Ai
1 Star 0 Fork 1

mysnapcore/mysnapd

forked from tupelo-shen/mysnapd 
加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
克隆/下载
assertstate_test.go 143.14 KB
一键复制 编辑 原始数据 按行查看 历史
tupelo-shen 提交于 2022-11-08 15:12 +08:00 . fix: overlord commit
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599
// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2016-2022 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package assertstate_test
import (
"bytes"
"context"
"crypto"
"errors"
"fmt"
"sort"
"strings"
"testing"
"time"
"golang.org/x/crypto/sha3"
. "gopkg.in/check.v1"
"gitee.com/mysnapcore/mysnapd/asserts"
"gitee.com/mysnapcore/mysnapd/asserts/assertstest"
"gitee.com/mysnapcore/mysnapd/asserts/snapasserts"
"gitee.com/mysnapcore/mysnapd/asserts/sysdb"
"gitee.com/mysnapcore/mysnapd/dirs"
"gitee.com/mysnapcore/mysnapd/httputil"
"gitee.com/mysnapcore/mysnapd/logger"
"gitee.com/mysnapcore/mysnapd/overlord"
"gitee.com/mysnapcore/mysnapd/overlord/assertstate"
"gitee.com/mysnapcore/mysnapd/overlord/auth"
"gitee.com/mysnapcore/mysnapd/overlord/snapstate"
"gitee.com/mysnapcore/mysnapd/overlord/snapstate/snapstatetest"
"gitee.com/mysnapcore/mysnapd/overlord/state"
"gitee.com/mysnapcore/mysnapd/snap"
"gitee.com/mysnapcore/mysnapd/snap/snaptest"
"gitee.com/mysnapcore/mysnapd/store"
"gitee.com/mysnapcore/mysnapd/store/storetest"
"gitee.com/mysnapcore/mysnapd/testutil"
)
func TestAssertManager(t *testing.T) { TestingT(t) }
type assertMgrSuite struct {
testutil.BaseTest
o *overlord.Overlord
state *state.State
se *overlord.StateEngine
mgr *assertstate.AssertManager
storeSigning *assertstest.StoreStack
dev1Acct *asserts.Account
dev1AcctKey *asserts.AccountKey
dev1Signing *assertstest.SigningDB
fakeStore snapstate.StoreService
trivialDeviceCtx snapstate.DeviceContext
}
var _ = Suite(&assertMgrSuite{})
type fakeStore struct {
storetest.Store
state *state.State
db asserts.RODatabase
maxDeclSupportedFormat int
maxValidationSetSupportedFormat int
requestedTypes [][]string
opts *store.RefreshOptions
snapActionErr error
downloadAssertionsErr error
}
func (sto *fakeStore) pokeStateLock() {
// the store should be called without the state lock held. Try
// to acquire it.
sto.state.Lock()
sto.state.Unlock()
}
func (sto *fakeStore) Assertion(assertType *asserts.AssertionType, key []string, _ *auth.UserState) (asserts.Assertion, error) {
sto.pokeStateLock()
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, sto.maxDeclSupportedFormat)
defer restore()
ref := &asserts.Ref{Type: assertType, PrimaryKey: key}
return ref.Resolve(sto.db.Find)
}
func (sto *fakeStore) SnapAction(_ context.Context, currentSnaps []*store.CurrentSnap, actions []*store.SnapAction, assertQuery store.AssertionQuery, user *auth.UserState, opts *store.RefreshOptions) ([]store.SnapActionResult, []store.AssertionResult, error) {
sto.pokeStateLock()
if len(currentSnaps) != 0 || len(actions) != 0 {
panic("only assertion query supported")
}
toResolve, toResolveSeq, err := assertQuery.ToResolve()
if err != nil {
return nil, nil, err
}
if sto.snapActionErr != nil {
return nil, nil, sto.snapActionErr
}
sto.opts = opts
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, sto.maxDeclSupportedFormat)
defer restore()
restoreSeq := asserts.MockMaxSupportedFormat(asserts.ValidationSetType, sto.maxValidationSetSupportedFormat)
defer restoreSeq()
reqTypes := make(map[string]bool)
ares := make([]store.AssertionResult, 0, len(toResolve)+len(toResolveSeq))
for g, ats := range toResolve {
urls := make([]string, 0, len(ats))
for _, at := range ats {
reqTypes[at.Ref.Type.Name] = true
a, err := at.Ref.Resolve(sto.db.Find)
if err != nil {
assertQuery.AddError(err, &at.Ref)
continue
}
if a.Revision() > at.Revision {
urls = append(urls, fmt.Sprintf("/assertions/%s", at.Unique()))
}
}
ares = append(ares, store.AssertionResult{
Grouping: asserts.Grouping(g),
StreamURLs: urls,
})
}
for g, ats := range toResolveSeq {
urls := make([]string, 0, len(ats))
for _, at := range ats {
reqTypes[at.Type.Name] = true
var a asserts.Assertion
headers, err := asserts.HeadersFromSequenceKey(at.Type, at.SequenceKey)
if err != nil {
return nil, nil, err
}
if !at.Pinned {
a, err = sto.db.FindSequence(at.Type, headers, -1, asserts.ValidationSetType.MaxSupportedFormat())
} else {
a, err = at.Resolve(sto.db.Find)
}
if err != nil {
assertQuery.AddSequenceError(err, at)
continue
}
storeVs := a.(*asserts.ValidationSet)
if storeVs.Sequence() > at.Sequence || (storeVs.Sequence() == at.Sequence && storeVs.Revision() >= at.Revision) {
urls = append(urls, fmt.Sprintf("/assertions/%s/%s", a.Type().Name, strings.Join(a.At().PrimaryKey, "/")))
}
}
ares = append(ares, store.AssertionResult{
Grouping: asserts.Grouping(g),
StreamURLs: urls,
})
}
// behave like the actual SnapAction if there are no results
if len(ares) == 0 {
return nil, ares, &store.SnapActionError{
NoResults: true,
}
}
typeNames := make([]string, 0, len(reqTypes))
for k := range reqTypes {
typeNames = append(typeNames, k)
}
sort.Strings(typeNames)
sto.requestedTypes = append(sto.requestedTypes, typeNames)
return nil, ares, nil
}
func (sto *fakeStore) DownloadAssertions(urls []string, b *asserts.Batch, user *auth.UserState) error {
sto.pokeStateLock()
if sto.downloadAssertionsErr != nil {
return sto.downloadAssertionsErr
}
resolve := func(ref *asserts.Ref) (asserts.Assertion, error) {
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, sto.maxDeclSupportedFormat)
defer restore()
restoreSeq := asserts.MockMaxSupportedFormat(asserts.ValidationSetType, sto.maxValidationSetSupportedFormat)
defer restoreSeq()
return ref.Resolve(sto.db.Find)
}
for _, u := range urls {
comps := strings.Split(u, "/")
if len(comps) < 4 {
return fmt.Errorf("cannot use URL: %s", u)
}
assertType := asserts.Type(comps[2])
key := comps[3:]
ref := &asserts.Ref{Type: assertType, PrimaryKey: key}
a, err := resolve(ref)
if err != nil {
return err
}
if err := b.Add(a); err != nil {
return err
}
}
return nil
}
var (
dev1PrivKey, _ = assertstest.GenerateKey(752)
)
func (s *assertMgrSuite) SetUpTest(c *C) {
dirs.SetRootDir(c.MkDir())
s.storeSigning = assertstest.NewStoreStack("can0nical", nil)
s.AddCleanup(sysdb.InjectTrusted(s.storeSigning.Trusted))
s.dev1Acct = assertstest.NewAccount(s.storeSigning, "developer1", nil, "")
err := s.storeSigning.Add(s.dev1Acct)
c.Assert(err, IsNil)
// developer signing
s.dev1AcctKey = assertstest.NewAccountKey(s.storeSigning, s.dev1Acct, nil, dev1PrivKey.PublicKey(), "")
err = s.storeSigning.Add(s.dev1AcctKey)
c.Assert(err, IsNil)
s.dev1Signing = assertstest.NewSigningDB(s.dev1Acct.AccountID(), dev1PrivKey)
s.o = overlord.Mock()
s.state = s.o.State()
s.se = s.o.StateEngine()
mgr, err := assertstate.Manager(s.state, s.o.TaskRunner())
c.Assert(err, IsNil)
s.mgr = mgr
s.o.AddManager(s.mgr)
s.o.AddManager(s.o.TaskRunner())
s.fakeStore = &fakeStore{
state: s.state,
db: s.storeSigning,
// leave this comment to keep old gofmt happy
maxDeclSupportedFormat: asserts.SnapDeclarationType.MaxSupportedFormat(),
maxValidationSetSupportedFormat: asserts.ValidationSetType.MaxSupportedFormat(),
}
s.trivialDeviceCtx = &snapstatetest.TrivialDeviceContext{
CtxStore: s.fakeStore,
}
}
func (s *assertMgrSuite) TestDB(c *C) {
s.state.Lock()
defer s.state.Unlock()
db := assertstate.DB(s.state)
c.Check(db, FitsTypeOf, (*asserts.Database)(nil))
}
func (s *assertMgrSuite) TestAdd(c *C) {
s.state.Lock()
defer s.state.Unlock()
// prereq store key
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
db := assertstate.DB(s.state)
devAcct, err := db.Find(asserts.AccountType, map[string]string{
"account-id": s.dev1Acct.AccountID(),
})
c.Assert(err, IsNil)
c.Check(devAcct.(*asserts.Account).Username(), Equals, "developer1")
}
func (s *assertMgrSuite) TestAddBatch(c *C) {
s.state.Lock()
defer s.state.Unlock()
b := &bytes.Buffer{}
enc := asserts.NewEncoder(b)
// wrong order is ok
err := enc.Encode(s.dev1Acct)
c.Assert(err, IsNil)
enc.Encode(s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
batch := asserts.NewBatch(nil)
refs, err := batch.AddStream(b)
c.Assert(err, IsNil)
c.Check(refs, DeepEquals, []*asserts.Ref{
