2019-03-11 16:56:48 +00:00
|
|
|
package certificate
|
2018-12-06 21:50:17 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"encoding/pem"
|
2020-11-21 19:24:11 +00:00
|
|
|
"fmt"
|
2018-12-06 21:50:17 +00:00
|
|
|
"net/http"
|
|
|
|
"testing"
|
|
|
|
|
2020-09-02 01:20:01 +00:00
|
|
|
"github.com/go-acme/lego/v4/acme"
|
|
|
|
"github.com/go-acme/lego/v4/acme/api"
|
|
|
|
"github.com/go-acme/lego/v4/certcrypto"
|
|
|
|
"github.com/go-acme/lego/v4/platform/tester"
|
2018-12-06 21:50:17 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
const certResponseMock = `-----BEGIN CERTIFICATE-----
|
|
|
|
MIIDEDCCAfigAwIBAgIHPhckqW5fPDANBgkqhkiG9w0BAQsFADAoMSYwJAYDVQQD
|
|
|
|
Ex1QZWJibGUgSW50ZXJtZWRpYXRlIENBIDM5NWU2MTAeFw0xODExMDcxNzQ2NTZa
|
|
|
|
Fw0yMzExMDcxNzQ2NTZaMBMxETAPBgNVBAMTCGFjbWUud3RmMIIBIjANBgkqhkiG
|
|
|
|
9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwtLNKvZXD20XPUQCWYSK9rUSKxD9Eb0c9fag
|
|
|
|
bxOxOkLRTgL8LH6yln+bxc3MrHDou4PpDUdeo2CyOQu3CKsTS5mrH3NXYHu0H7p5
|
|
|
|
y3riOJTHnfkGKLT9LciGz7GkXd62nvNP57bOf5Sk4P2M+Qbxd0hPTSfu52740LSy
|
|
|
|
144cnxe2P1aDYehrEp6nYCESuyD/CtUHTo0qwJmzIy163Sp3rSs15BuCPyhySnE3
|
|
|
|
BJ8Ggv+qC6D5I1932DfSqyQJ79iq/HRm0Fn84am3KwvRlUfWxabmsUGARXoqCgnE
|
|
|
|
zcbJVOZKewv0zlQJpfac+b+Imj6Lvt1TGjIz2mVyefYgLx8gwwIDAQABo1QwUjAO
|
|
|
|
BgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwG
|
|
|
|
A1UdEwEB/wQCMAAwEwYDVR0RBAwwCoIIYWNtZS53dGYwDQYJKoZIhvcNAQELBQAD
|
|
|
|
ggEBABB/0iYhmfPSQot5RaeeovQnsqYjI5ryQK2cwzW6qcTJfv8N6+p6XkqF1+W4
|
|
|
|
jXZjrQP8MvgO9KNWlvx12vhINE6wubk88L+2piAi5uS2QejmZbXpyYB9s+oPqlk9
|
|
|
|
IDvfdlVYOqvYAhSx7ggGi+j73mjZVtjAavP6dKuu475ZCeq+NIC15RpbbikWKtYE
|
|
|
|
HBJ7BW8XQKx67iHGx8ygHTDLbREL80Bck3oUm7wIYGMoNijD6RBl25p4gYl9dzOd
|
|
|
|
TqGl5hW/1P5hMbgEzHbr4O3BfWqU2g7tV36TASy3jbC3ONFRNNYrpEZ1AL3+cUri
|
|
|
|
OPPkKtAKAbQkKbUIfsHpBZjKZMU=
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
-----BEGIN CERTIFICATE-----
|
|
|
|
MIIDDDCCAfSgAwIBAgIIOV5hkYJx0JwwDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE
|
|
|
|
AxMVUGViYmxlIFJvb3QgQ0EgNTBmZmJkMB4XDTE4MTEwNzE3NDY0N1oXDTQ4MTEw
|
|
|
|
NzE3NDY0N1owKDEmMCQGA1UEAxMdUGViYmxlIEludGVybWVkaWF0ZSBDQSAzOTVl
|
|
|
|
NjEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCacwXN4LmyRTgYS8TT
|
|
|
|
SZYgz758npHiPTBDKgeN5WVmkkwW0TuN4W2zXhEmcM82uxOEjWS2drvK0+iJKneh
|
|
|
|
0fQR8ZF35dIYFe8WXTg3kEmqcizSgh4LxlOntsXvatfX/6GU/ADo3xAFoBKCijen
|
|
|
|
SRBIY65yq5m00cWx3RMIcQq1B0X8nJS0O1P7MYE/Vvidz5St/36RXVu1oWLeS5Fx
|
|
|
|
HAezW0lqxEUzvC+uLTFWC6f/CilzmI7SsPAkZBk7dO5Qs0d7m/zWF588vlGS+0pt
|
|
|
|
D1on+lU85Ma2zuAd0qmB6LY66N8pEKKtMk93wF/o4Z5i58ahbwNvTKAzz4JSRWSu
