mirror of
https://github.com/google/nomulus.git
synced 2025-05-03 05:27:52 +02:00
84 lines
3.6 KiB
Java
84 lines
3.6 KiB
Java
// Copyright 2017 The Nomulus Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package google.registry.tmch;
|
|
|
|
import static com.google.common.truth.Truth.assertThat;
|
|
import static google.registry.util.ResourceUtils.readResourceBytes;
|
|
import static org.mockito.Mockito.verify;
|
|
import static org.mockito.Mockito.when;
|
|
|
|
import google.registry.config.RegistryConfig.ConfigModule.TmchCaMode;
|
|
import java.net.MalformedURLException;
|
|
import java.net.URL;
|
|
import java.security.SignatureException;
|
|
import java.security.cert.CRLException;
|
|
import java.security.cert.CertificateNotYetValidException;
|
|
import org.joda.time.DateTime;
|
|
import org.junit.Test;
|
|
|
|
/** Unit tests for {@link TmchCrlAction}. */
|
|
public class TmchCrlActionTest extends TmchActionTestCase {
|
|
|
|
private TmchCrlAction newTmchCrlAction(TmchCaMode tmchCaMode) throws MalformedURLException {
|
|
TmchCrlAction action = new TmchCrlAction();
|
|
action.marksdb = marksdb;
|
|
action.tmchCertificateAuthority = new TmchCertificateAuthority(tmchCaMode);
|
|
action.tmchCrlUrl = new URL("http://sloth.lol/tmch.crl");
|
|
return action;
|
|
}
|
|
|
|
@Test
|
|
public void testSuccess() throws Exception {
|
|
clock.setTo(DateTime.parse("2013-07-24TZ"));
|
|
when(httpResponse.getContent()).thenReturn(
|
|
readResourceBytes(TmchCertificateAuthority.class, "icann-tmch.crl").read());
|
|
newTmchCrlAction(TmchCaMode.PRODUCTION).run();
|
|
verify(httpResponse).getContent();
|
|
verify(fetchService).fetch(httpRequest.capture());
|
|
assertThat(httpRequest.getValue().getURL().toString()).isEqualTo("http://sloth.lol/tmch.crl");
|
|
}
|
|
|
|
@Test
|
|
public void testFailure_crlTooOld() throws Exception {
|
|
clock.setTo(DateTime.parse("2020-01-01TZ"));
|
|
when(httpResponse.getContent()).thenReturn(
|
|
readResourceBytes(TmchCertificateAuthority.class, "icann-tmch-pilot.crl").read());
|
|
// We use the pilot CRL here only because we know that it was generated more recently than the
|
|
// production CRL, and thus attempting to replace it with the production CRL will fail. It
|
|
// doesn't matter that the wrong CRT would be used to verify it because that check happens after
|
|
// the age check.
|
|
TmchCrlAction action = newTmchCrlAction(TmchCaMode.PRODUCTION);
|
|
thrown.expectRootCause(CRLException.class, "New CRL is more out of date than our current CRL.");
|
|
action.run();
|
|
}
|
|
|
|
@Test
|
|
public void testFailure_crlNotSignedByRoot() throws Exception {
|
|
clock.setTo(DateTime.parse("2013-07-24TZ"));
|
|
when(httpResponse.getContent()).thenReturn(
|
|
readResourceBytes(TmchCertificateAuthority.class, "icann-tmch.crl").read());
|
|
thrown.expectRootCause(SignatureException.class, "Signature does not match.");
|
|
newTmchCrlAction(TmchCaMode.PILOT).run();
|
|
}
|
|
|
|
@Test
|
|
public void testFailure_crlNotYetValid() throws Exception {
|
|
clock.setTo(DateTime.parse("1984-01-01TZ"));
|
|
when(httpResponse.getContent()).thenReturn(
|
|
readResourceBytes(TmchCertificateAuthority.class, "icann-tmch-pilot.crl").read());
|
|
thrown.expectRootCause(CertificateNotYetValidException.class);
|
|
newTmchCrlAction(TmchCaMode.PILOT).run();
|
|
}
|
|
}
|