| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| #include "config.h" |
| |
| #include <gpgme.h> |
| #include "libglnx.h" |
| |
| #include "ostree-gpg-verify-result-private.h" |
| |
| #define assert_no_gpg_error(err, filename) \ |
| G_STMT_START { \ |
| if (err != GPG_ERR_NO_ERROR) { \ |
| g_autoptr(GString) string = g_string_new ("assertion failed "); \ |
| g_string_append_printf (string, "%s: %s ", gpgme_strsource (err), gpgme_strerror (err)); \ |
| g_string_append (string, filename ? filename : ""); \ |
| g_assertion_message (G_LOG_DOMAIN, __FILE__, __LINE__, G_STRFUNC, string->str); \ |
| } \ |
| } G_STMT_END |
| |
| #define assert_str_contains(s1, s2) \ |
| G_STMT_START { \ |
| const char *__s1 = (s1), *__s2 = (s2); \ |
| if (strstr (__s1, __s2) == NULL) { \ |
| g_autoptr(GString) string = g_string_new ("assertion failed (" #s1 " contains " #s2 "): "); \ |
| g_autofree char *__es1 = g_strescape (__s1, NULL); \ |
| g_autofree char *__es2 = g_strescape (__s2, NULL); \ |
| g_string_append_printf (string, "(\"%s\", \"%s\")", __es1, __es2); \ |
| g_assertion_message (G_LOG_DOMAIN, __FILE__, __LINE__, G_STRFUNC, string->str); \ |
| } \ |
| } G_STMT_END |
| |
| typedef struct { |
| OstreeGpgVerifyResult *result; |
| } TestFixture; |
| |
| static OstreeGpgSignatureAttr some_attributes[] = { |
| OSTREE_GPG_SIGNATURE_ATTR_VALID, |
| OSTREE_GPG_SIGNATURE_ATTR_SIG_EXPIRED, |
| OSTREE_GPG_SIGNATURE_ATTR_KEY_EXPIRED, |
| OSTREE_GPG_SIGNATURE_ATTR_KEY_REVOKED, |
| OSTREE_GPG_SIGNATURE_ATTR_KEY_MISSING, |
| OSTREE_GPG_SIGNATURE_ATTR_KEY_EXP_TIMESTAMP, |
| }; |
| |
| static void |
| test_fixture_setup (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| const char * const *sig_files = user_data; |
| gpgme_error_t gpg_error; |
| gpgme_data_t data_buffer; |
| gpgme_data_t signature_buffer; |
| OstreeGpgVerifyResult *result; |
| g_autofree char *homedir = NULL; |
| GError *local_error = NULL; |
| |
| |
| |
| |
| |
| |
| |
| homedir = g_test_build_filename (G_TEST_DIST, "tests/gpg-verify-data", NULL); |
| g_setenv ("GNUPGHOME", homedir, TRUE); |
| |
| result = g_initable_new (OSTREE_TYPE_GPG_VERIFY_RESULT, |
| NULL, &local_error, NULL); |
| g_assert_no_error (local_error); |
| |
| g_autofree char *data_filename = g_build_filename (homedir, "lgpl2", NULL); |
| gpg_error = gpgme_data_new_from_file (&data_buffer, data_filename, 1); |
| assert_no_gpg_error (gpg_error, data_filename); |
| |
| if (sig_files == NULL) |
| { |
| |
| g_autofree char *filename = g_build_filename (homedir, "lgpl2.sig", NULL); |
| gpg_error = gpgme_data_new_from_file (&signature_buffer, filename, 1); |
| assert_no_gpg_error (gpg_error, filename); |
| } |
| else |
| { |
| |
| gpg_error = gpgme_data_new (&signature_buffer); |
| assert_no_gpg_error (gpg_error, NULL); |
| |
| for (const char * const *name = sig_files; *name != NULL; name++) |
| { |
| g_autofree char *path = g_build_filename (homedir, *name, NULL); |
| g_autoptr(GFile) sig_file = g_file_new_for_path (path); |
| |
| g_autofree char *contents = NULL; |
| gsize len; |
| g_assert_true (g_file_load_contents (sig_file, NULL, &contents, |
| &len, NULL, &local_error)); |
| g_assert_no_error (local_error); |
| |
| char *cur = contents; |
| while (len > 0) |
| { |
| ssize_t written = gpgme_data_write (signature_buffer, cur, len); |
| if (written == -1) |
| assert_no_gpg_error (gpgme_error_from_syserror (), path); |
| cur += written; |
| len -= written; |
| } |
| } |
| |
| gpgme_data_seek (signature_buffer, 0, SEEK_SET); |
| } |
| |
| gpg_error = gpgme_op_verify (result->context, |
| signature_buffer, data_buffer, NULL); |
| assert_no_gpg_error (gpg_error, NULL); |
| |
| result->details = gpgme_op_verify_result (result->context); |
| gpgme_result_ref (result->details); |
| |
| gpgme_data_release (data_buffer); |
| gpgme_data_release (signature_buffer); |
| |
| fixture->result = result; |
| } |
| |
| static void |
| test_fixture_teardown (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| g_clear_object (&fixture->result); |
| } |
| |
| static void |
| test_check_counts (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| guint count_all; |
| guint count_valid; |
| |
| count_all = ostree_gpg_verify_result_count_all (fixture->result); |
| count_valid = ostree_gpg_verify_result_count_valid (fixture->result); |
| |
| g_assert_cmpint (count_all, ==, 5); |
| g_assert_cmpint (count_valid, ==, 1); |
| } |
| |
| static void |
| test_signature_lookup (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| |
| guint expected_signature_index = 2; |
| |
| |
| const char *fingerprint = "68dcc2db4bec5811c2573590bd9d2a44b7f541a6"; |
| |
| guint signature_index; |
| gboolean signature_found; |
| |
| |
| signature_index = 999999; |
| signature_found = ostree_gpg_verify_result_lookup (fixture->result, |
| fingerprint, |
| &signature_index); |
| g_assert_true (signature_found); |
| g_assert_cmpint (signature_index, ==, expected_signature_index); |
| |
| |
| signature_index = 999999; |
| signature_found = ostree_gpg_verify_result_lookup (fixture->result, |
| fingerprint + 32, |
| &signature_index); |
| g_assert_true (signature_found); |
| g_assert_cmpint (signature_index, ==, expected_signature_index); |
| |
| |
| signature_index = expected_signature_index = 999999; |
| fingerprint = "CAFEBABECAFEBABECAFEBABECAFEBABECAFEBABE"; |
| signature_found = ostree_gpg_verify_result_lookup (fixture->result, |
| fingerprint, |
| &signature_index); |
| g_assert_false (signature_found); |
| g_assert_cmpint (signature_index, ==, expected_signature_index); |
| } |
| |
| static void |
| test_attribute_basics (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| guint n_signatures, ii; |
| |
| n_signatures = ostree_gpg_verify_result_count_valid (fixture->result); |
| |
| for (ii = 0; ii < n_signatures; ii++) |
| { |
| g_autoptr(GVariant) tuple = NULL; |
| const char *attr_string; |
| const char *type_string; |
| gboolean key_missing; |
| |
| tuple = ostree_gpg_verify_result_get_all (fixture->result, ii); |
| |
| type_string = g_variant_get_type_string (tuple); |
| g_assert_cmpstr (type_string, ==, "(bbbbbsxxsssssxx)"); |
| |
| |
| |
| g_variant_get_child (tuple, |
| OSTREE_GPG_SIGNATURE_ATTR_PUBKEY_ALGO_NAME, |
| "&s", &attr_string); |
| g_assert_cmpstr (attr_string, ==, "RSA"); |
| |
| g_variant_get_child (tuple, |
| OSTREE_GPG_SIGNATURE_ATTR_HASH_ALGO_NAME, |
| "&s", &attr_string); |
| g_assert_cmpstr (attr_string, ==, "SHA1"); |
| |
| g_variant_get_child (tuple, |
| OSTREE_GPG_SIGNATURE_ATTR_KEY_MISSING, |
| "b", &key_missing); |
| |
| g_variant_get_child (tuple, |
| OSTREE_GPG_SIGNATURE_ATTR_USER_NAME, |
| "&s", &attr_string); |
| if (key_missing) |
| g_assert_cmpstr (attr_string, ==, "[unknown name]"); |
| else |
| g_assert_cmpstr (attr_string, ==, "J. Random User"); |
| |
| g_variant_get_child (tuple, |
| OSTREE_GPG_SIGNATURE_ATTR_USER_EMAIL, |
| "&s", &attr_string); |
| if (key_missing) |
| g_assert_cmpstr (attr_string, ==, "[unknown email]"); |
| else |
| g_assert_cmpstr (attr_string, ==, "testcase@redhat.com"); |
| } |
| } |
| |
| static void |
| test_valid_signature (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| guint signature_index = 0; |
| g_autoptr(GVariant) tuple = NULL; |
| gboolean valid; |
| gboolean sig_expired; |
| gboolean key_expired; |
| gboolean key_revoked; |
| gboolean key_missing; |
| gint64 key_exp_timestamp; |
| |
| tuple = ostree_gpg_verify_result_get (fixture->result, |
| signature_index, |
| some_attributes, |
| G_N_ELEMENTS (some_attributes)); |
| |
| g_variant_get (tuple, "(bbbbbx)", |
| &valid, |
| &sig_expired, |
| &key_expired, |
| &key_revoked, |
| &key_missing, |
| &key_exp_timestamp); |
| |
| g_assert_true (valid); |
| g_assert_false (sig_expired); |
| g_assert_false (key_expired); |
| g_assert_false (key_revoked); |
| g_assert_false (key_missing); |
| g_assert_cmpint (key_exp_timestamp, ==, 0); |
| } |
| |
| static void |
| test_expired_key (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| guint signature_index = 1; |
| g_autoptr(GVariant) tuple = NULL; |
| gboolean valid; |
| gboolean sig_expired; |
| gboolean key_expired; |
| gboolean key_revoked; |
| gboolean key_missing; |
| gint64 key_exp_timestamp; |
| |
| tuple = ostree_gpg_verify_result_get (fixture->result, |
| signature_index, |
| some_attributes, |
| G_N_ELEMENTS (some_attributes)); |
| |
| g_variant_get (tuple, "(bbbbbx)", |
| &valid, |
| &sig_expired, |
| &key_expired, |
| &key_revoked, |
| &key_missing, |
| &key_exp_timestamp); |
| |
| g_assert_false (valid); |
| g_assert_false (sig_expired); |
| g_assert_true (key_expired); |
| g_assert_false (key_revoked); |
| g_assert_false (key_missing); |
| g_assert_cmpint (key_exp_timestamp, ==, 1426782201); |
| } |
| |
| static void |
| test_revoked_key (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| guint signature_index = 2; |
| g_autoptr(GVariant) tuple = NULL; |
| gboolean valid; |
| gboolean sig_expired; |
| gboolean key_expired; |
| gboolean key_revoked; |
| gboolean key_missing; |
| gint64 key_exp_timestamp; |
| |
| tuple = ostree_gpg_verify_result_get (fixture->result, |
| signature_index, |
| some_attributes, |
| G_N_ELEMENTS (some_attributes)); |
| |
| g_variant_get (tuple, "(bbbbbx)", |
| &valid, |
| &sig_expired, |
| &key_expired, |
| &key_revoked, |
| &key_missing, |
| &key_exp_timestamp); |
| |
| g_assert_false (valid); |
| g_assert_false (sig_expired); |
| g_assert_false (key_expired); |
| g_assert_true (key_revoked); |
| g_assert_false (key_missing); |
| g_assert_cmpint (key_exp_timestamp, ==, 0); |
| } |
| |
| static void |
| test_missing_key (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| guint signature_index = 3; |
| g_autoptr(GVariant) tuple = NULL; |
| gboolean valid; |
| gboolean sig_expired; |
| gboolean key_expired; |
| gboolean key_revoked; |
| gboolean key_missing; |
| gint64 key_exp_timestamp; |
| |
| tuple = ostree_gpg_verify_result_get (fixture->result, |
| signature_index, |
| some_attributes, |
| G_N_ELEMENTS (some_attributes)); |
| |
| g_variant_get (tuple, "(bbbbbx)", |
| &valid, |
| &sig_expired, |
| &key_expired, |
| &key_revoked, |
| &key_missing, |
| &key_exp_timestamp); |
| |
| g_assert_false (valid); |
| g_assert_false (sig_expired); |
| g_assert_false (key_expired); |
| g_assert_false (key_revoked); |
| g_assert_true (key_missing); |
| g_assert_cmpint (key_exp_timestamp, ==, 0); |
| } |
| |
| static void |
| test_expired_signature (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| guint signature_index = 4; |
| g_autoptr(GVariant) tuple = NULL; |
| gboolean valid; |
| gboolean sig_expired; |
| gboolean key_expired; |
| gboolean key_revoked; |
| gboolean key_missing; |
| gint64 key_exp_timestamp; |
| |
| tuple = ostree_gpg_verify_result_get (fixture->result, |
| signature_index, |
| some_attributes, |
| G_N_ELEMENTS (some_attributes)); |
| |
| g_variant_get (tuple, "(bbbbbx)", |
| &valid, |
| &sig_expired, |
| &key_expired, |
| &key_revoked, |
| &key_missing, |
| &key_exp_timestamp); |
| |
| g_assert_false (valid); |
| g_assert_true (sig_expired); |
| g_assert_false (key_expired); |
| g_assert_false (key_revoked); |
| g_assert_false (key_missing); |
| g_assert_cmpint (key_exp_timestamp, ==, 0); |
| } |
| |
| static void |
| test_require_valid_signature (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| GError *error = NULL; |
| gboolean res = ostree_gpg_verify_result_require_valid_signature (fixture->result, |
| &error); |
| g_assert_true (res); |
| g_assert_no_error (error); |
| } |
| |
| static void |
| test_require_valid_signature_expired_key (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| GError *error = NULL; |
| gboolean res = ostree_gpg_verify_result_require_valid_signature (fixture->result, |
| &error); |
| g_assert_false (res); |
| g_assert_error (error, OSTREE_GPG_ERROR, OSTREE_GPG_ERROR_EXPIRED_KEY); |
| assert_str_contains (error->message, "Key expired"); |
| } |
| |
| static void |
| test_require_valid_signature_revoked_key (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| GError *error = NULL; |
| gboolean res = ostree_gpg_verify_result_require_valid_signature (fixture->result, |
| &error); |
| g_assert_false (res); |
| g_assert_error (error, OSTREE_GPG_ERROR, OSTREE_GPG_ERROR_REVOKED_KEY); |
| assert_str_contains (error->message, "Key revoked"); |
| } |
| |
| static void |
| test_require_valid_signature_missing_key (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| GError *error = NULL; |
| gboolean res = ostree_gpg_verify_result_require_valid_signature (fixture->result, |
| &error); |
| g_assert_false (res); |
| g_assert_error (error, OSTREE_GPG_ERROR, OSTREE_GPG_ERROR_MISSING_KEY); |
| assert_str_contains (error->message, "public key not found"); |
| } |
| |
| static void |
| test_require_valid_signature_expired_signature (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| GError *error = NULL; |
| gboolean res = ostree_gpg_verify_result_require_valid_signature (fixture->result, |
| &error); |
| g_assert_false (res); |
| g_assert_error (error, OSTREE_GPG_ERROR, OSTREE_GPG_ERROR_EXPIRED_SIGNATURE); |
| assert_str_contains (error->message, "Signature expired"); |
| } |
| |
| static void |
| test_require_valid_signature_expired_missing_key (TestFixture *fixture, |
| gconstpointer user_data) |
| { |
| GError *error = NULL; |
| gboolean res = ostree_gpg_verify_result_require_valid_signature (fixture->result, |
| &error); |
| g_assert_false (res); |
| |
| |
| |
| |
| |
| g_assert_error (error, OSTREE_GPG_ERROR, OSTREE_GPG_ERROR_MISSING_KEY); |
| assert_str_contains (error->message, "Key expired"); |
| assert_str_contains (error->message, "public key not found"); |
| } |
| |
| int |
| main (int argc, char **argv) |
| { |
| g_test_init (&argc, &argv, NULL); |
| |
| (void) gpgme_check_version (NULL); |
| |
| g_test_add ("/gpg-verify-result/check-counts", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_check_counts, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/signature-lookup", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_signature_lookup, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/attribute-basics", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_attribute_basics, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/valid-signature", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_valid_signature, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/expired-key", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_expired_key, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/revoked-key", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_revoked_key, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/missing-key", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_missing_key, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/expired-signature", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_expired_signature, |
| test_fixture_teardown); |
| |
| g_test_add ("/gpg-verify-result/require-valid-signature", |
| TestFixture, |
| NULL, |
| test_fixture_setup, |
| test_require_valid_signature, |
| test_fixture_teardown); |
| |
| const char *expired_key_files[] = { "lgpl2.sig1", NULL }; |
| g_test_add ("/gpg-verify-result/require-valid-signature-expired-key", |
| TestFixture, |
| expired_key_files, |
| test_fixture_setup, |
| test_require_valid_signature_expired_key, |
| test_fixture_teardown); |
| |
| const char *revoked_key_files[] = { "lgpl2.sig2", NULL }; |
| g_test_add ("/gpg-verify-result/require-valid-signature-revoked-key", |
| TestFixture, |
| revoked_key_files, |
| test_fixture_setup, |
| test_require_valid_signature_revoked_key, |
| test_fixture_teardown); |
| |
| const char *missing_key_files[] = { "lgpl2.sig3", NULL }; |
| g_test_add ("/gpg-verify-result/require-valid-signature-missing-key", |
| TestFixture, |
| missing_key_files, |
| test_fixture_setup, |
| test_require_valid_signature_missing_key, |
| test_fixture_teardown); |
| |
| const char *expired_signature_files[] = { "lgpl2.sig4", NULL }; |
| g_test_add ("/gpg-verify-result/require-valid-signature-expired-signature", |
| TestFixture, |
| expired_signature_files, |
| test_fixture_setup, |
| test_require_valid_signature_expired_signature, |
| test_fixture_teardown); |
| |
| const char *expired_missing_key_files[] = { "lgpl2.sig1", "lgpl2.sig3", NULL }; |
| g_test_add ("/gpg-verify-result/require-valid-signature-expired-missing-key", |
| TestFixture, |
| expired_missing_key_files, |
| test_fixture_setup, |
| test_require_valid_signature_expired_missing_key, |
| test_fixture_teardown); |
| |
| return g_test_run (); |
| } |