|
|
|
|
mB9LAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIChDAdBgNVHSUEFjAUBggrBgEFBQcD
|
|
|
|
AQYIKwYBBQUHAwIwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEA
|
|
|
|
upU0DjzvIvoCOYKbq1RRN7rPdYad39mfjxgkeV0iOF5JoIdO6y1C7XAm9lT69Wjm
|
|
|
|
iUPvnCTMDYft40N2SvmXuuMaPOm4zjNwn4K33jw5XBnpwxC7By/Y0oV+Sl10fBsd
|
|
|
|
QqXC6H7LcSGkv+4eJbgY33P4uH5ZAy+2TkHUuZDkpufkAshzBust7nDAjfv3AIuQ
|
|
|
|
wlPoyZfI11eqyiOqRzOq+B5dIBr1JzKnEzSL6n0JLNQiPO7iN03rud/wYD3gbmcv
|
|
|
|
rzFL1KZfz+HZdnFwFW2T2gVW8L3ii1l9AJDuKzlvjUH3p6bgihVq02sjT8mx+GM2
|
|
|
|
7R4IbHGnj0BJA2vMYC4hSw==
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
`
|
|
|
|
|
|
|
|
const issuerMock = `-----BEGIN CERTIFICATE-----
|
|
|
|
MIIDDDCCAfSgAwIBAgIIOV5hkYJx0JwwDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE
|
|
|
|
AxMVUGViYmxlIFJvb3QgQ0EgNTBmZmJkMB4XDTE4MTEwNzE3NDY0N1oXDTQ4MTEw
|
|
|
|
NzE3NDY0N1owKDEmMCQGA1UEAxMdUGViYmxlIEludGVybWVkaWF0ZSBDQSAzOTVl
|
|
|
|
NjEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCacwXN4LmyRTgYS8TT
|
|
|
|
SZYgz758npHiPTBDKgeN5WVmkkwW0TuN4W2zXhEmcM82uxOEjWS2drvK0+iJKneh
|
|
|
|
0fQR8ZF35dIYFe8WXTg3kEmqcizSgh4LxlOntsXvatfX/6GU/ADo3xAFoBKCijen
|
|
|
|
SRBIY65yq5m00cWx3RMIcQq1B0X8nJS0O1P7MYE/Vvidz5St/36RXVu1oWLeS5Fx
|
|
|
|
HAezW0lqxEUzvC+uLTFWC6f/CilzmI7SsPAkZBk7dO5Qs0d7m/zWF588vlGS+0pt
|
|
|
|
D1on+lU85Ma2zuAd0qmB6LY66N8pEKKtMk93wF/o4Z5i58ahbwNvTKAzz4JSRWSu
|
|
|
|
mB9LAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIChDAdBgNVHSUEFjAUBggrBgEFBQcD
|
|
|
|
AQYIKwYBBQUHAwIwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEA
|
|
|
|
upU0DjzvIvoCOYKbq1RRN7rPdYad39mfjxgkeV0iOF5JoIdO6y1C7XAm9lT69Wjm
|
|
|
|
iUPvnCTMDYft40N2SvmXuuMaPOm4zjNwn4K33jw5XBnpwxC7By/Y0oV+Sl10fBsd
|
|
|
|
QqXC6H7LcSGkv+4eJbgY33P4uH5ZAy+2TkHUuZDkpufkAshzBust7nDAjfv3AIuQ
|
|
|
|
wlPoyZfI11eqyiOqRzOq+B5dIBr1JzKnEzSL6n0JLNQiPO7iN03rud/wYD3gbmcv
|
|
|
|
rzFL1KZfz+HZdnFwFW2T2gVW8L3ii1l9AJDuKzlvjUH3p6bgihVq02sjT8mx+GM2
|
|
|
|
7R4IbHGnj0BJA2vMYC4hSw==
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
`
|
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
const certResponseMock2 = `
|
|
|
|
-----BEGIN CERTIFICATE-----
|
|
|
|
MIIFUzCCBDugAwIBAgISA/z9btaZCSo/qlVwmJrHpoyPMA0GCSqGSIb3DQEBCwUA
|
|
|
|
MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD
|
|
|
|
ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0yMDA3MjUwNjUxNDRaFw0y
|
|
|
|
MDEwMjMwNjUxNDRaMBgxFjAUBgNVBAMTDW5hdHVyZS5nbG9iYWwwggEiMA0GCSqG
|
|
|
|
SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDN/PF8lWub3i+lO3CLl/HJAM86pQH9hWej
|
|
|
|
Whci1PPNzKyEByJq2psNLCO1W1mXK3ClWSyifptCf7+AAFAOoBojPMwjaKMziw1M
