File: offline_test.go

package info (click to toggle)
gitsign 0.13.0-4
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 1,052 kB
  • sloc: makefile: 52; sh: 9
file content (65 lines) | stat: -rw-r--r-- 1,805 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
// Copyright 2023 The Sigstore Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//	http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

//go:build e2e
// +build e2e

package e2e

import (
	"context"
	"crypto/x509"
	"testing"

	"github.com/sigstore/gitsign/internal/fulcio/fulcioroots"
	"github.com/sigstore/gitsign/internal/git/gittest"
	"github.com/sigstore/gitsign/pkg/git"
	"github.com/sigstore/gitsign/pkg/rekor"
	"github.com/sigstore/sigstore/pkg/tuf"
)

func TestVerifyOffline(t *testing.T) {
	ctx := context.Background()

	// Initialize to prod root.
	tuf.Initialize(ctx, tuf.DefaultRemoteRoot, nil)
	root, intermediate, err := fulcioroots.New(x509.NewCertPool(), fulcioroots.FromTUF(ctx))
	if err != nil {
		t.Fatalf("error getting certificate root: %v", err)
	}

	client, err := rekor.New("https://rekor.sigstore.dev")
	if err != nil {
		t.Fatal(err)
	}

	commit := gittest.ParseCommit(t, "testdata/offline.commit")
	body := gittest.MarshalCommitBody(t, commit)
	sig := []byte(commit.PGPSignature)

	verifier, err := git.NewCertVerifier(git.WithRootPool(root), git.WithIntermediatePool(intermediate))
	if err != nil {
		t.Fatal(err)
	}

	cert, err := verifier.Verify(ctx, body, sig, true)
	if err != nil {
		t.Fatal(err)
	}
	tlog, err := client.VerifyInclusion(ctx, sig, cert)
	if err != nil {
		t.Fatal(err)
	}
	t.Log(*tlog.LogIndex)
}