2019-05-27 00:41:10 +00:00
package acme
import (
"bytes"
"crypto"
2020-02-07 14:50:22 +00:00
"crypto/rand"
"crypto/rsa"
2019-05-27 00:41:10 +00:00
"crypto/sha256"
2020-02-07 14:50:22 +00:00
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"encoding/asn1"
2019-05-27 00:41:10 +00:00
"encoding/base64"
2020-02-07 14:50:22 +00:00
"encoding/hex"
2019-05-27 00:41:10 +00:00
"encoding/json"
"fmt"
2020-02-10 19:50:13 +00:00
"io"
2019-05-27 00:41:10 +00:00
"io/ioutil"
2020-02-07 14:50:22 +00:00
"math/big"
"net"
2019-05-27 00:41:10 +00:00
"net/http"
2020-02-07 14:50:22 +00:00
"net/http/httptest"
2019-05-27 00:41:10 +00:00
"testing"
"time"
"github.com/pkg/errors"
"github.com/smallstep/assert"
"github.com/smallstep/certificates/db"
"github.com/smallstep/cli/jose"
"github.com/smallstep/nosql"
"github.com/smallstep/nosql/database"
)
var testOps = ChallengeOptions {
AccountID : "accID" ,
AuthzID : "authzID" ,
Identifier : Identifier {
Type : "" , // will get set correctly depending on the "new.." method.
Value : "zap.internal" ,
} ,
}
func newDNSCh ( ) ( challenge , error ) {
mockdb := & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return [ ] byte ( "foo" ) , true , nil
} ,
}
return newDNS01Challenge ( mockdb , testOps )
}
2020-02-07 14:50:22 +00:00
func newTLSALPNCh ( ) ( challenge , error ) {
mockdb := & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return [ ] byte ( "foo" ) , true , nil
} ,
}
return newTLSALPN01Challenge ( mockdb , testOps )
}
2019-05-27 00:41:10 +00:00
func newHTTPCh ( ) ( challenge , error ) {
mockdb := & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return [ ] byte ( "foo" ) , true , nil
} ,
}
return newHTTP01Challenge ( mockdb , testOps )
}
func TestNewHTTP01Challenge ( t * testing . T ) {
ops := ChallengeOptions {
AccountID : "accID" ,
AuthzID : "authzID" ,
Identifier : Identifier {
Type : "http" ,
Value : "zap.internal" ,
} ,
}
type test struct {
ops ChallengeOptions
db nosql . DB
err * Error
}
tests := map [ string ] test {
"fail/store-error" : {
ops : ops ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return nil , false , errors . New ( "force" )
} ,
} ,
err : ServerInternalErr ( errors . New ( "error saving acme challenge: force" ) ) ,
} ,
"ok" : {
ops : ops ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return [ ] byte ( "foo" ) , true , nil
} ,
} ,
} ,
}
for name , tc := range tests {
t . Run ( name , func ( t * testing . T ) {
ch , err := newHTTP01Challenge ( tc . db , tc . ops )
if err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , ch . getAccountID ( ) , ops . AccountID )
assert . Equals ( t , ch . getAuthzID ( ) , ops . AuthzID )
assert . Equals ( t , ch . getType ( ) , "http-01" )
assert . Equals ( t , ch . getValue ( ) , "zap.internal" )
assert . Equals ( t , ch . getStatus ( ) , StatusPending )
assert . True ( t , ch . getValidated ( ) . IsZero ( ) )
assert . True ( t , ch . getCreated ( ) . Before ( time . Now ( ) . UTC ( ) . Add ( time . Minute ) ) )
assert . True ( t , ch . getCreated ( ) . After ( time . Now ( ) . UTC ( ) . Add ( - 1 * time . Minute ) ) )
assert . True ( t , ch . getID ( ) != "" )
assert . True ( t , ch . getToken ( ) != "" )
}
}
} )
}
}
2020-02-07 14:50:22 +00:00
func TestNewTLSALPN01Challenge ( t * testing . T ) {
ops := ChallengeOptions {
AccountID : "accID" ,
AuthzID : "authzID" ,
Identifier : Identifier {
Type : "http" ,
Value : "zap.internal" ,
} ,
}
type test struct {
ops ChallengeOptions
db nosql . DB
err * Error
}
tests := map [ string ] test {
"fail/store-error" : {
ops : ops ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return nil , false , errors . New ( "force" )
} ,
} ,
err : ServerInternalErr ( errors . New ( "error saving acme challenge: force" ) ) ,
} ,
"ok" : {
ops : ops ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return [ ] byte ( "foo" ) , true , nil
} ,
} ,
} ,
}
for name , tc := range tests {
t . Run ( name , func ( t * testing . T ) {
ch , err := newTLSALPN01Challenge ( tc . db , tc . ops )
if err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , ch . getAccountID ( ) , ops . AccountID )
assert . Equals ( t , ch . getAuthzID ( ) , ops . AuthzID )
assert . Equals ( t , ch . getType ( ) , "tls-alpn-01" )
assert . Equals ( t , ch . getValue ( ) , "zap.internal" )
assert . Equals ( t , ch . getStatus ( ) , StatusPending )
assert . True ( t , ch . getValidated ( ) . IsZero ( ) )
assert . True ( t , ch . getCreated ( ) . Before ( time . Now ( ) . UTC ( ) . Add ( time . Minute ) ) )
assert . True ( t , ch . getCreated ( ) . After ( time . Now ( ) . UTC ( ) . Add ( - 1 * time . Minute ) ) )
assert . True ( t , ch . getID ( ) != "" )
assert . True ( t , ch . getToken ( ) != "" )
}
}
} )
}
}
2019-05-27 00:41:10 +00:00
func TestNewDNS01Challenge ( t * testing . T ) {
ops := ChallengeOptions {
AccountID : "accID" ,
AuthzID : "authzID" ,
Identifier : Identifier {
Type : "dns" ,
Value : "zap.internal" ,
} ,
}
type test struct {
ops ChallengeOptions
db nosql . DB
err * Error
}
tests := map [ string ] test {
"fail/store-error" : {
ops : ops ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return nil , false , errors . New ( "force" )
} ,
} ,
err : ServerInternalErr ( errors . New ( "error saving acme challenge: force" ) ) ,
} ,
"ok" : {
ops : ops ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return [ ] byte ( "foo" ) , true , nil
} ,
} ,
} ,
}
for name , tc := range tests {
t . Run ( name , func ( t * testing . T ) {
ch , err := newDNS01Challenge ( tc . db , tc . ops )
