ca.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416
  1. // Copyright 2018 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. // Package acmetest provides types for testing acme and autocert packages.
  5. //
  6. // TODO: Consider moving this to x/crypto/acme/internal/acmetest for acme tests as well.
  7. package acmetest
  8. import (
  9. "crypto"
  10. "crypto/ecdsa"
  11. "crypto/elliptic"
  12. "crypto/rand"
  13. "crypto/tls"
  14. "crypto/x509"
  15. "crypto/x509/pkix"
  16. "encoding/base64"
  17. "encoding/json"
  18. "fmt"
  19. "io"
  20. "math/big"
  21. "net/http"
  22. "net/http/httptest"
  23. "sort"
  24. "strings"
  25. "sync"
  26. "time"
  27. )
  28. // CAServer is a simple test server which implements ACME spec bits needed for testing.
  29. type CAServer struct {
  30. URL string // server URL after it has been started
  31. Roots *x509.CertPool // CA root certificates; initialized in NewCAServer
  32. rootKey crypto.Signer
  33. rootCert []byte // DER encoding
  34. rootTemplate *x509.Certificate
  35. server *httptest.Server
  36. challengeTypes []string // supported challenge types
  37. domainsWhitelist []string // only these domains are valid for issuing, unless empty
  38. mu sync.Mutex
  39. certCount int // number of issued certs
  40. domainAddr map[string]string // domain name to addr:port resolution
  41. authorizations map[string]*authorization // keyed by domain name
  42. errors []error // encountered client errors
  43. }
  44. // NewCAServer creates a new ACME test server and starts serving requests.
  45. // The returned CAServer issues certs signed with the CA roots
  46. // available in the Roots field.
  47. //
  48. // The challengeTypes argument defines the supported ACME challenge types
  49. // sent to a client in a response for a domain authorization.
  50. // If domainsWhitelist is non-empty, the certs will be issued only for the specified
  51. // list of domains. Otherwise, any domain name is allowed.
  52. func NewCAServer(challengeTypes []string, domainsWhitelist []string) *CAServer {
  53. var whitelist []string
  54. for _, name := range domainsWhitelist {
  55. whitelist = append(whitelist, name)
  56. }
  57. sort.Strings(whitelist)
  58. ca := &CAServer{
  59. challengeTypes: challengeTypes,
  60. domainsWhitelist: whitelist,
  61. domainAddr: make(map[string]string),
  62. authorizations: make(map[string]*authorization),
  63. }
  64. key, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  65. if err != nil {
  66. panic(fmt.Sprintf("ecdsa.GenerateKey: %v", err))
  67. }
  68. tmpl := &x509.Certificate{
  69. SerialNumber: big.NewInt(1),
  70. Subject: pkix.Name{
  71. Organization: []string{"Test Acme Co"},
  72. CommonName: "Root CA",
  73. },
  74. NotBefore: time.Now(),
  75. NotAfter: time.Now().Add(365 * 24 * time.Hour),
  76. KeyUsage: x509.KeyUsageCertSign,
  77. BasicConstraintsValid: true,
  78. IsCA: true,
  79. }
  80. der, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, &key.PublicKey, key)
  81. if err != nil {
  82. panic(fmt.Sprintf("x509.CreateCertificate: %v", err))
  83. }
  84. cert, err := x509.ParseCertificate(der)
  85. if err != nil {
  86. panic(fmt.Sprintf("x509.ParseCertificate: %v", err))
  87. }
  88. ca.Roots = x509.NewCertPool()
  89. ca.Roots.AddCert(cert)
  90. ca.rootKey = key
  91. ca.rootCert = der
  92. ca.rootTemplate = tmpl
  93. ca.server = httptest.NewServer(http.HandlerFunc(ca.handle))
  94. ca.URL = ca.server.URL
  95. return ca
  96. }
  97. // Close shuts down the server and blocks until all outstanding
  98. // requests on this server have completed.
