verify_test.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. package main
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "errors"
  6. "os"
  7. "testing"
  8. "time"
  9. "github.com/slackhq/nebula/cert"
  10. "github.com/stretchr/testify/assert"
  11. "golang.org/x/crypto/ed25519"
  12. )
  13. func Test_verifySummary(t *testing.T) {
  14. assert.Equal(t, "verify <flags>: verifies a certificate isn't expired and was signed by a trusted authority.", verifySummary())
  15. }
  16. func Test_verifyHelp(t *testing.T) {
  17. ob := &bytes.Buffer{}
  18. verifyHelp(ob)
  19. assert.Equal(
  20. t,
  21. "Usage of "+os.Args[0]+" verify <flags>: verifies a certificate isn't expired and was signed by a trusted authority.\n"+
  22. " -ca string\n"+
  23. " \tRequired: path to a file containing one or more ca certificates\n"+
  24. " -crt string\n"+
  25. " \tRequired: path to a file containing a single certificate\n",
  26. ob.String(),
  27. )
  28. }
  29. func Test_verify(t *testing.T) {
  30. time.Local = time.UTC
  31. ob := &bytes.Buffer{}
  32. eb := &bytes.Buffer{}
  33. // required args
  34. assertHelpError(t, verify([]string{"-ca", "derp"}, ob, eb), "-crt is required")
  35. assert.Equal(t, "", ob.String())
  36. assert.Equal(t, "", eb.String())
  37. assertHelpError(t, verify([]string{"-crt", "derp"}, ob, eb), "-ca is required")
  38. assert.Equal(t, "", ob.String())
  39. assert.Equal(t, "", eb.String())
  40. // no ca at path
  41. ob.Reset()
  42. eb.Reset()
  43. err := verify([]string{"-ca", "does_not_exist", "-crt", "does_not_exist"}, ob, eb)
  44. assert.Equal(t, "", ob.String())
  45. assert.Equal(t, "", eb.String())
  46. assert.EqualError(t, err, "error while reading ca: open does_not_exist: "+NoSuchFileError)
  47. // invalid ca at path
  48. ob.Reset()
  49. eb.Reset()
  50. caFile, err := os.CreateTemp("", "verify-ca")
  51. assert.Nil(t, err)
  52. defer os.Remove(caFile.Name())
  53. caFile.WriteString("-----BEGIN NOPE-----")
  54. err = verify([]string{"-ca", caFile.Name(), "-crt", "does_not_exist"}, ob, eb)
  55. assert.Equal(t, "", ob.String())
  56. assert.Equal(t, "", eb.String())
  57. assert.EqualError(t, err, "error while adding ca cert to pool: input did not contain a valid PEM encoded block")
  58. // make a ca for later
  59. caPub, caPriv, _ := ed25519.GenerateKey(rand.Reader)
  60. ca, _ := NewTestCaCert("test-ca", caPub, caPriv, time.Now().Add(time.Hour*-1), time.Now().Add(time.Hour*2), nil, nil, nil)
  61. b, _ := ca.MarshalPEM()
  62. caFile.Truncate(0)
  63. caFile.Seek(0, 0)
  64. caFile.Write(b)
  65. // no crt at path
  66. err = verify([]string{"-ca", caFile.Name(), "-crt", "does_not_exist"}, ob, eb)
  67. assert.Equal(t, "", ob.String())
  68. assert.Equal(t, "", eb.String())
  69. assert.EqualError(t, err, "unable to read crt: open does_not_exist: "+NoSuchFileError)
  70. // invalid crt at path
  71. ob.Reset()
  72. eb.Reset()
  73. certFile, err := os.CreateTemp("", "verify-cert")
  74. assert.Nil(t, err)
  75. defer os.Remove(certFile.Name())
  76. certFile.WriteString("-----BEGIN NOPE-----")
  77. err = verify([]string{"-ca", caFile.Name(), "-crt", certFile.Name()}, ob, eb)
  78. assert.Equal(t, "", ob.String())
  79. assert.Equal(t, "", eb.String())
  80. assert.EqualError(t, err, "error while parsing crt: input did not contain a valid PEM encoded block")
  81. // unverifiable cert at path
  82. crt, _ := NewTestCert(ca, caPriv, "test-cert", time.Now().Add(time.Hour*-1), time.Now().Add(time.Hour), nil, nil, nil)
  83. // Slightly evil hack to modify the certificate after it was sealed to generate an invalid signature
  84. pub := crt.PublicKey()
  85. for i, _ := range pub {
  86. pub[i] = 0
  87. }
  88. b, _ = crt.MarshalPEM()
  89. certFile.Truncate(0)
  90. certFile.Seek(0, 0)
  91. certFile.Write(b)
  92. err = verify([]string{"-ca", caFile.Name(), "-crt", certFile.Name()}, ob, eb)
  93. assert.Equal(t, "", ob.String())
  94. assert.Equal(t, "", eb.String())
  95. assert.True(t, errors.Is(err, cert.ErrSignatureMismatch))
  96. // verified cert at path
  97. crt, _ = NewTestCert(ca, caPriv, "test-cert", time.Now().Add(time.Hour*-1), time.Now().Add(time.Hour), nil, nil, nil)
  98. b, _ = crt.MarshalPEM()
  99. certFile.Truncate(0)
  100. certFile.Seek(0, 0)
  101. certFile.Write(b)
  102. err = verify([]string{"-ca", caFile.Name(), "-crt", certFile.Name()}, ob, eb)
  103. assert.Equal(t, "", ob.String())
  104. assert.Equal(t, "", eb.String())
  105. assert.Nil(t, err)
  106. }