本文整理汇总了Golang中github.com/yahoo/coname.VerifyLookup函数的典型用法代码示例。如果您正苦于以下问题:Golang VerifyLookup函数的具体用法?Golang VerifyLookup怎么用?Golang VerifyLookup使用的例子?那么恭喜您, 这里精选的函数代码示例或许可以为您提供帮助。
在下文中一共展示了VerifyLookup函数的7个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于我们的系统推荐出更棒的Golang代码示例。
示例1: ServeHTTP
func (h *HKPFront) ServeHTTP(w http.ResponseWriter, r *http.Request) {
q := r.URL.Query()
if r.Method != "GET" || r.URL.Path != "/pks/lookup" || len(q["op"]) != 1 || q["op"][0] != "get" || len(q["search"]) != 1 {
http.Error(w, `this server only supports queries of the form "/pks/lookup?op=get&search=<EMAIL>"`, 501)
return
}
user := q["search"][0]
ctx := context.Background()
var requiredSignatures *proto.QuorumExpr
if !h.InsecureSkipVerify {
realm, err := coname.GetRealmByUser(h.Config, user)
if err != nil {
http.Error(w, err.Error(), 400)
return
}
requiredSignatures = realm.VerificationPolicy.Quorum
}
pf, err := h.Lookup(ctx, &proto.LookupRequest{UserId: user, QuorumRequirement: requiredSignatures})
if err != nil {
http.Error(w, err.Error(), 503)
return
}
if !h.InsecureSkipVerify {
coname.VerifyLookup(h.Config, user, pf, h.Clk.Now())
}
if pf.Profile.Keys == nil {
http.Error(w, `No results found: No keys found: unknown email`, 404)
return
}
pgpKey, present := pf.Profile.Keys["pgp"]
if !present {
http.Error(w, `No results found: No keys found: the email is known to the keyserver, but the profile does not include an OpenPGP key`, 404)
return
}
if _, mr := q["mr"]; mr {
w.Header().Set("Content-Type", "application/pgp-keys")
}
aw, err := armor.Encode(w, "PGP PUBLIC KEY BLOCK", nil)
if err != nil {
http.Error(w, err.Error(), 500)
return
}
_, err = aw.Write(pgpKey)
if err != nil {
http.Error(w, err.Error(), 500)
return
}
if err := aw.Close(); err != nil {
http.Error(w, err.Error(), 500)
return
}
}
开发者ID:postfix,项目名称:coname,代码行数:58,代码来源:hkpfront.go
示例2: TestKeyserverRoundtrip
func TestKeyserverRoundtrip(t *testing.T) {
nReplicas := 3
cfgs, gks, ck, clientConfig, _, caPool, _, teardown := setupKeyservers(t, nReplicas)
defer teardown()
logs, dbs, clks, _, teardown2 := setupRaftLogCluster(t, nReplicas, 0)
defer teardown2()
kss := []*Keyserver{}
for i := range cfgs {
ks, err := Open(cfgs[i], dbs[i], logs[i], clientConfig.Realms[0].VerificationPolicy, clks[i], gks[i], nil)
if err != nil {
t.Fatal(err)
}
ks.insecureSkipEmailProof = true
ks.Start()
defer ks.Stop()
kss = append(kss, ks)
}
stop := stoppableSyncedClocks(clks)
defer close(stop)
waitForFirstEpoch(kss[0], clientConfig.Realms[0].VerificationPolicy.GetQuorum())
clientTLS, err := clientConfig.Realms[0].ClientTLS.Config(ck)
if err != nil {
t.Fatal(err)
}
_, _, _, profile := doRegister(t, kss[0], clientConfig, clientTLS, caPool, clks[0].Now(), alice, 0, proto.Profile{
Nonce: []byte("noncenoncenonceNONCE"),
Keys: map[string][]byte{"abc": []byte{1, 2, 3}, "xyz": []byte("TEST 456")},
})
conn, err := grpc.Dial(kss[0].publicListen.Addr().String(), grpc.WithTransportCredentials(credentials.NewTLS(clientTLS)))
if err != nil {
t.Fatal(err)
}
c := proto.NewE2EKSPublicClient(conn)
proof, err := c.Lookup(context.Background(), &proto.LookupRequest{
UserId: alice,
QuorumRequirement: clientConfig.Realms[0].VerificationPolicy.GetQuorum(),
})
if err != nil {
t.Fatal(err)
}
if got, want := proof.Profile.Encoding, profile.Encoding; !bytes.Equal(got, want) {
t.Errorf("profile didn't roundtrip: %x != %x", got, want)
}
_, err = coname.VerifyLookup(clientConfig, alice, proof, clks[0].Now())
if err != nil {
t.Fatal(err)
}
}
开发者ID:Liamsi,项目名称:coname,代码行数:54,代码来源:server_test.go
示例3: TestKeyserverAbsentLookup
func TestKeyserverAbsentLookup(t *testing.T) {
dieOnCtrlC()
