Skip to content

Commit 64f2615

Browse files
committed
Fix tests.
1 parent 6d92ba7 commit 64f2615

File tree

6 files changed

+25
-20
lines changed

6 files changed

+25
-20
lines changed

api/api.go

+5
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,11 @@ type Authority interface {
3939
// TimeDuration is an alias of provisioner.TimeDuration
4040
type TimeDuration = provisioner.TimeDuration
4141

42+
// NewTimeDuration returns a TimeDuration with the defined time.
43+
func NewTimeDuration(t time.Time) TimeDuration {
44+
return provisioner.NewTimeDuration(t)
45+
}
46+
4247
// ParseTimeDuration returns a new TimeDuration parsing the RFC 3339 time or
4348
// time.Duration string.
4449
func ParseTimeDuration(s string) (TimeDuration, error) {

api/api_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -397,8 +397,8 @@ func TestSignRequest_Validate(t *testing.T) {
397397
s := &SignRequest{
398398
CsrPEM: tt.fields.CsrPEM,
399399
OTT: tt.fields.OTT,
400-
NotAfter: tt.fields.NotAfter,
401-
NotBefore: tt.fields.NotBefore,
400+
NotAfter: NewTimeDuration(tt.fields.NotAfter),
401+
NotBefore: NewTimeDuration(tt.fields.NotBefore),
402402
}
403403
if err := s.Validate(); (err != nil) != tt.wantErr {
404404
t.Errorf("SignRequest.Validate() error = %v, wantErr %v", err, tt.wantErr)

authority/tls_test.go

+10-10
Original file line numberDiff line numberDiff line change
@@ -89,8 +89,8 @@ func TestSign(t *testing.T) {
8989

9090
nb := time.Now()
9191
signOpts := provisioner.Options{
92-
NotBefore: nb,
93-
NotAfter: nb.Add(time.Minute * 5),
92+
NotBefore: provisioner.NewTimeDuration(nb),
93+
NotAfter: provisioner.NewTimeDuration(nb.Add(time.Minute * 5)),
9494
}
9595

9696
// Create a token to get test extra opts.
@@ -171,8 +171,8 @@ func TestSign(t *testing.T) {
171171
"fail provisioner duration claim": func(t *testing.T) *signTest {
172172
csr := getCSR(t, priv)
173173
_signOpts := provisioner.Options{
174-
NotBefore: nb,
175-
NotAfter: nb.Add(time.Hour * 25),
174+
NotBefore: provisioner.NewTimeDuration(nb),
175+
NotAfter: provisioner.NewTimeDuration(nb.Add(time.Hour * 25)),
176176
}
177177
return &signTest{
178178
auth: a,
@@ -229,8 +229,8 @@ func TestSign(t *testing.T) {
229229
}
230230
} else {
231231
if assert.Nil(t, tc.err) {
232-
assert.Equals(t, leaf.NotBefore, signOpts.NotBefore.UTC().Truncate(time.Second))
233-
assert.Equals(t, leaf.NotAfter, signOpts.NotAfter.UTC().Truncate(time.Second))
232+
assert.Equals(t, leaf.NotBefore, signOpts.NotBefore.Time().Truncate(time.Second))
233+
assert.Equals(t, leaf.NotAfter, signOpts.NotAfter.Time().Truncate(time.Second))
234234
tmplt := a.config.AuthorityConfig.Template
235235
assert.Equals(t, fmt.Sprintf("%v", leaf.Subject),
236236
fmt.Sprintf("%v", &pkix.Name{
@@ -300,13 +300,13 @@ func TestRenew(t *testing.T) {
300300
nb1 := now.Add(-time.Minute * 7)
301301
na1 := now
302302
so := &provisioner.Options{
303-
NotBefore: nb1,
304-
NotAfter: na1,
303+
NotBefore: provisioner.NewTimeDuration(nb1),
304+
NotAfter: provisioner.NewTimeDuration(na1),
305305
}
306306

