github.com/Venafi/vcert/v5@v5.10.2/pkg/venafi/tpp/tpp_test.go (about) 1 /* 2 * Copyright 2018 Venafi, Inc. 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package tpp 18 19 import ( 20 "crypto/x509" 21 "net/http" 22 "strings" 23 "testing" 24 25 "github.com/Venafi/vcert/v5/pkg/certificate" 26 "github.com/Venafi/vcert/v5/pkg/endpoint" 27 ) 28 29 const ( 30 expectedURL = "https://localhost/" 31 ) 32 33 func TestParseConfigFindPolicyData(t *testing.T) { 34 data := []byte("{\"Locked\":false,\"PolicyDN\":\"\\\\VED\\\\Policy\\\\Web SDK Testing\",\"Result\":1,\"Values\":[\"Engineering\",\"Quality Assurance\"]}") 35 tppData, err := parseConfigResult(http.StatusOK, "", data) 36 if err != nil { 37 t.Fatalf("err is not nil, err: %s", err) 38 } 39 if len(tppData.Values) != 2 { 40 t.Fatalf("Values count was not expected count of 2 actual count is %d", len(tppData.Values)) 41 } 42 43 tppData, err = parseConfigResult(http.StatusBadRequest, "Bad Request", data) 44 if err == nil { 45 t.Fatalf("err is nil when expected to not be") 46 } 47 48 if !strings.Contains(err.Error(), "Bad Request") { 49 t.Fatalf("Parse Certificate error response did not include expected string: Bad Request -- Actual: %s", err) 50 } 51 52 data = []byte("bad data") 53 tppData, err = parseConfigData(data) 54 if err == nil { 55 t.Fatalf("ParseConfigData with bad data did not return an error") 56 } 57 } 58 59 func TestParseCertificateRequestData(t *testing.T) { 60 data := []byte("{\"CertificateDN\":\"\\\\VED\\\\Policy\\\\Web SDK Testing\\\\bonjoTest 33\"}") 61 62 requestDN, err := parseRequestResult(http.StatusOK, "", data) 63 if err != nil { 64 t.Fatalf("err is not nil, err: %s", err) 65 } 66 67 if !strings.EqualFold(requestDN, "\\VED\\Policy\\Web SDK Testing\\bonjoTest 33") { 68 t.Fatalf("Parse Certificate retrieve response did not include expected CertificateDN: \\VED\\Policy\\Web SDK Testing\\bonjoTest 33 -- Actual: %s", requestDN) 69 } 70 71 requestDN, err = parseRequestResult(http.StatusBadRequest, "Bad Request", data) 72 if err == nil { 73 t.Fatalf("err is nil when expected to not be") 74 } 75 76 if !strings.Contains(err.Error(), "Bad Request") { 77 t.Fatalf("Parse Certificate error response did not include expected string: Bad Request -- Actual: %s", err) 78 } 79 80 data = []byte("bad data") 81 _, err = parseRequestData(data) 82 if err == nil { 83 t.Fatalf("ParseRequestData with bad data did not return an error") 84 } 85 } 86 87 func TestParseCertificateRetrieveData(t *testing.T) { 88 data := []byte("{\"CertificateData\":\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tDQpNSUlHYWpDQ0JWS2dBd0lCQWdJS0hyT1Z5d0FBQUNxNHp6QU5CZ2txaGtpRzl3MEJBUVVGQURCWE1STXdFUVlLDQpDWkltaVpQeUxHUUJHUllEWTI5dE1SWXdGQVlLQ1pJbWlaUHlMR1FCR1JZR2RtVnVZV1pwTVJVd0V3WUtDWkltDQppWlB5TEdRQkdSWUZkbVZ1Y1dFeEVUQVBCZ05WQkFNVENGWmxibEZCSUVOQk1CNFhEVEUyTURJeE9ESXlNRFl3DQpNMW9YRFRFM01URXdPVEl5TlRnek1sb3dnWXd4Q3pBSkJnTlZCQVlUQWxWVE1RMHdDd1lEVlFRSUV3UlZkR0ZvDQpNUXd3Q2dZRFZRUUhFd05UVEVNeEZUQVRCZ05WQkFvVERGWmxibUZtYVN3Z1NXNWpMakVVTUJJR0ExVUVDeE1MDQpSVzVuYVc1bFpYSnBibWN4R2pBWUJnTlZCQXNURVZGMVlXeHBkSGtnUVhOemRYSmhibU5sTVJjd0ZRWURWUVFEDQpFdzUwWlhOMExtSnZibXB2TG1OdmJUQ0NBU0l3RFFZSktvWklodmNOQVFFQkJRQURnZ0VQQURDQ0FRb0NnZ0VCDQpBTXcwR2RrNm1CeUt0WHJBcXpQQ3pmVzV0V2lTZFFDTzhycHJadStRQXZwYXlUSjBJbFBBbE5QZEt5M3JlRUM1DQowMWxjUlpvYSt0aUpuazVKNWRqcU9oaXErdkhNKzRJYkJWb3lPODNPdmxYd045a1gyc0NuTGJ1MkFTeUJGZmVwDQpVWDJuNmJ5aGVKS3FJSUw1ZXd3TFlMWndYYUhHa1pZL2Q0ZXFSVmM5UTN3Nzh4SkJSbXdCNzhad1lQeVdYd0ZXDQpRTUVyRitMdkRZTnhQeGRtWXVSdFRWRTkvUHBpaWNKUnpVWWUzV25KcEhNRzQ0cDJDR3gvVHJQcDZkUHVoNlUxDQpET2J2UEt0UHAyR25JZy9aaWovL3ZDMU94eFNKMXdFdzdXMFE1N3JpMWl0QkxmTFg3MS9WOEpHMUFEN0t6cFQwDQp6ZGM1OERvVWxHTHg0cXd4dWFmaDR0c0NBd0VBQWFPQ0F3QXdnZ0w4TUIwR0ExVWREZ1FXQkJTTU5XK2Z4ZDZFDQphQ0tkaHk3dG11WS9YSnh4UmpBZkJnTlZIU01FR0RBV2dCUkdWbzIzMkxKRzA5OGg2RVFTUEZBVFFTdzdBVENDDQpBVnNHQTFVZEh3U0NBVkl3Z2dGT01JSUJTcUNDQVVhZ2dnRkNoajlvZEhSd09pOHZNbXM0TFhabGJuRmhMWEJrDQpZeTUyWlc1eFlTNTJaVzVoWm1rdVkyOXRMME5sY25SRmJuSnZiR3d2Vm1WdVVVRWxNakJEUVM1amNteUdnYjlzDQpaR0Z3T2k4dkwwTk9QVlpsYmxGQkpUSXdRMEVzUTA0OU1tczRMWFpsYm5GaExYQmtZeXhEVGoxRFJGQXNRMDQ5DQpVSFZpYkdsakpUSXdTMlY1SlRJd1UyVnlkbWxqWlhNc1EwNDlVMlZ5ZG1salpYTXNRMDQ5UTI5dVptbG5kWEpoDQpkR2x2Yml4RVF6MTJaVzV4WVN4RVF6MTJaVzVoWm1rc1JFTTlZMjl0UDJObGNuUnBabWxqWVhSbFVtVjJiMk5oDQpkR2x2Ymt4cGMzUS9ZbUZ6WlQ5dlltcGxZM1JEYkdGemN6MWpVa3hFYVhOMGNtbGlkWFJwYjI1UWIybHVkSVk5DQpabWxzWlRvdkx6SnJPQzEyWlc1eFlTMXdaR011ZG1WdWNXRXVkbVZ1WVdacExtTnZiUzlEWlhKMFJXNXliMnhzDQpMMVpsYmxGQklFTkJMbU55YkRDQnhBWUlLd1lCQlFVSEFRRUVnYmN3Z2JRd2diRUdDQ3NHQVFVRkJ6QUNob0drDQpiR1JoY0Rvdkx5OURUajFXWlc1UlFTVXlNRU5CTEVOT1BVRkpRU3hEVGoxUWRXSnNhV01sTWpCTFpYa2xNakJUDQpaWEoyYVdObGN5eERUajFUWlhKMmFXTmxjeXhEVGoxRGIyNW1hV2QxY21GMGFXOXVMRVJEUFhabGJuRmhMRVJEDQpQWFpsYm1GbWFTeEVRejFqYjIwL1kwRkRaWEowYVdacFkyRjBaVDlpWVhObFAyOWlhbVZqZEVOc1lYTnpQV05sDQpjblJwWm1sallYUnBiMjVCZFhSb2IzSnBkSGt3Q3dZRFZSMFBCQVFEQWdXZ01Eb0dDU3NHQVFRQmdqY1ZCd1F0DQpNQ3NHSXlzR0FRUUJnamNWQ0lHUGlYS0VoTEJxOVowUWg1Yi9mTVNKRldDYzZFT0Z1NlJkQWdGa0FnRUpNQk1HDQpBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQnNHQ1NzR0FRUUJnamNWQ2dRT01Bd3dDZ1lJS3dZQkJRVUhBd0V3DQpHUVlEVlIwUkJCSXdFSUlPZEdWemRDNWliMjVxYnk1amIyMHdEUVlKS29aSWh2Y05BUUVGQlFBRGdnRUJBSFhSDQpIZXZSTnZhL3l3YVU3VHJTMUlTb2ZqcUVtT1MwVDB2ZWlDenVFZkhwTitZWGg2SzhZVXViODFWTHF2aTJxSmJUDQp0bExwSmNVTytBVHBrYWV5K2RQU1B2WVNUejVKY3BaWjU3MCsrUTg0RFFPcnEvcmJjamFHMHBsNDk1Sk1nQzVRDQo4VUlZa0JTMndEWWhJRVdpYmZZVU91S2c3Y3RVRTV2eVI3eFkvU1JhaFBwUUNVS1o0QmJqNnhnV2VmOW5IVjVVDQpuVWZqQzVjdXJ3TUE5RGVweFBHWGtwVm5FK1RzK1k4ZlFwSmdVUUtmNHRoWklwbVB1d044NU1BVXJxTW9YbkNyDQpIM0Y4NzJJNnF4RlkzUzhyNk1TZUdMdUtyb3h4TEErQk9scDV2cXRqRlo0SWlDcUNmLzA1UzZFbFhaa1V1K1ZpDQpZaUkyQ1VValVEWkdVU2lrMUFBPQ0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQ0K\",\"Filename\":\"test.bonjo.com.cer\",\"Format\":\"base64\"}") 