if err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , ch . getAccountID ( ) , ops . AccountID )
assert . Equals ( t , ch . getAuthzID ( ) , ops . AuthzID )
assert . Equals ( t , ch . getType ( ) , "dns-01" )
assert . Equals ( t , ch . getValue ( ) , "zap.internal" )
assert . Equals ( t , ch . getStatus ( ) , StatusPending )
assert . True ( t , ch . getValidated ( ) . IsZero ( ) )
assert . True ( t , ch . getCreated ( ) . Before ( time . Now ( ) . UTC ( ) . Add ( time . Minute ) ) )
assert . True ( t , ch . getCreated ( ) . After ( time . Now ( ) . UTC ( ) . Add ( - 1 * time . Minute ) ) )
assert . True ( t , ch . getID ( ) != "" )
assert . True ( t , ch . getToken ( ) != "" )
}
}
} )
}
}
func TestChallengeToACME ( t * testing . T ) {
dir := newDirectory ( "ca.smallstep.com" , "acme" )
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
_httpCh , ok := httpCh . ( * http01Challenge )
assert . Fatal ( t , ok )
_httpCh . baseChallenge . Validated = clock . Now ( )
dnsCh , err := newDNSCh ( )
assert . FatalError ( t , err )
2020-02-07 14:50:22 +00:00
tlsALPNCh , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
2019-05-27 00:41:10 +00:00
prov := newProv ( )
tests := map [ string ] challenge {
2020-02-07 14:50:22 +00:00
"dns" : dnsCh ,
"http" : httpCh ,
"tls-alpn" : tlsALPNCh ,
2019-05-27 00:41:10 +00:00
}
for name , ch := range tests {
t . Run ( name , func ( t * testing . T ) {
ach , err := ch . toACME ( nil , dir , prov )
assert . FatalError ( t , err )
assert . Equals ( t , ach . Type , ch . getType ( ) )
assert . Equals ( t , ach . Status , ch . getStatus ( ) )
assert . Equals ( t , ach . Token , ch . getToken ( ) )
assert . Equals ( t , ach . URL ,
fmt . Sprintf ( "https://ca.smallstep.com/acme/%s/challenge/%s" ,
URLSafeProvisionerName ( prov ) , ch . getID ( ) ) )
assert . Equals ( t , ach . ID , ch . getID ( ) )
assert . Equals ( t , ach . AuthzID , ch . getAuthzID ( ) )
if ach . Type == "http-01" {
v , err := time . Parse ( time . RFC3339 , ach . Validated )
assert . FatalError ( t , err )
assert . Equals ( t , v . String ( ) , _httpCh . baseChallenge . Validated . String ( ) )
} else {
assert . Equals ( t , ach . Validated , "" )
}
} )
}
}
func TestChallengeSave ( t * testing . T ) {
type test struct {
ch challenge
old challenge
db nosql . DB
err * Error
}
tests := map [ string ] func ( t * testing . T ) test {
"fail/old-nil/swap-error" : func ( t * testing . T ) test {
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
return test {
ch : httpCh ,
old : nil ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return nil , false , errors . New ( "force" )
} ,
} ,
err : ServerInternalErr ( errors . New ( "error saving acme challenge: force" ) ) ,
}
} ,
"fail/old-nil/swap-false" : func ( t * testing . T ) test {
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
return test {
ch : httpCh ,
old : nil ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return [ ] byte ( "foo" ) , false , nil
} ,
} ,
err : ServerInternalErr ( errors . New ( "error saving acme challenge; acme challenge has changed since last read" ) ) ,
}
} ,
"ok/old-nil" : func ( t * testing . T ) test {
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
b , err := json . Marshal ( httpCh )
assert . FatalError ( t , err )
return test {
ch : httpCh ,
old : nil ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , old , nil )
assert . Equals ( t , b , newval )
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , [ ] byte ( httpCh . getID ( ) ) , key )
return [ ] byte ( "foo" ) , true , nil
} ,
} ,
}
} ,
"ok/old-not-nil" : func ( t * testing . T ) test {
oldHTTPCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( oldHTTPCh )
assert . FatalError ( t , err )
b , err := json . Marshal ( httpCh )
assert . FatalError ( t , err )
return test {
ch : httpCh ,
old : oldHTTPCh ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , old , oldb )
assert . Equals ( t , b , newval )
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , [ ] byte ( httpCh . getID ( ) ) , key )
return [ ] byte ( "foo" ) , true , nil
} ,
} ,
}
} ,
}
for name , run := range tests {
t . Run ( name , func ( t * testing . T ) {
tc := run ( t )
if err := tc . ch . save ( tc . db , tc . old ) ; err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
assert . Nil ( t , tc . err )
}
} )
}
}
func TestChallengeClone ( t * testing . T ) {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
clone := ch . clone ( )
assert . Equals ( t , clone . getID ( ) , ch . getID ( ) )
assert . Equals ( t , clone . getAccountID ( ) , ch . getAccountID ( ) )
assert . Equals ( t , clone . getAuthzID ( ) , ch . getAuthzID ( ) )
assert . Equals ( t , clone . getStatus ( ) , ch . getStatus ( ) )
assert . Equals ( t , clone . getToken ( ) , ch . getToken ( ) )
assert . Equals ( t , clone . getCreated ( ) , ch . getCreated ( ) )
assert . Equals ( t , clone . getValidated ( ) , ch . getValidated ( ) )
clone . Status = StatusValid
assert . NotEquals ( t , clone . getStatus ( ) , ch . getStatus ( ) )
}
func TestChallengeUnmarshal ( t * testing . T ) {
type test struct {
ch challenge
chb [ ] byte
err * Error
}
tests := map [ string ] func ( t * testing . T ) test {
"fail/nil" : func ( t * testing . T ) test {
return test {
chb : nil ,
err : ServerInternalErr ( errors . New ( "error unmarshaling challenge type: unexpected end of JSON input" ) ) ,
}
} ,
2020-02-07 20:25:27 +00:00
"fail/unexpected-type-http" : func ( t * testing . T ) test {
2019-05-27 00:41:10 +00:00
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
_httpCh , ok := httpCh . ( * http01Challenge )
