Hide keyboard shortcuts

Hot-keys on this page

r m x p   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

"""Tests for certbot.plugins.webroot.""" 

 

from __future__ import print_function 

 

import argparse 

import errno 

import json 

import os 

import shutil 

import tempfile 

import unittest 

 

import josepy as jose 

import mock 

import six 

 

from acme import challenges 

 

from certbot import achallenges 

from certbot import compat 

from certbot import errors 

from certbot.display import util as display_util 

 

from certbot.tests import acme_util 

from certbot.tests import util as test_util 

 

 

KEY = jose.JWKRSA.load(test_util.load_vector("rsa512_key.pem")) 

 

 

class AuthenticatorTest(unittest.TestCase): 

"""Tests for certbot.plugins.webroot.Authenticator.""" 

 

achall = achallenges.KeyAuthorizationAnnotatedChallenge( 

challb=acme_util.HTTP01_P, domain="thing.com", account_key=KEY) 

 

def setUp(self): 

from certbot.plugins.webroot import Authenticator 

self.path = tempfile.mkdtemp() 

self.partial_root_challenge_path = os.path.join( 

self.path, ".well-known") 

self.root_challenge_path = os.path.join( 

self.path, ".well-known", "acme-challenge") 

self.validation_path = os.path.join( 

self.root_challenge_path, 

"ZXZhR3hmQURzNnBTUmIyTEF2OUlaZjE3RHQzanV4R0orUEN0OTJ3citvQQ") 

self.config = mock.MagicMock(webroot_path=self.path, 

webroot_map={"thing.com": self.path}) 

self.auth = Authenticator(self.config, "webroot") 

 

def tearDown(self): 

shutil.rmtree(self.path) 

 

def test_more_info(self): 

more_info = self.auth.more_info() 

self.assertTrue(isinstance(more_info, six.string_types)) 

self.assertTrue(self.path in more_info) 

 

def test_add_parser_arguments(self): 

add = mock.MagicMock() 

self.auth.add_parser_arguments(add) 

self.assertEqual(2, add.call_count) 

 

def test_prepare(self): 

self.auth.prepare() # shouldn't raise any exceptions 

 

@test_util.patch_get_utility() 

def test_webroot_from_list(self, mock_get_utility): 

self.config.webroot_path = [] 

self.config.webroot_map = {"otherthing.com": self.path} 

mock_display = mock_get_utility() 

mock_display.menu.return_value = (display_util.OK, 1,) 

 

self.auth.perform([self.achall]) 

self.assertTrue(mock_display.menu.called) 

for call in mock_display.menu.call_args_list: 

self.assertTrue(self.achall.domain in call[0][0]) 

self.assertTrue(all( 

webroot in call[0][1] 

for webroot in six.itervalues(self.config.webroot_map))) 

self.assertEqual(self.config.webroot_map[self.achall.domain], 

self.path) 

 

@test_util.patch_get_utility() 

def test_webroot_from_list_help_and_cancel(self, mock_get_utility): 

self.config.webroot_path = [] 

self.config.webroot_map = {"otherthing.com": self.path} 

 

mock_display = mock_get_utility() 

mock_display.menu.side_effect = ((display_util.CANCEL, -1),) 

self.assertRaises(errors.PluginError, self.auth.perform, [self.achall]) 

self.assertTrue(mock_display.menu.called) 

for call in mock_display.menu.call_args_list: 

self.assertTrue(self.achall.domain in call[0][0]) 

self.assertTrue(all( 

webroot in call[0][1] 

for webroot in six.itervalues(self.config.webroot_map))) 

 

@test_util.patch_get_utility() 

def test_new_webroot(self, mock_get_utility): 

self.config.webroot_path = [] 

self.config.webroot_map = {"something.com": self.path} 

 

mock_display = mock_get_utility() 

mock_display.menu.return_value = (display_util.OK, 0,) 

with mock.patch('certbot.display.ops.validated_directory') as m: 

m.side_effect = ((display_util.CANCEL, -1), 

(display_util.OK, self.path,)) 

 

self.auth.perform([self.achall]) 

 

self.assertEqual(self.config.webroot_map[self.achall.domain], self.path) 

 

@test_util.patch_get_utility() 

def test_new_webroot_empty_map_cancel(self, mock_get_utility): 

self.config.webroot_path = [] 

self.config.webroot_map = {} 

 

mock_display = mock_get_utility() 

mock_display.menu.return_value = (display_util.OK, 0,) 

with mock.patch('certbot.display.ops.validated_directory') as m: 

m.return_value = (display_util.CANCEL, -1) 

self.assertRaises(errors.PluginError, 

self.auth.perform, 

[self.achall]) 

 

def test_perform_missing_root(self): 

self.config.webroot_path = None 

self.config.webroot_map = {} 

self.assertRaises(errors.PluginError, self.auth.perform, []) 

 

def test_perform_reraises_other_errors(self): 

self.auth.full_path = os.path.join(self.path, "null") 

permission_canary = os.path.join(self.path, "rnd") 

with open(permission_canary, "w") as f: 

f.write("thingimy") 

os.chmod(self.path, 0o000) 

try: 

open(permission_canary, "r") 

print("Warning, running tests as root skips permissions tests...") 

except IOError: 

# ok, permissions work, test away... 

self.assertRaises(errors.PluginError, self.auth.perform, []) 

os.chmod(self.path, 0o700) 

 

@test_util.skip_on_windows('On Windows, there is no chown.') 

@mock.patch("certbot.plugins.webroot.os.chown") 

def test_failed_chown(self, mock_chown): 

mock_chown.side_effect = OSError(errno.EACCES, "msg") 

self.auth.perform([self.achall]) # exception caught and logged 

 

 

@test_util.patch_get_utility() 

def test_perform_new_webroot_not_in_map(self, mock_get_utility): 

new_webroot = tempfile.mkdtemp() 

self.config.webroot_path = [] 

self.config.webroot_map = {"whatever.com": self.path} 

mock_display = mock_get_utility() 

mock_display.menu.side_effect = ((display_util.OK, 0), 

(display_util.OK, new_webroot)) 

achall = achallenges.KeyAuthorizationAnnotatedChallenge( 

challb=acme_util.HTTP01_P, domain="something.com", account_key=KEY) 

with mock.patch('certbot.display.ops.validated_directory') as m: 

m.return_value = (display_util.OK, new_webroot,) 

self.auth.perform([achall]) 

self.assertEqual(self.config.webroot_map[achall.domain], new_webroot) 

 

def test_perform_permissions(self): 

self.auth.prepare() 

 

# Remove exec bit from permission check, so that it 

# matches the file 

self.auth.perform([self.achall]) 

self.assertTrue(compat.compare_file_modes(os.stat(self.validation_path).st_mode, 0o644)) 

 

# Check permissions of the directories 

 

for dirpath, dirnames, _ in os.walk(self.path): 

for directory in dirnames: 

full_path = os.path.join(dirpath, directory) 

self.assertTrue(compat.compare_file_modes(os.stat(full_path).st_mode, 0o755)) 

 

parent_gid = os.stat(self.path).st_gid 

parent_uid = os.stat(self.path).st_uid 

 

self.assertEqual(os.stat(self.validation_path).st_gid, parent_gid) 

self.assertEqual(os.stat(self.validation_path).st_uid, parent_uid) 

 

def test_perform_cleanup(self): 

self.auth.prepare() 

responses = self.auth.perform([self.achall]) 

self.assertEqual(1, len(responses)) 

self.assertTrue(os.path.exists(self.validation_path)) 

with open(self.validation_path) as validation_f: 

validation = validation_f.read() 

self.assertTrue( 

challenges.KeyAuthorizationChallengeResponse( 

key_authorization=validation).verify( 

self.achall.chall, KEY.public_key())) 

 

self.auth.cleanup([self.achall]) 

self.assertFalse(os.path.exists(self.validation_path)) 

self.assertFalse(os.path.exists(self.root_challenge_path)) 

self.assertFalse(os.path.exists(self.partial_root_challenge_path)) 

 

def test_perform_cleanup_existing_dirs(self): 

os.mkdir(self.partial_root_challenge_path) 

self.auth.prepare() 

self.auth.perform([self.achall]) 

self.auth.cleanup([self.achall]) 

