mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 14:31:02 +00:00 
			
		
		
		
	Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/4572 Co-authored-by: TheFox0x7 <thefox0x7@gmail.com> Co-committed-by: TheFox0x7 <thefox0x7@gmail.com>
		
			
				
	
	
		
			153 lines
		
	
	
	
		
			5.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			153 lines
		
	
	
	
		
			5.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2023 The Forgejo Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package asymkey
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	"code.gitea.io/gitea/models/unittest"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/git"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/test"
 | |
| 
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| )
 | |
| 
 | |
| func TestParseCommitWithSSHSignature(t *testing.T) {
 | |
| 	require.NoError(t, unittest.PrepareTestDatabase())
 | |
| 	user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
 | |
| 	sshKey := unittest.AssertExistsAndLoadBean(t, &PublicKey{ID: 1000, OwnerID: 2})
 | |
| 
 | |
| 	t.Run("No commiter", func(t *testing.T) {
 | |
| 		o := commitToGitObject(&git.Commit{})
 | |
| 		commitVerification := ParseObjectWithSSHSignature(db.DefaultContext, &o, &user_model.User{})
 | |
| 		assert.False(t, commitVerification.Verified)
 | |
| 		assert.Equal(t, NoKeyFound, commitVerification.Reason)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Commiter without keys", func(t *testing.T) {
 | |
| 		user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
 | |
| 
 | |
| 		o := commitToGitObject(&git.Commit{Committer: &git.Signature{Email: user.Email}})
 | |
| 		commitVerification := ParseObjectWithSSHSignature(db.DefaultContext, &o, user)
 | |
| 		assert.False(t, commitVerification.Verified)
 | |
| 		assert.Equal(t, NoKeyFound, commitVerification.Reason)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Correct signature with wrong email", func(t *testing.T) {
 | |
| 		gitCommit := &git.Commit{
 | |
| 			Committer: &git.Signature{
 | |
| 				Email: "non-existent",
 | |
| 			},
 | |
| 			Signature: &git.ObjectSignature{
 | |
| 				Payload: `tree 2d491b2985a7ff848d5c02748e7ea9f9f7619f9f
 | |
| parent 45b03601635a1f463b81963a4022c7f87ce96ef9
 | |
| author user2 <non-existent> 1699710556 +0100
 | |
| committer user2 <non-existent> 1699710556 +0100
 | |
| 
 | |
| Using email that isn't known to Forgejo
 | |
| `,
 | |
| 				Signature: `-----BEGIN SSH SIGNATURE-----
 | |
| U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgoGSe9Zy7Ez9bSJcaTNjh/Y7p95
 | |
| f5DujjqkpzFRtw6CEAAAADZ2l0AAAAAAAAAAZzaGE1MTIAAABTAAAAC3NzaC1lZDI1NTE5
 | |
| AAAAQIMufOuSjZeDUujrkVK4sl7ICa0WwEftas8UAYxx0Thdkiw2qWjR1U1PKfTLm16/w8
 | |
| /bS1LX1lZNuzm2LR2qEgw=
 | |
| -----END SSH SIGNATURE-----
 | |
| `,
 | |
| 			},
 | |
| 		}
 | |
| 		o := commitToGitObject(gitCommit)
 | |
| 		commitVerification := ParseObjectWithSSHSignature(db.DefaultContext, &o, user2)
 | |
| 		assert.False(t, commitVerification.Verified)
 | |
| 		assert.Equal(t, NoKeyFound, commitVerification.Reason)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Incorrect signature with correct email", func(t *testing.T) {
 | |
| 		gitCommit := &git.Commit{
 | |
| 			Committer: &git.Signature{
 | |
| 				Email: "user2@example.com",
 | |
| 			},
 | |
| 			Signature: &git.ObjectSignature{
 | |
