mirror of https://github.com/hashicorp/consul
110 lines
2.7 KiB
Go
110 lines
2.7 KiB
Go
|
package connect
|
||
|
|
||
|
import (
|
||
|
"io/ioutil"
|
||
|
"os"
|
||
|
"os/exec"
|
||
|
"path/filepath"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
)
|
||
|
|
||
|
// hasOpenSSL is used to determine if the openssl CLI exists for unit tests.
|
||
|
var hasOpenSSL bool
|
||
|
|
||
|
func init() {
|
||
|
_, err := exec.LookPath("openssl")
|
||
|
hasOpenSSL = err == nil
|
||
|
}
|
||
|
|
||
|
// Test that the TestCA and TestLeaf functions generate valid certificates.
|
||
|
func TestTestCAAndLeaf(t *testing.T) {
|
||
|
if !hasOpenSSL {
|
||
|
t.Skip("openssl not found")
|
||
|
return
|
||
|
}
|
||
|
|
||
|
assert := assert.New(t)
|
||
|
|
||
|
// Create the certs
|
||
|
ca := TestCA(t, nil)
|
||
|
leaf := TestLeaf(t, "web", ca)
|
||
|
|
||
|
// Create a temporary directory for storing the certs
|
||
|
td, err := ioutil.TempDir("", "consul")
|
||
|
assert.Nil(err)
|
||
|
defer os.RemoveAll(td)
|
||
|
|
||
|
// Write the cert
|
||
|
assert.Nil(ioutil.WriteFile(filepath.Join(td, "ca.pem"), []byte(ca.RootCert), 0644))
|
||
|
assert.Nil(ioutil.WriteFile(filepath.Join(td, "leaf.pem"), []byte(leaf), 0644))
|
||
|
|
||
|
// Use OpenSSL to verify so we have an external, known-working process
|
||
|
// that can verify this outside of our own implementations.
|
||
|
cmd := exec.Command(
|
||
|
"openssl", "verify", "-verbose", "-CAfile", "ca.pem", "leaf.pem")
|
||
|
cmd.Dir = td
|
||
|
output, err := cmd.Output()
|
||
|
t.Log(string(output))
|
||
|
assert.Nil(err)
|
||
|
}
|
||
|
|
||
|
// Test cross-signing.
|
||
|
func TestTestCAAndLeaf_xc(t *testing.T) {
|
||
|
if !hasOpenSSL {
|
||
|
t.Skip("openssl not found")
|
||
|
return
|
||
|
}
|
||
|
|
||
|
assert := assert.New(t)
|
||
|
|
||
|
// Create the certs
|
||
|
ca1 := TestCA(t, nil)
|
||
|
ca2 := TestCA(t, ca1)
|
||
|
leaf1 := TestLeaf(t, "web", ca1)
|
||
|
leaf2 := TestLeaf(t, "web", ca2)
|
||
|
|
||
|
// Create a temporary directory for storing the certs
|
||
|
td, err := ioutil.TempDir("", "consul")
|
||
|
assert.Nil(err)
|
||
|
defer os.RemoveAll(td)
|
||
|
|
||
|
// Write the cert
|
||
|
xcbundle := []byte(ca1.RootCert)
|
||
|
xcbundle = append(xcbundle, '\n')
|
||
|
xcbundle = append(xcbundle, []byte(ca2.SigningCert)...)
|
||
|
assert.Nil(ioutil.WriteFile(filepath.Join(td, "ca.pem"), xcbundle, 0644))
|
||
|
assert.Nil(ioutil.WriteFile(filepath.Join(td, "leaf1.pem"), []byte(leaf1), 0644))
|
||
|
assert.Nil(ioutil.WriteFile(filepath.Join(td, "leaf2.pem"), []byte(leaf2), 0644))
|
||
|
|
||
|
// OpenSSL verify the cross-signed leaf (leaf2)
|
||
|
{
|
||
|
cmd := exec.Command(
|
||
|
"openssl", "verify", "-verbose", "-CAfile", "ca.pem", "leaf2.pem")
|
||
|
cmd.Dir = td
|
||
|
output, err := cmd.Output()
|
||
|
t.Log(string(output))
|
||
|
assert.Nil(err)
|
||
|
}
|
||
|
|
||
|
// OpenSSL verify the old leaf (leaf1)
|
||
|
{
|
||
|
cmd := exec.Command(
|
||
|
"openssl", "verify", "-verbose", "-CAfile", "ca.pem", "leaf1.pem")
|
||
|
cmd.Dir = td
|
||
|
output, err := cmd.Output()
|
||
|
t.Log(string(output))
|
||
|
assert.Nil(err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Test that the private key is memoized to preseve system entropy.
|
||
|
func TestTestPrivateKey_memoize(t *testing.T) {
|
||
|
ca1 := TestCA(t, nil)
|
||
|
ca2 := TestCA(t, nil)
|
||
|
if ca1.SigningKey != ca2.SigningKey {
|
||
|
t.Fatal("should have the same signing keys for tests")
|
||
|
}
|
||
|
}
|