|
|
|
|
BxAQiX8MzZLv4Hr4Uk08cQX31QHiEpOv4pMHqB0UpodTYY10dZnDdyJHaGKzxfJh
|
|
|
|
nQPYIVto+UegcVu9iZIDow7ugoT2Gh8nB8jOAc4wtBgmylgeAFmYR6QZ4PYSYFh0
|
|
|
|
DLZGGB1WuU/4YC5OciwTDv5EiqP3KM3NdkmGhPY0A3jcTrjN+HhcE4pYBtG1wHi8
|
|
|
|
PEuqqKyCLa3AjHq4WrZyCCkCMXPbIDS1Qt7botDmUZr/26xJZnl5AgMBAAGjggJj
|
|
|
|
MIICXzAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF
|
|
|
|
BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFFm72Cv7LnjVhcLqUujrykUr70lF
|
|
|
|
MB8GA1UdIwQYMBaAFKhKamMEfd265tE5t6ZFZe/zqOyhMG8GCCsGAQUFBwEBBGMw
|
|
|
|
YTAuBggrBgEFBQcwAYYiaHR0cDovL29jc3AuaW50LXgzLmxldHNlbmNyeXB0Lm9y
|
|
|
|
ZzAvBggrBgEFBQcwAoYjaHR0cDovL2NlcnQuaW50LXgzLmxldHNlbmNyeXB0Lm9y
|
|
|
|
Zy8wGAYDVR0RBBEwD4INbmF0dXJlLmdsb2JhbDBMBgNVHSAERTBDMAgGBmeBDAEC
|
|
|
|
ATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3BzLmxldHNl
|
|
|
|
bmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3ALIeBcyLos2KIE6H
|
|
|
|
ZvkruYolIGdr2vpw57JJUy3vi5BeAAABc4T006IAAAQDAEgwRgIhAPEEvCEMkekD
|
|
|
|
8XLDaxHPnJ85UZL72JqGgNK+7I/NdFNuAiEA5D78b4V1YsD8wvWz/sk6Ks8VgjED
|
|
|
|
eKGl/TyXwKEpzEIAdgBvU3asMfAxGdiZAKRRFf93FRwR2QLBACkGjbIImjfZEwAA
|
|
|
|
AXOE9NPrAAAEAwBHMEUCIAu4YFfGZIN/P+0eRG0krSddHKCSf6rqr6aVqUWkJY3F
|
|
|
|
AiEAz0HkTe0alED1gW9nEAJ1qqK1MLMjRM8SsUv9Is86+CwwDQYJKoZIhvcNAQEL
|
|
|
|
BQADggEBAGriSVi9YuBnm50w84gjlinmeGdvxgugblIoEqKoXd3d5/zx0DvW9Tm6
|
|
|
|
YGfXsvAJUSCag7dZ/s/PEu23jKNdFoaBmDaUHHKnUwbWWF7/ptYZ+YuDVGOJo8PL
|
|
|
|
CULNfUMon20rPU9smzW4BFDBZ6KmX/r4Q8cQ7FLOqKdcng0yMcqIfq4cBxEvd0uQ
|
|
|
|
pHR3AwCjAIGpV6Q9WHHiHx+SEd/Xc18Z5pXa9m3Rz4i6Mfv+AYLtnsZDxcH81cVM
|
|
|
|
7rYp80vhXM9tFd4wyrqLuaVZgYD1ylxTYpTI7sijIq4Sl984f3IPA/olN+zK6E8d
|
|
|
|
EbiufIcKeju/aSellDzzBabEo80YT4o=
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
-----BEGIN CERTIFICATE-----
|
|
|
|
MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/
|
|
|
|
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
|
|
|
|
DkRTVCBSb290IENBIFgzMB4XDTAwMDkzMDIxMTIxOVoXDTIxMDkzMDE0MDExNVow
|
|
|
|
PzEkMCIGA1UEChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMRcwFQYDVQQD
|
|
|
|
Ew5EU1QgUm9vdCBDQSBYMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
|
|
|
|
AN+v6ZdQCINXtMxiZfaQguzH0yxrMMpb7NnDfcdAwRgUi+DoM3ZJKuM/IUmTrE4O
|
|
|
|
rz5Iy2Xu/NMhD2XSKtkyj4zl93ewEnu1lcCJo6m67XMuegwGMoOifooUMM0RoOEq
|
|
|
|
OLl5CjH9UL2AZd+3UWODyOKIYepLYYHsUmu5ouJLGiifSKOeDNoJjj4XLh7dIN9b
|
|
|
|
xiqKqy69cK3FCxolkHRyxXtqqzTWMIn/5WgTe1QLyNau7Fqckh49ZLOMxt+/yUFw
|
|
|
|
7BZy1SbsOFU5Q9D8/RhcQPGX69Wam40dutolucbY38EVAjqr2m7xPi71XAicPNaD
|
|
|
|
aeQQmxkqtilX4+U9m5/wAl0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNV
|
|
|
|
HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMSnsaR7LHH62+FLkHX/xBVghYkQMA0GCSqG
|
|
|
|
SIb3DQEBBQUAA4IBAQCjGiybFwBcqR7uKGY3Or+Dxz9LwwmglSBd49lZRNI+DT69
|
|
|
|
ikugdB/OEIKcdBodfpga3csTS7MgROSR6cz8faXbauX+5v3gTt23ADq1cEmv8uXr
|
|
|
|
AvHRAosZy5Q6XkjEGB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZz
|
|
|
|
R8srzJmwN0jP41ZL9c8PDHIyh8bwRLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5
|
|
|
|
JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubSfZGL+T0yjWW06XyxV3bqxbYo
|
|
|
|
Ob8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
`
|
|
|
|
|
|
|
|
const issuerMock2 = `-----BEGIN CERTIFICATE-----
|
|
|
|
MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/
|
|
|
|
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
|
|
|
|
DkRTVCBSb290IENBIFgzMB4XDTAwMDkzMDIxMTIxOVoXDTIxMDkzMDE0MDExNVow
|
|
|
|
PzEkMCIGA1UEChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMRcwFQYDVQQD
|
|
|
|
Ew5EU1QgUm9vdCBDQSBYMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
|
|
|
|
AN+v6ZdQCINXtMxiZfaQguzH0yxrMMpb7NnDfcdAwRgUi+DoM3ZJKuM/IUmTrE4O
|
|
|
|
rz5Iy2Xu/NMhD2XSKtkyj4zl93ewEnu1lcCJo6m67XMuegwGMoOifooUMM0RoOEq
|
|
|
|
OLl5CjH9UL2AZd+3UWODyOKIYepLYYHsUmu5ouJLGiifSKOeDNoJjj4XLh7dIN9b
|
|
|
|
xiqKqy69cK3FCxolkHRyxXtqqzTWMIn/5WgTe1QLyNau7Fqckh49ZLOMxt+/yUFw
|
|
|
|
7BZy1SbsOFU5Q9D8/RhcQPGX69Wam40dutolucbY38EVAjqr2m7xPi71XAicPNaD
|
|
|
|
aeQQmxkqtilX4+U9m5/wAl0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNV
|
|
|
|
HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMSnsaR7LHH62+FLkHX/xBVghYkQMA0GCSqG
|
|
|
|
SIb3DQEBBQUAA4IBAQCjGiybFwBcqR7uKGY3Or+Dxz9LwwmglSBd49lZRNI+DT69
|
|
|
|
ikugdB/OEIKcdBodfpga3csTS7MgROSR6cz8faXbauX+5v3gTt23ADq1cEmv8uXr
|
|
|
|
AvHRAosZy5Q6XkjEGB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZz
|
|
|
|
R8srzJmwN0jP41ZL9c8PDHIyh8bwRLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5
|
|
|
|
JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubSfZGL+T0yjWW06XyxV3bqxbYo
|
|
|
|
Ob8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
`
|
|
|
|
|
2018-12-06 21:50:17 +00:00
|
|
|
func Test_checkResponse(t *testing.T) {
|
|
|
|
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
2019-02-06 17:15:53 +00:00
|
|
|
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
2018-12-06 21:50:17 +00:00
|
|
|
_, err := w.Write([]byte(certResponseMock))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", key)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2019-01-09 07:29:17 +00:00
|
|
|
certifier := NewCertifier(core, &resolverMock{}, CertifierOptions{KeyType: certcrypto.RSA2048})
