blob: 2b8eb62dd0b964fafbddd4ed81a9ee6ccfa8442a [file] [log] [blame]
// Copyright 2011 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package x509_test
import (
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"internal/testenv"
"math/big"
"runtime"
"testing"
"time"
)
func TestHybridPool(t *testing.T) {
t.Parallel()
if !(runtime.GOOS == "windows" || runtime.GOOS == "darwin" || runtime.GOOS == "ios") {
t.Skipf("platform verifier not available on %s", runtime.GOOS)
}
if !testenv.HasExternalNetwork() {
t.Skip()
}
if runtime.GOOS == "windows" {
// NOTE(#51599): on the Windows builders we sometimes see that the state
// of the root pool is not fully initialized, causing an expected
// platform verification to fail. In part this is because Windows
// dynamically populates roots into its local trust store at time of
// use. We can attempt to prime the pool by attempting TLS connections
// to google.com until it works, suggesting the pool has been properly
// updated. If after we hit the dealine, the pool has _still_ not been
// populated with the expected root, it's unlikely we are ever going to
// get into a good state, and so we just fail the test. #52108 suggests
// a better possible long term solution.
deadline := time.Now().Add(time.Second * 10)
nextSleep := 10 * time.Millisecond
for i := 0; ; i++ {
c, err := tls.Dial("tcp", "google.com:443", nil)
if err == nil {
c.Close()
break
}
nextSleep = nextSleep * time.Duration(i)
if time.Until(deadline) < nextSleep {
t.Fatal("windows root pool appears to be in an uninitialized state (missing root that chains to google.com)")
}
time.Sleep(nextSleep)
}
}
// Get the google.com chain, which should be valid on all platforms we
// are testing
c, err := tls.Dial("tcp", "google.com:443", &tls.Config{InsecureSkipVerify: true})
if err != nil {
t.Fatalf("tls connection failed: %s", err)
}
googChain := c.ConnectionState().PeerCertificates
rootTmpl := &x509.Certificate{
SerialNumber: big.NewInt(1),
Subject: pkix.Name{CommonName: "Go test root"},
IsCA: true,
BasicConstraintsValid: true,
NotBefore: time.Now().Add(-time.Hour),
NotAfter: time.Now().Add(time.Hour * 10),
}
k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
t.Fatalf("failed to generate test key: %s", err)
}
rootDER, err := x509.CreateCertificate(rand.Reader, rootTmpl, rootTmpl, k.Public(), k)
if err != nil {
t.Fatalf("failed to create test cert: %s", err)
}
root, err := x509.ParseCertificate(rootDER)
if err != nil {
t.Fatalf("failed to parse test cert: %s", err)
}
pool, err := x509.SystemCertPool()
if err != nil {
t.Fatalf("SystemCertPool failed: %s", err)
}
opts := x509.VerifyOptions{Roots: pool}
_, err = googChain[0].Verify(opts)
if err != nil {
t.Fatalf("verification failed for google.com chain (system only pool): %s", err)
}
pool.AddCert(root)
_, err = googChain[0].Verify(opts)
if err != nil {
t.Fatalf("verification failed for google.com chain (hybrid pool): %s", err)
}
certTmpl := &x509.Certificate{
SerialNumber: big.NewInt(1),
NotBefore: time.Now().Add(-time.Hour),
NotAfter: time.Now().Add(time.Hour * 10),
DNSNames: []string{"example.com"},
}
certDER, err := x509.CreateCertificate(rand.Reader, certTmpl, rootTmpl, k.Public(), k)
if err != nil {
t.Fatalf("failed to create test cert: %s", err)
}
cert, err := x509.ParseCertificate(certDER)
if err != nil {
t.Fatalf("failed to parse test cert: %s", err)
}
_, err = cert.Verify(opts)
if err != nil {
t.Fatalf("verification failed for custom chain (hybrid pool): %s", err)
}
}