@@ -31,7 +31,7 @@ func TestHandler_AddX509Cert(t *testing.T) {
31
31
// query certificate
32
32
certificate , _ := querySingleApprovedCertificate (
33
33
setup , testconstants .IntermediateSubject , testconstants .IntermediateSubjectKeyID )
34
- require .Equal (t , intermediateCertificate (accAddress ), * certificate )
34
+ require .Equal (t , intermediateCertificateNoVid (accAddress ), * certificate )
35
35
36
36
certificateBySubjectKeyID , _ := queryAllApprovedCertificatesBySubjectKeyID (setup , testconstants .IntermediateSubjectKeyID )
37
37
require .Equal (t , 1 , len (certificateBySubjectKeyID ))
@@ -130,7 +130,7 @@ func TestHandler_AddX509Cert_ForExistingNocCertificate(t *testing.T) {
130
130
setup .AddAccount (vendorAccAddress , []dclauthtypes.AccountRole {dclauthtypes .Vendor }, testconstants .Vid )
131
131
132
132
// Store the NOC certificate
133
- nocCertificate := intermediateCertificate (vendorAccAddress )
133
+ nocCertificate := intermediateCertificateNoVid (vendorAccAddress )
134
134
nocCertificate .SerialNumber = testconstants .TestSerialNumber
135
135
nocCertificate .IsNoc = true
136
136
@@ -156,7 +156,7 @@ func TestHandler_AddX509Cert_NoRootCert(t *testing.T) {
156
156
setup .AddAccount (vendorAccAddress , []dclauthtypes.AccountRole {dclauthtypes .Vendor }, testconstants .Vid )
157
157
158
158
// add intermediate certificate
159
- intermediateCertificate := intermediateCertificate (vendorAccAddress )
159
+ intermediateCertificate := intermediateCertificateNoVid (vendorAccAddress )
160
160
setup .Keeper .AddApprovedCertificate (setup .Ctx , intermediateCertificate )
161
161
162
162
// add leaf x509 certificate
@@ -182,6 +182,29 @@ func TestHandler_AddX509Cert_RootIsNoc(t *testing.T) {
182
182
require .ErrorIs (t , err , pkitypes .ErrInappropriateCertificateType )
183
183
}
184
184
185
+ func TestHandler_AddX509Cert_VIDScoped (t * testing.T ) {
186
+ setup := Setup (t )
187
+
188
+ // // store root certificate
189
+ rootCertOptions := createPAACertWithNumericVidOptions ()
190
+ proposeAndApproveRootCertificate (setup , setup .Trustee1 , rootCertOptions )
191
+
192
+ accAddress := GenerateAccAddress ()
193
+ setup .AddAccount (accAddress , []dclauthtypes.AccountRole {dclauthtypes .Vendor }, testconstants .PAACertWithNumericVidVid )
194
+
195
+ // add x509 certificate
196
+ addX509Cert := types .NewMsgAddX509Cert (accAddress .String (), testconstants .PAICertWithNumericPidVid , testconstants .CertSchemaVersion )
197
+ _ , err := setup .Handler (setup .Ctx , addX509Cert )
198
+ require .NoError (t , err )
199
+
200
+ // query certificate
201
+ intermediateCerts , _ := queryApprovedCertificates (setup , testconstants .PAICertWithNumericPidVidSubject , testconstants .PAICertWithNumericPidVidSubjectKeyID )
202
+ require .Equal (t , 1 , len (intermediateCerts .Certs ))
203
+ require .Equal (t , testconstants .PAICertWithNumericPidVidSubject , intermediateCerts .Certs [0 ].Subject )
204
+ require .Equal (t , testconstants .PAICertWithNumericPidVidSubjectKeyID , intermediateCerts .Certs [0 ].SubjectKeyId )
205
+ require .Equal (t , int32 (testconstants .PAICertWithNumericPidVidVid ), intermediateCerts .Certs [0 ].Vid )
206
+ }
207
+
185
208
func TestHandler_AddX509Cert_ForDifferentSerialNumber (t * testing.T ) {
186
209
setup := Setup (t )
187
210
@@ -193,7 +216,7 @@ func TestHandler_AddX509Cert_ForDifferentSerialNumber(t *testing.T) {
193
216
setup .AddAccount (vendorAccAddress , []dclauthtypes.AccountRole {dclauthtypes .Vendor }, testconstants .Vid )
194
217
195
218
// store intermediate certificate with different serial number
196
- intermediateCertificate := intermediateCertificate (vendorAccAddress )
219
+ intermediateCertificate := intermediateCertificateNoVid (vendorAccAddress )
197
220
intermediateCertificate .SerialNumber = SerialNumber
198
221
setup .Keeper .SetUniqueCertificate (
199
222
setup .Ctx ,
@@ -333,7 +356,7 @@ func TestHandler_AddX509Cert_EachChildCertRefersToTwoParentCerts(t *testing.T) {
333
356
setup .AddAccount (vendorAccAddress , []dclauthtypes.AccountRole {dclauthtypes .Vendor }, testconstants .Vid )
334
357
335
358
// store intermediate certificate (it refers to two parent certificates)
336
- intermediateCertificate := intermediateCertificate (vendorAccAddress )
359
+ intermediateCertificate := intermediateCertificateNoVid (vendorAccAddress )
337
360
intermediateCertificate .SerialNumber = SerialNumber
338
361
339
362
setup .Keeper .AddApprovedCertificate (setup .Ctx , intermediateCertificate )
@@ -409,7 +432,7 @@ func TestHandler_AddX509Cert_ByNotOwnerButSameVendor(t *testing.T) {
409
432
setup .AddAccount (vendorAccAddress1 , []dclauthtypes.AccountRole {dclauthtypes .Vendor }, testconstants .Vid )
410
433
411
434
// Store an intermediate certificate with the first vendor account as the owner
412
- intermediateCertificate := intermediateCertificate (vendorAccAddress1 )
435
+ intermediateCertificate := intermediateCertificateNoVid (vendorAccAddress1 )
413
436
intermediateCertificate .SerialNumber = SerialNumber
414
437
setup .Keeper .AddApprovedCertificate (setup .Ctx , intermediateCertificate )
415
438
setup .Keeper .AddApprovedCertificateBySubjectKeyID (setup .Ctx , intermediateCertificate )
@@ -440,7 +463,7 @@ func TestHandler_AddX509Cert_ByOtherVendor(t *testing.T) {
440
463
setup .AddAccount (vendorAccAddress1 , []dclauthtypes.AccountRole {dclauthtypes .Vendor }, testconstants .Vid )
441
464
442
465
// Store an intermediate certificate with the first vendor account as the owner
443
- intermediateCertificate := intermediateCertificate (vendorAccAddress1 )
466
+ intermediateCertificate := intermediateCertificateNoVid (vendorAccAddress1 )
444
467
intermediateCertificate .SerialNumber = SerialNumber
445
468
setup .Keeper .AddApprovedCertificate (setup .Ctx , intermediateCertificate )
446
469
setup .Keeper .AddApprovedCertificateBySubjectKeyID (setup .Ctx , intermediateCertificate )
0 commit comments