assert . Fatal ( t , ok )
_httpCh . baseChallenge . Type = "foo"
b , err := json . Marshal ( httpCh )
assert . FatalError ( t , err )
return test {
chb : b ,
err : ServerInternalErr ( errors . New ( "unexpected challenge type foo" ) ) ,
}
} ,
2020-02-07 20:25:27 +00:00
"fail/unexpected-type-alpn" : func ( t * testing . T ) test {
tlsALPNCh , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
_tlsALPNCh , ok := tlsALPNCh . ( * tlsALPN01Challenge )
assert . Fatal ( t , ok )
_tlsALPNCh . baseChallenge . Type = "foo"
b , err := json . Marshal ( tlsALPNCh )
assert . FatalError ( t , err )
return test {
chb : b ,
err : ServerInternalErr ( errors . New ( "unexpected challenge type foo" ) ) ,
}
} ,
"fail/unexpected-type-dns" : func ( t * testing . T ) test {
dnsCh , err := newDNSCh ( )
assert . FatalError ( t , err )
2020-02-11 14:57:28 +00:00
_dnsCh , ok := dnsCh . ( * dns01Challenge )
2020-02-07 20:25:27 +00:00
assert . Fatal ( t , ok )
2020-02-11 14:57:28 +00:00
_dnsCh . baseChallenge . Type = "foo"
2020-02-07 20:25:27 +00:00
b , err := json . Marshal ( dnsCh )
assert . FatalError ( t , err )
return test {
chb : b ,
err : ServerInternalErr ( errors . New ( "unexpected challenge type foo" ) ) ,
}
} ,
2019-05-27 00:41:10 +00:00
"ok/dns" : func ( t * testing . T ) test {
dnsCh , err := newDNSCh ( )
assert . FatalError ( t , err )
b , err := json . Marshal ( dnsCh )
assert . FatalError ( t , err )
return test {
ch : dnsCh ,
chb : b ,
}
} ,
"ok/http" : func ( t * testing . T ) test {
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
b , err := json . Marshal ( httpCh )
assert . FatalError ( t , err )
return test {
ch : httpCh ,
chb : b ,
}
} ,
2020-02-11 14:57:28 +00:00
"ok/alpn" : func ( t * testing . T ) test {
tlsALPNCh , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
b , err := json . Marshal ( tlsALPNCh )
assert . FatalError ( t , err )
return test {
ch : tlsALPNCh ,
chb : b ,
}
} ,
2019-05-27 00:41:10 +00:00
"ok/err" : func ( t * testing . T ) test {
httpCh , err := newHTTPCh ( )
assert . FatalError ( t , err )
_httpCh , ok := httpCh . ( * http01Challenge )
assert . Fatal ( t , ok )
_httpCh . baseChallenge . Error = ServerInternalErr ( errors . New ( "force" ) ) . ToACME ( )
b , err := json . Marshal ( httpCh )
assert . FatalError ( t , err )
return test {
ch : httpCh ,
chb : b ,
}
} ,
}
for name , run := range tests {
t . Run ( name , func ( t * testing . T ) {
tc := run ( t )
if ch , err := unmarshalChallenge ( tc . chb ) ; err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , tc . ch . getID ( ) , ch . getID ( ) )
assert . Equals ( t , tc . ch . getAccountID ( ) , ch . getAccountID ( ) )
assert . Equals ( t , tc . ch . getAuthzID ( ) , ch . getAuthzID ( ) )
assert . Equals ( t , tc . ch . getStatus ( ) , ch . getStatus ( ) )
assert . Equals ( t , tc . ch . getToken ( ) , ch . getToken ( ) )
assert . Equals ( t , tc . ch . getCreated ( ) , ch . getCreated ( ) )
assert . Equals ( t , tc . ch . getValidated ( ) , ch . getValidated ( ) )
}
}
} )
}
}
func TestGetChallenge ( t * testing . T ) {
type test struct {
id string
db nosql . DB
ch challenge
err * Error
}
tests := map [ string ] func ( t * testing . T ) test {
"fail/not-found" : func ( t * testing . T ) test {
dnsCh , err := newDNSCh ( )
assert . FatalError ( t , err )
return test {
ch : dnsCh ,
id : dnsCh . getID ( ) ,
db : & db . MockNoSQLDB {
MGet : func ( bucket , key [ ] byte ) ( [ ] byte , error ) {
return nil , database . ErrNotFound
} ,
} ,
err : MalformedErr ( errors . Errorf ( "challenge %s not found: not found" , dnsCh . getID ( ) ) ) ,
}
} ,
"fail/db-error" : func ( t * testing . T ) test {
dnsCh , err := newDNSCh ( )
assert . FatalError ( t , err )
return test {
ch : dnsCh ,
id : dnsCh . getID ( ) ,
db : & db . MockNoSQLDB {
MGet : func ( bucket , key [ ] byte ) ( [ ] byte , error ) {
return nil , errors . New ( "force" )
} ,
} ,
err : ServerInternalErr ( errors . Errorf ( "error loading challenge %s: force" , dnsCh . getID ( ) ) ) ,
}
} ,
"fail/unmarshal-error" : func ( t * testing . T ) test {
dnsCh , err := newDNSCh ( )
assert . FatalError ( t , err )
_dnsCh , ok := dnsCh . ( * dns01Challenge )
assert . Fatal ( t , ok )
_dnsCh . baseChallenge . Type = "foo"
b , err := json . Marshal ( dnsCh )
assert . FatalError ( t , err )
return test {
ch : dnsCh ,
id : dnsCh . getID ( ) ,
db : & db . MockNoSQLDB {
MGet : func ( bucket , key [ ] byte ) ( [ ] byte , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( dnsCh . getID ( ) ) )
return b , nil
} ,
} ,
err : ServerInternalErr ( errors . New ( "unexpected challenge type foo" ) ) ,
}
} ,
"ok" : func ( t * testing . T ) test {
dnsCh , err := newDNSCh ( )
assert . FatalError ( t , err )
b , err := json . Marshal ( dnsCh )
assert . FatalError ( t , err )
return test {
ch : dnsCh ,
id : dnsCh . getID ( ) ,
db : & db . MockNoSQLDB {
MGet : func ( bucket , key [ ] byte ) ( [ ] byte , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( dnsCh . getID ( ) ) )
return b , nil
} ,
} ,
}
} ,
}
for name , run := range tests {
t . Run ( name , func ( t * testing . T ) {
tc := run ( t )
if ch , err := getChallenge ( tc . db , tc . id ) ; err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , tc . ch . getID ( ) , ch . getID ( ) )
assert . Equals ( t , tc . ch . getAccountID ( ) , ch . getAccountID ( ) )
assert . Equals ( t , tc . ch . getAuthzID ( ) , ch . getAuthzID ( ) )
assert . Equals ( t , tc . ch . getStatus ( ) , ch . getStatus ( ) )
assert . Equals ( t , tc . ch . getToken ( ) , ch . getToken ( ) )
