mirror of
https://github.com/google/nomulus.git
synced 2025-05-09 08:18:21 +02:00
A fake Keyring implementation is needed to test Keyring related tools now, so I've refactored the fake RdeKeyring to support all Keyring API methods and moved it to the common testing package. ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=149977968
194 lines
7.7 KiB
Java
194 lines
7.7 KiB
Java
// Copyright 2017 The Nomulus Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package google.registry.rde;
|
|
|
|
import static com.google.common.truth.Truth.assertThat;
|
|
import static com.google.common.truth.Truth.assertWithMessage;
|
|
import static google.registry.testing.GcsTestingUtils.readGcsFile;
|
|
import static google.registry.testing.SystemInfo.hasCommand;
|
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
|
import static org.joda.time.DateTimeZone.UTC;
|
|
import static org.junit.Assume.assumeTrue;
|
|
|
|
import com.google.appengine.tools.cloudstorage.GcsFilename;
|
|
import com.google.appengine.tools.cloudstorage.GcsService;
|
|
import com.google.appengine.tools.cloudstorage.GcsServiceFactory;
|
|
import com.google.common.io.ByteSource;
|
|
import com.google.common.io.CharStreams;
|
|
import com.google.common.io.Files;
|
|
import google.registry.gcs.GcsUtils;
|
|
import google.registry.keyring.api.Keyring;
|
|
import google.registry.testing.AppEngineRule;
|
|
import google.registry.testing.BouncyCastleProviderRule;
|
|
import google.registry.testing.FakeKeyringModule;
|
|
import google.registry.testing.GcsTestingUtils;
|
|
import google.registry.testing.GpgSystemCommandRule;
|
|
import google.registry.testing.Providers;
|
|
import google.registry.testing.ShardableTestCase;
|
|
import java.io.File;
|
|
import java.io.FileNotFoundException;
|
|
import java.io.IOException;
|
|
import java.io.InputStream;
|
|
import java.io.InputStreamReader;
|
|
import org.bouncycastle.openpgp.PGPKeyPair;
|
|
import org.bouncycastle.openpgp.PGPPrivateKey;
|
|
import org.bouncycastle.openpgp.PGPPublicKey;
|
|
import org.joda.time.DateTime;
|
|
import org.junit.Before;
|
|
import org.junit.BeforeClass;
|
|
import org.junit.Rule;
|
|
import org.junit.Test;
|
|
import org.junit.runner.RunWith;
|
|
import org.junit.runners.JUnit4;
|
|
|
|
/** Unit tests for {@link BrdaCopyAction}. */
|
|
@RunWith(JUnit4.class)
|
|
public class BrdaCopyActionTest extends ShardableTestCase {
|
|
|
|
private static final ByteSource DEPOSIT_XML = RdeTestData.get("deposit_full.xml"); // 2010-10-17
|
|
|
|
private static final GcsFilename STAGE_FILE =
|
|
new GcsFilename("keg", "lol_2010-10-17_thin_S1_R0.xml.ghostryde");
|
|
private static final GcsFilename STAGE_LENGTH_FILE =
|
|
new GcsFilename("keg", "lol_2010-10-17_thin_S1_R0.xml.length");
|
|
private static final GcsFilename RYDE_FILE =
|
|
new GcsFilename("tub", "lol_2010-10-17_thin_S1_R0.ryde");
|
|
private static final GcsFilename SIG_FILE =
|
|
new GcsFilename("tub", "lol_2010-10-17_thin_S1_R0.sig");
|
|
|
|
@Rule
|
|
public final BouncyCastleProviderRule bouncy = new BouncyCastleProviderRule();
|
|
|
|
@Rule
|
|
public final AppEngineRule appEngine = AppEngineRule.builder()
|
|
.withDatastore()
|
|
.build();
|
|
|
|
@Rule
|
|
public final GpgSystemCommandRule gpg = new GpgSystemCommandRule(
|
|
RdeTestData.get("pgp-public-keyring.asc"),
|
|
RdeTestData.get("pgp-private-keyring-escrow.asc"));
|
|
|
|
private static PGPPublicKey encryptKey;
|
|
private static PGPPrivateKey decryptKey;
|
|
private static PGPPublicKey receiverKey;
|
|
private static PGPKeyPair signingKey;
|
|
|
|
@BeforeClass
|
|
public static void beforeClass() {
|
|
try (Keyring keyring = new FakeKeyringModule().get()) {
|
|
encryptKey = keyring.getRdeStagingEncryptionKey();
|
|
decryptKey = keyring.getRdeStagingDecryptionKey();
|
|
receiverKey = keyring.getRdeReceiverKey();
|
|
signingKey = keyring.getRdeSigningKey();
|
|
}
|
|
}
|
|
|
|
private final GcsService gcsService = GcsServiceFactory.createGcsService();
|
|
