salt/tests/pytests/functional/modules/test_x509_v2.py
2024-04-17 15:20:14 -07:00

1890 lines
67 KiB
Python

import base64
import datetime
import pytest
import salt.exceptions
from salt.utils.odict import OrderedDict
try:
import cryptography
import cryptography.x509 as cx509
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.serialization import (
load_pem_private_key,
pkcs7,
pkcs12,
)
HAS_LIBS = True
except ImportError:
HAS_LIBS = False
CRYPTOGRAPHY_VERSION = tuple(int(x) for x in cryptography.__version__.split("."))
pytestmark = [
pytest.mark.skip_on_fips_enabled_platform,
pytest.mark.skipif(HAS_LIBS is False, reason="Needs cryptography library"),
]
@pytest.fixture(scope="module")
def minion_config_overrides():
return {
"x509_signing_policies": {
"testpolicy": {
"CN": "from_signing_policy",
"basicConstraints": "critical, CA:FALSE",
"keyUsage": "critical, cRLSign, keyCertSign",
"authorityKeyIdentifier": "keyid:always",
"subjectKeyIdentifier": "hash",
},
"testsubjectstrpolicy": {
"subject": "CN=from_signing_policy",
},
"testsubjectdictpolicy": {
"subject": {"CN": "from_signing_policy"},
},
"testsubjectlistpolicy": {
"subject": [
"C=US",
"L=Salt Lake City",
"O=Salt Test",
],
},
"testnosubjectpolicy": {
"basicConstraints": "critical, CA:FALSE",
},
"testdeprecatednamepolicy": {
"commonName": "deprecated",
},
"testdeprecatedextpolicy": {
"X509v3 Basic Constraints": "critical CA:FALSE",
},
},
}
@pytest.fixture
def x509(loaders, modules):
yield modules.x509
@pytest.fixture
def ca_cert():
return """\
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
"""
@pytest.fixture
def ca_key():
return """\
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----"""
@pytest.fixture
def ca_key_enc():
return """\
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"""
@pytest.fixture
def rsa_privkey():
return """\
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----"""
@pytest.fixture
def rsa_privkey_enc():
return """\
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"""
@pytest.fixture
def rsa_pubkey():
return """\
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzIdEbSkbPIc5F/aewNoq
WPsF/YP+DByMwvYs+0K+lehc39P82fL8K2GIaGMBBzqlsX6CplAzGcoEQEBLTouL
m+JYC5e1zRjaml4M+Bid8A7qwdjlWd0enCAxVB9BMNnj/mokWzh3hAQMBXfmddGR
hH0P9KXfjBNh2V09vfHdtS9XMEEQjN6vCxaezXqsOMN3bjRTIcUatH7dVUgUpt9c
ye1mdbD5KVBgJ9MArc2tJ3rmB0lxjEbAhTEHrNnIkDOJCKE8TaQOW4RyVWlIvSEL
+Ov0TPeXXaef8HJlkyIpKrCZ+c4i0N7qOlyrJEWTXmKNCj87xgTpY5I7ARISeOQD
8QIDAQAB
-----END PUBLIC KEY-----"""
@pytest.fixture
def csr():
return """\
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----"""
@pytest.fixture
def ec_privkey():
return """\
-----BEGIN PRIVATE KEY-----
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1lRdFUUOd7WZsydR
eMzFLD5u1Bjxg+NPia6Vznhb4EehRANCAAS+5meGSwViKrRQ3Ni1cfa08WG5dK/u
ldlNqU8U1Lz3ckCGI3TdGZ6nPaL3IT/UNH6C+J86RWSLY18hFHXoeKBD
-----END PRIVATE KEY-----"""
@pytest.fixture
def ec_pubkey():
return """\
-----BEGIN PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvuZnhksFYiq0UNzYtXH2tPFhuXSv
7pXZTalPFNS893JAhiN03Rmepz2i9yE/1DR+gvifOkVki2NfIRR16HigQw==
-----END PUBLIC KEY-----"""
@pytest.fixture
def ed25519_privkey():
return """\
-----BEGIN PRIVATE KEY-----
MC4CAQAwBQYDK2VwBCIEIFKFjPIOBze2eo9x/EiCL0ni5GacaKIRZdfREBfuEdE9
-----END PRIVATE KEY-----"""
@pytest.fixture
def ed25519_pubkey():
return """\
-----BEGIN PUBLIC KEY-----
MCowBQYDK2VwAyEAK+1yspaj/3Mb2K7H6y2d0Y+udSF+7sBozMY4aKUBR0I=
-----END PUBLIC KEY-----"""
@pytest.fixture
def ed448_privkey():
return """\
-----BEGIN PRIVATE KEY-----
MEcCAQAwBQYDK2VxBDsEObnZH0tXF86wbuvvz9Blg9MjUIkyW+Cpz6n4WmaFHIT4
Y2QKHSRG0M1ZUFr/EYH9F9mTgnAwmyp7oA==
-----END PRIVATE KEY-----"""
@pytest.fixture
def ed448_pubkey():
return """\
-----BEGIN PUBLIC KEY-----
MEMwBQYDK2VxAzoAiIWDcsK9mSaXUL+67ZIdyik8T5Zf0sLEwq3aUf6eysYxjEoZ
vHv0+Ke3LRlEzGbwroKtP66opn4A
-----END PUBLIC KEY-----"""
@pytest.fixture
def cert_exts():
return """
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"""
@pytest.fixture
def csr_exts():
return """\
-----BEGIN CERTIFICATE REQUEST-----
MIIDvjCCAqYCAQAwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMyH
RG0pGzyHORf2nsDaKlj7Bf2D/gwcjML2LPtCvpXoXN/T/Nny/CthiGhjAQc6pbF+
gqZQMxnKBEBAS06Li5viWAuXtc0Y2ppeDPgYnfAO6sHY5VndHpwgMVQfQTDZ4/5q
JFs4d4QEDAV35nXRkYR9D/Sl34wTYdldPb3x3bUvVzBBEIzerwsWns16rDjDd240
UyHFGrR+3VVIFKbfXMntZnWw+SlQYCfTAK3NrSd65gdJcYxGwIUxB6zZyJAziQih
PE2kDluEclVpSL0hC/jr9Ez3l12nn/ByZZMiKSqwmfnOItDe6jpcqyRFk15ijQo/
O8YE6WOSOwESEnjkA/ECAwEAAaCCAXcwggFzBgkqhkiG9w0BCQ4xggFkMIIBYDAS
BgNVHRMBAf8ECDAGAQH/AgEBMA4GA1UdDwEB/wQEAwIBBjATBgNVHSUEDDAKBggr
BgEFBQcDCTAdBgNVHQ4EFgQUkLZONoQf6p8T2tLmMuWJG3iSmeQwEgYDVR0SBAsw
CYIHc2FsdC5jYTAwBggrBgEFBQcBAQQkMCIwIAYIKwYBBQUHMAGGFGh0dHA6Ly9v
Y3NwLnNhbHQuY2EvMCMGA1UdEQQcMBqCC3N1Yi5zYWx0LmNhgQtzdWJAc2FsdC5j
YTAoBgNVHR8EITAfMB2gG6AZhhdodHRwOi8vc2FsdC5jYS9teWNhLmNybDAQBgNV
HSAECTAHMAUGAyoEBTAMBgNVHSQEBTADgAEDMAoGA1UdNgQDAgECMCEGA1UdHgQa
MBigDDAKhwjAqAAA//8AAKEIMAaBBC5jb20wDwYJKwYBBQUHMAEFBAIFADARBggr
BgEFBQcBGAQFMAMCAQUwDQYJKoZIhvcNAQELBQADggEBAINICpHFaJaxDfABkbwV
b3Ji/djatf5dc2jB/A/qP18+M97xIpvJPi/xGTR+sMqffsXLGuZgrhmmkhrbYqIf
CHi9VPpZ7l0sB/mESJ5+//50J5tRN6I+7UCc3MWTs45HM8/alJQQAKX8Fdx6cZnI
2lz6raNyT4DUo/eympAtSjJRNnhT62YEiIR+9+Vu4aMjsnRLgLbtOGUraOoyC9do
eY6fyUlpNgz8ny7Ow6nV/J5FNaZfEt/79X+kjHdPkqz7r2A1PEI/Uu+Gksoyizvs
qFrpUgv3nrP7olcq8rKYbwI9bXj3LMQpWtUZ300Sy2+dzwjoBneJ9VmkaD2U6Njd
O68=
-----END CERTIFICATE REQUEST-----"""
@pytest.fixture
def cert_exts_read():
return {
"extensions": {
"authorityInfoAccess": {
"value": [{"OCSP": "http://ocsp.salt.ca/"}],
"critical": False,
},
"authorityKeyIdentifier": {
"critical": False,
"issuer": None,
"issuer_sn": None,
"keyid": "5C:F2:F1:F4:53:29:23:9E:EE:40:5A:92:A3:B4:2A:2E:F5:A6:8B:67",
},
"basicConstraints": {"ca": True, "critical": True, "pathlen": 1},
"certificatePolicies": {"critical": False, "value": [{"1.2.4.5": []}]},
"crlDistributionPoints": {
"critical": False,
"value": [
{
"crlissuer": [],
"fullname": ["URI:http://salt.ca/myca.crl"],
"reasons": [],
"relativename": None,
}
],
},
"extendedKeyUsage": {"critical": False, "value": ["OCSPSigning"]},
"inhibitAnyPolicy": {"critical": False, "value": 2},
"issuerAltName": {"critical": False, "value": ["DNS:salt.ca"]},
"keyUsage": {
"cRLSign": True,
"critical": True,
"dataEncipherment": False,
"decipherOnly": False,
"digitalSignature": False,
"encipherOnly": False,
"keyAgreement": False,
"keyCertSign": True,
"keyEncipherment": False,
"nonRepudiation": False,
},
"nameConstraints": {
"critical": False,
"excluded": ["mail:.com"],
"permitted": ["IP:192.168.0.0/16"],
},
"noCheck": {"critical": False, "value": True},
"policyConstraints": {
"critical": False,
"inhibitPolicyMapping": None,
"requireExplicitPolicy": 3,
},
"subjectAltName": {
"critical": False,
"value": ["DNS:sub.salt.ca", "mail:sub@salt.ca"],
},
"subjectKeyIdentifier": {
"critical": False,
"value": "90:B6:4E:36:84:1F:EA:9F:13:DA:D2:E6:32:E5:89:1B:78:92:99:E4",
},
"tlsfeature": {"critical": False, "value": ["status_request"]},
},
"fingerprints": {
"md5": "5C:D7:BF:68:AD:09:1A:CA:42:8E:62:10:60:21:13:20",
"sha1": "93:1A:31:45:AC:3D:62:E5:0C:59:E1:D1:8E:45:F2:BD:28:51:20:34",
"sha256": "E4:EB:84:87:17:80:E4:6D:6E:B8:9C:A0:EE:88:AF:CA:57:C7:8A:86:5A:A8:53:E1:38:DF:7A:43:D7:19:54:E1",
},
"issuer": OrderedDict([("C", "US"), ("O", "Salt"), ("CN", "Test")]),
"issuer_hash": "19:2C:28:89",
"issuer_str": "O=Salt,CN=Test,C=US",
"key_size": 2048,
"key_type": "rsa",
"not_after": "2022-12-15 17:53:40",
"not_before": "2022-11-15 17:53:40",
"public_key": "-----BEGIN PUBLIC KEY-----\n"
"MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzIdEbSkbPIc5F/aewNoq\n"
"WPsF/YP+DByMwvYs+0K+lehc39P82fL8K2GIaGMBBzqlsX6CplAzGcoEQEBLTouL\n"
"m+JYC5e1zRjaml4M+Bid8A7qwdjlWd0enCAxVB9BMNnj/mokWzh3hAQMBXfmddGR\n"
"hH0P9KXfjBNh2V09vfHdtS9XMEEQjN6vCxaezXqsOMN3bjRTIcUatH7dVUgUpt9c\n"
"ye1mdbD5KVBgJ9MArc2tJ3rmB0lxjEbAhTEHrNnIkDOJCKE8TaQOW4RyVWlIvSEL\n"
"+Ov0TPeXXaef8HJlkyIpKrCZ+c4i0N7qOlyrJEWTXmKNCj87xgTpY5I7ARISeOQD\n"
"8QIDAQAB\n"
"-----END PUBLIC KEY-----\n",
"serial_number": "0C:F5:41:98:4E:97:67:47:B5:E6:1C:22:D6:54:2B:56:B3:B4:FD:6F",
"signature_algorithm": "sha256WithRSAEncryption",
"subject": OrderedDict(),
"subject_hash": "D6:DC:44:F9",
"subject_str": "",
"version": 3,
}
@pytest.fixture
def csr_exts_read():
return {
"extensions": {
"authorityInfoAccess": {
"value": [{"OCSP": "http://ocsp.salt.ca/"}],
"critical": False,
},
"basicConstraints": {"ca": True, "critical": True, "pathlen": 1},
"certificatePolicies": {"critical": False, "value": [{"1.2.4.5": []}]},
"crlDistributionPoints": {
"critical": False,
"value": [
{
"crlissuer": [],
"fullname": ["URI:http://salt.ca/myca.crl"],
"reasons": [],
"relativename": None,
}
],
},
"extendedKeyUsage": {"critical": False, "value": ["OCSPSigning"]},
"inhibitAnyPolicy": {"critical": False, "value": 2},
"issuerAltName": {"critical": False, "value": ["DNS:salt.ca"]},
"keyUsage": {
"cRLSign": True,
"critical": True,
"dataEncipherment": False,
"decipherOnly": False,
"digitalSignature": False,
"encipherOnly": False,
"keyAgreement": False,
"keyCertSign": True,
"keyEncipherment": False,
"nonRepudiation": False,
},
"nameConstraints": {
"critical": False,
"excluded": ["mail:.com"],
"permitted": ["IP:192.168.0.0/16"],
},
"noCheck": {"critical": False, "value": True},
"policyConstraints": {
"critical": False,
"inhibitPolicyMapping": None,
"requireExplicitPolicy": 3,
},
"subjectAltName": {
"critical": False,
"value": ["DNS:sub.salt.ca", "mail:sub@salt.ca"],
},
"subjectKeyIdentifier": {
"critical": False,
"value": "90:B6:4E:36:84:1F:EA:9F:13:DA:D2:E6:32:E5:89:1B:78:92:99:E4",
},
"tlsfeature": {"critical": False, "value": ["status_request"]},
},
"key_size": 2048,
"key_type": "rsa",
"public_key_hash": "90:B6:4E:36:84:1F:EA:9F:13:DA:D2:E6:32:E5:89:1B:78:92:99:E4",
"subject": OrderedDict(),
"subject_hash": "D6:DC:44:F9",
"subject_str": "",
}
@pytest.fixture
def crl():
return """\
-----BEGIN X509 CRL-----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-----END X509 CRL-----"""
@pytest.fixture
def crl_all():
return """\
-----BEGIN X509 CRL-----
MIIDFDCCAfwCAQEwDQYJKoZIhvcNAQEFBQAwXzEjMCEGA1UEChMaU2FtcGxlIFNp
