예제 #1
0
    def setUp(self):
        self.cert = test_util.load_comparable_cert('rsa2048_cert.pem')
        key = test_util.load_pyopenssl_private_key('rsa2048_key.pem')
        # pylint: disable=protected-access
        certs = {b'foo': (key, self.cert.wrapped)}

        from acme.crypto_util import SSLSocket

        class _TestServer(socketserver.TCPServer):

            # pylint: disable=too-few-public-methods
            # six.moves.* | pylint: disable=attribute-defined-outside-init,no-init

            def server_bind(self):  # pylint: disable=missing-docstring
                self.socket = SSLSocket(socket.socket(),
                        certs)
                socketserver.TCPServer.server_bind(self)

        self.server = _TestServer(('', 0), socketserver.BaseRequestHandler)
        self.port = self.server.socket.getsockname()[1]
        self.server_thread = threading.Thread(
            # pylint: disable=no-member
            target=self.server.handle_request)
        self.server_thread.start()
        time.sleep(1)  # TODO: avoid race conditions in other way
예제 #2
0
    def setUp(self):
        self.cert = test_util.load_comparable_cert("rsa2048_cert.pem")
        key = test_util.load_pyopenssl_private_key("rsa2048_key.pem")
        # pylint: disable=protected-access
        certs = {b"foo": (key, self.cert.wrapped)}

        from acme.crypto_util import SSLSocket

        class _TestServer(socketserver.TCPServer):

            # pylint: disable=too-few-public-methods
            # six.moves.* | pylint: disable=attribute-defined-outside-init,no-init

            def server_bind(self):  # pylint: disable=missing-docstring
                self.socket = SSLSocket(socket.socket(), certs=certs)
                socketserver.TCPServer.server_bind(self)

        self.server = _TestServer(("", 0), socketserver.BaseRequestHandler)
        self.port = self.server.socket.getsockname()[1]
        self.server_thread = threading.Thread(
            # pylint: disable=no-member
            target=self.server.handle_request
        )
        self.server_thread.start()
        time.sleep(1)  # TODO: avoid race conditions in other way
예제 #3
0
 def setUp(self):
     self.certs = {b'localhost': (
         test_util.load_pyopenssl_private_key('rsa2048_key.pem'),
         test_util.load_cert('rsa2048_cert.pem'),
     )}
     from acme.standalone import TLSSNI01DualNetworkedServers
     self.servers = TLSSNI01DualNetworkedServers(('localhost', 0), certs=self.certs)
     self.servers.serve_forever()
예제 #4
0
 def setUp(self):
     self.certs = {b'localhost': (
         test_util.load_pyopenssl_private_key('rsa2048_key.pem'),
         test_util.load_cert('rsa2048_cert.pem'),
     )}
     from acme.standalone import TLSSNI01Server
     self.server = TLSSNI01Server(('localhost', 0), certs=self.certs)
     self.thread = threading.Thread(target=self.server.serve_forever)
     self.thread.start()
예제 #5
0
 def setUp(self):
     self.certs = {b'localhost': (
         test_util.load_pyopenssl_private_key('rsa2048_key.pem'),
         test_util.load_cert('rsa2048_cert.pem'),
     )}
     from acme.standalone import TLSSNI01Server
     self.server = TLSSNI01Server(('localhost', 0), certs=self.certs)
     # pylint: disable=no-member
     self.thread = threading.Thread(target=self.server.serve_forever)
     self.thread.start()
예제 #6
0
    def setUp(self):
        self.certs = {
            b"localhost": (test_util.load_pyopenssl_private_key("rsa512_key.pem"), test_util.load_cert("cert.pem"))
        }
        from acme.standalone import TLSSNI01Server

        self.server = TLSSNI01Server(("", 0), certs=self.certs)
        # pylint: disable=no-member
        self.thread = threading.Thread(target=self.server.serve_forever)
        self.thread.start()
예제 #7
0
 def setUp(self):
     self.certs = {
         b'localhost': (test_util.load_pyopenssl_private_key('rsa512_key.pem'),
                        # pylint: disable=protected-access
                        test_util.load_cert('cert.pem')._wrapped),
     }
     from acme.standalone import DVSNIServer
     self.server = DVSNIServer(("", 0), certs=self.certs)
     # pylint: disable=no-member
     self.thread = threading.Thread(target=self.server.serve_forever)
     self.thread.start()
예제 #8
0
 def setUp(self):
     self.certs = {
         b'localhost': (test_util.load_pyopenssl_private_key('rsa512_key.pem'),
                        # pylint: disable=protected-access
                        test_util.load_cert('cert.pem')._wrapped),
     }
     from acme.standalone import DVSNIServer
     self.server = DVSNIServer(("", 0), certs=self.certs)
     # pylint: disable=no-member
     self.thread = threading.Thread(target=self.server.handle_request)
     self.thread.start()
    def setUp(self):
        self.certs = {
            b"localhost": (
                test_util.load_pyopenssl_private_key("rsa512_key.pem"),
                # pylint: disable=protected-access
                test_util.load_cert("cert.pem")._wrapped,
            )
        }
        from acme.standalone import DVSNIServer

