Add tests for sign options.
This commit is contained in:
parent
5dfcbcf5dc
commit
c24d868d9d
2 changed files with 128 additions and 108 deletions
|
@ -74,6 +74,8 @@ func (e emailOnlyIdentity) Valid(req *x509.CertificateRequest) error {
|
||||||
return errors.New("certificate request does not contain any email address")
|
return errors.New("certificate request does not contain any email address")
|
||||||
case len(req.EmailAddresses) > 1:
|
case len(req.EmailAddresses) > 1:
|
||||||
return errors.New("certificate request does not contain too many email addresses")
|
return errors.New("certificate request does not contain too many email addresses")
|
||||||
|
case req.EmailAddresses[0] == "":
|
||||||
|
return errors.New("certificate request cannot contain an empty email address")
|
||||||
case req.EmailAddresses[0] != string(e):
|
case req.EmailAddresses[0] != string(e):
|
||||||
return errors.Errorf("certificate request does not contain the valid email address, got %s, want %s", req.EmailAddresses[0], e)
|
return errors.Errorf("certificate request does not contain the valid email address, got %s, want %s", req.EmailAddresses[0], e)
|
||||||
default:
|
default:
|
||||||
|
|
|
@ -1,133 +1,151 @@
|
||||||
// +build ignore
|
|
||||||
|
|
||||||
package provisioner
|
package provisioner
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/x509"
|
||||||
"crypto/x509/pkix"
|
"crypto/x509/pkix"
|
||||||
"net"
|
"net"
|
||||||
|
"net/url"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
"github.com/pkg/errors"
|
|
||||||
"github.com/smallstep/assert"
|
|
||||||
x509 "github.com/smallstep/cli/pkg/x509"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestCommonNameClaim_Valid(t *testing.T) {
|
func Test_emailOnlyIdentity_Valid(t *testing.T) {
|
||||||
tests := map[string]struct {
|
uri, err := url.Parse("https://example.com/1.0/getUser")
|
||||||
cnc certClaim
|
if err != nil {
|
||||||
crt *x509.Certificate
|
t.Fatal(err)
|
||||||
err error
|
|
||||||
}{
|
|
||||||
"empty-common-name": {
|
|
||||||
cnc: &commonNameClaim{name: "foo"},
|
|
||||||
crt: &x509.Certificate{},
|
|
||||||
err: errors.New("common name cannot be empty"),
|
|
||||||
},
|
|
||||||
"wrong-common-name": {
|
|
||||||
cnc: &commonNameClaim{name: "foo"},
|
|
||||||
crt: &x509.Certificate{Subject: pkix.Name{CommonName: "bar"}},
|
|
||||||
err: errors.New("common name claim failed - got bar, want foo"),
|
|
||||||
},
|
|
||||||
"ok": {
|
|
||||||
cnc: &commonNameClaim{name: "foo"},
|
|
||||||
crt: &x509.Certificate{Subject: pkix.Name{CommonName: "foo"}},
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for name, tc := range tests {
|
type args struct {
|
||||||
t.Run(name, func(t *testing.T) {
|
req *x509.CertificateRequest
|
||||||
err := tc.cnc.Valid(tc.crt)
|
}
|
||||||
if err != nil {
|
tests := []struct {
|
||||||
if assert.NotNil(t, tc.err) {
|
name string
|
||||||
assert.Equals(t, tc.err.Error(), err.Error())
|
e emailOnlyIdentity
|
||||||
}
|
args args
|
||||||
} else {
|
wantErr bool
|
||||||
assert.Nil(t, tc.err)
|
}{
|
||||||
|
{"ok", "name@smallstep.com", args{&x509.CertificateRequest{EmailAddresses: []string{"name@smallstep.com"}}}, false},
|
||||||
|
{"DNSNames", "name@smallstep.com", args{&x509.CertificateRequest{DNSNames: []string{"foo.bar.zar"}}}, true},
|
||||||
|
{"IPAddresses", "name@smallstep.com", args{&x509.CertificateRequest{IPAddresses: []net.IP{net.IPv4(127, 0, 0, 1)}}}, true},
|
||||||
|
{"URIs", "name@smallstep.com", args{&x509.CertificateRequest{URIs: []*url.URL{uri}}}, true},
|
||||||
|
{"no-emails", "name@smallstep.com", args{&x509.CertificateRequest{EmailAddresses: []string{}}}, true},
|
||||||
|
{"empty-email", "", args{&x509.CertificateRequest{EmailAddresses: []string{""}}}, true},
|
||||||
|