Z25lciBPcmdhbml6YXRpb24xGzAZBgNVBAsTElNhbXBsZSBTaWduZXIgVW5pdDEb
MBkGA1UEAxMSU2FtcGxlIFNpZ25lciBDZXJ0Fw0xMzAyMTgxMDMyMDBaFw0xMzAy
MTgxMDQyMDBaMIIBNjA8AgMUeUcXDTEzMDIxODEwMjIxMlowJjAKBgNVHRUEAwoB
AzAYBgNVHRgEERgPMjAxMzAyMTgxMDIyMDBaMDwCAxR5SBcNMTMwMjE4MTAyMjIy
WjAmMAoGA1UdFQQDCgEGMBgGA1UdGAQRGA8yMDEzMDIxODEwMjIwMFowPAIDFHlJ
Fw0xMzAyMTgxMDIyMzJaMCYwCgYDVR0VBAMKAQQwGAYDVR0YBBEYDzIwMTMwMjE4
MTAyMjAwWjA8AgMUeUoXDTEzMDIxODEwMjI0MlowJjAKBgNVHRUEAwoBATAYBgNV
HRgEERgPMjAxMzAyMTgxMDIyMDBaMDwCAxR5SxcNMTMwMjE4MTAyMjUxWjAmMAoG
A1UdFQQDCgEFMBgGA1UdGAQRGA8yMDEzMDIxODEwMjIwMFqgLzAtMB8GA1UdIwQY
MBaAFL4SAcyq6hGA2i6tsurHtfuf+a00MAoGA1UdFAQDAgEDMA0GCSqGSIb3DQEB
BQUAA4IBAQBCIb6B8cN5dmZbziETimiotDy+FsOvS93LeDWSkNjXTG/+bGgnrm3a
QpgB7heT8L2o7s2QtjX2DaTOSYL3nZ/Ibn/R8S0g+EbNQxdk5/la6CERxiRp+E2T
UG8LDb14YVMhRGKvCguSIyUG0MwGW6waqVtd6K71u7vhIU/Tidf6ZSdsTMhpPPFu
PUid4j29U3q10SGFF6cCt1DzjvUcCwHGhHA02Men70EgZFADPLWmLg0HglKUh1iZ
WcBGtev/8VsUijyjsM072C6Ut5TwNyrrthb952+eKlmxLNgT0o5hVYxjXhtwLQsL
7QZhrypAM1DLYqQjkiDI7hlvt7QuDGTJ
-----END X509 CRL-----"""
@pytest.fixture
def crl_args(tmp_path, ca_cert, ca_key):
return {
"signing_private_key": ca_key,
"signing_cert": ca_cert,
"revoked": [],
}
@pytest.fixture
def crl_args_exts():
return {
"authorityKeyIdentifier": "keyid:always",
"issuerAltName": "DNS:salt.ca",
"issuingDistributionPoint": {
"critical": True,
"fullname": [
"URI:http://salt.ca/myca.crl",
],
},
"CRLNumber": 1,
}
@pytest.fixture
def crl_revoked():
return [
{
"serial_number": "01337A",
"extensions": {
"CRLReason": "unspecified",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "01337B",
"extensions": {
"CRLReason": "keyCompromise",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "01337C",
"extensions": {
"CRLReason": "cACompromise",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "01337D",
"extensions": {
"CRLReason": "affiliationChanged",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "01337E",
"extensions": {
"CRLReason": "superseded",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "01337F",
"extensions": {
"CRLReason": "cessationOfOperation",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "013380",
"extensions": {
"CRLReason": "certificateHold",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "013381",
"extensions": {
"CRLReason": "privilegeWithdrawn",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "013381",
"extensions": {
"CRLReason": "aACompromise",
"invalidityDate": "2022-11-18 13:37:00",
},
},
{
"serial_number": "013382",
"extensions": {
"CRLReason": "removeFromCRL",
},
},
]
@pytest.mark.parametrize("algo", ["rsa", "ec", "ed25519", "ed448"])
def test_create_certificate_self_signed(x509, algo, request):
privkey = request.getfixturevalue(f"{algo}_privkey")
res = x509.create_certificate(signing_private_key=privkey, CN="success")
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_certificate_write_to_path(x509, encoding, rsa_privkey, tmp_path):
tgt = tmp_path / "cert"
x509.create_certificate(
signing_private_key=rsa_privkey, CN="success", encoding=encoding, path=str(tgt)
)
assert tgt.exists()
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(tgt.read_bytes(), encoding=encoding)
assert cert.subject.rfc4514_string() == "CN=success"
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_certificate_write_to_path_overwrite(
x509, encoding, rsa_privkey, tmp_path
):
tgt = tmp_path / "cert"
tgt.write_text("occupied")
assert tgt.exists()
x509.create_certificate(
signing_private_key=rsa_privkey, CN="success", encoding=encoding, path=str(tgt)
)
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(tgt.read_bytes(), encoding=encoding)
assert cert.subject.rfc4514_string() == "CN=success"
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_certificate_write_to_path_overwrite_false(
x509, encoding, rsa_privkey, tmp_path
):
tgt = tmp_path / "cert"
tgt.write_text("occupied")
assert tgt.exists()
x509.create_certificate(
signing_private_key=rsa_privkey,
CN="success",
encoding=encoding,
path=str(tgt),
overwrite=False,
)
assert tgt.read_text() == "occupied"
def test_create_certificate_raw(x509, rsa_privkey):
res = x509.create_certificate(
signing_private_key=rsa_privkey, CN="success", raw=True
)
assert isinstance(res, bytes)
assert res.startswith(b"-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
@pytest.mark.parametrize("algo", ["rsa", "ec", "ed25519", "ed448"])
def test_create_certificate_from_privkey(x509, ca_key, ca_cert, algo, request):
privkey = request.getfixturevalue(f"{algo}_privkey")
res = x509.create_certificate(
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=privkey,
CN="success",
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
def test_create_certificate_from_encrypted_privkey(
x509, ca_key, ca_cert, rsa_privkey_enc
):
res = x509.create_certificate(
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey_enc,
private_key_passphrase="hunter2",
CN="success",
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
def test_create_certificate_from_encrypted_privkey_with_encrypted_privkey(
x509, ca_key_enc, ca_cert, rsa_privkey_enc
):
res = x509.create_certificate(