pprof()
nReplicas := 3
cfgs, gks, ck, clientConfig, _, _, _, teardown := setupKeyservers(t, nReplicas)
defer teardown()
logs, dbs, clks, _, teardown2 := setupRaftLogCluster(t, nReplicas, 0)
defer teardown2()
kss := []*Keyserver{}
for i := range cfgs {
ks, err := Open(cfgs[i], dbs[i], logs[i], clientConfig.Realms[0].VerificationPolicy, clks[i], gks[i], nil)
if err != nil {
t.Fatal(err)
}
ks.Start()
defer ks.Stop()
kss = append(kss, ks)
}
stop := stoppableSyncedClocks(clks)
defer close(stop)
waitForFirstEpoch(kss[0], clientConfig.Realms[0].VerificationPolicy.GetQuorum())
clientTLS, err := clientConfig.Realms[0].ClientTLS.Config(ck)
if err != nil {
t.Fatal(err)
}
conn, err := grpc.Dial(kss[0].publicListen.Addr().String(), grpc.WithTransportCredentials(credentials.NewTLS(clientTLS)))
if err != nil {
t.Fatal(err)
}
c := proto.NewE2EKSPublicClient(conn)
proof, err := c.Lookup(context.Background(), &proto.LookupRequest{
UserId: alice,
QuorumRequirement: clientConfig.Realms[0].VerificationPolicy.GetQuorum(),
})
if err != nil {
t.Fatal(err)
}
keys, err := coname.VerifyLookup(clientConfig, alice, proof, clks[0].Now())
if err != nil {
t.Fatal(err)
}
if keys != nil {
t.Fatalf("Got back keys for a nonexistent profile")
}
}
开发者ID:Liamsi,项目名称:coname,代码行数:50,代码来源:server_test.go
示例4: TestKeyserverLookupSpecificEpoch
func TestKeyserverLookupSpecificEpoch(t *testing.T) {
dieOnCtrlC()
kss, caPool, clks, verifiers, ck, clientConfig, teardown := setupRealm(t, 3, 3)
defer teardown()
stop := stoppableSyncedClocks(clks)
defer close(stop)
waitForFirstEpoch(kss[0], clientConfig.Realms[0].VerificationPolicy.GetQuorum())
clientTLS, err := clientConfig.Realms[0].ClientTLS.Config(ck)
if err != nil {
t.Fatal(err)
}
_, _, _, profile := doRegister(t, kss[0], clientConfig, clientTLS, caPool, clks[0].Now(), alice, 0, proto.Profile{
Nonce: []byte("noncenoncenonceNONCE"),
Keys: map[string][]byte{"abc": []byte{1, 2, 3}, "xyz": []byte("TEST 456")},
})
epoch, err := getLatestEpoch(kss[0], clientConfig.Realms[0].VerificationPolicy.GetQuorum())
if err != nil {
t.Fatal(err)
}
conn, err := grpc.Dial(kss[0].publicListen.Addr().String(), grpc.WithTransportCredentials(credentials.NewTLS(clientTLS)))
if err != nil {
t.Fatal(err)
}
c := proto.NewE2EKSPublicClient(conn)
proof, err := c.Lookup(context.Background(), &proto.LookupRequest{
Epoch: epoch,
UserId: alice,
QuorumRequirement: clientConfig.Realms[0].VerificationPolicy.GetQuorum(),
})
if err != nil {
t.Fatal(err)
}
if got, want := proof.Profile.Encoding, profile.Encoding; !bytes.Equal(got, want) {
t.Errorf("profile didn't roundtrip: %x != %x", got, want)
}
if got, want := len(proof.Ratifications), majority(len(kss))+len(verifiers); got < want {
t.Errorf("expected at least %d sehs, got %d", got, want)
}
_, err = coname.VerifyLookup(clientConfig, alice, proof, clks[0].Now())
if err != nil {
t.Fatal(err)
}
}
开发者ID:yahoo,项目名称:coname,代码行数:48,代码来源:server_test.go
示例5: doUpdate
func doUpdate(
t *testing.T, ks *Keyserver, clientConfig *proto.Config, clientTLS *tls.Config, caPool *x509.CertPool, now time.Time,
name string, sk *[ed25519.PrivateKeySize]byte, pk *proto.PublicKey, version uint64, profileContents proto.Profile,
) (*proto.EncodedEntry, *proto.EncodedProfile) {
conn, err := grpc.Dial(ks.publicListen.Addr().String(), grpc.WithTransportCredentials(credentials.NewTLS(clientTLS)))
if err != nil {
t.Fatal(err)
}
publicC := proto.NewE2EKSPublicClient(conn)
// First, do a lookup to retrieve the index
lookup, err := publicC.Lookup(context.Background(), &proto.LookupRequest{
UserId: name,
// We don't care about any signatures here; the server just needs to tell us the index.