 

# Ensure we don't "clean up" directories that previously existed 

self.assertFalse(os.path.exists(self.validation_path)) 

self.assertFalse(os.path.exists(self.root_challenge_path)) 

 

def test_perform_cleanup_multiple_challenges(self): 

bingo_achall = achallenges.KeyAuthorizationAnnotatedChallenge( 

challb=acme_util.chall_to_challb( 

challenges.HTTP01(token=b"bingo"), "pending"), 

domain="thing.com", account_key=KEY) 

 

bingo_validation_path = "YmluZ28" 

os.mkdir(self.partial_root_challenge_path) 

self.auth.prepare() 

self.auth.perform([bingo_achall, self.achall]) 

 

self.auth.cleanup([self.achall]) 

self.assertFalse(os.path.exists(bingo_validation_path)) 

self.assertTrue(os.path.exists(self.root_challenge_path)) 

self.auth.cleanup([bingo_achall]) 

self.assertFalse(os.path.exists(self.validation_path)) 

self.assertFalse(os.path.exists(self.root_challenge_path)) 

 

def test_cleanup_leftovers(self): 

self.auth.prepare() 

self.auth.perform([self.achall]) 

 

leftover_path = os.path.join(self.root_challenge_path, 'leftover') 

os.mkdir(leftover_path) 

 

self.auth.cleanup([self.achall]) 

self.assertFalse(os.path.exists(self.validation_path)) 

self.assertTrue(os.path.exists(self.root_challenge_path)) 

 

os.rmdir(leftover_path) 

 

@mock.patch('os.rmdir') 

def test_cleanup_failure(self, mock_rmdir): 

self.auth.prepare() 

self.auth.perform([self.achall]) 

 

os_error = OSError() 

os_error.errno = errno.EACCES 

mock_rmdir.side_effect = os_error 

 

self.auth.cleanup([self.achall]) 

self.assertFalse(os.path.exists(self.validation_path)) 

self.assertTrue(os.path.exists(self.root_challenge_path)) 

 

 

class WebrootActionTest(unittest.TestCase): 

"""Tests for webroot argparse actions.""" 

 

achall = achallenges.KeyAuthorizationAnnotatedChallenge( 

challb=acme_util.HTTP01_P, domain="thing.com", account_key=KEY) 

 

def setUp(self): 

from certbot.plugins.webroot import Authenticator 

self.path = tempfile.mkdtemp() 

self.parser = argparse.ArgumentParser() 

self.parser.add_argument("-d", "--domains", 

action="append", default=[]) 

Authenticator.inject_parser_options(self.parser, "webroot") 

 

def test_webroot_map_action(self): 

args = self.parser.parse_args( 

["--webroot-map", json.dumps({'thing.com': self.path})]) 

self.assertEqual(args.webroot_map["thing.com"], self.path) 

 

def test_domain_before_webroot(self): 

args = self.parser.parse_args( 

"-d {0} -w {1}".format(self.achall.domain, self.path).split()) 

config = self._get_config_after_perform(args) 

self.assertEqual(config.webroot_map[self.achall.domain], self.path) 

 

def test_domain_before_webroot_error(self): 

self.assertRaises(errors.PluginError, self.parser.parse_args, 

"-d foo -w bar -w baz".split()) 

self.assertRaises(errors.PluginError, self.parser.parse_args, 

"-d foo -w bar -d baz -w qux".split()) 

 

def test_multiwebroot(self): 

args = self.parser.parse_args("-w {0} -d {1} -w {2} -d bar".format( 

self.path, self.achall.domain, tempfile.mkdtemp()).split()) 

self.assertEqual(args.webroot_map[self.achall.domain], self.path) 

config = self._get_config_after_perform(args) 

self.assertEqual( 

config.webroot_map[self.achall.domain], self.path) 

 

def _get_config_after_perform(self, config): 

from certbot.plugins.webroot import Authenticator 

auth = Authenticator(config, "webroot") 

auth.perform([self.achall]) 

return auth.config 

 

 

if __name__ == "__main__": 

unittest.main() # pragma: no cover