mirror of
https://github.com/netbirdio/netbird.git
synced 2025-03-04 01:41:17 +01:00
* Add AES-GCM encryption Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com> * migrate legacy encrypted data to AES-GCM encryption Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com> * Refactor and use transaction when migrating data Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com> * Add events migration tests Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com> * fix lint Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com> * skip migrating record on error Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com> * Preallocate capacity for nonce to avoid allocations in Seal Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com> --------- Signed-off-by: bcmmbaga <bethuelmbaga12@gmail.com>
98 lines
2.0 KiB
Go
98 lines
2.0 KiB
Go
package sqlite
|
|
|
|
import (
|
|
"testing"
|
|
)
|
|
|
|
func TestGenerateKey(t *testing.T) {
|
|
testData := "exampl@netbird.io"
|
|
key, err := GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed to generate key: %s", err)
|
|
}
|
|
ee, err := NewFieldEncrypt(key)
|
|
if err != nil {
|
|
t.Fatalf("failed to init email encryption: %s", err)
|
|
}
|
|
|
|
encrypted, err := ee.Encrypt(testData)
|
|
if err != nil {
|
|
t.Fatalf("failed to encrypt data: %s", err)
|
|
}
|
|
|
|
if encrypted == "" {
|
|
t.Fatalf("invalid encrypted text")
|
|
}
|
|
|
|
decrypted, err := ee.Decrypt(encrypted)
|
|
if err != nil {
|
|
t.Fatalf("failed to decrypt data: %s", err)
|
|
}
|
|
|
|
if decrypted != testData {
|
|
t.Fatalf("decrypted data is not match with test data: %s, %s", testData, decrypted)
|
|
}
|
|
}
|
|
|
|
func TestGenerateKeyLegacy(t *testing.T) {
|
|
testData := "exampl@netbird.io"
|
|
key, err := GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed to generate key: %s", err)
|
|
}
|
|
ee, err := NewFieldEncrypt(key)
|
|
if err != nil {
|
|
t.Fatalf("failed to init email encryption: %s", err)
|
|
}
|
|
|
|
encrypted := ee.LegacyEncrypt(testData)
|
|
if encrypted == "" {
|
|
t.Fatalf("invalid encrypted text")
|
|
}
|
|
|
|
decrypted, err := ee.LegacyDecrypt(encrypted)
|
|
if err != nil {
|
|
t.Fatalf("failed to decrypt data: %s", err)
|
|
}
|
|
|
|
if decrypted != testData {
|
|
t.Fatalf("decrypted data is not match with test data: %s, %s", testData, decrypted)
|
|
}
|
|
}
|
|
|
|
func TestCorruptKey(t *testing.T) {
|
|
testData := "exampl@netbird.io"
|
|
key, err := GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed to generate key: %s", err)
|
|
}
|
|
ee, err := NewFieldEncrypt(key)
|
|
if err != nil {
|
|
t.Fatalf("failed to init email encryption: %s", err)
|
|
}
|
|
|
|
encrypted, err := ee.Encrypt(testData)
|
|
if err != nil {
|
|
t.Fatalf("failed to encrypt data: %s", err)
|
|
}
|
|
|
|
if encrypted == "" {
|
|
t.Fatalf("invalid encrypted text")
|
|
}
|
|
|
|
newKey, err := GenerateKey()
|
|
if err != nil {
|
|
t.Fatalf("failed to generate key: %s", err)
|
|
}
|
|
|
|
ee, err = NewFieldEncrypt(newKey)
|
|
if err != nil {
|
|
t.Fatalf("failed to init email encryption: %s", err)
|
|
}
|
|
|
|
res, _ := ee.Decrypt(encrypted)
|
|
if res == testData {
|
|
t.Fatalf("incorrect decryption, the result is: %s", res)
|
|
}
|
|
}
|