keys_test.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. package main
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "io/ioutil"
  7. "net/http"
  8. "os"
  9. "path"
  10. "regexp"
  11. "testing"
  12. gosrc "github.com/Morganamilo/go-srcinfo"
  13. rpc "github.com/mikkeloscar/aur"
  14. )
  15. const (
  16. // The default port used by the PGP key server.
  17. gpgServerPort = 11371
  18. )
  19. func init() {
  20. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  21. regex := regexp.MustCompile(`search=0[xX]([a-fA-F0-9]+)`)
  22. matches := regex.FindStringSubmatch(r.RequestURI)
  23. data := ""
  24. if matches != nil {
  25. data = getPgpKey(matches[1])
  26. }
  27. w.Header().Set("Content-Type", "application/pgp-keys")
  28. _, err := w.Write([]byte(data))
  29. if err != nil {
  30. fmt.Fprintln(os.Stderr, err)
  31. }
  32. })
  33. }
  34. func newPkg(basename string) *rpc.Pkg {
  35. return &rpc.Pkg{Name: basename, PackageBase: basename}
  36. }
  37. func getPgpKey(key string) string {
  38. var buffer bytes.Buffer
  39. if contents, err := ioutil.ReadFile(path.Join("testdata", "keys", key)); err == nil {
  40. buffer.WriteString("-----BEGIN PGP PUBLIC KEY BLOCK-----\n")
  41. buffer.WriteString("Version: SKS 1.1.6\n")
  42. buffer.WriteString("Comment: Hostname: yay\n\n")
  43. buffer.Write(contents)
  44. buffer.WriteString("\n-----END PGP PUBLIC KEY BLOCK-----\n")
  45. }
  46. return buffer.String()
  47. }
  48. func startPgpKeyServer() *http.Server {
  49. srv := &http.Server{Addr: fmt.Sprintf("127.0.0.1:%d", gpgServerPort)}
  50. go func() {
  51. err := srv.ListenAndServe()
  52. if err != nil {
  53. fmt.Fprintln(os.Stderr, err)
  54. }
  55. }()
  56. return srv
  57. }
  58. func TestImportKeys(t *testing.T) {
  59. keyringDir, err := ioutil.TempDir("/tmp", "yay-test-keyring")
  60. if err != nil {
  61. t.Fatalf("Unable to init test keyring %q: %v\n", keyringDir, err)
  62. }
  63. defer os.RemoveAll(keyringDir)
  64. config = defaultSettings()
  65. config.GpgBin = "gpg"
  66. config.GpgFlags = fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir)
  67. server := startPgpKeyServer()
  68. defer func() {
  69. err := server.Shutdown(context.TODO())
  70. if err != nil {
  71. fmt.Fprintln(os.Stderr, err)
  72. }
  73. }()
  74. casetests := []struct {
  75. keys []string
  76. wantError bool
  77. }{
  78. // Single key, should succeed.
  79. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  80. {
  81. keys: []string{"C52048C0C0748FEE227D47A2702353E0F7E48EDB"},
  82. wantError: false,
  83. },
  84. // Two keys, should succeed as well.
  85. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  86. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  87. {
  88. keys: []string{"11E521D646982372EB577A1F8F0871F202119294",
  89. "B6C8F98282B944E3B0D5C2530FC3042E345AD05D"},
  90. wantError: false,
  91. },
  92. // Single invalid key, should fail.
  93. {
  94. keys: []string{"THIS-SHOULD-FAIL"},
  95. wantError: true,
  96. },
  97. // Two invalid keys, should fail.
  98. {
  99. keys: []string{"THIS-SHOULD-FAIL", "THIS-ONE-SHOULD-FAIL-TOO"},
  100. wantError: true,
  101. },
  102. // Invalid + valid key. Should fail as well.
  103. // 647F28654894E3BD457199BE38DBBDC86092693E: Greg Kroah-Hartman.
  104. {
  105. keys: []string{"THIS-SHOULD-FAIL",
  106. "647F28654894E3BD457199BE38DBBDC86092693E"},
  107. wantError: true,
  108. },
  109. }
  110. for _, tt := range casetests {
  111. err := importKeys(tt.keys)
  112. if !tt.wantError {
  113. if err != nil {
  114. t.Fatalf("Got error %q, want no error", err)
  115. }
  116. continue
  117. }
  118. // Here, we want to see the error.
