@@ -17,7 +17,7 @@ import (
17
17
"time"
18
18
19
19
"github.com/go-chi/chi"
20
- "github.com/smallstep/ca-component/provisioner "
20
+ "github.com/smallstep/ca-component/authority "
21
21
"github.com/smallstep/cli/crypto/tlsutil"
22
22
"github.com/smallstep/cli/jose"
23
23
)
@@ -349,7 +349,6 @@ func TestCertificateRequest_UnmarshalJSON_json(t *testing.T) {
349
349
}
350
350
351
351
func TestSignRequest_Validate (t * testing.T ) {
352
- now := time .Now ()
353
352
csr := parseCertificateRequest (csrPEM )
354
353
bad := parseCertificateRequest (csrPEM )
355
354
bad .Signature [0 ]++
@@ -364,16 +363,9 @@ func TestSignRequest_Validate(t *testing.T) {
364
363
fields fields
365
364
wantErr bool
366
365
}{
367
- {"ok" , fields {CertificateRequest {csr }, "foobarzar" , time.Time {}, time.Time {}}, false },
368
- {"ok 5m" , fields {CertificateRequest {csr }, "foobarzar" , now , now .Add (5 * time .Minute )}, false },
369
- {"ok 24h" , fields {CertificateRequest {csr }, "foobarzar" , now , now .Add (24 * time .Hour )}, false },
370
366
{"missing csr" , fields {CertificateRequest {}, "foobarzar" , time.Time {}, time.Time {}}, true },
371
367
{"invalid csr" , fields {CertificateRequest {bad }, "foobarzar" , time.Time {}, time.Time {}}, true },
372
368
{"missing ott" , fields {CertificateRequest {csr }, "" , time.Time {}, time.Time {}}, true },
373
- {"notAfter < now" , fields {CertificateRequest {csr }, "foobarzar" , now , now .Add (- 5 * time .Minute )}, true },
374
- {"notAfter < notBefore" , fields {CertificateRequest {csr }, "foobarzar" , now .Add (5 * time .Minute ), now .Add (4 * time .Minute )}, true },
375
- {"too short" , fields {CertificateRequest {csr }, "foobarzar" , now , now .Add (4 * time .Minute )}, true },
376
- {"too long" , fields {CertificateRequest {csr }, "foobarzar" , now , now .Add (24 * time .Hour ).Add (1 * time .Minute )}, true },
377
369
}
378
370
for _ , tt := range tests {
379
371
t .Run (tt .name , func (t * testing.T ) {
@@ -393,20 +385,20 @@ func TestSignRequest_Validate(t *testing.T) {
393
385
type mockAuthority struct {
394
386
ret1 , ret2 interface {}
395
387
err error
396
- authorize func (ott string ) ([]Claim , error )
388
+ authorize func (ott string ) ([]interface {} , error )
397
389
getTLSOptions func () * tlsutil.TLSOptions
398
390
root func (shasum string ) (* x509.Certificate , error )
399
- sign func (cr * x509.CertificateRequest , opts SignOptions , claims ... Claim ) (* x509.Certificate , * x509.Certificate , error )
391
+ sign func (cr * x509.CertificateRequest , signOpts authority. SignOptions , extraOpts ... interface {} ) (* x509.Certificate , * x509.Certificate , error )
400
392
renew func (cert * x509.Certificate ) (* x509.Certificate , * x509.Certificate , error )
401
- getProvisioners func () ([]* provisioner .Provisioner , error )
393
+ getProvisioners func () ([]* authority .Provisioner , error )
402
394
getEncryptedKey func (kid string ) (string , error )
403
395
}
404
396
405
- func (m * mockAuthority ) Authorize (ott string ) ([]Claim , error ) {
397
+ func (m * mockAuthority ) Authorize (ott string ) ([]interface {} , error ) {
406
398
if m .authorize != nil {
407
399
return m .authorize (ott )
408
400
}
409
- return m .ret1 .([]Claim ), m .err
401
+ return m .ret1 .([]interface {} ), m .err
410
402
}
411
403
412
404
func (m * mockAuthority ) GetTLSOptions () * tlsutil.TLSOptions {
@@ -416,24 +408,16 @@ func (m *mockAuthority) GetTLSOptions() *tlsutil.TLSOptions {
416
408