QuorumRequirement: &proto.QuorumExpr{
Threshold: 0,
Candidates: []uint64{},
Subexpressions: []*proto.QuorumExpr{},
},
})
if err != nil {
t.Fatal(err)
}
index := lookup.Index
// Do the update
var keyidBytes [8]byte
sha3.ShakeSum256(keyidBytes[:], proto.MustMarshal(pk))
keyid := binary.BigEndian.Uint64(keyidBytes[:8])
profile := proto.EncodedProfile{
Profile: profileContents,
}
profile.UpdateEncoding()
var commitment [64]byte
sha3.ShakeSum256(commitment[:], profile.Encoding)
entry := proto.EncodedEntry{
Entry: proto.Entry{
Index: index,
Version: version,
UpdatePolicy: &proto.AuthorizationPolicy{
PublicKeys: map[uint64]*proto.PublicKey{keyid: pk},
PolicyType: &proto.AuthorizationPolicy_Quorum{Quorum: &proto.QuorumExpr{
Threshold: 1,
Candidates: []uint64{keyid},
Subexpressions: []*proto.QuorumExpr{},
},
}},
ProfileCommitment: commitment[:],
},
}
entry.UpdateEncoding()
proof, err := publicC.Update(context.Background(), &proto.UpdateRequest{
Update: &proto.SignedEntryUpdate{
NewEntry: entry,
Signatures: map[uint64][]byte{keyid: ed25519.Sign(sk, entry.Encoding)[:]},
},
Profile: profile,
LookupParameters: &proto.LookupRequest{
UserId: name,
QuorumRequirement: clientConfig.Realms[0].VerificationPolicy.GetQuorum(),
},
})
if err != nil {
t.Fatal(err)
}
if got, want := proof.Profile.Encoding, profile.Encoding; !bytes.Equal(got, want) {
t.Errorf("updated profile didn't roundtrip: %x != %x", got, want)
}
_, err = coname.VerifyLookup(clientConfig, name, proof, now)
if err != nil {
t.Fatal(err)
}
return &entry, &profile
}
开发者ID:Liamsi,项目名称:coname,代码行数:75,代码来源:server_test.go
示例6: main
func main() {
configPathPtr := flag.String("config", "clientconfig.json", "path to config file")
name := flag.String("name", "[email protected]", "name to be looked up")
lookupOnly := flag.Bool("lookup", false, "only lookup the name")
flag.Parse()
timeOut := 10 * time.Second
configReader, err := os.Open(*configPathPtr)
if err != nil {
log.Fatalf("Failed to open configuration file: %s", err)
}
cfg := &proto.Config{}
err = jsonpb.Unmarshal(configReader, cfg)
if err != nil {
log.Fatalf("Failed to parse configuration file: %s", err)
}
certFile := "ca.crt.pem"
caCertPEM, err := ioutil.ReadFile(certFile)
if err != nil {
log.Fatalf("couldn't read certs from %s", certFile)
}
caCertDER, caCertPEM := pem.Decode(caCertPEM)
if caCertDER == nil {
log.Fatalf("failed to parse key PEM")
}
caCert, err := x509.ParseCertificate(caCertDER.Bytes)
if err != nil {
log.Fatal(err)
}
caPool := x509.NewCertPool()
caPool.AddCert(caCert)
realm := cfg.Realms[0]
clientTLS, err := realm.ClientTLS.Config(getKey)
if err != nil {
log.Fatal(err)
}
conn, err := grpc.Dial(realm.Addr, grpc.WithTransportCredentials(credentials.NewTLS(clientTLS)), grpc.WithTimeout(timeOut))
if err != nil {
log.Fatal(err)
}
publicC := proto.NewE2EKSPublicClient(conn)
// First, do a lookup to retrieve the index
lookup, err := publicC.Lookup(context.Background(), &proto.LookupRequest{
UserId: *name,
// We don't care about any signatures here; the server just needs to tell us the index.
// We could just give an empty quorum requirement if we wanted (although I guess the
// spec actually disallows that).
