|
51 | 51 | ) |
52 | 52 |
|
53 | 53 | from securesystemslib.signer import ( |
54 | | - SSlibSigner |
| 54 | + SSlibSigner, |
| 55 | + Signature |
55 | 56 | ) |
56 | 57 |
|
57 | 58 | logger = logging.getLogger(__name__) |
@@ -333,6 +334,71 @@ def test_metadata_timestamp(self): |
333 | 334 | ) |
334 | 335 |
|
335 | 336 |
|
| 337 | + def test_metadata_verify_delegate(self): |
| 338 | + root_path = os.path.join(self.repo_dir, 'metadata', 'root.json') |
| 339 | + root = Metadata.from_file(root_path) |
| 340 | + snapshot_path = os.path.join( |
| 341 | + self.repo_dir, 'metadata', 'snapshot.json') |
| 342 | + snapshot = Metadata.from_file(snapshot_path) |
| 343 | + targets_path = os.path.join( |
| 344 | + self.repo_dir, 'metadata', 'targets.json') |
| 345 | + targets = Metadata.from_file(targets_path) |
| 346 | + role1_path = os.path.join( |
| 347 | + self.repo_dir, 'metadata', 'role1.json') |
| 348 | + role1 = Metadata.from_file(role1_path) |
| 349 | + role2_path = os.path.join( |
| 350 | + self.repo_dir, 'metadata', 'role2.json') |
| 351 | + role2 = Metadata.from_file(role2_path) |
| 352 | + |
| 353 | + # test the expected delegation tree |
| 354 | + root.verify_delegate('root', root) |
| 355 | + root.verify_delegate('snapshot', snapshot) |
| 356 | + root.verify_delegate('targets', targets) |
| 357 | + targets.verify_delegate('role1', role1) |
| 358 | + role1.verify_delegate('role2', role2) |
| 359 | + |
| 360 | + # only root and targets can verify delegates |
| 361 | + with self.assertRaises(TypeError): |
| 362 | + snapshot.verify_delegate('snapshot', snapshot) |
| 363 | + # verify fails for roles that are not delegated by delegator |
| 364 | + with self.assertRaises(ValueError): |
| 365 | + root.verify_delegate('role1', role1) |
| 366 | + with self.assertRaises(ValueError): |
| 367 | + targets.verify_delegate('targets', targets) |
| 368 | + # verify fails when delegator has no delegations |
| 369 | + with self.assertRaises(ValueError): |
| 370 | + role2.verify_delegate('role1', role1) |
| 371 | + |
| 372 | + # verify fails when delegate content is modified |
| 373 | + expires = snapshot.signed.expires |
| 374 | + snapshot.signed.bump_expiration() |
| 375 | + with self.assertRaises(exceptions.UnsignedMetadataError): |
| 376 | + root.verify_delegate('snapshot', snapshot) |
| 377 | + snapshot.signed.expires = expires |
| 378 | + |
| 379 | + # verify fails if roles keys do not sign the metadata |
| 380 | + with self.assertRaises(exceptions.UnsignedMetadataError): |
| 381 | + root.verify_delegate('timestamp', snapshot) |
| 382 | + |
| 383 | + # Add a key to snapshot role, make sure the new sig fails to verify |
| 384 | + ts_keyid = next(iter(root.signed.roles["timestamp"].keyids)) |
| 385 | + root.signed.add_key("snapshot", root.signed.keys[ts_keyid]) |
| 386 | + snapshot.signatures[ts_keyid] = Signature(ts_keyid, "ff"*64) |
| 387 | + |
| 388 | + # verify succeeds if threshold is reached even if some signatures |
| 389 | + # fail to verify |
| 390 | + root.verify_delegate('snapshot', snapshot) |
| 391 | + |
| 392 | + # verify fails if threshold of signatures is not reached |
| 393 | + root.signed.roles['snapshot'].threshold = 2 |
| 394 | + with self.assertRaises(exceptions.UnsignedMetadataError): |
| 395 | + root.verify_delegate('snapshot', snapshot) |
| 396 | + |
| 397 | + # verify succeeds when we correct the new signature and reach the |
| 398 | + # threshold of 2 keys |
| 399 | + snapshot.sign(SSlibSigner(self.keystore['timestamp']), append=True) |
| 400 | + root.verify_delegate('snapshot', snapshot) |
| 401 | + |
336 | 402 |
|
337 | 403 | def test_key_class(self): |
338 | 404 | keys = { |
|
0 commit comments