2019-08-26 22:11:32 +03:00
#!/bin/bash
#
# Copyright (C) 2019 Collabora Ltd.
#
# SPDX-License-Identifier: LGPL-2.0+
#
# This library is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation; either
# version 2 of the License, or (at your option) any later version.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
2021-12-07 04:20:55 +03:00
# License along with this library. If not, see <https://www.gnu.org/licenses/>.
2019-08-26 22:11:32 +03:00
set -euo pipefail
. $( dirname $0 ) /libtest.sh
2020-05-15 23:43:23 +03:00
echo "1..20"
2019-08-26 22:11:32 +03:00
2020-04-15 01:18:13 +03:00
# This is explicitly opt in for testing
export OSTREE_DUMMY_SIGN_ENABLED = 1
2019-08-26 22:11:32 +03:00
setup_fake_remote_repo1 "archive"
repo_mode = "archive"
function repo_init( ) {
cd ${ test_tmpdir }
rm repo -rf
mkdir repo
ostree_repo_init repo --mode= ${ repo_mode }
2019-11-25 22:50:07 +03:00
${ CMD_PREFIX } ostree --repo= repo remote add --set= gpg-verify= false --set= sign-verify-summary= false origin $( cat httpd-address) /ostree/gnomerepo " $@ "
2019-08-26 22:11:32 +03:00
}
function test_signed_pull( ) {
local sign_type = " $1 "
2019-11-26 12:40:57 +03:00
local comment = " $2 "
2019-08-26 22:11:32 +03:00
cd ${ test_tmpdir }
${ CMD_PREFIX } ostree --repo= ostree-srv/gnomerepo commit ${ COMMIT_ARGS } \
-b main -s "A signed commit" --tree= ref = main
${ CMD_PREFIX } ostree --repo= ostree-srv/gnomerepo summary -u
# make sure gpg verification is correctly on
csum = $( ${ CMD_PREFIX } ostree --repo= ostree-srv/gnomerepo rev-parse main)
objpath = objects/${ csum : : 2 } /${ csum : 2 } .commitmeta
remotesig = ostree-srv/gnomerepo/$objpath
localsig = repo/$objpath
mv $remotesig $remotesig .bak
if ${ CMD_PREFIX } ostree --repo= repo --depth= 0 pull origin main; then
2020-05-07 22:43:10 +03:00
assert_not_reached "pull with sign-verify and no commitmeta unexpectedly succeeded?"
2019-08-26 22:11:32 +03:00
fi
# ok now check that we can pull correctly
mv $remotesig .bak $remotesig
${ CMD_PREFIX } ostree --repo= repo pull origin main
2019-11-26 12:40:57 +03:00
echo " ok ${ sign_type } ${ comment } pull signed commit "
2019-08-26 22:11:32 +03:00
rm $localsig
${ CMD_PREFIX } ostree --repo= repo pull origin main
test -f $localsig
2019-11-26 12:40:57 +03:00
echo " ok ${ sign_type } ${ comment } re-pull signature for stored commit "
2019-08-26 22:11:32 +03:00
}
DUMMYSIGN = "dummysign"
COMMIT_ARGS = " --sign= ${ DUMMYSIGN } --sign-type=dummy "
repo_init --set= sign-verify= true
2020-02-20 02:43:36 +03:00
# Check if verification-key and verification-file options throw error with wrong keys
cd ${ test_tmpdir }
${ CMD_PREFIX } ostree --repo= ostree-srv/gnomerepo commit ${ COMMIT_ARGS } \
-b main -s "A signed commit" --tree= ref = main
${ CMD_PREFIX } ostree --repo= ostree-srv/gnomerepo summary -u
if ${ CMD_PREFIX } ostree --repo= repo pull origin main; then
assert_not_reached "pull without keys unexpectedly succeeded"
fi
echo "ok pull failure without keys preloaded"
2020-04-12 21:04:06 +03:00
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-dummy-key "somewrongkey"
2020-02-20 02:43:36 +03:00
if ${ CMD_PREFIX } ostree --repo= repo pull origin main; then
assert_not_reached "pull with unknown key unexpectedly succeeded"
fi
echo "ok pull failure with incorrect key option"
2020-04-12 21:04:06 +03:00
${ CMD_PREFIX } ostree --repo= repo config unset 'remote "origin"' .verification-dummy-key
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-dummy-file "/non/existing/file"
2020-02-20 02:43:36 +03:00
if ${ CMD_PREFIX } ostree --repo= repo pull origin main; then
assert_not_reached "pull with unknown keys file unexpectedly succeeded"
fi
echo "ok pull failure with incorrect keys file option"
# Test with correct dummy key
2020-04-12 21:04:06 +03:00
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-dummy-key " ${ DUMMYSIGN } "
${ CMD_PREFIX } ostree --repo= repo config unset 'remote "origin"' .verification-dummy-file
2019-11-26 12:40:57 +03:00
test_signed_pull "dummy" ""
2019-08-26 22:11:32 +03:00
2020-05-07 22:43:10 +03:00
# Another test with the --verify option directly
repo_init --sign-verify= dummy = inline:${ DUMMYSIGN }
test_signed_pull "dummy" "from remote opt"
2020-05-15 23:43:23 +03:00
# And now explicitly limit it to dummy
repo_init
