048)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_TYPE')
|
|
})
|
|
|
|
it('should validate size is integer', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.createKey(`TEST-${Date.now()}`, 'RSA', 'string')).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_SIZE')
|
|
})
|
|
|
|
describe('implements NIST SP 800-131A', () => {
|
|
it('disallows RSA length < 2048', async () => {
|
|
await expect(ks.createKey('bad-nist-rsa', 'RSA', 1024)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_SIZE')
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('Ed25519 keys', () => {
|
|
const keyName = 'my custom key'
|
|
it('can be an Ed25519 key', async () => {
|
|
const keyInfo = await ks.createKey(keyName, 'Ed25519')
|
|
expect(keyInfo).to.exist()
|
|
expect(keyInfo).to.have.property('name', keyName)
|
|
expect(keyInfo).to.have.property('id')
|
|
})
|
|
|
|
it('does not overwrite existing key', async () => {
|
|
await expect(ks.createKey(keyName, 'Ed25519')).to.eventually.be.rejected.with.property('code', 'ERR_KEY_ALREADY_EXISTS')
|
|
})
|
|
|
|
it('can export/import a key', async () => {
|
|
const keyName = 'a new key'
|
|
const password = 'my sneaky password'
|
|
const keyInfo = await ks.createKey(keyName, 'Ed25519')
|
|
const exportedKey = await ks.exportKey(keyName, password)
|
|
// remove it so we can import it
|
|
await ks.removeKey(keyName)
|
|
const importedKey = await ks.importKey(keyName, exportedKey, password)
|
|
expect(importedKey.id).to.eql(keyInfo.id)
|
|
})
|
|
|
|
it('cannot create the "self" key', async () => {
|
|
await expect(ks.createKey('self', 'Ed25519')).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
})
|
|
|
|
describe('query', () => {
|
|
it('finds all existing keys', async () => {
|
|
const keys = await ks.listKeys()
|
|
expect(keys).to.exist()
|
|
const mykey = keys.find((k) => k.name.normalize() === rsaKeyName.normalize())
|
|
expect(mykey).to.exist()
|
|
})
|
|
|
|
it('finds a key by name', async () => {
|
|
const key = await ks.findKeyByName(rsaKeyName)
|
|
expect(key).to.exist()
|
|
expect(key).to.deep.equal(rsaKeyInfo)
|
|
})
|
|
|
|
it('finds a key by id', async () => {
|
|
const key = await ks.findKeyById(rsaKeyInfo.id)
|
|
expect(key).to.exist()
|
|
expect(key).to.deep.equal(rsaKeyInfo)
|
|
})
|
|
|
|
it('returns the key\'s name and id', async () => {
|
|
const keys = await ks.listKeys()
|
|
expect(keys).to.exist()
|
|
keys.forEach((key) => {
|
|
expect(key).to.have.property('name')
|
|
expect(key).to.have.property('id')
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('CMS protected data', () => {
|
|
const plainData = uint8ArrayFromString('This is a message from Alice to Bob')
|
|
let cms: Uint8Array
|
|
|
|
it('service is available', () => {
|
|
expect(ks).to.have.property('cms')
|
|
})
|
|
|
|
it('requires a key', async () => {
|
|
await expect(ks.cms.encrypt('no-key', plainData)).to.eventually.be.rejected.with.property('code', 'ERR_KEY_NOT_FOUND')
|
|
})
|
|
|
|
it('requires plain data as a Uint8Array', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.cms.encrypt(rsaKeyName, 'plain data')).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_PARAMETERS')
|
|
})
|
|
|
|
it('encrypts', async () => {
|
|
cms = await ks.cms.encrypt(rsaKeyName, plainData)
|
|
expect(cms).to.exist()
|
|
expect(cms).to.be.instanceOf(Uint8Array)
|
|
})
|
|
|
|
it('is a PKCS #7 message', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.cms.decrypt('not CMS')).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_PARAMETERS')
|
|
})
|
|
|
|
it('is a PKCS #7 binary message', async () => {
|
|
await expect(ks.cms.decrypt(plainData)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_CMS')
|
|
})
|
|
|
|
it('cannot be read without the key', async () => {
|
|
await expect(emptyKeystore.cms.decrypt(cms)).to.eventually.be.rejected.with.property('code', 'ERR_MISSING_KEYS')
|
|
})
|
|
|
|
it('can be read with the key', async () => {
|
|
const plain = await ks.cms.decrypt(cms)
|
|
expect(plain).to.exist()
|
|
expect(uint8ArrayToString(plain)).to.equal(uint8ArrayToString(plainData))
|
|
})
|
|
})
|
|
|
|
describe('exported key', () => {
|
|
let pemKey: string
|
|
|
|
it('requires the password', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.exportKey(rsaKeyName)).to.eventually.be.rejected.with.property('code', 'ERR_PASSWORD_REQUIRED')
|
|
})
|
|
|
|
it('requires the key name', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.exportKey(undefined, 'password')).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
|
|
it('is a PKCS #8 encrypted pem', async () => {
|
|
pemKey = await ks.exportKey(rsaKeyName, 'password')
|
|
expect(pemKey).to.startsWith('-----BEGIN ENCRYPTED PRIVATE KEY-----')
|
|
})
|
|
|
|
it('can be imported', async () => {
|
|
const key = await ks.importKey('imported-key', pemKey, 'password')
|
|
expect(key.name).to.equal('imported-key')
|
|
expect(key.id).to.equal(rsaKeyInfo.id)
|
|
})
|
|
|
|
it('requires the pem', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.importKey('imported-key', undefined, 'password')).to.eventually.be.rejected.with.property('code', 'ERR_PEM_REQUIRED')
|
|
})
|
|
|
|
it('cannot be imported as an existing key name', async () => {
|
|
await expect(ks.importKey(rsaKeyName, pemKey, 'password')).to.eventually.be.rejected.with.property('code', 'ERR_KEY_ALREADY_EXISTS')
|
|
})
|
|
|
|
it('cannot be imported with the wrong password', async () => {
|
|
await expect(ks.importKey('a-new-name-for-import', pemKey, 'not the password')).to.eventually.be.rejected.with.property('code', 'ERR_CANNOT_READ_KEY')
|
|
})
|
|
})
|
|
|
|
describe('peer id', () => {
|
|
const alicePrivKey = 'CAASpgkwggSiAgEAAoIBAQC2SKo/HMFZeBml1AF3XijzrxrfQXdJzjePBZAbdxqKR1Mc6juRHXij6HXYPjlAk01BhF1S3Ll4Lwi0cAHhggf457sMg55UWyeGKeUv0ucgvCpBwlR5cQ020i0MgzjPWOLWq1rtvSbNcAi2ZEVn6+Q2EcHo3wUvWRtLeKz+DZSZfw2PEDC+DGPJPl7f8g7zl56YymmmzH9liZLNrzg/qidokUv5u1pdGrcpLuPNeTODk0cqKB+OUbuKj9GShYECCEjaybJDl9276oalL9ghBtSeEv20kugatTvYy590wFlJkkvyl+nPxIH0EEYMKK9XRWlu9XYnoSfboiwcv8M3SlsjAgMBAAECggEAZtju/bcKvKFPz0mkHiaJcpycy9STKphorpCT83srBVQi59CdFU6Mj+aL/xt0kCPMVigJw8P3/YCEJ9J+rS8BsoWE+xWUEsJvtXoT7vzPHaAtM3ci1HZd302Mz1+GgS8Epdx+7F5p80XAFLDUnELzOzKftvWGZmWfSeDnslwVONkL/1VAzwKy7Ce6hk4SxRE7l2NE2OklSHOzCGU1f78ZzVYKSnS5Ag9YrGjOAmTOXDbKNKN/qIorAQ1bovzGoCwx3iGIatQKFOxyVCyO1PsJYT7JO+kZbhBWRRE+L7l+ppPER9bdLFxs1t5CrKc078h+wuUr05S1P1JjXk68pk3+kQKBgQDeK8AR11373Mzib6uzpjGzgNRMzdYNuExWjxyxAzz53NAR7zrPHvXvfIqjDScLJ4NcRO2TddhXAfZoOPVH5k4PJHKLBPKuXZpWlookCAyENY7+Pd55S8r+a+MusrMagYNljb5WbVTgN8cgdpim9lbbIFlpN6SZaVjLQL3J8TWH6wKBgQDSChzItkqWX11CNstJ9zJyUE20I7LrpyBJNgG1gtvz3ZMUQCn3PxxHtQzN9n1P0mSSYs+jBKPuoSyYLt1wwe10/lpgL4rkKWU3/m1Myt0tveJ9WcqHh6tzcAbb/fXpUFT/o4SWDimWkPkuCb+8j//2yiXk0a/T2f36zKMuZvujqQKBgC6B7BAQDG2H2B/ijofp12ejJU36nL98gAZyqOfpLJ+FeMz4TlBDQ+phIMhnHXA5UkdDapQ+zA3SrFk+6yGk9Vw4Hf46B+82SvOrSbmnMa+PYqKYIvUzR4gg34rL/7AhwnbEyD5hXq4dHwMNsIDq+l2elPjwm/U9V0gdAl2+r50HAoGALtsKqMvhv8HucAMBPrLikhXP/8um8mMKFMrzfqZ+otxfHzlhI0L08Bo3jQrb0Z7ByNY6M8epOmbCKADsbWcVre/AAY0ZkuSZK/CaOXNX/AhMKmKJh8qAOPRY02LIJRBCpfS4czEdnfUhYV/TYiFNnKRj57PPYZdTzUsxa/yVTmECgYBr7slQEjb5Onn5mZnGDh+72BxLNdgwBkhO0OCdpdISqk0F0Pxby22DFOKXZEpiyI9XYP1C8wPiJsShGm2yEwBPWXnrrZNWczaVuCbXHrZkWQogBDG3HGXNdU4MAWCyiYlyinIBpPpoAJZSzpGLmWbMWh28+RJS6AQX6KHrK1o2uw=='
|
|
let alice: PeerId
|
|
|
|
before(async function () {
|
|
const encoded = uint8ArrayFromString(alicePrivKey, 'base64pad')
|
|
const privateKey = await unmarshalPrivateKey(encoded)
|
|
alice = await createFromPrivKey(privateKey)
|
|
})
|
|
|
|
it('private key can be imported', async () => {
|
|
const key = await ks.importPeer('alice', alice)
|
|
expect(key.name).to.equal('alice')
|
|
expect(key.id).to.equal(alice.toString())
|
|
})
|
|
|
|
it('private key import requires a valid name', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.importPeer(undefined, alice)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
|
|
it('private key import requires the peer', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.importPeer('alice')).to.eventually.be.rejected.with.property('code', 'ERR_MISSING_PRIVATE_KEY')
|
|
})
|
|
|
|
it('key id exists', async () => {
|
|
const key = await ks.findKeyById(alice.toString())
|
|
expect(key).to.exist()
|
|
expect(key).to.have.property('name', 'alice')
|
|
expect(key).to.have.property('id', alice.toString())
|
|
})
|
|
|
|
it('key name exists', async () => {
|
|
const key = await ks.findKeyByName('alice')
|
|
expect(key).to.exist()
|
|
expect(key).to.have.property('name', 'alice')
|
|
expect(key).to.have.property('id', alice.toString())
|
|
})
|
|
})
|
|
|
|
describe('rename', () => {
|
|
it('requires an existing key name', async () => {
|
|
await expect(ks.renameKey('not-there', renamedRsaKeyName)).to.eventually.be.rejected.with.property('code', 'ERR_NOT_FOUND')
|
|
})
|
|
|
|
it('requires a valid new key name', async () => {
|
|
await expect(ks.renameKey(rsaKeyName, '..\not-valid')).to.eventually.be.rejected.with.property('code', 'ERR_NEW_KEY_NAME_INVALID')
|
|
})
|
|
|
|
it('does not overwrite existing key', async () => {