assert . Equals ( t , tc . ch . getCreated ( ) , ch . getCreated ( ) )
assert . Equals ( t , tc . ch . getValidated ( ) , ch . getValidated ( ) )
}
}
} )
}
}
func TestKeyAuthorization ( t * testing . T ) {
type test struct {
token string
jwk * jose . JSONWebKey
exp string
err * Error
}
tests := map [ string ] func ( t * testing . T ) test {
"fail/jwk-thumbprint-error" : func ( t * testing . T ) test {
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
jwk . Key = "foo"
return test {
token : "1234" ,
jwk : jwk ,
err : ServerInternalErr ( errors . Errorf ( "error generating JWK thumbprint: square/go-jose: unknown key type 'string'" ) ) ,
}
} ,
"ok" : func ( t * testing . T ) test {
token := "1234"
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
thumbprint , err := jwk . Thumbprint ( crypto . SHA256 )
assert . FatalError ( t , err )
encPrint := base64 . RawURLEncoding . EncodeToString ( thumbprint )
return test {
token : token ,
jwk : jwk ,
exp : fmt . Sprintf ( "%s.%s" , token , encPrint ) ,
}
} ,
}
for name , run := range tests {
t . Run ( name , func ( t * testing . T ) {
tc := run ( t )
if ka , err := KeyAuthorization ( tc . token , tc . jwk ) ; err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , tc . exp , ka )
}
}
} )
}
}
type errReader int
func ( errReader ) Read ( p [ ] byte ) ( n int , err error ) {
return 0 , errors . New ( "force" )
}
func ( errReader ) Close ( ) error {
return nil
}
func TestHTTP01Validate ( t * testing . T ) {
type test struct {
vo validateOptions
ch challenge
res challenge
jwk * jose . JSONWebKey
db nosql . DB
err * Error
}
tests := map [ string ] func ( t * testing . T ) test {
"ok/status-already-valid" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * http01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Status = StatusValid
return test {
ch : ch ,
res : ch ,
}
} ,
"ok/status-already-invalid" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * http01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Status = StatusInvalid
return test {
ch : ch ,
res : ch ,
}
} ,
"ok/http-get-error" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := ConnectionErr ( errors . Errorf ( "error doing http GET for url " +
"http://zap.internal/.well-known/acme-challenge/%s: force" , ch . getToken ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & http01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
return test {
ch : ch ,
vo : validateOptions {
httpGet : func ( url string ) ( * http . Response , error ) {
return nil , errors . New ( "force" )
} ,
} ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , newval , newb )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/http-get->=400" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := ConnectionErr ( errors . Errorf ( "error doing http GET for url " +
"http://zap.internal/.well-known/acme-challenge/%s with status code 400" , ch . getToken ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & http01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
return test {
ch : ch ,
vo : validateOptions {
httpGet : func ( url string ) ( * http . Response , error ) {
return & http . Response {
StatusCode : http . StatusBadRequest ,
} , nil
} ,
} ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , newval , newb )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"fail/read-body" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
jwk . Key = "foo"
return test {
ch : ch ,
vo : validateOptions {
httpGet : func ( url string ) ( * http . Response , error ) {
return & http . Response {
Body : errReader ( 0 ) ,
} , nil
} ,
} ,
jwk : jwk ,
err : ServerInternalErr ( errors . Errorf ( "error reading response " +
"body for url http://zap.internal/.well-known/acme-challenge/%s: force" ,
ch . getToken ( ) ) ) ,
}
} ,
"fail/key-authorization-gen-error" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
jwk . Key = "foo"
return test {
ch : ch ,
vo : validateOptions {
httpGet : func ( url string ) ( * http . Response , error ) {
return & http . Response {
Body : ioutil . NopCloser ( bytes . NewBufferString ( "foo" ) ) ,
} , nil
} ,
} ,
jwk : jwk ,
err : ServerInternalErr ( errors . New ( "error generating JWK thumbprint: square/go-jose: unknown key type 'string'" ) ) ,
}
} ,
"ok/key-auth-mismatch" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . Errorf ( "keyAuthorization does not match; " +
"expected %s, but got foo" , expKeyAuth ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & http01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
return test {
ch : ch ,
vo : validateOptions {
httpGet : func ( url string ) ( * http . Response , error ) {
return & http . Response {
Body : ioutil . NopCloser ( bytes . NewBufferString ( "foo" ) ) ,
} , nil
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , newval , newb )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"fail/save-error" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
return test {
ch : ch ,
vo : validateOptions {
httpGet : func ( url string ) ( * http . Response , error ) {
return & http . Response {
Body : ioutil . NopCloser ( bytes . NewBufferString ( expKeyAuth ) ) ,
} , nil
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return nil , false , errors . New ( "force" )
} ,
} ,
err : ServerInternalErr ( errors . New ( "error saving acme challenge: force" ) ) ,
}
} ,
"ok" : func ( t * testing . T ) test {
ch , err := newHTTPCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * http01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Error = MalformedErr ( nil ) . ToACME ( )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
