aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-02-25 14:36:35 +0100
committerRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-02-25 14:36:35 +0100
commitc05c22ddbc771e7713849cae40f9d91bfafa0503 (patch)
treeb97d11ab2a914806e6f671f9aff1cab9767b2eab
parentc9b4b43654f0ff26207cc63449f13298cd3c56e8 (diff)
major refactor based on README.md and TODOs
Updated types, improved units tests, isolated most test data to have it in one place, renamed and created new files to improve readability, and fixed a bunch of minor TODOs.
-rw-r--r--crypto.go34
-rw-r--r--crypto_test.go125
-rw-r--r--endpoint.go185
-rw-r--r--endpoint_test.go504
-rw-r--r--go.mod12
-rw-r--r--go.sum771
-rw-r--r--handler.go245
-rw-r--r--handler_test.go925
-rw-r--r--instance.go138
-rw-r--r--instance_test.go320
-rw-r--r--log_parameters.go71
-rw-r--r--log_parameters_test.go98
-rw-r--r--metric.go2
-rw-r--r--namespace/namespace.go150
-rw-r--r--namespace/namespace_test.go218
-rw-r--r--namespace/testdata/data.go21
-rw-r--r--reqres.go228
-rw-r--r--reqres_test.go365
-rw-r--r--request.go103
-rw-r--r--request_test.go318
-rw-r--r--server/main.go20
-rw-r--r--sth.go90
-rw-r--r--sth_test.go364
-rw-r--r--testdata/data.go287
-rw-r--r--trillian.go27
-rw-r--r--trillian_test.go302
-rw-r--r--type.go306
-rw-r--r--type_test.go330
-rw-r--r--types/namespace_test.go3
-rw-r--r--types/stitem.go71
-rw-r--r--types/stitem_test.go24
-rw-r--r--util.go40
-rw-r--r--util_test.go17
33 files changed, 2986 insertions, 3728 deletions
diff --git a/crypto.go b/crypto.go
deleted file mode 100644
index 546fc0a..0000000
--- a/crypto.go
+++ /dev/null
@@ -1,34 +0,0 @@
-package stfe
-
-import (
- "fmt"
- "time"
-
- "crypto"
- "crypto/rand"
-)
-
-// genV1Sdi issues a new SignedDebugInfoV1 StItem from a serialized leaf value
-func (lp *LogParameters) genV1Sdi(serialized []byte) (*StItem, error) {
- sig, err := lp.Signer.Sign(rand.Reader, serialized, crypto.Hash(0)) // ed25519
- if err != nil {
- return nil, fmt.Errorf("ed25519 signature failed: %v", err)
- }
- lastSdiTimestamp.Set(float64(time.Now().Unix()), lp.id())
- return NewSignedDebugInfoV1(lp.LogId, []byte("reserved"), sig), nil
-}
-
-// genV1Sth issues a new SignedTreeHeadV1 StItem from a TreeHeadV1 structure
-func (lp *LogParameters) genV1Sth(th *TreeHeadV1) (*StItem, error) {
- serialized, err := th.Marshal()
- if err != nil {
- return nil, fmt.Errorf("failed tls marshaling tree head: %v", err)
- }
- sig, err := lp.Signer.Sign(rand.Reader, serialized, crypto.Hash(0)) // ed25519
- if err != nil {
- return nil, fmt.Errorf("ed25519 signature failed: %v", err)
- }
- lastSthTimestamp.Set(float64(time.Now().Unix()), lp.id())
- lastSthSize.Set(float64(th.TreeSize), lp.id())
- return NewSignedTreeHeadV1(th, lp.LogId, sig), nil
-}
diff --git a/crypto_test.go b/crypto_test.go
deleted file mode 100644
index 75e530e..0000000
--- a/crypto_test.go
+++ /dev/null
@@ -1,125 +0,0 @@
-package stfe
-
-import (
- "bytes"
- "crypto"
- "fmt"
- "testing"
-
- cttestdata "github.com/google/certificate-transparency-go/trillian/testdata"
-)
-
-var (
- testLeaf = make([]byte, 64)
-)
-
-// TestGenV1Sdi tests that a signature failure works as expected, and that
-// the issued SDI (if any) is populated correctly.
-func TestGenV1Sdi(t *testing.T) {
- for _, table := range []struct {
- description string
- leaf []byte
- signer crypto.Signer
- wantErr bool
- }{
- {
- description: "signature failure",
- leaf: testLeaf,
- signer: cttestdata.NewSignerWithErr(nil, fmt.Errorf("signer failed")),
- wantErr: true,
- },
- {
- description: "all ok",
- leaf: testLeaf,
- signer: cttestdata.NewSignerWithFixedSig(nil, testSignature),
- },
- } {
- item, err := makeTestLogParameters(t, table.signer).genV1Sdi(table.leaf)
- if err != nil && !table.wantErr {
- t.Errorf("signing failed in test %q: %v", table.description, err)
- } else if err == nil && table.wantErr {
- t.Errorf("signing succeeded but wanted failure in test %q", table.description)
- }
- if err != nil || table.wantErr {
- continue
- }
- if want, got := item.Format, StFormatSignedDebugInfoV1; got != want {
- t.Errorf("got format %s, wanted %s in test %q", got, want, table.description)
- continue
- }
-
- sdi := item.SignedDebugInfoV1
- if got, want := sdi.LogId, testLogId; !bytes.Equal(got, want) {
- t.Errorf("got logId %X, wanted %X in test %q", got, want, table.description)
- }
- if got, want := sdi.Message, []byte("reserved"); !bytes.Equal(got, want) {
- t.Errorf("got message %s, wanted %s in test %q", got, want, table.description)
- }
- if got, want := sdi.Signature, testSignature; !bytes.Equal(got, want) {
- t.Errorf("got signature %X, wanted %X in test %q", got, want, table.description)
- }
- }
-}
-
-// TestGenV1Sth tests that a signature failure works as expected, and that
-// the issued STH (if any) is populated correctly.
-func TestGenV1Sth(t *testing.T) {
- th := NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash))
- for _, table := range []struct {
- description string
- th *TreeHeadV1
- signer crypto.Signer
- wantErr bool
- }{
- {
- description: "marshal failure",
- th: NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, nil)),
- wantErr: true,
- },
- {
- description: "signature failure",
- th: th,
- signer: cttestdata.NewSignerWithErr(nil, fmt.Errorf("signer failed")),
- wantErr: true,
- },
- {
- description: "all ok",
- th: th,
- signer: cttestdata.NewSignerWithFixedSig(nil, testSignature),
- },
- } {
- item, err := makeTestLogParameters(t, table.signer).genV1Sth(table.th)
- if err != nil && !table.wantErr {
- t.Errorf("signing failed in test %q: %v", table.description, err)
- } else if err == nil && table.wantErr {
- t.Errorf("signing succeeded but wanted failure in test %q", table.description)
- }
- if err != nil || table.wantErr {
- continue
- }
- if want, got := item.Format, StFormatSignedTreeHeadV1; got != want {
- t.Errorf("got format %s, wanted %s in test %q", got, want, table.description)
- continue
- }
-
- sth := item.SignedTreeHeadV1
- if got, want := sth.LogId, testLogId; !bytes.Equal(got, want) {
- t.Errorf("got logId %X, wanted %X in test %q", got, want, table.description)
- }
- if got, want := sth.Signature, testSignature; !bytes.Equal(got, want) {
- t.Errorf("got signature %X, wanted %X in test %q", got, want, table.description)
- }
- if got, want := sth.TreeHead.Timestamp, th.Timestamp; got != want {
- t.Errorf("got timestamp %d, wanted %d in test %q", got, want, table.description)
- }
- if got, want := sth.TreeHead.TreeSize, th.TreeSize; got != want {
- t.Errorf("got tree size %d, wanted %d in test %q", got, want, table.description)
- }
- if got, want := sth.TreeHead.RootHash.Data, th.RootHash.Data; !bytes.Equal(got, want) {
- t.Errorf("got root hash %X, wanted %X in test %q", got, want, table.description)
- }
- if len(sth.TreeHead.Extension) != 0 {
- t.Errorf("got extensions %X, wanted none in test %q", sth.TreeHead.Extension, table.description)
- }
- }
-}
diff --git a/endpoint.go b/endpoint.go
new file mode 100644
index 0000000..d3da95e
--- /dev/null
+++ b/endpoint.go
@@ -0,0 +1,185 @@
+package stfe
+
+import (
+ "context"
+ "fmt"
+ "strings"
+
+ "net/http"
+
+ "github.com/golang/glog"
+ "github.com/google/trillian"
+ "github.com/system-transparency/stfe/types"
+)
+
+// Endpoint is a named HTTP API endpoint
+type Endpoint string
+
+const (
+ EndpointAddEntry = Endpoint("add-entry")
+ EndpointAddCosignature = Endpoint("add-cosignature")
+ EndpointGetLatestSth = Endpoint("get-latest-sth")
+ EndpointGetStableSth = Endpoint("get-stable-sth")
+ EndpointGetCosignedSth = Endpoint("get-cosigned-sth")
+ EndpointGetProofByHash = Endpoint("get-proof-by-hash")
+ EndpointGetConsistencyProof = Endpoint("get-consistency-proof")
+ EndpointGetEntries = Endpoint("get-entries")
+)
+
+// Path joins a number of components to form a full endpoint path, e.g., base
+// ("example.com"), prefix ("st/v1"), and the endpoint itself ("get-sth").
+func (e Endpoint) Path(components ...string) string {
+ return strings.Join(append(components, string(e)), "/")
+}
+
+func addEntry(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
+ glog.V(3).Info("handling add-entry request")
+ item, err := i.LogParameters.parseAddEntryV1Request(r)
+ if err != nil {
+ return http.StatusBadRequest, fmt.Errorf("parseAddEntryV1Request: %v", err)
+ }
+ leaf, err := types.Marshal(*item)
+ if err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("Marshal: %v", err) // should never happen
+ }
+ trsp, err := i.Client.QueueLeaf(ctx, &trillian.QueueLeafRequest{
+ LogId: i.LogParameters.TreeId,
+ Leaf: &trillian.LogLeaf{
+ LeafValue: leaf,
+ ExtraData: nil,
+ },
+ })
+ if errInner := checkQueueLeaf(trsp, err); errInner != nil {
+ return http.StatusInternalServerError, fmt.Errorf("bad QueueLeafResponse: %v", errInner)
+ }
+ return http.StatusOK, nil
+}
+
+func addCosignature(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
+ glog.V(3).Info("handling add-cosignature request")
+ costh, err := i.LogParameters.parseAddCosignatureV1Request(r)
+ if err != nil {
+ return http.StatusBadRequest, err
+ }
+ if err := i.SthSource.AddCosignature(ctx, costh); err != nil {
+ return http.StatusBadRequest, err
+ }
+ return http.StatusOK, nil
+}
+
+func getLatestSth(ctx context.Context, i *Instance, w http.ResponseWriter, _ *http.Request) (int, error) {
+ glog.V(3).Info("handling get-latest-sth request")
+ sth, err := i.SthSource.Latest(ctx)
+ if err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("Latest: %v", err)
+ }
+ if err := writeOctetResponse(w, *sth); err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("writeOctetResponse: %v", err)
+ }
+ return http.StatusOK, nil
+}
+
+func getStableSth(ctx context.Context, i *Instance, w http.ResponseWriter, _ *http.Request) (int, error) {
+ glog.V(3).Info("handling get-stable-sth request")
+ sth, err := i.SthSource.Stable(ctx)
+ if err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("Latest: %v", err)
+ }
+ if err := writeOctetResponse(w, *sth); err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("writeOctetResponse: %v", err)
+ }
+ return http.StatusOK, nil
+}
+
+func getCosignedSth(ctx context.Context, i *Instance, w http.ResponseWriter, _ *http.Request) (int, error) {
+ glog.V(3).Info("handling get-cosigned-sth request")
+ costh, err := i.SthSource.Cosigned(ctx)
+ if err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("Cosigned: %v", err)
+ }
+ if err := writeOctetResponse(w, *costh); err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("writeOctetResponse: %v", err)
+ }
+ return http.StatusOK, nil
+}
+
+func getConsistencyProof(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
+ glog.V(3).Info("handling get-consistency-proof request")
+ req, err := i.LogParameters.parseGetConsistencyProofV1Request(r)
+ if err != nil {
+ return http.StatusBadRequest, err
+ }
+
+ trsp, err := i.Client.GetConsistencyProof(ctx, &trillian.GetConsistencyProofRequest{
+ LogId: i.LogParameters.TreeId,
+ FirstTreeSize: int64(req.First),
+ SecondTreeSize: int64(req.Second),
+ })
+ if errInner := checkGetConsistencyProof(i.LogParameters, trsp, err); errInner != nil {
+ return http.StatusInternalServerError, fmt.Errorf("bad GetConsistencyProofResponse: %v", errInner)
+ }
+
+ if err := writeOctetResponse(w, *types.NewConsistencyProofV1(i.LogParameters.LogId, req.First, req.Second, NewNodePathFromHashPath(trsp.Proof.Hashes))); err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("writeOctetResponse: %v", err)
+ }
+ return http.StatusOK, nil
+}
+
+func getProofByHash(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
+ glog.V(3).Info("handling get-proof-by-hash request")
+ req, err := i.LogParameters.parseGetProofByHashV1Request(r)
+ if err != nil {
+ return http.StatusBadRequest, err
+ }
+
+ trsp, err := i.Client.GetInclusionProofByHash(ctx, &trillian.GetInclusionProofByHashRequest{
+ LogId: i.LogParameters.TreeId,
+ LeafHash: req.Hash[:],
+ TreeSize: int64(req.TreeSize),
+ OrderBySequence: true,
+ })
+ if errInner := checkGetInclusionProofByHash(i.LogParameters, trsp, err); errInner != nil {
+ return http.StatusInternalServerError, fmt.Errorf("bad GetInclusionProofByHashResponse: %v", errInner)
+ }
+
+ if err := writeOctetResponse(w, *types.NewInclusionProofV1(i.LogParameters.LogId, req.TreeSize, uint64(trsp.Proof[0].LeafIndex), NewNodePathFromHashPath(trsp.Proof[0].Hashes))); err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("writeOctetResponse: %v", err)
+ }
+ return http.StatusOK, nil
+}
+
+func getEntries(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
+ glog.V(3).Info("handling get-entries request")
+ req, err := i.LogParameters.parseGetEntriesV1Request(r)
+ if err != nil {
+ return http.StatusBadRequest, err
+ }
+
+ trsp, err := i.Client.GetLeavesByRange(ctx, &trillian.GetLeavesByRangeRequest{
+ LogId: i.LogParameters.TreeId,
+ StartIndex: int64(req.Start),
+ Count: int64(req.End-req.Start) + 1,
+ })
+ if errInner := checkGetLeavesByRange(req, trsp, err); errInner != nil {
+ return http.StatusInternalServerError, fmt.Errorf("checkGetLeavesByRangeResponse: %v", errInner) // there is one StatusBadRequest in here tho..
+ }
+
+ if rsp, err := NewStItemListFromLeaves(trsp.Leaves); err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("NewStItemListFromLeaves: %v", err) // should never happen
+ } else if err := writeOctetResponse(w, *rsp); err != nil {
+ return http.StatusInternalServerError, fmt.Errorf("writeOctetResponse: %v", err)
+ }
+ return http.StatusOK, nil
+}
+
+func writeOctetResponse(w http.ResponseWriter, i interface{}) error {
+ b, err := types.Marshal(i)
+ if err != nil {
+ return fmt.Errorf("Marshal: %v", err)
+ }
+ w.Header().Set("Content-Type", "application/octet-stream")
+ if _, err := w.Write(b); err != nil {
+ return fmt.Errorf("Write: %v", err)
+ }
+ return nil
+}
diff --git a/endpoint_test.go b/endpoint_test.go
new file mode 100644
index 0000000..7772837
--- /dev/null
+++ b/endpoint_test.go
@@ -0,0 +1,504 @@
+package stfe
+
+import (
+ "bytes"
+ "fmt"
+ "reflect"
+ "testing"
+
+ "net/http"
+ "net/http/httptest"
+
+ "github.com/golang/mock/gomock"
+ cttestdata "github.com/google/certificate-transparency-go/trillian/testdata"
+ "github.com/google/trillian"
+ "github.com/system-transparency/stfe/testdata"
+ "github.com/system-transparency/stfe/types"
+)
+
+func TestEndpointAddEntry(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ breq *bytes.Buffer
+ trsp *trillian.QueueLeafResponse
+ terr error
+ wantCode int
+ }{
+ {
+ description: "invalid: bad request: empty",
+ breq: bytes.NewBuffer(nil),
+ wantCode: http.StatusBadRequest,
+ },
+ {
+ description: "invalid: bad Trillian response: error",
+ breq: testdata.AddSignedChecksumBuffer(t, testdata.Ed25519SkSubmitter, testdata.Ed25519VkSubmitter),
+ terr: fmt.Errorf("backend failure"),
+ wantCode: http.StatusInternalServerError,
+ },
+ {
+ description: "valid",
+ breq: testdata.AddSignedChecksumBuffer(t, testdata.Ed25519SkSubmitter, testdata.Ed25519VkSubmitter),
+ trsp: testdata.DefaultTQlr(t, false),
+ wantCode: http.StatusOK,
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, nil)
+ defer ti.ctrl.Finish()
+
+ url := EndpointAddEntry.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("POST", url, table.breq)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+ if table.trsp != nil || table.terr != nil {
+ ti.client.EXPECT().QueueLeaf(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr) // TODO: deadline matcher?
+ }
+
+ w := httptest.NewRecorder()
+ ti.postHandler(t, EndpointAddEntry).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointAddCosignature(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ breq *bytes.Buffer
+ wantCode int
+ }{
+ {
+ description: "invalid: bad request: empty",
+ breq: bytes.NewBuffer(nil),
+ wantCode: http.StatusBadRequest,
+ },
+ {
+ description: "invalid: signed wrong sth", // newLogParameters() use testdata.Ed25519VkLog as default
+ breq: testdata.AddCosignatureBuffer(t, testdata.DefaultSth(t, testdata.Ed25519VkLog2), &testdata.Ed25519SkWitness, &testdata.Ed25519VkWitness),
+ wantCode: http.StatusBadRequest,
+ },
+ {
+ description: "valid",
+ breq: testdata.AddCosignatureBuffer(t, testdata.DefaultSth(t, testdata.Ed25519VkLog), &testdata.Ed25519SkWitness, &testdata.Ed25519VkWitness),
+ wantCode: http.StatusOK,
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, nil)
+ defer ti.ctrl.Finish()
+
+ url := EndpointAddCosignature.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("POST", url, table.breq)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+
+ w := httptest.NewRecorder()
+ ti.postHandler(t, EndpointAddCosignature).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointGetLatestSth(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ trsp *trillian.GetLatestSignedLogRootResponse
+ terr error
+ wantCode int
+ wantItem *types.StItem
+ }{
+ {
+ description: "backend failure",
+ terr: fmt.Errorf("backend failure"),
+ wantCode: http.StatusInternalServerError,
+ },
+ {
+ description: "valid",
+ trsp: testdata.DefaultTSlr(t),
+ wantCode: http.StatusOK,
+ wantItem: testdata.DefaultSth(t, testdata.Ed25519VkLog),
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, cttestdata.NewSignerWithFixedSig(nil, testdata.Signature))
+ ti.ctrl.Finish()
+
+ // Setup and run client query
+ url := EndpointGetLatestSth.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("GET", url, nil)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+ if table.trsp != nil || table.terr != nil {
+ ti.client.EXPECT().GetLatestSignedLogRoot(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr) // TODO: deadline matcher?
+ }
+
+ w := httptest.NewRecorder()
+ ti.getHandler(t, EndpointGetLatestSth).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ if w.Code != http.StatusOK {
+ return
+ }
+
+ var item types.StItem
+ if err := types.Unmarshal([]byte(w.Body.String()), &item); err != nil {
+ t.Errorf("valid response cannot be unmarshalled in test %q: %v", table.description, err)
+ }
+ if got, want := item, *table.wantItem; !reflect.DeepEqual(got, want) {
+ t.Errorf("got item\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointGetStableSth(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ useBadSource bool
+ wantCode int
+ wantItem *types.StItem
+ }{
+ {
+ description: "invalid: sth source failure",
+ useBadSource: true,
+ wantCode: http.StatusInternalServerError,
+ },
+ {
+ description: "valid",
+ wantCode: http.StatusOK,
+ wantItem: testdata.DefaultSth(t, testdata.Ed25519VkLog),
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, nil)
+ ti.ctrl.Finish()
+ if table.useBadSource {
+ ti.instance.SthSource = &ActiveSthSource{}
+ }
+
+ // Setup and run client query
+ url := EndpointGetStableSth.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("GET", url, nil)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+
+ w := httptest.NewRecorder()
+ ti.getHandler(t, EndpointGetStableSth).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ if w.Code != http.StatusOK {
+ return
+ }
+
+ var item types.StItem
+ if err := types.Unmarshal([]byte(w.Body.String()), &item); err != nil {
+ t.Errorf("valid response cannot be unmarshalled in test %q: %v", table.description, err)
+ }
+ if got, want := item, *table.wantItem; !reflect.DeepEqual(got, want) {
+ t.Errorf("got item\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointGetCosignedSth(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ useBadSource bool
+ wantCode int
+ wantItem *types.StItem
+ }{
+ {
+ description: "invalid: sth source failure",
+ useBadSource: true,
+ wantCode: http.StatusInternalServerError,
+ },
+ {
+ description: "valid",
+ wantCode: http.StatusOK,
+ wantItem: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, nil)
+ ti.ctrl.Finish()
+ if table.useBadSource {
+ ti.instance.SthSource = &ActiveSthSource{}
+ }
+
+ // Setup and run client query
+ url := EndpointGetCosignedSth.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("GET", url, nil)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+
+ w := httptest.NewRecorder()
+ ti.getHandler(t, EndpointGetCosignedSth).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ if w.Code != http.StatusOK {
+ return
+ }
+
+ var item types.StItem
+ if err := types.Unmarshal([]byte(w.Body.String()), &item); err != nil {
+ t.Errorf("valid response cannot be unmarshalled in test %q: %v", table.description, err)
+ }
+ if got, want := item, *table.wantItem; !reflect.DeepEqual(got, want) {
+ t.Errorf("got item\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointGetProofByHash(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ breq *bytes.Buffer
+ trsp *trillian.GetInclusionProofByHashResponse
+ terr error
+ wantCode int
+ wantItem *types.StItem
+ }{
+ {
+ description: "invalid: bad request: empty",
+ breq: bytes.NewBuffer(nil),
+ wantCode: http.StatusBadRequest,
+ },
+ {
+ description: "invalid: bad Trillian response: error",
+ breq: bytes.NewBuffer(marshal(t, types.GetProofByHashV1{TreeSize: 1, Hash: testdata.LeafHash})),
+ terr: fmt.Errorf("backend failure"),
+ wantCode: http.StatusInternalServerError,
+ },
+ {
+ description: "valid",
+ breq: bytes.NewBuffer(marshal(t, types.GetProofByHashV1{TreeSize: 1, Hash: testdata.LeafHash})),
+ trsp: testdata.DefaultTGipbhr(t),
+ wantCode: http.StatusOK,
+ wantItem: testdata.DefaultInclusionProof(t, 1),
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, nil)
+ defer ti.ctrl.Finish()
+
+ url := EndpointGetProofByHash.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("POST", url, table.breq)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+ if table.trsp != nil || table.terr != nil {
+ ti.client.EXPECT().GetInclusionProofByHash(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr) // TODO: deadline matcher?
+ }
+
+ w := httptest.NewRecorder()
+ ti.postHandler(t, EndpointGetProofByHash).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ if w.Code != http.StatusOK {
+ return
+ }
+
+ var item types.StItem
+ if err := types.Unmarshal([]byte(w.Body.String()), &item); err != nil {
+ t.Errorf("valid response cannot be unmarshalled in test %q: %v", table.description, err)
+ }
+ if got, want := item, *table.wantItem; !reflect.DeepEqual(got, want) {
+ t.Errorf("got item\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointGetConsistencyProof(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ breq *bytes.Buffer
+ trsp *trillian.GetConsistencyProofResponse
+ terr error
+ wantCode int
+ wantItem *types.StItem
+ }{
+ {
+ description: "invalid: bad request: empty",
+ breq: bytes.NewBuffer(nil),
+ wantCode: http.StatusBadRequest,
+ },
+ {
+ description: "invalid: bad Trillian response: error",
+ breq: bytes.NewBuffer(marshal(t, types.GetConsistencyProofV1{First: 1, Second: 2})),
+ terr: fmt.Errorf("backend failure"),
+ wantCode: http.StatusInternalServerError,
+ },
+ {
+ description: "valid",
+ breq: bytes.NewBuffer(marshal(t, types.GetConsistencyProofV1{First: 1, Second: 2})),
+ trsp: testdata.DefaultTGcpr(t),
+ wantCode: http.StatusOK,
+ wantItem: testdata.DefaultConsistencyProof(t, 1, 2),
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, nil)
+ defer ti.ctrl.Finish()
+
+ url := EndpointGetConsistencyProof.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("POST", url, table.breq)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+ if table.trsp != nil || table.terr != nil {
+ ti.client.EXPECT().GetConsistencyProof(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr) // TODO: deadline matcher?
+ }
+
+ w := httptest.NewRecorder()
+ ti.postHandler(t, EndpointGetConsistencyProof).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ if w.Code != http.StatusOK {
+ return
+ }
+
+ var item types.StItem
+ if err := types.Unmarshal([]byte(w.Body.String()), &item); err != nil {
+ t.Errorf("valid response cannot be unmarshalled in test %q: %v", table.description, err)
+ }
+ if got, want := item, *table.wantItem; !reflect.DeepEqual(got, want) {
+ t.Errorf("got item\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointGetEntriesV1(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ breq *bytes.Buffer
+ trsp *trillian.GetLeavesByRangeResponse
+ terr error
+ wantCode int
+ wantItem *types.StItemList
+ }{
+ {
+ description: "invalid: bad request: empty",
+ breq: bytes.NewBuffer(nil),
+ wantCode: http.StatusBadRequest,
+ },
+ {
+ description: "invalid: bad Trillian response: error",
+ breq: bytes.NewBuffer(marshal(t, types.GetEntriesV1{Start: 0, End: 0})),
+ terr: fmt.Errorf("backend failure"),
+ wantCode: http.StatusInternalServerError,
+ },
+ {
+ description: "valid", // remember that newLogParameters() have testdata.MaxRange configured
+ breq: bytes.NewBuffer(marshal(t, types.GetEntriesV1{Start: 0, End: uint64(testdata.MaxRange - 1)})),
+ trsp: testdata.DefaultTGlbrr(t, 0, testdata.MaxRange-1),
+ wantCode: http.StatusOK,
+ wantItem: testdata.DefaultStItemList(t, 0, uint64(testdata.MaxRange)-1),
+ },
+ } {
+ func() { // run deferred functions at the end of each iteration
+ ti := newTestInstance(t, nil)
+ defer ti.ctrl.Finish()
+
+ url := EndpointGetEntries.Path("http://example.com", ti.instance.LogParameters.Prefix)
+ req, err := http.NewRequest("POST", url, table.breq)
+ if err != nil {
+ t.Fatalf("must create http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+ if table.trsp != nil || table.terr != nil {
+ ti.client.EXPECT().GetLeavesByRange(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr) // TODO: deadline matcher?
