remote_test.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356
  1. package remote
  2. import (
  3. "bytes"
  4. "crypto/tls"
  5. "crypto/x509"
  6. "fmt"
  7. "math/big"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "testing"
  12. "time"
  13. apiinfo "github.com/cloudflare/cfssl/api/info"
  14. apisign "github.com/cloudflare/cfssl/api/signhandler"
  15. "github.com/cloudflare/cfssl/config"
  16. "github.com/cloudflare/cfssl/helpers"
  17. "github.com/cloudflare/cfssl/helpers/testsuite"
  18. "github.com/cloudflare/cfssl/info"
  19. "github.com/cloudflare/cfssl/signer"
  20. "github.com/cloudflare/cfssl/signer/local"
  21. )
  22. const (
  23. testCaFile = "testdata/ca.pem"
  24. testCaKeyFile = "testdata/ca_key.pem"
  25. testServerFile = "testdata/server.pem"
  26. testServerKeyFile = "testdata/server-key.pem"
  27. testClientFile = "testdata/client.pem"
  28. testClientKeyFile = "testdata/client-key.pem"
  29. )
  30. var validMinimalRemoteConfig = `
  31. {
  32. "signing": {
  33. "default": {
  34. "remote": "localhost"
  35. }
  36. },
  37. "remotes": {
  38. "localhost": "http://127.0.0.1:80"
  39. }
  40. }`
  41. var validMinimalAuthRemoteConfig = `
  42. {
  43. "signing": {
  44. "default": {
  45. "auth_key": "sample",
  46. "remote": "localhost"
  47. }
  48. },
  49. "auth_keys": {
  50. "sample": {
  51. "type":"standard",
  52. "key":"0123456789ABCDEF0123456789ABCDEF"
  53. }
  54. },
  55. "remotes": {
  56. "localhost": "http://127.0.0.1:80"
  57. }
  58. }`
  59. func TestNewSigner(t *testing.T) {
  60. remoteConfig := testsuite.NewConfig(t, []byte(validMinimalRemoteConfig))
  61. _, err := NewSigner(remoteConfig.Signing)
  62. if err != nil {
  63. t.Fatal("fail to init remote signer:", err)
  64. }
  65. }
  66. func TestNewAuthSigner(t *testing.T) {
  67. remoteAuthConfig := testsuite.NewConfig(t, []byte(validMinimalAuthRemoteConfig))
  68. _, err := NewSigner(remoteAuthConfig.Signing)
  69. if err != nil {
  70. t.Fatal("fail to init remote signer:", err)
  71. }
  72. }
  73. func TestRemoteInfo(t *testing.T) {
  74. remoteServer := newTestInfoServer(t, false, nil)
  75. defer closeTestServer(t, remoteServer)
  76. remoteConfig := testsuite.NewConfig(t, []byte(validMinimalRemoteConfig))
  77. // override with test server address
  78. remoteConfig.Signing.OverrideRemotes(remoteServer.URL)
  79. verifyRemoteInfo(t, remoteConfig)
  80. }
  81. func TestRemoteTLSInfo(t *testing.T) {
  82. remoteTLSInfo(t, false)
  83. }
  84. func TestRemoteMutualTLSInfo(t *testing.T) {
  85. remoteTLSInfo(t, true)
  86. }
  87. func remoteTLSInfo(t *testing.T, isMutual bool) {
  88. certPool, err := helpers.LoadPEMCertPool(testCaFile)
  89. if err != nil {
  90. t.Fatal(err)
  91. }
  92. var clientCA *x509.CertPool
  93. if isMutual {
  94. clientCA = certPool
  95. }
  96. remoteServer := newTestInfoServer(t, true, clientCA)
  97. defer closeTestServer(t, remoteServer)
  98. remoteConfig := testsuite.NewConfig(t, []byte(validMinimalRemoteConfig))
  99. // override with full server URL to get https in protocol"
  100. t.Log("remote is:", remoteServer.URL)
  101. remoteConfig.Signing.OverrideRemotes(remoteServer.URL)
  102. remoteConfig.Signing.SetRemoteCAs(certPool)
  103. if isMutual {
  104. remoteConfig.Signing.SetClientCertKeyPairFromFile(testClientFile, testClientKeyFile)
  105. }
  106. verifyRemoteInfo(t, remoteConfig)
  107. }
  108. func verifyRemoteInfo(t *testing.T, remoteConfig *config.Config) {
  109. s := newRemoteSigner(t, remoteConfig.Signing)
  110. req := info.Req{}
  111. resp, err := s.Info(req)
