forked from TrueCloudLab/certificates
80 lines
1.8 KiB
Go
80 lines
1.8 KiB
Go
package stepcas
|
|
|
|
import (
|
|
"net/url"
|
|
"reflect"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/smallstep/certificates/cas/apiv1"
|
|
)
|
|
|
|
type mockErrIssuer struct{}
|
|
|
|
func (m mockErrIssuer) SignToken(subject string, sans []string) (string, error) {
|
|
return "", apiv1.ErrNotImplemented{}
|
|
}
|
|
|
|
func (m mockErrIssuer) RevokeToken(subject string) (string, error) {
|
|
return "", apiv1.ErrNotImplemented{}
|
|
}
|
|
|
|
func (m mockErrIssuer) Lifetime(d time.Duration) time.Duration {
|
|
return d
|
|
}
|
|
|
|
func Test_newStepIssuer(t *testing.T) {
|
|
caURL, err := url.Parse("https://ca.smallstep.com")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
type args struct {
|
|
caURL *url.URL
|
|
iss *apiv1.CertificateIssuer
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want stepIssuer
|
|
wantErr bool
|
|
}{
|
|
{"x5c", args{caURL, &apiv1.CertificateIssuer{
|
|
Type: "x5c",
|
|
Provisioner: "X5C",
|
|
Certificate: testX5CPath,
|
|
Key: testX5CKeyPath,
|
|
}}, &x5cIssuer{
|
|
caURL: caURL,
|
|
certFile: testX5CPath,
|
|
keyFile: testX5CKeyPath,
|
|
issuer: "X5C",
|
|
}, false},
|
|
{"jwk", args{caURL, &apiv1.CertificateIssuer{
|
|
Type: "jwk",
|
|
Provisioner: "ra@doe.org",
|
|
Key: testX5CKeyPath,
|
|
}}, &jwkIssuer{
|
|
caURL: caURL,
|
|
keyFile: testX5CKeyPath,
|
|
issuer: "ra@doe.org",
|
|
}, false},
|
|
{"fail", args{caURL, &apiv1.CertificateIssuer{
|
|
Type: "unknown",
|
|
Provisioner: "ra@doe.org",
|
|
Key: testX5CKeyPath,
|
|
}}, nil, true},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got, err := newStepIssuer(tt.args.caURL, tt.args.iss)
|
|
if (err != nil) != tt.wantErr {
|
|
t.Errorf("newStepIssuer() error = %v, wantErr %v", err, tt.wantErr)
|
|
return
|
|
}
|
|
if !reflect.DeepEqual(got, tt.want) {
|
|
t.Errorf("newStepIssuer() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|