argo-cd/util/tls/tls_test.go
Ville Vesilehto 109cd6c382
fix(tls): validate RSA keys before marshaling (#23295)
Signed-off-by: Ville Vesilehto <ville@vesilehto.fi>
2025-06-06 13:05:41 +02:00

533 lines
19 KiB
Go

package tls
import (
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"encoding/pem"
"errors"
"fmt"
"math/big"
"os"
"strings"
"testing"
"time"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
var chain = `-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----`
var privateKey = `-----BEGIN RSA PRIVATE KEY-----
MIICXQIBAAKBgQCJ35XKYxJtCy9on9TYqOZB2tvpcW5VCU7Y+cn8Ls7xtuYcA4ye
1FAWqCd71k15QTcGinCelTI/Oyy8jxpwJmAbrEU5xQfcpY8N2G1jdhZ4zA0vUrIa
ofCVQrk0DK1RxaijCrQeO+y+jhhsZkSX8SnzTJB/opdzIrZcFiXogMhVyQIDAQAB
AoGAWCUck86xGgvbnG0K3BVnWFT+4YlGe5E+2pMf4l1eqsQ+60wNnAGqzkFlNNP2
pf3emwzpIUnLXQeM+2QWB/tQ149oZg8ZeOU7024WWhwP0lEjmcP36KtnKa6z/Y6L
YkItQifsQ8mOD06yQea/IeuIlcrvvDjYGTYOWAfHoMekeYECQQDKxWy1/ML8CMrO
iRH6ijBEEhlSbbF22DuGOA52iccvrITwBwSjd2MXEKWxk9q0VMjPTmiyTasx9aZr
2UgjF3YZAkEArhDqRf4qYXpUy2zeMRlRCVQbtEk++KPs3tNyLWP6VtXl35cveF64
iG2R8lCgPF8Qq/DgHFUuiydIWgkF0dnzMQJAOajiPO3fVGP7p7d6kU/yYajz4mim
6jCa3JPcKQEMzxWzx713KDSuzMRDGbf9nQHvCGQ3iVxkrhQ4erqStMfbIQJBAJ7O
r+7LxL7KbTJrUQxanKR2KBCEAv+2DxX8s97VqEAxRliIBrc7NADEdrMs/AQYd41n
ZhBzZtNuM4RxVu3uewECQQDEJoPoXFXGyEAySPY8NJYPUHrY4tmue2L3CB+sdcgI
NPQCy08ABN5ro6GjeZimdvtHnXeiLYVKGtKsmTq4iTQG
-----END RSA PRIVATE KEY-----`
func decodePem(certInput string) (*tls.Certificate, error) {
var cert tls.Certificate
certPEMBlock := []byte(certInput)
var certDERBlock *pem.Block
for {
certDERBlock, certPEMBlock = pem.Decode(certPEMBlock)
if certDERBlock == nil {
break
}
if certDERBlock.Type == "CERTIFICATE" {
cert.Certificate = append(cert.Certificate, certDERBlock.Bytes)
}
}
var keyDERBlock *pem.Block
keyPEMBlock := []byte(privateKey)
keyDERBlock, _ = pem.Decode(keyPEMBlock)
privateKey, err := x509.ParsePKCS1PrivateKey(keyDERBlock.Bytes)
if err != nil {
return nil, err
}
cert.PrivateKey = privateKey
return &cert, nil
}
func TestEncodeX509KeyPairString(t *testing.T) {
certChain, err := decodePem(chain)
require.NoError(t, err)
cert, _ := EncodeX509KeyPairString(*certChain)
assert.Equal(t, strings.TrimSpace(chain), strings.TrimSpace(cert))
}
func TestGetTLSVersionByString(t *testing.T) {
t.Run("Valid versions", func(t *testing.T) {
for k, v := range tlsVersionByString {
r, err := getTLSVersionByString(k)
require.NoError(t, err)
assert.Equal(t, v, r)
}
})
t.Run("Invalid versions", func(t *testing.T) {
_, err := getTLSVersionByString("1.4")
require.Error(t, err)
})
t.Run("Empty versions", func(t *testing.T) {
r, err := getTLSVersionByString("")
require.NoError(t, err)
assert.Equal(t, uint16(0), r)
})
}
func TestGetTLSCipherSuitesByString(t *testing.T) {
suites := make([]string, 0)
for _, s := range tls.CipherSuites() {
t.Run("Test for valid suite "+s.Name, func(t *testing.T) {
ids, err := getTLSCipherSuitesByString(s.Name)
require.NoError(t, err)
assert.Len(t, ids, 1)
assert.Equal(t, s.ID, ids[0])
suites = append(suites, s.Name)
})
}
t.Run("Test colon separated list", func(t *testing.T) {
ids, err := getTLSCipherSuitesByString(strings.Join(suites, ":"))
require.NoError(t, err)
assert.Len(t, ids, len(suites))
})
suites = append([]string{"invalid"}, suites...)
