Skip to content

Commit

Permalink
Merge pull request #1408 from jku/merge-ngclient
Browse files Browse the repository at this point in the history
Merge ngclient: a new client library implementation
  • Loading branch information
Jussi Kukkonen authored Jul 5, 2021
2 parents c0e6673 + ffff7f5 commit 745a8f7
Show file tree
Hide file tree
Showing 12 changed files with 1,839 additions and 22 deletions.
124 changes: 124 additions & 0 deletions tests/test_trusted_metadata_set.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,124 @@
import json
import logging
import os
import shutil
import sys
import tempfile
import unittest

from tuf import exceptions
from tuf.api.metadata import Metadata
from tuf.ngclient._internal.trusted_metadata_set import TrustedMetadataSet

from tests import utils

logger = logging.getLogger(__name__)

class TestTrustedMetadataSet(unittest.TestCase):

def test_update(self):
repo_dir = os.path.join(os.getcwd(), 'repository_data', 'repository', 'metadata')

with open(os.path.join(repo_dir, "root.json"), "rb") as f:
trusted_set = TrustedMetadataSet(f.read())
trusted_set.root_update_finished()

with open(os.path.join(repo_dir, "timestamp.json"), "rb") as f:
trusted_set.update_timestamp(f.read())
with open(os.path.join(repo_dir, "snapshot.json"), "rb") as f:
trusted_set.update_snapshot(f.read())
with open(os.path.join(repo_dir, "targets.json"), "rb") as f:
trusted_set.update_targets(f.read())
with open(os.path.join(repo_dir, "role1.json"), "rb") as f:
trusted_set.update_delegated_targets(f.read(), "role1", "targets")
with open(os.path.join(repo_dir, "role2.json"), "rb") as f:
trusted_set.update_delegated_targets(f.read(), "role2", "role1")

def test_out_of_order_ops(self):
repo_dir = os.path.join(os.getcwd(), 'repository_data', 'repository', 'metadata')
data={}
for md in ["root", "timestamp", "snapshot", "targets", "role1"]:
with open(os.path.join(repo_dir, f"{md}.json"), "rb") as f:
data[md] = f.read()

trusted_set = TrustedMetadataSet(data["root"])

# Update timestamp before root is finished
with self.assertRaises(RuntimeError):
trusted_set.update_timestamp(data["timestamp"])

trusted_set.root_update_finished()
with self.assertRaises(RuntimeError):
trusted_set.root_update_finished()

# Update snapshot before timestamp
with self.assertRaises(RuntimeError):
trusted_set.update_snapshot(data["snapshot"])

trusted_set.update_timestamp(data["timestamp"])

# Update targets before snapshot
with self.assertRaises(RuntimeError):
trusted_set.update_targets(data["targets"])

trusted_set.update_snapshot(data["snapshot"])

#update timestamp after snapshot
with self.assertRaises(RuntimeError):
trusted_set.update_timestamp(data["timestamp"])

# Update delegated targets before targets
with self.assertRaises(RuntimeError):
trusted_set.update_delegated_targets(data["role1"], "role1", "targets")

trusted_set.update_targets(data["targets"])
trusted_set.update_delegated_targets(data["role1"], "role1", "targets")

def test_update_with_invalid_json(self):
repo_dir = os.path.join(os.getcwd(), 'repository_data', 'repository', 'metadata')
data={}
for md in ["root", "timestamp", "snapshot", "targets", "role1"]:
with open(os.path.join(repo_dir, f"{md}.json"), "rb") as f:
data[md] = f.read()

# root.json not a json file at all
with self.assertRaises(exceptions.RepositoryError):
TrustedMetadataSet(b"")
# root.json is invalid
root = Metadata.from_bytes(data["root"])
root.signed.version += 1
with self.assertRaises(exceptions.RepositoryError):
TrustedMetadataSet(json.dumps(root.to_dict()).encode())

trusted_set = TrustedMetadataSet(data["root"])
trusted_set.root_update_finished()

top_level_md = [
(data["timestamp"], trusted_set.update_timestamp),
(data["snapshot"], trusted_set.update_snapshot),
(data["targets"], trusted_set.update_targets),
]
for metadata, update_func in top_level_md:
# metadata is not json
with self.assertRaises(exceptions.RepositoryError):
update_func(b"")
# metadata is invalid
md = Metadata.from_bytes(metadata)
md.signed.version += 1
with self.assertRaises(exceptions.RepositoryError):
update_func(json.dumps(md.to_dict()).encode())

# metadata is of wrong type
with self.assertRaises(exceptions.RepositoryError):
update_func(data["root"])

update_func(metadata)


# TODO test updating over initial metadata (new keys, newer timestamp, etc)
# TODO test the actual specification checks


if __name__ == '__main__':
utils.configure_test_logging(sys.argv)
unittest.main()
153 changes: 153 additions & 0 deletions tests/test_updater_ng.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,153 @@
#!/usr/bin/env python