{Type: asserts.AccountType, PrimaryKey: []string{s.dev1Acct.AccountID()}},
{Type: asserts.AccountKeyType, PrimaryKey: []string{s.storeSigning.StoreAccountKey("").PublicKeyID()}},
})
// noop
err = batch.Add(s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.AddBatch(s.state, batch, nil)
c.Assert(err, IsNil)
db := assertstate.DB(s.state)
devAcct, err := db.Find(asserts.AccountType, map[string]string{
"account-id": s.dev1Acct.AccountID(),
})
c.Assert(err, IsNil)
c.Check(devAcct.(*asserts.Account).Username(), Equals, "developer1")
}
func (s *assertMgrSuite) TestAddBatchPartial(c *C) {
// Commit does add any successful assertion until the first error
s.state.Lock()
defer s.state.Unlock()
// store key already present
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
batch := asserts.NewBatch(nil)
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = batch.Add(snapDeclFoo)
c.Assert(err, IsNil)
err = batch.Add(s.dev1Acct)
c.Assert(err, IsNil)
// too old
rev := 1
headers := map[string]interface{}{
"snap-id": "foo-id",
"snap-sha3-384": makeDigest(rev),
"snap-size": fmt.Sprintf("%d", len(fakeSnap(rev))),
"snap-revision": fmt.Sprintf("%d", rev),
"developer-id": s.dev1Acct.AccountID(),
"timestamp": time.Time{}.Format(time.RFC3339),
}
snapRev, err := s.storeSigning.Sign(asserts.SnapRevisionType, headers, nil, "")
c.Assert(err, IsNil)
err = batch.Add(snapRev)
c.Assert(err, IsNil)
err = assertstate.AddBatch(s.state, batch, nil)
c.Check(err, ErrorMatches, `(?ms).*validity.*`)
// snap-declaration was added anyway
_, err = assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestAddBatchPrecheckPartial(c *C) {
s.state.Lock()
defer s.state.Unlock()
// store key already present
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
batch := asserts.NewBatch(nil)
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = batch.Add(snapDeclFoo)
c.Assert(err, IsNil)
err = batch.Add(s.dev1Acct)
c.Assert(err, IsNil)
// too old
rev := 1
headers := map[string]interface{}{
"snap-id": "foo-id",
"snap-sha3-384": makeDigest(rev),
"snap-size": fmt.Sprintf("%d", len(fakeSnap(rev))),
"snap-revision": fmt.Sprintf("%d", rev),
"developer-id": s.dev1Acct.AccountID(),
"timestamp": time.Time{}.Format(time.RFC3339),
}
snapRev, err := s.storeSigning.Sign(asserts.SnapRevisionType, headers, nil, "")
c.Assert(err, IsNil)
err = batch.Add(snapRev)
c.Assert(err, IsNil)
err = assertstate.AddBatch(s.state, batch, &asserts.CommitOptions{
Precheck: true,
})
c.Check(err, ErrorMatches, `(?ms).*validity.*`)
// nothing was added
_, err = assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
}
func (s *assertMgrSuite) TestAddBatchPrecheckHappy(c *C) {
s.state.Lock()
defer s.state.Unlock()
// store key already present
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
batch := asserts.NewBatch(nil)
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = batch.Add(snapDeclFoo)
c.Assert(err, IsNil)
err = batch.Add(s.dev1Acct)
c.Assert(err, IsNil)
rev := 1
revDigest := makeDigest(rev)
headers := map[string]interface{}{
"snap-id": "foo-id",
"snap-sha3-384": revDigest,
"snap-size": fmt.Sprintf("%d", len(fakeSnap(rev))),
"snap-revision": fmt.Sprintf("%d", rev),
"developer-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
}
snapRev, err := s.storeSigning.Sign(asserts.SnapRevisionType, headers, nil, "")
c.Assert(err, IsNil)
err = batch.Add(snapRev)
c.Assert(err, IsNil)
err = assertstate.AddBatch(s.state, batch, &asserts.CommitOptions{
Precheck: true,
})
c.Assert(err, IsNil)
_, err = assertstate.DB(s.state).Find(asserts.SnapRevisionType, map[string]string{
"snap-sha3-384": revDigest,
})
c.Check(err, IsNil)
}
func fakeSnap(rev int) []byte {
fake := fmt.Sprintf("hsqs________________%d", rev)
return []byte(fake)
}
func fakeHash(rev int) []byte {
h := sha3.Sum384(fakeSnap(rev))
return h[:]
}
func makeDigest(rev int) string {
d, err := asserts.EncodeDigest(crypto.SHA3_384, fakeHash(rev))
if err != nil {
panic(err)
}
return string(d)
}
func (s *assertMgrSuite) makeTestSnap(c *C, r int, extra string) string {
yaml := `name: foo
version: %d
%s
`
yaml = fmt.Sprintf(yaml, r, extra)
return snaptest.MakeTestSnapWithFiles(c, yaml, nil)
}
func (s *assertMgrSuite) prereqSnapAssertions(c *C, revisions ...int) (paths map[int]string, digests map[int]string) {
headers := map[string]interface{}{
"series": "16",
"snap-id": "snap-id-1",
"snap-name": "foo",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
}
snapDecl, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDecl)
c.Assert(err, IsNil)
paths = make(map[int]string)
digests = make(map[int]string)
for _, rev := range revisions {
snapPath := s.makeTestSnap(c, rev, "")
digest, sz, err := asserts.SnapFileSHA3_384(snapPath)
c.Assert(err, IsNil)
paths[rev] = snapPath
digests[rev] = digest
headers = map[string]interface{}{
"snap-id": "snap-id-1",
"snap-sha3-384": digest,
"snap-size": fmt.Sprintf("%d", sz),
"snap-revision": fmt.Sprintf("%d", rev),
"developer-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
}
snapRev, err := s.storeSigning.Sign(asserts.SnapRevisionType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapRev)
c.Assert(err, IsNil)
}
return paths, digests
}
func (s *assertMgrSuite) TestDoFetch(c *C) {
_, digests := s.prereqSnapAssertions(c, 10)
s.state.Lock()
defer s.state.Unlock()
ref := &asserts.Ref{
Type: asserts.SnapRevisionType,
PrimaryKey: []string{digests[10]},
}
err := assertstate.DoFetch(s.state, 0, s.trivialDeviceCtx, nil, func(f asserts.Fetcher) error {
return f.Fetch(ref)
})
c.Assert(err, IsNil)
snapRev, err := ref.Resolve(assertstate.DB(s.state).Find)
c.Assert(err, IsNil)
c.Check(snapRev.(*asserts.SnapRevision).SnapRevision(), Equals, 10)
}
func (s *assertMgrSuite) TestFetchIdempotent(c *C) {
_, digests := s.prereqSnapAssertions(c, 10, 11)
s.state.Lock()
defer s.state.Unlock()
ref := &asserts.Ref{
Type: asserts.SnapRevisionType,
PrimaryKey: []string{digests[10]},
}
fetching := func(f asserts.Fetcher) error {
return f.Fetch(ref)
}
err := assertstate.DoFetch(s.state, 0, s.trivialDeviceCtx, nil, fetching)
c.Assert(err, IsNil)
ref = &asserts.Ref{
Type: asserts.SnapRevisionType,
PrimaryKey: []string{digests[11]},
}
err = assertstate.DoFetch(s.state, 0, s.trivialDeviceCtx, nil, fetching)
c.Assert(err, IsNil)
snapRev, err := ref.Resolve(assertstate.DB(s.state).Find)
c.Assert(err, IsNil)
c.Check(snapRev.(*asserts.SnapRevision).SnapRevision(), Equals, 11)
}
func (s *assertMgrSuite) settle(c *C) {
err := s.o.Settle(5 * time.Second)
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestFetchUnsupportedUpdateIgnored(c *C) {
// ATM in principle we ignore updated assertions with unsupported formats
// NB: this scenario can only happen if there is a bug
// we ask the store to filter what is returned by max supported format!
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, 111)
defer restore()
logbuf, restore := logger.MockLogger()
defer restore()
snapDeclFoo0 := s.snapDecl(c, "foo", nil)
s.state.Lock()
defer s.state.Unlock()
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo0)
c.Assert(err, IsNil)
var snapDeclFoo1 *asserts.SnapDeclaration
(func() {
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, 999)
defer restore()
snapDeclFoo1 = s.snapDecl(c, "foo", map[string]interface{}{
"format": "999",
"revision": "1",
})
})()
c.Check(snapDeclFoo1.Revision(), Equals, 1)
ref := &asserts.Ref{
Type: asserts.SnapDeclarationType,
PrimaryKey: []string{"16", "foo-id"},
}
fetching := func(f asserts.Fetcher) error {
return f.Fetch(ref)
}
s.fakeStore.(*fakeStore).maxDeclSupportedFormat = 999
err = assertstate.DoFetch(s.state, 0, s.trivialDeviceCtx, nil, fetching)
// no error and the old one was kept
c.Assert(err, IsNil)
snapDecl, err := ref.Resolve(assertstate.DB(s.state).Find)
c.Assert(err, IsNil)
c.Check(snapDecl.Revision(), Equals, 0)
// we log the issue
c.Check(logbuf.String(), testutil.Contains, `Cannot update assertion snap-declaration (foo-id;`)
}
func (s *assertMgrSuite) TestFetchUnsupportedError(c *C) {
// NB: this scenario can only happen if there is a bug
// we ask the store to filter what is returned by max supported format!