|
2018-12-06 21:50:17 +00:00
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
order := acme.ExtendedOrder{
|
|
|
|
Order: acme.Order{
|
|
|
|
Status: acme.StatusValid,
|
|
|
|
Certificate: apiURL + "/certificate",
|
|
|
|
},
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
certRes := &Resource{}
|
|
|
|
bundle := false
|
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
valid, err := certifier.checkResponse(order, certRes, bundle, "")
|
2018-12-06 21:50:17 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.True(t, valid)
|
|
|
|
assert.NotNil(t, certRes)
|
|
|
|
assert.Equal(t, "", certRes.Domain)
|
|
|
|
assert.Contains(t, certRes.CertStableURL, "/certificate")
|
|
|
|
assert.Contains(t, certRes.CertURL, "/certificate")
|
|
|
|
assert.Nil(t, certRes.CSR)
|
|
|
|
assert.Nil(t, certRes.PrivateKey)
|
|
|
|
assert.Equal(t, certResponseMock, string(certRes.Certificate), "Certificate")
|
|
|
|
assert.Equal(t, issuerMock, string(certRes.IssuerCertificate), "IssuerCertificate")
|
|
|
|
}
|
|
|
|
|
|
|
|
func Test_checkResponse_issuerRelUp(t *testing.T) {
|
|
|
|
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
2019-02-06 17:15:53 +00:00
|
|
|
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
2018-12-06 21:50:17 +00:00
|
|
|
w.Header().Set("Link", "<"+apiURL+`/issuer>; rel="up"`)
|
|
|
|
_, err := w.Write([]byte(certResponseMock))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2019-02-06 17:15:53 +00:00
|
|
|
mux.HandleFunc("/issuer", func(w http.ResponseWriter, _ *http.Request) {
|
2018-12-06 21:50:17 +00:00
|
|
|
p, _ := pem.Decode([]byte(issuerMock))
|
|
|
|
_, err := w.Write(p.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", key)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2019-01-09 07:29:17 +00:00
|
|
|
certifier := NewCertifier(core, &resolverMock{}, CertifierOptions{KeyType: certcrypto.RSA2048})
|
2018-12-06 21:50:17 +00:00
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
order := acme.ExtendedOrder{
|
|
|
|
Order: acme.Order{
|
|
|
|
Status: acme.StatusValid,
|
|
|
|
Certificate: apiURL + "/certificate",
|
|
|
|
},
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
certRes := &Resource{}
|
|
|
|
bundle := false
|
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
valid, err := certifier.checkResponse(order, certRes, bundle, "")
|
2018-12-06 21:50:17 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.True(t, valid)
|
|
|
|
assert.NotNil(t, certRes)
|
|
|
|
assert.Equal(t, "", certRes.Domain)
|
|
|
|
assert.Contains(t, certRes.CertStableURL, "/certificate")
|
|
|
|