QuorumRequirement: realm.VerificationPolicy.GetQuorum(),
})
if err != nil {
log.Fatal(err)
}
fmt.Printf("looking up %s:\n", *name)
keys, err := coname.VerifyLookup(cfg, *name, lookup, time.Now())
if err != nil {
log.Fatal(err)
}
if keys == nil {
fmt.Printf("not present\n")
} else {
fmt.Printf("keys: %s\n", keys)
}
index := lookup.Index
if *lookupOnly {
return
}
// Then, do the actual update
nonce := make([]byte, 16)
_, err = rand.Read(nonce)
if err != nil {
log.Fatal(err)
}
profile := proto.EncodedProfile{
Profile: proto.Profile{
Nonce: nonce,
Keys: map[string][]byte{"abc": []byte("foo bar"), "xyz": []byte("TEST 456")},
},
}
profile.UpdateEncoding()
var commitment [64]byte
sha3.ShakeSum256(commitment[:], profile.Encoding)
var version uint64
if lookup.Entry != nil {
version = lookup.Entry.Version + 1
}
entry := proto.EncodedEntry{
Entry: proto.Entry{
Index: index,
Version: version,
UpdatePolicy: &proto.AuthorizationPolicy{
PublicKeys: make(map[uint64]*proto.PublicKey),
PolicyType: &proto.AuthorizationPolicy_Quorum{
Quorum: &proto.QuorumExpr{
Threshold: 0,
//.........这里部分代码省略.........
开发者ID:yahoo,项目名称:coname,代码行数:101,代码来源:client.go
示例7: TestKeyserverHTTPFrontLookup
func TestKeyserverHTTPFrontLookup(t *testing.T) {
kss, caPool, clks, verifiers, ck, clientConfig, teardown := setupRealm(t, 3, 3)
ks := kss[0]
defer teardown()
stop := stoppableSyncedClocks(clks)
defer close(stop)
waitForFirstEpoch(kss[0], clientConfig.Realms[0].VerificationPolicy.GetQuorum())
clientTLS, err := clientConfig.Realms[0].ClientTLS.Config(ck)
if err != nil {
t.Fatal(err)
}
pgpKeyRef := []byte("this-is-alices-pgp-key")
_, _, _, profile := doRegister(t, ks, clientConfig, clientTLS, caPool, clks[0].Now(), alice, 0, proto.Profile{
Nonce: []byte("definitely used only once"),
Keys: map[string][]byte{"pgp": pgpKeyRef},
})
url := "https://" + ks.httpFrontListen.Addr().String() + "/lookup"
lr := &proto.LookupRequest{UserId: alice,
QuorumRequirement: clientConfig.Realms[0].VerificationPolicy.GetQuorum()}
var b bytes.Buffer
mr := &jsonpb.Marshaler{OrigName: true}
err = mr.Marshal(&b, lr)
if err != nil {
t.Fatal(err)
}
req, err := http.NewRequest("POST", url, &b)
tr := &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
c := &http.Client{Transport: tr}
resp, err := c.Do(req)
if err != nil {
t.Fatal(err)
}
defer resp.Body.Close()
body, e := ioutil.ReadAll(resp.Body)
if resp.Status != "200 OK" {
t.Fatalf("%s (%s)", body, e)
}
proof := &proto.LookupProof{}
err = jsonpb.UnmarshalString(string(body), proof)
if err != nil {
t.Fatal(err)
}
if got, want := proof.Profile.Encoding, profile.Encoding; !bytes.Equal(got, want) {
t.Errorf("profile didn't roundtrip: %x != %x", got, want)
}
if got, want := len(proof.Ratifications), majority(len(kss))+len(verifiers); got < want {
t.Errorf("expected at least %d sehs, got %d", got, want)
}
_, err = coname.VerifyLookup(clientConfig, alice, proof, clks[0].Now())
if err != nil {
t.Fatal(err)
}
// To verify json response preserves the original field names
// as specified in https://github.com/yahoo/coname/blob/master/proto/client.proto#L63-L89
type lp struct {
Entry string `json:"entry"`
Index string `json:"index"`
IndexProof string `json:"index_proof"`
Profile string `json:"profile"`
UserId string `json:"user_id"`
}
l := &lp{}
err = json.Unmarshal(body, &l)
if err != nil {
t.Fatal(err)
}
if l.Entry == "" {
t.Errorf("entry not found in the response")
}
if l.Index == "" {
t.Errorf("index not found in the response")
}
if l.IndexProof == "" {
t.Errorf("index_proof not found in the response")
}
if l.Profile == "" {
t.Errorf("profile not found in the response")
}
if l.UserId == "" {
t.Errorf("user_id not found in the response")
}
}
开发者ID:maditya,项目名称:coname,代码行数:92,代码来源:server_test.go
注:本文中的github.com/yahoo/coname.VerifyLookup函数示例由纯净天空整理自Github/MSDocs等源码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。 |
请发表评论