1 package club.wpia.gigi;
3 import static org.junit.Assert.*;
5 import java.io.IOException;
6 import java.security.GeneralSecurityException;
7 import java.security.KeyPair;
8 import java.security.PrivateKey;
9 import java.security.cert.X509Certificate;
10 import java.sql.SQLException;
11 import java.util.Collection;
12 import java.util.List;
14 import org.hamcrest.CoreMatchers;
15 import org.junit.Test;
17 import club.wpia.gigi.dbObjects.Certificate;
18 import club.wpia.gigi.dbObjects.Certificate.CSRType;
19 import club.wpia.gigi.dbObjects.Certificate.CertificateStatus;
20 import club.wpia.gigi.dbObjects.Certificate.RevocationType;
21 import club.wpia.gigi.dbObjects.Certificate.SANType;
22 import club.wpia.gigi.dbObjects.Certificate.SubjectAlternateName;
23 import club.wpia.gigi.dbObjects.Digest;
24 import club.wpia.gigi.dbObjects.User;
25 import club.wpia.gigi.pages.account.certs.Certificates;
26 import club.wpia.gigi.testUtils.IOUtils;
27 import club.wpia.gigi.testUtils.ManagedTest;
28 import sun.security.x509.GeneralNameInterface;
30 public class TestCertificate extends ManagedTest {
32 User u = User.getById(createVerifiedUser("fn", "ln", createUniqueName() + "@example.com", TEST_PASSWORD));
35 public void testClientCertLoginStates() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
36 KeyPair kp = generateKeypair();
37 String key1 = generatePEMCSR(kp, "CN=testmail@example.com");
38 Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key1, CSRType.CSR, getClientProfile());
39 final PrivateKey pk = kp.getPrivate();
40 await(c.issue(null, "2y", u));
41 final X509Certificate ce = c.cert();
42 c.setLoginEnabled(true);
43 assertNotNull(login(pk, ce));
47 public void testSANs() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
48 KeyPair kp = generateKeypair();
49 String key = generatePEMCSR(kp, "CN=testmail@example.com");
50 Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key, CSRType.CSR, getClientProfile(),//
51 new SubjectAlternateName(SANType.EMAIL, "testmail@example.com"), new SubjectAlternateName(SANType.DNS, "testmail.example.com"));
53 testFails(CertificateStatus.DRAFT, c);
54 await(c.issue(null, "2y", u));
55 X509Certificate cert = c.cert();
56 Collection<List<?>> sans = cert.getSubjectAlternativeNames();
57 assertEquals(2, sans.size());
58 boolean hadDNS = false;
59 boolean hadEmail = false;
60 for (List<?> list : sans) {
61 assertEquals(2, list.size());
62 Integer type = (Integer) list.get(0);
64 case GeneralNameInterface.NAME_RFC822:
66 assertEquals("testmail@example.com", list.get(1));
68 case GeneralNameInterface.NAME_DNS:
70 assertEquals("testmail.example.com", list.get(1));
80 testFails(CertificateStatus.ISSUED, c);
82 Certificate c2 = Certificate.getBySerial(c.getSerial());
84 assertEquals(2, c2.getSANs().size());
85 assertEquals(c.getSANs().get(0).getName(), c2.getSANs().get(0).getName());
86 assertEquals(c.getSANs().get(0).getType(), c2.getSANs().get(0).getType());
87 assertEquals(c.getSANs().get(1).getName(), c2.getSANs().get(1).getName());
88 assertEquals(c.getSANs().get(1).getType(), c2.getSANs().get(1).getType());
91 c2.getSANs().remove(0);
92 fail("the list should not be modifiable");
93 } catch (UnsupportedOperationException e) {
99 public void testCertCreateSHA384() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
100 KeyPair kp = generateKeypair();
101 String key = generatePEMCSR(kp, "CN=testmail@example.com");
102 Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA384, key, CSRType.CSR, getClientProfile());
103 await(c.issue(null, "2y", u));
104 assertThat(c.cert().getSigAlgName().toLowerCase(), CoreMatchers.containsString("sha384"));
108 public void testCertLifeCycle() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
109 KeyPair kp = generateKeypair();
110 String key = generatePEMCSR(kp, "CN=testmail@example.com");
111 Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key, CSRType.CSR, getClientProfile());
112 final PrivateKey pk = kp.getPrivate();
114 testFails(CertificateStatus.DRAFT, c);
115 await(c.issue(null, "2y", u));
117 String cookie = login(u.getEmail(), TEST_PASSWORD);
118 testFails(CertificateStatus.ISSUED, c);
119 X509Certificate cert = c.cert();
120 c.setLoginEnabled(true);
121 assertNotNull(login(pk, cert));
122 assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH)), "<td>(?:REVOKED|ISSUED)</td>"));
123 assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH + "?withRevoked")), "<td>(?:REVOKED|ISSUED)</td>"));
124 await(c.revoke(RevocationType.USER));
126 testFails(CertificateStatus.REVOKED, c);
127 assertNull(login(pk, cert));
129 assertEquals(0, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH)), "<td>(?:REVOKED|ISSUED)</td>"));
130 assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH + "?withRevoked")), "<td>(?:REVOKED|ISSUED)</td>"));
133 private void testFails(CertificateStatus status, Certificate c) throws IOException, GeneralSecurityException, SQLException, GigiApiException {
134 assertEquals(status, c.getStatus());
135 if (status != CertificateStatus.ISSUED) {
137 c.revoke(RevocationType.USER);
138 fail(status + " is in invalid state");
139 } catch (IllegalStateException ise) {
143 if (status != CertificateStatus.DRAFT) {
145 c.issue(null, "2y", u);
146 fail(status + " is in invalid state");
147 } catch (IllegalStateException ise) {
151 if (status != CertificateStatus.ISSUED) {
154 if (status != CertificateStatus.REVOKED) {
155 fail(status + " is in invalid state");
157 } catch (IllegalStateException ise) {