]> WPIA git - gigi.git/blob - tests/club/wpia/gigi/TestCertificate.java
add: ensure that for Org Administrator actions certificate login is used
[gigi.git] / tests / club / wpia / gigi / TestCertificate.java
1 package club.wpia.gigi;
2
3 import static org.junit.Assert.*;
4
5 import java.io.IOException;
6 import java.math.BigInteger;
7 import java.security.GeneralSecurityException;
8 import java.security.KeyPair;
9 import java.security.PrivateKey;
10 import java.security.cert.X509Certificate;
11 import java.sql.SQLException;
12 import java.util.Collection;
13 import java.util.List;
14
15 import org.hamcrest.CoreMatchers;
16 import org.junit.Test;
17
18 import club.wpia.gigi.dbObjects.Certificate;
19 import club.wpia.gigi.dbObjects.Certificate.CSRType;
20 import club.wpia.gigi.dbObjects.Certificate.CertificateStatus;
21 import club.wpia.gigi.dbObjects.Certificate.RevocationType;
22 import club.wpia.gigi.dbObjects.Certificate.SANType;
23 import club.wpia.gigi.dbObjects.Certificate.SubjectAlternateName;
24 import club.wpia.gigi.dbObjects.Digest;
25 import club.wpia.gigi.dbObjects.User;
26 import club.wpia.gigi.pages.account.certs.Certificates;
27 import club.wpia.gigi.testUtils.IOUtils;
28 import club.wpia.gigi.testUtils.ManagedTest;
29 import club.wpia.gigi.util.RandomToken;
30 import sun.security.x509.GeneralNameInterface;
31
32 public class TestCertificate extends ManagedTest {
33
34     User u = User.getById(createVerifiedUser("fn", "ln", createUniqueName() + "@example.com", TEST_PASSWORD));
35
36     @Test
37     public void testClientCertLoginStates() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
38         KeyPair kp = generateKeypair();
39         String key1 = generatePEMCSR(kp, "CN=testmail@example.com");
40         Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key1, CSRType.CSR, getClientProfile());
41         final PrivateKey pk = kp.getPrivate();
42         await(c.issue(null, "2y", u));
43         final X509Certificate ce = c.cert();
44         c.setLoginEnabled(true);
45         assertNotNull(login(pk, ce));
46     }
47
48     @Test
49     public void testSANs() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
50         KeyPair kp = generateKeypair();
51         String key = generatePEMCSR(kp, "CN=testmail@example.com");
52         Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key, CSRType.CSR, getClientProfile(),//
53                 new SubjectAlternateName(SANType.EMAIL, "testmail@example.com"), new SubjectAlternateName(SANType.DNS, "testmail.example.com"));
54
55         testFails(CertificateStatus.DRAFT, c);
56         await(c.issue(null, "2y", u));
57         X509Certificate cert = c.cert();
58         Collection<List<?>> sans = cert.getSubjectAlternativeNames();
59         assertEquals(2, sans.size());
60         boolean hadDNS = false;
61         boolean hadEmail = false;
62         for (List<?> list : sans) {
63             assertEquals(2, list.size());
64             Integer type = (Integer) list.get(0);
65             switch (type) {
66             case GeneralNameInterface.NAME_RFC822:
67                 hadEmail = true;
68                 assertEquals("testmail@example.com", list.get(1));
69                 break;
70             case GeneralNameInterface.NAME_DNS:
71                 hadDNS = true;
72                 assertEquals("testmail.example.com", list.get(1));
73                 break;
74             default:
75                 fail("Unknown type");
76
77             }
78         }
79         assertTrue(hadDNS);
80         assertTrue(hadEmail);
81
82         testFails(CertificateStatus.ISSUED, c);
83
84         Certificate c2 = Certificate.getBySerial(new BigInteger(c.getSerial(), 16));
85         assertNotNull(c2);
86         assertEquals(2, c2.getSANs().size());
87         assertEquals(c.getSANs().get(0).getName(), c2.getSANs().get(0).getName());
88         assertEquals(c.getSANs().get(0).getType(), c2.getSANs().get(0).getType());
89         assertEquals(c.getSANs().get(1).getName(), c2.getSANs().get(1).getName());
90         assertEquals(c.getSANs().get(1).getType(), c2.getSANs().get(1).getType());