  112. if err != nil {
  113. t.Fatal("remote info failed:", err)
  114. }
  115. caBytes, err := os.ReadFile(testCaFile)
  116. caBytes = bytes.TrimSpace(caBytes)
  117. if err != nil {
  118. t.Fatal("fail to read test CA cert:", err)
  119. }
  120. if bytes.Compare(caBytes, []byte(resp.Certificate)) != 0 {
  121. t.Fatal("Get a different CA cert through info api.", len(resp.Certificate), len(caBytes))
  122. }
  123. }
  124. func TestRemoteSign(t *testing.T) {
  125. remoteServer := newTestSignServer(t, false, nil)
  126. defer closeTestServer(t, remoteServer)
  127. remoteConfig := testsuite.NewConfig(t, []byte(validMinimalRemoteConfig))
  128. // override with test server address
  129. remoteConfig.Signing.OverrideRemotes(remoteServer.URL)
  130. verifyRemoteSign(t, remoteConfig)
  131. }
  132. func TestRemoteTLSSign(t *testing.T) {
  133. remoteTLSSign(t, false)
  134. }
  135. func TestRemoteMutualTLSSign(t *testing.T) {
  136. remoteTLSSign(t, true)
  137. }
  138. func remoteTLSSign(t *testing.T, isMutual bool) {
  139. certPool, err := helpers.LoadPEMCertPool(testCaFile)
  140. if err != nil {
  141. t.Fatal(err)
  142. }
  143. var clientCA *x509.CertPool
  144. if isMutual {
  145. clientCA = certPool
  146. }
  147. remoteServer := newTestSignServer(t, true, clientCA)
  148. defer closeTestServer(t, remoteServer)
  149. remoteConfig := testsuite.NewConfig(t, []byte(validMinimalRemoteConfig))
  150. // override with full server URL to get https in protocol"
  151. remoteConfig.Signing.OverrideRemotes(remoteServer.URL)
  152. remoteConfig.Signing.SetRemoteCAs(certPool)
  153. if isMutual {
  154. remoteConfig.Signing.SetClientCertKeyPairFromFile(testClientFile, testClientKeyFile)
  155. }
  156. verifyRemoteSign(t, remoteConfig)
  157. }
  158. func verifyRemoteSign(t *testing.T, remoteConfig *config.Config) {
  159. s := newRemoteSigner(t, remoteConfig.Signing)
  160. hosts := []string{"cloudflare.com"}
  161. for _, test := range testsuite.CSRTests {
  162. csr, err := os.ReadFile(test.File)
  163. if err != nil {
  164. t.Fatal("CSR loading error:", err)
  165. }
  166. testSerial := big.NewInt(0x7007F)
  167. certBytes, err := s.Sign(signer.SignRequest{
  168. Hosts: hosts,
  169. Request: string(csr),
  170. Serial: testSerial,
  171. })
  172. if test.ErrorCallback != nil {
  173. test.ErrorCallback(t, err)
  174. } else {
  175. if err != nil {
  176. t.Fatalf("Expected no error. Got %s. Param %s %d", err.Error(), test.KeyAlgo, test.KeyLen)
  177. }
  178. cert, err := helpers.ParseCertificatePEM(certBytes)
  179. if err != nil {
  180. t.Fatal("Fail to parse returned certificate:", err)
  181. }
  182. sn := fmt.Sprintf("%X", cert.SerialNumber)
  183. if sn != "7007F" {
  184. t.Fatal("Serial Number was incorrect:", sn)
  185. }
  186. }
  187. }
  188. }
  189. func TestRemoteSignBadServerAndOverride(t *testing.T) {
  190. remoteServer := newTestSignServer(t, false, nil)
  191. defer closeTestServer(t, remoteServer)
  192. // remoteConfig contains port 80 that no test server will listen on
  193. remoteConfig := testsuite.NewConfig(t, []byte(validMinimalRemoteConfig))
  194. s := newRemoteSigner(t, remoteConfig.Signing)
  195. hosts := []string{"cloudflare.com"}
  196. csr, err := os.ReadFile("../local/testdata/rsa2048.csr")
  197. if err != nil {
  198. t.Fatal("CSR loading error:", err)
  199. }
  200. _, err = s.Sign(signer.SignRequest{Hosts: hosts, Request: string(csr)})
  201. if err == nil {
  202. t.Fatal("Should return error")
  203. }
  204. remoteConfig.Signing.OverrideRemotes(remoteServer.URL)
  205. s.SetPolicy(remoteConfig.Signing)
