keys_test.go 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266
  1. package pgp
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "io"
  7. "net/http"
  8. "os"
  9. "path"
  10. "regexp"
  11. "sort"
  12. "strings"
  13. "testing"
  14. "time"
  15. aur "github.com/Jguer/aur"
  16. gosrc "github.com/Morganamilo/go-srcinfo"
  17. "github.com/bradleyjkemp/cupaloy"
  18. "github.com/Jguer/yay/v11/pkg/dep"
  19. )
  20. const (
  21. // The default port used by the PGP key server.
  22. gpgServerPort = 11371
  23. )
  24. func init() {
  25. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  26. regex := regexp.MustCompile(`search=0[xX]([a-fA-F0-9]+)`)
  27. matches := regex.FindStringSubmatch(r.RequestURI)
  28. data := ""
  29. if matches != nil {
  30. data = getPgpKey(matches[1])
  31. }
  32. w.Header().Set("Content-Type", "application/pgp-keys")
  33. _, err := w.Write([]byte(data))
  34. if err != nil {
  35. fmt.Fprintln(os.Stderr, err)
  36. }
  37. })
  38. }
  39. func newPkg(basename string) *aur.Pkg {
  40. return &aur.Pkg{Name: basename, PackageBase: basename}
  41. }
  42. func getPgpKey(key string) string {
  43. var buffer bytes.Buffer
  44. if contents, err := os.ReadFile(path.Join("testdata", key)); err == nil {
  45. buffer.WriteString("-----BEGIN PGP PUBLIC KEY BLOCK-----\n")
  46. buffer.WriteString("Version: SKS 1.1.6\n")
  47. buffer.WriteString("Comment: Hostname: yay\n\n")
  48. buffer.Write(contents)
  49. buffer.WriteString("\n-----END PGP PUBLIC KEY BLOCK-----\n")
  50. }
  51. return buffer.String()
  52. }
  53. func startPgpKeyServer() *http.Server {
  54. srv := &http.Server{Addr: fmt.Sprintf("127.0.0.1:%d", gpgServerPort), ReadHeaderTimeout: 1 * time.Second}
  55. go func() {
  56. err := srv.ListenAndServe()
  57. if err != nil {
  58. fmt.Fprintln(os.Stderr, err)
  59. }
  60. }()
  61. return srv
  62. }
  63. func TestImportKeys(t *testing.T) {
  64. keyringDir := t.TempDir()
  65. server := startPgpKeyServer()
  66. defer func() {
  67. err := server.Shutdown(context.TODO())
  68. if err != nil {
  69. fmt.Fprintln(os.Stderr, err)
  70. }
  71. }()
  72. casetests := []struct {
  73. keys []string
  74. wantError bool
  75. }{
  76. // Single key, should succeed.
  77. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  78. {
  79. keys: []string{"C52048C0C0748FEE227D47A2702353E0F7E48EDB"},
  80. wantError: false,
  81. },
  82. // Two keys, should succeed as well.
  83. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  84. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  85. {
  86. keys: []string{
  87. "11E521D646982372EB577A1F8F0871F202119294",
  88. "B6C8F98282B944E3B0D5C2530FC3042E345AD05D",
  89. },
  90. wantError: false,
  91. },
  92. // Single invalid key, should fail.
  93. {
  94. keys: []string{"THIS-SHOULD-FAIL"},
  95. wantError: true,
  96. },
  97. // Two invalid keys, should fail.
  98. {
  99. keys: []string{"THIS-SHOULD-FAIL", "THIS-ONE-SHOULD-FAIL-TOO"},
  100. wantError: true,
  101. },
  102. // Invalid + valid key. Should fail as well.
  103. // 647F28654894E3BD457199BE38DBBDC86092693E: Greg Kroah-Hartman.
  104. {
  105. keys: []string{
  106. "THIS-SHOULD-FAIL",
  107. "647F28654894E3BD457199BE38DBBDC86092693E",
  108. },
  109. wantError: true,
  110. },
  111. }
  112. for _, tt := range casetests {
  113. err := importKeys(tt.keys, "gpg", fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir))
  114. if !tt.wantError {
  115. if err != nil {
  116. t.Fatalf("Got error %q, want no error", err)
  117. }
  118. continue
  119. }
  120. // Here, we want to see the error.
  121. if err == nil {
  122. t.Fatalf("Got no error; want error")
  123. }
  124. }
  125. }
  126. func makeSrcinfo(pkgbase string, pgpkeys ...string) *gosrc.Srcinfo {
  127. srcinfo := gosrc.Srcinfo{}
  128. srcinfo.Pkgbase = pkgbase
  129. srcinfo.ValidPGPKeys = pgpkeys
  130. return &srcinfo
  131. }
  132. func TestCheckPgpKeys(t *testing.T) {
  133. keyringDir := t.TempDir()
  134. server := startPgpKeyServer()
  135. defer func() {
  136. err := server.Shutdown(context.TODO())
  137. if err != nil {
  138. fmt.Fprintln(os.Stderr, err)
  139. }
  140. }()
  141. casetests := []struct {
  142. name string
  143. pkgs dep.Base
  144. srcinfos map[string]*gosrc.Srcinfo
  145. wantError bool
  146. }{
  147. // cower: single package, one valid key not yet in the keyring.
  148. // 487EACC08557AD082088DABA1EB2638FF56C0C53: Dave Reisner.
  149. {
  150. name: " one valid key not yet in the keyring",
  151. pkgs: dep.Base{newPkg("cower")},
  152. srcinfos: map[string]*gosrc.Srcinfo{"cower": makeSrcinfo("cower", "487EACC08557AD082088DABA1EB2638FF56C0C53")},
  153. wantError: false,
  154. },
  155. // libc++: single package, two valid keys not yet in the keyring.
  156. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  157. // B6C8F98282B944E3B0D5C2530FC3042E345AD05D: Hans Wennborg.
  158. {
  159. name: "two valid keys not yet in the keyring",
  160. pkgs: dep.Base{newPkg("libc++")},
  161. srcinfos: map[string]*gosrc.Srcinfo{
  162. "libc++": makeSrcinfo("libc++", "11E521D646982372EB577A1F8F0871F202119294", "B6C8F98282B944E3B0D5C2530FC3042E345AD05D"),
  163. },
  164. wantError: false,
  165. },
  166. // Two dummy packages requiring the same key.
  167. // ABAF11C65A2970B130ABE3C479BE3E4300411886: Linus Torvalds.
  168. {
  169. name: "Two dummy packages requiring the same key",
  170. pkgs: dep.Base{newPkg("dummy-1"), newPkg("dummy-2")},
  171. srcinfos: map[string]*gosrc.Srcinfo{
  172. "dummy-1": makeSrcinfo("dummy-1",
  173. "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  174. "dummy-2": makeSrcinfo("dummy-2", "ABAF11C65A2970B130ABE3C479BE3E4300411886"),
  175. },
  176. wantError: false,
  177. },
  178. // dummy package: single package, two valid keys, one of them already
  179. // in the keyring.
  180. // 11E521D646982372EB577A1F8F0871F202119294: Tom Stellard.
  181. // C52048C0C0748FEE227D47A2702353E0F7E48EDB: Thomas Dickey.
  182. {
  183. name: "one already in keyring",
  184. pkgs: dep.Base{newPkg("dummy-3")},
  185. srcinfos: map[string]*gosrc.Srcinfo{
  186. "dummy-3": makeSrcinfo("dummy-3", "11E521D646982372EB577A1F8F0871F202119294", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  187. },
  188. wantError: false,
  189. },
  190. // Two dummy packages with existing keys.
  191. {
  192. name: "two existing",
  193. pkgs: dep.Base{newPkg("dummy-4"), newPkg("dummy-5")},
  194. srcinfos: map[string]*gosrc.Srcinfo{
  195. "dummy-4": makeSrcinfo("dummy-4", "11E521D646982372EB577A1F8F0871F202119294"),
  196. "dummy-5": makeSrcinfo("dummy-5", "C52048C0C0748FEE227D47A2702353E0F7E48EDB"),
  197. },
  198. wantError: false,
  199. },
  200. // Dummy package with invalid key, should fail.
  201. {
  202. name: "one invalid",
  203. pkgs: dep.Base{newPkg("dummy-7")},
  204. srcinfos: map[string]*gosrc.Srcinfo{"dummy-7": makeSrcinfo("dummy-7", "THIS-SHOULD-FAIL")},
  205. wantError: true,
  206. },
  207. // Dummy package with both an invalid an another valid key, should fail.
  208. // A314827C4E4250A204CE6E13284FC34C8E4B1A25: Thomas Bächler.
  209. {
  210. name: "one invalid, one valid",
  211. pkgs: dep.Base{newPkg("dummy-8")},
  212. srcinfos: map[string]*gosrc.Srcinfo{"dummy-8": makeSrcinfo("dummy-8", "A314827C4E4250A204CE6E13284FC34C8E4B1A25", "THIS-SHOULD-FAIL")},
  213. wantError: true,
  214. },
  215. }
  216. for _, tt := range casetests {
  217. tt := tt
  218. t.Run(tt.name, func(t *testing.T) {
  219. rescueStdout := os.Stdout
  220. r, w, _ := os.Pipe()
  221. os.Stdout = w
  222. err := CheckPgpKeys([]dep.Base{tt.pkgs}, tt.srcinfos, "gpg",
  223. fmt.Sprintf("--homedir %s --keyserver 127.0.0.1", keyringDir), true)
  224. if !tt.wantError {
  225. if err != nil {
  226. t.Fatalf("Got error %q, want no error", err)
  227. }
  228. w.Close()
  229. out, _ := io.ReadAll(r)
  230. os.Stdout = rescueStdout
  231. splitLines := strings.Split(string(out), "\n")
  232. sort.Strings(splitLines)
  233. cupaloy.SnapshotT(t, strings.Join(splitLines, "\n"))
  234. return
  235. }
  236. // Here, we want to see the error.
  237. if err == nil {
  238. t.Fatalf("Got no error; want error")
  239. }
  240. })
  241. }
  242. }