096445bc1c
Database opening usually dial and hence we should pass ctx to them. Change-Id: I1362783568f66383c46f07be7549327bb1aaa39e
213 lines
6.4 KiB
Go
213 lines
6.4 KiB
Go
// Copyright (C) 2019 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package certificate_test
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"net"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"go.uber.org/zap/zaptest"
|
|
|
|
"storj.io/common/identity"
|
|
"storj.io/common/identity/testidentity"
|
|
"storj.io/common/pb"
|
|
"storj.io/common/peertls/tlsopts"
|
|
"storj.io/common/pkcrypto"
|
|
"storj.io/common/rpc"
|
|
"storj.io/common/rpc/rpcpeer"
|
|
"storj.io/common/storj"
|
|
"storj.io/common/testcontext"
|
|
"storj.io/storj/certificate"
|
|
"storj.io/storj/certificate/authorization"
|
|
"storj.io/storj/certificate/certificateclient"
|
|
"storj.io/storj/pkg/server"
|
|
)
|
|
|
|
// TODO: test sad path.
|
|
func TestCertificateSigner_Sign_E2E(t *testing.T) {
|
|
testidentity.SignerVersionsTest(t, func(t *testing.T, _ storj.IDVersion, signer *identity.FullCertificateAuthority) {
|
|
testidentity.CompleteIdentityVersionsTest(t, func(t *testing.T, _ storj.IDVersion, serverIdent *identity.FullIdentity) {
|
|
testidentity.CompleteIdentityVersionsTest(t, func(t *testing.T, _ storj.IDVersion, clientIdent *identity.FullIdentity) {
|
|
ctx := testcontext.New(t)
|
|
defer ctx.Cleanup()
|
|
|
|
caCert := ctx.File("ca.cert")
|
|
caKey := ctx.File("ca.key")
|
|
userID := "user@mail.test"
|
|
signerCAConfig := identity.FullCAConfig{
|
|
CertPath: caCert,
|
|
KeyPath: caKey,
|
|
}
|
|
err := signerCAConfig.Save(signer)
|
|
require.NoError(t, err)
|
|
|
|
authorizationsCfg := authorization.DBConfig{
|
|
URL: "bolt://" + ctx.File("authorizations.db"),
|
|
}
|
|
|
|
authDB, err := authorization.OpenDBFromCfg(ctx, authorizationsCfg)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, authDB)
|
|
|
|
auths, err := authDB.Create(ctx, "user@mail.test", 1)
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, auths)
|
|
|
|
certificatesCfg := certificate.Config{
|
|
Signer: signerCAConfig,
|
|
Server: server.Config{
|
|
Address: "127.0.0.1:0",
|
|
PrivateAddress: "127.0.0.1:0",
|
|
Config: tlsopts.Config{
|
|
PeerIDVersions: "*",
|
|
},
|
|
},
|
|
AuthorizationAddr: "127.0.0.1:0",
|
|
}
|
|
|
|
peer, err := certificate.New(zaptest.NewLogger(t), serverIdent, signer, authDB, nil, &certificatesCfg)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, peer)
|
|
|
|
ctx.Go(func() error {
|
|
err := peer.Run(ctx)
|
|
assert.NoError(t, err)
|
|
return err
|
|
})
|
|
defer ctx.Check(peer.Close)
|
|
|
|
tlsOptions, err := tlsopts.NewOptions(clientIdent, tlsopts.Config{
|
|
PeerIDVersions: "*",
|
|
}, nil)
|
|
require.NoError(t, err)
|
|
|
|
dialer := rpc.NewDefaultDialer(tlsOptions)
|
|
|
|
client, err := certificateclient.New(ctx, dialer, peer.Server.Addr().String())
|
|
require.NoError(t, err)
|
|
require.NotNil(t, client)
|
|
defer ctx.Check(client.Close)
|
|
|
|
signedChainBytes, err := client.Sign(ctx, auths[0].Token.String())
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, signedChainBytes)
|
|
|
|
signedChain, err := pkcrypto.CertsFromDER(signedChainBytes)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, clientIdent.CA.RawTBSCertificate, signedChain[0].RawTBSCertificate)
|
|
assert.Equal(t, signer.Cert.Raw, signedChainBytes[1])
|
|
// TODO: test scenario with rest chain
|
|