  99. func (ca *CAServer) Close() {
  100. ca.server.Close()
  101. }
  102. // Errors returns all client errors.
  103. func (ca *CAServer) Errors() []error {
  104. ca.mu.Lock()
  105. defer ca.mu.Unlock()
  106. return ca.errors
  107. }
  108. // Resolve adds a domain to address resolution for the ca to dial to
  109. // when validating challenges for the domain authorization.
  110. func (ca *CAServer) Resolve(domain, addr string) {
  111. ca.mu.Lock()
  112. defer ca.mu.Unlock()
  113. ca.domainAddr[domain] = addr
  114. }
  115. type discovery struct {
  116. NewReg string `json:"new-reg"`
  117. NewAuthz string `json:"new-authz"`
  118. NewCert string `json:"new-cert"`
  119. }
  120. type challenge struct {
  121. URI string `json:"uri"`
  122. Type string `json:"type"`
  123. Token string `json:"token"`
  124. }
  125. type authorization struct {
  126. Status string `json:"status"`
  127. Challenges []challenge `json:"challenges"`
  128. id int
  129. domain string
  130. }
  131. func (ca *CAServer) handle(w http.ResponseWriter, r *http.Request) {
  132. w.Header().Set("Replay-Nonce", "nonce")
  133. if r.Method == "HEAD" {
  134. // a nonce request
  135. return
  136. }
  137. // TODO: Verify nonce header for all POST requests.
  138. switch {
  139. default:
  140. err := fmt.Errorf("unrecognized r.URL.Path: %s", r.URL.Path)
  141. ca.addError(err)
  142. http.Error(w, err.Error(), http.StatusBadRequest)
  143. // Discovery request.
  144. case r.URL.Path == "/":
  145. resp := &discovery{
  146. NewReg: ca.serverURL("/new-reg"),
  147. NewAuthz: ca.serverURL("/new-authz"),
  148. NewCert: ca.serverURL("/new-cert"),
  149. }
  150. if err := json.NewEncoder(w).Encode(resp); err != nil {
  151. panic(fmt.Sprintf("discovery response: %v", err))
  152. }
  153. // Client key registration request.
  154. case r.URL.Path == "/new-reg":
  155. // TODO: Check the user account key against a ca.accountKeys?
  156. w.Write([]byte("{}"))
  157. // Domain authorization request.
  158. case r.URL.Path == "/new-authz":
  159. var req struct {
  160. Identifier struct{ Value string }
  161. }
  162. if err := decodePayload(&req, r.Body); err != nil {
  163. ca.addError(err)
  164. http.Error(w, err.Error(), http.StatusBadRequest)
  165. return
  166. }
  167. ca.mu.Lock()
  168. defer ca.mu.Unlock()
  169. authz, ok := ca.authorizations[req.Identifier.Value]
  170. if !ok {
  171. authz = &authorization{
  172. domain: req.Identifier.Value,
  173. Status: "pending",
  174. }
  175. for _, typ := range ca.challengeTypes {
  176. authz.Challenges = append(authz.Challenges, challenge{
  177. Type: typ,
  178. URI: ca.serverURL("/challenge/%s/%s", typ, authz.domain),
  179. Token: challengeToken(authz.domain, typ),
  180. })
  181. }
  182. ca.authorizations[authz.domain] = authz
  183. }
  184. w.Header().Set("Location", ca.serverURL("/authz/%s", authz.domain))
  185. w.WriteHeader(http.StatusCreated)
  186. if err := json.NewEncoder(w).Encode(authz); err != nil {
  187. panic(fmt.Sprintf("new authz response: %v", err))
  188. }
  189. // Accept tls-alpn-01 challenge type requests.
  190. // TODO: Add http-01 and dns-01 handlers.
