Fix RSA fingerprint generation to use PKCS1 encoding and uppercase format
related #2
This commit is contained in:
parent
83df31ec80
commit
62b243c8e4
5 changed files with 8 additions and 8 deletions
|
@ -32,7 +32,7 @@ func TestTorObfs4BridgeLineDataSource(t *testing.T) {
|
|||
resource.TestCheckResourceAttrSet("data.tor_obfs4_bridge_line.test", "bridge_line"),
|
||||
|
||||
resource.TestMatchResourceAttr("data.tor_obfs4_bridge_line.test", "bridge_line",
|
||||
regexp.MustCompile(`^Bridge obfs4 192\.0\.2\.1:443 [0-9a-f]{40} cert=[A-Za-z0-9+/]+ iat-mode=[0-2]$`)),
|
||||
regexp.MustCompile(`^Bridge obfs4 192\.0\.2\.1:443 [0-9A-F]{40} cert=[A-Za-z0-9+/]+ iat-mode=[0-2]$`)),
|
||||
|
||||
// Check that input values are used correctly
|
||||
resource.TestCheckResourceAttrPair("data.tor_obfs4_bridge_line.test", "identity_fingerprint_sha1", "tor_relay_identity_rsa.test", "public_key_fingerprint_sha1"),
|
||||
|
|
|
@ -184,5 +184,5 @@ func (r *TorRelayIdentityEd25519Resource) encodePublicKeyPEM(publicKey ed25519.P
|
|||
func (r *TorRelayIdentityEd25519Resource) generateSha256Fingerprint(publicKey ed25519.PublicKey) string {
|
||||
publicKeyBytes, _ := x509.MarshalPKIXPublicKey(publicKey)
|
||||
sha256Sum := sha256.Sum256(publicKeyBytes)
|
||||
return fmt.Sprintf("%x", sha256Sum)
|
||||
return fmt.Sprintf("%X", sha256Sum)
|
||||
}
|
||||
|
|
|
@ -27,7 +27,7 @@ func TestAccTorRelayIdentityEd25519Resource(t *testing.T) {
|
|||
// Verify PEM format
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_ed25519.test", "private_key_pem", regexp.MustCompile(`^-----BEGIN PRIVATE KEY-----`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_ed25519.test", "public_key_pem", regexp.MustCompile(`^-----BEGIN PUBLIC KEY-----`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_ed25519.test", "public_key_fingerprint_sha256", regexp.MustCompile(`^[0-9a-f]{64}$`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_ed25519.test", "public_key_fingerprint_sha256", regexp.MustCompile(`^[0-9A-F]{64}$`)),
|
||||
),
|
||||
},
|
||||
},
|
||||
|
|
|
@ -201,8 +201,8 @@ func (r *TorRelayIdentityRsaResource) generateFingerprints(publicKey *rsa.Public
|
|||
sha1Sum := sha1.Sum(publicKeyBytes)
|
||||
sha256Sum := sha256.Sum256(publicKeyBytes)
|
||||
|
||||
sha1Fingerprint := fmt.Sprintf("%x", sha1Sum)
|
||||
sha256Fingerprint := fmt.Sprintf("%x", sha256Sum)
|
||||
sha1Fingerprint := fmt.Sprintf("%X", sha1Sum)
|
||||
sha256Fingerprint := fmt.Sprintf("%X", sha256Sum)
|
||||
|
||||
return sha1Fingerprint, sha256Fingerprint, nil
|
||||
}
|
||||
|
|
|
@ -30,8 +30,8 @@ func TestAccTorRelayIdentityRsaResource(t *testing.T) {
|
|||
// Verify PEM format
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_rsa.test", "private_key_pem", regexp.MustCompile(`^-----BEGIN RSA PRIVATE KEY-----`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_rsa.test", "public_key_pem", regexp.MustCompile(`^-----BEGIN PUBLIC KEY-----`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_rsa.test", "public_key_fingerprint_sha1", regexp.MustCompile(`^[0-9a-f]{40}$`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_rsa.test", "public_key_fingerprint_sha256", regexp.MustCompile(`^[0-9a-f]{64}$`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_rsa.test", "public_key_fingerprint_sha1", regexp.MustCompile(`^[0-9A-F]{40}$`)),
|
||||
resource.TestMatchResourceAttr("tor_relay_identity_rsa.test", "public_key_fingerprint_sha256", regexp.MustCompile(`^[0-9A-F]{64}$`)),
|
||||
),
|
||||
},
|
||||
},
|
||||
|
@ -55,7 +55,7 @@ x7BlUBTFnhCZP5nSbwECQGgUr7jW/xrwbkDAP3+ql6o0yyhLMtvIqAKk3fUWxPXO
|
|||
OhEqFiIYW5mI//JWsqSZZxy4nMqgejKkrRgOOQbL0NE=
|
||||
-----END RSA PRIVATE KEY-----`
|
||||
|
||||
expectedSha1Fingerprint := "da5cec632a9a544394403bd533e1a7bde2f26edd"
|
||||
expectedSha1Fingerprint := "DA5CEC632A9A544394403BD533E1A7BDE2F26EDD"
|
||||
|
||||
block, _ := pem.Decode([]byte(testRsaPrivateKeyPem))
|
||||
if block == nil {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue