4570 lines
		
	
	
		
			169 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			4570 lines
		
	
	
		
			169 KiB
		
	
	
	
		
			Go
		
	
	
	
| package ra
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"context"
 | |
| 	"crypto/ecdsa"
 | |
| 	"crypto/elliptic"
 | |
| 	"crypto/rand"
 | |
| 	"crypto/rsa"
 | |
| 	"crypto/sha256"
 | |
| 	"crypto/x509"
 | |
| 	"crypto/x509/pkix"
 | |
| 	"encoding/json"
 | |
| 	"encoding/pem"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"math/big"
 | |
| 	mrand "math/rand/v2"
 | |
| 	"net"
 | |
| 	"os"
 | |
| 	"regexp"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"sync"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/go-jose/go-jose/v4"
 | |
| 	ctasn1 "github.com/google/certificate-transparency-go/asn1"
 | |
| 	ctx509 "github.com/google/certificate-transparency-go/x509"
 | |
| 	ctpkix "github.com/google/certificate-transparency-go/x509/pkix"
 | |
| 	"github.com/jmhodges/clock"
 | |
| 	"github.com/prometheus/client_golang/prometheus"
 | |
| 	"github.com/weppos/publicsuffix-go/publicsuffix"
 | |
| 	"golang.org/x/crypto/ocsp"
 | |
| 	"google.golang.org/grpc"
 | |
| 	"google.golang.org/grpc/codes"
 | |
| 	"google.golang.org/grpc/status"
 | |
| 	"google.golang.org/protobuf/types/known/emptypb"
 | |
| 	"google.golang.org/protobuf/types/known/timestamppb"
 | |
| 
 | |
| 	akamaipb "github.com/letsencrypt/boulder/akamai/proto"
 | |
| 	capb "github.com/letsencrypt/boulder/ca/proto"
 | |
| 	"github.com/letsencrypt/boulder/cmd"
 | |
| 	"github.com/letsencrypt/boulder/config"
 | |
| 	"github.com/letsencrypt/boulder/core"
 | |
| 	corepb "github.com/letsencrypt/boulder/core/proto"
 | |
| 	"github.com/letsencrypt/boulder/ctpolicy"
 | |
| 	"github.com/letsencrypt/boulder/ctpolicy/loglist"
 | |
| 	berrors "github.com/letsencrypt/boulder/errors"
 | |
| 	"github.com/letsencrypt/boulder/goodkey"
 | |
| 	bgrpc "github.com/letsencrypt/boulder/grpc"
 | |
| 	"github.com/letsencrypt/boulder/identifier"
 | |
| 	"github.com/letsencrypt/boulder/issuance"
 | |
| 	blog "github.com/letsencrypt/boulder/log"
 | |
| 	"github.com/letsencrypt/boulder/metrics"
 | |
| 	"github.com/letsencrypt/boulder/mocks"
 | |
| 	"github.com/letsencrypt/boulder/policy"
 | |
| 	pubpb "github.com/letsencrypt/boulder/publisher/proto"
 | |
| 	rapb "github.com/letsencrypt/boulder/ra/proto"
 | |
| 	"github.com/letsencrypt/boulder/ratelimit"
 | |
| 	"github.com/letsencrypt/boulder/ratelimits"
 | |
| 	bredis "github.com/letsencrypt/boulder/redis"
 | |
| 	"github.com/letsencrypt/boulder/sa"
 | |
| 	sapb "github.com/letsencrypt/boulder/sa/proto"
 | |
| 	"github.com/letsencrypt/boulder/test"
 | |
| 	isa "github.com/letsencrypt/boulder/test/inmem/sa"
 | |
| 	"github.com/letsencrypt/boulder/test/vars"
 | |
| 	vapb "github.com/letsencrypt/boulder/va/proto"
 | |
| )
 | |
| 
 | |
| func createPendingAuthorization(t *testing.T, sa sapb.StorageAuthorityClient, domain string, exp time.Time) *corepb.Authorization {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	res, err := sa.NewOrderAndAuthzs(
 | |
| 		context.Background(),
 | |
| 		&sapb.NewOrderAndAuthzsRequest{
 | |
| 			NewOrder: &sapb.NewOrderRequest{
 | |
| 				RegistrationID: Registration.Id,
 | |
| 				Expires:        timestamppb.New(exp),
 | |
| 				DnsNames:       []string{domain},
 | |
| 			},
 | |
| 			NewAuthzs: []*sapb.NewAuthzRequest{
 | |
| 				{
 | |
| 					Identifier:     &corepb.Identifier{Type: string(core.ChallengeTypeDNS01), Value: domain},
 | |
| 					RegistrationID: Registration.Id,
 | |
| 					Expires:        timestamppb.New(exp),
 | |
| 					ChallengeTypes: []string{
 | |
| 						string(core.ChallengeTypeHTTP01),
 | |
| 						string(core.ChallengeTypeDNS01),
 | |
| 						string(core.ChallengeTypeTLSALPN01)},
 | |
| 					Token: core.NewToken(),
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	)
 | |
| 	test.AssertNotError(t, err, "sa.NewOrderAndAuthzs failed")
 | |
| 
 | |
| 	return getAuthorization(t, fmt.Sprint(res.V2Authorizations[0]), sa)
 | |
| }
 | |
| 
 | |
| func createFinalizedAuthorization(t *testing.T, sa sapb.StorageAuthorityClient, domain string, exp time.Time, chall core.AcmeChallenge, attemptedAt time.Time) int64 {
 | |
| 	t.Helper()
 | |
| 	pending := createPendingAuthorization(t, sa, domain, exp)
 | |
| 	pendingID, err := strconv.ParseInt(pending.Id, 10, 64)
 | |
| 	test.AssertNotError(t, err, "strconv.ParseInt failed")
 | |
| 	_, err = sa.FinalizeAuthorization2(context.Background(), &sapb.FinalizeAuthorizationRequest{
 | |
| 		Id:          pendingID,
 | |
| 		Status:      "valid",
 | |
| 		Expires:     timestamppb.New(exp),
 | |
| 		Attempted:   string(chall),
 | |
| 		AttemptedAt: timestamppb.New(attemptedAt),
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "sa.FinalizeAuthorizations2 failed")
 | |
| 	return pendingID
 | |
| }
 | |
| 
 | |
| func getAuthorization(t *testing.T, id string, sa sapb.StorageAuthorityClient) *corepb.Authorization {
 | |
| 	t.Helper()
 | |
| 	idInt, err := strconv.ParseInt(id, 10, 64)
 | |
| 	test.AssertNotError(t, err, "strconv.ParseInt failed")
 | |
| 	dbAuthz, err := sa.GetAuthorization2(ctx, &sapb.AuthorizationID2{Id: idInt})
 | |
| 	test.AssertNotError(t, err, "Could not fetch authorization from database")
 | |
| 	return dbAuthz
 | |
| }
 | |
| 
 | |
| func dnsChallIdx(t *testing.T, challenges []*corepb.Challenge) int64 {
 | |
| 	t.Helper()
 | |
| 	var challIdx int64
 | |
| 	var set bool
 | |
| 	for i, ch := range challenges {
 | |
| 		if core.AcmeChallenge(ch.Type) == core.ChallengeTypeDNS01 {
 | |
| 			challIdx = int64(i)
 | |
| 			set = true
 | |
| 			break
 | |
| 		}
 | |
| 	}
 | |
| 	if !set {
 | |
| 		t.Errorf("dnsChallIdx didn't find challenge of type DNS-01")
 | |
| 	}
 | |
| 	return challIdx
 | |
| }
 | |
| 
 | |
| func numAuthorizations(o *corepb.Order) int {
 | |
| 	return len(o.V2Authorizations)
 | |
| }
 | |
| 
 | |
| type DummyValidationAuthority struct {
 | |
| 	performValidationRequest             chan *vapb.PerformValidationRequest
 | |
| 	PerformValidationRequestResultError  error
 | |
| 	PerformValidationRequestResultReturn *vapb.ValidationResult
 | |
| }
 | |
| 
 | |
| func (dva *DummyValidationAuthority) PerformValidation(ctx context.Context, req *vapb.PerformValidationRequest, _ ...grpc.CallOption) (*vapb.ValidationResult, error) {
 | |
| 	dva.performValidationRequest <- req
 | |
| 	return dva.PerformValidationRequestResultReturn, dva.PerformValidationRequestResultError
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	// These values we simulate from the client
 | |
| 	AccountKeyJSONA = []byte(`{
 | |
| 		"kty":"RSA",
 | |
| 		"n":"0vx7agoebGcQSuuPiLJXZptN9nndrQmbXEps2aiAFbWhM78LhWx4cbbfAAtVT86zwu1RK7aPFFxuhDR1L6tSoc_BJECPebWKRXjBZCiFV4n3oknjhMstn64tZ_2W-5JsGY4Hc5n9yBXArwl93lqt7_RN5w6Cf0h4QyQ5v-65YGjQR0_FDW2QvzqY368QQMicAtaSqzs8KJZgnYb9c7d0zgdAZHzu6qMQvRL5hajrn1n91CbOpbISD08qNLyrdkt-bFTWhAI4vMQFh6WeZu0fM4lFd2NcRwr3XPksINHaQ-G_xBniIqbw0Ls1jF44-csFCur-kEgU8awapJzKnqDKgw",
 | |
| 		"e":"AQAB"
 | |
| 	}`)
 | |
| 	AccountKeyA = jose.JSONWebKey{}
 | |
| 
 | |
| 	AccountKeyJSONB = []byte(`{
 | |
| 		"kty":"RSA",
 | |
| 		"n":"z8bp-jPtHt4lKBqepeKF28g_QAEOuEsCIou6sZ9ndsQsEjxEOQxQ0xNOQezsKa63eogw8YS3vzjUcPP5BJuVzfPfGd5NVUdT-vSSwxk3wvk_jtNqhrpcoG0elRPQfMVsQWmxCAXCVRz3xbcFI8GTe-syynG3l-g1IzYIIZVNI6jdljCZML1HOMTTW4f7uJJ8mM-08oQCeHbr5ejK7O2yMSSYxW03zY-Tj1iVEebROeMv6IEEJNFSS4yM-hLpNAqVuQxFGetwtwjDMC1Drs1dTWrPuUAAjKGrP151z1_dE74M5evpAhZUmpKv1hY-x85DC6N0hFPgowsanmTNNiV75w",
 | |
| 		"e":"AQAB"
 | |
| 	}`)
 | |
| 	AccountKeyB = jose.JSONWebKey{}
 | |
| 
 | |
| 	AccountKeyJSONC = []byte(`{
 | |
| 		"kty":"RSA",
 | |
| 		"n":"rFH5kUBZrlPj73epjJjyCxzVzZuV--JjKgapoqm9pOuOt20BUTdHqVfC2oDclqM7HFhkkX9OSJMTHgZ7WaVqZv9u1X2yjdx9oVmMLuspX7EytW_ZKDZSzL-sCOFCuQAuYKkLbsdcA3eHBK_lwc4zwdeHFMKIulNvLqckkqYB9s8GpgNXBDIQ8GjR5HuJke_WUNjYHSd8jY1LU9swKWsLQe2YoQUz_ekQvBvBCoaFEtrtRaSJKNLIVDObXFr2TLIiFiM0Em90kK01-eQ7ZiruZTKomll64bRFPoNo4_uwubddg3xTqur2vdF3NyhTrYdvAgTem4uC0PFjEQ1bK_djBQ",
 | |
| 		"e":"AQAB"
 | |
| 	}`)
 | |
| 	AccountKeyC = jose.JSONWebKey{}
 | |
| 
 | |
| 	// These values we simulate from the client
 | |
| 	AccountPrivateKeyJSON = []byte(`{
 | |
| 		"kty":"RSA",
 | |
| 		"n":"0vx7agoebGcQSuuPiLJXZptN9nndrQmbXEps2aiAFbWhM78LhWx4cbbfAAtVT86zwu1RK7aPFFxuhDR1L6tSoc_BJECPebWKRXjBZCiFV4n3oknjhMstn64tZ_2W-5JsGY4Hc5n9yBXArwl93lqt7_RN5w6Cf0h4QyQ5v-65YGjQR0_FDW2QvzqY368QQMicAtaSqzs8KJZgnYb9c7d0zgdAZHzu6qMQvRL5hajrn1n91CbOpbISD08qNLyrdkt-bFTWhAI4vMQFh6WeZu0fM4lFd2NcRwr3XPksINHaQ-G_xBniIqbw0Ls1jF44-csFCur-kEgU8awapJzKnqDKgw",
 | |
| 		"e":"AQAB",
 | |
| 		"d":"X4cTteJY_gn4FYPsXB8rdXix5vwsg1FLN5E3EaG6RJoVH-HLLKD9M7dx5oo7GURknchnrRweUkC7hT5fJLM0WbFAKNLWY2vv7B6NqXSzUvxT0_YSfqijwp3RTzlBaCxWp4doFk5N2o8Gy_nHNKroADIkJ46pRUohsXywbReAdYaMwFs9tv8d_cPVY3i07a3t8MN6TNwm0dSawm9v47UiCl3Sk5ZiG7xojPLu4sbg1U2jx4IBTNBznbJSzFHK66jT8bgkuqsk0GjskDJk19Z4qwjwbsnn4j2WBii3RL-Us2lGVkY8fkFzme1z0HbIkfz0Y6mqnOYtqc0X4jfcKoAC8Q",
 | |
| 		"p":"83i-7IvMGXoMXCskv73TKr8637FiO7Z27zv8oj6pbWUQyLPQBQxtPVnwD20R-60eTDmD2ujnMt5PoqMrm8RfmNhVWDtjjMmCMjOpSXicFHj7XOuVIYQyqVWlWEh6dN36GVZYk93N8Bc9vY41xy8B9RzzOGVQzXvNEvn7O0nVbfs",
 | |
| 		"q":"3dfOR9cuYq-0S-mkFLzgItgMEfFzB2q3hWehMuG0oCuqnb3vobLyumqjVZQO1dIrdwgTnCdpYzBcOfW5r370AFXjiWft_NGEiovonizhKpo9VVS78TzFgxkIdrecRezsZ-1kYd_s1qDbxtkDEgfAITAG9LUnADun4vIcb6yelxk",
 | |
| 		"dp":"G4sPXkc6Ya9y8oJW9_ILj4xuppu0lzi_H7VTkS8xj5SdX3coE0oimYwxIi2emTAue0UOa5dpgFGyBJ4c8tQ2VF402XRugKDTP8akYhFo5tAA77Qe_NmtuYZc3C3m3I24G2GvR5sSDxUyAN2zq8Lfn9EUms6rY3Ob8YeiKkTiBj0",
 | |
| 		"dq":"s9lAH9fggBsoFR8Oac2R_E2gw282rT2kGOAhvIllETE1efrA6huUUvMfBcMpn8lqeW6vzznYY5SSQF7pMdC_agI3nG8Ibp1BUb0JUiraRNqUfLhcQb_d9GF4Dh7e74WbRsobRonujTYN1xCaP6TO61jvWrX-L18txXw494Q_cgk",
 | |
| 		"qi":"GyM_p6JrXySiz1toFgKbWV-JdI3jQ4ypu9rbMWx3rQJBfmt0FoYzgUIZEVFEcOqwemRN81zoDAaa-Bk0KWNGDjJHZDdDmFhW3AN7lI-puxk_mHZGJ11rxyR8O55XLSe3SPmRfKwZI6yU24ZxvQKFYItdldUKGzO6Ia6zTKhAVRU"
 | |
| 	}`)
 | |
| 	AccountPrivateKey = jose.JSONWebKey{}
 | |
| 
 | |
| 	ShortKeyJSON = []byte(`{
 | |
| 		"e": "AQAB",
 | |
| 		"kty": "RSA",
 | |
| 		"n": "tSwgy3ORGvc7YJI9B2qqkelZRUC6F1S5NwXFvM4w5-M0TsxbFsH5UH6adigV0jzsDJ5imAechcSoOhAh9POceCbPN1sTNwLpNbOLiQQ7RD5mY_"
 | |
| 		}`)
 | |
| 
 | |
| 	ShortKey = jose.JSONWebKey{}
 | |
| 
 | |
| 	ResponseIndex = 0
 | |
| 
 | |
| 	ExampleCSR = &x509.CertificateRequest{}
 | |
| 
 | |
| 	Registration = &corepb.Registration{Id: 1}
 | |
| 
 | |
| 	Identifier = "not-example.com"
 | |
| 
 | |
| 	log = blog.UseMock()
 | |
| )
 | |
| 
 | |
| var ctx = context.Background()
 | |
| 
 | |
| // dummyRateLimitConfig satisfies the rl.RateLimitConfig interface while
 | |
| // allowing easy mocking of the individual RateLimitPolicy's
 | |
| type dummyRateLimitConfig struct {
 | |
| 	CertificatesPerNamePolicy             ratelimit.RateLimitPolicy
 | |
| 	RegistrationsPerIPPolicy              ratelimit.RateLimitPolicy
 | |
| 	RegistrationsPerIPRangePolicy         ratelimit.RateLimitPolicy
 | |
| 	PendingAuthorizationsPerAccountPolicy ratelimit.RateLimitPolicy
 | |
| 	NewOrdersPerAccountPolicy             ratelimit.RateLimitPolicy
 | |
| 	InvalidAuthorizationsPerAccountPolicy ratelimit.RateLimitPolicy
 | |
| 	CertificatesPerFQDNSetPolicy          ratelimit.RateLimitPolicy
 | |
| 	CertificatesPerFQDNSetFastPolicy      ratelimit.RateLimitPolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) CertificatesPerName() ratelimit.RateLimitPolicy {
 | |
| 	return r.CertificatesPerNamePolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) RegistrationsPerIP() ratelimit.RateLimitPolicy {
 | |
| 	return r.RegistrationsPerIPPolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) RegistrationsPerIPRange() ratelimit.RateLimitPolicy {
 | |
| 	return r.RegistrationsPerIPRangePolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) PendingAuthorizationsPerAccount() ratelimit.RateLimitPolicy {
 | |
| 	return r.PendingAuthorizationsPerAccountPolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) NewOrdersPerAccount() ratelimit.RateLimitPolicy {
 | |
| 	return r.NewOrdersPerAccountPolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) InvalidAuthorizationsPerAccount() ratelimit.RateLimitPolicy {
 | |
| 	return r.InvalidAuthorizationsPerAccountPolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) CertificatesPerFQDNSet() ratelimit.RateLimitPolicy {
 | |
| 	return r.CertificatesPerFQDNSetPolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) CertificatesPerFQDNSetFast() ratelimit.RateLimitPolicy {
 | |
| 	return r.CertificatesPerFQDNSetFastPolicy
 | |
| }
 | |
| 
 | |
| func (r *dummyRateLimitConfig) LoadPolicies(contents []byte) error {
 | |
| 	return nil // NOP - unrequired behaviour for this mock
 | |
| }
 | |
| 
 | |
| func parseAndMarshalIP(t *testing.T, ip string) []byte {
 | |
| 	ipBytes, err := net.ParseIP(ip).MarshalText()
 | |
| 	test.AssertNotError(t, err, "failed to marshal ip")
 | |
| 	return ipBytes
 | |
| }
 | |
| 
 | |
| func newAcctKey(t *testing.T) []byte {
 | |
| 	key, _ := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
 | |
| 	jwk := &jose.JSONWebKey{Key: key.Public()}
 | |
| 	acctKey, err := jwk.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "failed to marshal account key")
 | |
| 	return acctKey
 | |
| }
 | |
| 
 | |
| func initAuthorities(t *testing.T) (*DummyValidationAuthority, sapb.StorageAuthorityClient, *RegistrationAuthorityImpl, clock.FakeClock, func()) {
 | |
| 	err := json.Unmarshal(AccountKeyJSONA, &AccountKeyA)
 | |
| 	test.AssertNotError(t, err, "Failed to unmarshal public JWK")
 | |
| 	err = json.Unmarshal(AccountKeyJSONB, &AccountKeyB)
 | |
| 	test.AssertNotError(t, err, "Failed to unmarshal public JWK")
 | |
| 	err = json.Unmarshal(AccountKeyJSONC, &AccountKeyC)
 | |
| 	test.AssertNotError(t, err, "Failed to unmarshal public JWK")
 | |
| 
 | |
| 	err = json.Unmarshal(AccountPrivateKeyJSON, &AccountPrivateKey)
 | |
| 	test.AssertNotError(t, err, "Failed to unmarshal private JWK")
 | |
| 
 | |
| 	err = json.Unmarshal(ShortKeyJSON, &ShortKey)
 | |
| 	test.AssertNotError(t, err, "Failed to unmarshal JWK")
 | |
| 
 | |
| 	fc := clock.NewFake()
 | |
| 	// Set to some non-zero time.
 | |
| 	fc.Set(time.Date(2020, 3, 4, 5, 0, 0, 0, time.UTC))
 | |
| 
 | |
| 	dbMap, err := sa.DBMapForTest(vars.DBConnSA)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to create dbMap: %s", err)
 | |
| 	}
 | |
| 	ssa, err := sa.NewSQLStorageAuthority(dbMap, dbMap, nil, 1, 0, fc, log, metrics.NoopRegisterer)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to create SA: %s", err)
 | |
| 	}
 | |
| 	sa := &isa.SA{Impl: ssa}
 | |
| 
 | |
| 	saDBCleanUp := test.ResetBoulderTestDatabase(t)
 | |
| 
 | |
| 	va := &DummyValidationAuthority{
 | |
| 		performValidationRequest: make(chan *vapb.PerformValidationRequest, 1),
 | |
| 	}
 | |
| 
 | |
| 	pa, err := policy.New(map[core.AcmeChallenge]bool{
 | |
| 		core.ChallengeTypeHTTP01: true,
 | |
| 		core.ChallengeTypeDNS01:  true,
 | |
| 	}, blog.NewMock())
 | |
| 	test.AssertNotError(t, err, "Couldn't create PA")
 | |
| 	err = pa.LoadHostnamePolicyFile("../test/hostname-policy.yaml")
 | |
| 	test.AssertNotError(t, err, "Couldn't set hostname policy")
 | |
| 
 | |
| 	stats := metrics.NoopRegisterer
 | |
| 
 | |
| 	ca := &mocks.MockCA{
 | |
| 		PEM: eeCertPEM,
 | |
| 	}
 | |
| 	cleanUp := func() {
 | |
| 		saDBCleanUp()
 | |
| 	}
 | |
| 
 | |
| 	block, _ := pem.Decode(CSRPEM)
 | |
| 	ExampleCSR, _ = x509.ParseCertificateRequest(block.Bytes)
 | |
| 
 | |
| 	initialIP, err := net.ParseIP("3.2.3.3").MarshalText()
 | |
| 	test.AssertNotError(t, err, "Couldn't create initial IP")
 | |
| 	Registration, _ = ssa.NewRegistration(ctx, &corepb.Registration{
 | |
| 		Key:       AccountKeyJSONA,
 | |
| 		InitialIP: initialIP,
 | |
| 		Status:    string(core.StatusValid),
 | |
| 	})
 | |
| 
 | |
| 	ctp := ctpolicy.New(&mocks.PublisherClient{}, loglist.List{
 | |
| 		"OperA": {
 | |
| 			"LogA1": {Url: "UrlA1", Key: "KeyA1"},
 | |
| 		},
 | |
| 		"OperB": {
 | |
| 			"LogB1": {Url: "UrlB1", Key: "KeyB1"},
 | |
| 		},
 | |
| 	}, nil, nil, 0, log, metrics.NoopRegisterer)
 | |
| 
 | |
| 	var limiter *ratelimits.Limiter
 | |
| 	var txnBuilder *ratelimits.TransactionBuilder
 | |
| 	if strings.Contains(os.Getenv("BOULDER_CONFIG_DIR"), "test/config-next") {
 | |
| 		rc := bredis.Config{
 | |
| 			Username: "unittest-rw",
 | |
| 			TLS: cmd.TLSConfig{
 | |
| 				CACertFile: "../test/certs/ipki/minica.pem",
 | |
| 				CertFile:   "../test/certs/ipki/localhost/cert.pem",
 | |
| 				KeyFile:    "../test/certs/ipki/localhost/key.pem",
 | |
| 			},
 | |
| 			Lookups: []cmd.ServiceDomain{
 | |
| 				{
 | |
| 					Service: "redisratelimits",
 | |
| 					Domain:  "service.consul",
 | |
| 				},
 | |
| 			},
 | |
| 			LookupDNSAuthority: "consul.service.consul",
 | |
| 		}
 | |
| 		rc.PasswordConfig = cmd.PasswordConfig{
 | |
| 			PasswordFile: "../test/secrets/ratelimits_redis_password",
 | |
| 		}
 | |
| 		ring, err := bredis.NewRingFromConfig(rc, stats, log)
 | |
| 		test.AssertNotError(t, err, "making redis ring client")
 | |
| 		source := ratelimits.NewRedisSource(ring.Ring, fc, stats)
 | |
| 		test.AssertNotNil(t, source, "source should not be nil")
 | |
| 		limiter, err = ratelimits.NewLimiter(fc, source, stats)
 | |
| 		test.AssertNotError(t, err, "making limiter")
 | |
| 		txnBuilder, err = ratelimits.NewTransactionBuilder("../test/config-next/wfe2-ratelimit-defaults.yml", "")
 | |
| 		test.AssertNotError(t, err, "making transaction composer")
 | |
| 	}
 | |
| 
 | |
| 	testKeyPolicy, err := goodkey.NewPolicy(nil, nil)
 | |
| 	test.AssertNotError(t, err, "making keypolicy")
 | |
| 
 | |
| 	ra := NewRegistrationAuthorityImpl(
 | |
| 		fc, log, stats,
 | |
| 		1, testKeyPolicy, limiter, txnBuilder, 100,
 | |
| 		300*24*time.Hour, 7*24*time.Hour,
 | |
| 		nil, noopCAA{},
 | |
| 		0, 5*time.Minute,
 | |
| 		ctp, nil, nil)
 | |
| 	ra.SA = sa
 | |
| 	ra.VA = va
 | |
| 	ra.CA = ca
 | |
| 	ra.OCSP = &mocks.MockOCSPGenerator{}
 | |
| 	ra.PA = pa
 | |
| 	return va, sa, ra, fc, cleanUp
 | |
| }
 | |
| 
 | |
| func TestValidateContacts(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ansible := "ansible:earth.sol.milkyway.laniakea/letsencrypt"
 | |
| 	validEmail := "mailto:admin@email.com"
 | |
| 	otherValidEmail := "mailto:other-admin@email.com"
 | |
| 	malformedEmail := "mailto:admin.com"
 | |
| 	nonASCII := "mailto:señor@email.com"
 | |
| 	unparsable := "mailto:a@email.com, b@email.com"
 | |
| 	forbidden := "mailto:a@example.org"
 | |
| 
 | |
| 	err := ra.validateContacts([]string{})
 | |
| 	test.AssertNotError(t, err, "No Contacts")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{validEmail, otherValidEmail})
 | |
| 	test.AssertError(t, err, "Too Many Contacts")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{validEmail})
 | |
| 	test.AssertNotError(t, err, "Valid Email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{malformedEmail})
 | |
| 	test.AssertError(t, err, "Malformed Email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{ansible})
 | |
| 	test.AssertError(t, err, "Unknown scheme")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{""})
 | |
| 	test.AssertError(t, err, "Empty URL")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{nonASCII})
 | |
| 	test.AssertError(t, err, "Non ASCII email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{unparsable})
 | |
| 	test.AssertError(t, err, "Unparsable email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{forbidden})
 | |
| 	test.AssertError(t, err, "Forbidden email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:admin@localhost"})
 | |
| 	test.AssertError(t, err, "Forbidden email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:admin@example.not.a.iana.suffix"})
 | |
| 	test.AssertError(t, err, "Forbidden email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:admin@1.2.3.4"})
 | |
| 	test.AssertError(t, err, "Forbidden email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:admin@[1.2.3.4]"})
 | |
| 	test.AssertError(t, err, "Forbidden email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:admin@a.com?no-reminder-emails"})
 | |
| 	test.AssertError(t, err, "No hfields in email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:example@a.com?"})
 | |
| 	test.AssertError(t, err, "No hfields in email")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:example@a.com#"})
 | |
| 	test.AssertError(t, err, "No fragment")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{"mailto:example@a.com#optional"})
 | |
| 	test.AssertError(t, err, "No fragment")
 | |
| 
 | |
| 	// The registrations.contact field is VARCHAR(191). 175 'a' characters plus
 | |
| 	// the prefix "mailto:" and the suffix "@a.com" makes exactly 191 bytes of
 | |
| 	// encoded JSON. The correct size to hit our maximum DB field length.