private final GcsUtils gcsUtils = new GcsUtils(gcsService, 1024);
|
|
private final BrdaCopyAction action = new BrdaCopyAction();
|
|
|
|
@Before
|
|
public void before() throws Exception {
|
|
action.gcsUtils = gcsUtils;
|
|
action.ghostryde = new Ghostryde(23);
|
|
action.pgpCompressionFactory = new RydePgpCompressionOutputStreamFactory(Providers.of(1024));
|
|
action.pgpEncryptionFactory = new RydePgpEncryptionOutputStreamFactory(Providers.of(1024));
|
|
action.pgpFileFactory = new RydePgpFileOutputStreamFactory(Providers.of(1024));
|
|
action.pgpSigningFactory = new RydePgpSigningOutputStreamFactory();
|
|
action.tarFactory = new RydeTarOutputStreamFactory();
|
|
action.tld = "lol";
|
|
action.watermark = DateTime.parse("2010-10-17TZ");
|
|
action.brdaBucket = "tub";
|
|
action.stagingBucket = "keg";
|
|
action.receiverKey = receiverKey;
|
|
action.signingKey = signingKey;
|
|
action.stagingDecryptionKey = decryptKey;
|
|
|
|
byte[] xml = DEPOSIT_XML.read();
|
|
GcsTestingUtils.writeGcsFile(gcsService, STAGE_FILE,
|
|
Ghostryde.encode(xml, encryptKey, "lobster.xml", new DateTime(UTC)));
|
|
GcsTestingUtils.writeGcsFile(gcsService, STAGE_LENGTH_FILE,
|
|
Long.toString(xml.length).getBytes(UTF_8));
|
|
}
|
|
|
|
@Test
|
|
public void testRun() throws Exception {
|
|
action.run();
|
|
assertThat(gcsUtils.existsAndNotEmpty(STAGE_FILE)).isTrue();
|
|
assertThat(gcsUtils.existsAndNotEmpty(RYDE_FILE)).isTrue();
|
|
assertThat(gcsUtils.existsAndNotEmpty(SIG_FILE)).isTrue();
|
|
}
|
|
|
|
@Test
|
|
public void testRun_rydeFormat() throws Exception {
|
|
assumeTrue(hasCommand("gpg --version"));
|
|
action.run();
|
|
|
|
File rydeTmp = new File(gpg.getCwd(), "ryde");
|
|
Files.write(readGcsFile(gcsService, RYDE_FILE), rydeTmp);
|
|
|
|
Process pid = gpg.exec("gpg", "--list-packets", rydeTmp.toString());
|
|
String stdout = slurp(pid.getInputStream());
|
|
String stderr = slurp(pid.getErrorStream());
|
|
assertWithMessage(stderr).that(pid.waitFor()).isEqualTo(0);
|
|
assertWithMessage("OpenPGP message is missing encryption layer")
|
|
.that(stdout)
|
|
.contains(":pubkey enc packet:");
|
|
assertWithMessage("Unexpected symmetric encryption algorithm")
|
|
.that(stdout)
|
|
.contains(":pubkey enc packet: version 3, algo 1");
|
|
assertWithMessage("OpenPGP message is missing compression layer")
|
|
.that(stdout)
|
|
.contains(":compressed packet:");
|
|
assertWithMessage("Expected zip compression algorithm")
|
|
.that(stdout)
|
|
.contains(":compressed packet: algo=1");
|
|
assertWithMessage("OpenPGP message is missing literal data packet")
|
|
.that(stdout)
|
|
.contains(":literal data packet:");
|
|
assertWithMessage("Literal data packet does not contain correct filename")
|
|
.that(stdout)
|
|
.contains("name=\"lol_2010-10-17_thin_S1_R0.tar\"");
|
|
assertWithMessage("Literal data packet should be in BINARY mode")
|
|
.that(stdout)
|
|
.contains("mode b ");
|
|
assertWithMessage("Unexpected asymmetric encryption algorithm")
|
|
.that(stderr)
|
|
.contains("encrypted with 2048-bit RSA key");
|
|
assertWithMessage("Unexpected receiver public key").that(stderr).contains("ID 54E1EB0F");
|
|
}
|
|
|
|
@Test
|
|
public void testRun_rydeSignature() throws Exception {
|
|
assumeTrue(hasCommand("gpg --version"));
|
|
action.run();
|
|
|
|
File rydeTmp = new File(gpg.getCwd(), "ryde");
|
|
File sigTmp = new File(gpg.getCwd(), "ryde.sig");
|
|
Files.write(readGcsFile(gcsService, RYDE_FILE), rydeTmp);
|
|
Files.write(readGcsFile(gcsService, SIG_FILE), sigTmp);
|
|
|
|
Process pid = gpg.exec("gpg", "--verify", sigTmp.toString(), rydeTmp.toString());
|
|
String stderr = slurp(pid.getErrorStream());
|
|
assertWithMessage(stderr).that(pid.waitFor()).isEqualTo(0);
|
|
assertThat(stderr).contains("Good signature");
|
|
assertThat(stderr).contains("rde-unittest@registry.test");
|
|
}
|
|
|
|
private String slurp(InputStream is) throws FileNotFoundException, IOException {
|
|
return CharStreams.toString(new InputStreamReader(is, UTF_8));
|
|
}
|
|
}
|