2
0

cert_v1_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. package cert
  2. import (
  3. "crypto/ed25519"
  4. "fmt"
  5. "net/netip"
  6. "testing"
  7. "time"
  8. "github.com/slackhq/nebula/test"
  9. "github.com/stretchr/testify/assert"
  10. "github.com/stretchr/testify/require"
  11. "google.golang.org/protobuf/proto"
  12. )
  13. func TestCertificateV1_Marshal(t *testing.T) {
  14. t.Parallel()
  15. before := time.Now().Add(time.Second * -60).Round(time.Second)
  16. after := time.Now().Add(time.Second * 60).Round(time.Second)
  17. pubKey := []byte("1234567890abcedfghij1234567890ab")
  18. nc := certificateV1{
  19. details: detailsV1{
  20. name: "testing",
  21. networks: []netip.Prefix{
  22. mustParsePrefixUnmapped("10.1.1.1/24"),
  23. mustParsePrefixUnmapped("10.1.1.2/16"),
  24. },
  25. unsafeNetworks: []netip.Prefix{
  26. mustParsePrefixUnmapped("9.1.1.2/24"),
  27. mustParsePrefixUnmapped("9.1.1.3/16"),
  28. },
  29. groups: []string{"test-group1", "test-group2", "test-group3"},
  30. notBefore: before,
  31. notAfter: after,
  32. publicKey: pubKey,
  33. isCA: false,
  34. issuer: "1234567890abcedfghij1234567890ab",
  35. },
  36. signature: []byte("1234567890abcedfghij1234567890ab"),
  37. }
  38. b, err := nc.Marshal()
  39. require.NoError(t, err)
  40. //t.Log("Cert size:", len(b))
  41. nc2, err := unmarshalCertificateV1(b, nil)
  42. require.NoError(t, err)
  43. assert.Equal(t, Version1, nc.Version())
  44. assert.Equal(t, Curve_CURVE25519, nc.Curve())
  45. assert.Equal(t, nc.Signature(), nc2.Signature())
  46. assert.Equal(t, nc.Name(), nc2.Name())
  47. assert.Equal(t, nc.NotBefore(), nc2.NotBefore())
  48. assert.Equal(t, nc.NotAfter(), nc2.NotAfter())
  49. assert.Equal(t, nc.PublicKey(), nc2.PublicKey())
  50. assert.Equal(t, nc.IsCA(), nc2.IsCA())
  51. assert.Equal(t, nc.Networks(), nc2.Networks())
  52. assert.Equal(t, nc.UnsafeNetworks(), nc2.UnsafeNetworks())
  53. assert.Equal(t, nc.Groups(), nc2.Groups())
  54. }
  55. func TestCertificateV1_PublicKeyPem(t *testing.T) {
  56. t.Parallel()
  57. before := time.Now().Add(time.Second * -60).Round(time.Second)
  58. after := time.Now().Add(time.Second * 60).Round(time.Second)
  59. pubKey := ed25519.PublicKey("1234567890abcedfghij1234567890ab")
  60. nc := certificateV1{
  61. details: detailsV1{
  62. name: "testing",
  63. networks: []netip.Prefix{},
  64. unsafeNetworks: []netip.Prefix{},
  65. groups: []string{"test-group1", "test-group2", "test-group3"},
  66. notBefore: before,
  67. notAfter: after,
  68. publicKey: pubKey,
  69. isCA: false,
  70. issuer: "1234567890abcedfghij1234567890ab",
  71. },
  72. signature: []byte("1234567890abcedfghij1234567890ab"),
  73. }
  74. assert.Equal(t, Version1, nc.Version())
  75. assert.Equal(t, Curve_CURVE25519, nc.Curve())
  76. pubPem := "-----BEGIN NEBULA X25519 PUBLIC KEY-----\nMTIzNDU2Nzg5MGFiY2VkZmdoaWoxMjM0NTY3ODkwYWI=\n-----END NEBULA X25519 PUBLIC KEY-----\n"
  77. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), pubPem)
  78. assert.False(t, nc.IsCA())
  79. nc.details.isCA = true
  80. assert.Equal(t, Curve_CURVE25519, nc.Curve())
  81. pubPem = "-----BEGIN NEBULA ED25519 PUBLIC KEY-----\nMTIzNDU2Nzg5MGFiY2VkZmdoaWoxMjM0NTY3ODkwYWI=\n-----END NEBULA ED25519 PUBLIC KEY-----\n"
  82. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), pubPem)
  83. assert.True(t, nc.IsCA())
  84. pubP256KeyPem := []byte(`-----BEGIN NEBULA P256 PUBLIC KEY-----
  85. AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  86. AAAAAAAAAAAAAAAAAAAAAAA=
  87. -----END NEBULA P256 PUBLIC KEY-----
  88. `)
  89. pubP256KeyPemCA := []byte(`-----BEGIN NEBULA ECDSA P256 PUBLIC KEY-----
  90. AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  91. AAAAAAAAAAAAAAAAAAAAAAA=
  92. -----END NEBULA ECDSA P256 PUBLIC KEY-----
  93. `)
  94. pubP256Key, _, _, err := UnmarshalPublicKeyFromPEM(pubP256KeyPem)
  95. require.NoError(t, err)
  96. nc.details.curve = Curve_P256
  97. nc.details.publicKey = pubP256Key
  98. assert.Equal(t, Curve_P256, nc.Curve())
  99. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), string(pubP256KeyPemCA))
  100. assert.True(t, nc.IsCA())
  101. nc.details.isCA = false
  102. assert.Equal(t, Curve_P256, nc.Curve())
  103. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), string(pubP256KeyPem))
  104. assert.False(t, nc.IsCA())
  105. }
  106. func TestCertificateV1_Expired(t *testing.T) {
  107. nc := certificateV1{
  108. details: detailsV1{
  109. notBefore: time.Now().Add(time.Second * -60).Round(time.Second),
  110. notAfter: time.Now().Add(time.Second * 60).Round(time.Second),
  111. },
  112. }
  113. assert.True(t, nc.Expired(time.Now().Add(time.Hour)))
  114. assert.True(t, nc.Expired(time.Now().Add(-time.Hour)))
  115. assert.False(t, nc.Expired(time.Now()))
  116. }
  117. func TestCertificateV1_MarshalJSON(t *testing.T) {
  118. time.Local = time.UTC
  119. pubKey := []byte("1234567890abcedfghij1234567890ab")
  120. nc := certificateV1{
  121. details: detailsV1{
  122. name: "testing",
  123. networks: []netip.Prefix{
  124. mustParsePrefixUnmapped("10.1.1.1/24"),
  125. mustParsePrefixUnmapped("10.1.1.2/16"),
  126. },
  127. unsafeNetworks: []netip.Prefix{
  128. mustParsePrefixUnmapped("9.1.1.2/24"),
  129. mustParsePrefixUnmapped("9.1.1.3/16"),
  130. },
  131. groups: []string{"test-group1", "test-group2", "test-group3"},
  132. notBefore: time.Date(1, 0, 0, 1, 0, 0, 0, time.UTC),
  133. notAfter: time.Date(1, 0, 0, 2, 0, 0, 0, time.UTC),
  134. publicKey: pubKey,
  135. isCA: false,
  136. issuer: "1234567890abcedfghij1234567890ab",
  137. },
  138. signature: []byte("1234567890abcedfghij1234567890ab"),
  139. }
  140. b, err := nc.MarshalJSON()
  141. require.NoError(t, err)
  142. assert.JSONEq(
  143. t,
  144. "{\"details\":{\"curve\":\"CURVE25519\",\"groups\":[\"test-group1\",\"test-group2\",\"test-group3\"],\"isCa\":false,\"issuer\":\"1234567890abcedfghij1234567890ab\",\"name\":\"testing\",\"networks\":[\"10.1.1.1/24\",\"10.1.1.2/16\"],\"notAfter\":\"0000-11-30T02:00:00Z\",\"notBefore\":\"0000-11-30T01:00:00Z\",\"publicKey\":\"313233343536373839306162636564666768696a313233343536373839306162\",\"unsafeNetworks\":[\"9.1.1.2/24\",\"9.1.1.3/16\"]},\"fingerprint\":\"3944c53d4267a229295b56cb2d27d459164c010ac97d655063ba421e0670f4ba\",\"signature\":\"313233343536373839306162636564666768696a313233343536373839306162\",\"version\":1}",
  145. string(b),
  146. )
  147. }
  148. func TestCertificateV1_VerifyPrivateKey(t *testing.T) {
  149. ca, _, caKey, _ := NewTestCaCert(Version1, Curve_CURVE25519, time.Time{}, time.Time{}, nil, nil, nil)
  150. err := ca.VerifyPrivateKey(Curve_CURVE25519, caKey)
  151. require.NoError(t, err)
  152. _, _, caKey2, _ := NewTestCaCert(Version1, Curve_CURVE25519, time.Time{}, time.Time{}, nil, nil, nil)
  153. require.NoError(t, err)
  154. err = ca.VerifyPrivateKey(Curve_CURVE25519, caKey2)
  155. require.Error(t, err)
  156. c, _, priv, _ := NewTestCert(Version1, Curve_CURVE25519, ca, caKey, "test", time.Time{}, time.Time{}, nil, nil, nil)
  157. rawPriv, b, curve, err := UnmarshalPrivateKeyFromPEM(priv)
  158. require.NoError(t, err)
  159. assert.Empty(t, b)
  160. assert.Equal(t, Curve_CURVE25519, curve)
  161. err = c.VerifyPrivateKey(Curve_CURVE25519, rawPriv)
  162. require.NoError(t, err)
  163. _, priv2 := X25519Keypair()
  164. err = c.VerifyPrivateKey(Curve_CURVE25519, priv2)
  165. require.Error(t, err)
  166. }
  167. func TestCertificateV1_VerifyPrivateKeyP256(t *testing.T) {
  168. ca, _, caKey, _ := NewTestCaCert(Version1, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  169. err := ca.VerifyPrivateKey(Curve_P256, caKey)
  170. require.NoError(t, err)
  171. _, _, caKey2, _ := NewTestCaCert(Version1, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  172. require.NoError(t, err)
  173. err = ca.VerifyPrivateKey(Curve_P256, caKey2)
  174. require.Error(t, err)
  175. c, _, priv, _ := NewTestCert(Version1, Curve_P256, ca, caKey, "test", time.Time{}, time.Time{}, nil, nil, nil)
  176. rawPriv, b, curve, err := UnmarshalPrivateKeyFromPEM(priv)
  177. require.NoError(t, err)
  178. assert.Empty(t, b)
  179. assert.Equal(t, Curve_P256, curve)
  180. err = c.VerifyPrivateKey(Curve_P256, rawPriv)
  181. require.NoError(t, err)
  182. _, priv2 := P256Keypair()
  183. err = c.VerifyPrivateKey(Curve_P256, priv2)
  184. require.Error(t, err)
  185. }
  186. // Ensure that upgrading the protobuf library does not change how certificates
  187. // are marshalled, since this would break signature verification
  188. func TestMarshalingCertificateV1Consistency(t *testing.T) {
  189. before := time.Date(1970, time.January, 1, 1, 1, 1, 1, time.UTC)
  190. after := time.Date(9999, time.January, 1, 1, 1, 1, 1, time.UTC)
  191. pubKey := []byte("1234567890abcedfghij1234567890ab")
  192. nc := certificateV1{
  193. details: detailsV1{
  194. name: "testing",
  195. networks: []netip.Prefix{
  196. mustParsePrefixUnmapped("10.1.1.2/16"),
  197. mustParsePrefixUnmapped("10.1.1.1/24"),
  198. },
  199. unsafeNetworks: []netip.Prefix{
  200. mustParsePrefixUnmapped("9.1.1.3/16"),
  201. mustParsePrefixUnmapped("9.1.1.2/24"),
  202. },
  203. groups: []string{"test-group1", "test-group2", "test-group3"},
  204. notBefore: before,
  205. notAfter: after,
  206. publicKey: pubKey,
  207. isCA: false,
  208. issuer: "1234567890abcedfghij1234567890ab",
  209. },
  210. signature: []byte("1234567890abcedfghij1234567890ab"),
  211. }
  212. b, err := nc.Marshal()
  213. require.NoError(t, err)
  214. assert.Equal(t, "0a8e010a0774657374696e671212828284508080fcff0f8182845080feffff0f1a12838284488080fcff0f8282844880feffff0f220b746573742d67726f757031220b746573742d67726f757032220b746573742d67726f75703328cd1c30cdb8ccf0af073a20313233343536373839306162636564666768696a3132333435363738393061624a081234567890abcedf1220313233343536373839306162636564666768696a313233343536373839306162", fmt.Sprintf("%x", b))
  215. b, err = proto.Marshal(nc.getRawDetails())
  216. require.NoError(t, err)
  217. assert.Equal(t, "0a0774657374696e671212828284508080fcff0f8182845080feffff0f1a12838284488080fcff0f8282844880feffff0f220b746573742d67726f757031220b746573742d67726f757032220b746573742d67726f75703328cd1c30cdb8ccf0af073a20313233343536373839306162636564666768696a3132333435363738393061624a081234567890abcedf", fmt.Sprintf("%x", b))
  218. }
  219. func TestCertificateV1_Copy(t *testing.T) {
  220. ca, _, caKey, _ := NewTestCaCert(Version1, Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, nil)
  221. c, _, _, _ := NewTestCert(Version1, Curve_CURVE25519, ca, caKey, "test", time.Now(), time.Now().Add(5*time.Minute), nil, nil, nil)
  222. cc := c.Copy()
  223. test.AssertDeepCopyEqual(t, c, cc)
  224. }
  225. func TestUnmarshalCertificateV1(t *testing.T) {
  226. // Test that we don't panic with an invalid certificate (#332)
  227. data := []byte("\x98\x00\x00")
  228. _, err := unmarshalCertificateV1(data, nil)
  229. require.EqualError(t, err, "encoded Details was nil")
  230. }
  231. func appendByteSlices(b ...[]byte) []byte {
  232. retSlice := []byte{}
  233. for _, v := range b {
  234. retSlice = append(retSlice, v...)
  235. }
  236. return retSlice
  237. }
  238. func mustParsePrefixUnmapped(s string) netip.Prefix {
  239. prefix := netip.MustParsePrefix(s)
  240. return netip.PrefixFrom(prefix.Addr().Unmap(), prefix.Bits())
  241. }