2018-10-05 21:48:36 +00:00
|
|
|
package authority
|
|
|
|
|
|
|
|
import (
|
2019-07-29 19:34:27 +00:00
|
|
|
"context"
|
2020-02-11 22:05:37 +00:00
|
|
|
"crypto"
|
2020-08-11 01:14:32 +00:00
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/elliptic"
|
2018-10-05 21:48:36 +00:00
|
|
|
"crypto/rand"
|
2022-08-23 19:43:48 +00:00
|
|
|
"crypto/sha1" //nolint:gosec // used to create the Subject Key Identifier by RFC 5280
|
2018-10-05 21:48:36 +00:00
|
|
|
"crypto/x509"
|
|
|
|
"crypto/x509/pkix"
|
2018-10-26 06:49:23 +00:00
|
|
|
"encoding/asn1"
|
2019-08-27 00:52:49 +00:00
|
|
|
"encoding/pem"
|
2022-03-30 08:22:22 +00:00
|
|
|
"errors"
|
2018-10-05 21:48:36 +00:00
|
|
|
"fmt"
|
|
|
|
"net/http"
|
2019-02-15 00:44:36 +00:00
|
|
|
"reflect"
|
2018-10-05 21:48:36 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2022-03-30 08:22:22 +00:00
|
|
|
"gopkg.in/square/go-jose.v2/jwt"
|
2020-09-16 01:14:21 +00:00
|
|
|
|
2020-08-24 21:44:11 +00:00
|
|
|
"go.step.sm/crypto/jose"
|
2020-08-14 22:33:50 +00:00
|
|
|
"go.step.sm/crypto/keyutil"
|
2022-09-21 01:52:47 +00:00
|
|
|
"go.step.sm/crypto/minica"
|
2020-08-14 22:33:50 +00:00
|
|
|
"go.step.sm/crypto/pemutil"
|
2020-08-11 01:14:32 +00:00
|
|
|
"go.step.sm/crypto/x509util"
|
2022-03-30 08:22:22 +00:00
|
|
|
|
|
|
|
"github.com/smallstep/assert"
|
|
|
|
"github.com/smallstep/certificates/api/render"
|
2022-04-24 11:11:32 +00:00
|
|
|
"github.com/smallstep/certificates/authority/policy"
|
2022-03-30 08:22:22 +00:00
|
|
|
"github.com/smallstep/certificates/authority/provisioner"
|
|
|
|
"github.com/smallstep/certificates/cas/softcas"
|
|
|
|
"github.com/smallstep/certificates/db"
|
|
|
|
"github.com/smallstep/certificates/errs"
|
2018-10-05 21:48:36 +00:00
|
|
|
)
|
|
|
|
|
2019-03-12 01:47:57 +00:00
|
|
|
var (
|
|
|
|
stepOIDRoot = asn1.ObjectIdentifier{1, 3, 6, 1, 4, 1, 37476, 9000, 64}
|
|
|
|
stepOIDProvisioner = append(asn1.ObjectIdentifier(nil), append(stepOIDRoot, 1)...)
|
|
|
|
)
|
|
|
|
|
|
|
|
const provisionerTypeJWK = 1
|
|
|
|
|
|
|
|
type stepProvisionerASN1 struct {
|
|
|
|
Type int
|
|
|
|
Name []byte
|
|
|
|
CredentialID []byte
|
|
|
|
}
|
|
|
|
|
2020-03-31 18:41:36 +00:00
|
|
|
type certificateDurationEnforcer struct {
|
|
|
|
NotBefore time.Time
|
|
|
|
NotAfter time.Time
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *certificateDurationEnforcer) Enforce(cert *x509.Certificate) error {
|
|
|
|
cert.NotBefore = m.NotBefore
|
|
|
|
cert.NotAfter = m.NotAfter
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-09-16 20:31:26 +00:00
|
|
|
func getDefaultIssuer(a *Authority) *x509.Certificate {
|
2020-12-24 04:41:10 +00:00
|
|
|
return a.x509CAService.(*softcas.SoftCAS).CertificateChain[len(a.x509CAService.(*softcas.SoftCAS).CertificateChain)-1]
|
2020-09-16 20:31:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func getDefaultSigner(a *Authority) crypto.Signer {
|
|
|
|
return a.x509CAService.(*softcas.SoftCAS).Signer
|
|
|
|
}
|
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
func generateCertificate(t *testing.T, commonName string, sans []string, opts ...interface{}) *x509.Certificate {
|
|
|
|
t.Helper()
|
2019-03-12 01:47:57 +00:00
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
cr, err := x509util.CreateCertificateRequest(commonName, sans, priv)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
template, err := x509util.NewCertificate(cr)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
cert := template.GetCertificate()
|
|
|
|
for _, m := range opts {
|
|
|
|
switch m := m.(type) {
|
|
|
|
case provisioner.CertificateModifierFunc:
|
|
|
|
err = m.Modify(cert, provisioner.SignOptions{})
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
case signerFunc:
|
|
|
|
cert, err = m(cert, priv.Public())
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
default:
|
|
|
|
t.Fatalf("unknown type %T", m)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
return cert
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateRootCertificate(t *testing.T) (*x509.Certificate, crypto.Signer) {
|
|
|
|
t.Helper()
|
|
|
|
priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
cr, err := x509util.CreateCertificateRequest("TestRootCA", nil, priv)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
data := x509util.CreateTemplateData("TestRootCA", nil)
|
|
|
|
template, err := x509util.NewCertificate(cr, x509util.WithTemplate(x509util.DefaultRootTemplate, data))
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
cert := template.GetCertificate()
|
|
|
|
cert, err = x509util.CreateCertificate(cert, cert, priv.Public(), priv)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
return cert, priv
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateIntermidiateCertificate(t *testing.T, issuer *x509.Certificate, signer crypto.Signer) (*x509.Certificate, crypto.Signer) {
|
|
|
|
t.Helper()
|
|
|
|
priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
cr, err := x509util.CreateCertificateRequest("TestIntermediateCA", nil, priv)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
data := x509util.CreateTemplateData("TestIntermediateCA", nil)
|
|
|
|
template, err := x509util.NewCertificate(cr, x509util.WithTemplate(x509util.DefaultRootTemplate, data))
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
cert := template.GetCertificate()
|
|
|
|
cert, err = x509util.CreateCertificate(cert, issuer, priv.Public(), signer)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
return cert, priv
|
|
|
|
}
|
|
|
|
|
|
|
|
func withProvisionerOID(name, kid string) provisioner.CertificateModifierFunc {
|
|
|
|
return func(crt *x509.Certificate, _ provisioner.SignOptions) error {
|
2019-03-12 01:47:57 +00:00
|
|
|
b, err := asn1.Marshal(stepProvisionerASN1{
|
|
|
|
Type: provisionerTypeJWK,
|
|
|
|
Name: []byte(name),
|
|
|
|
CredentialID: []byte(kid),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
crt.ExtraExtensions = append(crt.ExtraExtensions, pkix.Extension{
|
|
|
|
Id: stepOIDProvisioner,
|
|
|
|
Critical: false,
|
|
|
|
Value: b,
|
|
|
|
})
|
2020-08-11 01:14:32 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
2019-03-12 01:47:57 +00:00
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
func withNotBeforeNotAfter(notBefore, notAfter time.Time) provisioner.CertificateModifierFunc {
|
|
|
|
return func(crt *x509.Certificate, _ provisioner.SignOptions) error {
|
|
|
|
crt.NotBefore = notBefore
|
|
|
|
crt.NotAfter = notAfter
|
2019-03-12 01:47:57 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
type signerFunc func(crt *x509.Certificate, pub crypto.PublicKey) (*x509.Certificate, error)
|
|
|
|
|
|
|
|
func withSigner(issuer *x509.Certificate, signer crypto.Signer) signerFunc {
|
|
|
|
return func(crt *x509.Certificate, pub crypto.PublicKey) (*x509.Certificate, error) {
|
|
|
|
return x509util.CreateCertificate(crt, issuer, pub, signer)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-07 00:26:25 +00:00
|
|
|
func getCSR(t *testing.T, priv interface{}, opts ...func(*x509.CertificateRequest)) *x509.CertificateRequest {
|
2018-10-05 21:48:36 +00:00
|
|
|
_csr := &x509.CertificateRequest{
|
2019-02-07 00:26:25 +00:00
|
|
|
Subject: pkix.Name{CommonName: "smallstep test"},
|
2018-10-05 21:48:36 +00:00
|
|
|
DNSNames: []string{"test.smallstep.com"},
|
|
|
|
}
|
2019-02-07 00:26:25 +00:00
|
|
|
for _, opt := range opts {
|
|
|
|
opt(_csr)
|
|
|
|
}
|
2018-10-05 21:48:36 +00:00
|
|
|
csrBytes, err := x509.CreateCertificateRequest(rand.Reader, _csr, priv)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
csr, err := x509.ParseCertificateRequest(csrBytes)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
return csr
|
|
|
|
}
|
|
|
|
|
2020-06-25 06:25:15 +00:00
|
|
|
func setExtraExtsCSR(exts []pkix.Extension) func(*x509.CertificateRequest) {
|
|
|
|
return func(csr *x509.CertificateRequest) {
|
|
|
|
csr.ExtraExtensions = exts
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-21 00:51:33 +00:00
|
|
|
func generateSubjectKeyID(pub crypto.PublicKey) ([]byte, error) {
|
|
|
|
b, err := x509.MarshalPKIXPublicKey(pub)
|
|
|
|
if err != nil {
|
2022-03-30 08:22:22 +00:00
|
|
|
return nil, fmt.Errorf("error marshaling public key: %w", err)
|
2020-07-21 00:51:33 +00:00
|
|
|
}
|
|
|
|
info := struct {
|
|
|
|
Algorithm pkix.AlgorithmIdentifier
|
|
|
|
SubjectPublicKey asn1.BitString
|
|
|
|
}{}
|
|
|
|
if _, err = asn1.Unmarshal(b, &info); err != nil {
|
2022-03-30 08:22:22 +00:00
|
|
|
return nil, fmt.Errorf("error unmarshaling public key: %w", err)
|
2020-07-21 00:51:33 +00:00
|
|
|
}
|
2022-08-23 19:43:48 +00:00
|
|
|
//nolint:gosec // used to create the Subject Key Identifier by RFC 5280
|
2020-07-21 00:51:33 +00:00
|
|
|
hash := sha1.Sum(info.SubjectPublicKey.Bytes)
|
|
|
|
return hash[:], nil
|
|
|
|
}
|
|
|
|
|
2020-06-25 06:25:15 +00:00
|
|
|
type basicConstraints struct {
|
|
|
|
IsCA bool `asn1:"optional"`
|
|
|
|
MaxPathLen int `asn1:"optional,default:-1"`
|
|
|
|
}
|
|
|
|
|
2022-02-02 22:36:58 +00:00
|
|
|
type testEnforcer struct {
|
|
|
|
enforcer func(*x509.Certificate) error
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *testEnforcer) Enforce(cert *x509.Certificate) error {
|
|
|
|
if e.enforcer != nil {
|
|
|
|
return e.enforcer(cert)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-12-20 21:30:05 +00:00
|
|
|
func TestAuthority_Sign(t *testing.T) {
|
2020-08-14 22:33:50 +00:00
|
|
|
pub, priv, err := keyutil.GenerateDefaultKeyPair()
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
a := testAuthority(t)
|
|
|
|
assert.FatalError(t, err)
|
2020-08-10 22:29:18 +00:00
|
|
|
a.config.AuthorityConfig.Template = &ASN1DN{
|
2018-10-05 21:48:36 +00:00
|
|
|
Country: "Tazmania",
|
|
|
|
Organization: "Acme Co",
|
|
|
|
Locality: "Landscapes",
|
|
|
|
Province: "Sudden Cliffs",
|
|
|
|
StreetAddress: "TNT",
|
2018-10-19 05:26:39 +00:00
|
|
|
CommonName: "test.smallstep.com",
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2018-10-19 05:26:39 +00:00
|
|
|
nb := time.Now()
|
2020-07-23 01:24:45 +00:00
|
|
|
signOpts := provisioner.SignOptions{
|
2019-03-25 19:35:21 +00:00
|
|
|
NotBefore: provisioner.NewTimeDuration(nb),
|
|
|
|
NotAfter: provisioner.NewTimeDuration(nb.Add(time.Minute * 5)),
|
2020-07-23 02:18:45 +00:00
|
|
|
Backdate: 1 * time.Minute,
|
2018-10-19 05:26:39 +00:00
|
|
|
}
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2019-03-12 01:15:24 +00:00
|
|
|
// Create a token to get test extra opts.
|
2019-03-08 03:30:17 +00:00
|
|
|
p := a.config.AuthorityConfig.Provisioners[1].(*provisioner.JWK)
|
2020-08-24 21:44:11 +00:00
|
|
|
key, err := jose.ReadKey("testdata/secrets/step_cli_key_priv.jwk", jose.WithPassword([]byte("pass")))
|
2019-03-12 01:15:24 +00:00
|
|
|
assert.FatalError(t, err)
|
2019-12-20 21:30:05 +00:00
|
|
|
token, err := generateToken("smallstep test", "step-cli", testAudiences.Sign[0], []string{"test.smallstep.com"}, time.Now(), key)
|
2019-03-12 01:15:24 +00:00
|
|
|
assert.FatalError(t, err)
|
2019-07-29 19:34:27 +00:00
|
|
|
ctx := provisioner.NewContextWithMethod(context.Background(), provisioner.SignMethod)
|
|
|
|
extraOpts, err := a.Authorize(ctx, token)
|
2019-03-12 01:15:24 +00:00
|
|
|
assert.FatalError(t, err)
|
2018-10-26 06:49:23 +00:00
|
|
|
|
2018-10-05 21:48:36 +00:00
|
|
|
type signTest struct {
|
2022-02-02 22:36:58 +00:00
|
|
|
auth *Authority
|
|
|
|
csr *x509.CertificateRequest
|
|
|
|
signOpts provisioner.SignOptions
|
|
|
|
extraOpts []provisioner.SignOption
|
|
|
|
notBefore time.Time
|
|
|
|
notAfter time.Time
|
|
|
|
extensionsCount int
|
|
|
|
err error
|
|
|
|
code int
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
tests := map[string]func(*testing.T) *signTest{
|
2019-03-21 01:11:45 +00:00
|
|
|
"fail invalid signature": func(t *testing.T) *signTest {
|
2018-10-05 21:48:36 +00:00
|
|
|
csr := getCSR(t, priv)
|
2019-03-21 01:11:45 +00:00
|
|
|
csr.Signature = []byte("foo")
|
2018-10-05 21:48:36 +00:00
|
|
|
return &signTest{
|
2018-10-26 06:49:23 +00:00
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
2019-03-21 01:11:45 +00:00
|
|
|
extraOpts: extraOpts,
|
2018-10-26 06:49:23 +00:00
|
|
|
signOpts: signOpts,
|
2021-11-19 02:44:58 +00:00
|
|
|
err: errors.New("invalid certificate request"),
|
2019-12-20 21:30:05 +00:00
|
|
|
code: http.StatusBadRequest,
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
},
|
2018-10-19 05:26:39 +00:00
|
|
|
"fail invalid extra option": func(t *testing.T) *signTest {
|
2018-10-05 21:48:36 +00:00
|
|
|
csr := getCSR(t, priv)
|
|
|
|
csr.Raw = []byte("foo")
|
|
|
|
return &signTest{
|
2018-10-26 06:49:23 +00:00
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
2019-02-07 00:26:25 +00:00
|
|
|
extraOpts: append(extraOpts, "42"),
|
2018-10-26 06:49:23 +00:00
|
|
|
signOpts: signOpts,
|
2019-12-20 21:30:05 +00:00
|
|
|
err: errors.New("authority.Sign; invalid extra option type string"),
|
|
|
|
code: http.StatusInternalServerError,
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
},
|
2018-10-19 05:26:39 +00:00
|
|
|
"fail merge default ASN1DN": func(t *testing.T) *signTest {
|
2018-10-05 21:48:36 +00:00
|
|
|
_a := testAuthority(t)
|
|
|
|
_a.config.AuthorityConfig.Template = nil
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
return &signTest{
|
2018-10-26 06:49:23 +00:00
|
|
|
auth: _a,
|
|
|
|
csr: csr,
|
2019-02-07 00:26:25 +00:00
|
|
|
extraOpts: extraOpts,
|
2018-10-26 06:49:23 +00:00
|
|
|
signOpts: signOpts,
|
2021-11-24 02:58:16 +00:00
|
|
|
err: errors.New("default ASN1DN template cannot be nil"),
|
|
|
|
code: http.StatusForbidden,
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
},
|
2018-10-19 05:26:39 +00:00
|
|
|
"fail create cert": func(t *testing.T) *signTest {
|
2018-10-05 21:48:36 +00:00
|
|
|
_a := testAuthority(t)
|
2020-09-16 01:14:21 +00:00
|
|
|
_a.x509CAService.(*softcas.SoftCAS).Signer = nil
|
2018-10-05 21:48:36 +00:00
|
|
|
csr := getCSR(t, priv)
|
|
|
|
return &signTest{
|
2018-10-26 06:49:23 +00:00
|
|
|
auth: _a,
|
|
|
|
csr: csr,
|
2019-03-12 01:15:24 +00:00
|
|
|
extraOpts: extraOpts,
|
2018-10-26 06:49:23 +00:00
|
|
|
signOpts: signOpts,
|
2020-07-21 00:51:33 +00:00
|
|
|
err: errors.New("authority.Sign; error creating certificate"),
|
2019-12-20 21:30:05 +00:00
|
|
|
code: http.StatusInternalServerError,
|
2018-10-19 05:26:39 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail provisioner duration claim": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
2020-07-23 01:24:45 +00:00
|
|
|
_signOpts := provisioner.SignOptions{
|
2019-03-25 19:35:21 +00:00
|
|
|
NotBefore: provisioner.NewTimeDuration(nb),
|
|
|
|
NotAfter: provisioner.NewTimeDuration(nb.Add(time.Hour * 25)),
|
2018-10-19 05:26:39 +00:00
|
|
|
}
|
|
|
|
return &signTest{
|
2018-10-26 06:49:23 +00:00
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
2019-02-07 00:26:25 +00:00
|
|
|
extraOpts: extraOpts,
|
2018-10-26 06:49:23 +00:00
|
|
|
signOpts: _signOpts,
|
2021-11-24 02:58:16 +00:00
|
|
|
err: errors.New("requested duration of 25h0m0s is more than the authorized maximum certificate duration of 24h1m0s"),
|
2021-11-24 19:43:24 +00:00
|
|
|
code: http.StatusForbidden,
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
},
|
2019-02-07 00:26:25 +00:00
|
|
|
"fail validate sans when adding common name not in claims": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv, func(csr *x509.CertificateRequest) {
|
|
|
|
csr.DNSNames = append(csr.DNSNames, csr.Subject.CommonName)
|
|
|
|
})
|
|
|
|
return &signTest{
|
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: extraOpts,
|
|
|
|
signOpts: signOpts,
|
2021-11-24 02:58:16 +00:00
|
|
|
err: errors.New("certificate request does not contain the valid DNS names - got [test.smallstep.com smallstep test], want [test.smallstep.com]"),
|
2021-11-24 19:43:24 +00:00
|
|
|
code: http.StatusForbidden,
|
2019-02-07 00:26:25 +00:00
|
|
|
}
|
|
|
|
},
|
2019-08-27 00:52:49 +00:00
|
|
|
"fail rsa key too short": func(t *testing.T) *signTest {
|
|
|
|
shortRSAKeyPEM := `-----BEGIN CERTIFICATE REQUEST-----
|
2019-09-05 01:31:09 +00:00
|
|
|
MIIBhDCB7gIBADAZMRcwFQYDVQQDEw5zbWFsbHN0ZXAgdGVzdDCBnzANBgkqhkiG
|
|
|
|
9w0BAQEFAAOBjQAwgYkCgYEA5JlgH99HvHHsCD6XTqqYj3bXU2oIlnYGoLVs7IJ4
|
|
|
|
k205rv5/YWky2gjdpIv0Tnaf3o57IJ891lB7GiyO5iHIEUv5N9dVzrdUboyzk2uZ
|
|
|
|
7JMMNB43CSLB2oNuwJjLeAM/yBzlhRnvpKjrNSfSV+cH54FXdnbFbcTFMStnjqKG
|
|
|
|
MeECAwEAAaAsMCoGCSqGSIb3DQEJDjEdMBswGQYDVR0RBBIwEIIOc21hbGxzdGVw
|
|
|
|
IHRlc3QwDQYJKoZIhvcNAQELBQADgYEAKwsbr8Zfcq05DgOoJ//cXMFK1SP8ktRU
|
|
|
|
N2++E8Ww0Tet9oyNRArqxxS/UyVio63D3wynzRAB25PFGpYG1cN4b81Gv/foFUT6
|
|
|
|
W5kR63lNVHBHgQmv5mA8YFsfrJHstaz5k727v2LMHEYIf5/3i16d5zhuxUoaPTYr
|
|
|
|
ZYtQ9Ot36qc=
|
2019-08-27 00:52:49 +00:00
|
|
|
-----END CERTIFICATE REQUEST-----`
|
|
|
|
block, _ := pem.Decode([]byte(shortRSAKeyPEM))
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
csr, err := x509.ParseCertificateRequest(block.Bytes)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
return &signTest{
|
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: extraOpts,
|
|
|
|
signOpts: signOpts,
|
2021-11-24 02:58:16 +00:00
|
|
|
err: errors.New("certificate request RSA key must be at least 2048 bits (256 bytes)"),
|
2021-11-24 02:43:36 +00:00
|
|
|
code: http.StatusForbidden,
|
2019-08-27 00:52:49 +00:00
|
|
|
}
|
|
|
|
},
|
2019-03-05 08:07:13 +00:00
|
|
|
"fail store cert in db": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
_a := testAuthority(t)
|
2019-12-20 21:30:05 +00:00
|
|
|
_a.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
return errors.New("force")
|
2019-03-05 08:07:13 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: _a,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: extraOpts,
|
|
|
|
signOpts: signOpts,
|
2019-12-20 21:30:05 +00:00
|
|
|
err: errors.New("authority.Sign; error storing certificate in db: force"),
|
|
|
|
code: http.StatusInternalServerError,
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
},
|
2020-07-23 02:18:45 +00:00
|
|
|
"fail custom template": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
testAuthority := testAuthority(t)
|
|
|
|
p, ok := testAuthority.provisioners.Load("step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
if !ok {
|
|
|
|
t.Fatal("provisioner not found")
|
|
|
|
}
|
|
|
|
p.(*provisioner.JWK).Options = &provisioner.Options{
|
2020-07-31 00:44:22 +00:00
|
|
|
X509: &provisioner.X509Options{Template: `{{ fail "fail message" }}`},
|
2020-07-23 02:18:45 +00:00
|
|
|
}
|
|
|
|
testExtraOpts, err := testAuthority.Authorize(ctx, token)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
testAuthority.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: testAuthority,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: testExtraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
err: errors.New("fail message"),
|
|
|
|
code: http.StatusBadRequest,
|
|
|
|
}
|
|
|
|
},
|
2022-01-12 10:15:39 +00:00
|
|
|
"fail bad JSON syntax template file": func(t *testing.T) *signTest {
|
2022-01-10 14:49:37 +00:00
|
|
|
csr := getCSR(t, priv)
|
|
|
|
testAuthority := testAuthority(t)
|
|
|
|
p, ok := testAuthority.provisioners.Load("step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
if !ok {
|
|
|
|
t.Fatal("provisioner not found")
|
|
|
|
}
|
|
|
|
p.(*provisioner.JWK).Options = &provisioner.Options{
|
|
|
|
X509: &provisioner.X509Options{
|
2022-01-12 10:15:39 +00:00
|
|
|
TemplateFile: "./testdata/templates/badjsonsyntax.tpl",