91
92         try {
93             c2.getSANs().remove(0);
94             fail("the list should not be modifiable");
95         } catch (UnsupportedOperationException e) {
96             // expected
97         }
98     }
99
100     @Test
101     public void testCertCreateSHA384() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
102         KeyPair kp = generateKeypair();
103         String key = generatePEMCSR(kp, "CN=testmail@example.com");
104         Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA384, key, CSRType.CSR, getClientProfile());
105         await(c.issue(null, "2y", u));
106         assertThat(c.cert().getSigAlgName().toLowerCase(), CoreMatchers.containsString("sha384"));
107     }
108
109     @Test
110     public void testCertLifeCycle() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
111         KeyPair kp = generateKeypair();
112         String key = generatePEMCSR(kp, "CN=testmail@example.com");
113         Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key, CSRType.CSR, getClientProfile());
114         final PrivateKey pk = kp.getPrivate();
115
116         testFails(CertificateStatus.DRAFT, c);
117         await(c.issue(null, "2y", u));
118
119         String cookie = login(u.getEmail(), TEST_PASSWORD);
120         testFails(CertificateStatus.ISSUED, c);
121         X509Certificate cert = c.cert();
122         c.setLoginEnabled(true);
123         assertNotNull(login(pk, cert));
124         assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH)), "<td>(?:REVOKED|ISSUED)</td>"));
125         assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH + "?withRevoked")), "<td>(?:REVOKED|ISSUED)</td>"));
126         await(c.revoke(RevocationType.USER));
127
128         testFails(CertificateStatus.REVOKED, c);
129         assertNull(login(pk, cert));
130
131         assertEquals(0, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH)), "<td>(?:REVOKED|ISSUED)</td>"));
132         assertEquals(1, countRegex(IOUtils.readURL(get(cookie, Certificates.PATH + "?withRevoked")), "<td>(?:REVOKED|ISSUED)</td>"));
133     }
134
135     private void testFails(CertificateStatus status, Certificate c) throws IOException, GeneralSecurityException, SQLException, GigiApiException {
136         assertEquals(status, c.getStatus());
137         if (status != CertificateStatus.ISSUED) {
138             try {
139                 c.revoke(RevocationType.USER);
140                 fail(status + " is in invalid state");
141             } catch (IllegalStateException ise) {
142
143             }
144         }
145         if (status != CertificateStatus.DRAFT) {
146             try {
147                 c.issue(null, "2y", u);
148                 fail(status + " is in invalid state");
149             } catch (IllegalStateException ise) {
150
151             }
152         }
153         if (status != CertificateStatus.ISSUED) {
154             try {
155                 c.cert();
156                 if (status != CertificateStatus.REVOKED) {
157                     fail(status + " is in invalid state");
158                 }
159             } catch (IllegalStateException ise) {
160
161             }
162         }
163     }
164
165     @Test
166     public void testClientCertDescription() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException {
167         KeyPair kp = generateKeypair();
168         String key1 = generatePEMCSR(kp, "CN=testmail@example.com");
169         Certificate c = new Certificate(u, u, Certificate.buildDN("CN", "testmail@example.com"), Digest.SHA256, key1, CSRType.CSR, getClientProfile());
170         await(c.issue(null, "2y", u));
171         String description = RandomToken.generateToken(95) + DIFFICULT_CHARS;
172         c.setDescription(description);
173         assertEquals(description, c.getDescription());
174
175         // test that description is entered to db
176         int cid = c.getId();
177         clearCaches();
178         Certificate cn = Certificate.getById(cid);
179         assertEquals(description, cn.getDescription());
180
181     }
182 }