return m .ret1 .(* tlsutil.TLSOptions )
417
409
}
418
410
419
- func (m * mockAuthority ) GetMinDuration () time.Duration {
420
- return minCertDuration
421
- }
422
-
423
- func (m * mockAuthority ) GetMaxDuration () time.Duration {
424
- return maxCertDuration
425
- }
426
-
427
411
func (m * mockAuthority ) Root (shasum string ) (* x509.Certificate , error ) {
428
412
if m .root != nil {
429
413
return m .root (shasum )
430
414
}
431
415
return m .ret1 .(* x509.Certificate ), m .err
432
416
}
433
417
434
- func (m * mockAuthority ) Sign (cr * x509.CertificateRequest , opts SignOptions , claims ... Claim ) (* x509.Certificate , * x509.Certificate , error ) {
418
+ func (m * mockAuthority ) Sign (cr * x509.CertificateRequest , signOpts authority. SignOptions , extraOpts ... interface {} ) (* x509.Certificate , * x509.Certificate , error ) {
435
419
if m .sign != nil {
436
- return m .sign (cr , opts , claims ... )
420
+ return m .sign (cr , signOpts , extraOpts ... )
437
421
}
438
422
return m .ret1 .(* x509.Certificate ), m .ret2 .(* x509.Certificate ), m .err
439
423
}
@@ -445,11 +429,11 @@ func (m *mockAuthority) Renew(cert *x509.Certificate) (*x509.Certificate, *x509.
445
429
return m .ret1 .(* x509.Certificate ), m .ret2 .(* x509.Certificate ), m .err
446
430
}
447
431
448
- func (m * mockAuthority ) GetProvisioners () ([]* provisioner .Provisioner , error ) {
432
+ func (m * mockAuthority ) GetProvisioners () ([]* authority .Provisioner , error ) {
449
433
if m .getProvisioners != nil {
450
434
return m .getProvisioners ()
451
435
}
452
- return m .ret1 .([]* provisioner .Provisioner ), m .err
436
+ return m .ret1 .([]* authority .Provisioner ), m .err
453
437
}
454
438
455
439
func (m * mockAuthority ) GetEncryptedKey (kid string ) (string , error ) {
@@ -567,14 +551,14 @@ func Test_caHandler_Sign(t *testing.T) {
567
551
}
568
552
569
553
tests := []struct {
570
- name string
571
- input string
572
- claims [] Claim
573
- autherr error
574
- cert * x509.Certificate
575
- root * x509.Certificate
576
- signErr error
577
- statusCode int
554
+ name string
555
+ input string
556
+ certAttrOpts [] interface {}
557
+ autherr error
558
+ cert * x509.Certificate
559
+ root * x509.Certificate
560
+ signErr error
561
+ statusCode int
578
562
}{
579
563
{"ok" , string (valid ), nil , nil , parseCertificate (certPEM ), parseCertificate (rootPEM ), nil , http .StatusCreated },
580
564
{"json read error" , "{" , nil , nil , nil , nil , nil , http .StatusBadRequest },
@@ -589,8 +573,8 @@ func Test_caHandler_Sign(t *testing.T) {
589
573
t .Run (tt .name , func (t * testing.T ) {
590
574
h := New (& mockAuthority {
591
575
ret1 : tt .cert , ret2 : tt .root , err : tt .signErr ,
592
- authorize : func (ott string ) ([]Claim , error ) {
593
- return tt .claims , tt .autherr
576
+ authorize : func (ott string ) ([]interface {} , error ) {
577
+ return tt .certAttrOpts , tt .autherr
594
578
},
595
579
getTLSOptions : func () * tlsutil.TLSOptions {
596
580
return nil
@@ -690,7 +674,7 @@ func Test_caHandler_JWKSetByIssuer(t *testing.T) {
690
674
t .Fatal (err )
691
675
}
692
676
693
- p := []* provisioner .Provisioner {
677
+ p := []* authority .Provisioner {
694
678
{
695
679
Issuer : "p1" ,
696
680
Key : & key ,
@@ -766,7 +750,7 @@ func Test_caHandler_Provisioners(t *testing.T) {
766
750
t .Fatal (err )
767
751
}
768
752
769
- p := []* provisioner .Provisioner {
753
+ p := []* authority .Provisioner {
770
754
{
771
755
Type : "JWK" ,
772
756
Issuer : "max" ,
0 commit comments