|
2022-01-10 14:49:37 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
testExtraOpts, err := testAuthority.Authorize(ctx, token)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
testAuthority.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: testAuthority,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: testExtraOpts,
|
|
|
|
signOpts: signOpts,
|
2022-01-12 10:15:39 +00:00
|
|
|
err: errors.New("error applying certificate template: invalid character"),
|
|
|
|
code: http.StatusInternalServerError,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail bad JSON value template file": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
testAuthority := testAuthority(t)
|
|
|
|
p, ok := testAuthority.provisioners.Load("step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
if !ok {
|
|
|
|
t.Fatal("provisioner not found")
|
|
|
|
}
|
|
|
|
p.(*provisioner.JWK).Options = &provisioner.Options{
|
|
|
|
X509: &provisioner.X509Options{
|
|
|
|
TemplateFile: "./testdata/templates/badjsonvalue.tpl",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
testExtraOpts, err := testAuthority.Authorize(ctx, token)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
testAuthority.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: testAuthority,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: testExtraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
err: errors.New("error applying certificate template: cannot unmarshal"),
|
2022-01-10 14:49:37 +00:00
|
|
|
code: http.StatusInternalServerError,
|
|
|
|
}
|
|
|
|
},
|
2022-02-02 22:36:58 +00:00
|
|
|
"fail with provisioner enforcer": func(t *testing.T) *signTest {
|
2018-10-05 21:48:36 +00:00
|
|
|
csr := getCSR(t, priv)
|
2022-02-02 22:36:58 +00:00
|
|
|
aa := testAuthority(t)
|
|
|
|
aa.db = &db.MockAuthDB{
|
2019-12-20 21:30:05 +00:00
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
2019-03-05 08:07:13 +00:00
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
2022-02-02 22:36:58 +00:00
|
|
|
|
2018-10-05 21:48:36 +00:00
|
|
|
return &signTest{
|
2022-02-02 22:36:58 +00:00
|
|
|
auth: aa,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: append(extraOpts, &testEnforcer{
|
|
|
|
enforcer: func(crt *x509.Certificate) error { return fmt.Errorf("an error") },
|
|
|
|
}),
|
|
|
|
signOpts: signOpts,
|
|
|
|
err: errors.New("error creating certificate"),
|
|
|
|
code: http.StatusForbidden,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail with custom enforcer": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
aa := testAuthority(t, WithX509Enforcers(&testEnforcer{
|
|
|
|
enforcer: func(cert *x509.Certificate) error {
|
|
|
|
return fmt.Errorf("an error")
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
aa.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: aa,
|
2018-10-26 06:49:23 +00:00
|
|
|
csr: csr,
|
2019-02-07 00:26:25 +00:00
|
|
|
extraOpts: extraOpts,
|
2018-10-26 06:49:23 +00:00
|
|
|
signOpts: signOpts,
|
2022-02-02 22:36:58 +00:00
|
|
|
err: errors.New("error creating certificate"),
|
|
|
|
code: http.StatusForbidden,
|
|
|
|
}
|
|
|
|
},
|
2022-04-24 11:11:32 +00:00
|
|
|
"fail with policy": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
aa := testAuthority(t)
|
|
|
|
aa.config.AuthorityConfig.Template = a.config.AuthorityConfig.Template
|
|
|
|
aa.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
fmt.Println(crt.Subject)
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
2022-04-26 11:12:16 +00:00
|
|
|
options := &policy.Options{
|
|
|
|
X509: &policy.X509PolicyOptions{
|
|
|
|
DeniedNames: &policy.X509NameOptions{
|
|
|
|
DNSDomains: []string{"test.smallstep.com"},
|
|
|
|
},
|
2022-04-24 11:11:32 +00:00
|
|
|
},
|
|
|
|
}
|
2022-04-26 11:12:16 +00:00
|
|
|
engine, err := policy.New(options)
|
2022-04-24 11:11:32 +00:00
|
|
|
assert.FatalError(t, err)
|
2022-04-26 11:12:16 +00:00
|
|
|
aa.policyEngine = engine
|
2022-04-24 11:11:32 +00:00
|
|
|
return &signTest{
|
|
|
|
auth: aa,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: extraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
notBefore: signOpts.NotBefore.Time().Truncate(time.Second),
|
|
|
|
notAfter: signOpts.NotAfter.Time().Truncate(time.Second),
|
|
|
|
extensionsCount: 6,
|
2022-09-22 01:46:46 +00:00
|
|
|
err: errors.New("dns name \"test.smallstep.com\" not allowed"),
|
2022-04-24 11:11:32 +00:00
|
|
|
code: http.StatusForbidden,
|
|
|
|
}
|
|
|
|
},
|
2022-09-30 00:16:26 +00:00
|
|
|
"fail enriching webhooks": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
csr.Raw = []byte("foo")
|
|
|
|
return &signTest{
|
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
|
|
|
extensionsCount: 7,
|
|
|
|
extraOpts: append(extraOpts, &mockWebhookController{
|
|
|
|
enrichErr: provisioner.ErrWebhookDenied,
|
|
|
|
}),
|
|
|
|
signOpts: signOpts,
|
|
|
|
err: provisioner.ErrWebhookDenied,
|
|
|
|
code: http.StatusForbidden,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail authorizing webhooks": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
csr.Raw = []byte("foo")
|
|
|
|
return &signTest{
|
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
|
|
|
extensionsCount: 7,
|
|
|
|
extraOpts: append(extraOpts, &mockWebhookController{
|
|
|
|
authorizeErr: provisioner.ErrWebhookDenied,
|
|
|
|
}),
|
|
|
|
signOpts: signOpts,
|
|
|
|
err: provisioner.ErrWebhookDenied,
|
|
|
|
code: http.StatusForbidden,
|
|
|
|
}
|
|
|
|
},
|
2022-02-02 22:36:58 +00:00
|
|
|
"ok": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
_a := testAuthority(t)
|
|
|
|
_a.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: extraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
notBefore: signOpts.NotBefore.Time().Truncate(time.Second),
|
|
|
|
notAfter: signOpts.NotAfter.Time().Truncate(time.Second),
|
|
|
|
extensionsCount: 6,
|
2020-03-31 18:41:36 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok with enforced modifier": func(t *testing.T) *signTest {
|
2020-06-25 06:25:15 +00:00
|
|
|
bcExt := pkix.Extension{}
|
|
|
|
bcExt.Id = asn1.ObjectIdentifier{2, 5, 29, 19}
|
|
|
|
bcExt.Critical = false
|
|
|
|
bcExt.Value, err = asn1.Marshal(basicConstraints{IsCA: true, MaxPathLen: 4})
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
csr := getCSR(t, priv, setExtraExtsCSR([]pkix.Extension{
|
|
|
|
bcExt,
|
|
|
|
{Id: stepOIDProvisioner, Value: []byte("foo")},
|
|
|
|
{Id: []int{1, 1, 1}, Value: []byte("bar")}}))
|
2020-03-31 18:41:36 +00:00
|
|
|
now := time.Now().UTC()
|
2022-08-23 19:43:48 +00:00
|
|
|
//nolint:gocritic
|
2020-03-31 18:41:36 +00:00
|
|
|
enforcedExtraOptions := append(extraOpts, &certificateDurationEnforcer{
|
|
|
|
NotBefore: now,
|
|
|
|
NotAfter: now.Add(365 * 24 * time.Hour),
|
|
|
|
})
|
|
|
|
_a := testAuthority(t)
|
|
|
|
_a.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
2022-02-02 22:36:58 +00:00
|
|
|
auth: a,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: enforcedExtraOptions,
|
|
|
|
signOpts: signOpts,
|
|
|
|
notBefore: now.Truncate(time.Second),
|
|
|
|
notAfter: now.Add(365 * 24 * time.Hour).Truncate(time.Second),
|
|
|
|
extensionsCount: 6,
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
2020-07-23 02:18:45 +00:00
|
|
|
},
|
|
|
|
"ok with custom template": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
testAuthority := testAuthority(t)
|
|
|
|
testAuthority.config.AuthorityConfig.Template = a.config.AuthorityConfig.Template
|
|
|
|
p, ok := testAuthority.provisioners.Load("step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
if !ok {
|
|
|
|
t.Fatal("provisioner not found")
|
|
|
|
}
|
|
|
|
p.(*provisioner.JWK).Options = &provisioner.Options{
|
2020-07-31 00:44:22 +00:00
|
|
|
X509: &provisioner.X509Options{Template: `{
|
2020-07-23 02:18:45 +00:00
|
|
|
"subject": {{toJson .Subject}},
|
|
|
|
"dnsNames": {{ toJson .Insecure.CR.DNSNames }},
|
|
|
|
"keyUsage": ["digitalSignature"],
|
|
|
|
"extKeyUsage": ["serverAuth","clientAuth"]
|
2020-07-31 00:44:22 +00:00
|
|
|
}`},
|
2020-07-23 02:18:45 +00:00
|
|
|
}
|
|
|
|
testExtraOpts, err := testAuthority.Authorize(ctx, token)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
testAuthority.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
2022-02-02 22:36:58 +00:00
|
|
|
auth: testAuthority,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: testExtraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
notBefore: signOpts.NotBefore.Time().Truncate(time.Second),
|
|
|
|
notAfter: signOpts.NotAfter.Time().Truncate(time.Second),
|
|
|
|
extensionsCount: 6,
|
2020-07-23 02:18:45 +00:00
|
|
|
}
|
2018-10-05 21:48:36 +00:00
|
|
|
},
|
2022-09-30 00:16:26 +00:00
|
|
|
"ok with enriching webhook": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
testAuthority := testAuthority(t)
|
|
|
|
testAuthority.config.AuthorityConfig.Template = a.config.AuthorityConfig.Template
|
|
|
|
p, ok := testAuthority.provisioners.Load("step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
if !ok {
|
|
|
|
