github.com/Venafi/vcert/v5@v5.10.2/pkg/venafi/tpp/tpp_test.go (about)

     1  /*
     2   * Copyright 2018 Venafi, Inc.
     3   *
     4   * Licensed under the Apache License, Version 2.0 (the "License");
     5   * you may not use this file except in compliance with the License.
     6   * You may obtain a copy of the License at
     7   *
     8   *  http://www.apache.org/licenses/LICENSE-2.0
     9   *
    10   * Unless required by applicable law or agreed to in writing, software
    11   * distributed under the License is distributed on an "AS IS" BASIS,
    12   * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    13   * See the License for the specific language governing permissions and
    14   * limitations under the License.
    15   */
    16  
    17  package tpp
    18  
    19  import (
    20  	"crypto/x509"
    21  	"net/http"
    22  	"strings"
    23  	"testing"
    24  
    25  	"github.com/Venafi/vcert/v5/pkg/certificate"
    26  	"github.com/Venafi/vcert/v5/pkg/endpoint"
    27  )
    28  
    29  const (
    30  	expectedURL = "https://localhost/"
    31  )
    32  
    33  func TestParseConfigFindPolicyData(t *testing.T) {
    34  	data := []byte("{\"Locked\":false,\"PolicyDN\":\"\\\\VED\\\\Policy\\\\Web SDK Testing\",\"Result\":1,\"Values\":[\"Engineering\",\"Quality Assurance\"]}")
    35  	tppData, err := parseConfigResult(http.StatusOK, "", data)
    36  	if err != nil {
    37  		t.Fatalf("err is not nil, err: %s", err)
    38  	}
    39  	if len(tppData.Values) != 2 {
    40  		t.Fatalf("Values count was not expected count of 2 actual count is %d", len(tppData.Values))
    41  	}
    42  
    43  	tppData, err = parseConfigResult(http.StatusBadRequest, "Bad Request", data)
    44  	if err == nil {
    45  		t.Fatalf("err is nil when expected to not be")
    46  	}
    47  
    48  	if !strings.Contains(err.Error(), "Bad Request") {
    49  		t.Fatalf("Parse Certificate error response did not include expected string: Bad Request -- Actual: %s", err)
    50  	}
    51  
    52  	data = []byte("bad data")
    53  	tppData, err = parseConfigData(data)
    54  	if err == nil {
    55  		t.Fatalf("ParseConfigData with bad data did not return an error")
    56  	}
    57  }
    58  
    59  func TestParseCertificateRequestData(t *testing.T) {
    60  	data := []byte("{\"CertificateDN\":\"\\\\VED\\\\Policy\\\\Web SDK Testing\\\\bonjoTest 33\"}")
    61  
    62  	requestDN, err := parseRequestResult(http.StatusOK, "", data)
    63  	if err != nil {
    64  		t.Fatalf("err is not nil, err: %s", err)
    65  	}
    66  
    67  	if !strings.EqualFold(requestDN, "\\VED\\Policy\\Web SDK Testing\\bonjoTest 33") {
    68  		t.Fatalf("Parse Certificate retrieve response did not include expected CertificateDN: \\VED\\Policy\\Web SDK Testing\\bonjoTest 33 -- Actual: %s", requestDN)
    69  	}
    70  
    71  	requestDN, err = parseRequestResult(http.StatusBadRequest, "Bad Request", data)
    72  	if err == nil {
    73  		t.Fatalf("err is nil when expected to not be")
    74  	}
    75  
    76  	if !strings.Contains(err.Error(), "Bad Request") {
    77  		t.Fatalf("Parse Certificate error response did not include expected string: Bad Request -- Actual: %s", err)