baseClone := ch . clone ( )
baseClone . Status = StatusValid
baseClone . Error = nil
newCh := & http01Challenge { baseClone }
return test {
ch : ch ,
res : newCh ,
vo : validateOptions {
httpGet : func ( url string ) ( * http . Response , error ) {
return & http . Response {
Body : ioutil . NopCloser ( bytes . NewBufferString ( expKeyAuth ) ) ,
} , nil
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
httpCh , err := unmarshalChallenge ( newval )
assert . FatalError ( t , err )
assert . Equals ( t , httpCh . getStatus ( ) , StatusValid )
assert . True ( t , httpCh . getValidated ( ) . Before ( time . Now ( ) . UTC ( ) . Add ( time . Minute ) ) )
assert . True ( t , httpCh . getValidated ( ) . After ( time . Now ( ) . UTC ( ) . Add ( - 1 * time . Second ) ) )
baseClone . Validated = httpCh . getValidated ( )
return nil , true , nil
} ,
} ,
}
} ,
}
for name , run := range tests {
t . Run ( name , func ( t * testing . T ) {
tc := run ( t )
if ch , err := tc . ch . validate ( tc . db , tc . jwk , tc . vo ) ; err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , tc . res . getID ( ) , ch . getID ( ) )
assert . Equals ( t , tc . res . getAccountID ( ) , ch . getAccountID ( ) )
assert . Equals ( t , tc . res . getAuthzID ( ) , ch . getAuthzID ( ) )
assert . Equals ( t , tc . res . getStatus ( ) , ch . getStatus ( ) )
assert . Equals ( t , tc . res . getToken ( ) , ch . getToken ( ) )
assert . Equals ( t , tc . res . getCreated ( ) , ch . getCreated ( ) )
assert . Equals ( t , tc . res . getValidated ( ) , ch . getValidated ( ) )
assert . Equals ( t , tc . res . getError ( ) , ch . getError ( ) )
}
}
} )
}
}
2020-02-07 14:50:22 +00:00
func TestTLSALPN01Validate ( t * testing . T ) {
type test struct {
srv * httptest . Server
vo validateOptions
ch challenge
res challenge
jwk * jose . JSONWebKey
db nosql . DB
err * Error
}
tests := map [ string ] func ( t * testing . T ) test {
"ok/status-already-valid" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * tlsALPN01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Status = StatusValid
return test {
ch : ch ,
res : ch ,
}
} ,
"ok/status-already-invalid" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * tlsALPN01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Status = StatusInvalid
return test {
ch : ch ,
res : ch ,
}
} ,
"ok/tls-dial-error" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := ConnectionErr ( errors . Errorf ( "error doing TLS dial for %v:443: force" , ch . getValue ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
return test {
ch : ch ,
vo : validateOptions {
tlsDial : func ( network , addr string , config * tls . Config ) ( * tls . Conn , error ) {
return nil , errors . New ( "force" )
} ,
} ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , newval , newb )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/timeout" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := ConnectionErr ( errors . Errorf ( "error doing TLS dial for %v:443: tls: DialWithDialer timed out" , ch . getValue ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( nil )
// srv.Start() - do not start server to cause timeout
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/no-certificates" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
2020-02-10 19:50:13 +00:00
expErr := RejectedIdentifierErr ( errors . Errorf ( "tls-alpn-01 challenge for %v resulted in no certificates" , ch . getValue ( ) ) )
2020-02-07 14:50:22 +00:00
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
return test {
2020-02-10 19:50:13 +00:00
ch : ch ,
2020-02-07 14:50:22 +00:00
vo : validateOptions {
2020-02-10 19:50:13 +00:00
tlsDial : func ( network , addr string , config * tls . Config ) ( * tls . Conn , error ) {
return tls . Client ( & noopConn { } , config ) , nil
} ,
2020-02-07 14:50:22 +00:00
} ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/no-names" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . Errorf ( "incorrect certificate for tls-alpn-01 challenge: leaf certificate must contain a single DNS name, %v" , ch . getValue ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expKeyAuthHash := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
cert , err := newTLSALPNValidationCert ( expKeyAuthHash [ : ] , false , true )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/too-many-names" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . Errorf ( "incorrect certificate for tls-alpn-01 challenge: leaf certificate must contain a single DNS name, %v" , ch . getValue ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expKeyAuthHash := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
cert , err := newTLSALPNValidationCert ( expKeyAuthHash [ : ] , false , true , ch . getValue ( ) , "other.internal" )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/wrong-name" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . Errorf ( "incorrect certificate for tls-alpn-01 challenge: leaf certificate must contain a single DNS name, %v" , ch . getValue ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expKeyAuthHash := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
cert , err := newTLSALPNValidationCert ( expKeyAuthHash [ : ] , false , true , "other.internal" )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/no-extension" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . New ( "incorrect certificate for tls-alpn-01 challenge: missing acmeValidationV1 extension" ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
