keys_test.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. package pgp
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "net/http"
  7. "os"
  8. "path"
  9. "regexp"
  10. "testing"
  11. "time"
  12. gosrc "github.com/Morganamilo/go-srcinfo"
  13. "github.com/stretchr/testify/assert"
  14. "github.com/stretchr/testify/require"
  15. )
  16. const (
  17. // The default port used by the PGP key server.
  18. gpgServerPort = 11371
  19. )
  20. func init() {
  21. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  22. regex := regexp.MustCompile(`search=0[xX]([a-fA-F0-9]+)`)
  23. matches := regex.FindStringSubmatch(r.RequestURI)
  24. data := ""
  25. if matches != nil {
  26. data = getPgpKey(matches[1])
  27. }
  28. w.Header().Set("Content-Type", "application/pgp-keys")
  29. _, err := w.Write([]byte(data))
  30. if err != nil {
  31. fmt.Fprintln(os.Stderr, err)
  32. }
  33. })
  34. }
  35. func getPgpKey(key string) string {
  36. var buffer bytes.Buffer
  37. if contents, err := os.ReadFile(path.Join("testdata", key)); err == nil {
  38. buffer.WriteString("-----BEGIN PGP PUBLIC KEY BLOCK-----\n")
  39. buffer.WriteString("Version: SKS 1.1.6\n")
  40. buffer.WriteString("Comment: Hostname: yay\n\n")
  41. buffer.Write(contents)
  42. buffer.WriteString("\n-----END PGP PUBLIC KEY BLOCK-----\n")
  43. }
  44. return buffer.String()
  45. }
  46. func startPgpKeyServer() *http.Server {
  47. srv := &http.Server{Addr: fmt.Sprintf("127.0.0.1:%d", gpgServerPort), ReadHeaderTimeout: 1 * time.Second}
  48. go func() {
  49. err := srv.ListenAndServe()
  50. if err != nil {
  51. fmt.Fprintln(os.Stderr, err)
  52. }
  53. }()
  54. return srv
  55. }
  56. func TestImportKeys(t *testing.T) {
  57. keyringDir := t.TempDir()
  58. server := startPgpKeyServer()
  59. defer func() {
  60. err := server.Shutdown(context.TODO())
  61. if err != nil {
  62. fmt.Fprintln(os.Stderr, err)
  63. }
  64. }()
  65. casetests := []struct {
  66. keys []string
  67. wantError bool
  68. }{
  69. // Single key, should succeed.
  70. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  71. {
  72. keys: []string{"C52048C0C0748FEE227D47A2702353E0F7E48EDB"},
  73. wantError: false,
  74. },
  75. // Two keys, should succeed as well.
  76. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  77. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  78. {
  79. keys: []string{
  80. "11E521D646982372EB577A1F8F0871F202119294",
  81. "B6C8F98282B944E3B0D5C2530FC3042E345AD05D",
  82. },
  83. wantError: false,
  84. },
  85. // Single invalid key, should fail.
  86. {
  87. keys: []string{"THIS-SHOULD-FAIL"},
  88. wantError: true,
  89. },
  90. // Two invalid keys, should fail.
  91. {
  92. keys: []string{"THIS-SHOULD-FAIL", "THIS-ONE-SHOULD-FAIL-TOO"},
  93. wantError: true,
  94. },
  95. // Invalid + valid key. Should fail as well.
  96. // 647F28654894E3BD457199BE38DBBDC86092693E: Greg Kroah-Hartman.
  97. {
  98. keys: []string{
  99. "THIS-SHOULD-FAIL",
  100. "647F28654894E3BD457199BE38DBBDC86092693E",
  101. },
  102. wantError: true,
  103. },
  104. }
  105. for _, tt := range casetests {
  106. err := importKeys(tt.keys, "gpg", fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir))
  107. if !tt.wantError {
  108. if err != nil {
  109. t.Fatalf("Got error %q, want no error", err)
  110. }
  111. continue
  112. }
  113. // Here, we want to see the error.
  114. if err == nil {
  115. t.Fatalf("Got no error; want error")
  116. }
  117. }
  118. }
  119. func makeSrcinfo(pkgbase string, pgpkeys ...string) *gosrc.Srcinfo {
  120. srcinfo := gosrc.Srcinfo{}
  121. srcinfo.Pkgbase = pkgbase
  122. srcinfo.ValidPGPKeys = pgpkeys
  123. return &srcinfo
  124. }
  125. func TestCheckPgpKeys(t *testing.T) {
  126. keyringDir := t.TempDir()
  127. server := startPgpKeyServer()
  128. defer func() {
  129. err := server.Shutdown(context.TODO())
  130. if err != nil {
  131. fmt.Fprintln(os.Stderr, err)
  132. }
  133. }()
  134. casetests := []struct {
  135. name string
  136. pkgs map[string]string
  137. srcinfos map[string]*gosrc.Srcinfo
  138. wantError bool
  139. expected []string
  140. }{
  141. // cower: single package, one valid key not yet in the keyring.