t.Run("Test invalid values", func(t *testing.T) {
_, err := getTLSCipherSuitesByString(strings.Join(suites, ":"))
require.Error(t, err)
})
}
func TestTLSVersionToString(t *testing.T) {
t.Run("Test known versions", func(t *testing.T) {
versions := make([]uint16, 0)
for _, v := range tlsVersionByString {
versions = append(versions, v)
}
s := tlsVersionsToStr(versions)
assert.Len(t, s, len(versions))
})
t.Run("Test unknown version", func(t *testing.T) {
s := tlsVersionsToStr([]uint16{999})
assert.Len(t, s, 1)
assert.Equal(t, "unknown", s[0])
})
}
func TestGenerate(t *testing.T) {
t.Run("Invalid: No hosts specified", func(t *testing.T) {
opts := CertOptions{Hosts: []string{}, Organization: "Acme", ValidFrom: time.Now(), ValidFor: 10 * time.Hour}
_, _, err := generate(opts)
assert.ErrorContains(t, err, "hosts not supplied")
})
t.Run("Invalid: No organization specified", func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "", ValidFrom: time.Now(), ValidFor: 10 * time.Hour}
_, _, err := generate(opts)
assert.ErrorContains(t, err, "organization not supplied")
})
t.Run("Invalid: Unsupported curve specified", func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Acme", ECDSACurve: "Curve?", ValidFrom: time.Now(), ValidFor: 10 * time.Hour}
_, _, err := generate(opts)
assert.ErrorContains(t, err, "unrecognized elliptic curve")
})
for _, curve := range []string{"P224", "P256", "P384", "P521"} {
t.Run("Create certificate with curve "+curve, func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Acme", ECDSACurve: curve}
_, _, err := generate(opts)
require.NoError(t, err)
})
}
t.Run("Create certificate with default options", func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Acme"}
certBytes, privKey, err := generate(opts)
require.NoError(t, err)
assert.NotNil(t, privKey)
cert, err := x509.ParseCertificate(certBytes)
require.NoError(t, err)
assert.NotNil(t, cert)
assert.Len(t, cert.DNSNames, 1)
assert.Equal(t, "localhost", cert.DNSNames[0])
assert.Empty(t, cert.IPAddresses)
assert.LessOrEqual(t, int64(time.Since(cert.NotBefore)), int64(10*time.Second))
})
t.Run("Create certificate with IP ", func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost", "127.0.0.1"}, Organization: "Acme"}
certBytes, privKey, err := generate(opts)
require.NoError(t, err)
assert.NotNil(t, privKey)
cert, err := x509.ParseCertificate(certBytes)
require.NoError(t, err)
assert.NotNil(t, cert)
assert.Len(t, cert.DNSNames, 1)
assert.Equal(t, "localhost", cert.DNSNames[0])
assert.Equal(t, "Acme", cert.Subject.Organization[0])
assert.Len(t, cert.IPAddresses, 1)
assert.Equal(t, "127.0.0.1", cert.IPAddresses[0].String())
})
t.Run("Create certificate with specific validity timeframe", func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Acme", ValidFrom: time.Now().Add(1 * time.Hour)}
certBytes, privKey, err := generate(opts)
require.NoError(t, err)
assert.NotNil(t, privKey)
cert, err := x509.ParseCertificate(certBytes)
require.NoError(t, err)
assert.NotNil(t, cert)
assert.GreaterOrEqual(t, (time.Now().Unix())+int64(1*time.Hour), cert.NotBefore.Unix())