+ }
+
+ w := httptest.NewRecorder()
+ ti.postHandler(t, EndpointGetEntries).ServeHTTP(w, req)
+ if got, want := w.Code, table.wantCode; got != want {
+ t.Errorf("got error code %d but wanted %d in test %q", got, want, table.description)
+ }
+ if w.Code != http.StatusOK {
+ return
+ }
+
+ var item types.StItemList
+ if err := types.Unmarshal([]byte(w.Body.String()), &item); err != nil {
+ t.Errorf("valid response cannot be unmarshalled in test %q: %v", table.description, err)
+ }
+ if got, want := item, *table.wantItem; !reflect.DeepEqual(got, want) {
+ t.Errorf("got item\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
+ }
+ }()
+ }
+}
+
+func TestEndpointPath(t *testing.T) {
+ base, prefix, proto := "http://example.com", "test", "st/v1"
+ for _, table := range []struct {
+ endpoint Endpoint
+ want string
+ }{
+ {
+ endpoint: EndpointAddEntry,
+ want: "http://example.com/test/st/v1/add-entry",
+ },
+ {
+ endpoint: EndpointAddCosignature,
+ want: "http://example.com/test/st/v1/add-cosignature",
+ },
+ {
+ endpoint: EndpointGetLatestSth,
+ want: "http://example.com/test/st/v1/get-latest-sth",
+ },
+ {
+ endpoint: EndpointGetStableSth,
+ want: "http://example.com/test/st/v1/get-stable-sth",
+ },
+ {
+ endpoint: EndpointGetCosignedSth,
+ want: "http://example.com/test/st/v1/get-cosigned-sth",
+ },
+ {
+ endpoint: EndpointGetConsistencyProof,
+ want: "http://example.com/test/st/v1/get-consistency-proof",
+ },
+ {
+ endpoint: EndpointGetProofByHash,
+ want: "http://example.com/test/st/v1/get-proof-by-hash",
+ },
+ {
+ endpoint: EndpointGetEntries,
+ want: "http://example.com/test/st/v1/get-entries",
+ },
+ } {
+ if got, want := table.endpoint.Path(base+"/"+prefix+"/"+proto), table.want; got != want {
+ t.Errorf("got endpoint\n%s\n\tbut wanted\n%s\n\twith one component", got, want)
+ }
+ if got, want := table.endpoint.Path(base, prefix, proto), table.want; got != want {
+ t.Errorf("got endpoint\n%s\n\tbut wanted\n%s\n\tmultiple components", got, want)
+ }
+ }
+}
+
+// TODO: TestWriteOctetResponse
+func TestWriteOctetResponse(t *testing.T) {
+}
diff --git a/go.mod b/go.mod
new file mode 100644
index 0000000..af0c837
--- /dev/null
+++ b/go.mod
@@ -0,0 +1,12 @@
+module github.com/system-transparency/stfe
+
+go 1.16
+
+require (
+ github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b
+ github.com/golang/mock v1.4.4
+ github.com/google/certificate-transparency-go v1.1.1
+ github.com/google/trillian v1.3.13
+ github.com/prometheus/client_golang v1.9.0 // indirect
+ google.golang.org/grpc v1.35.0
+)
diff --git a/go.sum b/go.sum
new file mode 100644
index 0000000..7a22d0c
--- /dev/null
+++ b/go.sum
@@ -0,0 +1,771 @@
+bitbucket.org/creachadair/shell v0.0.6/go.mod h1:8Qqi/cYk7vPnsOePHroKXDJYmb5x7ENhtiFtfZq8K+M=
+cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU=
+cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU=
+cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
+cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc=
+cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0=
+cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To=
+cloud.google.com/go v0.52.0/go.mod h1:pXajvRH/6o3+F9jDHZWQ5PbGhn+o8w9qiu/CffaVdO4=
+cloud.google.com/go v0.53.0/go.mod h1:fp/UouUEsRkN6ryDKNW/Upv/JBKnv6WDthjR6+vze6M=
+cloud.google.com/go v0.54.0/go.mod h1:1rq2OEkV3YMf6n/9ZvGWI3GWw0VoqH/1x2nd8Is/bPc=
+cloud.google.com/go v0.56.0/go.mod h1:jr7tqZxxKOVYizybht9+26Z/gUq7tiRzu+ACVAMbKVk=
+cloud.google.com/go v0.57.0/go.mod h1:oXiQ6Rzq3RAkkY7N6t3TcE6jE+CIBBbA36lwQ1JyzZs=
+cloud.google.com/go v0.60.0/go.mod h1:yw2G51M9IfRboUH61Us8GqCeF1PzPblB823Mn2q2eAU=
+cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o=
+cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE=
+cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc=
+cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg=
+cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc=
+cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ=
+cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE=
+cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk=
+cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I=
+cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw=
+cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA=
+cloud.google.com/go/pubsub v1.3.1/go.mod h1:i+ucay31+CNRpDW4Lu78I4xXG+O1r/MAHgjpRVR+TSU=
+cloud.google.com/go/pubsub v1.5.0/go.mod h1:ZEwJccE3z93Z2HWvstpri00jOg7oO4UZDtKhwDwqF0w=
+cloud.google.com/go/spanner v1.7.0/go.mod h1:sd3K2gZ9Fd0vMPLXzeCrF6fq4i63Q7aTLW/lBIfBkIk=
+cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw=
+cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos=
+cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk=
+cloud.google.com/go/storage v1.8.0/go.mod h1:Wv1Oy7z6Yz3DshWRJFhqM/UCfaWIRTdp0RXyy7KQOVs=
+contrib.go.opencensus.io/exporter/stackdriver v0.13.4/go.mod h1:aXENhDJ1Y4lIg4EUaVTwzvYETVNZk10Pu26tevFKLUc=
+dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
+github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
+github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
+github.com/Knetic/govaluate v3.0.1-0.20171022003610-9aa49832a739+incompatible/go.mod h1:r7JcOSlj0wfOMncg0iLm8Leh48TZaKVeNIfJntJ2wa0=
+github.com/Masterminds/goutils v1.1.0/go.mod h1:8cTjp+g8YejhMuvIA5y2vz3BpJxksy863GQaJW2MFNU=
+github.com/Masterminds/semver v1.4.2/go.mod h1:MB6lktGJrhw8PrUyiEoblNEGEQ+RzHPF078ddwwvV3Y=
+github.com/Masterminds/semver v1.5.0/go.mod h1:MB6lktGJrhw8PrUyiEoblNEGEQ+RzHPF078ddwwvV3Y=
+github.com/Masterminds/sprig v2.15.0+incompatible/go.mod h1:y6hNFY5UBTIWBxnzTeuNhlNS5hqE0NB0E6fgfo2Br3o=
+github.com/Masterminds/sprig v2.22.0+incompatible/go.mod h1:y6hNFY5UBTIWBxnzTeuNhlNS5hqE0NB0E6fgfo2Br3o=
+github.com/Shopify/sarama v1.19.0/go.mod h1:FVkBWblsNy7DGZRfXLU0O9RCGt5g3g3yEuWXgklEdEo=
+github.com/Shopify/toxiproxy v2.1.4+incompatible/go.mod h1:OXgGpZ6Cli1/URJOF1DMxUHB2q5Ap20/P/eIdh4G0pI=
+github.com/VividCortex/gohistogram v1.0.0/go.mod h1:Pf5mBqqDxYaXu3hDrrU+w6nw50o/4+TcAqDqk/vUH7g=
+github.com/afex/hystrix-go v0.0.0-20180502004556-fa1af6a1f4f5/go.mod h1:SkGFH1ia65gfNATL8TAiHDNxPzPdmEL5uirI2Uyuz6c=
+github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190924025748-f65c72e2690d/go.mod h1:rBZYJk541a8SKzHPHnH3zbiI+7dagKZ0cgpgrD7Fyho=
+github.com/antihax/optional v0.0.0-20180407024304-ca021399b1a6/go.mod h1:V8iCPQYkqmusNa815XgQio277wI47sdRh1dUOLdyC6Q=
+github.com/aokoli/goutils v1.0.1/go.mod h1:SijmP0QR8LtwsmDs8Yii5Z/S4trXFGFC2oO5g9DP+DQ=
+github.com/apache/beam v2.27.0+incompatible/go.mod h1:/8NX3Qi8vGstDLLaeaU7+lzVEu/ACaQhYjeefzQ0y1o=
+github.com/apache/thrift v0.12.0/go.mod h1:cp2SuWMxlEZw2r+iP2GNCdIi4C1qmUzdZFSVb+bacwQ=
+github.com/apache/thrift v0.13.0/go.mod h1:cp2SuWMxlEZw2r+iP2GNCdIi4C1qmUzdZFSVb+bacwQ=
+github.com/armon/circbuf v0.0.0-20150827004946-bbbad097214e/go.mod h1:3U/XgcO3hCbHZ8TKRvWD2dDTCfh9M9ya+I9JpbB7O8o=
+github.com/armon/consul-api v0.0.0-20180202201655-eb2c6b5be1b6/go.mod h1:grANhF5doyWs3UAsr3K4I6qtAmlQcZDesFNEHPZAzj8=
+github.com/armon/go-metrics v0.0.0-20180917152333-f0300d1749da/go.mod h1:Q73ZrmVTwzkszR9V5SSuryQ31EELlFMUz1kKyl939pY=
+github.com/armon/go-radix v0.0.0-20180808171621-7fddfc383310/go.mod h1:ufUuZ+zHj4x4TnLV4JWEpy2hxWSpsRywHrMgIH9cCH8=
+github.com/aryann/difflib v0.0.0-20170710044230-e206f873d14a/go.mod h1:DAHtR1m6lCRdSC2Tm3DSWRPvIPr6xNKyeHdqDQSQT+A=
+github.com/aws/aws-lambda-go v1.13.3/go.mod h1:4UKl9IzQMoD+QF79YdCuzCwp8VbmG4VAQwij/eHl5CU=
+github.com/aws/aws-sdk-go v1.23.20/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo=
+github.com/aws/aws-sdk-go v1.25.37/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo=
+github.com/aws/aws-sdk-go v1.27.0/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo=
+github.com/aws/aws-sdk-go-v2 v0.18.0/go.mod h1:JWVYvqSMppoMJC0x5wdwiImzgXTI9FuZwxzkQq9wy+g=
+github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
+github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
+github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
+github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
+github.com/bgentry/speakeasy v0.1.0/go.mod h1:+zsyZBPWlz7T6j88CTgSN5bM796AkVf0kBD4zp0CCIs=
+github.com/casbin/casbin/v2 v2.1.2/go.mod h1:YcPU1XXisHhLzuxH9coDNf2FbKpjGlbCg3n9yuLkIJQ=
+github.com/cenkalti/backoff v2.2.1+incompatible/go.mod h1:90ReRw6GdpyfrHakVjL/QHaoyV4aDUVVkXQJJJ3NXXM=
+github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/cespare/xxhash/v2 v2.1.1 h1:6MnRN8NT7+YBpUIWxHtefFZOKTAPgGjpQSxqLNn0+qY=
+github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
+github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
+github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
+github.com/clbanning/x2j v0.0.0-20191024224557-825249438eec/go.mod h1:jMjuTZXRI4dUb/I5gc9Hdhagfvm9+RyrPryS/auMzxE=
+github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
+github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
+github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
+github.com/cockroachdb/datadriven v0.0.0-20190809214429-80d97fb3cbaa/go.mod h1:zn76sxSg3SzpJ0PPJaLDCu+Bu0Lg3sKTORVIj19EIF8=
+github.com/codahale/hdrhistogram v0.0.0-20161010025455-3a0bb77429bd/go.mod h1:sE/e/2PUdi/liOCUjSTXgM1o87ZssimdTWN964YiIeI=
+github.com/coreos/etcd v3.3.10+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE=
+github.com/coreos/go-etcd v2.0.0+incompatible/go.mod h1:Jez6KQU2B/sWsbdaef3ED8NzMklzPG4d5KIOhIy30Tk=
+github.com/coreos/go-semver v0.2.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk=
+github.com/coreos/go-semver v0.3.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk=
+github.com/coreos/go-systemd v0.0.0-20180511133405-39ca1b05acc7/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
+github.com/coreos/go-systemd v0.0.0-20190620071333-e64a0ec8b42a/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
+github.com/coreos/pkg v0.0.0-20160727233714-3ac0863d7acf/go.mod h1:E3G3o1h8I7cfcXa63jLwjI0eiQQMgzzUDFVpN/nH/eA=
+github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f/go.mod h1:E3G3o1h8I7cfcXa63jLwjI0eiQQMgzzUDFVpN/nH/eA=
+github.com/cpuguy83/go-md2man v1.0.10/go.mod h1:SmD6nW6nTyfqj6ABTjUi3V3JVMnlJmwcJI5acqYI6dE=
+github.com/cpuguy83/go-md2man/v2 v2.0.0-20190314233015-f79a8a8ca69d/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU=
+github.com/cpuguy83/go-md2man/v2 v2.0.0/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU=
+github.com/creack/pty v1.1.7/go.mod h1:lj5s0c3V2DBrqTV7llrYr5NG6My20zk30Fl46Y7DoTY=
+github.com/davecgh/go-spew v0.0.0-20161028175848-04cdfd42973b/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ=
+github.com/dustin/go-humanize v0.0.0-20171111073723-bb3d318650d4/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk=
+github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk=
+github.com/eapache/go-resiliency v1.1.0/go.mod h1:kFI+JgMyC7bLPUVY133qvEBtVayf5mFgVsvEsIPBvNs=
+github.com/eapache/go-xerial-snappy v0.0.0-20180814174437-776d5712da21/go.mod h1:+020luEh2TKB4/GOp8oxxtq0Daoen/Cii55CzbTV6DU=
+github.com/eapache/queue v1.1.0/go.mod h1:6eCeP0CKFpHLu8blIFXhExK/dRa7WDZfr6jVFPTqq+I=
+github.com/edsrzf/mmap-go v1.0.0/go.mod h1:YO35OhQPt3KJa3ryjFM5Bs14WD66h8eGKpfaBNrHW5M=
+github.com/envoyproxy/go-control-plane v0.6.9/go.mod h1:SBwIajubJHhxtWwsL9s8ss4safvEdbitLhGGK48rN6g=
+github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
+github.com/envoyproxy/go-control-plane v0.9.9-0.20201210154907-fd9021fe5dad/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
+github.com/envoyproxy/protoc-gen-validate v0.0.14/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4=
+github.com/franela/goblin v0.0.0-20200105215937-c9ffbefa60db/go.mod h1:7dvUGVsVBjqR7JHJk0brhHOZYGmfBYOrK0ZhYMEtBr4=
+github.com/franela/goreq v0.0.0-20171204163338-bcd34c9993f8/go.mod h1:ZhphrRTfi2rbfLwlschooIH4+wKKDR4Pdxhh+TRoA20=
+github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
+github.com/fullstorydev/grpcurl v1.6.0/go.mod h1:ZQ+ayqbKMJNhzLmbpCiurTVlaK2M/3nqZCxaQ2Ze/sM=
+github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
+github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
+github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
+github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
+github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/kit v0.10.0/go.mod h1:xUsJbQ/Fp4kEt7AFgCuvyX4a71u8h9jB8tj/ORgOZ7o=
+github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
+github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
+github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
+github.com/go-redis/redis v6.15.8+incompatible/go.mod h1:NAIEuMOZ/fxfXJIrKDQDz8wamY7mA7PouImQ2Jvg6kA=
+github.com/go-redis/redis v6.15.9+incompatible/go.mod h1:NAIEuMOZ/fxfXJIrKDQDz8wamY7mA7PouImQ2Jvg6kA=
+github.com/go-sql-driver/mysql v1.4.0/go.mod h1:zAC/RDZ24gD3HViQzih4MyKcchzm+sOG5ZlKdlhCg5w=
+github.com/go-sql-driver/mysql v1.5.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg=
+github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
+github.com/gogo/googleapis v1.1.0/go.mod h1:gf4bu3Q80BeJ6H1S1vYPm8/ELATdvryBaNFGgqEef3s=
+github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
+github.com/gogo/protobuf v1.2.0/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
+github.com/gogo/protobuf v1.2.1/go.mod h1:hp+jE20tsWTFYpLwKvXlhS1hjn+gTNwPg2I6zVXpSg4=
+github.com/gogo/protobuf v1.3.0/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o=
+github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o=
+github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b h1:VKtxabqXZkF25pY9ekfRL6a582T4P37/31XEstQ5p58=
+github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
+github.com/golang/groupcache v0.0.0-20160516000752-02826c3e7903/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y=
+github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/mock v1.4.3/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/mock v1.4.4 h1:l75CXGRSwbaYNpl/Z2X1XIIAMSCquvXgpVZDhwEIJsc=
+github.com/golang/mock v1.4.4/go.mod h1:l3mdAwkq5BuhzHwde/uurv3sEJeZMXNpwsxVWU71h+4=
+github.com/golang/protobuf v1.1.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
+github.com/golang/protobuf v1.3.4/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
+github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk=
+github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
+github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
+github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
+github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
+github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
+github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
+github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.4.3 h1:JjCZWpVbqXDqFVmTfYWEVTMIYrL/NPdPSCHPJ0T/raM=
+github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/snappy v0.0.0-20180518054509-2e65f85255db/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
+github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
+github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
+github.com/google/certificate-transparency-go v1.0.21/go.mod h1:QeJfpSbVSfYc7RgB3gJFj9cbuQMMchQxrWXz8Ruopmg=
+github.com/google/certificate-transparency-go v1.1.1 h1:6JHXZhXEvilMcTjR4MGZn5KV0IRkcFl4CJx5iHVhjFE=
+github.com/google/certificate-transparency-go v1.1.1/go.mod h1:FDKqPvSXawb2ecErVRrD+nfy23RCzyl7eqVCEmlT1Zs=
+github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
+github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
+github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
+github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
+github.com/google/pprof v0.0.0-20191218002539-d4f498aebedc/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200229191704-1ebb73c60ed3/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200430221834-fc25d7d30c6d/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200507031123-427632fa3b1c/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
+github.com/google/trillian v1.3.11/go.mod h1:0tPraVHrSDkA3BO6vKX67zgLXs6SsOAbHEivX+9mPgw=
+github.com/google/trillian v1.3.13 h1:V0avmojBPY7YAlcd/nUVvNRprU28tRsahPNxIedqekU=
+github.com/google/trillian v1.3.13/go.mod h1:8y3zC8XuqFxsslWPkP0r3sprERfFf7hCWmicL0yHZNI=
+github.com/google/uuid v0.0.0-20161128191214-064e2069ce9c/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/uuid v1.0.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg=
+github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk=
+github.com/gopherjs/gopherjs v0.0.0-20181017120253-0766667cb4d1/go.mod h1:wJfORRmW1u3UXTncJ5qlYoELFm8eSnnEO6hX4iZ3EWY=
+github.com/gordonklaus/ineffassign v0.0.0-20200309095847-7953dde2c7bf/go.mod h1:cuNKsD1zp2v6XfE/orVX2QE1LC+i254ceGcVeDT3pTU=
+github.com/gorilla/context v1.1.1/go.mod h1:kBGZzfjB9CEq2AlWe17Uuf7NDRt0dE0s8S51q0aT7Yg=
+github.com/gorilla/mux v1.6.2/go.mod h1:1lud6UwP+6orDFRuTfBEV8e9/aOM/c4fVVCaMa2zaAs=
+github.com/gorilla/mux v1.7.3/go.mod h1:1lud6UwP+6orDFRuTfBEV8e9/aOM/c4fVVCaMa2zaAs=
+github.com/gorilla/websocket v0.0.0-20170926233335-4201258b820c/go.mod h1:E7qHFY5m1UJ88s3WnNqhKjPHQ0heANvMoAMk2YaljkQ=
+github.com/gorilla/websocket v1.4.1/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
+github.com/grpc-ecosystem/go-grpc-middleware v1.0.1-0.20190118093823-f849b5445de4/go.mod h1:FiyG127CGDf3tlThmgyCl78X/SZQqEOJBCDaAfeWzPs=
+github.com/grpc-ecosystem/go-grpc-middleware v1.2.2/go.mod h1:EaizFBKfUKtMIF5iaDEhniwNedqGo9FuLFzppDr3uwI=
+github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk=
+github.com/grpc-ecosystem/grpc-gateway v1.9.5/go.mod h1:vNeuVxBJEsws4ogUvrchl83t/GYV9WGTSLVdBhOQFDY=
+github.com/grpc-ecosystem/grpc-gateway v1.12.1/go.mod h1:8XEsbTttt/W+VvjtQhLACqCisSPWTxCZ7sBRjU6iH9c=
+github.com/hashicorp/consul/api v1.3.0/go.mod h1:MmDNSzIMUjNpY/mQ398R4bk2FnqQLoPndWW5VkKPlCE=
+github.com/hashicorp/consul/sdk v0.3.0/go.mod h1:VKf9jXwCTEY1QZP2MOLRhb5i/I/ssyNV1vwHyQBF0x8=
+github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
+github.com/hashicorp/go-cleanhttp v0.5.1/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
+github.com/hashicorp/go-immutable-radix v1.0.0/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60=
+github.com/hashicorp/go-msgpack v0.5.3/go.mod h1:ahLV/dePpqEmjfWmKiqvPkv/twdG7iPBM1vqhUKIvfM=
+github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk=
+github.com/hashicorp/go-rootcerts v1.0.0/go.mod h1:K6zTfqpRlCUIjkwsN4Z+hiSfzSTQa6eBIzfwKfwNnHU=
+github.com/hashicorp/go-sockaddr v1.0.0/go.mod h1:7Xibr9yA9JjQq1JpNB2Vw7kxv8xerXegt+ozgdvDeDU=
+github.com/hashicorp/go-syslog v1.0.0/go.mod h1:qPfqrKkXGihmCqbJM2mZgkZGvKG1dFdvsLplgctolz4=
+github.com/hashicorp/go-uuid v1.0.0/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
+github.com/hashicorp/go-uuid v1.0.1/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
+github.com/hashicorp/go-version v1.2.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA=
+github.com/hashicorp/go.net v0.0.1/go.mod h1:hjKkEWcCURg++eb33jQU7oqQcI9XDCnUzHA0oac0k90=
+github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
+github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
+github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
+github.com/hashicorp/logutils v1.0.0/go.mod h1:QIAnNjmIWmVIIkWDTG1z5v++HQmx9WQRO+LraFDTW64=
+github.com/hashicorp/mdns v1.0.0/go.mod h1:tL+uN++7HEJ6SQLQ2/p+z2pH24WQKWjBPkE0mNTz8vQ=
+github.com/hashicorp/memberlist v0.1.3/go.mod h1:ajVTdAv/9Im8oMAAj5G31PhhMCZJV2pPBoIllUwCN7I=
+github.com/hashicorp/serf v0.8.2/go.mod h1:6hOLApaqBFA1NXqRQAsxw9QxuDEvNxSQRwA/JwenrHc=
+github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
+github.com/huandu/xstrings v1.0.0/go.mod h1:4qWG/gcEcfX4z/mBDHJ++3ReCw9ibxbsNJbcucJdbSo=
+github.com/huandu/xstrings v1.2.0/go.mod h1:DvyZB1rfVYsBIigL8HwpZgxHwXozlTgGqn63UyNX5k4=
+github.com/hudl/fargo v1.3.0/go.mod h1:y3CKSmjA+wD2gak7sUSXTAoopbhU08POFhmITJgmKTg=
+github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
+github.com/imdario/mergo v0.3.4/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
+github.com/imdario/mergo v0.3.8/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
+github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8=
+github.com/influxdata/influxdb1-client v0.0.0-20191209144304-8bf82d3c094d/go.mod h1:qj24IKcXYK6Iy9ceXlo3Tc+vtHo9lIhSX5JddghvEPo=
+github.com/jhump/protoreflect v1.6.1/go.mod h1:RZQ/lnuN+zqeRVpQigTwO6o0AJUkxbnSnpuG7toUTG4=
+github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k=
+github.com/jonboulle/clockwork v0.1.0/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo=
+github.com/jonboulle/clockwork v0.2.0/go.mod h1:Pkfl5aHPm1nk2H9h0bjmnJD/BcgbGXUBGnn1kMkgxc8=
+github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
+github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
+github.com/json-iterator/go v1.1.7/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/json-iterator/go v1.1.8/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU=
+github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk=
+github.com/jtolds/gls v4.20.0+incompatible/go.mod h1:QJZ7F/aHp+rZTRtaJ1ow/lLfFfVYBRgL+9YlvaHOwJU=
+github.com/juju/ratelimit v1.0.1/go.mod h1:qapgC/Gy+xNh9UxzV13HGGl/6UXNN+ct+vwSgWNm/qk=
+github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
+github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
+github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q=
+github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00=
+github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
+github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/konsorten/go-windows-terminal-sequences v1.0.2/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
+github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
+github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
+github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
+github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
+github.com/letsencrypt/pkcs11key/v4 v4.0.0/go.mod h1:EFUvBDay26dErnNb70Nd0/VW3tJiIbETBPTl9ATXQag=
+github.com/lib/pq v1.8.0/go.mod h1:AlVN5x4E4T544tWzH6hKfbfQvm3HdbOxrmggDNAPY9o=
+github.com/lib/pq v1.9.0/go.mod h1:AlVN5x4E4T544tWzH6hKfbfQvm3HdbOxrmggDNAPY9o=
+github.com/lightstep/lightstep-tracer-common/golang/gogo v0.0.0-20190605223551-bc2310a04743/go.mod h1:qklhhLq1aX+mtWk9cPHPzaBjWImj5ULL6C7HFJtXQMM=
+github.com/lightstep/lightstep-tracer-go v0.18.1/go.mod h1:jlF1pusYV4pidLvZ+XD0UBX0ZE6WURAspgAczcDHrL4=
+github.com/lyft/protoc-gen-validate v0.0.13/go.mod h1:XbGvPuh87YZc5TdIa2/I4pLk0QoUACkjt2znoq26NVQ=
+github.com/magiconair/properties v1.8.0/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ=
+github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU=
+github.com/mattn/go-colorable v0.1.4/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE=
+github.com/mattn/go-isatty v0.0.3/go.mod h1:M+lRXTBqGeGNdLjl/ufCoiOlB5xdOkqRJdNxMWT7Zi4=
+github.com/mattn/go-isatty v0.0.4/go.mod h1:M+lRXTBqGeGNdLjl/ufCoiOlB5xdOkqRJdNxMWT7Zi4=
+github.com/mattn/go-isatty v0.0.8/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s=
+github.com/mattn/go-isatty v0.0.10/go.mod h1:qgIWMr58cqv1PHHyhnkY9lrL7etaEgOFcMEpPG5Rm84=
+github.com/mattn/go-runewidth v0.0.2/go.mod h1:LwmH8dsx7+W8Uxz3IHJYH5QSwggIsqBzpuz5H//U1FU=
+github.com/mattn/go-runewidth v0.0.4/go.mod h1:LwmH8dsx7+W8Uxz3IHJYH5QSwggIsqBzpuz5H//U1FU=
+github.com/mattn/go-runewidth v0.0.6/go.mod h1:H031xJmbD/WCDINGzjvQ9THkh0rPKHF+m2gUSrubnMI=
+github.com/matttproud/golang_protobuf_extensions v1.0.1 h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU=
+github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
+github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg=
+github.com/miekg/pkcs11 v1.0.2/go.mod h1:XsNlhZGX73bx86s2hdc/FuaLm2CPZJemRLMA+WTFxgs=
+github.com/miekg/pkcs11 v1.0.3/go.mod h1:XsNlhZGX73bx86s2hdc/FuaLm2CPZJemRLMA+WTFxgs=
+github.com/mitchellh/cli v1.0.0/go.mod h1:hNIlj7HEI86fIcpObd7a0FcrxTWetlwJDGcceTlRvqc=
+github.com/mitchellh/copystructure v1.0.0/go.mod h1:SNtv71yrdKgLRyLFxmLdkAbkKEFWgYaq1OVrnRcwhnw=
+github.com/mitchellh/go-homedir v1.0.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
+github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
+github.com/mitchellh/go-testing-interface v1.0.0/go.mod h1:kRemZodwjscx+RGhAo8eIhFbs2+BFgRtFPeD/KE+zxI=
+github.com/mitchellh/gox v0.4.0/go.mod h1:Sd9lOJ0+aimLBi73mGofS1ycjY8lL3uZM3JPS42BGNg=
+github.com/mitchellh/iochan v1.0.0/go.mod h1:JwYml1nuB7xOzsp52dPpHFffvOCDupsG0QubkSMEySY=
+github.com/mitchellh/mapstructure v0.0.0-20160808181253-ca63d7c062ee/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
+github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
+github.com/mitchellh/reflectwalk v1.0.0/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw=
+github.com/mitchellh/reflectwalk v1.0.1/go.mod h1:mSTlrgnPZtwu0c4WaC2kGObEpuNDbx0jmZXqmk4esnw=
+github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/mohae/deepcopy v0.0.0-20170929034955-c48cc78d4826/go.mod h1:TaXosZuwdSHYgviHp1DAtfrULt5eUgsSMsZf+YrPgl8=
+github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/mwitkow/go-proto-validators v0.0.0-20180403085117-0950a7990007/go.mod h1:m2XC9Qq0AlmmVksL6FktJCdTYyLk7V3fKyp0sl1yWQo=
+github.com/mwitkow/go-proto-validators v0.2.0/go.mod h1:ZfA1hW+UH/2ZHOWvQ3HnQaU0DtnpXu850MZiy+YUgcc=
+github.com/nats-io/jwt v0.3.0/go.mod h1:fRYCDE99xlTsqUzISS1Bi75UBJ6ljOJQOAAu5VglpSg=
+github.com/nats-io/jwt v0.3.2/go.mod h1:/euKqTS1ZD+zzjYrY7pseZrTtWQSjujC7xjPc8wL6eU=
+github.com/nats-io/nats-server/v2 v2.1.2/go.mod h1:Afk+wRZqkMQs/p45uXdrVLuab3gwv3Z8C4HTBu8GD/k=
+github.com/nats-io/nats.go v1.9.1/go.mod h1:ZjDU1L/7fJ09jvUSRVBR2e7+RnLiiIQyqyzEE/Zbp4w=
+github.com/nats-io/nkeys v0.1.0/go.mod h1:xpnFELMwJABBLVhffcfd1MZx6VsNRFpEugbxziKVo7w=
+github.com/nats-io/nkeys v0.1.3/go.mod h1:xpnFELMwJABBLVhffcfd1MZx6VsNRFpEugbxziKVo7w=
+github.com/nats-io/nuid v1.0.1/go.mod h1:19wcPz3Ph3q0Jbyiqsd0kePYG7A95tJPxeL+1OSON2c=
+github.com/nishanths/predeclared v0.0.0-20190419143655-18a43bb90ffc/go.mod h1:62PewwiQTlm/7Rj+cxVYqZvDIUc+JjZq6GHAC1fsObQ=
+github.com/oklog/oklog v0.3.2/go.mod h1:FCV+B7mhrz4o+ueLpx+KqkyXRGMWOYEvfiXtdGtbWGs=
+github.com/oklog/run v1.0.0/go.mod h1:dlhp/R75TPv97u0XWUtDeV/lRKWPKSdTuV0TZvrmrQA=
+github.com/olekukonko/tablewriter v0.0.0-20170122224234-a0225b3f23b5/go.mod h1:vsDQFd/mU46D+Z4whnwzcISnGGzXWMclvtLoiIKAKIo=
+github.com/olekukonko/tablewriter v0.0.1/go.mod h1:vsDQFd/mU46D+Z4whnwzcISnGGzXWMclvtLoiIKAKIo=
+github.com/olekukonko/tablewriter v0.0.2/go.mod h1:rSAaSIOAGT9odnlyGlUfAJaoc5w2fSBUmeGDbRWPxyQ=
+github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.7.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.10.3/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/gomega v1.4.3/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY=
+github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
+github.com/op/go-logging v0.0.0-20160315200505-970db520ece7/go.mod h1:HzydrMdWErDVzsI23lYNej1Htcns9BCg93Dk0bBINWk=
+github.com/opentracing-contrib/go-observer v0.0.0-20170622124052-a52f23424492/go.mod h1:Ngi6UdF0k5OKD5t5wlmGhe/EDKPoUM3BXZSSfIuJbis=
+github.com/opentracing/basictracer-go v1.0.0/go.mod h1:QfBfYuafItcjQuMwinw9GhYKwFXS9KnPs5lxoYwgW74=
+github.com/opentracing/opentracing-go v1.0.2/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
+github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
+github.com/openzipkin-contrib/zipkin-go-opentracing v0.4.5/go.mod h1:/wsWhb9smxSfWAKL3wpBW7V8scJMt8N8gnaMCS9E/cA=
+github.com/openzipkin/zipkin-go v0.1.6/go.mod h1:QgAqvLzwWbR/WpD4A3cGpPtJrZXNIiJc5AZX7/PBEpw=
+github.com/openzipkin/zipkin-go v0.2.1/go.mod h1:NaW6tEwdmWMaCDZzg8sh+IBNOxHMPnhQw8ySjnjRyN4=
+github.com/openzipkin/zipkin-go v0.2.2/go.mod h1:NaW6tEwdmWMaCDZzg8sh+IBNOxHMPnhQw8ySjnjRyN4=
+github.com/pact-foundation/pact-go v1.0.4/go.mod h1:uExwJY4kCzNPcHRj+hCR/HBbOOIwwtUjcrb0b5/5kLM=
+github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
+github.com/pborman/uuid v1.2.0/go.mod h1:X/NO0urCmaxf9VXbdlT7C2Yzkj2IKimNn4k+gtPdI/k=
+github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic=
+github.com/performancecopilot/speed v3.0.0+incompatible/go.mod h1:/CLtqpZ5gBg1M9iaPbIdPPGyKcA8hKdoy6hAWba7Yac=
+github.com/pierrec/lz4 v1.0.2-0.20190131084431-473cd7ce01a1/go.mod h1:3/3N9NVKO0jef7pBehbT1qWhCMrIgbYNnFAZCqQ5LRc=
+github.com/pierrec/lz4 v2.0.5+incompatible/go.mod h1:pdkljMzZIN41W+lC3N2tnIh5sFi+IEE17M5jbnwPHcY=
+github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/profile v1.2.1/go.mod h1:hJw3o1OdXxsrSjjVksARp5W95eeEaEfptyVZyv6JUPA=
+github.com/pmezard/go-difflib v0.0.0-20151028094244-d8ed2627bdf0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/posener/complete v1.1.1/go.mod h1:em0nMJCgc9GFtwrmVmEMR/ZL6WyhyjMBndrE9hABlRI=
+github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
+github.com/prometheus/client_golang v0.9.3-0.20190127221311-3c4408c8b829/go.mod h1:p2iRAGwDERtqlqzRXnrOVns+ignqQo//hLXqYxZYVNs=
+github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
+github.com/prometheus/client_golang v1.3.0/go.mod h1:hJaj2vgQTGQmVCsAACORcieXFeDPbaTKGT+JTgUa3og=
+github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
+github.com/prometheus/client_golang v1.9.0 h1:Rrch9mh17XcxvEu9D9DEpb4isxjGBtcevQjKvxPRQIU=
+github.com/prometheus/client_golang v1.9.0/go.mod h1:FqZLKOZnGdFAhOK4nqGHa7D66IdsO+O441Eve7ptJDU=
+github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
+github.com/prometheus/client_model v0.0.0-20190115171406-56726106282f/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
+github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.1.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.2.0 h1:uq5h0d+GuxiXLJLNABMgp2qUWDPiLvgCzz2dUR+/W/M=
+github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/common v0.2.0/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
+github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
+github.com/prometheus/common v0.7.0/go.mod h1:DjGbpBbp5NYNiECxcL/VnbXCCaQpKd3tt26CguLLsqA=
+github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
+github.com/prometheus/common v0.15.0 h1:4fgOnadei3EZvgRwxJ7RMpG1k1pOZth5Pc13tyspaKM=
+github.com/prometheus/common v0.15.0/go.mod h1:U+gB1OBLb1lF3O42bTCL+FK18tX9Oar16Clt/msog/s=
+github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.0-20190117184657-bf6a532e95b1/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
+github.com/prometheus/procfs v0.0.8/go.mod h1:7Qr8sr6344vo1JqZ6HhLceV9o3AJ1Ff+GxbHq6oeK9A=
+github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
+github.com/prometheus/procfs v0.2.0 h1:wH4vA7pcjKuZzjF7lM8awk4fnuJO6idemZXoKnULUx4=
+github.com/prometheus/procfs v0.2.0/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
+github.com/pseudomuto/protoc-gen-doc v1.3.2/go.mod h1:y5+P6n3iGrbKG+9O04V5ld71in3v/bX88wUwgt+U8EA=
+github.com/pseudomuto/protokit v0.2.0/go.mod h1:2PdH30hxVHsup8KpBTOXTBeMVhJZVio3Q8ViKSAXT0Q=
+github.com/rcrowley/go-metrics v0.0.0-20181016184325-3113b8401b8a/go.mod h1:bCqnVzQkZxMG4s8nGwiZ5l3QUCyqpo9Y+/ZMZ9VjZe4=
+github.com/rogpeppe/fastuuid v0.0.0-20150106093220-6724a57986af/go.mod h1:XWv6SoW27p1b0cqNHllgS5HIMJraePCO15w5zCzIWYg=
+github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ=
+github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
+github.com/rs/cors v1.7.0/go.mod h1:gFx+x8UowdsKA9AchylcLynDq+nNFfI8FkUZdN/jGCU=
+github.com/russross/blackfriday v1.5.2/go.mod h1:JO/DiYxRf+HjHt06OyowR9PTA263kcR/rfWxYHBV53g=
+github.com/russross/blackfriday/v2 v2.0.1/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
+github.com/ryanuber/columnize v0.0.0-20160712163229-9b3edd62028f/go.mod h1:sm1tb6uqfes/u+d4ooFouqFdy9/2g9QGwK3SQygK0Ts=
+github.com/samuel/go-zookeeper v0.0.0-20190923202752-2cc03de413da/go.mod h1:gi+0XIa01GRL2eRQVjQkKGqKF3SF9vZR/HnPullcV2E=
+github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529/go.mod h1:DxrIzT+xaE7yg65j358z/aeFdxmN0P9QXhEzd20vsDc=
+github.com/sergi/go-diff v1.1.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM=
+github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc=
+github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
+github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
+github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
+github.com/smartystreets/assertions v0.0.0-20180927180507-b2de0cb4f26d/go.mod h1:OnSkiWE9lh6wB0YB77sQom3nweQdgAjqCqsofrRNTgc=
+github.com/smartystreets/goconvey v1.6.4/go.mod h1:syvi0/a8iFYH4r/RixwvyeAJjdLS9QV7WQ/tjFTllLA=
+github.com/soheilhy/cmux v0.1.4/go.mod h1:IM3LyeVVIOuxMH7sFAkER9+bJ4dT7Ms6E4xg4kGIyLM=
+github.com/sony/gobreaker v0.4.1/go.mod h1:ZKptC7FHNvhBz7dN2LGjPVBz2sZJmc0/PkyDJOjmxWY=
+github.com/spf13/afero v1.1.2/go.mod h1:j4pytiNVoe2o6bmDsKpLACNPDBIoEAkihy7loJ1B0CQ=
+github.com/spf13/cast v1.3.0/go.mod h1:Qx5cxh0v+4UWYiBimWS+eyWzqEqokIECu5etghLkUJE=
+github.com/spf13/cobra v0.0.3/go.mod h1:1l0Ry5zgKvJasoi3XT1TypsSe7PqH0Sj9dhYf7v3XqQ=
+github.com/spf13/cobra v0.0.5/go.mod h1:3K3wKZymM7VvHMDS9+Akkh4K60UwM26emMESw8tLCHU=
+github.com/spf13/jwalterweatherman v1.0.0/go.mod h1:cQK4TGJAtQXfYWX+Ddv3mKDzgVb68N+wFjFa4jdeBTo=
+github.com/spf13/pflag v1.0.1/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
+github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
+github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
+github.com/spf13/viper v1.3.2/go.mod h1:ZiWeW+zYFKm7srdB9IoDzzZXaJaI5eL9QjNiN/DMA2s=
+github.com/streadway/amqp v0.0.0-20190404075320-75d898a42a94/go.mod h1:AZpEONHx3DKn8O/DFsRAY58/XVQiIPMTMB1SddzLXVw=
+github.com/streadway/amqp v0.0.0-20190827072141-edfb9018d271/go.mod h1:AZpEONHx3DKn8O/DFsRAY58/XVQiIPMTMB1SddzLXVw=
+github.com/streadway/handy v0.0.0-20190108123426-d5acb3125c2a/go.mod h1:qNTQ5P5JnDBl6z3cMAg/SywNDC5ABu5ApDIw6lUbRmI=
+github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/testify v0.0.0-20170130113145-4d4bfba8f1d1/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
+github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
+github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
+github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
+github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
+github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/tmc/grpc-websocket-proxy v0.0.0-20170815181823-89b8d40f7ca8/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U=
+github.com/tmc/grpc-websocket-proxy v0.0.0-20190109142713-0ad062ec5ee5/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U=
+github.com/tmc/grpc-websocket-proxy v0.0.0-20200427203606-3cfed13b9966/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U=
+github.com/tomasen/realip v0.0.0-20180522021738-f0c99a92ddce/go.mod h1:o8v6yHRoik09Xen7gje4m9ERNah1d1PPsVq1VEx9vE4=
+github.com/ugorji/go/codec v0.0.0-20181204163529-d75b2dcb6bc8/go.mod h1:VFNgLljTbGfSG7qAOspJ7OScBnGdDN/yBr0sguwnwf0=
+github.com/urfave/cli v1.20.0/go.mod h1:70zkFmudgCuE/ngEzBv17Jvp/497gISqfk5gWijbERA=
+github.com/urfave/cli v1.22.1/go.mod h1:Gos4lmkARVdJ6EkW0WaNv/tZAAMe9V7XWyB60NtXRu0=
+github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU=
+github.com/xordataexchange/crypt v0.0.3-0.20170626215501-b2862e3d0a77/go.mod h1:aYKd//L2LvnjZzWKhF00oedf4jCCReLcmhLdhm1A27Q=
+github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+go.etcd.io/bbolt v1.3.3/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU=
+go.etcd.io/bbolt v1.3.4/go.mod h1:G5EMThwa9y8QZGBClrRx5EY+Yw9kAhnjy3bSjsnlVTQ=
+go.etcd.io/etcd v0.0.0-20191023171146-3cf2f69b5738/go.mod h1:dnLIgRNXwCJa5e+c6mIZCrds/GIG4ncV9HhK5PX7jPg=
+go.etcd.io/etcd v0.0.0-20200513171258-e048e166ab9c/go.mod h1:xCI7ZzBfRuGgBXyXO6yfWfDmlWd35khcWpUa4L0xI/k=
+go.etcd.io/etcd v0.5.0-alpha.5.0.20200819165624-17cef6e3e9d5/go.mod h1:skWido08r9w6Lq/w70DO5XYIKMu4QFu1+4VsqLQuJy8=
+go.opencensus.io v0.20.1/go.mod h1:6WKK9ahsWS3RSO+PY9ZHZUfv2irvY6gN279GOPZjmmk=
+go.opencensus.io v0.20.2/go.mod h1:6WKK9ahsWS3RSO+PY9ZHZUfv2irvY6gN279GOPZjmmk=
+go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
+go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
+go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.opencensus.io v0.22.4/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.uber.org/atomic v1.3.2/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE=
+go.uber.org/atomic v1.4.0/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE=
+go.uber.org/atomic v1.5.0/go.mod h1:sABNBOSYdrvTF6hTgEIbc7YasKWGhgEQZyfxyTvoXHQ=
+go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/0=
+go.uber.org/multierr v1.3.0/go.mod h1:VgVr7evmIr6uPjLBxg28wmKNXyqE9akIJ5XnfpiKl+4=
+go.uber.org/multierr v1.4.0/go.mod h1:VgVr7evmIr6uPjLBxg28wmKNXyqE9akIJ5XnfpiKl+4=
+go.uber.org/tools v0.0.0-20190618225709-2cfd321de3ee/go.mod h1:vJERXedbb3MVM5f9Ejo0C68/HhF8uaILCdgjnY+goOA=
+go.uber.org/zap v1.10.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q=
+go.uber.org/zap v1.13.0/go.mod h1:zwrFLgMcdUuIBviXEYEH1YKNaOBnKXsx2IPda5bBwHM=
+golang.org/x/crypto v0.0.0-20180501155221-613d6eafa307/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20181029021203-45a5f77698d3/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
+golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20190701094942-4def268fd1a4/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
+golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
+golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek=
+golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY=
+golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM=
+golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU=
+golang.org/x/exp v0.0.0-20200331195152-e8c3332aa8e5/go.mod h1:4M0jN8W1tt0AVLNr8HDosyJCDCDuyL9N9+3m7wDWgKw=
+golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js=
+golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
+golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190409202823-959b441ac422/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs=
+golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE=
+golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o=
+golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc=
+golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY=
+golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
+golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
+golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181023162649-9b4f9f5ad519/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181201002055-351d144fa1fc/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181220203305-927f97764cc3/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190125091013-d26f9f9a57f3/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks=
+golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190813141303-74dc4d7220e7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190923162816-aa69164e4478/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20191002035440-2ec189313ef0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200222125558-5a598a2470a0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200301022130-244492dfa37a/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200324143707-d3edc9973b7e/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200421231249-e086a090c8fd/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200501053045-e0ff5e5a1de5/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200506145744-7e3656a0809f/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200513185701-a91f0712d120/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200520182314-0ba52f642ac2/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200625001655-4c5254603344 h1:vGXIOMxbNfDTk/aXCmfdLgkrSV+Z2tcbze+pEc3v5W4=
+golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
+golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
+golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190412183630-56d357773e84/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20200317015054-43a5402ce75a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sys v0.0.0-20180823144017-11551d06cbcc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181026203630-95b1ffbd15a5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181107165924-66b7b1311ac8/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181122145206-62eef0e2fa9b/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181205085412-a5c9d58dba9a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190222072716-a9d3bda3a223/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190826190057-c7b8b68b1456/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191008105621-543471e840be/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191220142924-d4481acd189f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200331124033-c3d80250170d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200420163511-1957bb5e6d1f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200501052902-10377860bb8e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200511232937-7e40ca221e25/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200515095857-1151b9dac4a9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200523222454-059865788121/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200625212154-ddb9806d33ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20201214210602-f9fddec55a1e h1:AyodaIpKjppX+cBfTASF2E1US3H2JFBj920Ot3rtDjs=
+golang.org/x/sys v0.0.0-20201214210602-f9fddec55a1e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.2 h1:tW2bmiBqwgJj/UpqtC8EpXEZVYOwU0yG4iWbprSVAcs=
+golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
+golang.org/x/time v0.0.0-20180412165947-fbb02b2291d2/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20200416051211-89c76fbcd5d1/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/tools v0.0.0-20180221164845-07fd8470d635/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20180828015842-6cd1fcedba52/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
+golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190328211700-ab21143f2384/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191010075000-0337d82405ff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191029041327-9cc4af7d6b2c/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191029190741-b9c20aec41a5/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200103221440-774c71fcf114/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200122220014-bf1340f18c4a/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200204074204-1cc6d1ef6c74/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200207183749-b753a1ba74fa/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200224181240-023911ca70b2/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200227222343-706bc42d1f0d/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
+golang.org/x/tools v0.0.0-20200312045724-11d5b4c81c7d/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
+golang.org/x/tools v0.0.0-20200331025713-a30bf2db82d4/go.mod h1:Sl4aGygMT6LrqrWclx+PTx3U+LnKx/seiNR+3G19Ar8=
+golang.org/x/tools v0.0.0-20200426102838-f3a5411a4c3b/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200512131952-2bc93b1c0c88/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200515010526-7d3b6ebf133d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200626171337-aa94e735be7f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200630154851-b2d8b0336632/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200706234117-b22de6825cf7/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
+golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+google.golang.org/api v0.3.1/go.mod h1:6wY9I6uQWHQ8EM57III9mq/AjF+i8G65rmVagqKMtkk=
+google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE=
+google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M=
+google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
+google.golang.org/api v0.9.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
+google.golang.org/api v0.10.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
+google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.14.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.15.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.17.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.18.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.19.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.20.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.22.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.24.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE=
+google.golang.org/api v0.28.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE=
+google.golang.org/api v0.29.0/go.mod h1:Lcubydp8VUV7KeIHD9z2Bys/sm/vGKnG1UHuDBSrHWM=
+google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
+google.golang.org/appengine v1.2.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0=
+google.golang.org/appengine v1.6.2/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0=
+google.golang.org/appengine v1.6.5/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
+google.golang.org/appengine v1.6.6/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
+google.golang.org/genproto v0.0.0-20170818010345-ee236bd376b0/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20181107211654-5fc9ac540362/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190530194941-fb225487d101/go.mod h1:z3L6/3dTEVtUr6QSP8miRzeRqwQOioJ9I66odjN4I7s=
+google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8=
+google.golang.org/genproto v0.0.0-20190927181202-20e1ac93f88c/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8=
+google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191115194625-c23dd37a84c9/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191216164720-4f79533eabd1/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191230161307-f3c370f40bfb/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200115191322-ca5a22157cba/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200122232147-0452cf42e150/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200204135345-fa8e72b47b90/go.mod h1:GmwEX6Z4W5gMy59cAlVYjN9JhxgbQH6Gn+gFDQe2lzA=
+google.golang.org/genproto v0.0.0-20200212174721-66ed5ce911ce/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200224152610-e50cd9704f63/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200228133532-8c2c7df3a383/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200305110556-506484158171/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200312145019-da6875a35672/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200331122359-1ee6d9798940/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200423170343-7949de9c1215/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200430143042-b979b6f78d84/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200511104702-f5ebc3bea380/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200515170657-fc4c6c6a6587/go.mod h1:YsZOwe1myG/8QRHRsmBRE1LrgQY60beZKjly0O1fX9U=
+google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
+google.golang.org/genproto v0.0.0-20200626011028-ee7919e894b5/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20200707001353-8e8330bf89df h1:HWF6nM8ruGdu1K8IXFR+i2oT3YP+iBfZzCbC9zUfcWo=
+google.golang.org/genproto v0.0.0-20200707001353-8e8330bf89df/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/grpc v1.8.0/go.mod h1:yo6s7OP7yaDglbqo1J04qKzAhqBH6lvTonzMVmEdcZw=
+google.golang.org/grpc v1.17.0/go.mod h1:6QZJwpn2B+Zp71q/5VxRsJ6NXXVCE5NRUHRo+f3cWCs=
+google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
+google.golang.org/grpc v1.20.0/go.mod h1:chYK+tFQF0nDUGJgXMSgLCQk3phJEuONr2DCgLDdAQM=
+google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
+google.golang.org/grpc v1.21.0/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
+google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
+google.golang.org/grpc v1.22.1/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.23.1/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.24.0/go.mod h1:XDChyiUovWa60DnaeDeZmSW86xtLtjtZbwvSiRnRtcA=
+google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
+google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60=
+google.golang.org/grpc v1.29.0/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
+google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
+google.golang.org/grpc v1.35.0 h1:TwIQcH3es+MojMVojxxfQ3l3OF2KzlRxML2xZq0kRo8=
+google.golang.org/grpc v1.35.0/go.mod h1:qjiiYl8FncCW8feJPdyg3v6XW24KsRHe+dy9BAGRRjU=
+google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
+google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
+google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
+google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
+google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
+google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4=
+google.golang.org/protobuf v1.25.0 h1:Ejskq+SyPohKW+1uil0JJMtmHCgJPJ/qWTxr8qp+R4c=
+google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c=
+gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
+gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/cheggaaa/pb.v1 v1.0.25/go.mod h1:V/YB90LKu/1FcN3WVnfiiE5oMCibMjukxqG/qStrOgw=
+gopkg.in/cheggaaa/pb.v1 v1.0.28/go.mod h1:V/YB90LKu/1FcN3WVnfiiE5oMCibMjukxqG/qStrOgw=
+gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI=
+gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
+gopkg.in/gcfg.v1 v1.2.3/go.mod h1:yesOnuUOFQAhST5vPY4nbZsb/huCgGGXlipJsBn0b3o=
+gopkg.in/resty.v1 v1.12.0/go.mod h1:mDo4pnntr5jdWRML875a/NmxYqAlA73dVijT2AXvQQo=
+gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
+gopkg.in/warnings.v0 v0.1.2/go.mod h1:jksf8JmL6Qr/oQM2OXTHunEvvTAsrWBLb6OOjuVWRNI=
+gopkg.in/yaml.v2 v2.0.0-20170812160011-eb3733d160e7/go.mod h1:JAlM8MvJe8wmxCU4Bli9HhUf9+ttbYbLASfIpnQbh74=
+gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.5/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.6/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+honnef.co/go/tools v0.0.0-20180728063816-88497007e858/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
+honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
+honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
+rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
+rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
+rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
+sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o=
+sourcegraph.com/sourcegraph/appdash v0.0.0-20190731080439-ebfcffb1b5c0/go.mod h1:hI742Nqp5OhwiqlzhgfbWU4mW4yO10fP+LoT9WOswdU=
diff --git a/handler.go b/handler.go
deleted file mode 100644
index 8c7e332..0000000
--- a/handler.go
+++ /dev/null
@@ -1,245 +0,0 @@
-package stfe
-
-import (
- "context"
- "fmt"
- "time"
-
- "net/http"
-
- "github.com/golang/glog"
- "github.com/google/trillian"
-)
-
-// Handler implements the http.Handler interface, and contains a reference
-// to an STFE server instance as well as a function that uses it.
