@@ -154,7 +154,7 @@ func dateDummyCert(pub interface{}, start, end time.Time, san ...string) ([]byte
154
154
return nil , err
155
155
}
156
156
t := & x509.Certificate {
157
- SerialNumber : big . NewInt ( 1 ),
157
+ SerialNumber : randomSerial ( ),
158
158
NotBefore : start ,
159
159
NotAfter : end ,
160
160
BasicConstraintsValid : true ,
@@ -167,6 +167,14 @@ func dateDummyCert(pub interface{}, start, end time.Time, san ...string) ([]byte
167
167
return x509 .CreateCertificate (rand .Reader , t , t , pub , key )
168
168
}
169
169
170
+ func randomSerial () * big.Int {
171
+ serial , err := rand .Int (rand .Reader , new (big.Int ).Lsh (big .NewInt (1 ), 32 ))
172
+ if err != nil {
173
+ panic (err )
174
+ }
175
+ return serial
176
+ }
177
+
170
178
func decodePayload (v interface {}, r io.Reader ) error {
171
179
var req struct { Payload string }
172
180
if err := json .NewDecoder (r ).Decode (& req ); err != nil {
@@ -276,15 +284,54 @@ func TestGetCertificate_nilPrompt(t *testing.T) {
276
284
}
277
285
}
278
286
287
+ func TestGetCertificate_goodCache (t * testing.T ) {
288
+ // Make a valid cert and cache it.
289
+ pk , err := ecdsa .GenerateKey (elliptic .P256 (), rand .Reader )
290
+ if err != nil {
291
+ t .Fatal (err )
292
+ }
293
+ serial := randomSerial ()
294
+ tmpl := & x509.Certificate {
295
+ SerialNumber : serial ,
296
+ DNSNames : []string {exampleDomain },
297
+ // Use a time before the Let's Encrypt revocation cutoff to also test
298
+ // that non-Let's Encrypt certificates are not renewed.
299
+ NotBefore : time .Date (2022 , time .January , 1 , 0 , 0 , 0 , 0 , time .UTC ),
300
+ NotAfter : time .Date (2122 , time .January , 1 , 0 , 0 , 0 , 0 , time .UTC ),
301
+ }
302
+ pub , err := x509 .CreateCertificate (rand .Reader , tmpl , tmpl , & pk .PublicKey , pk )
303
+ if err != nil {
304
+ t .Fatal (err )
305
+ }
306
+ tlscert := & tls.Certificate {
307
+ Certificate : [][]byte {pub },
308
+ PrivateKey : pk ,
309
+ }
310
+
311
+ man := & Manager {Prompt : AcceptTOS , Cache : newMemCache (t )}
312
+ defer man .stopRenew ()
313
+ if err := man .cachePut (context .Background (), exampleCertKey , tlscert ); err != nil {
314
+ t .Fatalf ("man.cachePut: %v" , err )
315
+ }
316
+
317
+ hello := clientHelloInfo (exampleDomain , algECDSA )
318
+ gotCert := testGetCertificate (t , man , exampleDomain , hello )
319
+ if gotCert .SerialNumber .Cmp (serial ) != 0 {
320
+ t .Error ("good certificate was replaced" )
321
+ }
322
+ }
323
+
279
324
func TestGetCertificate_expiredCache (t * testing.T ) {
280
325
// Make an expired cert and cache it.
281
326
pk , err := ecdsa .GenerateKey (elliptic .P256 (), rand .Reader )
282
327
if err != nil {
283
328
t .Fatal (err )
284
329
}
330
+ serial := randomSerial ()
285
331
tmpl := & x509.Certificate {
286
- SerialNumber : big .NewInt (1 ),
287
- Subject : pkix.Name {CommonName : exampleDomain },
332
+ SerialNumber : serial ,
333
+ DNSNames : []string {exampleDomain },
334
+ NotBefore : time .Now ().Add (- 1 * time .Minute ),
288
335
NotAfter : time .Now (),
289
336
}
290
337
pub , err := x509 .CreateCertificate (rand .Reader , tmpl , tmpl , & pk .PublicKey , pk )
@@ -305,7 +352,89 @@ func TestGetCertificate_expiredCache(t *testing.T) {
305
352
// The expired cached cert should trigger a new cert issuance
306
353
// and return without an error.