})
for _, year := range []int{1, 2, 3, 10} {
t.Run(fmt.Sprintf("Create certificate with specified ValidFor %d year", year), func(t *testing.T) {
validFrom, validFor := time.Now(), 365*24*time.Hour*time.Duration(year)
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Acme", ValidFrom: validFrom, ValidFor: validFor}
certBytes, privKey, err := generate(opts)
require.NoError(t, err)
assert.NotNil(t, privKey)
cert, err := x509.ParseCertificate(certBytes)
require.NoError(t, err)
assert.NotNil(t, cert)
t.Logf("certificate expiration time %s", cert.NotAfter)
assert.Equal(t, validFrom.Unix()+int64(validFor.Seconds()), cert.NotAfter.Unix())
})
}
}
func TestGeneratePEM(t *testing.T) {
t.Run("Invalid - PEM creation failure", func(t *testing.T) {
opts := CertOptions{Hosts: nil, Organization: "Acme"}
cert, key, err := generatePEM(opts)
require.Error(t, err)
assert.Nil(t, cert)
assert.Nil(t, key)
})
t.Run("Create PEM from certficate options", func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Acme"}
cert, key, err := generatePEM(opts)
require.NoError(t, err)
assert.NotNil(t, cert)
assert.NotNil(t, key)
})
t.Run("Create X509KeyPair", func(t *testing.T) {
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Acme"}
cert, err := GenerateX509KeyPair(opts)
require.NoError(t, err)
assert.NotNil(t, cert)
})
}
func TestGetTLSConfigCustomizer(t *testing.T) {
t.Run("Valid TLS customization", func(t *testing.T) {
cfunc, err := getTLSConfigCustomizer(DefaultTLSMinVersion, DefaultTLSMaxVersion, DefaultTLSCipherSuite)
require.NoError(t, err)
assert.NotNil(t, cfunc)
config := tls.Config{}
cfunc(&config)
assert.Equal(t, config.MinVersion, uint16(tls.VersionTLS12))
assert.Equal(t, config.MaxVersion, uint16(tls.VersionTLS13))
})
t.Run("Valid TLS customization - No cipher customization for TLSv1.3 only with default ciphers", func(t *testing.T) {
cfunc, err := getTLSConfigCustomizer("1.3", "1.3", DefaultTLSCipherSuite)
require.NoError(t, err)
assert.NotNil(t, cfunc)
config := tls.Config{}
cfunc(&config)
assert.Equal(t, config.MinVersion, uint16(tls.VersionTLS13))
assert.Equal(t, config.MaxVersion, uint16(tls.VersionTLS13))
assert.Empty(t, config.CipherSuites)
})
t.Run("Valid TLS customization - No cipher customization for TLSv1.3 only with custom ciphers", func(t *testing.T) {
cfunc, err := getTLSConfigCustomizer("1.3", "1.3", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256")
require.NoError(t, err)
assert.NotNil(t, cfunc)
config := tls.Config{}
cfunc(&config)
assert.Equal(t, config.MinVersion, uint16(tls.VersionTLS13))
assert.Equal(t, config.MaxVersion, uint16(tls.VersionTLS13))
assert.Empty(t, config.CipherSuites)
})
t.Run("Invalid TLS customization - Min version higher than max version", func(t *testing.T) {
cfunc, err := getTLSConfigCustomizer("1.3", "1.2", DefaultTLSCipherSuite)
require.Error(t, err)
assert.Nil(t, cfunc)
})
t.Run("Invalid TLS customization - Invalid min version given", func(t *testing.T) {
cfunc, err := getTLSConfigCustomizer("2.0", "1.2", DefaultTLSCipherSuite)
