@@ -11,7 +11,6 @@ import (
11
11
12
12
"github.com/pkg/errors"
13
13
"github.com/smallstep/assert"
14
- "github.com/smallstep/certificates/db"
15
14
"github.com/smallstep/certificates/errs"
16
15
"go.step.sm/crypto/jose"
17
16
"go.step.sm/crypto/pemutil"
@@ -83,52 +82,9 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
83
82
err : errors .New ("sshpop.authorizeToken; error extracting sshpop header from token: extractSSHPOPCert; error parsing token: " ),
84
83
}
85
84
},
86
- "fail/error-revoked-db-check" : func (t * testing.T ) test {
87
- p , err := generateSSHPOP ()
88
- assert .FatalError (t , err )
89
- p .db = & db.MockAuthDB {
90
- MIsSSHRevoked : func (sn string ) (bool , error ) {
91
- return false , errors .New ("force" )
92
- },
93
- }
94
- cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
95
- assert .FatalError (t , err )
96
- tok , err := generateSSHPOPToken (p , cert , jwk )
97
- assert .FatalError (t , err )
98
- return test {
99
- p : p ,
100
- token : tok ,
101
- code : http .StatusInternalServerError ,
102
- err : errors .New ("sshpop.authorizeToken; error checking checking sshpop cert revocation: force" ),
103
- }
104
- },
105
- "fail/cert-already-revoked" : func (t * testing.T ) test {
106
- p , err := generateSSHPOP ()
107
- assert .FatalError (t , err )
108
- p .db = & db.MockAuthDB {
109
- MIsSSHRevoked : func (sn string ) (bool , error ) {
110
- return true , nil
111
- },
112
- }
113
- cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
114
- assert .FatalError (t , err )
115
- tok , err := generateSSHPOPToken (p , cert , jwk )
116
- assert .FatalError (t , err )
117
- return test {
118
- p : p ,
119
- token : tok ,
120
- code : http .StatusUnauthorized ,
121
- err : errors .New ("sshpop.authorizeToken; sshpop certificate is revoked" ),
122
- }
123
- },
124
85
"fail/cert-not-yet-valid" : func (t * testing.T ) test {
125
86
p , err := generateSSHPOP ()
126
87
assert .FatalError (t , err )
127
- p .db = & db.MockAuthDB {
128
- MIsSSHRevoked : func (sn string ) (bool , error ) {
129
- return false , nil
130
- },
131
- }
132
88
cert , jwk , err := createSSHCert (& ssh.Certificate {
133
89
CertType : ssh .UserCert ,
134
90
ValidAfter : uint64 (time .Now ().Add (time .Minute ).Unix ()),
@@ -146,11 +102,6 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
146
102
"fail/cert-past-validity" : func (t * testing.T ) test {
147
103
p , err := generateSSHPOP ()
148
104
assert .FatalError (t , err )
149
- p .db = & db.MockAuthDB {
150
- MIsSSHRevoked : func (sn string ) (bool , error ) {
151
- return false , nil
152
- },
153
- }
154
105
cert , jwk , err := createSSHCert (& ssh.Certificate {
155
106
CertType : ssh .UserCert ,
156
107
ValidBefore : uint64 (time .Now ().Add (- time .Minute ).Unix ()),
@@ -168,11 +119,6 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
168
119
"fail/no-signer-found" : func (t * testing.T ) test {
169
120
p , err := generateSSHPOP ()
170
121
assert .FatalError (t , err )
171
- p .db = & db.MockAuthDB {
172
- MIsSSHRevoked : func (sn string ) (bool , error ) {
173
- return false , nil
174
- },
175
- }
176
122
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .HostCert }, sshSigner )
177
123
assert .FatalError (t , err )
178
124
tok , err := generateSSHPOPToken (p , cert , jwk )
@@ -187,11 +133,6 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
187
133
"fail/error-parsing-claims-bad-sig" : func (t * testing.T ) test {
188
134
p , err := generateSSHPOP ()
189
135
assert .FatalError (t , err )
190
- p .db = & db.MockAuthDB {
191
- MIsSSHRevoked : func (sn string ) (bool , error ) {
192
- return false , nil
193
- },
194
- }
195
136
cert , _ , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
196
137
assert .FatalError (t , err )
197
138
otherJWK , err := jose .GenerateJWK ("EC" , "P-256" , "ES256" , "sig" , "" , 0 )
@@ -208,11 +149,6 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
208
149
"fail/invalid-claims-issuer" : func (t * testing.T ) test {
209
150
p , err := generateSSHPOP ()
210
151
assert .FatalError (t , err )
211
- p .db = & db.MockAuthDB {
212
- MIsSSHRevoked : func (sn string ) (bool , error ) {
213
- return false , nil
214
- },
215
- }
216
152
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
217
153
assert .FatalError (t , err )
218
154
tok , err := generateToken ("foo" , "bar" , testAudiences .Sign [0 ], "" ,
@@ -228,11 +164,6 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
228
164
"fail/invalid-audience" : func (t * testing.T ) test {
229
165
p , err := generateSSHPOP ()
230
166
assert .FatalError (t , err )
231
- p .db = & db.MockAuthDB {
232
- MIsSSHRevoked : func (sn string ) (bool , error ) {