signing_cert=ca_cert,
signing_private_key=ca_key_enc,
signing_private_key_passphrase="correct horse battery staple",
private_key=rsa_privkey_enc,
private_key_passphrase="hunter2",
CN="success",
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
@pytest.mark.parametrize("algo", ["rsa", "ec", "ed25519", "ed448"])
def test_create_certificate_from_pubkey(x509, ca_key, ca_cert, algo, request):
pubkey = request.getfixturevalue(f"{algo}_pubkey")
res = x509.create_certificate(
signing_cert=ca_cert,
signing_private_key=ca_key,
public_key=pubkey,
CN="success",
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
def test_create_certificate_from_csr(x509, ca_key, ca_cert, csr):
res = x509.create_certificate(
signing_cert=ca_cert, signing_private_key=ca_key, csr=csr, CN="success"
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
def test_create_certificate_from_mismatching_private_key(
x509, rsa_privkey, ca_cert, ec_privkey
):
with pytest.raises(salt.exceptions.SaltInvocationError):
x509.create_certificate(
signing_cert=ca_cert,
signing_private_key=rsa_privkey,
private_key=rsa_privkey,
CN="success",
)
def test_create_certificate_with_ca_cert_needs_any_pubkey_source(x509, ca_key, ca_cert):
with pytest.raises(salt.exceptions.SaltInvocationError):
x509.create_certificate(signing_cert=ca_cert, signing_private_key=ca_key)
def test_create_certificate_with_extensions(x509, ca_key, ca_cert, rsa_privkey):
extensions = {
"basicConstraints": "critical, CA:TRUE, pathlen:1",
"keyUsage": "critical, cRLSign, keyCertSign",
"extendedKeyUsage": "OCSPSigning",
"subjectKeyIdentifier": "hash",
"authorityKeyIdentifier": "keyid:always",
"issuerAltName": "DNS:salt.ca",
"authorityInfoAccess": "OCSP;URI:http://ocsp.salt.ca/",
"subjectAltName": "DNS:sub.salt.ca,email:sub@salt.ca",
"crlDistributionPoints": "URI:http://salt.ca/myca.crl",
"certificatePolicies": "1.2.4.5",
"policyConstraints": "requireExplicitPolicy:3",
"inhibitAnyPolicy": 2,
"nameConstraints": "permitted;IP:192.168.0.0/255.255.0.0,excluded;email:.com",
"noCheck": True,
"tlsfeature": "status_request",
}
res = x509.create_certificate(
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
**extensions,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
for x in [
cx509.BasicConstraints,
cx509.KeyUsage,
cx509.ExtendedKeyUsage,
cx509.SubjectKeyIdentifier,
cx509.AuthorityKeyIdentifier,
cx509.IssuerAlternativeName,
cx509.AuthorityInformationAccess,
cx509.SubjectAlternativeName,
cx509.CRLDistributionPoints,
cx509.CertificatePolicies,
cx509.PolicyConstraints,
cx509.InhibitAnyPolicy,
cx509.NameConstraints,
cx509.OCSPNoCheck,
cx509.TLSFeature,
]:
cert.extensions.get_extension_for_class(x)
def test_create_certificate_from_csr_with_extensions(x509, ca_key, ca_cert, csr_exts):
res = x509.create_certificate(
signing_cert=ca_cert, signing_private_key=ca_key, csr=csr_exts
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
# the following extensions are copied from the CSR if not otherwise defined
for x in [
cx509.BasicConstraints,
cx509.KeyUsage,
cx509.ExtendedKeyUsage,
cx509.SubjectKeyIdentifier,
cx509.SubjectAlternativeName,
cx509.CertificatePolicies,
cx509.PolicyConstraints,
cx509.InhibitAnyPolicy,
cx509.NameConstraints,
cx509.OCSPNoCheck,
cx509.TLSFeature,
]:
cert.extensions.get_extension_for_class(x)
# these extensions should never be copied (copying anything is a risk though)
for x in [
cx509.IssuerAlternativeName,
cx509.AuthorityInformationAccess,
cx509.CRLDistributionPoints,
]:
with pytest.raises(cx509.ExtensionNotFound):
cert.extensions.get_extension_for_class(x)
@pytest.mark.parametrize(
"arg",
[
{"C": "US", "CN": "Homer", "L": "Springfield"},
pytest.param(
{"subject": ["C=US", "L=Springfield", "CN=Homer"]},
marks=pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 37,
reason="At least cryptography v37 is required for parsing RFC4514 strings.",
),
),
pytest.param(
{"subject": "CN=Homer,L=Springfield,C=US"},
marks=pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 37,
reason="At least cryptography v37 is required for parsing RFC4514 strings.",
),
),
],
)
def test_create_certificate_with_distinguished_name(
x509, ca_cert, ca_key, rsa_privkey, arg
):
res = x509.create_certificate(
signing_cert=ca_cert, signing_private_key=ca_key, private_key=rsa_privkey, **arg
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=Homer,L=Springfield,C=US"
def test_create_certificate_with_signing_policy(x509, ca_cert, ca_key, rsa_privkey):
res = x509.create_certificate(
signing_policy="testpolicy",
CN="from_kwargs",
basicConstraints="CA:TRUE",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=from_signing_policy"
for x in [cx509.BasicConstraints, cx509.KeyUsage, cx509.SubjectKeyIdentifier]:
ext = cert.extensions.get_extension_for_class(x)
if x == cx509.BasicConstraints:
assert not ext.value.ca
def test_create_certificate_with_signing_policy_no_subject_override(
x509, ca_cert, ca_key, rsa_privkey
):
"""
Since `subject` gets precedence, if the signing policy uses direct kwargs
for name attributes, ensure that setting `subject` gets ignored.
