Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
R
rekor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
SafSec
rekor
Commits
154235aa
Commit
154235aa
authored
4 years ago
by
Dan Lorenc
Browse files
Options
Downloads
Patches
Plain Diff
Store the whole cert.
Signed-off-by:
Dan Lorenc
<
dlorenc@google.com
>
parent
35e1104c
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
pkg/pki/x509/x509.go
+37
-14
37 additions, 14 deletions
pkg/pki/x509/x509.go
tests/e2e_test.go
+11
-4
11 additions, 4 deletions
tests/e2e_test.go
with
48 additions
and
18 deletions
pkg/pki/x509/x509.go
+
37
−
14
View file @
154235aa
...
@@ -69,7 +69,12 @@ func (s Signature) Verify(r io.Reader, k interface{}) error {
...
@@ -69,7 +69,12 @@ func (s Signature) Verify(r io.Reader, k interface{}) error {
return
fmt
.
Errorf
(
"Invalid public key type for: %v"
,
k
)
return
fmt
.
Errorf
(
"Invalid public key type for: %v"
,
k
)
}
}
switch
pub
:=
key
.
key
.
(
type
)
{
p
:=
key
.
key
if
p
==
nil
{
p
=
key
.
cert
.
c
.
PublicKey
}
switch
pub
:=
p
.
(
type
)
{
case
*
rsa
.
PublicKey
:
case
*
rsa
.
PublicKey
:
return
rsa
.
VerifyPKCS1v15
(
pub
,
crypto
.
SHA256
,
hash
,
s
.
signature
)
return
rsa
.
VerifyPKCS1v15
(
pub
,
crypto
.
SHA256
,
hash
,
s
.
signature
)
case
ed25519
.
PublicKey
:
case
ed25519
.
PublicKey
:
...
@@ -89,7 +94,13 @@ func (s Signature) Verify(r io.Reader, k interface{}) error {
...
@@ -89,7 +94,13 @@ func (s Signature) Verify(r io.Reader, k interface{}) error {
// PublicKey Public Key that follows the x509 standard
// PublicKey Public Key that follows the x509 standard
type
PublicKey
struct
{
type
PublicKey
struct
{
key
interface
{}
key
interface
{}
cert
*
cert
}
type
cert
struct
{
c
*
x509
.
Certificate
b
[]
byte
}
}
// NewPublicKey implements the pki.PublicKey interface
// NewPublicKey implements the pki.PublicKey interface
...
@@ -112,29 +123,41 @@ func NewPublicKey(r io.Reader) (*PublicKey, error) {
...
@@ -112,29 +123,41 @@ func NewPublicKey(r io.Reader) (*PublicKey, error) {
}
}
return
&
PublicKey
{
key
:
key
},
nil
return
&
PublicKey
{
key
:
key
},
nil
case
"CERTIFICATE"
:
case
"CERTIFICATE"
:
c
ert
,
err
:=
x509
.
ParseCertificate
(
block
.
Bytes
)
c
,
err
:=
x509
.
ParseCertificate
(
block
.
Bytes
)
if
err
!=
nil
{
if
err
!=
nil
{
return
nil
,
err
return
nil
,
err
}
}
return
&
PublicKey
{
key
:
cert
.
PublicKey
},
nil
return
&
PublicKey
{
cert
:
&
cert
{
c
:
c
,
b
:
block
.
Bytes
,
}},
nil
}
}
return
nil
,
fmt
.
Errorf
(
"invalid public key: %s"
,
string
(
rawPub
))
return
nil
,
fmt
.
Errorf
(
"invalid public key: %s"
,
string
(
rawPub
))
}
}
// CanonicalValue implements the pki.PublicKey interface
// CanonicalValue implements the pki.PublicKey interface
func
(
k
PublicKey
)
CanonicalValue
()
([]
byte
,
error
)
{
func
(
k
PublicKey
)
CanonicalValue
()
([]
byte
,
error
)
{
if
k
.
key
==
nil
{
return
nil
,
fmt
.
