Files
slsa-verifier/verifiers/internal/gha/bundle_test.go
Ramon Petgrave 4cd7d4802e chore: update go and golanci lint (#810)
This PR updates go to 1.23.1 and updates golanci-lint to v1.61.1, while
fixing new lint errors.

---------

Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
Signed-off-by: Ramon Petgrave <32398091+ramonpetgrave64@users.noreply.github.com>
2024-10-10 13:07:08 -04:00

337 lines
7.6 KiB
Go

package gha
import (
"context"
"encoding/base64"
"fmt"
"os"
"testing"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
dsselib "github.com/secure-systems-lab/go-securesystemslib/dsse"
rekorpbv1 "github.com/sigstore/protobuf-specs/gen/pb-go/rekor/v1"
serrors "github.com/slsa-framework/slsa-verifier/v2/errors"
"github.com/slsa-framework/slsa-verifier/v2/verifiers/utils"
)
func Test_verifyBundle(t *testing.T) {
t.Parallel()
ctx := context.Background()
trustedRoot, err := utils.GetSigstoreTrustedRoot()
if err != nil {
t.Fatal(err)
}
tests := []struct {
name string
path string
expected error
}{
{
name: "valid bundle",
path: "./testdata/bundle/valid.intoto.sigstore",
},
{
name: "mismatch rekor entry",
path: "./testdata/bundle/mismatch-tlog.intoto.sigstore",
expected: ErrorMismatchSignature,
},
{
name: "invalid Rekor SET",
path: "./testdata/bundle/invalid-set.intoto.sigstore",
expected: serrors.ErrorInvalidRekorEntry,
},
/* we hit the SET error before we can hit the invalid DSSE sig
{
name: "invalid DSSE sig",
path: "./testdata/bundle/invalid-dsse-sig.intoto.sigstore",
},
{
name: "invalid expiry with Rekor timestamp",
path: "./testdata/bundle/invalid-expiry-tlog.intoto.sigstore",
},
{
name: "invalid no DSSE",
path: "./testdata/bundle/invalid-no-dsse.intoto.sigstore",
},
{
name: "invalid no certificate",
path: "./testdata/bundle/invalid-no-cert.intoto.sigstore",
},
*/
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
t.Parallel()
content, err := os.ReadFile(tt.path)
if err != nil {
panic(fmt.Errorf("os.ReadFile: %w", err))
}
_, err = VerifyProvenanceBundle(ctx, content, trustedRoot)
if !errCmp(err, tt.expected) {
t.Error(cmp.Diff(err, tt.expected))
}
})
}
}
func Test_matchRekorEntryWithEnvelope(t *testing.T) {
t.Parallel()
goodDSSEV001Body := []byte(`
{
"apiVersion": "0.0.1",
"kind": "dsse",
"spec": {
"signatures": [
{
"signature": "MEUCIHiah7zQLL9LK9m9/0JH3rHIaYlvcus4h84KOdaR3iAlAiEAio+tnbpkW+V+FPYxpuiJBY0MuD43RVX5QmMwk3sgnUE="
}
]
}
}
`)
goodDSSEV001Sig := "MEUCIHiah7zQLL9LK9m9/0JH3rHIaYlvcus4h84KOdaR3iAlAiEAio+tnbpkW+V+FPYxpuiJBY0MuD43RVX5QmMwk3sgnUE="
goodIntotoV002Body := []byte(`
{
"apiVersion": "0.0.2",
"kind": "intoto",
"spec": {
"content": {
"envelope": {
"signatures": [
{
"publicKey": "mypubkey",
"sig": "TUVVQ0lRRGVoVlQ0MFRLUDNxWnlVN3BDcXhwMzRyeGt1Wk1ZRTVBWGhBb0x4NTdzdmdJZ0xSa3NCV1hPamUyMCtrKzh4M3ViZkZzNlpxQ2dLNXc3eXlITFB6SC9tcGs9"
}
]
}
}
}
}
`)
goodIntotoV001Sig := "MEUCIQDehVT40TKP3qZyU7pCqxp34rxkuZMYE5AXhAoLx57svgIgLRksBWXOje20+k+8x3ubfFs6ZqCgK5w7yyHLPzH/mpk="
tests := []struct {
name string
tlog *rekorpbv1.TransparencyLogEntry
env *dsselib.Envelope
err error
}{
{
name: "failure: no signtures in envelope",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "intoto",
Version: "0.0.2",
},
CanonicalizedBody: goodIntotoV002Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{},
},
err: ErrorNoSignatures,
},
{
name: "success: dsse v0.0.1",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "dsse",
Version: "0.0.1",
},
CanonicalizedBody: goodDSSEV001Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: goodDSSEV001Sig,
},
},
},
err: nil,
},
{
name: "success: intoto v0.0.2",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "intoto",
Version: "0.0.2",
},
CanonicalizedBody: goodIntotoV002Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: goodIntotoV001Sig,
},
},
},
err: nil,
},
{
name: "faiulure: dsse v0.0.1: mismatch signatures",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "dsse",
Version: "0.0.1",
},
CanonicalizedBody: goodDSSEV001Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
},
},
err: ErrorMismatchSignature,
},
{
name: "faiulure: dsse v0.0.1: unequal number of signatures",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "dsse",
Version: "0.0.1",
},
CanonicalizedBody: goodDSSEV001Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
{
Sig: base64.StdEncoding.EncodeToString([]byte("othersig")),
},
},
},
err: ErrorUnequalSignatures,
},
{
name: "faiulure: intoto v0.0.2: mismatch signatures",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "intoto",
Version: "0.0.2",
},
CanonicalizedBody: goodIntotoV002Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
{
Sig: base64.StdEncoding.EncodeToString([]byte("othersig")),
},
},
},
err: ErrorUnequalSignatures,
},
{
name: "failure: unknown type",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "slsa",
Version: "0.0.x",
},
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
},
},
err: ErrorUnexpectedEntryType,
},
{
name: "failure: unknown dsse type version",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "dsse",
Version: "0.0.x",
},
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
},
},
err: ErrorUnexpectedEntryType,
},
{
name: "failure: unknown intoto type version",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "dsse",
Version: "0.0.x",
},
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
},
},
err: ErrorUnexpectedEntryType,
},
{
name: "failure: parse error: dsse kind, intoto body",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "dsse",
Version: "0.0.1",
},
CanonicalizedBody: goodIntotoV002Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
},
},
err: ErrorParsingEntryBody,
},
{
name: "failure: parse error: intoto kind, dsse body",
tlog: &rekorpbv1.TransparencyLogEntry{
KindVersion: &rekorpbv1.KindVersion{
Kind: "intoto",
Version: "0.0.2",
},
CanonicalizedBody: goodDSSEV001Body,
},
env: &dsselib.Envelope{
Signatures: []dsselib.Signature{
{
Sig: base64.StdEncoding.EncodeToString([]byte("mysig")),
},
},
},
err: ErrorParsingEntryBody,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
t.Parallel()
err := matchRekorEntryWithEnvelope(tt.tlog, tt.env)
if errorDiff := cmp.Diff(tt.err, err, cmpopts.EquateErrors()); errorDiff != "" {
t.Errorf("unexpected error (-want +got):\n%s", errorDiff)
}
})
}
}