 | |
| 	var longStringBuf strings.Builder
 | |
| 	longStringBuf.WriteString("mailto:")
 | |
| 	for range 175 {
 | |
| 		longStringBuf.WriteRune('a')
 | |
| 	}
 | |
| 	longStringBuf.WriteString("@a.com")
 | |
| 
 | |
| 	err = ra.validateContacts([]string{longStringBuf.String()})
 | |
| 	test.AssertError(t, err, "Too long contacts")
 | |
| }
 | |
| 
 | |
| func TestNewRegistration(t *testing.T) {
 | |
| 	_, sa, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	mailto := "mailto:foo@letsencrypt.org"
 | |
| 	acctKeyB, err := AccountKeyB.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "failed to marshal account key")
 | |
| 	input := &corepb.Registration{
 | |
| 		Contact:         []string{mailto},
 | |
| 		ContactsPresent: true,
 | |
| 		Key:             acctKeyB,
 | |
| 		InitialIP:       parseAndMarshalIP(t, "7.6.6.5"),
 | |
| 	}
 | |
| 
 | |
| 	result, err := ra.NewRegistration(ctx, input)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("could not create new registration: %s", err)
 | |
| 	}
 | |
| 	test.AssertByteEquals(t, result.Key, acctKeyB)
 | |
| 	test.Assert(t, len(result.Contact) == 1, "Wrong number of contacts")
 | |
| 	test.Assert(t, mailto == (result.Contact)[0], "Contact didn't match")
 | |
| 	test.Assert(t, result.Agreement == "", "Agreement didn't default empty")
 | |
| 
 | |
| 	reg, err := sa.GetRegistration(ctx, &sapb.RegistrationID{Id: result.Id})
 | |
| 	test.AssertNotError(t, err, "Failed to retrieve registration")
 | |
| 	test.AssertByteEquals(t, reg.Key, acctKeyB)
 | |
| }
 | |
| 
 | |
| func TestNewRegistrationContactsPresent(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	testCases := []struct {
 | |
| 		Name        string
 | |
| 		Reg         *corepb.Registration
 | |
| 		ExpectedErr error
 | |
| 	}{
 | |
| 		{
 | |
| 			Name: "No contacts provided by client ContactsPresent false",
 | |
| 			Reg: &corepb.Registration{
 | |
| 				Key:       newAcctKey(t),
 | |
| 				InitialIP: parseAndMarshalIP(t, "7.6.6.5"),
 | |
| 			},
 | |
| 			ExpectedErr: nil,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Empty contact provided by client ContactsPresent true",
 | |
| 			Reg: &corepb.Registration{
 | |
| 				Contact:         []string{},
 | |
| 				ContactsPresent: true,
 | |
| 				Key:             newAcctKey(t),
 | |
| 				InitialIP:       parseAndMarshalIP(t, "7.6.6.4"),
 | |
| 			},
 | |
| 			ExpectedErr: nil,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Valid contact provided by client ContactsPresent true",
 | |
| 			Reg: &corepb.Registration{
 | |
| 				Contact:         []string{"mailto:foo@letsencrypt.org"},
 | |
| 				ContactsPresent: true,
 | |
| 				Key:             newAcctKey(t),
 | |
| 				InitialIP:       parseAndMarshalIP(t, "7.6.4.3"),
 | |
| 			},
 | |
| 			ExpectedErr: nil,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Valid contact provided by client ContactsPresent false",
 | |
| 			Reg: &corepb.Registration{
 | |
| 				Contact:         []string{"mailto:foo@letsencrypt.org"},
 | |
| 				ContactsPresent: false,
 | |
| 				Key:             newAcctKey(t),
 | |
| 				InitialIP:       parseAndMarshalIP(t, "7.6.6.2"),
 | |
| 			},
 | |
| 			ExpectedErr: fmt.Errorf("account contacts present but contactsPresent false"),
 | |
| 		},
 | |
| 	}
 | |
| 	// For each test case we check that the NewRegistration works as
 | |
| 	// intended with variations of Contact and ContactsPresent fields
 | |
| 	for _, tc := range testCases {
 | |
| 		t.Run(tc.Name, func(t *testing.T) {
 | |
| 			// Create new registration
 | |
| 			_, err := ra.NewRegistration(ctx, tc.Reg)
 | |
| 			// Check error output
 | |
| 			if tc.ExpectedErr == nil {
 | |
| 				test.AssertNotError(t, err, "expected no error for NewRegistration")
 | |
| 			} else {
 | |
| 				test.AssertError(t, err, "expected error for NewRegistration")
 | |
| 				test.AssertEquals(t, err.Error(), tc.ExpectedErr.Error())
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type mockSAFailsNewRegistration struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| }
 | |
| 
 | |
| func (sa *mockSAFailsNewRegistration) NewRegistration(_ context.Context, _ *corepb.Registration, _ ...grpc.CallOption) (*corepb.Registration, error) {
 | |
| 	return &corepb.Registration{}, fmt.Errorf("too bad")
 | |
| }
 | |
| 
 | |
| func TestNewRegistrationSAFailure(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.SA = &mockSAFailsNewRegistration{}
 | |
| 	acctKeyB, err := AccountKeyB.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "failed to marshal account key")
 | |
| 	input := corepb.Registration{
 | |
| 		Contact:         []string{"mailto:test@example.com"},
 | |
| 		ContactsPresent: true,
 | |
| 		Key:             acctKeyB,
 | |
| 		InitialIP:       parseAndMarshalIP(t, "7.6.6.5"),
 | |
| 	}
 | |
| 	result, err := ra.NewRegistration(ctx, &input)
 | |
| 	if err == nil {
 | |
| 		t.Fatalf("NewRegistration should have failed when SA.NewRegistration failed %#v", result.Key)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestNewRegistrationNoFieldOverwrite(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	mailto := "mailto:foo@letsencrypt.org"
 | |
| 	acctKeyC, err := AccountKeyC.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "failed to marshal account key")
 | |
| 	input := &corepb.Registration{
 | |
| 		Id:              23,
 | |
| 		Key:             acctKeyC,
 | |
| 		Contact:         []string{mailto},
 | |
| 		ContactsPresent: true,
 | |
| 		Agreement:       "I agreed",
 | |
| 		InitialIP:       parseAndMarshalIP(t, "5.0.5.0"),
 | |
| 	}
 | |
| 
 | |
| 	result, err := ra.NewRegistration(ctx, input)
 | |
| 	test.AssertNotError(t, err, "Could not create new registration")
 | |
| 	test.Assert(t, result.Id != 23, "ID shouldn't be set by user")
 | |
| 	// TODO: Enable this test case once we validate terms agreement.
 | |
| 	//test.Assert(t, result.Agreement != "I agreed", "Agreement shouldn't be set with invalid URL")
 | |
| }
 | |
| 
 | |
| func TestNewRegistrationBadKey(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	mailto := "mailto:foo@letsencrypt.org"
 | |
| 	shortKey, err := ShortKey.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "failed to marshal account key")
 | |
| 	input := &corepb.Registration{
 | |
| 		Contact:         []string{mailto},
 | |
| 		ContactsPresent: true,
 | |
| 		Key:             shortKey,
 | |
| 	}
 | |
| 	_, err = ra.NewRegistration(ctx, input)
 | |
| 	test.AssertError(t, err, "Should have rejected authorization with short key")
 | |
| }
 | |
| 
 | |
| func TestNewRegistrationRateLimit(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Specify a dummy rate limit policy that allows 1 registration per exact IP
 | |
| 	// match, and 2 per range.
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		RegistrationsPerIPPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 1,
 | |
| 			Window:    config.Duration{Duration: 24 * 90 * time.Hour},
 | |
| 		},
 | |
| 		RegistrationsPerIPRangePolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 2,
 | |
| 			Window:    config.Duration{Duration: 24 * 90 * time.Hour},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Create one registration for an IPv4 address
 | |
| 	mailto := "mailto:foo@letsencrypt.org"
 | |
| 	reg := &corepb.Registration{
 | |
| 		Contact:         []string{mailto},
 | |
| 		ContactsPresent: true,
 | |
| 		Key:             newAcctKey(t),
 | |
| 		InitialIP:       parseAndMarshalIP(t, "7.6.6.5"),
 | |
| 	}
 | |
| 	// There should be no errors - it is within the RegistrationsPerIP rate limit
 | |
| 	_, err := ra.NewRegistration(ctx, reg)
 | |
| 	test.AssertNotError(t, err, "Unexpected error adding new IPv4 registration")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlCheckLatency, prometheus.Labels{"limit": ratelimit.RegistrationsPerIP, "decision": ratelimits.Allowed}, 1)
 | |
| 	// There are no overrides for this IP, so the override usage gauge should
 | |
| 	// contain 0 entries with labels matching it.
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlOverrideUsageGauge, prometheus.Labels{"limit": ratelimit.RegistrationsPerIP, "override_key": "7.6.6.5"}, 0)
 | |
| 
 | |
| 	// Create another registration for the same IPv4 address by changing the key
 | |
| 	reg.Key = newAcctKey(t)
 | |
| 
 | |
| 	// There should be an error since a 2nd registration will exceed the
 | |
| 	// RegistrationsPerIP rate limit
 | |
| 	_, err = ra.NewRegistration(ctx, reg)
 | |
| 	test.AssertError(t, err, "No error adding duplicate IPv4 registration")
 | |
| 	test.AssertEquals(t, err.Error(), "too many registrations for this IP: see https://letsencrypt.org/docs/too-many-registrations-for-this-ip/")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlCheckLatency, prometheus.Labels{"limit": ratelimit.RegistrationsPerIP, "decision": ratelimits.Denied}, 1)
 | |
| 
 | |
| 	// Create a registration for an IPv6 address
 | |
| 	reg.Key = newAcctKey(t)
 | |
| 	reg.InitialIP = parseAndMarshalIP(t, "2001:cdba:1234:5678:9101:1121:3257:9652")
 | |
| 
 | |
| 	// There should be no errors - it is within the RegistrationsPerIP rate limit
 | |
| 	_, err = ra.NewRegistration(ctx, reg)
 | |
| 	test.AssertNotError(t, err, "Unexpected error adding a new IPv6 registration")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlCheckLatency, prometheus.Labels{"limit": ratelimit.RegistrationsPerIP, "decision": ratelimits.Allowed}, 2)
 | |
| 
 | |
| 	// Create a 2nd registration for the IPv6 address by changing the key
 | |
| 	reg.Key = newAcctKey(t)
 | |
| 
 | |
| 	// There should be an error since a 2nd reg for the same IPv6 address will
 | |
| 	// exceed the RegistrationsPerIP rate limit
 | |
| 	_, err = ra.NewRegistration(ctx, reg)
 | |
| 	test.AssertError(t, err, "No error adding duplicate IPv6 registration")
 | |
| 	test.AssertEquals(t, err.Error(), "too many registrations for this IP: see https://letsencrypt.org/docs/too-many-registrations-for-this-ip/")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlCheckLatency, prometheus.Labels{"limit": ratelimit.RegistrationsPerIP, "decision": ratelimits.Denied}, 2)
 | |
| 
 | |
| 	// Create a registration for an IPv6 address in the same /48
 | |
| 	reg.Key = newAcctKey(t)
 | |
| 	reg.InitialIP = parseAndMarshalIP(t, "2001:cdba:1234:5678:9101:1121:3257:9653")
 | |
| 
 | |
| 	// There should be no errors since two IPv6 addresses in the same /48 is
 | |
| 	// within the RegistrationsPerIPRange limit
 | |
| 	_, err = ra.NewRegistration(ctx, reg)
 | |
| 	test.AssertNotError(t, err, "Unexpected error adding second IPv6 registration in the same /48")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlCheckLatency, prometheus.Labels{"limit": ratelimit.RegistrationsPerIPRange, "decision": ratelimits.Allowed}, 2)
 | |
| 
 | |
| 	// Create a registration for yet another IPv6 address in the same /48
 | |
| 	reg.Key = newAcctKey(t)
 | |
| 	reg.InitialIP = parseAndMarshalIP(t, "2001:cdba:1234:5678:9101:1121:3257:9654")
 | |
| 
 | |
| 	// There should be an error since three registrations within the same IPv6
 | |
| 	// /48 is outside of the RegistrationsPerIPRange limit
 | |
| 	_, err = ra.NewRegistration(ctx, reg)
 | |
| 	test.AssertError(t, err, "No error adding a third IPv6 registration in the same /48")
 | |
| 	test.AssertEquals(t, err.Error(), "too many registrations for this IP range: see https://letsencrypt.org/docs/rate-limits/")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlCheckLatency, prometheus.Labels{"limit": ratelimit.RegistrationsPerIPRange, "decision": ratelimits.Denied}, 1)
 | |
| }
 | |
| 
 | |
| func TestRegistrationsPerIPOverrideUsage(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	regIP := net.ParseIP("4.5.6.7")
 | |
| 	rlp := ratelimit.RateLimitPolicy{
 | |
| 		Threshold: 2,
 | |
| 		Window:    config.Duration{Duration: 23 * time.Hour},
 | |
| 		Overrides: map[string]int64{
 | |
| 			regIP.String(): 3,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	mockCounterAlwaysTwo := func(context.Context, *sapb.CountRegistrationsByIPRequest, ...grpc.CallOption) (*sapb.Count, error) {
 | |
| 		return &sapb.Count{Count: 2}, nil
 | |
| 	}
 | |
| 
 | |
| 	// No error expected, the count of existing registrations for "4.5.6.7"
 | |
| 	// should be 1 below the override threshold.
 | |
| 	err := ra.checkRegistrationIPLimit(ctx, rlp, regIP, mockCounterAlwaysTwo)
 | |
| 	test.AssertNotError(t, err, "Unexpected error checking RegistrationsPerIPRange limit")
 | |
| 
 | |
| 	// Accounting for the anticipated issuance, we expect "4.5.6.7" to be at
 | |
| 	// 100% of their override threshold.
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlOverrideUsageGauge, prometheus.Labels{"limit": ratelimit.RegistrationsPerIP, "override_key": regIP.String()}, 1)
 | |
| 
 | |
| 	mockCounterAlwaysThree := func(context.Context, *sapb.CountRegistrationsByIPRequest, ...grpc.CallOption) (*sapb.Count, error) {
 | |
| 		return &sapb.Count{Count: 3}, nil
 | |
| 	}
 | |
| 
 | |
| 	// Error expected, the count of existing registrations for "4.5.6.7" should
 | |
| 	// be exactly at the threshold.
 | |
| 	err = ra.checkRegistrationIPLimit(ctx, rlp, regIP, mockCounterAlwaysThree)
 | |
| 	test.AssertError(t, err, "Expected error checking RegistrationsPerIPRange limit")
 | |
| 
 | |
| 	// Expecting 100% of the override for "4.5.6.7" to be utilized.
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlOverrideUsageGauge, prometheus.Labels{"limit": ratelimit.RegistrationsPerIP, "override_key": regIP.String()}, 1)
 | |
| }
 | |
| 
 | |
| type NoUpdateSA struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| }
 | |
| 
 | |
| func (sa NoUpdateSA) UpdateRegistration(_ context.Context, _ *corepb.Registration, _ ...grpc.CallOption) (*emptypb.Empty, error) {
 | |
| 	return nil, fmt.Errorf("UpdateRegistration() is mocked to always error")
 | |
| }
 | |
| 
 | |
| func TestUpdateRegistrationSame(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	mailto := "mailto:foo@letsencrypt.org"
 | |
| 
 | |
| 	// Make a new registration with AccountKeyC and a Contact
 | |
| 	acctKeyC, err := AccountKeyC.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "failed to marshal account key")
 | |
| 	reg := &corepb.Registration{
 | |
| 		Key:             acctKeyC,
 | |
| 		Contact:         []string{mailto},
 | |
| 		ContactsPresent: true,
 | |
| 		Agreement:       "I agreed",
 | |
| 		InitialIP:       parseAndMarshalIP(t, "5.0.5.0"),
 | |
| 	}
 | |
| 	result, err := ra.NewRegistration(ctx, reg)
 | |
| 	test.AssertNotError(t, err, "Could not create new registration")
 | |
| 
 | |
| 	// Switch to a mock SA that will always error if UpdateRegistration() is called
 | |
| 	ra.SA = &NoUpdateSA{}
 | |
| 
 | |
| 	// Make an update to the registration with the same Contact & Agreement values.
 | |
| 	updateSame := &corepb.Registration{
 | |
| 		Id:              result.Id,
 | |
| 		Key:             acctKeyC,
 | |
| 		Contact:         []string{mailto},
 | |
| 		ContactsPresent: true,
 | |
| 		Agreement:       "I agreed",
 | |
| 	}
 | |
| 
 | |
| 	// The update operation should *not* error, even with the NoUpdateSA because
 | |
| 	// UpdateRegistration() should not be called when the update content doesn't
 | |
| 	// actually differ from the existing content
 | |
| 	_, err = ra.UpdateRegistration(ctx, &rapb.UpdateRegistrationRequest{Base: result, Update: updateSame})
 | |
| 	test.AssertNotError(t, err, "Error updating registration")
 | |
| }
 | |
| 
 | |
| func TestPerformValidationExpired(t *testing.T) {
 | |
| 	_, sa, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	authz := createPendingAuthorization(t, sa, Identifier, fc.Now().Add(-2*time.Hour))
 | |
| 
 | |
| 	_, err := ra.PerformValidation(ctx, &rapb.PerformValidationRequest{
 | |
| 		Authz:          authz,
 | |
| 		ChallengeIndex: int64(ResponseIndex),
 | |
| 	})
 | |
| 	test.AssertError(t, err, "Updated expired authorization")
 | |
| }
 | |
| 
 | |
| func TestPerformValidationAlreadyValid(t *testing.T) {
 | |
| 	va, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Create a finalized authorization
 | |
| 	exp := ra.clk.Now().Add(365 * 24 * time.Hour)
 | |
| 	authz := core.Authorization{
 | |
| 		ID:             "1337",
 | |
| 		Identifier:     identifier.NewDNS("not-example.com"),
 | |
| 		RegistrationID: 1,
 | |
| 		Status:         "valid",
 | |
| 		Expires:        &exp,
 | |
| 		Challenges: []core.Challenge{
 | |
| 			{
 | |
| 				Token:  core.NewToken(),
 | |
| 				Type:   core.ChallengeTypeHTTP01,
 | |
| 				Status: core.StatusPending,
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	authzPB, err := bgrpc.AuthzToPB(authz)
 | |
| 	test.AssertNotError(t, err, "bgrpc.AuthzToPB failed")
 | |
| 
 | |
| 	va.PerformValidationRequestResultReturn = &vapb.ValidationResult{
 | |
| 		Records: []*corepb.ValidationRecord{
 | |
| 			{
 | |
| 				AddressUsed: []byte("192.168.0.1"),
 | |
| 				Hostname:    "example.com",
 | |
| 				Port:        "8080",
 | |
| 				Url:         "http://example.com/",
 | |
| 			},
 | |
| 		},
 | |
| 		Problems: nil,
 | |
| 	}
 | |
| 
 | |
| 	// A subsequent call to perform validation should return nil due
 | |
| 	// to being short-circuited because of valid authz reuse.
 | |
| 	val, err := ra.PerformValidation(ctx, &rapb.PerformValidationRequest{
 | |
| 		Authz:          authzPB,
 | |
| 		ChallengeIndex: int64(ResponseIndex),
 | |
| 	})
 | |
| 	test.Assert(t, core.AcmeStatus(val.Status) == core.StatusValid, "Validation should have been valid")
 | |
| 	test.AssertNotError(t, err, "Error was not nil, but should have been nil")
 | |
| }
 | |
| 
 | |
| func TestPerformValidationSuccess(t *testing.T) {
 | |
| 	va, sa, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// We know this is OK because of TestNewAuthorization
 | |
| 	authzPB := createPendingAuthorization(t, sa, Identifier, fc.Now().Add(12*time.Hour))
 | |
| 
 | |
| 	va.PerformValidationRequestResultReturn = &vapb.ValidationResult{
 | |
| 		Records: []*corepb.ValidationRecord{
 | |
| 			{
 | |
| 				AddressUsed:   []byte("192.168.0.1"),
 | |
| 				Hostname:      "example.com",
 | |
| 				Port:          "8080",
 | |
| 				Url:           "http://example.com/",
 | |
| 				ResolverAddrs: []string{"rebound"},
 | |
| 			},
 | |
| 		},
 | |
| 		Problems: nil,
 | |
| 	}
 | |
| 
 | |
| 	now := fc.Now()
 | |
| 	challIdx := dnsChallIdx(t, authzPB.Challenges)
 | |
| 	authzPB, err := ra.PerformValidation(ctx, &rapb.PerformValidationRequest{
 | |
| 		Authz:          authzPB,
 | |
| 		ChallengeIndex: challIdx,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "PerformValidation failed")
 | |
| 
 | |
| 	var vaRequest *vapb.PerformValidationRequest
 | |
| 	select {
 | |
| 	case r := <-va.performValidationRequest:
 | |
| 		vaRequest = r
 | |
| 	case <-time.After(time.Second):
 | |
| 		t.Fatal("Timed out waiting for DummyValidationAuthority.PerformValidation to complete")
 | |
| 	}
 | |
| 
 | |
| 	// Verify that the VA got the request, and it's the same as the others
 | |
| 	test.AssertEquals(t, authzPB.Challenges[challIdx].Type, vaRequest.Challenge.Type)
 | |
| 	test.AssertEquals(t, authzPB.Challenges[challIdx].Token, vaRequest.Challenge.Token)
 | |
| 
 | |
| 	// Sleep so the RA has a chance to write to the SA
 | |
| 	time.Sleep(100 * time.Millisecond)
 | |
| 
 | |
| 	dbAuthzPB := getAuthorization(t, authzPB.Id, sa)
 | |
| 	t.Log("dbAuthz:", dbAuthzPB)
 | |
| 
 | |
| 	// Verify that the responses are reflected
 | |
| 	challIdx = dnsChallIdx(t, dbAuthzPB.Challenges)
 | |
| 	challenge, err := bgrpc.PBToChallenge(dbAuthzPB.Challenges[challIdx])
 | |
| 	test.AssertNotError(t, err, "Failed to marshall corepb.Challenge to core.Challenge.")
 | |
| 
 | |
| 	test.AssertNotNil(t, vaRequest.Challenge, "Request passed to VA has no challenge")
 | |
| 	test.Assert(t, challenge.Status == core.StatusValid, "challenge was not marked as valid")
 | |
| 
 | |
| 	// The DB authz's expiry should be equal to the current time plus the
 | |
| 	// configured authorization lifetime
 | |
| 	test.AssertEquals(t, dbAuthzPB.Expires.AsTime(), now.Add(ra.authorizationLifetime))
 | |
| 
 | |
| 	// Check that validated timestamp was recorded, stored, and retrieved
 | |
| 	expectedValidated := fc.Now()
 | |
| 	test.Assert(t, *challenge.Validated == expectedValidated, "Validated timestamp incorrect or missing")
 | |
| }
 | |
| 
 | |
| func TestPerformValidationVAError(t *testing.T) {
 | |
| 	va, sa, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	authzPB := createPendingAuthorization(t, sa, Identifier, fc.Now().Add(12*time.Hour))
 | |
| 
 | |
| 	va.PerformValidationRequestResultError = fmt.Errorf("Something went wrong")
 | |
| 
 | |
| 	challIdx := dnsChallIdx(t, authzPB.Challenges)
 | |
| 	authzPB, err := ra.PerformValidation(ctx, &rapb.PerformValidationRequest{
 | |
| 		Authz:          authzPB,
 | |
| 		ChallengeIndex: challIdx,
 | |
| 	})
 | |
| 
 | |
| 	test.AssertNotError(t, err, "PerformValidation completely failed")
 | |
| 
 | |
| 	var vaRequest *vapb.PerformValidationRequest
 | |
| 	select {
 | |
| 	case r := <-va.performValidationRequest:
 | |
| 		vaRequest = r
 | |
| 	case <-time.After(time.Second):
 | |
| 		t.Fatal("Timed out waiting for DummyValidationAuthority.PerformValidation to complete")
 | |
| 	}
 | |
| 
 | |
| 	// Verify that the VA got the request, and it's the same as the others
 | |
| 	test.AssertEquals(t, authzPB.Challenges[challIdx].Type, vaRequest.Challenge.Type)
 | |
| 	test.AssertEquals(t, authzPB.Challenges[challIdx].Token, vaRequest.Challenge.Token)
 | |
| 
 | |
| 	// Sleep so the RA has a chance to write to the SA
 | |
| 	time.Sleep(100 * time.Millisecond)
 | |
| 
 | |
| 	dbAuthzPB := getAuthorization(t, authzPB.Id, sa)
 | |
| 	t.Log("dbAuthz:", dbAuthzPB)
 | |
| 
 | |
| 	// Verify that the responses are reflected
 | |
| 	challIdx = dnsChallIdx(t, dbAuthzPB.Challenges)
 | |
| 	challenge, err := bgrpc.PBToChallenge(dbAuthzPB.Challenges[challIdx])
 | |
| 	test.AssertNotError(t, err, "Failed to marshall corepb.Challenge to core.Challenge.")
 | |
| 	test.Assert(t, challenge.Status == core.StatusInvalid, "challenge was not marked as invalid")
 | |
| 	test.AssertContains(t, challenge.Error.Error(), "Could not communicate with VA")
 | |
| 	test.Assert(t, challenge.ValidationRecord == nil, "challenge had a ValidationRecord")
 | |
| 
 | |
| 	// Check that validated timestamp was recorded, stored, and retrieved
 | |
| 	expectedValidated := fc.Now()
 | |
| 	test.Assert(t, *challenge.Validated == expectedValidated, "Validated timestamp incorrect or missing")
 | |
| }
 | |
| 
 | |
| func TestCertificateKeyNotEqualAccountKey(t *testing.T) {
 | |
| 	_, sa, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	exp := ra.clk.Now().Add(365 * 24 * time.Hour)
 | |
| 
 | |
| 	authzID := createFinalizedAuthorization(t, sa, "www.example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 
 | |
| 	order, err := sa.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:   Registration.Id,
 | |
| 			Expires:          timestamppb.New(exp),
 | |
| 			DnsNames:         []string{"www.example.com"},
 | |
| 			V2Authorizations: []int64{authzID},
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order with finalized authz IDs, ready status")
 | |
| 
 | |
| 	csrBytes, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		// Registration has key == AccountKeyA
 | |
| 		PublicKey:          AccountKeyA.Key,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		DNSNames:           []string{"www.example.com"},
 | |
| 	}, AccountPrivateKey.Key)
 | |
| 	test.AssertNotError(t, err, "Failed to sign CSR")
 | |
| 
 | |
| 	_, err = ra.FinalizeOrder(ctx, &rapb.FinalizeOrderRequest{
 | |
| 		Order: &corepb.Order{
 | |
| 			Status:         string(core.StatusReady),
 | |
| 			DnsNames:       []string{"www.example.com"},
 | |
| 			Id:             order.Id,
 | |
| 			RegistrationID: Registration.Id,
 | |
| 		},
 | |
| 		Csr: csrBytes,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "Should have rejected cert with key = account key")
 | |
| 	test.AssertEquals(t, err.Error(), "certificate public key must be different than account key")
 | |
| }
 | |
| 
 | |
| func TestNewOrderRateLimiting(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.orderLifetime = 5 * 24 * time.Hour
 | |
| 
 | |
| 	// Create a dummy rate limit config that sets a NewOrdersPerAccount rate
 | |
| 	// limit with a very low threshold/short window
 | |
| 	rateLimitDuration := 5 * time.Minute
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		NewOrdersPerAccountPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 1,
 | |
| 			Window:    config.Duration{Duration: rateLimitDuration},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	orderOne := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"first.example.com"},
 | |
| 	}
 | |
| 	orderTwo := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"second.example.com"},
 | |
| 	}
 | |
| 
 | |
| 	// To start, it should be possible to create a new order
 | |
| 	_, err := ra.NewOrder(ctx, orderOne)
 | |
| 	test.AssertNotError(t, err, "NewOrder for orderOne failed")
 | |
| 
 | |
| 	// Advance the clock 1s to separate the orders in time
 | |
| 	fc.Add(time.Second)
 | |
| 
 | |
| 	// Creating an order immediately after the first with different names
 | |
| 	// should fail
 | |
| 	_, err = ra.NewOrder(ctx, orderTwo)
 | |
| 	test.AssertError(t, err, "NewOrder for orderTwo succeeded, should have been ratelimited")
 | |
| 
 | |
| 	// Creating the first order again should succeed because of order reuse, no
 | |
| 	// new pending order is produced.
 | |
| 	_, err = ra.NewOrder(ctx, orderOne)
 | |
| 	test.AssertNotError(t, err, "Reuse of orderOne failed")
 | |
| 
 | |
| 	// Advancing the clock by 2 * the rate limit duration should allow orderTwo to
 | |
| 	// succeed
 | |
| 	fc.Add(2 * rateLimitDuration)
 | |
| 	_, err = ra.NewOrder(ctx, orderTwo)
 | |
| 	test.AssertNotError(t, err, "NewOrder for orderTwo failed after advancing clock")
 | |
| }
 | |
| 
 | |
| // TestEarlyOrderRateLimiting tests that NewOrder applies the certificates per
 | |
| // name/per FQDN rate limits against the order names.
 | |
| func TestEarlyOrderRateLimiting(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.orderLifetime = 5 * 24 * time.Hour
 | |
| 
 | |
| 	rateLimitDuration := 5 * time.Minute
 | |
| 
 | |
| 	domain := "early-ratelimit-example.com"
 | |
| 
 | |
| 	// Set a mock RL policy with a CertificatesPerName threshold for the domain
 | |
| 	// name so low if it were enforced it would prevent a new order for any names.
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		CertificatesPerNamePolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 10,
 | |
| 			Window:    config.Duration{Duration: rateLimitDuration},
 | |
| 			// Setting the Threshold to 0 skips applying the rate limit. Setting an
 | |
| 			// override to 0 does the trick.
 | |
| 			Overrides: map[string]int64{
 | |
| 				domain: 0,
 | |
| 			},
 | |
| 		},
 | |
| 		NewOrdersPerAccountPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 10,
 | |
| 			Window:    config.Duration{Duration: rateLimitDuration},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Request an order for the test domain
 | |
| 	newOrder := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{domain},
 | |
| 	}
 | |
| 
 | |
| 	// With the feature flag enabled the NewOrder request should fail because of
 | |
| 	// the CertificatesPerNamePolicy.
 | |
| 	_, err := ra.NewOrder(ctx, newOrder)
 | |
| 	test.AssertError(t, err, "NewOrder did not apply cert rate limits with feature flag enabled")
 | |
| 
 | |
| 	var bErr *berrors.BoulderError
 | |
| 	test.Assert(t, errors.As(err, &bErr), "NewOrder did not return a boulder error")
 | |
| 	test.AssertEquals(t, bErr.RetryAfter, rateLimitDuration)
 | |
| 
 | |
| 	// The err should be the expected rate limit error
 | |
| 	expected := "too many certificates already issued for \"early-ratelimit-example.com\". Retry after 2020-03-04T05:05:00Z: see https://letsencrypt.org/docs/rate-limits/"
 | |
| 	test.AssertEquals(t, bErr.Error(), expected)
 | |
| }
 | |
| 
 | |
| // mockInvalidAuthorizationsAuthority is a mock which claims that the given
 | |
| // domain has one invalid authorization.
 | |
| type mockInvalidAuthorizationsAuthority struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| 	domainWithFailures string
 | |
| }
 | |
| 
 | |
| func (sa *mockInvalidAuthorizationsAuthority) CountInvalidAuthorizations2(ctx context.Context, req *sapb.CountInvalidAuthorizationsRequest, _ ...grpc.CallOption) (*sapb.Count, error) {
 | |
| 	if req.DnsName == sa.domainWithFailures {
 | |
| 		return &sapb.Count{Count: 1}, nil
 | |
| 	} else {
 | |
| 		return &sapb.Count{}, nil
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuthzFailedRateLimitingNewOrder(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		InvalidAuthorizationsPerAccountPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 1,
 | |
| 			Window:    config.Duration{Duration: 1 * time.Hour},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	limit := ra.rlPolicies.InvalidAuthorizationsPerAccount()
 | |
| 	ra.SA = &mockInvalidAuthorizationsAuthority{domainWithFailures: "all.i.do.is.lose.com"}
 | |
| 	err := ra.checkInvalidAuthorizationLimits(ctx, Registration.Id,
 | |
| 		[]string{"charlie.brown.com", "all.i.do.is.lose.com"}, limit)
 | |
| 	test.AssertError(t, err, "checkInvalidAuthorizationLimits did not encounter expected rate limit error")
 | |
| 	test.AssertEquals(t, err.Error(), "too many failed authorizations recently: see https://letsencrypt.org/docs/failed-validation-limit/")
 | |
| }
 | |
| 
 | |
| type mockSAWithNameCounts struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| 	nameCounts *sapb.CountByNames
 | |
| 	t          *testing.T
 | |
| 	clk        clock.FakeClock
 | |
| }
 | |
| 
 | |
| func (m *mockSAWithNameCounts) CountCertificatesByNames(ctx context.Context, req *sapb.CountCertificatesByNamesRequest, _ ...grpc.CallOption) (*sapb.CountByNames, error) {
 | |
| 	expectedLatest := m.clk.Now()
 | |
| 	if req.Range.Latest.AsTime() != expectedLatest {
 | |
| 		m.t.Errorf("incorrect latest: got '%v', expected '%v'", req.Range.Latest.AsTime(), expectedLatest)
 | |
| 	}
 | |
| 	expectedEarliest := m.clk.Now().Add(-23 * time.Hour)
 | |
| 	if req.Range.Earliest.AsTime() != expectedEarliest {
 | |
| 		m.t.Errorf("incorrect earliest: got '%v', expected '%v'", req.Range.Earliest.AsTime(), expectedEarliest)
 | |
| 	}
 | |
| 	counts := make(map[string]int64)
 | |
| 	for _, name := range req.DnsNames {
 | |
| 		if count, ok := m.nameCounts.Counts[name]; ok {
 | |
| 			counts[name] = count
 | |
| 		}
 | |
| 	}
 | |
| 	return &sapb.CountByNames{Counts: counts}, nil
 | |
| }
 | |
| 
 | |
| // FQDNSetExists is a mock which always returns false, so the test requests
 | |
| // aren't considered to be renewals.
 | |
| func (m *mockSAWithNameCounts) FQDNSetExists(ctx context.Context, req *sapb.FQDNSetExistsRequest, _ ...grpc.CallOption) (*sapb.Exists, error) {
 | |
| 	return &sapb.Exists{Exists: false}, nil
 | |
| }
 | |
| 
 | |
| func TestCheckCertificatesPerNameLimit(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	rlp := ratelimit.RateLimitPolicy{
 | |
| 		Threshold: 3,
 | |
| 		Window:    config.Duration{Duration: 23 * time.Hour},
 | |
| 		Overrides: map[string]int64{
 | |
| 			"bigissuer.com":     100,
 | |
| 			"smallissuer.co.uk": 1,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	mockSA := &mockSAWithNameCounts{
 | |
| 		nameCounts: &sapb.CountByNames{Counts: map[string]int64{"example.com": 1}},
 | |
| 		clk:        fc,
 | |
| 		t:          t,
 | |
| 	}
 | |
| 
 | |
| 	ra.SA = mockSA
 | |
| 
 | |
| 	// One base domain, below threshold
 | |
| 	err := ra.checkCertificatesPerNameLimit(ctx, []string{"www.example.com", "example.com"}, rlp, 99)
 | |
| 	test.AssertNotError(t, err, "rate limited example.com incorrectly")
 | |
| 
 | |
| 	// Two base domains, one above threshold, one below
 | |
| 	mockSA.nameCounts.Counts["example.com"] = 10
 | |
| 	mockSA.nameCounts.Counts["good-example.com"] = 1
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"www.example.com", "example.com", "good-example.com"}, rlp, 99)
 | |
| 	test.AssertError(t, err, "incorrectly failed to rate limit example.com")
 | |
| 	test.AssertErrorIs(t, err, berrors.RateLimit)
 | |
| 	// There are no overrides for "example.com", so the override usage gauge
 | |
| 	// should contain 0 entries with labels matching it.
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlOverrideUsageGauge, prometheus.Labels{"limit": ratelimit.CertificatesPerName, "override_key": "example.com"}, 0)
 | |
| 	// Verify it has no sub errors as there is only one bad name
 | |
| 	test.AssertEquals(t, err.Error(), "too many certificates already issued for \"example.com\". Retry after 1970-01-01T23:00:00Z: see https://letsencrypt.org/docs/rate-limits/")
 | |
| 	var bErr *berrors.BoulderError
 | |
| 	test.AssertErrorWraps(t, err, &bErr)
 | |
| 	test.AssertEquals(t, len(bErr.SubErrors), 0)
 | |
| 
 | |
| 	// Three base domains, two above threshold, one below
 | |
| 	mockSA.nameCounts.Counts["example.com"] = 10
 | |
| 	mockSA.nameCounts.Counts["other-example.com"] = 10
 | |
| 	mockSA.nameCounts.Counts["good-example.com"] = 1
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"example.com", "other-example.com", "good-example.com"}, rlp, 99)
 | |
| 	test.AssertError(t, err, "incorrectly failed to rate limit example.com, other-example.com")
 | |
| 	test.AssertErrorIs(t, err, berrors.RateLimit)
 | |
| 	// Verify it has two sub errors as there are two bad names
 | |
| 	test.AssertEquals(t, err.Error(), "too many certificates already issued for multiple names (\"example.com\" and 2 others). Retry after 1970-01-01T23:00:00Z: see https://letsencrypt.org/docs/rate-limits/")
 | |
| 	test.AssertErrorWraps(t, err, &bErr)
 | |
| 	test.AssertEquals(t, len(bErr.SubErrors), 2)
 | |
| 
 | |
| 	// SA misbehaved and didn't send back a count for every input name
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"zombo.com", "www.example.com", "example.com"}, rlp, 99)
 | |
| 	test.AssertError(t, err, "incorrectly failed to error on misbehaving SA")
 | |
| 
 | |
| 	// Two base domains, one above threshold but with an override.
 | |
| 	mockSA.nameCounts.Counts["example.com"] = 0
 | |
| 	mockSA.nameCounts.Counts["bigissuer.com"] = 50
 | |
| 	ra.rlOverrideUsageGauge.WithLabelValues(ratelimit.CertificatesPerName, "bigissuer.com").Set(.5)
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"www.example.com", "subdomain.bigissuer.com"}, rlp, 99)
 | |
| 	test.AssertNotError(t, err, "incorrectly rate limited bigissuer")
 | |
| 	// "bigissuer.com" has an override of 100 and they've issued 50. Accounting
 | |
| 	// for the anticipated issuance, we expect to see 51% utilization.
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlOverrideUsageGauge, prometheus.Labels{"limit": ratelimit.CertificatesPerName, "override_key": "bigissuer.com"}, .51)
 | |
| 
 | |
| 	// Two base domains, one above its override
 | |
| 	mockSA.nameCounts.Counts["example.com"] = 10
 | |
| 	mockSA.nameCounts.Counts["bigissuer.com"] = 100
 | |
| 	ra.rlOverrideUsageGauge.WithLabelValues(ratelimit.CertificatesPerName, "bigissuer.com").Set(1)
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"www.example.com", "subdomain.bigissuer.com"}, rlp, 99)
 | |
| 	test.AssertError(t, err, "incorrectly failed to rate limit bigissuer")
 | |
| 	test.AssertErrorIs(t, err, berrors.RateLimit)
 | |
| 	// "bigissuer.com" has an override of 100 and they've issued 100. They're
 | |
| 	// already at 100% utilization, so we expect to see 100% utilization.
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlOverrideUsageGauge, prometheus.Labels{"limit": ratelimit.CertificatesPerName, "override_key": "bigissuer.com"}, 1)
 | |
| 
 | |
| 	// One base domain, above its override (which is below threshold)
 | |
| 	mockSA.nameCounts.Counts["smallissuer.co.uk"] = 1
 | |
| 	ra.rlOverrideUsageGauge.WithLabelValues(ratelimit.CertificatesPerName, "smallissuer.co.uk").Set(1)
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"www.smallissuer.co.uk"}, rlp, 99)
 | |
| 	test.AssertError(t, err, "incorrectly failed to rate limit smallissuer")
 | |
| 	test.AssertErrorIs(t, err, berrors.RateLimit)
 | |
| 	// "smallissuer.co.uk" has an override of 1 and they've issued 1. They're
 | |
| 	// already at 100% utilization, so we expect to see 100% utilization.
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.rlOverrideUsageGauge, prometheus.Labels{"limit": ratelimit.CertificatesPerName, "override_key": "smallissuer.co.uk"}, 1)
 | |
| }
 | |
| 
 | |
| // TestCheckExactCertificateLimit tests that the duplicate certificate limit
 | |
| // applied to FQDN sets is respected.
 | |
| func TestCheckExactCertificateLimit(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Create a rate limit with a small threshold
 | |
| 	const dupeCertLimit = 3
 | |
| 	rlp := ratelimit.RateLimitPolicy{
 | |
| 		Threshold: dupeCertLimit,
 | |
| 		Window:    config.Duration{Duration: 24 * time.Hour},
 | |
| 	}
 | |
| 
 | |
| 	// Create a mock SA that has a count of already issued certificates for some
 | |
| 	// test names
 | |
| 	firstIssuanceTimestamp := ra.clk.Now().Add(-rlp.Window.Duration)
 | |
| 	fITS2 := firstIssuanceTimestamp.Add(time.Hour * 23)
 | |
| 	fITS3 := firstIssuanceTimestamp.Add(time.Hour * 16)
 | |
| 	fITS4 := firstIssuanceTimestamp.Add(time.Hour * 8)
 | |
| 	issuanceTimestampsNS := []int64{
 | |
| 		fITS2.UnixNano(),
 | |
| 		fITS3.UnixNano(),
 | |
| 		fITS4.UnixNano(),
 | |
| 		firstIssuanceTimestamp.UnixNano(),
 | |
| 	}
 | |
| 	issuanceTimestamps := []*timestamppb.Timestamp{
 | |
| 		timestamppb.New(fITS2),
 | |
| 		timestamppb.New(fITS3),
 | |
| 		timestamppb.New(fITS4),
 | |
| 		timestamppb.New(firstIssuanceTimestamp),
 | |
| 	}
 | |
| 	// Our window is 24 hours and our threshold is 3 issuance. If our most
 | |
| 	// recent issuance was 1 hour ago, we expect the next token to be available
 | |
| 	// 8 hours from issuance time or 7 hours from now.
 | |
| 	expectRetryAfterNS := time.Unix(0, issuanceTimestampsNS[0]).Add(time.Hour * 8).Format(time.RFC3339)
 | |
| 	expectRetryAfter := issuanceTimestamps[0].AsTime().Add(time.Hour * 8).Format(time.RFC3339)
 | |
| 	test.AssertEquals(t, expectRetryAfterNS, expectRetryAfter)
 | |
| 	ra.SA = &mockSAWithFQDNSet{
 | |
| 		issuanceTimestamps: map[string]*sapb.Timestamps{
 | |
| 			"none.example.com":          {Timestamps: []*timestamppb.Timestamp{}},
 | |
| 			"under.example.com":         {Timestamps: issuanceTimestamps[3:3]},
 | |
| 			"equalbutvalid.example.com": {Timestamps: issuanceTimestamps[1:3]},
 | |
| 			"over.example.com":          {Timestamps: issuanceTimestamps[0:3]},
 | |
| 		},
 | |
| 		t: t,
 | |
| 	}
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		Name        string
 | |
| 		Domain      string
 | |
| 		ExpectedErr error
 | |
| 	}{
 | |
| 		{
 | |
| 			Name:        "FQDN set issuances none",
 | |
| 			Domain:      "none.example.com",
 | |
| 			ExpectedErr: nil,
 | |
| 		},
 | |
| 		{
 | |
| 			Name:        "FQDN set issuances less than limit",
 | |
| 			Domain:      "under.example.com",
 | |
| 			ExpectedErr: nil,
 | |
| 		},
 | |
| 		{
 | |
| 			Name:        "FQDN set issuances equal to limit",
 | |
| 			Domain:      "equalbutvalid.example.com",
 | |
| 			ExpectedErr: nil,
 | |
| 		},
 | |
| 		{
 | |
| 			Name:   "FQDN set issuances above limit NS",
 | |
| 			Domain: "over.example.com",
 | |
| 			ExpectedErr: fmt.Errorf(
 | |
| 				"too many certificates (3) already issued for this exact set of domains in the last 24 hours: over.example.com, retry after %s: see https://letsencrypt.org/docs/duplicate-certificate-limit/",
 | |
| 				expectRetryAfterNS,
 | |
| 			),
 | |
| 		},
 | |
| 		{
 | |
| 			Name:   "FQDN set issuances above limit",
 | |
| 			Domain: "over.example.com",
 | |
| 			ExpectedErr: fmt.Errorf(
 | |
| 				"too many certificates (3) already issued for this exact set of domains in the last 24 hours: over.example.com, retry after %s: see https://letsencrypt.org/docs/duplicate-certificate-limit/",
 | |
| 				expectRetryAfter,
 | |
| 			),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// For each test case we check that the certificatesPerFQDNSetLimit is applied
 | |
| 	// as we expect
 | |
| 	for _, tc := range testCases {
 | |
| 		t.Run(tc.Name, func(t *testing.T) {
 | |
| 			result := ra.checkCertificatesPerFQDNSetLimit(ctx, []string{tc.Domain}, rlp, 0)
 | |
| 			if tc.ExpectedErr == nil {
 | |
| 				test.AssertNotError(t, result, fmt.Sprintf("Expected no error for %q", tc.Domain))
 | |
| 			} else {
 | |
| 				test.AssertError(t, result, fmt.Sprintf("Expected error for %q", tc.Domain))
 | |
| 				test.AssertEquals(t, result.Error(), tc.ExpectedErr.Error())
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestRegistrationUpdate(t *testing.T) {
 | |
| 	oldURL := "http://old.invalid"
 | |
| 	newURL := "http://new.invalid"
 | |
| 	base := &corepb.Registration{
 | |
| 		Id:        1,
 | |
| 		Contact:   []string{oldURL},
 | |
| 		Agreement: "",
 | |
| 	}
 | |
| 	update := &corepb.Registration{
 | |
| 		Contact:         []string{newURL},
 | |
| 		ContactsPresent: true,
 | |
| 		Agreement:       "totally!",
 | |
| 	}
 | |
| 
 | |
| 	res, changed := mergeUpdate(base, update)
 | |
| 	test.AssertEquals(t, changed, true)
 | |
| 	test.AssertEquals(t, res.Contact[0], update.Contact[0])
 | |
| 	test.AssertEquals(t, res.Agreement, update.Agreement)
 | |
| 
 | |
| 	// Make sure that a `MergeUpdate` call with an empty string doesn't produce an
 | |
| 	// error and results in a change to the base reg.
 | |
| 	emptyUpdate := &corepb.Registration{
 | |
| 		Contact:         []string{""},
 | |
| 		ContactsPresent: true,
 | |
| 		Agreement:       "totally!",
 | |
| 	}
 | |
| 	_, changed = mergeUpdate(res, emptyUpdate)
 | |
| 	test.AssertEquals(t, changed, true)
 | |
| }
 | |
| 
 | |
| func TestRegistrationContactUpdate(t *testing.T) {
 | |
| 	contactURL := "mailto://example@example.com"
 | |
| 
 | |
| 	// Test that a registration contact can be removed by updating with an empty
 | |
| 	// Contact slice.
 | |
| 	base := &corepb.Registration{
 | |
| 		Id:        1,
 | |
| 		Contact:   []string{contactURL},
 | |
| 		Agreement: "totally!",
 | |
| 	}
 | |
| 	update := &corepb.Registration{
 | |
| 		Id:              1,
 | |
| 		Contact:         []string{},
 | |
| 		ContactsPresent: true,
 | |
| 		Agreement:       "totally!",
 | |
| 	}
 | |
| 	res, changed := mergeUpdate(base, update)
 | |
| 	test.AssertEquals(t, changed, true)
 | |
| 	test.Assert(t, len(res.Contact) == 0, "Contact was not deleted in update")
 | |
| 
 | |
| 	// Test that a registration contact isn't changed when an update is performed
 | |
| 	// with no Contact field
 | |
| 	base = &corepb.Registration{
 | |
| 		Id:        1,
 | |
| 		Contact:   []string{contactURL},
 | |
| 		Agreement: "totally!",
 | |
| 	}
 | |
| 	update = &corepb.Registration{
 | |
| 		Id:        1,
 | |
| 		Agreement: "totally!",
 | |
| 	}
 | |
| 	res, changed = mergeUpdate(base, update)
 | |
| 	test.AssertEquals(t, changed, false)
 | |
| 	test.Assert(t, len(res.Contact) == 1, "len(Contact) was updated unexpectedly")
 | |
| 	test.Assert(t, (res.Contact)[0] == contactURL, "Contact was changed unexpectedly")
 | |
| }
 | |
| 
 | |
| func TestRegistrationKeyUpdate(t *testing.T) {
 | |
| 	oldKey, err := rsa.GenerateKey(rand.Reader, 512)
 | |
| 	test.AssertNotError(t, err, "rsa.GenerateKey() for oldKey failed")
 | |
| 	oldKeyJSON, err := jose.JSONWebKey{Key: oldKey}.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "MarshalJSON for oldKey failed")
 | |
| 
 | |
| 	base := &corepb.Registration{Key: oldKeyJSON}
 | |
| 	update := &corepb.Registration{}
 | |
| 	_, changed := mergeUpdate(base, update)
 | |
| 	test.Assert(t, !changed, "mergeUpdate changed the key with empty update")
 | |
| 
 | |
| 	newKey, err := rsa.GenerateKey(rand.Reader, 1024)
 | |
| 	test.AssertNotError(t, err, "rsa.GenerateKey() for newKey failed")
 | |
| 	newKeyJSON, err := jose.JSONWebKey{Key: newKey}.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "MarshalJSON for newKey failed")
 | |
| 
 | |
| 	update = &corepb.Registration{Key: newKeyJSON}
 | |
| 	res, changed := mergeUpdate(base, update)
 | |
| 	test.Assert(t, changed, "mergeUpdate didn't change the key with non-empty update")
 | |
| 	test.AssertByteEquals(t, res.Key, update.Key)
 | |
| }
 | |
| 
 | |
| // A mockSAWithFQDNSet is a mock StorageAuthority that supports
 | |
| // CountCertificatesByName as well as FQDNSetExists. This allows testing
 | |
| // checkCertificatesPerNameRateLimit's FQDN exemption logic.
 | |
| type mockSAWithFQDNSet struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| 	fqdnSet            map[string]bool
 | |
| 	issuanceTimestamps map[string]*sapb.Timestamps
 | |
| 
 | |
| 	t *testing.T
 | |
| }
 | |
| 
 | |
| // Construct the FQDN Set key the same way as the SA (by using
 | |
| // `core.UniqueLowerNames`, joining the names with a `,` and hashing them)
 | |
| // but return a string so it can be used as a key in m.fqdnSet.
 | |
| func (m mockSAWithFQDNSet) hashNames(names []string) string {
 | |
| 	names = core.UniqueLowerNames(names)
 | |
| 	hash := sha256.Sum256([]byte(strings.Join(names, ",")))
 | |
| 	return string(hash[:])
 | |
| }
 | |
| 
 | |
| // Search for a set of domain names in the FQDN set map
 | |
| func (m mockSAWithFQDNSet) FQDNSetExists(_ context.Context, req *sapb.FQDNSetExistsRequest, _ ...grpc.CallOption) (*sapb.Exists, error) {
 | |
| 	hash := m.hashNames(req.DnsNames)
 | |
| 	if _, exists := m.fqdnSet[hash]; exists {
 | |
| 		return &sapb.Exists{Exists: true}, nil
 | |
| 	}
 | |
| 	return &sapb.Exists{Exists: false}, nil
 | |
| }
 | |
| 
 | |
| // Return a map of domain -> certificate count.
 | |
| func (m mockSAWithFQDNSet) CountCertificatesByNames(ctx context.Context, req *sapb.CountCertificatesByNamesRequest, _ ...grpc.CallOption) (*sapb.CountByNames, error) {
 | |
| 	counts := make(map[string]int64)
 | |
| 	for _, name := range req.DnsNames {
 | |
| 		entry, ok := m.issuanceTimestamps[name]
 | |
| 		if ok {
 | |
| 			counts[name] = int64(len(entry.Timestamps))
 | |
| 		}
 | |
| 	}
 | |
| 	return &sapb.CountByNames{Counts: counts}, nil
 | |
| }
 | |
| 
 | |
| func (m mockSAWithFQDNSet) CountFQDNSets(_ context.Context, req *sapb.CountFQDNSetsRequest, _ ...grpc.CallOption) (*sapb.Count, error) {
 | |
| 	var total int64
 | |
| 	for _, name := range req.DnsNames {
 | |
| 		entry, ok := m.issuanceTimestamps[name]
 | |
| 		if ok {
 | |
| 			total += int64(len(entry.Timestamps))
 | |
| 		}
 | |
| 	}
 | |
| 	return &sapb.Count{Count: total}, nil
 | |
| }
 | |
| 
 | |
| func (m mockSAWithFQDNSet) FQDNSetTimestampsForWindow(_ context.Context, req *sapb.CountFQDNSetsRequest, _ ...grpc.CallOption) (*sapb.Timestamps, error) {
 | |
| 	if len(req.DnsNames) == 1 {
 | |
| 		return m.issuanceTimestamps[req.DnsNames[0]], nil
 | |
| 	} else {
 | |
| 		return nil, fmt.Errorf("FQDNSetTimestampsForWindow mock only supports a single domain")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TestExactPublicSuffixCertLimit tests the behaviour of issue #2681 with and
 | |
| // without the feature flag for the fix enabled.
 | |
| // See https://github.com/letsencrypt/boulder/issues/2681
 | |
| func TestExactPublicSuffixCertLimit(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Simple policy that only allows 2 certificates per name.
 | |
| 	certsPerNamePolicy := ratelimit.RateLimitPolicy{
 | |
| 		Threshold: 2,
 | |
| 		Window:    config.Duration{Duration: 23 * time.Hour},
 | |
| 	}
 | |
| 
 | |
| 	// We use "dedyn.io" and "dynv6.net" domains for the test on the implicit
 | |
| 	// assumption that both domains are present on the public suffix list.
 | |
| 	// Quickly verify that this is true before continuing with the rest of the test.
 | |
| 	_, err := publicsuffix.Domain("dedyn.io")
 | |
| 	test.AssertError(t, err, "dedyn.io was not on the public suffix list, invaliding the test")
 | |
| 	_, err = publicsuffix.Domain("dynv6.net")
 | |
| 	test.AssertError(t, err, "dynv6.net was not on the public suffix list, invaliding the test")
 | |
| 
 | |
| 	// Back the mock SA with counts as if so far we have issued the following
 | |
| 	// certificates for the following domains:
 | |
| 	//   - test.dedyn.io (once)
 | |
| 	//   - test2.dedyn.io (once)
 | |
| 	//   - dynv6.net (twice)
 | |
| 	mockSA := &mockSAWithNameCounts{
 | |
| 		nameCounts: &sapb.CountByNames{
 | |
| 			Counts: map[string]int64{
 | |
| 				"test.dedyn.io":  1,
 | |
| 				"test2.dedyn.io": 1,
 | |
| 				"test3.dedyn.io": 0,
 | |
| 				"dedyn.io":       0,
 | |
| 				"dynv6.net":      2,
 | |
| 			},
 | |
| 		},
 | |
| 		clk: fc,
 | |
| 		t:   t,
 | |
| 	}
 | |
| 	ra.SA = mockSA
 | |
| 
 | |
| 	// Trying to issue for "test3.dedyn.io" and "dedyn.io" should succeed because
 | |
| 	// test3.dedyn.io has no certificates and "dedyn.io" is an exact public suffix
 | |
| 	// match with no certificates issued for it.
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"test3.dedyn.io", "dedyn.io"}, certsPerNamePolicy, 99)
 | |
| 	test.AssertNotError(t, err, "certificate per name rate limit not applied correctly")
 | |
| 
 | |
| 	// Trying to issue for "test3.dedyn.io" and "dynv6.net" should fail because
 | |
| 	// "dynv6.net" is an exact public suffix match with 2 certificates issued for
 | |
| 	// it.
 | |
| 	err = ra.checkCertificatesPerNameLimit(ctx, []string{"test3.dedyn.io", "dynv6.net"}, certsPerNamePolicy, 99)
 | |
| 	test.AssertError(t, err, "certificate per name rate limit not applied correctly")
 | |
| }
 | |
| 
 | |
| func TestDeactivateAuthorization(t *testing.T) {
 | |
| 	_, sa, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	exp := ra.clk.Now().Add(365 * 24 * time.Hour)
 | |
| 	authzID := createFinalizedAuthorization(t, sa, "not-example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 	dbAuthzPB := getAuthorization(t, fmt.Sprint(authzID), sa)
 | |
| 	_, err := ra.DeactivateAuthorization(ctx, dbAuthzPB)
 | |
| 	test.AssertNotError(t, err, "Could not deactivate authorization")
 | |
| 	deact, err := sa.GetAuthorization2(ctx, &sapb.AuthorizationID2{Id: authzID})
 | |
| 	test.AssertNotError(t, err, "Could not get deactivated authorization with ID "+dbAuthzPB.Id)
 | |
| 	test.AssertEquals(t, deact.Status, string(core.StatusDeactivated))
 | |
| }
 | |
| 
 | |
| func TestDeactivateRegistration(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Deactivate failure because incomplete registration provided
 | |
| 	_, err := ra.DeactivateRegistration(context.Background(), &corepb.Registration{})
 | |
| 	test.AssertDeepEquals(t, err, fmt.Errorf("incomplete gRPC request message"))
 | |
| 
 | |
| 	// Deactivate failure because registration status already deactivated
 | |
| 	_, err = ra.DeactivateRegistration(context.Background(),
 | |
| 		&corepb.Registration{Id: 1, Status: string(core.StatusDeactivated)})
 | |
| 	test.AssertError(t, err, "DeactivateRegistration failed with a non-valid registration")
 | |
| 
 | |
| 	// Deactivate success with valid registration
 | |
| 	_, err = ra.DeactivateRegistration(context.Background(),
 | |
| 		&corepb.Registration{Id: 1, Status: string(core.StatusValid)})
 | |
| 	test.AssertNotError(t, err, "DeactivateRegistration failed")
 | |
| 
 | |
| 	// Check db to make sure account is deactivated
 | |
| 	dbReg, err := ra.SA.GetRegistration(context.Background(), &sapb.RegistrationID{Id: 1})
 | |
| 	test.AssertNotError(t, err, "GetRegistration failed")
 | |
| 	test.AssertEquals(t, dbReg.Status, string(core.StatusDeactivated))
 | |
| }
 | |
| 
 | |
| // noopCAA implements caaChecker, always returning nil
 | |
| type noopCAA struct{}
 | |
| 
 | |
| func (cr noopCAA) IsCAAValid(
 | |
| 	ctx context.Context,
 | |
| 	in *vapb.IsCAAValidRequest,
 | |
| 	opts ...grpc.CallOption,
 | |
| ) (*vapb.IsCAAValidResponse, error) {
 | |
| 	return &vapb.IsCAAValidResponse{}, nil
 | |
| }
 | |
| 
 | |
| // caaRecorder implements caaChecker, always returning nil, but recording the
 | |
| // names it was called for.
 | |
| type caaRecorder struct {
 | |
| 	sync.Mutex
 | |
| 	names map[string]bool
 | |
| }
 | |
| 
 | |
| func (cr *caaRecorder) IsCAAValid(
 | |
| 	ctx context.Context,
 | |
| 	in *vapb.IsCAAValidRequest,
 | |
| 	opts ...grpc.CallOption,
 | |
| ) (*vapb.IsCAAValidResponse, error) {
 | |
| 	cr.Lock()
 | |
| 	defer cr.Unlock()
 | |
| 	cr.names[in.Domain] = true
 | |
| 	return &vapb.IsCAAValidResponse{}, nil
 | |
| }
 | |
| 
 | |
| // Test that the right set of domain names have their CAA rechecked, based on
 | |
| // their `Validated` (attemptedAt in the database) timestamp.
 | |
| func TestRecheckCAADates(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	recorder := &caaRecorder{names: make(map[string]bool)}
 | |
| 	ra.caa = recorder
 | |
| 	ra.authorizationLifetime = 15 * time.Hour
 | |
| 
 | |
| 	recentValidated := fc.Now().Add(-1 * time.Hour)
 | |
| 	recentExpires := fc.Now().Add(15 * time.Hour)
 | |
| 	olderValidated := fc.Now().Add(-8 * time.Hour)
 | |
| 	olderExpires := fc.Now().Add(5 * time.Hour)
 | |
| 
 | |
| 	authzs := map[identifier.ACMEIdentifier]*core.Authorization{
 | |
| 		identifier.NewDNS("recent.com"): {
 | |
| 			Identifier: identifier.NewDNS("recent.com"),
 | |
| 			Expires:    &recentExpires,
 | |
| 			Challenges: []core.Challenge{
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeHTTP01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: &recentValidated,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 		identifier.NewDNS("older.com"): {
 | |
| 			Identifier: identifier.NewDNS("older.com"),
 | |
| 			Expires:    &olderExpires,
 | |
| 			Challenges: []core.Challenge{
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeHTTP01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: &olderValidated,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 		identifier.NewDNS("older2.com"): {
 | |
| 			Identifier: identifier.NewDNS("older2.com"),
 | |
| 			Expires:    &olderExpires,
 | |
| 			Challenges: []core.Challenge{
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeHTTP01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: &olderValidated,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 		identifier.NewDNS("wildcard.com"): {
 | |
| 			Identifier: identifier.NewDNS("wildcard.com"),
 | |
| 			Expires:    &olderExpires,
 | |
| 			Challenges: []core.Challenge{
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeHTTP01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: &olderValidated,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 		identifier.NewDNS("*.wildcard.com"): {
 | |
| 			Identifier: identifier.NewDNS("*.wildcard.com"),
 | |
| 			Expires:    &olderExpires,
 | |
| 			Challenges: []core.Challenge{
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeHTTP01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: &olderValidated,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	twoChallenges := map[identifier.ACMEIdentifier]*core.Authorization{
 | |
| 		identifier.NewDNS("twochallenges.com"): {
 | |
| 			ID:         "twochal",
 | |
| 			Identifier: identifier.NewDNS("twochallenges.com"),
 | |
| 			Expires:    &recentExpires,
 | |
| 			Challenges: []core.Challenge{
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeHTTP01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: &olderValidated,
 | |
| 				},
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeDNS01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: &olderValidated,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	noChallenges := map[identifier.ACMEIdentifier]*core.Authorization{
 | |
| 		identifier.NewDNS("nochallenges.com"): {
 | |
| 			ID:         "nochal",
 | |
| 			Identifier: identifier.NewDNS("nochallenges.com"),
 | |
| 			Expires:    &recentExpires,
 | |
| 			Challenges: []core.Challenge{},
 | |
| 		},
 | |
| 	}
 | |
| 	noValidationTime := map[identifier.ACMEIdentifier]*core.Authorization{
 | |
| 		identifier.NewDNS("novalidationtime.com"): {
 | |
| 			ID:         "noval",
 | |
| 			Identifier: identifier.NewDNS("novalidationtime.com"),
 | |
| 			Expires:    &recentExpires,
 | |
| 			Challenges: []core.Challenge{
 | |
| 				{
 | |
| 					Status:    core.StatusValid,
 | |
| 					Type:      core.ChallengeTypeHTTP01,
 | |
| 					Token:     "exampleToken",
 | |
| 					Validated: nil,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// NOTE: The names provided here correspond to authorizations in the
 | |
| 	// `mockSAWithRecentAndOlder`
 | |
| 	err := ra.checkAuthorizationsCAA(context.Background(), Registration.Id, authzs, fc.Now())
 | |
| 	// We expect that there is no error rechecking authorizations for these names
 | |
| 	if err != nil {
 | |
| 		t.Errorf("expected nil err, got %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// Should error if a authorization has `!= 1` challenge
 | |
| 	err = ra.checkAuthorizationsCAA(context.Background(), Registration.Id, twoChallenges, fc.Now())
 | |
| 	test.AssertEquals(t, err.Error(), "authorization has incorrect number of challenges. 1 expected, 2 found for: id twochal")
 | |
| 
 | |
| 	// Should error if a authorization has `!= 1` challenge
 | |
| 	err = ra.checkAuthorizationsCAA(context.Background(), Registration.Id, noChallenges, fc.Now())
 | |
| 	test.AssertEquals(t, err.Error(), "authorization has incorrect number of challenges. 1 expected, 0 found for: id nochal")
 | |
| 
 | |
| 	// Should error if authorization's challenge has no validated timestamp
 | |
| 	err = ra.checkAuthorizationsCAA(context.Background(), Registration.Id, noValidationTime, fc.Now())
 | |
| 	test.AssertEquals(t, err.Error(), "authorization's challenge has no validated timestamp for: id noval")
 | |
| 
 | |
| 	// We expect that "recent.com" is not checked because its mock authorization
 | |
| 	// isn't expired
 | |
| 	if _, present := recorder.names["recent.com"]; present {
 | |
| 		t.Errorf("Rechecked CAA unnecessarily for recent.com")
 | |
| 	}
 | |
| 
 | |
| 	// We expect that "older.com" is checked
 | |
| 	if _, present := recorder.names["older.com"]; !present {
 | |
| 		t.Errorf("Failed to recheck CAA for older.com")
 | |
| 	}
 | |
| 
 | |
| 	// We expect that "older2.com" is checked
 | |
| 	if _, present := recorder.names["older2.com"]; !present {
 | |
| 		t.Errorf("Failed to recheck CAA for older2.com")
 | |
| 	}
 | |
| 
 | |
| 	// We expect that the "wildcard.com" domain (without the `*.` prefix) is checked.
 | |
| 	if _, present := recorder.names["wildcard.com"]; !present {
 | |
| 		t.Errorf("Failed to recheck CAA for wildcard.com")
 | |
| 	}
 | |
| 
 | |
| 	// We expect that "*.wildcard.com" is checked (with the `*.` prefix, because
 | |
| 	// it is stripped at a lower layer than we are testing)
 | |
| 	if _, present := recorder.names["*.wildcard.com"]; !present {
 | |
| 		t.Errorf("Failed to recheck CAA for *.wildcard.com")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type caaFailer struct{}
 | |
| 
 | |
| func (cf *caaFailer) IsCAAValid(
 | |
| 	ctx context.Context,
 | |
| 	in *vapb.IsCAAValidRequest,
 | |
| 	opts ...grpc.CallOption,
 | |
| ) (*vapb.IsCAAValidResponse, error) {
 | |
| 	cvrpb := &vapb.IsCAAValidResponse{}
 | |
| 	switch in.Domain {
 | |
| 	case "a.com":
 | |
| 		cvrpb.Problem = &corepb.ProblemDetails{
 | |
| 			Detail: "CAA invalid for a.com",
 | |
| 		}
 | |
| 	case "c.com":
 | |
| 		cvrpb.Problem = &corepb.ProblemDetails{
 | |
| 			Detail: "CAA invalid for c.com",
 | |
| 		}
 | |
| 	case "d.com":
 | |
| 		return nil, fmt.Errorf("Error checking CAA for d.com")
 | |
| 	}
 | |
| 	return cvrpb, nil
 | |
| }
 | |
| 
 | |
| func TestRecheckCAAEmpty(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	err := ra.recheckCAA(context.Background(), nil)
 | |
| 	test.AssertNotError(t, err, "expected nil")
 | |
| }
 | |
| 
 | |
| func makeHTTP01Authorization(domain string) *core.Authorization {
 | |
| 	return &core.Authorization{
 | |
| 		Identifier: identifier.NewDNS(domain),
 | |
| 		Challenges: []core.Challenge{{Status: core.StatusValid, Type: core.ChallengeTypeHTTP01}},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestRecheckCAASuccess(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	authzs := []*core.Authorization{
 | |
| 		makeHTTP01Authorization("a.com"),
 | |
| 		makeHTTP01Authorization("b.com"),
 | |
| 		makeHTTP01Authorization("c.com"),
 | |
| 	}
 | |
| 	err := ra.recheckCAA(context.Background(), authzs)
 | |
| 	test.AssertNotError(t, err, "expected nil")
 | |
| }
 | |
| 
 | |
| func TestRecheckCAAFail(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.caa = &caaFailer{}
 | |
| 	authzs := []*core.Authorization{
 | |
| 		makeHTTP01Authorization("a.com"),
 | |
| 		makeHTTP01Authorization("b.com"),
 | |
| 		makeHTTP01Authorization("c.com"),
 | |
| 	}
 | |
| 	err := ra.recheckCAA(context.Background(), authzs)
 | |
| 
 | |
| 	test.AssertError(t, err, "expected err, got nil")
 | |
| 	var berr *berrors.BoulderError
 | |
| 	test.AssertErrorWraps(t, err, &berr)
 | |
| 	test.AssertErrorIs(t, berr, berrors.CAA)
 | |
| 	test.AssertEquals(t, len(berr.SubErrors), 2)
 | |
| 
 | |
| 	// We don't know whether the asynchronous a.com or c.com CAA recheck will fail
 | |
| 	// first. Whichever does will be mentioned in the top level problem detail.
 | |
| 	expectedDetailRegex := regexp.MustCompile(
 | |
| 		`Rechecking CAA for "(?:a\.com|c\.com)" and 1 more identifiers failed. Refer to sub-problems for more information`,
 | |
| 	)
 | |
| 	if !expectedDetailRegex.MatchString(berr.Detail) {
 | |
| 		t.Errorf("expected suberror detail to match expected regex, got %q", err)
 | |
| 	}
 | |
| 
 | |
| 	// There should be a sub error for both a.com and c.com with the correct type
 | |
| 	subErrMap := make(map[string]berrors.SubBoulderError, len(berr.SubErrors))
 | |
| 	for _, subErr := range berr.SubErrors {
 | |
| 		subErrMap[subErr.Identifier.Value] = subErr
 | |
| 	}
 | |
| 	subErrA, foundA := subErrMap["a.com"]
 | |
| 	subErrB, foundB := subErrMap["c.com"]
 | |
| 	test.AssertEquals(t, foundA, true)
 | |
| 	test.AssertEquals(t, foundB, true)
 | |
| 	test.AssertEquals(t, subErrA.Type, berrors.CAA)
 | |
| 	test.AssertEquals(t, subErrB.Type, berrors.CAA)
 | |
| 
 | |
| 	// Recheck CAA with just one bad authz
 | |
| 	authzs = []*core.Authorization{
 | |
| 		makeHTTP01Authorization("a.com"),
 | |
| 	}
 | |
| 	err = ra.recheckCAA(context.Background(), authzs)
 | |
| 	// It should error
 | |
| 	test.AssertError(t, err, "expected err from recheckCAA")
 | |
| 	// It should be a berror
 | |
| 	test.AssertErrorWraps(t, err, &berr)
 | |
| 	// There should be *no* suberrors because there was only one overall error
 | |
| 	test.AssertEquals(t, len(berr.SubErrors), 0)
 | |
| }
 | |
| 
 | |
| func TestRecheckCAAInternalServerError(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.caa = &caaFailer{}
 | |
| 	authzs := []*core.Authorization{
 | |
| 		makeHTTP01Authorization("a.com"),
 | |
| 		makeHTTP01Authorization("b.com"),
 | |
| 		makeHTTP01Authorization("d.com"),
 | |
| 	}
 | |
| 	err := ra.recheckCAA(context.Background(), authzs)
 | |
| 	test.AssertError(t, err, "expected err, got nil")
 | |
| 	test.AssertErrorIs(t, err, berrors.InternalServer)
 | |
| }
 | |
| 
 | |
| func TestNewOrder(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.orderLifetime = time.Hour
 | |
| 
 | |
| 	now := fc.Now()
 | |
| 	orderA, err := ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID:         Registration.Id,
 | |
| 		CertificateProfileName: "test",
 | |
| 		DnsNames:               []string{"b.com", "a.com", "a.com", "C.COM"},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "ra.NewOrder failed")
 | |
| 	test.AssertEquals(t, orderA.RegistrationID, int64(1))
 | |
| 	test.AssertEquals(t, orderA.Expires.AsTime(), now.Add(time.Hour))
 | |
| 	test.AssertEquals(t, len(orderA.DnsNames), 3)
 | |
| 	test.AssertEquals(t, orderA.CertificateProfileName, "test")
 | |
| 	// We expect the order names to have been sorted, deduped, and lowercased
 | |
| 	test.AssertDeepEquals(t, orderA.DnsNames, []string{"a.com", "b.com", "c.com"})
 | |
| 	test.AssertEquals(t, orderA.Id, int64(1))
 | |
| 	test.AssertEquals(t, numAuthorizations(orderA), 3)
 | |
| 
 | |
| 	// Reuse all existing authorizations
 | |
| 	now = fc.Now()
 | |
| 	orderB, err := ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"b.com", "a.com", "C.COM"},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "ra.NewOrder failed")
 | |
| 	test.AssertEquals(t, orderB.RegistrationID, int64(1))
 | |
| 	test.AssertEquals(t, orderB.Expires.AsTime(), now.Add(time.Hour))
 | |
| 	// We expect orderB's ID to match orderA's because of pending order reuse
 | |
| 	test.AssertEquals(t, orderB.Id, orderA.Id)
 | |
| 	test.AssertEquals(t, len(orderB.DnsNames), 3)
 | |
| 	test.AssertDeepEquals(t, orderB.DnsNames, []string{"a.com", "b.com", "c.com"})
 | |
| 	test.AssertEquals(t, numAuthorizations(orderB), 3)
 | |
| 	test.AssertDeepEquals(t, orderB.V2Authorizations, orderA.V2Authorizations)
 | |
| 
 | |
| 	// Reuse all of the existing authorizations from the previous order and
 | |
| 	// add a new one
 | |
| 	orderA.DnsNames = append(orderA.DnsNames, "d.com")
 | |
| 	now = fc.Now()
 | |
| 	orderC, err := ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       orderA.DnsNames,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "ra.NewOrder failed")
 | |
| 	test.AssertEquals(t, orderC.RegistrationID, int64(1))
 | |
| 	test.AssertEquals(t, orderC.Expires.AsTime(), now.Add(time.Hour))
 | |
| 	test.AssertEquals(t, len(orderC.DnsNames), 4)
 | |
| 	test.AssertDeepEquals(t, orderC.DnsNames, []string{"a.com", "b.com", "c.com", "d.com"})
 | |
| 	// We expect orderC's ID to not match orderA/orderB's because it is for
 | |
| 	// a different set of names
 | |
| 	test.AssertNotEquals(t, orderC.Id, orderA.Id)
 | |
| 	test.AssertEquals(t, numAuthorizations(orderC), 4)
 | |
| 	// Abuse the order of the queries used to extract the reused authorizations
 | |
| 	existing := orderC.V2Authorizations[:3]
 | |
| 	test.AssertDeepEquals(t, existing, orderA.V2Authorizations)
 | |
| 
 | |
| 	_, err = ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"a"},
 | |
| 	})
 | |
| 	test.AssertError(t, err, "NewOrder with invalid names did not error")
 | |
| 	test.AssertEquals(t, err.Error(), "Cannot issue for \"a\": Domain name needs at least one dot")
 | |
| }
 | |
| 
 | |
| // TestNewOrderReuse tests that subsequent requests by an ACME account to create
 | |
| // an identical order results in only one order being created & subsequently
 | |
| // reused.
 | |
| func TestNewOrderReuse(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ctx := context.Background()
 | |
| 	names := []string{"zombo.com", "welcome.to.zombo.com"}
 | |
| 
 | |
| 	// Configure the RA to use a short order lifetime
 | |
| 	ra.orderLifetime = time.Hour
 | |
| 	// Create a var with two times the order lifetime to reference later
 | |
| 	doubleLifetime := ra.orderLifetime * 2
 | |
| 
 | |
| 	// Create an initial request with regA and names
 | |
| 	orderReq := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       names,
 | |
| 	}
 | |
| 
 | |
| 	// Create a second registration to reference
 | |
| 	acctKeyB, err := AccountKeyB.MarshalJSON()
 | |
| 	test.AssertNotError(t, err, "failed to marshal account key")
 | |
| 	input := &corepb.Registration{
 | |
| 		Key:       acctKeyB,
 | |
| 		InitialIP: parseAndMarshalIP(t, "42.42.42.42"),
 | |
| 	}
 | |
| 	secondReg, err := ra.NewRegistration(ctx, input)
 | |
| 	test.AssertNotError(t, err, "Error creating a second test registration")
 | |
| 	// First, add an order with `names` for regA
 | |
| 	firstOrder, err := ra.NewOrder(context.Background(), orderReq)
 | |
| 	// It shouldn't fail
 | |
| 	test.AssertNotError(t, err, "Adding an initial order for regA failed")
 | |
| 	// It should have an ID
 | |
| 	test.AssertNotNil(t, firstOrder.Id, "Initial order had a nil ID")
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		Name         string
 | |
| 		OrderReq     *rapb.NewOrderRequest
 | |
| 		ExpectReuse  bool
 | |
| 		AdvanceClock *time.Duration
 | |
| 	}{
 | |
| 		{
 | |
| 			Name:     "Duplicate order, same regID",
 | |
| 			OrderReq: orderReq,
 | |
| 			// We expect reuse since the order matches firstOrder
 | |
| 			ExpectReuse: true,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Subset of order names, same regID",
 | |
| 			OrderReq: &rapb.NewOrderRequest{
 | |
| 				RegistrationID: Registration.Id,
 | |
| 				DnsNames:       []string{names[1]},
 | |
| 			},
 | |
| 			// We do not expect reuse because the order names don't match firstOrder
 | |
| 			ExpectReuse: false,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Duplicate order, different regID",
 | |
| 			OrderReq: &rapb.NewOrderRequest{
 | |
| 				RegistrationID: secondReg.Id,
 | |
| 				DnsNames:       names,
 | |
| 			},
 | |
| 			// We do not expect reuse because the order regID differs from firstOrder
 | |
| 			ExpectReuse: false,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Duplicate order, different profile",
 | |
| 			OrderReq: &rapb.NewOrderRequest{
 | |
| 				RegistrationID:         Registration.Id,
 | |
| 				CertificateProfileName: "different",
 | |
| 				DnsNames:               names,
 | |
| 			},
 | |
| 			// We do not expect reuse because the profile name differs from firstOrder
 | |
| 			ExpectReuse: false,
 | |
| 		},
 | |
| 		{
 | |
| 			Name:         "Duplicate order, same regID, first expired",
 | |
| 			OrderReq:     orderReq,
 | |
| 			AdvanceClock: &doubleLifetime,
 | |
| 			// We do not expect reuse because firstOrder has expired
 | |
| 			ExpectReuse: true,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, tc := range testCases {
 | |
| 		t.Run(tc.Name, func(t *testing.T) {
 | |
| 			// If the testcase specifies, advance the clock before adding the order
 | |
| 			if tc.AdvanceClock != nil {
 | |
| 				_ = fc.Now().Add(*tc.AdvanceClock)
 | |
| 			}
 | |
| 			// Add the order for the test request
 | |
| 			order, err := ra.NewOrder(ctx, tc.OrderReq)
 | |
| 			// It shouldn't fail
 | |
| 			test.AssertNotError(t, err, "NewOrder returned an unexpected error")
 | |
| 			// The order should not have a nil ID
 | |
| 			test.AssertNotNil(t, order.Id, "NewOrder returned an order with a nil Id")
 | |
| 
 | |
| 			if tc.ExpectReuse {
 | |
| 				// If we expected order reuse for this testcase assert that the order
 | |
| 				// has the same ID as the firstOrder
 | |
| 				test.AssertEquals(t, firstOrder.Id, order.Id)
 | |
| 			} else {
 | |
| 				// Otherwise assert that the order doesn't have the same ID as the
 | |
| 				// firstOrder
 | |
| 				test.AssertNotEquals(t, firstOrder.Id, order.Id)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestNewOrderReuseInvalidAuthz(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ctx := context.Background()
 | |
| 	names := []string{"zombo.com"}
 | |
| 
 | |
| 	// Create an initial request with regA and names
 | |
| 	orderReq := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       names,
 | |
| 	}
 | |
| 
 | |
| 	// First, add an order with `names` for regA
 | |
| 	order, err := ra.NewOrder(ctx, orderReq)
 | |
| 	// It shouldn't fail
 | |
| 	test.AssertNotError(t, err, "Adding an initial order for regA failed")
 | |
| 	// It should have an ID
 | |
| 	test.AssertNotNil(t, order.Id, "Initial order had a nil ID")
 | |
| 	// It should have one authorization
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 1)
 | |
| 
 | |
| 	_, err = ra.SA.FinalizeAuthorization2(ctx, &sapb.FinalizeAuthorizationRequest{
 | |
| 		Id:          order.V2Authorizations[0],
 | |
| 		Status:      string(core.StatusInvalid),
 | |
| 		Expires:     order.Expires,
 | |
| 		Attempted:   string(core.ChallengeTypeDNS01),
 | |
| 		AttemptedAt: timestamppb.New(ra.clk.Now()),
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "FinalizeAuthorization2 failed")
 | |
| 
 | |
| 	// The order associated with the authz should now be invalid
 | |
| 	updatedOrder, err := ra.SA.GetOrder(ctx, &sapb.OrderRequest{Id: order.Id})
 | |
| 	test.AssertNotError(t, err, "Error getting order to check status")
 | |
| 	test.AssertEquals(t, updatedOrder.Status, "invalid")
 | |
| 
 | |
| 	// Create a second order for the same names/regID
 | |
| 	secondOrder, err := ra.NewOrder(ctx, orderReq)
 | |
| 	// It shouldn't fail
 | |
| 	test.AssertNotError(t, err, "Adding an initial order for regA failed")
 | |
| 	// It should have a different ID than the first now-invalid order
 | |
| 	test.AssertNotEquals(t, secondOrder.Id, order.Id)
 | |
| 	// It should be status pending
 | |
| 	test.AssertEquals(t, secondOrder.Status, "pending")
 | |
| 	test.AssertEquals(t, numAuthorizations(secondOrder), 1)
 | |
| 	// It should have a different authorization than the first order's now-invalid authorization
 | |
| 	test.AssertNotEquals(t, secondOrder.V2Authorizations[0], order.V2Authorizations[0])
 | |
| }
 | |
| 
 | |
| // mockSACountPendingFails has a CountPendingAuthorizations2 implementation
 | |
| // that always returns error
 | |
| type mockSACountPendingFails struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| }
 | |
| 
 | |
| func (mock *mockSACountPendingFails) CountPendingAuthorizations2(ctx context.Context, req *sapb.RegistrationID, _ ...grpc.CallOption) (*sapb.Count, error) {
 | |
| 	return nil, errors.New("counting is slow and boring")
 | |
| }
 | |
| 
 | |
| // Ensure that we don't bother to call the SA to count pending authorizations
 | |
| // when an "unlimited" limit is set.
 | |
| func TestPendingAuthorizationsUnlimited(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		PendingAuthorizationsPerAccountPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 1,
 | |
| 			Window:    config.Duration{Duration: 24 * time.Hour},
 | |
| 			RegistrationOverrides: map[int64]int64{
 | |
| 				13: -1,
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	ra.SA = &mockSACountPendingFails{}
 | |
| 
 | |
| 	limit := ra.rlPolicies.PendingAuthorizationsPerAccount()
 | |
| 	err := ra.checkPendingAuthorizationLimit(context.Background(), 13, limit)
 | |
| 	test.AssertNotError(t, err, "checking pending authorization limit")
 | |
| }
 | |
| 
 | |
| // An authority that returns nonzero failures for CountInvalidAuthorizations2,
 | |
| // and also returns existing authzs for the same domain from GetAuthorizations2
 | |
| type mockInvalidPlusValidAuthzAuthority struct {
 | |
| 	mockSAWithAuthzs
 | |
| 	domainWithFailures string
 | |
| }
 | |
| 
 | |
| func (sa *mockInvalidPlusValidAuthzAuthority) CountInvalidAuthorizations2(ctx context.Context, req *sapb.CountInvalidAuthorizationsRequest, _ ...grpc.CallOption) (*sapb.Count, error) {
 | |
| 	if req.DnsName == sa.domainWithFailures {
 | |
| 		return &sapb.Count{Count: 1}, nil
 | |
| 	} else {
 | |
| 		return &sapb.Count{}, nil
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Test that the failed authorizations limit is checked before authz reuse.
 | |
| func TestNewOrderCheckFailedAuthorizationsFirst(t *testing.T) {
 | |
| 	_, _, ra, clk, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Create an order (and thus a pending authz) for example.com
 | |
| 	ctx := context.Background()
 | |
| 	order, err := ra.NewOrder(ctx, &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"example.com"},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "adding an initial order for regA")
 | |
| 	test.AssertNotNil(t, order.Id, "initial order had a nil ID")
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 1)
 | |
| 
 | |
| 	// Now treat example.com as if it had a recent failure, but also a valid authz.
 | |
| 	expires := clk.Now().Add(24 * time.Hour)
 | |
| 	ra.SA = &mockInvalidPlusValidAuthzAuthority{
 | |
| 		mockSAWithAuthzs: mockSAWithAuthzs{
 | |
| 			authzs: []*core.Authorization{
 | |
| 				{
 | |
| 					ID:             "1",
 | |
| 					Identifier:     identifier.NewDNS("example.com"),
 | |
| 					RegistrationID: Registration.Id,
 | |
| 					Expires:        &expires,
 | |
| 					Status:         "valid",
 | |
| 					Challenges: []core.Challenge{
 | |
| 						{
 | |
| 							Type:   core.ChallengeTypeHTTP01,
 | |
| 							Status: core.StatusValid,
 | |
| 							Token:  core.NewToken(),
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 		domainWithFailures: "example.com",
 | |
| 	}
 | |
| 
 | |
| 	// Set a very restrictive police for invalid authorizations - one failure
 | |
| 	// and you're done for a day.