89 90 resp, err := parseRetrieveResult(http.StatusOK, "", data) 91 if err != nil { 92 t.Fatalf("err is not nil, err: %s", err) 93 } 94 95 if !strings.EqualFold(resp.Filename, "test.bonjo.com.cer") { 96 t.Fatalf("Parse Certificate retrieve response did not include expected filename: test.bonjo.com.cer -- Actual: %s", resp.Filename) 97 } 98 99 resp, err = parseRetrieveResult(http.StatusBadRequest, "Bad Request", data) 100 if err == nil { 101 t.Fatalf("err is nil when expected to not be") 102 } 103 104 if !strings.Contains(err.Error(), "Bad Request") { 105 t.Fatalf("Parse Certificate error response did not include expected string: Bad Request -- Actual: %s", err) 106 } 107 108 data = []byte("bad data") 109 _, err = parseRetrieveData(data) 110 if err == nil { 111 t.Fatalf("ParseRetrieveData with bad data did not return an error") 112 } 113 } 114 115 func getBaseZoneConfiguration() *endpoint.ZoneConfiguration { 116 z := endpoint.NewZoneConfiguration() 117 z.Organization = "Venafi" 118 z.OrganizationalUnit = []string{"Engineering", "Automated Tests"} 119 z.Country = "US" 120 z.Province = "Utah" 121 z.Locality = "SLC" 122 z.AllowedKeyConfigurations = []endpoint.AllowedKeyConfiguration{endpoint.AllowedKeyConfiguration{KeyType: certificate.KeyTypeRSA, KeySizes: []int{4096}}} 123 z.HashAlgorithm = x509.SHA512WithRSA 124 return z 125 } 126 127 func TestGetPolicyDN(t *testing.T) { 128 const expectedPolicy = "\\VED\\Policy\\One\\Level 2\\This is level Three" 129 130 actualPolicy := getPolicyDN("One\\Level 2\\This is level Three") 131 if len(expectedPolicy) != len(actualPolicy) { 132 t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy) 133 } 134 for i := 0; i < len(expectedPolicy); i++ { 135 if expectedPolicy[i] != actualPolicy[i] { 136 t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy) 137 } 138 } 139 140 actualPolicy = getPolicyDN("\\One\\Level 2\\This is level Three") 141 if len(expectedPolicy) != len(actualPolicy) { 142 t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy) 143 } 144 for i := 0; i < len(expectedPolicy); i++ { 145 if expectedPolicy[i] != actualPolicy[i] { 146 t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy) 147 } 148 } 149 150 actualPolicy = getPolicyDN(expectedPolicy) 151 if len(expectedPolicy) != len(actualPolicy) { 152 t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy) 153 } 154 for i := 0; i < len(expectedPolicy); i++ { 155 if expectedPolicy[i] != actualPolicy[i] { 156 t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy) 157 } 158 } 159 } 160 161 func TestRetrieveChainOptionFromString(t *testing.T) { 162 co := retrieveChainOptionFromString("RoOt-fIrSt") 163 if co != retrieveChainOptionRootFirst { 164 t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionRootFirst, co) 165 } 166 co = retrieveChainOptionFromString("IGNORE") 