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, 111)
defer restore()
s.state.Lock()
defer s.state.Unlock()
var snapDeclFoo1 *asserts.SnapDeclaration
(func() {
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, 999)
defer restore()
snapDeclFoo1 = s.snapDecl(c, "foo", map[string]interface{}{
"format": "999",
"revision": "1",
})
})()
c.Check(snapDeclFoo1.Revision(), Equals, 1)
ref := &asserts.Ref{
Type: asserts.SnapDeclarationType,
PrimaryKey: []string{"16", "foo-id"},
}
fetching := func(f asserts.Fetcher) error {
return f.Fetch(ref)
}
s.fakeStore.(*fakeStore).maxDeclSupportedFormat = 999
err := assertstate.DoFetch(s.state, 0, s.trivialDeviceCtx, nil, fetching)
c.Check(err, ErrorMatches, `(?s).*proposed "snap-declaration" assertion has format 999 but 111 is latest supported.*`)
}
func (s *assertMgrSuite) setModel(model *asserts.Model) {
deviceCtx := &snapstatetest.TrivialDeviceContext{
DeviceModel: model,
CtxStore: s.fakeStore,
}
s.AddCleanup(snapstatetest.MockDeviceContext(deviceCtx))
s.state.Set("seeded", true)
}
func (s *assertMgrSuite) setupModelAndStore(c *C) *asserts.Store {
// setup a model and store assertion
a := assertstest.FakeAssertion(map[string]interface{}{
"type": "model",
"authority-id": "my-brand",
"series": "16",
"brand-id": "my-brand",
"model": "my-model",
"architecture": "amd64",
"store": "my-brand-store",
"gadget": "gadget",
"kernel": "krnl",
})
s.setModel(a.(*asserts.Model))
a, err := s.storeSigning.Sign(asserts.StoreType, map[string]interface{}{
"authority-id": s.storeSigning.AuthorityID,
"operator-id": s.storeSigning.AuthorityID,
"store": "my-brand-store",
"timestamp": time.Now().Format(time.RFC3339),
}, nil, "")
c.Assert(err, IsNil)
return a.(*asserts.Store)
}
func (s *assertMgrSuite) TestValidateSnap(c *C) {
paths, digests := s.prereqSnapAssertions(c, 10)
snapPath := paths[10]
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
chg := s.state.NewChange("install", "...")
t := s.state.NewTask("validate-snap", "Fetch and check snap assertions")
snapsup := snapstate.SnapSetup{
SnapPath: snapPath,
UserID: 0,
SideInfo: &snap.SideInfo{
RealName: "foo",
SnapID: "snap-id-1",
Revision: snap.R(10),
},
}
t.Set("snap-setup", snapsup)
chg.AddTask(t)
s.state.Unlock()
defer s.se.Stop()
s.settle(c)
s.state.Lock()
c.Assert(chg.Err(), IsNil)
snapRev, err := assertstate.DB(s.state).Find(asserts.SnapRevisionType, map[string]string{
"snap-id": "snap-id-1",
"snap-sha3-384": digests[10],
})
c.Assert(err, IsNil)
c.Check(snapRev.(*asserts.SnapRevision).SnapRevision(), Equals, 10)
// store assertion was also fetched
_, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestValidateSnapStoreNotFound(c *C) {
paths, digests := s.prereqSnapAssertions(c, 10)
snapPath := paths[10]
s.state.Lock()
defer s.state.Unlock()
// have a model and store but store assertion is not made available
s.setupModelAndStore(c)
chg := s.state.NewChange("install", "...")
t := s.state.NewTask("validate-snap", "Fetch and check snap assertions")
snapsup := snapstate.SnapSetup{
SnapPath: snapPath,
UserID: 0,
SideInfo: &snap.SideInfo{
RealName: "foo",
SnapID: "snap-id-1",
Revision: snap.R(10),
},
}
t.Set("snap-setup", snapsup)
chg.AddTask(t)
s.state.Unlock()
defer s.se.Stop()
s.settle(c)
s.state.Lock()
c.Assert(chg.Err(), IsNil)
snapRev, err := assertstate.DB(s.state).Find(asserts.SnapRevisionType, map[string]string{
"snap-id": "snap-id-1",
"snap-sha3-384": digests[10],
})
c.Assert(err, IsNil)
c.Check(snapRev.(*asserts.SnapRevision).SnapRevision(), Equals, 10)
// store assertion was not found and ignored
_, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
}
func (s *assertMgrSuite) TestValidateSnapMissingSnapSetup(c *C) {
s.state.Lock()
defer s.state.Unlock()
chg := s.state.NewChange("install", "...")
t := s.state.NewTask("validate-snap", "Fetch and check snap assertions")
chg.AddTask(t)
s.state.Unlock()
defer s.se.Stop()
s.settle(c)
s.state.Lock()
c.Assert(chg.Err(), ErrorMatches, `(?s).*internal error: cannot obtain snap setup: no state entry for key.*`)
}
func (s *assertMgrSuite) TestValidateSnapNotFound(c *C) {
snapPath := s.makeTestSnap(c, 33, "")
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
chg := s.state.NewChange("install", "...")
t := s.state.NewTask("validate-snap", "Fetch and check snap assertions")
snapsup := snapstate.SnapSetup{
SnapPath: snapPath,
UserID: 0,
SideInfo: &snap.SideInfo{
RealName: "foo",
SnapID: "snap-id-1",
Revision: snap.R(33),
},
}
t.Set("snap-setup", snapsup)
chg.AddTask(t)
s.state.Unlock()
defer s.se.Stop()
s.settle(c)
s.state.Lock()
c.Assert(chg.Err(), ErrorMatches, `(?s).*cannot verify snap "foo", no matching signatures found.*`)
}
func (s *assertMgrSuite) TestValidateSnapCrossCheckFail(c *C) {
paths, _ := s.prereqSnapAssertions(c, 10)
snapPath := paths[10]
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
chg := s.state.NewChange("install", "...")
t := s.state.NewTask("validate-snap", "Fetch and check snap assertions")
snapsup := snapstate.SnapSetup{
SnapPath: snapPath,
UserID: 0,
SideInfo: &snap.SideInfo{
RealName: "f",
SnapID: "snap-id-1",
Revision: snap.R(10),
},
}
t.Set("snap-setup", snapsup)
chg.AddTask(t)
s.state.Unlock()
defer s.se.Stop()
s.settle(c)
s.state.Lock()
c.Assert(chg.Err(), ErrorMatches, `(?s).*cannot install "f", snap "f" is undergoing a rename to "foo".*`)
}
func (s *assertMgrSuite) TestValidateDelegatedSnap(c *C) {
snapPath := s.makeTestSnap(c, 10, `provenance: delegated-prov`)
digest, sz, err := asserts.SnapFileSHA3_384(snapPath)
c.Assert(err, IsNil)
headers := map[string]interface{}{
"series": "16",
"snap-id": "snap-id-1",
"snap-name": "foo",
"publisher-id": s.dev1Acct.AccountID(),
"revision-authority": []interface{}{
map[string]interface{}{
"account-id": s.dev1Acct.AccountID(),
"provenance": []interface{}{"delegated-prov"},
"on-store": []interface{}{"my-brand-store"},
"on-model": []interface{}{"my-brand/my-model"},
},
},
"timestamp": time.Now().Format(time.RFC3339),
}
snapDecl, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDecl)
c.Assert(err, IsNil)
headers = map[string]interface{}{
"authority-id": s.dev1Acct.AccountID(),
"series": "16",
"snap-id": "snap-id-1",
"snap-sha3-384": digest,
"provenance": "delegated-prov",
"snap-size": fmt.Sprintf("%d", sz),
"snap-revision": "10",
"developer-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
}
snapRev, err := s.dev1Signing.Sign(asserts.SnapRevisionType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapRev)
c.Assert(err, IsNil)
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err = s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
chg := s.state.NewChange("install", "...")
t := s.state.NewTask("validate-snap", "Fetch and check snap assertions")
snapsup := snapstate.SnapSetup{
SnapPath: snapPath,
UserID: 0,
SideInfo: &snap.SideInfo{
RealName: "foo",
SnapID: "snap-id-1",
Revision: snap.R(10),
},
ExpectedProvenance: "delegated-prov",
}
t.Set("snap-setup", snapsup)
chg.AddTask(t)
s.state.Unlock()
defer s.se.Stop()
s.settle(c)
s.state.Lock()
c.Assert(chg.Err(), IsNil)
snapRev1, err := assertstate.DB(s.state).Find(asserts.SnapRevisionType, map[string]string{
"snap-id": "snap-id-1",
"snap-sha3-384": digest,
"provenance": "delegated-prov",
})
c.Assert(err, IsNil)
c.Check(snapRev1.(*asserts.SnapRevision).SnapRevision(), Equals, 10)
// store assertion was also fetched
_, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestValidateDelegatedSnapProvenanceMismatch(c *C) {
err := s.testValidateDelegatedSnapMismatch(c, `provenance: delegated-prov-other`, "delegated-prov-other", "delegated-prov", map[string]interface{}{
"account-id": s.dev1Acct.AccountID(),
"provenance": []interface{}{"delegated-prov"},
})
c.Check(err, ErrorMatches, `(?s).*cannot verify snap "foo", no matching signatures found.*`)
}
func (s *assertMgrSuite) TestValidateDelegatedSnapStoreProvenanceMismatch(c *C) {
// this is a scenario where a store is serving information matching
// the assertions which themselves don't match the snap
err := s.testValidateDelegatedSnapMismatch(c, `provenance: delegated-prov-other`, "delegated-prov", "delegated-prov", map[string]interface{}{
"account-id": s.dev1Acct.AccountID(),
"provenance": []interface{}{"delegated-prov"},
})
c.Check(err, ErrorMatches, `(?s).*snap ".*foo.*\.snap" has been signed under provenance "delegated-prov" different from the metadata one: "delegated-prov-other".*`)
}
func (s *assertMgrSuite) testValidateDelegatedSnapMismatch(c *C, provenanceFrag, expectedProv, revProvenance string, revisionAuthority map[string]interface{}) error {
snapPath := s.makeTestSnap(c, 10, provenanceFrag)
digest, sz, err := asserts.SnapFileSHA3_384(snapPath)
c.Assert(err, IsNil)
headers := map[string]interface{}{
"series": "16",
"snap-id": "snap-id-1",
"snap-name": "foo",
"publisher-id": s.dev1Acct.AccountID(),
"revision-authority": []interface{}{
revisionAuthority,
},
"timestamp": time.Now().Format(time.RFC3339),
}
snapDecl, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDecl)
c.Assert(err, IsNil)
headers = map[string]interface{}{
"authority-id": s.dev1Acct.AccountID(),
"series": "16",
"snap-id": "snap-id-1",
"snap-sha3-384": digest,
"snap-size": fmt.Sprintf("%d", sz),
"snap-revision": "10",
"developer-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
}
if revProvenance != "" {
headers["provenance"] = revProvenance
}
snapRev, err := s.dev1Signing.Sign(asserts.SnapRevisionType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapRev)
c.Assert(err, IsNil)
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err = s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
chg := s.state.NewChange("install", "...")
