def setUp(self): self.cert = test_util.load_comparable_cert('rsa2048_cert.pem') key = test_util.load_pyopenssl_private_key('rsa2048_key.pem') # pylint: disable=protected-access certs = {b'foo': (key, self.cert.wrapped)} from acme.crypto_util import SSLSocket class _TestServer(socketserver.TCPServer): # pylint: disable=too-few-public-methods # six.moves.* | pylint: disable=attribute-defined-outside-init,no-init def server_bind(self): # pylint: disable=missing-docstring self.socket = SSLSocket(socket.socket(), certs) socketserver.TCPServer.server_bind(self) self.server = _TestServer(('', 0), socketserver.BaseRequestHandler) self.port = self.server.socket.getsockname()[1] self.server_thread = threading.Thread( # pylint: disable=no-member target=self.server.handle_request) self.server_thread.start() time.sleep(1) # TODO: avoid race conditions in other way
def setUp(self): self.cert = test_util.load_comparable_cert("rsa2048_cert.pem") key = test_util.load_pyopenssl_private_key("rsa2048_key.pem") # pylint: disable=protected-access certs = {b"foo": (key, self.cert.wrapped)} from acme.crypto_util import SSLSocket class _TestServer(socketserver.TCPServer): # pylint: disable=too-few-public-methods # six.moves.* | pylint: disable=attribute-defined-outside-init,no-init def server_bind(self): # pylint: disable=missing-docstring self.socket = SSLSocket(socket.socket(), certs=certs) socketserver.TCPServer.server_bind(self) self.server = _TestServer(("", 0), socketserver.BaseRequestHandler) self.port = self.server.socket.getsockname()[1] self.server_thread = threading.Thread( # pylint: disable=no-member target=self.server.handle_request ) self.server_thread.start() time.sleep(1) # TODO: avoid race conditions in other way
def setUp(self): self.certs = {b'localhost': ( test_util.load_pyopenssl_private_key('rsa2048_key.pem'), test_util.load_cert('rsa2048_cert.pem'), )} from acme.standalone import TLSSNI01DualNetworkedServers self.servers = TLSSNI01DualNetworkedServers(('localhost', 0), certs=self.certs) self.servers.serve_forever()
def setUp(self): self.certs = {b'localhost': ( test_util.load_pyopenssl_private_key('rsa2048_key.pem'), test_util.load_cert('rsa2048_cert.pem'), )} from acme.standalone import TLSSNI01Server self.server = TLSSNI01Server(('localhost', 0), certs=self.certs) self.thread = threading.Thread(target=self.server.serve_forever) self.thread.start()
def setUp(self): self.certs = {b'localhost': ( test_util.load_pyopenssl_private_key('rsa2048_key.pem'), test_util.load_cert('rsa2048_cert.pem'), )} from acme.standalone import TLSSNI01Server self.server = TLSSNI01Server(('localhost', 0), certs=self.certs) # pylint: disable=no-member self.thread = threading.Thread(target=self.server.serve_forever) self.thread.start()
def setUp(self): self.certs = { b"localhost": (test_util.load_pyopenssl_private_key("rsa512_key.pem"), test_util.load_cert("cert.pem")) } from acme.standalone import TLSSNI01Server self.server = TLSSNI01Server(("", 0), certs=self.certs) # pylint: disable=no-member self.thread = threading.Thread(target=self.server.serve_forever) self.thread.start()
def setUp(self): self.certs = { b'localhost': (test_util.load_pyopenssl_private_key('rsa512_key.pem'), # pylint: disable=protected-access test_util.load_cert('cert.pem')._wrapped), } from acme.standalone import DVSNIServer self.server = DVSNIServer(("", 0), certs=self.certs) # pylint: disable=no-member self.thread = threading.Thread(target=self.server.serve_forever) self.thread.start()
def setUp(self): self.certs = { b'localhost': (test_util.load_pyopenssl_private_key('rsa512_key.pem'), # pylint: disable=protected-access test_util.load_cert('cert.pem')._wrapped), } from acme.standalone import DVSNIServer self.server = DVSNIServer(("", 0), certs=self.certs) # pylint: disable=no-member self.thread = threading.Thread(target=self.server.handle_request) self.thread.start()
