2019-05-27 00:41:10 +00:00
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/base64"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http/httptest"
|
2020-05-07 03:18:12 +00:00
|
|
|
"net/url"
|
2019-05-27 00:41:10 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/go-chi/chi"
|
|
|
|
"github.com/smallstep/assert"
|
|
|
|
"github.com/smallstep/certificates/acme"
|
2020-08-14 22:33:50 +00:00
|
|
|
"go.step.sm/crypto/pemutil"
|
2019-05-27 00:41:10 +00:00
|
|
|
)
|
|
|
|
|
2021-03-12 08:16:48 +00:00
|
|
|
func TestNewOrderRequest_Validate(t *testing.T) {
|
2019-05-27 00:41:10 +00:00
|
|
|
type test struct {
|
|
|
|
nor *NewOrderRequest
|
|
|
|
nbf, naf time.Time
|
|
|
|
err *acme.Error
|
|
|
|
}
|
|
|
|
var tests = map[string]func(t *testing.T) test{
|
|
|
|
"fail/no-identifiers": func(t *testing.T) test {
|
|
|
|
return test{
|
|
|
|
nor: &NewOrderRequest{},
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "identifiers list cannot be empty"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/bad-identifier": func(t *testing.T) test {
|
|
|
|
return test{
|
|
|
|
nor: &NewOrderRequest{
|
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{Type: "dns", Value: "example.com"},
|
|
|
|
{Type: "foo", Value: "bar.com"},
|
|
|
|
},
|
|
|
|
},
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "identifier type unsupported: foo"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok": func(t *testing.T) test {
|
|
|
|
nbf := time.Now().UTC().Add(time.Minute)
|
|
|
|
naf := time.Now().UTC().Add(5 * time.Minute)
|
|
|
|
return test{
|
|
|
|
nor: &NewOrderRequest{
|
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{Type: "dns", Value: "example.com"},
|
|
|
|
{Type: "dns", Value: "bar.com"},
|
|
|
|
},
|
|
|
|
NotAfter: naf,
|
|
|
|
NotBefore: nbf,
|
|
|
|
},
|
|
|
|
nbf: nbf,
|
|
|
|
naf: naf,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for name, run := range tests {
|
|
|
|
tc := run(t)
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
if err := tc.nor.Validate(); err != nil {
|
|
|
|
if assert.NotNil(t, err) {
|
|
|
|
ae, ok := err.(*acme.Error)
|
|
|
|
assert.True(t, ok)
|
|
|
|
assert.HasPrefix(t, ae.Error(), tc.err.Error())
|
|
|
|
assert.Equals(t, ae.StatusCode(), tc.err.StatusCode())
|
|
|
|
assert.Equals(t, ae.Type, tc.err.Type)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if assert.Nil(t, tc.err) {
|
|
|
|
if tc.nbf.IsZero() {
|
|
|
|
assert.True(t, tc.nor.NotBefore.Before(time.Now().Add(time.Minute)))
|
|
|
|
assert.True(t, tc.nor.NotBefore.After(time.Now().Add(-time.Minute)))
|
|
|
|
} else {
|
|
|
|
assert.Equals(t, tc.nor.NotBefore, tc.nbf)
|
|
|
|
}
|
|
|
|
if tc.naf.IsZero() {
|
|
|
|
assert.True(t, tc.nor.NotAfter.Before(time.Now().Add(24*time.Hour)))
|
|
|
|
assert.True(t, tc.nor.NotAfter.After(time.Now().Add(24*time.Hour-time.Minute)))
|
|
|
|
} else {
|
|
|
|
assert.Equals(t, tc.nor.NotAfter, tc.naf)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFinalizeRequestValidate(t *testing.T) {
|
|
|
|
_csr, err := pemutil.Read("../../authority/testdata/certs/foo.csr")
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
csr, ok := _csr.(*x509.CertificateRequest)
|
|
|
|
assert.Fatal(t, ok)
|
|
|
|
type test struct {
|
|
|
|
fr *FinalizeRequest
|
|
|
|
err *acme.Error
|
|
|
|
}
|
|
|
|
var tests = map[string]func(t *testing.T) test{
|
|
|
|
"fail/parse-csr-error": func(t *testing.T) test {
|
|
|
|
return test{
|
|
|
|
fr: &FinalizeRequest{},
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "unable to parse csr: asn1: syntax error: sequence truncated"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/invalid-csr-signature": func(t *testing.T) test {
|
|
|
|
b, err := pemutil.Read("../../authority/testdata/certs/badsig.csr")
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
c, ok := b.(*x509.CertificateRequest)
|
|
|
|
assert.Fatal(t, ok)
|
|
|
|
return test{
|
|
|
|
fr: &FinalizeRequest{
|
