ca: remove one call to provider.ActiveRoot
ActiveRoot should not be called from the secondary DC, because there should not be a requirement to run the same Vault instance in a secondary DC. SignIntermediate is called in a secondary DC, so it should not call ActiveRoot We would also like to change the interface of ActiveRoot so that we can support using an intermediate cert as the primary CA in Consul. In preparation for making that change I am reducing the number of calls to ActiveRoot, so that there are fewer code paths to modify when the interface changes. This change required a change to the mockCAServerDelegate we use in tests. It was returning the RootCert for SignIntermediate, but that is not an accurate fake of production. In production this would also be a separate cert.
This commit is contained in:
parent
1f66120c20
commit
1f670c22f5
|
@ -1463,28 +1463,22 @@ func (c *CAManager) SignCertificate(csr *x509.CertificateRequest, spiffeID conne
|
||||||
|
|
||||||
connect.HackSANExtensionForCSR(csr)
|
connect.HackSANExtensionForCSR(csr)
|
||||||
|
|
||||||
root, err := provider.ActiveRoot()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
// Check if the root expired before using it to sign.
|
// Check if the root expired before using it to sign.
|
||||||
err = c.checkExpired(root)
|
// TODO: we store NotBefore and NotAfter on this struct, so we could avoid
|
||||||
|
// parsing the cert here.
|
||||||
|
err = c.checkExpired(caRoot.RootCert)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("root expired: %w", err)
|
return nil, fmt.Errorf("root expired: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
inter, err := provider.ActiveIntermediate()
|
if c.isIntermediateUsedToSignLeaf() && len(caRoot.IntermediateCerts) > 0 {
|
||||||
if err != nil {
|
inter := caRoot.IntermediateCerts[len(caRoot.IntermediateCerts)-1]
|
||||||
return nil, err
|
if err := c.checkExpired(inter); err != nil {
|
||||||
}
|
return nil, fmt.Errorf("intermediate expired: %w", err)
|
||||||
// Check if the intermediate expired before using it to sign.
|
}
|
||||||
err = c.checkExpired(inter)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("intermediate expired: %w", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// All seems to be in order, actually sign it.
|
// All seems to be in order, actually sign it.
|
||||||
|
|
||||||
pem, err := provider.Sign(csr)
|
pem, err := provider.Sign(csr)
|
||||||
if err == ca.ErrRateLimited {
|
if err == ca.ErrRateLimited {
|
||||||
return nil, ErrRateLimited
|
return nil, ErrRateLimited
|
||||||
|
|
|
@ -12,6 +12,7 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"math/big"
|
"math/big"
|
||||||
"net/rpc"
|
"net/rpc"
|
||||||
|
"net/url"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -131,11 +132,12 @@ func verifyLeafCert(t *testing.T, root *structs.CARoot, leafCertPEM string) {
|
||||||
}
|
}
|
||||||
|
|
||||||
type mockCAServerDelegate struct {
|
type mockCAServerDelegate struct {
|
||||||
t *testing.T
|
t *testing.T
|
||||||
config *Config
|
config *Config
|
||||||
store *state.Store
|
store *state.Store
|
||||||
primaryRoot *structs.CARoot
|
primaryRoot *structs.CARoot
|
||||||
callbackCh chan string
|
secondaryIntermediate string
|
||||||
|
callbackCh chan string
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewMockCAServerDelegate(t *testing.T, config *Config) *mockCAServerDelegate {
|
func NewMockCAServerDelegate(t *testing.T, config *Config) *mockCAServerDelegate {
|
||||||
|
@ -198,7 +200,7 @@ func (m *mockCAServerDelegate) forwardDC(method, dc string, args interface{}, re
|
||||||
roots.ActiveRootID = m.primaryRoot.ID
|
roots.ActiveRootID = m.primaryRoot.ID
|
||||||
case "ConnectCA.SignIntermediate":
|
case "ConnectCA.SignIntermediate":
|
||||||
r := reply.(*string)
|
r := reply.(*string)
|
||||||
*r = m.primaryRoot.RootCert
|
*r = m.secondaryIntermediate
|
||||||
default:
|
default:
|
||||||
return fmt.Errorf("received call to unsupported method %q", method)
|
return fmt.Errorf("received call to unsupported method %q", method)
|
||||||
}
|
}
|
||||||
|
@ -305,13 +307,14 @@ func initTestManager(t *testing.T, manager *CAManager, delegate *mockCAServerDel
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestCAManager_Initialize(t *testing.T) {
|
func TestCAManager_Initialize(t *testing.T) {
|
||||||
|
|
||||||
conf := DefaultConfig()
|
conf := DefaultConfig()
|
||||||
conf.ConnectEnabled = true
|
conf.ConnectEnabled = true
|
||||||
conf.PrimaryDatacenter = "dc1"
|
conf.PrimaryDatacenter = "dc1"
|
||||||
conf.Datacenter = "dc2"
|
conf.Datacenter = "dc2"
|
||||||
delegate := NewMockCAServerDelegate(t, conf)
|
delegate := NewMockCAServerDelegate(t, conf)
|
||||||
|
delegate.secondaryIntermediate = delegate.primaryRoot.RootCert
|
||||||
manager := NewCAManager(delegate, nil, testutil.Logger(t), conf)
|
manager := NewCAManager(delegate, nil, testutil.Logger(t), conf)
|
||||||
|
|
||||||
manager.providerShim = &mockCAProvider{
|
manager.providerShim = &mockCAProvider{
|
||||||
callbackCh: delegate.callbackCh,
|
callbackCh: delegate.callbackCh,
|
||||||
rootPEM: delegate.primaryRoot.RootCert,
|
rootPEM: delegate.primaryRoot.RootCert,
|
||||||
|
@ -356,6 +359,7 @@ func TestCAManager_UpdateConfigWhileRenewIntermediate(t *testing.T) {
|
||||||
conf.PrimaryDatacenter = "dc1"
|
conf.PrimaryDatacenter = "dc1"
|
||||||
conf.Datacenter = "dc2"
|
conf.Datacenter = "dc2"
|
||||||
delegate := NewMockCAServerDelegate(t, conf)
|
delegate := NewMockCAServerDelegate(t, conf)
|
||||||
|
delegate.secondaryIntermediate = delegate.primaryRoot.RootCert
|
||||||
manager := NewCAManager(delegate, nil, testutil.Logger(t), conf)
|
manager := NewCAManager(delegate, nil, testutil.Logger(t), conf)
|
||||||
manager.providerShim = &mockCAProvider{
|
manager.providerShim = &mockCAProvider{
|
||||||
callbackCh: delegate.callbackCh,
|
callbackCh: delegate.callbackCh,
|
||||||
|
@ -447,6 +451,8 @@ func TestCAManager_SignCertificate_WithExpiredCert(t *testing.T) {
|
||||||
intermediatePEM := generateCertPEM(t, caPrivKey, arg.notBeforeIntermediate, arg.notAfterIntermediate)
|
intermediatePEM := generateCertPEM(t, caPrivKey, arg.notBeforeIntermediate, arg.notAfterIntermediate)
|
||||||
|
|
||||||
delegate := NewMockCAServerDelegate(t, conf)
|
delegate := NewMockCAServerDelegate(t, conf)
|
||||||
|
delegate.primaryRoot.RootCert = rootPEM
|
||||||
|
delegate.secondaryIntermediate = intermediatePEM
|
||||||
manager := NewCAManager(delegate, nil, testutil.Logger(t), conf)
|
manager := NewCAManager(delegate, nil, testutil.Logger(t), conf)
|
||||||
|
|
||||||
manager.providerShim = &mockCAProvider{
|
manager.providerShim = &mockCAProvider{
|
||||||
|
@ -458,14 +464,13 @@ func TestCAManager_SignCertificate_WithExpiredCert(t *testing.T) {
|
||||||
|
|
||||||
// Simulate Wait half the TTL for the cert to need renewing.
|
// Simulate Wait half the TTL for the cert to need renewing.
|
||||||
manager.timeNow = func() time.Time {
|
manager.timeNow = func() time.Time {
|
||||||
return time.Now().Add(500 * time.Millisecond)
|
return time.Now().UTC().Add(500 * time.Millisecond)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Call RenewIntermediate and then confirm the RPCs and provider calls
|
// Call RenewIntermediate and then confirm the RPCs and provider calls
|
||||||
// happen in the expected order.
|
// happen in the expected order.
|
||||||
|
|
||||||
_, err := manager.SignCertificate(&x509.CertificateRequest{}, &connect.SpiffeIDAgent{})
|
_, err := manager.SignCertificate(&x509.CertificateRequest{}, &connect.SpiffeIDAgent{})
|
||||||
|
|
||||||
if arg.isError {
|
if arg.isError {
|
||||||
require.Error(t, err)
|
require.Error(t, err)
|
||||||
require.Contains(t, err.Error(), arg.errorMsg)
|
require.Contains(t, err.Error(), arg.errorMsg)
|
||||||
|
@ -494,6 +499,7 @@ func generateCertPEM(t *testing.T, caPrivKey *rsa.PrivateKey, notBefore time.Tim
|
||||||
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
|
||||||
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
|
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
|
||||||
BasicConstraintsValid: true,
|
BasicConstraintsValid: true,
|
||||||
|
URIs: []*url.URL{connect.SpiffeIDAgent{Host: "foo"}.URI()},
|
||||||
}
|
}
|
||||||
|
|
||||||
caBytes, err := x509.CreateCertificate(rand.Reader, ca, ca, &caPrivKey.PublicKey, caPrivKey)
|
caBytes, err := x509.CreateCertificate(rand.Reader, ca, ca, &caPrivKey.PublicKey, caPrivKey)
|
||||||
|
|
Loading…
Reference in a new issue