func TestAddAuthorization(t *testing.T) { sa, _, cleanUp := initSA(t) defer cleanUp() reg := satest.CreateWorkingRegistration(t, sa) PA := core.Authorization{RegistrationID: reg.ID} PA, err := sa.NewPendingAuthorization(PA) test.AssertNotError(t, err, "Couldn't create new pending authorization") test.Assert(t, PA.ID != "", "ID shouldn't be blank") dbPa, err := sa.GetAuthorization(PA.ID) test.AssertNotError(t, err, "Couldn't get pending authorization with ID "+PA.ID) test.AssertMarshaledEquals(t, PA, dbPa) expectedPa := core.Authorization{ID: PA.ID} test.AssertMarshaledEquals(t, dbPa.ID, expectedPa.ID) combos := make([][]int, 1) combos[0] = []int{0, 1} exp := time.Now().AddDate(0, 0, 1) identifier := core.AcmeIdentifier{Type: core.IdentifierDNS, Value: "wut.com"} newPa := core.Authorization{ID: PA.ID, Identifier: identifier, RegistrationID: reg.ID, Status: core.StatusPending, Expires: &exp, Combinations: combos} err = sa.UpdatePendingAuthorization(newPa) test.AssertNotError(t, err, "Couldn't update pending authorization with ID "+PA.ID) newPa.Status = core.StatusValid err = sa.FinalizeAuthorization(newPa) test.AssertNotError(t, err, "Couldn't finalize pending authorization with ID "+PA.ID) dbPa, err = sa.GetAuthorization(PA.ID) test.AssertNotError(t, err, "Couldn't get authorization with ID "+PA.ID) }
func TestAddAuthorization(t *testing.T) { sa := initSA(t) PA := core.Authorization{} PA, err := sa.NewPendingAuthorization(PA) test.AssertNotError(t, err, "Couldn't create new pending authorization") test.Assert(t, PA.ID != "", "ID shouldn't be blank") dbPa, err := sa.GetAuthorization(PA.ID) test.AssertNotError(t, err, "Couldn't get pending authorization with ID "+PA.ID) test.AssertMarshaledEquals(t, PA, dbPa) expectedPa := core.Authorization{ID: PA.ID} test.AssertMarshaledEquals(t, dbPa.ID, expectedPa.ID) var jwk jose.JsonWebKey err = json.Unmarshal([]byte(theKey), &jwk) if err != nil { t.Errorf("JSON unmarshal error: %+v", err) return } uu, err := url.Parse("test.com") u := core.AcmeURL(*uu) chall := core.Challenge{Type: "simpleHttp", Status: core.StatusPending, URI: u, Token: "THISWOULDNTBEAGOODTOKEN", Path: "test-me"} combos := make([][]int, 1) combos[0] = []int{0, 1} exp := time.Now().AddDate(0, 0, 1) newPa := core.Authorization{ID: PA.ID, Identifier: core.AcmeIdentifier{Type: core.IdentifierDNS, Value: "wut.com"}, RegistrationID: 0, Status: core.StatusPending, Expires: &exp, Challenges: []core.Challenge{chall}, Combinations: combos} err = sa.UpdatePendingAuthorization(newPa) test.AssertNotError(t, err, "Couldn't update pending authorization with ID "+PA.ID) newPa.Status = core.StatusValid err = sa.FinalizeAuthorization(newPa) test.AssertNotError(t, err, "Couldn't finalize pending authorization with ID "+PA.ID) dbPa, err = sa.GetAuthorization(PA.ID) test.AssertNotError(t, err, "Couldn't get authorization with ID "+PA.ID) }
func TestAddAuthorization(t *testing.T) { sa, cleanUp := initSA(t) defer cleanUp() PA := core.Authorization{} PA, err := sa.NewPendingAuthorization(PA) test.AssertNotError(t, err, "Couldn't create new pending authorization") test.Assert(t, PA.ID != "", "ID shouldn't be blank") dbPa, err := sa.GetAuthorization(PA.ID) test.AssertNotError(t, err, "Couldn't get pending authorization with ID "+PA.ID) test.AssertMarshaledEquals(t, PA, dbPa) expectedPa := core.Authorization{ID: PA.ID} test.AssertMarshaledEquals(t, dbPa.ID, expectedPa.ID) var jwk jose.JsonWebKey err = json.Unmarshal([]byte(theKey), &jwk) if err != nil { t.Errorf("JSON unmarshal error: %+v", err) return } combos := make([][]int, 1) combos[0] = []int{0, 1} exp := time.Now().AddDate(0, 0, 1) identifier := core.AcmeIdentifier{Type: core.IdentifierDNS, Value: "wut.com"} newPa := core.Authorization{ID: PA.ID, Identifier: identifier, RegistrationID: 0, Status: core.StatusPending, Expires: &exp, Combinations: combos} err = sa.UpdatePendingAuthorization(newPa) test.AssertNotError(t, err, "Couldn't update pending authorization with ID "+PA.ID) newPa.Status = core.StatusValid err = sa.FinalizeAuthorization(newPa) test.AssertNotError(t, err, "Couldn't finalize pending authorization with ID "+PA.ID) dbPa, err = sa.GetAuthorization(PA.ID) test.AssertNotError(t, err, "Couldn't get authorization with ID "+PA.ID) }
func TestAcmeURLSlice(t *testing.T) { tc := BoulderTypeConverter{} var au, out []*core.AcmeURL marshaledI, err := tc.ToDb(au) test.AssertNotError(t, err, "Could not ToDb") scanner, ok := tc.FromDb(&out) test.Assert(t, ok, "FromDb failed") if !ok { t.FailNow() return } marshaled := marshaledI.(string) err = scanner.Binder(&marshaled, &out) test.AssertMarshaledEquals(t, au, out) }
func TestOCSPStatus(t *testing.T) { tc := BoulderTypeConverter{} var os, out core.OCSPStatus os = "core.OCSPStatus" marshaledI, err := tc.ToDb(os) test.AssertNotError(t, err, "Could not ToDb") scanner, ok := tc.FromDb(&out) test.Assert(t, ok, "FromDb failed") if !ok { t.FailNow() return } marshaled := marshaledI.(string) err = scanner.Binder(&marshaled, &out) test.AssertMarshaledEquals(t, os, out) }
func TestAcmeIdentifier(t *testing.T) { tc := BoulderTypeConverter{} ai := core.AcmeIdentifier{Type: "data1", Value: "data2"} out := core.AcmeIdentifier{} marshaledI, err := tc.ToDb(ai) test.AssertNotError(t, err, "Could not ToDb") scanner, ok := tc.FromDb(&out) test.Assert(t, ok, "FromDb failed") if !ok { t.FailNow() return } marshaled := marshaledI.(string) err = scanner.Binder(&marshaled, &out) test.AssertMarshaledEquals(t, ai, out) }
func TestJsonWebKey(t *testing.T) { tc := BoulderTypeConverter{} var jwk, out jose.JsonWebKey json.Unmarshal([]byte(JWK1JSON), &jwk) marshaledI, err := tc.ToDb(jwk) test.AssertNotError(t, err, "Could not ToDb") scanner, ok := tc.FromDb(&out) test.Assert(t, ok, "FromDb failed") if !ok { t.FailNow() return } marshaled := marshaledI.(string) err = scanner.Binder(&marshaled, &out) test.AssertMarshaledEquals(t, jwk, out) }