forked from TrueCloudLab/certificates
Merge pull request #438 from smallstep/max/broken-validate-challenge-test
Fix broken ValidateChallenge test
This commit is contained in:
commit
c255863816
3 changed files with 104 additions and 13 deletions
|
@ -2,9 +2,14 @@ package acme
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"crypto"
|
||||||
|
"encoding/base64"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -1331,11 +1336,14 @@ func TestAuthorityValidateChallenge(t *testing.T) {
|
||||||
prov := newProv()
|
prov := newProv()
|
||||||
ctx := context.WithValue(context.Background(), ProvisionerContextKey, prov)
|
ctx := context.WithValue(context.Background(), ProvisionerContextKey, prov)
|
||||||
ctx = context.WithValue(ctx, BaseURLContextKey, "https://test.ca.smallstep.com:8080")
|
ctx = context.WithValue(ctx, BaseURLContextKey, "https://test.ca.smallstep.com:8080")
|
||||||
|
|
||||||
type test struct {
|
type test struct {
|
||||||
auth *Authority
|
auth *Authority
|
||||||
id, accID string
|
id, accID string
|
||||||
err *Error
|
err *Error
|
||||||
ch challenge
|
ch challenge
|
||||||
|
jwk *jose.JSONWebKey
|
||||||
|
server *httptest.Server
|
||||||
}
|
}
|
||||||
tests := map[string]func(t *testing.T) test{
|
tests := map[string]func(t *testing.T) test{
|
||||||
"fail/getChallenge-error": func(t *testing.T) test {
|
"fail/getChallenge-error": func(t *testing.T) test {
|
||||||
|
@ -1375,8 +1383,25 @@ func TestAuthorityValidateChallenge(t *testing.T) {
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"fail/validate-error": func(t *testing.T) test {
|
"fail/validate-error": func(t *testing.T) test {
|
||||||
ch, err := newHTTPCh()
|
keyauth := "temp"
|
||||||
|
keyauthp := &keyauth
|
||||||
|
// Create test server that returns challenge auth
|
||||||
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
fmt.Fprintf(w, "%s\r\n", *keyauthp)
|
||||||
|
}))
|
||||||
|
t.Cleanup(func() { ts.Close() })
|
||||||
|
|
||||||
|
ch, err := newHTTPChWithServer(strings.TrimPrefix(ts.URL, "http://"))
|
||||||
assert.FatalError(t, err)
|
assert.FatalError(t, err)
|
||||||
|
|
||||||
|
jwk, _, err := jose.GenerateDefaultKeyPair([]byte("pass"))
|
||||||
|
assert.FatalError(t, err)
|
||||||
|
|
||||||
|
thumbprint, err := jwk.Thumbprint(crypto.SHA256)
|
||||||
|
assert.FatalError(t, err)
|
||||||
|
encPrint := base64.RawURLEncoding.EncodeToString(thumbprint)
|
||||||
|
*keyauthp = fmt.Sprintf("%s.%s", ch.getToken(), encPrint)
|
||||||
|
|
||||||
b, err := json.Marshal(ch)
|
b, err := json.Marshal(ch)
|
||||||
assert.FatalError(t, err)
|
assert.FatalError(t, err)
|
||||||
auth, err := NewAuthority(&db.MockNoSQLDB{
|
auth, err := NewAuthority(&db.MockNoSQLDB{
|
||||||
|
@ -1396,10 +1421,12 @@ func TestAuthorityValidateChallenge(t *testing.T) {
|
||||||
auth: auth,
|
auth: auth,
|
||||||
id: ch.getID(),
|
id: ch.getID(),
|
||||||
accID: ch.getAccountID(),
|
accID: ch.getAccountID(),
|
||||||
|
jwk: jwk,
|
||||||
|
server: ts,
|
||||||
err: ServerInternalErr(errors.New("error attempting challenge validation: error saving acme challenge: force")),
|
err: ServerInternalErr(errors.New("error attempting challenge validation: error saving acme challenge: force")),
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"ok": func(t *testing.T) test {
|
"ok/already-valid": func(t *testing.T) test {
|
||||||
ch, err := newHTTPCh()
|
ch, err := newHTTPCh()
|
||||||
assert.FatalError(t, err)
|
assert.FatalError(t, err)
|
||||||
_ch, ok := ch.(*http01Challenge)
|
_ch, ok := ch.(*http01Challenge)
|
||||||
|
@ -1423,11 +1450,54 @@ func TestAuthorityValidateChallenge(t *testing.T) {
|
||||||
ch: ch,
|
ch: ch,
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"ok": func(t *testing.T) test {
|
||||||
|
keyauth := "temp"
|
||||||
|
keyauthp := &keyauth
|
||||||
|
// Create test server that returns challenge auth
|
||||||
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
fmt.Fprintf(w, "%s\r\n", *keyauthp)
|
||||||
|
}))
|
||||||
|
t.Cleanup(func() { ts.Close() })
|
||||||
|
|
||||||
|
ch, err := newHTTPChWithServer(strings.TrimPrefix(ts.URL, "http://"))
|
||||||
|
assert.FatalError(t, err)
|
||||||
|
|
||||||
|
jwk, _, err := jose.GenerateDefaultKeyPair([]byte("pass"))
|
||||||
|
assert.FatalError(t, err)
|
||||||
|
|
||||||
|
thumbprint, err := jwk.Thumbprint(crypto.SHA256)
|
||||||
|
assert.FatalError(t, err)
|
||||||
|
encPrint := base64.RawURLEncoding.EncodeToString(thumbprint)
|
||||||
|
*keyauthp = fmt.Sprintf("%s.%s", ch.getToken(), encPrint)
|
||||||
|
|
||||||
|
b, err := json.Marshal(ch)
|
||||||
|
assert.FatalError(t, err)
|
||||||
|
auth, err := NewAuthority(&db.MockNoSQLDB{
|
||||||
|
MGet: func(bucket, key []byte) ([]byte, error) {
|
||||||
|
assert.Equals(t, bucket, challengeTable)
|
||||||
|
assert.Equals(t, key, []byte(ch.getID()))
|
||||||
|
return b, nil
|
||||||
|
},
|
||||||
|
MCmpAndSwap: func(bucket, key, old, newval []byte) ([]byte, bool, error) {
|
||||||
|
assert.Equals(t, bucket, challengeTable)
|
||||||
|
assert.Equals(t, key, []byte(ch.getID()))
|
||||||
|
return nil, true, nil
|
||||||
|
},
|
||||||
|
}, "ca.smallstep.com", "acme", nil)
|
||||||
|
assert.FatalError(t, err)
|
||||||
|
return test{
|
||||||
|
auth: auth,
|
||||||
|
id: ch.getID(),
|
||||||
|
accID: ch.getAccountID(),
|
||||||
|
jwk: jwk,
|
||||||
|
server: ts,
|
||||||
|
}
|
||||||
|
},
|
||||||
}
|
}
|
||||||
for name, run := range tests {
|
for name, run := range tests {
|
||||||
t.Run(name, func(t *testing.T) {
|
t.Run(name, func(t *testing.T) {
|
||||||
tc := run(t)
|
tc := run(t)
|
||||||
if acmeCh, err := tc.auth.ValidateChallenge(ctx, tc.accID, tc.id, nil); err != nil {
|
if acmeCh, err := tc.auth.ValidateChallenge(ctx, tc.accID, tc.id, tc.jwk); err != nil {
|
||||||
if assert.NotNil(t, tc.err) {
|
if assert.NotNil(t, tc.err) {
|
||||||
ae, ok := err.(*Error)
|
ae, ok := err.(*Error)
|
||||||
assert.True(t, ok)
|
assert.True(t, ok)
|
||||||
|
@ -1440,6 +1510,7 @@ func TestAuthorityValidateChallenge(t *testing.T) {
|
||||||
gotb, err := json.Marshal(acmeCh)
|
gotb, err := json.Marshal(acmeCh)
|
||||||
assert.FatalError(t, err)
|
assert.FatalError(t, err)
|
||||||
|
|
||||||
|
if tc.ch != nil {
|
||||||
acmeExp, err := tc.ch.toACME(ctx, nil, tc.auth.dir)
|
acmeExp, err := tc.ch.toACME(ctx, nil, tc.auth.dir)
|
||||||
assert.FatalError(t, err)
|
assert.FatalError(t, err)
|
||||||
expb, err := json.Marshal(acmeExp)
|
expb, err := json.Marshal(acmeExp)
|
||||||
|
@ -1448,6 +1519,7 @@ func TestAuthorityValidateChallenge(t *testing.T) {
|
||||||
assert.Equals(t, expb, gotb)
|
assert.Equals(t, expb, gotb)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -238,7 +238,10 @@ func (bc *baseChallenge) validate(db nosql.DB, jwk *jose.JSONWebKey, vo validate
|
||||||
func (bc *baseChallenge) storeError(db nosql.DB, err *Error) error {
|
func (bc *baseChallenge) storeError(db nosql.DB, err *Error) error {
|
||||||
clone := bc.clone()
|
clone := bc.clone()
|
||||||
clone.Error = err.ToACME()
|
clone.Error = err.ToACME()
|
||||||
return clone.save(db, bc)
|
if err := clone.save(db, bc); err != nil {
|
||||||
|
return ServerInternalErr(errors.Wrap(err, "failure saving error to acme challenge"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// unmarshalChallenge unmarshals a challenge type into the correct sub-type.
|
// unmarshalChallenge unmarshals a challenge type into the correct sub-type.
|
||||||
|
|
|
@ -69,6 +69,22 @@ func newHTTPCh() (challenge, error) {
|
||||||
return newHTTP01Challenge(mockdb, testOps)
|
return newHTTP01Challenge(mockdb, testOps)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func newHTTPChWithServer(host string) (challenge, error) {
|
||||||
|
mockdb := &db.MockNoSQLDB{
|
||||||
|
MCmpAndSwap: func(bucket, key, old, newval []byte) ([]byte, bool, error) {
|
||||||
|
return []byte("foo"), true, nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return newHTTP01Challenge(mockdb, ChallengeOptions{
|
||||||
|
AccountID: "accID",
|
||||||
|
AuthzID: "authzID",
|
||||||
|
Identifier: Identifier{
|
||||||
|
Type: "", // will get set correctly depending on the "new.." method.
|
||||||
|
Value: host,
|
||||||
|
},
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
func TestNewHTTP01Challenge(t *testing.T) {
|
func TestNewHTTP01Challenge(t *testing.T) {
|
||||||
ops := ChallengeOptions{
|
ops := ChallengeOptions{
|
||||||
AccountID: "accID",
|
AccountID: "accID",
|
||||||
|
|
Loading…
Reference in a new issue