        self.server = DVSNIServer(("", 0), certs=self.certs)
        # pylint: disable=no-member
        self.thread = threading.Thread(target=self.server.handle_request)
        self.thread.start()
예제 #10
0
    def setUp(self):
        from acme.challenges import DVSNIResponse
        # pylint: disable=invalid-name
        s = '9dbjsl3gTAtOnEtKFEmhS6Mj-ajNjDcOmRkp3Lfzm3c'
        self.msg = DVSNIResponse(s=jose.decode_b64jose(s))
        self.jmsg = {
            'resource': 'challenge',
            'type': 'dvsni',
            's': s,
        }

        from acme.challenges import DVSNI
        self.chall = DVSNI(
            r=jose.decode_b64jose('Tyq0La3slT7tqQ0wlOiXnCY2vyez7Zo5blgPJ1xt5xI'),
            nonce=jose.decode_b64jose('a82d5ff8ef740d12881f6d3c2277ab2e'))
        self.z = (b'38e612b0397cc2624a07d351d7ef50e4'
                  b'6134c0213d9ed52f7d7c611acaeed41b')
        self.domain = 'foo.com'
        self.key = test_util.load_pyopenssl_private_key('rsa512_key.pem')
        self.public_key = test_util.load_rsa_private_key(
            'rsa512_key.pem').public_key()
    def setUp(self):
        from acme.challenges import DVSNIResponse
        # pylint: disable=invalid-name
        s = '9dbjsl3gTAtOnEtKFEmhS6Mj-ajNjDcOmRkp3Lfzm3c'
        self.msg = DVSNIResponse(s=jose.decode_b64jose(s))
        self.jmsg = {
            'resource': 'challenge',
            'type': 'dvsni',
            's': s,
        }

        from acme.challenges import DVSNI
        self.chall = DVSNI(
            r=jose.decode_b64jose(
                'Tyq0La3slT7tqQ0wlOiXnCY2vyez7Zo5blgPJ1xt5xI'),
            nonce=jose.decode_b64jose('a82d5ff8ef740d12881f6d3c2277ab2e'))
        self.z = (b'38e612b0397cc2624a07d351d7ef50e4'
                  b'6134c0213d9ed52f7d7c611acaeed41b')
        self.domain = 'foo.com'
        self.key = test_util.load_pyopenssl_private_key('rsa512_key.pem')
        self.public_key = test_util.load_rsa_private_key(
            'rsa512_key.pem').public_key()
예제 #12
0
import argparse
import copy
import os
import re
import shutil
import tarfile

from acme import jose
from acme import test_util
from certbot import constants

from certbot_compatibility_test import errors

_KEY_BASE = "rsa1024_key.pem"
KEY_PATH = test_util.vector_path(_KEY_BASE)
KEY = test_util.load_pyopenssl_private_key(_KEY_BASE)
JWK = jose.JWKRSA(key=test_util.load_rsa_private_key(_KEY_BASE))
IP_REGEX = re.compile(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$")


def create_le_config(parent_dir):
    """Sets up LE dirs in parent_dir and returns the config dict"""
    config = copy.deepcopy(constants.CLI_DEFAULTS)

    le_dir = os.path.join(parent_dir, "certbot")
    config["config_dir"] = os.path.join(le_dir, "config")
    config["work_dir"] = os.path.join(le_dir, "work")
    config["logs_dir"] = os.path.join(le_dir, "logs_dir")
    os.makedirs(config["config_dir"])
    os.mkdir(config["work_dir"])
    os.mkdir(config["logs_dir"])
예제 #13
0
 def test_gen_verify_cert(self):
     key1 = test_util.load_pyopenssl_private_key('rsa512_key.pem')
     cert, key2 = self.response.gen_cert(key1)
     self.assertEqual(key1, key2)
     self.assertTrue(self.response.verify_cert(cert))
예제 #14
0
 def test_gen_verify_cert(self):
     key1 = test_util.load_pyopenssl_private_key('rsa512_key.pem')
     cert, key2 = self.msg.gen_cert(key1)
     self.assertEqual(key1, key2)
     self.assertTrue(self.msg.verify_cert(cert))
예제 #15
0
파일: util.py 프로젝트: fmarier/letsencrypt
import os
import re
import shutil
import socket
import tarfile

from acme import jose
from acme import test_util
from letsencrypt import constants

from letsencrypt_compatibility_test import errors


_KEY_BASE = "rsa1024_key.pem"
KEY_PATH = test_util.vector_path(_KEY_BASE)
KEY = test_util.load_pyopenssl_private_key(_KEY_BASE)
JWK = jose.JWKRSA(key=test_util.load_rsa_private_key(_KEY_BASE))
IP_REGEX = re.compile(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$")


def create_le_config(parent_dir):
    """Sets up LE dirs in parent_dir and returns the config dict"""
    config = copy.deepcopy(constants.CLI_DEFAULTS)

    le_dir = os.path.join(parent_dir, "letsencrypt")
    config["config_dir"] = os.path.join(le_dir, "config")
    config["work_dir"] = os.path.join(le_dir, "work")
    config["logs_dir"] = os.path.join(le_dir, "logs_dir")
    os.makedirs(config["config_dir"])
    os.mkdir(config["work_dir"])
    os.mkdir(config["logs_dir"])
예제 #16
0
 def test_verify_bad_domain(self):
     key1 = test_util.load_pyopenssl_private_key('rsa512_key.pem')
     cert, key2 = self.response.gen_cert(self.domain, key1)
     self.assertEqual(key1, key2)
     self.assertFalse(self.response.verify_cert(self.domain2, cert))