ca_test.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237
  1. //go:build !windows
  2. // +build !windows
  3. package main
  4. import (
  5. "bytes"
  6. "encoding/pem"
  7. "errors"
  8. "os"
  9. "strings"
  10. "testing"
  11. "time"
  12. "github.com/slackhq/nebula/cert"
  13. "github.com/stretchr/testify/assert"
  14. )
  15. func Test_caSummary(t *testing.T) {
  16. assert.Equal(t, "ca <flags>: create a self signed certificate authority", caSummary())
  17. }
  18. func Test_caHelp(t *testing.T) {
  19. ob := &bytes.Buffer{}
  20. caHelp(ob)
  21. assert.Equal(
  22. t,
  23. "Usage of "+os.Args[0]+" ca <flags>: create a self signed certificate authority\n"+
  24. " -argon-iterations uint\n"+
  25. " \tOptional: Argon2 iterations parameter used for encrypted private key passphrase (default 1)\n"+
  26. " -argon-memory uint\n"+
  27. " \tOptional: Argon2 memory parameter (in KiB) used for encrypted private key passphrase (default 2097152)\n"+
  28. " -argon-parallelism uint\n"+
  29. " \tOptional: Argon2 parallelism parameter used for encrypted private key passphrase (default 4)\n"+
  30. " -curve string\n"+
  31. " \tEdDSA/ECDSA Curve (25519, P256) (default \"25519\")\n"+
  32. " -duration duration\n"+
  33. " \tOptional: amount of time the certificate should be valid for. Valid time units are seconds: \"s\", minutes: \"m\", hours: \"h\" (default 8760h0m0s)\n"+
  34. " -encrypt\n"+
  35. " \tOptional: prompt for passphrase and write out-key in an encrypted format\n"+
  36. " -groups string\n"+
  37. " \tOptional: comma separated list of groups. This will limit which groups subordinate certs can use\n"+
  38. " -ips string\n"+
  39. " Deprecated, see -networks\n"+
  40. " -name string\n"+
  41. " \tRequired: name of the certificate authority\n"+
  42. " -networks string\n"+
  43. " \tOptional: comma separated list of ip address and network in CIDR notation. This will limit which ip addresses and networks subordinate certs can use in networks\n"+
  44. " -out-crt string\n"+
  45. " \tOptional: path to write the certificate to (default \"ca.crt\")\n"+
  46. " -out-key string\n"+
  47. " \tOptional: path to write the private key to (default \"ca.key\")\n"+
  48. " -out-qr string\n"+
  49. " \tOptional: output a qr code image (png) of the certificate\n"+
  50. optionalPkcs11String(" -pkcs11 string\n \tOptional: PKCS#11 URI to an existing private key\n")+
  51. " -subnets string\n"+
  52. " \tDeprecated, see -unsafe-networks\n"+
  53. " -unsafe-networks string\n"+
  54. " \tOptional: comma separated list of ip address and network in CIDR notation. This will limit which ip addresses and networks subordinate certs can use in unsafe networks\n"+
  55. " -version uint\n"+
  56. " \tOptional: version of the certificate format to use (default 2)\n",
  57. ob.String(),
  58. )
  59. }
  60. func Test_ca(t *testing.T) {
  61. ob := &bytes.Buffer{}
  62. eb := &bytes.Buffer{}
  63. nopw := &StubPasswordReader{
  64. password: []byte(""),
  65. err: nil,
  66. }
  67. errpw := &StubPasswordReader{
  68. password: []byte(""),
  69. err: errors.New("stub error"),
  70. }
  71. passphrase := []byte("DO NOT USE THIS KEY")
  72. testpw := &StubPasswordReader{
  73. password: passphrase,
  74. err: nil,
  75. }
  76. pwPromptOb := "Enter passphrase: "
  77. // required args
  78. assertHelpError(t, ca(
  79. []string{"-version", "1", "-out-key", "nope", "-out-crt", "nope", "duration", "100m"}, ob, eb, nopw,