t.Fatal("provisioner not found")
|
|
|
|
}
|
|
|
|
p.(*provisioner.JWK).Options = &provisioner.Options{
|
|
|
|
X509: &provisioner.X509Options{Template: `{
|
|
|
|
"subject": {"commonName": {{ toJson .Webhooks.people.role }} },
|
|
|
|
"dnsNames": {{ toJson .Insecure.CR.DNSNames }},
|
|
|
|
"keyUsage": ["digitalSignature"],
|
|
|
|
"extKeyUsage": ["serverAuth","clientAuth"]
|
|
|
|
}`},
|
|
|
|
}
|
|
|
|
testExtraOpts, err := testAuthority.Authorize(ctx, token)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
testAuthority.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for i, o := range testExtraOpts {
|
|
|
|
if wc, ok := o.(*provisioner.WebhookController); ok {
|
|
|
|
testExtraOpts[i] = &mockWebhookController{
|
|
|
|
templateData: wc.TemplateData,
|
|
|
|
respData: map[string]any{"people": map[string]any{"role": "smallstep test"}},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: testAuthority,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: testExtraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
notBefore: signOpts.NotBefore.Time().Truncate(time.Second),
|
|
|
|
notAfter: signOpts.NotAfter.Time().Truncate(time.Second),
|
|
|
|
extensionsCount: 6,
|
|
|
|
}
|
|
|
|
},
|
2020-08-21 01:48:17 +00:00
|
|
|
"ok/csr with no template critical SAN extension": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv, func(csr *x509.CertificateRequest) {
|
|
|
|
csr.Subject = pkix.Name{}
|
|
|
|
}, func(csr *x509.CertificateRequest) {
|
|
|
|
csr.DNSNames = []string{"foo", "bar"}
|
|
|
|
})
|
|
|
|
now := time.Now().UTC()
|
|
|
|
enforcedExtraOptions := []provisioner.SignOption{&certificateDurationEnforcer{
|
|
|
|
NotBefore: now,
|
|
|
|
NotAfter: now.Add(365 * 24 * time.Hour),
|
|
|
|
}}
|
|
|
|
_a := testAuthority(t)
|
2020-08-28 21:44:43 +00:00
|
|
|
_a.config.AuthorityConfig.Template = &ASN1DN{}
|
2020-08-21 01:48:17 +00:00
|
|
|
_a.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject, pkix.Name{})
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
2022-02-02 22:36:58 +00:00
|
|
|
auth: _a,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: enforcedExtraOptions,
|
|
|
|
signOpts: provisioner.SignOptions{},
|
|
|
|
notBefore: now.Truncate(time.Second),
|
|
|
|
notAfter: now.Add(365 * 24 * time.Hour).Truncate(time.Second),
|
|
|
|
extensionsCount: 5,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok with custom enforcer": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
aa := testAuthority(t, WithX509Enforcers(&testEnforcer{
|
|
|
|
enforcer: func(cert *x509.Certificate) error {
|
|
|
|
cert.CRLDistributionPoints = []string{"http://ca.example.org/leaf.crl"}
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
aa.config.AuthorityConfig.Template = a.config.AuthorityConfig.Template
|
|
|
|
aa.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
assert.Equals(t, crt.CRLDistributionPoints, []string{"http://ca.example.org/leaf.crl"})
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return &signTest{
|
|
|
|
auth: aa,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: extraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
notBefore: signOpts.NotBefore.Time().Truncate(time.Second),
|
|
|
|
notAfter: signOpts.NotAfter.Time().Truncate(time.Second),
|
|
|
|
extensionsCount: 7,
|
2020-08-21 01:48:17 +00:00
|
|
|
}
|
|
|
|
},
|
2022-04-24 11:11:32 +00:00
|
|
|
"ok with policy": func(t *testing.T) *signTest {
|
|
|
|
csr := getCSR(t, priv)
|
|
|
|
aa := testAuthority(t)
|
|
|
|
aa.config.AuthorityConfig.Template = a.config.AuthorityConfig.Template
|
|
|
|
aa.db = &db.MockAuthDB{
|
|
|
|
MStoreCertificate: func(crt *x509.Certificate) error {
|
|
|
|
fmt.Println(crt.Subject)
|
|
|
|
assert.Equals(t, crt.Subject.CommonName, "smallstep test")
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
2022-04-26 11:12:16 +00:00
|
|
|
options := &policy.Options{
|
|
|
|
X509: &policy.X509PolicyOptions{
|
|
|
|
AllowedNames: &policy.X509NameOptions{
|
2022-04-28 12:49:23 +00:00
|
|
|
CommonNames: []string{"smallstep test"},
|
|
|
|
DNSDomains: []string{"*.smallstep.com"},
|
2022-04-26 11:12:16 +00:00
|
|
|
},
|
2022-04-24 11:11:32 +00:00
|
|
|
},
|
|
|
|
}
|
2022-04-26 11:12:16 +00:00
|
|
|
engine, err := policy.New(options)
|
2022-04-24 11:11:32 +00:00
|
|
|
assert.FatalError(t, err)
|
2022-04-26 11:12:16 +00:00
|
|
|
aa.policyEngine = engine
|
2022-04-24 11:11:32 +00:00
|
|
|
return &signTest{
|
|
|
|
auth: aa,
|
|
|
|
csr: csr,
|
|
|
|
extraOpts: extraOpts,
|
|
|
|
signOpts: signOpts,
|
|
|
|
notBefore: signOpts.NotBefore.Time().Truncate(time.Second),
|
|
|
|
notAfter: signOpts.NotAfter.Time().Truncate(time.Second),
|
|
|
|
extensionsCount: 6,
|
|
|
|
}
|
|
|
|
},
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for name, genTestCase := range tests {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
tc := genTestCase(t)
|
|
|
|
|
2019-10-09 19:57:12 +00:00
|
|
|
certChain, err := tc.auth.Sign(tc.csr, tc.signOpts, tc.extraOpts...)
|
2018-10-05 21:48:36 +00:00
|
|
|
if err != nil {
|
2019-12-20 21:30:05 +00:00
|
|
|
if assert.NotNil(t, tc.err, fmt.Sprintf("unexpected error: %s", err)) {
|
|
|
|
assert.Nil(t, certChain)
|
2022-09-22 07:04:31 +00:00
|
|
|
var sc render.StatusCodedError
|
|
|
|
assert.Fatal(t, errors.As(err, &sc), "error does not implement StatusCodedError interface")
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.Equals(t, sc.StatusCode(), tc.code)
|
|
|
|
assert.HasPrefix(t, err.Error(), tc.err.Error())
|
|
|
|
|
2022-08-23 19:43:48 +00:00
|
|
|
var ctxErr *errs.Error
|
|
|
|
assert.Fatal(t, errors.As(err, &ctxErr), "error is not of type *errs.Error")
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.Equals(t, ctxErr.Details["csr"], tc.csr)
|
|
|
|
assert.Equals(t, ctxErr.Details["signOptions"], tc.signOpts)
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
} else {
|
2019-10-09 19:57:12 +00:00
|
|
|
leaf := certChain[0]
|
|
|
|
intermediate := certChain[1]
|
2018-10-05 21:48:36 +00:00
|
|
|
if assert.Nil(t, tc.err) {
|
2020-03-31 18:41:36 +00:00
|
|
|
assert.Equals(t, leaf.NotBefore, tc.notBefore)
|
|
|
|
assert.Equals(t, leaf.NotAfter, tc.notAfter)
|
2018-10-05 21:48:36 +00:00
|
|
|
tmplt := a.config.AuthorityConfig.Template
|
2020-08-21 01:48:17 +00:00
|
|
|
if tc.csr.Subject.CommonName == "" {
|
|
|
|
assert.Equals(t, leaf.Subject, pkix.Name{})
|
|
|
|
} else {
|
2021-11-12 23:46:34 +00:00
|
|
|
assert.Equals(t, leaf.Subject.String(),
|
|
|
|
pkix.Name{
|
2020-08-21 01:48:17 +00:00
|
|
|
Country: []string{tmplt.Country},
|
|
|
|
Organization: []string{tmplt.Organization},
|
|
|
|
Locality: []string{tmplt.Locality},
|
|
|
|
StreetAddress: []string{tmplt.StreetAddress},
|
|
|
|
Province: []string{tmplt.Province},
|
|
|
|
CommonName: "smallstep test",
|
2021-11-12 23:46:34 +00:00
|
|
|
}.String())
|
2020-08-21 01:48:17 +00:00
|
|
|
assert.Equals(t, leaf.DNSNames, []string{"test.smallstep.com"})
|
|
|
|
}
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.Equals(t, leaf.Issuer, intermediate.Subject)
|
|
|
|
assert.Equals(t, leaf.SignatureAlgorithm, x509.ECDSAWithSHA256)
|
|
|
|
assert.Equals(t, leaf.PublicKeyAlgorithm, x509.ECDSA)
|
2020-09-16 20:31:26 +00:00
|
|
|
assert.Equals(t, leaf.ExtKeyUsage, []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth})
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2020-09-16 20:31:26 +00:00
|
|
|
issuer := getDefaultIssuer(a)
|
2020-07-21 00:51:33 +00:00
|
|
|
subjectKeyID, err := generateSubjectKeyID(pub)
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.FatalError(t, err)
|
2020-07-21 00:51:33 +00:00
|
|
|
assert.Equals(t, leaf.SubjectKeyId, subjectKeyID)
|
2020-09-16 20:31:26 +00:00
|
|
|
assert.Equals(t, leaf.AuthorityKeyId, issuer.SubjectKeyId)
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2018-10-26 06:49:23 +00:00
|
|
|
// Verify Provisioner OID
|
|
|
|
found := 0
|
|
|
|
for _, ext := range leaf.Extensions {
|
2020-06-25 06:25:15 +00:00
|
|
|
switch {
|
|
|
|
case ext.Id.Equal(stepOIDProvisioner):
|
|
|
|
found++
|
|
|
|
val := stepProvisionerASN1{}
|
|
|
|
_, err := asn1.Unmarshal(ext.Value, &val)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
assert.Equals(t, val.Type, provisionerTypeJWK)
|
|
|
|
assert.Equals(t, val.Name, []byte(p.Name))
|
|
|
|
assert.Equals(t, val.CredentialID, []byte(p.Key.KeyID))
|
2020-08-21 01:48:17 +00:00
|
|
|
|
2020-06-25 06:25:15 +00:00
|
|
|
// Basic Constraints
|
|
|
|
case ext.Id.Equal(asn1.ObjectIdentifier([]int{2, 5, 29, 19})):
|
|
|
|
val := basicConstraints{}
|
|
|
|
_, err := asn1.Unmarshal(ext.Value, &val)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
assert.False(t, val.IsCA, false)
|
|
|
|
assert.Equals(t, val.MaxPathLen, 0)
|
2020-08-21 01:48:17 +00:00
|
|
|
|
|
|
|
// SAN extension
|
|
|
|
case ext.Id.Equal(asn1.ObjectIdentifier([]int{2, 5, 29, 17})):
|
|
|
|
if tc.csr.Subject.CommonName == "" {
|
|
|
|
// Empty CSR subject test does not use any provisioner extensions.
|
|
|
|
// So provisioner ID ext will be missing.
|
|
|
|
found = 1
|
|
|
|
}
|
2018-10-26 06:49:23 +00:00
|
|
|
}
|
|
|
|
}
|
2018-10-26 21:24:16 +00:00
|
|
|
assert.Equals(t, found, 1)
|
2020-09-16 20:31:26 +00:00
|
|
|
realIntermediate, err := x509.ParseCertificate(issuer.Raw)
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.FatalError(t, err)
|
|
|
|
assert.Equals(t, intermediate, realIntermediate)
|
2022-02-02 22:36:58 +00:00
|
|
|
assert.Len(t, tc.extensionsCount, leaf.Extensions)
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-09 19:11:40 +00:00
|
|
|
func TestAuthority_Renew(t *testing.T) {
|
|
|
|
a := testAuthority(t)
|
2020-08-10 22:29:18 +00:00
|
|
|
a.config.AuthorityConfig.Template = &ASN1DN{
|
2020-07-09 19:11:40 +00:00
|
|
|
Country: "Tazmania",
|
|
|
|
Organization: "Acme Co",
|
|
|
|
Locality: "Landscapes",
|
|
|
|
Province: "Sudden Cliffs",
|
|
|
|
StreetAddress: "TNT",
|
|
|
|
CommonName: "renew",
|
|
|
|
}
|
|
|
|
|
|
|
|
now := time.Now().UTC()
|
|
|
|
nb1 := now.Add(-time.Minute * 7)
|
2022-03-10 02:43:45 +00:00
|
|
|
na1 := now.Add(time.Hour)
|
2020-07-23 01:24:45 +00:00
|
|
|
so := &provisioner.SignOptions{
|
2020-07-09 19:11:40 +00:00
|
|
|
NotBefore: provisioner.NewTimeDuration(nb1),
|
|
|
|
NotAfter: provisioner.NewTimeDuration(na1),
|
|
|
|
}
|
|
|
|
|
2020-09-16 20:31:26 +00:00
|
|
|
issuer := getDefaultIssuer(a)
|
|
|
|
signer := getDefaultSigner(a)
|
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
cert := generateCertificate(t, "renew", []string{"test.smallstep.com", "test"},
|
|
|
|
withNotBeforeNotAfter(so.NotBefore.Time(), so.NotAfter.Time()),
|
|
|
|
withDefaultASN1DN(a.config.AuthorityConfig.Template),
|
|
|
|
withProvisionerOID("Max", a.config.AuthorityConfig.Provisioners[0].(*provisioner.JWK).Key.KeyID),
|
2020-09-16 20:31:26 +00:00
|
|
|
withSigner(issuer, signer))
|
2020-07-09 19:11:40 +00:00
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
certNoRenew := generateCertificate(t, "renew", []string{"test.smallstep.com", "test"},
|
|
|
|
withNotBeforeNotAfter(so.NotBefore.Time(), so.NotAfter.Time()),
|
|
|
|
withDefaultASN1DN(a.config.AuthorityConfig.Template),
|
2020-07-09 19:11:40 +00:00
|
|
|
withProvisionerOID("dev", a.config.AuthorityConfig.Provisioners[2].(*provisioner.JWK).Key.KeyID),
|
2020-09-16 20:31:26 +00:00
|
|
|
withSigner(issuer, signer))
|
2020-07-09 19:11:40 +00:00
|
|
|
|
|
|
|
type renewTest struct {
|
|
|
|
auth *Authority
|
|
|
|
cert *x509.Certificate
|
|
|
|
err error
|
|
|
|
code int
|
|
|
|
}
|
|
|
|
tests := map[string]func() (*renewTest, error){
|
|
|
|
"fail/create-cert": func() (*renewTest, error) {
|
|
|
|
_a := testAuthority(t)
|
2020-09-16 01:14:21 +00:00
|
|
|
_a.x509CAService.(*softcas.SoftCAS).Signer = nil
|
2020-07-09 19:11:40 +00:00
|
|
|
return &renewTest{
|
|
|
|
auth: _a,
|
|
|
|
cert: cert,
|
2020-08-06 02:09:06 +00:00
|
|
|
err: errors.New("authority.Rekey: error creating certificate"),
|
2020-07-09 19:11:40 +00:00
|
|
|
code: http.StatusInternalServerError,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
"fail/unauthorized": func() (*renewTest, error) {
|
|
|
|
return &renewTest{
|
|
|
|
cert: certNoRenew,
|
2022-03-10 02:43:45 +00:00
|
|
|
err: errors.New("authority.Rekey: authority.authorizeRenew: renew is disabled for provisioner 'dev'"),
|
2020-07-09 19:11:40 +00:00
|
|
|
code: http.StatusUnauthorized,
|
|
|
|
}, nil
|
|
|
|
},
|
2022-03-10 21:01:08 +00:00
|
|
|
"fail/WithAuthorizeRenewFunc": func() (*renewTest, error) {
|
|
|
|
aa := testAuthority(t, WithAuthorizeRenewFunc(func(ctx context.Context, p *provisioner.Controller, cert *x509.Certificate) error {
|
|
|
|
return errs.Unauthorized("not authorized")
|
|
|
|
}))
|
|
|
|
aa.x509CAService = a.x509CAService
|
|
|
|
aa.config.AuthorityConfig.Template = a.config.AuthorityConfig.Template
|
|
|
|
return &renewTest{
|
|
|
|
auth: aa,
|
|
|
|
cert: cert,
|
|
|
|
err: errors.New("authority.Rekey: authority.authorizeRenew: not authorized"),
|
|
|
|
code: http.StatusUnauthorized,
|
|
|
|
}, nil
|
|
|
|
},
|
2020-07-09 19:11:40 +00:00
|
|
|
"ok": func() (*renewTest, error) {
|
|
|
|
return &renewTest{
|
|
|
|
auth: a,
|
|
|
|
cert: cert,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
"ok/success-new-intermediate": func() (*renewTest, error) {
|
2020-08-11 01:14:32 +00:00
|
|
|
rootCert, rootSigner := generateRootCertificate(t)
|
|
|
|
intCert, intSigner := generateIntermidiateCertificate(t, rootCert, rootSigner)
|
2020-07-09 19:11:40 +00:00
|
|
|
|
|
|
|
_a := testAuthority(t)
|
2020-12-24 04:41:10 +00:00
|
|
|
_a.x509CAService.(*softcas.SoftCAS).CertificateChain = []*x509.Certificate{intCert}
|
2020-09-16 01:14:21 +00:00
|
|
|
_a.x509CAService.(*softcas.SoftCAS).Signer = intSigner
|
2020-07-09 19:11:40 +00:00
|
|
|
return &renewTest{
|
|
|
|
auth: _a,
|
|
|
|
cert: cert,
|
|
|
|
}, nil
|
|
|
|
},
|
2022-03-10 21:01:08 +00:00
|
|
|
"ok/WithAuthorizeRenewFunc": func() (*renewTest, error) {
|
|
|
|
aa := testAuthority(t, WithAuthorizeRenewFunc(func(ctx context.Context, p *provisioner.Controller, cert *x509.Certificate) error {
|
|
|
|
return nil
|
|
|
|
}))
|
|
|
|
aa.x509CAService = a.x509CAService
|
|
|
|
aa.config.AuthorityConfig.Template = a.config.AuthorityConfig.Template
|
|
|
|
return &renewTest{
|
|
|
|
auth: aa,
|
|
|
|
cert: cert,
|
|
|
|
}, nil
|
|
|
|
},
|
2020-07-09 19:11:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for name, genTestCase := range tests {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
tc, err := genTestCase()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
var certChain []*x509.Certificate
|
|
|
|
if tc.auth != nil {
|
|
|
|
certChain, err = tc.auth.Renew(tc.cert)
|
|
|
|
} else {
|
|
|
|
certChain, err = a.Renew(tc.cert)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if assert.NotNil(t, tc.err, fmt.Sprintf("unexpected error: %s", err)) {
|
|
|
|
assert.Nil(t, certChain)
|
2022-09-22 07:04:31 +00:00
|
|
|
var sc render.StatusCodedError
|
|
|
|
assert.Fatal(t, errors.As(err, &sc), "error does not implement StatusCodedError interface")
|
2020-07-09 19:11:40 +00:00
|
|
|
assert.Equals(t, sc.StatusCode(), tc.code)
|
|
|
|
assert.HasPrefix(t, err.Error(), tc.err.Error())
|
|
|
|
|
2022-08-23 19:43:48 +00:00
|
|
|
var ctxErr *errs.Error
|
|
|
|
assert.Fatal(t, errors.As(err, &ctxErr), "error is not of type *errs.Error")
|
2020-07-09 19:11:40 +00:00
|
|
|
assert.Equals(t, ctxErr.Details["serialNumber"], tc.cert.SerialNumber.String())
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
leaf := certChain[0]
|
|
|
|
intermediate := certChain[1]
|
|
|
|
if assert.Nil(t, tc.err) {
|
|
|
|
assert.Equals(t, leaf.NotAfter.Sub(leaf.NotBefore), tc.cert.NotAfter.Sub(cert.NotBefore))
|
|
|
|
|
|
|
|
assert.True(t, leaf.NotBefore.After(now.Add(-2*time.Minute)))
|
|
|
|
assert.True(t, leaf.NotBefore.Before(now.Add(time.Minute)))
|
|
|
|
|
|
|
|
expiry := now.Add(time.Minute * 7)
|
|
|
|
assert.True(t, leaf.NotAfter.After(expiry.Add(-2*time.Minute)))
|
2022-03-10 02:43:45 +00:00
|
|
|
assert.True(t, leaf.NotAfter.Before(expiry.Add(time.Hour)))
|
2020-07-09 19:11:40 +00:00
|
|
|
|
|
|
|
tmplt := a.config.AuthorityConfig.Template
|
2021-11-12 23:46:34 +00:00
|
|
|
assert.Equals(t, leaf.Subject.String(),
|
|
|
|
pkix.Name{
|
2020-07-09 19:11:40 +00:00
|
|
|
Country: []string{tmplt.Country},
|
|
|
|
Organization: []string{tmplt.Organization},
|
|
|
|
Locality: []string{tmplt.Locality},
|
|
|
|
StreetAddress: []string{tmplt.StreetAddress},
|
|
|
|
Province: []string{tmplt.Province},
|
|
|
|
CommonName: tmplt.CommonName,
|
2021-11-12 23:46:34 +00:00
|
|
|
}.String())
|
2020-07-09 19:11:40 +00:00
|
|
|
assert.Equals(t, leaf.Issuer, intermediate.Subject)
|
|
|
|
|
|
|
|
assert.Equals(t, leaf.SignatureAlgorithm, x509.ECDSAWithSHA256)
|
|
|
|
assert.Equals(t, leaf.PublicKeyAlgorithm, x509.ECDSA)
|
|
|
|
assert.Equals(t, leaf.ExtKeyUsage,
|
|
|
|
[]x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth})
|
|
|
|
assert.Equals(t, leaf.DNSNames, []string{"test.smallstep.com", "test"})
|
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
subjectKeyID, err := generateSubjectKeyID(leaf.PublicKey)
|
2020-07-09 19:11:40 +00:00
|
|
|
assert.FatalError(t, err)
|
2020-07-21 00:51:33 +00:00
|
|
|
assert.Equals(t, leaf.SubjectKeyId, subjectKeyID)
|
2020-07-09 19:11:40 +00:00
|
|
|
|
|
|
|
// We did not change the intermediate before renewing.
|
2020-09-16 20:31:26 +00:00
|
|
|
authIssuer := getDefaultIssuer(tc.auth)
|
|
|
|
if issuer.SerialNumber == authIssuer.SerialNumber {
|
|
|
|
assert.Equals(t, leaf.AuthorityKeyId, issuer.SubjectKeyId)
|
2020-07-09 19:11:40 +00:00
|
|
|
// Compare extensions: they can be in a different order
|
|
|
|
for _, ext1 := range tc.cert.Extensions {
|
|
|
|
//skip SubjectKeyIdentifier
|
|
|
|
if ext1.Id.Equal(oidSubjectKeyIdentifier) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
found := false
|
|
|
|
for _, ext2 := range leaf.Extensions {
|
|
|
|
if reflect.DeepEqual(ext1, ext2) {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
t.Errorf("x509 extension %s not found in renewed certificate", ext1.Id.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// We did change the intermediate before renewing.