    78  	}
    79  
    80  	data = []byte("bad data")
    81  	_, err = parseRequestData(data)
    82  	if err == nil {
    83  		t.Fatalf("ParseRequestData with bad data did not return an error")
    84  	}
    85  }
    86  
    87  func TestParseCertificateRetrieveData(t *testing.T) {
    88  	data := []byte("{\"CertificateData\":\"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\",\"Filename\":\"test.bonjo.com.cer\",\"Format\":\"base64\"}")
    89  
    90  	resp, err := parseRetrieveResult(http.StatusOK, "", data)
    91  	if err != nil {
    92  		t.Fatalf("err is not nil, err: %s", err)
    93  	}
    94  
    95  	if !strings.EqualFold(resp.Filename, "test.bonjo.com.cer") {
    96  		t.Fatalf("Parse Certificate retrieve response did not include expected filename: test.bonjo.com.cer -- Actual: %s", resp.Filename)
    97  	}
    98  
    99  	resp, err = parseRetrieveResult(http.StatusBadRequest, "Bad Request", data)
   100  	if err == nil {
   101  		t.Fatalf("err is nil when expected to not be")
   102  	}
   103  
   104  	if !strings.Contains(err.Error(), "Bad Request") {
   105  		t.Fatalf("Parse Certificate error response did not include expected string: Bad Request -- Actual: %s", err)
   106  	}
   107  
   108  	data = []byte("bad data")
   109  	_, err = parseRetrieveData(data)
   110  	if err == nil {
   111  		t.Fatalf("ParseRetrieveData with bad data did not return an error")
   112  	}
   113  }
   114  
   115  func getBaseZoneConfiguration() *endpoint.ZoneConfiguration {
   116  	z := endpoint.NewZoneConfiguration()
   117  	z.Organization = "Venafi"
   118  	z.OrganizationalUnit = []string{"Engineering", "Automated Tests"}
   119  	z.Country = "US"
   120  	z.Province = "Utah"
   121  	z.Locality = "SLC"
   122  	z.AllowedKeyConfigurations = []endpoint.AllowedKeyConfiguration{endpoint.AllowedKeyConfiguration{KeyType: certificate.KeyTypeRSA, KeySizes: []int{4096}}}
   123  	z.HashAlgorithm = x509.SHA512WithRSA
   124  	return z
   125  }
   126  
   127  func TestGetPolicyDN(t *testing.T) {
   128  	const expectedPolicy = "\\VED\\Policy\\One\\Level 2\\This is level Three"
   129  
   130  	actualPolicy := getPolicyDN("One\\Level 2\\This is level Three")
   131  	if len(expectedPolicy) != len(actualPolicy) {
   132  		t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy)
   133  	}
   134  	for i := 0; i < len(expectedPolicy); i++ {
   135  		if expectedPolicy[i] != actualPolicy[i] {
   136  			t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy)
   137  		}
   138  	}
   139  
   140  	actualPolicy = getPolicyDN("\\One\\Level 2\\This is level Three")
   141  	if len(expectedPolicy) != len(actualPolicy) {
   142  		t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy)
   143  	}
   144  	for i := 0; i < len(expectedPolicy); i++ {
   145  		if expectedPolicy[i] != actualPolicy[i] {
   146  			t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy)
   147  		}
   148  	}
   149  
   150  	actualPolicy = getPolicyDN(expectedPolicy)
   151  	if len(expectedPolicy) != len(actualPolicy) {
   152  		t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy)
   153  	}
   154  	for i := 0; i < len(expectedPolicy); i++ {
