@@ -110,7 +110,7 @@ func TestWellFormedIdentifiers(t *testing.T) {
110
110
111
111
// Test syntax errors
112
112
for _ , tc := range testCases {
113
- err := WellFormedIdentifiers ([]identifier.ACMEIdentifier {identifier .NewDNS (tc .domain )})
113
+ err := WellFormedIdentifiers ([]identifier.ACMEIdentifier {identifier .FromDNS (tc .domain )})
114
114
if tc .err == nil {
115
115
test .AssertNil (t , err , fmt .Sprintf ("Unexpected error for domain %q, got %s" , tc .domain , err ))
116
116
} else {
@@ -121,7 +121,7 @@ func TestWellFormedIdentifiers(t *testing.T) {
121
121
}
122
122
}
123
123
124
- err := WellFormedIdentifiers ([]identifier.ACMEIdentifier {identifier .NewIP (netip .MustParseAddr ("9.9.9.9" ))})
124
+ err := WellFormedIdentifiers ([]identifier.ACMEIdentifier {identifier .FromIP (netip .MustParseAddr ("9.9.9.9" ))})
125
125
test .AssertError (t , err , "Expected error for IP, but got none" )
126
126
var berr * berrors.BoulderError
127
127
test .AssertErrorWraps (t , err , & berr )
@@ -183,22 +183,22 @@ func TestWillingToIssue(t *testing.T) {
183
183
test .AssertNotError (t , err , "Couldn't load rules" )
184
184
185
185
// Invalid encoding
186
- err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewDNS ("www.xn--m.com" )})
186
+ err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromDNS ("www.xn--m.com" )})
187
187
test .AssertError (t , err , "WillingToIssue didn't fail on a malformed IDN" )
188
188
// Invalid identifier type
189
- err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewIP (netip .MustParseAddr ("1.1.1.1" ))})
189
+ err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromIP (netip .MustParseAddr ("1.1.1.1" ))})
190
190
test .AssertError (t , err , "WillingToIssue didn't fail on an IP address" )
191
191
// Valid encoding
192
- err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewDNS ("www.xn--mnich-kva.com" )})
192
+ err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromDNS ("www.xn--mnich-kva.com" )})
193
193
test .AssertNotError (t , err , "WillingToIssue failed on a properly formed IDN" )
194
194
// IDN TLD
195
- err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewDNS ("xn--example--3bhk5a.xn--p1ai" )})
195
+ err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromDNS ("xn--example--3bhk5a.xn--p1ai" )})
196
196
test .AssertNotError (t , err , "WillingToIssue failed on a properly formed domain with IDN TLD" )
197
197
features .Reset ()
198
198
199
199
// Test expected blocked domains
200
200
for _ , domain := range shouldBeBlocked {
201
- err := pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewDNS (domain )})
201
+ err := pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromDNS (domain )})
202
202
test .AssertError (t , err , "domain was not correctly forbidden" )
203
203
var berr * berrors.BoulderError
204
204
test .AssertErrorWraps (t , err , & berr )
@@ -207,7 +207,7 @@ func TestWillingToIssue(t *testing.T) {
207
207
208
208
// Test acceptance of good names
209
209
for _ , domain := range shouldBeAccepted {
210
- err := pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewDNS (domain )})
210
+ err := pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromDNS (domain )})
211
211
test .AssertNotError (t , err , "domain was incorrectly forbidden" )
212
212
}
213
213
}
@@ -293,7 +293,7 @@ func TestWillingToIssue_Wildcards(t *testing.T) {
293
293
294
294
for _ , tc := range testCases {
295
295
t .Run (tc .Name , func (t * testing.T ) {
296
- err := pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewDNS (tc .Domain )})
296
+ err := pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromDNS (tc .Domain )})
297
297
if tc .ExpectedErr == nil {
298
298
test .AssertNil (t , err , fmt .Sprintf ("Unexpected error for domain %q, got %s" , tc .Domain , err ))
299
299
} else {
@@ -329,11 +329,11 @@ func TestWillingToIssue_SubErrors(t *testing.T) {
329
329
330
330
// Test multiple malformed domains and one banned domain; only the malformed ones will generate errors
331
331
err = pa .WillingToIssue ([]identifier.ACMEIdentifier {
332
- identifier .NewDNS ("perfectly-fine.com" ), // fine
333
- identifier .NewDNS ("letsdecrypt_org" ), // malformed
334
- identifier .NewDNS ("example.comm" ), // malformed
335
- identifier .NewDNS ("letsdecrypt.org" ), // banned
336
- identifier .NewDNS ("also-perfectly-fine.com" ), // fine
332
+ identifier .FromDNS ("perfectly-fine.com" ), // fine
333
+ identifier .FromDNS ("letsdecrypt_org" ), // malformed
334
+ identifier .FromDNS ("example.comm" ), // malformed
335
+ identifier .FromDNS ("letsdecrypt.org" ), // banned
336
+ identifier .FromDNS ("also-perfectly-fine.com" ), // fine
337
337
})
338
338
test .AssertDeepEquals (t , err ,
339
339
& berrors.BoulderError {
@@ -345,24 +345,24 @@ func TestWillingToIssue_SubErrors(t *testing.T) {
345
345
Type : berrors .Malformed ,
346
346
Detail : "Domain name contains an invalid character" ,
347
347
},
348
- Identifier : identifier .NewDNS ("letsdecrypt_org" ),
348
+ Identifier : identifier .FromDNS ("letsdecrypt_org" ),
349
349
},
350
350
{
351
351
BoulderError : & berrors.BoulderError {
352
352
Type : berrors .Malformed ,
353
353
Detail : "Domain name does not end with a valid public suffix (TLD)" ,
354
354
},
355
- Identifier : identifier .NewDNS ("example.comm" ),
355
+ Identifier : identifier .FromDNS ("example.comm" ),
356
356
},
357
357
},
358
358
})
359
359
360
360
// Test multiple banned domains.
361
361
err = pa .WillingToIssue ([]identifier.ACMEIdentifier {
362
- identifier .NewDNS ("perfectly-fine.com" ), // fine
363
- identifier .NewDNS ("letsdecrypt.org" ), // banned
364
- identifier .NewDNS ("example.com" ), // banned
365
- identifier .NewDNS ("also-perfectly-fine.com" ), // fine
362
+ identifier .FromDNS ("perfectly-fine.com" ), // fine
363
+ identifier .FromDNS ("letsdecrypt.org" ), // banned
364
+ identifier .FromDNS ("example.com" ), // banned
365
+ identifier .FromDNS ("also-perfectly-fine.com" ), // fine
366
366
})
367
367
test .AssertError (t , err , "Expected err from WillingToIssueWildcards" )
368
368
@@ -376,20 +376,20 @@ func TestWillingToIssue_SubErrors(t *testing.T) {
376
376
Type : berrors .RejectedIdentifier ,
377
377
Detail : "The ACME server refuses to issue a certificate for this domain name, because it is forbidden by policy" ,
378
378
},
379
- Identifier : identifier .NewDNS ("letsdecrypt.org" ),
379
+ Identifier : identifier .FromDNS ("letsdecrypt.org" ),
380
380
},
381
381
{
382
382
BoulderError : & berrors.BoulderError {
383
383
Type : berrors .RejectedIdentifier ,
384
384
Detail : "The ACME server refuses to issue a certificate for this domain name, because it is forbidden by policy" ,
385
385
},
386
- Identifier : identifier .NewDNS ("example.com" ),
386
+ Identifier : identifier .FromDNS ("example.com" ),
387
387
},
388
388
},
389
389
})
390
390
391
391
// Test willing to issue with only *one* bad identifier.
392
- err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .NewDNS ("letsdecrypt.org" )})
392
+ err = pa .WillingToIssue ([]identifier.ACMEIdentifier {identifier .FromDNS ("letsdecrypt.org" )})
393
393
test .AssertDeepEquals (t , err ,
394
394
& berrors.BoulderError {
395
395
Type : berrors .RejectedIdentifier ,
@@ -409,21 +409,21 @@ func TestChallengeTypesFor(t *testing.T) {
409
409
}{
410
410
{
411
411
name : "dns" ,
412
- ident : identifier .NewDNS ("example.com" ),
412
+ ident : identifier .FromDNS ("example.com" ),
413
413
wantChalls : []core.AcmeChallenge {
414
414
core .ChallengeTypeHTTP01 , core .ChallengeTypeDNS01 , core .ChallengeTypeTLSALPN01 ,
415
415
},
416
416
},
417
417
{
418
418
name : "wildcard" ,
419
- ident : identifier .NewDNS ("*.example.com" ),
419
+ ident : identifier .FromDNS ("*.example.com" ),
420
420
wantChalls : []core.AcmeChallenge {
421
421
core .ChallengeTypeDNS01 ,
422
422
},
423
423
},
424
424
{
425
425
name : "other" ,
426
- ident : identifier .NewIP (netip .MustParseAddr ("1.2.3.4" )),
426
+ ident : identifier .FromIP (netip .MustParseAddr ("1.2.3.4" )),
427
427
wantErr : "unrecognized identifier type" ,
428
428
},
429
429
}
@@ -514,23 +514,23 @@ func TestCheckAuthzChallenges(t *testing.T) {
514
514
{
515
515
name : "no challenges" ,
516
516
authz : core.Authorization {
517
- Identifier : identifier .NewDNS ("example.com" ),
517
+ Identifier : identifier .FromDNS ("example.com" ),
518
518
Challenges : []core.Challenge {},
519
519
},
520
520
wantErr : "has no challenges" ,
521
521
},
522
522
{
523
523
name : "no valid challenges" ,
524
524
authz : core.Authorization {
525
- Identifier : identifier .NewDNS ("example.com" ),
525
+ Identifier : identifier .FromDNS ("example.com" ),
526
526
Challenges : []core.Challenge {{Type : core .ChallengeTypeDNS01 , Status : core .StatusPending }},
527
527
},
528
528
wantErr : "not solved by any challenge" ,
529
529
},
530
530
{
531
531
name : "solved by disabled challenge" ,
532
532
authz : core.Authorization {
533
- Identifier : identifier .NewDNS ("example.com" ),
533
+ Identifier : identifier .FromDNS ("example.com" ),
534
534
Challenges : []core.Challenge {{Type : core .ChallengeTypeDNS01 , Status : core .StatusValid }},
535
535
},
536
536
enabled : map [core.AcmeChallenge ]bool {core .ChallengeTypeHTTP01 : true },
@@ -539,15 +539,15 @@ func TestCheckAuthzChallenges(t *testing.T) {
539
539
{
540
540
name : "solved by wrong kind of challenge" ,
541
541
authz : core.Authorization {
542
- Identifier : identifier .NewDNS ("*.example.com" ),
542
+ Identifier : identifier .FromDNS ("*.example.com" ),
543
543
Challenges : []core.Challenge {{Type : core .ChallengeTypeHTTP01 , Status : core .StatusValid }},
544
544
},
545
545
wantErr : "inapplicable challenge type" ,
546
546
},
547
547
{
548
548
name : "valid authz" ,
549
549
authz : core.Authorization {
550
- Identifier : identifier .NewDNS ("example.com" ),
550
+ Identifier : identifier .FromDNS ("example.com" ),
551
551
Challenges : []core.Challenge {{Type : core .ChallengeTypeTLSALPN01 , Status : core .StatusValid }},
552
552
},
553
553
},
0 commit comments