|
2020-09-16 20:31:26 +00:00
|
|
|
assert.Equals(t, leaf.AuthorityKeyId, authIssuer.SubjectKeyId)
|
2020-07-09 19:11:40 +00:00
|
|
|
// Compare extensions: they can be in a different order
|
|
|
|
for _, ext1 := range tc.cert.Extensions {
|
|
|
|
//skip SubjectKeyIdentifier
|
|
|
|
if ext1.Id.Equal(oidSubjectKeyIdentifier) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// The authority key id extension should be different b/c the intermediates are different.
|
|
|
|
if ext1.Id.Equal(oidAuthorityKeyIdentifier) {
|
|
|
|
for _, ext2 := range leaf.Extensions {
|
|
|
|
assert.False(t, reflect.DeepEqual(ext1, ext2))
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else {
|
|
|
|
found := false
|
|
|
|
for _, ext2 := range leaf.Extensions {
|
|
|
|
if reflect.DeepEqual(ext1, ext2) {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
t.Errorf("x509 extension %s not found in renewed certificate", ext1.Id.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-16 20:31:26 +00:00
|
|
|
realIntermediate, err := x509.ParseCertificate(authIssuer.Raw)
|
2020-07-09 19:11:40 +00:00
|
|
|
assert.FatalError(t, err)
|
|
|
|
assert.Equals(t, intermediate, realIntermediate)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-08 06:17:59 +00:00
|
|
|
func TestAuthority_Rekey(t *testing.T) {
|
2020-08-14 22:33:50 +00:00
|
|
|
pub, _, err := keyutil.GenerateDefaultKeyPair()
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
a := testAuthority(t)
|
2020-08-10 22:29:18 +00:00
|
|
|
a.config.AuthorityConfig.Template = &ASN1DN{
|
2018-10-05 21:48:36 +00:00
|
|
|
Country: "Tazmania",
|
|
|
|
Organization: "Acme Co",
|
|
|
|
Locality: "Landscapes",
|
|
|
|
Province: "Sudden Cliffs",
|
|
|
|
StreetAddress: "TNT",
|
|
|
|
CommonName: "renew",
|
|
|
|
}
|
|
|
|
|
|
|
|
now := time.Now().UTC()
|
|
|
|
nb1 := now.Add(-time.Minute * 7)
|
2022-03-10 02:43:45 +00:00
|
|
|
na1 := now.Add(time.Hour)
|
2020-07-23 01:24:45 +00:00
|
|
|
so := &provisioner.SignOptions{
|
2019-03-25 19:35:21 +00:00
|
|
|
NotBefore: provisioner.NewTimeDuration(nb1),
|
|
|
|
NotAfter: provisioner.NewTimeDuration(na1),
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2020-09-16 20:31:26 +00:00
|
|
|
issuer := getDefaultIssuer(a)
|
|
|
|
signer := getDefaultSigner(a)
|
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
cert := generateCertificate(t, "renew", []string{"test.smallstep.com", "test"},
|
|
|
|
withNotBeforeNotAfter(so.NotBefore.Time(), so.NotAfter.Time()),
|
|
|
|
withDefaultASN1DN(a.config.AuthorityConfig.Template),
|
|
|
|
withProvisionerOID("Max", a.config.AuthorityConfig.Provisioners[0].(*provisioner.JWK).Key.KeyID),
|
2020-09-16 20:31:26 +00:00
|
|
|
withSigner(issuer, signer))
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2020-08-11 01:14:32 +00:00
|
|
|
certNoRenew := generateCertificate(t, "renew", []string{"test.smallstep.com", "test"},
|
|
|
|
withNotBeforeNotAfter(so.NotBefore.Time(), so.NotAfter.Time()),
|
|
|
|
withDefaultASN1DN(a.config.AuthorityConfig.Template),
|
2019-03-08 03:30:17 +00:00
|
|
|
withProvisionerOID("dev", a.config.AuthorityConfig.Provisioners[2].(*provisioner.JWK).Key.KeyID),
|
2020-09-16 20:31:26 +00:00
|
|
|
withSigner(issuer, signer))
|
2018-11-01 22:43:24 +00:00
|
|
|
|
2018-10-05 21:48:36 +00:00
|
|
|
type renewTest struct {
|
|
|
|
auth *Authority
|
2019-12-20 21:30:05 +00:00
|
|
|
cert *x509.Certificate
|
2020-07-09 19:11:40 +00:00
|
|
|
pk crypto.PublicKey
|
2019-12-20 21:30:05 +00:00
|
|
|
err error
|
|
|
|
code int
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
tests := map[string]func() (*renewTest, error){
|
2020-07-09 19:11:40 +00:00
|
|
|
"fail/create-cert": func() (*renewTest, error) {
|
2018-10-05 21:48:36 +00:00
|
|
|
_a := testAuthority(t)
|
2020-09-16 01:14:21 +00:00
|
|
|
_a.x509CAService.(*softcas.SoftCAS).Signer = nil
|
2018-10-05 21:48:36 +00:00
|
|
|
return &renewTest{
|
|
|
|
auth: _a,
|
2019-12-20 21:30:05 +00:00
|
|
|
cert: cert,
|
2020-08-06 02:09:06 +00:00
|
|
|
err: errors.New("authority.Rekey: error creating certificate"),
|
2019-12-20 21:30:05 +00:00
|
|
|
code: http.StatusInternalServerError,
|
2018-10-05 21:48:36 +00:00
|
|
|
}, nil
|
|
|
|
},
|
2020-07-09 19:11:40 +00:00
|
|
|
"fail/unauthorized": func() (*renewTest, error) {
|
2018-11-01 22:43:24 +00:00
|
|
|
return &renewTest{
|
2019-12-20 21:30:05 +00:00
|
|
|
cert: certNoRenew,
|
2022-03-10 02:43:45 +00:00
|
|
|
err: errors.New("authority.Rekey: authority.authorizeRenew: renew is disabled for provisioner 'dev'"),
|
2019-12-20 21:30:05 +00:00
|
|
|
code: http.StatusUnauthorized,
|
2018-11-01 22:43:24 +00:00
|
|
|
}, nil
|
|
|
|
},
|
2020-07-09 19:11:40 +00:00
|
|
|
"ok/renew": func() (*renewTest, error) {
|
|
|
|
return &renewTest{
|
|
|
|
auth: a,
|
|
|
|
cert: cert,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
"ok/rekey": func() (*renewTest, error) {
|
2018-10-05 21:48:36 +00:00
|
|
|
return &renewTest{
|
2019-02-15 03:17:42 +00:00
|
|
|
auth: a,
|
2019-12-20 21:30:05 +00:00
|
|
|
cert: cert,
|
2020-08-11 01:14:32 +00:00
|
|
|
pk: pub,
|
2019-02-15 03:17:42 +00:00
|
|
|
}, nil
|
|
|
|
},
|
2020-07-09 19:11:40 +00:00
|
|
|
"ok/renew/success-new-intermediate": func() (*renewTest, error) {
|
2020-08-11 01:14:32 +00:00
|
|
|
rootCert, rootSigner := generateRootCertificate(t)
|
|
|
|
intCert, intSigner := generateIntermidiateCertificate(t, rootCert, rootSigner)
|
2019-02-15 03:17:42 +00:00
|
|
|
|
|
|
|
_a := testAuthority(t)
|
2020-12-24 04:41:10 +00:00
|
|
|
_a.x509CAService.(*softcas.SoftCAS).CertificateChain = []*x509.Certificate{intCert}
|
2020-09-16 01:14:21 +00:00
|
|
|
_a.x509CAService.(*softcas.SoftCAS).Signer = intSigner
|
2019-02-15 03:17:42 +00:00
|
|
|
return &renewTest{
|
|
|
|
auth: _a,
|
2019-12-20 21:30:05 +00:00
|
|
|
cert: cert,
|
2018-10-05 21:48:36 +00:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, genTestCase := range tests {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
tc, err := genTestCase()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
2019-10-09 19:57:12 +00:00
|
|
|
var certChain []*x509.Certificate
|
2018-10-05 21:48:36 +00:00
|
|
|
if tc.auth != nil {
|
2020-07-09 19:11:40 +00:00
|
|
|
certChain, err = tc.auth.Rekey(tc.cert, tc.pk)
|
2018-10-05 21:48:36 +00:00
|
|
|
} else {
|
2020-07-09 19:11:40 +00:00
|
|
|
certChain, err = a.Rekey(tc.cert, tc.pk)
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
2019-12-20 21:30:05 +00:00
|
|
|
if assert.NotNil(t, tc.err, fmt.Sprintf("unexpected error: %s", err)) {
|
|
|
|
assert.Nil(t, certChain)
|
2022-09-22 07:04:31 +00:00
|
|
|
var sc render.StatusCodedError
|
|
|
|
assert.Fatal(t, errors.As(err, &sc), "error does not implement StatusCodedError interface")
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.Equals(t, sc.StatusCode(), tc.code)
|
|
|
|
assert.HasPrefix(t, err.Error(), tc.err.Error())
|
|
|
|
|
2022-08-23 19:43:48 +00:00
|
|
|
var ctxErr *errs.Error
|
|
|
|
assert.Fatal(t, errors.As(err, &ctxErr), "error is not of type *errs.Error")
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.Equals(t, ctxErr.Details["serialNumber"], tc.cert.SerialNumber.String())
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
} else {
|
2019-10-09 19:57:12 +00:00
|
|
|
leaf := certChain[0]
|
|
|
|
intermediate := certChain[1]
|
2018-10-05 21:48:36 +00:00
|
|
|
if assert.Nil(t, tc.err) {
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.Equals(t, leaf.NotAfter.Sub(leaf.NotBefore), tc.cert.NotAfter.Sub(cert.NotBefore))
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.True(t, leaf.NotBefore.After(now.Add(-2*time.Minute)))
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.True(t, leaf.NotBefore.Before(now.Add(time.Minute)))
|
|
|
|
|
|
|
|
expiry := now.Add(time.Minute * 7)
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.True(t, leaf.NotAfter.After(expiry.Add(-2*time.Minute)))
|
2022-03-10 02:43:45 +00:00
|
|
|
assert.True(t, leaf.NotAfter.Before(expiry.Add(time.Hour)))
|
2018-10-05 21:48:36 +00:00
|
|
|
|
|
|
|
tmplt := a.config.AuthorityConfig.Template
|
2021-11-12 23:46:34 +00:00
|
|
|
assert.Equals(t, leaf.Subject.String(),
|
|
|
|
pkix.Name{
|
2018-10-05 21:48:36 +00:00
|
|
|
Country: []string{tmplt.Country},
|
|
|
|
Organization: []string{tmplt.Organization},
|
|
|
|
Locality: []string{tmplt.Locality},
|
|
|
|
StreetAddress: []string{tmplt.StreetAddress},
|
|
|
|
Province: []string{tmplt.Province},
|
|
|
|
CommonName: tmplt.CommonName,
|
2021-11-12 23:46:34 +00:00
|
|
|
}.String())
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.Equals(t, leaf.Issuer, intermediate.Subject)
|
|
|
|
|
|
|
|
assert.Equals(t, leaf.SignatureAlgorithm, x509.ECDSAWithSHA256)
|
|
|
|
assert.Equals(t, leaf.PublicKeyAlgorithm, x509.ECDSA)
|
|
|
|
assert.Equals(t, leaf.ExtKeyUsage,
|
|
|
|
[]x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth})
|
|
|
|
assert.Equals(t, leaf.DNSNames, []string{"test.smallstep.com", "test"})
|
|
|
|
|
2020-07-09 19:11:40 +00:00
|
|
|
// Test Public Key and SubjectKeyId
|
|
|
|
expectedPK := tc.pk
|
|
|
|
if tc.pk == nil {
|
|
|
|
expectedPK = cert.PublicKey
|
|
|
|
}
|
|
|
|
assert.Equals(t, leaf.PublicKey, expectedPK)
|
|
|
|
|
2020-07-21 21:34:55 +00:00
|
|
|
subjectKeyID, err := generateSubjectKeyID(expectedPK)
|
2018-10-05 21:48:36 +00:00
|
|
|
assert.FatalError(t, err)
|
2020-07-21 21:34:55 +00:00
|
|
|
assert.Equals(t, leaf.SubjectKeyId, subjectKeyID)
|
2020-07-09 19:11:40 +00:00
|
|
|
if tc.pk == nil {
|
|
|
|
assert.Equals(t, leaf.SubjectKeyId, cert.SubjectKeyId)
|
|
|
|
}
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2019-02-15 03:17:42 +00:00
|
|
|
// We did not change the intermediate before renewing.
