|
13 | 13 | import sys |
14 | 14 | import tempfile |
15 | 15 | import unittest |
16 | | -from copy import copy |
| 16 | +from copy import copy, deepcopy |
17 | 17 | from datetime import datetime, timedelta |
18 | 18 | from typing import Any, ClassVar, Dict, Optional |
19 | 19 |
|
|
41 | 41 | Metadata, |
42 | 42 | MetaFile, |
43 | 43 | Root, |
| 44 | + RootVerificationResult, |
44 | 45 | Signature, |
45 | 46 | Snapshot, |
46 | 47 | SuccinctRoles, |
|
55 | 56 | logger = logging.getLogger(__name__) |
56 | 57 |
|
57 | 58 |
|
58 | | -# pylint: disable=too-many-public-methods |
| 59 | +# pylint: disable=too-many-public-methods,too-many-statements |
59 | 60 | class TestMetadata(unittest.TestCase): |
60 | 61 | """Tests for public API of all classes in 'tuf/api/metadata.py'.""" |
61 | 62 |
|
@@ -471,95 +472,205 @@ def test_signed_verify_delegate(self) -> None: |
471 | 472 | Snapshot.type, snapshot_md.signed_bytes, snapshot_md.signatures |
472 | 473 | ) |
473 | 474 |
|
| 475 | + def test_verification_result(self) -> None: |
| 476 | + vr = VerificationResult(3, {"a": None}, {"b": None}) |
| 477 | + self.assertEqual(vr.missing, 2) |
| 478 | + self.assertFalse(vr.verified) |
| 479 | + self.assertFalse(vr) |
| 480 | + |
| 481 | + # Add a signature |
| 482 | + vr.signed["c"] = None |
| 483 | + self.assertEqual(vr.missing, 1) |
| 484 | + self.assertFalse(vr.verified) |
| 485 | + self.assertFalse(vr) |
| 486 | + |
| 487 | + # Add last missing signature |
| 488 | + vr.signed["d"] = None |
| 489 | + self.assertEqual(vr.missing, 0) |
| 490 | + self.assertTrue(vr.verified) |
| 491 | + self.assertTrue(vr) |
| 492 | + |
| 493 | + # Add one more signature |
| 494 | + vr.signed["e"] = None |
| 495 | + self.assertEqual(vr.missing, 0) |
| 496 | + self.assertTrue(vr.verified) |
| 497 | + self.assertTrue(vr) |
| 498 | + |
| 499 | + def test_root_verification_result(self) -> None: |
| 500 | + vr1 = VerificationResult(3, {"a": None}, {"b": None}) |
| 501 | + vr2 = VerificationResult(1, {"c": None}, {"b": None}) |
| 502 | + |
| 503 | + vr = RootVerificationResult(vr1, vr2) |
| 504 | + self.assertEqual(vr.signed, {"a": None, "c": None}) |
| 505 | + self.assertEqual(vr.unsigned, {"b": None}) |
| 506 | + self.assertFalse(vr.verified) |
| 507 | + self.assertFalse(vr) |
| 508 | + |
| 509 | + vr1.signed["c"] = None |
| 510 | + vr1.signed["f"] = None |
| 511 | + self.assertEqual(vr.signed, {"a": None, "c": None, "f": None}) |
| 512 | + self.assertEqual(vr.unsigned, {"b": None}) |
| 513 | + self.assertTrue(vr.verified) |
| 514 | + self.assertTrue(vr) |
| 515 | + |
474 | 516 | def test_signed_get_verification_result(self) -> None: |
475 | 517 | # Setup: Load test metadata and keys |
476 | 518 | root_path = os.path.join(self.repo_dir, "metadata", "root.json") |
477 | 519 | root = Metadata[Root].from_file(root_path) |
478 | | - initial_root_keyids = root.signed.roles[Root.type].keyids |
479 | | - self.assertEqual(len(initial_root_keyids), 1) |
480 | | - key1_id = initial_root_keyids[0] |
481 | | - key2 = self.keystore[Timestamp.type] |
482 | | - key2_id = key2["keyid"] |
| 520 | + |
| 521 | + key1_id = root.signed.roles[Root.type].keyids[0] |