|
|
|
CSR: base64.RawURLEncoding.EncodeToString(c.Raw),
|
|
|
|
},
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "csr failed signature check: x509: ECDSA verification failure"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok": func(t *testing.T) test {
|
|
|
|
return test{
|
|
|
|
fr: &FinalizeRequest{
|
|
|
|
CSR: base64.RawURLEncoding.EncodeToString(csr.Raw),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for name, run := range tests {
|
|
|
|
tc := run(t)
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
if err := tc.fr.Validate(); err != nil {
|
|
|
|
if assert.NotNil(t, err) {
|
|
|
|
ae, ok := err.(*acme.Error)
|
|
|
|
assert.True(t, ok)
|
|
|
|
assert.HasPrefix(t, ae.Error(), tc.err.Error())
|
|
|
|
assert.Equals(t, ae.StatusCode(), tc.err.StatusCode())
|
|
|
|
assert.Equals(t, ae.Type, tc.err.Type)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if assert.Nil(t, tc.err) {
|
|
|
|
assert.Equals(t, tc.fr.csr.Raw, csr.Raw)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
func TestHandler_GetOrder(t *testing.T) {
|
2021-03-12 08:16:48 +00:00
|
|
|
now := clock.Now()
|
|
|
|
nbf := now
|
|
|
|
naf := now.Add(24 * time.Hour)
|
|
|
|
expiry := now.Add(-time.Hour)
|
2019-05-27 00:41:10 +00:00
|
|
|
o := acme.Order{
|
|
|
|
ID: "orderID",
|
2021-03-10 18:50:51 +00:00
|
|
|
NotBefore: nbf,
|
|
|
|
NotAfter: naf,
|
2019-05-27 00:41:10 +00:00
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "example.com",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "*.smallstep.com",
|
|
|
|
},
|
|
|
|
},
|
2021-03-19 21:37:45 +00:00
|
|
|
ExpiresAt: expiry,
|
|
|
|
Status: acme.StatusInvalid,
|
|
|
|
Error: acme.NewError(acme.ErrorMalformedType, "order has expired"),
|
2021-03-12 08:16:48 +00:00
|
|
|
AuthorizationURLs: []string{
|
|
|
|
"https://test.ca.smallstep.com/acme/test@acme-provisioner.com/authz/foo",
|
|
|
|
"https://test.ca.smallstep.com/acme/test@acme-provisioner.com/authz/bar",
|
|
|
|
"https://test.ca.smallstep.com/acme/test@acme-provisioner.com/authz/baz",
|
|
|
|
},
|
|
|
|
FinalizeURL: "https://test.ca.smallstep.com/acme/test@acme-provisioner.com/order/orderID/finalize",
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Request with chi context
|
|
|
|
chiCtx := chi.NewRouteContext()
|
|
|
|
chiCtx.URLParams.Add("ordID", o.ID)
|
|
|
|
prov := newProv()
|
2020-05-07 03:18:12 +00:00
|
|
|
provName := url.PathEscape(prov.GetName())
|
|
|
|
baseURL := &url.URL{Scheme: "https", Host: "test.ca.smallstep.com"}
|
|
|
|
url := fmt.Sprintf("%s/acme/%s/order/%s",
|
|
|
|
baseURL.String(), provName, o.ID)
|
2019-05-27 00:41:10 +00:00
|
|
|
|
|
|
|
type test struct {
|
2021-03-10 18:50:51 +00:00
|
|
|
db acme.DB
|
2019-05-27 00:41:10 +00:00
|
|
|
ctx context.Context
|
|
|
|
statusCode int
|
2021-03-10 18:50:51 +00:00
|
|
|
err *acme.Error
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
var tests = map[string]func(t *testing.T) test{
|
|
|
|
"fail/no-account": func(t *testing.T) test {
|
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx: context.WithValue(context.Background(), provisionerContextKey, prov),
|
2020-02-02 01:35:41 +00:00
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorAccountDoesNotExistType, "account does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-account": func(t *testing.T) test {
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, nil)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
2020-02-02 01:35:41 +00:00
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorAccountDoesNotExistType, "account does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
2021-03-12 08:16:48 +00:00
|
|
|
"fail/no-provisioner": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), accContextKey, acc)
|