Errorf
(
"x509 public key has not been initialized"
)
}
b
,
err
:=
x509
.
MarshalPKIXPublicKey
(
k
.
key
)
var
p
pem
.
Block
if
err
!=
nil
{
switch
{
return
nil
,
err
case
k
.
key
!=
nil
:
}
b
,
err
:=
x509
.
MarshalPKIXPublicKey
(
k
.
key
)
if
err
!=
nil
{
return
nil
,
err
}
p
:=
pem
.
Block
{
p
=
pem
.
Block
{
Type
:
"PUBLIC KEY"
,
Type
:
"PUBLIC KEY"
,
Bytes
:
b
,
Bytes
:
b
,
}
case
k
.
cert
!=
nil
:
p
=
pem
.
Block
{
Type
:
"CERTIFICATE"
,
Bytes
:
k
.
cert
.
b
,
}
default
:
return
nil
,
fmt
.
Errorf
(
"x509 public key has not been initialized"
)
}
}
var
buf
bytes
.
Buffer
var
buf
bytes
.
Buffer
...
...
This diff is collapsed.
Click to expand it.
tests/e2e_test.go
+
11
−
4
View file @
154235aa
...
@@ -242,14 +242,18 @@ func TestX509(t *testing.T) {
...
@@ -242,14 +242,18 @@ func TestX509(t *testing.T) {
t
.
Fatal
(
err
)
t
.
Fatal
(
err
)
}
}
// If we do it twice, it should already exist
out
:=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
out
:=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
"--public-key"
,
certPath
,
"--pki-format"
,
"x509"
)
"--public-key"
,
certPath
,
"--pki-format"
,
"x509"
)
outputContains
(
t
,
out
,
"Created entry at"
)
outputContains
(
t
,
out
,
"Created entry at"
)
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
"--public-key"
,
certPath
,
"--pki-format"
,
"x509"
)
outputContains
(
t
,
out
,
"Entry already exists"
)
// Now upload with the public key rather than the cert. They should be deduped.
// Now upload with the public key rather than the cert. They should
NOT
be deduped.
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
"--public-key"
,
pubKeyPath
,
"--pki-format"
,
"x509"
)
"--public-key"
,
pubKeyPath
,
"--pki-format"
,
"x509"
)
outputContains
(
t
,
out
,
"
Entry already exists
"
)
outputContains
(
t
,
out
,
"
Created entry at
"
)
// Now let's go the other order to be sure. New artifact, key first then cert.
// Now let's go the other order to be sure. New artifact, key first then cert.
createdX509SignedArtifact
(
t
,
artifactPath
,
sigPath
)
createdX509SignedArtifact
(
t
,
artifactPath
,
sigPath
)
...
@@ -257,10 +261,13 @@ func TestX509(t *testing.T) {
...
@@ -257,10 +261,13 @@ func TestX509(t *testing.T) {
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
"--public-key"
,
pubKeyPath
,
"--pki-format"
,
"x509"
)
"--public-key"
,
pubKeyPath
,
"--pki-format"
,
"x509"
)
outputContains
(
t
,
out
,
"Created entry at"
)
outputContains
(
t
,
out
,
"Created entry at"
)
// This should already exist
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
"--public-key"
,
cert
Path
,
"--pki-format"
,
"x509"
)
"--public-key"
,
pubKey
Path
,
"--pki-format"
,
"x509"
)
outputContains
(
t
,
out
,
"Entry already exists"
)
outputContains
(
t
,
out
,
"Entry already exists"
)
// This should NOT already exist
out
=
runCli
(
t
,
"upload"
,
"--artifact"
,
artifactPath
,
"--signature"
,
sigPath
,
"--public-key"
,
certPath
,
"--pki-format"
,
"x509"
)
outputContains
(
t
,
out
,
"Created entry at"
)
}
}
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment