| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485 | #!/bin/bash -x# vim: set tabstop=8 shiftwidth=4 softtabstop=4 expandtab smarttab colorcolumn=80:## Copyright (c) 2016 Red Hat, Inc.# Author: Nathaniel McCallum <npmccallum@redhat.com>## This program is free software: you can redistribute it and/or modify# it under the terms of the GNU General Public License as published by# the Free Software Foundation, either version 3 of the License, or# (at your option) any later version.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program.  If not, see <http://www.gnu.org/licenses/>.#function fetch() {    curl -sfg http://127.0.0.1:$PORT$1}function ver() {    jose jws ver -i- -k "$1"}function on_exit() {    if [ "$PID" ]; then kill $PID; wait $PID || true; fi    [ -d "$TMP" ] && rm -rf $TMP}trap 'on_exit' EXITtrap 'exit' ERRexport TMP=`mktemp -d`mkdir -p $TMP/dbtangd-keygen $TMP/db sig excjose jwk gen -i '{"alg": "ES512"}' -o $TMP/db/.sig.jwkjose jwk gen -i '{"alg": "ES512"}' -o $TMP/db/.oth.jwkexport PORT=`shuf -i 1024-65536 -n 1`$SD_ACTIVATE -l "127.0.0.1:$PORT" -a $VALGRIND tangd $TMP/db &export PID=$!sleep 0.5# Make sure requests on the root fail! fetch /# The request should fail (404) for non-signature key IDs! fetch /adv/`jose jwk thp -i $TMP/db/exc.jwk`! fetch /adv/`jose jwk thp -a S512 -i $TMP/db/exc.jwk`# The default advertisement fetch should succeed and pass verificationfetch /advfetch /adv | ver $TMP/db/sig.jwkfetch /adv/ | ver $TMP/db/sig.jwk# Fetching by any thumbprint should workfetch /adv/`jose jwk thp -i $TMP/db/sig.jwk` | ver $TMP/db/sig.jwkfetch /adv/`jose jwk thp -a S512 -i $TMP/db/sig.jwk` | ver $TMP/db/sig.jwk# Requesting an adv by an advertised key ID should't be signed by hidden keys! fetch /adv/`jose jwk thp -i $TMP/db/sig.jwk` | ver $TMP/db/.sig.jwk! fetch /adv/`jose jwk thp -i $TMP/db/sig.jwk` | ver $TMP/db/.oth.jwk# Verify that the default advertisement is not signed with hidden signature keys! fetch /adv/ | ver $TMP/db/.oth.jwk! fetch /adv/ | ver $TMP/db/.sig.jwk# A private key advertisement is signed by all advertised keys and the requested private keyfetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` | ver $TMP/db/sig.jwkfetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` | ver $TMP/db/.sig.jwk! fetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` | ver $TMP/db/.oth.jwk# Verify that the advertisements contain the cty parameterfetch /adv | jose fmt -j- -Og protected -SyOg cty -Sq "jwk-set+json" -Efetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` \    | jose fmt -j- -Og signatures -A \               -g 0 -Og protected -SyOg cty -Sq "jwk-set+json" -EUUUUU \               -g 1 -Og protected -SyOg cty -Sq "jwk-set+json" -EUUUUUtest "$(tang-show-keys $PORT)" == "$(jose jwk thp -i $TMP/db/sig.jwk)"
 |