-type Handler struct {
- instance *Instance // STFE server instance
- endpoint Endpoint // e.g., add-entry
- method string // e.g., GET
- handler func(context.Context, *Instance, http.ResponseWriter, *http.Request) (int, error)
-}
-
-// Path returns a path that should be configured for this handler
-func (h Handler) Path() string {
- return h.endpoint.Path("", h.instance.LogParameters.Prefix)
-}
-
-// ServeHTTP is part of the http.Handler interface
-func (a Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- // export prometheus metrics
- var now time.Time = time.Now()
- var statusCode int
- defer func() {
- rspcnt.Inc(a.instance.LogParameters.id(), string(a.endpoint), fmt.Sprintf("%d", statusCode))
- latency.Observe(time.Now().Sub(now).Seconds(), a.instance.LogParameters.id(), string(a.endpoint), fmt.Sprintf("%d", statusCode))
- }()
- reqcnt.Inc(a.instance.LogParameters.id(), string(a.endpoint))
-
- ctx, cancel := context.WithDeadline(r.Context(), now.Add(a.instance.LogParameters.Deadline))
- defer cancel()
-
- if r.Method != a.method {
- glog.Warningf("%s/%s: got HTTP %s, wanted HTTP %s", a.instance.LogParameters.Prefix, string(a.endpoint), r.Method, a.method)
- a.sendHTTPError(w, http.StatusMethodNotAllowed, fmt.Errorf("method not allowed: %s", r.Method))
- return
- }
-
- statusCode, err := a.handler(ctx, a.instance, w, r)
- if err != nil {
- glog.Warningf("handler error %s/%s: %v", a.instance.LogParameters.Prefix, a.endpoint, err)
- a.sendHTTPError(w, statusCode, err)
- }
-}
-
-func (a Handler) sendHTTPError(w http.ResponseWriter, statusCode int, err error) {
- http.Error(w, http.StatusText(statusCode), statusCode)
-}
-
-// addEntry accepts log entries from trusted submitters
-func addEntry(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
- glog.V(3).Info("handling add-entry request")
- req, err := i.LogParameters.newAddEntryRequest(r)
- if err != nil {
- return http.StatusBadRequest, err
- }
-
- trsp, err := i.Client.QueueLeaf(ctx, &trillian.QueueLeafRequest{
- LogId: i.LogParameters.TreeId,
- Leaf: &trillian.LogLeaf{
- LeafValue: req.Item,
- ExtraData: req.Signature,
- },
- })
- if errInner := checkQueueLeaf(trsp, err); errInner != nil {
- return http.StatusInternalServerError, fmt.Errorf("bad QueueLeafResponse: %v", errInner)
- }
-
- sdi, err := i.LogParameters.genV1Sdi(trsp.QueuedLeaf.Leaf.LeafValue)
- if err != nil {
- return http.StatusInternalServerError, fmt.Errorf("failed creating signed debug info: %v", err)
- }
- rsp, err := sdi.MarshalB64()
- if err != nil {
- return http.StatusInternalServerError, err
- }
- if err := writeJsonResponse(rsp, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// getEntries provides a list of entries from the Trillian backend
-func getEntries(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
- glog.V(3).Info("handling get-entries request")
- req, err := i.LogParameters.newGetEntriesRequest(r)
- if err != nil {
- return http.StatusBadRequest, err
- }
-
- trsp, err := i.Client.GetLeavesByRange(ctx, &trillian.GetLeavesByRangeRequest{
- LogId: i.LogParameters.TreeId,
- StartIndex: req.Start,
- Count: req.End - req.Start + 1,
- })
- if status, errInner := checkGetLeavesByRange(req, trsp, err); errInner != nil {
- return status, fmt.Errorf("bad GetLeavesByRangeResponse: %v", errInner)
- }
-
- rsp, err := i.LogParameters.newGetEntriesResponse(trsp.Leaves)
- if err != nil {
- return http.StatusInternalServerError, fmt.Errorf("failed creating GetEntriesResponse: %v", err)
- }
- if err := writeJsonResponse(rsp, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// getAnchors provides a list of configured trust anchors
-func getAnchors(_ context.Context, i *Instance, w http.ResponseWriter, _ *http.Request) (int, error) {
- glog.V(3).Info("handling get-anchors request")
- data := i.LogParameters.newGetAnchorsResponse()
- if err := writeJsonResponse(data, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// getProofByHash provides an inclusion proof based on a given leaf hash
-func getProofByHash(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
- glog.V(3).Info("handling get-proof-by-hash request")
- req, err := i.LogParameters.newGetProofByHashRequest(r)
- if err != nil {
- return http.StatusBadRequest, err
- }
-
- trsp, err := i.Client.GetInclusionProofByHash(ctx, &trillian.GetInclusionProofByHashRequest{
- LogId: i.LogParameters.TreeId,
- LeafHash: req.Hash,
- TreeSize: req.TreeSize,
- OrderBySequence: true,
- })
- if errInner := checkGetInclusionProofByHash(i.LogParameters, trsp, err); errInner != nil {
- return http.StatusInternalServerError, fmt.Errorf("bad GetInclusionProofByHashResponse: %v", errInner)
- }
-
- rsp, err := NewInclusionProofV1(i.LogParameters.LogId, uint64(req.TreeSize), uint64(trsp.Proof[0].LeafIndex), trsp.Proof[0].Hashes).MarshalB64()
- if err != nil {
- return http.StatusInternalServerError, err
- }
- if err := writeJsonResponse(rsp, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// getConsistencyProof provides a consistency proof between two STHs
-func getConsistencyProof(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
- glog.V(3).Info("handling get-consistency-proof request")
- req, err := i.LogParameters.newGetConsistencyProofRequest(r)
- if err != nil {
- return http.StatusBadRequest, err
- }
-
- trsp, err := i.Client.GetConsistencyProof(ctx, &trillian.GetConsistencyProofRequest{
- LogId: i.LogParameters.TreeId,
- FirstTreeSize: int64(req.First),
- SecondTreeSize: int64(req.Second),
- })
- if errInner := checkGetConsistencyProof(i.LogParameters, trsp, err); errInner != nil {
- return http.StatusInternalServerError, fmt.Errorf("bad GetConsistencyProofResponse: %v", errInner)
- }
-
- rsp, err := NewConsistencyProofV1(i.LogParameters.LogId, uint64(req.First), uint64(req.Second), trsp.Proof.Hashes).MarshalB64()
- if err != nil {
- return http.StatusInternalServerError, err
- }
- if err := writeJsonResponse(rsp, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// getSth provides the most recent STH
-func getSth(ctx context.Context, i *Instance, w http.ResponseWriter, _ *http.Request) (int, error) {
- glog.V(3).Info("handling get-sth request")
- sth, err := i.SthSource.Latest(ctx)
- if err != nil {
- return http.StatusInternalServerError, fmt.Errorf("Latest: %v", err)
- }
- rsp, err := sth.MarshalB64()
- if err != nil {
- return http.StatusInternalServerError, err
- }
- if err := writeJsonResponse(rsp, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// getStableSth provides an STH that is stable for a fixed period of time
-func getStableSth(ctx context.Context, i *Instance, w http.ResponseWriter, _ *http.Request) (int, error) {
- glog.V(3).Info("handling get-stable-sth request")
- sth, err := i.SthSource.Stable(ctx)
- if err != nil {
- return http.StatusInternalServerError, fmt.Errorf("Latest: %v", err)
- }
- rsp, err := sth.MarshalB64()
- if err != nil {
- return http.StatusInternalServerError, err
- }
- if err := writeJsonResponse(rsp, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// getCosi provides a cosigned STH
-func getCosi(ctx context.Context, i *Instance, w http.ResponseWriter, _ *http.Request) (int, error) {
- costh, err := i.SthSource.Cosigned(ctx)
- if err != nil {
- return http.StatusInternalServerError, fmt.Errorf("Cosigned: %v", err)
- }
- rsp, err := costh.MarshalB64()
- if err != nil {
- return http.StatusInternalServerError, err
- }
- if err := writeJsonResponse(rsp, w); err != nil {
- return http.StatusInternalServerError, err
- }
- return http.StatusOK, nil
-}
-
-// addCosi accepts cosigned STHs from trusted witnesses
-func addCosi(ctx context.Context, i *Instance, w http.ResponseWriter, r *http.Request) (int, error) {
- glog.V(3).Info("handling add-cosignature request")
- costh, err := i.LogParameters.newAddCosignatureRequest(r)
- if err != nil {
- return http.StatusBadRequest, err
- }
- if err := i.SthSource.AddCosignature(ctx, costh); err != nil {
- return http.StatusBadRequest, err
- }
- return http.StatusOK, nil
-}
diff --git a/handler_test.go b/handler_test.go
deleted file mode 100644
index 804ef67..0000000
--- a/handler_test.go
+++ /dev/null
@@ -1,925 +0,0 @@
-package stfe
-
-// TODO: refactor tests
-
-import (
- "bytes"
- "context"
- "crypto"
- "fmt"
- "testing"
-
- "crypto/ed25519"
- "encoding/base64"
- "encoding/json"
- "net/http"
- "net/http/httptest"
-
- "github.com/golang/mock/gomock"
- "github.com/google/certificate-transparency-go/trillian/mockclient"
- cttestdata "github.com/google/certificate-transparency-go/trillian/testdata"
- "github.com/google/trillian"
-
- "github.com/system-transparency/stfe/namespace/testdata"
-)
-
-type testHandler struct {
- mockCtrl *gomock.Controller
- client *mockclient.MockTrillianLogClient
- instance *Instance
-}
-
-func newTestHandler(t *testing.T, signer crypto.Signer, sth *StItem) *testHandler {
- ctrl := gomock.NewController(t)
- client := mockclient.NewMockTrillianLogClient(ctrl)
- lp := makeTestLogParameters(t, signer)
- source := &ActiveSthSource{
- client: client,
- logParameters: lp,
- }
- if sth != nil {
- source.currCosth = NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- Signature: testSignature,
- },
- })
- source.nextCosth = NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil)
- source.cosignatureFrom = make(map[string]bool)
- }
- return &testHandler{
- mockCtrl: ctrl,
- client: client,
- instance: &Instance{
- Client: client,
- LogParameters: lp,
- SthSource: source,
- },
- }
-}
-
-func (th *testHandler) getHandlers(t *testing.T) map[Endpoint]Handler {
- return map[Endpoint]Handler{
- EndpointGetLatestSth: Handler{instance: th.instance, handler: getSth, endpoint: EndpointGetLatestSth, method: http.MethodGet},
- EndpointGetConsistencyProof: Handler{instance: th.instance, handler: getConsistencyProof, endpoint: EndpointGetConsistencyProof, method: http.MethodGet},
- EndpointGetProofByHash: Handler{instance: th.instance, handler: getProofByHash, endpoint: EndpointGetProofByHash, method: http.MethodGet},
- EndpointGetAnchors: Handler{instance: th.instance, handler: getAnchors, endpoint: EndpointGetAnchors, method: http.MethodGet},
- EndpointGetEntries: Handler{instance: th.instance, handler: getEntries, endpoint: EndpointGetEntries, method: http.MethodGet},
- EndpointGetStableSth: Handler{instance: th.instance, handler: getStableSth, endpoint: EndpointGetStableSth, method: http.MethodGet},
- EndpointGetCosignedSth: Handler{instance: th.instance, handler: getCosi, endpoint: EndpointGetCosignedSth, method: http.MethodGet},
- }
-}
-
-func (th *testHandler) getHandler(t *testing.T, endpoint Endpoint) Handler {
- handler, ok := th.getHandlers(t)[endpoint]
- if !ok {
- t.Fatalf("no such get endpoint: %s", endpoint)
- }
- return handler
-}
-
-func (th *testHandler) postHandlers(t *testing.T) map[Endpoint]Handler {
- return map[Endpoint]Handler{
- EndpointAddEntry: Handler{instance: th.instance, handler: addEntry, endpoint: EndpointAddEntry, method: http.MethodPost},
- EndpointAddCosignature: Handler{instance: th.instance, handler: addCosi, endpoint: EndpointAddCosignature, method: http.MethodPost},
- }
-}
-
-func (th *testHandler) postHandler(t *testing.T, endpoint Endpoint) Handler {
- handler, ok := th.postHandlers(t)[endpoint]
- if !ok {
- t.Fatalf("no such post endpoint: %s", endpoint)
- }
- return handler
-}
-
-// TestGetHandlersRejectPost checks that all get handlers reject post requests
-func TestGetHandlersRejectPost(t *testing.T) {
- th := newTestHandler(t, nil, nil)
- defer th.mockCtrl.Finish()
-
- for endpoint, handler := range th.getHandlers(t) {
- t.Run(string(endpoint), func(t *testing.T) {
- s := httptest.NewServer(handler)
- defer s.Close()
-
- url := endpoint.Path(s.URL, th.instance.LogParameters.Prefix)
- if rsp, err := http.Post(url, "application/json", nil); err != nil {
- t.Fatalf("http.Post(%s)=(_,%q), want (_,nil)", url, err)
- } else if rsp.StatusCode != http.StatusMethodNotAllowed {
- t.Errorf("http.Post(%s)=(%d,nil), want (%d, nil)", url, rsp.StatusCode, http.StatusMethodNotAllowed)
- }
- })
- }
-}
-
-// TestPostHandlersRejectGet checks that all post handlers reject get requests
-func TestPostHandlersRejectGet(t *testing.T) {
- th := newTestHandler(t, nil, nil)
- defer th.mockCtrl.Finish()
-
- for endpoint, handler := range th.postHandlers(t) {
- t.Run(string(endpoint), func(t *testing.T) {
- s := httptest.NewServer(handler)
- defer s.Close()
-
- url := endpoint.Path(s.URL, th.instance.LogParameters.Prefix)
- if rsp, err := http.Get(url); err != nil {
- t.Fatalf("http.Get(%s)=(_,%q), want (_,nil)", url, err)
- } else if rsp.StatusCode != http.StatusMethodNotAllowed {
- t.Errorf("http.Get(%s)=(%d,nil), want (%d, nil)", url, rsp.StatusCode, http.StatusMethodNotAllowed)
- }
- })
- }
-}
-
-//// TestGetAnchors checks for a valid number of decodable trust anchors
-//func TestGetAnchors(t *testing.T) {
-// // TODO: refactor with namespaces
-// //th := newTestHandler(t, nil)
-// //defer th.mockCtrl.Finish()
-//
-// //url := EndpointGetAnchors.Path("http://example.com", th.instance.LogParameters.Prefix)
-// //req, err := http.NewRequest("GET", url, nil)
-// //if err != nil {
-// // t.Fatalf("failed creating http request: %v", err)
-// //}
-//
-// //w := httptest.NewRecorder()
-// //th.getHandler(t, EndpointGetAnchors).ServeHTTP(w, req)
-// //if w.Code != http.StatusOK {
-// // t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, http.StatusOK)
-// // return
-// //}
-//
-// //var derAnchors [][]byte
-// //if err := json.Unmarshal([]byte(w.Body.String()), &derAnchors); err != nil {
-// // t.Errorf("failed unmarshaling trust anchors response: %v", err)
-// // return
-// //}
-// //if got, want := len(derAnchors), len(th.instance.LogParameters.); got != want {
-// // t.Errorf("unexpected trust anchor count %d, want %d", got, want)
-// //}
-// //if _, err := x509util.ParseDerList(derAnchors); err != nil {
-// // t.Errorf("failed decoding trust anchors: %v", err)
-// //}
-//}
-
-func TestGetEntries(t *testing.T) {
- for _, table := range []struct {
- description string
- breq *GetEntriesRequest
- trsp *trillian.GetLeavesByRangeResponse
- terr error
- wantCode int
- wantErrText string
- }{
- {
- description: "bad request parameters",
- breq: &GetEntriesRequest{
- Start: 1,
- End: 0,
- },
- wantCode: http.StatusBadRequest,
- wantErrText: http.StatusText(http.StatusBadRequest) + "\n",
- },
- {
- description: "empty trillian response",
- breq: &GetEntriesRequest{
- Start: 0,
- End: 1,
- },
- terr: fmt.Errorf("back-end failure"),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- },
- // TODO: make invalid get-entries response
- //{
- // description: "invalid get-entries response",
- // breq: &GetEntriesRequest{
- // Start: 0,
- // End: 1,
- // },
- // trsp: makeTrillianGetLeavesByRangeResponse(t, 0, 1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk),
- // wantCode: http.StatusInternalServerError,
- // wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- //},
- {
- description: "valid get-entries response",
- breq: &GetEntriesRequest{
- Start: 0,
- End: 1,
- },
- trsp: makeTrillianGetLeavesByRangeResponse(t, 0, 1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk),
- wantCode: http.StatusOK,
- },
- } {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, nil, nil)
- defer th.mockCtrl.Finish()
-
- url := EndpointGetEntries.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("must create http request: %v", err)
- }
- q := req.URL.Query()
- q.Add("start", fmt.Sprintf("%d", table.breq.Start))
- q.Add("end", fmt.Sprintf("%d", table.breq.End))
- req.URL.RawQuery = q.Encode()
-
- if table.trsp != nil || table.terr != nil {
- th.client.EXPECT().GetLeavesByRange(newDeadlineMatcher(), gomock.Any()).Return(table.trsp, table.terr)
- }
- w := httptest.NewRecorder()
- th.getHandler(t, EndpointGetEntries).ServeHTTP(w, req)
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
-
- body := w.Body.String()
- if w.Code != http.StatusOK {
- if body != table.wantErrText {
- t.Errorf("GET(%s)=%q, want text %q", url, body, table.wantErrText)
- }
- return
- }
-
- var rsps []*GetEntryResponse
- if err := json.Unmarshal([]byte(body), &rsps); err != nil {
- t.Errorf("failed parsing list of log entries: %v", err)
- return
- }
- for i, rsp := range rsps {
- var item StItem
- if err := item.Unmarshal(rsp.Item); err != nil {
- t.Errorf("failed unmarshaling StItem: %v", err)
- } else {
- if item.Format != StFormatChecksumV1 {
- t.Errorf("invalid StFormat: got %v, want %v", item.Format, StFormatChecksumV1)
- }
- checksum := item.ChecksumV1
- if got, want := checksum.Package, []byte(fmt.Sprintf("%s_%d", testPackage, int64(i)+table.breq.Start)); !bytes.Equal(got, want) {
- t.Errorf("got package name %s, want %s", string(got), string(want))
- }
- if got, want := checksum.Checksum, make([]byte, 32); !bytes.Equal(got, want) {
- t.Errorf("got package checksum %X, want %X", got, want)
- }
- // TODO: check namespace?
- }
-
- // TODO: verify signaturew w/ namespace?
- //if !ed25519.Verify(chain[0].PublicKey.(ed25519.PublicKey), rsp.Item, rsp.Signature) {
- // t.Errorf("invalid ed25519 signature")
- //}
- }
- }()
- }
-}
-
-func TestAddEntry(t *testing.T) {
- for _, table := range []struct {
- description string
- breq *bytes.Buffer
- trsp *trillian.QueueLeafResponse
- terr error
- wantCode int
- wantErrText string
- signer crypto.Signer
- }{
- {
- description: "empty trillian response",
- breq: mustMakeEd25519ChecksumV1Buffer(t, testPackage, testChecksum, testdata.Ed25519Vk, testdata.Ed25519Sk),
- terr: fmt.Errorf("back-end failure"),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- },
- {
- description: "bad request parameters: invalid signature",
- breq: mustMakeEd25519ChecksumV1Buffer(t, testPackage, testChecksum, make([]byte, 32), testdata.Ed25519Sk),
- wantCode: http.StatusBadRequest,
- wantErrText: http.StatusText(http.StatusBadRequest) + "\n",
- },
- {
- description: "log signature failure",
- breq: mustMakeEd25519ChecksumV1Buffer(t, testPackage, testChecksum, testdata.Ed25519Vk, testdata.Ed25519Sk),
- trsp: makeTrillianQueueLeafResponse(t, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk, false),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- signer: cttestdata.NewSignerWithErr(nil, fmt.Errorf("signing failed")),
- },
- {
- description: "valid add-entry request-response",
- breq: mustMakeEd25519ChecksumV1Buffer(t, testPackage, testChecksum, testdata.Ed25519Vk, testdata.Ed25519Sk),
- trsp: makeTrillianQueueLeafResponse(t, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk, false),
- wantCode: http.StatusOK,
- signer: cttestdata.NewSignerWithFixedSig(nil, make([]byte, 32)),
- },
- } {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, table.signer, nil)
- defer th.mockCtrl.Finish()
-
- url := EndpointAddEntry.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("POST", url, table.breq)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
- req.Header.Set("Content-Type", "application/json")
-
- if table.trsp != nil || table.terr != nil {
- th.client.EXPECT().QueueLeaf(newDeadlineMatcher(), gomock.Any()).Return(table.trsp, table.terr)
- }
- w := httptest.NewRecorder()
- th.postHandler(t, EndpointAddEntry).ServeHTTP(w, req)
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
-
- body := w.Body.String()
- if w.Code != http.StatusOK {
- if body != table.wantErrText {
- t.Errorf("GET(%s)=%q, want text %q", url, body, table.wantErrText)
- }
- return
- }
-
- // status code is http.StatusOK, check response
- var data []byte
- if err := json.Unmarshal([]byte(body), &data); err != nil {
- t.Errorf("failed unmarshaling json: %v, wanted ok", err)
- return
- }
- var item StItem
- if err := item.Unmarshal(data); err != nil {
- t.Errorf("failed unmarshaling StItem: %v, wanted ok", err)
- return
- }
- if item.Format != StFormatSignedDebugInfoV1 {
- t.Errorf("invalid StFormat: got %v, want %v", item.Format, StFormatSignedDebugInfoV1)
- }
- sdi := item.SignedDebugInfoV1
- if !bytes.Equal(sdi.LogId, th.instance.LogParameters.LogId) {
- t.Errorf("want log id %X, got %X", sdi.LogId, th.instance.LogParameters.LogId)
- }
- if len(sdi.Message) == 0 {
- t.Errorf("expected message, got none")
- }
- if !bytes.Equal(sdi.Signature, make([]byte, 32)) {
- t.Errorf("want signature %X, got %X", sdi.Signature, make([]byte, 32))
- }
- }()
- }
-}
-
-func TestGetSth(t *testing.T) {
- tr := makeLatestSignedLogRootResponse(t, 0, 0, make([]byte, 32))
- tr.SignedLogRoot.LogRoot = tr.SignedLogRoot.LogRoot[1:]
- for _, table := range []struct {
- description string
- trsp *trillian.GetLatestSignedLogRootResponse
- terr error
- wantCode int
- wantErrText string
- signer crypto.Signer
- }{
- {
- description: "empty trillian response",
- terr: fmt.Errorf("back-end failure"),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- },
- {
- description: "marshal failure: no signature",
- trsp: makeLatestSignedLogRootResponse(t, 0, 0, make([]byte, 32)),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- signer: cttestdata.NewSignerWithFixedSig(nil, make([]byte, 0)),
- },
- {
- description: "signature failure",
- trsp: makeLatestSignedLogRootResponse(t, 0, 0, make([]byte, 32)),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- signer: cttestdata.NewSignerWithErr(nil, fmt.Errorf("signing failed")),
- },
- {
- description: "valid request and response",
- trsp: makeLatestSignedLogRootResponse(t, 0, 0, make([]byte, 32)),
- wantCode: http.StatusOK,
- signer: cttestdata.NewSignerWithFixedSig(nil, make([]byte, 32)),
- },
- } {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, table.signer, nil)
- defer th.mockCtrl.Finish()
-
- url := EndpointGetLatestSth.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
-
- w := httptest.NewRecorder()
- th.client.EXPECT().GetLatestSignedLogRoot(newDeadlineMatcher(), gomock.Any()).Return(table.trsp, table.terr)
- th.getHandler(t, EndpointGetLatestSth).ServeHTTP(w, req)
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
-
- body := w.Body.String()
- if w.Code != http.StatusOK {
- if body != table.wantErrText {
- t.Errorf("GET(%s)=%q, want text %q", url, body, table.wantErrText)
- }
- return
- }
-
- // status code is http.StatusOK, check response
- var data []byte
- if err := json.Unmarshal([]byte(body), &data); err != nil {
- t.Errorf("failed unmarshaling json: %v, wanted ok", err)
- return
- }
- var item StItem
- if err := item.Unmarshal(data); err != nil {
- t.Errorf("failed unmarshaling StItem: %v, wanted ok", err)
- return
- }
- if item.Format != StFormatSignedTreeHeadV1 {
- t.Errorf("invalid StFormat: got %v, want %v", item.Format, StFormatSignedTreeHeadV1)
- }
- sth := item.SignedTreeHeadV1
- if !bytes.Equal(sth.LogId, th.instance.LogParameters.LogId) {
- t.Errorf("want log id %X, got %X", sth.LogId, th.instance.LogParameters.LogId)
- }
- if !bytes.Equal(sth.Signature, make([]byte, 32)) {
- t.Errorf("want signature %X, got %X", sth.Signature, make([]byte, 32))
- }
- if sth.TreeHead.TreeSize != 0 {
- t.Errorf("want tree size %d, got %d", 0, sth.TreeHead.TreeSize)
- }
- if sth.TreeHead.Timestamp != 0 {
- t.Errorf("want timestamp %d, got %d", 0, sth.TreeHead.Timestamp)
- }
- if !bytes.Equal(sth.TreeHead.RootHash.Data, make([]byte, 32)) {
- t.Errorf("want root hash %X, got %X", make([]byte, 32), sth.TreeHead.RootHash)
- }
- if len(sth.TreeHead.Extension) != 0 {
- t.Errorf("want no extensions, got %v", sth.TreeHead.Extension)
- }
- }()
- }
-}
-
-func TestGetConsistencyProof(t *testing.T) {
- fixedProof := [][]byte{
- make([]byte, 32),
- make([]byte, 32),
- }
- for _, table := range []struct {
- description string
- breq *GetConsistencyProofRequest
- trsp *trillian.GetConsistencyProofResponse
- terr error
- wantCode int
- wantErrText string
- }{
- {
- description: "bad request parameters",
- breq: &GetConsistencyProofRequest{
- First: 2,
- Second: 1,
- },
- wantCode: http.StatusBadRequest,
- wantErrText: http.StatusText(http.StatusBadRequest) + "\n",
- },
- {
- description: "empty trillian response",
- breq: &GetConsistencyProofRequest{
- First: 1,
- Second: 2,
- },
- terr: fmt.Errorf("back-end failure"),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- },
- {
- description: "valid request and response",
- breq: &GetConsistencyProofRequest{
- First: 1,
- Second: 2,
- },
- trsp: makeTrillianGetConsistencyProofResponse(t, fixedProof),
- wantCode: http.StatusOK,
- },
- } {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, nil, nil)
- defer th.mockCtrl.Finish()
-
- url := EndpointGetConsistencyProof.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
- q := req.URL.Query()
- q.Add("first", fmt.Sprintf("%d", table.breq.First))
- q.Add("second", fmt.Sprintf("%d", table.breq.Second))
- req.URL.RawQuery = q.Encode()
-
- w := httptest.NewRecorder()
- if table.trsp != nil || table.terr != nil {
- th.client.EXPECT().GetConsistencyProof(newDeadlineMatcher(), gomock.Any()).Return(table.trsp, table.terr)
- }
- th.getHandler(t, EndpointGetConsistencyProof).ServeHTTP(w, req)
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
- body := w.Body.String()
- if w.Code != http.StatusOK {
- if body != table.wantErrText {
- t.Errorf("GET(%s)=%q, want text %q", url, body, table.wantErrText)
- }
- return
- }
-
- // status code is http.StatusOK, check response
- var data []byte
- if err := json.Unmarshal([]byte(body), &data); err != nil {
- t.Errorf("failed unmarshaling json: %v, wanted ok", err)
- return
- }
- var item StItem
- if err := item.Unmarshal(data); err != nil {
- t.Errorf("failed unmarshaling StItem: %v, wanted ok", err)
- return
- }
- if item.Format != StFormatConsistencyProofV1 {
- t.Errorf("invalid StFormat: got %v, want %v", item.Format, StFormatInclusionProofV1)
- }
- proof := item.ConsistencyProofV1
- if !bytes.Equal(proof.LogId, th.instance.LogParameters.LogId) {
- t.Errorf("want log id %X, got %X", proof.LogId, th.instance.LogParameters.LogId)
- }
- if got, want := proof.TreeSize1, uint64(table.breq.First); got != want {
- t.Errorf("want tree size %d, got %d", want, got)
- }
- if got, want := proof.TreeSize2, uint64(table.breq.Second); got != want {
- t.Errorf("want tree size %d, got %d", want, got)
- }
- if got, want := len(proof.ConsistencyPath), len(fixedProof); got != want {
- t.Errorf("want proof length %d, got %d", want, got)
- return
- }
- for i, nh := range proof.ConsistencyPath {
- if !bytes.Equal(nh.Data, fixedProof[i]) {
- t.Errorf("want proof[%d]=%X, got %X", i, fixedProof[i], nh.Data)
- }
- }
- }()
- }
-}
-
-func TestGetProofByHash(t *testing.T) {
- fixedProof := [][]byte{
- make([]byte, 32),
- make([]byte, 32),
- }
- for _, table := range []struct {
- description string
- breq *GetProofByHashRequest
- trsp *trillian.GetInclusionProofByHashResponse
- terr error
- wantCode int
- wantErrText string
- }{
- {
- description: "bad request parameters",
- breq: &GetProofByHashRequest{
- Hash: make([]byte, 32),
- TreeSize: 0,
- },
- wantCode: http.StatusBadRequest,
- wantErrText: http.StatusText(http.StatusBadRequest) + "\n",
- },
- {
- description: "empty trillian response",
- breq: &GetProofByHashRequest{
- Hash: make([]byte, 32),
- TreeSize: 128,
- },
- terr: fmt.Errorf("back-end failure"),
- wantCode: http.StatusInternalServerError,
- wantErrText: http.StatusText(http.StatusInternalServerError) + "\n",
- },
- {
- description: "valid request and response",
- breq: &GetProofByHashRequest{
- Hash: make([]byte, 32),
- TreeSize: 128,
- },
- trsp: makeTrillianGetInclusionProofByHashResponse(t, 0, fixedProof),
- wantCode: http.StatusOK,
- },
- } {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, nil, nil)
- defer th.mockCtrl.Finish()
-
- url := EndpointGetProofByHash.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
- q := req.URL.Query()
- q.Add("hash", base64.StdEncoding.EncodeToString(table.breq.Hash))
- q.Add("tree_size", fmt.Sprintf("%d", table.breq.TreeSize))
- req.URL.RawQuery = q.Encode()
-
- w := httptest.NewRecorder()
- if table.trsp != nil || table.terr != nil {
- th.client.EXPECT().GetInclusionProofByHash(newDeadlineMatcher(), gomock.Any()).Return(table.trsp, table.terr)
- }
- th.getHandler(t, EndpointGetProofByHash).ServeHTTP(w, req)
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
- body := w.Body.String()
- if w.Code != http.StatusOK {
- if body != table.wantErrText {
- t.Errorf("GET(%s)=%q, want text %q", url, body, table.wantErrText)
- }
- return
- }
-
- // status code is http.StatusOK, check response
- var data []byte
- if err := json.Unmarshal([]byte(body), &data); err != nil {
- t.Errorf("failed unmarshaling json: %v, wanted ok", err)
- return
- }
- var item StItem
- if err := item.Unmarshal(data); err != nil {
- t.Errorf("failed unmarshaling StItem: %v, wanted ok", err)
- return
- }
- if item.Format != StFormatInclusionProofV1 {
- t.Errorf("invalid StFormat: got %v, want %v", item.Format, StFormatInclusionProofV1)
- }
- proof := item.InclusionProofV1
- if !bytes.Equal(proof.LogId, th.instance.LogParameters.LogId) {
- t.Errorf("want log id %X, got %X", proof.LogId, th.instance.LogParameters.LogId)
- }
- if proof.TreeSize != uint64(table.breq.TreeSize) {
- t.Errorf("want tree size %d, got %d", table.breq.TreeSize, proof.TreeSize)
- }
- if proof.LeafIndex != 0 {
- t.Errorf("want index %d, got %d", 0, proof.LeafIndex)
- }
- if got, want := len(proof.InclusionPath), len(fixedProof); got != want {
- t.Errorf("want proof length %d, got %d", want, got)
- return
- }
- for i, nh := range proof.InclusionPath {
- if !bytes.Equal(nh.Data, fixedProof[i]) {
- t.Errorf("want proof[%d]=%X, got %X", i, fixedProof[i], nh.Data)
- }
- }
- }()
- }
-}
-
-func TestGetStableSth(t *testing.T) {
- for _, table := range cosiTestCases(t) {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, nil, table.sth)
- defer th.mockCtrl.Finish()
-
- // Setup and run client query
- url := EndpointGetStableSth.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
- w := httptest.NewRecorder()
- th.getHandler(t, EndpointGetStableSth).ServeHTTP(w, req)
-
- // Check response code
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
- if w.Code != http.StatusOK {
- return
- }
- // Check response bytes
- var gotBytes []byte
- if err := json.Unmarshal([]byte(w.Body.String()), &gotBytes); err != nil {
- t.Errorf("failed unmarshaling json: %v, wanted ok", err)
- return
- }
- wantBytes, _ := table.sth.Marshal()
- if got, want := gotBytes, wantBytes; !bytes.Equal(got, want) {
- t.Errorf("wanted response %X but got %X in test %q", got, want, table.description)
- }
- }()
- }
-}
-
-func TestGetCosi(t *testing.T) {
- for _, table := range cosiTestCases(t) {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, nil, table.sth)
- defer th.mockCtrl.Finish()
-
- // Setup and run client query
- url := EndpointGetCosignedSth.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
- w := httptest.NewRecorder()
- th.getHandler(t, EndpointGetCosignedSth).ServeHTTP(w, req)
-
- // Check response code
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
- if w.Code != http.StatusOK {
- return
- }
- // Check response bytes
- var gotBytes []byte
- if err := json.Unmarshal([]byte(w.Body.String()), &gotBytes); err != nil {
- t.Errorf("failed unmarshaling json: %v, wanted ok", err)
- return
- }
- wantCosth := NewCosignedTreeHeadV1(table.sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- Signature: testSignature,
- },
- })
- wantBytes, _ := wantCosth.Marshal()
- if got, want := gotBytes, wantBytes; !bytes.Equal(got, want) {
- t.Errorf("wanted response %X but got %X in test %q", got, want, table.description)
- }
- }()
- }
-}
-
-func TestAddCosi(t *testing.T) {
- validSth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature)
- validSth2 := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp+1000000, testTreeSize, testNodeHash)), testLogId, testSignature)
- for _, table := range []struct {
- description string
- sth *StItem
- breq *bytes.Buffer
- wantCode int
- }{
- {
- description: "invalid request: untrusted witness", // more specific tests can be found in TestNewAddCosignatureRequest
- sth: validSth,
- breq: mustMakeAddCosiBuffer(t, testdata.Ed25519Sk2, testdata.Ed25519Vk2, validSth),
- wantCode: http.StatusBadRequest,
- },
- {
- description: "invalid request: cosigned wrong sth", // more specific tests can be found in TestAddCosignature
- sth: validSth,
- breq: mustMakeAddCosiBuffer(t, testdata.Ed25519Sk, testdata.Ed25519Vk, validSth2),
- wantCode: http.StatusBadRequest,
- },
- {
- description: "valid",
- sth: validSth,
- breq: mustMakeAddCosiBuffer(t, testdata.Ed25519Sk, testdata.Ed25519Vk, validSth),
- wantCode: http.StatusOK,
- },
- } {
- func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, nil, table.sth)
- defer th.mockCtrl.Finish()
-
- // Setup and run client query
- url := EndpointAddCosignature.Path("http://example.com", th.instance.LogParameters.Prefix)
- req, err := http.NewRequest("POST", url, table.breq)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
- req.Header.Set("Content-Type", "application/json")
-
- w := httptest.NewRecorder()
- th.postHandler(t, EndpointAddCosignature).ServeHTTP(w, req)
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
-
- // Check response
- if w.Code != table.wantCode {
- t.Errorf("GET(%s)=%d, want http status code %d", url, w.Code, table.wantCode)
- }
- }()
- }
-}
-
-type cosiTestCase struct {
- description string
- sth *StItem
- wantCode int
-}
-
-// cosiTestCases returns test cases used by TestGetStableSth and TestGetCosi
-func cosiTestCases(t *testing.T) []cosiTestCase {
- t.Helper()
- return []cosiTestCase{
- {
- description: "no cosigned/stable sth",
- sth: nil,
- wantCode: http.StatusInternalServerError,
- },
- {
- description: "malformed cosigned/stable sth",
- sth: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), []byte("not a log id"), testSignature),
- wantCode: http.StatusInternalServerError,
- },
- {
- description: "valid",
- sth: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature),
- wantCode: http.StatusOK,
- },
- }
-}
-
-// mustMakeEd25519ChecksumV1 creates an ed25519-signed ChecksumV1 leaf
-func mustMakeEd25519ChecksumV1(t *testing.T, id, checksum, vk, sk []byte) ([]byte, []byte) {
- t.Helper()
- leaf, err := NewChecksumV1(id, checksum, mustNewNamespaceEd25519V1(t, vk)).Marshal()
- if err != nil {
- t.Fatalf("must serialize checksum_v1: %v", err)
- }
- return leaf, ed25519.Sign(ed25519.PrivateKey(sk), leaf)
-}
-
-// mustMakeEd25519ChecksumV1Buffer creates an add-entry data buffer with an
-// Ed25519 namespace that can be posted.