"""
res = x509.create_certificate(
signing_policy="testpolicy",
subject={"CN": "from_kwargs", "SERIALNUMBER": "1234"},
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=from_signing_policy"
@pytest.mark.parametrize(
"signing_policy,subject,expected",
[
(
"testsubjectdictpolicy",
"CN=from_kwargs,SERIALNUMBER=1234",
"CN=from_signing_policy",
),
(
"testsubjectdictpolicy",
["CN=from_kwargs", "SERIALNUMBER=1234"],
"CN=from_signing_policy",
),
(
"testsubjectstrpolicy",
["CN=from_kwargs", "SERIALNUMBER=1234"],
"CN=from_signing_policy",
),
(
"testsubjectstrpolicy",
{"CN": "from_kwargs", "SERIALNUMBER": "1234"},
"CN=from_signing_policy",
),
(
"testsubjectlistpolicy",
"CN=from_kwargs,SERIALNUMBER=1234",
"O=Salt Test,L=Salt Lake City,C=US",
),
(
"testsubjectlistpolicy",
{"CN": "from_kwargs", "SERIALNUMBER": "1234"},
"O=Salt Test,L=Salt Lake City,C=US",
),
],
)
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 37,
reason="Parsing of RFC4514 strings requires cryptography >= 37",
)
def test_create_certificate_with_signing_policy_subject_type_mismatch_no_override(
x509, ca_cert, ca_key, rsa_privkey, signing_policy, subject, expected
):
"""
When both signing_policy and kwargs have `subject` and the types do not match,
force signing_policy
"""
res = x509.create_certificate(
signing_policy=signing_policy,
subject=subject,
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == expected
@pytest.mark.parametrize(
"signing_policy,subject,expected",
[
(
"testsubjectdictpolicy",
{"CN": "from_kwargs", "O": "Foo"},
"CN=from_signing_policy,O=Foo",
),
("testsubjectstrpolicy", "CN=from_kwargs,O=Foo", "CN=from_signing_policy"),
(
"testsubjectlistpolicy",
["CN=Test1"],
"CN=Test1,O=Salt Test,L=Salt Lake City,C=US",
),
],
)
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 37,
reason="Parsing of RFC4514 strings requires cryptography >= 37",
)
def test_create_certificate_with_signing_policy_subject_merging(
x509, ca_cert, ca_key, rsa_privkey, signing_policy, subject, expected
):
"""
When both signing_policy and kwargs have `subject` and the types match,
merge them with priority to signing_policy
"""
res = x509.create_certificate(
signing_policy=signing_policy,
subject=subject,
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == expected
@pytest.mark.parametrize(
"subject,expected",
[
({"CN": "from_kwargs", "O": "Foo"}, "CN=from_kwargs,O=Foo"),
("CN=from_kwargs,O=Foo", "CN=from_kwargs,O=Foo"),
(["O=Foo", "CN=Test1"], "CN=Test1,O=Foo"),
],
)
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 37,
reason="Parsing of RFC4514 strings requires cryptography >= 37",
)
def test_create_certificate_with_signing_policy_no_subject(
x509, ca_cert, ca_key, rsa_privkey, subject, expected
):
"""
When signing_policy does not enforce `subject` somehow,
make sure to follow kwargs
"""
res = x509.create_certificate(
signing_policy="testnosubjectpolicy",
subject=subject,
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == expected
def test_create_certificate_not_before_not_after(x509, ca_cert, ca_key, rsa_privkey):
fmt = "%Y-%m-%d %H:%M:%S"
not_before = "2022-12-21 13:37:10"
not_after = "2032-12-21 13:37:10"
res = x509.create_certificate(
not_before=not_before,
not_after=not_after,
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.not_valid_before == datetime.datetime.strptime(not_before, fmt)
assert cert.not_valid_after == datetime.datetime.strptime(not_after, fmt)
@pytest.mark.parametrize("sn", [3735928559, "DE:AD:BE:EF", "deadbeef"])
def test_create_certificate_explicit_serial_number(
x509, ca_cert, ca_key, rsa_privkey, sn
):
res = x509.create_certificate(
serial_number=sn,
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.serial_number == 3735928559
def test_create_certificate_as_der(x509, ca_cert, ca_key, rsa_privkey):
res = x509.create_certificate(
encoding="der",
CN="success",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
cert = _get_cert(res, "der")
assert cert.subject.rfc4514_string() == "CN=success"
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 37,
reason="PKCS7 serialization requires cryptography v37+",
)
@pytest.mark.parametrize("typ", ["pem", "der"])
def test_create_certificate_as_pkcs7(x509, ca_cert, ca_key, rsa_privkey, typ):
res = x509.create_certificate(
encoding=f"pkcs7_{typ}",
CN="success",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
cert = _get_cert(res, f"pkcs7_{typ}")
assert cert[0].subject.rfc4514_string() == "CN=success"
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 36,
reason="Complete PKCS12 deserialization requires cryptography v36+",
)
def test_create_certificate_as_pkcs12(x509, ca_cert, ca_key, rsa_privkey):
res = x509.create_certificate(
encoding="pkcs12",
pkcs12_friendlyname="foo",
CN="success",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
cert = _get_cert(res, "pkcs12")
assert cert.cert.certificate.subject.rfc4514_string() == "CN=success"
assert cert.cert.friendly_name == b"foo"
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 36,
reason="Complete PKCS12 deserialization requires cryptography v36+",
)
def test_create_certificate_as_encrypted_pkcs12(x509, ca_cert, ca_key, rsa_privkey_enc):
res = x509.create_certificate(
encoding="pkcs12",
private_key_passphrase="hunter2",
pkcs12_passphrase="hunter3",
pkcs12_embed_private_key=True,
pkcs12_friendlyname="foo",
CN="success",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey_enc,
)
cert = _get_cert(res, "pkcs12", "hunter3")
assert cert.cert.certificate.subject.rfc4514_string() == "CN=success"
assert cert.cert.friendly_name == b"foo"
def test_create_certificate_append_certs_pem(x509, ca_cert, ca_key, rsa_privkey):
res = x509.create_certificate(
append_certs=[ca_cert],
CN="success",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
assert res.endswith(ca_cert)
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 37,
reason="PKCS7 serialization requires cryptography v37+",
)
@pytest.mark.parametrize("typ", ["pem", "der"])
def test_create_certificate_append_certs_pkcs7(x509, ca_cert, ca_key, rsa_privkey, typ):
res = x509.create_certificate(
append_certs=[ca_cert],
encoding=f"pkcs7_{typ}",
CN="success",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
cert = _get_cert(res, f"pkcs7_{typ}")
assert cert[0].subject.rfc4514_string() == "CN=success"
assert cert[1].serial_number == _get_cert(ca_cert).serial_number
@pytest.mark.skipif(
CRYPTOGRAPHY_VERSION[0] < 36,
reason="Complete PKCS12 deserialization requires cryptography v36+",