{"multiple-emails", "name@smallstep.com", args{&x509.CertificateRequest{EmailAddresses: []string{"name@smallstep.com", "foo@smallstep.com"}}}, true},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if err := tt.e.Valid(tt.args.req); (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("emailOnlyIdentity.Valid() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestIPAddressesClaim_Valid(t *testing.T) {
|
func Test_commonNameValidator_Valid(t *testing.T) {
|
||||||
tests := map[string]struct {
|
type args struct {
|
||||||
iac certClaim
|
req *x509.CertificateRequest
|
||||||
crt *x509.Certificate
|
|
||||||
err error
|
|
||||||
}{
|
|
||||||
"unexpected-ip-in-crt": {
|
|
||||||
iac: &ipAddressesClaim{ips: []net.IP{net.ParseIP("127.0.0.1")}},
|
|
||||||
crt: &x509.Certificate{IPAddresses: []net.IP{net.ParseIP("127.0.0.1"), net.ParseIP("1.1.1.1")}},
|
|
||||||
err: errors.New("IP Addresses claim failed - got [127.0.0.1 1.1.1.1], want [127.0.0.1]"),
|
|
||||||
},
|
|
||||||
"missing-ip-in-crt": {
|
|
||||||
iac: &ipAddressesClaim{ips: []net.IP{net.ParseIP("127.0.0.1"), net.ParseIP("1.1.1.1")}},
|
|
||||||
crt: &x509.Certificate{IPAddresses: []net.IP{net.ParseIP("127.0.0.1")}},
|
|
||||||
err: errors.New("IP Addresses claim failed - got [127.0.0.1], want [127.0.0.1 1.1.1.1]"),
|
|
||||||
},
|
|
||||||
"invalid-matcher-nonempty-ips": {
|
|
||||||
iac: &ipAddressesClaim{ips: []net.IP{}},
|
|
||||||
crt: &x509.Certificate{IPAddresses: []net.IP{net.ParseIP("127.0.0.1")}},
|
|
||||||
err: errors.New("IP Addresses claim failed - got [127.0.0.1], want []"),
|
|
||||||
},
|
|
||||||
"ok": {
|
|
||||||
iac: &ipAddressesClaim{ips: []net.IP{net.ParseIP("127.0.0.1")}},
|
|
||||||
crt: &x509.Certificate{IPAddresses: []net.IP{net.ParseIP("127.0.0.1")}},
|
|
||||||
},
|
|
||||||
"ok-multiple-identical-ip-entries": {
|
|
||||||
iac: &ipAddressesClaim{ips: []net.IP{net.ParseIP("127.0.0.1")}},
|
|
||||||
crt: &x509.Certificate{IPAddresses: []net.IP{net.ParseIP("127.0.0.1"), net.ParseIP("127.0.0.1"), net.ParseIP("127.0.0.1")}},
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
tests := []struct {
|
||||||
for name, tc := range tests {
|
name string
|
||||||
t.Run(name, func(t *testing.T) {
|
v commonNameValidator
|
||||||
err := tc.iac.Valid(tc.crt)
|
args args
|
||||||
if err != nil {
|
wantErr bool
|
||||||
if assert.NotNil(t, tc.err) {
|
}{
|
||||||
assert.Equals(t, tc.err.Error(), err.Error())
|
{"ok", "foo.bar.zar", args{&x509.CertificateRequest{Subject: pkix.Name{CommonName: "foo.bar.zar"}}}, false},
|
||||||
}
|
{"empty", "", args{&x509.CertificateRequest{Subject: pkix.Name{CommonName: ""}}}, true},
|
||||||
} else {
|
{"wrong", "foo.bar.zar", args{&x509.CertificateRequest{Subject: pkix.Name{CommonName: "example.com"}}}, true},
|
||||||
assert.Nil(t, tc.err)
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if err := tt.v.Valid(tt.args.req); (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("commonNameValidator.Valid() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestDNSNamesClaim_Valid(t *testing.T) {
|
func Test_dnsNamesValidator_Valid(t *testing.T) {
|
||||||
tests := map[string]struct {
|
type args struct {
|
||||||
dnc certClaim
|
req *x509.CertificateRequest
|
||||||
crt *x509.Certificate
|
|
||||||
err error
|
|
||||||
}{
|
|
||||||
"unexpected-dns-name-in-crt": {
|
|
||||||
dnc: &dnsNamesClaim{names: []string{"foo"}},
|
|
||||||
crt: &x509.Certificate{DNSNames: []string{"foo", "bar"}},
|
|
||||||
err: errors.New("DNS names claim failed - got [foo bar], want [foo]"),
|
|
||||||
},
|
|
||||||
"ok": {
|
|
||||||
dnc: &dnsNamesClaim{names: []string{"foo", "bar"}},
|
|
||||||
crt: &x509.Certificate{DNSNames: []string{"bar", "foo"}},
|
|
||||||
},
|
|
||||||
"missing-dns-name-in-crt": {
|
|
||||||
dnc: &dnsNamesClaim{names: []string{"foo", "bar"}},
|
|
||||||
crt: &x509.Certificate{DNSNames: []string{"foo"}},
|
|
||||||