-func mustMakeEd25519ChecksumV1Buffer(t *testing.T, identifier, checksum, vk, sk []byte) *bytes.Buffer {
- t.Helper()
- leaf, signature := mustMakeEd25519ChecksumV1(t, identifier, checksum, vk, sk)
- req := AddEntryRequest{
- Item: leaf,
- Signature: signature,
- }
- data, err := json.Marshal(req)
- if err != nil {
- t.Fatalf("must marshal add-entry request: %v", err)
- }
- return bytes.NewBuffer(data)
-}
-
-// mustMakeAddCosiBuffer creates an add-cosi data buffer
-func mustMakeAddCosiBuffer(t *testing.T, sk, vk []byte, sth *StItem) *bytes.Buffer {
- t.Helper()
- msg, err := sth.Marshal()
- if err != nil {
- t.Fatalf("must marshal sth: %v", err)
- }
- costh := NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *mustNewNamespaceEd25519V1(t, vk),
- Signature: ed25519.Sign(ed25519.PrivateKey(sk), msg),
- },
- })
- item, err := costh.Marshal()
- if err != nil {
- t.Fatalf("must marshal costh: %v", err)
- }
- data, err := json.Marshal(AddCosignatureRequest{item})
- if err != nil {
- t.Fatalf("must marshal add-cosi request: %v", err)
- }
- return bytes.NewBuffer(data)
-}
-
-// deadlineMatcher implements gomock.Matcher, such that an error is raised if
-// there is no context.Context deadline set
-type deadlineMatcher struct{}
-
-// newDeadlineMatcher returns a new DeadlineMatcher
-func newDeadlineMatcher() gomock.Matcher {
- return &deadlineMatcher{}
-}
-
-// Matches returns true if the passed interface is a context with a deadline
-func (dm *deadlineMatcher) Matches(i interface{}) bool {
- ctx, ok := i.(context.Context)
- if !ok {
- return false
- }
- _, ok = ctx.Deadline()
- return ok
-}
-
-// String is needed to implement gomock.Matcher
-func (dm *deadlineMatcher) String() string {
- return fmt.Sprintf("deadlineMatcher{}")
-}
diff --git a/instance.go b/instance.go
index c729bc8..6f1314b 100644
--- a/instance.go
+++ b/instance.go
@@ -1,123 +1,69 @@
package stfe
import (
- "crypto"
+ "context"
"fmt"
- "strings"
"time"
"net/http"
+ "github.com/golang/glog"
"github.com/google/trillian"
- "github.com/system-transparency/stfe/namespace"
)
-// Instance is an instance of a particular log front-end
+// Instance is an instance of the system transparency front-end
type Instance struct {
Client trillian.TrillianLogClient
- SthSource SthSource
LogParameters *LogParameters
+ SthSource SthSource
}
-// LogParameters is a collection of log parameters
-type LogParameters struct {
- LogId []byte // used externally by everyone
- TreeId int64 // used internally by Trillian
- Prefix string // e.g., "test" for <base>/test
- MaxRange int64 // max entries per get-entries request
- Submitters *namespace.NamespacePool // trusted submitters
- Witnesses *namespace.NamespacePool // trusted witnesses
- Deadline time.Duration // gRPC deadline
- Interval time.Duration // cosigning sth frequency
- Signer crypto.Signer // interface to access private key
- HashType crypto.Hash // hash function used by Trillian
+// Handlers returns a list of STFE handlers
+func (i *Instance) Handlers() []Handler {
+ return []Handler{
+ Handler{Instance: i, Handler: addEntry, Endpoint: EndpointAddEntry, Method: http.MethodPost},
+ Handler{Instance: i, Handler: addCosignature, Endpoint: EndpointAddCosignature, Method: http.MethodPost},
+ Handler{Instance: i, Handler: getLatestSth, Endpoint: EndpointGetLatestSth, Method: http.MethodGet},
+ Handler{Instance: i, Handler: getStableSth, Endpoint: EndpointGetStableSth, Method: http.MethodGet},
+ Handler{Instance: i, Handler: getCosignedSth, Endpoint: EndpointGetCosignedSth, Method: http.MethodGet},
+ Handler{Instance: i, Handler: getProofByHash, Endpoint: EndpointGetProofByHash, Method: http.MethodPost},
+ Handler{Instance: i, Handler: getConsistencyProof, Endpoint: EndpointGetConsistencyProof, Method: http.MethodPost},
+ Handler{Instance: i, Handler: getEntries, Endpoint: EndpointGetEntries, Method: http.MethodPost},
+ }
}
-// Endpoint is a named HTTP API endpoint
-type Endpoint string
-
-const (
- EndpointAddEntry = Endpoint("add-entry")
- EndpointAddCosignature = Endpoint("add-cosignature")
- EndpointGetEntries = Endpoint("get-entries")
- EndpointGetAnchors = Endpoint("get-anchors")
- EndpointGetProofByHash = Endpoint("get-proof-by-hash")
- EndpointGetConsistencyProof = Endpoint("get-consistency-proof")
- EndpointGetLatestSth = Endpoint("get-latest-sth")
- EndpointGetStableSth = Endpoint("get-stable-sth")
- EndpointGetCosignedSth = Endpoint("get-cosigned-sth")
-)
-
-func (i Instance) String() string {
- return fmt.Sprintf("%s\n", i.LogParameters)
+// Handler implements the http.Handler interface, and contains a reference
+// to an STFE server instance as well as a function that uses it.
+type Handler struct {
+ Instance *Instance
+ Endpoint Endpoint
+ Method string
+ Handler func(context.Context, *Instance, http.ResponseWriter, *http.Request) (int, error)
}
-func (lp LogParameters) String() string {
- return fmt.Sprintf("LogId(%s) TreeId(%d) Prefix(%s) MaxRange(%d) Submitters(%d) Witnesses(%d) Deadline(%v) Interval(%v)", lp.id(), lp.TreeId, lp.Prefix, lp.MaxRange, len(lp.Submitters.List()), len(lp.Witnesses.List()), lp.Deadline, lp.Interval)
-}
+// ServeHTTP is part of the http.Handler interface
+func (a Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
+ // export prometheus metrics
+ var now time.Time = time.Now()
+ var statusCode int
+ defer func() {
+ rspcnt.Inc(string(a.Instance.LogParameters.LogIdBytes), string(a.Endpoint), fmt.Sprintf("%d", statusCode))
+ latency.Observe(time.Now().Sub(now).Seconds(), string(a.Instance.LogParameters.LogIdBytes), string(a.Endpoint), fmt.Sprintf("%d", statusCode))
+ }()
+ reqcnt.Inc(string(a.Instance.LogParameters.LogIdBytes), string(a.Endpoint))
-func (e Endpoint) String() string {
- return string(e)
-}
+ ctx, cancel := context.WithDeadline(r.Context(), now.Add(a.Instance.LogParameters.Deadline))
+ defer cancel()
-// NewInstance creates a new STFE instance
-func NewInstance(lp *LogParameters, client trillian.TrillianLogClient, source SthSource) *Instance {
- return &Instance{
- LogParameters: lp,
- Client: client,
- SthSource: source,
+ if r.Method != a.Method {
+ glog.Warningf("%s/%s: got HTTP %s, wanted HTTP %s", a.Instance.LogParameters.Prefix, string(a.Endpoint), r.Method, a.Method)
+ http.Error(w, "", http.StatusMethodNotAllowed)
+ return
}
-}
-// NewLogParameters creates new log parameters. Note that the signer is
-// assumed to be an ed25519 signing key. Could be fixed at some point.
-func NewLogParameters(signer crypto.Signer, logId *namespace.Namespace, treeId int64, prefix string, submitters, witnesses *namespace.NamespacePool, maxRange int64, interval, deadline time.Duration) (*LogParameters, error) {
- if signer == nil {
- return nil, fmt.Errorf("need a signer but got none")
- }
- if maxRange < 1 {
- return nil, fmt.Errorf("max range must be at least one")
- }
- lid, err := logId.Marshal()
+ statusCode, err := a.Handler(ctx, a.Instance, w, r)
if err != nil {
- return nil, fmt.Errorf("failed encoding log identifier: %v", err)
- }
- return &LogParameters{
- LogId: lid,
- TreeId: treeId,
- Prefix: prefix,
- MaxRange: maxRange,
- Submitters: submitters,
- Witnesses: witnesses,
- Deadline: deadline,
- Interval: interval,
- Signer: signer,
- HashType: crypto.SHA256, // STFE assumes RFC 6962 hashing
- }, nil
-}
-
-// Handlers returns a list of STFE handlers
-func (i *Instance) Handlers() []Handler {
- return []Handler{
- Handler{instance: i, handler: addEntry, endpoint: EndpointAddEntry, method: http.MethodPost},
- Handler{instance: i, handler: addCosi, endpoint: EndpointAddCosignature, method: http.MethodPost},
- Handler{instance: i, handler: getEntries, endpoint: EndpointGetEntries, method: http.MethodGet},
- Handler{instance: i, handler: getAnchors, endpoint: EndpointGetAnchors, method: http.MethodGet},
- Handler{instance: i, handler: getProofByHash, endpoint: EndpointGetProofByHash, method: http.MethodGet},
- Handler{instance: i, handler: getConsistencyProof, endpoint: EndpointGetConsistencyProof, method: http.MethodGet},
- Handler{instance: i, handler: getSth, endpoint: EndpointGetLatestSth, method: http.MethodGet},
- Handler{instance: i, handler: getStableSth, endpoint: EndpointGetStableSth, method: http.MethodGet},
- Handler{instance: i, handler: getCosi, endpoint: EndpointGetCosignedSth, method: http.MethodGet},
+ glog.Warningf("handler error %s/%s: %v", a.Instance.LogParameters.Prefix, a.Endpoint, err)
+ http.Error(w, "", statusCode)
}
}
-
-// id formats the log's identifier as base64
-func (i *LogParameters) id() string {
- return b64(i.LogId)
-}
-
-// Path joins a number of components to form a full endpoint path, e.g., base
-// ("example.com"), prefix ("st/v1"), and the endpoint itself ("get-sth").
-func (e Endpoint) Path(components ...string) string {
- return strings.Join(append(components, string(e)), "/")
-}
diff --git a/instance_test.go b/instance_test.go
index 0ceedb8..21ef808 100644
--- a/instance_test.go
+++ b/instance_test.go
@@ -1,121 +1,90 @@
package stfe
import (
- "bytes"
+ "crypto"
"testing"
- "time"
- "crypto"
- "crypto/ed25519"
+ "net/http"
+ "net/http/httptest"
- "github.com/system-transparency/stfe/namespace"
- "github.com/system-transparency/stfe/namespace/testdata"
+ "github.com/golang/mock/gomock"
+ "github.com/google/certificate-transparency-go/trillian/mockclient"
+ "github.com/system-transparency/stfe/testdata"
+ "github.com/system-transparency/stfe/types"
)
-var (
- testLogId = append([]byte{0x00, 0x01, 0x20}, testdata.Ed25519Vk3...)
- testTreeId = int64(0)
- testMaxRange = int64(3)
- testPrefix = "test"
- testHashType = crypto.SHA256
- testSignature = make([]byte, 32)
- testNodeHash = make([]byte, 32)
- testMessage = []byte("test message")
- testPackage = []byte("foobar")
- testChecksum = make([]byte, 32)
- testTreeSize = uint64(128)
- testTreeSizeLarger = uint64(256)
- testTimestamp = uint64(0)
- testProof = [][]byte{
- testNodeHash,
- testNodeHash,
- }
- testIndex = uint64(0)
- testHashLen = 31
- testDeadline = time.Second * 5
- testInterval = time.Second * 10
-)
+type testInstance struct {
+ ctrl *gomock.Controller
+ client *mockclient.MockTrillianLogClient
+ instance *Instance
+}
-// TestNewLogParamters checks that invalid ones are rejected and that a valid
-// set of parameters are accepted.
-func TestNewLogParameters(t *testing.T) {
- testLogId := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk3)
- namespaces := mustNewNamespacePool(t, []*namespace.Namespace{
- mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- })
- witnesses := mustNewNamespacePool(t, []*namespace.Namespace{})
- signer := ed25519.PrivateKey(testdata.Ed25519Sk)
- for _, table := range []struct {
- description string
- logId *namespace.Namespace
- maxRange int64
- signer crypto.Signer
- wantErr bool
- }{
- {
- description: "invalid signer: nil",
- logId: testLogId,
- maxRange: testMaxRange,
- signer: nil,
- wantErr: true,
- },
- {
- description: "invalid max range",
- logId: testLogId,
- maxRange: 0,
- signer: signer,
- wantErr: true,
- },
- {
- description: "invalid log identifier",
- logId: &namespace.Namespace{
- Format: namespace.NamespaceFormatEd25519V1,
- NamespaceEd25519V1: &namespace.NamespaceEd25519V1{
- Namespace: make([]byte, 31), // too short
- },
+// newTestInstances sets up a test instance that uses default log parameters
+// with an optional signer, see newLogParameters() for further details. The
+// SthSource is instantiated with an ActiveSthSource that has (i) the default
+// STH as the currently cosigned STH based on testdata.Ed25519VkWitness, and
+// (ii) the default STH without any cosignatures as the currently stable STH.
+func newTestInstance(t *testing.T, signer crypto.Signer) *testInstance {
+ t.Helper()
+ ctrl := gomock.NewController(t)
+ client := mockclient.NewMockTrillianLogClient(ctrl)
+ return &testInstance{
+ ctrl: ctrl,
+ client: client,
+ instance: &Instance{
+ Client: client,
+ LogParameters: newLogParameters(t, signer),
+ SthSource: &ActiveSthSource{
+ client: client,
+ logParameters: newLogParameters(t, signer),
+ currCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
+ nextCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, nil),
+ cosignatureFrom: make(map[[types.NamespaceFingerprintSize]byte]bool),
},
- maxRange: testMaxRange,
- signer: signer,
- wantErr: true,
},
- {
- description: "valid log parameters",
- logId: testLogId,
- maxRange: testMaxRange,
- signer: signer,
- },
- } {
- lp, err := NewLogParameters(table.signer, table.logId, testTreeId, testPrefix, namespaces, witnesses, table.maxRange, testInterval, testDeadline)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error=%v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- if err != nil {
- continue
- }
- lid, err := table.logId.Marshal()
- if err != nil {
- t.Fatalf("must marshal log id: %v", err)
- }
+ }
+}
- if got, want := lp.LogId, lid; !bytes.Equal(got, want) {
- t.Errorf("got log id %X but wanted %X in test %q", got, want, table.description)
- }
- if got, want := lp.TreeId, testTreeId; got != want {
- t.Errorf("got tree id %d but wanted %d in test %q", got, want, table.description)
- }
- if got, want := lp.Prefix, testPrefix; got != want {
- t.Errorf("got prefix %s but wanted %s in test %q", got, want, table.description)
- }
- if got, want := lp.MaxRange, testMaxRange; got != want {
- t.Errorf("got max range %d but wanted %d in test %q", got, want, table.description)
- }
- if got, want := len(lp.Submitters.List()), len(namespaces.List()); got != want {
- t.Errorf("got %d anchors but wanted %d in test %q", got, want, table.description)
- }
- if got, want := len(lp.Witnesses.List()), len(witnesses.List()); got != want {
- t.Errorf("got %d anchors but wanted %d in test %q", got, want, table.description)
- }
+// getHandlers returns all endpoints that use HTTP GET as a map to handlers
+func (ti *testInstance) getHandlers(t *testing.T) map[Endpoint]Handler {
+ t.Helper()
+ return map[Endpoint]Handler{
+ EndpointGetLatestSth: Handler{Instance: ti.instance, Handler: getLatestSth, Endpoint: EndpointGetLatestSth, Method: http.MethodGet},
+ EndpointGetStableSth: Handler{Instance: ti.instance, Handler: getStableSth, Endpoint: EndpointGetStableSth, Method: http.MethodGet},
+ EndpointGetCosignedSth: Handler{Instance: ti.instance, Handler: getCosignedSth, Endpoint: EndpointGetCosignedSth, Method: http.MethodGet},
+ }
+}
+
+// postHandlers returns all endpoints that use HTTP POST as a map to handlers
+func (ti *testInstance) postHandlers(t *testing.T) map[Endpoint]Handler {
+ t.Helper()
+ return map[Endpoint]Handler{
+ EndpointAddEntry: Handler{Instance: ti.instance, Handler: addEntry, Endpoint: EndpointAddEntry, Method: http.MethodPost},
+ EndpointAddCosignature: Handler{Instance: ti.instance, Handler: addCosignature, Endpoint: EndpointAddCosignature, Method: http.MethodPost},
+ EndpointGetConsistencyProof: Handler{Instance: ti.instance, Handler: getConsistencyProof, Endpoint: EndpointGetConsistencyProof, Method: http.MethodPost},
+ EndpointGetProofByHash: Handler{Instance: ti.instance, Handler: getProofByHash, Endpoint: EndpointGetProofByHash, Method: http.MethodPost},
+ EndpointGetEntries: Handler{Instance: ti.instance, Handler: getEntries, Endpoint: EndpointGetEntries, Method: http.MethodPost},
+ }
+}
+
+// getHandler must return a particular HTTP GET handler
+func (ti *testInstance) getHandler(t *testing.T, endpoint Endpoint) Handler {
+ t.Helper()
+ handler, ok := ti.getHandlers(t)[endpoint]
+ if !ok {
+ t.Fatalf("must return HTTP GET handler for endpoint: %s", endpoint)
+ }
+ return handler
+}
+
+// postHandler must return a particular HTTP POST handler
+func (ti *testInstance) postHandler(t *testing.T, endpoint Endpoint) Handler {
+ t.Helper()
+ handler, ok := ti.postHandlers(t)[endpoint]
+ if !ok {
+ t.Fatalf("must return HTTP POST handler for endpoint: %s", endpoint)
}
+ return handler
}
// TestHandlers checks that we configured all endpoints and that there are no
@@ -123,21 +92,20 @@ func TestNewLogParameters(t *testing.T) {
func TestHandlers(t *testing.T) {
endpoints := map[Endpoint]bool{
EndpointAddEntry: false,
- EndpointGetEntries: false,
+ EndpointAddCosignature: false,
EndpointGetLatestSth: false,
- EndpointGetProofByHash: false,
- EndpointGetConsistencyProof: false,
- EndpointGetAnchors: false,
EndpointGetStableSth: false,
EndpointGetCosignedSth: false,
- EndpointAddCosignature: false,
+ EndpointGetConsistencyProof: false,
+ EndpointGetProofByHash: false,
+ EndpointGetEntries: false,
}
- i := NewInstance(makeTestLogParameters(t, nil), nil, nil)
+ i := &Instance{nil, newLogParameters(t, nil), nil}
for _, handler := range i.Handlers() {
- if _, ok := endpoints[handler.endpoint]; !ok {
- t.Errorf("got unexpected endpoint: %s", handler.endpoint)
+ if _, ok := endpoints[handler.Endpoint]; !ok {
+ t.Errorf("got unexpected endpoint: %s", handler.Endpoint)
}
- endpoints[handler.endpoint] = true
+ endpoints[handler.Endpoint] = true
}
for endpoint, ok := range endpoints {
if !ok {
@@ -146,104 +114,42 @@ func TestHandlers(t *testing.T) {
}
}
-// TestEndpointPath checks that the endpoint path builder works as expected
-func TestEndpointPath(t *testing.T) {
- base, prefix := "http://example.com", "test"
- for _, table := range []struct {
- endpoint Endpoint
- want string
- }{
- {
- endpoint: EndpointAddEntry,
- want: "http://example.com/test/add-entry",
- },
- {
- endpoint: EndpointGetEntries,
- want: "http://example.com/test/get-entries",
- },
- {
- endpoint: EndpointGetProofByHash,
- want: "http://example.com/test/get-proof-by-hash",
- },
- {
- endpoint: EndpointGetConsistencyProof,
- want: "http://example.com/test/get-consistency-proof",
- },
- {
- endpoint: EndpointGetLatestSth,
- want: "http://example.com/test/get-latest-sth",
- },
- {
- endpoint: EndpointGetAnchors,
- want: "http://example.com/test/get-anchors",
- },
- {
- endpoint: EndpointGetStableSth,
- want: "http://example.com/test/get-stable-sth",
- },
- {
- endpoint: EndpointGetCosignedSth,
- want: "http://example.com/test/get-cosigned-sth",
- },
- {
- endpoint: EndpointAddCosignature,
- want: "http://example.com/test/add-cosignature",
- },
- } {
- if got, want := table.endpoint.Path(base, prefix), table.want; got != want {
- t.Errorf("got %s but wanted %s with multiple components", got, want)
- }
- if got, want := table.endpoint.Path(base+"/"+prefix), table.want; got != want {
- t.Errorf("got %s but wanted %s with one component", got, want)
- }
- }
-}
+// TestGetHandlersRejectPost checks that all get handlers reject post requests
+func TestGetHandlersRejectPost(t *testing.T) {
+ ti := newTestInstance(t, nil)
+ defer ti.ctrl.Finish()
-func mustNewLogId(t *testing.T, namespace *namespace.Namespace) []byte {
- b, err := namespace.Marshal()
- if err != nil {
- t.Fatalf("must marshal log id: %v", err)
- }
- return b
-}
+ for endpoint, handler := range ti.getHandlers(t) {
+ t.Run(string(endpoint), func(t *testing.T) {
+ s := httptest.NewServer(handler)
+ defer s.Close()
-func mustNewNamespaceEd25519V1(t *testing.T, vk []byte) *namespace.Namespace {
- namespace, err := namespace.NewNamespaceEd25519V1(vk)
- if err != nil {
- t.Fatalf("must make ed25519 namespace: %v", err)
+ url := endpoint.Path(s.URL, ti.instance.LogParameters.Prefix)
+ if rsp, err := http.Post(url, "application/json", nil); err != nil {
+ t.Fatalf("http.Post(%s)=(_,%q), want (_,nil)", url, err)
+ } else if rsp.StatusCode != http.StatusMethodNotAllowed {
+ t.Errorf("http.Post(%s)=(%d,nil), want (%d, nil)", url, rsp.StatusCode, http.StatusMethodNotAllowed)
+ }
+ })
}
- return namespace
}
-func mustNewNamespacePool(t *testing.T, anchors []*namespace.Namespace) *namespace.NamespacePool {
- namespaces, err := namespace.NewNamespacePool(anchors)
- if err != nil {
- t.Fatalf("must make namespaces: %v", err)
- }
- return namespaces
-}
+// TestPostHandlersRejectGet checks that all post handlers reject get requests
+func TestPostHandlersRejectGet(t *testing.T) {
+ ti := newTestInstance(t, nil)
+ defer ti.ctrl.Finish()
+
+ for endpoint, handler := range ti.postHandlers(t) {
+ t.Run(string(endpoint), func(t *testing.T) {
+ s := httptest.NewServer(handler)
+ defer s.Close()
-// makeTestLogParameters makes a collection of test log parameters.
-//
-// The log's identity is based on testdata.Ed25519{Vk3,Sk3}. The log's accepted
-// submitters are based on testdata.Ed25519Vk. The log's accepted witnesses are
-// based on testdata.Ed25519Vk. The remaining log parameters are based on the
-// global test* variables in this file.
-//
-// For convenience the passed signer is optional (i.e., it may be nil).
-func makeTestLogParameters(t *testing.T, signer crypto.Signer) *LogParameters {
- return &LogParameters{
- LogId: mustNewLogId(t, mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk3)),
- TreeId: testTreeId,
- Prefix: testPrefix,
- MaxRange: testMaxRange,
- Submitters: mustNewNamespacePool(t, []*namespace.Namespace{
- mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- }),
- Witnesses: mustNewNamespacePool(t, []*namespace.Namespace{
- mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- }),
- Signer: signer,
- HashType: testHashType,
+ url := endpoint.Path(s.URL, ti.instance.LogParameters.Prefix)
+ if rsp, err := http.Get(url); err != nil {
+ t.Fatalf("http.Get(%s)=(_,%q), want (_,nil)", url, err)
+ } else if rsp.StatusCode != http.StatusMethodNotAllowed {
+ t.Errorf("http.Get(%s)=(%d,nil), want (%d, nil)", url, rsp.StatusCode, http.StatusMethodNotAllowed)
+ }
+ })
}
}
diff --git a/log_parameters.go b/log_parameters.go
new file mode 100644
index 0000000..86ac0cc
--- /dev/null
+++ b/log_parameters.go
@@ -0,0 +1,71 @@
+package stfe
+
+import (
+ "crypto"
+ "fmt"
+ "time"
+
+ "crypto/rand"
+
+ "github.com/system-transparency/stfe/types"
+)
+
+// LogParameters is a collection of log parameters
+type LogParameters struct {
+ LogId *types.Namespace // log identifier
+ LogIdBytes []byte // serialized log id
+ TreeId int64 // used internally by Trillian
+ Prefix string // e.g., "test" for <base>/test
+ MaxRange int64 // max entries per get-entries request
+ Submitters *types.NamespacePool // trusted submitters
+ Witnesses *types.NamespacePool // trusted witnesses
+ Deadline time.Duration // gRPC deadline
+ Interval time.Duration // cosigning sth frequency
+ HashType crypto.Hash // hash function used by Trillian
+ Signer crypto.Signer // access to Ed25519 private key
+}
+
+// NewLogParameters creates newly initialized log parameters
+func NewLogParameters(signer crypto.Signer, logId *types.Namespace, treeId int64, prefix string, submitters, witnesses *types.NamespacePool, maxRange int64, interval, deadline time.Duration) (*LogParameters, error) {
+ logIdBytes, err := types.Marshal(*logId)
+ if err != nil {
+ return nil, fmt.Errorf("Marshal failed for log identifier: %v", err)
+ }
+ return &LogParameters{
+ LogId: logId,
+ TreeId: treeId,
+ Prefix: prefix,
+ MaxRange: maxRange,
+ Submitters: submitters,
+ Witnesses: witnesses,
+ Deadline: deadline,
+ Interval: interval,
+ HashType: crypto.SHA256,
+ Signer: signer,
+ LogIdBytes: logIdBytes,
+ }, nil
+}
+
+// SignTreeHeadV1 signs a TreeHeadV1 structure
+func (lp *LogParameters) SignTreeHeadV1(th *types.TreeHeadV1) (*types.StItem, error) {
+ serialized, err := types.Marshal(*th)
+ if err != nil {
+ return nil, fmt.Errorf("Marshal failed for TreeHeadV1: %v", err)
+ }
+ sig, err := lp.Signer.Sign(rand.Reader, serialized, crypto.Hash(0))
+ if err != nil {
+ return nil, fmt.Errorf("Sign failed: %v", err)
+ }
+ lastSthTimestamp.Set(float64(time.Now().Unix()), string(lp.LogIdBytes))
+ lastSthSize.Set(float64(th.TreeSize), string(lp.LogIdBytes))
+ return &types.StItem{
+ Format: types.StFormatSignedTreeHeadV1,
+ SignedTreeHeadV1: &types.SignedTreeHeadV1{
+ TreeHead: *th,
+ Signature: types.SignatureV1{
+ Namespace: *lp.LogId,
+ Signature: sig,
+ },
+ },
+ }, nil
+}
diff --git a/log_parameters_test.go b/log_parameters_test.go
new file mode 100644
index 0000000..cec7674
--- /dev/null
+++ b/log_parameters_test.go
@@ -0,0 +1,98 @@
+package stfe
+
+import (
+ "crypto"
+ "fmt"
+ "reflect"
+ "testing"
+
+ cttestdata "github.com/google/certificate-transparency-go/trillian/testdata"
+ "github.com/system-transparency/stfe/testdata"
+ "github.com/system-transparency/stfe/types"
+)
+
+// newLogParameters must create new log parameters with an optional log signer
+// based on the parameters in "github.com/system-transparency/stfe/testdata".
+// The log's namespace is initialized with testdata.LogEd25519Vk, the submmiter
+// namespace list is initialized with testdata.SubmmiterEd25519, and the witness
+// namespace list is initialized with testdata.WitnessEd25519Vk.
+func newLogParameters(t *testing.T, signer crypto.Signer) *LogParameters {
+ t.Helper()
+ logId := testdata.NewNamespace(t, testdata.Ed25519VkLog)
+ witnessPool := testdata.NewNamespacePool(t, []*types.Namespace{
+ testdata.NewNamespace(t, testdata.Ed25519VkWitness),
+ })
+ submitPool := testdata.NewNamespacePool(t, []*types.Namespace{
+ testdata.NewNamespace(t, testdata.Ed25519VkSubmitter),
+ })
+ lp, err := NewLogParameters(signer, logId, testdata.TreeId, testdata.Prefix, submitPool, witnessPool, testdata.MaxRange, testdata.Interval, testdata.Deadline)
+ if err != nil {
+ t.Fatalf("must create new log parameters: %v", err)
+ }
+ return lp
+}
+
+func TestNewLogParameters(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ logId *types.Namespace
+ wantErr bool
+ }{
+ {
+ description: "invalid: cannot marshal log id",
+ logId: &types.Namespace{
+ Format: types.NamespaceFormatReserved,
+ },
+ wantErr: true,
+ },
+ {
+ description: "valid",
+ logId: testdata.NewNamespace(t, testdata.Ed25519VkLog),
+ },
+ } {
+ _, err := NewLogParameters(nil, table.logId, testdata.TreeId, testdata.Prefix, nil, nil, testdata.MaxRange, testdata.Interval, testdata.Deadline)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err)
+ }
+ }
+}
+
+func TestSignTreeHeadV1(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ th *types.TreeHeadV1
+ signer crypto.Signer
+ wantErr bool
+ wantSth *types.StItem
+ }{
+ {
+ description: "invalid: marshal failure",
+ th: types.NewTreeHeadV1(testdata.Timestamp, testdata.TreeSize, nil, testdata.Extension),
+ wantErr: true,
+ },
+ {
+ description: "invalid: signature failure",
+ th: types.NewTreeHeadV1(testdata.Timestamp, testdata.TreeSize, testdata.NodeHash, testdata.Extension),
+ signer: cttestdata.NewSignerWithErr(nil, fmt.Errorf("signer failed")),
+ wantErr: true,
+ },
+ {
+ description: "valid",
+ th: testdata.DefaultTh(t),
+ signer: cttestdata.NewSignerWithFixedSig(nil, testdata.Signature),
+ wantSth: testdata.DefaultSth(t, testdata.Ed25519VkLog),
+ },
+ } {
+ sth, err := newLogParameters(t, table.signer).SignTreeHeadV1(table.th)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err)
+ }
+ if err != nil {
+ continue
+ }
+
+ if got, want := sth, table.wantSth; !reflect.DeepEqual(got, want) {
+ t.Errorf("got \n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
+ }
+ }
+}
diff --git a/metric.go b/metric.go
index 1d0f100..7e3e8b2 100644
--- a/metric.go
+++ b/metric.go
@@ -9,7 +9,6 @@ var (
reqcnt monitoring.Counter // number of incoming http requests
rspcnt monitoring.Counter // number of valid http responses
latency monitoring.Histogram // request-response latency
- lastSdiTimestamp monitoring.Gauge // unix timestamp from the most recent sdi
lastSthTimestamp monitoring.Gauge // unix timestamp from the most recent sth
lastSthSize monitoring.Gauge // tree size of most recent sth
)
@@ -20,6 +19,5 @@ func init() {
rspcnt = mf.NewCounter("http_rsp", "number of http requests", "logid", "endpoint", "status")
latency = mf.NewHistogram("http_latency", "http request-response latency", "logid", "endpoint", "status")
lastSthTimestamp = mf.NewGauge("last_sth_timestamp", "unix timestamp while handling the most recent sth", "logid")
- lastSdiTimestamp = mf.NewGauge("last_sdi_timestamp", "unix timestamp while handling the most recent sdi", "logid")
lastSthSize = mf.NewGauge("last_sth_size", "most recent sth tree size", "logid")
}
diff --git a/namespace/namespace.go b/namespace/namespace.go
deleted file mode 100644
index f5c56cf..0000000
--- a/namespace/namespace.go
+++ /dev/null
@@ -1,150 +0,0 @@
-// Package namespace provides namespace functionality. A namespace refers to a
-// particular verification key and signing algorithm that can be serialized with
-// TLS 1.2 notation, see RFC 5246 (§4). Only Ed25519 is supported at this time.
-//
-// For example, this is how a serialized Ed25519 namespace looks like:
-//
-// 0 2 3 35 (byte index)
-// +----+-----------------------+
-// | 1 + 32 + Verification key +
-// +----+-----------------------+
-package namespace
-
-import (
- "fmt"
-
- "crypto/ed25519"
-
- "github.com/google/certificate-transparency-go/tls"
-)
-
-// NamespaceFormat defines a particular namespace type that is versioend
-type NamespaceFormat tls.Enum
-
-const (
- NamespaceFormatReserved NamespaceFormat = 0
- NamespaceFormatEd25519V1 NamespaceFormat = 1
-)
-
-// Namespace references a versioned namespace based on a given format specifier
-type Namespace struct {
- Format NamespaceFormat `tls:"maxval:65535"`
- NamespaceEd25519V1 *NamespaceEd25519V1 `tls:"selector:Format,val:1"`
-}
-
-// NamespaceEd25519V1 uses an Ed25519 verification key as namespace. Encoding,
-// signing, and verification operations are defined by RFC 8032.
