| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687 | 
							- #!/bin/bash -x
 
- # vim: set tabstop=8 shiftwidth=4 softtabstop=4 expandtab smarttab colorcolumn=80:
 
- #
 
- # Copyright (c) 2016 Red Hat, Inc.
 
- # Author: Nathaniel McCallum <npmccallum@redhat.com>
 
- #
 
- # This program is free software: you can redistribute it and/or modify
 
- # it under the terms of the GNU General Public License as published by
 
- # the Free Software Foundation, either version 3 of the License, or
 
- # (at your option) any later version.
 
- #
 
- # This program is distributed in the hope that it will be useful,
 
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
 
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
- # GNU General Public License for more details.
 
- #
 
- # You should have received a copy of the GNU General Public License
 
- # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
- #
 
- function fetch() {
 
-     curl -sfg http://127.0.0.1:$PORT$1
 
- }
 
- function ver() {
 
-     jose jws ver -i- -k "$1"
 
- }
 
- function on_exit() {
 
-     if [ "$PID" ]; then kill $PID; wait $PID || true; fi
 
-     [ -d "$TMP" ] && rm -rf $TMP
 
- }
 
- trap 'on_exit' EXIT
 
- trap 'exit' ERR
 
- export TMP=`mktemp -d`
 
- mkdir -p $TMP/db
 
- mkdir -p $TMP/cache
 
- tangd-keygen $TMP/db sig exc
 
- jose jwk gen -i '{"alg": "ES512"}' -o $TMP/db/.sig.jwk
 
- jose jwk gen -i '{"alg": "ES512"}' -o $TMP/db/.oth.jwk
 
- tangd-update $TMP/db $TMP/cache
 
- export PORT=`shuf -i 1024-65536 -n 1`
 
- $SD_ACTIVATE -l "127.0.0.1:$PORT" -a $VALGRIND tangd $TMP/cache &
 
- export PID=$!
 
- sleep 0.5
 
- # Make sure requests on the root fail
 
- ! fetch /
 
- # The request should fail (404) for non-signature key IDs
 
- ! fetch /adv/`jose jwk thp -i $TMP/db/exc.jwk`
 
- ! fetch /adv/`jose jwk thp -a S512 -i $TMP/db/exc.jwk`
 
- # The default advertisement fetch should succeed and pass verification
 
- fetch /adv
 
- fetch /adv | ver $TMP/db/sig.jwk
 
- fetch /adv/ | ver $TMP/db/sig.jwk
 
- # Fetching by any thumbprint should work
 
- fetch /adv/`jose jwk thp -i $TMP/db/sig.jwk` | ver $TMP/db/sig.jwk
 
- fetch /adv/`jose jwk thp -a S512 -i $TMP/db/sig.jwk` | ver $TMP/db/sig.jwk
 
- # Requesting an adv by an advertised key ID should't be signed by hidden keys
 
- ! fetch /adv/`jose jwk thp -i $TMP/db/sig.jwk` | ver $TMP/db/.sig.jwk
 
- ! fetch /adv/`jose jwk thp -i $TMP/db/sig.jwk` | ver $TMP/db/.oth.jwk
 
- # Verify that the default advertisement is not signed with hidden signature keys
 
- ! fetch /adv/ | ver $TMP/db/.oth.jwk
 
- ! fetch /adv/ | ver $TMP/db/.sig.jwk
 
- # A private key advertisement is signed by all advertised keys and the requested private key
 
- fetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` | ver $TMP/db/sig.jwk
 
- fetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` | ver $TMP/db/.sig.jwk
 
- ! fetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` | ver $TMP/db/.oth.jwk
 
- # Verify that the advertisements contain the cty parameter
 
- fetch /adv | jose fmt -j- -Og protected -SyOg cty -Sq "jwk-set+json" -E
 
- fetch /adv/`jose jwk thp -i $TMP/db/.sig.jwk` \
 
-     | jose fmt -j- -Og signatures -A \
 
-                -g 0 -Og protected -SyOg cty -Sq "jwk-set+json" -EUUUUU \
 
-                -g 1 -Og protected -SyOg cty -Sq "jwk-set+json" -EUUUUU
 
- test $(tang-show-keys $PORT) == $(jose jwk thp -i $TMP/db/sig.jwk)
 
 
  |