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		InvalidAuthorizationsPerAccountPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 1,
 | |
| 			Window:    config.Duration{Duration: 24 * time.Hour},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Creating an order for example.com should error with the "too many failed
 | |
| 	// authorizations recently" error.
 | |
| 	_, err = ra.NewOrder(ctx, &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"example.com"},
 | |
| 	})
 | |
| 
 | |
| 	test.AssertError(t, err, "expected error for domain with too many failures")
 | |
| 	test.AssertEquals(t, err.Error(), "too many failed authorizations recently: see https://letsencrypt.org/docs/failed-validation-limit/")
 | |
| }
 | |
| 
 | |
| // mockSAWithAuthzs has a GetAuthorizations2 method that returns the protobuf
 | |
| // version of its authzs struct member. It also has a fake GetOrderForNames
 | |
| // which always fails, and a fake NewOrderAndAuthzs which always succeeds, to
 | |
| // facilitate the full execution of RA.NewOrder.
 | |
| type mockSAWithAuthzs struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| 	authzs []*core.Authorization
 | |
| }
 | |
| 
 | |
| // GetOrderForNames is a mock which always returns NotFound so that NewOrder
 | |
| // proceeds to attempt authz reuse instead of wholesale order reuse.
 | |
| func (msa *mockSAWithAuthzs) GetOrderForNames(ctx context.Context, req *sapb.GetOrderForNamesRequest, _ ...grpc.CallOption) (*corepb.Order, error) {
 | |
| 	return nil, berrors.NotFoundError("no such order")
 | |
| }
 | |
| 
 | |
| // GetAuthorizations2 returns a _bizarre_ authorization for "*.zombo.com" that
 | |
| // was validated by HTTP-01. This should never happen in real life since the
 | |
| // name is a wildcard. We use this mock to test that we reject this bizarre
 | |
| // situation correctly.
 | |
| func (msa *mockSAWithAuthzs) GetAuthorizations2(ctx context.Context, req *sapb.GetAuthorizationsRequest, _ ...grpc.CallOption) (*sapb.Authorizations, error) {
 | |
| 	resp := &sapb.Authorizations{}
 | |
| 	for _, v := range msa.authzs {
 | |
| 		authzPB, err := bgrpc.AuthzToPB(*v)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		resp.Authzs = append(resp.Authzs, authzPB)
 | |
| 	}
 | |
| 	return resp, nil
 | |
| }
 | |
| 
 | |
| func (msa *mockSAWithAuthzs) GetAuthorization2(ctx context.Context, req *sapb.AuthorizationID2, _ ...grpc.CallOption) (*corepb.Authorization, error) {
 | |
| 	for _, authz := range msa.authzs {
 | |
| 		if authz.ID == fmt.Sprintf("%d", req.Id) {
 | |
| 			return bgrpc.AuthzToPB(*authz)
 | |
| 		}
 | |
| 	}
 | |
| 	return nil, berrors.NotFoundError("no such authz")
 | |
| }
 | |
| 
 | |
| // NewOrderAndAuthzs is a mock which just reflects the incoming request back,
 | |
| // pretending to have created new db rows for the requested newAuthzs.
 | |
| func (msa *mockSAWithAuthzs) NewOrderAndAuthzs(ctx context.Context, req *sapb.NewOrderAndAuthzsRequest, _ ...grpc.CallOption) (*corepb.Order, error) {
 | |
| 	authzIDs := req.NewOrder.V2Authorizations
 | |
| 	for range req.NewAuthzs {
 | |
| 		authzIDs = append(authzIDs, mrand.Int64())
 | |
| 	}
 | |
| 	return &corepb.Order{
 | |
| 		// Fields from the input new order request.
 | |
| 		RegistrationID:         req.NewOrder.RegistrationID,
 | |
| 		Expires:                req.NewOrder.Expires,
 | |
| 		DnsNames:               req.NewOrder.DnsNames,
 | |
| 		V2Authorizations:       authzIDs,
 | |
| 		CertificateProfileName: req.NewOrder.CertificateProfileName,
 | |
| 		// Mock new fields generated by the database transaction.
 | |
| 		Id:      mrand.Int64(),
 | |
| 		Created: timestamppb.Now(),
 | |
| 		// A new order is never processing because it can't have been finalized yet.
 | |
| 		BeganProcessing: false,
 | |
| 		Status:          string(core.StatusPending),
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| // TestNewOrderAuthzReuseSafety checks that the RA's safety check for reusing an
 | |
| // authorization for a new-order request with a wildcard name works correctly.
 | |
| // We want to ensure that we never reuse a non-Wildcard authorization (e.g. one
 | |
| // with more than just a DNS-01 challenge) for a wildcard name. See Issue #3420
 | |
| // for background - this safety check was previously broken!
 | |
| // https://github.com/letsencrypt/boulder/issues/3420
 | |
| func TestNewOrderAuthzReuseSafety(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ctx := context.Background()
 | |
| 	names := []string{"*.zombo.com"}
 | |
| 
 | |
| 	// Use a mock SA that always returns a valid HTTP-01 authz for the name
 | |
| 	// "zombo.com"
 | |
| 	expires := time.Now()
 | |
| 	ra.SA = &mockSAWithAuthzs{
 | |
| 		authzs: []*core.Authorization{
 | |
| 			{
 | |
| 				// A static fake ID we can check for in a unit test
 | |
| 				ID:             "1",
 | |
| 				Identifier:     identifier.NewDNS("*.zombo.com"),
 | |
| 				RegistrationID: Registration.Id,
 | |
| 				// Authz is valid
 | |
| 				Status:  "valid",
 | |
| 				Expires: &expires,
 | |
| 				Challenges: []core.Challenge{
 | |
| 					// HTTP-01 challenge is valid
 | |
| 					{
 | |
| 						Type:   core.ChallengeTypeHTTP01, // The dreaded HTTP-01! X__X
 | |
| 						Status: core.StatusValid,
 | |
| 						Token:  core.NewToken(),
 | |
| 					},
 | |
| 					// DNS-01 challenge is pending
 | |
| 					{
 | |
| 						Type:   core.ChallengeTypeDNS01,
 | |
| 						Status: core.StatusPending,
 | |
| 						Token:  core.NewToken(),
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			{
 | |
| 				// A static fake ID we can check for in a unit test
 | |
| 				ID:             "2",
 | |
| 				Identifier:     identifier.NewDNS("zombo.com"),
 | |
| 				RegistrationID: Registration.Id,
 | |
| 				// Authz is valid
 | |
| 				Status:  "valid",
 | |
| 				Expires: &expires,
 | |
| 				Challenges: []core.Challenge{
 | |
| 					// HTTP-01 challenge is valid
 | |
| 					{
 | |
| 						Type:   core.ChallengeTypeHTTP01,
 | |
| 						Status: core.StatusValid,
 | |
| 						Token:  core.NewToken(),
 | |
| 					},
 | |
| 					// DNS-01 challenge is pending
 | |
| 					{
 | |
| 						Type:   core.ChallengeTypeDNS01,
 | |
| 						Status: core.StatusPending,
 | |
| 						Token:  core.NewToken(),
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Create an initial request with regA and names
 | |
| 	orderReq := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       names,
 | |
| 	}
 | |
| 
 | |
| 	// Create an order for that request
 | |
| 	order, err := ra.NewOrder(ctx, orderReq)
 | |
| 	// It shouldn't fail
 | |
| 	test.AssertNotError(t, err, "Adding an initial order for regA failed")
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 1)
 | |
| 	// It should *not* be the bad authorization!
 | |
| 	test.AssertNotEquals(t, order.V2Authorizations[0], int64(1))
 | |
| }
 | |
| 
 | |
| func TestNewOrderWildcard(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.orderLifetime = time.Hour
 | |
| 
 | |
| 	orderNames := []string{"example.com", "*.welcome.zombo.com"}
 | |
| 	wildcardOrderRequest := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       orderNames,
 | |
| 	}
 | |
| 
 | |
| 	order, err := ra.NewOrder(context.Background(), wildcardOrderRequest)
 | |
| 	test.AssertNotError(t, err, "NewOrder failed for a wildcard order request")
 | |
| 
 | |
| 	// We expect the order to be pending
 | |
| 	test.AssertEquals(t, order.Status, string(core.StatusPending))
 | |
| 	// We expect the order to have two names
 | |
| 	test.AssertEquals(t, len(order.DnsNames), 2)
 | |
| 	// We expect the order to have the names we requested
 | |
| 	test.AssertDeepEquals(t,
 | |
| 		core.UniqueLowerNames(order.DnsNames),
 | |
| 		core.UniqueLowerNames(orderNames))
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 2)
 | |
| 
 | |
| 	// Check each of the authz IDs in the order
 | |
| 	for _, authzID := range order.V2Authorizations {
 | |
| 		// We should be able to retrieve the authz from the db without error
 | |
| 		authzID := authzID
 | |
| 		authzPB, err := ra.SA.GetAuthorization2(ctx, &sapb.AuthorizationID2{Id: authzID})
 | |
| 		test.AssertNotError(t, err, "sa.GetAuthorization2 failed")
 | |
| 		authz, err := bgrpc.PBToAuthz(authzPB)
 | |
| 		test.AssertNotError(t, err, "bgrpc.PBToAuthz failed")
 | |
| 
 | |
| 		// We expect the authz is in Pending status
 | |
| 		test.AssertEquals(t, authz.Status, core.StatusPending)
 | |
| 
 | |
| 		name := authz.Identifier.Value
 | |
| 		switch name {
 | |
| 		case "*.welcome.zombo.com":
 | |
| 			// If the authz is for *.welcome.zombo.com, we expect that it only has one
 | |
| 			// pending challenge with DNS-01 type
 | |
| 			test.AssertEquals(t, len(authz.Challenges), 1)
 | |
| 			test.AssertEquals(t, authz.Challenges[0].Status, core.StatusPending)
 | |
| 			test.AssertEquals(t, authz.Challenges[0].Type, core.ChallengeTypeDNS01)
 | |
| 		case "example.com":
 | |
| 			// If the authz is for example.com, we expect it has normal challenges
 | |
| 			test.AssertEquals(t, len(authz.Challenges), 3)
 | |
| 		default:
 | |
| 			t.Fatalf("Received an authorization for a name not requested: %q", name)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// An order for a base domain and a wildcard for the same base domain should
 | |
| 	// return just 2 authz's, one for the wildcard with a DNS-01
 | |
| 	// challenge and one for the base domain with the normal challenges.
 | |
| 	orderNames = []string{"zombo.com", "*.zombo.com"}
 | |
| 	wildcardOrderRequest = &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       orderNames,
 | |
| 	}
 | |
| 	order, err = ra.NewOrder(context.Background(), wildcardOrderRequest)
 | |
| 	test.AssertNotError(t, err, "NewOrder failed for a wildcard order request")
 | |
| 
 | |
| 	// We expect the order to be pending
 | |
| 	test.AssertEquals(t, order.Status, string(core.StatusPending))
 | |
| 	// We expect the order to have two names
 | |
| 	test.AssertEquals(t, len(order.DnsNames), 2)
 | |
| 	// We expect the order to have the names we requested
 | |
| 	test.AssertDeepEquals(t,
 | |
| 		core.UniqueLowerNames(order.DnsNames),
 | |
| 		core.UniqueLowerNames(orderNames))
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 2)
 | |
| 
 | |
| 	for _, authzID := range order.V2Authorizations {
 | |
| 		// We should be able to retrieve the authz from the db without error
 | |
| 		authzID := authzID
 | |
| 		authzPB, err := ra.SA.GetAuthorization2(ctx, &sapb.AuthorizationID2{Id: authzID})
 | |
| 		test.AssertNotError(t, err, "sa.GetAuthorization2 failed")
 | |
| 		authz, err := bgrpc.PBToAuthz(authzPB)
 | |
| 		test.AssertNotError(t, err, "bgrpc.PBToAuthz failed")
 | |
| 		// We expect the authz is in Pending status
 | |
| 		test.AssertEquals(t, authz.Status, core.StatusPending)
 | |
| 		switch authz.Identifier.Value {
 | |
| 		case "zombo.com":
 | |
| 			// We expect that the base domain identifier auth has the normal number of
 | |
| 			// challenges
 | |
| 			test.AssertEquals(t, len(authz.Challenges), 3)
 | |
| 		case "*.zombo.com":
 | |
| 			// We expect that the wildcard identifier auth has only a pending
 | |
| 			// DNS-01 type challenge
 | |
| 			test.AssertEquals(t, len(authz.Challenges), 1)
 | |
| 			test.AssertEquals(t, authz.Challenges[0].Status, core.StatusPending)
 | |
| 			test.AssertEquals(t, authz.Challenges[0].Type, core.ChallengeTypeDNS01)
 | |
| 		default:
 | |
| 			t.Fatal("Unexpected authorization value returned from new-order")
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Make an order for a single domain, no wildcards. This will create a new
 | |
| 	// pending authz for the domain
 | |
| 	normalOrderReq := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"everything.is.possible.zombo.com"},
 | |
| 	}
 | |
| 	normalOrder, err := ra.NewOrder(context.Background(), normalOrderReq)
 | |
| 	test.AssertNotError(t, err, "NewOrder failed for a normal non-wildcard order")
 | |
| 
 | |
| 	test.AssertEquals(t, numAuthorizations(normalOrder), 1)
 | |
| 	// We expect the order is in Pending status
 | |
| 	test.AssertEquals(t, order.Status, string(core.StatusPending))
 | |
| 	var authz core.Authorization
 | |
| 	authzPB, err := ra.SA.GetAuthorization2(ctx, &sapb.AuthorizationID2{Id: normalOrder.V2Authorizations[0]})
 | |
| 	test.AssertNotError(t, err, "sa.GetAuthorization2 failed")
 | |
| 	authz, err = bgrpc.PBToAuthz(authzPB)
 | |
| 	test.AssertNotError(t, err, "bgrpc.PBToAuthz failed")
 | |
| 	// We expect the authz is in Pending status
 | |
| 	test.AssertEquals(t, authz.Status, core.StatusPending)
 | |
| 	// We expect the authz is for the identifier the correct domain
 | |
| 	test.AssertEquals(t, authz.Identifier.Value, "everything.is.possible.zombo.com")
 | |
| 	// We expect the authz has the normal # of challenges
 | |
| 	test.AssertEquals(t, len(authz.Challenges), 3)
 | |
| 
 | |
| 	// Now submit an order request for a wildcard of the domain we just created an
 | |
| 	// order for. We should **NOT** reuse the authorization from the previous
 | |
| 	// order since we now require a DNS-01 challenge for the `*.` prefixed name.
 | |
| 	orderNames = []string{"*.everything.is.possible.zombo.com"}
 | |
| 	wildcardOrderRequest = &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       orderNames,
 | |
| 	}
 | |
| 	order, err = ra.NewOrder(context.Background(), wildcardOrderRequest)
 | |
| 	test.AssertNotError(t, err, "NewOrder failed for a wildcard order request")
 | |
| 	// We expect the order is in Pending status
 | |
| 	test.AssertEquals(t, order.Status, string(core.StatusPending))
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 1)
 | |
| 	// The authz should be a different ID than the previous authz
 | |
| 	test.AssertNotEquals(t, order.V2Authorizations[0], normalOrder.V2Authorizations[0])
 | |
| 	// We expect the authorization is available
 | |
| 	authzPB, err = ra.SA.GetAuthorization2(ctx, &sapb.AuthorizationID2{Id: order.V2Authorizations[0]})
 | |
| 	test.AssertNotError(t, err, "sa.GetAuthorization2 failed")
 | |
| 	authz, err = bgrpc.PBToAuthz(authzPB)
 | |
| 	test.AssertNotError(t, err, "bgrpc.PBToAuthz failed")
 | |
| 	// We expect the authz is in Pending status
 | |
| 	test.AssertEquals(t, authz.Status, core.StatusPending)
 | |
| 	// We expect the authz is for a identifier with the correct domain
 | |
| 	test.AssertEquals(t, authz.Identifier.Value, "*.everything.is.possible.zombo.com")
 | |
| 	// We expect the authz has only one challenge
 | |
| 	test.AssertEquals(t, len(authz.Challenges), 1)
 | |
| 	// We expect the one challenge is pending
 | |
| 	test.AssertEquals(t, authz.Challenges[0].Status, core.StatusPending)
 | |
| 	// We expect that the one challenge is a DNS01 type challenge
 | |
| 	test.AssertEquals(t, authz.Challenges[0].Type, core.ChallengeTypeDNS01)
 | |
| 
 | |
| 	// Submit an identical wildcard order request
 | |
| 	dupeOrder, err := ra.NewOrder(context.Background(), wildcardOrderRequest)
 | |
| 	test.AssertNotError(t, err, "NewOrder failed for a wildcard order request")
 | |
| 	// We expect the order is in Pending status
 | |
| 	test.AssertEquals(t, dupeOrder.Status, string(core.StatusPending))
 | |
| 	test.AssertEquals(t, numAuthorizations(dupeOrder), 1)
 | |
| 	// The authz should be the same ID as the previous order's authz. We already
 | |
| 	// checked that order.Authorizations[0] only has a DNS-01 challenge above so
 | |
| 	// we don't need to recheck that here.
 | |
| 	test.AssertEquals(t, dupeOrder.V2Authorizations[0], order.V2Authorizations[0])
 | |
| }
 | |
| 
 | |
| func TestNewOrderExpiry(t *testing.T) {
 | |
| 	_, _, ra, clk, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ctx := context.Background()
 | |
| 	names := []string{"zombo.com"}
 | |
| 
 | |
| 	// Set the order lifetime to 48 hours.
 | |
| 	ra.orderLifetime = 48 * time.Hour
 | |
| 
 | |
| 	// Use an expiry that is sooner than the configured order expiry but greater
 | |
| 	// than 24 hours away.
 | |
| 	fakeAuthzExpires := clk.Now().Add(35 * time.Hour)
 | |
| 
 | |
| 	// Use a mock SA that always returns a soon-to-be-expired valid authz for
 | |
| 	// "zombo.com".
 | |
| 	ra.SA = &mockSAWithAuthzs{
 | |
| 		authzs: []*core.Authorization{
 | |
| 			{
 | |
| 				// A static fake ID we can check for in a unit test
 | |
| 				ID:             "1",
 | |
| 				Identifier:     identifier.NewDNS("zombo.com"),
 | |
| 				RegistrationID: Registration.Id,
 | |
| 				Expires:        &fakeAuthzExpires,
 | |
| 				Status:         "valid",
 | |
| 				Challenges: []core.Challenge{
 | |
| 					{
 | |
| 						Type:   core.ChallengeTypeHTTP01,
 | |
| 						Status: core.StatusValid,
 | |
| 						Token:  core.NewToken(),
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Create an initial request with regA and names
 | |
| 	orderReq := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       names,
 | |
| 	}
 | |
| 
 | |
| 	// Create an order for that request
 | |
| 	order, err := ra.NewOrder(ctx, orderReq)
 | |
| 	// It shouldn't fail
 | |
| 	test.AssertNotError(t, err, "Adding an order for regA failed")
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 1)
 | |
| 	// It should be the fake near-expired-authz authz
 | |
| 	test.AssertEquals(t, order.V2Authorizations[0], int64(1))
 | |
| 	// The order's expiry should be the fake authz's expiry since it is sooner
 | |
| 	// than the order's own expiry.
 | |
| 	test.AssertEquals(t, order.Expires.AsTime(), fakeAuthzExpires)
 | |
| 
 | |
| 	// Set the order lifetime to be lower than the fakeAuthzLifetime
 | |
| 	ra.orderLifetime = 12 * time.Hour
 | |
| 	expectedOrderExpiry := clk.Now().Add(ra.orderLifetime)
 | |
| 	// Create the order again
 | |
| 	order, err = ra.NewOrder(ctx, orderReq)
 | |
| 	// It shouldn't fail
 | |
| 	test.AssertNotError(t, err, "Adding an order for regA failed")
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 1)
 | |
| 	// It should be the fake near-expired-authz authz
 | |
| 	test.AssertEquals(t, order.V2Authorizations[0], int64(1))
 | |
| 	// The order's expiry should be the order's own expiry since it is sooner than
 | |
| 	// the fake authz's expiry.
 | |
| 	test.AssertEquals(t, order.Expires.AsTime(), expectedOrderExpiry)
 | |
| }
 | |
| 
 | |
| func TestFinalizeOrder(t *testing.T) {
 | |
| 	_, sa, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.orderLifetime = time.Hour
 | |
| 
 | |
| 	// Create one finalized authorization for not-example.com and one finalized
 | |
| 	// authorization for www.not-example.org
 | |
| 	now := ra.clk.Now()
 | |
| 	exp := now.Add(365 * 24 * time.Hour)
 | |
| 	authzIDA := createFinalizedAuthorization(t, sa, "not-example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 	authzIDB := createFinalizedAuthorization(t, sa, "www.not-example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 
 | |
| 	testKey, err := rsa.GenerateKey(rand.Reader, 2048)
 | |
| 	test.AssertNotError(t, err, "error generating test key")
 | |
| 
 | |
| 	policyForbidCSR, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		DNSNames:           []string{"example.org"},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Error creating policy forbid CSR")
 | |
| 
 | |
| 	oneDomainCSR, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		DNSNames:           []string{"a.com"},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Error creating CSR with one DNS name")
 | |
| 
 | |
| 	twoDomainCSR, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		DNSNames:           []string{"a.com", "b.com"},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Error creating CSR with two DNS names")
 | |
| 
 | |
| 	validCSR, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.Public(),
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		DNSNames:           []string{"not-example.com", "www.not-example.com"},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Error creating CSR with authorized names")
 | |
| 
 | |
| 	expectedCert := &x509.Certificate{
 | |
| 		SerialNumber:          big.NewInt(0),
 | |
| 		Subject:               pkix.Name{CommonName: "not-example.com"},
 | |
| 		DNSNames:              []string{"not-example.com", "www.not-example.com"},
 | |
| 		PublicKey:             testKey.Public(),
 | |
| 		NotBefore:             fc.Now(),
 | |
| 		BasicConstraintsValid: true,
 | |
| 		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
 | |
| 	}
 | |
| 	certDER, err := x509.CreateCertificate(rand.Reader, expectedCert, expectedCert, testKey.Public(), testKey)
 | |
| 	test.AssertNotError(t, err, "failed to construct test certificate")
 | |
| 	ra.CA.(*mocks.MockCA).PEM = pem.EncodeToMemory(&pem.Block{Bytes: certDER, Type: "CERTIFICATE"})
 | |
| 
 | |
| 	fakeRegID := int64(0xB00)
 | |
| 
 | |
| 	// NOTE(@cpu): We use unique `names` for each of these orders because
 | |
| 	// otherwise only *one* order is created & reused. The first test case to
 | |
| 	// finalize the order will put it into processing state and the other tests
 | |
| 	// will fail because you can't finalize an order that is already being
 | |
| 	// processed.