-type NamespaceEd25519V1 struct {
- Namespace []byte `tls:"minlen:32,maxlen:32"`
-}
-
-// String returns a human-readable representation of a namespace.
-func (n Namespace) String() string {
- switch n.Format {
- case NamespaceFormatEd25519V1:
- return fmt.Sprintf("%x", n.NamespaceEd25519V1.Namespace)
- default:
- return "reserved"
- }
-}
-
-// NewNamespaceEd25519V1 returns an new Ed25519V1 namespace based on a
-// verification key.
-func NewNamespaceEd25519V1(vk []byte) (*Namespace, error) {
- if len(vk) != 32 {
- return nil, fmt.Errorf("invalid verification key: must be 32 bytes")
- }
- return &Namespace{
- Format: NamespaceFormatEd25519V1,
- NamespaceEd25519V1: &NamespaceEd25519V1{
- Namespace: vk,
- },
- }, nil
-}
-
-// Verify checks that signature is valid over message for this namespace
-func (ns *Namespace) Verify(message, signature []byte) error {
- switch ns.Format {
- case NamespaceFormatEd25519V1:
- if !ed25519.Verify(ed25519.PublicKey(ns.NamespaceEd25519V1.Namespace), message, signature) {
- return fmt.Errorf("ed25519 signature verification failed")
- }
- default:
- return fmt.Errorf("namespace not supported: %v", ns.Format)
- }
- return nil
-}
-
-func (ns *Namespace) Marshal() ([]byte, error) {
- serialized, err := tls.Marshal(*ns)
- if err != nil {
- return nil, fmt.Errorf("marshaled failed for namespace(%v): %v", ns.Format, err)
- }
- return serialized, err
-}
-
-func (ns *Namespace) Unmarshal(serialized []byte) error {
- extra, err := tls.Unmarshal(serialized, ns)
- if err != nil {
- return fmt.Errorf("unmarshal failed for namespace: %v", err)
- } else if len(extra) > 0 {
- return fmt.Errorf("unmarshal found extra data for namespace(%v): %v", ns.Format, err)
- }
- return nil
-}
-
-// NamespacePool is a pool of namespaces that contain complete verification keys
-type NamespacePool struct {
- pool map[string]*Namespace
- list []*Namespace
- // If we need to update this structure without a restart => add mutex.
-}
-
-// NewNameSpacePool creates a new namespace pool from a list of namespaces. An
-// error is returned if there are duplicate namespaces or namespaces without a
-// complete verification key. The latter is determined by namespaceWithKey().
-func NewNamespacePool(namespaces []*Namespace) (*NamespacePool, error) {
- np := &NamespacePool{
- pool: make(map[string]*Namespace),
- list: make([]*Namespace, 0),
- }
- for _, namespace := range namespaces {
- if !namespaceWithKey(namespace.Format) {
- return nil, fmt.Errorf("need verification key in namespace pool: %v", namespace.Format)
- }
- if _, ok := np.pool[namespace.String()]; ok {
- return nil, fmt.Errorf("duplicate namespace: %v", namespace.String())
- }
- np.pool[namespace.String()] = namespace
- np.list = append(np.list, namespace)
- }
- return np, nil
-}
-
-// Find checks if namespace is a member of the namespace pool.
-func (np *NamespacePool) Find(namespace *Namespace) (*Namespace, bool) {
- if _, ok := np.pool[namespace.String()]; !ok {
- return nil, false
- }
- // If the passed namespace is a key fingerprint the actual key needs to be
- // attached before returning. Not applicable for Ed25519. Docdoc later.
- return namespace, true
-}
-
-// List returns a copied list of namespaces that is used by this pool.
-func (np *NamespacePool) List() []*Namespace {
- namespaces := make([]*Namespace, len(np.list))
- copy(namespaces, np.list)
- return namespaces
-}
-
-// namespaceWithKey returns true if a namespace format contains a complete
-// verification key. I.e., some formats might have a key fingerprint instead.
-func namespaceWithKey(format NamespaceFormat) bool {
- switch format {
- case NamespaceFormatEd25519V1:
- return true
- default:
- return false
- }
-}
diff --git a/namespace/namespace_test.go b/namespace/namespace_test.go
deleted file mode 100644
index 10c0bf0..0000000
--- a/namespace/namespace_test.go
+++ /dev/null
@@ -1,218 +0,0 @@
-package namespace
-
-import (
- "bytes"
- "testing"
-
- "crypto/ed25519"
-
- "github.com/system-transparency/stfe/namespace/testdata"
-)
-
-func TestNewNamespaceEd25519V1(t *testing.T) {
- for _, table := range []struct {
- description string
- vk []byte
- wantErr bool
- }{
- {
- description: "invalid",
- vk: append(testdata.Ed25519Vk, 0x00),
- wantErr: true,
- },
- {
- description: "valid",
- vk: testdata.Ed25519Vk,
- },
- } {
- n, err := NewNamespaceEd25519V1(table.vk)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- if err != nil {
- continue
- }
- if got, want := n.Format, NamespaceFormatEd25519V1; got != want {
- t.Errorf("got namespace format %v but wanted %v in test %q", got, want, table.description)
- continue
- }
- if got, want := n.NamespaceEd25519V1.Namespace, table.vk; !bytes.Equal(got, want) {
- t.Errorf("got namespace %X but wanted %X in test %q", got, want, table.description)
- }
- }
-}
-
-func TestVerify(t *testing.T) {
- testMsg := []byte("msg")
- for _, table := range []struct {
- description string
- namespace *Namespace
- msg, sig []byte
- wantErr bool
- }{
- {
- description: "invalid: unsupported namespace",
- namespace: &Namespace{Format: NamespaceFormatReserved},
- msg: testMsg,
- sig: []byte("sig"),
- wantErr: true,
- },
- {
- description: "invalid: bad ed25519 verification key",
- namespace: mustNewNamespaceEd25519V1(t, testdata.Ed25519Sk[:32]),
- msg: testMsg,
- sig: ed25519.Sign(ed25519.PrivateKey(testdata.Ed25519Sk), testMsg),
- wantErr: true,
- },
- {
- description: "invalid: ed25519 signature is not over message",
- namespace: mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- msg: append(testMsg, 0x00),
- sig: ed25519.Sign(ed25519.PrivateKey(testdata.Ed25519Sk), testMsg),
- wantErr: true,
- },
- {
- description: "valid: ed25519",
- namespace: mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- msg: testMsg,
- sig: ed25519.Sign(ed25519.PrivateKey(testdata.Ed25519Sk), testMsg),
- },
- } {
- err := table.namespace.Verify(table.msg, table.sig)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error=%v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- }
-}
-
-func TestMarshal(t *testing.T) {
- for _, table := range []struct {
- description string
- namespace *Namespace
- wantErr bool
- wantBytes []byte
- }{
- {
- description: "invalid ed25519: namespace size too small",
- namespace: &Namespace{
- Format: NamespaceFormatEd25519V1,
- NamespaceEd25519V1: &NamespaceEd25519V1{
- Namespace: testdata.Ed25519Vk[:len(testdata.Ed25519Vk)-1],
- },
- },
- wantErr: true,
- },
- {
- description: "invalid ed25519: namespace size too large",
- namespace: &Namespace{
- Format: NamespaceFormatEd25519V1,
- NamespaceEd25519V1: &NamespaceEd25519V1{
- Namespace: append(testdata.Ed25519Vk, 0x00),
- },
- },
- wantErr: true,
- },
- {
- description: "valid: ed25519",
- namespace: mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- // TODO: wantBytes
- },
- } {
- _, err := table.namespace.Marshal()
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- if err != nil {
- continue
- }
- // TODO: add check that we got the bytes we wanted also
- }
-}
-
-func TestUnmarshal(t *testing.T) {
- // TODO
-}
-
-func TestNewNamespacePool(t *testing.T) {
- ns1, _ := NewNamespaceEd25519V1(testdata.Ed25519Vk)
- ns2, _ := NewNamespaceEd25519V1(make([]byte, 32))
- nsr := &Namespace{Format: NamespaceFormatReserved}
- for _, table := range []struct {
- description string
- namespaces []*Namespace
- wantErr bool
- }{
- {
- description: "invalid: duplicate namespace",
- namespaces: []*Namespace{ns1, ns1, ns2},
- wantErr: true,
- },
- {
- description: "invalid: namespace without key",
- namespaces: []*Namespace{ns1, nsr, ns2},
- wantErr: true,
- },
- {
- description: "valid: empty",
- namespaces: []*Namespace{},
- },
- {
- description: "valid: one namespace",
- namespaces: []*Namespace{ns1},
- },
- {
- description: "valid: two namespaces",
- namespaces: []*Namespace{ns1, ns2},
- },
- } {
- _, err := NewNamespacePool(table.namespaces)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- }
-}
-
-func TestFind(t *testing.T) {
- ns1 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)
- ns2 := mustNewNamespaceEd25519V1(t, make([]byte, 32))
- pool, _ := NewNamespacePool(nil)
- _, got := pool.Find(ns1)
- if want := false; got != want {
- t.Errorf("got %v but wanted %v in test %q", got, want, "empty pool")
- }
-
- pool, _ = NewNamespacePool([]*Namespace{ns1})
- _, got = pool.Find(ns1)
- if want := true; got != want {
- t.Errorf("got %v but wanted %v in test %q", got, want, "non-empty pool: looking for member")
- }
- _, got = pool.Find(ns2)
- if want := false; got != want {
- t.Errorf("got %v but wanted %v in test %q", got, want, "non-empty pool: looking for non-member")
- }
-}
-
-func TestList(t *testing.T) {
- ns1 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)
- ns2 := mustNewNamespaceEd25519V1(t, make([]byte, 32))
- namespaces := []*Namespace{ns1, ns2}
- pool, _ := NewNamespacePool(namespaces)
- l1 := pool.List()
- if got, want := len(l1), len(namespaces); got != want {
- t.Errorf("got len %v but wanted %v", got, want)
- }
-
- l1[0] = ns2
- l2 := pool.List()
- if bytes.Equal(l1[0].NamespaceEd25519V1.Namespace, l2[0].NamespaceEd25519V1.Namespace) {
- t.Errorf("returned list is not a copy")
- }
-}
-
-func mustNewNamespaceEd25519V1(t *testing.T, vk []byte) *Namespace {
- namespace, err := NewNamespaceEd25519V1(vk)
- if err != nil {
- t.Fatalf("must make ed25519 namespace: %v", err)
- }
- return namespace
-}
diff --git a/namespace/testdata/data.go b/namespace/testdata/data.go
deleted file mode 100644
index 5f3f4df..0000000
--- a/namespace/testdata/data.go
+++ /dev/null
@@ -1,21 +0,0 @@
-package testdata
-
-import (
- "encoding/base64"
-)
-
-var (
- Ed25519Vk = mustDecodeB64("HOQFUkKNWpjYAhNKTyWCzahlI7RDtf5123kHD2LACj0=")
- Ed25519Sk = mustDecodeB64("Zaajc50Xt1tNpTj6WYkljzcVjLXL2CcQcHFT/xZqYEcc5AVSQo1amNgCE0pPJYLNqGUjtEO1/nXbeQcPYsAKPQ==")
-
- Ed25519Vk2 = mustDecodeB64("LqrWb9JwQUTk/SwTNDdMH8aRmy3mbmhwEepO5WSgb+A=")
- Ed25519Sk2 = mustDecodeB64("fDkSq4cWvG72yMhUyHVcZ72QKerZ66msgyVqDvfufZQuqtZv0nBBROT9LBM0N0wfxpGbLeZuaHAR6k7lZKBv4A==")
-
- Ed25519Vk3 = mustDecodeB64("Icd1U1oY0z+5iAwgCQZyGI+pycGs6GI2rQO8gAzT7Y0=")
- Ed25519Sk3 = mustDecodeB64("Q6uNL7VKv9flaBIXBXy/NyhNOicLYKKmfuJ6tLReMvQhx3VTWhjTP7mIDCAJBnIYj6nJwazoYjatA7yADNPtjQ==")
-)
-
-func mustDecodeB64(s string) []byte {
- b, _ := base64.StdEncoding.DecodeString(s)
- return b
-}
diff --git a/reqres.go b/reqres.go
deleted file mode 100644
index e4ad11b..0000000
--- a/reqres.go
+++ /dev/null
@@ -1,228 +0,0 @@
-package stfe
-
-import (
- "fmt"
- "strconv"
-
- "encoding/json"
- "io/ioutil"
- "net/http"
-
- "github.com/google/trillian"
-)
-
-// AddEntryRequest is a collection of add-entry input parameters
-type AddEntryRequest struct {
- Item []byte `json:"item"` // tls-serialized StItem
- Signature []byte `json:"signature"` // serialized signature using the signature scheme below
-}
-
-// GetEntriesRequest is a collection of get-entry input parameters
-type GetEntriesRequest struct {
- Start int64 `json:"start"` // 0-based and inclusive start-index
- End int64 `json:"end"` // 0-based and inclusive end-index
-}
-
-// GetProofByHashRequest is a collection of get-proof-by-hash input parameters
-type GetProofByHashRequest struct {
- Hash []byte `json:"hash"` // leaf hash
- TreeSize int64 `json:"tree_size"` // tree head size to base proof on
-}
-
-// GetConsistencyProofRequest is a collection of get-consistency-proof input
-// parameters
-type GetConsistencyProofRequest struct {
- First int64 `json:"first"` // size of the older Merkle tree
- Second int64 `json:"second"` // size of the newer Merkle tree
-}
-
-// GetEntryResponse is an assembled log entry and its associated appendix. It
-// is identical to the add-entry request that the log once accepted.
-type GetEntryResponse AddEntryRequest
-
-// AddCosignatureRequest encapsulates a cosignature request
-type AddCosignatureRequest struct {
- Item []byte `json:"item"`
-}
-
-// newAddCosignatureRequest parses and verifies an STH cosignature request
-func (lp *LogParameters) newAddCosignatureRequest(r *http.Request) (*StItem, error) {
- var req AddCosignatureRequest
- if err := unpackJsonPost(r, &req); err != nil {
- return nil, fmt.Errorf("unpackJsonPost: %v", err)
- }
-
- // Try decoding as CosignedTreeHeadV1
- var item StItem
- if err := item.Unmarshal(req.Item); err != nil {
- return nil, fmt.Errorf("Unmarshal: %v", err)
- }
- if item.Format != StFormatCosignedTreeHeadV1 {
- return nil, fmt.Errorf("invalid StItem format: %v", item.Format)
- }
-
- // Check that witness namespace is valid
- sth := &StItem{Format: StFormatSignedTreeHeadV1, SignedTreeHeadV1: &item.CosignedTreeHeadV1.SignedTreeHeadV1}
- if len(item.CosignedTreeHeadV1.SignatureV1) != 1 {
- return nil, fmt.Errorf("invalid number of cosignatures")
- } else if namespace, ok := lp.Witnesses.Find(&item.CosignedTreeHeadV1.SignatureV1[0].Namespace); !ok {
- return nil, fmt.Errorf("unknown witness")
- } else if msg, err := sth.Marshal(); err != nil {
- return nil, fmt.Errorf("Marshal: %v", err)
- } else if err := namespace.Verify(msg, item.CosignedTreeHeadV1.SignatureV1[0].Signature); err != nil {
- return nil, fmt.Errorf("Verify: %v", err)
- }
- return &item, nil
-}
-
-// newAddEntryRequest parses and sanitizes the JSON-encoded add-entry
-// parameters from an incoming HTTP post. The request is returned if it is
-// a checksumV1 entry that is signed by a valid namespace.
-func (lp *LogParameters) newAddEntryRequest(r *http.Request) (*AddEntryRequest, error) {
- var entry AddEntryRequest
- if err := unpackJsonPost(r, &entry); err != nil {
- return nil, err
- }
-
- // Try decoding as ChecksumV1 StItem
- var item StItem
- if err := item.Unmarshal(entry.Item); err != nil {
- return nil, fmt.Errorf("StItem(%s): %v", item.Format, err)
- }
- if item.Format != StFormatChecksumV1 {
- return nil, fmt.Errorf("invalid StItem format: %s", item.Format)
- }
-
- // Check that namespace is valid for item
- if namespace, ok := lp.Submitters.Find(&item.ChecksumV1.Namespace); !ok {
- return nil, fmt.Errorf("unknown namespace: %s", item.ChecksumV1.Namespace.String())
- } else if err := namespace.Verify(entry.Item, entry.Signature); err != nil {
- return nil, fmt.Errorf("invalid namespace: %v", err)
- }
- return &entry, nil
-}
-
-// newGetEntriesRequest parses and sanitizes the URL-encoded get-entries
-// parameters from an incoming HTTP request. Too large ranges are truncated
-// based on the log's configured max range, but without taking the log's
-// current tree size into consideration (because it is not know at this point).
-func (lp *LogParameters) newGetEntriesRequest(httpRequest *http.Request) (*GetEntriesRequest, error) {
- start, err := strconv.ParseInt(httpRequest.FormValue("start"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad start parameter: %v", err)
- }
- end, err := strconv.ParseInt(httpRequest.FormValue("end"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad end parameter: %v", err)
- }
-
- if start < 0 {
- return nil, fmt.Errorf("bad parameters: start(%v) must have a non-negative value", start)
- }
- if start > end {
- return nil, fmt.Errorf("bad parameters: start(%v) must be less than or equal to end(%v)", start, end)
- }
- if end-start+1 > lp.MaxRange {
- end = start + lp.MaxRange - 1
- }
- return &GetEntriesRequest{Start: start, End: end}, nil
-}
-
-// newGetProofByHashRequest parses and sanitizes the URL-encoded
-// get-proof-by-hash parameters from an incoming HTTP request.
-func (lp *LogParameters) newGetProofByHashRequest(httpRequest *http.Request) (*GetProofByHashRequest, error) {
- size, err := strconv.ParseInt(httpRequest.FormValue("tree_size"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad tree_size parameter: %v", err)
- }
- if size < 1 {
- return nil, fmt.Errorf("bad tree_size parameter: must be larger than zero")
- }
- hash, err := deb64(httpRequest.FormValue("hash"))
- if err != nil {
- return nil, fmt.Errorf("bad hash parameter: %v", err)
- }
- if len(hash) != lp.HashType.Size() {
- return nil, fmt.Errorf("bad hash parameter: must be %d bytes", lp.HashType.Size())
- }
- return &GetProofByHashRequest{TreeSize: size, Hash: hash}, nil
-}
-
-// newGetConsistencyProofRequest parses and sanitizes the URL-encoded
-// get-consistency-proof-request parameters from an incoming HTTP request
-func (lp *LogParameters) newGetConsistencyProofRequest(httpRequest *http.Request) (*GetConsistencyProofRequest, error) {
- first, err := strconv.ParseInt(httpRequest.FormValue("first"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad first parameter: %v", err)
- }
- second, err := strconv.ParseInt(httpRequest.FormValue("second"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad second parameter: %v", err)
- }
-
- if first < 1 {
- return nil, fmt.Errorf("bad parameters: first(%d) must be a natural number", first)
- }
- if first >= second {
- return nil, fmt.Errorf("bad parameters: second(%d) must be larger than first(%d)", first, second)
- }
- return &GetConsistencyProofRequest{First: first, Second: second}, nil
-}
-
-// newGetEntryResponse assembles a log entry and its appendix
-func (lp *LogParameters) newGetEntryResponse(leaf, appendix []byte) (*GetEntryResponse, error) {
- return &GetEntryResponse{leaf, appendix}, nil // TODO: remove me
-}
-
-// newGetEntriesResponse assembles a get-entries response
-func (lp *LogParameters) newGetEntriesResponse(leaves []*trillian.LogLeaf) ([]*GetEntryResponse, error) {
- entries := make([]*GetEntryResponse, 0, len(leaves))
- for _, leaf := range leaves {
- entry, err := lp.newGetEntryResponse(leaf.GetLeafValue(), leaf.GetExtraData())
- if err != nil {
- return nil, err
- }
- entries = append(entries, entry)
- }
- return entries, nil
-}
-
-// newGetAnchorsResponse assembles a get-anchors response
-func (lp *LogParameters) newGetAnchorsResponse() [][]byte {
- namespaces := make([][]byte, 0, len(lp.Submitters.List()))
- for _, namespace := range lp.Submitters.List() {
- raw, err := namespace.Marshal()
- if err != nil {
- fmt.Printf("TODO: fix me and entire func\n")
- continue
- }
- namespaces = append(namespaces, raw)
- }
- return namespaces
-}
-
-// unpackJsonPost unpacks a json-encoded HTTP POST request into `unpack`
-func unpackJsonPost(r *http.Request, unpack interface{}) error {
- body, err := ioutil.ReadAll(r.Body)
- if err != nil {
- return fmt.Errorf("failed reading request body: %v", err)
- }
- if err := json.Unmarshal(body, &unpack); err != nil {
- return fmt.Errorf("failed parsing json body: %v", err)
- }
- return nil
-}
-
-// writeJsonBody writes a json-body HTTP response
-func writeJsonResponse(response interface{}, w http.ResponseWriter) error {
- json, err := json.Marshal(&response)
- if err != nil {
- return fmt.Errorf("json-encoding failed: %v", err)
- }
- w.Header().Set("Content-Type", "application/json")
- _, err = w.Write(json)
- if err != nil {
- return fmt.Errorf("failed writing json response: %v", err)
- }
- return nil
-}
diff --git a/reqres_test.go b/reqres_test.go
deleted file mode 100644
index 7c3b455..0000000
--- a/reqres_test.go
+++ /dev/null
@@ -1,365 +0,0 @@
-package stfe
-
-import (
- "bytes"
- "fmt"
- "strconv"
- "testing"
-
- "net/http"
-
- "github.com/system-transparency/stfe/namespace/testdata"
-)
-
-func TestNewAddCosignatureRequest(t *testing.T) {
- lp := makeTestLogParameters(t, nil)
- validSth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature)
- for _, table := range []struct {
- description string
- breq *bytes.Buffer
- wantErr bool
- }{
- // TODO: test cases for all errors + add wantBytes for valid cases
- {
- description: "invalid: unknown witness",
- breq: mustMakeAddCosiBuffer(t, testdata.Ed25519Sk2, testdata.Ed25519Vk2, validSth),
- wantErr: true,
- },
- {
- description: "invalid: bad signature",
- breq: mustMakeAddCosiBuffer(t, testdata.Ed25519Sk, testdata.Ed25519Vk2, validSth),
- wantErr: true,
- },
- {
- description: "valid",
- breq: mustMakeAddCosiBuffer(t, testdata.Ed25519Sk, testdata.Ed25519Vk, validSth),
- },
- } {
- url := EndpointAddCosignature.Path("http://example.com", lp.Prefix)
- req, err := http.NewRequest("POST", url, table.breq)
- if err != nil {
- t.Fatalf("failed creating http request: %v", err)
- }
- req.Header.Set("Content-Type", "application/json")
-
- _, err = lp.newAddCosignatureRequest(req)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got errror %v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- }
-}
-
-// TODO: TestNewAddEntryRequest
-func TestNewAddEntryRequest(t *testing.T) {
-}
-
-func TestNewGetEntriesRequest(t *testing.T) {
- lp := makeTestLogParameters(t, nil)
- for _, table := range []struct {
- description string
- start string
- end string
- wantErr bool
- }{
- {
- description: "bad request: start must be an integer",
- start: "start",
- end: "10",
- wantErr: true,
- },
- {
- description: "bad request: end must be an integer",
- start: "10",
- end: "end",
- wantErr: true,
- },
- {
- description: "bad request: start must not be negative",
- start: "-1",
- end: "10",
- wantErr: true,
- },
- {
- description: "bad request: start must be larger than end",
- start: "1",
- end: "0",
- wantErr: true,
- },
- {
- description: "ok request but bad response: expected truncated",
- start: "0",
- end: fmt.Sprintf("%d", testMaxRange),
- },
- {
- description: "ok request and response",
- start: "0",
- end: "0",
- },
- {
- description: "ok request and response",
- start: "0",
- end: fmt.Sprintf("%d", testMaxRange-1),
- },
- } {
- url := EndpointGetEntries.Path("http://example.com/", lp.Prefix)
- r, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("must make http request in test %q: %v", table.description, err)
- }
- q := r.URL.Query()
- q.Add("start", table.start)
- q.Add("end", table.end)
- r.URL.RawQuery = q.Encode()
-
- req, err := lp.newGetEntriesRequest(r)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error is %v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- if err != nil {
- continue
- }
-
- if got, want := req.Start, mustParseInt64(t, table.start); got != want {
- t.Errorf("got start %d but wanted %d in test %q", got, want, table.description)
- }
- if got, want := req.End, min(mustParseInt64(t, table.end), req.Start+testMaxRange-1); got != want {
- t.Errorf("got end %d but wanted %d in test %q", got, want, table.description)
- }
- }
-}
-
-func TestNewGetProofByHashRequest(t *testing.T) {
- lp := makeTestLogParameters(t, nil)
- for _, table := range []struct {
- description string
- treeSize string
- hash string
- wantErr bool
- }{
- {
- description: "bad request: tree size must be an integer",
- treeSize: "treeSize",
- hash: b64(testNodeHash),
- wantErr: true,
- },
- {
- description: "bad request: tree size must be larger than zero",
- treeSize: "0",
- hash: b64(testNodeHash),
- wantErr: true,
- },
- {
- description: "bad request: hash is not base64",
- treeSize: "1",
- hash: "<(^_^)>",
- wantErr: true,
- },
- {
- description: "bad request: invalid node hash (too small)",
- treeSize: "1",
- hash: b64(testNodeHash[1:]),
- wantErr: true,
- },
- {
- description: "bad request: invalid node hash (too large)",
- treeSize: "1",
- hash: b64(append(testNodeHash, byte(0))),
- wantErr: true,
- },
- {
- description: "ok request",
- treeSize: "1",
- hash: b64(testNodeHash),
- },
- } {
- url := EndpointGetProofByHash.Path("http://example.com/", lp.Prefix)
- r, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("must make http request in test %q: %v", table.description, err)
- }
- q := r.URL.Query()
- q.Add("tree_size", table.treeSize)
- q.Add("hash", table.hash)
- r.URL.RawQuery = q.Encode()
-
- req, err := lp.newGetProofByHashRequest(r)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error is %v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- if err != nil {
- continue
- }
-
- if got, want := req.TreeSize, mustParseInt64(t, table.treeSize); got != want {
- t.Errorf("got treeSize %d but wanted %d in test %q", got, want, table.description)
- }
- if got, want := req.Hash, mustDeb64(t, table.hash); !bytes.Equal(got, want) {
- t.Errorf("got hash %X but wanted %X in test %q", got, want, table.description)
- }
- }
-}
-
-func TestNewGetConsistencyProofRequest(t *testing.T) {
- lp := makeTestLogParameters(t, nil)
- for _, table := range []struct {
- description string
- first string
- second string
- wantErr bool
- }{
- {
- description: "bad reuqest: first must be an integer",
- first: "first",
- second: "1",
- wantErr: true,
- },
- {
- description: "bad request: second must be an integer",
- first: "1",
- second: "second",
- wantErr: true,
- },
- {
- description: "bad request: first must be larger than zero",
- first: "0",
- second: "2",
- wantErr: true,
- },
- {
- description: "bad request: second must be larger than firsst",
- first: "2",
- second: "1",
- wantErr: true,
- },
- {
- description: "ok request",
- first: "1",
- second: "2",
- },
- } {
- url := EndpointGetConsistencyProof.Path("http://example.com/", lp.Prefix)
- r, err := http.NewRequest("GET", url, nil)
- if err != nil {
- t.Fatalf("must make http request in test %q: %v", table.description, err)
- }
- q := r.URL.Query()
- q.Add("first", table.first)
- q.Add("second", table.second)
- r.URL.RawQuery = q.Encode()
-
- req, err := lp.newGetConsistencyProofRequest(r)
- if got, want := err != nil, table.wantErr; got != want {
- t.Errorf("got error is %v but wanted %v in test %q: %v", got, want, table.description, err)
- }
- if err != nil {
- continue
- }
-
- if got, want := req.First, mustParseInt64(t, table.first); got != want {
- t.Errorf("got first %d but wanted %d in test %q", got, want, table.description)
- }
- if got, want := req.Second, mustParseInt64(t, table.second); got != want {
- t.Errorf("got second %d but wanted %d in test %q", got, want, table.description)
- }
- }
-}
-
-// TODO: refactor TestNewGetEntryResponse
-func TestNewGetEntryResponse(t *testing.T) {
- //lp := makeTestLogParameters(t, nil)
-
- //var appendix Appendix
- //leaf, app := makeTestLeaf(t, testPackage, testdata.RootChain, testdata.EndEntityPrivateKey)
- //if err := appendix.Unmarshal(app); err != nil {
- // t.Fatalf("must unmarshal appendix: %v", err)
- //}
- //if _, err := lp.newGetEntryResponse(leaf, app[1:]); err == nil {
- // t.Errorf("got no error invalid appendix")
- //}
-
- //// Valid response
- //rsp, err := lp.newGetEntryResponse(leaf, app)
- //if err != nil {
- // t.Errorf("got error %v but wanted none", err)
- // return
- //}
- //if got, want := rsp.Item, leaf; !bytes.Equal(got, want) {
- // t.Errorf("got leaf %X but wanted %X", got, want)
- //}
- //if got, want := rsp.Signature, appendix.Signature; !bytes.Equal(got, want) {
- // t.Errorf("got signature %X but wanted %X", got, want)
- //}
- //if got, want := rsp.SignatureScheme, appendix.SignatureScheme; got != want {
- // t.Errorf("got signature scheme %d but wanted %d", got, want)
- //}
- //if got, want := len(rsp.Chain), len(appendix.Chain); got != want {
- // t.Errorf("got chain length %d but wanted %d", got, want)
- //}
- //for i, n := 0, len(rsp.Chain); i < n; i++ {
- // if got, want := rsp.Chain[i], appendix.Chain[i].Data; !bytes.Equal(got, want) {
- // t.Errorf("got chain[%d]=%X but wanted %X", i, got, want)
- // }
- //}
-}
-
-// TODO: refactor TestNewGetEntriesResponse
-func TestNewGetEntriesResponse(t *testing.T) {
- //lp := makeTestLogParameters(t, nil)
-
- //// Invalid
- //leaf := makeTrillianQueueLeafResponse(t, testPackage, testdata.RootChain, testdata.EndEntityPrivateKey, false).QueuedLeaf.Leaf
- //leaf.ExtraData = leaf.ExtraData[1:]
- //if _, err := lp.newGetEntriesResponse([]*trillian.LogLeaf{leaf}); err == nil {
- // t.Errorf("got no error for invalid appendix")
- //}
-
- //// Valid, including empty
- //for n, numEntries := 0, 5; n < numEntries; n++ {
- // leaves := make([]*trillian.LogLeaf, 0, n)
- // for i := 0; i < n; i++ {
- // leaves = append(leaves, makeTrillianQueueLeafResponse(t, []byte(fmt.Sprintf("%s-%d", testPackage, i)), testdata.RootChain, testdata.EndEntityPrivateKey, false).QueuedLeaf.Leaf)
- // }
- // if rsp, err := lp.newGetEntriesResponse(leaves); err != nil {
- // t.Errorf("got error for %d valid leaves: %v", n, err)
- // } else if got, want := len(rsp), n; got != want {
- // t.Errorf("got %d leaves but wanted %d", got, want)
- // }
- // // note that we tested actual leaf contents in TestNewGetEntryResponse
- //}
-}
-
-// TODO: refactor TestNewGetAnchorsResponse
-func TestNewGetAnchorsResponse(t *testing.T) {
- //rawAnchors := makeTestLogParameters(t, nil).newGetAnchorsResponse()
- //if got, want := len(rawAnchors), testdata.NumTrustAnchors; got != want {
- // t.Errorf("got %d anchors but wanted %d", got, want)
- //}
- //for _, rawAnchor := range rawAnchors {
- // if _, err := x509.ParseCertificate(rawAnchor); err != nil {
- // t.Errorf("invalid trust anchor %X: %v", rawAnchor, err)
- // }
- //}
-}
-
-func mustParseInt64(t *testing.T, num string) int64 {
- n, err := strconv.ParseInt(num, 10, 64)
- if err != nil {
- t.Fatalf("must parse int: %v", err)
- }
- return n
-}
-
-func mustDeb64(t *testing.T, str string) []byte {
- b, err := deb64(str)
- if err != nil {
- t.Fatalf("must base64 decode: %v", err)
- }
- return b
-}
-
-func min(a, b int64) int64 {
- if a < b {
- return a
- }
- return b
-}
diff --git a/request.go b/request.go
new file mode 100644
index 0000000..5bee672
--- /dev/null
+++ b/request.go
@@ -0,0 +1,103 @@
+package stfe
+
+import (
+ "fmt"
+
+ "io/ioutil"
+ "net/http"
+
+ "github.com/system-transparency/stfe/types"
+)
+
+func (lp *LogParameters) parseAddEntryV1Request(r *http.Request) (*types.StItem, error) {
+ var item types.StItem
+ if err := unpackOctetPost(r, &item); err != nil {
+ return nil, fmt.Errorf("unpackOctetPost: %v", err)
+ }
+ if item.Format != types.StFormatSignedChecksumV1 {
+ return nil, fmt.Errorf("invalid StItem format: %v", item.Format)
+ }
+
+ // Check that submitter namespace is valid
+ if namespace, ok := lp.Submitters.Find(&item.SignedChecksumV1.Signature.Namespace); !ok {
+ return nil, fmt.Errorf("unknown namespace: %v", item.SignedChecksumV1.Signature.Namespace)
+ } else if msg, err := types.Marshal(item.SignedChecksumV1.Data); err != nil {
+ return nil, fmt.Errorf("Marshal: %v", err) // should never happen
+ } else if err := namespace.Verify(msg, item.SignedChecksumV1.Signature.Signature); err != nil {
+ return nil, fmt.Errorf("Verify: %v", err)
+ }
+ return &item, nil
+}
+
+func (lp *LogParameters) parseAddCosignatureV1Request(r *http.Request) (*types.StItem, error) {
+ var item types.StItem
+ if err := unpackOctetPost(r, &item); err != nil {
+ return nil, fmt.Errorf("unpackOctetPost: %v", err)
+ }
+ if item.Format != types.StFormatCosignedTreeHeadV1 {
+ return nil, fmt.Errorf("invalid StItem format: %v", item.Format)
+ }
+
+ // Check that witness namespace is valid
+ if got, want := len(item.CosignedTreeHeadV1.Cosignatures), 1; got != want {
+ return nil, fmt.Errorf("invalid number of cosignatures: %d", got)
+ } else if namespace, ok := lp.Witnesses.Find(&item.CosignedTreeHeadV1.Cosignatures[0].Namespace); !ok {
+ return nil, fmt.Errorf("unknown witness: %v", item.CosignedTreeHeadV1.Cosignatures[0].Namespace)
+ } else if msg, err := types.Marshal(*types.NewSignedTreeHeadV1(&item.CosignedTreeHeadV1.SignedTreeHead.TreeHead, &item.CosignedTreeHeadV1.SignedTreeHead.Signature).SignedTreeHeadV1); err != nil {
+ return nil, fmt.Errorf("Marshal: %v", err) // should never happen
+ } else if err := namespace.Verify(msg, item.CosignedTreeHeadV1.Cosignatures[0].Signature); err != nil {
+ return nil, fmt.Errorf("Verify: %v", err)
+ }
+ return &item, nil
+}
+
+func (lp *LogParameters) parseGetConsistencyProofV1Request(r *http.Request) (*types.GetConsistencyProofV1, error) {
+ var item types.GetConsistencyProofV1
+ if err := unpackOctetPost(r, &item); err != nil {
+ return nil, fmt.Errorf("unpackOctetPost: %v", err)
+ }
+ if item.First < 1 {
+ return nil, fmt.Errorf("first(%d) must be larger than zero", item.First)
+ }
+ if item.Second <= item.First {
+ return nil, fmt.Errorf("second(%d) must be larger than first(%d)", item.Second, item.First)
+ }
+ return &item, nil
+}
+
+func (lp *LogParameters) parseGetProofByHashV1Request(r *http.Request) (*types.GetProofByHashV1, error) {
+ var item types.GetProofByHashV1
+ if err := unpackOctetPost(r, &item); err != nil {
+ return nil, fmt.Errorf("unpackOctetPost: %v", err)
+ }
+ if item.TreeSize < 1 {
+ return nil, fmt.Errorf("TreeSize(%d) must be larger than zero", item.TreeSize)
+ }
+ return &item, nil
+}
+
+func (lp *LogParameters) parseGetEntriesV1Request(r *http.Request) (*types.GetEntriesV1, error) {
+ var item types.GetEntriesV1
+ if err := unpackOctetPost(r, &item); err != nil {
+ return nil, fmt.Errorf("unpackOctetPost: %v", err)
+ }
+
+ if item.Start > item.End {
+ return nil, fmt.Errorf("start(%v) must be less than or equal to end(%v)", item.Start, item.End)
+ }
+ if item.End-item.Start+1 > uint64(lp.MaxRange) {
+ item.End = item.Start + uint64(lp.MaxRange) - 1
+ }
+ return &item, nil
+}
+
+func unpackOctetPost(r *http.Request, out interface{}) error {
+ body, err := ioutil.ReadAll(r.Body)
+ if err != nil {
+ return fmt.Errorf("failed reading request body: %v", err)
+ }
+ if err := types.Unmarshal(body, out); err != nil {
+ return fmt.Errorf("Unmarshal: %v", err)
+ }
+ return nil
+}
diff --git a/request_test.go b/request_test.go
new file mode 100644
index 0000000..b0e5da1
--- /dev/null
+++ b/request_test.go
@@ -0,0 +1,318 @@
+package stfe
+
+import (
+ "bytes"
+ "fmt"
+ "reflect"
+ "testing"
+ "testing/iotest"
+
+ "net/http"
+
+ "github.com/system-transparency/stfe/testdata"
+ "github.com/system-transparency/stfe/types"
+)
+
+func TestParseAddEntryV1Request(t *testing.T) {
+ lp := newLogParameters(t, nil)
+ for _, table := range []struct {
+ description string
+ breq *bytes.Buffer
+ wantErr bool
+ }{
+ {
+ description: "invalid: nothing to unpack",
+ breq: bytes.NewBuffer(nil),
+ wantErr: true,
+ },
+ {
+ description: "invalid: not a signed checksum entry",
+ breq: testdata.AddCosignatureBuffer(t, testdata.DefaultSth(t, testdata.Ed25519VkLog), &testdata.Ed25519SkWitness, &testdata.Ed25519VkWitness),