307
354
hello := clientHelloInfo (exampleDomain , algECDSA )
308
- testGetCertificate (t , man , exampleDomain , hello )
355
+ gotCert := testGetCertificate (t , man , exampleDomain , hello )
356
+ if gotCert .SerialNumber .Cmp (serial ) == 0 {
357
+ t .Error ("expired certificate was not replaced" )
358
+ }
359
+ }
360
+
361
+ func TestGetCertificate_goodLetsEncrypt (t * testing.T ) {
362
+ pk , err := ecdsa .GenerateKey (elliptic .P256 (), rand .Reader )
363
+ if err != nil {
364
+ t .Fatal (err )
365
+ }
366
+ issuer := & x509.Certificate {
367
+ Subject : pkix.Name {Country : []string {"US" },
368
+ Organization : []string {"Let's Encrypt" }, CommonName : "R3" },
369
+ }
370
+ serial := randomSerial ()
371
+ tmpl := & x509.Certificate {
372
+ SerialNumber : serial ,
373
+ DNSNames : []string {exampleDomain },
374
+ NotBefore : time .Date (2022 , time .January , 26 , 12 , 0 , 0 , 0 , time .UTC ),
375
+ NotAfter : time .Date (2122 , time .January , 1 , 0 , 0 , 0 , 0 , time .UTC ),
376
+ }
377
+ pub , err := x509 .CreateCertificate (rand .Reader , tmpl , issuer , & pk .PublicKey , pk )
378
+ if err != nil {
379
+ t .Fatal (err )
380
+ }
381
+ tlscert := & tls.Certificate {
382
+ Certificate : [][]byte {pub },
383
+ PrivateKey : pk ,
384
+ }
385
+
386
+ man := & Manager {Prompt : AcceptTOS , Cache : newMemCache (t )}
387
+ defer man .stopRenew ()
388
+ if err := man .cachePut (context .Background (), exampleCertKey , tlscert ); err != nil {
389
+ t .Fatalf ("man.cachePut: %v" , err )
390
+ }
391
+
392
+ hello := clientHelloInfo (exampleDomain , algECDSA )
393
+ gotCert := testGetCertificate (t , man , exampleDomain , hello )
394
+ if gotCert .SerialNumber .Cmp (serial ) != 0 {
395
+ t .Error ("good certificate was replaced" )
396
+ }
397
+ }
398
+
399
+ func TestGetCertificate_revokedLetsEncrypt (t * testing.T ) {
400
+ // Make a presumably revoked Let's Encrypt cert and cache it.
401
+ pk , err := ecdsa .GenerateKey (elliptic .P256 (), rand .Reader )
402
+ if err != nil {
403
+ t .Fatal (err )
404
+ }
405
+ issuer := & x509.Certificate {
406
+ Subject : pkix.Name {Country : []string {"US" },
407
+ Organization : []string {"Let's Encrypt" }, CommonName : "R3" },
408
+ }
409
+ serial := randomSerial ()
410
+ tmpl := & x509.Certificate {
411
+ SerialNumber : serial ,
412
+ DNSNames : []string {exampleDomain },
413
+ NotBefore : time .Date (2022 , time .January , 1 , 0 , 0 , 0 , 0 , time .UTC ),
414
+ NotAfter : time .Date (2122 , time .January , 1 , 0 , 0 , 0 , 0 , time .UTC ),
415
+ }
416
+ pub , err := x509 .CreateCertificate (rand .Reader , tmpl , issuer , & pk .PublicKey , pk )
417
+ if err != nil {
418
+ t .Fatal (err )
419
+ }
420
+ tlscert := & tls.Certificate {
421
+ Certificate : [][]byte {pub },
422
+ PrivateKey : pk ,
423
+ }
424
+
425
+ man := & Manager {Prompt : AcceptTOS , Cache : newMemCache (t )}
426
+ defer man .stopRenew ()
427
+ if err := man .cachePut (context .Background (), exampleCertKey , tlscert ); err != nil {
428
+ t .Fatalf ("man.cachePut: %v" , err )
429
+ }
430
+
431
+ // The presumably revoked cached cert should trigger a new cert issuance
432
+ // and return without an error.
433
+ hello := clientHelloInfo (exampleDomain , algECDSA )
434
+ gotCert := testGetCertificate (t , man , exampleDomain , hello )
435
+ if gotCert .SerialNumber .Cmp (serial ) == 0 {
436
+ t .Error ("certificate was not replaced" )
437
+ }
309
438
}
310
439
311
440
func TestGetCertificate_failedAttempt (t * testing.T ) {
@@ -441,7 +570,7 @@ func TestGetCertificate_wrongCacheKeyType(t *testing.T) {
441
570
}
442
571
tmpl := & x509.Certificate {
443
572
SerialNumber : big .NewInt (1 ),
444
- Subject : pkix. Name { CommonName : exampleDomain },
573
+ DNSNames : [] string { exampleDomain },
445
574
NotAfter : time .Now ().Add (90 * 24 * time .Hour ),
446
575
}
447
576
pub , err := x509 .CreateCertificate (rand .Reader , tmpl , tmpl , & pk .PublicKey , pk )
@@ -599,7 +728,7 @@ func startACMEServerStub(t *testing.T, tokenCert getCertificateFunc, domain stri
599
728
600
729
// tests man.GetCertificate flow using the provided hello argument.
601
730
// The domain argument is the expected domain name of a certificate request.
602
- func testGetCertificate (t * testing.T , man * Manager , domain string , hello * tls.ClientHelloInfo ) {
731
+ func testGetCertificate (t * testing.T , man * Manager , domain string , hello * tls.ClientHelloInfo ) * x509. Certificate {
603
732
url , finish := startACMEServerStub (t , tokenCertFn (man , algECDSA ), domain )
604
733
defer finish ()
605
734
man .Client = & acme.Client {DirectoryURL : url }
@@ -633,6 +762,7 @@ func testGetCertificate(t *testing.T, man *Manager, domain string, hello *tls.Cl
633
762
t .Errorf ("cert.DNSNames = %v; want %q" , cert .DNSNames , domain )
634
763
}
635
764
765
+ return cert
636
766
}
637
767
638
768
func TestVerifyHTTP01 (t * testing.T ) {
0 commit comments