167 if co != retrieveChainOptionIgnore { 168 t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionIgnore, co) 169 } 170 co = retrieveChainOptionFromString("RoOt-LaSt") 171 if co != retrieveChainOptionRootLast { 172 t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionRootLast, co) 173 } 174 co = retrieveChainOptionFromString("some value") 175 if co != retrieveChainOptionRootLast { 176 t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionRootLast, co) 177 } 178 } 179 180 func TestNewPEMCertificateCollectionFromResponse(t *testing.T) { 181 var ( 182 tppResponse = "subject=CN=certafi-bonjo.venafi.com, OU=Quality Assurance, OU=Engineering, O="Venafi, Inc.", L=SLC, S=Utah, C=US
issuer=CN=VenQA Class G CA, DC=venqa, DC=venafi, DC=com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

subject=CN=VenQA Class G CA, DC=venqa, DC=venafi, DC=com
issuer=CN=VenQA CA, DC=venqa, DC=venafi, DC=com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

subject=CN=VenQA CA, DC=venqa, DC=venafi, DC=com
issuer=CN=VenQA CA, DC=venqa, DC=venafi, DC=com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

" 183 ) 184 185 col, err := newPEMCollectionFromResponse(tppResponse, certificate.ChainOptionRootLast) 186 if err != nil { 187 t.Fatalf("Error: %s", err) 188 } 189 if len(col.Chain) != 2 { 190 t.Fatalf("PEM Chain did not contain the expected number of elements 2, actual count %d", len(col.Chain)) 191 } 192 } 193 194 func TestGenerateRequest(t *testing.T) { 195 tpp := Connector{} 196 zoneConfig := getBaseZoneConfiguration() 197 req := certificate.Request{} 198 req.Subject.CommonName = "vcert.test.vfidev.com" 199 req.Subject.Organization = []string{"Venafi, Inc."} 200 req.Subject.OrganizationalUnit = []string{"Automated Tests"} 201 req.Subject.Locality = []string{"Las Vegas"} 202 req.Subject.Province = []string{"Nevada"} 203 req.Subject.Country = []string{"US"} 204 zoneConfig.UpdateCertificateRequest(&req) 205 err := tpp.GenerateRequest(zoneConfig, &req) 206 if err != nil { 207 t.Fatalf("Error: %s", err) 208 } 209 } 210 211 func TestGenerateRequestWithLockedMgmtType(t *testing.T) { 212 tpp := Connector{} 213 zoneConfig := getBaseZoneConfiguration() 214 zoneConfig.CustomAttributeValues[tppAttributeManagementType] = "Monitoring" 215 req := certificate.Request{} 216 req.Subject.CommonName = "vcert.test.vfidev.com" 217 req.Subject.Organization = []string{"Venafi, Inc."} 218 req.Subject.OrganizationalUnit = []string{"Automated Tests"} 219 req.Subject.Locality = []string{"Las Vegas"} 220 req.Subject.Province = []string{"Nevada"} 221 req.Subject.Country = []string{"US"} 222 zoneConfig.UpdateCertificateRequest(&req) 223 err := tpp.GenerateRequest(zoneConfig, &req) 224 if err == nil { 225 t.Fatalf("Error expected, request should not be generated with mgmt type set to Monitoring") 226 } 227 } 228 229 func TestGenerateRequestWithNoUserProvidedCSRAllowed(t *testing.T) { 230 tpp := Connector{} 231 zoneConfig := getBaseZoneConfiguration() 232 zoneConfig.CustomAttributeValues[tppAttributeManualCSR] = "0" 233 req := certificate.Request{} 234 req.Subject.CommonName = "vcert.test.vfidev.com" 235 req.Subject.Organization = []string{"Venafi, Inc."