|
21 | 21 | from scionlab.models.pki import Key, Certificate
|
22 | 22 | from scionlab.models.trc import TRC, _coreas_certificates
|
23 | 23 |
|
24 |
| - |
25 | 24 | _ASID_1 = 'ff00:0:1'
|
26 | 25 | _ASID_2 = 'ff00:0:2'
|
27 | 26 | _ASID_3 = 'ff00:0:3'
|
@@ -250,6 +249,74 @@ def test_create_sensitive_update(self):
|
250 | 249 | self.assertTrue(trc.votes.exists())
|
251 | 250 | self.assertEqual(trc.quorum, prev.quorum)
|
252 | 251 |
|
| 252 | + def test_delete_one_core_as(self): |
| 253 | + self._create_ases() |
| 254 | + prev = TRC.objects.create(self.isd1) |
| 255 | + # remove one core AS |
| 256 | + AS.objects.filter(is_core=True, isd=self.isd1).first().delete() |
| 257 | + # deleting a core As triggers a generation of a TRC. Get that TRC: |
| 258 | + trc = TRC.objects.latest() |
| 259 | + |
| 260 | + # check the trc chain |
| 261 | + _check_trc(trc, prev) |
| 262 | + # check it's a sensitive update |
| 263 | + self.assertEqual(trc.serial_version, prev.serial_version + 1) |
| 264 | + self.assertEqual(trc.base_version, prev.base_version) |
| 265 | + self.assertEqual(trc.predecessor_trc_or_none(), prev) |
| 266 | + self.assertTrue(trc.votes.exists()) |
| 267 | + self.assertNotEqual(trc.quorum, prev.quorum) |
| 268 | + |
| 269 | + # Check valid latest CP AS certificates regenerated, core |
| 270 | + some_core = AS.objects.filter(is_core=True, isd=self.isd1).first() |
| 271 | + cert_cp_as = some_core.certificates_latest().filter(key__usage=Key.CP_AS).first() |
| 272 | + loaded_certs = bytes(cert_cp_as.format_certfile(), 'ascii') |
| 273 | + trcs.verify_certificate(loaded_certs, trcs.decode_trc(trc.trc)) |
| 274 | + |
| 275 | + # Check valid latest CP AS certificates regenerated, non-core |
| 276 | + any_none_core = AS.objects.filter(is_core=False, isd=self.isd1).first() |
| 277 | + cert_cp_as = any_none_core.certificates_latest().filter(key__usage=Key.CP_AS).first() |
| 278 | + loaded_certs = bytes(cert_cp_as.format_certfile(), 'ascii') |
| 279 | + trcs.verify_certificate(loaded_certs, trcs.decode_trc(trc.trc)) |
| 280 | + |
| 281 | + def test_broken_delete_one_core_as(self): |
| 282 | + # [regression test] Check that validating an invalid / old certificate fails |
| 283 | + # against an updated TRC |
| 284 | + self._create_ases() |
| 285 | + prev = TRC.objects.create(self.isd1) |
| 286 | + # remove one core AS |
| 287 | + AS.objects.filter(is_core=True, isd=self.isd1).first().delete() |
| 288 | + # deleting a core As triggers a generation of a TRC. Get that TRC: |
| 289 | + trc = TRC.objects.latest() |
| 290 | + |
| 291 | + # check the trc chain |
| 292 | + _check_trc(trc, prev) |
| 293 | + # check it's a sensitive update |
| 294 | + self.assertEqual(trc.serial_version, prev.serial_version + 1) |
| 295 | + self.assertEqual(trc.base_version, prev.base_version) |
| 296 | + self.assertEqual(trc.predecessor_trc_or_none(), prev) |
| 297 | + self.assertTrue(trc.votes.exists()) |
| 298 | + self.assertNotEqual(trc.quorum, prev.quorum) |
| 299 | + |
| 300 | + # Check invalid CP AS certificates when selecting old certificate, core |
| 301 | + with self.assertRaises(trcs._CalledProcessErrorWithOutput): |
| 302 | + some_core = AS.objects.filter(is_core=True, isd=self.isd1).first() |
| 303 | + cert_cp_as = Certificate.objects.filter(key__AS=some_core, key__usage=Key.CP_AS, |
| 304 | + key__version=1).get() |
| 305 | + loaded_certs = bytes(cert_cp_as.format_certfile(), 'ascii') |
| 306 | + trcs.verify_certificate(loaded_certs, trcs.decode_trc(trc.trc)) |
| 307 | + |
| 308 | + # Check invalid CP AS certificates when randomly selecting, non-core |
| 309 | + with self.assertRaises(AttributeError): |
| 310 | + any_none_core = AS.objects.filter(is_core=False, isd=self.isd1).first() |
| 311 | + cert_cp_as = Certificate.objects.filter(key__AS=any_none_core, key__usage=Key.CP_AS, |
| 312 | + key__version=1).get() |
| 313 | + certfile = cert_cp_as.format_certfile() |
| 314 | + # We should never get further, Unreachable code |
| 315 | + # The first core AS was deleted and the non-core v1 CP AS cert was referring to |
| 316 | + # that core AS CA cert |
| 317 | + loaded_certs = bytes(certfile, 'ascii') |
| 318 | + trcs.verify_certificate(loaded_certs, trcs.decode_trc(trc.trc)) |
| 319 | + |
253 | 320 | def test_create_less_core_ases(self):
|
254 | 321 | self._create_ases()
|
255 | 322 | prev = TRC.objects.create(self.isd1)
|
|
0 commit comments