  191. case strings.HasPrefix(r.URL.Path, "/challenge/tls-alpn-01/"):
  192. domain := strings.TrimPrefix(r.URL.Path, "/challenge/tls-alpn-01/")
  193. ca.mu.Lock()
  194. defer ca.mu.Unlock()
  195. if _, ok := ca.authorizations[domain]; !ok {
  196. err := fmt.Errorf("challenge accept: no authz for %q", domain)
  197. ca.addError(err)
  198. http.Error(w, err.Error(), http.StatusNotFound)
  199. return
  200. }
  201. go func(domain string) {
  202. err := ca.verifyALPNChallenge(domain)
  203. ca.mu.Lock()
  204. defer ca.mu.Unlock()
  205. authz := ca.authorizations[domain]
  206. if err != nil {
  207. authz.Status = "invalid"
  208. return
  209. }
  210. authz.Status = "valid"
  211. }(domain)
  212. w.Write([]byte("{}"))
  213. // Get authorization status requests.
  214. case strings.HasPrefix(r.URL.Path, "/authz/"):
  215. domain := strings.TrimPrefix(r.URL.Path, "/authz/")
  216. ca.mu.Lock()
  217. defer ca.mu.Unlock()
  218. authz, ok := ca.authorizations[domain]
  219. if !ok {
  220. http.Error(w, fmt.Sprintf("no authz for %q", domain), http.StatusNotFound)
  221. return
  222. }
  223. if err := json.NewEncoder(w).Encode(authz); err != nil {
  224. panic(fmt.Sprintf("get authz for %q response: %v", domain, err))
  225. }
  226. // Cert issuance request.
  227. case r.URL.Path == "/new-cert":
  228. var req struct {
  229. CSR string `json:"csr"`
  230. }
  231. decodePayload(&req, r.Body)
  232. b, _ := base64.RawURLEncoding.DecodeString(req.CSR)
  233. csr, err := x509.ParseCertificateRequest(b)
  234. if err != nil {
  235. ca.addError(err)
  236. http.Error(w, err.Error(), http.StatusBadRequest)
  237. return
  238. }
  239. names := unique(append(csr.DNSNames, csr.Subject.CommonName))
  240. if err := ca.matchWhitelist(names); err != nil {
  241. ca.addError(err)
  242. http.Error(w, err.Error(), http.StatusUnauthorized)
  243. return
  244. }
  245. if err := ca.authorized(names); err != nil {
  246. ca.addError(err)
  247. http.Error(w, err.Error(), http.StatusUnauthorized)
  248. return
  249. }
  250. der, err := ca.leafCert(csr)
  251. if err != nil {
  252. err = fmt.Errorf("new-cert response: ca.leafCert: %v", err)
  253. ca.addError(err)
  254. http.Error(w, err.Error(), http.StatusBadRequest)
  255. }
  256. w.Header().Set("Link", fmt.Sprintf("<%s>; rel=up", ca.serverURL("/ca-cert")))
  257. w.WriteHeader(http.StatusCreated)
  258. w.Write(der)
  259. // CA chain cert request.
  260. case r.URL.Path == "/ca-cert":
  261. w.Write(ca.rootCert)
  262. }
  263. }
  264. func (ca *CAServer) addError(err error) {
  265. ca.mu.Lock()
  266. defer ca.mu.Unlock()
  267. ca.errors = append(ca.errors, err)
  268. }
  269. func (ca *CAServer) serverURL(format string, arg ...interface{}) string {
  270. return ca.server.URL + fmt.Sprintf(format, arg...)