t := s.state.NewTask("validate-snap", "Fetch and check snap assertions")
snapsup := snapstate.SnapSetup{
SnapPath: snapPath,
UserID: 0,
SideInfo: &snap.SideInfo{
RealName: "foo",
SnapID: "snap-id-1",
Revision: snap.R(10),
},
ExpectedProvenance: expectedProv,
}
t.Set("snap-setup", snapsup)
chg.AddTask(t)
s.state.Unlock()
defer s.se.Stop()
s.settle(c)
s.state.Lock()
return chg.Err()
}
func (s *assertMgrSuite) TestValidateDelegatedSnapDeviceMismatch(c *C) {
err := s.testValidateDelegatedSnapMismatch(c, `provenance: delegated-prov`, "delegated-prov", "delegated-prov", map[string]interface{}{
"account-id": s.dev1Acct.AccountID(),
"provenance": []interface{}{"delegated-prov"},
"on-store": []interface{}{"other-store"},
})
c.Check(err, ErrorMatches, `(?s).*snap "foo" revision assertion with provenance "delegated-prov" is not signed by an authority authorized on this device: .*`)
}
func (s *assertMgrSuite) TestValidateDelegatedSnapDefaultProvenanceMismatch(c *C) {
err := s.testValidateDelegatedSnapMismatch(c, "", "", "delegated-prov", map[string]interface{}{
"account-id": s.dev1Acct.AccountID(),
"provenance": []interface{}{"delegated-prov"},
"on-store": []interface{}{"my-brand-store"},
})
c.Check(err, ErrorMatches, `(?s).*cannot verify snap "foo", no matching signatures found.*`)
}
func (s *assertMgrSuite) validationSetAssert(c *C, name, sequence, revision string, snapPresence, requiredRevision string) *asserts.ValidationSet {
snaps := []interface{}{map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "foo",
"presence": snapPresence,
}}
if requiredRevision != "" {
snaps[0].(map[string]interface{})["revision"] = requiredRevision
}
return s.validationSetAssertForSnaps(c, name, sequence, revision, snaps)
}
func (s *assertMgrSuite) validationSetAssertForSnaps(c *C, name, sequence, revision string, snaps []interface{}) *asserts.ValidationSet {
headers := map[string]interface{}{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"authority-id": s.dev1Acct.AccountID(),
"publisher-id": s.dev1Acct.AccountID(),
"name": name,
"sequence": sequence,
"snaps": snaps,
"timestamp": time.Now().Format(time.RFC3339),
"revision": revision,
}
a, err := s.dev1Signing.Sign(asserts.ValidationSetType, headers, nil, "")
c.Assert(err, IsNil)
return a.(*asserts.ValidationSet)
}
func (s *assertMgrSuite) snapDecl(c *C, name string, extraHeaders map[string]interface{}) *asserts.SnapDeclaration {
headers := map[string]interface{}{
"series": "16",
"snap-id": name + "-id",
"snap-name": name,
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
}
for h, v := range extraHeaders {
headers[h] = v
}
decl, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(decl)
c.Assert(err, IsNil)
return decl.(*asserts.SnapDeclaration)
}
func (s *assertMgrSuite) stateFromDecl(c *C, decl *asserts.SnapDeclaration, instanceName string, revno snap.Revision) {
snapName, instanceKey := snap.SplitInstanceName(instanceName)
if snapName == "" {
snapName = decl.SnapName()
instanceName = snapName
}
c.Assert(snapName, Equals, decl.SnapName())
snapID := decl.SnapID()
snapstate.Set(s.state, instanceName, &snapstate.SnapState{
Active: true,
Sequence: []*snap.SideInfo{
{RealName: snapName, SnapID: snapID, Revision: revno},
},
Current: revno,
InstanceKey: instanceKey,
})
}
func (s *assertMgrSuite) TestRefreshAssertionsRefreshSnapDeclarationsAndValidationSets(c *C) {
s.state.Lock()
defer s.state.Unlock()
storeAs := s.setupModelAndStore(c)
snapDeclFoo := s.snapDecl(c, "foo", nil)
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
c.Assert(s.storeSigning.Add(storeAs), IsNil)
// previous state
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, snapDeclFoo), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
// changed snap decl assertion
headers := map[string]interface{}{
"series": "16",
"snap-id": "foo-id",
"snap-name": "fo-o",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "1",
}
snapDeclFoo1, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFoo1)
c.Assert(err, IsNil)
// changed validation set assertion
vsetAs2 := s.validationSetAssert(c, "bar", "2", "3", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
err = assertstate.RefreshSnapAssertions(s.state, 0, &assertstate.RefreshAssertionsOptions{IsRefreshOfAllSnaps: true})
c.Assert(err, IsNil)
a, err := assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.SnapDeclaration).SnapName(), Equals, "fo-o")
a, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(a.Revision(), Equals, 3)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
// changed validation set assertion again
vsetAs3 := s.validationSetAssert(c, "bar", "4", "5", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs3), IsNil)
// but pretend it's not a refresh of all snaps
err = assertstate.RefreshSnapAssertions(s.state, 0, &assertstate.RefreshAssertionsOptions{IsRefreshOfAllSnaps: false})
c.Assert(err, IsNil)
// so the assertion is not updated
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "4",
})
c.Check(asserts.IsNotFound(err), Equals, true)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsTooEarly(c *C) {
s.state.Lock()
defer s.state.Unlock()
r := snapstatetest.MockDeviceModel(nil)
defer r()
err := assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Check(err, FitsTypeOf, &snapstate.ChangeConflictError{})
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsNop(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
err := assertstate.RefreshSnapDeclarations(s.state, 0, &assertstate.RefreshAssertionsOptions{IsAutoRefresh: true})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, true)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsNoStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", nil)
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
snapstate.Set(s.state, "local", &snapstate.SnapState{
Active: false,
Sequence: []*snap.SideInfo{
{RealName: "local", Revision: snap.R(-1)},
},
Current: snap.R(-1),
})
// previous state
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
// one changed assertion
headers := map[string]interface{}{
"series": "16",
"snap-id": "foo-id",
"snap-name": "fo-o",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "1",
}
snapDeclFoo1, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFoo1)
c.Assert(err, IsNil)
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, IsNil)
a, err := assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.SnapDeclaration).SnapName(), Equals, "fo-o")
// another one
// one changed assertion
headers = s.dev1Acct.Headers()
headers["display-name"] = "Dev 1 edited display-name"
headers["revision"] = "1"
dev1Acct1, err := s.storeSigning.Sign(asserts.AccountType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(dev1Acct1)
c.Assert(err, IsNil)
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, IsNil)
a, err = assertstate.DB(s.state).Find(asserts.AccountType, map[string]string{
"account-id": s.dev1Acct.AccountID(),
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.Account).DisplayName(), Equals, "Dev 1 edited display-name")
// change snap decl to something that has a too new format
s.fakeStore.(*fakeStore).maxDeclSupportedFormat = 999
(func() {
restore := asserts.MockMaxSupportedFormat(asserts.SnapDeclarationType, 999)
defer restore()
headers := map[string]interface{}{
"format": "999",
"series": "16",
"snap-id": "foo-id",
"snap-name": "foo",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "2",
}
snapDeclFoo2, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFoo2)
c.Assert(err, IsNil)
})()
// no error, kept the old one
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, IsNil)
a, err = assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.SnapDeclaration).SnapName(), Equals, "fo-o")
c.Check(a.(*asserts.SnapDeclaration).Revision(), Equals, 1)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsChangingKey(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
snapDeclFoo := s.snapDecl(c, "foo", nil)
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
// previous state
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
storePrivKey2, _ := assertstest.GenerateKey(752)
err = s.storeSigning.ImportKey(storePrivKey2)
c.Assert(err, IsNil)
storeKey2 := assertstest.NewAccountKey(s.storeSigning.RootSigning, s.storeSigning.TrustedAccount, map[string]interface{}{
"name": "store2",
}, storePrivKey2.PublicKey(), "")
err = s.storeSigning.Add(storeKey2)
c.Assert(err, IsNil)
// one changed assertion signed with different key
headers := map[string]interface{}{
"series": "16",
"snap-id": "foo-id",
"snap-name": "foo",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "1",
}
storeKey2ID := storePrivKey2.PublicKey().ID()
snapDeclFoo1, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, storeKey2ID)
c.Assert(err, IsNil)
c.Check(snapDeclFoo1.SignKeyID(), Not(Equals), snapDeclFoo.SignKeyID())
err = s.storeSigning.Add(snapDeclFoo1)
c.Assert(err, IsNil)
_, err = storeKey2.Ref().Resolve(assertstate.DB(s.state).Find)
c.Check(asserts.IsNotFound(err), Equals, true)
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, IsNil)
a, err := assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(err, IsNil)
c.Check(a.Revision(), Equals, 1)
c.Check(a.SignKeyID(), Equals, storeKey2ID)
// key was fetched as well
_, err = storeKey2.Ref().Resolve(assertstate.DB(s.state).Find)
c.Check(err, IsNil)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsWithStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
storeAs := s.setupModelAndStore(c)
snapDeclFoo := s.snapDecl(c, "foo", nil)
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
// previous state
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
// one changed assertion
headers := map[string]interface{}{
"series": "16",
"snap-id": "foo-id",
"snap-name": "fo-o",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "1",
}
snapDeclFoo1, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFoo1)
c.Assert(err, IsNil)
// store assertion is missing
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, IsNil)
a, err := assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.SnapDeclaration).SnapName(), Equals, "fo-o")
// changed again
headers = map[string]interface{}{
"series": "16",
"snap-id": "foo-id",
"snap-name": "f-oo",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "2",
}
snapDeclFoo2, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFoo2)
c.Assert(err, IsNil)
// store assertion is available
err = s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, IsNil)
a, err = assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": "foo-id",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.SnapDeclaration).SnapName(), Equals, "f-oo")
_, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(err, IsNil)
// store assertion has changed