 | |
| 	// Add a new order for the fake reg ID
 | |
| 	fakeRegOrder, err := ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"001.example.com"},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order for fake reg ID order ID")
 | |
| 
 | |
| 	missingAuthzOrder, err := ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"002.example.com"},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order for missing authz order ID")
 | |
| 
 | |
| 	validatedOrder, err := sa.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:   Registration.Id,
 | |
| 			Expires:          timestamppb.New(exp),
 | |
| 			DnsNames:         []string{"not-example.com", "www.not-example.com"},
 | |
| 			V2Authorizations: []int64{authzIDA, authzIDB},
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order with finalized authz IDs, ready status")
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		Name           string
 | |
| 		OrderReq       *rapb.FinalizeOrderRequest
 | |
| 		ExpectedErrMsg string
 | |
| 		ExpectIssuance bool
 | |
| 	}{
 | |
| 		{
 | |
| 			Name: "No id in order",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{},
 | |
| 				Csr:   oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "invalid order ID: 0",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "No account id in order",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id: 1,
 | |
| 				},
 | |
| 				Csr: oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "invalid account ID: 0",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "No names in order",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:             1,
 | |
| 					RegistrationID: 1,
 | |
| 					Status:         string(core.StatusReady),
 | |
| 					DnsNames:       []string{},
 | |
| 				},
 | |
| 				Csr: oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "Order has no associated names",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Wrong order state (valid)",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:             1,
 | |
| 					RegistrationID: 1,
 | |
| 					Status:         string(core.StatusValid),
 | |
| 					DnsNames:       []string{"a.com"},
 | |
| 				},
 | |
| 				Csr: oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: `Order's status ("valid") is not acceptable for finalization`,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Wrong order state (pending)",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:             1,
 | |
| 					RegistrationID: 1,
 | |
| 					Status:         string(core.StatusPending),
 | |
| 					DnsNames:       []string{"a.com"},
 | |
| 				},
 | |
| 				Csr: oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectIssuance: false,
 | |
| 			ExpectedErrMsg: `Order's status ("pending") is not acceptable for finalization`,
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Invalid CSR",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:             1,
 | |
| 					RegistrationID: 1,
 | |
| 					Status:         string(core.StatusReady),
 | |
| 					DnsNames:       []string{"a.com"},
 | |
| 				},
 | |
| 				Csr: []byte{0xC0, 0xFF, 0xEE},
 | |
| 			},
 | |
| 			ExpectedErrMsg: "unable to parse CSR: asn1: syntax error: truncated tag or length",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "CSR and Order with diff number of names",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:             1,
 | |
| 					RegistrationID: 1,
 | |
| 					Status:         string(core.StatusReady),
 | |
| 					DnsNames:       []string{"a.com", "b.com"},
 | |
| 				},
 | |
| 				Csr: oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "CSR does not specify same identifiers as Order",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "CSR and Order with diff number of names (other way)",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:             1,
 | |
| 					RegistrationID: 1,
 | |
| 					Status:         string(core.StatusReady),
 | |
| 					DnsNames:       []string{"a.com"},
 | |
| 				},
 | |
| 				Csr: twoDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "CSR does not specify same identifiers as Order",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "CSR missing an order name",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:             1,
 | |
| 					RegistrationID: 1,
 | |
| 					Status:         string(core.StatusReady),
 | |
| 					DnsNames:       []string{"foobar.com"},
 | |
| 				},
 | |
| 				Csr: oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "CSR does not specify same identifiers as Order",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "CSR with policy forbidden name",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Id:                1,
 | |
| 					RegistrationID:    1,
 | |
| 					Status:            string(core.StatusReady),
 | |
| 					DnsNames:          []string{"example.org"},
 | |
| 					Expires:           timestamppb.New(exp),
 | |
| 					CertificateSerial: "",
 | |
| 					BeganProcessing:   false,
 | |
| 				},
 | |
| 				Csr: policyForbidCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "Cannot issue for \"example.org\": The ACME server refuses to issue a certificate for this domain name, because it is forbidden by policy",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Order with missing registration",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Status:            string(core.StatusReady),
 | |
| 					DnsNames:          []string{"a.com"},
 | |
| 					Id:                fakeRegOrder.Id,
 | |
| 					RegistrationID:    fakeRegID,
 | |
| 					Expires:           timestamppb.New(exp),
 | |
| 					CertificateSerial: "",
 | |
| 					BeganProcessing:   false,
 | |
| 					Created:           timestamppb.New(now),
 | |
| 				},
 | |
| 				Csr: oneDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: fmt.Sprintf("registration with ID '%d' not found", fakeRegID),
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Order with missing authorizations",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: &corepb.Order{
 | |
| 					Status:            string(core.StatusReady),
 | |
| 					DnsNames:          []string{"a.com", "b.com"},
 | |
| 					Id:                missingAuthzOrder.Id,
 | |
| 					RegistrationID:    Registration.Id,
 | |
| 					Expires:           timestamppb.New(exp),
 | |
| 					CertificateSerial: "",
 | |
| 					BeganProcessing:   false,
 | |
| 					Created:           timestamppb.New(now),
 | |
| 				},
 | |
| 				Csr: twoDomainCSR,
 | |
| 			},
 | |
| 			ExpectedErrMsg: "authorizations for these identifiers not found: a.com, b.com",
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "Order with correct authorizations, ready status",
 | |
| 			OrderReq: &rapb.FinalizeOrderRequest{
 | |
| 				Order: validatedOrder,
 | |
| 				Csr:   validCSR,
 | |
| 			},
 | |
| 			ExpectIssuance: true,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, tc := range testCases {
 | |
| 		t.Run(tc.Name, func(t *testing.T) {
 | |
| 			_, result := ra.FinalizeOrder(context.Background(), tc.OrderReq)
 | |
| 			// If we don't expect issuance we expect an error
 | |
| 			if !tc.ExpectIssuance {
 | |
| 				// Check that the error happened and the message matches expected
 | |
| 				test.AssertError(t, result, "FinalizeOrder did not fail when expected to")
 | |
| 				test.AssertEquals(t, result.Error(), tc.ExpectedErrMsg)
 | |
| 			} else {
 | |
| 				// Otherwise we expect an issuance and no error
 | |
| 				test.AssertNotError(t, result, fmt.Sprintf("FinalizeOrder result was %#v, expected nil", result))
 | |
| 				// Check that the order now has a serial for the issued certificate
 | |
| 				updatedOrder, err := sa.GetOrder(
 | |
| 					context.Background(),
 | |
| 					&sapb.OrderRequest{Id: tc.OrderReq.Order.Id})
 | |
| 				test.AssertNotError(t, err, "Error getting order to check serial")
 | |
| 				test.AssertNotEquals(t, updatedOrder.CertificateSerial, "")
 | |
| 				test.AssertEquals(t, updatedOrder.Status, "valid")
 | |
| 				test.AssertEquals(t, updatedOrder.Expires.AsTime(), exp)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestFinalizeOrderWithMixedSANAndCN(t *testing.T) {
 | |
| 	_, sa, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ra.orderLifetime = time.Hour
 | |
| 
 | |
| 	// Pick an expiry in the future
 | |
| 	now := ra.clk.Now()
 | |
| 	exp := now.Add(365 * 24 * time.Hour)
 | |
| 
 | |
| 	// Create one finalized authorization for Registration.Id for not-example.com and
 | |
| 	// one finalized authorization for Registration.Id for www.not-example.org
 | |
| 	authzIDA := createFinalizedAuthorization(t, sa, "not-example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 	authzIDB := createFinalizedAuthorization(t, sa, "www.not-example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 
 | |
| 	// Create a new order to finalize with names in SAN and CN
 | |
| 	mixedOrder, err := sa.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:   Registration.Id,
 | |
| 			Expires:          timestamppb.New(exp),
 | |
| 			DnsNames:         []string{"not-example.com", "www.not-example.com"},
 | |
| 			V2Authorizations: []int64{authzIDA, authzIDB},
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order with finalized authz IDs")
 | |
| 	testKey, err := rsa.GenerateKey(rand.Reader, 2048)
 | |
| 	test.AssertNotError(t, err, "error generating test key")
 | |
| 	mixedCSR, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		Subject:            pkix.Name{CommonName: "not-example.com"},
 | |
| 		DNSNames:           []string{"www.not-example.com"},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Could not create mixed CSR")
 | |
| 
 | |
| 	template := &x509.Certificate{
 | |
| 		SerialNumber:          big.NewInt(12),
 | |
| 		Subject:               pkix.Name{CommonName: "not-example.com"},
 | |
| 		DNSNames:              []string{"www.not-example.com", "not-example.com"},
 | |
| 		NotBefore:             time.Now(),
 | |
| 		BasicConstraintsValid: true,
 | |
| 		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
 | |
| 	}
 | |
| 	cert, err := x509.CreateCertificate(rand.Reader, template, template, testKey.Public(), testKey)
 | |
| 	test.AssertNotError(t, err, "Failed to create mixed cert")
 | |
| 
 | |
| 	ra.CA = &mocks.MockCA{
 | |
| 		PEM: pem.EncodeToMemory(&pem.Block{
 | |
| 			Bytes: cert,
 | |
| 		}),
 | |
| 	}
 | |
| 
 | |
| 	_, result := ra.FinalizeOrder(context.Background(), &rapb.FinalizeOrderRequest{Order: mixedOrder, Csr: mixedCSR})
 | |
| 	test.AssertNotError(t, result, "FinalizeOrder failed")
 | |
| 	// Check that the order now has a serial for the issued certificate
 | |
| 	updatedOrder, err := sa.GetOrder(
 | |
| 		context.Background(),
 | |
| 		&sapb.OrderRequest{Id: mixedOrder.Id})
 | |
| 	test.AssertNotError(t, err, "Error getting order to check serial")
 | |
| 	test.AssertNotEquals(t, updatedOrder.CertificateSerial, "")
 | |
| 	test.AssertEquals(t, updatedOrder.Status, "valid")
 | |
| }
 | |
| 
 | |
| func TestFinalizeOrderWildcard(t *testing.T) {
 | |
| 	_, sa, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Pick an expiry in the future
 | |
| 	now := ra.clk.Now()
 | |
| 	exp := now.Add(365 * 24 * time.Hour)
 | |
| 
 | |
| 	testKey, err := rsa.GenerateKey(rand.Reader, 2048)
 | |
| 	test.AssertNotError(t, err, "Error creating test RSA key")
 | |
| 	wildcardCSR, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		DNSNames:           []string{"*.zombo.com"},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Error creating CSR with wildcard DNS name")
 | |
| 
 | |
| 	template := &x509.Certificate{
 | |
| 		SerialNumber:          big.NewInt(1337),
 | |
| 		NotBefore:             time.Now(),
 | |
| 		NotAfter:              time.Now().AddDate(0, 0, 1),
 | |
| 		KeyUsage:              x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
 | |
| 		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
 | |
| 		BasicConstraintsValid: true,
 | |
| 		Subject:               pkix.Name{CommonName: "*.zombo.com"},
 | |
| 		DNSNames:              []string{"*.zombo.com"},
 | |
| 	}
 | |
| 
 | |
| 	certBytes, err := x509.CreateCertificate(rand.Reader, template, template, testKey.Public(), testKey)
 | |
| 	test.AssertNotError(t, err, "Error creating test certificate")
 | |
| 
 | |
| 	certPEM := pem.EncodeToMemory(&pem.Block{
 | |
| 		Type:  "CERTIFICATE",
 | |
| 		Bytes: certBytes,
 | |
| 	})
 | |
| 
 | |
| 	// Set up a mock CA capable of giving back a cert for the wildcardCSR above
 | |
| 	ca := &mocks.MockCA{
 | |
| 		PEM: certPEM,
 | |
| 	}
 | |
| 	ra.CA = ca
 | |
| 
 | |
| 	// Create a new order for a wildcard domain
 | |
| 	orderNames := []string{"*.zombo.com"}
 | |
| 	wildcardOrderRequest := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       orderNames,
 | |
| 	}
 | |
| 	order, err := ra.NewOrder(context.Background(), wildcardOrderRequest)
 | |
| 	test.AssertNotError(t, err, "NewOrder failed for wildcard domain order")
 | |
| 
 | |
| 	// Create one standard finalized authorization for Registration.Id for zombo.com
 | |
| 	_ = createFinalizedAuthorization(t, sa, "zombo.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 
 | |
| 	// Finalizing the order should *not* work since the existing validated authz
 | |
| 	// is not a special DNS-01-Wildcard challenge authz, so the order will be
 | |
| 	// "pending" not "ready".
 | |
| 	finalizeReq := &rapb.FinalizeOrderRequest{
 | |
| 		Order: order,
 | |
| 		Csr:   wildcardCSR,
 | |
| 	}
 | |
| 	_, err = ra.FinalizeOrder(context.Background(), finalizeReq)
 | |
| 	test.AssertError(t, err, "FinalizeOrder did not fail for unauthorized "+
 | |
| 		"wildcard order")
 | |
| 	test.AssertEquals(t, err.Error(),
 | |
| 		`Order's status ("pending") is not acceptable for finalization`)
 | |
| 
 | |
| 	// Creating another order for the wildcard name
 | |
| 	validOrder, err := ra.NewOrder(context.Background(), wildcardOrderRequest)
 | |
| 	test.AssertNotError(t, err, "NewOrder failed for wildcard domain order")
 | |
| 	test.AssertEquals(t, numAuthorizations(validOrder), 1)
 | |
| 	// We expect to be able to get the authorization by ID
 | |
| 	_, err = sa.GetAuthorization2(ctx, &sapb.AuthorizationID2{Id: validOrder.V2Authorizations[0]})
 | |
| 	test.AssertNotError(t, err, "sa.GetAuthorization2 failed")
 | |
| 
 | |
| 	// Finalize the authorization with the challenge validated
 | |
| 	expires := now.Add(time.Hour * 24 * 7)
 | |
| 	_, err = sa.FinalizeAuthorization2(ctx, &sapb.FinalizeAuthorizationRequest{
 | |
| 		Id:          validOrder.V2Authorizations[0],
 | |
| 		Status:      string(core.StatusValid),
 | |
| 		Expires:     timestamppb.New(expires),
 | |
| 		Attempted:   string(core.ChallengeTypeDNS01),
 | |
| 		AttemptedAt: timestamppb.New(now),
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "sa.FinalizeAuthorization2 failed")
 | |
| 
 | |
| 	// Refresh the order so the SA sets its status
 | |
| 	validOrder, err = sa.GetOrder(ctx, &sapb.OrderRequest{
 | |
| 		Id: validOrder.Id,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not refresh valid order from SA")
 | |
| 
 | |
| 	// Now it should be possible to finalize the order
 | |
| 	finalizeReq = &rapb.FinalizeOrderRequest{
 | |
| 		Order: validOrder,
 | |
| 		Csr:   wildcardCSR,
 | |
| 	}
 | |
| 	_, err = ra.FinalizeOrder(context.Background(), finalizeReq)
 | |
| 	test.AssertNotError(t, err, "FinalizeOrder failed for authorized "+
 | |
| 		"wildcard order")
 | |
| }
 | |
| 
 | |
| func TestFinalizeOrderDisabledChallenge(t *testing.T) {
 | |
| 	_, sa, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Create a random domain
 | |
| 	var bytes [3]byte
 | |
| 	_, err := rand.Read(bytes[:])
 | |
| 	test.AssertNotError(t, err, "creating test domain name")
 | |
| 	domain := fmt.Sprintf("%x.example.com", bytes[:])
 | |
| 
 | |
| 	// Create a finalized authorization for that domain
 | |
| 	authzID := createFinalizedAuthorization(
 | |
| 		t, sa, domain, fc.Now().Add(24*time.Hour), core.ChallengeTypeHTTP01, fc.Now().Add(-1*time.Hour))
 | |
| 
 | |
| 	// Create an order that reuses that authorization
 | |
| 	order, err := ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{domain},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "creating test order")
 | |
| 	test.AssertEquals(t, order.V2Authorizations[0], authzID)
 | |
| 
 | |
| 	// Create a CSR for this order
 | |
| 	testKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
 | |
| 	test.AssertNotError(t, err, "generating test key")
 | |
| 	csr, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey: testKey.PublicKey,
 | |
| 		DNSNames:  []string{domain},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Error creating policy forbid CSR")
 | |
| 
 | |
| 	// Replace the Policy Authority with one which has this challenge type disabled
 | |
| 	pa, err := policy.New(map[core.AcmeChallenge]bool{
 | |
| 		core.ChallengeTypeDNS01:     true,
 | |
| 		core.ChallengeTypeTLSALPN01: true,
 | |
| 	}, ra.log)
 | |
| 	test.AssertNotError(t, err, "creating test PA")
 | |
| 	err = pa.LoadHostnamePolicyFile("../test/hostname-policy.yaml")
 | |
| 	test.AssertNotError(t, err, "loading test hostname policy")
 | |
| 	ra.PA = pa
 | |
| 
 | |
| 	// Now finalizing this order should fail
 | |
| 	_, err = ra.FinalizeOrder(context.Background(), &rapb.FinalizeOrderRequest{
 | |
| 		Order: order,
 | |
| 		Csr:   csr,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "finalization should fail")
 | |
| 
 | |
| 	// Unfortunately we can't test for the PA's "which is now disabled" error
 | |
| 	// message directly, because the RA discards it and collects all invalid names
 | |
| 	// into a single more generic error message. But it does at least distinguish
 | |
| 	// between missing, expired, and invalid, so we can test for "invalid".
 | |
| 	test.AssertContains(t, err.Error(), "authorizations for these identifiers not valid")
 | |
| }
 | |
| 
 | |
| func TestIssueCertificateAuditLog(t *testing.T) {
 | |
| 	_, sa, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Set up order and authz expiries
 | |
| 	ra.orderLifetime = 24 * time.Hour
 | |
| 	exp := ra.clk.Now().Add(24 * time.Hour)
 | |
| 
 | |
| 	// Make some valid authorizations for some names using different challenge types
 | |
| 	names := []string{"not-example.com", "www.not-example.com", "still.not-example.com", "definitely.not-example.com"}
 | |
| 	challs := []core.AcmeChallenge{core.ChallengeTypeHTTP01, core.ChallengeTypeDNS01, core.ChallengeTypeHTTP01, core.ChallengeTypeDNS01}
 | |
| 	var authzIDs []int64
 | |
| 	for i, name := range names {
 | |
| 		authzIDs = append(authzIDs, createFinalizedAuthorization(t, sa, name, exp, challs[i], ra.clk.Now()))
 | |
| 	}
 | |
| 
 | |
| 	// Create a pending order for all of the names
 | |
| 	order, err := sa.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:   Registration.Id,
 | |
| 			Expires:          timestamppb.New(exp),
 | |
| 			DnsNames:         names,
 | |
| 			V2Authorizations: authzIDs,
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order with finalized authz IDs")
 | |
| 
 | |
| 	// Generate a CSR covering the order names with a random RSA key
 | |
| 	testKey, err := rsa.GenerateKey(rand.Reader, 2048)
 | |
| 	test.AssertNotError(t, err, "error generating test key")
 | |
| 	csr, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		Subject:            pkix.Name{CommonName: "not-example.com"},
 | |
| 		DNSNames:           names,
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Could not create test order CSR")
 | |
| 
 | |
| 	// Create a mock certificate for the fake CA to return
 | |
| 	template := &x509.Certificate{
 | |
| 		SerialNumber: big.NewInt(12),
 | |
| 		Subject: pkix.Name{
 | |
| 			CommonName: "not-example.com",
 | |
| 		},
 | |
| 		DNSNames:              names,
 | |
| 		NotBefore:             time.Now(),
 | |
| 		NotAfter:              time.Now().AddDate(0, 0, 1),
 | |
| 		BasicConstraintsValid: true,
 | |
| 		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
 | |
| 	}
 | |
| 	cert, err := x509.CreateCertificate(rand.Reader, template, template, testKey.Public(), testKey)
 | |
| 	test.AssertNotError(t, err, "Failed to create mock cert for test CA")
 | |
| 
 | |
| 	// Set up the RA's CA with a mock that returns the cert from above
 | |
| 	ra.CA = &mocks.MockCA{
 | |
| 		PEM: pem.EncodeToMemory(&pem.Block{
 | |
| 			Bytes: cert,
 | |
| 		}),
 | |
| 	}
 | |
| 
 | |
| 	// The mock cert needs to be parsed to get its notbefore/notafter dates
 | |
| 	parsedCerts, err := x509.ParseCertificates(cert)
 | |
| 	test.AssertNotError(t, err, "Failed to parse mock cert DER bytes")
 | |
| 	test.AssertEquals(t, len(parsedCerts), 1)
 | |
| 	parsedCert := parsedCerts[0]
 | |
| 
 | |
| 	// Cast the RA's mock log so we can ensure its cleared and can access the
 | |
| 	// matched log lines
 | |
| 	mockLog := ra.log.(*blog.Mock)
 | |
| 	mockLog.Clear()
 | |
| 
 | |
| 	// Finalize the order with the CSR
 | |
| 	order.Status = string(core.StatusReady)
 | |
| 	_, err = ra.FinalizeOrder(context.Background(), &rapb.FinalizeOrderRequest{
 | |
| 		Order: order,
 | |
| 		Csr:   csr,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Error finalizing test order")
 | |
| 
 | |
| 	// Get the logged lines from the audit logger
 | |
| 	loglines := mockLog.GetAllMatching("Certificate request - successful JSON=")
 | |
| 
 | |
| 	// There should be exactly 1 matching log line
 | |
| 	test.AssertEquals(t, len(loglines), 1)
 | |
| 	// Strip away the stuff before 'JSON='
 | |
| 	jsonContent := strings.TrimPrefix(loglines[0], "INFO: [AUDIT] Certificate request - successful JSON=")
 | |
| 
 | |
| 	// Unmarshal the JSON into a certificate request event object
 | |
| 	var event certificateRequestEvent
 | |
| 	err = json.Unmarshal([]byte(jsonContent), &event)
 | |
| 	// The JSON should unmarshal without error
 | |
| 	test.AssertNotError(t, err, "Error unmarshalling logged JSON issuance event")
 | |
| 	// The event should have no error
 | |
| 	test.AssertEquals(t, event.Error, "")
 | |
| 	// The event requester should be the expected reg ID
 | |
| 	test.AssertEquals(t, event.Requester, Registration.Id)
 | |
| 	// The event order ID should be the expected order ID
 | |
| 	test.AssertEquals(t, event.OrderID, order.Id)
 | |
| 	// The event serial number should be the expected serial number
 | |
| 	test.AssertEquals(t, event.SerialNumber, core.SerialToString(template.SerialNumber))
 | |
| 	// The event verified fields should be the expected value
 | |
| 	test.AssertDeepEquals(t, event.VerifiedFields, []string{"subject.commonName", "subjectAltName"})
 | |
| 	// The event CommonName should match the expected common name
 | |
| 	test.AssertEquals(t, event.CommonName, "not-example.com")
 | |
| 	// The event names should match the order names
 | |
| 	test.AssertDeepEquals(t, core.UniqueLowerNames(event.Names), core.UniqueLowerNames(order.DnsNames))
 | |
| 	// The event's NotBefore and NotAfter should match the cert's
 | |
| 	test.AssertEquals(t, event.NotBefore, parsedCert.NotBefore)
 | |
| 	test.AssertEquals(t, event.NotAfter, parsedCert.NotAfter)
 | |
| 
 | |
| 	// There should be one event Authorization entry for each name
 | |
| 	test.AssertEquals(t, len(event.Authorizations), len(names))
 | |
| 
 | |
| 	// Check the authz entry for each name
 | |
| 	for i, name := range names {
 | |
| 		authzEntry := event.Authorizations[name]
 | |
| 		// The authz entry should have the correct authz ID
 | |
| 		test.AssertEquals(t, authzEntry.ID, fmt.Sprintf("%d", authzIDs[i]))
 | |
| 		// The authz entry should have the correct challenge type
 | |
| 		test.AssertEquals(t, authzEntry.ChallengeType, challs[i])
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestIssueCertificateCAACheckLog(t *testing.T) {
 | |
| 	_, sa, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	// Set up order and authz expiries.
 | |
| 	ra.orderLifetime = 24 * time.Hour
 | |
| 	ra.authorizationLifetime = 15 * time.Hour
 | |
| 
 | |
| 	exp := fc.Now().Add(24 * time.Hour)
 | |
| 	recent := fc.Now().Add(-1 * time.Hour)
 | |
| 	older := fc.Now().Add(-8 * time.Hour)
 | |
| 
 | |
| 	// Make some valid authzs for four names. Half of them were validated
 | |
| 	// recently and half were validated in excess of our CAA recheck time.
 | |
| 	names := []string{"not-example.com", "www.not-example.com", "still.not-example.com", "definitely.not-example.com"}
 | |
| 	var authzIDs []int64
 | |
| 	for i, name := range names {
 | |
| 		attemptedAt := older
 | |
| 		if i%2 == 0 {
 | |
| 			attemptedAt = recent
 | |
| 		}
 | |
| 		authzIDs = append(authzIDs, createFinalizedAuthorization(t, sa, name, exp, core.ChallengeTypeHTTP01, attemptedAt))
 | |
| 	}
 | |
| 
 | |
| 	// Create a pending order for all of the names.
 | |
| 	order, err := sa.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:   Registration.Id,
 | |
| 			Expires:          timestamppb.New(exp),
 | |
| 			DnsNames:         names,
 | |
| 			V2Authorizations: authzIDs,
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order with finalized authz IDs")
 | |
| 
 | |
| 	// Generate a CSR covering the order names with a random RSA key.
 | |
| 	testKey, err := rsa.GenerateKey(rand.Reader, 2048)
 | |
| 	test.AssertNotError(t, err, "error generating test key")
 | |
| 	csr, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		Subject:            pkix.Name{CommonName: "not-example.com"},
 | |
| 		DNSNames:           names,
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Could not create test order CSR")
 | |
| 
 | |
| 	// Create a mock certificate for the fake CA to return.
 | |
| 	template := &x509.Certificate{
 | |
| 		SerialNumber: big.NewInt(12),
 | |
| 		Subject: pkix.Name{
 | |
| 			CommonName: "not-example.com",
 | |
| 		},
 | |
| 		DNSNames:              names,
 | |
| 		NotBefore:             time.Now(),
 | |
| 		NotAfter:              time.Now().AddDate(0, 0, 1),
 | |
| 		BasicConstraintsValid: true,
 | |
| 		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
 | |
| 	}
 | |
| 	cert, err := x509.CreateCertificate(rand.Reader, template, template, testKey.Public(), testKey)
 | |
| 	test.AssertNotError(t, err, "Failed to create mock cert for test CA")
 | |
| 
 | |
| 	// Set up the RA's CA with a mock that returns the cert from above.
 | |
| 	ra.CA = &mocks.MockCA{
 | |
| 		PEM: pem.EncodeToMemory(&pem.Block{
 | |
| 			Bytes: cert,
 | |
| 		}),
 | |
| 	}
 | |
| 
 | |
| 	// Cast the RA's mock log so we can ensure its cleared and can access the
 | |
| 	// matched log lines.
 | |
| 	mockLog := ra.log.(*blog.Mock)
 | |
| 	mockLog.Clear()
 | |
| 
 | |
| 	// Finalize the order with the CSR.
 | |
| 	order.Status = string(core.StatusReady)
 | |
| 	_, err = ra.FinalizeOrder(context.Background(), &rapb.FinalizeOrderRequest{
 | |
| 		Order: order,
 | |
| 		Csr:   csr,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Error finalizing test order")
 | |
| 
 | |
| 	// Get the logged lines from the mock logger.
 | |
| 	loglines := mockLog.GetAllMatching("FinalizationCaaCheck JSON=")
 | |
| 	// There should be exactly 1 matching log line.
 | |
| 	test.AssertEquals(t, len(loglines), 1)
 | |
| 
 | |
| 	// Strip away the stuff before 'JSON='.
 | |
| 	jsonContent := strings.TrimPrefix(loglines[0], "INFO: FinalizationCaaCheck JSON=")
 | |
| 
 | |
| 	// Unmarshal the JSON into an event object.
 | |
| 	var event finalizationCAACheckEvent
 | |
| 	err = json.Unmarshal([]byte(jsonContent), &event)
 | |
| 	// The JSON should unmarshal without error.
 | |
| 	test.AssertNotError(t, err, "Error unmarshalling logged JSON issuance event.")
 | |
| 	// The event requester should be the expected registration ID.
 | |
| 	test.AssertEquals(t, event.Requester, Registration.Id)
 | |
| 	// The event should have the expected number of Authzs where CAA was reused.
 | |
| 	test.AssertEquals(t, event.Reused, 2)
 | |
| 	// The event should have the expected number of Authzs where CAA was
 | |
| 	// rechecked.
 | |
| 	test.AssertEquals(t, event.Rechecked, 2)
 | |
| }
 | |
| 
 | |
| // TestUpdateMissingAuthorization tests the race condition where a challenge is
 | |
| // updated to valid concurrently with another attempt to have the challenge
 | |
| // updated. Previously this would return a `berrors.InternalServer` error when
 | |
| // the row was found missing from `pendingAuthorizations` by the 2nd update
 | |
| // since the 1st had already deleted it. We accept this may happen and now test
 | |
| // for a `berrors.NotFound` error return.
 | |
| //
 | |
| // See https://github.com/letsencrypt/boulder/issues/3201
 | |
| func TestUpdateMissingAuthorization(t *testing.T) {
 | |
| 	_, sa, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	ctx := context.Background()
 | |
| 
 | |
| 	authzPB := createPendingAuthorization(t, sa, Identifier, fc.Now().Add(12*time.Hour))
 | |
| 	authz, err := bgrpc.PBToAuthz(authzPB)
 | |
| 	test.AssertNotError(t, err, "failed to deserialize authz")
 | |
| 
 | |
| 	// Twiddle the authz to pretend its been validated by the VA
 | |
| 	authz.Challenges[0].Status = "valid"
 | |
| 	err = ra.recordValidation(ctx, authz.ID, authz.Expires, &authz.Challenges[0])
 | |
| 	test.AssertNotError(t, err, "ra.recordValidation failed")
 | |
| 
 | |
| 	// Try to record the same validation a second time.
 | |
| 	err = ra.recordValidation(ctx, authz.ID, authz.Expires, &authz.Challenges[0])
 | |
| 	test.AssertError(t, err, "ra.recordValidation didn't fail")
 | |
| 	test.AssertErrorIs(t, err, berrors.NotFound)
 | |
| }
 | |
| 
 | |
| func TestPerformValidationBadChallengeType(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 	pa, err := policy.New(map[core.AcmeChallenge]bool{}, blog.NewMock())
 | |
| 	test.AssertNotError(t, err, "Couldn't create PA")
 | |
| 	ra.PA = pa
 | |
| 
 | |
| 	exp := fc.Now().Add(10 * time.Hour)
 | |
| 	authz := core.Authorization{
 | |
| 		ID:             "1337",
 | |
| 		Identifier:     identifier.NewDNS("not-example.com"),
 | |
| 		RegistrationID: 1,
 | |
| 		Status:         "valid",
 | |
| 		Challenges: []core.Challenge{
 | |
| 			{
 | |
| 				Status: core.StatusValid,
 | |
| 				Type:   core.ChallengeTypeHTTP01,
 | |
| 				Token:  "exampleToken",
 | |
| 			},
 | |
| 		},
 | |
| 		Expires: &exp,
 | |
| 	}
 | |
| 	authzPB, err := bgrpc.AuthzToPB(authz)
 | |
| 	test.AssertNotError(t, err, "AuthzToPB failed")
 | |
| 
 | |
| 	_, err = ra.PerformValidation(context.Background(), &rapb.PerformValidationRequest{
 | |
| 		Authz:          authzPB,
 | |
| 		ChallengeIndex: 0,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "ra.PerformValidation allowed a update to a authorization")
 | |
| 	test.AssertEquals(t, err.Error(), "challenge type \"http-01\" no longer allowed")
 | |
| }
 | |
| 
 | |
| type timeoutPub struct {
 | |
| }
 | |
| 
 | |
| func (mp *timeoutPub) SubmitToSingleCTWithResult(_ context.Context, _ *pubpb.Request, _ ...grpc.CallOption) (*pubpb.Result, error) {
 | |
| 	return nil, context.DeadlineExceeded
 | |
| }
 | |
| 
 | |
| func TestCTPolicyMeasurements(t *testing.T) {
 | |
| 	_, ssa, ra, _, cleanup := initAuthorities(t)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	ra.ctpolicy = ctpolicy.New(&timeoutPub{}, loglist.List{
 | |
| 		"OperA": {
 | |
| 			"LogA1": {Url: "UrlA1", Key: "KeyA1"},
 | |
| 		},
 | |
| 		"OperB": {
 | |
| 			"LogB1": {Url: "UrlB1", Key: "KeyB1"},
 | |
| 		},
 | |
| 	}, nil, nil, 0, log, metrics.NoopRegisterer)
 | |
| 
 | |
| 	// Create valid authorizations for not-example.com and www.not-example.com
 | |
| 	exp := ra.clk.Now().Add(365 * 24 * time.Hour)
 | |
| 	authzIDA := createFinalizedAuthorization(t, ssa, "not-example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 	authzIDB := createFinalizedAuthorization(t, ssa, "www.not-example.com", exp, core.ChallengeTypeHTTP01, ra.clk.Now())
 | |
| 
 | |
| 	order, err := ra.SA.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:   Registration.Id,
 | |
| 			Expires:          timestamppb.New(exp),
 | |
| 			DnsNames:         []string{"not-example.com", "www.not-example.com"},
 | |
| 			V2Authorizations: []int64{authzIDA, authzIDB},
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "error generating test order")
 | |
| 
 | |
| 	testKey, err := rsa.GenerateKey(rand.Reader, 2048)
 | |
| 	test.AssertNotError(t, err, "error generating test key")
 | |
| 
 | |
| 	csr, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.Public(),
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		DNSNames:           []string{"not-example.com", "www.not-example.com"},
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "error generating test CSR")
 | |
| 
 | |
| 	_, err = ra.FinalizeOrder(context.Background(), &rapb.FinalizeOrderRequest{
 | |
| 		Order: order,
 | |
| 		Csr:   csr,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "FinalizeOrder should have failed when SCTs timed out")
 | |
| 	test.AssertContains(t, err.Error(), "getting SCTs")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.ctpolicyResults, prometheus.Labels{"result": "failure"}, 1)
 | |
| }
 | |
| 
 | |
| func TestWildcardOverlap(t *testing.T) {
 | |
| 	err := wildcardOverlap([]string{
 | |
| 		"*.example.com",
 | |
| 		"*.example.net",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error %q, expected none", err)
 | |
| 	}
 | |
| 	err = wildcardOverlap([]string{
 | |
| 		"*.example.com",
 | |
| 		"*.example.net",
 | |
| 		"www.example.com",
 | |
| 	})
 | |
| 	if err == nil {
 | |
| 		t.Errorf("Got no error, expected one")
 | |
| 	}
 | |
| 	test.AssertErrorIs(t, err, berrors.Malformed)
 | |
| 
 | |
| 	err = wildcardOverlap([]string{
 | |
| 		"*.foo.example.com",
 | |
| 		"*.example.net",
 | |
| 		"www.example.com",
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error %q, expected none", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // mockCAFailPrecert is a mock CA that always returns an error from `IssuePrecertificate`
 | |
| type mockCAFailPrecert struct {
 | |
| 	mocks.MockCA
 | |
| 	err error
 | |
| }
 | |
| 
 | |
| func (ca *mockCAFailPrecert) IssuePrecertificate(
 | |
| 	context.Context,
 | |
| 	*capb.IssueCertificateRequest,
 | |
| 	...grpc.CallOption) (*capb.IssuePrecertificateResponse, error) {
 | |
| 	return nil, ca.err
 | |
| }
 | |
| 
 | |
| // mockCAFailCertForPrecert is a mock CA that always returns an error from
 | |
| // `IssueCertificateForPrecertificate`
 | |
| type mockCAFailCertForPrecert struct {
 | |
| 	mocks.MockCA
 | |
| 	err error
 | |
| }
 | |
| 
 | |
| // IssuePrecertificate needs to be mocked for mockCAFailCertForPrecert's `IssueCertificateForPrecertificate` to get called.
 | |
| func (ca *mockCAFailCertForPrecert) IssuePrecertificate(
 | |
| 	context.Context,
 | |
| 	*capb.IssueCertificateRequest,
 | |
| 	...grpc.CallOption) (*capb.IssuePrecertificateResponse, error) {
 | |
| 	k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	tmpl := &ctx509.Certificate{
 | |
| 		SerialNumber: big.NewInt(1),
 | |
| 		ExtraExtensions: []ctpkix.Extension{
 | |
| 			{
 | |
| 				Id:       ctx509.OIDExtensionCTPoison,
 | |
| 				Critical: true,
 | |
| 				Value:    ctasn1.NullBytes,
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	precert, err := ctx509.CreateCertificate(rand.Reader, tmpl, tmpl, k.Public(), k)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return &capb.IssuePrecertificateResponse{
 | |
| 		DER: precert,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func (ca *mockCAFailCertForPrecert) IssueCertificateForPrecertificate(
 | |
| 	context.Context,
 | |
| 	*capb.IssueCertificateForPrecertificateRequest,
 | |
| 	...grpc.CallOption) (*corepb.Certificate, error) {
 | |
| 	return &corepb.Certificate{}, ca.err
 | |
| }
 | |
| 
 | |
| // TestIssueCertificateInnerErrs tests that errors from the CA caught during
 | |
| // `ra.issueCertificateInner` are propagated correctly, with the part of the
 | |
| // issuance process that failed prefixed on the error message.
 | |
| func TestIssueCertificateInnerErrs(t *testing.T) {
 | |
| 	_, sa, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.orderLifetime = 24 * time.Hour
 | |
| 	exp := ra.clk.Now().Add(24 * time.Hour)
 | |
| 
 | |
| 	// Make some valid authorizations for some names
 | |
| 	names := []string{"not-example.com", "www.not-example.com", "still.not-example.com", "definitely.not-example.com"}
 | |
| 	var authzIDs []int64
 | |
| 	for _, name := range names {
 | |
| 		authzIDs = append(authzIDs, createFinalizedAuthorization(t, sa, name, exp, core.ChallengeTypeHTTP01, ra.clk.Now()))
 | |
| 	}
 | |
| 
 | |
| 	// Create a pending order for all of the names
 | |
| 	order, err := sa.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:   Registration.Id,
 | |
| 			Expires:          timestamppb.New(exp),
 | |
| 			DnsNames:         names,
 | |
| 			V2Authorizations: authzIDs,
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order with finalized authz IDs")
 | |
| 
 | |
| 	// Generate a CSR covering the order names with a random RSA key
 | |
| 	testKey, err := rsa.GenerateKey(rand.Reader, 2048)
 | |
| 	test.AssertNotError(t, err, "error generating test key")
 | |
| 	csr, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{
 | |
| 		PublicKey:          testKey.PublicKey,
 | |
| 		SignatureAlgorithm: x509.SHA256WithRSA,
 | |
| 		Subject:            pkix.Name{CommonName: "not-example.com"},
 | |
| 		DNSNames:           names,
 | |
| 	}, testKey)
 | |
| 	test.AssertNotError(t, err, "Could not create test order CSR")
 | |
| 
 | |
| 	csrOb, err := x509.ParseCertificateRequest(csr)
 | |
| 	test.AssertNotError(t, err, "Error pasring generated CSR")
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		Name         string
 | |
| 		Mock         capb.CertificateAuthorityClient
 | |
| 		ExpectedErr  error
 | |
| 		ExpectedProb *berrors.BoulderError
 | |
| 	}{
 | |
| 		{
 | |
| 			Name: "vanilla error during IssuePrecertificate",
 | |
| 			Mock: &mockCAFailPrecert{
 | |
| 				err: fmt.Errorf("bad bad not good"),
 | |
| 			},
 | |
| 			ExpectedErr: fmt.Errorf("issuing precertificate: bad bad not good"),
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "malformed problem during IssuePrecertificate",
 | |
| 			Mock: &mockCAFailPrecert{
 | |
| 				err: berrors.MalformedError("detected 1x whack attack"),
 | |
| 			},
 | |
| 			ExpectedProb: &berrors.BoulderError{
 | |
| 				Detail: "issuing precertificate: detected 1x whack attack",
 | |
| 				Type:   berrors.Malformed,
 | |
| 			},
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "vanilla error during IssueCertificateForPrecertificate",
 | |
| 			Mock: &mockCAFailCertForPrecert{
 | |
| 				err: fmt.Errorf("aaaaaaaaaaaaaaaaaaaa!!"),
 | |
| 			},
 | |
| 			ExpectedErr: fmt.Errorf("issuing certificate for precertificate: aaaaaaaaaaaaaaaaaaaa!!"),
 | |
| 		},
 | |
| 		{
 | |
| 			Name: "malformed problem during IssueCertificateForPrecertificate",
 | |
| 			Mock: &mockCAFailCertForPrecert{
 | |
| 				err: berrors.MalformedError("provided DER is DERanged"),
 | |
| 			},
 | |
| 			ExpectedProb: &berrors.BoulderError{
 | |
| 				Detail: "issuing certificate for precertificate: provided DER is DERanged",
 | |
| 				Type:   berrors.Malformed,
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, tc := range testCases {
 | |
| 		t.Run(tc.Name, func(t *testing.T) {
 | |
| 			// Mock the CA
 | |
| 			ra.CA = tc.Mock
 | |
| 			// Attempt issuance
 | |
| 			_, _, err = ra.issueCertificateInner(ctx, csrOb, order.CertificateProfileName, accountID(Registration.Id), orderID(order.Id))
 | |
| 			// We expect all of the testcases to fail because all use mocked CAs that deliberately error
 | |
| 			test.AssertError(t, err, "issueCertificateInner with failing mock CA did not fail")
 | |
| 			// If there is an expected `error` then match the error message
 | |
| 			if tc.ExpectedErr != nil {
 | |
| 				test.AssertEquals(t, err.Error(), tc.ExpectedErr.Error())
 | |
| 			} else if tc.ExpectedProb != nil {
 | |
| 				// If there is an expected `berrors.BoulderError` then we expect the
 | |
| 				// `issueCertificateInner` error to be a `berrors.BoulderError`
 | |
| 				var berr *berrors.BoulderError
 | |
| 				test.AssertErrorWraps(t, err, &berr)
 | |
| 				// Match the expected berror Type and Detail to the observed
 | |
| 				test.AssertErrorIs(t, berr, tc.ExpectedProb.Type)
 | |
| 				test.AssertEquals(t, berr.Detail, tc.ExpectedProb.Detail)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type MockCARecordingProfile struct {
 | |
| 	inner       *mocks.MockCA
 | |
| 	profileName string
 | |
| 	profileHash []byte
 | |
| }
 | |
| 
 | |
| func (ca *MockCARecordingProfile) IssuePrecertificate(ctx context.Context, req *capb.IssueCertificateRequest, _ ...grpc.CallOption) (*capb.IssuePrecertificateResponse, error) {
 | |
| 	ca.profileName = req.CertProfileName
 | |
| 	return ca.inner.IssuePrecertificate(ctx, req)
 | |
| }
 | |
| 
 | |
| func (ca *MockCARecordingProfile) IssueCertificateForPrecertificate(ctx context.Context, req *capb.IssueCertificateForPrecertificateRequest, _ ...grpc.CallOption) (*corepb.Certificate, error) {
 | |
| 	ca.profileHash = req.CertProfileHash
 | |
| 	return ca.inner.IssueCertificateForPrecertificate(ctx, req)
 | |
| }
 | |
| 
 | |
| type mockSAWithFinalize struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| }
 | |
| 
 | |
| func (sa *mockSAWithFinalize) FinalizeOrder(ctx context.Context, req *sapb.FinalizeOrderRequest, _ ...grpc.CallOption) (*emptypb.Empty, error) {
 | |
| 	return &emptypb.Empty{}, nil
 | |
| }
 | |
| 
 | |
| func (sa *mockSAWithFinalize) FQDNSetExists(ctx context.Context, in *sapb.FQDNSetExistsRequest, opts ...grpc.CallOption) (*sapb.Exists, error) {
 | |
| 	return &sapb.Exists{}, nil
 | |
| }
 | |
| 
 | |
| func TestIssueCertificateInnerWithProfile(t *testing.T) {
 | |
| 	_, _, ra, fc, cleanup := initAuthorities(t)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	// Generate a reasonable-looking CSR and cert to pass the matchesCSR check.
 | |
| 	testKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
 | |
| 	test.AssertNotError(t, err, "generating test key")
 | |
| 	csrDER, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{DNSNames: []string{"example.com"}}, testKey)
 | |
| 	test.AssertNotError(t, err, "creating test csr")
 | |
| 	csr, err := x509.ParseCertificateRequest(csrDER)
 | |
| 	test.AssertNotError(t, err, "parsing test csr")
 | |
| 	certDER, err := x509.CreateCertificate(rand.Reader, &x509.Certificate{
 | |
| 		SerialNumber:          big.NewInt(1),
 | |
| 		DNSNames:              []string{"example.com"},
 | |
| 		NotBefore:             fc.Now(),
 | |
| 		BasicConstraintsValid: true,
 | |
| 		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
 | |
| 	}, &x509.Certificate{}, testKey.Public(), testKey)
 | |
| 	test.AssertNotError(t, err, "creating test cert")
 | |
| 	certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
 | |
| 
 | |
| 	// Use a mock CA that will record the profile name and profile hash included
 | |
| 	// in the RA's request messages. Populate it with the cert generated above.
 | |
| 	mockCA := MockCARecordingProfile{inner: &mocks.MockCA{PEM: certPEM}}
 | |
| 	ra.CA = &mockCA
 | |
| 
 | |
| 	ra.SA = &mockSAWithFinalize{}
 | |
| 
 | |
| 	// Call issueCertificateInner with the CSR generated above and the profile
 | |
| 	// name "default", which will cause the mockCA to return a specific hash.
 | |
| 	_, cpId, err := ra.issueCertificateInner(context.Background(), csr, "default", 1, 1)
 | |
| 	test.AssertNotError(t, err, "issuing cert with profile name")
 | |
| 	test.AssertEquals(t, mockCA.profileName, cpId.name)
 | |
| 	test.AssertByteEquals(t, mockCA.profileHash, cpId.hash)
 | |
| }
 | |
| 
 | |
| func TestIssueCertificateOuter(t *testing.T) {
 | |
| 	_, sa, ra, fc, cleanup := initAuthorities(t)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	ra.orderLifetime = 24 * time.Hour
 | |
| 	exp := ra.clk.Now().Add(24 * time.Hour)
 | |
| 
 | |
| 	// Make some valid authorizations for some names
 | |
| 	names := []string{"not-example.com", "www.not-example.com", "still.not-example.com", "definitely.not-example.com"}
 | |
| 	var authzIDs []int64
 | |
| 	for _, name := range names {
 | |
| 		authzIDs = append(authzIDs, createFinalizedAuthorization(t, sa, name, exp, core.ChallengeTypeHTTP01, ra.clk.Now()))
 | |
| 	}
 | |
| 
 | |
| 	// Create a pending order for all of the names
 | |
| 	order, err := sa.NewOrderAndAuthzs(context.Background(), &sapb.NewOrderAndAuthzsRequest{
 | |
| 		NewOrder: &sapb.NewOrderRequest{
 | |
| 			RegistrationID:         Registration.Id,
 | |
| 			Expires:                timestamppb.New(exp),
 | |
| 			DnsNames:               names,
 | |
| 			V2Authorizations:       authzIDs,
 | |
| 			CertificateProfileName: "philsProfile",
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Could not add test order with finalized authz IDs")
 | |
| 
 | |
| 	testKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
 | |
| 	test.AssertNotError(t, err, "generating test key")
 | |
| 	csrDER, err := x509.CreateCertificateRequest(rand.Reader, &x509.CertificateRequest{DNSNames: []string{"example.com"}}, testKey)
 | |
| 	test.AssertNotError(t, err, "creating test csr")
 | |
| 	csr, err := x509.ParseCertificateRequest(csrDER)
 | |
| 	test.AssertNotError(t, err, "parsing test csr")
 | |
| 	certDER, err := x509.CreateCertificate(rand.Reader, &x509.Certificate{
 | |
| 		SerialNumber:          big.NewInt(1),
 | |
| 		DNSNames:              []string{"example.com"},
 | |
| 		NotBefore:             fc.Now(),
 | |
| 		BasicConstraintsValid: true,
 | |
| 		ExtKeyUsage:           []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
 | |
| 	}, &x509.Certificate{}, testKey.Public(), testKey)
 | |
| 	test.AssertNotError(t, err, "creating test cert")
 | |
| 	certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
 | |
| 
 | |
| 	// Use a mock CA that will record the profile name and profile hash included
 | |
| 	// in the RA's request messages. Populate it with the cert generated above.
 | |
| 	mockCA := MockCARecordingProfile{inner: &mocks.MockCA{PEM: certPEM}}
 | |
| 	ra.CA = &mockCA
 | |
| 
 | |
| 	ra.SA = &mockSAWithFinalize{}
 | |
| 
 | |
| 	_, err = ra.issueCertificateOuter(context.Background(), order, csr, certificateRequestEvent{})
 | |
| 	test.AssertNotError(t, err, "Could not issue certificate")
 | |
| 	test.AssertMetricWithLabelsEquals(t, ra.newCertCounter, prometheus.Labels{"profileName": mockCA.profileName, "profileHash": fmt.Sprintf("%x", mockCA.profileHash)}, 1)
 | |
| }
 | |
| 
 | |
| func TestNewOrderMaxNames(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.maxNames = 2
 | |
| 	_, err := ra.NewOrder(context.Background(), &rapb.NewOrderRequest{
 | |
| 		RegistrationID: 1,
 | |
| 		DnsNames: []string{
 | |
| 			"a",
 | |
| 			"b",
 | |
| 			"c",
 | |
| 		},
 | |
| 	})
 | |
| 	test.AssertError(t, err, "NewOrder didn't fail with too many names in request")
 | |
| 	test.AssertEquals(t, err.Error(), "Order cannot contain more than 2 DNS names")
 | |
| 	test.AssertErrorIs(t, err, berrors.Malformed)
 | |
| }
 | |
| 
 | |
| // CSR generated by Go:
 | |
| // * Random public key
 | |
| // * CN = not-example.com
 | |
| // * DNSNames = not-example.com, www.not-example.com
 | |
| var CSRPEM = []byte(`
 | |
| -----BEGIN CERTIFICATE REQUEST-----
 | |
| MIICrjCCAZYCAQAwJzELMAkGA1UEBhMCVVMxGDAWBgNVBAMTD25vdC1leGFtcGxl
 | |
| LmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKT1B7UsonZuLOp7
 | |
| qq2pw+COo0I9ZheuhN9ltu1+bAMWBYUb8KFPNGGp8Ygt6YCLjlnWOche7Fjb5lPj
 | |
| hV6U2BkEt85mdaGTDg6mU3qjk2/cnZeAvJWW5ewYOBGxN/g/KHgdYZ+uhHH/PbGt
 | |
| Wktcv5bRJ9Dxbjxsy7l8SLQ6fd/MF/3z6sBJzIHkcDupDOFdPN/Z0KOw7BOPHAbg
 | |
| ghLJTmiESA1Ljxb8848bENlCz8pVizIu2Ilr4xBPtA5oUfO0FJKbT1T66JZoqwy/
 | |
| drfrlHA7F6c8kYlAmwiOfWHzlWCkE1YuZPJrZQrt4tJ70rrPxV1qEGJDumzgcEbU
 | |
| /aYYiBsCAwEAAaBCMEAGCSqGSIb3DQEJDjEzMDEwLwYDVR0RBCgwJoIPbm90LWV4
 | |
| YW1wbGUuY29tghN3d3cubm90LWV4YW1wbGUuY29tMA0GCSqGSIb3DQEBCwUAA4IB
 | |
| AQBuFo5SHqN1lWmM6rKaOBXFezAdzZyGb9x8+5Zq/eh9pSxpn0MTOmq/u+sDHxsC
 | |
| ywcshUO3P9//9u4ALtNn/jsJmSrElsTvG3SH5owl9muNEiOgf+6/rY/X8Zcnv/e0
 | |
| Ar9r73BcCkjoAOFbr7xiLLYu5EaBQjSj6/m4ujwJTWS2SqobK5VfdpzmDp4wT3eB
 | |
| V4FPLxyxxOLuWLzcBkDdLw/zh922HtR5fqk155Y4pj3WS9NnI/NMHmclrlfY/2P4
 | |
| dJrBVM+qVbPTzM19QplMkiy7FxpDx6toUXDYM4KdKKV0+yX/zw/V0/Gb7K7yIjVB
 | |
| wqjllqgMjN4nvHjiDXFx/kPY
 | |
| -----END CERTIFICATE REQUEST-----
 | |
| `)
 | |
| 
 | |
| var eeCertPEM = []byte(`
 | |
| -----BEGIN CERTIFICATE-----
 | |
| MIIEfTCCAmWgAwIBAgISCr9BRk0C9OOGVke6CAa8F+AXMA0GCSqGSIb3DQEBCwUA
 | |
| MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKDAdUZXN0IENBMRAwDgYDVQQDDAdUZXN0
 | |
| IENBMB4XDTE2MDMyMDE4MTEwMFoXDTE2MDMyMDE5MTEwMFowHjEcMBoGA1UEAxMT
 | |
| d3d3Lm5vdC1leGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
 | |
| ggEBAKT1B7UsonZuLOp7qq2pw+COo0I9ZheuhN9ltu1+bAMWBYUb8KFPNGGp8Ygt
 | |
| 6YCLjlnWOche7Fjb5lPjhV6U2BkEt85mdaGTDg6mU3qjk2/cnZeAvJWW5ewYOBGx
 | |
| N/g/KHgdYZ+uhHH/PbGtWktcv5bRJ9Dxbjxsy7l8SLQ6fd/MF/3z6sBJzIHkcDup
 | |
| DOFdPN/Z0KOw7BOPHAbgghLJTmiESA1Ljxb8848bENlCz8pVizIu2Ilr4xBPtA5o
 | |
| UfO0FJKbT1T66JZoqwy/drfrlHA7F6c8kYlAmwiOfWHzlWCkE1YuZPJrZQrt4tJ7
 | |
| 0rrPxV1qEGJDumzgcEbU/aYYiBsCAwEAAaOBoTCBnjAdBgNVHSUEFjAUBggrBgEF
 | |
| BQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUIEr9ryJ0aJuD
 | |
| CwBsCp7Eun8Hx4AwHwYDVR0jBBgwFoAUmiamd/N/8knrCb1QlhwB4WXCqaswLwYD
 | |
| VR0RBCgwJoIPbm90LWV4YW1wbGUuY29tghN3d3cubm90LWV4YW1wbGUuY29tMA0G
 | |
| CSqGSIb3DQEBCwUAA4ICAQBpGLrCt38Z+knbuE1ALEB3hqUQCAm1OPDW6HR+v2nO
 | |
| f2ERxTwL9Cad++3vONxgB68+6KQeIf5ph48OGnS5DgO13mb2cxLlmM2IJpkbSFtW
 | |
| VeRNFt/WxRJafpbKw2hgQNJ/sxEAsCyA+kVeh1oCxGQyPO7IIXtw5FecWfIiNNwM
 | |
| mVM17uchtvsM5BRePvet9xZxrKOFnn6TQRs8vC4e59Y8h52On+L2Q/ytAa7j3+fb
 | |
| 7OYCe+yWypGeosekamZTMBjHFV3RRxsGdRATSuZkv1uewyUnEPmsy5Ow4doSYZKW
 | |
| QmKjti+vv1YhAhFxPArob0SG3YOiFuKzZ9rSOhUtzSg01ml/kRyOiC7rfO7NRzHq
 | |
| idhPUhu2QBmdJTLLOBQLvKDNDOHqDYwKdIHJ7pup2y0Fvm4T96q5bnrSdmz/QAlB
 | |
| XVw08HWMcjeOeHYiHST3yxYfQivTNm2PlKfUACb7vcrQ6pYhOnVdYgJZm6gkV4Xd
 | |
| K1HKja36snIevv/gSgsE7bGcBYLVCvf16o3IRt9K8CpDoSsWn0iAVcwUP2CyPLm4
 | |
| QsqA1afjTUPKQTAgDKRecDPhrT1+FjtBwdpXetpRiBK0UE5exfnI4nszZ9+BYG1l
 | |
| xGUhoOJp0T++nz6R3TX7Rwk7KmG6xX3vWr/MFu5A3c8fvkqj987Vti5BeBezCXfs
 | |
| rA==
 | |
| -----END CERTIFICATE-----
 | |
| `)
 | |
| 
 | |
| // mockSARevocation is a fake which includes all of the SA methods called in the
 | |
| // course of a revocation. Its behavior can be customized by providing sets of
 | |
| // issued (known) certs, already-revoked certs, and already-blocked keys. It
 | |
| // also updates the sets of revoked certs and blocked keys when certain methods
 | |
| // are called, to allow for more complex test logic.
 | |
| type mockSARevocation struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| 
 | |
| 	known   map[string]*x509.Certificate
 | |
| 	revoked map[string]*corepb.CertificateStatus
 | |
| 	blocked []*sapb.AddBlockedKeyRequest
 | |
| }
 | |
| 
 | |
| func newMockSARevocation(known *x509.Certificate) *mockSARevocation {
 | |
| 	return &mockSARevocation{
 | |
| 		known:   map[string]*x509.Certificate{core.SerialToString(known.SerialNumber): known},
 | |
| 		revoked: make(map[string]*corepb.CertificateStatus),
 | |
| 		blocked: make([]*sapb.AddBlockedKeyRequest, 0),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (msar *mockSARevocation) reset() {
 | |
| 	msar.revoked = make(map[string]*corepb.CertificateStatus)
 | |
| 	msar.blocked = make([]*sapb.AddBlockedKeyRequest, 0)
 | |
| }
 | |
| 
 | |
| func (msar *mockSARevocation) AddBlockedKey(_ context.Context, req *sapb.AddBlockedKeyRequest, _ ...grpc.CallOption) (*emptypb.Empty, error) {
 | |
| 	msar.blocked = append(msar.blocked, req)
 | |
| 	return &emptypb.Empty{}, nil
 | |
| }
 | |
| 
 | |
| func (msar *mockSARevocation) GetSerialMetadata(_ context.Context, req *sapb.Serial, _ ...grpc.CallOption) (*sapb.SerialMetadata, error) {
 | |
| 	if cert, present := msar.known[req.Serial]; present {
 | |
| 		return &sapb.SerialMetadata{
 | |
| 			Serial:         req.Serial,
 | |
| 			RegistrationID: 1,
 | |
| 			Created:        timestamppb.New(cert.NotBefore),
 | |
| 			Expires:        timestamppb.New(cert.NotAfter),
 | |
| 		}, nil
 | |
| 	}
 | |
| 	return nil, berrors.UnknownSerialError()
 | |
| }
 | |
| 
 | |
| func (msar *mockSARevocation) GetLintPrecertificate(_ context.Context, req *sapb.Serial, _ ...grpc.CallOption) (*corepb.Certificate, error) {
 | |
| 	if cert, present := msar.known[req.Serial]; present {
 | |
| 		return &corepb.Certificate{Der: cert.Raw}, nil
 | |
| 	}
 | |
| 	return nil, berrors.UnknownSerialError()
 | |
| }
 | |
| 
 | |
| func (msar *mockSARevocation) GetCertificateStatus(_ context.Context, req *sapb.Serial, _ ...grpc.CallOption) (*corepb.CertificateStatus, error) {
 | |
| 	if status, present := msar.revoked[req.Serial]; present {
 | |
| 		return status, nil
 | |
| 	}
 | |
| 	if cert, present := msar.known[req.Serial]; present {
 | |
| 		return &corepb.CertificateStatus{
 | |
| 			Serial:   core.SerialToString(cert.SerialNumber),
 | |
| 			IssuerID: int64(issuance.IssuerNameID(cert)),
 | |
| 		}, nil
 | |
| 	}
 | |
| 	return nil, berrors.UnknownSerialError()
 | |
| }
 | |
| 
 | |
| func (msar *mockSARevocation) RevokeCertificate(_ context.Context, req *sapb.RevokeCertificateRequest, _ ...grpc.CallOption) (*emptypb.Empty, error) {
 | |
| 	if _, present := msar.revoked[req.Serial]; present {
 | |
| 		return nil, berrors.AlreadyRevokedError("already revoked")
 | |
| 	}
 | |
| 	cert, present := msar.known[req.Serial]
 | |
| 	if !present {
 | |
| 		return nil, berrors.UnknownSerialError()
 | |
| 	}
 | |
| 	msar.revoked[req.Serial] = &corepb.CertificateStatus{
 | |
| 		Serial:        req.Serial,
 | |
| 		IssuerID:      int64(issuance.IssuerNameID(cert)),
 | |
| 		Status:        string(core.OCSPStatusRevoked),
 | |
| 		RevokedReason: req.Reason,
 | |
| 	}
 | |
| 	return &emptypb.Empty{}, nil
 | |
| }
 | |
| 
 | |
| func (msar *mockSARevocation) UpdateRevokedCertificate(_ context.Context, req *sapb.RevokeCertificateRequest, _ ...grpc.CallOption) (*emptypb.Empty, error) {
 | |
| 	status, present := msar.revoked[req.Serial]
 | |
| 	if !present {
 | |
| 		return nil, errors.New("not already revoked")
 | |
| 	}
 | |
| 	if req.Reason != ocsp.KeyCompromise {
 | |
| 		return nil, errors.New("cannot re-revoke except for keyCompromise")
 | |
| 	}
 | |
| 	if present && status.RevokedReason == ocsp.KeyCompromise {
 | |
| 		return nil, berrors.AlreadyRevokedError("already revoked for keyCompromise")
 | |
| 	}
 | |
| 	msar.revoked[req.Serial].RevokedReason = req.Reason
 | |
| 	return &emptypb.Empty{}, nil
 | |
| }
 | |
| 
 | |
| type mockOCSPA struct {
 | |
| 	mocks.MockCA
 | |
| }
 | |
| 
 | |
| func (mcao *mockOCSPA) GenerateOCSP(context.Context, *capb.GenerateOCSPRequest, ...grpc.CallOption) (*capb.OCSPResponse, error) {
 | |
| 	return &capb.OCSPResponse{Response: []byte{1, 2, 3}}, nil
 | |
| }
 | |
| 
 | |
| type mockPurger struct{}
 | |
| 
 | |
| func (mp *mockPurger) Purge(context.Context, *akamaipb.PurgeRequest, ...grpc.CallOption) (*emptypb.Empty, error) {
 | |
| 	return &emptypb.Empty{}, nil
 | |
| }
 | |
| 
 | |
| // mockSAGenerateOCSP is a mock SA that always returns a good OCSP response, with a constant NotAfter.
