cert_v2_test.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226
  1. package cert
  2. import (
  3. "crypto/ed25519"
  4. "crypto/rand"
  5. "net/netip"
  6. "slices"
  7. "testing"
  8. "time"
  9. "github.com/slackhq/nebula/test"
  10. "github.com/stretchr/testify/assert"
  11. "github.com/stretchr/testify/require"
  12. )
  13. func TestCertificateV2_Marshal(t *testing.T) {
  14. before := time.Now().Add(time.Second * -60).Round(time.Second)
  15. after := time.Now().Add(time.Second * 60).Round(time.Second)
  16. pubKey := []byte("1234567890abcedfghij1234567890ab")
  17. nc := certificateV2{
  18. details: detailsV2{
  19. name: "testing",
  20. networks: []netip.Prefix{
  21. mustParsePrefixUnmapped("10.1.1.2/16"),
  22. mustParsePrefixUnmapped("10.1.1.1/24"),
  23. },
  24. unsafeNetworks: []netip.Prefix{
  25. mustParsePrefixUnmapped("9.1.1.3/16"),
  26. mustParsePrefixUnmapped("9.1.1.2/24"),
  27. },
  28. groups: []string{"test-group1", "test-group2", "test-group3"},
  29. notBefore: before,
  30. notAfter: after,
  31. isCA: false,
  32. issuer: "1234567890abcdef1234567890abcdef",
  33. },
  34. signature: []byte("1234567890abcdef1234567890abcdef"),
  35. publicKey: pubKey,
  36. }
  37. db, err := nc.details.Marshal()
  38. require.NoError(t, err)
  39. nc.rawDetails = db
  40. b, err := nc.Marshal()
  41. require.Nil(t, err)
  42. //t.Log("Cert size:", len(b))
  43. nc2, err := unmarshalCertificateV2(b, nil, Curve_CURVE25519)
  44. assert.Nil(t, err)
  45. assert.Equal(t, nc.Version(), Version2)
  46. assert.Equal(t, nc.Curve(), Curve_CURVE25519)
  47. assert.Equal(t, nc.Signature(), nc2.Signature())
  48. assert.Equal(t, nc.Name(), nc2.Name())
  49. assert.Equal(t, nc.NotBefore(), nc2.NotBefore())
  50. assert.Equal(t, nc.NotAfter(), nc2.NotAfter())
  51. assert.Equal(t, nc.PublicKey(), nc2.PublicKey())
  52. assert.Equal(t, nc.IsCA(), nc2.IsCA())
  53. assert.Equal(t, nc.Issuer(), nc2.Issuer())
  54. // unmarshalling will sort networks and unsafeNetworks, we need to do the same
  55. // but first make sure it fails
  56. assert.NotEqual(t, nc.Networks(), nc2.Networks())
  57. assert.NotEqual(t, nc.UnsafeNetworks(), nc2.UnsafeNetworks())
  58. slices.SortFunc(nc.details.networks, comparePrefix)
  59. slices.SortFunc(nc.details.unsafeNetworks, comparePrefix)
  60. assert.Equal(t, nc.Networks(), nc2.Networks())
  61. assert.Equal(t, nc.UnsafeNetworks(), nc2.UnsafeNetworks())
  62. assert.Equal(t, nc.Groups(), nc2.Groups())
  63. }
  64. func TestCertificateV2_Expired(t *testing.T) {
  65. nc := certificateV2{
  66. details: detailsV2{
  67. notBefore: time.Now().Add(time.Second * -60).Round(time.Second),
  68. notAfter: time.Now().Add(time.Second * 60).Round(time.Second),
  69. },
  70. }
  71. assert.True(t, nc.Expired(time.Now().Add(time.Hour)))
  72. assert.True(t, nc.Expired(time.Now().Add(-time.Hour)))
  73. assert.False(t, nc.Expired(time.Now()))
  74. }
  75. func TestCertificateV2_MarshalJSON(t *testing.T) {
  76. time.Local = time.UTC
  77. pubKey := []byte("1234567890abcedf1234567890abcedf")
  78. nc := certificateV2{
  79. details: detailsV2{
  80. name: "testing",
  81. networks: []netip.Prefix{
  82. mustParsePrefixUnmapped("10.1.1.1/24"),
  83. mustParsePrefixUnmapped("10.1.1.2/16"),
  84. },
  85. unsafeNetworks: []netip.Prefix{
  86. mustParsePrefixUnmapped("9.1.1.2/24"),
  87. mustParsePrefixUnmapped("9.1.1.3/16"),
  88. },
  89. groups: []string{"test-group1", "test-group2", "test-group3"},
  90. notBefore: time.Date(1, 0, 0, 1, 0, 0, 0, time.UTC),
  91. notAfter: time.Date(1, 0, 0, 2, 0, 0, 0, time.UTC),
  92. isCA: false,
  93. issuer: "1234567890abcedf1234567890abcedf",
  94. },
  95. publicKey: pubKey,
  96. signature: []byte("1234567890abcedf1234567890abcedf1234567890abcedf1234567890abcedf"),
  97. }
  98. b, err := nc.MarshalJSON()
  99. assert.ErrorIs(t, err, ErrMissingDetails)
  100. rd, err := nc.details.Marshal()
  101. assert.NoError(t, err)
  102. nc.rawDetails = rd
  103. b, err = nc.MarshalJSON()
  104. assert.Nil(t, err)
  105. assert.Equal(
  106. t,
  107. "{\"curve\":\"CURVE25519\",\"details\":{\"groups\":[\"test-group1\",\"test-group2\",\"test-group3\"],\"isCa\":false,\"issuer\":\"1234567890abcedf1234567890abcedf\",\"name\":\"testing\",\"networks\":[\"10.1.1.1/24\",\"10.1.1.2/16\"],\"notAfter\":\"0000-11-30T02:00:00Z\",\"notBefore\":\"0000-11-30T01:00:00Z\",\"unsafeNetworks\":[\"9.1.1.2/24\",\"9.1.1.3/16\"]},\"fingerprint\":\"152d9a7400c1e001cb76cffd035215ebb351f69eeb797f7f847dd086e15e56dd\",\"publicKey\":\"3132333435363738393061626365646631323334353637383930616263656466\",\"signature\":\"31323334353637383930616263656466313233343536373839306162636564663132333435363738393061626365646631323334353637383930616263656466\",\"version\":2}",
  108. string(b),
  109. )
  110. }
  111. func TestCertificateV2_VerifyPrivateKey(t *testing.T) {
  112. ca, _, caKey, _ := NewTestCaCert(Version2, Curve_CURVE25519, time.Time{}, time.Time{}, nil, nil, nil)
  113. err := ca.VerifyPrivateKey(Curve_CURVE25519, caKey)
  114. assert.Nil(t, err)
  115. err = ca.VerifyPrivateKey(Curve_CURVE25519, caKey[:16])
  116. assert.ErrorIs(t, err, ErrInvalidPrivateKey)
  117. _, caKey2, err := ed25519.GenerateKey(rand.Reader)
  118. require.Nil(t, err)
  119. err = ca.VerifyPrivateKey(Curve_CURVE25519, caKey2)
  120. assert.ErrorIs(t, err, ErrPublicPrivateKeyMismatch)
  121. c, _, priv, _ := NewTestCert(Version2, Curve_CURVE25519, ca, caKey, "test", time.Time{}, time.Time{}, nil, nil, nil)
  122. rawPriv, b, curve, err := UnmarshalPrivateKeyFromPEM(priv)
  123. assert.NoError(t, err)
  124. assert.Empty(t, b)
  125. assert.Equal(t, Curve_CURVE25519, curve)
  126. err = c.VerifyPrivateKey(Curve_CURVE25519, rawPriv)
  127. assert.Nil(t, err)
  128. _, priv2 := X25519Keypair()
  129. err = c.VerifyPrivateKey(Curve_P256, priv2)