   155  		if expectedPolicy[i] != actualPolicy[i] {
   156  			t.Fatalf("getPolicyDN did not return the expected value of %s -- Actual value %s", expectedPolicy, actualPolicy)
   157  		}
   158  	}
   159  }
   160  
   161  func TestRetrieveChainOptionFromString(t *testing.T) {
   162  	co := retrieveChainOptionFromString("RoOt-fIrSt")
   163  	if co != retrieveChainOptionRootFirst {
   164  		t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionRootFirst, co)
   165  	}
   166  	co = retrieveChainOptionFromString("IGNORE")
   167  	if co != retrieveChainOptionIgnore {
   168  		t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionIgnore, co)
   169  	}
   170  	co = retrieveChainOptionFromString("RoOt-LaSt")
   171  	if co != retrieveChainOptionRootLast {
   172  		t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionRootLast, co)
   173  	}
   174  	co = retrieveChainOptionFromString("some value")
   175  	if co != retrieveChainOptionRootLast {
   176  		t.Fatalf("retrieveChainOptionFromString did not return the expected value of %v -- Actual value %v", retrieveChainOptionRootLast, co)
   177  	}
   178  }
   179  
   180  func TestNewPEMCertificateCollectionFromResponse(t *testing.T) {
   181  	var (
   182  		tppResponse = "subject=CN=certafi-bonjo.venafi.com, OU=Quality Assurance, OU=Engineering, O="Venafi, Inc.", L=SLC, S=Utah, C=US
issuer=CN=VenQA Class G CA, DC=venqa, DC=venafi, DC=com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

subject=CN=VenQA Class G CA, DC=venqa, DC=venafi, DC=com
issuer=CN=VenQA CA, DC=venqa, DC=venafi, DC=com
-----BEGIN CERTIFICATE-----
MIIGGzCCBQOgAwIBAgIKK0kjHQAAACaHWjANBgkqhkiG9w0BAQUFADBXMRMwEQYK
CZImiZPyLGQBGRYDY29tMRYwFAYKCZImiZPyLGQBGRYGdmVuYWZpMRUwEwYKCZIm
iZPyLGQBGRYFdmVucWExETAPBgNVBAMTCFZlblFBIENBMB4XDTE0MDMwOTA3MzIw
N1oXDTE2MDMwOTA3NDIwN1owXzETMBEGCgmSJomT8ixkARkWA2NvbTEWMBQGCgmS
JomT8ixkARkWBnZlbmFmaTEVMBMGCgmSJomT8ixkARkWBXZlbnFhMRkwFwYDVQQD
ExBWZW5RQSBDbGFzcyBHIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
AQEArRMPTrwXRaD71Szy070JQC1lw+k9LfhD7tLqn7lr8Og242+lxFERFolQdYW6
v0uvcnZrJxGj+c3BJv7JLSdLumN4+N9z+COlHj2hIEmZuH//a3iKA5+Y+46wsWqM
MNFxonMUYDRtH/cocx/Ym7yE+8DyuTXc4zZ38hgFiusDrCH9d4zKEdQrPiLc5EgI
oewa0JFiudm7Kph2th75o+KwyUXEmfAUjIoGlCC7F/0GREPij7tOfgXKodNVXz3K
zfucg0p8vf3wd5K6xnzG1Fo/0o3GlHZmM5TfLDurx/mgmde8LftC6BHtdBC+pwp0
pvyMUJab0Br6AlZeZG04IrVPBwIDAQABo4IC3zCCAtswEgYJKwYBBAGCNxUBBAUC
AwEAATAjBgkrBgEEAYI3FQIEFgQUjR/UGsyByiYbUReb1Jzr9Tk5DmcwHQYDVR0O
BBYEFPN+IlbEeT7kUjtFyH6ilVyiWFp4MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
QwBBMAsGA1UdDwQEAwIBhjASBgNVHRMBAf8ECDAGAQH/AgEAMB8GA1UdIwQYMBaA
FEZWjbfYskbT3yHoRBI8UBNBLDsBMIIBWwYDVR0fBIIBUjCCAU4wggFKoIIBRqCC
AUKGP2h0dHA6Ly8yazgtdmVucWEtcGRjLnZlbnFhLnZlbmFmaS5jb20vQ2VydEVu
cm9sbC9WZW5RQSUyMENBLmNybIaBv2xkYXA6Ly8vQ049VmVuUUElMjBDQSxDTj0y
azgtdmVucWEtcGRjLENOPUNEUCxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxD
Tj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPXZlbnFhLERDPXZlbmFmaSxE
Qz1jb20/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
PWNSTERpc3RyaWJ1dGlvblBvaW50hj1maWxlOi8vMms4LXZlbnFhLXBkYy52ZW5x
YS52ZW5hZmkuY29tL0NlcnRFbnJvbGwvVmVuUUEgQ0EuY3JsMIHEBggrBgEFBQcB
AQSBtzCBtDCBsQYIKwYBBQUHMAKGgaRsZGFwOi8vL0NOPVZlblFBJTIwQ0EsQ049
QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNv
bmZpZ3VyYXRpb24sREM9dmVucWEsREM9dmVuYWZpLERDPWNvbT9jQUNlcnRpZmlj
YXRlP2Jhc2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTANBgkq
hkiG9w0BAQUFAAOCAQEATNA8Cwul1UBQJHd+50b9g4jnXX7Kf+bUUmE9iJGOr2aB
E7/MAHGdjftvdJY0X+l1h8XS3Oaquo8trdGlxh9dBrQEYP2YlXnHgmY2xrI92bzd
ii3B9ZzLNKbMMPjowujZeB3GmytdNZvK+ghWZRZ9A2wNgYK4OTVJjlMDd9L8558T
yDnExeinI24X+z8CF1bYR5dX1NJThcwLwRPQd7EOQqYrfJV/7hsklbAypLAqePXt
P9B+DQ5bwFajgeL5en9UOfkJv34Y6xiZw5uZFuJD3QFqwpc5U6StaFfktYsKdYnK
2yktNHCiuRjFjzY27T2Ss2knEIbLjOJRZ+GRVxPm0Q==
-----END CERTIFICATE-----

subject=CN=VenQA CA, DC=venqa, DC=venafi, DC=com
issuer=CN=VenQA CA, DC=venqa, DC=venafi, DC=com
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

"
   183  	)
   184  
   185  	col, err := newPEMCollectionFromResponse(tppResponse, certificate.ChainOptionRootLast)
   186  	if err != nil {
   187  		t.Fatalf("Error: %s", err)
   188  	}
   189  	if len(col.Chain) != 2 {
   190  		t.Fatalf("PEM Chain did not contain the expected number of elements 2, actual count %d", len(col.Chain))
   191  	}
   192  }
   193  
   194  func TestGenerateRequest(t *testing.T) {
   195  	tpp := Connector{}
   196  	zoneConfig := getBaseZoneConfiguration()
   197  	req := certificate.Request{}
   198  	req.Subject.CommonName = "vcert.test.vfidev.com"
   199  	req.Subject.Organization = []string{"Venafi, Inc."}
   200  	req.Subject.OrganizationalUnit = []string{"Automated Tests"}
   201  	req.Subject.Locality = []string{"Las Vegas"}
   202  	req.Subject.Province = []string{"Nevada"}
   203  	req.Subject.Country = []string{"US"}
   204  	zoneConfig.UpdateCertificateRequest(&req)
   205  	err := tpp.GenerateRequest(zoneConfig, &req)
   206  	if err != nil {
   207  		t.Fatalf("Error: %s", err)
   208  	}
   209  }
   210  
   211  func TestGenerateRequestWithLockedMgmtType(t *testing.T) {
   212  	tpp := Connector{}
   213  	zoneConfig := getBaseZoneConfiguration()
   214  	zoneConfig.CustomAttributeValues[tppAttributeManagementType] = "Monitoring"
   215  	req := certificate.Request{}
   216  	req.Subject.CommonName = "vcert.test.vfidev.com"
   217  	req.Subject.Organization = []string{"Venafi, Inc."}
   218  	req.Subject.OrganizationalUnit = []string{"Automated Tests"}
   219  	req.Subject.Locality = []string{"Las Vegas"}
   220  	req.Subject.Province = []string{"Nevada"}
   221  	req.Subject.Country = []string{"US"}
   222  	zoneConfig.UpdateCertificateRequest(&req)
   223  	err := tpp.GenerateRequest(zoneConfig, &req)
   224  	if err == nil {
   225  		t.Fatalf("Error expected, request should not be generated with mgmt type set to Monitoring")
   226  	}
   227  }
   228  
   229  func TestGenerateRequestWithNoUserProvidedCSRAllowed(t *testing.T) {
   230  	tpp := Connector{}
   231  	zoneConfig := getBaseZoneConfiguration()
   232  	zoneConfig.CustomAttributeValues[tppAttributeManualCSR] = "0"
   233  	req := certificate.Request{}
   234  	req.Subject.CommonName = "vcert.test.vfidev.com"
   235  	req.Subject.Organization = []string{"Venafi, Inc."}
   236  	req.Subject.OrganizationalUnit = []string{"Automated Tests"}
   237  	req.Subject.Locality = []string{"Las Vegas"}
   238  	req.Subject.Province = []string{"Nevada"}