} 236 req.Subject.OrganizationalUnit = []string{"Automated Tests"} 237 req.Subject.Locality = []string{"Las Vegas"} 238 req.Subject.Province = []string{"Nevada"} 239 req.Subject.Country = []string{"US"} 240 zoneConfig.UpdateCertificateRequest(&req) 241 err := tpp.GenerateRequest(zoneConfig, &req) 242 if err == nil { 243 t.Fatalf("Error expected, request should not be generated with Manual CSR set to 0") 244 } 245 } 246 247 func TestGenerateRequestWithLockedKeyConfiguration(t *testing.T) { 248 tpp := Connector{} 249 zoneConfig := getBaseZoneConfiguration() 250 zoneConfig.AllowedKeyConfigurations = []endpoint.AllowedKeyConfiguration{{KeyType: certificate.KeyTypeECDSA, KeyCurves: []certificate.EllipticCurve{certificate.EllipticCurveP384}}} 251 req := certificate.Request{} 252 req.Subject.CommonName = "vcert.test.vfidev.com" 253 req.Subject.Organization = []string{"Venafi, Inc."} 254 req.Subject.OrganizationalUnit = []string{"Automated Tests"} 255 req.Subject.Locality = []string{"Las Vegas"} 256 req.Subject.Province = []string{"Nevada"} 257 req.Subject.Country = []string{"US"} 258 req.KeyType = certificate.KeyTypeRSA 259 zoneConfig.UpdateCertificateRequest(&req) 260 err := tpp.GenerateRequest(zoneConfig, &req) 261 if err != nil { 262 t.Fatalf("Error expected, request should be update with key type goten from zone") 263 } 264 } 265 266 func TestGetHttpClient(t *testing.T) { 267 tpp := Connector{} 268 if tpp.getHTTPClient() == nil { 269 t.Fatalf("Failed to get http client") 270 } 271 } 272 273 func TestConvertServerPolicyToInternalPolicy(t *testing.T) { 274 sp := serverPolicy{ 275 KeyPair: struct { 276 KeyAlgorithm _strValue 277 KeySize struct { 278 Locked bool 279 Value int 280 } 281 EllipticCurve struct { 282 Locked bool 283 Value string 284 } 285 }{ 286 KeyAlgorithm: _strValue{ 287 Locked: true, 288 Value: "rsa", 289 }, 290 KeySize: struct { 291 Locked bool 292 Value int 293 }{ 294 Locked: true, 295 Value: 2048, 296 }, 297 EllipticCurve: struct { 298 Locked bool 299 Value string 300 }{ 301 Locked: false, 302 Value: "", 303 }, 304 }, 305 } 306 p := sp.toPolicy() 307 if len(p.AllowedKeyConfigurations) != 1 { 308 t.Fatal("invalid configurations values") 309 } 310 k := p.AllowedKeyConfigurations[0] 311 if k.KeyType != certificate.KeyTypeRSA { 312 t.Fatal("invalid key type") 313 } 314 if len(k.KeySizes) != 4 || k.KeySizes[0] != 2048 || k.KeySizes[1] != 3072 || k.KeySizes[2] != 4096 || k.KeySizes[3] != 8192 { 315 t.Fatal("bad key lengths") 316 } 317 318 sp = serverPolicy{ 319 KeyPair: struct { 