sig-auth/main.go

69 lines
1.1 KiB
Go
Raw Normal View History

2025-02-10 23:07:41 -05:00
package main
import (
"bytes"
"crypto"
"encoding/json"
"fmt"
"log"
"os"
"crispbyte.dev/sig-auth/client"
2025-02-14 19:41:22 -05:00
"github.com/opencontainers/go-digest"
2025-02-10 23:07:41 -05:00
"golang.org/x/crypto/ssh"
)
func main() {
testData := map[string]string{"hello": "world"}
json_data, _ := json.Marshal(testData)
keyFile := "testkey"
key, err := loadPrivateKey(keyFile)
if err != nil {
log.Fatal(err)
}
client, err := client.GetSigningClient(key, "test-id")
if err != nil {
log.Fatal(err)
}
2025-02-14 19:41:22 -05:00
id := digest.FromBytes(json_data)
req, err := http.NewRequest("POST", "http://localhost:8080/post", bytes.NewBuffer(json_data))
if err != nil {
log.Fatal(err)
}
req.Header.Add("Content-Digest", string(id.Algorithm())+"="+id.Encoded())
req.Header.Add("Content-Type", "application/json")
resp, err := client.Do(req)
2025-02-10 23:07:41 -05:00
if err != nil {
log.Fatal(err)
}
defer resp.Body.Close()
var res map[string]interface{}
json.NewDecoder(resp.Body).Decode(&res)
fmt.Println(res)
}
func loadPrivateKey(keyFile string) (crypto.PrivateKey, error) {
keyBytes, err := os.ReadFile(keyFile)
if err != nil {
return nil, err
}
return ssh.ParseRawPrivateKey(keyBytes)
}