175 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			175 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Go
		
	
	
	
| // Copyright 2014 ISRG.  All rights reserved
 | |
| // This Source Code Form is subject to the terms of the Mozilla Public
 | |
| // License, v. 2.0. If a copy of the MPL was not distributed with this
 | |
| // file, You can obtain one at http://mozilla.org/MPL/2.0/.
 | |
| 
 | |
| package core
 | |
| 
 | |
| import (
 | |
| 	"encoding/base64"
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/letsencrypt/boulder/Godeps/_workspace/src/github.com/letsencrypt/go-jose"
 | |
| 	"github.com/letsencrypt/boulder/test"
 | |
| )
 | |
| 
 | |
| // challenges.go
 | |
| 
 | |
| var accountKeyJSON = `{
 | |
|   "kty":"RSA",
 | |
|   "n":"yNWVhtYEKJR21y9xsHV-PD_bYwbXSeNuFal46xYxVfRL5mqha7vttvjB_vc7Xg2RvgCxHPCqoxgMPTzHrZT75LjCwIW2K_klBYN8oYvTwwmeSkAz6ut7ZxPv-nZaT5TJhGk0NT2kh_zSpdriEJ_3vW-mqxYbbBmpvHqsa1_zx9fSuHYctAZJWzxzUZXykbWMWQZpEiE0J4ajj51fInEzVn7VxV-mzfMyboQjujPh7aNJxAWSq4oQEJJDgWwSh9leyoJoPpONHxh5nEE5AjE01FkGICSxjpZsF-w8hOTI3XXohUdu29Se26k2B0PolDSuj0GIQU6-W9TdLXSjBb2SpQ",
 | |
|   "e":"AQAB"
 | |
| }`
 | |
| 
 | |
| func TestChallenges(t *testing.T) {
 | |
| 	var accountKey *jose.JsonWebKey
 | |
| 	err := json.Unmarshal([]byte(accountKeyJSON), &accountKey)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error unmarshaling JWK: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	http01 := HTTPChallenge01(accountKey)
 | |
| 	if !http01.IsSane(false) {
 | |
| 		t.Errorf("New http-01 challenge is not sane: %v", http01)
 | |
| 	}
 | |
| 
 | |
| 	tlssni01 := TLSSNIChallenge01(accountKey)
 | |
| 	if !tlssni01.IsSane(false) {
 | |
| 		t.Errorf("New tls-sni-01 challenge is not sane: %v", tlssni01)
 | |
| 	}
 | |
| 
 | |
| 	dns01 := DNSChallenge01(accountKey)
 | |
| 	if !dns01.IsSane(false) {
 | |
| 		t.Errorf("New dns-01 challenge is not sane: %v", dns01)
 | |
| 	}
 | |
| 
 | |
| 	test.Assert(t, ValidChallenge(ChallengeTypeHTTP01), "Refused valid challenge")
 | |
| 	test.Assert(t, ValidChallenge(ChallengeTypeTLSSNI01), "Refused valid challenge")
 | |
| 	test.Assert(t, ValidChallenge(ChallengeTypeDNS01), "Refused valid challenge")
 | |
| 	test.Assert(t, !ValidChallenge("nonsense-71"), "Accepted invalid challenge")
 | |
| }
 | |
| 
 | |
| // objects.go
 | |
| 
 | |
| var testCertificateRequestBadCSR = []byte(`{"csr":"AAAA"}`)
 | |
| var testCertificateRequestGood = []byte(`{
 | |
|   "csr": "MIHRMHgCAQAwFjEUMBIGA1UEAxMLZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWUlnRrm5ErSVkTzBTk3isg1hNydfyY4NM1P_N1S-ZeD39HMrYJsQkUh2tKvy3ztfmEqWpekvO4WRktSa000BPoAAwCgYIKoZIzj0EAwMDSQAwRgIhAIZIBwu4xOUD_4dJuGgceSKaoXTFBQKA3BFBNVJvbpdsAiEAlfq3Dq_8dnYbtmyDdXgopeKkSV5_76VSpcog-wkwEwo"
 | |
| }`)
 | |
| 
 | |
| func TestCertificateRequest(t *testing.T) {
 | |
| 
 | |
| 	// Good
 | |
| 	var goodCR CertificateRequest
 | |
| 	err := json.Unmarshal(testCertificateRequestGood, &goodCR)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error unmarshaling good certificate request: %v", err)
 | |
| 	}
 | |
| 	if err = goodCR.CSR.CheckSignature(); err != nil {
 | |
| 		t.Errorf("Valid CSR in CertificateRequest failed to verify: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Bad CSR
 | |
| 	var badCR CertificateRequest
 | |
| 	err = json.Unmarshal(testCertificateRequestBadCSR, &badCR)
 | |
| 	if err == nil {
 | |
