From 047500ae23a12469ce3e458c6a58a642716041b7 Mon Sep 17 00:00:00 2001 From: Rasmus Dahlberg Date: Sat, 23 Apr 2022 18:19:25 +0200 Subject: add drafty tool named sigsum-debug Meant to be used for debugging and tests only. Replaces cmd/tmp/* in log-go, expect for the DNS command which is redundant. Use `dig -t txt $domain_hint` to debug domain hints. --- cmd/sigsum-debug/leaf/hash/hash.go | 42 ++++++++++ cmd/sigsum-debug/leaf/inclusion/inclusion.go | 9 ++ cmd/sigsum-debug/leaf/leaf.go | 119 +++++++++++++++++++++++++++ cmd/sigsum-debug/leaf/sign/sign.go | 37 +++++++++ cmd/sigsum-debug/leaf/verify/verify.go | 9 ++ 5 files changed, 216 insertions(+) create mode 100644 cmd/sigsum-debug/leaf/hash/hash.go create mode 100644 cmd/sigsum-debug/leaf/inclusion/inclusion.go create mode 100644 cmd/sigsum-debug/leaf/leaf.go create mode 100644 cmd/sigsum-debug/leaf/sign/sign.go create mode 100644 cmd/sigsum-debug/leaf/verify/verify.go (limited to 'cmd/sigsum-debug/leaf') diff --git a/cmd/sigsum-debug/leaf/hash/hash.go b/cmd/sigsum-debug/leaf/hash/hash.go new file mode 100644 index 0000000..9bc845e --- /dev/null +++ b/cmd/sigsum-debug/leaf/hash/hash.go @@ -0,0 +1,42 @@ +package hash + +import ( + "fmt" + "strings" + + "git.sigsum.org/sigsum-go/internal/fmtio" + "git.sigsum.org/sigsum-go/pkg/hex" + "git.sigsum.org/sigsum-go/pkg/types" +) + +func Main(args []string, optKeyHash, optSignature string, optShardHint uint64) error { + if len(args) != 0 { + return fmt.Errorf("trailing arguments: %s", strings.Join(args, ", ")) + } + data, err := fmtio.BytesFromStdin() + if err != nil { + return fmt.Errorf("read stdin: %w", err) + } + keyHash, err := fmtio.KeyHashFromHex(optKeyHash) + if err != nil { + return fmt.Errorf("parse key hash: %w", err) + } + sig, err := fmtio.SignatureFromHex(optSignature) + if err != nil { + return fmt.Errorf("parse signature: %w", err) + } + + preimage := types.HashFn(data) + leaf := types.Leaf{ + Statement: types.Statement{ + ShardHint: optShardHint, + Checksum: *types.HashFn(preimage[:]), + }, + Signature: sig, + KeyHash: keyHash, + } + leafHash := types.LeafHash(leaf.ToBinary()) + + fmt.Printf("%s\n", hex.Serialize(leafHash[:])) + return nil +} diff --git a/cmd/sigsum-debug/leaf/inclusion/inclusion.go b/cmd/sigsum-debug/leaf/inclusion/inclusion.go new file mode 100644 index 0000000..f9aeb68 --- /dev/null +++ b/cmd/sigsum-debug/leaf/inclusion/inclusion.go @@ -0,0 +1,9 @@ +package inclusion + +import ( + "fmt" +) + +func Main(args []string, optLeafHash, optRootHash string, optTreeSize uint64) error { + return fmt.Errorf("TODO") +} diff --git a/cmd/sigsum-debug/leaf/leaf.go b/cmd/sigsum-debug/leaf/leaf.go new file mode 100644 index 0000000..97de37e --- /dev/null +++ b/cmd/sigsum-debug/leaf/leaf.go @@ -0,0 +1,119 @@ +package leaf + +import ( + "flag" + "fmt" + "log" + + "git.sigsum.org/sigsum-go/cmd/sigsum-debug/leaf/hash" + "git.sigsum.org/sigsum-go/cmd/sigsum-debug/leaf/inclusion" + "git.sigsum.org/sigsum-go/cmd/sigsum-debug/leaf/sign" + "git.sigsum.org/sigsum-go/cmd/sigsum-debug/leaf/verify" + "git.sigsum.org/sigsum-go/internal/options" +) + +const usage = ` +sigsum-debug leaf signs, verifies, and hashes Merkle tree leaves. + +Usage: + + sigsum-debug leaf help + Outputs a usage message + + sigsum-debug leaf sign -k PRIVATE_KEY -h SHARD_HINT + Reads data from stdin and outputs a signature + + sigsum-debug leaf verify -k PUBLIC_KEY -s SIGNATURE -h SHARD_HINT + Reads data from stdin and verifies its signature + + sigsum-debug leaf hash -k KEY_HASH -s SIGNATURE -h SHARD_HINT + Reads data from stdin and outputs a leaf hash + + sigsum-debug leaf inclusion -l LEAF_HASH -n TREE_SIZE -r ROOT_HASH + Reads an inclusion proof from stdin and verifies it + +` + +var ( + optPrivateKey, optPublicKey, optKeyHash, optLeafHash, optRootHash, optSignature string + optShardHint, optTreeSize uint64 +) + +func Main(args []string) error { + var err error + + opt := options.New(args, func() { log.Printf(usage[1:]) }, setOptions) + err = checkOptions(opt.Name()) + if err == nil { + switch opt.Name() { + case "help": + opt.Usage() + case "sign": + err = sign.Main(opt.Args(), optPrivateKey, optShardHint) + case "verify": + err = verify.Main(opt.Args(), optPublicKey, optSignature, optShardHint) + case "hash": + err = hash.Main(opt.Args(), optKeyHash, optSignature, optShardHint) + case "inclusion": + err = inclusion.Main(opt.Args(), optLeafHash, optRootHash, optTreeSize) + default: + err = fmt.Errorf("invalid command %q, try \"help\"", opt.Name()) + } + } + if err != nil { + format := " %s: %w" + if len(opt.Name()) == 0 { + format = "%s: %w" + } + err = fmt.Errorf(format, opt.Name(), err) + } + + return err +} + +func setOptions(fs *flag.FlagSet) { + switch cmd := fs.Name(); cmd { + case "help": + case "sign": + options.AddString(fs, &optPrivateKey, "k", "private-key", options.DefaultString) + options.AddUint64(fs, &optShardHint, "h", "shard-hint", options.DefaultUint64) + case "verify": + options.AddString(fs, &optPublicKey, "k", "public-key", options.DefaultString) + options.AddString(fs, &optSignature, "s", "signature", options.DefaultString) + options.AddUint64(fs, &optShardHint, "h", "shard-hint", options.DefaultUint64) + case "hash": + options.AddString(fs, &optKeyHash, "k", "key-hash", options.DefaultString) + options.AddString(fs, &optSignature, "s", "signature", options.DefaultString) + options.AddUint64(fs, &optShardHint, "h", "shard-hint", options.DefaultUint64) + case "inclusion": + options.AddString(fs, &optLeafHash, "l", "leaf-hash", options.DefaultString) + options.AddUint64(fs, &optTreeSize, "n", "tree-size", options.DefaultUint64) + options.AddString(fs, &optRootHash, "r", "root-hash", options.DefaultString) + } +} + +// checkOptions checks that options with required arguments were set +func checkOptions(cmd string) error { + var err error + + switch cmd { + case "help": + case "sign": + err = options.CheckString("private key", optPrivateKey, err) + err = options.CheckUint64("shard hint", optShardHint, err) + case "verify": + err = options.CheckString("public key", optPublicKey, err) + err = options.CheckString("signature", optSignature, err) + err = options.CheckUint64("shard hint", optShardHint, err) + case "hash": + err = options.CheckString("key hash", optKeyHash, err) + err = options.CheckString("signature", optSignature, err) + err = options.CheckUint64("shard hint", optShardHint, err) + case "inclusion": + err = options.CheckString("leaf hash", optLeafHash, err) + err = options.CheckUint64("tree size", optTreeSize, err) + err = options.CheckString("root hash", optRootHash, err) + } + + return err +} diff --git a/cmd/sigsum-debug/leaf/sign/sign.go b/cmd/sigsum-debug/leaf/sign/sign.go new file mode 100644 index 0000000..348ae23 --- /dev/null +++ b/cmd/sigsum-debug/leaf/sign/sign.go @@ -0,0 +1,37 @@ +package sign + +import ( + "fmt" + "strings" + + "git.sigsum.org/sigsum-go/internal/fmtio" + "git.sigsum.org/sigsum-go/pkg/hex" + "git.sigsum.org/sigsum-go/pkg/types" +) + +func Main(args []string, optPrivateKey string, optShardHint uint64) error { + if len(args) != 0 { + return fmt.Errorf("trailing arguments: %s", strings.Join(args, ", ")) + } + data, err := fmtio.BytesFromStdin() + if err != nil { + return fmt.Errorf("read stdin: %w", err) + } + priv, err := fmtio.SignerFromHex(optPrivateKey) + if err != nil { + return fmt.Errorf("parse private key: %w", err) + } + + preimage := types.HashFn(data) + stm := types.Statement{ + ShardHint: optShardHint, + Checksum: *types.HashFn(preimage[:]), + } + sig, err := stm.Sign(priv) + if err != nil { + fmt.Errorf("sign leaf: %w", err) + } + + fmt.Printf("%s\n", hex.Serialize(sig[:])) + return nil +} diff --git a/cmd/sigsum-debug/leaf/verify/verify.go b/cmd/sigsum-debug/leaf/verify/verify.go new file mode 100644 index 0000000..a00791a --- /dev/null +++ b/cmd/sigsum-debug/leaf/verify/verify.go @@ -0,0 +1,9 @@ +package verify + +import ( + "fmt" +) + +func Main(args []string, optPublicKey, optSignature string, optShardHint uint64) error { + return fmt.Errorf("TODO") +} -- cgit v1.2.3