a, err = s.storeSigning.Sign(asserts.StoreType, map[string]interface{}{
"authority-id": s.storeSigning.AuthorityID,
"operator-id": s.storeSigning.AuthorityID,
"store": "my-brand-store",
"location": "the-cloud",
"revision": "1",
"timestamp": time.Now().Format(time.RFC3339),
}, nil, "")
c.Assert(err, IsNil)
storeAs = a.(*asserts.Store)
err = s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, IsNil)
a, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.Store).Location(), Equals, "the-cloud")
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsDownloadError(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
snapDeclFoo := s.snapDecl(c, "foo", nil)
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
// previous state
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
// one changed assertion
headers := map[string]interface{}{
"series": "16",
"snap-id": "foo-id",
"snap-name": "fo-o",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "1",
}
snapDeclFoo1, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFoo1)
c.Assert(err, IsNil)
s.fakeStore.(*fakeStore).downloadAssertionsErr = errors.New("download error")
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, ErrorMatches, `cannot refresh snap-declarations for snaps:
- foo: download error`)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsPersistentNetworkError(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
snapDeclFoo := s.snapDecl(c, "foo", nil)
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
// previous state
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
// one changed assertion
headers := map[string]interface{}{
"series": "16",
"snap-id": "foo-id",
"snap-name": "fo-o",
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "1",
}
snapDeclFoo1, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFoo1)
c.Assert(err, IsNil)
pne := new(httputil.PersistentNetworkError)
s.fakeStore.(*fakeStore).snapActionErr = pne
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
c.Assert(err, Equals, pne)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsNoStoreFallback(c *C) {
// test that if we get a 4xx or 500 error from the store trying bulk
// assertion refresh we fall back to the old logic
s.fakeStore.(*fakeStore).snapActionErr = &store.UnexpectedHTTPStatusError{StatusCode: 400}
logbuf, restore := logger.MockLogger()
defer restore()
s.TestRefreshSnapDeclarationsNoStore(c)
c.Check(logbuf.String(), Matches, "(?m).*bulk refresh of snap-declarations failed, falling back to one-by-one assertion fetching:.*HTTP status code 400.*")
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsNoStoreFallbackUnexpectedSnapActionError(c *C) {
// test that if we get an unexpected SnapAction error from the
// store trying bulk assertion refresh we fall back to the old
// logic
s.fakeStore.(*fakeStore).snapActionErr = &store.SnapActionError{
NoResults: true,
Other: []error{errors.New("unexpected error")},
}
logbuf, restore := logger.MockLogger()
defer restore()
s.TestRefreshSnapDeclarationsNoStore(c)
c.Check(logbuf.String(), Matches, "(?m).*bulk refresh of snap-declarations failed, falling back to one-by-one assertion fetching:.*unexpected error.*")
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsWithStoreFallback(c *C) {
// test that if we get a 4xx or 500 error from the store trying bulk
// assertion refresh we fall back to the old logic
s.fakeStore.(*fakeStore).snapActionErr = &store.UnexpectedHTTPStatusError{StatusCode: 500}
logbuf, restore := logger.MockLogger()
defer restore()
s.TestRefreshSnapDeclarationsWithStore(c)
c.Check(logbuf.String(), Matches, "(?m).*bulk refresh of snap-declarations failed, falling back to one-by-one assertion fetching:.*HTTP status code 500.*")
}
// the following tests cover what happens when refreshing snap-declarations
// need to support overflowing the chosen asserts.Pool maximum groups
func (s *assertMgrSuite) testRefreshSnapDeclarationsMany(c *C, n int) error {
// reduce maxGroups to test and stress the logic that deals
// with overflowing it
s.AddCleanup(assertstate.MockMaxGroups(16))
// previous state
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
for i := 1; i <= n; i++ {
name := fmt.Sprintf("foo%d", i)
snapDeclFooX := s.snapDecl(c, name, nil)
s.stateFromDecl(c, snapDeclFooX, "", snap.R(7+i))
// previous state
err = assertstate.Add(s.state, snapDeclFooX)
c.Assert(err, IsNil)
// make an update on top
headers := map[string]interface{}{
"series": "16",
"snap-id": name + "-id",
"snap-name": fmt.Sprintf("fo-o-%d", i),
"publisher-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
"revision": "1",
}
snapDeclFooX1, err := s.storeSigning.Sign(asserts.SnapDeclarationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(snapDeclFooX1)
c.Assert(err, IsNil)
}
err = assertstate.RefreshSnapDeclarations(s.state, 0, nil)
if err != nil {
// fot the caller to check
return err
}
// check we got the updates
for i := 1; i <= n; i++ {
name := fmt.Sprintf("foo%d", i)
a, err := assertstate.DB(s.state).Find(asserts.SnapDeclarationType, map[string]string{
"series": "16",
"snap-id": name + "-id",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.SnapDeclaration).SnapName(), Equals, fmt.Sprintf("fo-o-%d", i))
}
return nil
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsMany14NoStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
err := s.testRefreshSnapDeclarationsMany(c, 14)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "snap-declaration"},
})
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsMany16NoStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
err := s.testRefreshSnapDeclarationsMany(c, 16)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "snap-declaration"},
})
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsMany16WithStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
err = s.testRefreshSnapDeclarationsMany(c, 16)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
// first 16 groups request
{"account", "account-key", "snap-declaration"},
// final separate request covering store only
{"store"},
})
// store assertion was also fetched
_, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsMany17NoStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
err := s.testRefreshSnapDeclarationsMany(c, 17)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
// first 16 groups request
{"account", "account-key", "snap-declaration"},
// final separate request for the rest
{"snap-declaration"},
})
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsMany17NoStoreMergeErrors(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
s.fakeStore.(*fakeStore).downloadAssertionsErr = errors.New("download error")
err := s.testRefreshSnapDeclarationsMany(c, 17)
c.Check(err, ErrorMatches, `(?s)cannot refresh snap-declarations for snaps:
- foo1: download error.* - foo9: download error`)
// all foo* snaps accounted for
c.Check(strings.Count(err.Error(), "foo"), Equals, 17)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
// first 16 groups request
{"account", "account-key", "snap-declaration"},
// final separate request for the rest
{"snap-declaration"},
})
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsMany31WithStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
err = s.testRefreshSnapDeclarationsMany(c, 31)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
// first 16 groups request
{"account", "account-key", "snap-declaration"},
// final separate request for the rest and store
{"snap-declaration", "store"},
})
// store assertion was also fetched
_, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestRefreshSnapDeclarationsMany32WithStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
err = s.testRefreshSnapDeclarationsMany(c, 32)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
// first 16 groups request
{"account", "account-key", "snap-declaration"},
// 2nd round request
{"snap-declaration"},
// final separate request covering store
{"store"},
})
// store assertion was also fetched
_, err = assertstate.DB(s.state).Find(asserts.StoreType, map[string]string{
"store": "my-brand-store",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestValidateRefreshesNothing(c *C) {
s.state.Lock()
defer s.state.Unlock()
validated, err := assertstate.ValidateRefreshes(s.state, nil, nil, 0, s.trivialDeviceCtx)
c.Assert(err, IsNil)
c.Check(validated, HasLen, 0)
}
func (s *assertMgrSuite) TestValidateRefreshesNoControl(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", nil)
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
fooRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooRefresh}, nil, 0, s.trivialDeviceCtx)
c.Assert(err, IsNil)
c.Check(validated, DeepEquals, []*snap.Info{fooRefresh})
}
func (s *assertMgrSuite) TestValidateRefreshesMissingValidation(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
fooRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooRefresh}, nil, 0, s.trivialDeviceCtx)
c.Assert(err, ErrorMatches, `cannot refresh "foo" to revision 9: no validation by "bar"`)
c.Check(validated, HasLen, 0)
}
func (s *assertMgrSuite) TestParallelInstanceValidateRefreshesMissingValidation(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclFoo, "foo_instance", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
fooInstanceRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
InstanceKey: "instance",
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooInstanceRefresh}, nil, 0, s.trivialDeviceCtx)
c.Assert(err, ErrorMatches, `cannot refresh "foo_instance" to revision 9: no validation by "bar"`)
c.Check(validated, HasLen, 0)
}
func (s *assertMgrSuite) TestValidateRefreshesMissingValidationButIgnore(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
fooRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooRefresh}, map[string]bool{"foo": true}, 0, s.trivialDeviceCtx)
c.Assert(err, IsNil)
c.Check(validated, DeepEquals, []*snap.Info{fooRefresh})
}
func (s *assertMgrSuite) TestParallelInstanceValidateRefreshesMissingValidationButIgnore(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclFoo, "foo_instance", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
fooRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
}
fooInstanceRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
InstanceKey: "instance",
}
// validation is ignore for foo_instance but not for foo
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooRefresh, fooInstanceRefresh}, map[string]bool{"foo_instance": true}, 0, s.trivialDeviceCtx)
c.Assert(err, ErrorMatches, `cannot refresh "foo" to revision 9: no validation by "bar"`)
c.Check(validated, DeepEquals, []*snap.Info{fooInstanceRefresh})
}
