File: http_client_test.go

package info (click to toggle)
golang-github-smallstep-certificates 0.29.0-4
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 6,412 kB
  • sloc: sh: 385; makefile: 129
file content (120 lines) | stat: -rw-r--r-- 3,260 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
package authority

import (
	"context"
	"crypto/tls"
	"crypto/x509"
	"fmt"
	"io"
	"net/http"
	"net/http/httptest"
	"testing"
	"time"

	"github.com/smallstep/certificates/authority/provisioner"
	"github.com/smallstep/certificates/internal/httptransport"
	"github.com/stretchr/testify/assert"
	"github.com/stretchr/testify/require"
	"go.step.sm/crypto/jose"
	"go.step.sm/crypto/keyutil"
	"go.step.sm/crypto/x509util"
)

func mustCertificate(t *testing.T, a *Authority, csr *x509.CertificateRequest) []*x509.Certificate {
	t.Helper()

	ctx := provisioner.NewContextWithMethod(context.Background(), provisioner.SignMethod)

	now := time.Now()
	signOpts := provisioner.SignOptions{
		NotBefore: provisioner.NewTimeDuration(now),
		NotAfter:  provisioner.NewTimeDuration(now.Add(5 * time.Minute)),
		Backdate:  1 * time.Minute,
	}

	sans := []string{}
	sans = append(sans, csr.DNSNames...)
	sans = append(sans, csr.EmailAddresses...)
	for _, s := range csr.IPAddresses {
		sans = append(sans, s.String())
	}
	for _, s := range csr.URIs {
		sans = append(sans, s.String())
	}

	key, err := jose.ReadKey("testdata/secrets/step_cli_key_priv.jwk", jose.WithPassword([]byte("pass")))
	require.NoError(t, err)

	token, err := generateToken(csr.Subject.CommonName, "step-cli", testAudiences.Sign[0], sans, now, key)
	require.NoError(t, err)

	extraOpts, err := a.Authorize(ctx, token)
	require.NoError(t, err)

	chain, err := a.SignWithContext(ctx, csr, signOpts, extraOpts...)
	require.NoError(t, err)

	return chain
}

func Test_newHTTPClient(t *testing.T) {
	signer, err := keyutil.GenerateDefaultSigner()
	require.NoError(t, err)

	csr, err := x509util.CreateCertificateRequest("test", []string{"localhost", "127.0.0.1", "[::1]"}, signer)
	require.NoError(t, err)

	auth := testAuthority(t)
	chain := mustCertificate(t, auth, csr)

	t.Run("SystemCertPool", func(t *testing.T) {
		resp, err := auth.httpClient.Get("https://smallstep.com")
		require.NoError(t, err)
		assert.Equal(t, http.StatusOK, resp.StatusCode)
		b, err := io.ReadAll(resp.Body)
		assert.NoError(t, err)
		assert.NotEmpty(t, b)
		assert.NoError(t, resp.Body.Close())
	})

	t.Run("LocalCertPool", func(t *testing.T) {
		srv := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
			fmt.Fprint(w, "ok")
		}))
		srv.TLS = &tls.Config{
			Certificates: []tls.Certificate{
				{Certificate: [][]byte{chain[0].Raw, chain[1].Raw}, PrivateKey: signer, Leaf: chain[0]},
			},
		}
		srv.StartTLS()
		defer srv.Close()

		resp, err := auth.httpClient.Get(srv.URL)
		require.NoError(t, err)
		assert.Equal(t, http.StatusOK, resp.StatusCode)
		b, err := io.ReadAll(resp.Body)
		assert.NoError(t, err)
		assert.Equal(t, []byte("ok"), b)
		assert.NoError(t, resp.Body.Close())

		t.Run("DefaultClient", func(t *testing.T) {
			client := &http.Client{}
			_, err := client.Get(srv.URL)
			assert.Error(t, err)
		})
	})

	t.Run("custom transport", func(t *testing.T) {
		tmp := http.DefaultTransport
		t.Cleanup(func() {
			http.DefaultTransport = tmp
		})
		transport := struct {
			http.RoundTripper
		}{http.DefaultTransport}
		http.DefaultTransport = transport

		client := newHTTPClient(httptransport.NoopWrapper(), auth.rootX509Certs...)
		assert.NotNil(t, client)
	})
}