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("provisioner does not exist"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-provisioner": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, nil)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("provisioner does not exist"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/db.GetOrder-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
2019-05-27 00:41:10 +00:00
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
db: &acme.MockDB{
|
|
|
|
MockError: acme.NewErrorISE("force"),
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewErrorISE("force"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
2021-03-12 08:16:48 +00:00
|
|
|
"fail/account-id-mismatch": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
|
|
|
db: &acme.MockDB{
|
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
|
|
|
return &acme.Order{AccountID: "foo"}, nil
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 401,
|
|
|
|
err: acme.NewError(acme.ErrorUnauthorizedType, "account id mismatch"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/provisioner-id-mismatch": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
|
|
|
db: &acme.MockDB{
|
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
|
|
|
return &acme.Order{AccountID: "accountID", ProvisionerID: "bar"}, nil
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 401,
|
|
|
|
err: acme.NewError(acme.ErrorUnauthorizedType, "provisioner id mismatch"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/order-update-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
|
|
|
db: &acme.MockDB{
|
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
|
|
|
return &acme.Order{
|
|
|
|
AccountID: "accountID",
|
|
|
|
ProvisionerID: "acme/test@acme-provisioner.com",
|
2021-03-19 21:37:45 +00:00
|
|
|
ExpiresAt: clock.Now().Add(-time.Hour),
|
2021-03-12 08:16:48 +00:00
|
|
|
Status: acme.StatusReady,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
MockUpdateOrder: func(ctx context.Context, o *acme.Order) error {
|
|
|
|
return acme.NewErrorISE("force")
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("force"),
|
|
|
|
}
|
|
|
|
},
|
2019-05-27 00:41:10 +00:00
|
|
|
"ok": func(t *testing.T) test {
|
2021-03-12 08:16:48 +00:00
|
|
|
acc := &acme.Account{ID: "accountID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
2019-05-27 00:41:10 +00:00
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx = context.WithValue(ctx, baseURLContextKey, baseURL)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
db: &acme.MockDB{
|
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
2021-03-12 08:16:48 +00:00
|
|
|
return &acme.Order{
|
|
|
|
ID: "orderID",
|
|
|
|
AccountID: "accountID",
|
|
|
|
ProvisionerID: "acme/test@acme-provisioner.com",
|
2021-03-19 21:37:45 +00:00
|
|
|
ExpiresAt: expiry,
|
2021-03-12 08:16:48 +00:00
|
|
|
Status: acme.StatusReady,
|
|
|
|
AuthorizationIDs: []string{"foo", "bar", "baz"},
|
|
|
|
NotBefore: nbf,
|
|
|
|
NotAfter: naf,
|
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "example.com",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "*.smallstep.com",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
MockUpdateOrder: func(ctx context.Context, o *acme.Order) error {
|
|
|
|
return nil
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 200,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for name, run := range tests {
|
|
|
|
tc := run(t)
|
|
|
|
t.Run(name, func(t *testing.T) {
|
2021-03-12 08:16:48 +00:00
|
|
|
h := &Handler{linker: NewLinker("dns", "acme"), db: tc.db}
|
2019-05-27 00:41:10 +00:00
|
|
|
req := httptest.NewRequest("GET", url, nil)
|
|
|
|
req = req.WithContext(tc.ctx)
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
h.GetOrder(w, req)
|
|
|
|
res := w.Result()
|
|
|
|
|
|
|
|
assert.Equals(t, res.StatusCode, tc.statusCode)
|
|
|
|
|
|
|
|
body, err := ioutil.ReadAll(res.Body)
|
|
|
|
res.Body.Close()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
if res.StatusCode >= 400 && assert.NotNil(t, tc.err) {
|
|
|
|
var ae acme.Error
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.FatalError(t, json.Unmarshal(bytes.TrimSpace(body), &ae))
|
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
assert.Equals(t, ae.Type, tc.err.Type)
|
|
|
|
assert.Equals(t, ae.Detail, tc.err.Detail)
|
|
|
|
assert.Equals(t, ae.Identifier, tc.err.Identifier)
|
|
|
|
assert.Equals(t, ae.Subproblems, tc.err.Subproblems)
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.Equals(t, res.Header["Content-Type"], []string{"application/problem+json"})
|
|
|
|
} else {
|
|
|
|
expB, err := json.Marshal(o)
|
|
|
|
assert.FatalError(t, err)
|
2021-03-12 08:16:48 +00:00
|
|
|
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.Equals(t, bytes.TrimSpace(body), expB)
|
|
|
|
assert.Equals(t, res.Header["Location"], []string{url})
|
|
|
|
assert.Equals(t, res.Header["Content-Type"], []string{"application/json"})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-25 03:46:02 +00:00
|
|
|
/*
|
2021-03-12 08:16:48 +00:00
|
|
|
func TestHandler_NewOrder(t *testing.T) {
|
2019-05-27 00:41:10 +00:00
|
|
|
expiry := time.Now().UTC().Add(6 * time.Hour)
|
|
|
|
nbf := time.Now().UTC().Add(5 * time.Hour)
|
|
|
|
naf := nbf.Add(17 * time.Hour)
|
|
|
|
o := acme.Order{
|
|
|
|
ID: "orderID",
|
2021-03-19 21:37:45 +00:00
|
|
|
ExpiresAt: expiry,
|
2021-03-10 18:50:51 +00:00
|
|
|
NotBefore: nbf,
|
|
|
|
NotAfter: naf,
|
2019-05-27 00:41:10 +00:00
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{Type: "dns", Value: "example.com"},
|
|
|
|
{Type: "dns", Value: "bar.com"},
|
|
|
|
},
|
2021-03-10 18:50:51 +00:00
|
|
|
Status: "pending",
|
|
|
|
AuthorizationURLs: []string{"foo", "bar"},
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
prov := newProv()
|
2020-05-07 03:18:12 +00:00
|
|
|
provName := url.PathEscape(prov.GetName())
|
|
|
|
baseURL := &url.URL{Scheme: "https", Host: "test.ca.smallstep.com"}
|
|
|
|
url := fmt.Sprintf("%s/acme/%s/new-order",
|
|
|
|
baseURL.String(), provName)
|
2019-05-27 00:41:10 +00:00
|
|
|
|
|
|
|
type test struct {
|
2021-03-10 18:50:51 +00:00
|
|
|
db acme.DB
|
2019-05-27 00:41:10 +00:00
|
|
|
ctx context.Context
|
|
|
|
statusCode int
|
2021-03-10 18:50:51 +00:00
|
|
|
err *acme.Error
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
var tests = map[string]func(t *testing.T) test{
|
|
|
|
"fail/no-account": func(t *testing.T) test {
|
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx: context.WithValue(context.Background(), provisionerContextKey, prov),
|
2020-02-02 01:35:41 +00:00
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorAccountDoesNotExistType, "account does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-account": func(t *testing.T) test {
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, nil)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
2020-02-02 01:35:41 +00:00
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorAccountDoesNotExistType, "account does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
2021-03-12 08:16:48 +00:00
|
|
|
"fail/no-provisioner": func(t *testing.T) test {
|
2019-05-27 00:41:10 +00:00
|
|
|
acc := &acme.Account{ID: "accID"}
|
2021-03-12 08:16:48 +00:00
|
|
|
ctx := context.WithValue(context.Background(), accContextKey, acc)
|
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("provisioner expected in request context"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-provisioner": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, nil)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
2021-03-12 08:16:48 +00:00
|
|
|
err: acme.NewErrorISE("provisioner expected in request context"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-payload": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, nil)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewErrorISE("payload expected in request context"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/unmarshal-payload-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{})