cert , err := newTLSALPNValidationCert ( nil , false , true , ch . getValue ( ) )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/extension-not-critical" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . New ( "incorrect certificate for tls-alpn-01 challenge: acmeValidationV1 extension not critical" ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expKeyAuthHash := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
cert , err := newTLSALPNValidationCert ( expKeyAuthHash [ : ] , false , false , ch . getValue ( ) )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"ok/extension-malformed" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . New ( "incorrect certificate for tls-alpn-01 challenge: malformed acmeValidationV1 extension value" ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
cert , err := newTLSALPNValidationCert ( [ ] byte { 1 , 2 , 3 } , false , true , ch . getValue ( ) )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
2020-02-07 20:14:08 +00:00
"ok/no-protocol" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . New ( "cannot negotiate ALPN acme-tls/1 protocol for tls-alpn-01 challenge" ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
srv := httptest . NewTLSServer ( nil )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : func ( network , addr string , config * tls . Config ) ( * tls . Conn , error ) {
return tls . DialWithDialer ( & net . Dialer { Timeout : time . Second } , "tcp" , srv . Listener . Addr ( ) . String ( ) , config )
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
2020-02-07 14:50:22 +00:00
"ok/mismatched-token" : func ( t * testing . T ) test {
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expKeyAuthHash := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
incorrectTokenHash := sha256 . Sum256 ( [ ] byte ( "mismatched" ) )
expErr := RejectedIdentifierErr ( errors . Errorf ( "incorrect certificate for tls-alpn-01 challenge: " +
"expected acmeValidationV1 extension value %s for this challenge but got %s" ,
hex . EncodeToString ( expKeyAuthHash [ : ] ) , hex . EncodeToString ( incorrectTokenHash [ : ] ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & tlsALPN01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
cert , err := newTLSALPNValidationCert ( incorrectTokenHash [ : ] , false , true , ch . getValue ( ) )
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
tlsDial : tlsDial ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , string ( newval ) , string ( newb ) )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
2020-02-08 00:26:18 +00:00
"ok/obsolete-oid" : func ( t * testing . T ) test {
2020-02-07 14:50:22 +00:00
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
2020-02-08 00:26:18 +00:00
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . New ( "incorrect certificate for tls-alpn-01 challenge: " +
"obsolete id-pe-acmeIdentifier in acmeValidationV1 extension" ) )
2020-02-07 14:50:22 +00:00
baseClone := ch . clone ( )
2020-02-08 00:26:18 +00:00
baseClone . Error = expErr . ToACME ( )
2020-02-07 14:50:22 +00:00
newCh := & tlsALPN01Challenge { baseClone }
2020-02-08 00:26:18 +00:00
newb , err := json . Marshal ( newCh )
2020-02-07 14:50:22 +00:00
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expKeyAuthHash := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
2020-02-08 00:26:18 +00:00
cert , err := newTLSALPNValidationCert ( expKeyAuthHash [ : ] , true , true , ch . getValue ( ) )
2020-02-07 14:50:22 +00:00
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
2020-02-08 00:26:18 +00:00
tlsDial : tlsDial ,
2020-02-07 14:50:22 +00:00
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
2020-02-08 00:26:18 +00:00
assert . Equals ( t , string ( newval ) , string ( newb ) )
2020-02-07 14:50:22 +00:00
return nil , true , nil
} ,
} ,
2020-02-08 00:26:18 +00:00
res : ch ,
2020-02-07 14:50:22 +00:00
}
} ,
2020-02-08 00:57:29 +00:00
"ok" : func ( t * testing . T ) test {
2020-02-07 14:50:22 +00:00
ch , err := newTLSALPNCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * tlsALPN01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Error = MalformedErr ( nil ) . ToACME ( )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
baseClone := ch . clone ( )
baseClone . Status = StatusValid
baseClone . Error = nil
newCh := & tlsALPN01Challenge { baseClone }
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expKeyAuthHash := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
2020-02-08 00:26:18 +00:00
cert , err := newTLSALPNValidationCert ( expKeyAuthHash [ : ] , false , true , ch . getValue ( ) )
2020-02-07 14:50:22 +00:00
assert . FatalError ( t , err )
srv , tlsDial := newTestTLSALPNServer ( cert )
srv . Start ( )
return test {
srv : srv ,
ch : ch ,
vo : validateOptions {
2020-02-08 00:26:18 +00:00
tlsDial : func ( network , addr string , config * tls . Config ) ( conn * tls . Conn , err error ) {
assert . Equals ( t , network , "tcp" )
assert . Equals ( t , addr , net . JoinHostPort ( newCh . getValue ( ) , "443" ) )
assert . Equals ( t , config . NextProtos , [ ] string { "acme-tls/1" } )
assert . Equals ( t , config . ServerName , newCh . getValue ( ) )
assert . True ( t , config . InsecureSkipVerify )
return tlsDial ( network , addr , config )
} ,
2020-02-07 14:50:22 +00:00
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
alpnCh , err := unmarshalChallenge ( newval )
assert . FatalError ( t , err )
assert . Equals ( t , alpnCh . getStatus ( ) , StatusValid )