  80. ), "-name is required")
  81. assert.Equal(t, "", ob.String())
  82. assert.Equal(t, "", eb.String())
  83. // ipv4 only ips
  84. assertHelpError(t, ca([]string{"-version", "1", "-name", "ipv6", "-ips", "100::100/100"}, ob, eb, nopw), "invalid -networks definition: v1 certificates can only be ipv4, have 100::100/100")
  85. assert.Equal(t, "", ob.String())
  86. assert.Equal(t, "", eb.String())
  87. // ipv4 only subnets
  88. assertHelpError(t, ca([]string{"-version", "1", "-name", "ipv6", "-subnets", "100::100/100"}, ob, eb, nopw), "invalid -unsafe-networks definition: v1 certificates can only be ipv4, have 100::100/100")
  89. assert.Equal(t, "", ob.String())
  90. assert.Equal(t, "", eb.String())
  91. // failed key write
  92. ob.Reset()
  93. eb.Reset()
  94. args := []string{"-version", "1", "-name", "test", "-duration", "100m", "-out-crt", "/do/not/write/pleasecrt", "-out-key", "/do/not/write/pleasekey"}
  95. assert.EqualError(t, ca(args, ob, eb, nopw), "error while writing out-key: open /do/not/write/pleasekey: "+NoSuchDirError)
  96. assert.Equal(t, "", ob.String())
  97. assert.Equal(t, "", eb.String())
  98. // create temp key file
  99. keyF, err := os.CreateTemp("", "test.key")
  100. assert.Nil(t, err)
  101. assert.Nil(t, os.Remove(keyF.Name()))
  102. // failed cert write
  103. ob.Reset()
  104. eb.Reset()
  105. args = []string{"-version", "1", "-name", "test", "-duration", "100m", "-out-crt", "/do/not/write/pleasecrt", "-out-key", keyF.Name()}
  106. assert.EqualError(t, ca(args, ob, eb, nopw), "error while writing out-crt: open /do/not/write/pleasecrt: "+NoSuchDirError)
  107. assert.Equal(t, "", ob.String())
  108. assert.Equal(t, "", eb.String())
  109. // create temp cert file
  110. crtF, err := os.CreateTemp("", "test.crt")
  111. assert.Nil(t, err)
  112. assert.Nil(t, os.Remove(crtF.Name()))
  113. assert.Nil(t, os.Remove(keyF.Name()))
  114. // test proper cert with removed empty groups and subnets
  115. ob.Reset()
  116. eb.Reset()
  117. args = []string{"-version", "1", "-name", "test", "-duration", "100m", "-groups", "1,, 2 , ,,,3,4,5", "-out-crt", crtF.Name(), "-out-key", keyF.Name()}
  118. assert.Nil(t, ca(args, ob, eb, nopw))
  119. assert.Equal(t, "", ob.String())
  120. assert.Equal(t, "", eb.String())
  121. // read cert and key files
  122. rb, _ := os.ReadFile(keyF.Name())
  123. lKey, b, c, err := cert.UnmarshalSigningPrivateKeyFromPEM(rb)
  124. assert.Equal(t, cert.Curve_CURVE25519, c)
  125. assert.Len(t, b, 0)
  126. assert.Nil(t, err)
  127. assert.Len(t, lKey, 64)
  128. rb, _ = os.ReadFile(crtF.Name())
  129. lCrt, b, err := cert.UnmarshalCertificateFromPEM(rb)
  130. assert.Len(t, b, 0)
  131. assert.Nil(t, err)
  132. assert.Equal(t, "test", lCrt.Name())
  133. assert.Len(t, lCrt.Networks(), 0)
  134. assert.True(t, lCrt.IsCA())
  135. assert.Equal(t, []string{"1", "2", "3", "4", "5"}, lCrt.Groups())
  136. assert.Len(t, lCrt.UnsafeNetworks(), 0)
  137. assert.Len(t, lCrt.PublicKey(), 32)
  138. assert.Equal(t, time.Duration(time.Minute*100), lCrt.NotAfter().Sub(lCrt.NotBefore()))
  139. assert.Equal(t, "", lCrt.Issuer())
  140. assert.True(t, lCrt.CheckSignature(lCrt.PublicKey()))
  141. // test encrypted key
  142. os.Remove(keyF.Name())
  143. os.Remove(crtF.Name())
  144. ob.Reset()
  145. eb.Reset()
