@@ -388,7 +388,6 @@ func initAuthorities(t *testing.T) (*DummyValidationAuthority, sapb.StorageAutho
388
388
ra .SA = sa
389
389
ra .VA = va
390
390
ra .CA = ca
391
- ra .OCSP = & mocks.MockOCSPGenerator {}
392
391
ra .PA = pa
393
392
return dummyVA , sa , ra , rlSource , fc , cleanUp
394
393
}
@@ -3630,125 +3629,16 @@ func (msar *mockSARevocation) UpdateRevokedCertificate(_ context.Context, req *s
3630
3629
return & emptypb.Empty {}, nil
3631
3630
}
3632
3631
3633
- type mockOCSPA struct {
3634
- mocks.MockCA
3635
- }
3636
-
3637
- func (mcao * mockOCSPA ) GenerateOCSP (context.Context , * capb.GenerateOCSPRequest , ... grpc.CallOption ) (* capb.OCSPResponse , error ) {
3638
- return & capb.OCSPResponse {Response : []byte {1 , 2 , 3 }}, nil
3639
- }
3640
-
3641
3632
type mockPurger struct {}
3642
3633
3643
3634
func (mp * mockPurger ) Purge (context.Context , * akamaipb.PurgeRequest , ... grpc.CallOption ) (* emptypb.Empty , error ) {
3644
3635
return & emptypb.Empty {}, nil
3645
3636
}
3646
3637
3647
- // mockSAGenerateOCSP is a mock SA that always returns a good OCSP response, with a constant NotAfter.
3648
- type mockSAGenerateOCSP struct {
3649
- sapb.StorageAuthorityClient
3650
- expiration time.Time
3651
- }
3652
-
3653
- func (msgo * mockSAGenerateOCSP ) GetCertificateStatus (_ context.Context , req * sapb.Serial , _ ... grpc.CallOption ) (* corepb.CertificateStatus , error ) {
3654
- return & corepb.CertificateStatus {
3655
- Serial : req .Serial ,
3656
- Status : "good" ,
3657
- NotAfter : timestamppb .New (msgo .expiration .UTC ()),
3658
- }, nil
3659
- }
3660
-
3661
- func TestGenerateOCSP (t * testing.T ) {
3662
- _ , _ , ra , _ , clk , cleanUp := initAuthorities (t )
3663
- defer cleanUp ()
3664
-
3665
- ra .OCSP = & mockOCSPA {}
3666
- ra .SA = & mockSAGenerateOCSP {expiration : clk .Now ().Add (time .Hour )}
3667
-
3668
- req := & rapb.GenerateOCSPRequest {
3669
- Serial : core .SerialToString (big .NewInt (1 )),
3670
- }
3671
-
3672
- resp , err := ra .GenerateOCSP (context .Background (), req )
3673
- test .AssertNotError (t , err , "generating OCSP" )
3674
- test .AssertByteEquals (t , resp .Response , []byte {1 , 2 , 3 })
3675
-
3676
- ra .SA = & mockSAGenerateOCSP {expiration : clk .Now ().Add (- time .Hour )}
3677
- _ , err = ra .GenerateOCSP (context .Background (), req )
3678
- if ! errors .Is (err , berrors .NotFound ) {
3679
- t .Errorf ("expected NotFound error, got %s" , err )
3680
- }
3681
- }
3682
-
3683
- // mockSALongExpiredSerial is a mock SA that treats every serial as if it expired a long time ago.
3684
- // Specifically, it returns NotFound to GetCertificateStatus (simulating the serial having been
3685
- // removed from the certificateStatus table), but returns success to GetSerialMetadata (simulating
3686
- // a serial number staying in the `serials` table indefinitely).