)
def test_create_certificate_append_certs_pkcs12(x509, ca_cert, ca_key, rsa_privkey):
res = x509.create_certificate(
append_certs=[ca_cert],
encoding="pkcs12",
CN="success",
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
)
cert = _get_cert(res, "pkcs12")
assert cert.cert.certificate.subject.rfc4514_string() == "CN=success"
assert (
cert.additional_certs[0].certificate.serial_number
== _get_cert(ca_cert).serial_number
)
@pytest.mark.parametrize("prepend_cn", [False, True])
def test_create_certificate_copypath(
x509, rsa_privkey, ca_cert, ca_key, prepend_cn, tmp_path
):
res = x509.create_certificate(
signing_cert=ca_cert,
signing_private_key=ca_key,
private_key=rsa_privkey,
CN="success",
copypath=str(tmp_path),
prepend_cn=prepend_cn,
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
prefix = ""
if prepend_cn:
prefix = "success-"
assert (tmp_path / f"{prefix}{cert.serial_number:x}.crt").exists()
def test_create_crl_empty(x509, crl_args, ca_cert):
res = x509.create_crl(**crl_args)
assert res.startswith("-----BEGIN X509 CRL-----")
def test_create_crl(x509, crl_args, crl_revoked, ca_cert):
crl_args["revoked"] = crl_revoked
res = x509.create_crl(**crl_args)
assert res.startswith("-----BEGIN X509 CRL-----")
def test_create_crl_with_exts(x509, crl_args, crl_args_exts, ca_cert):
crl_args.update({"extensions": crl_args_exts})
res = x509.create_crl(**crl_args)
assert res.startswith("-----BEGIN X509 CRL-----")
def test_create_crl_from_certificate(x509, ca_cert, ca_key, cert_exts):
revoked = [{"certificate": cert_exts}]
res = x509.create_crl(
signing_cert=ca_cert, revoked=revoked, signing_private_key=ca_key
)
assert res.startswith("-----BEGIN X509 CRL-----")
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_crl_write_to_path(x509, encoding, crl_args, tmp_path):
tgt = tmp_path / "crl"
crl_args["encoding"] = encoding
crl_args["path"] = str(tgt)
x509.create_crl(**crl_args)
assert tgt.exists()
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN X509 CRL-----")
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_crl_write_to_path_overwrite(x509, encoding, crl_args, tmp_path):
tgt = tmp_path / "cert"
crl_args["encoding"] = encoding
crl_args["path"] = str(tgt)
tgt.write_text("occupied")
assert tgt.exists()
x509.create_crl(**crl_args)
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN X509 CRL-----")
def test_create_crl_raw(x509, crl_args):
res = x509.create_crl(**crl_args, raw=True)
assert isinstance(res, bytes)
assert res.startswith(b"-----BEGIN X509 CRL-----")
@pytest.mark.parametrize("algo", ["rsa", "ec", "ed25519", "ed448"])
def test_create_csr(x509, algo, request):
privkey = request.getfixturevalue(f"{algo}_privkey")
res = x509.create_csr(private_key=privkey)
assert res.startswith("-----BEGIN CERTIFICATE REQUEST-----")
def test_create_csr_der(x509, rsa_privkey):
res = x509.create_csr(private_key=rsa_privkey, encoding="der")
assert base64.b64decode(res)
def test_create_csr_with_extensions(x509, rsa_privkey):
extensions = {
"basicConstraints": "critical, CA:TRUE, pathlen:1",
"keyUsage": "critical, cRLSign, keyCertSign",
"extendedKeyUsage": "OCSPSigning",
"subjectKeyIdentifier": "hash",
"issuerAltName": "DNS:salt.ca",
"authorityInfoAccess": "OCSP;URI:http://ocsp.salt.ca/",
"subjectAltName": "DNS:sub.salt.ca,email:sub@salt.ca",
"crlDistributionPoints": "URI:http://salt.ca/myca.crl",
"certificatePolicies": "1.2.4.5",
"policyConstraints": "requireExplicitPolicy:3",
"inhibitAnyPolicy": 2,
"nameConstraints": "permitted;IP:192.168.0.0/255.255.0.0,excluded;email:.com",
"noCheck": True,
"tlsfeature": "status_request",
}
res = x509.create_csr(private_key=rsa_privkey, **extensions)
assert res.startswith("-----BEGIN CERTIFICATE REQUEST-----")
def test_create_csr_with_wildcard_san(x509, rsa_privkey):
"""
Test that wildcards in SAN extension are supported. Issue #65072
"""
res = x509.create_csr(private_key=rsa_privkey, subjectAltName="DNS:*.salt.ca")
assert res.startswith("-----BEGIN CERTIFICATE REQUEST-----")
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_csr_write_to_path(x509, encoding, rsa_privkey, tmp_path):
tgt = tmp_path / "csr"
x509.create_csr(private_key=rsa_privkey, encoding=encoding, path=str(tgt))
assert tgt.exists()
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN CERTIFICATE REQUEST-----")
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_csr_write_to_path_overwrite(x509, encoding, rsa_privkey, tmp_path):
tgt = tmp_path / "cert"
tgt.write_text("occupied")
assert tgt.exists()
x509.create_csr(private_key=rsa_privkey, encoding=encoding, path=str(tgt))
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN CERTIFICATE REQUEST-----")
def test_create_csr_raw(x509, rsa_privkey):
res = x509.create_csr(private_key=rsa_privkey, raw=True)
assert isinstance(res, bytes)
assert res.startswith(b"-----BEGIN CERTIFICATE REQUEST-----")
@pytest.mark.slow_test
@pytest.mark.parametrize("algo", ["rsa", "ec", "ed25519", "ed448"])
def test_create_private_key(x509, algo):
res = x509.create_private_key(algo=algo)
assert res.startswith("-----BEGIN PRIVATE KEY-----")
@pytest.mark.slow_test
@pytest.mark.parametrize("algo", ["rsa", "ec", "ed25519", "ed448"])
def test_create_private_key_with_passphrase(x509, algo):
passphrase = "hunter2"
res = x509.create_private_key(algo=algo, passphrase=passphrase)
assert res.startswith("-----BEGIN ENCRYPTED PRIVATE KEY-----")
# ensure it can be loaded
x509.get_private_key_size(res, passphrase=passphrase)
@pytest.mark.slow_test
def test_create_private_key_der(x509):
res = x509.create_private_key(algo="ec", encoding="der")
assert base64.b64decode(res)
@pytest.mark.slow_test
@pytest.mark.parametrize("passphrase", [None, "hunter2"])
def test_create_private_key_pkcs12(x509, passphrase):
res = x509.create_private_key(algo="ec", encoding="pkcs12", passphrase=passphrase)
assert base64.b64decode(res)
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_private_key_write_to_path(x509, encoding, tmp_path):
tgt = tmp_path / "pk"
x509.create_private_key(encoding=encoding, path=str(tgt))
assert tgt.exists()
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN PRIVATE KEY-----")
def test_create_private_key_write_to_path_encrypted(x509, tmp_path):
tgt = tmp_path / "pk"
x509.create_private_key(path=str(tgt), passphrase="hunter1")
assert tgt.exists()
assert tgt.read_text().startswith("-----BEGIN ENCRYPTED PRIVATE KEY-----")