assert.Contains(t, certRes.CertURL, "/certificate")
|
|
|
|
assert.Nil(t, certRes.CSR)
|
|
|
|
assert.Nil(t, certRes.PrivateKey)
|
|
|
|
assert.Equal(t, certResponseMock, string(certRes.Certificate), "Certificate")
|
|
|
|
assert.Equal(t, issuerMock, string(certRes.IssuerCertificate), "IssuerCertificate")
|
|
|
|
}
|
|
|
|
|
|
|
|
func Test_checkResponse_embeddedIssuer(t *testing.T) {
|
|
|
|
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
2019-02-06 17:15:53 +00:00
|
|
|
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
2018-12-06 21:50:17 +00:00
|
|
|
_, err := w.Write([]byte(certResponseMock))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", key)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2019-01-09 07:29:17 +00:00
|
|
|
certifier := NewCertifier(core, &resolverMock{}, CertifierOptions{KeyType: certcrypto.RSA2048})
|
2018-12-06 21:50:17 +00:00
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
order := acme.ExtendedOrder{
|
|
|
|
Order: acme.Order{
|
|
|
|
Status: acme.StatusValid,
|
|
|
|
Certificate: apiURL + "/certificate",
|
|
|
|
},
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
certRes := &Resource{}
|
|
|
|
bundle := false
|
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
valid, err := certifier.checkResponse(order, certRes, bundle, "")
|
2018-12-06 21:50:17 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.True(t, valid)
|
|
|
|
assert.NotNil(t, certRes)
|
|
|
|
assert.Equal(t, "", certRes.Domain)
|
|
|
|
assert.Contains(t, certRes.CertStableURL, "/certificate")
|
|
|
|
assert.Contains(t, certRes.CertURL, "/certificate")
|
|
|
|
assert.Nil(t, certRes.CSR)
|
|
|
|
assert.Nil(t, certRes.PrivateKey)
|
|
|
|
assert.Equal(t, certResponseMock, string(certRes.Certificate), "Certificate")
|
|
|
|
assert.Equal(t, issuerMock, string(certRes.IssuerCertificate), "IssuerCertificate")
|
|
|
|
}
|
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
func Test_checkResponse_alternate(t *testing.T) {
|
|
|
|
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
|
|
|
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
2020-11-21 19:24:11 +00:00
|
|
|
w.Header().Add("Link", fmt.Sprintf(`<%s/certificate/1>;title="foo";rel="alternate"`, apiURL))
|
|
|
|
|
2020-09-02 00:22:53 +00:00
|
|
|
_, err := w.Write([]byte(certResponseMock))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
})
|
2020-11-21 19:24:11 +00:00
|
|
|
|
|
|
|
mux.HandleFunc("/certificate/1", func(w http.ResponseWriter, _ *http.Request) {
|
2020-09-02 00:22:53 +00:00
|
|
|