| 				Payload: `tree 853694aae8816094a0d875fee7ea26278dbf5d0f
 | |
| parent c2780d5c313da2a947eae22efd7dacf4213f4e7f
 | |
| author user2 <user2@example.com> 1699707877 +0100
 | |
| committer user2 <user2@example.com> 1699707877 +0100
 | |
| 
 | |
| Add content
 | |
| `,
 | |
| 				Signature: `-----BEGIN SSH SIGNATURE-----`,
 | |
| 			},
 | |
| 		}
 | |
| 
 | |
| 		o := commitToGitObject(gitCommit)
 | |
| 		commitVerification := ParseObjectWithSSHSignature(db.DefaultContext, &o, user2)
 | |
| 		assert.False(t, commitVerification.Verified)
 | |
| 		assert.Equal(t, NoKeyFound, commitVerification.Reason)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Valid signature with correct email", func(t *testing.T) {
 | |
| 		gitCommit := &git.Commit{
 | |
| 			Committer: &git.Signature{
 | |
| 				Email: "user2@example.com",
 | |
| 			},
 | |
| 			Signature: &git.ObjectSignature{
 | |
| 				Payload: `tree 853694aae8816094a0d875fee7ea26278dbf5d0f
 | |
| parent c2780d5c313da2a947eae22efd7dacf4213f4e7f
 | |
| author user2 <user2@example.com> 1699707877 +0100
 | |
| committer user2 <user2@example.com> 1699707877 +0100
 | |
| 
 | |
| Add content
 | |
| `,
 | |
| 				Signature: `-----BEGIN SSH SIGNATURE-----
 | |
| U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgoGSe9Zy7Ez9bSJcaTNjh/Y7p95
 | |
| f5DujjqkpzFRtw6CEAAAADZ2l0AAAAAAAAAAZzaGE1MTIAAABTAAAAC3NzaC1lZDI1NTE5
 | |
| AAAAQBe2Fwk/FKY3SBCnG6jSYcO6ucyahp2SpQ/0P+otslzIHpWNW8cQ0fGLdhhaFynJXQ
 | |
| fs9cMpZVM9BfIKNUSO8QY=
 | |
| -----END SSH SIGNATURE-----
 | |
| `,
 | |
| 			},
 | |
| 		}
 | |
| 
 | |
| 		o := commitToGitObject(gitCommit)
 | |
| 		commitVerification := ParseObjectWithSSHSignature(db.DefaultContext, &o, user2)
 | |
| 		assert.True(t, commitVerification.Verified)
 | |
| 		assert.Equal(t, "user2 / SHA256:TKfwbZMR7e9OnlV2l1prfah1TXH8CmqR0PvFEXVCXA4", commitVerification.Reason)
 | |
| 		assert.Equal(t, sshKey, commitVerification.SigningSSHKey)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Valid signature with noreply email", func(t *testing.T) {
 | |
| 		defer test.MockVariableValue(&setting.Service.NoReplyAddress, "noreply.example.com")()
 | |
| 
 | |
| 		gitCommit := &git.Commit{
 | |
| 			Committer: &git.Signature{
 | |
| 				Email: "user2@noreply.example.com",
 | |
| 			},
 | |
| 			Signature: &git.ObjectSignature{
 | |
| 				Payload: `tree 4836c7f639f37388bab4050ef5c97bbbd54272fc
 | |
| parent 795be1b0117ea5c65456050bb9fd84744d4fd9c6
 | |
| author user2 <user2@noreply.example.com> 1699709594 +0100
 | |
| committer user2 <user2@noreply.example.com> 1699709594 +0100
 | |
| 
 | |
| Commit with noreply
 | |
| `,
 | |
| 				Signature: `-----BEGIN SSH SIGNATURE-----
 | |
| U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgoGSe9Zy7Ez9bSJcaTNjh/Y7p95
 | |
| f5DujjqkpzFRtw6CEAAAADZ2l0AAAAAAAAAAZzaGE1MTIAAABTAAAAC3NzaC1lZDI1NTE5
 | |
| AAAAQJz83KKxD6Bz/ZvNpqkA3RPOSQ4LQ5FfEItbtoONkbwV9wAWMnmBqgggo/lnXCJ3oq
 | |
| muPLbvEduU+Ze/1Ol1pgk=
 | |
| -----END SSH SIGNATURE-----
 | |
| `,
 | |
| 			},
 | |
| 		}
 | |
| 
 | |
| 		o := commitToGitObject(gitCommit)
 | |
| 		commitVerification := ParseObjectWithSSHSignature(db.DefaultContext, &o, user2)
 | |
| 		assert.True(t, commitVerification.Verified)
 | |
| 		assert.Equal(t, "user2 / SHA256:TKfwbZMR7e9OnlV2l1prfah1TXH8CmqR0PvFEXVCXA4", commitVerification.Reason)
 | |
| 		assert.Equal(t, sshKey, commitVerification.SigningSSHKey)
 | |
| 	})
 | |
| }
 |