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "failed to unmarshal new-order request payload: unexpected end of JSON input"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/malformed-payload-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
|
|
|
nor := &NewOrderRequest{}
|
|
|
|
b, err := json.Marshal(nor)
|
|
|
|
assert.FatalError(t, err)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: b})
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "identifiers list cannot be empty"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/NewOrder-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
|
|
|
nor := &NewOrderRequest{
|
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{Type: "dns", Value: "example.com"},
|
|
|
|
{Type: "dns", Value: "bar.com"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
b, err := json.Marshal(nor)
|
|
|
|
assert.FatalError(t, err)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: b})
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
db: &acme.MockDB{
|
|
|
|
MockCreateOrder: func(ctx context.Context, o *acme.Order) error {
|
|
|
|
return acme.NewError(acme.ErrorMalformedType, "force")
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "force"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
|
|
|
nor := &NewOrderRequest{
|
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{Type: "dns", Value: "example.com"},
|
|
|
|
{Type: "dns", Value: "bar.com"},
|
|
|
|
},
|
|
|
|
NotBefore: nbf,
|
|
|
|
NotAfter: naf,
|
|
|
|
}
|
|
|
|
b, err := json.Marshal(nor)
|
|
|
|
assert.FatalError(t, err)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: b})
|
|
|
|
ctx = context.WithValue(ctx, baseURLContextKey, baseURL)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
db: &acme.MockDB{
|
|
|
|
MockCreateOrder: func(ctx context.Context, o *acme.Order) error {
|
2021-03-12 08:16:48 +00:00
|
|
|
o.ID = "orderID"
|
2021-03-10 18:50:51 +00:00
|
|
|
return nil
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 201,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok/default-naf-nbf": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
|
|
|
nor := &NewOrderRequest{
|
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{Type: "dns", Value: "example.com"},
|
|
|
|
{Type: "dns", Value: "bar.com"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
b, err := json.Marshal(nor)
|
|
|
|
assert.FatalError(t, err)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: b})
|
|
|
|
ctx = context.WithValue(ctx, baseURLContextKey, baseURL)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
db: &acme.MockDB{
|
|
|
|
MockCreateOrder: func(ctx context.Context, o *acme.Order) error {
|
|
|
|
return nil
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 201,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for name, run := range tests {
|
|
|
|
tc := run(t)
|
|
|
|
t.Run(name, func(t *testing.T) {
|
2021-03-12 08:16:48 +00:00
|
|
|
h := &Handler{linker: NewLinker("dns", "prefix"), db: tc.db}
|
2019-05-27 00:41:10 +00:00
|
|
|
req := httptest.NewRequest("GET", url, nil)
|
|
|
|
req = req.WithContext(tc.ctx)
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
h.NewOrder(w, req)
|
|
|
|
res := w.Result()
|
|
|
|
|
|
|
|
assert.Equals(t, res.StatusCode, tc.statusCode)
|
|
|
|
|
|
|
|
body, err := ioutil.ReadAll(res.Body)
|
|
|
|
res.Body.Close()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
if res.StatusCode >= 400 && assert.NotNil(t, tc.err) {
|
|
|
|
var ae acme.Error
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.FatalError(t, json.Unmarshal(bytes.TrimSpace(body), &ae))
|
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
assert.Equals(t, ae.Type, tc.err.Type)
|
|
|
|
assert.Equals(t, ae.Detail, tc.err.Detail)
|
|
|
|
assert.Equals(t, ae.Identifier, tc.err.Identifier)
|
|
|
|
assert.Equals(t, ae.Subproblems, tc.err.Subproblems)
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.Equals(t, res.Header["Content-Type"], []string{"application/problem+json"})
|
|
|
|
} else {
|
|
|
|
expB, err := json.Marshal(o)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
assert.Equals(t, bytes.TrimSpace(body), expB)
|
|
|
|
assert.Equals(t, res.Header["Location"],
|
2020-05-07 03:18:12 +00:00
|
|
|
[]string{fmt.Sprintf("%s/acme/%s/order/%s", baseURL.String(),
|
|
|
|
provName, o.ID)})
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.Equals(t, res.Header["Content-Type"], []string{"application/json"})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2021-03-25 03:46:02 +00:00
|
|
|
*/
|
2019-05-27 00:41:10 +00:00
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
func TestHandler_FinalizeOrder(t *testing.T) {
|
2021-03-12 08:16:48 +00:00
|
|
|
now := clock.Now()
|
|
|
|
nbf := now
|
|
|
|
naf := now.Add(24 * time.Hour)
|
2019-05-27 00:41:10 +00:00
|
|
|
o := acme.Order{
|
|
|
|
ID: "orderID",
|
2021-03-10 18:50:51 +00:00
|
|
|
NotBefore: nbf,
|
|
|
|
NotAfter: naf,
|
2019-05-27 00:41:10 +00:00
|
|
|
Identifiers: []acme.Identifier{
|
2021-03-12 08:16:48 +00:00
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "example.com",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "*.smallstep.com",
|
|
|
|
},
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
2021-03-19 21:37:45 +00:00
|
|
|
ExpiresAt: naf,
|
|
|
|
Status: acme.StatusValid,
|
2021-03-12 08:16:48 +00:00
|
|
|
AuthorizationURLs: []string{
|
|
|
|
"https://test.ca.smallstep.com/acme/test@acme-provisioner.com/authz/foo",
|
|
|
|
"https://test.ca.smallstep.com/acme/test@acme-provisioner.com/authz/bar",
|
|
|
|
"https://test.ca.smallstep.com/acme/test@acme-provisioner.com/authz/baz",
|
|
|
|
},
|
|
|
|
FinalizeURL: "https://test.ca.smallstep.com/acme/test@acme-provisioner.com/order/orderID/finalize",
|
|
|
|
CertificateURL: "https://test.ca.smallstep.com/acme/test@acme-provisioner.com/certificate/certID",
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Request with chi context
|
|
|
|
chiCtx := chi.NewRouteContext()
|
|
|
|
chiCtx.URLParams.Add("ordID", o.ID)
|
|
|
|
prov := newProv()
|
2020-05-07 03:18:12 +00:00
|
|
|
provName := url.PathEscape(prov.GetName())
|
|
|
|
baseURL := &url.URL{Scheme: "https", Host: "test.ca.smallstep.com"}
|
2021-03-12 08:16:48 +00:00
|
|
|
url := fmt.Sprintf("%s/acme/%s/order/%s",
|
2020-05-07 03:18:12 +00:00
|
|
|
baseURL.String(), provName, o.ID)
|
2019-05-27 00:41:10 +00:00
|
|
|
|
2021-03-12 08:16:48 +00:00
|
|
|
_csr, err := pemutil.Read("../../authority/testdata/certs/foo.csr")
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
csr, ok := _csr.(*x509.CertificateRequest)
|
|
|
|
assert.Fatal(t, ok)
|
|
|
|
|
|
|
|
nor := &FinalizeRequest{
|
|
|
|
CSR: base64.RawURLEncoding.EncodeToString(csr.Raw),
|
|
|
|
}
|
|
|
|
payloadBytes, err := json.Marshal(nor)
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
2019-05-27 00:41:10 +00:00
|
|
|
type test struct {
|
2021-03-10 18:50:51 +00:00
|
|
|
db acme.DB
|
2019-05-27 00:41:10 +00:00
|
|
|
ctx context.Context
|
|
|
|
statusCode int
|
2021-03-10 18:50:51 +00:00
|
|
|
err *acme.Error
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
var tests = map[string]func(t *testing.T) test{
|
|
|
|
"fail/no-account": func(t *testing.T) test {
|
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx: context.WithValue(context.Background(), provisionerContextKey, prov),
|
2020-02-02 01:35:41 +00:00
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorAccountDoesNotExistType, "account does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-account": func(t *testing.T) test {
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, nil)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
2020-02-02 01:35:41 +00:00
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorAccountDoesNotExistType, "account does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
2021-03-12 08:16:48 +00:00
|
|
|
"fail/no-provisioner": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), accContextKey, acc)
|
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("provisioner does not exist"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-provisioner": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, nil)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
2021-03-12 08:16:48 +00:00
|
|
|
err: acme.NewErrorISE("provisioner does not exist"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/no-payload": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, provisionerContextKey, prov)
|
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("payload does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/nil-payload": func(t *testing.T) test {
|
2021-03-12 08:16:48 +00:00
|
|
|
acc := &acme.Account{ID: "accountID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, nil)
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
2021-03-12 08:16:48 +00:00
|
|
|
err: acme.NewErrorISE("paylod does not exist"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/unmarshal-payload-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{})
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "failed to unmarshal finalize-order request payload: unexpected end of JSON input"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"fail/malformed-payload-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accID"}
|
|
|
|
fr := &FinalizeRequest{}
|
|
|
|
b, err := json.Marshal(fr)
|
|
|
|
assert.FatalError(t, err)
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: b})
|
2019-05-27 00:41:10 +00:00
|
|
|
return test{
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 400,
|
2021-03-10 18:50:51 +00:00
|
|
|
err: acme.NewError(acme.ErrorMalformedType, "unable to parse csr: asn1: syntax error: sequence truncated"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
2021-03-12 08:16:48 +00:00
|
|
|
"fail/db.GetOrder-error": func(t *testing.T) test {
|
|
|
|
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: payloadBytes})
|
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
|
|
|
db: &acme.MockDB{
|
|
|
|
MockError: acme.NewErrorISE("force"),
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("force"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
2021-03-12 08:16:48 +00:00
|
|
|
},
|
|
|
|
"fail/account-id-mismatch": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
2021-03-12 08:16:48 +00:00
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: payloadBytes})
|
2019-05-27 00:41:10 +00:00
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
db: &acme.MockDB{
|
2021-03-12 08:16:48 +00:00
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
|
|
|
return &acme.Order{AccountID: "foo"}, nil
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
2021-03-12 08:16:48 +00:00
|
|
|
statusCode: 401,
|
|
|
|
err: acme.NewError(acme.ErrorUnauthorizedType, "account id mismatch"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
|
|
|
},
|
2021-03-12 08:16:48 +00:00
|
|
|
"fail/provisioner-id-mismatch": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: payloadBytes})
|
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
|
|
|
db: &acme.MockDB{
|
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
|
|
|
return &acme.Order{AccountID: "accountID", ProvisionerID: "bar"}, nil
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 401,
|
|
|
|
err: acme.NewError(acme.ErrorUnauthorizedType, "provisioner id mismatch"),
|
2019-05-27 00:41:10 +00:00
|
|
|
}
|
2021-03-12 08:16:48 +00:00
|
|
|
},
|
|
|
|
"fail/order-finalize-error": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
2021-03-10 18:50:51 +00:00
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
2021-03-12 08:16:48 +00:00
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: payloadBytes})
|
2019-05-27 00:41:10 +00:00