_, err := w.Write([]byte(certResponseMock2))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", key)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
certifier := NewCertifier(core, &resolverMock{}, CertifierOptions{KeyType: certcrypto.RSA2048})
|
|
|
|
|
|
|
|
order := acme.ExtendedOrder{
|
|
|
|
Order: acme.Order{
|
|
|
|
Status: acme.StatusValid,
|
|
|
|
Certificate: apiURL + "/certificate",
|
|
|
|
},
|
|
|
|
}
|
2020-11-21 19:24:11 +00:00
|
|
|
certRes := &Resource{
|
|
|
|
Domain: "example.com",
|
|
|
|
}
|
2020-09-02 00:22:53 +00:00
|
|
|
bundle := false
|
|
|
|
|
|
|
|
valid, err := certifier.checkResponse(order, certRes, bundle, "DST Root CA X3")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
assert.True(t, valid)
|
|
|
|
assert.NotNil(t, certRes)
|
2020-11-21 19:24:11 +00:00
|
|
|
assert.Equal(t, "example.com", certRes.Domain)
|
|
|
|
assert.Contains(t, certRes.CertStableURL, "/certificate/1")
|
|
|
|
assert.Contains(t, certRes.CertURL, "/certificate/1")
|
2020-09-02 00:22:53 +00:00
|
|
|
assert.Nil(t, certRes.CSR)
|
|
|
|
assert.Nil(t, certRes.PrivateKey)
|
|
|
|
assert.Equal(t, certResponseMock2, string(certRes.Certificate), "Certificate")
|
|
|
|
assert.Equal(t, issuerMock2, string(certRes.IssuerCertificate), "IssuerCertificate")
|
|
|
|
}
|
|
|
|
|
2019-05-25 14:12:37 +00:00
|
|
|
func Test_Get(t *testing.T) {
|
|
|
|
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
|
|
|
mux.HandleFunc("/acme/cert/test-cert", func(w http.ResponseWriter, _ *http.Request) {
|
|
|
|
_, err := w.Write([]byte(certResponseMock))
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", key)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
certifier := NewCertifier(core, &resolverMock{}, CertifierOptions{KeyType: certcrypto.RSA2048})
|
|
|
|
|
|
|
|
certRes, err := certifier.Get(apiURL+"/acme/cert/test-cert", false)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
assert.NotNil(t, certRes)
|
|
|
|
assert.Equal(t, "acme.wtf", certRes.Domain)
|
|
|
|
assert.Equal(t, apiURL+"/acme/cert/test-cert", certRes.CertStableURL)
|
|
|
|
assert.Equal(t, apiURL+"/acme/cert/test-cert", certRes.CertURL)
|
|
|
|
assert.Nil(t, certRes.CSR)
|
|
|
|
assert.Nil(t, certRes.PrivateKey)
|
|
|
|
assert.Equal(t, certResponseMock, string(certRes.Certificate), "Certificate")
|
|
|
|
assert.Equal(t, issuerMock, string(certRes.IssuerCertificate), "IssuerCertificate")
|
|
|
|
}
|
|
|
|
|
2018-12-06 21:50:17 +00:00
|
|
|
type resolverMock struct {
|
|
|
|
error error
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *resolverMock) Solve(authorizations []acme.Authorization) error {
|
|
|
|
return r.error
|
|
|
|
}
|