   239  	req.Subject.Country = []string{"US"}
   240  	zoneConfig.UpdateCertificateRequest(&req)
   241  	err := tpp.GenerateRequest(zoneConfig, &req)
   242  	if err == nil {
   243  		t.Fatalf("Error expected, request should not be generated with Manual CSR set to 0")
   244  	}
   245  }
   246  
   247  func TestGenerateRequestWithLockedKeyConfiguration(t *testing.T) {
   248  	tpp := Connector{}
   249  	zoneConfig := getBaseZoneConfiguration()
   250  	zoneConfig.AllowedKeyConfigurations = []endpoint.AllowedKeyConfiguration{{KeyType: certificate.KeyTypeECDSA, KeyCurves: []certificate.EllipticCurve{certificate.EllipticCurveP384}}}
   251  	req := certificate.Request{}
   252  	req.Subject.CommonName = "vcert.test.vfidev.com"
   253  	req.Subject.Organization = []string{"Venafi, Inc."}
   254  	req.Subject.OrganizationalUnit = []string{"Automated Tests"}
   255  	req.Subject.Locality = []string{"Las Vegas"}
   256  	req.Subject.Province = []string{"Nevada"}
   257  	req.Subject.Country = []string{"US"}
   258  	req.KeyType = certificate.KeyTypeRSA
   259  	zoneConfig.UpdateCertificateRequest(&req)
   260  	err := tpp.GenerateRequest(zoneConfig, &req)
   261  	if err != nil {
   262  		t.Fatalf("Error expected, request should be update with key type goten from zone")
   263  	}
   264  }
   265  
   266  func TestGetHttpClient(t *testing.T) {
   267  	tpp := Connector{}
   268  	if tpp.getHTTPClient() == nil {
   269  		t.Fatalf("Failed to get http client")
   270  	}
   271  }
   272  
   273  func TestConvertServerPolicyToInternalPolicy(t *testing.T) {
   274  	sp := serverPolicy{
   275  		KeyPair: struct {
   276  			KeyAlgorithm _strValue
   277  			KeySize      struct {
   278  				Locked bool
   279  				Value  int
   280  			}
   281  			EllipticCurve struct {
   282  				Locked bool
   283  				Value  string
   284  			}
   285  		}{
   286  			KeyAlgorithm: _strValue{
   287  				Locked: true,
   288  				Value:  "rsa",
   289  			},
   290  			KeySize: struct {
   291  				Locked bool
   292  				Value  int
   293  			}{
   294  				Locked: true,
   295  				Value:  2048,
   296  			},
   297  			EllipticCurve: struct {
   298  				Locked bool
   299  				Value  string
   300  			}{
   301  				Locked: false,
   302  				Value:  "",
   303  			},
   304  		},
   305  	}
   306  	p := sp.toPolicy()
   307  	if len(p.AllowedKeyConfigurations) != 1 {
   308  		t.Fatal("invalid configurations values")
   309  	}
   310  	k := p.AllowedKeyConfigurations[0]
   311  	if k.KeyType != certificate.KeyTypeRSA {
   312  		t.Fatal("invalid key type")
   313  	}
   314  	if len(k.KeySizes) != 4 || k.KeySizes[0] != 2048 || k.KeySizes[1] != 3072 || k.KeySizes[2] != 4096 || k.KeySizes[3] != 8192 {
   315  		t.Fatal("bad key lengths")
   316  	}
   317  
   318  	sp = serverPolicy{
   319  		KeyPair: struct {
   320  			KeyAlgorithm _strValue
   321  			KeySize      struct {
   322  				Locked bool
   323  				Value  int
   324  			}
   325  			EllipticCurve struct {
   326  				Locked bool
   327  				Value  string
   328  			}
   329  		}{
   330  			KeyAlgorithm: _strValue{
   331  				Locked: true,
   332  				Value:  "ec",
   333  			},
   334  			KeySize: struct {