assert . True ( t , alpnCh . getValidated ( ) . Before ( time . Now ( ) . UTC ( ) . Add ( time . Minute ) ) )
assert . True ( t , alpnCh . getValidated ( ) . After ( time . Now ( ) . UTC ( ) . Add ( - 1 * time . Second ) ) )
baseClone . Validated = alpnCh . getValidated ( )
return nil , true , nil
} ,
} ,
res : newCh ,
}
} ,
}
for name , run := range tests {
t . Run ( name , func ( t * testing . T ) {
tc := run ( t )
if tc . srv != nil {
defer tc . srv . Close ( )
}
if ch , err := tc . ch . validate ( tc . db , tc . jwk , tc . vo ) ; err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , tc . res . getID ( ) , ch . getID ( ) )
assert . Equals ( t , tc . res . getAccountID ( ) , ch . getAccountID ( ) )
assert . Equals ( t , tc . res . getAuthzID ( ) , ch . getAuthzID ( ) )
assert . Equals ( t , tc . res . getStatus ( ) , ch . getStatus ( ) )
assert . Equals ( t , tc . res . getToken ( ) , ch . getToken ( ) )
assert . Equals ( t , tc . res . getCreated ( ) , ch . getCreated ( ) )
assert . Equals ( t , tc . res . getValidated ( ) , ch . getValidated ( ) )
assert . Equals ( t , tc . res . getError ( ) , ch . getError ( ) )
}
}
} )
}
}
func newTestTLSALPNServer ( validationCert * tls . Certificate ) ( * httptest . Server , tlsDialer ) {
srv := httptest . NewUnstartedServer ( http . NewServeMux ( ) )
srv . Config . TLSNextProto = map [ string ] func ( * http . Server , * tls . Conn , http . Handler ) {
"acme-tls/1" : func ( _ * http . Server , conn * tls . Conn , _ http . Handler ) {
// no-op
} ,
"http/1.1" : func ( _ * http . Server , conn * tls . Conn , _ http . Handler ) {
panic ( "unexpected http/1.1 next proto" )
} ,
}
srv . TLS = & tls . Config {
GetCertificate : func ( hello * tls . ClientHelloInfo ) ( * tls . Certificate , error ) {
2020-02-07 20:14:08 +00:00
if len ( hello . SupportedProtos ) == 1 && hello . SupportedProtos [ 0 ] == "acme-tls/1" {
2020-02-07 14:50:22 +00:00
return validationCert , nil
}
return nil , nil
} ,
NextProtos : [ ] string {
"acme-tls/1" ,
"http/1.1" ,
} ,
}
srv . Listener = tls . NewListener ( srv . Listener , srv . TLS )
2020-02-10 19:50:13 +00:00
//srv.Config.ErrorLog = log.New(ioutil.Discard, "", 0) // hush
2020-02-07 14:50:22 +00:00
return srv , func ( network , addr string , config * tls . Config ) ( conn * tls . Conn , err error ) {
return tls . DialWithDialer ( & net . Dialer { Timeout : time . Second } , "tcp" , srv . Listener . Addr ( ) . String ( ) , config )
}
}
2020-02-10 19:50:13 +00:00
// noopConn is a mock net.Conn that does nothing.
type noopConn struct { }
func ( c * noopConn ) Read ( _ [ ] byte ) ( n int , err error ) { return 0 , io . EOF }
func ( c * noopConn ) Write ( _ [ ] byte ) ( n int , err error ) { return 0 , io . EOF }
func ( c * noopConn ) Close ( ) error { return nil }
func ( c * noopConn ) LocalAddr ( ) net . Addr { return & net . IPAddr { IP : net . IPv4zero , Zone : "" } }
func ( c * noopConn ) RemoteAddr ( ) net . Addr { return & net . IPAddr { IP : net . IPv4zero , Zone : "" } }
func ( c * noopConn ) SetDeadline ( t time . Time ) error { return nil }
func ( c * noopConn ) SetReadDeadline ( t time . Time ) error { return nil }
func ( c * noopConn ) SetWriteDeadline ( t time . Time ) error { return nil }
2020-02-07 14:50:22 +00:00
func newTLSALPNValidationCert ( keyAuthHash [ ] byte , obsoleteOID , critical bool , names ... string ) ( * tls . Certificate , error ) {
privateKey , err := rsa . GenerateKey ( rand . Reader , 2048 )
if err != nil {
return nil , err
}
certTemplate := & x509 . Certificate {
SerialNumber : big . NewInt ( 1337 ) ,
Subject : pkix . Name {
Organization : [ ] string { "Test" } ,
} ,
NotBefore : time . Now ( ) ,
NotAfter : time . Now ( ) . AddDate ( 0 , 0 , 1 ) ,
KeyUsage : x509 . KeyUsageDigitalSignature | x509 . KeyUsageCertSign ,
ExtKeyUsage : [ ] x509 . ExtKeyUsage { x509 . ExtKeyUsageServerAuth } ,
BasicConstraintsValid : true ,
DNSNames : names ,
}
if keyAuthHash != nil {
oid := asn1 . ObjectIdentifier { 1 , 3 , 6 , 1 , 5 , 5 , 7 , 1 , 31 }
if obsoleteOID {
oid = asn1 . ObjectIdentifier { 1 , 3 , 6 , 1 , 5 , 5 , 7 , 1 , 30 , 1 }
}
keyAuthHashEnc , _ := asn1 . Marshal ( keyAuthHash [ : ] )
certTemplate . ExtraExtensions = [ ] pkix . Extension {
{
Id : oid ,
Critical : critical ,
Value : keyAuthHashEnc ,
} ,
}
}
cert , err := x509 . CreateCertificate ( rand . Reader , certTemplate , certTemplate , privateKey . Public ( ) , privateKey )
if err != nil {
return nil , err
}
return & tls . Certificate {
PrivateKey : privateKey ,
Certificate : [ ] [ ] byte { cert } ,
} , nil
}
2019-05-27 00:41:10 +00:00
func TestDNS01Validate ( t * testing . T ) {
type test struct {
vo validateOptions
ch challenge
res challenge
jwk * jose . JSONWebKey
db nosql . DB
err * Error
}
tests := map [ string ] func ( t * testing . T ) test {
"ok/status-already-valid" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * dns01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Status = StatusValid
return test {
ch : ch ,
res : ch ,
}
} ,
"ok/status-already-invalid" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * dns01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Status = StatusInvalid
return test {
ch : ch ,
res : ch ,
}
} ,
"ok/lookup-txt-error" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
expErr := DNSErr ( errors . Errorf ( "error looking up TXT records for " +
"domain %s: force" , ch . getValue ( ) ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & dns01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
return test {
ch : ch ,
vo : validateOptions {
lookupTxt : func ( url string ) ( [ ] string , error ) {
