Skip to content

Commit 2502113

Browse files
VA: Remove logging of RIR and Perspective (#7818)
1 parent 56f0ed6 commit 2502113

File tree

3 files changed

+19
-58
lines changed

3 files changed

+19
-58
lines changed

va/caa_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -589,7 +589,7 @@ func (b caaBrokenDNS) LookupCAA(_ context.Context, domain string) ([]*dns.CAA, s
589589
}
590590

591591
func TestDisabledMultiCAARechecking(t *testing.T) {
592-
brokenRVA, _ := setupRemote(nil, "broken", caaBrokenDNS{}, "", "")
592+
brokenRVA := setupRemote(nil, "broken", caaBrokenDNS{}, "", "")
593593
remoteVAs := []RemoteVA{{brokenRVA, "broken"}}
594594
va, _ := setup(nil, 0, "local", remoteVAs, nil)
595595

@@ -663,10 +663,10 @@ func TestMultiCAARechecking(t *testing.T) {
663663
brokenUA = "broken"
664664
hijackedUA = "hijacked"
665665
)
666-
remoteVA, _ := setupRemote(nil, remoteUA, nil, "", "")
667-
brokenVA, _ := setupRemote(nil, brokenUA, caaBrokenDNS{}, "", "")
666+
remoteVA := setupRemote(nil, remoteUA, nil, "", "")
667+
brokenVA := setupRemote(nil, brokenUA, caaBrokenDNS{}, "", "")
668668
// Returns incorrect results
669-
hijackedVA, _ := setupRemote(nil, hijackedUA, caaHijackedDNS{}, "", "")
669+
hijackedVA := setupRemote(nil, hijackedUA, caaHijackedDNS{}, "", "")
670670

671671
testCases := []struct {
672672
name string

va/va.go

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -322,8 +322,6 @@ type verificationRequestEvent struct {
322322
ValidationLatency float64
323323
Error string `json:",omitempty"`
324324
InternalError string `json:",omitempty"`
325-
Perspective string `json:",omitempty"`
326-
RIR string `json:",omitempty"`
327325
}
328326

329327
// ipError is an error type used to pass though the IP address of the remote
@@ -678,18 +676,6 @@ func (va *ValidationAuthorityImpl) PerformValidation(ctx context.Context, req *v
678676
logEvent.Challenge.Status = core.StatusValid
679677
}
680678

681-
if va.perspective != "" && va.perspective != PrimaryPerspective {
682-
// This validation was performed by a remote VA. According to the
683-
// requirements in section 5.4.1 (2) vii of the BRs we need to log
684-
// the perspective used. Additionally, we'll log the RIR where this
685-
// RVA is located.
686-
//
687-
// TODO(#7615): Make these fields mandatory for non-Primary
688-
// perspectives and remove the (va.perspective != "") check.
689-
logEvent.Perspective = va.perspective
690-
logEvent.RIR = va.rir
691-
}
692-
693679
va.metrics.localValidationTime.With(prometheus.Labels{
694680
"type": string(logEvent.Challenge.Type),
695681
"result": string(logEvent.Challenge.Status),

va/va_test.go

Lines changed: 15 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -148,12 +148,12 @@ func setup(srv *httptest.Server, maxRemoteFailures int, userAgent string, remote
148148
return va, logger
149149
}
150150

151-
func setupRemote(srv *httptest.Server, userAgent string, mockDNSClientOverride bdns.Client, perspective, rir string) (RemoteClients, *blog.Mock) {
152-
rva, log := setup(srv, 0, userAgent, nil, mockDNSClientOverride)
151+
func setupRemote(srv *httptest.Server, userAgent string, mockDNSClientOverride bdns.Client, perspective, rir string) RemoteClients {
152+
rva, _ := setup(srv, 0, userAgent, nil, mockDNSClientOverride)
153153
rva.perspective = perspective
154154
rva.rir = rir
155155

156-
return RemoteClients{VAClient: &inMemVA{*rva}, CAAClient: &inMemVA{*rva}}, log
156+
return RemoteClients{VAClient: &inMemVA{*rva}, CAAClient: &inMemVA{*rva}}
157157
}
158158

159159
type multiSrv struct {
@@ -373,8 +373,8 @@ func TestMultiVA(t *testing.T) {
373373
ms := httpMultiSrv(t, expectedToken, allowedUAs)
374374
defer ms.Close()
375375

376-
remoteVA1, _ := setupRemote(ms.Server, remoteUA1, nil, "", "")
377-
remoteVA2, _ := setupRemote(ms.Server, remoteUA2, nil, "", "")
376+
remoteVA1 := setupRemote(ms.Server, remoteUA1, nil, "", "")
377+
remoteVA2 := setupRemote(ms.Server, remoteUA2, nil, "", "")
378378
remoteVAs := []RemoteVA{
379379
{remoteVA1, remoteUA1},
380380
{remoteVA2, remoteUA2},
@@ -511,8 +511,8 @@ func TestMultiVAEarlyReturn(t *testing.T) {
511511
ms := httpMultiSrv(t, expectedToken, allowedUAs)
512512
defer ms.Close()
513513