| 		t.Errorf("Unexpectedly accepted certificate request with bad CSR")
 | |
| 	}
 | |
| 
 | |
| 	// Marshal
 | |
| 	jsonCR, err := json.Marshal(goodCR)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Failed to marshal good certificate request: %v", err)
 | |
| 	}
 | |
| 	err = json.Unmarshal(jsonCR, &goodCR)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Marshalled certificate request failed to unmarshal: %v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // util.go
 | |
| 
 | |
| func TestErrors(t *testing.T) {
 | |
| 	testMessage := "test"
 | |
| 	errors := []error{
 | |
| 		NotSupportedError(testMessage),
 | |
| 		MalformedRequestError(testMessage),
 | |
| 		UnauthorizedError(testMessage),
 | |
| 		NotFoundError(testMessage),
 | |
| 		SignatureValidationError(testMessage),
 | |
| 		CertificateIssuanceError(testMessage),
 | |
| 	}
 | |
| 
 | |
| 	for i, err := range errors {
 | |
| 		if msg := err.Error(); msg != testMessage {
 | |
| 			t.Errorf("Error %d returned unexpected message %v", i, msg)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestRandomString(t *testing.T) {
 | |
| 	byteLength := 256
 | |
| 	b64 := RandomString(byteLength)
 | |
| 	bin, err := base64.RawURLEncoding.DecodeString(b64)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error in base64 decode: %v", err)
 | |
| 	}
 | |
| 	if len(bin) != byteLength {
 | |
| 		t.Errorf("Improper length: %v", len(bin))
 | |
| 	}
 | |
| 
 | |
| 	token := NewToken()
 | |
| 	if len(token) != 43 {
 | |
| 		t.Errorf("Improper length for token: %v %v", len(token), token)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestFingerprint(t *testing.T) {
 | |
| 	in := []byte{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}
 | |
| 	out := []byte{55, 71, 8, 255, 247, 113, 157, 213,
 | |
| 		151, 158, 200, 117, 213, 108, 210, 40,
 | |
| 		111, 109, 60, 247, 236, 49, 122, 59,
 | |
| 		37, 99, 42, 171, 40, 236, 55, 187}
 | |
| 
 | |
| 	digest := Fingerprint256(in)
 | |
| 	if digest != base64.RawURLEncoding.EncodeToString(out) {
 | |
| 		t.Errorf("Incorrect SHA-256 fingerprint: %v", digest)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestURL(t *testing.T) {
 | |
| 	scheme := "https"
 | |
| 	host := "example.com"
 | |
| 	path := "/acme/test"
 | |
| 	query := "foo"
 | |
| 	jsonURL := fmt.Sprintf(`{"URL":"%s://%s%s?%s"}`, scheme, host, path, query)
 | |
| 	badJSON := `{"URL":666}`
 | |
| 
 | |
| 	url := struct{ URL *AcmeURL }{URL: &AcmeURL{}}
 | |
| 	err := json.Unmarshal([]byte(jsonURL), &url)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error in json unmarshal: %v", err)
 | |
| 	}
 | |
| 	if url.URL.Scheme != scheme || url.URL.Host != host ||
 | |
| 		url.URL.Path != path || url.URL.RawQuery != query {
 | |
| 		t.Errorf("Improper URL contents: %v", url.URL)
 | |
| 	}
 | |
| 	if s := url.URL.PathSegments(); len(s) != 2 {
 | |
| 		t.Errorf("Path segments failed to parse properly: %v", s)
 | |
| 	}
 | |
| 
 | |
| 	err = json.Unmarshal([]byte(badJSON), &url)
 | |
| 	if err == nil {
 | |
| 		t.Errorf("Failed to catch bad JSON")
 | |
| 	}
 | |
| 
 | |
| 	marshaledURL, err := json.Marshal(url)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error in json marshal: %v", err)
 | |
| 	}
 | |
| 	if string(marshaledURL) != jsonURL {
 | |
| 		t.Errorf("Expected marshaled url %#v, got %#v", jsonURL, string(marshaledURL))
 | |
| 	}
 | |
| }
 |