| 522 | + key1 = root.signed.get_key(key1_id) |
| 523 | + |
| 524 | + key2_id = root.signed.roles[Timestamp.type].keyids[0] |
| 525 | + key2 = root.signed.get_key(key2_id) |
| 526 | + priv_key2 = self.keystore[Timestamp.type] |
| 527 | + |
483 | 528 | key3_id = "123456789abcdefg" |
484 | | - key4 = self.keystore[Snapshot.type] |
485 | | - key4_id = key4["keyid"] |
| 529 | + priv_key4 = self.keystore[Snapshot.type] |
| 530 | + key4_id = priv_key4["keyid"] |
486 | 531 |
|
487 | 532 | # Test: 1 authorized key, 1 valid signature |
488 | 533 | result = root.signed.get_verification_result( |
489 | 534 | Root.type, root.signed_bytes, root.signatures |
490 | 535 | ) |
491 | | - self.assertTrue(result.verified) |
492 | | - self.assertEqual(result.signed, {key1_id}) |
493 | | - self.assertEqual(result.unsigned, set()) |
| 536 | + self.assertTrue(result) |
| 537 | + self.assertEqual(result.signed, {key1_id: key1}) |
| 538 | + self.assertEqual(result.unsigned, {}) |
494 | 539 |
|
495 | 540 | # Test: 2 authorized keys, 1 invalid signature |
496 | 541 | # Adding a key, i.e. metadata change, invalidates existing signature |
497 | | - root.signed.add_key( |
498 | | - SSlibKey.from_securesystemslib_key(key2), |
499 | | - Root.type, |
500 | | - ) |
| 542 | + root.signed.add_key(key2, Root.type) |
501 | 543 | result = root.signed.get_verification_result( |
502 | 544 | Root.type, root.signed_bytes, root.signatures |
503 | 545 | ) |
504 | | - self.assertFalse(result.verified) |
505 | | - self.assertEqual(result.signed, set()) |
506 | | - self.assertEqual(result.unsigned, {key1_id, key2_id}) |
| 546 | + self.assertFalse(result) |
| 547 | + self.assertEqual(result.signed, {}) |
| 548 | + self.assertEqual(result.unsigned, {key1_id: key1, key2_id: key2}) |
507 | 549 |
|
508 | 550 | # Test: 3 authorized keys, 1 invalid signature, 1 key missing key data |
509 | | - # Adding a keyid w/o key, fails verification the same as no signature |
510 | | - # or an invalid signature for that key |
| 551 | + # Adding a keyid w/o key, fails verification but this key is not listed |
| 552 | + # in unsigned |
511 | 553 | root.signed.roles[Root.type].keyids.append(key3_id) |
512 | 554 | result = root.signed.get_verification_result( |
513 | 555 | Root.type, root.signed_bytes, root.signatures |
514 | 556 | ) |
515 | | - self.assertFalse(result.verified) |
516 | | - self.assertEqual(result.signed, set()) |
517 | | - self.assertEqual(result.unsigned, {key1_id, key2_id, key3_id}) |
| 557 | + self.assertFalse(result) |
| 558 | + self.assertEqual(result.signed, {}) |
| 559 | + self.assertEqual(result.unsigned, {key1_id: key1, key2_id: key2}) |
518 | 560 |
|
519 | 561 | # Test: 3 authorized keys, 1 valid signature, 1 invalid signature, 1 |
520 | 562 | # key missing key data |
521 | | - root.sign(SSlibSigner(key2), append=True) |
| 563 | + root.sign(SSlibSigner(priv_key2), append=True) |
522 | 564 | result = root.signed.get_verification_result( |
523 | 565 | Root.type, root.signed_bytes, root.signatures |
524 | 566 | ) |
525 | | - self.assertTrue(result.verified) |
526 | | - self.assertEqual(result.signed, {key2_id}) |
527 | | - self.assertEqual(result.unsigned, {key1_id, key3_id}) |
| 567 | + self.assertTrue(result) |
| 568 | + self.assertEqual(result.signed, {key2_id: key2}) |
| 569 | + self.assertEqual(result.unsigned, {key1_id: key1}) |
528 | 570 |
|
529 | 571 | # Test: 3 authorized keys, 1 valid signature, 1 invalid signature, 1 |
530 | 572 | # key missing key data, 1 ignored unrelated signature |
531 | | - root.sign(SSlibSigner(key4), append=True) |
| 573 | + root.sign(SSlibSigner(priv_key4), append=True) |
532 | 574 | self.assertEqual( |
533 | 575 | set(root.signatures.keys()), {key1_id, key2_id, key4_id} |
534 | 576 | ) |
535 | | - self.assertTrue(result.verified) |
536 | | - self.assertEqual(result.signed, {key2_id}) |
537 | | - self.assertEqual(result.unsigned, {key1_id, key3_id}) |
| 577 | + self.assertTrue(result) |
| 578 | + self.assertEqual(result.signed, {key2_id: key2}) |
| 579 | + self.assertEqual(result.unsigned, {key1_id: key1}) |
538 | 580 |
|
539 | 581 | # See test_signed_verify_delegate for more related tests ... |
540 | 582 |
|
541 | | - def test_signed_verification_result_union(self) -> None: |
542 | | - # Test all possible "unions" (AND) of "verified" field |
543 | | - data = [ |
544 | | - (True, True, True), |
545 | | - (True, False, False), |
546 | | - (False, True, False), |
547 | | - (False, False, False), |
548 | | - ] |
| 583 | + def test_root_get_root_verification_result(self) -> None: |
| 584 | + # Setup: Load test metadata and keys |
| 585 | + root_path = os.path.join(self.repo_dir, "metadata", "root.json") |
| 586 | + root = Metadata[Root].from_file(root_path) |
| 587 | + |
| 588 | + key1_id = root.signed.roles[Root.type].keyids[0] |
| 589 | + key1 = root.signed.get_key(key1_id) |
| 590 | + |
| 591 | + key2_id = root.signed.roles[Timestamp.type].keyids[0] |
| 592 | + key2 = root.signed.get_key(key2_id) |
| 593 | + priv_key2 = self.keystore[Timestamp.type] |
549 | 594 |
|
550 | | - for a_part, b_part, ab_part in data: |
551 | | - self.assertEqual( |
552 | | - VerificationResult(a_part, set(), set()).union( |
553 | | - VerificationResult(b_part, set(), set()) |
554 | | - ), |
555 | | - VerificationResult(ab_part, set(), set()), |
| 595 | + priv_key4 = self.keystore[Snapshot.type] |
| 596 | + |
| 597 | + # Test: Verify with no previous root version |
| 598 | + result = root.signed.get_root_verification_result( |
| 599 | + None, root.signed_bytes, root.signatures |
| 600 | + ) |
| 601 | + self.assertTrue(result) |
| 602 | + self.assertEqual(result.signed, {key1_id: key1}) |
| 603 | + self.assertEqual(result.unsigned, {}) |
| 604 | + |
| 605 | + # Test: Verify with other root that is not version N-1 |
| 606 | + prev_root: Metadata[Root] = deepcopy(root) |
| 607 | + with self.assertRaises(ValueError): |
| 608 | + result = root.signed.get_root_verification_result( |
| 609 | + prev_root.signed, root.signed_bytes, root.signatures |
556 | 610 | ) |
557 | 611 |
|
558 | | - # Test exemplary union (|) of "signed" and "unsigned" fields |
559 | | - a = VerificationResult(True, {"1"}, {"2"}) |
560 | | - b = VerificationResult(True, {"3"}, {"4"}) |
561 | | - ab = VerificationResult(True, {"1", "3"}, {"2", "4"}) |
