Skip to content
Snippets Groups Projects
Commit 154235aa authored by Dan Lorenc's avatar Dan Lorenc
Browse files

Store the whole cert.


Signed-off-by: default avatarDan Lorenc <dlorenc@google.com>
parent 35e1104c
No related branches found
No related tags found
No related merge requests found
...@@ -69,7 +69,12 @@ func (s Signature) Verify(r io.Reader, k interface{}) error { ...@@ -69,7 +69,12 @@ func (s Signature) Verify(r io.Reader, k interface{}) error {
return fmt.Errorf("Invalid public key type for: %v", k) return fmt.Errorf("Invalid public key type for: %v", k)
} }
switch pub := key.key.(type) { p := key.key
if p == nil {
p = key.cert.c.PublicKey
}
switch pub := p.(type) {
case *rsa.PublicKey: case *rsa.PublicKey:
return rsa.VerifyPKCS1v15(pub, crypto.SHA256, hash, s.signature) return rsa.VerifyPKCS1v15(pub, crypto.SHA256, hash, s.signature)
case ed25519.PublicKey: case ed25519.PublicKey:
...@@ -89,7 +94,13 @@ func (s Signature) Verify(r io.Reader, k interface{}) error { ...@@ -89,7 +94,13 @@ func (s Signature) Verify(r io.Reader, k interface{}) error {
// PublicKey Public Key that follows the x509 standard // PublicKey Public Key that follows the x509 standard
type PublicKey struct { type PublicKey struct {
key interface{} key interface{}
cert *cert
}
type cert struct {
c *x509.Certificate
b []byte
} }
// NewPublicKey implements the pki.PublicKey interface // NewPublicKey implements the pki.PublicKey interface
...@@ -112,29 +123,41 @@ func NewPublicKey(r io.Reader) (*PublicKey, error) { ...@@ -112,29 +123,41 @@ func NewPublicKey(r io.Reader) (*PublicKey, error) {
} }
return &PublicKey{key: key}, nil return &PublicKey{key: key}, nil
case "CERTIFICATE": case "CERTIFICATE":
cert, err := x509.ParseCertificate(block.Bytes) c, err := x509.ParseCertificate(block.Bytes)
if err != nil { if err != nil {
return nil, err return nil, err
} }
return &PublicKey{key: cert.PublicKey}, nil return &PublicKey{
cert: &cert{
c: c,
b: block.Bytes,
}}, nil
} }
return nil, fmt.Errorf("invalid public key: %s", string(rawPub)) return nil, fmt.Errorf("invalid public key: %s", string(rawPub))
} }
// CanonicalValue implements the pki.PublicKey interface // CanonicalValue implements the pki.PublicKey interface
func (k PublicKey) CanonicalValue() ([]byte, error) { func (k PublicKey) CanonicalValue() ([]byte, error) {
if k.key == nil {
return nil, fmt.Errorf("x509 public key has not been initialized")
}
b, err := x509.MarshalPKIXPublicKey(k.key) var p pem.Block
if err != nil { switch {
return nil, err case k.key != nil:
} b, err := x509.MarshalPKIXPublicKey(k.key)
if err != nil {
return nil, err
}
p := pem.Block{ p = pem.Block{
Type: "PUBLIC KEY", Type: "PUBLIC KEY",
Bytes: b, Bytes: b,
}
case k.cert != nil:
p = pem.Block{
Type: "CERTIFICATE",
Bytes: k.cert.b,
}
default:
return nil, fmt.Errorf("x509 public key has not been initialized")
} }
var buf bytes.Buffer var buf bytes.Buffer
......
...@@ -242,14 +242,18 @@ func TestX509(t *testing.T) { ...@@ -242,14 +242,18 @@ func TestX509(t *testing.T) {
t.Fatal(err) t.Fatal(err)
} }
// If we do it twice, it should already exist
out := runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath, out := runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath,
"--public-key", certPath, "--pki-format", "x509") "--public-key", certPath, "--pki-format", "x509")
outputContains(t, out, "Created entry at") outputContains(t, out, "Created entry at")
out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath,
"--public-key", certPath, "--pki-format", "x509")
outputContains(t, out, "Entry already exists")
// Now upload with the public key rather than the cert. They should be deduped. // Now upload with the public key rather than the cert. They should NOT be deduped.
out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath, out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath,
"--public-key", pubKeyPath, "--pki-format", "x509") "--public-key", pubKeyPath, "--pki-format", "x509")
outputContains(t, out, "Entry already exists") outputContains(t, out, "Created entry at")
// Now let's go the other order to be sure. New artifact, key first then cert. // Now let's go the other order to be sure. New artifact, key first then cert.
createdX509SignedArtifact(t, artifactPath, sigPath) createdX509SignedArtifact(t, artifactPath, sigPath)
...@@ -257,10 +261,13 @@ func TestX509(t *testing.T) { ...@@ -257,10 +261,13 @@ func TestX509(t *testing.T) {
out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath, out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath,
"--public-key", pubKeyPath, "--pki-format", "x509") "--public-key", pubKeyPath, "--pki-format", "x509")
outputContains(t, out, "Created entry at") outputContains(t, out, "Created entry at")
// This should already exist
out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath, out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath,
"--public-key", certPath, "--pki-format", "x509") "--public-key", pubKeyPath, "--pki-format", "x509")
outputContains(t, out, "Entry already exists") outputContains(t, out, "Entry already exists")
// This should NOT already exist
out = runCli(t, "upload", "--artifact", artifactPath, "--signature", sigPath,
"--public-key", certPath, "--pki-format", "x509")
outputContains(t, out, "Created entry at")
} }
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment