@@ -25,6 +25,7 @@ import (
25
25
26
26
"github.com/go-chi/chi"
27
27
"github.com/smallstep/certificates/authority"
28
+ "github.com/smallstep/certificates/authority/provisioner"
28
29
"github.com/smallstep/certificates/logging"
29
30
"github.com/smallstep/cli/crypto/tlsutil"
30
31
"github.com/smallstep/cli/jose"
@@ -410,22 +411,22 @@ func TestSignRequest_Validate(t *testing.T) {
410
411
type mockAuthority struct {
411
412
ret1 , ret2 interface {}
412
413
err error
413
- authorize func (ott string ) ([]interface {} , error )
414
+ authorize func (ott string ) ([]provisioner. SignOption , error )
414
415
getTLSOptions func () * tlsutil.TLSOptions
415
416
root func (shasum string ) (* x509.Certificate , error )
416
- sign func (cr * x509.CertificateRequest , signOpts authority.SignOptions , extraOpts ... interface {} ) (* x509.Certificate , * x509.Certificate , error )
417
+ sign func (cr * x509.CertificateRequest , signOpts authority.SignOptions , extraOpts ... provisioner. SignOption ) (* x509.Certificate , * x509.Certificate , error )
417
418
renew func (cert * x509.Certificate ) (* x509.Certificate , * x509.Certificate , error )
418
- getProvisioners func (nextCursor string , limit int ) ([]* authority .Provisioner , string , error )
419
+ getProvisioners func (nextCursor string , limit int ) ([]* provisioner .Provisioner , string , error )
419
420
getEncryptedKey func (kid string ) (string , error )
420
421
getRoots func () ([]* x509.Certificate , error )
421
422
getFederation func () ([]* x509.Certificate , error )
422
423
}
423
424
424
- func (m * mockAuthority ) Authorize (ott string ) ([]interface {} , error ) {
425
+ func (m * mockAuthority ) Authorize (ott string ) ([]provisioner. SignOption , error ) {
425
426
if m .authorize != nil {
426
427
return m .authorize (ott )
427
428
}
428
- return m .ret1 .([]interface {} ), m .err
429
+ return m .ret1 .([]provisioner. SignOption ), m .err
429
430
}
430
431
431
432
func (m * mockAuthority ) GetTLSOptions () * tlsutil.TLSOptions {
@@ -442,7 +443,7 @@ func (m *mockAuthority) Root(shasum string) (*x509.Certificate, error) {
442
443
return m .ret1 .(* x509.Certificate ), m .err
443
444
}
444
445
445
- func (m * mockAuthority ) Sign (cr * x509.CertificateRequest , signOpts authority.SignOptions , extraOpts ... interface {} ) (* x509.Certificate , * x509.Certificate , error ) {
446
+ func (m * mockAuthority ) Sign (cr * x509.CertificateRequest , signOpts authority.SignOptions , extraOpts ... provisioner. SignOption ) (* x509.Certificate , * x509.Certificate , error ) {
446
447
if m .sign != nil {
447
448
return m .sign (cr , signOpts , extraOpts ... )
448
449
}
@@ -456,11 +457,11 @@ func (m *mockAuthority) Renew(cert *x509.Certificate) (*x509.Certificate, *x509.
456
457
return m .ret1 .(* x509.Certificate ), m .ret2 .(* x509.Certificate ), m .err
457
458
}
458
459
459
- func (m * mockAuthority ) GetProvisioners (nextCursor string , limit int ) ([]* authority .Provisioner , string , error ) {
460
+ func (m * mockAuthority ) GetProvisioners (nextCursor string , limit int ) ([]* provisioner .Provisioner , string , error ) {
460
461
if m .getProvisioners != nil {
461
462
return m .getProvisioners (nextCursor , limit )
462
463
}
463
- return m .ret1 .([]* authority .Provisioner ), m .ret2 .(string ), m .err
464
+ return m .ret1 .([]* provisioner .Provisioner ), m .ret2 .(string ), m .err
464
465
}
465
466
466
467
func (m * mockAuthority ) GetEncryptedKey (kid string ) (string , error ) {
@@ -597,7 +598,7 @@ func Test_caHandler_Sign(t *testing.T) {
597
598
tests := []struct {
598
599
name string
599
600
input string
600
- certAttrOpts []interface {}
601
+ certAttrOpts []provisioner. SignOption
601
602
autherr error
602
603
cert * x509.Certificate
603
604
root * x509.Certificate
@@ -617,7 +618,7 @@ func Test_caHandler_Sign(t *testing.T) {
617
618
t .Run (tt .name , func (t * testing.T ) {
618
619
h := New (& mockAuthority {
619
620
ret1 : tt .cert , ret2 : tt .root , err : tt .signErr ,
620
- authorize : func (ott string ) ([]interface {} , error ) {
621
+ authorize : func (ott string ) ([]provisioner. SignOption , error ) {
621
622
return tt .certAttrOpts , tt .autherr
622
623
},
623
624
getTLSOptions : func () * tlsutil.TLSOptions {
@@ -723,19 +724,19 @@ func Test_caHandler_Provisioners(t *testing.T) {
723
724
t .Fatal (err )
724
725
}
725
726
726
- p := []* authority .Provisioner {
727
- {
727
+ p := []* provisioner .Provisioner {
728
+ provisioner . New ( & provisioner. JWK {
728
729
Type : "JWK" ,
729
730
Name : "max" ,
730
731
EncryptedKey : "abc" ,
731
732
Key : & key ,
732
- },
733
- {
733
+ }) ,
734
+ provisioner . New ( & provisioner. JWK {
734
735
Type : "JWK" ,
735
736
Name : "mariano" ,
736
737
EncryptedKey : "def" ,
737
738
Key : & key ,
738
- },
739
+ }) ,
739
740
}
740
741
pr := ProvisionersResponse {
741
742
Provisioners : p ,
0 commit comments