mirror of
https://github.com/tailscale/tailscale.git
synced 2025-04-03 06:45:49 +00:00
ipn/ipnlocal: allow cache hits for testing ACME certs (#15023)
PR #14771 added support for getting certs from alternate ACME servers, but the certStore caching mechanism breaks unless you install the CA in system roots, because we check the validity of the cert before allowing a cache hit, which includes checking for a valid chain back to a trusted CA. For ease of testing, allow cert cache hits when the chain is unknown to avoid re-issuing the cert on every TLS request served. We will still get a cache miss when the cert has expired, as enforced by a test, and this makes it much easier to test against non-prod ACME servers compared to having to manage the installation of non-prod CAs on clients. Updates #14771 Change-Id: I74fe6593fe399bd135cc822195155e99985ec08a Signed-off-by: Tom Proctor <tomhjp@users.noreply.github.com>
This commit is contained in:
parent
e38e5c38cc
commit
a6e19f2881
@ -471,6 +471,10 @@ func (b *LocalBackend) getCertPEM(ctx context.Context, cs certStore, logf logger
|
||||
return nil, err
|
||||
}
|
||||
|
||||
if !isDefaultDirectoryURL(ac.DirectoryURL) {
|
||||
logf("acme: using Directory URL %q", ac.DirectoryURL)
|
||||
}
|
||||
|
||||
a, err := ac.GetReg(ctx, "" /* pre-RFC param */)
|
||||
switch {
|
||||
case err == nil:
|
||||
@ -737,7 +741,28 @@ func validateLeaf(leaf *x509.Certificate, intermediates *x509.CertPool, domain s
|
||||
// binary's baked-in roots (LetsEncrypt). See tailscale/tailscale#14690.
|
||||
return validateLeaf(leaf, intermediates, domain, now, bakedroots.Get())
|
||||
}
|
||||
return err == nil
|
||||
|
||||
if err == nil {
|
||||
return true
|
||||
}
|
||||
|
||||
// When pointed at a non-prod ACME server, we don't expect to have the CA
|
||||
// in our system or baked-in roots. Verify only throws UnknownAuthorityError
|
||||
// after first checking the leaf cert's expiry, hostnames etc, so we know
|
||||
// that the only reason for an error is to do with constructing a full chain.
|
||||
// Allow this error so that cert caching still works in testing environments.
|
||||
if errors.As(err, &x509.UnknownAuthorityError{}) {
|
||||
acmeURL := envknob.String("TS_DEBUG_ACME_DIRECTORY_URL")
|
||||
if !isDefaultDirectoryURL(acmeURL) {
|
||||
return true
|
||||
}
|
||||
}
|
||||
|
||||
return false
|
||||
}
|
||||
|
||||
func isDefaultDirectoryURL(u string) bool {
|
||||
return u == "" || u == acme.LetsEncryptURL
|
||||
}
|
||||
|
||||
// validLookingCertDomain reports whether name looks like a valid domain name that
|
||||
|
@ -47,10 +47,10 @@ var certTestFS embed.FS
|
||||
func TestCertStoreRoundTrip(t *testing.T) {
|
||||
const testDomain = "example.com"
|
||||
|
||||
// Use a fixed verification timestamp so validity doesn't fall off when the
|
||||
// cert expires. If you update the test data below, this may also need to be
|
||||
// updated.
|
||||
// Use fixed verification timestamps so validity doesn't change over time.
|
||||
// If you update the test data below, these may also need to be updated.
|
||||
testNow := time.Date(2023, time.February, 10, 0, 0, 0, 0, time.UTC)
|
||||
testExpired := time.Date(2026, time.February, 10, 0, 0, 0, 0, time.UTC)
|
||||
|
||||
// To re-generate a root certificate and domain certificate for testing,
|
||||
// use:
|
||||
@ -78,14 +78,20 @@ func TestCertStoreRoundTrip(t *testing.T) {
|
||||
}
|
||||
|
||||
tests := []struct {
|
||||
name string
|
||||
store certStore
|
||||
name string
|
||||
store certStore
|
||||
debugACMEURL bool
|
||||
}{
|
||||
{"FileStore", certFileStore{dir: t.TempDir(), testRoots: roots}},
|
||||
{"StateStore", certStateStore{StateStore: new(mem.Store), testRoots: roots}},
|
||||
{"FileStore", certFileStore{dir: t.TempDir(), testRoots: roots}, false},
|
||||
{"FileStore_UnknownCA", certFileStore{dir: t.TempDir()}, true},
|
||||
{"StateStore", certStateStore{StateStore: new(mem.Store), testRoots: roots}, false},
|
||||
{"StateStore_UnknownCA", certStateStore{StateStore: new(mem.Store)}, true},
|
||||
}
|
||||
for _, test := range tests {
|
||||
t.Run(test.name, func(t *testing.T) {
|
||||
if test.debugACMEURL {
|
||||
t.Setenv("TS_DEBUG_ACME_DIRECTORY_URL", "https://acme-staging-v02.api.letsencrypt.org/directory")
|
||||
}
|
||||
if err := test.store.WriteTLSCertAndKey(testDomain, testCert, testKey); err != nil {
|
||||
t.Fatalf("WriteTLSCertAndKey: unexpected error: %v", err)
|
||||
}
|
||||
@ -99,6 +105,10 @@ func TestCertStoreRoundTrip(t *testing.T) {
|
||||
if diff := cmp.Diff(kp.KeyPEM, testKey); diff != "" {
|
||||
t.Errorf("Key (-got, +want):\n%s", diff)
|
||||
}
|
||||
unexpected, err := test.store.Read(testDomain, testExpired)
|
||||
if err != errCertExpired {
|
||||
t.Fatalf("Read: expected expiry error: %v", string(unexpected.CertPEM))
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user