def setUp(self): self.certs = { b"localhost": ( test_util.load_pyopenssl_private_key("rsa512_key.pem"), # pylint: disable=protected-access test_util.load_cert("cert.pem")._wrapped, ) } from acme.standalone import DVSNIServer self.server = DVSNIServer(("", 0), certs=self.certs) # pylint: disable=no-member self.thread = threading.Thread(target=self.server.handle_request) self.thread.start()
def setUp(self): from acme.challenges import DVSNIResponse # pylint: disable=invalid-name s = '9dbjsl3gTAtOnEtKFEmhS6Mj-ajNjDcOmRkp3Lfzm3c' self.msg = DVSNIResponse(s=jose.decode_b64jose(s)) self.jmsg = { 'resource': 'challenge', 'type': 'dvsni', 's': s, } from acme.challenges import DVSNI self.chall = DVSNI( r=jose.decode_b64jose('Tyq0La3slT7tqQ0wlOiXnCY2vyez7Zo5blgPJ1xt5xI'), nonce=jose.decode_b64jose('a82d5ff8ef740d12881f6d3c2277ab2e')) self.z = (b'38e612b0397cc2624a07d351d7ef50e4' b'6134c0213d9ed52f7d7c611acaeed41b') self.domain = 'foo.com' self.key = test_util.load_pyopenssl_private_key('rsa512_key.pem') self.public_key = test_util.load_rsa_private_key( 'rsa512_key.pem').public_key()
def setUp(self): from acme.challenges import DVSNIResponse # pylint: disable=invalid-name s = '9dbjsl3gTAtOnEtKFEmhS6Mj-ajNjDcOmRkp3Lfzm3c' self.msg = DVSNIResponse(s=jose.decode_b64jose(s)) self.jmsg = { 'resource': 'challenge', 'type': 'dvsni', 's': s, } from acme.challenges import DVSNI self.chall = DVSNI( r=jose.decode_b64jose( 'Tyq0La3slT7tqQ0wlOiXnCY2vyez7Zo5blgPJ1xt5xI'), nonce=jose.decode_b64jose('a82d5ff8ef740d12881f6d3c2277ab2e')) self.z = (b'38e612b0397cc2624a07d351d7ef50e4' b'6134c0213d9ed52f7d7c611acaeed41b') self.domain = 'foo.com' self.key = test_util.load_pyopenssl_private_key('rsa512_key.pem') self.public_key = test_util.load_rsa_private_key( 'rsa512_key.pem').public_key()
import argparse import copy import os import re import shutil import tarfile from acme import jose from acme import test_util from certbot import constants from certbot_compatibility_test import errors _KEY_BASE = "rsa1024_key.pem" KEY_PATH = test_util.vector_path(_KEY_BASE) KEY = test_util.load_pyopenssl_private_key(_KEY_BASE) JWK = jose.JWKRSA(key=test_util.load_rsa_private_key(_KEY_BASE)) IP_REGEX = re.compile(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$") def create_le_config(parent_dir): """Sets up LE dirs in parent_dir and returns the config dict""" config = copy.deepcopy(constants.CLI_DEFAULTS) le_dir = os.path.join(parent_dir, "certbot") config["config_dir"] = os.path.join(le_dir, "config") config["work_dir"] = os.path.join(le_dir, "work") config["logs_dir"] = os.path.join(le_dir, "logs_dir") os.makedirs(config["config_dir"]) os.mkdir(config["work_dir"]) os.mkdir(config["logs_dir"])
def test_gen_verify_cert(self): key1 = test_util.load_pyopenssl_private_key('rsa512_key.pem') cert, key2 = self.response.gen_cert(key1) self.assertEqual(key1, key2) self.assertTrue(self.response.verify_cert(cert))
def test_gen_verify_cert(self): key1 = test_util.load_pyopenssl_private_key('rsa512_key.pem') cert, key2 = self.msg.gen_cert(key1) self.assertEqual(key1, key2) self.assertTrue(self.msg.verify_cert(cert))
import os import re import shutil import socket import tarfile from acme import jose from acme import test_util from letsencrypt import constants from letsencrypt_compatibility_test import errors _KEY_BASE = "rsa1024_key.pem" KEY_PATH = test_util.vector_path(_KEY_BASE) KEY = test_util.load_pyopenssl_private_key(_KEY_BASE) JWK = jose.JWKRSA(key=test_util.load_rsa_private_key(_KEY_BASE)) IP_REGEX = re.compile(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$") def create_le_config(parent_dir): """Sets up LE dirs in parent_dir and returns the config dict""" config = copy.deepcopy(constants.CLI_DEFAULTS) le_dir = os.path.join(parent_dir, "letsencrypt") config["config_dir"] = os.path.join(le_dir, "config") config["work_dir"] = os.path.join(le_dir, "work") config["logs_dir"] = os.path.join(le_dir, "logs_dir") os.makedirs(config["config_dir"]) os.mkdir(config["work_dir"]) os.mkdir(config["logs_dir"])
def test_verify_bad_domain(self): key1 = test_util.load_pyopenssl_private_key('rsa512_key.pem') cert, key2 = self.response.gen_cert(self.domain, key1) self.assertEqual(key1, key2) self.assertFalse(self.response.verify_cert(self.domain2, cert))