+ wantErr: true,
+ },
+ {
+ description: "invalid: untrusted submitter", // only testdata.Ed25519VkSubmitter is registered by default in newLogParameters()
+
+ breq: testdata.AddSignedChecksumBuffer(t, testdata.Ed25519SkSubmitter2, testdata.Ed25519VkSubmitter2),
+ wantErr: true,
+ },
+ {
+ description: "invalid: signature does not cover message",
+
+ breq: testdata.AddSignedChecksumBuffer(t, testdata.Ed25519SkSubmitter2, testdata.Ed25519VkSubmitter),
+ wantErr: true,
+ },
+ {
+ description: "valid",
+ breq: testdata.AddSignedChecksumBuffer(t, testdata.Ed25519SkSubmitter, testdata.Ed25519VkSubmitter),
+ },
+ } {
+ url := EndpointAddEntry.Path("http://example.com", lp.Prefix)
+ req, err := http.NewRequest("POST", url, table.breq)
+ if err != nil {
+ t.Fatalf("failed creating http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+
+ _, err = lp.parseAddEntryV1Request(req)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got errror %v but wanted %v in test %q: %v", got, want, table.description, err)
+ }
+ }
+}
+
+func TestParseAddCosignatureV1Request(t *testing.T) {
+ lp := newLogParameters(t, nil)
+ for _, table := range []struct {
+ description string
+ breq *bytes.Buffer
+ wantErr bool
+ }{
+ {
+ description: "invalid: nothing to unpack",
+ breq: bytes.NewBuffer(nil),
+ wantErr: true,
+ },
+ {
+ description: "invalid: not a cosigned sth",
+ breq: testdata.AddSignedChecksumBuffer(t, testdata.Ed25519SkSubmitter, testdata.Ed25519VkSubmitter),
+ wantErr: true,
+ },
+ {
+ description: "invalid: no cosignature",
+ breq: testdata.AddCosignatureBuffer(t, testdata.DefaultSth(t, testdata.Ed25519VkLog), &testdata.Ed25519SkWitness, nil),
+ wantErr: true,
+ },
+ {
+ description: "invalid: untrusted witness", // only testdata.Ed25519VkWitness is registered by default in newLogParameters()
+ breq: testdata.AddCosignatureBuffer(t, testdata.DefaultSth(t, testdata.Ed25519VkLog), &testdata.Ed25519SkWitness2, &testdata.Ed25519VkWitness2),
+ wantErr: true,
+ },
+ {
+ description: "invalid: signature does not cover message",
+ breq: testdata.AddCosignatureBuffer(t, testdata.DefaultSth(t, testdata.Ed25519VkLog), &testdata.Ed25519SkWitness2, &testdata.Ed25519VkWitness),
+ wantErr: true,
+ },
+ {
+ description: "valid",
+ breq: testdata.AddCosignatureBuffer(t, testdata.DefaultSth(t, testdata.Ed25519VkLog), &testdata.Ed25519SkWitness, &testdata.Ed25519VkWitness),
+ },
+ } {
+ url := EndpointAddCosignature.Path("http://example.com", lp.Prefix)
+ req, err := http.NewRequest("POST", url, table.breq)
+ if err != nil {
+ t.Fatalf("failed creating http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+
+ _, err = lp.parseAddCosignatureV1Request(req)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got errror %v but wanted %v in test %q: %v", got, want, table.description, err)
+ }
+ }
+}
+
+func TestNewGetConsistencyProofRequest(t *testing.T) {
+ lp := newLogParameters(t, nil)
+ for _, table := range []struct {
+ description string
+ req *types.GetConsistencyProofV1
+ wantErr bool
+ }{
+ {
+ description: "invalid: nothing to unpack",
+ req: nil,
+ wantErr: true,
+ },
+ {
+ description: "invalid: first must be larger than zero",
+ req: &types.GetConsistencyProofV1{First: 0, Second: 0},
+ wantErr: true,
+ },
+ {
+ description: "invalid: second must be larger than first",
+ req: &types.GetConsistencyProofV1{First: 2, Second: 1},
+ wantErr: true,
+ },
+ {
+ description: "valid",
+ req: &types.GetConsistencyProofV1{First: 1, Second: 2},
+ },
+ } {
+ var buf *bytes.Buffer
+ if table.req == nil {
+ buf = bytes.NewBuffer(nil)
+ } else {
+ buf = bytes.NewBuffer(marshal(t, *table.req))
+ }
+
+ url := EndpointGetConsistencyProof.Path("http://example.com", lp.Prefix)
+ req, err := http.NewRequest("POST", url, buf)
+ if err != nil {
+ t.Fatalf("failed creating http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+
+ _, err = lp.parseGetConsistencyProofV1Request(req)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got errror %v but wanted %v in test %q: %v", got, want, table.description, err)
+ }
+ }
+}
+
+func TestNewGetProofByHashRequest(t *testing.T) {
+ lp := newLogParameters(t, nil)
+ for _, table := range []struct {
+ description string
+ req *types.GetProofByHashV1
+ wantErr bool
+ }{
+ {
+ description: "invalid: nothing to unpack",
+ req: nil,
+ wantErr: true,
+ },
+ {
+ description: "invalid: no entry in an empty tree",
+ req: &types.GetProofByHashV1{TreeSize: 0, Hash: testdata.LeafHash},
+ wantErr: true,
+ },
+ {
+ description: "valid",
+ req: &types.GetProofByHashV1{TreeSize: 1, Hash: testdata.LeafHash},
+ },
+ } {
+ var buf *bytes.Buffer
+ if table.req == nil {
+ buf = bytes.NewBuffer(nil)
+ } else {
+ buf = bytes.NewBuffer(marshal(t, *table.req))
+ }
+
+ url := EndpointGetProofByHash.Path("http://example.com", lp.Prefix)
+ req, err := http.NewRequest("POST", url, buf)
+ if err != nil {
+ t.Fatalf("failed creating http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+
+ _, err = lp.parseGetProofByHashV1Request(req)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got errror %v but wanted %v in test %q: %v", got, want, table.description, err)
+ }
+ }
+}
+
+func TestParseGetEntriesV1Request(t *testing.T) {
+ lp := newLogParameters(t, nil)
+ for _, table := range []struct {
+ description string
+ req *types.GetEntriesV1
+ wantErr bool
+ wantReq *types.GetEntriesV1
+ }{
+ {
+ description: "invalid: nothing to unpack",
+ req: nil,
+ wantErr: true,
+ },
+ {
+ description: "invalid: start must be larger than end",
+ req: &types.GetEntriesV1{Start: 1, End: 0},
+ wantErr: true,
+ },
+ {
+ description: "valid: want truncated range",
+ req: &types.GetEntriesV1{Start: 0, End: uint64(testdata.MaxRange)},
+ wantReq: &types.GetEntriesV1{Start: 0, End: uint64(testdata.MaxRange) - 1},
+ },
+ {
+ description: "valid",
+ req: &types.GetEntriesV1{Start: 0, End: 0},
+ wantReq: &types.GetEntriesV1{Start: 0, End: 0},
+ },
+ } {
+ var buf *bytes.Buffer
+ if table.req == nil {
+ buf = bytes.NewBuffer(nil)
+ } else {
+ buf = bytes.NewBuffer(marshal(t, *table.req))
+ }
+
+ url := EndpointGetEntries.Path("http://example.com", lp.Prefix)
+ req, err := http.NewRequest("POST", url, buf)
+ if err != nil {
+ t.Fatalf("failed creating http request: %v", err)
+ }
+ req.Header.Set("Content-Type", "application/octet-stream")
+
+ output, err := lp.parseGetEntriesV1Request(req)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got errror %v but wanted %v in test %q: %v", got, want, table.description, err)
+ }
+ if err != nil {
+ continue
+ }
+ if got, want := output, table.wantReq; !reflect.DeepEqual(got, want) {
+ t.Errorf("got request\n%v\n\tbut wanted\n%v\n\t in test %q", got, want, table.description)
+ }
+ }
+}
+
+func TestUnpackOctetPost(t *testing.T) {
+ for _, table := range []struct {
+ description string
+ req *http.Request
+ out interface{}
+ wantErr bool
+ }{
+ {
+ description: "invalid: cannot read request body",
+ req: func() *http.Request {
+ req, err := http.NewRequest(http.MethodPost, "", iotest.ErrReader(fmt.Errorf("bad reader")))
+ if err != nil {
+ t.Fatalf("must make new http request: %v", err)
+ }
+ return req
+ }(),
+ out: &types.StItem{},
+ wantErr: true,
+ },
+ {
+ description: "invalid: cannot unmarshal",
+ req: func() *http.Request {
+ req, err := http.NewRequest(http.MethodPost, "", bytes.NewBuffer(nil))
+ if err != nil {
+ t.Fatalf("must make new http request: %v", err)
+ }
+ return req
+ }(),
+ out: &types.StItem{},
+ wantErr: true,
+ },
+ {
+ description: "valid",
+ req: func() *http.Request {
+ req, err := http.NewRequest(http.MethodPost, "", bytes.NewBuffer([]byte{0}))
+ if err != nil {
+ t.Fatalf("must make new http request: %v", err)
+ }
+ return req
+ }(),
+ out: &struct{ SomeUint8 uint8 }{},
+ },
+ } {
+ err := unpackOctetPost(table.req, table.out)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q", got, want, table.description)
+ }
+ }
+}
+
+func marshal(t *testing.T, out interface{}) []byte {
+ b, err := types.Marshal(out)
+ if err != nil {
+ t.Fatalf("must marshal: %v", err)
+ }
+ return b
+}
diff --git a/server/main.go b/server/main.go
index 7402fb3..a00758e 100644
--- a/server/main.go
+++ b/server/main.go
@@ -20,7 +20,7 @@ import (
"github.com/google/trillian"
"github.com/prometheus/client_golang/prometheus/promhttp"
"github.com/system-transparency/stfe"
- "github.com/system-transparency/stfe/namespace"
+ "github.com/system-transparency/stfe/types"
"google.golang.org/grpc"
)
@@ -31,8 +31,8 @@ var (
trillianID = flag.Int64("trillian_id", 5991359069696313945, "log identifier in the Trillian database")
deadline = flag.Duration("deadline", time.Second*10, "deadline for backend requests")
key = flag.String("key", "8gzezwrU/2eTrO6tEYyLKsoqn5V54URvKIL9cTE7jUYUqXVX4neJvcBq/zpSAYPsZFG1woh0OGBzQbi9UP9MZw==", "base64-encoded Ed25519 signing key")
- submitters = flag.String("submitters", "AAEgHOQFUkKNWpjYAhNKTyWCzahlI7RDtf5123kHD2LACj0=,AAEgLqrWb9JwQUTk/SwTNDdMH8aRmy3mbmhwEepO5WSgb+A=", "comma-separated list of trusted submitter namespaces in base64 (default: testdata.Ed25519{Vk,Vk2})")
- witnesses = flag.String("witnesses", "", "comma-separated list of trusted submitter namespaces in base64 (default: none")
+ submitters = flag.String("submitters", "AAEgHOQFUkKNWpjYAhNKTyWCzahlI7RDtf5123kHD2LACj0=,AAEgLqrWb9JwQUTk/SwTNDdMH8aRmy3mbmhwEepO5WSgb+A=", "comma-separated list of trusted submitter namespaces in base64 (default: testdata.Ed25519{Vk,Vk2})") // TODO: update to valid submitter namespaces
+ witnesses = flag.String("witnesses", "", "comma-separated list of trusted submitter namespaces in base64 (default: none") // TODO: update to valid witness namespaces
maxRange = flag.Int64("max_range", 2, "maximum number of entries that can be retrived in a single request")
interval = flag.Duration("interval", time.Second*30, "interval used to rotate the log's cosigned STH")
)
@@ -113,7 +113,7 @@ func setupInstanceFromFlags() (*stfe.Instance, error) {
return nil, fmt.Errorf("sk: DecodeString: %v", err)
}
signer := ed25519.PrivateKey(sk)
- logId, err := namespace.NewNamespaceEd25519V1([]byte(ed25519.PrivateKey(sk).Public().(ed25519.PublicKey)))
+ logId, err := types.NewNamespaceEd25519V1([]byte(ed25519.PrivateKey(sk).Public().(ed25519.PublicKey)))
if err != nil {
return nil, fmt.Errorf("NewNamespaceEd25519V1: %v", err)
}
@@ -128,7 +128,7 @@ func setupInstanceFromFlags() (*stfe.Instance, error) {
return nil, fmt.Errorf("NewActiveSthSource: %v", err)
}
// Setup log instance
- i := stfe.NewInstance(lp, client, source)
+ i := &stfe.Instance{client, lp, source}
for _, handler := range i.Handlers() {
glog.V(3).Infof("adding handler: %s", handler.Path())
mux.Handle(handler.Path(), handler)
@@ -138,22 +138,22 @@ func setupInstanceFromFlags() (*stfe.Instance, error) {
// newNamespacePoolFromString creates a new namespace pool from a
// comma-separated list of serialized and base64-encoded namespaces.
-func newNamespacePoolFromString(str string) (*namespace.NamespacePool, error) {
- var namespaces []*namespace.Namespace
+func newNamespacePoolFromString(str string) (*types.NamespacePool, error) {
+ var namespaces []*types.Namespace
if len(str) > 0 {
for _, b64 := range strings.Split(str, ",") {
b, err := base64.StdEncoding.DecodeString(b64)
if err != nil {
return nil, fmt.Errorf("DecodeString: %v", err)
}
- var namespace namespace.Namespace
- if err := namespace.Unmarshal(b); err != nil {
+ var namespace types.Namespace
+ if err := types.Unmarshal(b, &namespace); err != nil {
return nil, fmt.Errorf("Unmarshal: %v", err)
}
namespaces = append(namespaces, &namespace)
}
}
- pool, err := namespace.NewNamespacePool(namespaces)
+ pool, err := types.NewNamespacePool(namespaces)
if err != nil {
return nil, fmt.Errorf("NewNamespacePool: %v", err)
}
diff --git a/sth.go b/sth.go
index 58b5c35..30ba965 100644
--- a/sth.go
+++ b/sth.go
@@ -9,21 +9,22 @@ import (
"github.com/golang/glog"
"github.com/google/certificate-transparency-go/schedule"
"github.com/google/trillian"
- "github.com/google/trillian/types"
+ ttypes "github.com/google/trillian/types"
+ "github.com/system-transparency/stfe/types"
)
// SthSource provides access to the log's STHs.
type SthSource interface {
// Latest returns the most reccent signed_tree_head_v*.
- Latest(context.Context) (*StItem, error)
+ Latest(context.Context) (*types.StItem, error)
// Stable returns the most recent signed_tree_head_v* that is stable for
// some period of time, e.g., 10 minutes.
- Stable(context.Context) (*StItem, error)
+ Stable(context.Context) (*types.StItem, error)
// Cosigned returns the most recent cosigned_tree_head_v*.
- Cosigned(context.Context) (*StItem, error)
+ Cosigned(context.Context) (*types.StItem, error)
// AddCosignature attempts to add a cosignature to the stable STH. The
// passed cosigned_tree_head_v* must have a single verified cosignature.
- AddCosignature(context.Context, *StItem) error
+ AddCosignature(context.Context, *types.StItem) error
// Run keeps the STH source updated until cancelled
Run(context.Context)
}
@@ -33,9 +34,9 @@ type SthSource interface {
type ActiveSthSource struct {
client trillian.TrillianLogClient
logParameters *LogParameters
- currCosth *StItem // current cosigned_tree_head_v1 (already finalized)
- nextCosth *StItem // next cosigned_tree_head_v1 (under preparation)
- cosignatureFrom map[string]bool // track who we got cosignatures from in nextCosth
+ currCosth *types.StItem // current cosigned_tree_head_v1 (already finalized)
+ nextCosth *types.StItem // next cosigned_tree_head_v1 (under preparation)
+ cosignatureFrom map[[types.NamespaceFingerprintSize]byte]bool // track who we got cosignatures from in nextCosth
mutex sync.RWMutex
}
@@ -51,10 +52,11 @@ func NewActiveSthSource(cli trillian.TrillianLogClient, lp *LogParameters) (*Act
if err != nil {
return nil, fmt.Errorf("Latest: %v", err)
}
+
// TODO: load persisted cosigned STH?
- s.currCosth = NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil)
- s.nextCosth = NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil)
- s.cosignatureFrom = make(map[string]bool)
+ s.currCosth = types.NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil)
+ s.nextCosth = types.NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil)
+ s.cosignatureFrom = make(map[[types.NamespaceFingerprintSize]byte]bool)
return &s, nil
}
@@ -70,78 +72,84 @@ func (s *ActiveSthSource) Run(ctx context.Context) {
// rotate
s.mutex.Lock()
defer s.mutex.Unlock()
- s.rotate(sth)
+ if err := s.rotate(sth); err != nil {
+ glog.Warningf("rotate failed: %v", err)
+ }
// TODO: persist cosigned STH?
})
}
-func (s *ActiveSthSource) Latest(ctx context.Context) (*StItem, error) {
+func (s *ActiveSthSource) Latest(ctx context.Context) (*types.StItem, error) {
trsp, err := s.client.GetLatestSignedLogRoot(ctx, &trillian.GetLatestSignedLogRootRequest{
LogId: s.logParameters.TreeId,
})
- var lr types.LogRootV1
+ var lr ttypes.LogRootV1
if errInner := checkGetLatestSignedLogRoot(s.logParameters, trsp, err, &lr); errInner != nil {
return nil, fmt.Errorf("invalid signed log root response: %v", errInner)
}
- return s.logParameters.genV1Sth(NewTreeHeadV1(&lr))
+ return s.logParameters.SignTreeHeadV1(NewTreeHeadV1FromLogRoot(&lr))
}
-func (s *ActiveSthSource) Stable(_ context.Context) (*StItem, error) {
+func (s *ActiveSthSource) Stable(_ context.Context) (*types.StItem, error) {
s.mutex.RLock()
defer s.mutex.RUnlock()
if s.nextCosth == nil {
return nil, fmt.Errorf("no stable sth available")
}
- return &StItem{
- Format: StFormatSignedTreeHeadV1,
- SignedTreeHeadV1: &s.nextCosth.CosignedTreeHeadV1.SignedTreeHeadV1,
- }, nil
+ return types.NewSignedTreeHeadV1(&s.nextCosth.CosignedTreeHeadV1.SignedTreeHead.TreeHead, &s.nextCosth.CosignedTreeHeadV1.SignedTreeHead.Signature), nil
}
-func (s *ActiveSthSource) Cosigned(_ context.Context) (*StItem, error) {
+func (s *ActiveSthSource) Cosigned(_ context.Context) (*types.StItem, error) {
s.mutex.RLock()
defer s.mutex.RUnlock()
- if s.currCosth == nil || len(s.currCosth.CosignedTreeHeadV1.SignatureV1) == 0 {
+ if s.currCosth == nil || len(s.currCosth.CosignedTreeHeadV1.Cosignatures) == 0 {
return nil, fmt.Errorf("no cosigned sth available")
}
return s.currCosth, nil
}
-func (s *ActiveSthSource) AddCosignature(_ context.Context, costh *StItem) error {
+func (s *ActiveSthSource) AddCosignature(_ context.Context, costh *types.StItem) error {
s.mutex.Lock()
defer s.mutex.Unlock()
- if !reflect.DeepEqual(s.nextCosth.CosignedTreeHeadV1.SignedTreeHeadV1, costh.CosignedTreeHeadV1.SignedTreeHeadV1) {
+ if !reflect.DeepEqual(s.nextCosth.CosignedTreeHeadV1.SignedTreeHead, costh.CosignedTreeHeadV1.SignedTreeHead) {
return fmt.Errorf("cosignature covers a different tree head")
}
- witness := costh.CosignedTreeHeadV1.SignatureV1[0].Namespace.String()
- if _, ok := s.cosignatureFrom[witness]; ok {
+ witness, err := costh.CosignedTreeHeadV1.Cosignatures[0].Namespace.Fingerprint()
+ if err != nil {
+ return fmt.Errorf("namespace without fingerprint: %v", err)
+ }
+ if _, ok := s.cosignatureFrom[*witness]; ok {
return nil // duplicate
}
- s.cosignatureFrom[witness] = true
- s.nextCosth.CosignedTreeHeadV1.SignatureV1 = append(s.nextCosth.CosignedTreeHeadV1.SignatureV1, costh.CosignedTreeHeadV1.SignatureV1[0])
+ s.cosignatureFrom[*witness] = true
+ s.nextCosth.CosignedTreeHeadV1.Cosignatures = append(s.nextCosth.CosignedTreeHeadV1.Cosignatures, costh.CosignedTreeHeadV1.Cosignatures[0])
return nil
}
// rotate rotates the log's cosigned and stable STH. The caller must aquire the
// source's read-write lock if there are concurrent reads and/or writes.
-func (s *ActiveSthSource) rotate(fixedSth *StItem) {
+func (s *ActiveSthSource) rotate(fixedSth *types.StItem) error {
// rotate stable -> cosigned
- if reflect.DeepEqual(&s.currCosth.CosignedTreeHeadV1.SignedTreeHeadV1, &s.nextCosth.CosignedTreeHeadV1.SignedTreeHeadV1) {
- for _, sigv1 := range s.currCosth.CosignedTreeHeadV1.SignatureV1 {
- witness := sigv1.Namespace.String()
- if _, ok := s.cosignatureFrom[witness]; !ok {
- s.cosignatureFrom[witness] = true
- s.nextCosth.CosignedTreeHeadV1.SignatureV1 = append(s.nextCosth.CosignedTreeHeadV1.SignatureV1, sigv1)
+ if reflect.DeepEqual(&s.currCosth.CosignedTreeHeadV1.SignedTreeHead, &s.nextCosth.CosignedTreeHeadV1.SignedTreeHead) {
+ for _, sigv1 := range s.currCosth.CosignedTreeHeadV1.Cosignatures {
+ witness, err := sigv1.Namespace.Fingerprint()
+ if err != nil {
+ return fmt.Errorf("namespace without fingerprint: %v", err)
+ }
+ if _, ok := s.cosignatureFrom[*witness]; !ok {
+ s.cosignatureFrom[*witness] = true
+ s.nextCosth.CosignedTreeHeadV1.Cosignatures = append(s.nextCosth.CosignedTreeHeadV1.Cosignatures, sigv1)
}
}
}
- s.currCosth.CosignedTreeHeadV1.SignedTreeHeadV1 = s.nextCosth.CosignedTreeHeadV1.SignedTreeHeadV1
- s.currCosth.CosignedTreeHeadV1.SignatureV1 = make([]SignatureV1, len(s.nextCosth.CosignedTreeHeadV1.SignatureV1))
- copy(s.currCosth.CosignedTreeHeadV1.SignatureV1, s.nextCosth.CosignedTreeHeadV1.SignatureV1)
+ s.currCosth.CosignedTreeHeadV1.SignedTreeHead = s.nextCosth.CosignedTreeHeadV1.SignedTreeHead
+ s.currCosth.CosignedTreeHeadV1.Cosignatures = make([]types.SignatureV1, len(s.nextCosth.CosignedTreeHeadV1.Cosignatures))
+ copy(s.currCosth.CosignedTreeHeadV1.Cosignatures, s.nextCosth.CosignedTreeHeadV1.Cosignatures)
// rotate new stable -> stable
- if !reflect.DeepEqual(&s.nextCosth.CosignedTreeHeadV1.SignedTreeHeadV1, fixedSth.SignedTreeHeadV1) {
- s.nextCosth = NewCosignedTreeHeadV1(fixedSth.SignedTreeHeadV1, nil)
- s.cosignatureFrom = make(map[string]bool)
+ if !reflect.DeepEqual(&s.nextCosth.CosignedTreeHeadV1.SignedTreeHead, fixedSth.SignedTreeHeadV1) {
+ s.nextCosth = types.NewCosignedTreeHeadV1(fixedSth.SignedTreeHeadV1, nil)
+ s.cosignatureFrom = make(map[[types.NamespaceFingerprintSize]byte]bool)
}
+ return nil
}
diff --git a/sth_test.go b/sth_test.go
index e3350dd..e5914c6 100644
--- a/sth_test.go
+++ b/sth_test.go
@@ -10,8 +10,8 @@ import (
"github.com/golang/mock/gomock"
cttestdata "github.com/google/certificate-transparency-go/trillian/testdata"
"github.com/google/trillian"
- "github.com/system-transparency/stfe/namespace"
- "github.com/system-transparency/stfe/namespace/testdata"
+ "github.com/system-transparency/stfe/testdata"
+ "github.com/system-transparency/stfe/types"
)
func TestNewActiveSthSource(t *testing.T) {
@@ -21,28 +21,28 @@ func TestNewActiveSthSource(t *testing.T) {
trsp *trillian.GetLatestSignedLogRootResponse
terr error
wantErr bool
- wantCosi *StItem // current cosigned sth
- wantStable *StItem // next stable sth that signatures are collected for
+ wantCosi *types.StItem // current cosigned sth
+ wantStable *types.StItem // next stable sth that signatures are collected for
}{
{
- description: "invalid trillian response",
- signer: cttestdata.NewSignerWithFixedSig(nil, testSignature),
+ description: "invalid: no Trillian response",
+ signer: cttestdata.NewSignerWithFixedSig(nil, testdata.Signature),
terr: fmt.Errorf("internal server error"),
wantErr: true,
},
{
description: "valid",
- signer: cttestdata.NewSignerWithFixedSig(nil, testSignature),
- trsp: makeLatestSignedLogRootResponse(t, testTimestamp, testTreeSize, testNodeHash),
- wantCosi: NewCosignedTreeHeadV1(NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature).SignedTreeHeadV1, nil),
- wantStable: NewCosignedTreeHeadV1(NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature).SignedTreeHeadV1, nil),
+ signer: cttestdata.NewSignerWithFixedSig(nil, testdata.Signature),
+ trsp: testdata.DefaultTSlr(t),
+ wantCosi: testdata.DefaultCosth(t, testdata.Ed25519VkLog, nil),
+ wantStable: testdata.DefaultCosth(t, testdata.Ed25519VkLog, nil),
},
} {
func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, table.signer, nil)
- defer th.mockCtrl.Finish()
- th.client.EXPECT().GetLatestSignedLogRoot(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr)
- source, err := NewActiveSthSource(th.client, th.instance.LogParameters)
+ ti := newTestInstance(t, table.signer)
+ defer ti.ctrl.Finish()
+ ti.client.EXPECT().GetLatestSignedLogRoot(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr)
+ source, err := NewActiveSthSource(ti.client, ti.instance.LogParameters)
if got, want := err != nil, table.wantErr; got != want {
t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err)
}
@@ -51,20 +51,20 @@ func TestNewActiveSthSource(t *testing.T) {
}
if got, want := source.currCosth, table.wantCosi; !reflect.DeepEqual(got, want) {
- t.Errorf("got cosigned sth %v but wanted %v in test %q", got, want, table.description)
+ t.Errorf("got cosigned sth\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
}
if got, want := source.nextCosth, table.wantStable; !reflect.DeepEqual(got, want) {
- t.Errorf("got stable sth %v but wanted %v in test %q", got, want, table.description)
+ t.Errorf("got stable sth\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
}
- cosignatureFrom := make(map[string]bool)
- for _, wit := range table.wantStable.CosignedTreeHeadV1.SignatureV1 {
- cosignatureFrom[wit.Namespace.String()] = true
+ cosignatureFrom := make(map[[types.NamespaceFingerprintSize]byte]bool)
+ for _, cosig := range table.wantStable.CosignedTreeHeadV1.Cosignatures {
+ cosignatureFrom[testdata.Fingerprint(t, &cosig.Namespace)] = true
}
if got, want := source.cosignatureFrom, cosignatureFrom; !reflect.DeepEqual(got, want) {
if got == nil {
- t.Errorf("got uninitialized witness map %v but wanted %v in test %q", nil, want, table.description)
+ t.Errorf("got uninitialized witness map\n%v\n\tbut wanted\n%v\n\tin test %q", nil, want, table.description)
} else {
- t.Errorf("got witness map %v but wanted %v in test %q", got, want, table.description)
+ t.Errorf("got witness map\n%v\n\t but wanted\n%v\n\tin test %q", got, want, table.description)
}
}
}()
@@ -78,32 +78,32 @@ func TestLatest(t *testing.T) {
trsp *trillian.GetLatestSignedLogRootResponse
terr error
wantErr bool
- wantRsp *StItem
+ wantRsp *types.StItem
}{
{
- description: "invalid trillian response",
- signer: cttestdata.NewSignerWithFixedSig(nil, testSignature),
+ description: "invalid: no Trillian response",
+ signer: cttestdata.NewSignerWithFixedSig(nil, testdata.Signature),
terr: fmt.Errorf("internal server error"),
wantErr: true,
},
{
- description: "signature failure",
+ description: "invalid: no signature",
signer: cttestdata.NewSignerWithErr(nil, fmt.Errorf("signing failed")),
terr: fmt.Errorf("internal server error"),
wantErr: true,
},
{
description: "valid",
- signer: cttestdata.NewSignerWithFixedSig(nil, testSignature),
- trsp: makeLatestSignedLogRootResponse(t, testTimestamp, testTreeSize, testNodeHash),
- wantRsp: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature),
+ signer: cttestdata.NewSignerWithFixedSig(nil, testdata.Signature),
+ trsp: testdata.DefaultTSlr(t),
+ wantRsp: testdata.DefaultSth(t, testdata.Ed25519VkLog),
},
} {
func() { // run deferred functions at the end of each iteration
- th := newTestHandler(t, table.signer, nil)
- defer th.mockCtrl.Finish()
- th.client.EXPECT().GetLatestSignedLogRoot(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr)
- sth, err := th.instance.SthSource.Latest(context.Background())
+ ti := newTestInstance(t, table.signer)
+ defer ti.ctrl.Finish()
+ ti.client.EXPECT().GetLatestSignedLogRoot(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr)
+ sth, err := ti.instance.SthSource.Latest(context.Background())
if got, want := err != nil, table.wantErr; got != want {
t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err)
}
@@ -111,30 +111,30 @@ func TestLatest(t *testing.T) {
return
}
if got, want := sth, table.wantRsp; !reflect.DeepEqual(got, want) {
- t.Errorf("got %v but wanted %v in test %q", got, want, table.description)
+ t.Errorf("got\n%v\n\tbut wanted\n%v\n\t in test %q", got, want, table.description)
}
}()
}
}
func TestStable(t *testing.T) {
- sth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature)
for _, table := range []struct {
description string
source SthSource
- wantRsp *StItem
+ wantRsp *types.StItem
wantErr bool
}{
{
- description: "no stable sth",
+ description: "invalid: no stable sth",
source: &ActiveSthSource{},
wantErr: true,
},
{
description: "valid",
source: &ActiveSthSource{
- nextCosth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil)},
- wantRsp: sth,
+ nextCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, nil),
+ },
+ wantRsp: testdata.DefaultSth(t, testdata.Ed25519VkLog),
},
} {
sth, err := table.source.Stable(context.Background())
@@ -145,43 +145,36 @@ func TestStable(t *testing.T) {
continue
}
if got, want := sth, table.wantRsp; !reflect.DeepEqual(got, want) {
- t.Errorf("got %v but wanted %v in test %q", got, want, table.description)
+ t.Errorf("got\n%v\n\t but wanted\n%v\n\t in test %q", got, want, table.description)
}
}
}
func TestCosigned(t *testing.T) {
- sth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature)
- sigs := []SignatureV1{
- SignatureV1{
- Namespace: *mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- Signature: testSignature,
- },
- }
for _, table := range []struct {
description string
source SthSource
- wantRsp *StItem
+ wantRsp *types.StItem
wantErr bool
}{
{
- description: "no cosigned sth: nil",
+ description: "invalid: no cosigned sth: nil",
source: &ActiveSthSource{},
wantErr: true,
},
{
- description: "no cosigned sth: nil signatures",
+ description: "invalid: no cosigned sth: nil signatures",
source: &ActiveSthSource{
- currCosth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil),
+ currCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, nil),
},
wantErr: true,
},
{
description: "valid",
source: &ActiveSthSource{
- currCosth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, sigs),
+ currCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
},
- wantRsp: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, sigs),
+ wantRsp: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
},
} {
cosi, err := table.source.Cosigned(context.Background())
@@ -192,91 +185,58 @@ func TestCosigned(t *testing.T) {
continue
}
if got, want := cosi, table.wantRsp; !reflect.DeepEqual(got, want) {
- t.Errorf("got %v but wanted %v in test %q", got, want, table.description)
+ t.Errorf("got\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
}
}
}
func TestAddCosignature(t *testing.T) {
- sth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature)
- wit1 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)
- wit2 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk2)
for _, table := range []struct {
description string
source *ActiveSthSource
- req *StItem
- wantWit []*namespace.Namespace
+ req *types.StItem
+ wantWit []*types.Namespace
wantErr bool
}{
{
description: "invalid: cosignature must target the stable sth",
source: &ActiveSthSource{
- nextCosth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil),
- cosignatureFrom: make(map[string]bool),
+ nextCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, nil),
+ cosignatureFrom: make(map[[types.NamespaceFingerprintSize]byte]bool),
},
- req: NewCosignedTreeHeadV1(NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp+1000000, testTreeSize, testNodeHash)), testLogId, testSignature).SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *wit1,
- Signature: testSignature,
- },
- }),
+ req: testdata.DefaultCosth(t, testdata.Ed25519VkLog2, [][32]byte{testdata.Ed25519VkWitness}),
wantErr: true,
},
{
description: "valid: adding duplicate into a pool of cosignatures",
source: &ActiveSthSource{
- nextCosth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *wit1,
- Signature: testSignature,
- },
- }),
- cosignatureFrom: map[string]bool{
- wit1.String(): true,
+ nextCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
+ cosignatureFrom: map[[types.NamespaceFingerprintSize]byte]bool{
+ testdata.Fingerprint(t, testdata.NewNamespace(t, testdata.Ed25519VkWitness)): true,
},
},
- req: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *wit1,
- Signature: testSignature,
- },
- }),
- wantWit: []*namespace.Namespace{wit1},
+ req: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
+ wantWit: []*types.Namespace{testdata.NewNamespace(t, testdata.Ed25519VkWitness)},
},
{
description: "valid: adding into an empty pool of cosignatures",
source: &ActiveSthSource{
- nextCosth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil),
- cosignatureFrom: make(map[string]bool),
+ nextCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, nil),
+ cosignatureFrom: make(map[[types.NamespaceFingerprintSize]byte]bool),
},
- req: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *wit1,
- Signature: testSignature,
- },
- }),
- wantWit: []*namespace.Namespace{wit1},
+ req: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
+ wantWit: []*types.Namespace{testdata.NewNamespace(t, testdata.Ed25519VkWitness)},
},
{
description: "valid: adding into a pool of cosignatures",
source: &ActiveSthSource{
- nextCosth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *wit1,
- Signature: testSignature,
- },
- }),
- cosignatureFrom: map[string]bool{
- wit1.String(): true,
+ nextCosth: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness}),
+ cosignatureFrom: map[[types.NamespaceFingerprintSize]byte]bool{
+ testdata.Fingerprint(t, testdata.NewNamespace(t, testdata.Ed25519VkWitness)): true,
},
},
- req: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
- Namespace: *wit2,
- Signature: testSignature,
- },
- }),
- wantWit: []*namespace.Namespace{wit1, wit2},
+ req: testdata.DefaultCosth(t, testdata.Ed25519VkLog, [][32]byte{testdata.Ed25519VkWitness2}),
+ wantWit: []*types.Namespace{testdata.NewNamespace(t, testdata.Ed25519VkWitness), testdata.NewNamespace(t, testdata.Ed25519VkWitness2)},
},
} {
err := table.source.AddCosignature(context.Background(), table.req)
@@ -288,23 +248,23 @@ func TestAddCosignature(t *testing.T) {
}
// Check that the next cosigned sth is updated
- var sigs []SignatureV1
+ var sigs []types.SignatureV1
for _, wit := range table.wantWit {
- sigs = append(sigs, SignatureV1{
+ sigs = append(sigs, types.SignatureV1{
Namespace: *wit,
- Signature: testSignature,
+ Signature: testdata.Signature,
})
}
- if got, want := table.source.nextCosth, NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, sigs); !reflect.DeepEqual(got, want) {
- t.Errorf("got %v but wanted %v in test %q", got, want, table.description)
+ if got, want := table.source.nextCosth, types.NewCosignedTreeHeadV1(testdata.DefaultSth(t, testdata.Ed25519VkLog).SignedTreeHeadV1, sigs); !reflect.DeepEqual(got, want) {
+ t.Errorf("got\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
}
// Check that the map tracking witness signatures is updated
if got, want := len(table.source.cosignatureFrom), len(table.wantWit); got != want {
t.Errorf("witness map got %d cosignatures but wanted %d in test %q", got, want, table.description)
} else {
for _, wit := range table.wantWit {
- if _, ok := table.source.cosignatureFrom[wit.String()]; !ok {
- t.Errorf("missing signature from witness %X in test %q", wit.String(), table.description)
+ if _, ok := table.source.cosignatureFrom[testdata.Fingerprint(t, wit)]; !ok {
+ t.Errorf("missing signature from witness %X in test %q", testdata.Fingerprint(t, wit), table.description)
}
}
}
@@ -312,199 +272,201 @@ func TestAddCosignature(t *testing.T) {
}
func TestRotate(t *testing.T) {
- sth1 := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature)
- sth2 := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp+1000000, testTreeSize+1, testNodeHash)), testLogId, testSignature)
- sth3 := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp+2000000, testTreeSize+2, testNodeHash)), testLogId, testSignature)
- wit1 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)
- wit2 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk2)
- wit3 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk3)
+ // distinct sths
+ sth1 := testdata.DefaultSth(t, testdata.Ed25519VkLog)
+ sth2 := testdata.DefaultSth(t, testdata.Ed25519VkLog2)
+ sth3 := testdata.DefaultSth(t, testdata.Ed25519VkLog3)
+ // distinct witnesses
+ wit1 := testdata.NewNamespace(t, testdata.Ed25519VkWitness)
