2017-03-13 15:20:41 +00:00
|
|
|
import os
|
2017-04-25 10:06:59 +00:00
|
|
|
import requests
|
2017-04-25 10:52:10 +00:00
|
|
|
from falcon import testing
|
2015-09-09 05:31:48 +00:00
|
|
|
from click.testing import CliRunner
|
|
|
|
from certidude.cli import entry_point as cli
|
2016-09-18 15:30:31 +00:00
|
|
|
from datetime import datetime, timedelta
|
2017-03-13 15:20:41 +00:00
|
|
|
from cryptography.hazmat.primitives import hashes, serialization
|
|
|
|
from cryptography.x509.oid import NameOID
|
2017-04-25 10:52:10 +00:00
|
|
|
import pytest
|
2017-04-25 10:06:59 +00:00
|
|
|
from xattr import setxattr
|
2015-09-09 05:31:48 +00:00
|
|
|
|
|
|
|
runner = CliRunner()
|
|
|
|
|
2017-04-25 10:52:10 +00:00
|
|
|
@pytest.fixture(scope='module')
|
|
|
|
def client():
|
|
|
|
from certidude.api import certidude_app
|
|
|
|
return testing.TestClient(certidude_app())
|
|
|
|
|
|
|
|
|
2015-09-29 11:44:31 +00:00
|
|
|
def test_cli_setup_authority():
|
2016-09-18 15:30:31 +00:00
|
|
|
result = runner.invoke(cli, ['setup', 'authority'])
|
|
|
|
assert not result.exception
|
2017-03-13 15:20:41 +00:00
|
|
|
from certidude import const, config
|
2015-09-09 05:31:48 +00:00
|
|
|
|
2016-09-18 15:30:31 +00:00
|
|
|
from certidude import authority
|
2017-03-26 20:44:47 +00:00
|
|
|
assert authority.ca_cert.serial_number >= 0x100000000000000000000000000000000000000
|
|
|
|
assert authority.ca_cert.serial_number <= 0xfffffffffffffffffffffffffffffffffffffff
|
2017-03-13 15:20:41 +00:00
|
|
|
assert authority.ca_cert.not_valid_before < datetime.now()
|
|
|
|
assert authority.ca_cert.not_valid_after > datetime.now() + timedelta(days=7000)
|
|
|
|
|
2017-04-25 10:52:10 +00:00
|
|
|
# Try starting up forked server
|
|
|
|
result = runner.invoke(cli, ['serve', '-f', '-p', '8080'])
|
|
|
|
assert not result.exception
|
2017-03-13 15:20:41 +00:00
|
|
|
|
|
|
|
from cryptography import x509
|
|
|
|
from cryptography.hazmat.primitives.asymmetric import rsa, padding
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
key = rsa.generate_private_key(
|
|
|
|
public_exponent=65537,
|
|
|
|
key_size=4096,
|
|
|
|
backend=default_backend()
|
|
|
|
)
|
2015-09-09 05:31:48 +00:00
|
|
|
|
2017-03-13 15:20:41 +00:00
|
|
|
csr = x509.CertificateSigningRequestBuilder(
|
|
|
|
).subject_name(x509.Name([x509.NameAttribute(NameOID.COMMON_NAME, u"test")]))
|
|
|
|
|
2017-03-13 15:54:33 +00:00
|
|
|
authority.store_request(
|
|
|
|
csr.sign(key, hashes.SHA256(), default_backend()).public_bytes(serialization.Encoding.PEM))
|
2017-03-13 15:20:41 +00:00
|
|
|
|
2017-04-25 10:06:59 +00:00
|
|
|
# Check that we can retrieve empty CRL
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/revoked/")
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 200
|
|
|
|
|
2017-03-26 21:16:01 +00:00
|
|
|
result = runner.invoke(cli, ['list', '-srv'])
|
|
|
|
assert not result.exception
|
|
|
|
|
2017-03-13 15:20:41 +00:00
|
|
|
result = runner.invoke(cli, ['sign', 'test', '-o'])
|
|
|
|
assert not result.exception
|
|
|
|
|
|
|
|
result = runner.invoke(cli, ['revoke', 'test'])
|
|
|
|
assert not result.exception
|
2017-03-13 15:54:33 +00:00
|
|
|
|
|
|
|
authority.generate_ovpn_bundle(u"test2")
|
|
|
|
authority.generate_pkcs12_bundle(u"test3")
|
2017-03-26 20:45:08 +00:00
|
|
|
|
|
|
|
result = runner.invoke(cli, ['list', '-srv'])
|
|
|
|
assert not result.exception
|
2017-03-26 21:16:01 +00:00
|
|
|
|
|
|
|
result = runner.invoke(cli, ['cron'])
|
|
|
|
assert not result.exception
|
2017-04-25 10:06:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
# Test CA certificate fetch
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/certificate")
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 200
|
|
|
|
assert r.headers.get('content-type') == "application/x-x509-ca-cert"
|
|
|
|
|
|
|
|
|
|
|
|
# Test signed certificate API call
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/signed/test2")
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 200
|
|
|
|
assert r.headers.get('content-type') == "application/x-pem-file"
|
|
|
|
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/signed/test2", headers={"Accept":"application/json"})
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 200
|
|
|
|
assert r.headers.get('content-type') == "application/json"
|
|
|
|
|
|
|
|
|
|
|
|
# Test revocations API call
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/revoked")
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 200
|
|
|
|
assert r.headers.get('content-type') == "application/x-pkcs7-crl"
|
|
|
|
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/revoked",
|
2017-04-25 10:06:59 +00:00
|
|
|
headers={"Accept":"application/x-pem-file"})
|
|
|
|
assert r.status_code == 200
|
|
|
|
assert r.headers.get('content-type') == "application/x-pem-file"
|
|
|
|
|
|
|
|
# Test attribute fetching API call
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/signed/test2/attr/")
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 403
|
|
|
|
|
|
|
|
path, _, _ = authority.get_signed("test2")
|
|
|
|
setxattr(path, "user.lease.address", b"127.0.0.1")
|
|
|
|
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/signed/test2/attr/")
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 200
|
|
|
|
|
|
|
|
# Tags should not be visible anonymously
|
2017-04-25 10:52:10 +00:00
|
|
|
r = client().simulate_get("/api/signed/test2/tag/")
|
2017-04-25 10:06:59 +00:00
|
|
|
assert r.status_code == 401
|
|
|
|
|
|
|
|
|
|
|
|
# Revoke all valid ones
|
|
|
|
result = runner.invoke(cli, ['revoke', 'test2'])
|
|
|
|
assert not result.exception
|
|
|
|
|
|
|
|
result = runner.invoke(cli, ['revoke', 'test3'])
|
|
|
|
assert not result.exception
|
2017-04-25 10:52:10 +00:00
|
|
|
|
|
|
|
|
|
|
|
|