Fix tests.

pull/56/head
Mariano Cano 5 years ago
parent 6d92ba75b9
commit 64f2615864

@ -39,6 +39,11 @@ type Authority interface {
// TimeDuration is an alias of provisioner.TimeDuration // TimeDuration is an alias of provisioner.TimeDuration
type TimeDuration = provisioner.TimeDuration type TimeDuration = provisioner.TimeDuration
// NewTimeDuration returns a TimeDuration with the defined time.
func NewTimeDuration(t time.Time) TimeDuration {
return provisioner.NewTimeDuration(t)
}
// ParseTimeDuration returns a new TimeDuration parsing the RFC 3339 time or // ParseTimeDuration returns a new TimeDuration parsing the RFC 3339 time or
// time.Duration string. // time.Duration string.
func ParseTimeDuration(s string) (TimeDuration, error) { func ParseTimeDuration(s string) (TimeDuration, error) {

@ -397,8 +397,8 @@ func TestSignRequest_Validate(t *testing.T) {
s := &SignRequest{ s := &SignRequest{
CsrPEM: tt.fields.CsrPEM, CsrPEM: tt.fields.CsrPEM,
OTT: tt.fields.OTT, OTT: tt.fields.OTT,
NotAfter: tt.fields.NotAfter, NotAfter: NewTimeDuration(tt.fields.NotAfter),
NotBefore: tt.fields.NotBefore, NotBefore: NewTimeDuration(tt.fields.NotBefore),
} }
if err := s.Validate(); (err != nil) != tt.wantErr { if err := s.Validate(); (err != nil) != tt.wantErr {
t.Errorf("SignRequest.Validate() error = %v, wantErr %v", err, tt.wantErr) t.Errorf("SignRequest.Validate() error = %v, wantErr %v", err, tt.wantErr)

@ -89,8 +89,8 @@ func TestSign(t *testing.T) {
nb := time.Now() nb := time.Now()
signOpts := provisioner.Options{ signOpts := provisioner.Options{
NotBefore: nb, NotBefore: provisioner.NewTimeDuration(nb),
NotAfter: nb.Add(time.Minute * 5), NotAfter: provisioner.NewTimeDuration(nb.Add(time.Minute * 5)),
} }
// Create a token to get test extra opts. // Create a token to get test extra opts.
@ -171,8 +171,8 @@ func TestSign(t *testing.T) {
"fail provisioner duration claim": func(t *testing.T) *signTest { "fail provisioner duration claim": func(t *testing.T) *signTest {
csr := getCSR(t, priv) csr := getCSR(t, priv)
_signOpts := provisioner.Options{ _signOpts := provisioner.Options{
NotBefore: nb, NotBefore: provisioner.NewTimeDuration(nb),
NotAfter: nb.Add(time.Hour * 25), NotAfter: provisioner.NewTimeDuration(nb.Add(time.Hour * 25)),
} }
return &signTest{ return &signTest{
auth: a, auth: a,
@ -229,8 +229,8 @@ func TestSign(t *testing.T) {
} }
} else { } else {
if assert.Nil(t, tc.err) { if assert.Nil(t, tc.err) {
assert.Equals(t, leaf.NotBefore, signOpts.NotBefore.UTC().Truncate(time.Second)) assert.Equals(t, leaf.NotBefore, signOpts.NotBefore.Time().Truncate(time.Second))
assert.Equals(t, leaf.NotAfter, signOpts.NotAfter.UTC().Truncate(time.Second)) assert.Equals(t, leaf.NotAfter, signOpts.NotAfter.Time().Truncate(time.Second))
tmplt := a.config.AuthorityConfig.Template tmplt := a.config.AuthorityConfig.Template
assert.Equals(t, fmt.Sprintf("%v", leaf.Subject), assert.Equals(t, fmt.Sprintf("%v", leaf.Subject),
fmt.Sprintf("%v", &pkix.Name{ fmt.Sprintf("%v", &pkix.Name{
@ -300,13 +300,13 @@ func TestRenew(t *testing.T) {
nb1 := now.Add(-time.Minute * 7) nb1 := now.Add(-time.Minute * 7)
na1 := now na1 := now
so := &provisioner.Options{ so := &provisioner.Options{
NotBefore: nb1, NotBefore: provisioner.NewTimeDuration(nb1),
NotAfter: na1, NotAfter: provisioner.NewTimeDuration(na1),
} }
leaf, err := x509util.NewLeafProfile("renew", a.intermediateIdentity.Crt, leaf, err := x509util.NewLeafProfile("renew", a.intermediateIdentity.Crt,
a.intermediateIdentity.Key, a.intermediateIdentity.Key,
x509util.WithNotBeforeAfterDuration(so.NotBefore, so.NotAfter, 0), x509util.WithNotBeforeAfterDuration(so.NotBefore.Time(), so.NotAfter.Time(), 0),
withDefaultASN1DN(a.config.AuthorityConfig.Template), withDefaultASN1DN(a.config.AuthorityConfig.Template),
x509util.WithPublicKey(pub), x509util.WithHosts("test.smallstep.com,test"), x509util.WithPublicKey(pub), x509util.WithHosts("test.smallstep.com,test"),
withProvisionerOID("Max", a.config.AuthorityConfig.Provisioners[0].(*provisioner.JWK).Key.KeyID)) withProvisionerOID("Max", a.config.AuthorityConfig.Provisioners[0].(*provisioner.JWK).Key.KeyID))
@ -318,7 +318,7 @@ func TestRenew(t *testing.T) {
leafNoRenew, err := x509util.NewLeafProfile("norenew", a.intermediateIdentity.Crt, leafNoRenew, err := x509util.NewLeafProfile("norenew", a.intermediateIdentity.Crt,
a.intermediateIdentity.Key, a.intermediateIdentity.Key,
x509util.WithNotBeforeAfterDuration(so.NotBefore, so.NotAfter, 0), x509util.WithNotBeforeAfterDuration(so.NotBefore.Time(), so.NotAfter.Time(), 0),
withDefaultASN1DN(a.config.AuthorityConfig.Template), withDefaultASN1DN(a.config.AuthorityConfig.Template),
x509util.WithPublicKey(pub), x509util.WithHosts("test.smallstep.com,test"), x509util.WithPublicKey(pub), x509util.WithHosts("test.smallstep.com,test"),
withProvisionerOID("dev", a.config.AuthorityConfig.Provisioners[2].(*provisioner.JWK).Key.KeyID), withProvisionerOID("dev", a.config.AuthorityConfig.Provisioners[2].(*provisioner.JWK).Key.KeyID),

@ -209,8 +209,8 @@ ZEp7knvU2psWRw==
body, err := json.Marshal(&api.SignRequest{ body, err := json.Marshal(&api.SignRequest{
CsrPEM: api.CertificateRequest{CertificateRequest: csr}, CsrPEM: api.CertificateRequest{CertificateRequest: csr},
OTT: raw, OTT: raw,
NotBefore: now, NotBefore: api.NewTimeDuration(now),
NotAfter: leafExpiry, NotAfter: api.NewTimeDuration(leafExpiry),
}) })
assert.FatalError(t, err) assert.FatalError(t, err)
return &signTest{ return &signTest{
@ -242,8 +242,8 @@ ZEp7knvU2psWRw==
body, err := json.Marshal(&api.SignRequest{ body, err := json.Marshal(&api.SignRequest{
CsrPEM: api.CertificateRequest{CertificateRequest: csr}, CsrPEM: api.CertificateRequest{CertificateRequest: csr},
OTT: raw, OTT: raw,
NotBefore: now, NotBefore: api.NewTimeDuration(now),
NotAfter: leafExpiry, NotAfter: api.NewTimeDuration(leafExpiry),
}) })
assert.FatalError(t, err) assert.FatalError(t, err)
return &signTest{ return &signTest{

@ -257,8 +257,8 @@ func TestClient_Sign(t *testing.T) {
request := &api.SignRequest{ request := &api.SignRequest{
CsrPEM: api.CertificateRequest{CertificateRequest: parseCertificateRequest(csrPEM)}, CsrPEM: api.CertificateRequest{CertificateRequest: parseCertificateRequest(csrPEM)},
OTT: "the-ott", OTT: "the-ott",
NotBefore: time.Now(), NotBefore: api.NewTimeDuration(time.Now()),
NotAfter: time.Now().AddDate(0, 1, 0), NotAfter: api.NewTimeDuration(time.Now().AddDate(0, 1, 0)),
} }
unauthorized := api.Unauthorized(fmt.Errorf("Unauthorized")) unauthorized := api.Unauthorized(fmt.Errorf("Unauthorized"))
badRequest := api.BadRequest(fmt.Errorf("Bad Request")) badRequest := api.BadRequest(fmt.Errorf("Bad Request"))

@ -95,8 +95,8 @@ func signDuration(srv *httptest.Server, domain string, duration time.Duration) (
} }
if duration > 0 { if duration > 0 {
req.NotBefore = time.Now() req.NotBefore = api.NewTimeDuration(time.Now())
req.NotAfter = req.NotBefore.Add(duration) req.NotAfter = api.NewTimeDuration(req.NotBefore.Time().Add(duration))
} }
client, err := NewClient(srv.URL, WithRootFile("testdata/secrets/root_ca.crt")) client, err := NewClient(srv.URL, WithRootFile("testdata/secrets/root_ca.crt"))

Loading…
Cancel
Save