1 package org.cacert.gigi;
3 import static org.junit.Assert.*;
5 import java.io.IOException;
6 import java.security.GeneralSecurityException;
7 import java.security.KeyPair;
8 import java.security.PrivateKey;
9 import java.security.cert.X509Certificate;
10 import java.sql.SQLException;
11 import java.util.Collection;
12 import java.util.List;
14 import org.cacert.gigi.dbObjects.Certificate;
15 import org.cacert.gigi.dbObjects.Certificate.CSRType;
16 import org.cacert.gigi.dbObjects.Certificate.CertificateStatus;
17 import org.cacert.gigi.dbObjects.Certificate.SANType;
18 import org.cacert.gigi.dbObjects.Certificate.SubjectAlternateName;
19 import org.cacert.gigi.dbObjects.CertificateProfile;
20 import org.cacert.gigi.dbObjects.Digest;
21 import org.cacert.gigi.dbObjects.User;
22 import org.cacert.gigi.pages.account.certs.Certificates;
23 import org.cacert.gigi.testUtils.IOUtils;
24 import org.cacert.gigi.testUtils.ManagedTest;
25 import org.junit.Test;
27 import sun.security.x509.GeneralNameInterface;
29 public class TestCertificate extends ManagedTest {
31 User u = User.getById(createVerifiedUser("fn", "ln", createUniqueName() + "@example.com", TEST_PASSWORD));
34 public void testClientCertLoginStates() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
35 KeyPair kp = generateKeypair();
36 String key1 = generatePEMCSR(kp, "CN=testmail@example.com");
37 Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key1, CSRType.CSR, CertificateProfile.getById(1));
38 final PrivateKey pk = kp.getPrivate();
39 c.issue(null, "2y", u).waitFor(60000);
40 final X509Certificate ce = c.cert();
41 assertNotNull(login(pk, ce));
45 public void testSANs() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
46 KeyPair kp = generateKeypair();
47 String key = generatePEMCSR(kp, "CN=testmail@example.com");
48 Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key, CSRType.CSR, CertificateProfile.getById(1),//
49 new SubjectAlternateName(SANType.EMAIL, "testmail@example.com"), new SubjectAlternateName(SANType.DNS, "testmail.example.com"));
51 testFails(CertificateStatus.DRAFT, c);
52 c.issue(null, "2y", u).waitFor(60000);
53 X509Certificate cert = c.cert();
54 Collection<List<?>> sans = cert.getSubjectAlternativeNames();
55 assertEquals(2, sans.size());
56 boolean hadDNS = false;
57 boolean hadEmail = false;
58 for (List<?> list : sans) {
59 assertEquals(2, list.size());
60 Integer type = (Integer) list.get(0);
62 case GeneralNameInterface.NAME_RFC822:
64 assertEquals("testmail@example.com", list.get(1));
66 case GeneralNameInterface.NAME_DNS:
68 assertEquals("testmail.example.com", list.get(1));
78 testFails(CertificateStatus.ISSUED, c);
80 Certificate c2 = Certificate.getBySerial(c.getSerial());
82 assertEquals(2, c2.getSANs().size());
83 assertEquals(c.getSANs().get(0).getName(), c2.getSANs().get(0).getName());
84 assertEquals(c.getSANs().get(0).getType(), c2.getSANs().get(0).getType());
85 assertEquals(c.getSANs().get(1).getName(), c2.getSANs().get(1).getName());
86 assertEquals(c.getSANs().get(1).getType(), c2.getSANs().get(1).getType());
89 c2.getSANs().remove(0);
90 fail("the list should not be modifiable");
91 } catch (UnsupportedOperationException e) {
97 public void testCertLifeCycle() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
98 KeyPair kp = generateKeypair();
99 String key = generatePEMCSR(kp, "CN=testmail@example.com");
100 Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key, CSRType.CSR, CertificateProfile.getById(1));
101 final PrivateKey pk = kp.getPrivate();
103 testFails(CertificateStatus.DRAFT, c);
104 c.issue(null, "2y", u).waitFor(60000);
106 String cookie = login(u.getEmail(), TEST_PASSWORD);
107 testFails(CertificateStatus.ISSUED, c);
108 X509Certificate cert = c.cert();
109 assertNotNull(login(pk, cert));
110 assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH)), "<td>(?:REVOKED|ISSUED)</td>"));
111 assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH + "?withRevoked")), "<td>(?:REVOKED|ISSUED)</td>"));
112 c.revoke().waitFor(60000);
114 testFails(CertificateStatus.REVOKED, c);
115 assertNull(login(pk, cert));
117 assertEquals(0, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH)), "<td>(?:REVOKED|ISSUED)</td>"));
118 assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH + "?withRevoked")), "<td>(?:REVOKED|ISSUED)</td>"));
121 private void testFails(CertificateStatus status, Certificate c) throws IOException, GeneralSecurityException, SQLException, GigiApiException {
122 assertEquals(status, c.getStatus());
123 if (status != CertificateStatus.ISSUED) {
126 fail(status + " is in invalid state");
127 } catch (IllegalStateException ise) {
131 if (status != CertificateStatus.DRAFT) {
133 c.issue(null, "2y", u);
134 fail(status + " is in invalid state");
135 } catch (IllegalStateException ise) {
139 if (status != CertificateStatus.ISSUED) {
142 if (status != CertificateStatus.REVOKED) {
143 fail(status + " is in invalid state");
145 } catch (IllegalStateException ise) {