verify_test.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141
  1. package main
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "os"
  6. "testing"
  7. "time"
  8. "github.com/slackhq/nebula/cert"
  9. "github.com/stretchr/testify/assert"
  10. "golang.org/x/crypto/ed25519"
  11. )
  12. func Test_verifySummary(t *testing.T) {
  13. assert.Equal(t, "verify <flags>: verifies a certificate isn't expired and was signed by a trusted authority.", verifySummary())
  14. }
  15. func Test_verifyHelp(t *testing.T) {
  16. ob := &bytes.Buffer{}
  17. verifyHelp(ob)
  18. assert.Equal(
  19. t,
  20. "Usage of "+os.Args[0]+" verify <flags>: verifies a certificate isn't expired and was signed by a trusted authority.\n"+
  21. " -ca string\n"+
  22. " \tRequired: path to a file containing one or more ca certificates\n"+
  23. " -crt string\n"+
  24. " \tRequired: path to a file containing a single certificate\n",
  25. ob.String(),
  26. )
  27. }
  28. func Test_verify(t *testing.T) {
  29. time.Local = time.UTC
  30. ob := &bytes.Buffer{}
  31. eb := &bytes.Buffer{}
  32. // required args
  33. assertHelpError(t, verify([]string{"-ca", "derp"}, ob, eb), "-crt is required")
  34. assert.Equal(t, "", ob.String())
  35. assert.Equal(t, "", eb.String())
  36. assertHelpError(t, verify([]string{"-crt", "derp"}, ob, eb), "-ca is required")
  37. assert.Equal(t, "", ob.String())
  38. assert.Equal(t, "", eb.String())
  39. // no ca at path
  40. ob.Reset()
  41. eb.Reset()
  42. err := verify([]string{"-ca", "does_not_exist", "-crt", "does_not_exist"}, ob, eb)
  43. assert.Equal(t, "", ob.String())
  44. assert.Equal(t, "", eb.String())
  45. assert.EqualError(t, err, "error while reading ca: open does_not_exist: "+NoSuchFileError)
  46. // invalid ca at path
  47. ob.Reset()
  48. eb.Reset()
  49. caFile, err := os.CreateTemp("", "verify-ca")
  50. assert.Nil(t, err)
  51. defer os.Remove(caFile.Name())
  52. caFile.WriteString("-----BEGIN NOPE-----")
  53. err = verify([]string{"-ca", caFile.Name(), "-crt", "does_not_exist"}, ob, eb)
  54. assert.Equal(t, "", ob.String())
  55. assert.Equal(t, "", eb.String())
  56. assert.EqualError(t, err, "error while adding ca cert to pool: input did not contain a valid PEM encoded block")
  57. // make a ca for later
  58. caPub, caPriv, _ := ed25519.GenerateKey(rand.Reader)
  59. ca := cert.NebulaCertificate{
  60. Details: cert.NebulaCertificateDetails{
  61. Name: "test-ca",
  62. NotBefore: time.Now().Add(time.Hour * -1),
  63. NotAfter: time.Now().Add(time.Hour * 2),
  64. PublicKey: caPub,
  65. IsCA: true,
  66. },
  67. }
  68. ca.Sign(cert.Curve_CURVE25519, caPriv)
  69. b, _ := ca.MarshalToPEM()
  70. caFile.Truncate(0)
  71. caFile.Seek(0, 0)
  72. caFile.Write(b)
  73. // no crt at path
  74. err = verify([]string{"-ca", caFile.Name(), "-crt", "does_not_exist"}, ob, eb)
  75. assert.Equal(t, "", ob.String())
  76. assert.Equal(t, "", eb.String())
  77. assert.EqualError(t, err, "unable to read crt; open does_not_exist: "+NoSuchFileError)
  78. // invalid crt at path
  79. ob.Reset()
  80. eb.Reset()
  81. certFile, err := os.CreateTemp("", "verify-cert")
  82. assert.Nil(t, err)
  83. defer os.Remove(certFile.Name())
  84. certFile.WriteString("-----BEGIN NOPE-----")
  85. err = verify([]string{"-ca", caFile.Name(), "-crt", certFile.Name()}, ob, eb)
  86. assert.Equal(t, "", ob.String())
  87. assert.Equal(t, "", eb.String())
  88. assert.EqualError(t, err, "error while parsing crt: input did not contain a valid PEM encoded block")
  89. // unverifiable cert at path
  90. _, badPriv, _ := ed25519.GenerateKey(rand.Reader)
  91. certPub, _ := x25519Keypair()
  92. signer, _ := ca.Sha256Sum()
  93. crt := cert.NebulaCertificate{
  94. Details: cert.NebulaCertificateDetails{
  95. Name: "test-cert",
  96. NotBefore: time.Now().Add(time.Hour * -1),
  97. NotAfter: time.Now().Add(time.Hour),
  98. PublicKey: certPub,
  99. IsCA: false,
  100. Issuer: signer,
  101. },
  102. }
  103. crt.Sign(cert.Curve_CURVE25519, badPriv)
  104. b, _ = crt.MarshalToPEM()
  105. certFile.Truncate(0)
  106. certFile.Seek(0, 0)
  107. certFile.Write(b)
  108. err = verify([]string{"-ca", caFile.Name(), "-crt", certFile.Name()}, ob, eb)
  109. assert.Equal(t, "", ob.String())
  110. assert.Equal(t, "", eb.String())
  111. assert.EqualError(t, err, "certificate signature did not match")
  112. // verified cert at path
  113. crt.Sign(cert.Curve_CURVE25519, caPriv)
  114. b, _ = crt.MarshalToPEM()
  115. certFile.Truncate(0)
  116. certFile.Seek(0, 0)
  117. certFile.Write(b)
  118. err = verify([]string{"-ca", caFile.Name(), "-crt", certFile.Name()}, ob, eb)
  119. assert.Equal(t, "", ob.String())
  120. assert.Equal(t, "", eb.String())
  121. assert.Nil(t, err)
  122. }