@@ -27,9 +27,9 @@ import (
27
27
"github.com/smallstep/certificates/errs"
28
28
"github.com/smallstep/cli/crypto/keys"
29
29
"github.com/smallstep/cli/crypto/pemutil"
30
- "github.com/smallstep/cli/crypto/x509util"
31
30
stepJOSE "github.com/smallstep/cli/jose"
32
31
"go.step.sm/crypto/randutil"
32
+ "go.step.sm/crypto/x509util"
33
33
jose "gopkg.in/square/go-jose.v2"
34
34
"gopkg.in/square/go-jose.v2/jwt"
35
35
)
@@ -93,13 +93,9 @@ func TestCASign(t *testing.T) {
93
93
config .AuthorityConfig .Template = asn1dn
94
94
ca , err := New (config )
95
95
assert .FatalError (t , err )
96
-
97
- intermediateIdentity , err := x509util .LoadIdentityFromDisk ("testdata/secrets/intermediate_ca.crt" ,
98
- "testdata/secrets/intermediate_ca_key" , pemutil .WithPassword ([]byte ("password" )))
96
+ intermediateCert , err := pemutil .ReadCertificate ("testdata/secrets/intermediate_ca.crt" )
99
97
assert .FatalError (t , err )
100
-
101
- clijwk , err := stepJOSE .ParseKey ("testdata/secrets/step_cli_key_priv.jwk" ,
102
- stepJOSE .WithPassword ([]byte ("pass" )))
98
+ clijwk , err := stepJOSE .ParseKey ("testdata/secrets/step_cli_key_priv.jwk" , stepJOSE .WithPassword ([]byte ("pass" )))
103
99
assert .FatalError (t , err )
104
100
sig , err := jose .NewSigner (jose.SigningKey {Algorithm : jose .ES256 , Key : clijwk .Key },
105
101
(& jose.SignerOptions {}).WithType ("JWT" ).WithHeader ("kid" , clijwk .KeyID ))
@@ -321,9 +317,9 @@ ZEp7knvU2psWRw==
321
317
assert .FatalError (t , err )
322
318
assert .Equals (t , leaf .SubjectKeyId , subjectKeyID )
323
319
324
- assert .Equals (t , leaf .AuthorityKeyId , intermediateIdentity . Crt .SubjectKeyId )
320
+ assert .Equals (t , leaf .AuthorityKeyId , intermediateCert .SubjectKeyId )
325
321
326
- realIntermediate , err := x509 .ParseCertificate (intermediateIdentity . Crt .Raw )
322
+ realIntermediate , err := x509 .ParseCertificate (intermediateCert .Raw )
327
323
assert .FatalError (t , err )
328
324
assert .Equals (t , intermediate , realIntermediate )
329
325
} else {
@@ -555,7 +551,7 @@ func TestCAHealth(t *testing.T) {
555
551
}
556
552
557
553
func TestCARenew (t * testing.T ) {
558
- pub , _ , err := keys .GenerateDefaultKeyPair ()
554
+ pub , priv , err := keys .GenerateDefaultKeyPair ()
559
555
assert .FatalError (t , err )
560
556
561
557
asn1dn := & authority.ASN1DN {
@@ -574,8 +570,9 @@ func TestCARenew(t *testing.T) {
574
570
assert .FatalError (t , err )
575
571
assert .FatalError (t , err )
576
572
577
- intermediateIdentity , err := x509util .LoadIdentityFromDisk ("testdata/secrets/intermediate_ca.crt" ,
578
- "testdata/secrets/intermediate_ca_key" , pemutil .WithPassword ([]byte ("password" )))
573
+ intermediateCert , err := pemutil .ReadCertificate ("testdata/secrets/intermediate_ca.crt" )
574
+ assert .FatalError (t , err )
575
+ intermediateKey , err := pemutil .Read ("testdata/secrets/intermediate_ca_key" , pemutil .WithPassword ([]byte ("password" )))
579
576
assert .FatalError (t , err )
580
577
581
578
now := time .Now ().UTC ()
@@ -605,15 +602,15 @@ func TestCARenew(t *testing.T) {
605
602
}
606
603
},
607
604
"success" : func (t * testing.T ) * renewTest {
608
- profile , err := x509util .NewLeafProfile ("test" , intermediateIdentity .Crt ,
609
- intermediateIdentity .Key , x509util .WithPublicKey (pub ),
610
- x509util .WithNotBeforeAfterDuration (now , leafExpiry , 0 ), x509util .WithHosts ("funk" ))
605
+ cr , err := x509util .CreateCertificateRequest ("test" , []string {"funk" }, priv .(crypto.Signer ))
611
606
assert .FatalError (t , err )
612
- crtBytes , err := profile . CreateCertificate ( )
607
+ cert , err := x509util . NewCertificate ( cr )
613
608
assert .FatalError (t , err )
614
- crt , err := x509 .ParseCertificate (crtBytes )
609
+ crt := cert .GetCertificate ()
610
+ crt .NotBefore = time .Now ()
611
+ crt .NotAfter = leafExpiry
612
+ crt , err = x509util .CreateCertificate (crt , intermediateCert , pub , intermediateKey .(crypto.Signer ))
615
613
assert .FatalError (t , err )
616
-
617
614
return & renewTest {
618
615
ca : ca ,
619
616
tlsConnState : & tls.ConnectionState {
@@ -661,9 +658,9 @@ func TestCARenew(t *testing.T) {
661
658
subjectKeyID , err := generateSubjectKeyID (pub )
662
659
assert .FatalError (t , err )
663
660
assert .Equals (t , leaf .SubjectKeyId , subjectKeyID )
664
- assert .Equals (t , leaf .AuthorityKeyId , intermediateIdentity . Crt .SubjectKeyId )
661
+ assert .Equals (t , leaf .AuthorityKeyId , intermediateCert .SubjectKeyId )
665
662
666
- realIntermediate , err := x509 .ParseCertificate (intermediateIdentity . Crt .Raw )
663
+ realIntermediate , err := x509 .ParseCertificate (intermediateCert .Raw )
667
664
assert .FatalError (t , err )
668
665
assert .Equals (t , intermediate , realIntermediate )
669
666
0 commit comments