  130. assert.ErrorIs(t, err, ErrPublicPrivateCurveMismatch)
  131. err = c.VerifyPrivateKey(Curve_CURVE25519, priv2)
  132. assert.ErrorIs(t, err, ErrPublicPrivateKeyMismatch)
  133. err = c.VerifyPrivateKey(Curve_CURVE25519, priv2[:16])
  134. assert.ErrorIs(t, err, ErrInvalidPrivateKey)
  135. ac, ok := c.(*certificateV2)
  136. require.True(t, ok)
  137. ac.curve = Curve(99)
  138. err = c.VerifyPrivateKey(Curve(99), priv2)
  139. assert.EqualError(t, err, "invalid curve: 99")
  140. ca2, _, caKey2, _ := NewTestCaCert(Version2, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  141. err = ca.VerifyPrivateKey(Curve_CURVE25519, caKey)
  142. assert.Nil(t, err)
  143. err = ca2.VerifyPrivateKey(Curve_P256, caKey2[:16])
  144. assert.ErrorIs(t, err, ErrInvalidPrivateKey)
  145. c, _, priv, _ = NewTestCert(Version2, Curve_P256, ca2, caKey2, "test", time.Time{}, time.Time{}, nil, nil, nil)
  146. rawPriv, b, curve, err = UnmarshalPrivateKeyFromPEM(priv)
  147. err = c.VerifyPrivateKey(Curve_P256, priv[:16])
  148. assert.ErrorIs(t, err, ErrInvalidPrivateKey)
  149. err = c.VerifyPrivateKey(Curve_P256, priv)
  150. assert.ErrorIs(t, err, ErrInvalidPrivateKey)
  151. aCa, ok := ca2.(*certificateV2)
  152. require.True(t, ok)
  153. aCa.curve = Curve(99)
  154. err = aCa.VerifyPrivateKey(Curve(99), priv2)
  155. assert.EqualError(t, err, "invalid curve: 99")
  156. }
  157. func TestCertificateV2_VerifyPrivateKeyP256(t *testing.T) {
  158. ca, _, caKey, _ := NewTestCaCert(Version2, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  159. err := ca.VerifyPrivateKey(Curve_P256, caKey)
  160. assert.Nil(t, err)
  161. _, _, caKey2, _ := NewTestCaCert(Version2, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  162. assert.Nil(t, err)
  163. err = ca.VerifyPrivateKey(Curve_P256, caKey2)
  164. assert.NotNil(t, err)
  165. c, _, priv, _ := NewTestCert(Version2, Curve_P256, ca, caKey, "test", time.Time{}, time.Time{}, nil, nil, nil)
  166. rawPriv, b, curve, err := UnmarshalPrivateKeyFromPEM(priv)
  167. assert.NoError(t, err)
  168. assert.Empty(t, b)
  169. assert.Equal(t, Curve_P256, curve)
  170. err = c.VerifyPrivateKey(Curve_P256, rawPriv)
  171. assert.Nil(t, err)
  172. _, priv2 := P256Keypair()
  173. err = c.VerifyPrivateKey(Curve_P256, priv2)
  174. assert.NotNil(t, err)
  175. }
  176. func TestCertificateV2_Copy(t *testing.T) {
  177. ca, _, caKey, _ := NewTestCaCert(Version2, Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, nil)
  178. c, _, _, _ := NewTestCert(Version2, Curve_CURVE25519, ca, caKey, "test", time.Now(), time.Now().Add(5*time.Minute), nil, nil, nil)
  179. cc := c.Copy()
  180. test.AssertDeepCopyEqual(t, c, cc)
  181. }
  182. func TestUnmarshalCertificateV2(t *testing.T) {
  183. data := []byte("\x98\x00\x00")
  184. _, err := unmarshalCertificateV2(data, nil, Curve_CURVE25519)
  185. assert.EqualError(t, err, "bad wire format")
  186. }