 | |
| type mockSAGenerateOCSP struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| 	expiration time.Time
 | |
| }
 | |
| 
 | |
| func (msgo *mockSAGenerateOCSP) GetCertificateStatus(_ context.Context, req *sapb.Serial, _ ...grpc.CallOption) (*corepb.CertificateStatus, error) {
 | |
| 	return &corepb.CertificateStatus{
 | |
| 		Serial:   req.Serial,
 | |
| 		Status:   "good",
 | |
| 		NotAfter: timestamppb.New(msgo.expiration.UTC()),
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func TestGenerateOCSP(t *testing.T) {
 | |
| 	_, _, ra, clk, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.OCSP = &mockOCSPA{}
 | |
| 	ra.SA = &mockSAGenerateOCSP{expiration: clk.Now().Add(time.Hour)}
 | |
| 
 | |
| 	req := &rapb.GenerateOCSPRequest{
 | |
| 		Serial: core.SerialToString(big.NewInt(1)),
 | |
| 	}
 | |
| 
 | |
| 	resp, err := ra.GenerateOCSP(context.Background(), req)
 | |
| 	test.AssertNotError(t, err, "generating OCSP")
 | |
| 	test.AssertByteEquals(t, resp.Response, []byte{1, 2, 3})
 | |
| 
 | |
| 	ra.SA = &mockSAGenerateOCSP{expiration: clk.Now().Add(-time.Hour)}
 | |
| 	_, err = ra.GenerateOCSP(context.Background(), req)
 | |
| 	if !errors.Is(err, berrors.NotFound) {
 | |
| 		t.Errorf("expected NotFound error, got %s", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // mockSALongExpiredSerial is a mock SA that treats every serial as if it expired a long time ago.
 | |
| // Specifically, it returns NotFound to GetCertificateStatus (simulating the serial having been
 | |
| // removed from the certificateStatus table), but returns success to GetSerialMetadata (simulating
 | |
| // a serial number staying in the `serials` table indefinitely).
 | |
| type mockSALongExpiredSerial struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| }
 | |
| 
 | |
| func (msgo *mockSALongExpiredSerial) GetCertificateStatus(_ context.Context, req *sapb.Serial, _ ...grpc.CallOption) (*corepb.CertificateStatus, error) {
 | |
| 	return nil, berrors.NotFoundError("not found")
 | |
| }
 | |
| 
 | |
| func (msgo *mockSALongExpiredSerial) GetSerialMetadata(_ context.Context, req *sapb.Serial, _ ...grpc.CallOption) (*sapb.SerialMetadata, error) {
 | |
| 	return &sapb.SerialMetadata{
 | |
| 		Serial: req.Serial,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func TestGenerateOCSPLongExpiredSerial(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.OCSP = &mockOCSPA{}
 | |
| 	ra.SA = &mockSALongExpiredSerial{}
 | |
| 
 | |
| 	req := &rapb.GenerateOCSPRequest{
 | |
| 		Serial: core.SerialToString(big.NewInt(1)),
 | |
| 	}
 | |
| 
 | |
| 	_, err := ra.GenerateOCSP(context.Background(), req)
 | |
| 	test.AssertError(t, err, "generating OCSP")
 | |
| 	if !errors.Is(err, berrors.NotFound) {
 | |
| 		t.Errorf("expected NotFound error, got %#v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // mockSAUnknownSerial is a mock SA that always returns NotFound to certificate status and serial lookups.
 | |
| // It emulates an SA that has never issued a certificate.
 | |
| type mockSAUnknownSerial struct {
 | |
| 	mockSALongExpiredSerial
 | |
| }
 | |
| 
 | |
| func (msgo *mockSAUnknownSerial) GetSerialMetadata(_ context.Context, req *sapb.Serial, _ ...grpc.CallOption) (*sapb.SerialMetadata, error) {
 | |
| 	return nil, berrors.NotFoundError("not found")
 | |
| }
 | |
| 
 | |
| func TestGenerateOCSPUnknownSerial(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.OCSP = &mockOCSPA{}
 | |
| 	ra.SA = &mockSAUnknownSerial{}
 | |
| 
 | |
| 	req := &rapb.GenerateOCSPRequest{
 | |
| 		Serial: core.SerialToString(big.NewInt(1)),
 | |
| 	}
 | |
| 
 | |
| 	_, err := ra.GenerateOCSP(context.Background(), req)
 | |
| 	test.AssertError(t, err, "generating OCSP")
 | |
| 	if !errors.Is(err, berrors.UnknownSerial) {
 | |
| 		t.Errorf("expected UnknownSerial error, got %#v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestRevokeCertByApplicant_Subscriber(t *testing.T) {
 | |
| 	_, _, ra, clk, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.OCSP = &mockOCSPA{}
 | |
| 	ra.purger = &mockPurger{}
 | |
| 
 | |
| 	// Use the same self-signed cert as both issuer and issuee for revocation.
 | |
| 	_, cert := test.ThrowAwayCert(t, clk)
 | |
| 	cert.IsCA = true
 | |
| 	ic, err := issuance.NewCertificate(cert)
 | |
| 	test.AssertNotError(t, err, "failed to create issuer cert")
 | |
| 	ra.issuersByNameID = map[issuance.NameID]*issuance.Certificate{
 | |
| 		ic.NameID(): ic,
 | |
| 	}
 | |
| 	ra.SA = newMockSARevocation(cert)
 | |
| 
 | |
| 	// Revoking without a regID should fail.
 | |
| 	_, err = ra.RevokeCertByApplicant(context.Background(), &rapb.RevokeCertByApplicantRequest{
 | |
| 		Cert:  cert.Raw,
 | |
| 		Code:  ocsp.Unspecified,
 | |
| 		RegID: 0,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "should have failed with no RegID")
 | |
| 	test.AssertContains(t, err.Error(), "incomplete")
 | |
| 
 | |
| 	// Revoking for a disallowed reason should fail.
 | |
| 	_, err = ra.RevokeCertByApplicant(context.Background(), &rapb.RevokeCertByApplicantRequest{
 | |
| 		Cert:  cert.Raw,
 | |
| 		Code:  ocsp.CertificateHold,
 | |
| 		RegID: 1,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "should have failed with bad reasonCode")
 | |
| 	test.AssertContains(t, err.Error(), "disallowed revocation reason")
 | |
| 
 | |
| 	// Revoking with the correct regID should succeed.
 | |
| 	_, err = ra.RevokeCertByApplicant(context.Background(), &rapb.RevokeCertByApplicantRequest{
 | |
| 		Cert:  cert.Raw,
 | |
| 		Code:  ocsp.Unspecified,
 | |
| 		RegID: 1,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "should have succeeded")
 | |
| 
 | |
| 	// Revoking an already-revoked serial should fail.
 | |
| 	_, err = ra.RevokeCertByApplicant(context.Background(), &rapb.RevokeCertByApplicantRequest{
 | |
| 		Cert:  cert.Raw,
 | |
| 		Code:  ocsp.Unspecified,
 | |
| 		RegID: 1,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "should have failed with bad reasonCode")
 | |
| 	test.AssertContains(t, err.Error(), "already revoked")
 | |
| }
 | |
| 
 | |
| // mockSARevocationWithAuthzs embeds a mockSARevocation and so inherits all its
 | |
| // methods, but also adds GetValidAuthorizations2 so that it can pretend to
 | |
| // either be authorized or not for all of the names in the to-be-revoked cert.
 | |
| type mockSARevocationWithAuthzs struct {
 | |
| 	*mockSARevocation
 | |
| 	authorized bool
 | |
| }
 | |
| 
 | |
| func (msa *mockSARevocationWithAuthzs) GetValidAuthorizations2(ctx context.Context, req *sapb.GetValidAuthorizationsRequest, _ ...grpc.CallOption) (*sapb.Authorizations, error) {
 | |
| 	authzs := &sapb.Authorizations{}
 | |
| 
 | |
| 	if !msa.authorized {
 | |
| 		return authzs, nil
 | |
| 	}
 | |
| 
 | |
| 	for _, name := range req.DnsNames {
 | |
| 		authzs.Authzs = append(authzs.Authzs, &corepb.Authorization{DnsName: name})
 | |
| 	}
 | |
| 
 | |
| 	return authzs, nil
 | |
| }
 | |
| 
 | |
| func TestRevokeCertByApplicant_Controller(t *testing.T) {
 | |
| 	_, _, ra, clk, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.OCSP = &mockOCSPA{}
 | |
| 	ra.purger = &mockPurger{}
 | |
| 
 | |
| 	// Use the same self-signed cert as both issuer and issuee for revocation.
 | |
| 	_, cert := test.ThrowAwayCert(t, clk)
 | |
| 	cert.IsCA = true
 | |
| 	ic, err := issuance.NewCertificate(cert)
 | |
| 	test.AssertNotError(t, err, "failed to create issuer cert")
 | |
| 	ra.issuersByNameID = map[issuance.NameID]*issuance.Certificate{
 | |
| 		ic.NameID(): ic,
 | |
| 	}
 | |
| 	mockSA := newMockSARevocation(cert)
 | |
| 
 | |
| 	// Revoking when the account doesn't have valid authzs for the name should fail.
 | |
| 	// We use RegID 2 here and below because the mockSARevocation believes regID 1
 | |
| 	// is the original issuer.
 | |
| 	ra.SA = &mockSARevocationWithAuthzs{mockSA, false}
 | |
| 	_, err = ra.RevokeCertByApplicant(context.Background(), &rapb.RevokeCertByApplicantRequest{
 | |
| 		Cert:  cert.Raw,
 | |
| 		Code:  ocsp.Unspecified,
 | |
| 		RegID: 2,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "should have failed with wrong RegID")
 | |
| 	test.AssertContains(t, err.Error(), "requester does not control all names")
 | |
| 
 | |
| 	// Revoking when the account does have valid authzs for the name should succeed,
 | |
| 	// but override the revocation reason to cessationOfOperation.
 | |
| 	ra.SA = &mockSARevocationWithAuthzs{mockSA, true}
 | |
| 	_, err = ra.RevokeCertByApplicant(context.Background(), &rapb.RevokeCertByApplicantRequest{
 | |
| 		Cert:  cert.Raw,
 | |
| 		Code:  ocsp.Unspecified,
 | |
| 		RegID: 2,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "should have succeeded")
 | |
| 	test.AssertEquals(t, mockSA.revoked[core.SerialToString(cert.SerialNumber)].RevokedReason, int64(ocsp.CessationOfOperation))
 | |
| }
 | |
| 
 | |
| func TestRevokeCertByKey(t *testing.T) {
 | |
| 	_, _, ra, clk, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.OCSP = &mockOCSPA{}
 | |
| 	ra.purger = &mockPurger{}
 | |
| 
 | |
| 	// Use the same self-signed cert as both issuer and issuee for revocation.
 | |
| 	_, cert := test.ThrowAwayCert(t, clk)
 | |
| 	digest, err := core.KeyDigest(cert.PublicKey)
 | |
| 	test.AssertNotError(t, err, "core.KeyDigest failed")
 | |
| 	cert.IsCA = true
 | |
| 	ic, err := issuance.NewCertificate(cert)
 | |
| 	test.AssertNotError(t, err, "failed to create issuer cert")
 | |
| 	ra.issuersByNameID = map[issuance.NameID]*issuance.Certificate{
 | |
| 		ic.NameID(): ic,
 | |
| 	}
 | |
| 	mockSA := newMockSARevocation(cert)
 | |
| 	ra.SA = mockSA
 | |
| 
 | |
| 	// Revoking should work, but override the requested reason and block the key.
 | |
| 	_, err = ra.RevokeCertByKey(context.Background(), &rapb.RevokeCertByKeyRequest{
 | |
| 		Cert: cert.Raw,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "should have succeeded")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked), 1)
 | |
| 	test.Assert(t, bytes.Equal(digest[:], mockSA.blocked[0].KeyHash), "key hash mismatch")
 | |
| 	test.AssertEquals(t, mockSA.blocked[0].Source, "API")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked[0].Comment), 0)
 | |
| 	test.AssertEquals(t, mockSA.revoked[core.SerialToString(cert.SerialNumber)].RevokedReason, int64(ocsp.KeyCompromise))
 | |
| 
 | |
| 	// Re-revoking should fail, because it is already revoked for keyCompromise.
 | |
| 	_, err = ra.RevokeCertByKey(context.Background(), &rapb.RevokeCertByKeyRequest{
 | |
| 		Cert: cert.Raw,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "should have failed")
 | |
| 
 | |
| 	// Reset and have the Subscriber revoke for a different reason.
 | |
| 	// Then re-revoking using the key should work.
 | |
| 	mockSA.revoked = make(map[string]*corepb.CertificateStatus)
 | |
| 	_, err = ra.RevokeCertByApplicant(context.Background(), &rapb.RevokeCertByApplicantRequest{
 | |
| 		Cert:  cert.Raw,
 | |
| 		Code:  ocsp.Unspecified,
 | |
| 		RegID: 1,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "should have succeeded")
 | |
| 	_, err = ra.RevokeCertByKey(context.Background(), &rapb.RevokeCertByKeyRequest{
 | |
| 		Cert: cert.Raw,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "should have succeeded")
 | |
| }
 | |
| 
 | |
| func TestAdministrativelyRevokeCertificate(t *testing.T) {
 | |
| 	_, _, ra, clk, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.OCSP = &mockOCSPA{}
 | |
| 	ra.purger = &mockPurger{}
 | |
| 
 | |
| 	// Use the same self-signed cert as both issuer and issuee for revocation.
 | |
| 	serial, cert := test.ThrowAwayCert(t, clk)
 | |
| 	digest, err := core.KeyDigest(cert.PublicKey)
 | |
| 	test.AssertNotError(t, err, "core.KeyDigest failed")
 | |
| 	cert.IsCA = true
 | |
| 	ic, err := issuance.NewCertificate(cert)
 | |
| 	test.AssertNotError(t, err, "failed to create issuer cert")
 | |
| 	ra.issuersByNameID = map[issuance.NameID]*issuance.Certificate{
 | |
| 		ic.NameID(): ic,
 | |
| 	}
 | |
| 	mockSA := newMockSARevocation(cert)
 | |
| 	ra.SA = mockSA
 | |
| 
 | |
| 	// Revoking with an empty request should fail immediately.
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{})
 | |
| 	test.AssertError(t, err, "AdministrativelyRevokeCertificate should have failed for nil request object")
 | |
| 
 | |
| 	// Revoking with no serial should fail immediately.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Code:      ocsp.Unspecified,
 | |
| 		AdminName: "root",
 | |
| 	})
 | |
| 	test.AssertError(t, err, "AdministrativelyRevokeCertificate should have failed with no cert or serial")
 | |
| 
 | |
| 	// Revoking without an admin name should fail immediately.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    serial,
 | |
| 		Code:      ocsp.Unspecified,
 | |
| 		AdminName: "",
 | |
| 	})
 | |
| 	test.AssertError(t, err, "AdministrativelyRevokeCertificate should have failed with empty string for `AdminName`")
 | |
| 
 | |
| 	// Revoking for a forbidden reason should fail immediately.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    serial,
 | |
| 		Code:      ocsp.CertificateHold,
 | |
| 		AdminName: "root",
 | |
| 	})
 | |
| 	test.AssertError(t, err, "AdministrativelyRevokeCertificate should have failed with forbidden revocation reason")
 | |
| 
 | |
| 	// Revoking a cert for an unspecified reason should work but not block the key.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    serial,
 | |
| 		Code:      ocsp.Unspecified,
 | |
| 		AdminName: "root",
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "AdministrativelyRevokeCertificate failed")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked), 0)
 | |
| 	test.AssertMetricWithLabelsEquals(
 | |
| 		t, ra.revocationReasonCounter, prometheus.Labels{"reason": "unspecified"}, 1)
 | |
| 
 | |
| 	// Revoking a serial for an unspecified reason should work but not block the key.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    serial,
 | |
| 		Code:      ocsp.Unspecified,
 | |
| 		AdminName: "root",
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "AdministrativelyRevokeCertificate failed")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked), 0)
 | |
| 	test.AssertMetricWithLabelsEquals(
 | |
| 		t, ra.revocationReasonCounter, prometheus.Labels{"reason": "unspecified"}, 2)
 | |
| 
 | |
| 	// Duplicate administrative revocation of a serial for an unspecified reason
 | |
| 	// should succeed because the akamai cache purge succeeds.
 | |
| 	// Note that we *don't* call reset() here, so it recognizes the duplicate.
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    serial,
 | |
| 		Code:      ocsp.Unspecified,
 | |
| 		AdminName: "root",
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "AdministrativelyRevokeCertificate failed")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked), 0)
 | |
| 	test.AssertMetricWithLabelsEquals(
 | |
| 		t, ra.revocationReasonCounter, prometheus.Labels{"reason": "unspecified"}, 2)
 | |
| 
 | |
| 	// Duplicate administrative revocation of a serial for a *malformed* cert for
 | |
| 	// an unspecified reason should fail because we can't attempt an akamai cache
 | |
| 	// purge so the underlying AlreadyRevoked error gets propagated upwards.
 | |
| 	// Note that we *don't* call reset() here, so it recognizes the duplicate.
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    serial,
 | |
| 		Code:      ocsp.Unspecified,
 | |
| 		AdminName: "root",
 | |
| 		Malformed: true,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "Should be revoked")
 | |
| 	test.AssertContains(t, err.Error(), "already revoked")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked), 0)
 | |
| 	test.AssertMetricWithLabelsEquals(
 | |
| 		t, ra.revocationReasonCounter, prometheus.Labels{"reason": "unspecified"}, 2)
 | |
| 
 | |
| 	// Revoking a cert for key compromise with skipBlockKey set should work but
 | |
| 	// not block the key.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:       serial,
 | |
| 		Code:         ocsp.KeyCompromise,
 | |
| 		AdminName:    "root",
 | |
| 		SkipBlockKey: true,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "AdministrativelyRevokeCertificate failed")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked), 0)
 | |
| 	test.AssertMetricWithLabelsEquals(
 | |
| 		t, ra.revocationReasonCounter, prometheus.Labels{"reason": "keyCompromise"}, 1)
 | |
| 
 | |
| 	// Revoking a cert for key compromise should work and block the key.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    serial,
 | |
| 		Code:      ocsp.KeyCompromise,
 | |
| 		AdminName: "root",
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "AdministrativelyRevokeCertificate failed")
 | |
| 	test.AssertEquals(t, len(mockSA.blocked), 1)
 | |
| 	test.Assert(t, bytes.Equal(digest[:], mockSA.blocked[0].KeyHash), "key hash mismatch")
 | |
| 	test.AssertEquals(t, mockSA.blocked[0].Source, "admin-revoker")
 | |
| 	test.AssertEquals(t, mockSA.blocked[0].Comment, "revoked by root")
 | |
| 	test.AssertEquals(t, mockSA.blocked[0].Added.AsTime(), clk.Now())
 | |
| 	test.AssertMetricWithLabelsEquals(
 | |
| 		t, ra.revocationReasonCounter, prometheus.Labels{"reason": "keyCompromise"}, 2)
 | |
| 
 | |
| 	// Revoking a malformed cert for key compromise should fail because we don't
 | |
| 	// have the pubkey to block.
 | |
| 	mockSA.reset()
 | |
| 	_, err = ra.AdministrativelyRevokeCertificate(context.Background(), &rapb.AdministrativelyRevokeCertificateRequest{
 | |
| 		Serial:    core.SerialToString(cert.SerialNumber),
 | |
| 		Code:      ocsp.KeyCompromise,
 | |
| 		AdminName: "root",
 | |
| 		Malformed: true,
 | |
| 	})
 | |
| 	test.AssertError(t, err, "AdministrativelyRevokeCertificate should have failed with just serial for keyCompromise")
 | |
| }
 | |
| 
 | |
| func TestNewOrderRateLimitingExempt(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	ra.orderLifetime = 5 * 24 * time.Hour
 | |
| 
 | |
| 	// Set up a rate limit policy that allows 1 order every 5 minutes.
 | |
| 	rateLimitDuration := 5 * time.Minute
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		NewOrdersPerAccountPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 1,
 | |
| 			Window:    config.Duration{Duration: rateLimitDuration},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	exampleOrderOne := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"first.example.com", "second.example.com"},
 | |
| 	}
 | |
| 	exampleOrderTwo := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"first.example.com", "third.example.com"},
 | |
| 	}
 | |
| 
 | |
| 	// Create an order immediately.
 | |
| 	_, err := ra.NewOrder(ctx, exampleOrderOne)
 | |
| 	test.AssertNotError(t, err, "orderOne should have succeeded")
 | |
| 
 | |
| 	// Create another order immediately. This should fail.
 | |
| 	_, err = ra.NewOrder(ctx, exampleOrderTwo)
 | |
| 	test.AssertError(t, err, "orderTwo should have failed")
 | |
| 
 | |
| 	// Exempt orderTwo from rate limiting.
 | |
| 	exampleOrderTwo.IsARIRenewal = true
 | |
| 	_, err = ra.NewOrder(ctx, exampleOrderTwo)
 | |
| 	test.AssertNotError(t, err, "orderTwo should have succeeded")
 | |
| }
 | |
| 
 | |
| func TestNewOrderFailedAuthzRateLimitingExempt(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	exampleOrder := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"example.com"},
 | |
| 	}
 | |
| 
 | |
| 	// Create an order, and thus a pending authz, for "example.com".
 | |
| 	ctx := context.Background()
 | |
| 	order, err := ra.NewOrder(ctx, exampleOrder)
 | |
| 	test.AssertNotError(t, err, "adding an initial order for regA")
 | |
| 	test.AssertNotNil(t, order.Id, "initial order had a nil ID")
 | |
| 	test.AssertEquals(t, numAuthorizations(order), 1)
 | |
| 
 | |
| 	// Mock SA that has a failed authorization for "example.com".
 | |
| 	ra.SA = &mockInvalidPlusValidAuthzAuthority{
 | |
| 		mockSAWithAuthzs{authzs: []*core.Authorization{}},
 | |
| 		"example.com",
 | |
| 	}
 | |
| 
 | |
| 	// Set up a rate limit policy that allows 1 order every 24 hours.
 | |
| 	ra.rlPolicies = &dummyRateLimitConfig{
 | |
| 		InvalidAuthorizationsPerAccountPolicy: ratelimit.RateLimitPolicy{
 | |
| 			Threshold: 1,
 | |
| 			Window:    config.Duration{Duration: 24 * time.Hour},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Requesting a new order for "example.com" should fail due to too many
 | |
| 	// failed authorizations.
 | |
| 	_, err = ra.NewOrder(ctx, exampleOrder)
 | |
| 	test.AssertError(t, err, "expected error for domain with too many failures")
 | |
| 
 | |
| 	// Exempt the order from rate limiting.
 | |
| 	exampleOrder.IsARIRenewal = true
 | |
| 	_, err = ra.NewOrder(ctx, exampleOrder)
 | |
| 	test.AssertNotError(t, err, "limit exempt order should have succeeded")
 | |
| }
 | |
| 
 | |
| // An authority that returns an error from NewOrderAndAuthzs if the
 | |
| // "ReplacesSerial" field of the request is empty.
 | |
| type mockNewOrderMustBeReplacementAuthority struct {
 | |
| 	mockSAWithAuthzs
 | |
| }
 | |
| 
 | |
| func (sa *mockNewOrderMustBeReplacementAuthority) NewOrderAndAuthzs(ctx context.Context, req *sapb.NewOrderAndAuthzsRequest, _ ...grpc.CallOption) (*corepb.Order, error) {
 | |
| 	if req.NewOrder.ReplacesSerial == "" {
 | |
| 		return nil, status.Error(codes.InvalidArgument, "NewOrder is not a replacement")
 | |
| 	}
 | |
| 	return &corepb.Order{
 | |
| 		Id:             1,
 | |
| 		RegistrationID: req.NewOrder.RegistrationID,
 | |
| 		Expires:        req.NewOrder.Expires,
 | |
| 		Status:         string(core.StatusPending),
 | |
| 		Created:        timestamppb.New(time.Now()),
 | |
| 		DnsNames:       req.NewOrder.DnsNames,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| func TestNewOrderReplacesSerialCarriesThroughToSA(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	exampleOrder := &rapb.NewOrderRequest{
 | |
| 		RegistrationID: Registration.Id,
 | |
| 		DnsNames:       []string{"example.com"},
 | |
| 		ReplacesSerial: "1234",
 | |
| 	}
 | |
| 
 | |
| 	// Mock SA that returns an error from NewOrderAndAuthzs if the
 | |
| 	// "ReplacesSerial" field of the request is empty.
 | |
| 	ra.SA = &mockNewOrderMustBeReplacementAuthority{mockSAWithAuthzs{}}
 | |
| 
 | |
| 	_, err := ra.NewOrder(ctx, exampleOrder)
 | |
| 	test.AssertNotError(t, err, "order with ReplacesSerial should have succeeded")
 | |
| }
 | |
| 
 | |
| // newMockSAUnpauseAccount is a fake which includes all of the SA methods called
 | |
| // in the course of an account unpause. Its behavior can be customized by
 | |
| // providing the number of unpaused account identifiers to allow testing of
 | |
| // various scenarios.
 | |
| type mockSAUnpauseAccount struct {
 | |
| 	sapb.StorageAuthorityClient
 | |
| 	identsToUnpause int64
 | |
| 	receivedRegID   int64
 | |
| }
 | |
| 
 | |
| func (sa *mockSAUnpauseAccount) UnpauseAccount(_ context.Context, req *sapb.RegistrationID, _ ...grpc.CallOption) (*sapb.Count, error) {
 | |
| 	sa.receivedRegID = req.Id
 | |
| 	return &sapb.Count{Count: sa.identsToUnpause}, nil
 | |
| }
 | |
| 
 | |
| // TestUnpauseAccount tests that the RA's UnpauseAccount method correctly passes
 | |
| // the requested RegID to the SA, and correctly passes the SA's count back to
 | |
| // the caller.
 | |
| func TestUnpauseAccount(t *testing.T) {
 | |
| 	_, _, ra, _, cleanUp := initAuthorities(t)
 | |
| 	defer cleanUp()
 | |
| 
 | |
| 	mockSA := mockSAUnpauseAccount{identsToUnpause: 0}
 | |
| 	ra.SA = &mockSA
 | |
| 
 | |
| 	res, err := ra.UnpauseAccount(context.Background(), &rapb.UnpauseAccountRequest{
 | |
| 		RegistrationID: 1,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Should have been able to unpause account")
 | |
| 	test.AssertEquals(t, res.Count, int64(0))
 | |
| 	test.AssertEquals(t, mockSA.receivedRegID, int64(1))
 | |
| 
 | |
| 	mockSA.identsToUnpause = 50001
 | |
| 	res, err = ra.UnpauseAccount(context.Background(), &rapb.UnpauseAccountRequest{
 | |
| 		RegistrationID: 1,
 | |
| 	})
 | |
| 	test.AssertNotError(t, err, "Should have been able to unpause account")
 | |
| 	test.AssertEquals(t, res.Count, int64(50001))
 | |
| }
 | |
| 
 | |
| func TestGetAuthorization(t *testing.T) {
 | |
| 	_, _, ra, _, cleanup := initAuthorities(t)
 | |
| 	defer cleanup()
 | |
| 
 | |
| 	ra.SA = &mockSAWithAuthzs{
 | |
| 		authzs: []*core.Authorization{
 | |
| 			{
 | |
| 				ID:         "1",
 | |
| 				Identifier: identifier.NewDNS("example.com"),
 | |
| 				Status:     "valid",
 | |
| 				Challenges: []core.Challenge{
 | |
| 					{
 | |
| 						Type:   core.ChallengeTypeHTTP01,
 | |
| 						Status: core.StatusValid,
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// With HTTP01 enabled, GetAuthorization should pass the mock challenge through.
 | |
| 	pa, err := policy.New(map[core.AcmeChallenge]bool{
 | |
| 		core.ChallengeTypeHTTP01: true,
 | |
| 		core.ChallengeTypeDNS01:  true,
 | |
| 	}, blog.NewMock())
 | |
| 	test.AssertNotError(t, err, "Couldn't create PA")
 | |
| 	ra.PA = pa
 | |
| 	authz, err := ra.GetAuthorization(context.Background(), &rapb.GetAuthorizationRequest{Id: 1})
 | |
| 	test.AssertNotError(t, err, "should not fail")
 | |
| 	test.AssertEquals(t, len(authz.Challenges), 1)
 | |
| 	test.AssertEquals(t, authz.Challenges[0].Type, string(core.ChallengeTypeHTTP01))
 | |
| 
 | |
| 	// With HTTP01 disabled, GetAuthorization should filter out the mock challenge.
 | |
| 	pa, err = policy.New(map[core.AcmeChallenge]bool{
 | |
| 		core.ChallengeTypeDNS01: true,
 | |
| 	}, blog.NewMock())
 | |
| 	test.AssertNotError(t, err, "Couldn't create PA")
 | |
| 	ra.PA = pa
 | |
| 	authz, err = ra.GetAuthorization(context.Background(), &rapb.GetAuthorizationRequest{Id: 1})
 | |
| 	test.AssertNotError(t, err, "should not fail")
 | |
| 	test.AssertEquals(t, len(authz.Challenges), 0)
 | |
| }
 |