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .sign-verify dummy
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-dummy-key " ${ DUMMYSIGN } "
test_signed_pull "dummy" "explicit value"
# dummy, but no key configured
repo_init
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .sign-verify dummy
if ${ CMD_PREFIX } ostree --repo= repo pull origin main 2>err.txt; then
assert_not_reached "pull with nosuchsystem succeeded"
fi
assert_file_has_content err.txt 'No keys found for required signapi type dummy'
echo "ok explicit dummy but unconfigured"
# Set it to an unknown explicit value
repo_init
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .sign-verify nosuchsystem;
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-dummy-key " ${ DUMMYSIGN } "
if ${ CMD_PREFIX } ostree --repo= repo pull origin main 2>err.txt; then
assert_not_reached "pull with nosuchsystem succeeded"
fi
assert_file_has_content err.txt 'Requested signature type is not implemented'
echo "ok pull failure for unknown system"
2020-05-07 22:43:10 +03:00
repo_init
if ${ CMD_PREFIX } ostree --repo= repo remote add other --sign-verify= trustme = inline:ok http://localhost 2>err.txt; then
assert_not_reached "remote add with invalid keytype succeeded"
fi
assert_file_has_content err.txt 'Requested signature type is not implemented'
if ${ CMD_PREFIX } ostree --repo= repo remote add other --sign-verify= dummy http://localhost 2>err.txt; then
assert_not_reached "remote add with invalid keytype succeeded"
fi
assert_file_has_content err.txt 'Failed to parse KEYTYPE'
if ${ CMD_PREFIX } ostree --repo= repo remote add other --sign-verify= dummy = foo:bar http://localhost 2>err.txt; then
assert_not_reached "remote add with invalid keytype succeeded"
fi
assert_file_has_content err.txt 'Invalid key reference'
echo "ok remote add errs"
2020-04-16 19:43:43 +03:00
if ! has_sign_ed25519; then
2019-11-26 12:40:57 +03:00
echo "ok ed25519-key pull signed commit # SKIP due libsodium unavailability"
echo "ok ed25519-key re-pull signature for stored commit # SKIP due libsodium unavailability"
2020-01-31 13:00:59 +03:00
echo "ok ed25519-key+file pull signed commit # SKIP due libsodium unavailability"
echo "ok ed25519-key+file re-pull signature for stored commit # SKIP due libsodium unavailability"
2019-11-26 12:40:57 +03:00
echo "ok ed25519-file pull signed commit # SKIP due libsodium unavailability"
echo "ok ed25519-file re-pull signature for stored commit # SKIP due libsodium unavailability"
2020-05-07 22:43:10 +03:00
echo "ok ed25519-inline # SKIP due libsodium unavailability"
echo "ok ed25519-inline # SKIP due libsodium unavailability"
2019-11-26 12:40:57 +03:00
exit 0
fi
2019-08-26 22:11:32 +03:00
# Test ostree sign with 'ed25519' module
2019-11-17 20:15:46 +03:00
gen_ed25519_keys
PUBLIC = ${ ED25519PUBLIC }
SEED = ${ ED25519SEED }
SECRET = ${ ED25519SECRET }
2019-08-26 22:11:32 +03:00
COMMIT_ARGS = " --sign= ${ SECRET } --sign-type=ed25519 "
repo_init --set= sign-verify= true
2020-04-12 21:04:06 +03:00
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-ed25519-key " ${ PUBLIC } "
2019-11-26 12:40:57 +03:00
test_signed_pull "ed25519" "key"
2019-08-26 22:11:32 +03:00
2019-08-27 00:51:20 +03:00
# Prepare files with public ed25519 signatures
PUBKEYS = " $( mktemp -p ${ test_tmpdir } ed25519_XXXXXX.ed25519) "
# Test the file with multiple keys without a valid public key
for ( ( i = 0; i<100; i++) ) ; do
# Generate a list with some public signatures
2019-11-17 20:15:46 +03:00
gen_ed25519_random_public
2019-08-27 00:51:20 +03:00
done > ${ PUBKEYS }
2020-01-31 13:00:59 +03:00
# Test case with the file containing incorrect signatures and with the correct key set
2020-04-12 21:04:06 +03:00
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-ed25519-file " ${ PUBKEYS } "
2020-01-31 13:00:59 +03:00
test_signed_pull "ed25519" "key+file"
2019-08-27 00:51:20 +03:00
# Add correct key into the list
echo ${ PUBLIC } >> ${ PUBKEYS }
repo_init --set= sign-verify= true
2020-04-12 21:04:06 +03:00
${ CMD_PREFIX } ostree --repo= repo config set 'remote "origin"' .verification-ed25519-file " ${ PUBKEYS } "
2019-11-26 12:40:57 +03:00
test_signed_pull "ed25519" "file"
2019-08-27 00:51:20 +03:00
2020-05-07 22:43:10 +03:00
repo_init --sign-verify= ed25519 = inline:" ${ ED25519PUBLIC } "
test_signed_pull "ed25519" "--verify-ed25519"