  142. // 487EACC08557AD082088DABA1EB2638FF56C0C53: Dave Reisner.
  143. {
  144. name: " one valid key not yet in the keyring",
  145. pkgs: map[string]string{"cower": ""},
  146. srcinfos: map[string]*gosrc.Srcinfo{"cower": makeSrcinfo("cower", "487EACC08557AD082088DABA1EB2638FF56C0C53")},
  147. wantError: false,
  148. expected: []string{"487EACC08557AD082088DABA1EB2638FF56C0C53"},
  149. },
  150. // libc++: single package, two valid keys not yet in the keyring.
  151. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  152. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  153. {
  154. name: "two valid keys not yet in the keyring",
  155. pkgs: map[string]string{"libc++": ""},
  156. srcinfos: map[string]*gosrc.Srcinfo{
  157. "libc++": makeSrcinfo("libc++", "11E521D646982372EB577A1F8F0871F202119294", "B6C8F98282B944E3B0D5C2530FC3042E345AD05D"),
  158. },
  159. wantError: false,
  160. expected: []string{"11E521D646982372EB577A1F8F0871F202119294", "B6C8F98282B944E3B0D5C2530FC3042E345AD05D"},
  161. },
  162. // Two dummy packages requiring the same key.
  163. // ABAF11C65A2970B130ABE3C479BE3E4300411886: Linus Torvalds.
  164. {
  165. name: "Two dummy packages requiring the same key",
  166. pkgs: map[string]string{"dummy-1": "", "dummy-2": ""},
  167. srcinfos: map[string]*gosrc.Srcinfo{
  168. "dummy-1": makeSrcinfo("dummy-1",
  169. "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  170. "dummy-2": makeSrcinfo("dummy-2", "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  171. },
  172. wantError: false,
  173. expected: []string{"ABAF11C65A2970B130ABE3C479BE3E4300411886"},
  174. },
  175. // dummy package: single package, two valid keys, one of them already
  176. // in the keyring.
  177. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  178. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  179. {
  180. name: "one already in keyring",
  181. pkgs: map[string]string{"dummy-3": ""},
  182. srcinfos: map[string]*gosrc.Srcinfo{
  183. "dummy-3": makeSrcinfo("dummy-3", "11E521D646982372EB577A1F8F0871F202119294", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  184. },
  185. wantError: false,
  186. expected: []string{"C52048C0C0748FEE227D47A2702353E0F7E48EDB"},
  187. },
  188. // Two dummy packages with existing keys.
  189. {
  190. name: "two existing",
  191. pkgs: map[string]string{"dummy-4": "", "dummy-5": ""},
  192. srcinfos: map[string]*gosrc.Srcinfo{
  193. "dummy-4": makeSrcinfo("dummy-4", "11E521D646982372EB577A1F8F0871F202119294"),
  194. "dummy-5": makeSrcinfo("dummy-5", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  195. },
  196. wantError: false,
  197. expected: []string{},
  198. },
  199. // Dummy package with invalid key, should fail.
  200. {
  201. name: "one invalid",
  202. pkgs: map[string]string{"dummy-7": ""},
  203. srcinfos: map[string]*gosrc.Srcinfo{"dummy-7": makeSrcinfo("dummy-7", "THIS-SHOULD-FAIL")},
  204. wantError: true,
  205. },
  206. // Dummy package with both an invalid an another valid key, should fail.
  207. // A314827C4E4250A204CE6E13284FC34C8E4B1A25: Thomas Bächler.
  208. {
  209. name: "one invalid, one valid",
  210. pkgs: map[string]string{"dummy-8": ""},
  211. srcinfos: map[string]*gosrc.Srcinfo{"dummy-8": makeSrcinfo("dummy-8", "A314827C4E4250A204CE6E13284FC34C8E4B1A25", "THIS-SHOULD-FAIL")},
  212. wantError: true,
  213. expected: []string{},
  214. },
  215. }
  216. for _, tt := range casetests {
  217. tt := tt
  218. t.Run(tt.name, func(t *testing.T) {
  219. problematic, err := CheckPgpKeys(tt.pkgs, tt.srcinfos, "gpg",
  220. fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir), true)
  221. if tt.wantError {
  222. require.Error(t, err)
  223. return
  224. }
  225. require.NoError(t, err)
  226. assert.ElementsMatch(t, tt.expected, problematic, fmt.Sprintf("%#v", problematic))
  227. })
  228. }
  229. }