  146. args = []string{"-version", "1", "-encrypt", "-name", "test", "-duration", "100m", "-groups", "1,2,3,4,5", "-out-crt", crtF.Name(), "-out-key", keyF.Name()}
  147. assert.Nil(t, ca(args, ob, eb, testpw))
  148. assert.Equal(t, pwPromptOb, ob.String())
  149. assert.Equal(t, "", eb.String())
  150. // read encrypted key file and verify default params
  151. rb, _ = os.ReadFile(keyF.Name())
  152. k, _ := pem.Decode(rb)
  153. ned, err := cert.UnmarshalNebulaEncryptedData(k.Bytes)
  154. assert.Nil(t, err)
  155. // we won't know salt in advance, so just check start of string
  156. assert.Equal(t, uint32(2*1024*1024), ned.EncryptionMetadata.Argon2Parameters.Memory)
  157. assert.Equal(t, uint8(4), ned.EncryptionMetadata.Argon2Parameters.Parallelism)
  158. assert.Equal(t, uint32(1), ned.EncryptionMetadata.Argon2Parameters.Iterations)
  159. // verify the key is valid and decrypt-able
  160. var curve cert.Curve
  161. curve, lKey, b, err = cert.DecryptAndUnmarshalSigningPrivateKey(passphrase, rb)
  162. assert.Equal(t, cert.Curve_CURVE25519, curve)
  163. assert.Nil(t, err)
  164. assert.Len(t, b, 0)
  165. assert.Len(t, lKey, 64)
  166. // test when reading passsword results in an error
  167. os.Remove(keyF.Name())
  168. os.Remove(crtF.Name())
  169. ob.Reset()
  170. eb.Reset()
  171. args = []string{"-version", "1", "-encrypt", "-name", "test", "-duration", "100m", "-groups", "1,2,3,4,5", "-out-crt", crtF.Name(), "-out-key", keyF.Name()}
  172. assert.Error(t, ca(args, ob, eb, errpw))
  173. assert.Equal(t, pwPromptOb, ob.String())
  174. assert.Equal(t, "", eb.String())
  175. // test when user fails to enter a password
  176. os.Remove(keyF.Name())
  177. os.Remove(crtF.Name())
  178. ob.Reset()
  179. eb.Reset()
  180. args = []string{"-version", "1", "-encrypt", "-name", "test", "-duration", "100m", "-groups", "1,2,3,4,5", "-out-crt", crtF.Name(), "-out-key", keyF.Name()}
  181. assert.EqualError(t, ca(args, ob, eb, nopw), "no passphrase specified, remove -encrypt flag to write out-key in plaintext")
  182. assert.Equal(t, strings.Repeat(pwPromptOb, 5), ob.String()) // prompts 5 times before giving up
  183. assert.Equal(t, "", eb.String())
  184. // create valid cert/key for overwrite tests
  185. os.Remove(keyF.Name())
  186. os.Remove(crtF.Name())
  187. ob.Reset()
  188. eb.Reset()
  189. args = []string{"-version", "1", "-name", "test", "-duration", "100m", "-groups", "1,, 2 , ,,,3,4,5", "-out-crt", crtF.Name(), "-out-key", keyF.Name()}
  190. assert.Nil(t, ca(args, ob, eb, nopw))
  191. // test that we won't overwrite existing certificate file
  192. ob.Reset()
  193. eb.Reset()
  194. args = []string{"-version", "1", "-name", "test", "-duration", "100m", "-groups", "1,, 2 , ,,,3,4,5", "-out-crt", crtF.Name(), "-out-key", keyF.Name()}
  195. assert.EqualError(t, ca(args, ob, eb, nopw), "refusing to overwrite existing CA key: "+keyF.Name())
  196. assert.Equal(t, "", ob.String())
  197. assert.Equal(t, "", eb.String())
  198. // test that we won't overwrite existing key file
  199. os.Remove(keyF.Name())
  200. ob.Reset()
  201. eb.Reset()
  202. args = []string{"-version", "1", "-name", "test", "-duration", "100m", "-groups", "1,, 2 , ,,,3,4,5", "-out-crt", crtF.Name(), "-out-key", keyF.Name()}
  203. assert.EqualError(t, ca(args, ob, eb, nopw), "refusing to overwrite existing CA cert: "+crtF.Name())
  204. assert.Equal(t, "", ob.String())
  205. assert.Equal(t, "", eb.String())
  206. os.Remove(keyF.Name())
  207. }