@pytest.mark.parametrize("encoding", ["pem", "der"])
def test_create_private_key_write_to_path_overwrite(x509, encoding, tmp_path):
tgt = tmp_path / "cert"
tgt.write_text("occupied")
assert tgt.exists()
x509.create_private_key(encoding=encoding, path=str(tgt))
if encoding == "pem":
assert tgt.read_text().startswith("-----BEGIN PRIVATE KEY-----")
def test_create_private_key_raw(x509):
res = x509.create_private_key(raw=True)
assert isinstance(res, bytes)
assert res.startswith(b"-----BEGIN PRIVATE KEY-----")
@pytest.mark.parametrize(
"algo,expected", [("rsa", 2048), ("ec", 256), ("ed25519", None), ("ed448", None)]
)
def test_get_private_key_size(x509, algo, expected, request):
privkey = request.getfixturevalue(f"{algo}_privkey")
res = x509.get_private_key_size(privkey)
assert res == expected
@pytest.mark.parametrize(
"source", ["rsa_privkey", "rsa_pubkey", "cert_exts", "csr_exts"]
)
def test_get_public_key(x509, source, request):
src = request.getfixturevalue(source)
res = x509.get_public_key(src)
assert res.startswith("-----BEGIN PUBLIC KEY-----")
def test_read_certificate(x509, cert_exts, cert_exts_read):
res = x509.read_certificate(cert_exts)
assert res == cert_exts_read
def test_read_crl(x509, crl):
res = x509.read_crl(crl)
assert res
assert res == {
"extensions": {},
"issuer": OrderedDict([("C", "US"), ("O", "Salt"), ("CN", "Test")]),
"last_update": "2022-11-16 04:10:08",
"next_update": "2023-02-24 04:10:08",
"revoked_certificates": {
"0CF541984E976747B5E61C22D6542B56B3B4FD6F": {
"extensions": {},
"revocation_date": "2022-11-16 03:10:08",
},
},
"signature_algorithm": "sha256WithRSAEncryption",
}
def test_read_crl_all(x509, crl_all):
res = x509.read_crl(crl_all)
assert res == {
"extensions": {
"authorityKeyIdentifier": {
"critical": False,
"issuer": None,
"issuer_sn": None,
"keyid": "BE:12:01:CC:AA:EA:11:80:DA:2E:AD:B2:EA:C7:B5:FB:9F:F9:AD:34",
},
"cRLNumber": {"critical": False, "value": 3},
},
"issuer": OrderedDict(
[
("O", "Sample Signer Organization"),
("OU", "Sample Signer Unit"),
("CN", "Sample Signer Cert"),
]
),
"last_update": "2013-02-18 10:32:00",
"next_update": "2013-02-18 10:42:00",
"revoked_certificates": {
"147947": {
"extensions": {
"CRLReason": {
"critical": False,
"value": "affiliationChanged",
},
"invalidityDate": {
"critical": False,
"value": "2013-02-18 10:22:00",
},
},
"revocation_date": "2013-02-18 10:22:12",
},
"147948": {
"extensions": {
"CRLReason": {
"critical": False,
"value": "certificateHold",
},
"invalidityDate": {
"critical": False,
"value": "2013-02-18 10:22:00",
},
},
"revocation_date": "2013-02-18 10:22:22",
},
"147949": {
"extensions": {
"CRLReason": {
"critical": False,
"value": "superseded",
},
"invalidityDate": {
"critical": False,
"value": "2013-02-18 10:22:00",
},
},
"revocation_date": "2013-02-18 10:22:32",
},
"14794A": {
"extensions": {
"CRLReason": {
"critical": False,
"value": "keyCompromise",
},
"invalidityDate": {
"critical": False,
"value": "2013-02-18 10:22:00",
},
},
"revocation_date": "2013-02-18 10:22:42",
},
"14794B": {
"extensions": {
"CRLReason": {
"critical": False,
"value": "cessationOfOperation",
},
"invalidityDate": {
"critical": False,
"value": "2013-02-18 10:22:00",
},
},
"revocation_date": "2013-02-18 10:22:51",
},
},
"signature_algorithm": "sha1WithRSAEncryption",
}
def test_read_csr(x509, csr_exts, csr_exts_read):
res = x509.read_csr(csr_exts)
assert res == csr_exts_read
def test_verify_crl(x509, crl, ca_cert):
assert x509.verify_crl(crl, ca_cert) is True
def test_encode_private_key(x509, rsa_privkey):
pk = x509.create_private_key()
res = x509.encode_private_key(pk)
assert res.strip() == pk.strip()
def test_encode_private_key_encrypted(x509, ca_key, ca_key_enc):
pk = x509.create_private_key()
pk_enc = x509.encode_private_key(pk, passphrase="hunter1")
res = x509.encode_private_key(pk_enc, private_key_passphrase="hunter1")
assert res.strip() == pk.strip()
@pytest.mark.parametrize("privkey,expected", [("ca_key", True), ("rsa_privkey", False)])
def test_verify_private_key(x509, request, privkey, expected, ca_cert):
pk = request.getfixturevalue(privkey)
assert x509.verify_private_key(pk, ca_cert) is expected
def test_verify_private_key_with_passphrase(x509, ca_key_enc, ca_cert):
assert (
x509.verify_private_key(
ca_key_enc, ca_cert, passphrase="correct horse battery staple"
)
is True
)
@pytest.mark.parametrize("algo", ["rsa", "ec", "ed25519", "ed448"])
def test_verify_signature(x509, algo, request):
wrong_privkey = request.getfixturevalue(f"{algo}_privkey")
privkey = x509.create_private_key(algo=algo)
cert = x509.create_certificate(signing_private_key=privkey)
assert x509.verify_signature(cert, privkey)
assert not x509.verify_signature(cert, wrong_privkey)
def test_get_pem_entry(x509, ca_cert):
res = x509.get_pem_entry(ca_cert)
assert res == ca_cert.encode()
def test_get_pem_entry_newline_fix(x509, ca_cert):
res = x509.get_pem_entry(ca_cert.replace("\n", ""))
assert res == ca_cert.encode()
@pytest.fixture
def fresh_cert(x509, ca_key):
return x509.create_certificate(signing_private_key=ca_key, days_valid=1, CN="fresh")
def test_expires(x509, fresh_cert):
assert not x509.expires(fresh_cert)
assert x509.expires(fresh_cert, 2)
def test_expired(x509, ca_key, fresh_cert, tmp_path):
tgt = tmp_path / "pem"
tgt.write_text(fresh_cert)
res = x509.expired(str(tgt))
assert res == {"cn": "fresh", "path": str(tgt), "expired": False}
old_cert = x509.create_certificate(
signing_private_key=ca_key,
not_before="2000-01-01 13:37:00",
not_after="2000-01-01 13:37:42",
CN="expired",
)
res = x509.expired(old_cert)
assert res == {"cn": "expired", "expired": True}
def test_will_expire(x509, fresh_cert):
assert x509.will_expire(fresh_cert, 0) == {
"check_days": 0,
"cn": "fresh",
"will_expire": False,
}
assert x509.will_expire(fresh_cert, 2) == {
"check_days": 2,
"cn": "fresh",
"will_expire": True,
}
def test_write_pem(x509, fresh_cert, tmp_path):
tgt = tmp_path / "write_pem"
x509.write_pem(fresh_cert, str(tgt))
assert tgt.exists()
assert tgt.read_text() == fresh_cert
def test_get_pem_entries(x509, fresh_cert, ca_cert, tmp_path):
ca = tmp_path / "ca"
cert = tmp_path / "cert"
ca.write_text(ca_cert)
cert.write_text(fresh_cert)
res = x509.get_pem_entries(str(tmp_path / "*"))
assert res
assert res == {str(ca): ca_cert.encode(), str(cert): fresh_cert.encode()}
def test_read_certificates(x509, cert_exts, cert_exts_read, tmp_path):
cert = tmp_path / "cert"
cert.write_text(cert_exts)