func (s *assertMgrSuite) TestParallelInstanceValidateRefreshesMissingValidationButIgnoreInstanceKeyed(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "foo_instance", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
fooInstanceRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
InstanceKey: "instance",
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooInstanceRefresh}, map[string]bool{"foo_instance": true}, 0, s.trivialDeviceCtx)
c.Assert(err, IsNil)
c.Check(validated, DeepEquals, []*snap.Info{fooInstanceRefresh})
}
func (s *assertMgrSuite) TestParallelInstanceValidateRefreshesMissingValidationButIgnoreBothOneIgnored(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclFoo, "foo_instance", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
fooRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
}
fooInstanceRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
InstanceKey: "instance",
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooRefresh, fooInstanceRefresh}, map[string]bool{"foo_instance": true}, 0, s.trivialDeviceCtx)
c.Assert(err, ErrorMatches, `cannot refresh "foo" to revision 9: no validation by "bar"`)
c.Check(validated, DeepEquals, []*snap.Info{fooInstanceRefresh})
}
func (s *assertMgrSuite) TestValidateRefreshesValidationOK(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
snapDeclBaz := s.snapDecl(c, "baz", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclFoo, "foo_instance", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
s.stateFromDecl(c, snapDeclBaz, "", snap.R(1))
snapstate.Set(s.state, "local", &snapstate.SnapState{
Active: false,
Sequence: []*snap.SideInfo{
{RealName: "local", Revision: snap.R(-1)},
},
Current: snap.R(-1),
})
// validation by bar
headers := map[string]interface{}{
"series": "16",
"snap-id": "bar-id",
"approved-snap-id": "foo-id",
"approved-snap-revision": "9",
"timestamp": time.Now().Format(time.RFC3339),
}
barValidation, err := s.dev1Signing.Sign(asserts.ValidationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(barValidation)
c.Assert(err, IsNil)
// validation by baz
headers = map[string]interface{}{
"series": "16",
"snap-id": "baz-id",
"approved-snap-id": "foo-id",
"approved-snap-revision": "9",
"timestamp": time.Now().Format(time.RFC3339),
}
bazValidation, err := s.dev1Signing.Sign(asserts.ValidationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(bazValidation)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBaz)
c.Assert(err, IsNil)
fooRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
}
fooInstanceRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
InstanceKey: "instance",
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooRefresh, fooInstanceRefresh}, nil, 0, s.trivialDeviceCtx)
c.Assert(err, IsNil)
c.Check(validated, DeepEquals, []*snap.Info{fooRefresh, fooInstanceRefresh})
}
func (s *assertMgrSuite) TestValidateRefreshesRevokedValidation(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapDeclFoo := s.snapDecl(c, "foo", nil)
snapDeclBar := s.snapDecl(c, "bar", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
snapDeclBaz := s.snapDecl(c, "baz", map[string]interface{}{
"refresh-control": []interface{}{"foo-id"},
})
s.stateFromDecl(c, snapDeclFoo, "", snap.R(7))
s.stateFromDecl(c, snapDeclBar, "", snap.R(3))
s.stateFromDecl(c, snapDeclBaz, "", snap.R(1))
snapstate.Set(s.state, "local", &snapstate.SnapState{
Active: false,
Sequence: []*snap.SideInfo{
{RealName: "local", Revision: snap.R(-1)},
},
Current: snap.R(-1),
})
// validation by bar
headers := map[string]interface{}{
"series": "16",
"snap-id": "bar-id",
"approved-snap-id": "foo-id",
"approved-snap-revision": "9",
"timestamp": time.Now().Format(time.RFC3339),
}
barValidation, err := s.dev1Signing.Sign(asserts.ValidationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(barValidation)
c.Assert(err, IsNil)
// revoked validation by baz
headers = map[string]interface{}{
"series": "16",
"snap-id": "baz-id",
"approved-snap-id": "foo-id",
"approved-snap-revision": "9",
"revoked": "true",
"timestamp": time.Now().Format(time.RFC3339),
}
bazValidation, err := s.dev1Signing.Sign(asserts.ValidationType, headers, nil, "")
c.Assert(err, IsNil)
err = s.storeSigning.Add(bazValidation)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBar)
c.Assert(err, IsNil)
err = assertstate.Add(s.state, snapDeclBaz)
c.Assert(err, IsNil)
fooRefresh := &snap.Info{
SideInfo: snap.SideInfo{RealName: "foo", SnapID: "foo-id", Revision: snap.R(9)},
}
validated, err := assertstate.ValidateRefreshes(s.state, []*snap.Info{fooRefresh}, nil, 0, s.trivialDeviceCtx)
c.Assert(err, ErrorMatches, `(?s).*cannot refresh "foo" to revision 9: validation by "baz" \(id "baz-id"\) revoked.*`)
c.Check(validated, HasLen, 0)
}
func (s *assertMgrSuite) TestBaseSnapDeclaration(c *C) {
s.state.Lock()
defer s.state.Unlock()
r1 := assertstest.MockBuiltinBaseDeclaration(nil)
defer r1()
baseDecl, err := assertstate.BaseDeclaration(s.state)
c.Assert(asserts.IsNotFound(err), Equals, true)
c.Check(baseDecl, IsNil)
r2 := assertstest.MockBuiltinBaseDeclaration([]byte(`
type: base-declaration
authority-id: canonical
series: 16
plugs:
iface: true
`))
defer r2()
baseDecl, err = assertstate.BaseDeclaration(s.state)
c.Assert(err, IsNil)
c.Check(baseDecl, NotNil)
c.Check(baseDecl.PlugRule("iface"), NotNil)
}
func (s *assertMgrSuite) TestSnapDeclaration(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a declaration in the system db
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
_, err = assertstate.SnapDeclaration(s.state, "snap-id-other")
c.Check(asserts.IsNotFound(err), Equals, true)
snapDecl, err := assertstate.SnapDeclaration(s.state, "foo-id")
c.Assert(err, IsNil)
c.Check(snapDecl.SnapName(), Equals, "foo")
}
func (s *assertMgrSuite) TestAutoAliasesTemporaryFallback(c *C) {
s.state.Lock()
defer s.state.Unlock()
// prereqs for developer assertions in the system db
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
// not from the store
aliases, err := assertstate.AutoAliases(s.state, &snap.Info{SuggestedName: "local"})
c.Assert(err, IsNil)
c.Check(aliases, HasLen, 0)
// missing
_, err = assertstate.AutoAliases(s.state, &snap.Info{
SideInfo: snap.SideInfo{
RealName: "baz",
SnapID: "baz-id",
},
})
c.Check(err, ErrorMatches, `internal error: cannot find snap-declaration for installed snap "baz": snap-declaration \(baz-id; series:16\) not found`)
info := snaptest.MockInfo(c, `
name: foo
version: 0
apps:
cmd1:
aliases: [alias1]
cmd2:
aliases: [alias2]
`, &snap.SideInfo{
RealName: "foo",
SnapID: "foo-id",
})
// empty list
// have a declaration in the system db
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
aliases, err = assertstate.AutoAliases(s.state, info)
c.Assert(err, IsNil)
c.Check(aliases, HasLen, 0)
// some aliases
snapDeclFoo = s.snapDecl(c, "foo", map[string]interface{}{
"auto-aliases": []interface{}{"alias1", "alias2", "alias3"},
"revision": "1",
})
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
aliases, err = assertstate.AutoAliases(s.state, info)
c.Assert(err, IsNil)
c.Check(aliases, DeepEquals, map[string]string{
"alias1": "cmd1",
"alias2": "cmd2",
})
}
func (s *assertMgrSuite) TestAutoAliasesExplicit(c *C) {
s.state.Lock()
defer s.state.Unlock()
// prereqs for developer assertions in the system db
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
// not from the store
aliases, err := assertstate.AutoAliases(s.state, &snap.Info{SuggestedName: "local"})
c.Assert(err, IsNil)
c.Check(aliases, HasLen, 0)
// missing
_, err = assertstate.AutoAliases(s.state, &snap.Info{
SideInfo: snap.SideInfo{
RealName: "baz",
SnapID: "baz-id",
},
})
c.Check(err, ErrorMatches, `internal error: cannot find snap-declaration for installed snap "baz": snap-declaration \(baz-id; series:16\) not found`)
// empty list
// have a declaration in the system db
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
aliases, err = assertstate.AutoAliases(s.state, &snap.Info{
SideInfo: snap.SideInfo{
RealName: "foo",
SnapID: "foo-id",
},
})
c.Assert(err, IsNil)
c.Check(aliases, HasLen, 0)
// some aliases
snapDeclFoo = s.snapDecl(c, "foo", map[string]interface{}{
"aliases": []interface{}{
map[string]interface{}{
"name": "alias1",
"target": "cmd1",
},
map[string]interface{}{
"name": "alias2",
"target": "cmd2",
},
map[string]interface{}{
"name": "alias-missing",
"target": "cmd-missing",
},
},
"revision": "1",
})
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
aliases, err = assertstate.AutoAliases(s.state, &snap.Info{
SideInfo: snap.SideInfo{
RealName: "foo",
SnapID: "foo-id",
},
Apps: map[string]*snap.AppInfo{
"cmd1": {},
"cmd2": {},
// no cmd-missing
},
})
c.Assert(err, IsNil)
c.Check(aliases, DeepEquals, map[string]string{
"alias1": "cmd1",
"alias2": "cmd2",
})
}
func (s *assertMgrSuite) TestPublisher(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a declaration in the system db
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
_, err = assertstate.SnapDeclaration(s.state, "snap-id-other")
c.Check(asserts.IsNotFound(err), Equals, true)
acct, err := assertstate.Publisher(s.state, "foo-id")
c.Assert(err, IsNil)
c.Check(acct.AccountID(), Equals, s.dev1Acct.AccountID())
c.Check(acct.Username(), Equals, "developer1")
}
func (s *assertMgrSuite) TestPublisherStoreAccount(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a declaration in the system db
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
snapDeclFoo := s.snapDecl(c, "foo", nil)
err = assertstate.Add(s.state, snapDeclFoo)
c.Assert(err, IsNil)
_, err = assertstate.SnapDeclaration(s.state, "snap-id-other")
c.Check(asserts.IsNotFound(err), Equals, true)
acct, err := assertstate.PublisherStoreAccount(s.state, "foo-id")
c.Assert(err, IsNil)
c.Check(acct.ID, Equals, s.dev1Acct.AccountID())
c.Check(acct.Username, Equals, "developer1")
c.Check(acct.DisplayName, Equals, "Developer1")
c.Check(acct.Validation, Equals, s.dev1Acct.Validation())
}
func (s *assertMgrSuite) TestStore(c *C) {
s.state.Lock()
defer s.state.Unlock()
err := assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
err = assertstate.Add(s.state, s.dev1Acct)
c.Assert(err, IsNil)
storeHeaders := map[string]interface{}{
"store": "foo",
"operator-id": s.dev1Acct.AccountID(),
"timestamp": time.Now().Format(time.RFC3339),
}
fooStore, err := s.storeSigning.Sign(asserts.StoreType, storeHeaders, nil, "")
c.Assert(err, IsNil)
err = assertstate.Add(s.state, fooStore)
c.Assert(err, IsNil)
_, err = assertstate.Store(s.state, "bar")
c.Check(asserts.IsNotFound(err), Equals, true)
store, err := assertstate.Store(s.state, "foo")
c.Assert(err, IsNil)
c.Check(store.Store(), Equals, "foo")
}
// validation-sets related tests
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsNop(c *C) {
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
err := assertstate.RefreshValidationSetAssertions(s.state, 0, nil)