# Copyright 2021, New York University and the TUF contributors
# SPDX-License-Identifier: MIT OR Apache-2.0

"""Test Updater class
"""

import os
import shutil
import tempfile
import logging
import sys
import unittest
import tuf.unittest_toolbox as unittest_toolbox

from tests import utils
from tuf import ngclient

logger = logging.getLogger(__name__)


class TestUpdater(unittest_toolbox.Modified_TestCase):

@classmethod
def setUpClass(cls):
# Create a temporary directory to store the repository, metadata, and target
# files. 'temporary_directory' must be deleted in TearDownModule() so that
# temporary files are always removed, even when exceptions occur.
cls.temporary_directory = tempfile.mkdtemp(dir=os.getcwd())

# Needed because in some tests simple_server.py cannot be found.
# The reason is that the current working directory
# has been changed when executing a subprocess.
cls.SIMPLE_SERVER_PATH = os.path.join(os.getcwd(), 'simple_server.py')

# Launch a SimpleHTTPServer (serves files in the current directory).
# Test cases will request metadata and target files that have been
# pre-generated in 'tuf/tests/repository_data', which will be served
# by the SimpleHTTPServer launched here. The test cases of 'test_updater.py'
# assume the pre-generated metadata files have a specific structure, such
# as a delegated role 'targets/role1', three target files, five key files,
# etc.
cls.server_process_handler = utils.TestServerProcess(log=logger,
server=cls.SIMPLE_SERVER_PATH)



@classmethod
def tearDownClass(cls):
# Cleans the resources and flush the logged lines (if any).
cls.server_process_handler.clean()

# Remove the temporary repository directory, which should contain all the
# metadata, targets, and key files generated for the test cases
shutil.rmtree(cls.temporary_directory)



def setUp(self):
# We are inheriting from custom class.
unittest_toolbox.Modified_TestCase.setUp(self)

# Copy the original repository files provided in the test folder so that
# any modifications made to repository files are restricted to the copies.
# The 'repository_data' directory is expected to exist in 'tuf.tests/'.
original_repository_files = os.path.join(os.getcwd(), 'repository_data')
temporary_repository_root = \
self.make_temp_directory(directory=self.temporary_directory)

# The original repository, keystore, and client directories will be copied
# for each test case.
original_repository = os.path.join(original_repository_files, 'repository')
original_keystore = os.path.join(original_repository_files, 'keystore')
original_client = os.path.join(original_repository_files, 'client', 'test_repository1', 'metadata', 'current')

# Save references to the often-needed client repository directories.
# Test cases need these references to access metadata and target files.
self.repository_directory = \
os.path.join(temporary_repository_root, 'repository')
self.keystore_directory = \
os.path.join(temporary_repository_root, 'keystore')

self.client_directory = os.path.join(temporary_repository_root, 'client')

# Copy the original 'repository', 'client', and 'keystore' directories
# to the temporary repository the test cases can use.
shutil.copytree(original_repository, self.repository_directory)
shutil.copytree(original_client, self.client_directory)
shutil.copytree(original_keystore, self.keystore_directory)

# 'path/to/tmp/repository' -> 'localhost:8001/tmp/repository'.
repository_basepath = self.repository_directory[len(os.getcwd()):]
url_prefix = 'http://' + utils.TEST_HOST_ADDRESS + ':' \
+ str(self.server_process_handler.port) + repository_basepath

metadata_url = f"{url_prefix}/metadata/"
targets_url = f"{url_prefix}/targets/"
# Creating a repository instance. The test cases will use this client
# updater to refresh metadata, fetch target files, etc.
self.repository_updater = ngclient.Updater(self.client_directory,
metadata_url,
targets_url)

def tearDown(self):
# We are inheriting from custom class.
unittest_toolbox.Modified_TestCase.tearDown(self)

# Logs stdout and stderr from the sever subprocess.
self.server_process_handler.flush_log()

def test_refresh(self):
# All metadata is in local directory already
self.repository_updater.refresh()

# Get targetinfo for 'file1.txt' listed in targets
targetinfo1 = self.repository_updater.get_one_valid_targetinfo('file1.txt')
# Get targetinfo for 'file3.txt' listed in the delegated role1
targetinfo3= self.repository_updater.get_one_valid_targetinfo('file3.txt')

destination_directory = self.make_temp_directory()
updated_targets = self.repository_updater.updated_targets([targetinfo1, targetinfo3],
destination_directory)

self.assertListEqual(updated_targets, [targetinfo1, targetinfo3])

self.repository_updater.download_target(targetinfo1, destination_directory)
updated_targets = self.repository_updater.updated_targets(updated_targets,
destination_directory)

self.assertListEqual(updated_targets, [targetinfo3])


self.repository_updater.download_target(targetinfo3, destination_directory)
updated_targets = self.repository_updater.updated_targets(updated_targets,
destination_directory)

self.assertListEqual(updated_targets, [])

def test_refresh_with_only_local_root(self):
os.remove(os.path.join(self.client_directory, "timestamp.json"))
os.remove(os.path.join(self.client_directory, "snapshot.json"))
os.remove(os.path.join(self.client_directory, "targets.json"))
os.remove(os.path.join(self.client_directory, "role1.json"))

self.repository_updater.refresh()