   335  				Locked bool
   336  				Value  int
   337  			}{
   338  				Locked: true,
   339  				Value:  2048,
   340  			},
   341  			EllipticCurve: struct {
   342  				Locked bool
   343  				Value  string
   344  			}{
   345  				Locked: true,
   346  				Value:  "p521",
   347  			},
   348  		},
   349  	}
   350  	p = sp.toPolicy()
   351  	if len(p.AllowedKeyConfigurations) != 1 {
   352  		t.Fatal("invalid configurations values")
   353  	}
   354  	k = p.AllowedKeyConfigurations[0]
   355  	if k.KeyType != certificate.KeyTypeECDSA {
   356  		t.Fatal("invalid key type")
   357  	}
   358  	if len(k.KeyCurves) != 1 || k.KeyCurves[0] != certificate.EllipticCurveP521 {
   359  		t.Fatal("bad key curve")
   360  	}
   361  
   362  	sp = serverPolicy{
   363  		KeyPair: struct {
   364  			KeyAlgorithm _strValue
   365  			KeySize      struct {
   366  				Locked bool
   367  				Value  int
   368  			}
   369  			EllipticCurve struct {
   370  				Locked bool
   371  				Value  string
   372  			}
   373  		}{
   374  			KeyAlgorithm: _strValue{
   375  				Locked: false,
   376  				Value:  "ec",
   377  			},
   378  			KeySize: struct {
   379  				Locked bool
   380  				Value  int
   381  			}{
   382  				Locked: true,
   383  				Value:  2048,
   384  			},
   385  			EllipticCurve: struct {
   386  				Locked bool
   387  				Value  string
   388  			}{
   389  				Locked: true,
   390  				Value:  "p384",
   391  			},
   392  		},
   393  	}
   394  	p = sp.toPolicy()
   395  	if len(p.AllowedKeyConfigurations) != 2 {
   396  		t.Fatal("invalid configurations values")
   397  	}
   398  	k = p.AllowedKeyConfigurations[0]
   399  	if k.KeyType != certificate.KeyTypeRSA {
   400  		t.Fatal("invalid key type")
   401  	}
   402  	if len(k.KeySizes) != 4 || k.KeySizes[0] != 2048 || k.KeySizes[1] != 3072 || k.KeySizes[2] != 4096 || k.KeySizes[3] != 8192 {
   403  		t.Fatal("bad key lengths")
   404  	}
   405  	k = p.AllowedKeyConfigurations[1]
   406  	if k.KeyType != certificate.KeyTypeECDSA {
   407  		t.Fatal("invalid key type")
   408  	}
   409  	if len(k.KeyCurves) != 1 || k.KeyCurves[0] != certificate.EllipticCurveP384 {
   410  		t.Fatal("bad key curve")
   411  	}
   412  
   413  	sp = serverPolicy{
   414  		WhitelistedDomains: []string{
   415  			"test1.com",
   416  			"test2.com",
   417  			".test3.com",
   418  		},
   419  	}
   420  	p = sp.toPolicy()
   421  	if len(p.SubjectCNRegexes) != 3 {
   422  		t.Fatalf("invalid SubjectCNRegexes length, expected 3, got %d", len(p.SubjectCNRegexes))
   423  	}
   424  	if p.SubjectCNRegexes[0] != "^([\\p{L}\\p{N}-]+\\.)*test1\\.com$" {
   425  		t.Fatalf("invalid SubjectCNRegexes[0], expected ^([\\p{L}\\p{N}-*]+\\.)*test1\\.com$, got %s", p.SubjectCNRegexes[0])
   426  	}
   427  	if p.SubjectCNRegexes[1] != "^([\\p{L}\\p{N}-]+\\.)*test2\\.com$" {
   428  		t.Fatalf("invalid SubjectCNRegexes[1], expected ^([\\p{L}\\p{N}-*]+\\.)*test2\\.com$, got %s", p.SubjectCNRegexes[1])
   429  	}
   430  	if p.SubjectCNRegexes[2] != "^([\\p{L}\\p{N}-]+\\.)+test3\\.com$" {
   431  		t.Fatalf("invalid SubjectCNRegexes[2], expected ^([\\p{L}\\p{N}-*]+\\.)+test3\\.com$, got %s", p.SubjectCNRegexes[2])
   432  	}
   433  }