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestValidationSetAssertionsAutoRefresh(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "bar", "2", "3", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
c.Assert(assertstate.AutoRefreshAssertions(s.state, 0), IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, true)
a, err := assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(a.Revision(), Equals, 3)
}
func (s *assertMgrSuite) TestValidationSetAssertionsAutoRefreshError(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
err := assertstate.AutoRefreshAssertions(s.state, 0)
c.Assert(asserts.IsNotFound(err), Equals, true)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsStoreError(c *C) {
s.fakeStore.(*fakeStore).snapActionErr = &store.UnexpectedHTTPStatusError{StatusCode: 400}
s.state.Lock()
defer s.state.Unlock()
s.setModel(sysdb.GenericClassicModel())
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
err := assertstate.RefreshValidationSetAssertions(s.state, 0, nil)
c.Assert(err, ErrorMatches, `cannot refresh validation set assertions: cannot : got unexpected HTTP status code 400.*`)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertions(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "bar", "1", "2", "required", "1")
err = s.storeSigning.Add(vsetAs2)
c.Assert(err, IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
err = assertstate.RefreshValidationSetAssertions(s.state, 0, &assertstate.RefreshAssertionsOptions{IsAutoRefresh: true})
c.Assert(err, IsNil)
a, err := assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "1",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "bar")
c.Check(a.Revision(), Equals, 2)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, true)
// sequence changed in the store to 4
vsetAs3 := s.validationSetAssert(c, "bar", "4", "3", "required", "1")
err = s.storeSigning.Add(vsetAs3)
c.Assert(err, IsNil)
// precondition check - sequence 4 not available locally yet
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "4",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
s.fakeStore.(*fakeStore).requestedTypes = nil
err = assertstate.RefreshValidationSetAssertions(s.state, 0, nil)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// new sequence is available in the db
a, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "4",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "bar")
// tracking current was updated
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr.Current, Equals, 4)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsPinned(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
err = assertstate.Add(s.state, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "bar", "2", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "bar", "2", "5", "required", "1")
err = s.storeSigning.Add(vsetAs2)
c.Assert(err, IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 2,
PinnedAt: 2,
}
assertstate.UpdateValidationSet(s.state, &tr)
err = assertstate.RefreshValidationSetAssertions(s.state, 0, nil)
c.Assert(err, IsNil)
a, err := assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "bar")
c.Check(a.(*asserts.ValidationSet).Sequence(), Equals, 2)
c.Check(a.Revision(), Equals, 5)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// sequence changed in the store to 7
vsetAs3 := s.validationSetAssert(c, "bar", "7", "8", "required", "1")
err = s.storeSigning.Add(vsetAs3)
c.Assert(err, IsNil)
s.fakeStore.(*fakeStore).requestedTypes = nil
err = assertstate.RefreshValidationSetAssertions(s.state, 0, nil)
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// new sequence is not available in the db
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "7",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
// tracking current remains at 2
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr.Current, Equals, 2)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsLocalOnlyFailed(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add to local database
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "baz", "3", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs2), IsNil)
// vset2 present and updated in the store
vsetAs2_2 := s.validationSetAssert(c, "baz", "3", "2", "required", "1")
err = s.storeSigning.Add(vsetAs2_2)
c.Assert(err, IsNil)
tr1 := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
PinnedAt: 1,
LocalOnly: true,
}
tr2 := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "baz",
Mode: assertstate.Monitor,
Current: 3,
PinnedAt: 3,
}
assertstate.UpdateValidationSet(s.state, &tr1)
assertstate.UpdateValidationSet(s.state, &tr2)
err = assertstate.RefreshValidationSetAssertions(s.state, 0, nil)
c.Assert(err, IsNil)
// precondition - local assertion vsetAs1 is the latest
a, err := assertstate.DB(s.state).FindSequence(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "1",
}, -1, -1)
c.Assert(err, IsNil)
vs := a.(*asserts.ValidationSet)
c.Check(vs.Name(), Equals, "bar")
c.Check(vs.Sequence(), Equals, 1)
c.Check(vs.Revision(), Equals, 1)
// but vsetAs2 was updated with vsetAs2_2
a, err = assertstate.DB(s.state).FindSequence(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "baz",
"sequence": "1",
}, -1, -1)
c.Assert(err, IsNil)
vs = a.(*asserts.ValidationSet)
c.Check(vs.Name(), Equals, "baz")
c.Check(vs.Sequence(), Equals, 3)
c.Check(vs.Revision(), Equals, 2)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsEnforcingModeHappyNotPinned(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapstate.Set(s.state, "foo", &snapstate.SnapState{
Active: true,
Sequence: []*snap.SideInfo{{RealName: "foo", Revision: snap.R(1), SnapID: "qOqKhntON3vR7kwEbVPsILm7bUViPDzz"}},
Current: snap.R(1),
})
snaptest.MockSnap(c, string(`name: foo
version: 1`), &snap.SideInfo{
Revision: snap.R("1")})
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "foo", "1", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "bar", "1", "2", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs2), IsNil)
// in the store
vsetAs3 := s.validationSetAssert(c, "foo", "1", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs3), IsNil)
vsetAs4 := s.validationSetAssert(c, "bar", "2", "3", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs4), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
tr = assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
err = assertstate.RefreshValidationSetAssertions(s.state, 0, nil)
c.Assert(err, IsNil)
a, err := assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
"sequence": "1",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "foo")
c.Check(a.Revision(), Equals, 2)
a, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "bar")
c.Check(a.(*asserts.ValidationSet).Sequence(), Equals, 2)
c.Check(a.Revision(), Equals, 3)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// tracking current was updated
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr.Current, Equals, 2)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsEnforcingModeHappyPinned(c *C) {
s.state.Lock()
defer s.state.Unlock()
snapstate.Set(s.state, "foo", &snapstate.SnapState{
Active: true,
Sequence: []*snap.SideInfo{{RealName: "foo", Revision: snap.R(1), SnapID: "qOqKhntON3vR7kwEbVPsILm7bUViPDzz"}},
Current: snap.R(1),
})
snaptest.MockSnap(c, string(`name: foo
version: 1`), &snap.SideInfo{Revision: snap.R("1")})
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "bar", "1", "2", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
// in the store
c.Assert(s.storeSigning.Add(vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "bar", "2", "3", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 1,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
c.Assert(assertstate.RefreshValidationSetAssertions(s.state, 0, nil), IsNil)
a, err := assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "1",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "bar")
c.Check(a.(*asserts.ValidationSet).Sequence(), Equals, 1)
c.Check(a.Revision(), Equals, 2)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// tracking current was updated
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr.Current, Equals, 1)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsEnforcingModeConflict(c *C) {
s.state.Lock()
defer s.state.Unlock()
logbuf, restore := logger.MockLogger()
defer restore()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
vsetAs1 := s.validationSetAssert(c, "foo", "1", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "bar", "1", "2", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs2), IsNil)
// in the store
vsetAs3 := s.validationSetAssert(c, "foo", "2", "2", "invalid", "")
c.Assert(s.storeSigning.Add(vsetAs3), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
tr = assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
c.Assert(assertstate.RefreshValidationSetAssertions(s.state, 0, nil), IsNil)
c.Assert(logbuf.String(), Matches, `.*cannot refresh to conflicting validation set assertions: validation sets are in conflict:\n- cannot constrain snap "foo" as both invalid .* and required at revision 1.*\n`)
a, err := assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
"sequence": "1",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "foo")
c.Check(a.Revision(), Equals, 1)
// new assertion wasn't committed to the database.
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
"sequence": "2",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// tracking current wasn't updated
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "foo", &tr), IsNil)
c.Check(tr.Current, Equals, 1)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsEnforcingModeMissingSnap(c *C) {
s.state.Lock()
defer s.state.Unlock()
logbuf, restore := logger.MockLogger()
defer restore()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
// currently tracked, but snap is not installed (it's optional)
vsetAs1 := s.validationSetAssert(c, "foo", "1", "1", "optional", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
// in the store, snap is now required
vsetAs3 := s.validationSetAssert(c, "foo", "2", "2", "required", "")
c.Assert(s.storeSigning.Add(vsetAs3), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
c.Assert(assertstate.RefreshValidationSetAssertions(s.state, 0, nil), IsNil)
c.Assert(logbuf.String(), Matches, `.*cannot refresh to validation set assertions that do not satisfy installed snaps: validation sets assertions are not met:\n- missing required snaps:\n - foo \(required at any revision by sets .*/foo\)\n`)
a, err := assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
"sequence": "1",
})
c.Assert(err, IsNil)
c.Check(a.(*asserts.ValidationSet).Name(), Equals, "foo")
c.Check(a.Revision(), Equals, 1)
// new assertion wasn't committed to the database.