|
|
await expect(ks.renameKey(rsaKeyName, rsaKeyName)).to.eventually.be.rejected.with.property('code', 'ERR_KEY_ALREADY_EXISTS')
|
|
})
|
|
|
|
it('cannot create the "self" key', async () => {
|
|
await expect(ks.renameKey(rsaKeyName, 'self')).to.eventually.be.rejected.with.property('code', 'ERR_NEW_KEY_NAME_INVALID')
|
|
})
|
|
|
|
it('removes the existing key name', async () => {
|
|
const key = await ks.renameKey(rsaKeyName, renamedRsaKeyName)
|
|
expect(key).to.exist()
|
|
expect(key).to.have.property('name', renamedRsaKeyName)
|
|
expect(key).to.have.property('id', rsaKeyInfo.id)
|
|
// Try to find the changed key
|
|
await expect(ks.findKeyByName(rsaKeyName)).to.eventually.be.rejected()
|
|
})
|
|
|
|
it('creates the new key name', async () => {
|
|
const key = await ks.findKeyByName(renamedRsaKeyName)
|
|
expect(key).to.exist()
|
|
expect(key).to.have.property('name', renamedRsaKeyName)
|
|
})
|
|
|
|
it('does not change the key ID', async () => {
|
|
const key = await ks.findKeyByName(renamedRsaKeyName)
|
|
expect(key).to.exist()
|
|
expect(key).to.have.property('name', renamedRsaKeyName)
|
|
expect(key).to.have.property('id', rsaKeyInfo.id)
|
|
})
|
|
|
|
it('throws with invalid key names', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(ks.findKeyByName(undefined)).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
})
|
|
|
|
describe('key removal', () => {
|
|
it('cannot remove the "self" key', async () => {
|
|
await expect(ks.removeKey('self')).to.eventually.be.rejected.with.property('code', 'ERR_INVALID_KEY_NAME')
|
|
})
|
|
|
|
it('cannot remove an unknown key', async () => {
|
|
await expect(ks.removeKey('not-there')).to.eventually.be.rejected.with.property('code', 'ERR_KEY_NOT_FOUND')
|
|
})
|
|
|
|
it('can remove a known key', async () => {
|
|
const key = await ks.removeKey(renamedRsaKeyName)
|
|
expect(key).to.exist()
|
|
expect(key).to.have.property('name', renamedRsaKeyName)
|
|
expect(key).to.have.property('id', rsaKeyInfo.id)
|
|
})
|
|
})
|
|
|
|
describe('rotate keychain passphrase', () => {
|
|
let oldPass: string
|
|
let kc: KeyChain
|
|
let options: KeyChainInit
|
|
let ds: Datastore
|
|
before(async () => {
|
|
ds = new MemoryDatastore()
|
|
oldPass = `hello-${Date.now()}-${Date.now()}`
|
|
options = {
|
|
pass: oldPass,
|
|
dek: {
|
|
salt: '3Nd/Ya4ENB3bcByNKptb4IR',
|
|
iterationCount: 10000,
|
|
keyLength: 64,
|
|
hash: 'sha2-512'
|
|
}
|
|
}
|
|
kc = new KeyChain(new Components({ datastore: ds }), options)
|
|
await ds.open()
|
|
})
|
|
|
|
it('should validate newPass is a string', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(kc.rotateKeychainPass(oldPass, 1234567890)).to.eventually.be.rejected()
|
|
})
|
|
|
|
it('should validate oldPass is a string', async () => {
|
|
// @ts-expect-error invalid parameters
|
|
await expect(kc.rotateKeychainPass(1234, 'newInsecurePassword1')).to.eventually.be.rejected()
|
|
})
|
|
|
|
it('should validate newPass is at least 20 characters', async () => {
|
|