  206. certBytes, err := s.Sign(signer.SignRequest{
  207. Hosts: hosts,
  208. Request: string(csr),
  209. Serial: big.NewInt(1),
  210. })
  211. if err != nil {
  212. t.Fatalf("Expected no error. Got %s.", err.Error())
  213. }
  214. _, err = helpers.ParseCertificatePEM(certBytes)
  215. if err != nil {
  216. t.Fatal("Fail to parse returned certificate:", err)
  217. }
  218. }
  219. // helper functions
  220. func newRemoteSigner(t *testing.T, policy *config.Signing) *Signer {
  221. s, err := NewSigner(policy)
  222. if err != nil {
  223. t.Fatal("fail to init remote signer:", err)
  224. }
  225. return s
  226. }
  227. func newTestSignHandler(t *testing.T) (h http.Handler) {
  228. h, err := newHandler(t, testCaFile, testCaKeyFile, "sign")
  229. if err != nil {
  230. t.Fatal(err)
  231. }
  232. return
  233. }
  234. func newTestInfoHandler(t *testing.T) (h http.Handler) {
  235. h, err := newHandler(t, testCaFile, testCaKeyFile, "info")
  236. if err != nil {
  237. t.Fatal(err)
  238. }
  239. return
  240. }
  241. func newTestServer(t *testing.T, path string, handler http.Handler, isTLS bool, certPool *x509.CertPool) *httptest.Server {
  242. mux := http.NewServeMux()
  243. mux.Handle(path, handler)
  244. ts := httptest.NewUnstartedServer(mux)
  245. if isTLS {
  246. cert, err := tls.LoadX509KeyPair(testServerFile, testServerKeyFile)
  247. if err != nil {
  248. t.Fatal(err)
  249. }
  250. clientCertRequired := tls.NoClientCert
  251. if certPool != nil {
  252. clientCertRequired = tls.RequireAndVerifyClientCert
  253. }
  254. ts.TLS = &tls.Config{
  255. Certificates: []tls.Certificate{cert},
  256. ClientCAs: certPool,
  257. ClientAuth: clientCertRequired,
  258. }
  259. ts.TLS.BuildNameToCertificate()
  260. ts.StartTLS()
  261. } else {
  262. ts.Start()
  263. }
  264. return ts
  265. }
  266. func newTestSignServer(t *testing.T, isTLS bool, certPool *x509.CertPool) *httptest.Server {
  267. ts := newTestServer(t, "/api/v1/cfssl/sign", newTestSignHandler(t), isTLS, certPool)
  268. t.Log(ts.URL)
  269. return ts
  270. }
  271. func newTestInfoServer(t *testing.T, isTLS bool, certPool *x509.CertPool) *httptest.Server {
  272. ts := newTestServer(t, "/api/v1/cfssl/info", newTestInfoHandler(t), isTLS, certPool)
  273. t.Log(ts.URL)
  274. return ts
  275. }
  276. func closeTestServer(t *testing.T, ts *httptest.Server) {
  277. t.Log("Finalizing test server.")
  278. ts.Close()
  279. }
  280. // newHandler generates a new sign handler (or info handler) using the certificate
  281. // authority private key and certficate to sign certificates.
  282. func newHandler(t *testing.T, caFile, caKeyFile, op string) (http.Handler, error) {
  283. var expiry = 1 * time.Minute
  284. var CAConfig = &config.Config{
  285. Signing: &config.Signing{
  286. Profiles: map[string]*config.SigningProfile{
  287. "signature": {
  288. Usage: []string{"digital signature"},
  289. Expiry: expiry,
  290. },
  291. },
  292. Default: &config.SigningProfile{
  293. Usage: []string{"cert sign", "crl sign"},
  294. ExpiryString: "43800h",
  295. Expiry: expiry,
  296. CAConstraint: config.CAConstraint{IsCA: true},
  297. ClientProvidesSerialNumbers: true,
  298. },
  299. },
  300. }
  301. s, err := local.NewSignerFromFile(testCaFile, testCaKeyFile, CAConfig.Signing)
  302. if err != nil {
  303. t.Fatal(err)
  304. }
  305. if op == "sign" {
  306. return apisign.NewHandlerFromSigner(s)
  307. } else if op == "info" {
  308. return apiinfo.NewHandler(s)
  309. }
  310. t.Fatal("Bad op code")
  311. return nil, nil
  312. }