summaryrefslogtreecommitdiff
path: root/tests/test-commit-sign-sh-ext.c
diff options
context:
space:
mode:
authorColin Walters <walters@verbum.org>2021-04-12 18:42:05 -0400
committerColin Walters <walters@verbum.org>2021-08-30 13:27:38 -0400
commit359435de843ce2a1e94941c24ec4ddd7d5a7bccb (patch)
treee1d745d1575c30526c7d5074a285703fe720bc45 /tests/test-commit-sign-sh-ext.c
parent30909a28f2aff54b615837a184f53509cbccc381 (diff)
downloadostree-359435de843ce2a1e94941c24ec4ddd7d5a7bccb.tar.gz
Add an API to verify a commit signature explicitly
We have a bunch of APIs to do GPG verification of a commit, but that doesn't generalize to signapi. Further, they require the caller to check the signature status explicitly which seems like a trap. This much higher level API works with both GPG and signapi. The intention is to use this in things that are doing "external pulls" like the ostree-ext tar import support. There we will get the commitmeta from the tarball and we want to verify it at the same time we import the commit.
Diffstat (limited to 'tests/test-commit-sign-sh-ext.c')
-rw-r--r--tests/test-commit-sign-sh-ext.c118
1 files changed, 118 insertions, 0 deletions
diff --git a/tests/test-commit-sign-sh-ext.c b/tests/test-commit-sign-sh-ext.c
new file mode 100644
index 00000000..b5c5dcc6
--- /dev/null
+++ b/tests/test-commit-sign-sh-ext.c
@@ -0,0 +1,118 @@
+/*
+ * Copyright (C) 2021 Red Hat, Inc.
+ *
+ * SPDX-License-Identifier: LGPL-2.0+
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, write to the
+ * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
+ * Boston, MA 02111-1307, USA.
+ */
+
+#include "config.h"
+
+#include "libglnx.h"
+#include <ostree.h>
+
+static void
+assert_error_contains (GError **error, const char *msg)
+{
+ g_assert (error != NULL);
+ GError *actual = *error;
+ g_assert (actual != NULL);
+ if (strstr (actual->message, msg) == NULL)
+ g_error ("%s does not contain %s", actual->message, msg);
+ g_clear_error (error);
+}
+
+// Perhaps in the future we hook this up to a fuzzer
+static GBytes *
+corrupt (GBytes *input)
+{
+ gsize len = 0;
+ const guint8 *buf = g_bytes_get_data (input, &len);
+ g_assert_cmpint (len, >, 0);
+ g_assert_cmpint (len, <, G_MAXINT);
+ g_autofree char *newbuf = g_memdup (buf, len);
+ int o = g_random_int_range (0, len);
+ newbuf[o] = (newbuf[0] + 1);
+
+ return g_bytes_new_take (g_steal_pointer (&newbuf), len);
+}
+
+static gboolean
+run (GError **error)
+{
+ g_autoptr(OstreeRepo) repo = ostree_repo_open_at (AT_FDCWD, "repo", NULL, error);
+ if (!repo)
+ return FALSE;
+
+ g_autofree char *rev = NULL;
+ if (!ostree_repo_resolve_rev (repo, "origin:main", FALSE, &rev, error))
+ return FALSE;
+ g_assert (rev);
+ g_autoptr(GVariant) commit = NULL;
+ if (!ostree_repo_load_variant (repo, OSTREE_OBJECT_TYPE_COMMIT, rev, &commit, error))
+ return FALSE;
+ g_assert (commit);
+
+ g_autoptr(GVariant) detached_meta = NULL;
+ if (!ostree_repo_read_commit_detached_metadata (repo, rev, &detached_meta, NULL, error))
+ return FALSE;
+ g_assert (detached_meta);
+
+ g_autoptr(GBytes) commit_bytes = g_variant_get_data_as_bytes (commit);
+ g_autoptr(GBytes) detached_meta_bytes = g_variant_get_data_as_bytes (detached_meta);
+ g_autofree char *verify_report = NULL;
+ if (!ostree_repo_signature_verify_commit_data (repo, "origin", commit_bytes, detached_meta_bytes, 0,
+ &verify_report, error))
+ return FALSE;
+
+ if (ostree_repo_signature_verify_commit_data (repo, "origin", commit_bytes, detached_meta_bytes,
+ OSTREE_REPO_VERIFY_FLAGS_NO_GPG | OSTREE_REPO_VERIFY_FLAGS_NO_SIGNAPI,
+ &verify_report, error))
+ g_error ("Should not have validated");
+ assert_error_contains (error, "No commit verification types enabled");
+
+ // No signatures
+ g_autoptr(GBytes) empty = g_bytes_new_static ("", 0);
+ if (ostree_repo_signature_verify_commit_data (repo, "origin", commit_bytes, empty, 0,
+ &verify_report, error))
+ g_error ("Should not have validated");
+ assert_error_contains (error, "no signatures found");
+ // No such remote
+ if (ostree_repo_signature_verify_commit_data (repo, "nosuchremote", commit_bytes, detached_meta_bytes, 0,
+ &verify_report, error))
+ g_error ("Should not have validated");
+ assert_error_contains (error, "Remote \"nosuchremote\" not found");
+
+ // Corrupted commit
+ g_autoptr(GBytes) corrupted_commit = corrupt (commit_bytes);
+ if (ostree_repo_signature_verify_commit_data (repo, "origin", corrupted_commit, detached_meta_bytes, 0,
+ &verify_report, error))
+ g_error ("Should not have validated");
+ assert_error_contains (error, "BAD signature");
+
+ return TRUE;
+}
+
+int
+main (int argc, char **argv)
+{
+ g_autoptr(GError) error = NULL;
+ if (!run (&error))
+ {
+ g_printerr ("error: %s\n", error->message);
+ exit (1);
+ }
+}