err: errors.New("DNS names claim failed - got [foo], want [foo bar]"),
|
|
||||||
},
|
|
||||||
"ok-multiple-identical-dns-entries": {
|
|
||||||
dnc: &dnsNamesClaim{names: []string{"foo"}},
|
|
||||||
crt: &x509.Certificate{DNSNames: []string{"foo", "foo", "foo"}},
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
tests := []struct {
|
||||||
for name, tc := range tests {
|
name string
|
||||||
t.Run(name, func(t *testing.T) {
|
v dnsNamesValidator
|
||||||
err := tc.dnc.Valid(tc.crt)
|
args args
|
||||||
if err != nil {
|
wantErr bool
|
||||||
if assert.NotNil(t, tc.err) {
|
}{
|
||||||
assert.Equals(t, tc.err.Error(), err.Error())
|
{"ok0", []string{}, args{&x509.CertificateRequest{DNSNames: []string{}}}, false},
|
||||||
}
|
{"ok1", []string{"foo.bar.zar"}, args{&x509.CertificateRequest{DNSNames: []string{"foo.bar.zar"}}}, false},
|
||||||
} else {
|
{"ok2", []string{"foo.bar.zar", "bar.zar"}, args{&x509.CertificateRequest{DNSNames: []string{"foo.bar.zar", "bar.zar"}}}, false},
|
||||||
assert.Nil(t, tc.err)
|
{"ok3", []string{"foo.bar.zar", "bar.zar"}, args{&x509.CertificateRequest{DNSNames: []string{"bar.zar", "foo.bar.zar"}}}, false},
|
||||||
|
{"fail1", []string{"foo.bar.zar"}, args{&x509.CertificateRequest{DNSNames: []string{"bar.zar"}}}, true},
|
||||||
|
{"fail2", []string{"foo.bar.zar"}, args{&x509.CertificateRequest{DNSNames: []string{"bar.zar", "foo.bar.zar"}}}, true},
|
||||||
|
{"fail3", []string{"foo.bar.zar", "bar.zar"}, args{&x509.CertificateRequest{DNSNames: []string{"foo.bar.zar", "zar.bar"}}}, true},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if err := tt.v.Valid(tt.args.req); (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("dnsNamesValidator.Valid() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func Test_ipAddressesValidator_Valid(t *testing.T) {
|
||||||
|
ip1 := net.IPv4(10, 3, 2, 1)
|
||||||
|
ip2 := net.IPv4(10, 3, 2, 2)
|
||||||
|
ip3 := net.IPv4(10, 3, 2, 3)
|
||||||
|
|
||||||
|
type args struct {
|
||||||
|
req *x509.CertificateRequest
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
v ipAddressesValidator
|
||||||
|
args args
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{"ok0", []net.IP{}, args{&x509.CertificateRequest{IPAddresses: []net.IP{}}}, false},
|
||||||
|
{"ok1", []net.IP{ip1}, args{&x509.CertificateRequest{IPAddresses: []net.IP{ip1}}}, false},
|
||||||
|
{"ok2", []net.IP{ip1, ip2}, args{&x509.CertificateRequest{IPAddresses: []net.IP{ip1, ip2}}}, false},
|
||||||
|
{"ok3", []net.IP{ip1, ip2}, args{&x509.CertificateRequest{IPAddresses: []net.IP{ip2, ip1}}}, false},
|
||||||
|
{"fail1", []net.IP{ip1}, args{&x509.CertificateRequest{IPAddresses: []net.IP{ip2}}}, true},
|
||||||
|
{"fail2", []net.IP{ip1}, args{&x509.CertificateRequest{IPAddresses: []net.IP{ip2, ip1}}}, true},
|
||||||
|
{"fail3", []net.IP{ip1, ip2}, args{&x509.CertificateRequest{IPAddresses: []net.IP{ip1, ip3}}}, true},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if err := tt.v.Valid(tt.args.req); (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("ipAddressesValidator.Valid() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func Test_validityValidator_Valid(t *testing.T) {
|
||||||
|
type fields struct {
|
||||||
|
min time.Duration
|
||||||
|
max time.Duration
|
||||||
|
}
|
||||||
|
type args struct {
|
||||||
|
crt *x509.Certificate
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
fields fields
|
||||||
|
args args
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
// TODO: Add test cases.
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
v := &validityValidator{
|
||||||
|
min: tt.fields.min,
|
||||||
|
max: tt.fields.max,
|
||||||
|
}
|
||||||
|
if err := v.Valid(tt.args.crt); (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("validityValidator.Valid() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue