keys_test.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273
  1. package pgp
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "io/ioutil"
  7. "net/http"
  8. "os"
  9. "path"
  10. "regexp"
  11. "sort"
  12. "strings"
  13. "testing"
  14. aur "github.com/Jguer/aur"
  15. gosrc "github.com/Morganamilo/go-srcinfo"
  16. "github.com/bradleyjkemp/cupaloy"
  17. "github.com/Jguer/yay/v10/pkg/dep"
  18. )
  19. const (
  20. // The default port used by the PGP key server.
  21. gpgServerPort = 11371
  22. )
  23. func init() {
  24. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  25. regex := regexp.MustCompile(`search=0[xX]([a-fA-F0-9]+)`)
  26. matches := regex.FindStringSubmatch(r.RequestURI)
  27. data := ""
  28. if matches != nil {
  29. data = getPgpKey(matches[1])
  30. }
  31. w.Header().Set("Content-Type", "application/pgp-keys")
  32. _, err := w.Write([]byte(data))
  33. if err != nil {
  34. fmt.Fprintln(os.Stderr, err)
  35. }
  36. })
  37. }
  38. func newPkg(basename string) *aur.Pkg {
  39. return &aur.Pkg{Name: basename, PackageBase: basename}
  40. }
  41. func getPgpKey(key string) string {
  42. var buffer bytes.Buffer
  43. if contents, err := ioutil.ReadFile(path.Join("testdata", key)); err == nil {
  44. buffer.WriteString("-----BEGIN PGP PUBLIC KEY BLOCK-----\n")
  45. buffer.WriteString("Version: SKS 1.1.6\n")
  46. buffer.WriteString("Comment: Hostname: yay\n\n")
  47. buffer.Write(contents)
  48. buffer.WriteString("\n-----END PGP PUBLIC KEY BLOCK-----\n")
  49. }
  50. return buffer.String()
  51. }
  52. func startPgpKeyServer() *http.Server {
  53. srv := &http.Server{Addr: fmt.Sprintf("127.0.0.1:%d", gpgServerPort)}
  54. go func() {
  55. err := srv.ListenAndServe()
  56. if err != nil {
  57. fmt.Fprintln(os.Stderr, err)
  58. }
  59. }()
  60. return srv
  61. }
  62. func TestImportKeys(t *testing.T) {
  63. keyringDir, err := ioutil.TempDir("/tmp", "yay-test-keyring")
  64. if err != nil {
  65. t.Fatalf("Unable to init test keyring %q: %v\n", keyringDir, err)
  66. }
  67. defer os.RemoveAll(keyringDir)
  68. server := startPgpKeyServer()
  69. defer func() {
  70. err := server.Shutdown(context.TODO())
  71. if err != nil {
  72. fmt.Fprintln(os.Stderr, err)
  73. }
  74. }()
  75. casetests := []struct {
  76. keys []string
  77. wantError bool
  78. }{
  79. // Single key, should succeed.
  80. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  81. {
  82. keys: []string{"C52048C0C0748FEE227D47A2702353E0F7E48EDB"},
  83. wantError: false,
  84. },
  85. // Two keys, should succeed as well.
  86. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  87. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  88. {
  89. keys: []string{
  90. "11E521D646982372EB577A1F8F0871F202119294",
  91. "B6C8F98282B944E3B0D5C2530FC3042E345AD05D",
  92. },
  93. wantError: false,
  94. },
  95. // Single invalid key, should fail.
  96. {
  97. keys: []string{"THIS-SHOULD-FAIL"},
  98. wantError: true,
  99. },
  100. // Two invalid keys, should fail.
  101. {
  102. keys: []string{"THIS-SHOULD-FAIL", "THIS-ONE-SHOULD-FAIL-TOO"},
  103. wantError: true,
  104. },
  105. // Invalid + valid key. Should fail as well.
  106. // 647F28654894E3BD457199BE38DBBDC86092693E: Greg Kroah-Hartman.
  107. {
  108. keys: []string{
  109. "THIS-SHOULD-FAIL",
  110. "647F28654894E3BD457199BE38DBBDC86092693E",
  111. },
  112. wantError: true,
  113. },
  114. }
  115. for _, tt := range casetests {
  116. err := importKeys(tt.keys, "gpg", fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir))
  117. if !tt.wantError {
  118. if err != nil {
  119. t.Fatalf("Got error %q, want no error", err)
  120. }
  121. continue
  122. }
  123. // Here, we want to see the error.
  124. if err == nil {
  125. t.Fatalf("Got no error; want error")
  126. }
  127. }
  128. }
  129. func makeSrcinfo(pkgbase string, pgpkeys ...string) *gosrc.Srcinfo {
  130. srcinfo := gosrc.Srcinfo{}
  131. srcinfo.Pkgbase = pkgbase
  132. srcinfo.ValidPGPKeys = pgpkeys
  133. return &srcinfo
  134. }
  135. func TestCheckPgpKeys(t *testing.T) {
  136. keyringDir, err := ioutil.TempDir("/tmp", "yay-test-keyring")
  137. if err != nil {
  138. t.Fatalf("Unable to init test keyring: %v\n", err)
  139. }
  140. defer os.RemoveAll(keyringDir)
  141. server := startPgpKeyServer()
  142. defer func() {
  143. err := server.Shutdown(context.TODO())
  144. if err != nil {
  145. fmt.Fprintln(os.Stderr, err)
  146. }
  147. }()
  148. casetests := []struct {
  149. name string
  150. pkgs dep.Base
  151. srcinfos map[string]*gosrc.Srcinfo
  152. wantError bool
  153. }{
  154. // cower: single package, one valid key not yet in the keyring.
  155. // 487EACC08557AD082088DABA1EB2638FF56C0C53: Dave Reisner.
  156. {
  157. name: " one valid key not yet in the keyring",
  158. pkgs: dep.Base{newPkg("cower")},
  159. srcinfos: map[string]*gosrc.Srcinfo{"cower": makeSrcinfo("cower", "487EACC08557AD082088DABA1EB2638FF56C0C53")},
  160. wantError: false,
  161. },
  162. // libc++: single package, two valid keys not yet in the keyring.
  163. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  164. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  165. {
  166. name: "two valid keys not yet in the keyring",
  167. pkgs: dep.Base{newPkg("libc++")},
  168. srcinfos: map[string]*gosrc.Srcinfo{
  169. "libc++": makeSrcinfo("libc++", "11E521D646982372EB577A1F8F0871F202119294", "B6C8F98282B944E3B0D5C2530FC3042E345AD05D"),
  170. },
  171. wantError: false,
  172. },
  173. // Two dummy packages requiring the same key.
  174. // ABAF11C65A2970B130ABE3C479BE3E4300411886: Linus Torvalds.
  175. {
  176. name: "Two dummy packages requiring the same key",
  177. pkgs: dep.Base{newPkg("dummy-1"), newPkg("dummy-2")},
  178. srcinfos: map[string]*gosrc.Srcinfo{
  179. "dummy-1": makeSrcinfo("dummy-1",
  180. "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  181. "dummy-2": makeSrcinfo("dummy-2", "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  182. },
  183. wantError: false,
  184. },
  185. // dummy package: single package, two valid keys, one of them already
  186. // in the keyring.
  187. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  188. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  189. {
  190. name: "one already in keyring",
  191. pkgs: dep.Base{newPkg("dummy-3")},
  192. srcinfos: map[string]*gosrc.Srcinfo{
  193. "dummy-3": makeSrcinfo("dummy-3", "11E521D646982372EB577A1F8F0871F202119294", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  194. },
  195. wantError: false,
  196. },
  197. // Two dummy packages with existing keys.
  198. {
  199. name: "two existing",
  200. pkgs: dep.Base{newPkg("dummy-4"), newPkg("dummy-5")},
  201. srcinfos: map[string]*gosrc.Srcinfo{
  202. "dummy-4": makeSrcinfo("dummy-4", "11E521D646982372EB577A1F8F0871F202119294"),
  203. "dummy-5": makeSrcinfo("dummy-5", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  204. },
  205. wantError: false,
  206. },
  207. // Dummy package with invalid key, should fail.
  208. {
  209. name: "one invalid",
  210. pkgs: dep.Base{newPkg("dummy-7")},
  211. srcinfos: map[string]*gosrc.Srcinfo{"dummy-7": makeSrcinfo("dummy-7", "THIS-SHOULD-FAIL")},
  212. wantError: true,
  213. },
  214. // Dummy package with both an invalid an another valid key, should fail.
  215. // A314827C4E4250A204CE6E13284FC34C8E4B1A25: Thomas Bächler.
  216. {
  217. name: "one invalid, one valid",
  218. pkgs: dep.Base{newPkg("dummy-8")},
  219. srcinfos: map[string]*gosrc.Srcinfo{"dummy-8": makeSrcinfo("dummy-8", "A314827C4E4250A204CE6E13284FC34C8E4B1A25", "THIS-SHOULD-FAIL")},
  220. wantError: true,
  221. },
  222. }
  223. for _, tt := range casetests {
  224. tt := tt
  225. t.Run(tt.name, func(t *testing.T) {
  226. rescueStdout := os.Stdout
  227. r, w, _ := os.Pipe()
  228. os.Stdout = w
  229. err := CheckPgpKeys([]dep.Base{tt.pkgs}, tt.srcinfos, "gpg",
  230. fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir), true)
  231. if !tt.wantError {
  232. if err != nil {
  233. t.Fatalf("Got error %q, want no error", err)
  234. }
  235. w.Close()
  236. out, _ := ioutil.ReadAll(r)
  237. os.Stdout = rescueStdout
  238. splitLines := strings.Split(string(out), "\n")
  239. sort.Strings(splitLines)
  240. cupaloy.SnapshotT(t, strings.Join(splitLines, "\n"))
  241. return
  242. }
  243. // Here, we want to see the error.
  244. if err == nil {
  245. t.Fatalf("Got no error; want error")
  246. }
  247. })
  248. }
  249. }