  271. }
  272. func (ca *CAServer) matchWhitelist(dnsNames []string) error {
  273. if len(ca.domainsWhitelist) == 0 {
  274. return nil
  275. }
  276. var nomatch []string
  277. for _, name := range dnsNames {
  278. i := sort.SearchStrings(ca.domainsWhitelist, name)
  279. if i == len(ca.domainsWhitelist) || ca.domainsWhitelist[i] != name {
  280. nomatch = append(nomatch, name)
  281. }
  282. }
  283. if len(nomatch) > 0 {
  284. return fmt.Errorf("matchWhitelist: some domains don't match: %q", nomatch)
  285. }
  286. return nil
  287. }
  288. func (ca *CAServer) authorized(dnsNames []string) error {
  289. ca.mu.Lock()
  290. defer ca.mu.Unlock()
  291. var noauthz []string
  292. for _, name := range dnsNames {
  293. authz, ok := ca.authorizations[name]
  294. if !ok || authz.Status != "valid" {
  295. noauthz = append(noauthz, name)
  296. }
  297. }
  298. if len(noauthz) > 0 {
  299. return fmt.Errorf("CAServer: no authz for %q", noauthz)
  300. }
  301. return nil
  302. }
  303. func (ca *CAServer) leafCert(csr *x509.CertificateRequest) (der []byte, err error) {
  304. ca.mu.Lock()
  305. defer ca.mu.Unlock()
  306. ca.certCount++ // next leaf cert serial number
  307. leaf := &x509.Certificate{
  308. SerialNumber: big.NewInt(int64(ca.certCount)),
  309. Subject: pkix.Name{Organization: []string{"Test Acme Co"}},
  310. NotBefore: time.Now(),
  311. NotAfter: time.Now().Add(90 * 24 * time.Hour),
  312. KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment,
  313. ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
  314. DNSNames: csr.DNSNames,
  315. BasicConstraintsValid: true,
  316. }
  317. if len(csr.DNSNames) == 0 {
  318. leaf.DNSNames = []string{csr.Subject.CommonName}
  319. }
  320. return x509.CreateCertificate(rand.Reader, leaf, ca.rootTemplate, csr.PublicKey, ca.rootKey)
  321. }
  322. func (ca *CAServer) addr(domain string) (string, error) {
  323. ca.mu.Lock()
  324. defer ca.mu.Unlock()
  325. addr, ok := ca.domainAddr[domain]
  326. if !ok {
  327. return "", fmt.Errorf("CAServer: no addr resolution for %q", domain)
  328. }
  329. return addr, nil
  330. }
  331. func (ca *CAServer) verifyALPNChallenge(domain string) error {
  332. const acmeALPNProto = "acme-tls/1"
  333. addr, err := ca.addr(domain)
  334. if err != nil {
  335. return err
  336. }
  337. conn, err := tls.Dial("tcp", addr, &tls.Config{
  338. ServerName: domain,
  339. InsecureSkipVerify: true,
  340. NextProtos: []string{acmeALPNProto},
  341. })
  342. if err != nil {
  343. return err
  344. }
  345. if v := conn.ConnectionState().NegotiatedProtocol; v != acmeALPNProto {
  346. return fmt.Errorf("CAServer: verifyALPNChallenge: negotiated proto is %q; want %q", v, acmeALPNProto)
  347. }
  348. if n := len(conn.ConnectionState().PeerCertificates); n != 1 {
  349. return fmt.Errorf("len(PeerCertificates) = %d; want 1", n)
  350. }
  351. // TODO: verify conn.ConnectionState().PeerCertificates[0]
  352. return nil
  353. }
  354. func decodePayload(v interface{}, r io.Reader) error {
  355. var req struct{ Payload string }
  356. if err := json.NewDecoder(r).Decode(&req); err != nil {
  357. return err
  358. }
  359. payload, err := base64.RawURLEncoding.DecodeString(req.Payload)
  360. if err != nil {
  361. return err
  362. }
  363. return json.Unmarshal(payload, v)
  364. }
  365. func challengeToken(domain, challType string) string {
  366. return fmt.Sprintf("token-%s-%s", domain, challType)
  367. }
  368. func unique(a []string) []string {
  369. seen := make(map[string]bool)
  370. var res []string
  371. for _, s := range a {
  372. if s != "" && !seen[s] {
  373. seen[s] = true
  374. res = append(res, s)
  375. }
  376. }
  377. return res
  378. }