require.Error(t, err)
assert.Nil(t, cfunc)
})
t.Run("Invalid TLS customization - Invalid max version given", func(t *testing.T) {
cfunc, err := getTLSConfigCustomizer("1.2", "2.0", DefaultTLSCipherSuite)
require.Error(t, err)
assert.Nil(t, cfunc)
})
t.Run("Invalid TLS customization - Unknown cipher suite given", func(t *testing.T) {
cfunc, err := getTLSConfigCustomizer("1.3", "1.2", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:invalid")
require.Error(t, err)
assert.Nil(t, cfunc)
})
}
func TestBestEffortSystemCertPool(t *testing.T) {
pool := BestEffortSystemCertPool()
assert.NotNil(t, pool)
}
func TestCreateServerTLSConfig(t *testing.T) {
t.Run("Configuration from a valid key/cert pair", func(t *testing.T) {
tlsc, err := CreateServerTLSConfig("testdata/valid_tls.crt", "testdata/valid_tls.key", []string{"localhost", "argocd-repo-server"})
require.NoError(t, err)
assert.Len(t, tlsc.Certificates, 1)
c, err := x509.ParseCertificate(tlsc.Certificates[0].Certificate[0])
require.NoError(t, err)
assert.Equal(t, "SomeCN", c.Subject.CommonName)
})
t.Run("Self-signed creation due to non-existing cert", func(t *testing.T) {
tlsc, err := CreateServerTLSConfig("testdata/invvalid_tls.crt", "testdata/invalid_tls.key", []string{"localhost", "argocd-repo-server"})
require.NoError(t, err)
assert.Len(t, tlsc.Certificates, 1)
c, err := x509.ParseCertificate(tlsc.Certificates[0].Certificate[0])
require.NoError(t, err)
assert.Equal(t, []string{"Argo CD"}, c.Subject.Organization)
})
t.Run("Self-signed creation fails due to hosts being nil", func(t *testing.T) {
tlsc, err := CreateServerTLSConfig("testdata/invvalid_tls.crt", "testdata/invalid_tls.key", nil)
require.Error(t, err)
assert.Nil(t, tlsc)
})
t.Run("Self-signed creation fails due to invalid certificates", func(t *testing.T) {
tlsc, err := CreateServerTLSConfig("testdata/empty_tls.crt", "testdata/empty_tls.key", nil)
require.Error(t, err)
assert.Nil(t, tlsc)
})
}
// getCert does the same thing as tls.AppendCertsFromPEM, but throws an error if something goes wrong.
func getCert(pemCerts []byte) (*x509.Certificate, error) {
block, _ := pem.Decode(pemCerts)
if block == nil {
return nil, errors.New("failed to decode pem block")
}
if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
return nil, errors.New("encountered something other than a certificate")
}
certBytes := block.Bytes
cert, err := x509.ParseCertificate(certBytes)
if err != nil {
return nil, fmt.Errorf("error parsing certificate: %w", err)
}
return cert, nil
}
func getCertFromFile(path string) (*x509.Certificate, error) {
certBytes, err := os.ReadFile(path)
if err != nil {
return nil, fmt.Errorf("error reading file: %w", err)
}
return getCert(certBytes)
}
func TestLoadX509CertPool(t *testing.T) {
t.Run("Successfully load single cert", func(t *testing.T) {
p, err := LoadX509CertPool("testdata/valid_tls.crt")
require.NoError(t, err)
require.NotNil(t, p)
cert, err := getCertFromFile("testdata/valid_tls.crt")
require.NoError(t, err)
groundTruthPool := x509.NewCertPool()
groundTruthPool.AddCert(cert)