233
- return false , nil
234
- },
235
- }
236
167
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
237
168
assert .FatalError (t , err )
238
169
tok , err := generateToken ("foo" , p .GetName (), "invalid-aud" , "" ,
@@ -248,11 +179,6 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
248
179
"fail/empty-subject" : func (t * testing.T ) test {
249
180
p , err := generateSSHPOP ()
250
181
assert .FatalError (t , err )
251
- p .db = & db.MockAuthDB {
252
- MIsSSHRevoked : func (sn string ) (bool , error ) {
253
- return false , nil
254
- },
255
- }
256
182
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
257
183
assert .FatalError (t , err )
258
184
tok , err := generateToken ("" , p .GetName (), testAudiences .Sign [0 ], "" ,
@@ -268,11 +194,6 @@ func TestSSHPOP_authorizeToken(t *testing.T) {
268
194
"ok" : func (t * testing.T ) test {
269
195
p , err := generateSSHPOP ()
270
196
assert .FatalError (t , err )
271
- p .db = & db.MockAuthDB {
272
- MIsSSHRevoked : func (sn string ) (bool , error ) {
273
- return false , nil
274
- },
275
- }
276
197
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
277
198
assert .FatalError (t , err )
278
199
tok , err := generateSSHPOPToken (p , cert , jwk )
@@ -330,11 +251,6 @@ func TestSSHPOP_AuthorizeSSHRevoke(t *testing.T) {
330
251
"fail/subject-not-equal-serial" : func (t * testing.T ) test {
331
252
p , err := generateSSHPOP ()
332
253
assert .FatalError (t , err )
333
- p .db = & db.MockAuthDB {
334
- MIsSSHRevoked : func (sn string ) (bool , error ) {
335
- return false , nil
336
- },
337
- }
338
254
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshSigner )
339
255
assert .FatalError (t , err )
340
256
tok , err := generateToken ("foo" , p .GetName (), testAudiences .SSHRevoke [0 ], "" ,
@@ -350,11 +266,6 @@ func TestSSHPOP_AuthorizeSSHRevoke(t *testing.T) {
350
266
"ok" : func (t * testing.T ) test {
351
267
p , err := generateSSHPOP ()
352
268
assert .FatalError (t , err )
353
- p .db = & db.MockAuthDB {
354
- MIsSSHRevoked : func (sn string ) (bool , error ) {
355
- return false , nil
356
- },
357
- }
358
269
cert , jwk , err := createSSHCert (& ssh.Certificate {Serial : 123455 , CertType : ssh .UserCert }, sshSigner )
359
270
assert .FatalError (t , err )
360
271
tok , err := generateToken ("123455" , p .GetName (), testAudiences .SSHRevoke [0 ], "" ,
@@ -419,11 +330,6 @@ func TestSSHPOP_AuthorizeSSHRenew(t *testing.T) {
419
330
"fail/not-host-cert" : func (t * testing.T ) test {
420
331
p , err := generateSSHPOP ()
421
332
assert .FatalError (t , err )
422
- p .db = & db.MockAuthDB {
423
- MIsSSHRevoked : func (sn string ) (bool , error ) {
424
- return false , nil
425
- },
426
- }
427
333
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshUserSigner )
428
334
assert .FatalError (t , err )
429
335
tok , err := generateToken ("foo" , p .GetName (), testAudiences .SSHRenew [0 ], "" ,
@@ -439,11 +345,6 @@ func TestSSHPOP_AuthorizeSSHRenew(t *testing.T) {
439
345
"ok" : func (t * testing.T ) test {
440
346
p , err := generateSSHPOP ()
441
347
assert .FatalError (t , err )
442
- p .db = & db.MockAuthDB {
443
- MIsSSHRevoked : func (sn string ) (bool , error ) {
444
- return false , nil
445
- },
446
- }
447
348
cert , jwk , err := createSSHCert (& ssh.Certificate {Serial : 123455 , CertType : ssh .HostCert }, sshHostSigner )
448
349
assert .FatalError (t , err )
449
350
tok , err := generateToken ("123455" , p .GetName (), testAudiences .SSHRenew [0 ], "" ,
@@ -511,11 +412,6 @@ func TestSSHPOP_AuthorizeSSHRekey(t *testing.T) {
511
412
"fail/not-host-cert" : func (t * testing.T ) test {
512
413
p , err := generateSSHPOP ()
513
414
assert .FatalError (t , err )
514
- p .db = & db.MockAuthDB {
515
- MIsSSHRevoked : func (sn string ) (bool , error ) {
516
- return false , nil
517
- },
518
- }
519
415
cert , jwk , err := createSSHCert (& ssh.Certificate {CertType : ssh .UserCert }, sshUserSigner )
520
416
assert .FatalError (t , err )
521
417
tok , err := generateToken ("foo" , p .GetName (), testAudiences .SSHRekey [0 ], "" ,
@@ -531,11 +427,6 @@ func TestSSHPOP_AuthorizeSSHRekey(t *testing.T) {
531
427
"ok" : func (t * testing.T ) test {
532
428
p , err := generateSSHPOP ()
533
429
assert .FatalError (t , err )
534
- p .db = & db.MockAuthDB {
535
- MIsSSHRevoked : func (sn string ) (bool , error ) {
536
- return false , nil
537
- },
538
- }
539
430
cert , jwk , err := createSSHCert (& ssh.Certificate {Serial : 123455 , CertType : ssh .HostCert }, sshHostSigner )
540
431
assert .FatalError (t , err )
541
432
tok , err := generateToken ("123455" , p .GetName (), testAudiences .SSHRekey [0 ], "" ,
0 commit comments