|
2020-09-16 20:31:26 +00:00
|
|
|
authIssuer := getDefaultIssuer(tc.auth)
|
|
|
|
if issuer.SerialNumber == authIssuer.SerialNumber {
|
|
|
|
assert.Equals(t, leaf.AuthorityKeyId, issuer.SubjectKeyId)
|
2019-02-15 03:17:42 +00:00
|
|
|
// Compare extensions: they can be in a different order
|
2019-12-20 21:30:05 +00:00
|
|
|
for _, ext1 := range tc.cert.Extensions {
|
2020-07-05 16:47:57 +00:00
|
|
|
//skip SubjectKeyIdentifier
|
|
|
|
if ext1.Id.Equal(oidSubjectKeyIdentifier) {
|
|
|
|
continue
|
|
|
|
}
|
2019-02-15 03:17:42 +00:00
|
|
|
found := false
|
|
|
|
for _, ext2 := range leaf.Extensions {
|
|
|
|
if reflect.DeepEqual(ext1, ext2) {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
t.Errorf("x509 extension %s not found in renewed certificate", ext1.Id.String())
|
2019-02-15 00:44:36 +00:00
|
|
|
}
|
|
|
|
}
|
2019-02-15 03:17:42 +00:00
|
|
|
} else {
|
|
|
|
// We did change the intermediate before renewing.
|
2020-09-16 20:31:26 +00:00
|
|
|
assert.Equals(t, leaf.AuthorityKeyId, authIssuer.SubjectKeyId)
|
2019-02-15 03:17:42 +00:00
|
|
|
// Compare extensions: they can be in a different order
|
2019-12-20 21:30:05 +00:00
|
|
|
for _, ext1 := range tc.cert.Extensions {
|
2020-07-05 16:47:57 +00:00
|
|
|
//skip SubjectKeyIdentifier
|
|
|
|
if ext1.Id.Equal(oidSubjectKeyIdentifier) {
|
|
|
|
continue
|
|
|
|
}
|
2019-02-15 03:17:42 +00:00
|
|
|
// The authority key id extension should be different b/c the intermediates are different.
|
|
|
|
if ext1.Id.Equal(oidAuthorityKeyIdentifier) {
|
|
|
|
for _, ext2 := range leaf.Extensions {
|
|
|
|
assert.False(t, reflect.DeepEqual(ext1, ext2))
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
} else {
|
|
|
|
found := false
|
|
|
|
for _, ext2 := range leaf.Extensions {
|
|
|
|
if reflect.DeepEqual(ext1, ext2) {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
t.Errorf("x509 extension %s not found in renewed certificate", ext1.Id.String())
|
|
|
|
}
|
|
|
|
}
|
2019-02-15 00:44:36 +00:00
|
|
|
}
|
|
|
|
}
|
2019-02-15 03:17:42 +00:00
|
|
|
|
2020-09-16 20:31:26 +00:00
|
|
|
realIntermediate, err := x509.ParseCertificate(authIssuer.Raw)
|
2019-02-15 03:17:42 +00:00
|
|
|
assert.FatalError(t, err)
|
|
|
|
assert.Equals(t, intermediate, realIntermediate)
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-20 21:30:05 +00:00
|
|
|
func TestAuthority_GetTLSOptions(t *testing.T) {
|
2018-10-05 21:48:36 +00:00
|
|
|
type renewTest struct {
|
|
|
|
auth *Authority
|
2020-08-10 22:29:18 +00:00
|
|
|
opts *TLSOptions
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
tests := map[string]func() (*renewTest, error){
|
|
|
|
"default": func() (*renewTest, error) {
|
|
|
|
a := testAuthority(t)
|
|
|
|
return &renewTest{auth: a, opts: &DefaultTLSOptions}, nil
|
|
|
|
},
|
|
|
|
"non-default": func() (*renewTest, error) {
|
|
|
|
a := testAuthority(t)
|
2020-08-10 22:29:18 +00:00
|
|
|
a.config.TLS = &TLSOptions{
|
|
|
|
CipherSuites: CipherSuites{
|
2018-10-05 21:48:36 +00:00
|
|
|
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305",
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
|
|
|
|
},
|
|
|
|
MinVersion: 1.0,
|
|
|
|
MaxVersion: 1.1,
|
|
|
|
Renegotiation: true,
|
|
|
|
}
|
|
|
|
return &renewTest{auth: a, opts: a.config.TLS}, nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, genTestCase := range tests {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
tc, err := genTestCase()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
opts := tc.auth.GetTLSOptions()
|
|
|
|
assert.Equals(t, opts, tc.opts)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2019-03-05 08:07:13 +00:00
|
|
|
|
2019-12-20 21:30:05 +00:00
|
|
|
func TestAuthority_Revoke(t *testing.T) {
|
2019-03-05 08:07:13 +00:00
|
|
|
reasonCode := 2
|
|
|
|
reason := "bob was let go"
|
|
|
|
validIssuer := "step-cli"
|
2019-12-20 21:30:05 +00:00
|
|
|
validAudience := testAudiences.Revoke
|
2019-03-05 08:07:13 +00:00
|
|
|
now := time.Now().UTC()
|
|
|
|
|
2020-08-24 21:44:11 +00:00
|
|
|
jwk, err := jose.ReadKey("testdata/secrets/step_cli_key_priv.jwk", jose.WithPassword([]byte("pass")))
|
2019-03-05 08:07:13 +00:00
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
sig, err := jose.NewSigner(jose.SigningKey{Algorithm: jose.ES256, Key: jwk.Key},
|
|
|
|
(&jose.SignerOptions{}).WithType("JWT").WithHeader("kid", jwk.KeyID))
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
2019-12-20 21:30:05 +00:00
|
|
|
a := testAuthority(t)
|
|
|
|
|
2022-05-26 00:10:07 +00:00
|
|
|
tlsRevokeCtx := provisioner.NewContextWithMethod(context.Background(), provisioner.RevokeMethod)
|
|
|
|
|
2019-03-05 08:07:13 +00:00
|
|
|
type test struct {
|
2019-12-20 21:30:05 +00:00
|
|
|
auth *Authority
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx context.Context
|
2019-12-20 21:30:05 +00:00
|
|
|
opts *RevokeOptions
|
|
|
|
err error
|
|
|
|
code int
|
|
|
|
checkErrDetails func(err *errs.Error)
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
tests := map[string]func() test{
|
2019-12-20 21:30:05 +00:00
|
|
|
"fail/token/authorizeRevoke error": func() test {
|
2019-03-05 08:07:13 +00:00
|
|
|
return test{
|
2019-12-20 21:30:05 +00:00
|
|
|
auth: a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2019-03-05 08:07:13 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
OTT: "foo",
|
|
|
|
Serial: "sn",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
err: errors.New("authority.Revoke; error parsing token"),
|
|
|
|
code: http.StatusUnauthorized,
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
"fail/nil-db": func() test {
|
2019-03-05 08:07:13 +00:00
|
|
|
cl := jwt.Claims{
|
|
|
|
Subject: "sn",
|
|
|
|
Issuer: validIssuer,
|
|
|
|
NotBefore: jwt.NewNumericDate(now),
|
|
|
|
Expiry: jwt.NewNumericDate(now.Add(time.Minute)),
|
|
|
|
Audience: validAudience,
|
|
|
|
ID: "44",
|
|
|
|
}
|
|
|
|
raw, err := jwt.Signed(sig).Claims(cl).CompactSerialize()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
return test{
|
2019-12-20 21:30:05 +00:00
|
|
|
auth: a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2019-03-05 08:07:13 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
Serial: "sn",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
OTT: raw,
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
err: errors.New("authority.Revoke; no persistence layer configured"),
|
|
|
|
code: http.StatusNotImplemented,
|
|
|
|
checkErrDetails: func(err *errs.Error) {
|
|
|
|
assert.Equals(t, err.Details["token"], raw)
|
|
|
|
assert.Equals(t, err.Details["tokenID"], "44")
|
|
|
|
assert.Equals(t, err.Details["provisionerID"], "step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
},
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
"fail/db-revoke": func() test {
|
|
|
|
_a := testAuthority(t, WithDatabase(&db.MockAuthDB{
|
|
|
|
MUseToken: func(id, tok string) (bool, error) {
|
2019-05-02 22:26:18 +00:00
|
|
|
return true, nil
|
|
|
|
},
|
2020-09-16 01:14:21 +00:00
|
|
|
MGetCertificate: func(sn string) (*x509.Certificate, error) {
|
|
|
|
return nil, nil
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
Err: errors.New("force"),
|
|
|
|
}))
|
2019-03-05 08:07:13 +00:00
|
|
|
|
|
|
|
cl := jwt.Claims{
|
|
|
|
Subject: "sn",
|
|
|
|
Issuer: validIssuer,
|
|
|
|
NotBefore: jwt.NewNumericDate(now),
|
|
|
|
Expiry: jwt.NewNumericDate(now.Add(time.Minute)),
|
|
|
|
Audience: validAudience,
|
|
|
|
ID: "44",
|
|
|
|
}
|
|
|
|
raw, err := jwt.Signed(sig).Claims(cl).CompactSerialize()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
return test{
|
2019-12-20 21:30:05 +00:00
|
|
|
auth: _a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2019-03-05 08:07:13 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
Serial: "sn",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
OTT: raw,
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
err: errors.New("authority.Revoke: force"),
|
|
|
|
code: http.StatusInternalServerError,
|
|
|
|
checkErrDetails: func(err *errs.Error) {
|
|
|
|
assert.Equals(t, err.Details["token"], raw)
|
|
|
|
assert.Equals(t, err.Details["tokenID"], "44")
|
|
|
|
assert.Equals(t, err.Details["provisionerID"], "step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
},
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
"fail/already-revoked": func() test {
|
|
|
|
_a := testAuthority(t, WithDatabase(&db.MockAuthDB{
|
|
|
|
MUseToken: func(id, tok string) (bool, error) {
|
2019-05-02 22:26:18 +00:00
|
|
|
return true, nil
|
|
|
|
},
|
2020-09-16 01:14:21 +00:00
|
|
|
MGetCertificate: func(sn string) (*x509.Certificate, error) {
|
|
|
|
return nil, nil
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
Err: db.ErrAlreadyExists,
|
|
|
|
}))
|
2019-03-05 08:07:13 +00:00
|
|
|
|
|
|
|
cl := jwt.Claims{
|
|
|
|
Subject: "sn",
|
|
|
|
Issuer: validIssuer,
|
|
|
|
NotBefore: jwt.NewNumericDate(now),
|
|
|
|
Expiry: jwt.NewNumericDate(now.Add(time.Minute)),
|
|
|
|
Audience: validAudience,
|
|
|
|
ID: "44",
|
|
|
|
}
|
|
|
|
raw, err := jwt.Signed(sig).Claims(cl).CompactSerialize()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
return test{
|
2019-12-20 21:30:05 +00:00
|
|
|
auth: _a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2019-03-05 08:07:13 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
Serial: "sn",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
OTT: raw,
|
|
|
|
},
|
2021-11-19 02:17:36 +00:00
|
|
|
err: errors.New("certificate with serial number 'sn' is already revoked"),
|
2019-12-20 21:30:05 +00:00
|
|
|
code: http.StatusBadRequest,
|
|
|
|
checkErrDetails: func(err *errs.Error) {
|
|
|
|
assert.Equals(t, err.Details["token"], raw)
|
|
|
|
assert.Equals(t, err.Details["tokenID"], "44")
|
|
|
|
assert.Equals(t, err.Details["provisionerID"], "step-cli:4UELJx8e0aS9m0CH3fZ0EB7D5aUPICb759zALHFejvc")
|
|
|
|
},
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok/token": func() test {
|
2019-12-20 21:30:05 +00:00
|
|
|
_a := testAuthority(t, WithDatabase(&db.MockAuthDB{
|
|
|
|
MUseToken: func(id, tok string) (bool, error) {
|
2019-05-02 22:26:18 +00:00
|
|
|
return true, nil
|
|
|
|
},
|
2020-09-16 01:14:21 +00:00
|
|
|
MGetCertificate: func(sn string) (*x509.Certificate, error) {
|
|
|
|
return nil, errors.New("not found")
|
|
|
|
},
|
2019-12-20 21:30:05 +00:00
|
|
|
}))
|
2019-03-05 08:07:13 +00:00
|
|
|
|
|
|
|
cl := jwt.Claims{
|
|
|
|
Subject: "sn",
|
|
|
|
Issuer: validIssuer,
|
|
|
|
NotBefore: jwt.NewNumericDate(now),
|
|
|
|
Expiry: jwt.NewNumericDate(now.Add(time.Minute)),
|
|
|
|
Audience: validAudience,
|
|
|
|
ID: "44",
|
|
|
|
}
|
|
|
|
raw, err := jwt.Signed(sig).Claims(cl).CompactSerialize()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
return test{
|
2019-12-20 21:30:05 +00:00
|
|
|
auth: _a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2019-03-05 08:07:13 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
Serial: "sn",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
OTT: raw,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok/mTLS": func() test {
|
2019-12-20 21:30:05 +00:00
|
|
|
_a := testAuthority(t, WithDatabase(&db.MockAuthDB{}))
|
2019-03-05 08:07:13 +00:00
|
|
|
|
|
|
|
crt, err := pemutil.ReadCertificate("./testdata/certs/foo.crt")
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
2021-03-22 20:37:31 +00:00
|
|
|
return test{
|
|
|
|
auth: _a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2021-03-22 20:37:31 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
Crt: crt,
|
|
|
|
Serial: "102012593071130646873265215610956555026",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
MTLS: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok/mTLS-no-provisioner": func() test {
|
|
|
|
_a := testAuthority(t, WithDatabase(&db.MockAuthDB{}))
|
|
|
|
|
|
|
|
crt, err := pemutil.ReadCertificate("./testdata/certs/foo.crt")
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
// Filter out provisioner extension.
|
|
|
|
for i, ext := range crt.Extensions {
|
|
|
|
if ext.Id.Equal(asn1.ObjectIdentifier{1, 3, 6, 1, 4, 1, 37476, 9000, 64, 1}) {
|
|
|
|
crt.Extensions = append(crt.Extensions[:i], crt.Extensions[i+1:]...)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-05 08:07:13 +00:00
|
|
|
return test{
|
2019-12-20 21:30:05 +00:00
|
|
|
auth: _a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2019-03-05 08:07:13 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
Crt: crt,
|
|
|
|
Serial: "102012593071130646873265215610956555026",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
MTLS: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
2021-12-02 16:11:36 +00:00
|
|
|
"ok/ACME": func() test {
|
|
|
|
_a := testAuthority(t, WithDatabase(&db.MockAuthDB{}))
|
|
|
|
|
|
|
|
crt, err := pemutil.ReadCertificate("./testdata/certs/foo.crt")
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
|
|
|
return test{
|
|
|
|
auth: _a,
|
2022-05-26 00:10:07 +00:00
|
|
|
ctx: tlsRevokeCtx,
|
2021-12-02 16:11:36 +00:00
|
|
|
opts: &RevokeOptions{
|
|
|
|
Crt: crt,
|
|
|
|
Serial: "102012593071130646873265215610956555026",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
ACME: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
2022-05-26 00:10:07 +00:00
|
|
|
"ok/ssh": func() test {
|
|
|
|
a := testAuthority(t, WithDatabase(&db.MockAuthDB{
|
|
|
|
MRevoke: func(rci *db.RevokedCertificateInfo) error {
|
|
|
|
return errors.New("Revoke was called")
|
|
|
|
},
|
|
|
|
MRevokeSSH: func(rci *db.RevokedCertificateInfo) error {
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}))
|
|
|
|
|
|
|
|
cl := jwt.Claims{
|
|
|
|
Subject: "sn",
|
|
|
|
Issuer: validIssuer,
|
|
|
|
NotBefore: jwt.NewNumericDate(now),
|
|
|
|
Expiry: jwt.NewNumericDate(now.Add(time.Minute)),
|
|
|
|
Audience: validAudience,
|
|
|
|
ID: "44",
|
|
|
|
}
|
|
|
|
raw, err := jwt.Signed(sig).Claims(cl).CompactSerialize()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
return test{
|
|
|
|
auth: a,
|
|
|
|
ctx: provisioner.NewContextWithMethod(context.Background(), provisioner.SSHRevokeMethod),
|
|
|
|
opts: &RevokeOptions{
|
|
|
|
Serial: "sn",
|
|
|
|
ReasonCode: reasonCode,
|
|
|
|
Reason: reason,
|
|
|
|
OTT: raw,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
for name, f := range tests {
|
|
|
|
tc := f()
|
|
|
|
t.Run(name, func(t *testing.T) {
|
2022-05-26 00:10:07 +00:00
|
|
|
if err := tc.auth.Revoke(tc.ctx, tc.opts); err != nil {
|
2019-12-20 21:30:05 +00:00
|
|
|
if assert.NotNil(t, tc.err, fmt.Sprintf("unexpected error: %s", err)) {
|
2022-09-22 07:04:31 +00:00
|
|
|
var sc render.StatusCodedError
|
|
|
|
assert.Fatal(t, errors.As(err, &sc), "error does not implement StatusCodedError interface")
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.Equals(t, sc.StatusCode(), tc.code)
|
|
|
|
assert.HasPrefix(t, err.Error(), tc.err.Error())
|
|
|
|
|
2022-08-23 19:43:48 +00:00
|
|
|
var ctxErr *errs.Error
|
|
|
|
assert.Fatal(t, errors.As(err, &ctxErr), "error is not of type *errs.Error")
|
2019-12-20 21:30:05 +00:00
|
|
|
assert.Equals(t, ctxErr.Details["serialNumber"], tc.opts.Serial)
|
|
|
|
assert.Equals(t, ctxErr.Details["reasonCode"], tc.opts.ReasonCode)
|
|
|
|
assert.Equals(t, ctxErr.Details["reason"], tc.opts.Reason)
|
|
|
|
assert.Equals(t, ctxErr.Details["MTLS"], tc.opts.MTLS)
|
2020-08-24 21:44:11 +00:00
|
|
|
assert.Equals(t, ctxErr.Details["context"], provisioner.RevokeMethod.String())
|
2019-12-20 21:30:05 +00:00
|
|
|
|
|
|
|
if tc.checkErrDetails != nil {
|
|
|
|
tc.checkErrDetails(ctxErr)
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
assert.Nil(t, tc.err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2022-09-21 01:52:47 +00:00
|
|
|
|
|
|
|
func TestAuthority_constraints(t *testing.T) {
|
|
|
|
ca, err := minica.New(
|
|
|
|
minica.WithIntermediateTemplate(`{
|
|
|
|
"subject": {{ toJson .Subject }},
|
|
|
|
"keyUsage": ["certSign", "crlSign"],
|
|
|
|
"basicConstraints": {
|
|
|
|
"isCA": true,
|
|
|
|
"maxPathLen": 0
|
|
|
|
},
|
|
|
|
"nameConstraints": {
|
|
|
|
"critical": true,
|
|
|
|
"permittedDNSDomains": ["internal.example.org"],
|
|
|
|
"excludedDNSDomains": ["internal.example.com"],
|
|
|
|
"permittedIPRanges": ["192.168.1.0/24", "192.168.2.1/32"],
|
|
|
|
"excludedIPRanges": ["192.168.3.0/24", "192.168.4.0/28"],
|
|
|
|
"permittedEmailAddresses": ["root@example.org", "example.org", ".acme.org"],
|
|
|
|
"excludedEmailAddresses": ["root@example.com", "example.com", ".acme.com"],
|
|
|
|
"permittedURIDomains": ["uuid.example.org", ".acme.org"],
|
|
|
|
"excludedURIDomains": ["uuid.example.com", ".acme.com"]
|
|
|
|
}
|
|
|
|
}`),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
auth, err := NewEmbedded(WithX509RootCerts(ca.Root), WithX509Signer(ca.Intermediate, ca.Signer))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
signer, err := keyutil.GenerateDefaultSigner()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
sans []string
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
{"ok dns", []string{"internal.example.org", "host.internal.example.org"}, false},
|
|
|
|
{"ok ip", []string{"192.168.1.10", "192.168.2.1"}, false},
|
|
|
|
{"ok email", []string{"root@example.org", "info@example.org", "info@www.acme.org"}, false},
|
|
|
|
{"ok uri", []string{"https://uuid.example.org/b908d973-5167-4a62-abe3-6beda358d82a", "https://uuid.acme.org/1724aae1-1bb3-44fb-83c3-9a1a18df67c8"}, false},
|
|
|
|
{"fail permitted dns", []string{"internal.acme.org"}, true},
|
|
|
|
{"fail excluded dns", []string{"internal.example.com"}, true},
|
|
|
|
{"fail permitted ips", []string{"192.168.2.10"}, true},
|
|
|
|
{"fail excluded ips", []string{"192.168.3.1"}, true},
|
|
|
|
{"fail permitted emails", []string{"root@acme.org"}, true},
|
|
|
|
{"fail excluded emails", []string{"root@example.com"}, true},
|
|
|
|
{"fail permitted uris", []string{"https://acme.org/uuid/7848819c-9d0b-4e12-bbff-cd66079a3444"}, true},
|
|
|
|
{"fail excluded uris", []string{"https://uuid.example.com/d325eda7-6356-4d60-b8f6-3d64724afeb3"}, true},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
csr, err := x509util.CreateCertificateRequest(tt.sans[0], tt.sans, signer)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
cert, err := ca.SignCSR(csr)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
data := x509util.CreateTemplateData(tt.sans[0], tt.sans)
|
|
|
|
templateOption, err := provisioner.TemplateOptions(nil, data)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = auth.Sign(csr, provisioner.SignOptions{}, templateOption)
|
|
|
|
if (err != nil) != tt.wantErr {
|
|
|
|
t.Errorf("Authority.Sign() error = %v, wantErr %v", err, tt.wantErr)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = auth.Renew(cert)
|
|
|
|
if (err != nil) != tt.wantErr {
|
|
|
|
t.Errorf("Authority.Renew() error = %v, wantErr %v", err, tt.wantErr)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|