assert.True(t, groundTruthPool.Equal(p))
})
t.Run("Successfully load single existing cert from multiple list", func(t *testing.T) {
p, err := LoadX509CertPool("testdata/invalid_tls.crt", "testdata/valid_tls.crt")
require.NoError(t, err)
require.NotNil(t, p)
cert, err := getCertFromFile("testdata/valid_tls.crt")
require.NoError(t, err)
groundTruthPool := x509.NewCertPool()
groundTruthPool.AddCert(cert)
assert.True(t, groundTruthPool.Equal(p))
})
t.Run("Only non-existing certs in list", func(t *testing.T) {
p, err := LoadX509CertPool("testdata/invalid_tls.crt", "testdata/valid_tls2.crt")
require.NoError(t, err)
require.NotNil(t, p)
groundTruthPool := x509.NewCertPool()
assert.True(t, groundTruthPool.Equal(p))
})
t.Run("Invalid cert in requested cert list", func(t *testing.T) {
p, err := LoadX509CertPool("testdata/empty_tls.crt", "testdata/valid_tls2.crt")
require.Error(t, err)
require.Nil(t, p)
})
}
func TestEncodeX509KeyPair_InvalidRSAKey(t *testing.T) {
t.Run("Nil RSA private key", func(t *testing.T) {
cert := tls.Certificate{
Certificate: [][]byte{{0x30, 0x82}}, // minimal DER certificate bytes
PrivateKey: (*rsa.PrivateKey)(nil),
}
certPEM, keyPEM := EncodeX509KeyPair(cert)
assert.NotEmpty(t, certPEM)
assert.Empty(t, keyPEM)
})
t.Run("RSA private key that fails validation", func(t *testing.T) {
// Create an RSA key with invalid parameters that will fail Validate()
invalidKey := &rsa.PrivateKey{
PublicKey: rsa.PublicKey{
N: big.NewInt(1), // Too small modulus, will fail validation
E: 65537,
},
D: big.NewInt(1), // Invalid private exponent
}
cert := tls.Certificate{
Certificate: [][]byte{{0x30, 0x82}}, // minimal DER certificate bytes
PrivateKey: invalidKey,
}
certPEM, keyPEM := EncodeX509KeyPair(cert)
assert.NotEmpty(t, certPEM)
assert.Empty(t, keyPEM)
})
t.Run("RSA private key with inconsistent parameters", func(t *testing.T) {
invalidKey := &rsa.PrivateKey{
PublicKey: rsa.PublicKey{
N: big.NewInt(35),
E: 65537,
},
D: big.NewInt(99999),
}
cert := tls.Certificate{
Certificate: [][]byte{{0x30, 0x82}}, // minimal DER certificate bytes
PrivateKey: invalidKey,
}
certPEM, keyPEM := EncodeX509KeyPair(cert)
assert.NotEmpty(t, certPEM)
assert.Empty(t, keyPEM)
})
t.Run("Unsupported private key type", func(t *testing.T) {
// Use a type that's not *rsa.PrivateKey or *ecdsa.PrivateKey
cert := tls.Certificate{
Certificate: [][]byte{{0x30, 0x82}}, // minimal DER certificate bytes
PrivateKey: "not a private key", // Unsupported type
}
certPEM, keyPEM := EncodeX509KeyPair(cert)
assert.NotEmpty(t, certPEM)
assert.Empty(t, keyPEM)
})
t.Run("Valid RSA private key should work", func(t *testing.T) {
// Generate a valid RSA key for testing
opts := CertOptions{Hosts: []string{"localhost"}, Organization: "Test"}
validCert, err := GenerateX509KeyPair(opts)
require.NoError(t, err)
certPEM, keyPEM := EncodeX509KeyPair(*validCert)
assert.NotEmpty(t, certPEM)
assert.NotEmpty(t, keyPEM)
assert.Contains(t, string(keyPEM), "-----BEGIN RSA PRIVATE KEY-----")
assert.Contains(t, string(keyPEM), "-----END RSA PRIVATE KEY-----")
})
}