diff options
author | Rasmus Dahlberg <rasmus.dahlberg@kau.se> | 2021-02-17 19:58:27 +0100 |
---|---|---|
committer | Rasmus Dahlberg <rasmus.dahlberg@kau.se> | 2021-02-17 19:58:27 +0100 |
commit | 238518951868db81cd3a004e5c3f0b99f8e82b06 (patch) | |
tree | 1df8e71e869272bc5324e7412eab9236276f3548 /sth_test.go | |
parent | 72c8492ee1bd07d5960c9920e51b7addac11b806 (diff) |
added basic server-side cosigning (work in progress)
Diffstat (limited to 'sth_test.go')
-rw-r--r-- | sth_test.go | 454 |
1 files changed, 454 insertions, 0 deletions
diff --git a/sth_test.go b/sth_test.go new file mode 100644 index 0000000..3b84b8c --- /dev/null +++ b/sth_test.go @@ -0,0 +1,454 @@ +package stfe + +import ( + "context" + "crypto" + "fmt" + "reflect" + "testing" + + "github.com/golang/mock/gomock" + cttestdata "github.com/google/certificate-transparency-go/trillian/testdata" + "github.com/google/trillian" + "github.com/system-transparency/stfe/namespace" + "github.com/system-transparency/stfe/namespace/testdata" +) + +func TestLatest(t *testing.T) { + for _, table := range []struct { + description string + signer crypto.Signer + trsp *trillian.GetLatestSignedLogRootResponse + terr error + wantErr bool + wantRsp *StItem + }{ + { + description: "invalid trillian response", + signer: cttestdata.NewSignerWithFixedSig(nil, testSignature), + terr: fmt.Errorf("internal server error"), + wantErr: true, + }, + { + description: "signature failure", + signer: cttestdata.NewSignerWithErr(nil, fmt.Errorf("signing failed")), + terr: fmt.Errorf("internal server error"), + wantErr: true, + }, + { + description: "valid", + signer: cttestdata.NewSignerWithFixedSig(nil, testSignature), + trsp: makeLatestSignedLogRootResponse(t, testTimestamp, testTreeSize, testNodeHash), + wantRsp: NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature), + }, + } { + func() { // run deferred functions at the end of each iteration + th := newTestHandler(t, table.signer, nil) + defer th.mockCtrl.Finish() + th.client.EXPECT().GetLatestSignedLogRoot(gomock.Any(), gomock.Any()).Return(table.trsp, table.terr) + sth, err := th.instance.SthSource.Latest(context.Background()) + if got, want := err != nil, table.wantErr; got != want { + t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err) + } + if err != nil { + return + } + if got, want := sth, table.wantRsp; !reflect.DeepEqual(got, want) { + t.Errorf("got %v but wanted %v in test %q", got, want, table.description) + } + }() + } +} + +func TestStable(t *testing.T) { + sth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature) + for _, table := range []struct { + description string + source SthSource + wantRsp *StItem + wantErr bool + }{ + { + description: "no stable sth", + source: &ActiveSthSource{}, + wantErr: true, + }, + { + description: "valid", + source: &ActiveSthSource{ + nextSth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil)}, + wantRsp: sth, + }, + } { + sth, err := table.source.Stable(context.Background()) + if got, want := err != nil, table.wantErr; got != want { + t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err) + } + if err != nil { + continue + } + if got, want := sth, table.wantRsp; !reflect.DeepEqual(got, want) { + t.Errorf("got %v but wanted %v in test %q", got, want, table.description) + } + } +} + +func TestCosigned(t *testing.T) { + sth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature) + sigs := []SignatureV1{ + SignatureV1{ + Namespace: *mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk), + Signature: testSignature, + }, + } + for _, table := range []struct { + description string + source SthSource + wantRsp *StItem + wantErr bool + }{ + { + description: "no cosigned sth: nil", + source: &ActiveSthSource{}, + wantErr: true, + }, + { + description: "no cosigned sth: nil signatures", + source: &ActiveSthSource{ + currSth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil), + }, + wantErr: true, + }, + { + description: "valid", + source: &ActiveSthSource{ + currSth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, sigs), + }, + wantRsp: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, sigs), + }, + } { + cosi, err := table.source.Cosigned(context.Background()) + if got, want := err != nil, table.wantErr; got != want { + t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err) + } + if err != nil { + continue + } + if got, want := cosi, table.wantRsp; !reflect.DeepEqual(got, want) { + t.Errorf("got %v but wanted %v in test %q", got, want, table.description) + } + } +} + +func TestAddCosignature(t *testing.T) { + sth := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature) + wit1 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk) + wit2 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk2) + for _, table := range []struct { + description string + source *ActiveSthSource + req *StItem + wantWit []*namespace.Namespace + wantErr bool + }{ + { + description: "invalid: cosignature must target the stable sth", + source: &ActiveSthSource{ + nextSth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil), + cosignatureFrom: make(map[string]bool), + }, + req: NewCosignedTreeHeadV1(NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp+1000000, testTreeSize, testNodeHash)), testLogId, testSignature).SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantErr: true, + }, + { + description: "valid: adding duplicate into a pool of cosignatures", + source: &ActiveSthSource{ + nextSth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + cosignatureFrom: map[string]bool{ + wit1.String(): true, + }, + }, + req: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantWit: []*namespace.Namespace{wit1}, + }, + { + description: "valid: adding into an empty pool of cosignatures", + source: &ActiveSthSource{ + nextSth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, nil), + cosignatureFrom: make(map[string]bool), + }, + req: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantWit: []*namespace.Namespace{wit1}, + }, + { + description: "valid: adding into a pool of