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
2021-03-10 18:50:51 +00:00
|
|
|
db: &acme.MockDB{
|
2021-03-12 08:16:48 +00:00
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
|
|
|
return &acme.Order{
|
|
|
|
AccountID: "accountID",
|
|
|
|
ProvisionerID: "acme/test@acme-provisioner.com",
|
2021-03-19 21:37:45 +00:00
|
|
|
ExpiresAt: clock.Now().Add(-time.Hour),
|
2021-03-12 08:16:48 +00:00
|
|
|
Status: acme.StatusReady,
|
|
|
|
}, nil
|
|
|
|
},
|
2021-03-10 18:50:51 +00:00
|
|
|
MockUpdateOrder: func(ctx context.Context, o *acme.Order) error {
|
2021-03-12 08:16:48 +00:00
|
|
|
return acme.NewErrorISE("force")
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 500,
|
|
|
|
err: acme.NewErrorISE("force"),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"ok": func(t *testing.T) test {
|
|
|
|
acc := &acme.Account{ID: "accountID"}
|
|
|
|
ctx := context.WithValue(context.Background(), provisionerContextKey, prov)
|
|
|
|
ctx = context.WithValue(ctx, accContextKey, acc)
|
|
|
|
ctx = context.WithValue(ctx, payloadContextKey, &payloadInfo{value: payloadBytes})
|
|
|
|
ctx = context.WithValue(ctx, baseURLContextKey, baseURL)
|
|
|
|
ctx = context.WithValue(ctx, chi.RouteCtxKey, chiCtx)
|
|
|
|
return test{
|
|
|
|
db: &acme.MockDB{
|
|
|
|
MockGetOrder: func(ctx context.Context, id string) (*acme.Order, error) {
|
|
|
|
return &acme.Order{
|
|
|
|
ID: "orderID",
|
|
|
|
AccountID: "accountID",
|
|
|
|
ProvisionerID: "acme/test@acme-provisioner.com",
|
2021-03-19 21:37:45 +00:00
|
|
|
ExpiresAt: naf,
|
2021-03-12 08:16:48 +00:00
|
|
|
Status: acme.StatusValid,
|
|
|
|
AuthorizationIDs: []string{"foo", "bar", "baz"},
|
|
|
|
NotBefore: nbf,
|
|
|
|
NotAfter: naf,
|
|
|
|
Identifiers: []acme.Identifier{
|
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "example.com",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Type: "dns",
|
|
|
|
Value: "*.smallstep.com",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
CertificateID: "certID",
|
|
|
|
}, nil
|
2019-05-27 00:41:10 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
ctx: ctx,
|
|
|
|
statusCode: 200,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for name, run := range tests {
|
|
|
|
tc := run(t)
|
|
|
|
t.Run(name, func(t *testing.T) {
|
2021-03-12 08:16:48 +00:00
|
|
|
h := &Handler{linker: NewLinker("dns", "acme"), db: tc.db}
|
2019-05-27 00:41:10 +00:00
|
|
|
req := httptest.NewRequest("GET", url, nil)
|
|
|
|
req = req.WithContext(tc.ctx)
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
h.FinalizeOrder(w, req)
|
|
|
|
res := w.Result()
|
|
|
|
|
|
|
|
assert.Equals(t, res.StatusCode, tc.statusCode)
|
|
|
|
|
|
|
|
body, err := ioutil.ReadAll(res.Body)
|
|
|
|
res.Body.Close()
|
|
|
|
assert.FatalError(t, err)
|
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
if res.StatusCode >= 400 && assert.NotNil(t, tc.err) {
|
|
|
|
var ae acme.Error
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.FatalError(t, json.Unmarshal(bytes.TrimSpace(body), &ae))
|
|
|
|
|
2021-03-10 18:50:51 +00:00
|
|
|
assert.Equals(t, ae.Type, tc.err.Type)
|
|
|
|
assert.Equals(t, ae.Detail, tc.err.Detail)
|
|
|
|
assert.Equals(t, ae.Identifier, tc.err.Identifier)
|
|
|
|
assert.Equals(t, ae.Subproblems, tc.err.Subproblems)
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.Equals(t, res.Header["Content-Type"], []string{"application/problem+json"})
|
|
|
|
} else {
|
|
|
|
expB, err := json.Marshal(o)
|
|
|
|
assert.FatalError(t, err)
|
2021-03-12 08:16:48 +00:00
|
|
|
|
|
|
|
ro := new(acme.Order)
|
|
|
|
err = json.Unmarshal(body, ro)
|
|
|
|
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.Equals(t, bytes.TrimSpace(body), expB)
|
2021-03-12 08:16:48 +00:00
|
|
|
assert.Equals(t, res.Header["Location"], []string{url})
|
2019-05-27 00:41:10 +00:00
|
|
|
assert.Equals(t, res.Header["Content-Type"], []string{"application/json"})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|