зеркало из https://github.com/microsoft/git.git
ssh signing: make verify-tag consider key lifetime
Set the payload_type for check_signature() when calling verify-tag. Implements the same tests as for verify-commit. Signed-off-by: Fabian Stelzer <fs@gigacodes.de> Signed-off-by: Junio C Hamano <gitster@pobox.com>
This commit is contained in:
Родитель
4bbf3780ff
Коммит
dd3aa418aa
|
@ -48,6 +48,23 @@ test_expect_success GPGSSH 'create signed tags ssh' '
|
||||||
git tag -u"${GPGSSH_KEY_UNTRUSTED}" -m eighth eighth-signed-alt
|
git tag -u"${GPGSSH_KEY_UNTRUSTED}" -m eighth eighth-signed-alt
|
||||||
'
|
'
|
||||||
|
|
||||||
|
test_expect_success GPGSSH,GPGSSH_VERIFYTIME 'create signed tags with keys having defined lifetimes' '
|
||||||
|
test_when_finished "test_unconfig commit.gpgsign" &&
|
||||||
|
test_config gpg.format ssh &&
|
||||||
|
|
||||||
|
echo expired >file && test_tick && git commit -a -m expired -S"${GPGSSH_KEY_EXPIRED}" &&
|
||||||
|
git tag -s -u "${GPGSSH_KEY_EXPIRED}" -m expired-signed expired-signed &&
|
||||||
|
|
||||||
|
echo notyetvalid >file && test_tick && git commit -a -m notyetvalid -S"${GPGSSH_KEY_NOTYETVALID}" &&
|
||||||
|
git tag -s -u "${GPGSSH_KEY_NOTYETVALID}" -m notyetvalid-signed notyetvalid-signed &&
|
||||||
|
|
||||||
|
echo timeboxedvalid >file && test_tick && git commit -a -m timeboxedvalid -S"${GPGSSH_KEY_TIMEBOXEDVALID}" &&
|
||||||
|
git tag -s -u "${GPGSSH_KEY_TIMEBOXEDVALID}" -m timeboxedvalid-signed timeboxedvalid-signed &&
|
||||||
|
|
||||||
|
echo timeboxedinvalid >file && test_tick && git commit -a -m timeboxedinvalid -S"${GPGSSH_KEY_TIMEBOXEDINVALID}" &&
|
||||||
|
git tag -s -u "${GPGSSH_KEY_TIMEBOXEDINVALID}" -m timeboxedinvalid-signed timeboxedinvalid-signed
|
||||||
|
'
|
||||||
|
|
||||||
test_expect_success GPGSSH 'verify and show ssh signatures' '
|
test_expect_success GPGSSH 'verify and show ssh signatures' '
|
||||||
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
||||||
(
|
(
|
||||||
|
@ -80,6 +97,31 @@ test_expect_success GPGSSH 'verify and show ssh signatures' '
|
||||||
)
|
)
|
||||||
'
|
'
|
||||||
|
|
||||||
|
test_expect_success GPGSSH,GPGSSH_VERIFYTIME 'verify-tag exits failure on expired signature key' '
|
||||||
|
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
||||||
|
test_must_fail git verify-tag expired-signed 2>actual &&
|
||||||
|
! grep "${GPGSSH_GOOD_SIGNATURE_TRUSTED}" actual
|
||||||
|
'
|
||||||
|
|
||||||
|
test_expect_success GPGSSH,GPGSSH_VERIFYTIME 'verify-tag exits failure on not yet valid signature key' '
|
||||||
|
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
||||||
|
test_must_fail git verify-tag notyetvalid-signed 2>actual &&
|
||||||
|
! grep "${GPGSSH_GOOD_SIGNATURE_TRUSTED}" actual
|
||||||
|
'
|
||||||
|
|
||||||
|
test_expect_success GPGSSH,GPGSSH_VERIFYTIME 'verify-tag succeeds with tag date and key validity matching' '
|
||||||
|
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
||||||
|
git verify-tag timeboxedvalid-signed 2>actual &&
|
||||||
|
grep "${GPGSSH_GOOD_SIGNATURE_TRUSTED}" actual &&
|
||||||
|
! grep "${GPGSSH_BAD_SIGNATURE}" actual
|
||||||
|
'
|
||||||
|
|
||||||
|
test_expect_success GPGSSH,GPGSSH_VERIFYTIME 'verify-tag failes with tag date outside of key validity' '
|
||||||
|
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
||||||
|
test_must_fail git verify-tag timeboxedinvalid-signed 2>actual &&
|
||||||
|
! grep "${GPGSSH_GOOD_SIGNATURE_TRUSTED}" actual
|
||||||
|
'
|
||||||
|
|
||||||
test_expect_success GPGSSH 'detect fudged ssh signature' '
|
test_expect_success GPGSSH 'detect fudged ssh signature' '
|
||||||
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
test_config gpg.ssh.allowedSignersFile "${GPGSSH_ALLOWED_SIGNERS}" &&
|
||||||
git cat-file tag seventh-signed >raw &&
|
git cat-file tag seventh-signed >raw &&
|
||||||
|
|
1
tag.c
1
tag.c
|
@ -25,6 +25,7 @@ static int run_gpg_verify(const char *buf, unsigned long size, unsigned flags)
|
||||||
return error("no signature found");
|
return error("no signature found");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sigc.payload_type = SIGNATURE_PAYLOAD_TAG;
|
||||||
sigc.payload = strbuf_detach(&payload, &sigc.payload_len);
|
sigc.payload = strbuf_detach(&payload, &sigc.payload_len);
|
||||||
ret = check_signature(&sigc, signature.buf, signature.len);
|
ret = check_signature(&sigc, signature.buf, signature.len);
|
||||||
|
|
||||||
|
|
Загрузка…
Ссылка в новой задаче