Skip to content

Commit 7fe365c

Browse files
committed
fixups
1 parent 717b3be commit 7fe365c

File tree

5 files changed

+34
-29
lines changed

5 files changed

+34
-29
lines changed

cli/signature.go

Lines changed: 27 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ import (
44
"context"
55
"crypto/x509"
66
"fmt"
7-
"io"
87
"os"
98
"os/exec"
109
"path/filepath"
@@ -16,7 +15,6 @@ import (
1615

1716
"cdr.dev/slog"
1817
"github.com/coder/code-marketplace/extensionsign"
19-
"github.com/coder/code-marketplace/storage/easyzip"
2018
)
2119

2220
func signature() *cobra.Command {
@@ -31,6 +29,10 @@ func signature() *cobra.Command {
3129
return cmd
3230
}
3331

32+
var (
33+
localCA = false
34+
)
35+
3436
func verifySig() *cobra.Command {
3537
cmd := &cobra.Command{
3638
Use: "verify <extension.vsix> <signature.p7s>",
@@ -40,6 +42,11 @@ func verifySig() *cobra.Command {
4042
logger := cmdLogger(cmd)
4143
ctx := cmd.Context()
4244
extensionVsix := args[0]
45+
msgData, err := os.ReadFile(extensionVsix)
46+
if err != nil {
47+
return xerrors.Errorf("read %q: %w", extensionVsix, err)
48+
}
49+
4350
p7sFile := args[1]
4451

4552
logger.Info(ctx, fmt.Sprintf("Decoding %q", p7sFile))
@@ -49,14 +56,14 @@ func verifySig() *cobra.Command {
4956
return xerrors.Errorf("read %q: %w", p7sFile, err)
5057
}
5158

52-
msg, err := easyzip.GetZipFileReader(data, extensionVsix)
53-
if err != nil {
54-
return xerrors.Errorf("get manifest: %w", err)
55-
}
56-
msgData, err := io.ReadAll(msg)
57-
if err != nil {
58-
return xerrors.Errorf("read manifest: %w", err)
59-
}
59+
//msg, err := easyzip.GetZipFileReader(data, extensionVsix)
60+
//if err != nil {
61+
// return xerrors.Errorf("get manifest: %w", err)
62+
//}
63+
//msgData, err := io.ReadAll(msg)
64+
//if err != nil {
65+
// return xerrors.Errorf("read manifest: %w", err)
66+
//}
6067

6168
signed, err := extensionsign.ExtractP7SSig(data)
6269
if err != nil {
@@ -87,6 +94,7 @@ func verifySig() *cobra.Command {
8794
return nil
8895
},
8996
}
97+
cmd.Flags().BoolVar(&localCA, "local-ca", true, "Use the local CA for verification.")
9098
return cmd
9199
}
92100

@@ -153,12 +161,18 @@ func openSSLVerify(ctx context.Context, logger slog.Logger, message []byte, sign
153161
return false, xerrors.Errorf("write signature: %w", err)
154162
}
155163

156-
cmd := exec.CommandContext(ctx, "openssl", "smime", "-verify",
164+
if localCA {
165+
166+
}
167+
168+
cmd := exec.CommandContext(ctx, "openssl", "cms", "-verify",
157169
"-in", sigPath, "-content", msgPath, "-inform", "DER",
158-
"-CAfile", "/home/steven/go/src/github.com/coder/code-marketplace/extensionsign/testdata/cert2.pem",
159170
)
171+
if localCA {
172+
cmd.Args = append(cmd.Args, "-CAfile", "/home/steven/go/src/github.com/coder/code-marketplace/extensionsign/testdata/cert2.pem")
173+
}
160174
output := &strings.Builder{}
161-
cmd.Stdout = output
175+
//cmd.Stdout = output
162176
cmd.Stderr = output
163177
err = cmd.Run()
164178
fmt.Println(output.String())

extensionsign/algo.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import (
1313
"golang.org/x/xerrors"
1414
)
1515

16-
var SigningAlgorithm = OpenSSLSign
16+
var SigningAlgorithm = CMSAlgo
1717

1818
func CMSAlgo(data []byte, certs []*x509.Certificate, signer crypto.Signer) (result []byte, err error) {
1919
return cms.SignDetached(data, certs, signer)

extensionsign/sigzip.go

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ func ExtractP7SSig(zip []byte) ([]byte, error) {
3939
}
4040

4141
// SignAndZipManifest signs a manifest and zips it up
42-
func SignAndZipManifest(certs []*x509.Certificate, secret crypto.Signer, manifest json.RawMessage) ([]byte, error) {
42+
func SignAndZipManifest(certs []*x509.Certificate, secret crypto.Signer, vsixData []byte, manifest json.RawMessage) ([]byte, error) {
4343
var buf bytes.Buffer
4444
w := zip.NewWriter(&buf)
4545

@@ -53,19 +53,12 @@ func SignAndZipManifest(certs []*x509.Certificate, secret crypto.Signer, manifes
5353
return nil, xerrors.Errorf("write manifest: %w", err)
5454
}
5555

56-
// Empty file
5756
p7sFile, err := w.Create(".signature.p7s")
5857
if err != nil {
5958
return nil, xerrors.Errorf("create empty p7s signature: %w", err)
6059
}
6160

62-
// Actual sig
63-
sigFile, err := w.Create(".signature.sig")
64-
if err != nil {
65-
return nil, xerrors.Errorf("create signature: %w", err)
66-
}
67-
68-
signature, err := secret.Sign(rand.Reader, vsixData, crypto.Hash(0))
61+
signature, err := SigningAlgorithm(vsixData, certs, secret)
6962
if err != nil {
7063
return nil, xerrors.Errorf("sign: %w", err)
7164
}

storage/signature.go

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,6 @@ import (
1414
"golang.org/x/xerrors"
1515

1616
"cdr.dev/slog"
17-
<<<<<<< HEAD
18-
19-
=======
20-
>>>>>>> 13a5775 (chore: more work towards supporting p7s)
2117
"github.com/coder/code-marketplace/extensionsign"
2218
)
2319

@@ -208,7 +204,7 @@ func (s *Signature) Open(ctx context.Context, fp string) (fs.File, error) {
208204
}
209205

210206
func (s *Signature) SigZip(ctx context.Context, vsix []byte, sigManifest []byte) ([]byte, error) {
211-
signed, err := extensionsign.SignAndZipManifest(s.Signer, vsix, sigManifest)
207+
signed, err := extensionsign.SignAndZipManifest(s.Certificates, s.Signer, vsix, sigManifest)
212208
if err != nil {
213209
s.Logger.Error(ctx, "signing manifest", slog.Error(err))
214210
return nil, xerrors.Errorf("sign and zip manifest: %w", err)

storage/signature_test.go

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ import (
55
"crypto/x509"
66
"testing"
77

8+
"github.com/stretchr/testify/require"
9+
810
"cdr.dev/slog"
911
"github.com/coder/code-marketplace/extensionsign"
1012
"github.com/coder/code-marketplace/storage"
@@ -32,7 +34,7 @@ func signed(signer bool, factory func(t *testing.T) testStorage) func(t *testing
3234
sst, err := storage.NewSignatureStorage(slog.Make(), key, []*x509.Certificate{}, st.storage)
3335
require.NoError(t, err)
3436
return testStorage{
35-
storage: storage.NewSignatureStorage(slog.Make(), key, st.storage),
37+
storage: sst,
3638
write: st.write,
3739
exists: st.exists,
3840
expectedManifest: exp,

0 commit comments

Comments
 (0)