try {
|
|
await kc.rotateKeychainPass(oldPass, 'not20Chars')
|
|
} catch (err: any) {
|
|
expect(err).to.exist()
|
|
}
|
|
})
|
|
|
|
it('can rotate keychain passphrase', async () => {
|
|
await kc.createKey('keyCreatedWithOldPassword', 'RSA', 2048)
|
|
await kc.rotateKeychainPass(oldPass, 'newInsecurePassphrase')
|
|
|
|
// Get Key PEM from datastore
|
|
const dsname = new Key('/pkcs8/' + 'keyCreatedWithOldPassword')
|
|
const res = await ds.get(dsname)
|
|
const pem = uint8ArrayToString(res)
|
|
|
|
const oldDek = options.pass != null
|
|
? pbkdf2(
|
|
options.pass,
|
|
options.dek?.salt ?? 'salt',
|
|
options.dek?.iterationCount ?? 0,
|
|
options.dek?.keyLength ?? 0,
|
|
options.dek?.hash ?? 'sha2-256'
|
|
)
|
|
: ''
|
|
|
|
const newDek = pbkdf2(
|
|
'newInsecurePassphrase',
|
|
options.dek?.salt ?? 'salt',
|
|
options.dek?.iterationCount ?? 0,
|
|
options.dek?.keyLength ?? 0,
|
|
options.dek?.hash ?? 'sha2-256'
|
|
)
|
|
|
|
// Dek with old password should not work:
|
|
await expect(kc.importKey('keyWhosePassChanged', pem, oldDek))
|
|
.to.eventually.be.rejected()
|
|
// Dek with new password should work:
|
|
await expect(kc.importKey('keyWhosePasswordChanged', pem, newDek))
|
|
.to.eventually.have.property('name', 'keyWhosePasswordChanged')
|
|
}).timeout(10000)
|
|
})
|
|
})
|
|
|
|
describe('libp2p.keychain', () => {
|
|
it.skip('needs a passphrase to be used, otherwise throws an error', async () => {
|
|
const libp2p = await createNode({
|
|
started: false
|
|
})
|
|
|
|
await expect(libp2p.keychain.createKey('keyName', 'RSA', 2048)).to.be.rejected()
|
|
})
|
|
|
|
it('can be used when a passphrase is provided', async () => {
|
|
const libp2p = await createNode({
|
|
started: false,
|
|
config: {
|
|
datastore: new MemoryDatastore(),
|
|
keychain: {
|
|
pass: '12345678901234567890'
|
|
}
|
|
}
|
|
})
|
|
|
|
await libp2p.loadKeychain()
|
|
|
|
const kInfo = await libp2p.keychain.createKey('keyName', 'Ed25519')
|
|
expect(kInfo).to.exist()
|
|
})
|
|
|
|
it('does not require a keychain passphrase', async () => {
|
|
const libp2p = await createNode({
|
|
started: false,
|
|
config: {
|
|
datastore: new MemoryDatastore()
|
|
}
|
|
})
|
|
|
|
await libp2p.loadKeychain()
|
|
|
|
const kInfo = await libp2p.keychain.createKey('keyName', 'Ed25519')
|
|
expect(kInfo).to.exist()
|
|
})
|
|
|
|
it('can reload keys', async () => {
|
|
const datastore = new MemoryDatastore()
|
|
const libp2p = await createNode({
|
|
started: false,
|
|
config: {
|
|
datastore,
|
|
keychain: {
|
|
pass: '12345678901234567890'
|
|
}
|
|
}
|
|
})
|
|
await libp2p.loadKeychain()
|
|
|
|
const kInfo = await libp2p.keychain.createKey('keyName', 'Ed25519')
|
|
expect(kInfo).to.exist()
|
|
|
|
const libp2p2 = await createNode({
|
|
started: false,
|
|
config: {
|
|
datastore,
|
|
keychain: {
|
|
pass: '12345678901234567890'
|
|
}
|
|
}
|
|
})
|
|
|
|
await libp2p2.loadKeychain()
|
|
const key = await libp2p2.keychain.findKeyByName('keyName')
|
|
|
|
expect(key).to.exist()
|
|
})
|
|
})
|