#!/usr/bin/python3 -OO # Copyright 2007-2020 The SABnzbd-Team # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. """ tests.test_cert_gen - Testing Certificate generation """ import datetime from cryptography import x509 from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives.asymmetric import rsa from sabnzbd.utils.certgen import generate_key, generate_local_cert from tests.testhelper import * class TestCertGen: def test_generate_key_default(self): # Generate private key with default key_size and file name private_key = generate_key(output_file=os.path.join(SAB_CACHE_DIR, "test_key.pem")) assert private_key.key_size == 2048 @pytest.mark.parametrize( "key_size, file_name", [(512, "test_key.pem"), (1024, "test_123_key.pem"), (4096, "123_key.pem")] ) def test_generate_key_custom(self, key_size, file_name): # Generate private key private_key = generate_key(key_size=key_size, output_file=os.path.join(SAB_CACHE_DIR, file_name)) # validate generated private key assert private_key.key_size == key_size assert os.path.isfile(os.path.join(SAB_CACHE_DIR, file_name)) def test_generate_local_cert(self): # Generate private key private_key = generate_key(output_file=os.path.join(SAB_CACHE_DIR, "test_key.pem")) # Generate local certificate using private key output_file = os.path.join(SAB_CACHE_DIR, "test_cert.cert") local_cert = generate_local_cert(private_key, output_file=output_file) assert local_cert # Validating generated key file public_key = local_cert.public_key() assert isinstance(public_key, rsa.RSAPublicKey) # Validate certificate file with open(output_file, "rb") as cert_file: cert_content = cert_file.read() cert = x509.load_pem_x509_certificate(cert_content, default_backend()) # Validate that the timestamp at which the certificate stops being valid (expiration date) is in future assert datetime.datetime.now() < cert.not_valid_after