res = x509.read_certificates(str(tmp_path / "*"))
assert res
assert res == {str(cert): cert_exts_read}
# Deprecated arguments
@pytest.mark.parametrize("arg", [{"version": 3}, {"serial_bits": 64}, {"text": True}])
def test_create_certificate_should_not_fail_with_removed_args(x509, arg, rsa_privkey):
with pytest.deprecated_call():
res = x509.create_certificate(
signing_private_key=rsa_privkey, CN="success", days_valid=1, **arg
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
def test_create_certificate_warns_about_algorithm_renaming(x509, rsa_privkey):
with pytest.deprecated_call():
res = x509.create_certificate(
signing_private_key=rsa_privkey, days_valid=1, algorithm="sha512"
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert isinstance(cert.signature_hash_algorithm, hashes.SHA512)
def test_create_certificate_warns_about_long_name_attributes(x509, rsa_privkey):
with pytest.deprecated_call():
res = x509.create_certificate(
signing_private_key=rsa_privkey, days_valid=1, commonName="success"
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert cert.subject.rfc4514_string() == "CN=success"
def test_create_certificate_warns_about_long_extensions(x509, rsa_privkey):
kwarg = {"X509v3 Basic Constraints": "critical CA:TRUE, pathlen:1"}
with pytest.deprecated_call():
res = x509.create_certificate(
signing_private_key=rsa_privkey, days_valid=1, **kwarg
)
assert res.startswith("-----BEGIN CERTIFICATE-----")
cert = _get_cert(res)
assert len(cert.extensions) == 1
assert isinstance(cert.extensions[0].value, cx509.BasicConstraints)
assert cert.extensions[0].critical
assert cert.extensions[0].value.ca
assert cert.extensions[0].value.path_length == 1
@pytest.mark.parametrize("arg", [{"version": 1}, {"text": True}])
def test_create_csr_should_not_fail_with_removed_args(x509, arg, rsa_privkey):
with pytest.deprecated_call():
res = x509.create_csr(private_key=rsa_privkey, CN="success", **arg)
assert res.startswith("-----BEGIN CERTIFICATE REQUEST-----")
def test_create_csr_warns_about_algorithm_renaming(x509, rsa_privkey):
with pytest.deprecated_call():
res = x509.create_csr(private_key=rsa_privkey, algorithm="sha512")
assert res.startswith("-----BEGIN CERTIFICATE REQUEST-----")
csr = cx509.load_pem_x509_csr(res.encode())
assert isinstance(csr.signature_hash_algorithm, hashes.SHA512)
def test_create_csr_warns_about_long_name_attributes(x509, rsa_privkey):
with pytest.deprecated_call():
res = x509.create_csr(private_key=rsa_privkey, commonName="success")
assert res.startswith("-----BEGIN CERTIFICATE REQUEST-----")
csr = cx509.load_pem_x509_csr(res.encode())
assert csr.subject.rfc4514_string() == "CN=success"
def test_create_csr_warns_about_long_extensions(x509, rsa_privkey):
kwarg = {"X509v3 Basic Constraints": "critical CA:FALSE"}
with pytest.deprecated_call():
res = x509.create_csr(private_key=rsa_privkey, **kwarg)
assert res.startswith("-----BEGIN CERTIFICATE REQUEST-----")
csr = cx509.load_pem_x509_csr(res.encode())
assert len(csr.extensions) == 1
assert isinstance(csr.extensions[0].value, cx509.BasicConstraints)
assert csr.extensions[0].critical
assert csr.extensions[0].value.ca is False
assert csr.extensions[0].value.path_length is None
@pytest.mark.parametrize("arg", [{"text": True}])
def test_create_crl_should_not_fail_with_removed_args(x509, arg, crl_args):
crl_args["days_valid"] = 7
with pytest.deprecated_call():
res = x509.create_crl(**crl_args, **arg)
assert res.startswith("-----BEGIN X509 CRL-----")
def test_create_crl_should_recognize_old_style_revoked(x509, crl_args, crl_revoked):
revoked = [
{f"key_{i}": [{"serial_number": rev["serial_number"]}]}
for i, rev in enumerate(crl_revoked)
]
crl_args["revoked"] = revoked
crl_args["days_valid"] = 7
with pytest.deprecated_call():
res = x509.create_crl(**crl_args)
crl = cx509.load_pem_x509_crl(res.encode())
assert len(crl) == len(crl_revoked)
def test_create_crl_should_recognize_old_style_reason(x509, crl_args):
revoked = [{"key_1": [{"serial_number": "01337A"}, {"reason": "keyCompromise"}]}]
crl_args["revoked"] = revoked
crl_args["days_valid"] = 7
with pytest.deprecated_call():
res = x509.create_crl(**crl_args)
crl = cx509.load_pem_x509_crl(res.encode())
assert len(crl) == 1
rev = crl.get_revoked_certificate_by_serial_number(78714)
assert rev
assert rev.extensions
assert len(rev.extensions) == 1
assert isinstance(rev.extensions[0].value, cx509.CRLReason)
@pytest.mark.parametrize(
"arg", [{"cipher": "aes_256_cbc"}, {"verbose": True}, {"text": True}]
)
def test_create_private_key_should_not_fail_with_removed_args(x509, arg, crl_args):
with pytest.deprecated_call():
res = x509.create_private_key(**arg)
assert res.startswith("-----BEGIN PRIVATE KEY-----")
def test_create_private_key_warns_about_bits_renaming(x509):
with pytest.deprecated_call():
res = x509.create_private_key(bits=3072)
pk = load_pem_private_key(res.encode(), None)
assert pk.key_size == 3072
def test_get_public_key_should_not_fail_with_removed_arg(x509, rsa_privkey):
with pytest.deprecated_call():
res = x509.get_public_key(rsa_privkey, asObj=True)
assert res.startswith("-----BEGIN PUBLIC KEY-----")
def test_get_signing_policy_warns_about_long_names(x509):
with pytest.deprecated_call():
res = x509.get_signing_policy("testdeprecatednamepolicy")
assert res
assert "commonName" not in res
assert "CN" in res
assert res["CN"] == "deprecated"
def test_get_signing_policy_warns_about_long_exts(x509):
with pytest.deprecated_call():
res = x509.get_signing_policy("testdeprecatedextpolicy")
assert res
assert "X509v3 Basic Constraints" not in res
assert "basicConstraints" in res
assert res["basicConstraints"] == "critical CA:FALSE"
def _get_cert(cert, encoding="pem", passphrase=None):
if encoding == "pem":
if not isinstance(cert, bytes):
cert = cert.encode()
return cx509.load_pem_x509_certificate(cert)
if encoding == "der":
if not isinstance(cert, bytes):
cert = base64.b64decode(cert)
return cx509.load_der_x509_certificate(cert)
if encoding == "pkcs7_pem":
if not isinstance(cert, bytes):
cert = cert.encode()
return pkcs7.load_pem_pkcs7_certificates(cert)
if encoding == "pkcs7_der":
if not isinstance(cert, bytes):
cert = base64.b64decode(cert)
return pkcs7.load_der_pkcs7_certificates(cert)
if encoding == "pkcs12":
if not isinstance(cert, bytes):
cert = base64.b64decode(cert)
if passphrase is not None and not isinstance(passphrase, bytes):
passphrase = passphrase.encode()
return pkcs12.load_pkcs12(cert, passphrase)