# Get targetinfo for 'file3.txt' listed in the delegated role1
targetinfo3= self.repository_updater.get_one_valid_targetinfo('file3.txt')

if __name__ == '__main__':
utils.configure_test_logging(sys.argv)
unittest.main()
10 changes: 5 additions & 5 deletions tox.ini
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ changedir = tests
commands =
python --version
python -m coverage run aggregate_tests.py
python -m coverage report -m --fail-under 97
python -m coverage report -m --fail-under 97 --omit "{toxinidir}/tuf/ngclient/*"

deps =
-r{toxinidir}/requirements-test.txt
Expand All @@ -43,13 +43,13 @@ changedir = {toxinidir}
commands =
# Use different configs for new (tuf/api/*) and legacy code
# TODO: configure black and isort args in pyproject.toml (see #1161)
black --check --diff --line-length 80 tuf/api
isort --check --diff --line-length 80 --profile black -p tuf tuf/api
pylint -j 0 tuf/api --rcfile=tuf/api/pylintrc
black --check --diff --line-length 80 tuf/api tuf/ngclient
isort --check --diff --line-length 80 --profile black -p tuf tuf/api tuf/ngclient
pylint -j 0 tuf/api tuf/ngclient --rcfile=tuf/api/pylintrc

# NOTE: Contrary to what the pylint docs suggest, ignoring full paths does
# work, unfortunately each subdirectory has to be ignored explicitly.
pylint -j 0 tuf --ignore=tuf/api,tuf/api/serialization
pylint -j 0 tuf --ignore=tuf/api,tuf/api/serialization,tuf/ngclient,tuf/ngclient/_internal

mypy

Expand Down
28 changes: 11 additions & 17 deletions tuf/exceptions.py
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,10 @@ class UnsupportedAlgorithmError(Error):
class LengthOrHashMismatchError(Error):
"""Indicate an error while checking the length and hash values of an object"""

class BadHashError(Error):
class RepositoryError(Error):
"""Indicate an error with a repository's state, such as a missing file."""

class BadHashError(RepositoryError):
"""Indicate an error while checking the value of a hash object."""

def __init__(self, expected_hash: str, observed_hash: str):
Expand All @@ -92,9 +95,6 @@ def __repr__(self) -> str:
# self.__class__.__name__ + '(' + repr(self.expected_hash) + ', ' +
# repr(self.observed_hash) + ')')

class BadVersionNumberError(Error):
"""Indicate an error for metadata that contains an invalid version number."""


class BadPasswordError(Error):
"""Indicate an error after encountering an invalid password."""
Expand All @@ -104,8 +104,8 @@ class UnknownKeyError(Error):
"""Indicate an error while verifying key-like objects (e.g., keyids)."""


class RepositoryError(Error):
"""Indicate an error with a repository's state, such as a missing file."""
class BadVersionNumberError(RepositoryError):
"""Indicate an error for metadata that contains an invalid version number."""


class MissingLocalRepositoryError(RepositoryError):
Expand All @@ -120,35 +120,29 @@ class ForbiddenTargetError(RepositoryError):
"""Indicate that a role signed for a target that it was not delegated to."""


class ExpiredMetadataError(Error):
class ExpiredMetadataError(RepositoryError):
"""Indicate that a TUF Metadata file has expired."""


class ReplayedMetadataError(RepositoryError):
"""Indicate that some metadata has been replayed to the client."""

def __init__(self, metadata_role: str, previous_version: int, current_version: int):
def __init__(self, metadata_role: str, downloaded_version: int, current_version: int):
super(ReplayedMetadataError, self).__init__()

self.metadata_role = metadata_role
self.previous_version = previous_version
self.downloaded_version = downloaded_version
self.current_version = current_version

def __str__(self) -> str:
return (
'Downloaded ' + repr(self.metadata_role) + ' is older (' +
repr(self.previous_version) + ') than the version currently '
repr(self.downloaded_version) + ') than the version currently '
'installed (' + repr(self.current_version) + ').')

def __repr__(self) -> str:
return self.__class__.__name__ + ' : ' + str(self)

# # Directly instance-reproducing:
# return (
# self.__class__.__name__ + '(' + repr(self.metadata_role) + ', ' +
# repr(self.previous_version) + ', ' + repr(self.current_version) + ')')



class CryptoError(Error):
"""Indicate any cryptography-related errors."""
Expand Down Expand Up @@ -250,7 +244,7 @@ class InvalidNameError(Error):
"""Indicate an error while trying to validate any type of named object."""


class UnsignedMetadataError(Error):
class UnsignedMetadataError(RepositoryError):
"""Indicate metadata object with insufficient threshold of signatures."""

# signable is not used but kept in method signature for backwards compat
Expand Down
Loading

0 comments on commit 745a8f7

Please sign in to comment.