  119. if err == nil {
  120. t.Fatalf("Got no error; want error")
  121. }
  122. }
  123. }
  124. func makeSrcinfo(pkgbase string, pgpkeys ...string) *gosrc.Srcinfo {
  125. srcinfo := gosrc.Srcinfo{}
  126. srcinfo.Pkgbase = pkgbase
  127. srcinfo.ValidPGPKeys = pgpkeys
  128. return &srcinfo
  129. }
  130. func TestCheckPgpKeys(t *testing.T) {
  131. keyringDir, err := ioutil.TempDir("/tmp", "yay-test-keyring")
  132. if err != nil {
  133. t.Fatalf("Unable to init test keyring: %v\n", err)
  134. }
  135. defer os.RemoveAll(keyringDir)
  136. config.GpgBin = "gpg"
  137. config.GpgFlags = fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir)
  138. server := startPgpKeyServer()
  139. defer func() {
  140. err := server.Shutdown(context.TODO())
  141. if err != nil {
  142. fmt.Fprintln(os.Stderr, err)
  143. }
  144. }()
  145. casetests := []struct {
  146. pkgs Base
  147. srcinfos map[string]*gosrc.Srcinfo
  148. wantError bool
  149. }{
  150. // cower: single package, one valid key not yet in the keyring.
  151. // 487EACC08557AD082088DABA1EB2638FF56C0C53: Dave Reisner.
  152. {
  153. pkgs: Base{newPkg("cower")},
  154. srcinfos: map[string]*gosrc.Srcinfo{"cower": makeSrcinfo("cower", "487EACC08557AD082088DABA1EB2638FF56C0C53")},
  155. wantError: false,
  156. },
  157. // libc++: single package, two valid keys not yet in the keyring.
  158. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  159. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  160. {
  161. pkgs: Base{newPkg("libc++")},
  162. srcinfos: map[string]*gosrc.Srcinfo{
  163. "libc++": makeSrcinfo("libc++", "11E521D646982372EB577A1F8F0871F202119294", "B6C8F98282B944E3B0D5C2530FC3042E345AD05D")},
  164. wantError: false,
  165. },
  166. // Two dummy packages requiring the same key.
  167. // ABAF11C65A2970B130ABE3C479BE3E4300411886: Linus Torvalds.
  168. {
  169. pkgs: Base{newPkg("dummy-1"), newPkg("dummy-2")},
  170. srcinfos: map[string]*gosrc.Srcinfo{
  171. "dummy-1": makeSrcinfo("dummy-1",
  172. "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  173. "dummy-2": makeSrcinfo("dummy-2", "ABAF11C65A2970B130ABE3C479BE3E4300411886")},
  174. wantError: false,
  175. },
  176. // dummy package: single package, two valid keys, one of them already
  177. // in the keyring.
  178. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  179. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  180. {
  181. pkgs: Base{newPkg("dummy-3")},
  182. srcinfos: map[string]*gosrc.Srcinfo{
  183. "dummy-3": makeSrcinfo("dummy-3", "11E521D646982372EB577A1F8F0871F202119294", "C52048C0C0748FEE227D47A2702353E0F7E48EDB")},
  184. wantError: false,
  185. },
  186. // Two dummy packages with existing keys.
  187. {
  188. pkgs: Base{newPkg("dummy-4"), newPkg("dummy-5")},
  189. srcinfos: map[string]*gosrc.Srcinfo{
  190. "dummy-4": makeSrcinfo("dummy-4", "11E521D646982372EB577A1F8F0871F202119294"),
  191. "dummy-5": makeSrcinfo("dummy-5", "C52048C0C0748FEE227D47A2702353E0F7E48EDB")},
  192. wantError: false,
  193. },
  194. // Dummy package with invalid key, should fail.
  195. {
  196. pkgs: Base{newPkg("dummy-7")},
  197. srcinfos: map[string]*gosrc.Srcinfo{"dummy-7": makeSrcinfo("dummy-7", "THIS-SHOULD-FAIL")},
  198. wantError: true,
  199. },
  200. // Dummy package with both an invalid an another valid key, should fail.
  201. // A314827C4E4250A204CE6E13284FC34C8E4B1A25: Thomas Bächler.
  202. {
  203. pkgs: Base{newPkg("dummy-8")},
  204. srcinfos: map[string]*gosrc.Srcinfo{"dummy-8": makeSrcinfo("dummy-8", "A314827C4E4250A204CE6E13284FC34C8E4B1A25", "THIS-SHOULD-FAIL")},
  205. wantError: true,
  206. },
  207. }
  208. for _, tt := range casetests {
  209. err := checkPgpKeys([]Base{tt.pkgs}, tt.srcinfos)
  210. if !tt.wantError {
  211. if err != nil {
  212. t.Fatalf("Got error %q, want no error", err)
  213. }
  214. continue
  215. }
  216. // Here, we want to see the error.
  217. if err == nil {
  218. t.Fatalf("Got no error; want error")
  219. }
  220. }
  221. }