return nil , errors . New ( "force" )
} ,
} ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , newval , newb )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
2019-12-20 20:54:41 +00:00
"ok/lookup-txt-wildcard" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * dns01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Value = "*.zap.internal"
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
h := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
expected := base64 . RawURLEncoding . EncodeToString ( h [ : ] )
baseClone := ch . clone ( )
baseClone . Status = StatusValid
baseClone . Error = nil
newCh := & dns01Challenge { baseClone }
return test {
ch : ch ,
res : newCh ,
vo : validateOptions {
lookupTxt : func ( url string ) ( [ ] string , error ) {
assert . Equals ( t , url , "_acme-challenge.zap.internal" )
return [ ] string { "foo" , expected } , nil
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
dnsCh , err := unmarshalChallenge ( newval )
assert . FatalError ( t , err )
assert . Equals ( t , dnsCh . getStatus ( ) , StatusValid )
baseClone . Validated = dnsCh . getValidated ( )
return nil , true , nil
} ,
} ,
}
} ,
2019-05-27 00:41:10 +00:00
"fail/key-authorization-gen-error" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
jwk . Key = "foo"
return test {
ch : ch ,
vo : validateOptions {
lookupTxt : func ( url string ) ( [ ] string , error ) {
return [ ] string { "foo" , "bar" } , nil
} ,
} ,
jwk : jwk ,
err : ServerInternalErr ( errors . New ( "error generating JWK thumbprint: square/go-jose: unknown key type 'string'" ) ) ,
}
} ,
"ok/key-auth-mismatch" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
expErr := RejectedIdentifierErr ( errors . Errorf ( "keyAuthorization does not match; " +
"expected %s, but got %s" , expKeyAuth , [ ] string { "foo" , "bar" } ) )
baseClone := ch . clone ( )
baseClone . Error = expErr . ToACME ( )
newCh := & http01Challenge { baseClone }
newb , err := json . Marshal ( newCh )
assert . FatalError ( t , err )
return test {
ch : ch ,
vo : validateOptions {
lookupTxt : func ( url string ) ( [ ] string , error ) {
return [ ] string { "foo" , "bar" } , nil
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
assert . Equals ( t , newval , newb )
return nil , true , nil
} ,
} ,
res : ch ,
}
} ,
"fail/save-error" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
h := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
expected := base64 . RawURLEncoding . EncodeToString ( h [ : ] )
return test {
ch : ch ,
vo : validateOptions {
lookupTxt : func ( url string ) ( [ ] string , error ) {
return [ ] string { "foo" , expected } , nil
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
return nil , false , errors . New ( "force" )
} ,
} ,
err : ServerInternalErr ( errors . New ( "error saving acme challenge: force" ) ) ,
}
} ,
"ok" : func ( t * testing . T ) test {
ch , err := newDNSCh ( )
assert . FatalError ( t , err )
_ch , ok := ch . ( * dns01Challenge )
assert . Fatal ( t , ok )
_ch . baseChallenge . Error = MalformedErr ( nil ) . ToACME ( )
oldb , err := json . Marshal ( ch )
assert . FatalError ( t , err )
jwk , err := jose . GenerateJWK ( "EC" , "P-256" , "ES256" , "sig" , "" , 0 )
assert . FatalError ( t , err )
expKeyAuth , err := KeyAuthorization ( ch . getToken ( ) , jwk )
assert . FatalError ( t , err )
h := sha256 . Sum256 ( [ ] byte ( expKeyAuth ) )
expected := base64 . RawURLEncoding . EncodeToString ( h [ : ] )
baseClone := ch . clone ( )
baseClone . Status = StatusValid
baseClone . Error = nil
newCh := & dns01Challenge { baseClone }
return test {
ch : ch ,
res : newCh ,
vo : validateOptions {
lookupTxt : func ( url string ) ( [ ] string , error ) {
return [ ] string { "foo" , expected } , nil
} ,
} ,
jwk : jwk ,
db : & db . MockNoSQLDB {
MCmpAndSwap : func ( bucket , key , old , newval [ ] byte ) ( [ ] byte , bool , error ) {
assert . Equals ( t , bucket , challengeTable )
assert . Equals ( t , key , [ ] byte ( ch . getID ( ) ) )
assert . Equals ( t , old , oldb )
dnsCh , err := unmarshalChallenge ( newval )
assert . FatalError ( t , err )
assert . Equals ( t , dnsCh . getStatus ( ) , StatusValid )
assert . True ( t , dnsCh . getValidated ( ) . Before ( time . Now ( ) . UTC ( ) ) )
assert . True ( t , dnsCh . getValidated ( ) . After ( time . Now ( ) . UTC ( ) . Add ( - 1 * time . Second ) ) )
baseClone . Validated = dnsCh . getValidated ( )
return nil , true , nil
} ,
} ,
}
} ,
}
for name , run := range tests {
t . Run ( name , func ( t * testing . T ) {
tc := run ( t )
if ch , err := tc . ch . validate ( tc . db , tc . jwk , tc . vo ) ; err != nil {
if assert . NotNil ( t , tc . err ) {
ae , ok := err . ( * Error )
assert . True ( t , ok )
assert . HasPrefix ( t , ae . Error ( ) , tc . err . Error ( ) )
assert . Equals ( t , ae . StatusCode ( ) , tc . err . StatusCode ( ) )
assert . Equals ( t , ae . Type , tc . err . Type )
}
} else {
if assert . Nil ( t , tc . err ) {
assert . Equals ( t , tc . res . getID ( ) , ch . getID ( ) )
assert . Equals ( t , tc . res . getAccountID ( ) , ch . getAccountID ( ) )
assert . Equals ( t , tc . res . getAuthzID ( ) , ch . getAuthzID ( ) )
assert . Equals ( t , tc . res . getStatus ( ) , ch . getStatus ( ) )
assert . Equals ( t , tc . res . getToken ( ) , ch . getToken ( ) )
assert . Equals ( t , tc . res . getCreated ( ) , ch . getCreated ( ) )
assert . Equals ( t , tc . res . getValidated ( ) , ch . getValidated ( ) )
assert . Equals ( t , tc . res . getError ( ) , ch . getError ( ) )
}
}
} )
}
}