cosignatures", + source: &ActiveSthSource{ + nextSth: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + cosignatureFrom: map[string]bool{ + wit1.String(): true, + }, + }, + req: NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + }), + wantWit: []*namespace.Namespace{wit1, wit2}, + }, + } { + err := table.source.AddCosignature(context.Background(), table.req) + if got, want := err != nil, table.wantErr; got != want { + t.Errorf("got error %v but wanted %v in test %q: %v", got, want, table.description, err) + } + if err != nil { + continue + } + + // Check that the next cosigned sth is updated + var sigs []SignatureV1 + for _, wit := range table.wantWit { + sigs = append(sigs, SignatureV1{ + Namespace: *wit, + Signature: testSignature, + }) + } + if got, want := table.source.nextSth, NewCosignedTreeHeadV1(sth.SignedTreeHeadV1, sigs); !reflect.DeepEqual(got, want) { + t.Errorf("got %v but wanted %v in test %q", got, want, table.description) + } + // Check that the map tracking witness signatures is updated + if got, want := len(table.source.cosignatureFrom), len(table.wantWit); got != want { + t.Errorf("witness map got %d cosignatures but wanted %d in test %q", got, want, table.description) + } else { + for _, wit := range table.wantWit { + if _, ok := table.source.cosignatureFrom[wit.String()]; !ok { + t.Errorf("missing signature from witness %X in test %q", wit.String(), table.description) + } + } + } + } +} + +func TestRotate(t *testing.T) { + sth1 := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp, testTreeSize, testNodeHash)), testLogId, testSignature) + sth2 := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp+1000000, testTreeSize+1, testNodeHash)), testLogId, testSignature) + sth3 := NewSignedTreeHeadV1(NewTreeHeadV1(makeTrillianLogRoot(t, testTimestamp+2000000, testTreeSize+2, testNodeHash)), testLogId, testSignature) + wit1 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk) + wit2 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk2) + wit3 := mustNewNamespaceEd25519V1(t, testdata.Ed25519Vk3) + for _, table := range []struct { + description string + source *ActiveSthSource + fixedSth *StItem + wantCurrSth *StItem + wantNextSth *StItem + wantWit []*namespace.Namespace + }{ + { + description: "not repeated cosigned and not repeated stable", + source: &ActiveSthSource{ + currSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, nil), + nextSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + cosignatureFrom: map[string]bool{ + wit1.String(): true, + }, + }, + fixedSth: sth3, + wantCurrSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantNextSth: NewCosignedTreeHeadV1(sth3.SignedTreeHeadV1, nil), + wantWit: nil, // no cosignatures for the next stable sth yet + }, + { + description: "not repeated cosigned and repeated stable", + source: &ActiveSthSource{ + currSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, nil), + nextSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + cosignatureFrom: map[string]bool{ + wit1.String(): true, + }, + }, + fixedSth: sth2, + wantCurrSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantNextSth: NewCosignedTreeHeadV1(sth2.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantWit: []*namespace.Namespace{wit1}, + }, + { + description: "repeated cosigned and not repeated stable", + source: &ActiveSthSource{ + currSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + }), + nextSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit3, + Signature: testSignature, + }, + }), + cosignatureFrom: map[string]bool{ + wit2.String(): true, + wit3.String(): true, + }, + }, + fixedSth: sth3, + wantCurrSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit3, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantNextSth: NewCosignedTreeHeadV1(sth3.SignedTreeHeadV1, nil), + wantWit: nil, // no cosignatures for the next stable sth yet + }, + { + description: "repeated cosigned and repeated stable", + source: &ActiveSthSource{ + currSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + }), + nextSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit3, + Signature: testSignature, + }, + }), + cosignatureFrom: map[string]bool{ + wit2.String(): true, + wit3.String(): true, + }, + }, + fixedSth: sth1, + wantCurrSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit3, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantNextSth: NewCosignedTreeHeadV1(sth1.SignedTreeHeadV1, []SignatureV1{ + SignatureV1{ + Namespace: *wit2, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit3, + Signature: testSignature, + }, + SignatureV1{ + Namespace: *wit1, + Signature: testSignature, + }, + }), + wantWit: []*namespace.Namespace{wit1, wit2, wit3}, + }, + } { + table.source.rotate(table.fixedSth) + if got, want := table.source.currSth, table.wantCurrSth; !reflect.DeepEqual(got, want) { + t.Errorf("got currSth %X but wanted %X in test %q", got, want, table.description) + } + if got, want := table.source.nextSth, table.wantNextSth; !reflect.DeepEqual(got, want) { + t.Errorf("got nextSth %X but wanted %X in test %q", got, want, table.description) + } + if got, want := len(table.source.cosignatureFrom), len(table.wantWit); got != want { + t.Errorf("witness map got %d cosignatures but wanted %d in test %q", got, want, table.description) + } else { + for _, wit := range table.wantWit { + if _, ok := table.source.cosignatureFrom[wit.String()]; !ok { + t.Errorf("missing signature from witness %X in test %q", wit.String(), table.description) + } + } + } + // check that adding cosignatures to stable will not effect cosigned sth + wantLen := len(table.source.currSth.CosignedTreeHeadV1.SignatureV1) + table.source.nextSth.CosignedTreeHeadV1.SignatureV1 = append(table.source.nextSth.CosignedTreeHeadV1.SignatureV1, SignatureV1{Namespace: *wit1, Signature: testSignature}) + if gotLen := len(table.source.currSth.CosignedTreeHeadV1.SignatureV1); gotLen != wantLen { + t.Errorf("adding cosignatures to the stable sth modifies the fixated cosigned sth in test %q", table.description) + } + } +} |