3687
- type mockSALongExpiredSerial struct {
3688
- sapb.StorageAuthorityClient
3689
- }
3690
-
3691
- func (msgo * mockSALongExpiredSerial ) GetCertificateStatus (_ context.Context , req * sapb.Serial , _ ... grpc.CallOption ) (* corepb.CertificateStatus , error ) {
3692
- return nil , berrors .NotFoundError ("not found" )
3693
- }
3694
-
3695
- func (msgo * mockSALongExpiredSerial ) GetSerialMetadata (_ context.Context , req * sapb.Serial , _ ... grpc.CallOption ) (* sapb.SerialMetadata , error ) {
3696
- return & sapb.SerialMetadata {
3697
- Serial : req .Serial ,
3698
- }, nil
3699
- }
3700
-
3701
- func TestGenerateOCSPLongExpiredSerial (t * testing.T ) {
3702
- _ , _ , ra , _ , _ , cleanUp := initAuthorities (t )
3703
- defer cleanUp ()
3704
-
3705
- ra .OCSP = & mockOCSPA {}
3706
- ra .SA = & mockSALongExpiredSerial {}
3707
-
3708
- req := & rapb.GenerateOCSPRequest {
3709
- Serial : core .SerialToString (big .NewInt (1 )),
3710
- }
3711
-
3712
- _ , err := ra .GenerateOCSP (context .Background (), req )
3713
- test .AssertError (t , err , "generating OCSP" )
3714
- if ! errors .Is (err , berrors .NotFound ) {
3715
- t .Errorf ("expected NotFound error, got %#v" , err )
3716
- }
3717
- }
3718
-
3719
- // mockSAUnknownSerial is a mock SA that always returns NotFound to certificate status and serial lookups.
3720
- // It emulates an SA that has never issued a certificate.
3721
- type mockSAUnknownSerial struct {
3722
- mockSALongExpiredSerial
3723
- }
3724
-
3725
- func (msgo * mockSAUnknownSerial ) GetSerialMetadata (_ context.Context , req * sapb.Serial , _ ... grpc.CallOption ) (* sapb.SerialMetadata , error ) {
3726
- return nil , berrors .NotFoundError ("not found" )
3727
- }
3728
-
3729
- func TestGenerateOCSPUnknownSerial (t * testing.T ) {
3730
- _ , _ , ra , _ , _ , cleanUp := initAuthorities (t )
3731
- defer cleanUp ()
3732
-
3733
- ra .OCSP = & mockOCSPA {}
3734
- ra .SA = & mockSAUnknownSerial {}
3735
-
3736
- req := & rapb.GenerateOCSPRequest {
3737
- Serial : core .SerialToString (big .NewInt (1 )),
3738
- }
3739
-
3740
- _ , err := ra .GenerateOCSP (context .Background (), req )
3741
- test .AssertError (t , err , "generating OCSP" )
3742
- if ! errors .Is (err , berrors .UnknownSerial ) {
3743
- t .Errorf ("expected UnknownSerial error, got %#v" , err )
3744
- }
3745
- }
3746
-
3747
3638
func TestRevokeCertByApplicant_Subscriber (t * testing.T ) {
3748
3639
_ , _ , ra , _ , clk , cleanUp := initAuthorities (t )
3749
3640
defer cleanUp ()
3750
3641
3751
- ra .OCSP = & mockOCSPA {}
3752
3642
ra .purger = & mockPurger {}
3753
3643
3754
3644
// Use the same self-signed cert as both issuer and issuee for revocation.
@@ -3823,7 +3713,6 @@ func TestRevokeCertByApplicant_Controller(t *testing.T) {
3823
3713
_ , _ , ra , _ , clk , cleanUp := initAuthorities (t )
3824
3714
defer cleanUp ()
3825
3715
3826
- ra .OCSP = & mockOCSPA {}
3827
3716
ra .purger = & mockPurger {}
3828
3717
3829
3718
// Use the same self-signed cert as both issuer and issuee for revocation.
@@ -3864,7 +3753,6 @@ func TestRevokeCertByKey(t *testing.T) {
3864
3753
_ , _ , ra , _ , clk , cleanUp := initAuthorities (t )
3865
3754
defer cleanUp ()
3866
3755
3867
- ra .OCSP = & mockOCSPA {}
3868
3756
ra .purger = & mockPurger {}
3869
3757
3870
3758
// Use the same self-signed cert as both issuer and issuee for revocation.
@@ -3916,7 +3804,6 @@ func TestAdministrativelyRevokeCertificate(t *testing.T) {
3916
3804
_ , _ , ra , _ , clk , cleanUp := initAuthorities (t )
3917
3805
defer cleanUp ()
3918
3806
3919
- ra .OCSP = & mockOCSPA {}
3920
3807
ra .purger = & mockPurger {}
3921
3808
3922
3809
// Use the same self-signed cert as both issuer and issuee for revocation.
0 commit comments