1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98
|
// Copyright 2024 The Sigstore Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//go:build e2e && kms
package test
import (
"context"
"os"
"path"
"testing"
"github.com/sigstore/cosign/v2/cmd/cosign/cli/generate"
"github.com/sigstore/cosign/v2/cmd/cosign/cli/options"
"github.com/sigstore/cosign/v2/cmd/cosign/cli/sign"
"github.com/sigstore/cosign/v2/pkg/cosign/env"
_ "github.com/sigstore/sigstore/pkg/signature/kms/hashivault"
)
const (
rekorURLVar = "REKOR_URL"
testKMSVar = "TEST_KMS"
defaultKMS = "hashivault://transit"
)
func TestSecretsKMS(t *testing.T) {
ctx := context.Background()
repo, stop := reg(t)
defer stop()
td := t.TempDir()
imgName := path.Join(repo, "cosign-kms-e2e")
_, _, cleanup := mkimage(t, imgName)
defer cleanup()
kms := os.Getenv(testKMSVar)
if kms == "" {
kms = defaultKMS
}
prefix := path.Join(td, "test-kms")
must(generate.GenerateKeyPairCmd(ctx, kms, prefix, nil), t)
pubKey := prefix + ".pub"
privKey := kms
// Verify should fail at first
mustErr(verify(pubKey, imgName, true, nil, "", false), t)
rekorURL := os.Getenv(rekorURLVar)
must(downloadAndSetEnv(t, rekorURL+"/api/v1/log/publicKey", env.VariableSigstoreRekorPublicKey.String(), td), t)
// Now sign and verify with the KMS key
ko := options.KeyOpts{
KeyRef: privKey,
RekorURL: rekorURL,
SkipConfirmation: true,
}
so := options.SignOptions{
Upload: true,
TlogUpload: true,
}
must(sign.SignCmd(ro, ko, so, []string{imgName}), t)
must(verify(pubKey, imgName, true, nil, "", false), t)
// Sign and verify with annotations
mustErr(verify(pubKey, imgName, true, map[string]any{"foo": "bar"}, "", false), t)
soAnno := options.SignOptions{
Upload: true,
TlogUpload: true,
AnnotationOptions: options.AnnotationOptions{
Annotations: []string{"foo=bar"},
},
}
must(sign.SignCmd(ro, ko, soAnno, []string{imgName}), t)
must(verify(pubKey, imgName, true, map[string]any{"foo": "bar"}, "", false), t)
// Store signatures in a different repo
t.Setenv("COSIGN_REPOSITORY", path.Join(repo, "subbedrepo"))
must(sign.SignCmd(ro, ko, so, []string{imgName}), t)
must(verify(pubKey, imgName, true, nil, "", false), t)
os.Unsetenv("COSIGN_REPOSITORY")
}
|