keys_test.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. package main
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "io/ioutil"
  7. "net/http"
  8. "os"
  9. "path"
  10. "regexp"
  11. "testing"
  12. gosrc "github.com/Morganamilo/go-srcinfo"
  13. rpc "github.com/mikkeloscar/aur"
  14. "github.com/Jguer/yay/v10/pkg/dep"
  15. "github.com/Jguer/yay/v10/pkg/settings"
  16. )
  17. const (
  18. // The default port used by the PGP key server.
  19. gpgServerPort = 11371
  20. )
  21. func init() {
  22. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  23. regex := regexp.MustCompile(`search=0[xX]([a-fA-F0-9]+)`)
  24. matches := regex.FindStringSubmatch(r.RequestURI)
  25. data := ""
  26. if matches != nil {
  27. data = getPgpKey(matches[1])
  28. }
  29. w.Header().Set("Content-Type", "application/pgp-keys")
  30. _, err := w.Write([]byte(data))
  31. if err != nil {
  32. fmt.Fprintln(os.Stderr, err)
  33. }
  34. })
  35. }
  36. func newPkg(basename string) *rpc.Pkg {
  37. return &rpc.Pkg{Name: basename, PackageBase: basename}
  38. }
  39. func getPgpKey(key string) string {
  40. var buffer bytes.Buffer
  41. if contents, err := ioutil.ReadFile(path.Join("testdata", "keys", key)); err == nil {
  42. buffer.WriteString("-----BEGIN PGP PUBLIC KEY BLOCK-----\n")
  43. buffer.WriteString("Version: SKS 1.1.6\n")
  44. buffer.WriteString("Comment: Hostname: yay\n\n")
  45. buffer.Write(contents)
  46. buffer.WriteString("\n-----END PGP PUBLIC KEY BLOCK-----\n")
  47. }
  48. return buffer.String()
  49. }
  50. func startPgpKeyServer() *http.Server {
  51. srv := &http.Server{Addr: fmt.Sprintf("127.0.0.1:%d", gpgServerPort)}
  52. go func() {
  53. err := srv.ListenAndServe()
  54. if err != nil {
  55. fmt.Fprintln(os.Stderr, err)
  56. }
  57. }()
  58. return srv
  59. }
  60. func TestImportKeys(t *testing.T) {
  61. keyringDir, err := ioutil.TempDir("/tmp", "yay-test-keyring")
  62. if err != nil {
  63. t.Fatalf("Unable to init test keyring %q: %v\n", keyringDir, err)
  64. }
  65. defer os.RemoveAll(keyringDir)
  66. config = settings.MakeConfig()
  67. config.GpgBin = "gpg"
  68. config.GpgFlags = fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir)
  69. server := startPgpKeyServer()
  70. defer func() {
  71. err := server.Shutdown(context.TODO())
  72. if err != nil {
  73. fmt.Fprintln(os.Stderr, err)
  74. }
  75. }()
  76. casetests := []struct {
  77. keys []string
  78. wantError bool
  79. }{
  80. // Single key, should succeed.
  81. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  82. {
  83. keys: []string{"C52048C0C0748FEE227D47A2702353E0F7E48EDB"},
  84. wantError: false,
  85. },
  86. // Two keys, should succeed as well.
  87. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  88. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  89. {
  90. keys: []string{
  91. "11E521D646982372EB577A1F8F0871F202119294",
  92. "B6C8F98282B944E3B0D5C2530FC3042E345AD05D",
  93. },
  94. wantError: false,
  95. },
  96. // Single invalid key, should fail.
  97. {
  98. keys: []string{"THIS-SHOULD-FAIL"},
  99. wantError: true,
  100. },
  101. // Two invalid keys, should fail.
  102. {
  103. keys: []string{"THIS-SHOULD-FAIL", "THIS-ONE-SHOULD-FAIL-TOO"},
  104. wantError: true,
  105. },
  106. // Invalid + valid key. Should fail as well.
  107. // 647F28654894E3BD457199BE38DBBDC86092693E: Greg Kroah-Hartman.
  108. {
  109. keys: []string{
  110. "THIS-SHOULD-FAIL",
  111. "647F28654894E3BD457199BE38DBBDC86092693E",
  112. },
  113. wantError: true,
  114. },
  115. }
  116. for _, tt := range casetests {
  117. err := importKeys(tt.keys)
  118. if !tt.wantError {
  119. if err != nil {
  120. t.Fatalf("Got error %q, want no error", err)
  121. }
  122. continue
  123. }
  124. // Here, we want to see the error.
  125. if err == nil {
  126. t.Fatalf("Got no error; want error")
  127. }
  128. }
  129. }
  130. func makeSrcinfo(pkgbase string, pgpkeys ...string) *gosrc.Srcinfo {
  131. srcinfo := gosrc.Srcinfo{}
  132. srcinfo.Pkgbase = pkgbase
  133. srcinfo.ValidPGPKeys = pgpkeys
  134. return &srcinfo
  135. }
  136. func TestCheckPgpKeys(t *testing.T) {
  137. keyringDir, err := ioutil.TempDir("/tmp", "yay-test-keyring")
  138. if err != nil {
  139. t.Fatalf("Unable to init test keyring: %v\n", err)
  140. }
  141. defer os.RemoveAll(keyringDir)
  142. config.GpgBin = "gpg"
  143. config.GpgFlags = fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir)
  144. server := startPgpKeyServer()
  145. defer func() {
  146. err := server.Shutdown(context.TODO())
  147. if err != nil {
  148. fmt.Fprintln(os.Stderr, err)
  149. }
  150. }()
  151. casetests := []struct {
  152. pkgs dep.Base
  153. srcinfos map[string]*gosrc.Srcinfo
  154. wantError bool
  155. }{
  156. // cower: single package, one valid key not yet in the keyring.
  157. // 487EACC08557AD082088DABA1EB2638FF56C0C53: Dave Reisner.
  158. {
  159. pkgs: dep.Base{newPkg("cower")},
  160. srcinfos: map[string]*gosrc.Srcinfo{"cower": makeSrcinfo("cower", "487EACC08557AD082088DABA1EB2638FF56C0C53")},
  161. wantError: false,
  162. },
  163. // libc++: single package, two valid keys not yet in the keyring.
  164. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  165. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  166. {
  167. pkgs: dep.Base{newPkg("libc++")},
  168. srcinfos: map[string]*gosrc.Srcinfo{
  169. "libc++": makeSrcinfo("libc++", "11E521D646982372EB577A1F8F0871F202119294", "B6C8F98282B944E3B0D5C2530FC3042E345AD05D"),
  170. },
  171. wantError: false,
  172. },
  173. // Two dummy packages requiring the same key.
  174. // ABAF11C65A2970B130ABE3C479BE3E4300411886: Linus Torvalds.
  175. {
  176. pkgs: dep.Base{newPkg("dummy-1"), newPkg("dummy-2")},
  177. srcinfos: map[string]*gosrc.Srcinfo{
  178. "dummy-1": makeSrcinfo("dummy-1",
  179. "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  180. "dummy-2": makeSrcinfo("dummy-2", "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  181. },
  182. wantError: false,
  183. },
  184. // dummy package: single package, two valid keys, one of them already
  185. // in the keyring.
  186. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  187. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  188. {
  189. pkgs: dep.Base{newPkg("dummy-3")},
  190. srcinfos: map[string]*gosrc.Srcinfo{
  191. "dummy-3": makeSrcinfo("dummy-3", "11E521D646982372EB577A1F8F0871F202119294", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  192. },
  193. wantError: false,
  194. },
  195. // Two dummy packages with existing keys.
  196. {
  197. pkgs: dep.Base{newPkg("dummy-4"), newPkg("dummy-5")},
  198. srcinfos: map[string]*gosrc.Srcinfo{
  199. "dummy-4": makeSrcinfo("dummy-4", "11E521D646982372EB577A1F8F0871F202119294"),
  200. "dummy-5": makeSrcinfo("dummy-5", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  201. },
  202. wantError: false,
  203. },
  204. // Dummy package with invalid key, should fail.
  205. {
  206. pkgs: dep.Base{newPkg("dummy-7")},
  207. srcinfos: map[string]*gosrc.Srcinfo{"dummy-7": makeSrcinfo("dummy-7", "THIS-SHOULD-FAIL")},
  208. wantError: true,
  209. },
  210. // Dummy package with both an invalid an another valid key, should fail.
  211. // A314827C4E4250A204CE6E13284FC34C8E4B1A25: Thomas Bächler.
  212. {
  213. pkgs: dep.Base{newPkg("dummy-8")},
  214. srcinfos: map[string]*gosrc.Srcinfo{"dummy-8": makeSrcinfo("dummy-8", "A314827C4E4250A204CE6E13284FC34C8E4B1A25", "THIS-SHOULD-FAIL")},
  215. wantError: true,
  216. },
  217. }
  218. for _, tt := range casetests {
  219. err := checkPgpKeys([]dep.Base{tt.pkgs}, tt.srcinfos)
  220. if !tt.wantError {
  221. if err != nil {
  222. t.Fatalf("Got error %q, want no error", err)
  223. }
  224. continue
  225. }
  226. // Here, we want to see the error.
  227. if err == nil {
  228. t.Fatalf("Got no error; want error")
  229. }
  230. }
  231. }