// assert.Equal(t, signingCA.RawRestChain(), signedChainBytes[1:])
|
|
|
|
err = signedChain[0].CheckSignatureFrom(signer.Cert)
|
|
require.NoError(t, err)
|
|
|
|
err = peer.Close()
|
|
assert.NoError(t, err)
|
|
|
|
// NB: re-open after closing for server
|
|
authDB, err = authorization.OpenDBFromCfg(ctx, authorizationsCfg)
|
|
require.NoError(t, err)
|
|
defer ctx.Check(authDB.Close)
|
|
require.NotNil(t, authDB)
|
|
|
|
updatedAuths, err := authDB.Get(ctx, userID)
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, updatedAuths)
|
|
require.NotNil(t, updatedAuths[0].Claim)
|
|
|
|
now := time.Now().Unix()
|
|
claim := updatedAuths[0].Claim
|
|
|
|
listenerHost, _, err := net.SplitHostPort(peer.Server.Addr().String())
|
|
require.NoError(t, err)
|
|
claimHost, _, err := net.SplitHostPort(claim.Addr)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, listenerHost, claimHost)
|
|
assert.Equal(t, signedChainBytes, claim.SignedChainBytes)
|
|
assert.Condition(t, func() bool {
|
|
return now-10 < claim.Timestamp &&
|
|
claim.Timestamp < now+10
|
|
})
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestCertificateSigner_Sign(t *testing.T) {
|
|
testidentity.SignerVersionsTest(t, func(t *testing.T, _ storj.IDVersion, ca *identity.FullCertificateAuthority) {
|
|
testidentity.CompleteIdentityVersionsTest(t, func(t *testing.T, _ storj.IDVersion, ident *identity.FullIdentity) {
|
|
ctx := testcontext.New(t)
|
|
defer ctx.Cleanup()
|
|
|
|
userID := "user@mail.test"
|
|
// TODO: test with all types of authorization DBs (bolt, redis, etc.)
|
|
authDB, err := authorization.OpenDB(ctx, "bolt://"+ctx.File("authorizations.db"), false)
|
|
require.NoError(t, err)
|
|
defer ctx.Check(authDB.Close)
|
|
require.NotNil(t, authDB)
|
|
|
|
auths, err := authDB.Create(ctx, userID, 1)
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, auths)
|
|
|
|
expectedAddr := &net.TCPAddr{
|
|
IP: net.ParseIP("1.2.3.4"),
|
|
Port: 5,
|
|
}
|
|
peer := &rpcpeer.Peer{
|
|
Addr: expectedAddr,
|
|
State: tls.ConnectionState{
|
|
PeerCertificates: []*x509.Certificate{ident.Leaf, ident.CA},
|
|
},
|
|
}
|
|
peerCtx := rpcpeer.NewContext(ctx, peer)
|
|
|
|
certSigner := certificate.NewEndpoint(zaptest.NewLogger(t), ca, authDB, 0)
|
|
req := pb.SigningRequest{
|
|
Timestamp: time.Now().Unix(),
|
|
AuthToken: auths[0].Token.String(),
|
|
}
|
|
res, err := certSigner.Sign(peerCtx, &req)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, res)
|
|
require.NotEmpty(t, res.Chain)
|
|
|
|
signedChain, err := pkcrypto.CertsFromDER(res.Chain)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, ident.CA.RawTBSCertificate, signedChain[0].RawTBSCertificate)
|
|
assert.Equal(t, ca.Cert.Raw, signedChain[1].Raw)
|
|
// TODO: test scenario with rest chain
|
|
// assert.Equal(t, signingCA.RawRestChain(), res.Chain[1:])
|
|
|
|
err = signedChain[0].CheckSignatureFrom(ca.Cert)
|
|
require.NoError(t, err)
|
|
|
|
updatedAuths, err := authDB.Get(ctx, userID)
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, updatedAuths)
|
|
require.NotNil(t, updatedAuths[0].Claim)
|
|
|
|
claim := updatedAuths[0].Claim
|
|
assert.Equal(t, expectedAddr.String(), claim.Addr)
|
|
assert.Equal(t, res.Chain, claim.SignedChainBytes)
|
|
|
|
now := time.Now()
|
|
claimTime := time.Unix(claim.Timestamp, 0)
|
|
assert.Condition(t, func() bool {
|
|
return now.Sub(claimTime) < authorization.MaxClockSkew &&
|
|
claimTime.Sub(now) < authorization.MaxClockSkew
|
|
})
|
|
})
|
|
})
|
|
}
|