514-
remoteVA1, _ := setupRemote(ms.Server, remoteUA1, nil, "", "")
515-
remoteVA2, _ := setupRemote(ms.Server, remoteUA2, nil, "", "")
514+
remoteVA1 := setupRemote(ms.Server, remoteUA1, nil, "", "")
515+
remoteVA2 := setupRemote(ms.Server, remoteUA2, nil, "", "")
516516

517517
remoteVAs := []RemoteVA{
518518
{remoteVA1, remoteUA1},
@@ -561,8 +561,8 @@ func TestMultiVAPolicy(t *testing.T) {
561561
ms := httpMultiSrv(t, expectedToken, allowedUAs)
562562
defer ms.Close()
563563

564-
remoteVA1, _ := setupRemote(ms.Server, remoteUA1, nil, "", "")
565-
remoteVA2, _ := setupRemote(ms.Server, remoteUA2, nil, "", "")
564+
remoteVA1 := setupRemote(ms.Server, remoteUA1, nil, "", "")
565+
remoteVA2 := setupRemote(ms.Server, remoteUA2, nil, "", "")
566566

567567
remoteVAs := []RemoteVA{
568568
{remoteVA1, remoteUA1},
@@ -591,43 +591,18 @@ func TestMultiVALogging(t *testing.T) {
591591
ms := httpMultiSrv(t, expectedToken, map[string]bool{localUA: true, rva1UA: true, rva2UA: true})
592592
defer ms.Close()
593593

594-
rva1, rva1Log := setupRemote(ms.Server, rva1UA, nil, "dev-arin", "ARIN")
595-
rva2, rva2Log := setupRemote(ms.Server, rva2UA, nil, "dev-ripe", "RIPE")
594+
rva1 := setupRemote(ms.Server, rva1UA, nil, "dev-arin", "ARIN")
595+
rva2 := setupRemote(ms.Server, rva2UA, nil, "dev-ripe", "RIPE")
596596

597597
remoteVAs := []RemoteVA{
598598
{rva1, rva1UA},
599599
{rva2, rva2UA},
600600
}
601-
va, vaLog := setup(ms.Server, 0, localUA, remoteVAs, nil)
601+
va, _ := setup(ms.Server, 0, localUA, remoteVAs, nil)
602602
req := createValidationRequest("letsencrypt.org", core.ChallengeTypeHTTP01)
603603
res, err := va.PerformValidation(ctx, req)
604604
test.Assert(t, res.Problems == nil, fmt.Sprintf("validation failed with: %#v", res.Problems))
605605
test.AssertNotError(t, err, "performing validation")
606-
607-
// We do not log perspective or RIR for the local VAs.
608-
// We expect these log lines to be available immediately.
609-
test.Assert(t, len(vaLog.GetAllMatching(`"Perspective"`)) == 0, "expected no logged perspective for primary")
610-
test.Assert(t, len(vaLog.GetAllMatching(`"RIR"`)) == 0, "expected no logged RIR for primary")
611-
612-
// We do log perspective and RIR for the remote VAs.
613-
//
614-
// Because the remote VAs are operating on different goroutines, we aren't guaranteed their
615-
// log lines have arrived yet. Give it a few tries.
616-
for i := 0; i < 10; i++ {
617-
if len(rva1Log.GetAllMatching(`"Perspective":"dev-arin"`)) >= 1 &&
618-
len(rva1Log.GetAllMatching(`"RIR":"ARIN"`)) >= 1 &&
619-
len(rva2Log.GetAllMatching(`"Perspective":"dev-ripe"`)) >= 1 &&
620-
len(rva2Log.GetAllMatching(`"RIR":"RIPE"`)) >= 1 {
621-
break
622-
}
623-
if i == 9 {
624-
t.Logf("VA:\n%s\n", strings.Join(vaLog.GetAll(), "\n"))
625-
t.Logf("RVA 1:\n%s\n", strings.Join(rva1Log.GetAll(), "\n"))
626-
t.Logf("RVA 2:\n%s\n", strings.Join(rva2Log.GetAll(), "\n"))
627-
t.Errorf("expected perspective and RIR logs for remote VAs, but they never arrived")
628-
}
629-
time.Sleep(100 * time.Millisecond)
630-
}
631606
}
632607

633608
func TestDetailedError(t *testing.T) {
@@ -684,9 +659,9 @@ func TestDetailedError(t *testing.T) {
684659

685660
func TestLogRemoteDifferentials(t *testing.T) {
686661
// Create some remote VAs
687-
remoteVA1, _ := setupRemote(nil, "remote 1", nil, "", "")
688-
remoteVA2, _ := setupRemote(nil, "remote 2", nil, "", "")
689-
remoteVA3, _ := setupRemote(nil, "remote 3", nil, "", "")
662+
remoteVA1 := setupRemote(nil, "remote 1", nil, "", "")
663+
remoteVA2 := setupRemote(nil, "remote 2", nil, "", "")
664+
remoteVA3 := setupRemote(nil, "remote 3", nil, "", "")
690665
remoteVAs := []RemoteVA{
691666
{remoteVA1, "remote 1"},
692667
{remoteVA2, "remote 2"},

0 commit comments

Comments
 (0)