+ wit2 := testdata.NewNamespace(t, testdata.Ed25519VkWitness2)
+ wit3 := testdata.NewNamespace(t, testdata.Ed25519VkWitness3)
for _, table := range []struct {
description string
source *ActiveSthSource
- fixedSth *StItem
- wantCurrSth *StItem
- wantNextSth *StItem
- wantWit []*namespace.Namespace
+ fixedSth *types.StItem
+ wantCurrSth *types.StItem
+ wantNextSth *types.StItem
+ wantWit []*types.Namespace
}{
{
description: "not repeated cosigned and not repeated stable",
source: &ActiveSthSource{
- currCosth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, nil),
- nextCosth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ currCosth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, nil),
+ nextCosth: types.NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- cosignatureFrom: map[string]bool{
- wit1.String(): true,
+ cosignatureFrom: map[[types.NamespaceFingerprintSize]byte]bool{
+ testdata.Fingerprint(t, wit1): true,
},
},
fixedSth: sth3,
- wantCurrSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ wantCurrSth: types.NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- wantNextSth: NewCosignedTreeHeadV1(sth3.SignedTreeHeadV1, nil),
+ wantNextSth: types.NewCosignedTreeHeadV1(sth3.SignedTreeHeadV1, nil),
wantWit: nil, // no cosignatures for the next stable sth yet
},
{
description: "not repeated cosigned and repeated stable",
source: &ActiveSthSource{
- currCosth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, nil),
- nextCosth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ currCosth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, nil),
+ nextCosth: types.NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- cosignatureFrom: map[string]bool{
- wit1.String(): true,
+ cosignatureFrom: map[[types.NamespaceFingerprintSize]byte]bool{
+ testdata.Fingerprint(t, wit1): true,
},
},
fixedSth: sth2,
- wantCurrSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ wantCurrSth: types.NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- wantNextSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ wantNextSth: types.NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- wantWit: []*namespace.Namespace{wit1},
+ wantWit: []*types.Namespace{wit1},
},
{
description: "repeated cosigned and not repeated stable",
source: &ActiveSthSource{
- currCosth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ currCosth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit2,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- nextCosth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ nextCosth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit2,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit3,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- cosignatureFrom: map[string]bool{
- wit2.String(): true,
- wit3.String(): true,
+ cosignatureFrom: map[[types.NamespaceFingerprintSize]byte]bool{
+ testdata.Fingerprint(t, wit2): true,
+ testdata.Fingerprint(t, wit3): true,
},
},
fixedSth: sth3,
- wantCurrSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ wantCurrSth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit2,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit3,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- wantNextSth: NewCosignedTreeHeadV1(sth3.SignedTreeHeadV1, nil),
+ wantNextSth: types.NewCosignedTreeHeadV1(sth3.SignedTreeHeadV1, nil),
wantWit: nil, // no cosignatures for the next stable sth yet
},
{
description: "repeated cosigned and repeated stable",
source: &ActiveSthSource{
- currCosth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ currCosth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit2,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- nextCosth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ nextCosth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit2,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit3,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- cosignatureFrom: map[string]bool{
- wit2.String(): true,
- wit3.String(): true,
+ cosignatureFrom: map[[types.NamespaceFingerprintSize]byte]bool{
+ testdata.Fingerprint(t, wit2): true,
+ testdata.Fingerprint(t, wit3): true,
},
},
fixedSth: sth1,
- wantCurrSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ wantCurrSth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit2,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit3,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- wantNextSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{
- SignatureV1{
+ wantNextSth: types.NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []types.SignatureV1{
+ types.SignatureV1{
Namespace: *wit2,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit3,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
- SignatureV1{
+ types.SignatureV1{
Namespace: *wit1,
- Signature: testSignature,
+ Signature: testdata.Signature,
},
}),
- wantWit: []*namespace.Namespace{wit1, wit2, wit3},
+ wantWit: []*types.Namespace{wit1, wit2, wit3},
},
} {
table.source.rotate(table.fixedSth)
if got, want := table.source.currCosth, table.wantCurrSth; !reflect.DeepEqual(got, want) {
- t.Errorf("got currCosth %X but wanted %X in test %q", got, want, table.description)
+ t.Errorf("got currCosth\n%v\n\tbut wanted \n%v\n\tin test %q", got, want, table.description)
}
if got, want := table.source.nextCosth, table.wantNextSth; !reflect.DeepEqual(got, want) {
- t.Errorf("got nextCosth %X but wanted %X in test %q", got, want, table.description)
+ t.Errorf("got nextCosth\n%v\n\tbut wanted\n%v\n\tin test %q", got, want, table.description)
}
if got, want := len(table.source.cosignatureFrom), len(table.wantWit); got != want {
t.Errorf("witness map got %d cosignatures but wanted %d in test %q", got, want, table.description)
} else {
for _, wit := range table.wantWit {
- if _, ok := table.source.cosignatureFrom[wit.String()]; !ok {
- t.Errorf("missing signature from witness %X in test %q", wit.String(), table.description)
+ if _, ok := table.source.cosignatureFrom[testdata.Fingerprint(t, wit)]; !ok {
+ t.Errorf("missing signature from witness %X in test %q", testdata.Fingerprint(t, wit), table.description)
}
}
}
// check that adding cosignatures to stable will not effect cosigned sth
- wantLen := len(table.source.currCosth.CosignedTreeHeadV1.SignatureV1)
- table.source.nextCosth.CosignedTreeHeadV1.SignatureV1 = append(table.source.nextCosth.CosignedTreeHeadV1.SignatureV1, SignatureV1{Namespace: *wit1, Signature: testSignature})
- if gotLen := len(table.source.currCosth.CosignedTreeHeadV1.SignatureV1); gotLen != wantLen {
+ wantLen := len(table.source.currCosth.CosignedTreeHeadV1.Cosignatures)
+ table.source.nextCosth.CosignedTreeHeadV1.Cosignatures = append(table.source.nextCosth.CosignedTreeHeadV1.Cosignatures, types.SignatureV1{Namespace: *wit1, Signature: testdata.Signature})
+ if gotLen := len(table.source.currCosth.CosignedTreeHeadV1.Cosignatures); gotLen != wantLen {
t.Errorf("adding cosignatures to the stable sth modifies the fixated cosigned sth in test %q", table.description)
}
}
diff --git a/testdata/data.go b/testdata/data.go
new file mode 100644
index 0000000..ac958e5
--- /dev/null
+++ b/testdata/data.go
@@ -0,0 +1,287 @@
+package testdata
+
+import (
+ "bytes"
+ "testing"
+ "time"
+
+ "crypto/ed25519"
+
+ "github.com/google/trillian"
+ ttypes "github.com/google/trillian/types"
+ "github.com/system-transparency/stfe/types"
+ "google.golang.org/grpc/codes"
+ "google.golang.org/grpc/status"
+)
+
+var (
+ Ed25519VkLog = [32]byte{}
+ Ed25519VkLog2 = [32]byte{1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1}
+ Ed25519VkLog3 = [32]byte{2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2}
+ //Ed25519VkWitness = [32]byte{3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3}
+ // Ed25519VkWitness2 = [32]byte{4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4}
+ Ed25519VkWitness3 = [32]byte{5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5, 5}
+ //Ed25519VkSubmitter = [32]byte{6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6}
+
+ TreeId = int64(0)
+ Prefix = "test"
+ MaxRange = int64(3)
+ Interval = time.Second * 10
+ Deadline = time.Second * 5
+
+ Timestamp = uint64(0)
+ TreeSize = uint64(0)
+ Extension = make([]byte, 0)
+ NodeHash = make([]byte, 32)
+ Signature = make([]byte, 64)
+ Identifier = []byte("foobar-1.2.3")
+ Checksum = make([]byte, 32)
+ Index = int64(0)
+ HashPath = [][]byte{
+ NodeHash,
+ }
+ NodePath = []types.NodeHash{
+ types.NodeHash{NodeHash},
+ }
+ LeafHash = [32]byte{}
+
+ // TODO: make these unique and load more pretty maybe
+ Ed25519SkWitness = [64]byte{230, 122, 195, 152, 194, 195, 147, 153, 80, 120, 153, 79, 102, 27, 52, 187, 136, 218, 150, 234, 107, 9, 167, 4, 92, 21, 11, 113, 42, 29, 129, 69, 75, 60, 249, 150, 229, 93, 75, 32, 103, 126, 244, 37, 53, 182, 68, 82, 249, 109, 49, 94, 10, 19, 146, 244, 58, 191, 169, 107, 78, 37, 45, 210}
+ Ed25519VkWitness = [32]byte{75, 60, 249, 150, 229, 93, 75, 32, 103, 126, 244, 37, 53, 182, 68, 82, 249, 109, 49, 94, 10, 19, 146, 244, 58, 191, 169, 107, 78, 37, 45, 210}
+
+ Ed25519SkWitness2 = [64]byte{98, 65, 92, 117, 33, 167, 138, 36, 252, 147, 87, 173, 44, 62, 17, 66, 126, 70, 218, 87, 91, 148, 64, 194, 241, 248, 62, 90, 140, 122, 234, 76, 144, 6, 250, 185, 37, 217, 77, 201, 180, 42, 81, 37, 165, 27, 22, 32, 25, 8, 156, 228, 78, 207, 208, 18, 91, 77, 189, 51, 112, 31, 237, 6}
+ Ed25519VkWitness2 = [32]byte{144, 6, 250, 185, 37, 217, 77, 201, 180, 42, 81, 37, 165, 27, 22, 32, 25, 8, 156, 228, 78, 207, 208, 18, 91, 77, 189, 51, 112, 31, 237, 6}
+
+ Ed25519SkSubmitter = [64]byte{230, 122, 195, 152, 194, 195, 147, 153, 80, 120, 153, 79, 102, 27, 52, 187, 136, 218, 150, 234, 107, 9, 167, 4, 92, 21, 11, 113, 42, 29, 129, 69, 75, 60, 249, 150, 229, 93, 75, 32, 103, 126, 244, 37, 53, 182, 68, 82, 249, 109, 49, 94, 10, 19, 146, 244, 58, 191, 169, 107, 78, 37, 45, 210}
+ Ed25519VkSubmitter = [32]byte{75, 60, 249, 150, 229, 93, 75, 32, 103, 126, 244, 37, 53, 182, 68, 82, 249, 109, 49, 94, 10, 19, 146, 244, 58, 191, 169, 107, 78, 37, 45, 210}
+ Ed25519SkSubmitter2 = [64]byte{98, 65, 92, 117, 33, 167, 138, 36, 252, 147, 87, 173, 44, 62, 17, 66, 126, 70, 218, 87, 91, 148, 64, 194, 241, 248, 62, 90, 140, 122, 234, 76, 144, 6, 250, 185, 37, 217, 77, 201, 180, 42, 81, 37, 165, 27, 22, 32, 25, 8, 156, 228, 78, 207, 208, 18, 91, 77, 189, 51, 112, 31, 237, 6}
+ Ed25519VkSubmitter2 = [32]byte{144, 6, 250, 185, 37, 217, 77, 201, 180, 42, 81, 37, 165, 27, 22, 32, 25, 8, 156, 228, 78, 207, 208, 18, 91, 77, 189, 51, 112, 31, 237, 6}
+)
+
+// TODO: reorder and docdoc where need be
+//
+// Helpers that must create default values for different STFE types
+//
+
+func DefaultCosth(t *testing.T, logVk [32]byte, witVk [][32]byte) *types.StItem {
+ t.Helper()
+ cosigs := make([]types.SignatureV1, 0)
+ for _, vk := range witVk {
+ cosigs = append(cosigs, types.SignatureV1{*NewNamespace(t, vk), Signature})
+ }
+ return types.NewCosignedTreeHeadV1(DefaultSth(t, logVk).SignedTreeHeadV1, cosigs)
+}
+
+func DefaultSth(t *testing.T, vk [32]byte) *types.StItem {
+ t.Helper()
+ return types.NewSignedTreeHeadV1(DefaultTh(t), DefaultSig(t, vk))
+}
+
+func DefaultSignedChecksum(t *testing.T, vk [32]byte) *types.StItem {
+ t.Helper()
+ return types.NewSignedChecksumV1(DefaultChecksum(t), DefaultSig(t, vk))
+}
+
+func DefaultTh(t *testing.T) *types.TreeHeadV1 {
+ t.Helper()
+ return types.NewTreeHeadV1(Timestamp, TreeSize, NodeHash, Extension)
+}
+
+func DefaultSig(t *testing.T, vk [32]byte) *types.SignatureV1 {
+ t.Helper()
+ return &types.SignatureV1{*NewNamespace(t, vk), Signature}
+}
+
+func DefaultChecksum(t *testing.T) *types.ChecksumV1 {
+ t.Helper()
+ return &types.ChecksumV1{Identifier, Checksum}
+}
+
+func AddCosignatureBuffer(t *testing.T, sth *types.StItem, sk *[64]byte, vk *[32]byte) *bytes.Buffer {
+ t.Helper()
+ var cosigs []types.SignatureV1
+ if vk != nil {
+ cosigs = []types.SignatureV1{
+ types.SignatureV1{
+ Namespace: *NewNamespace(t, *vk),
+ Signature: ed25519.Sign(ed25519.PrivateKey((*sk)[:]), marshal(t, *sth.SignedTreeHeadV1)),
+ },
+ }
+ }
+ return bytes.NewBuffer(marshal(t, *types.NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, cosigs)))
+}
+
+func AddSignedChecksumBuffer(t *testing.T, sk [64]byte, vk [32]byte) *bytes.Buffer {
+ t.Helper()
+ data := DefaultChecksum(t)
+ return bytes.NewBuffer(marshal(t, *types.NewSignedChecksumV1(
+ data,
+ &types.SignatureV1{
+ Namespace: *NewNamespace(t, vk),
+ Signature: ed25519.Sign(ed25519.PrivateKey(sk[:]), marshal(t, *data)),
+ },
+ )))
+}
+
+func NewNamespacePool(t *testing.T, namespaces []*types.Namespace) *types.NamespacePool {
+ pool, err := types.NewNamespacePool(namespaces)
+ if err != nil {
+ t.Fatalf("must make namespace pool: %v", err)
+ }
+ return pool
+}
+
+func NewNamespace(t *testing.T, vk [32]byte) *types.Namespace {
+ namespace, err := types.NewNamespaceEd25519V1(vk[:])
+ if err != nil {
+ t.Fatalf("must make Ed25519V1 namespace: %v", err)
+ }
+ return namespace
+}
+
+//
+// Helpers that must create default values for different Trillian types
+//
+
+// DefaultTLr creates a default Trillian log root
+func DefaultTLr(t *testing.T) *ttypes.LogRootV1 {
+ t.Helper()
+ return Tlr(t, TreeSize, Timestamp, NodeHash)
+}
+
+// Tlr creates a Trillian log root
+func Tlr(t *testing.T, size, timestamp uint64, hash []byte) *ttypes.LogRootV1 {
+ t.Helper()
+ return &ttypes.LogRootV1{
+ TreeSize: size,
+ RootHash: hash,
+ TimestampNanos: timestamp,
+ Revision: 0, // not used by stfe
+ Metadata: nil, // not used by stfe
+ }
+}
+
+// DefaultTSlr creates a default Trillian signed log root
+func DefaultTSlr(t *testing.T) *trillian.GetLatestSignedLogRootResponse {
+ t.Helper()
+ return Tslr(t, DefaultTLr(t))
+}
+
+// Tslr creates a Trillian signed log root
+func Tslr(t *testing.T, lr *ttypes.LogRootV1) *trillian.GetLatestSignedLogRootResponse {
+ t.Helper()
+ b, err := lr.MarshalBinary()
+ if err != nil {
+ t.Fatalf("must marshal Trillian log root: %v", err)
+ }
+ return &trillian.GetLatestSignedLogRootResponse{
+ SignedLogRoot: &trillian.SignedLogRoot{
+ KeyHint: nil, // not used by stfe
+ LogRoot: b,
+ LogRootSignature: nil, // not used by stfe
+ },
+ Proof: nil, // not used by stfe
+ }
+}
+
+// DefaultTQlr creates a default Trillian queue leaf response
+func DefaultTQlr(t *testing.T, withDupCode bool) *trillian.QueueLeafResponse {
+ t.Helper()
+ s := status.New(codes.OK, "ok").Proto()
+ if withDupCode {
+ s = status.New(codes.AlreadyExists, "duplicate").Proto()
+ }
+ return &trillian.QueueLeafResponse{
+ QueuedLeaf: &trillian.QueuedLogLeaf{
+ Leaf: &trillian.LogLeaf{
+ MerkleLeafHash: nil, // not used by stfe
+ LeafValue: marshal(t, *DefaultSignedChecksum(t, Ed25519VkSubmitter)),
+ ExtraData: nil, // not used by stfe
+ LeafIndex: 0, // not applicable (log is not pre-ordered)
+ LeafIdentityHash: nil, // not used by stfe
+ },
+ Status: s,
+ },
+ }
+}
+
+// DefaultTglbrr creates a default Trillian get leaves by range response
+func DefaultTGlbrr(t *testing.T, start, end int64) *trillian.GetLeavesByRangeResponse {
+ t.Helper()
+ leaves := make([]*trillian.LogLeaf, 0, end-start+1)
+ for i, n := start, end+1; i < n; i++ {
+ leaves = append(leaves, &trillian.LogLeaf{
+ MerkleLeafHash: nil, // not usedb y stfe
+ LeafValue: marshal(t, *DefaultSignedChecksum(t, Ed25519VkSubmitter)),
+ ExtraData: nil, // not used by stfe
+ LeafIndex: i,
+ LeafIdentityHash: nil, // not used by stfe
+ })
+ }
+ return &trillian.GetLeavesByRangeResponse{
+ Leaves: leaves,
+ SignedLogRoot: Tslr(t, Tlr(t, uint64(end)+1, Timestamp, NodeHash)).SignedLogRoot,
+ }
+}
+
+func DefaultStItemList(t *testing.T, start, end uint64) *types.StItemList {
+ items := make([]types.StItem, 0, end-start+1)
+ for i, n := start, end+1; i < n; i++ {
+ items = append(items, *DefaultSignedChecksum(t, Ed25519VkSubmitter))
+ }
+ return &types.StItemList{items}
+}
+
+// DefaultTGipbhr creates a default Trillian get inclusion proof by hash response
+func DefaultTGipbhr(t *testing.T) *trillian.GetInclusionProofByHashResponse {
+ t.Helper()
+ return &trillian.GetInclusionProofByHashResponse{
+ Proof: []*trillian.Proof{
+ &trillian.Proof{
+ LeafIndex: Index,
+ Hashes: HashPath,
+ },
+ },
+ SignedLogRoot: nil, // not used by stfe
+ }
+}
+
+func DefaultInclusionProof(t *testing.T, size uint64) *types.StItem {
+ return types.NewInclusionProofV1(NewNamespace(t, Ed25519VkLog), size, uint64(Index), NodePath)
+}
+
+// DefaultTGcpr creates a default Trillian get consistency proof response
+func DefaultTGcpr(t *testing.T) *trillian.GetConsistencyProofResponse {
+ t.Helper()
+ return &trillian.GetConsistencyProofResponse{
+ Proof: &trillian.Proof{
+ LeafIndex: 0, // not applicable for consistency proofs
+ Hashes: HashPath,
+ },
+ SignedLogRoot: nil, // not used by stfe
+ }
+}
+
+func DefaultConsistencyProof(t *testing.T, first, second uint64) *types.StItem {
+ return types.NewConsistencyProofV1(NewNamespace(t, Ed25519VkLog), first, second, NodePath)
+}
+
+//
+// Other helpers
+//
+
+func Fingerprint(t *testing.T, namespace *types.Namespace) [types.NamespaceFingerprintSize]byte {
+ fpr, err := namespace.Fingerprint()
+ if err != nil {
+ t.Fatalf("must have namespace fingerprint: %v", err)
+ }
+ return *fpr
+}
+
+func marshal(t *testing.T, i interface{}) []byte {
+ b, err := types.Marshal(i)
+ if err != nil {
+ t.Fatalf("must marshal interface: %v", err)
+ }
+ return b
+}
diff --git a/trillian.go b/trillian.go
index 162ec77..2adf567 100644
--- a/trillian.go
+++ b/trillian.go
@@ -3,11 +3,10 @@ package stfe
import (
"fmt"
- "net/http"
-
"github.com/golang/glog"
"github.com/google/trillian"
"github.com/google/trillian/types"
+ stfetypes "github.com/system-transparency/stfe/types"
"google.golang.org/grpc/codes"
)
@@ -27,42 +26,42 @@ func checkQueueLeaf(rsp *trillian.QueueLeafResponse, err error) error {
return nil
}
-func checkGetLeavesByRange(req *GetEntriesRequest, rsp *trillian.GetLeavesByRangeResponse, err error) (int, error) {
+func checkGetLeavesByRange(req *stfetypes.GetEntriesV1, rsp *trillian.GetLeavesByRangeResponse, err error) error {
if err != nil {
- return http.StatusInternalServerError, fmt.Errorf("Trillian Error: %v", err)
+ return fmt.Errorf("Trillian Error: %v", err)
}
if rsp == nil {
- return http.StatusInternalServerError, fmt.Errorf("Trillian error: empty response")
+ return fmt.Errorf("Trillian error: empty response")
}
if rsp.SignedLogRoot == nil {
- return http.StatusInternalServerError, fmt.Errorf("Trillian error: no signed log root")
+ return fmt.Errorf("Trillian error: no signed log root")
}
if rsp.SignedLogRoot.LogRoot == nil {
- return http.StatusInternalServerError, fmt.Errorf("Trillian error: no log root")
+ return fmt.Errorf("Trillian error: no log root")
}
if len(rsp.Leaves) == 0 {
- return http.StatusInternalServerError, fmt.Errorf("Trillian error: no leaves")
+ return fmt.Errorf("Trillian error: no leaves")
}
if len(rsp.Leaves) > int(req.End-req.Start+1) {
- return http.StatusInternalServerError, fmt.Errorf("too many leaves: %d for [%d,%d]", len(rsp.Leaves), req.Start, req.End)
+ return fmt.Errorf("too many leaves: %d for [%d,%d]", len(rsp.Leaves), req.Start, req.End)
}
// Ensure that a bad start parameter results in an error
var lr types.LogRootV1
if err := lr.UnmarshalBinary(rsp.SignedLogRoot.LogRoot); err != nil {
- return http.StatusInternalServerError, fmt.Errorf("cannot unmarshal log root: %v", err)
+ return fmt.Errorf("cannot unmarshal log root: %v", err)
}
if uint64(req.Start) >= lr.TreeSize {
- return http.StatusNotFound, fmt.Errorf("invalid start(%d): tree size is %d", req.Start, lr.TreeSize)
+ return fmt.Errorf("invalid start(%d): tree size is %d", req.Start, lr.TreeSize)
}
// Ensure that we got and return expected leaf indices
for i, leaf := range rsp.Leaves {
- if leaf.LeafIndex != req.Start+int64(i) {
- return http.StatusInternalServerError, fmt.Errorf("invalid leaf index: wanted %d, got %d", req.Start+int64(i), leaf.LeafIndex)
+ if got, want := leaf.LeafIndex, int64(req.Start+uint64(i)); got != want {
+ return fmt.Errorf("invalid leaf index(%d): wanted %d", got, want)
}
}
- return http.StatusOK, nil
+ return nil
}
func checkGetInclusionProofByHash(lp *LogParameters, rsp *trillian.GetInclusionProofByHashResponse, err error) error {
diff --git a/trillian_test.go b/trillian_test.go
index b3c1653..1b0c923 100644
--- a/trillian_test.go
+++ b/trillian_test.go
@@ -5,11 +5,9 @@ import (
"testing"
"github.com/google/trillian"
- "github.com/google/trillian/types"
- "google.golang.org/grpc/codes"
- "google.golang.org/grpc/status"
-
- "github.com/system-transparency/stfe/namespace/testdata"
+ ttypes "github.com/google/trillian/types"
+ "github.com/system-transparency/stfe/testdata"
+ "github.com/system-transparency/stfe/types"
)
func TestCheckQueueLeaf(t *testing.T) {
@@ -20,30 +18,31 @@ func TestCheckQueueLeaf(t *testing.T) {
wantErr bool
}{
{
- description: "bad response: trillian error",
+ description: "invalid: no Trillian response: error",
err: fmt.Errorf("backend error"),
wantErr: true,
},
{
- description: "bad response: empty",
+ description: "invalid: no Trillian response: nil",
wantErr: true,
},
{
- description: "bad response: no queued leaf",
+ description: "invalid: no Trillian response: empty",
rsp: &trillian.QueueLeafResponse{},
wantErr: true,
},
{
- description: "ok response: duplicate leaf",
- rsp: makeTrillianQueueLeafResponse(t, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk, true),
+ description: "valid: gRPC status: duplicate",
+ rsp: testdata.DefaultTQlr(t, true),
},
{
- description: "ok response: new leaf",
- rsp: makeTrillianQueueLeafResponse(t, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk, false),
+ description: "valid: gRPC status: ok",
+ rsp: testdata.DefaultTQlr(t, false),
},
} {
- if err := checkQueueLeaf(table.rsp, table.err); (err != nil) != table.wantErr {
- t.Errorf("got error %v, but wanted error %v in test %q", err, table.wantErr, table.description)
+ err := checkQueueLeaf(table.rsp, table.err)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q", got, want, table.description)
}
}
}
@@ -51,101 +50,90 @@ func TestCheckQueueLeaf(t *testing.T) {
func TestCheckGetLeavesByRange(t *testing.T) {
for _, table := range []struct {
description string
- req *GetEntriesRequest
+ req *types.GetEntriesV1
rsp *trillian.GetLeavesByRangeResponse
err error
wantErr bool
}{
{
- description: "bad response: trillian error",
- req: &GetEntriesRequest{Start: 0, End: 1},
+ description: "invalid: no Trillian response: error",
+ req: &types.GetEntriesV1{Start: 0, End: 1},
err: fmt.Errorf("backend error"),
wantErr: true,
},
{
- description: "bad response: empty",
- req: &GetEntriesRequest{Start: 0, End: 1},
+ description: "invalid: no Trillian response: nil",
+ req: &types.GetEntriesV1{Start: 0, End: 1},
wantErr: true,
},
{
- description: "bad response: no leaves",
- req: &GetEntriesRequest{Start: 0, End: 1},
+ description: "invalid: bad Trillian response: no leaves",
+ req: &types.GetEntriesV1{Start: 0, End: 1},
rsp: func(rsp *trillian.GetLeavesByRangeResponse) *trillian.GetLeavesByRangeResponse {
rsp.Leaves = nil
return rsp
- }(makeTrillianGetLeavesByRangeResponse(t, 0, 1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk)),
+ }(testdata.DefaultTGlbrr(t, 0, 1)),
wantErr: true,
},
{
- description: "bad response: no signed log root",
- req: &GetEntriesRequest{Start: 0, End: 1},
+ description: "invalid: bad Trillian response: no signed log root",
+ req: &types.GetEntriesV1{Start: 0, End: 1},
rsp: func(rsp *trillian.GetLeavesByRangeResponse) *trillian.GetLeavesByRangeResponse {
rsp.SignedLogRoot = nil
return rsp
- }(makeTrillianGetLeavesByRangeResponse(t, 0, 1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk)),
+ }(testdata.DefaultTGlbrr(t, 0, 1)),
wantErr: true,
},
{
- description: "bad response: no log root",
- req: &GetEntriesRequest{Start: 0, End: 1},
+ description: "invalid: bad Trillian response: no log root",
+ req: &types.GetEntriesV1{Start: 0, End: 1},
rsp: func(rsp *trillian.GetLeavesByRangeResponse) *trillian.GetLeavesByRangeResponse {
rsp.SignedLogRoot.LogRoot = nil
return rsp
- }(makeTrillianGetLeavesByRangeResponse(t, 0, 1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk)),
+ }(testdata.DefaultTGlbrr(t, 0, 1)),
wantErr: true,
},
{
- description: "bad response: truncated root",
- req: &GetEntriesRequest{Start: 0, End: 1},
+ description: "invalid: bad Trillian response: truncated log root",
+ req: &types.GetEntriesV1{Start: 0, End: 1},
rsp: func(rsp *trillian.GetLeavesByRangeResponse) *trillian.GetLeavesByRangeResponse {
rsp.SignedLogRoot.LogRoot = rsp.SignedLogRoot.LogRoot[1:]
return rsp
- }(makeTrillianGetLeavesByRangeResponse(t, 0, 1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk)),
+ }(testdata.DefaultTGlbrr(t, 0, 1)),
wantErr: true,
},
{
- description: "bad response: too many leaves",
- req: &GetEntriesRequest{Start: 0, End: 1},
- rsp: makeTrillianGetLeavesByRangeResponse(t, 0, 2, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk),
+ description: "invalid: bad Trillian response: too many leaves",
+ req: &types.GetEntriesV1{Start: 0, End: 1},
+ rsp: testdata.DefaultTGlbrr(t, 0, 2),
wantErr: true,
},
{
- description: "bad response: start is not a valid index",
- req: &GetEntriesRequest{Start: int64(testTreeSize), End: int64(testTreeSize)},
- rsp: func(rsp *trillian.GetLeavesByRangeResponse) *trillian.GetLeavesByRangeResponse {
- rsp.SignedLogRoot = makeLatestSignedLogRootResponse(t, 0, testTreeSize, testNodeHash).SignedLogRoot
- return rsp
- }(makeTrillianGetLeavesByRangeResponse(t, int64(testTreeSize)-1, int64(testTreeSize)-1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk)),
- wantErr: true,
- },
- {
- description: "bad response: invalid leaf indices",
- req: &GetEntriesRequest{Start: 10, End: 11},
- rsp: makeTrillianGetLeavesByRangeResponse(t, 11, 12, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk),
+ description: "invalid: bad Trillian response: start is not a valid index",
+ req: &types.GetEntriesV1{Start: 10, End: 10},
+ rsp: testdata.DefaultTGlbrr(t, 9, 9),
wantErr: true,
},
{
- description: "ok response: interval refers to the latest leaf",
- req: &GetEntriesRequest{Start: int64(testTreeSize) - 1, End: int64(testTreeSize) - 1},
- rsp: func(rsp *trillian.GetLeavesByRangeResponse) *trillian.GetLeavesByRangeResponse {
- rsp.SignedLogRoot = makeLatestSignedLogRootResponse(t, 0, testTreeSize, testNodeHash).SignedLogRoot
- return rsp
- }(makeTrillianGetLeavesByRangeResponse(t, int64(testTreeSize)-1, int64(testTreeSize)-1, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk)),
+ description: "invalid: bad Trillian response: invalid leaf indices",
+ req: &types.GetEntriesV1{Start: 10, End: 11},
+ rsp: testdata.DefaultTGlbrr(t, 11, 12),
+ wantErr: true,
},
{
- description: "ok response: a bunch of leaves",
- req: &GetEntriesRequest{Start: 10, End: 20},
- rsp: makeTrillianGetLeavesByRangeResponse(t, 10, 20, testPackage, testdata.Ed25519Vk, testdata.Ed25519Sk),
+ description: "valid",
+ req: &types.GetEntriesV1{Start: 10, End: 20},
+ rsp: testdata.DefaultTGlbrr(t, 10, 20),
},
} {
- if _, err := checkGetLeavesByRange(table.req, table.rsp, table.err); (err != nil) != table.wantErr {
- t.Errorf("got error %v, but wanted error %v in test %q", err, table.wantErr, table.description)
+ err := checkGetLeavesByRange(table.req, table.rsp, table.err)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q", got, want, table.description)
}
}
}
func TestCheckGetInclusionProofByHash(t *testing.T) {
- lp := makeTestLogParameters(t, nil)
for _, table := range []struct {
description string
rsp *trillian.GetInclusionProofByHashResponse
@@ -153,16 +141,16 @@ func TestCheckGetInclusionProofByHash(t *testing.T) {
wantErr bool
}{
{
- description: "bad response: trillian error",
+ description: "invalid: no Trillian response: error",
err: fmt.Errorf("backend failure"),
wantErr: true,
},
{
- description: "bad response: empty",
+ description: "invalid: no Trillian response: nil",
wantErr: true,
},
{
- description: "bad response: no proofs",
+ description: "invalid: bad Trillian response: no proofs",
rsp: &trillian.GetInclusionProofByHashResponse{},
wantErr: true,
},
@@ -171,27 +159,30 @@ func TestCheckGetInclusionProofByHash(t *testing.T) {
rsp: func(rsp *trillian.GetInclusionProofByHashResponse) *trillian.GetInclusionProofByHashResponse {
rsp.Proof[0] = nil
return rsp
- }(makeTrillianGetInclusionProofByHashResponse(t, int64(testIndex), testProof)),
+ }(testdata.DefaultTGipbhr(t)),
wantErr: true,
},
{
description: "bad response: proof with invalid node hash",
- rsp: makeTrillianGetInclusionProofByHashResponse(t, int64(testIndex), [][]byte{make([]byte, testHashLen-1)}),
- wantErr: true,
+ rsp: func(rsp *trillian.GetInclusionProofByHashResponse) *trillian.GetInclusionProofByHashResponse {
+ rsp.Proof[0].Hashes = append(rsp.Proof[0].Hashes, make([]byte, 0))
+ return rsp
+ }(testdata.DefaultTGipbhr(t)),
+ wantErr: true,
},
{
- description: "ok response",
- rsp: makeTrillianGetInclusionProofByHashResponse(t, int64(testIndex), testProof),
+ description: "valid",
+ rsp: testdata.DefaultTGipbhr(t),
},
} {
- if err := checkGetInclusionProofByHash(lp, table.rsp, table.err); (err != nil) != table.wantErr {
- t.Errorf("got error %v, but wanted error %v in test %q", err, table.wantErr, table.description)
+ err := checkGetInclusionProofByHash(newLogParameters(t, nil), table.rsp, table.err)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q", got, want, table.description)
}
}
}
func TestCheckGetConsistencyProof(t *testing.T) {
- lp := makeTestLogParameters(t, nil)
for _, table := range []struct {
description string
rsp *trillian.GetConsistencyProofResponse
@@ -199,37 +190,40 @@ func TestCheckGetConsistencyProof(t *testing.T) {
wantErr bool
}{
{
- description: "bad response: trillian error",
+ description: "invalid: no Trillian response: error",
err: fmt.Errorf("backend failure"),
wantErr: true,
},
{
- description: "bad response: empty",
+ description: "invalid: no Trillian response: nil",
wantErr: true,
},
{
- description: "bad response: no proof",
+ description: "invalid: bad Trillian response: no proof",
rsp: &trillian.GetConsistencyProofResponse{},
wantErr: true,
},
{
- description: "bad response: proof with invalid node hash",
- rsp: makeTrillianGetConsistencyProofResponse(t, [][]byte{make([]byte, testHashLen-1)}),
- wantErr: true,
+ description: "invalid: bad Trillian response: proof with invalid node hash",
+ rsp: func(rsp *trillian.GetConsistencyProofResponse) *trillian.GetConsistencyProofResponse {
+ rsp.Proof.Hashes = append(rsp.Proof.Hashes, make([]byte, 0))
+ return rsp
+ }(testdata.DefaultTGcpr(t)),
+ wantErr: true,
},
{
- description: "ok response",
- rsp: makeTrillianGetConsistencyProofResponse(t, testProof),
+ description: "valid",
+ rsp: testdata.DefaultTGcpr(t),
},
} {
- if err := checkGetConsistencyProof(lp, table.rsp, table.err); (err != nil) != table.wantErr {
- t.Errorf("got error %v, but wanted error %v in test %q", err, table.wantErr, table.description)
+ err := checkGetConsistencyProof(newLogParameters(t, nil), table.rsp, table.err)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q", got, want, table.description)
}
}
}
func TestCheckGetLatestSignedLogRoot(t *testing.T) {
- lp := makeTestLogParameters(t, nil)
for _, table := range []struct {
description string
rsp *trillian.GetLatestSignedLogRootResponse
@@ -237,160 +231,52 @@ func TestCheckGetLatestSignedLogRoot(t *testing.T) {
wantErr bool
}{
{
- description: "bad trillian response: error",
+ description: "invalid: no Trillian response: error",
err: fmt.Errorf("backend failure"),
wantErr: true,
},
{
- description: "bad trillian response: empty",
+ description: "invalid: no Trillian response: nil",
wantErr: true,
},
{
- description: "bad trillian response: no signed log root",
- rsp: &trillian.GetLatestSignedLogRootResponse{SignedLogRoot: nil},
- wantErr: true,
+ description: "invalid: bad Trillian response: no signed log root",
+ rsp: func(rsp *trillian.GetLatestSignedLogRootResponse) *trillian.GetLatestSignedLogRootResponse {
+ rsp.SignedLogRoot = nil
+ return rsp
+ }(testdata.DefaultTSlr(t)),
+ wantErr: true,
},
{
- description: "bad trillian response: no log root",
+ description: "invalid: bad Trillian response: no log root",
rsp: func(rsp *trillian.GetLatestSignedLogRootResponse) *trillian.GetLatestSignedLogRootResponse {
rsp.SignedLogRoot.LogRoot = nil
return rsp
- }(makeLatestSignedLogRootResponse(t, 0, 0, testNodeHash)),
+ }(testdata.DefaultTSlr(t)),
wantErr: true,
},
{
- description: "bad trillian response: truncated log root",
+ description: "invalid: bad Trillian response: truncated log root",
rsp: func(rsp *trillian.GetLatestSignedLogRootResponse) *trillian.GetLatestSignedLogRootResponse {
rsp.SignedLogRoot.LogRoot = rsp.SignedLogRoot.LogRoot[1:]
return rsp
- }(makeLatestSignedLogRootResponse(t, 0, 0, testNodeHash)),
+ }(testdata.DefaultTSlr(t)),
wantErr: true,
},
{
- description: "bad trillian response: invalid root hash size",
- rsp: makeLatestSignedLogRootResponse(t, 0, 0, make([]byte, testHashLen-1)),
+ description: "invalid: bad Trillian response: truncated root hash",
+ rsp: testdata.Tslr(t, testdata.Tlr(t, testdata.TreeSize, testdata.Timestamp, make([]byte, 31))),
wantErr: true,
},
{
- description: "ok response",
- rsp: makeLatestSignedLogRootResponse(t, 0, 0, testNodeHash),
+ description: "valid",
+ rsp: testdata.DefaultTSlr(t),
},
} {
- var lr types.LogRootV1
- if err := checkGetLatestSignedLogRoot(lp, table.rsp, table.err, &lr); (err != nil) != table.wantErr {
- t.Errorf("got error %v, but wanted error %v in test %q", err, table.wantErr, table.description)
+ var lr ttypes.LogRootV1
+ err := checkGetLatestSignedLogRoot(newLogParameters(t, nil), table.rsp, table.err, &lr)
+ if got, want := err != nil, table.wantErr; got != want {
+ t.Errorf("got error %v but wanted %v in test %q", got, want, table.description)
}
}
}
-
-// makeTrillianQueueLeafResponse creates a valid trillian QueueLeafResponse
-// for a package `name` where the checksum is all zeros (32 bytes). Namespace
-// is based on vk and sk (ed25519).
-//
-// Note: MerkleLeafHash and LeafIdentityHash are unset (not used by stfe).
-func makeTrillianQueueLeafResponse(t *testing.T, name, vk, sk []byte, dupCode bool) *trillian.QueueLeafResponse {
- t.Helper()
- leaf, signature := mustMakeEd25519ChecksumV1(t, name, make([]byte, 32), vk, sk)
- s := status.New(codes.OK, "ok").Proto()
- if dupCode {
- s = status.New(codes.AlreadyExists, "duplicate").Proto()
- }
- return &trillian.QueueLeafResponse{
- QueuedLeaf: &trillian.QueuedLogLeaf{
- Leaf: &trillian.LogLeaf{
- MerkleLeafHash: nil, // not used by stfe
- LeafValue: leaf,
- ExtraData: signature,
- LeafIndex: 0, // not applicable (log is not pre-ordered)
- LeafIdentityHash: nil, // not used by stfe
- },
- Status: s,
- },
- }
-}
-
-// makeTrillianGetInclusionProofByHashResponse populates a get-proof-by-hash
-// response.
-//
-// Note: SignedLogRoot is unset (not used by stfe).
-func makeTrillianGetInclusionProofByHashResponse(t *testing.T, index int64, path [][]byte) *trillian.GetInclusionProofByHashResponse {
- t.Helper()
- return &trillian.GetInclusionProofByHashResponse{
- Proof: []*trillian.Proof{
- &trillian.Proof{
- LeafIndex: index,
- Hashes: path,
- },
- },
- SignedLogRoot: nil,
- }
-}
-
-// makeTrillianGetConsistencyProofResponse populates a get-consistency response.
-//
-// Note: LeafIndex is not applicable for a consistency proof (0), and
-// SignedLogRoot is unset (not used by stfe).
-func makeTrillianGetConsistencyProofResponse(t *testing.T, path [][]byte) *trillian.GetConsistencyProofResponse {
- t.Helper()
- return &trillian.GetConsistencyProofResponse{
- Proof: &trillian.Proof{
- LeafIndex: 0,
- Hashes: path,
- },
- SignedLogRoot: nil,
- }
-}
-
-// makeTrillianGetLeavesByRangeResponse creates a range of leaves [start,end]
-// such that the package is `name`_<index> and the checksum is all zeros (32
-// bytes). An Ed25519 namespace is used based on vk and sk.
-//
-// Note: MerkleLeafHash and LeafIdentityHash are unset (not used by stfe).
-func makeTrillianGetLeavesByRangeResponse(t *testing.T, start, end int64, name, vk, sk []byte) *trillian.GetLeavesByRangeResponse {
- t.Helper()
- leaves := make([]*trillian.LogLeaf, 0, end-start+1)
- for i, n := start, end+1; i < n; i++ {
- leaf, signature := mustMakeEd25519ChecksumV1(t, append(name, []byte(fmt.Sprintf("_%d", i))...), make([]byte, 32), vk, sk)
- leaves = append(leaves, &trillian.LogLeaf{
- MerkleLeafHash: nil,
- LeafValue: leaf,
- ExtraData: signature,
- LeafIndex: i,
- LeafIdentityHash: nil,
- })
- }
- return &trillian.GetLeavesByRangeResponse{
- Leaves: leaves,
- SignedLogRoot: makeLatestSignedLogRootResponse(t, 0, uint64(end)+1, make([]byte, 32)).SignedLogRoot,
- }
-}
-
-// makeTrillianLogRoot: docdoc
-func makeTrillianLogRoot(t *testing.T, timestamp, size uint64, hash []byte) *types.LogRootV1 {
- t.Helper()
- return &types.LogRootV1{
- TreeSize: size,
- RootHash: hash,
- TimestampNanos: timestamp,
- Revision: 0, // not used by stfe
- Metadata: nil, // not used by stfe
- }
-}
-
-// makeLatestSignedLogRootResponse creates a new trillian STH. Revision,
-// Metadata, Proof, KeyHint, and LogRootSignature are unsset.
-func makeLatestSignedLogRootResponse(t *testing.T, timestamp, size uint64, hash []byte) *trillian.GetLatestSignedLogRootResponse {
- t.Helper()
- rootBytes, err := makeTrillianLogRoot(t, timestamp, size, hash).MarshalBinary()
- if err != nil {
- t.Fatalf("failed to marshal root in test: %v", err)
- }
- return &trillian.GetLatestSignedLogRootResponse{
- SignedLogRoot: &trillian.SignedLogRoot{
- KeyHint: nil, // not used by stfe
- LogRoot: rootBytes,
- LogRootSignature: nil, // not used by stfe
- },
- Proof: nil, // not used by stfe
- }
-}
diff --git a/type.go b/type.go
deleted file mode 100644
index db9ddc6..0000000
--- a/type.go
+++ /dev/null
@@ -1,306 +0,0 @@
-package stfe
-
-import (
- "fmt"
- "time"
-
- "encoding/base64"
-
- "github.com/google/certificate-transparency-go/tls"
- "github.com/google/trillian/types"
- "github.com/system-transparency/stfe/namespace"
-)
-
-// StFormat defines a particular StItem type that is versioned
-type StFormat tls.Enum
-
-const (
- StFormatReserved StFormat = 0
- StFormatSignedTreeHeadV1 StFormat = 1
- StFormatSignedDebugInfoV1 StFormat = 2
- StFormatConsistencyProofV1 StFormat = 3
- StFormatInclusionProofV1 StFormat = 4
- StFormatChecksumV1 = 5
- StFormatCosignedTreeHeadV1 = 6
-)
-
-// StItem references a versioned item based on a given format specifier
-type StItem struct {
- Format StFormat `tls:"maxval:65535"`
- SignedTreeHeadV1 *SignedTreeHeadV1 `tls:"selector:Format,val:1"`
- SignedDebugInfoV1 *SignedDebugInfoV1 `tls:"selector:Format,val:2"`
- ConsistencyProofV1 *ConsistencyProofV1 `tls:"selector:Format,val:3"`
- InclusionProofV1 *InclusionProofV1 `tls:"selector:Format,val:4"`
- ChecksumV1 *ChecksumV1 `tls:"selector:Format,val:5"`
- CosignedTreeHeadV1 *CosignedTreeHeadV1 `tls:"selector:Format,val:6"`
-}
-
-// SignedTreeHeadV1 is a signed tree head as defined by RFC 6962/bis, §4.10
-type SignedTreeHeadV1 struct {
- LogId []byte `tls:"minlen:35,maxlen:35"`
- TreeHead TreeHeadV1
- Signature []byte `tls:"minlen:1,maxlen:65535"`
-}
-
-// SignedDebugInfoV1 is a signed statement that we intend (but do not promise)
-// to insert an entry into the log as defined by markdown/api.md
-type SignedDebugInfoV1 struct {
- LogId []byte `tls:"minlen:35,maxlen:35"`
- Message []byte `tls:"minlen:0,maxlen:65535"`
- Signature []byte `tls:"minlen:1,maxlen:65535"`
-}
-
-// ConsistencyProofV1 is a consistency proof as defined by RFC 6962/bis, §4.11
-type ConsistencyProofV1 struct {
- LogId []byte `tls:"minlen:35,maxlen:35"`
- TreeSize1 uint64
- TreeSize2 uint64
- ConsistencyPath []NodeHash `tls:"minlen:0,maxlen:65535"`
-}
-
-// InclusionProofV1 is an inclusion proof as defined by RFC 6962/bis, §4.12
-type InclusionProofV1 struct {
- LogId []byte `tls:"minlen:35,maxlen:35"`
- TreeSize uint64
- LeafIndex uint64
- InclusionPath []NodeHash `tls:"minlen:0,maxlen:65535"`
-}
-
-// ChecksumV1 associates a leaf type as defined by markdown/api.md
-type ChecksumV1 struct {
- Package []byte `tls:"minlen:1,maxlen:255"`
- Checksum []byte `tls:"minlen:1,maxlen:64"`
- Namespace namespace.Namespace
-}
-
-// TreeHeadV1 is a tree head as defined by RFC 6962/bis, §4.10
-type TreeHeadV1 struct {
- Timestamp uint64
- TreeSize uint64
- RootHash NodeHash
- Extension []byte `tls:"minlen:0,maxlen:65535"`
-}
-
-// CosignedTreeheadV1 is a cosigned STH
-type CosignedTreeHeadV1 struct {
- SignedTreeHeadV1 SignedTreeHeadV1
- SignatureV1 []SignatureV1 `tls:"minlen:0,maxlen:4294967295"`
-}
-
-// SignatureV1 is a detached signature that was produced by a namespace
-type SignatureV1 struct {
- Namespace namespace.Namespace
- Signature []byte `tls:"minlen:1,maxlen:65535"`
-}
-
-// NodeHash is a Merkle tree hash as defined by RFC 6962/bis, §4.9
-type NodeHash struct {
- Data []byte `tls:"minlen:32,maxlen:255"`
-}
-
-// RawCertificate is a serialized X.509 certificate
-type RawCertificate struct {
- Data []byte `tls:"minlen:0,maxlen:65535"`
-}
-
-func (f StFormat) String() string {
- switch f {
- case StFormatReserved:
- return "reserved"
- case StFormatSignedTreeHeadV1:
- return "signed_tree_head_v1"
- case StFormatSignedDebugInfoV1:
- return "signed_debug_info_v1"
- case StFormatConsistencyProofV1:
- return "consistency_proof_v1"
- case StFormatInclusionProofV1:
- return "inclusion_proof_v1"
- case StFormatChecksumV1:
- return "checksum_v1"
- case StFormatCosignedTreeHeadV1:
- return "cosigned_tree_head_v1"
- default:
- return fmt.Sprintf("Unknown StFormat: %d", f)
- }
-}
-
-func (i StItem) String() string {
- switch i.Format {
- case StFormatChecksumV1:
- return fmt.Sprintf("Format(%s): %s", i.Format, i.ChecksumV1)
- case StFormatConsistencyProofV1:
- return fmt.Sprintf("Format(%s): %s", i.Format, i.ConsistencyProofV1)
- case StFormatInclusionProofV1:
- return fmt.Sprintf("Format(%s): %s", i.Format, i.InclusionProofV1)
- case StFormatSignedDebugInfoV1:
- return fmt.Sprintf("Format(%s): %s", i.Format, i.SignedDebugInfoV1)
- case StFormatSignedTreeHeadV1:
- return fmt.Sprintf("Format(%s): %s", i.Format, i.SignedTreeHeadV1)
- case StFormatCosignedTreeHeadV1:
- return fmt.Sprintf("Format(%s): %s", i.Format, i.CosignedTreeHeadV1)
- default:
- return fmt.Sprintf("unknown StItem: %s", i.Format)
- }
-}
-
-func (i SignedTreeHeadV1) String() string {
- return fmt.Sprintf("LogId(%s) TreeHead(%s) Signature(%s)", b64(i.LogId), i.TreeHead, b64(i.Signature))
-}
-
-func (i SignedDebugInfoV1) String() string {
- return fmt.Sprintf("LogId(%s) Message(%s) Signature(%s)", b64(i.LogId), string(i.Message), b64(i.Signature))
-}
-
-func (i ConsistencyProofV1) String() string {
- return fmt.Sprintf("LogID(%s) TreeSize1(%d) TreeSize2(%d) ConsistencyPath(%v)", b64(i.LogId), i.TreeSize1, i.TreeSize2, B64EncodePath(i.ConsistencyPath))
-}
-
-func (i InclusionProofV1) String() string {
- return fmt.Sprintf("LogID(%s) TreeSize(%d) LeafIndex(%d) AuditPath(%v)", b64(i.LogId), i.TreeSize, i.LeafIndex, B64EncodePath(i.InclusionPath))
-}
-
-func (i ChecksumV1) String() string {
- return fmt.Sprintf("Package(%s) Checksum(%s) Namespace(%s)", string(i.Package), string(i.Checksum), i.Namespace.String())
-}
-
-func (th TreeHeadV1) String() string {
- return fmt.Sprintf("Timestamp(%s) TreeSize(%d) RootHash(%s)", time.Unix(int64(th.Timestamp/1000), 0), th.TreeSize, b64(th.RootHash.Data))
-}
-
-func (i CosignedTreeHeadV1) String() string {
- return fmt.Sprintf("SignedTreeHead(%s) #Cosignatures(%d)", i.SignedTreeHeadV1.String(), len(i.SignatureV1))
-}
-
-// Marshal serializes an Stitem as defined by RFC 5246
-func (i *StItem) Marshal() ([]byte, error) {
- serialized, err := tls.Marshal(*i)
- if err != nil {
- return nil, fmt.Errorf("marshal failed for StItem(%s): %v", i.Format, err)
- }
- return serialized, nil
-}
-
-// MarshalB64 base64-encodes a serialized StItem
-func (i *StItem) MarshalB64() (string, error) {
- serialized, err := i.Marshal()
- if err != nil {
- return "", err
- }
- return b64(serialized), nil
-}
-
-// Unmarshal unpacks a serialized StItem
-func (i *StItem) Unmarshal(serialized []byte) error {
- extra, err := tls.Unmarshal(serialized, i)
- if err != nil {
- return fmt.Errorf("unmarshal failed for StItem(%s): %v", i.Format, err)
- } else if len(extra) > 0 {
- return fmt.Errorf("unmarshal found extra data for StItem(%s): %v", i.Format, extra)
- }
- return nil
-}
-
-// UnmarshalB64 unpacks a base64-encoded serialized StItem
-func (i *StItem) UnmarshalB64(s string) error {
- serialized, err := deb64(s)
- if err != nil {
- return fmt.Errorf("base64 decoding failed for StItem(%s): %v", i.Format, err)
- }
- return i.Unmarshal(serialized)
-}
-
-// Marshal serializes a TreeHeadV1 as defined by RFC 5246
-func (th *TreeHeadV1) Marshal() ([]byte, error) {
- serialized, err := tls.Marshal(*th)
- if err != nil {
- return nil, fmt.Errorf("marshal failed for TreeHeadV1: %v", err)
- }
- return serialized, nil
-}
-
-// B64EncodePath encodes a path of node hashes as a list of base64 strings
-func B64EncodePath(path []NodeHash) []string {
- p := make([]string, 0, len(path))
- for _, hash := range path {
- p = append(p, b64(hash.Data))
- }
- return p
-}
-
-// NewSignedTreeHead creates a new StItem of type signed_tree_head_v1
-func NewSignedTreeHeadV1(th *TreeHeadV1, logId, signature []byte) *StItem {
- return &StItem{
- Format: StFormatSignedTreeHeadV1,
- SignedTreeHeadV1: &SignedTreeHeadV1{logId, *th, signature},
- }
-}
-
-// NewSignedDebugInfoV1 creates a new StItem of type inclusion_proof_v1
-func NewSignedDebugInfoV1(logId, message, signature []byte) *StItem {
- return &StItem{
- Format: StFormatSignedDebugInfoV1,
- SignedDebugInfoV1: &SignedDebugInfoV1{logId, message, signature},
- }
-}
-
-// NewInclusionProofV1 creates a new StItem of type inclusion_proof_v1
-func NewInclusionProofV1(logID []byte, treeSize, index uint64, proof [][]byte) *StItem {
- path := make([]NodeHash, 0, len(proof))
- for _, hash := range proof {
- path = append(path, NodeHash{Data: hash})
- }
- return &StItem{
- Format: StFormatInclusionProofV1,
- InclusionProofV1: &InclusionProofV1{logID, treeSize, index, path},
- }
-}
-
-// NewConsistencyProofV1 creates a new StItem of type consistency_proof_v1
-func NewConsistencyProofV1(logId []byte, first, second uint64, proof [][]byte) *StItem {
- path := make([]NodeHash, 0, len(proof))
- for _, hash := range proof {
- path = append(path, NodeHash{Data: hash})
- }
- return &StItem{
- Format: StFormatConsistencyProofV1,
- ConsistencyProofV1: &ConsistencyProofV1{logId, uint64(first), uint64(second), path},
- }
-}
-
-// NewChecksumV1 creates a new StItem of type checksum_v1
-func NewChecksumV1(identifier, checksum []byte, namespace *namespace.Namespace) *StItem {
- return &StItem{
- Format: StFormatChecksumV1,
- ChecksumV1: &ChecksumV1{identifier, checksum, *namespace},
- }
-}
-
-// NewTreeHead creates a new TreeHeadV1 from a Trillian-signed log root without
-// verifying any signature. In other words, Trillian <-> STFE must be trusted.
-func NewTreeHeadV1(lr *types.LogRootV1) *TreeHeadV1 {
- return &TreeHeadV1{
- uint64(lr.TimestampNanos / 1000 / 1000),
- uint64(lr.TreeSize),
- NodeHash{lr.RootHash},
- make([]byte, 0),
- }
-}
-
-// NewCosignedTreeHeadV1 creates a new StItem of type cosigned_tree_head_v1
-func NewCosignedTreeHeadV1(sth *SignedTreeHeadV1, sigs []SignatureV1) *StItem {
- return &StItem{
- Format: StFormatCosignedTreeHeadV1,
- CosignedTreeHeadV1: &CosignedTreeHeadV1{
- SignedTreeHeadV1: *sth,
- SignatureV1: sigs,
- },
- }
-}
-
-func b64(b []byte) string {
- return base64.StdEncoding.EncodeToString(b)
-}
-
-func deb64(str string) ([]byte, error) {
- return base64.StdEncoding.DecodeString(str)
-}
diff --git a/type_test.go b/type_test.go
deleted file mode 100644
index 6ac3b29..0000000
--- a/type_test.go
+++ /dev/null
@@ -1,330 +0,0 @@
-package stfe
-
-import (
- "testing"
-
- "github.com/system-transparency/stfe/namespace/testdata"
-)
-
-// TestEncDecStItem tests that valid StItems can be (un)marshaled, and that
-// invalid ones in fact fail.
-//
-// Note: max limits for inclusion and consistency proofs are not tested.
-// Note: TreeHeadV1 extensions are not tested (not used by stfe)
-func TestEncDecStItem(t *testing.T) {
- logIdSize := 35
- signatureMin := 1
- signatureMax := 65535
- messageMax := 65535
- nodeHashMin := 32
- nodeHashMax := 255
- packageMin := 1
- packageMax := 255
- checksumMin := 1
- checksumMax := 64
- for _, table := range []struct {
- description string
- item *StItem
- wantErr bool
- }{
- // signed_tree_head_v1
- {
- description: "too short log id",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), make([]byte, logIdSize-1), testSignature),
- wantErr: true,
- },
- {
- description: "too large log id",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), make([]byte, logIdSize+1), testSignature),
- wantErr: true,
- },
- {
- description: "ok log id: min and max",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature),
- },
- {
- description: "too short signature",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, make([]byte, signatureMin-1)),
- wantErr: true,
- },
- {
- description: "too large signature",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, make([]byte, signatureMax+1)),
- wantErr: true,
- },
- {
- description: "ok signature: min",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, make([]byte, signatureMin)),
- },
- {
- description: "ok signature: max",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, make([]byte, signatureMax)),
- },
- {
- description: "too short root hash",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMin-1))), testLogId, testSignature),
- wantErr: true,
- },
- {
- description: "too large root hash",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMax+1))), testLogId, testSignature),
- wantErr: true,
- },
- {
- description: "ok root hash: min",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMin))), testLogId, testSignature),
- },
- {
- description: "ok root hash: min",
- item: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMax))), testLogId, testSignature),
- },
- // signed_debug_info_v1
- {
- description: "too short log id",
- item: NewSignedDebugInfoV1(make([]byte, logIdSize-1), testMessage, testSignature),
- wantErr: true,
- },
- {
- description: "too large log id",
- item: NewSignedDebugInfoV1(make([]byte, logIdSize+1), testMessage, testSignature),
- wantErr: true,
- },
- {
- description: "ok log id: min and max",
- item: NewSignedDebugInfoV1(testLogId, testMessage, testSignature),
- },
- {
- description: "too large message",
- item: NewSignedDebugInfoV1(testLogId, make([]byte, messageMax+1), testSignature),
- wantErr: true,
- },
- {
- description: "ok message: max",
- item: NewSignedDebugInfoV1(testLogId, make([]byte, messageMax), testSignature),
- },
- {
- description: "too short signature",
- item: NewSignedDebugInfoV1(testLogId, testMessage, make([]byte, signatureMin-1)),
- wantErr: true,
- },
- {
- description: "too large signature",
- item: NewSignedDebugInfoV1(testLogId, testMessage, make([]byte, signatureMax+1)),
- wantErr: true,
- },
- {
- description: "ok signature: min",
- item: NewSignedDebugInfoV1(testLogId, testMessage, make([]byte, signatureMin)),
- },
- {
- description: "ok signature: max",
- item: NewSignedDebugInfoV1(testLogId, testMessage, make([]byte, signatureMax)),
- },
- // consistency_proof_v1
- {
- description: "too short log id",
- item: NewConsistencyProofV1(make([]byte, logIdSize-1), testTreeSize, testTreeSizeLarger, testProof),
- wantErr: true,
- },
- {
- description: "too large log id",
- item: NewConsistencyProofV1(make([]byte, logIdSize+1), testTreeSize, testTreeSizeLarger, testProof),
- wantErr: true,
- },
- {
- description: "ok log id: min and max",
- item: NewConsistencyProofV1(testLogId, testTreeSize, testTreeSizeLarger, testProof),
- },
- {
- description: "too small node hash in proof",
- item: NewConsistencyProofV1(testLogId, testTreeSize, testTreeSizeLarger, [][]byte{make([]byte, nodeHashMin-1)}),
- wantErr: true,
- },
- {
- description: "too large node hash in proof",
- item: NewConsistencyProofV1(testLogId, testTreeSize, testTreeSizeLarger, [][]byte{make([]byte, nodeHashMax+1)}),
- wantErr: true,
- },
- {
- description: "ok proof: min node hash",
- item: NewConsistencyProofV1(testLogId, testTreeSize, testTreeSizeLarger, [][]byte{make([]byte, nodeHashMin)}),
- },
- {
- description: "ok proof: max node hash",
- item: NewConsistencyProofV1(testLogId, testTreeSize, testTreeSizeLarger, [][]byte{make([]byte, nodeHashMin)}),
- },
- {
- description: "ok proof: empty",
- item: NewConsistencyProofV1(testLogId, testTreeSize, testTreeSizeLarger, [][]byte{}),
- },
- // inclusion_proof_v1
- {
- description: "too short log id",
- item: NewInclusionProofV1(make([]byte, logIdSize-1), testTreeSize, testIndex, testProof),
- wantErr: true,
- },
- {
- description: "too large log id",
- item: NewInclusionProofV1(make([]byte, logIdSize+1), testTreeSize, testIndex, testProof),
- wantErr: true,
- },
- {
- description: "ok log id: min and max",
- item: NewInclusionProofV1(testLogId, testTreeSize, testIndex, testProof),
- },
- {
- description: "too short node hash in proof",
- item: NewInclusionProofV1(testLogId, testTreeSize, testIndex, [][]byte{make([]byte, nodeHashMin-1)}),
- wantErr: true,
- },
- {
- description: "too large node hash in proof",
- item: NewInclusionProofV1(testLogId, testTreeSize, testIndex, [][]byte{make([]byte, nodeHashMax+1)}),
- wantErr: true,
- },
- {
- description: "ok proof: min node hash",
- item: NewInclusionProofV1(testLogId, testTreeSize, testIndex, [][]byte{make([]byte, nodeHashMin)}),
- },
- {
- description: "ok proof: max node hash",
- item: NewInclusionProofV1(testLogId, testTreeSize, testIndex, [][]byte{make([]byte, nodeHashMax)}),
- },
- {
- description: "ok proof: empty",
- item: NewInclusionProofV1(testLogId, testTreeSize, testIndex, [][]byte{}),
- },
- // checksum_v1
- {
- description: "too short package",
- item: NewChecksumV1(make([]byte, packageMin-1), testChecksum, mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- wantErr: true,
- },
- {
- description: "too large package",
- item: NewChecksumV1(make([]byte, packageMax+1), testChecksum, mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- wantErr: true,
- },
- {
- description: "ok package: min",
- item: NewChecksumV1(make([]byte, packageMin), testChecksum, mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- },
- {
- description: "ok package: max",
- item: NewChecksumV1(make([]byte, packageMax), testChecksum, mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- },
- {
- description: "too short checksum",
- item: NewChecksumV1(testPackage, make([]byte, checksumMin-1), mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- wantErr: true,
- },
- {
- description: "too large checksum",
- item: NewChecksumV1(testPackage, make([]byte, checksumMax+1), mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- wantErr: true,
- },
- {
- description: "ok checksum: min",
- item: NewChecksumV1(testPackage, make([]byte, checksumMin), mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- },
- {
- description: "ok checksum: max",
- item: NewChecksumV1(testPackage, make([]byte, checksumMax), mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)),
- }, // namespace (un)marshal is already tested in its own package (skip)
- {
- description: "ok cosigned sth",
- item: NewCosignedTreeHeadV1(
- NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature).SignedTreeHeadV1,
- []SignatureV1{
- SignatureV1{
- *mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk),
- testSignature,
- },
- },
- ),
- }, // TODO: the only thing that is not tested elsewhere for cosigned sth is bound on signature. Unify signature into a type => some tests go away.
- } {
- b, err := table.item.MarshalB64()
- if err != nil && !table.wantErr {
- t.Errorf("failed marshaling StItem(%s) in test %q: %v", table.item.Format, table.description, err)
- } else if err == nil && table.wantErr {
- t.Errorf("succeeded marshaling StItem(%s) in test %q but want failure", table.item.Format, table.description)
- }
- if err != nil || table.wantErr {
- continue // nothing to unmarshal
- }
-
- var item StItem
- if err := item.UnmarshalB64(b); err != nil {
- t.Errorf("failed unmarshaling StItem(%s) in test %q: %v", table.item.Format, table.description, err)
- }
- }
-}
-
-// TestTreeHeadMarshal tests that valid tree heads can be marshaled and that
-// invalid ones cannot.
-//
-// Note: TreeHeadV1 extensions are not tested (not used by stfe)
-func TestTreeHeadMarshal(t *testing.T) {
- nodeHashMin := 32
- nodeHashMax := 255
- for _, table := range []struct {
- description string
- th *TreeHeadV1
- wantErr bool
- }{
- {
- description: "too short root hash",
- th: NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMin-1))),
- wantErr: true,
- },
- {
- description: "too large root hash",
- th: NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMax+1))),
- wantErr: true,
- },
- {
- description: "ok tree head: min node hash",
- th: NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMin))),
- },
- {
- description: "ok tree head: max node hash",
- th: NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, make([]byte, nodeHashMax))),
- },
- } {
- if _, err := table.th.Marshal(); err != nil && !table.wantErr {
- t.Errorf("failed marshaling in test %q: %v", table.description, err)
- } else if err == nil && table.wantErr {
- t.Errorf("succeeded marshaling but wanted error in test %q: %v", table.description, err)
- }
- }
-}
-
-// TestStItemUnmarshal tests that invalid ST items cannot be unmarshaled
-func TestStItemUnmarshalFailure(t *testing.T) {
- b, err := NewChecksumV1(testPackage, testChecksum, mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk)).Marshal()
- if err != nil {
- t.Errorf("must marshal ChecksumV1 StItem: %v", err)
- return
- }
-
- var checksum StItem
- if err := checksum.Unmarshal(append(b[:], []byte{0}...)); err == nil {
- t.Errorf("succeeded unmarshaling but wanted error: one extra byte")
- }
- if err := checksum.Unmarshal(append(b[:], b[:]...)); err == nil {
- t.Errorf("succeeded unmarshaling but wanted error: one extra b")
- }
- if err := checksum.Unmarshal([]byte{0}); err == nil {
- t.Errorf("succeeded unmarshaling but wanted error: just a single byte")
- }
-
- b[0] = byte(len(testPackage)) + 1 // will mess up the first length specifier
- if err := checksum.Unmarshal(b); err == nil {
- t.Errorf("succeeded unmarshaling but wanted error: bad length")
- }
-
- if err := checksum.UnmarshalB64("@" + b64(b[1:])); err == nil {
- t.Errorf("succeded unmarshaling base64 but wanted error: bad byte")
- }
-}
diff --git a/types/namespace_test.go b/types/namespace_test.go
index c38d295..a5847ef 100644
--- a/types/namespace_test.go
+++ b/types/namespace_test.go
@@ -146,8 +146,7 @@ func test_cases_verify(t *testing.T) []testCaseNamespace {
// test_cases_verify_ed25519v1 returns ed25519_v1 Namespace.Verify() tests
func test_cases_verify_ed25519v1(t *testing.T) []testCaseNamespace {
testEd25519Sk := [64]byte{230, 122, 195, 152, 194, 195, 147, 153, 80, 120, 153, 79, 102, 27, 52, 187, 136, 218, 150, 234, 107, 9, 167, 4, 92, 21, 11, 113, 42, 29, 129, 69, 75, 60, 249, 150, 229, 93, 75, 32, 103, 126, 244, 37, 53, 182, 68, 82, 249, 109, 49, 94, 10, 19, 146, 244, 58, 191, 169, 107, 78, 37, 45, 210}
- testEd25519Vk := [32]byte{75, 60, 249, 150, 229, 93, 75, 32, 103, 126, 244, 37, 53, 182, 68, 82, 249, 109, 49, 94, 10, 19, 146, 244, 58, 191, 169, 107, 78,
- 37, 45, 210}
+ testEd25519Vk := [32]byte{75, 60, 249, 150, 229, 93, 75, 32, 103, 126, 244, 37, 53, 182, 68, 82, 249, 109, 49, 94, 10, 19, 146, 244, 58, 191, 169, 107, 78, 37, 45, 210}
return []testCaseNamespace{
{
description: "test_cases_verify_ed25519v1: invalid: sk signed message, but vk is not for sk",
diff --git a/types/stitem.go b/types/stitem.go
index b214082..447cad0 100644
--- a/types/stitem.go
+++ b/types/stitem.go
@@ -119,3 +119,74 @@ func (i StItem) String() string {
return fmt.Sprintf("unknown StItem: %v", i.Format)
}
}
+
+func NewSignedTreeHeadV1(th *TreeHeadV1, sig *SignatureV1) *StItem {
+ return &StItem{
+ Format: StFormatSignedTreeHeadV1,
+ SignedTreeHeadV1: &SignedTreeHeadV1{
+ TreeHead: *th,
+ Signature: *sig,
+ },
+ }
+}
+
+func NewCosignedTreeHeadV1(sth *SignedTreeHeadV1, cosig []SignatureV1) *StItem {
+ if cosig == nil {
+ cosig = make([]SignatureV1, 0)
+ }
+ return &StItem{
+ Format: StFormatCosignedTreeHeadV1,
+ CosignedTreeHeadV1: &CosignedTreeHeadV1{
+ SignedTreeHead: *sth,
+ Cosignatures: cosig,
+ },
+ }
+}
+
+func NewConsistencyProofV1(id *Namespace, size1, size2 uint64, path []NodeHash) *StItem {
+ return &StItem{
+ Format: StFormatConsistencyProofV1,
+ ConsistencyProofV1: &ConsistencyProofV1{
+ LogId: *id,
+ TreeSize1: size1,
+ TreeSize2: size2,
+ ConsistencyPath: path,
+ },
+ }
+}
+
+func NewInclusionProofV1(id *Namespace, size, index uint64, path []NodeHash) *StItem {
+ return &StItem{
+ Format: StFormatInclusionProofV1,
+ InclusionProofV1: &InclusionProofV1{
+ LogId: *id,
+ TreeSize: size,
+ LeafIndex: index,
+ InclusionPath: path,
+ },
+ }
+}
+
+func NewSignedChecksumV1(data *ChecksumV1, sig *SignatureV1) *StItem {
+ return &StItem{
+ Format: StFormatSignedChecksumV1,
+ SignedChecksumV1: &SignedChecksumV1{
+ Data: *data,
+ Signature: *sig,
+ },
+ }
+}
+
+func NewTreeHeadV1(timestamp, size uint64, hash, extension []byte) *TreeHeadV1 {
+ if extension == nil {
+ extension = make([]byte, 0)
+ }
+ return &TreeHeadV1{
+ Timestamp: timestamp,
+ TreeSize: size,
+ RootHash: NodeHash{
+ Data: hash,
+ },
+ Extension: extension,
+ }
+}
diff --git a/types/stitem_test.go b/types/stitem_test.go
index c6e413a..90d6808 100644
--- a/types/stitem_test.go
+++ b/types/stitem_test.go
@@ -38,3 +38,27 @@ func TestStItemString(t *testing.T) {
}
}
}
+
+// TODO: TestNewSignedTreeHeadV1
+func TestNewSignedTreeHeadV1(t *testing.T) {
+}
+
+// TODO: TestNewCosignedTreeHeadV1
+func TestNewCosignedTreeHeadV1(t *testing.T) {
+}
+
+// TODO: TestNewConsistencyProofV1
+func TestNewConsistencyProofV1(t *testing.T) {
+}
+
+// TODO: TestNewInclusionProofV1
+func TestNewInclusionProofV1(t *testing.T) {
+}
+
+// TODO: TestNewSignedChecksumV1
+func TestNewSignedChecksumV1(t *testing.T) {
+}
+
+// TODO: TestNewTreeHeadV1
+func TestNewTreeHeadV1(t *testing.T) {
+}
diff --git a/util.go b/util.go
new file mode 100644
index 0000000..847c3f7
--- /dev/null
+++ b/util.go
@@ -0,0 +1,40 @@
+package stfe
+
+import (
+ "fmt"
+
+ "github.com/google/trillian"
+ ttypes "github.com/google/trillian/types"
+ "github.com/system-transparency/stfe/types"
+)
+
+func NewTreeHeadV1FromLogRoot(lr *ttypes.LogRootV1) *types.TreeHeadV1 {
+ return &types.TreeHeadV1{
+ Timestamp: uint64(lr.TimestampNanos / 1000 / 1000),
+ TreeSize: uint64(lr.TreeSize),
+ RootHash: types.NodeHash{
+ Data: lr.RootHash,
+ },
+ Extension: make([]byte, 0),
+ }
+}
+
+func NewNodePathFromHashPath(hashes [][]byte) []types.NodeHash {
+ path := make([]types.NodeHash, 0, len(hashes))
+ for _, hash := range hashes {
+ path = append(path, types.NodeHash{hash})
+ }
+ return path
+}
+
+func NewStItemListFromLeaves(leaves []*trillian.LogLeaf) (*types.StItemList, error) {
+ items := make([]types.StItem, 0, len(leaves))
+ for _, leaf := range leaves {
+ var item types.StItem
+ if err := types.Unmarshal(leaf.LeafValue, &item); err != nil {
+ return nil, fmt.Errorf("Unmarshal failed: %v", err)
+ }
+ items = append(items, item)
+ }
+ return &types.StItemList{items}, nil
+}
diff --git a/util_test.go b/util_test.go
new file mode 100644
index 0000000..b40a672
--- /dev/null
+++ b/util_test.go
@@ -0,0 +1,17 @@
+package stfe
+
+import (
+ "testing"
+)
+
+// TODO: TestNewTreeHeadV1FromLogRoot
+func TestNewTreeHeadV1FromLogRoot(t *testing.T) {
+}
+
+// TODO: TestNewNodePathFromHashPath
+func TestNewNodePathFromHashPath(t *testing.T) {
+}
+
+// TODO: TestStItemListFromLeaves
+func TestStItemListFromLeaves(t *testing.T) {
+}