562 | | - self.assertEqual(a.union(b), ab) |
| 612 | + # Test: Verify with previous root |
| 613 | + prev_root.signed.version -= 1 |
| 614 | + result = root.signed.get_root_verification_result( |
| 615 | + prev_root.signed, root.signed_bytes, root.signatures |
| 616 | + ) |
| 617 | + self.assertTrue(result) |
| 618 | + self.assertEqual(result.signed, {key1_id: key1}) |
| 619 | + self.assertEqual(result.unsigned, {}) |
| 620 | + |
| 621 | + # Test: Add a signer to previous root (threshold still 1) |
| 622 | + prev_root.signed.add_key(key2, Root.type) |
| 623 | + result = root.signed.get_root_verification_result( |
| 624 | + prev_root.signed, root.signed_bytes, root.signatures |
| 625 | + ) |
| 626 | + self.assertTrue(result) |
| 627 | + self.assertEqual(result.signed, {key1_id: key1}) |
| 628 | + self.assertEqual(result.unsigned, {key2_id: key2}) |
| 629 | + |
| 630 | + # Test: Increase threshold in previous root |
| 631 | + prev_root.signed.roles[Root.type].threshold += 1 |
| 632 | + result = root.signed.get_root_verification_result( |
| 633 | + prev_root.signed, root.signed_bytes, root.signatures |
| 634 | + ) |
| 635 | + self.assertFalse(result) |
| 636 | + self.assertEqual(result.signed, {key1_id: key1}) |
| 637 | + self.assertEqual(result.unsigned, {key2_id: key2}) |
| 638 | + |
| 639 | + # Test: Sign root with both keys |
| 640 | + root.sign(SSlibSigner(priv_key2), append=True) |
| 641 | + result = root.signed.get_root_verification_result( |
| 642 | + prev_root.signed, root.signed_bytes, root.signatures |
| 643 | + ) |
| 644 | + self.assertTrue(result) |
| 645 | + self.assertEqual(result.signed, {key1_id: key1, key2_id: key2}) |
| 646 | + self.assertEqual(result.unsigned, {}) |
| 647 | + |
| 648 | + # Test: Sign root with an unrelated key |
| 649 | + root.sign(SSlibSigner(priv_key4), append=True) |
| 650 | + result = root.signed.get_root_verification_result( |
| 651 | + prev_root.signed, root.signed_bytes, root.signatures |
| 652 | + ) |
| 653 | + self.assertTrue(result) |
| 654 | + self.assertEqual(result.signed, {key1_id: key1, key2_id: key2}) |
| 655 | + self.assertEqual(result.unsigned, {}) |
| 656 | + |
| 657 | + # Test: Remove key1 from previous root |
| 658 | + prev_root.signed.revoke_key(key1_id, Root.type) |
| 659 | + result = root.signed.get_root_verification_result( |
| 660 | + prev_root.signed, root.signed_bytes, root.signatures |
| 661 | + ) |
| 662 | + self.assertFalse(result) |
| 663 | + self.assertEqual(result.signed, {key1_id: key1, key2_id: key2}) |
| 664 | + self.assertEqual(result.unsigned, {}) |
| 665 | + |
| 666 | + # Test: Lower threshold in previous root |
| 667 | + prev_root.signed.roles[Root.type].threshold -= 1 |
| 668 | + result = root.signed.get_root_verification_result( |
| 669 | + prev_root.signed, root.signed_bytes, root.signatures |
| 670 | + ) |
| 671 | + self.assertTrue(result) |
| 672 | + self.assertEqual(result.signed, {key1_id: key1, key2_id: key2}) |
| 673 | + self.assertEqual(result.unsigned, {}) |
563 | 674 |
|
564 | 675 | def test_key_class(self) -> None: |
565 | 676 | # Test if from_securesystemslib_key removes the private key from keyval |
|
0 commit comments