307307
leaf, err := x509util.NewLeafProfile("renew", a.intermediateIdentity.Crt,
308308
a.intermediateIdentity.Key,
309-
x509util.WithNotBeforeAfterDuration(so.NotBefore, so.NotAfter, 0),
309+
x509util.WithNotBeforeAfterDuration(so.NotBefore.Time(), so.NotAfter.Time(), 0),
310310
withDefaultASN1DN(a.config.AuthorityConfig.Template),
311311
x509util.WithPublicKey(pub), x509util.WithHosts("test.smallstep.com,test"),
312312
withProvisionerOID("Max", a.config.AuthorityConfig.Provisioners[0].(*provisioner.JWK).Key.KeyID))
@@ -318,7 +318,7 @@ func TestRenew(t *testing.T) {
318318

319319
leafNoRenew, err := x509util.NewLeafProfile("norenew", a.intermediateIdentity.Crt,
320320
a.intermediateIdentity.Key,
321-
x509util.WithNotBeforeAfterDuration(so.NotBefore, so.NotAfter, 0),
321+
x509util.WithNotBeforeAfterDuration(so.NotBefore.Time(), so.NotAfter.Time(), 0),
322322
withDefaultASN1DN(a.config.AuthorityConfig.Template),
323323
x509util.WithPublicKey(pub), x509util.WithHosts("test.smallstep.com,test"),
324324
withProvisionerOID("dev", a.config.AuthorityConfig.Provisioners[2].(*provisioner.JWK).Key.KeyID),

ca/ca_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -209,8 +209,8 @@ ZEp7knvU2psWRw==
209209
body, err := json.Marshal(&api.SignRequest{
210210
CsrPEM: api.CertificateRequest{CertificateRequest: csr},
211211
OTT: raw,
212-
NotBefore: now,
213-
NotAfter: leafExpiry,
212+
NotBefore: api.NewTimeDuration(now),
213+
NotAfter: api.NewTimeDuration(leafExpiry),
214214
})
215215
assert.FatalError(t, err)
216216
return &signTest{
@@ -242,8 +242,8 @@ ZEp7knvU2psWRw==
242242
body, err := json.Marshal(&api.SignRequest{
243243
CsrPEM: api.CertificateRequest{CertificateRequest: csr},
244244
OTT: raw,
245-
NotBefore: now,
246-
NotAfter: leafExpiry,
245+
NotBefore: api.NewTimeDuration(now),
246+
NotAfter: api.NewTimeDuration(leafExpiry),
247247
})
248248
assert.FatalError(t, err)
249249
return &signTest{

ca/client_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -257,8 +257,8 @@ func TestClient_Sign(t *testing.T) {
257257
request := &api.SignRequest{
258258
CsrPEM: api.CertificateRequest{CertificateRequest: parseCertificateRequest(csrPEM)},
259259
OTT: "the-ott",
260-
NotBefore: time.Now(),
261-
NotAfter: time.Now().AddDate(0, 1, 0),
260+
NotBefore: api.NewTimeDuration(time.Now()),
261+
NotAfter: api.NewTimeDuration(time.Now().AddDate(0, 1, 0)),
262262
}
263263
unauthorized := api.Unauthorized(fmt.Errorf("Unauthorized"))
264264
badRequest := api.BadRequest(fmt.Errorf("Bad Request"))

ca/tls_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -95,8 +95,8 @@ func signDuration(srv *httptest.Server, domain string, duration time.Duration) (
9595
}
9696

9797
if duration > 0 {
98-
req.NotBefore = time.Now()
99-
req.NotAfter = req.NotBefore.Add(duration)
98+
req.NotBefore = api.NewTimeDuration(time.Now())
99+
req.NotAfter = api.NewTimeDuration(req.NotBefore.Time().Add(duration))
100100
}
101101

102102
client, err := NewClient(srv.URL, WithRootFile("testdata/secrets/root_ca.crt"))

0 commit comments

Comments
 (0)