320 KeyAlgorithm _strValue 321 KeySize struct { 322 Locked bool 323 Value int 324 } 325 EllipticCurve struct { 326 Locked bool 327 Value string 328 } 329 }{ 330 KeyAlgorithm: _strValue{ 331 Locked: true, 332 Value: "ec", 333 }, 334 KeySize: struct { 335 Locked bool 336 Value int 337 }{ 338 Locked: true, 339 Value: 2048, 340 }, 341 EllipticCurve: struct { 342 Locked bool 343 Value string 344 }{ 345 Locked: true, 346 Value: "p521", 347 }, 348 }, 349 } 350 p = sp.toPolicy() 351 if len(p.AllowedKeyConfigurations) != 1 { 352 t.Fatal("invalid configurations values") 353 } 354 k = p.AllowedKeyConfigurations[0] 355 if k.KeyType != certificate.KeyTypeECDSA { 356 t.Fatal("invalid key type") 357 } 358 if len(k.KeyCurves) != 1 || k.KeyCurves[0] != certificate.EllipticCurveP521 { 359 t.Fatal("bad key curve") 360 } 361 362 sp = serverPolicy{ 363 KeyPair: struct { 364 KeyAlgorithm _strValue 365 KeySize struct { 366 Locked bool 367 Value int 368 } 369 EllipticCurve struct { 370 Locked bool 371 Value string 372 } 373 }{ 374 KeyAlgorithm: _strValue{ 375 Locked: false, 376 Value: "ec", 377 }, 378 KeySize: struct { 379 Locked bool 380 Value int 381 }{ 382 Locked: true, 383 Value: 2048, 384 }, 385 EllipticCurve: struct { 386 Locked bool 387 Value string 388 }{ 389 Locked: true, 390 Value: "p384", 391 }, 392 }, 393 } 394 p = sp.toPolicy() 395 if len(p.AllowedKeyConfigurations) != 2 { 396 t.Fatal("invalid configurations values") 397 } 398 k = p.AllowedKeyConfigurations[0] 399 if k.KeyType != certificate.KeyTypeRSA { 400 t.Fatal("invalid key type") 401 } 402 if len(k.KeySizes) != 4 || k.KeySizes[0] != 2048 || k.KeySizes[1] != 3072 || k.KeySizes[2] != 4096 || k.KeySizes[3] != 8192 { 403 t.Fatal("bad key lengths") 404 } 405 k = p.AllowedKeyConfigurations[1] 406 if k.KeyType != certificate.KeyTypeECDSA { 407 t.Fatal("invalid key type") 408 } 409 if len(k.KeyCurves) != 1 || k.KeyCurves[0] != certificate.EllipticCurveP384 { 410 t.Fatal("bad key curve") 411 } 412 413 sp = serverPolicy{ 414 WhitelistedDomains: []string{ 415 "test1.com", 416 "test2.com", 417 ".test3.com", 418 }, 419 } 420 p = sp.toPolicy() 421 if len(p.SubjectCNRegexes) != 3 { 422 t.Fatalf("invalid SubjectCNRegexes length, expected 3, got %d", len(p.SubjectCNRegexes)) 423 } 424 if p.SubjectCNRegexes[0] != "^([\\p{L}\\p{N}-]+\\.)*test1\\.com$" { 425 t.Fatalf("invalid SubjectCNRegexes[0], expected ^([\\p{L}\\p{N}-*]+\\.)*test1\\.com$, got %s", p.SubjectCNRegexes[0]) 426 } 427 if p.SubjectCNRegexes[1] != "^([\\p{L}\\p{N}-]+\\.)*test2\\.com$" { 428 t.Fatalf("invalid SubjectCNRegexes[1], expected ^([\\p{L}\\p{N}-*]+\\.)*test2\\.com$, got %s", p.SubjectCNRegexes[1]) 429 } 430 if p.SubjectCNRegexes[2] != "^([\\p{L}\\p{N}-]+\\.)+test3\\.com$" { 431 t.Fatalf("invalid SubjectCNRegexes[2], expected ^([\\p{L}\\p{N}-*]+\\.)+test3\\.com$, got %s", p.SubjectCNRegexes[2]) 432 } 433 }