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
"sequence": "2",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// tracking current wasn't updated
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "foo", &tr), IsNil)
c.Check(tr.Current, Equals, 1)
}
func (s *assertMgrSuite) TestRefreshValidationSetAssertionsEnforcingModeWrongSnapRevisionOK(c *C) {
s.state.Lock()
defer s.state.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
err := s.storeSigning.Add(storeAs)
c.Assert(err, IsNil)
// store key already present
c.Assert(assertstate.Add(s.state, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(s.state, s.dev1AcctKey), IsNil)
snapstate.Set(s.state, "foo", &snapstate.SnapState{
Active: false,
Sequence: []*snap.SideInfo{
{RealName: "foo", Revision: snap.R(1)},
},
Current: snap.R(1),
})
// snap revision 1 is installed
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(s.state, vsetAs1), IsNil)
// in the store, revision 2 required
vsetAs3 := s.validationSetAssert(c, "bar", "2", "2", "required", "2")
c.Assert(s.storeSigning.Add(vsetAs3), IsNil)
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
Current: 1,
}
assertstate.UpdateValidationSet(s.state, &tr)
c.Assert(assertstate.RefreshValidationSetAssertions(s.state, 0, nil), IsNil)
// new assertion has been committed to the database.
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).requestedTypes, DeepEquals, [][]string{
{"account", "account-key", "validation-set"},
})
// tracking current has been updated
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr.Current, Equals, 2)
}
func (s *assertMgrSuite) TestValidationSetAssertionForMonitorLocalFallbackForPinned(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add to local database
vsetAs := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs), IsNil)
opts := assertstate.ResolveOptions{AllowLocalFallback: true}
vs, local, err := assertstate.ValidationSetAssertionForMonitor(st, s.dev1Acct.AccountID(), "bar", 1, true, 0, &opts)
c.Assert(err, IsNil)
c.Assert(vs, NotNil)
c.Assert(local, Equals, true)
}
func (s *assertMgrSuite) TestValidationSetAssertionForMonitorPinnedRefreshedFromStore(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add to local database
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs1), IsNil)
// newer revision available in the store
vsetAs2 := s.validationSetAssert(c, "bar", "1", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
vs, local, err := assertstate.ValidationSetAssertionForMonitor(st, s.dev1Acct.AccountID(), "bar", 1, true, 0, nil)
c.Assert(err, IsNil)
c.Assert(local, Equals, false)
c.Check(vs.Revision(), Equals, 2)
c.Check(vs.Sequence(), Equals, 1)
}
func (s *assertMgrSuite) TestValidationSetAssertionForMonitorUnpinnedRefreshedFromStore(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add to local database
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs1), IsNil)
// newer assertion available in the store
vsetAs2 := s.validationSetAssert(c, "bar", "3", "1", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
vs, local, err := assertstate.ValidationSetAssertionForMonitor(st, s.dev1Acct.AccountID(), "bar", 0, false, 0, nil)
c.Assert(err, IsNil)
c.Assert(local, Equals, false)
c.Check(vs.Revision(), Equals, 1)
c.Check(vs.Sequence(), Equals, 3)
}
func (s *assertMgrSuite) TestValidationSetAssertionForMonitorUnpinnedNotFound(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
_, _, err := assertstate.ValidationSetAssertionForMonitor(st, s.dev1Acct.AccountID(), "bar", 0, false, 0, nil)
c.Assert(err, ErrorMatches, fmt.Sprintf(`cannot fetch and resolve assertions:\n - validation-set/16/%s/bar: validation-set assertion not found.*`, s.dev1Acct.AccountID()))
}
// Test for enforce mode
func (s *assertMgrSuite) TestValidationSetAssertionForEnforceNotPinnedHappy(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add sequence to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
snapasserts.NewInstalledSnap("other", "ididididid", snap.Revision{N: 1}),
}
sequence := 0
vs, _, err := assertstate.ValidationSetAssertionForEnforce(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
c.Check(vs.Revision(), Equals, 2)
c.Check(vs.Sequence(), Equals, 2)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestValidationSetAssertionForEnforcePinnedHappy(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add sequence to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
sequence := 2
vs, cur, err := assertstate.ValidationSetAssertionForEnforce(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
c.Check(vs.Revision(), Equals, 2)
c.Check(vs.Sequence(), Equals, 2)
c.Check(cur, Equals, 2)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
}
func (s *assertMgrSuite) TestValidationSetAssertionForEnforceNotPinnedUnhappyMissingSnap(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add sequence to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps := []*snapasserts.InstalledSnap{}
sequence := 0
_, _, err := assertstate.ValidationSetAssertionForEnforce(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, NotNil)
verr, ok := err.(*snapasserts.ValidationSetsValidationError)
c.Assert(ok, Equals, true)
c.Check(verr.MissingSnaps, DeepEquals, map[string]map[snap.Revision][]string{
"foo": {
snap.R(1): []string{fmt.Sprintf("%s/bar", s.dev1Acct.AccountID())},
},
})
// and it hasn't been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
}
func (s *assertMgrSuite) TestValidationSetAssertionForEnforceNotPinnedUnhappyConflict(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add an assertion to local database
vsetAs := s.validationSetAssert(c, "boo", "4", "4", "invalid", "")
c.Assert(assertstate.Add(st, vsetAs), IsNil)
// and to the store (for refresh to be happy)
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
// and pretend it was tracked already
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "boo",
Mode: assertstate.Enforce,
Current: 4,
}
assertstate.UpdateValidationSet(st, &tr)
// add sequence to the store, it conflicts with boo
vsetAs2 := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
snaps := []*snapasserts.InstalledSnap{}
sequence := 0
_, _, err := assertstate.ValidationSetAssertionForEnforce(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Check(err, ErrorMatches, fmt.Sprintf(`validation sets are in conflict:\n- cannot constrain snap "foo" as both invalid \(%s/boo\) and required at revision 1 \(%s/bar\)`, s.dev1Acct.AccountID(), s.dev1Acct.AccountID()))
// and it hasn't been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
}
func (s *assertMgrSuite) TestValidationSetAssertionForEnforceNotPinnedAfterForgetHappy(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add an old assertion to local database; it's not tracked which is the
// case after 'snap validate --forget' (we don't prune assertions from db).
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs1), IsNil)
// newer sequence available in the store
vsetAs2 := s.validationSetAssert(c, "bar", "3", "5", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
sequence := 0
vs, cur, err := assertstate.ValidationSetAssertionForEnforce(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
// new assertion got fetched
c.Check(vs.Revision(), Equals, 5)
c.Check(vs.Sequence(), Equals, 3)
c.Check(cur, Equals, 3)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "3",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestValidationSetAssertionForEnforceNotPinnedAfterMonitorHappy(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add and old assertion to local database
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs1), IsNil)
// and pretend it was tracked already in monitor mode
tr := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
}
assertstate.UpdateValidationSet(st, &tr)
// newer sequence available in the store
vsetAs2 := s.validationSetAssert(c, "bar", "3", "5", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
sequence := 0
vs, cur, err := assertstate.ValidationSetAssertionForEnforce(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
// doesn't fetch new assertion
c.Check(vs.Revision(), Equals, 1)
c.Check(vs.Sequence(), Equals, 1)
c.Check(cur, Equals, 1)
// old assertion is stil in the database
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "1",
})
c.Assert(err, IsNil)
}
func (s *assertMgrSuite) TestTemporaryDB(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
err := assertstate.Add(st, s.storeSigning.StoreAccountKey(""))
c.Assert(err, IsNil)
a, err := s.storeSigning.Sign(asserts.ModelType, map[string]interface{}{
"type": "model",
"series": "16",
"authority-id": s.storeSigning.AuthorityID,
"brand-id": s.storeSigning.AuthorityID,
"model": "my-model",
"architecture": "amd64",
"gadget": "gadget",
"kernel": "krnl",
"timestamp": time.Now().Format(time.RFC3339),
}, nil, "")
c.Assert(err, IsNil)
model := a.(*asserts.Model)
aRev2, err := s.storeSigning.Sign(asserts.ModelType, map[string]interface{}{
"type": "model",
"series": "16",
"authority-id": s.storeSigning.AuthorityID,
"brand-id": s.storeSigning.AuthorityID,
"model": "my-model",
"architecture": "amd64",
"gadget": "gadget",
"kernel": "krnl",
"timestamp": time.Now().Format(time.RFC3339),
"revision": "2",
}, nil, "")
c.Assert(err, IsNil)
modelRev2 := aRev2.(*asserts.Model)
hdrs := map[string]string{
"series": "16",
"model": "my-model",
"brand-id": s.storeSigning.AuthorityID,
}
// model isn't found in the main DB
_, err = assertstate.DB(st).Find(asserts.ModelType, hdrs)
c.Assert(err, NotNil)
c.Assert(asserts.IsNotFound(err), Equals, true)
// let's get a temporary DB
tempDB := assertstate.TemporaryDB(st)
c.Assert(tempDB, NotNil)
// and add the model to it
err = tempDB.Add(model)
c.Assert(err, IsNil)
fromTemp, err := tempDB.Find(asserts.ModelType, hdrs)
c.Assert(err, IsNil)
c.Assert(fromTemp.(*asserts.Model), DeepEquals, model)
// the model is only in the temp database
_, err = assertstate.DB(st).Find(asserts.ModelType, hdrs)
c.Assert(err, NotNil)
c.Assert(asserts.IsNotFound(err), Equals, true)
// let's add it to the DB now
err = assertstate.Add(st, model)
c.Assert(err, IsNil)
// such that we can lookup the revision 2 in a temporary DB
tempDB = assertstate.TemporaryDB(st)
c.Assert(tempDB, NotNil)
err = tempDB.Add(modelRev2)
c.Assert(err, IsNil)
fromTemp, err = tempDB.Find(asserts.ModelType, hdrs)
c.Assert(err, IsNil)
c.Assert(fromTemp.(*asserts.Model), DeepEquals, modelRev2)
// but the main DB still returns the old model
fromDB, err := assertstate.DB(st).Find(asserts.ModelType, hdrs)
c.Assert(err, IsNil)
c.Assert(fromDB.(*asserts.Model), DeepEquals, model)
}
func (s *assertMgrSuite) TestEnforceValidationSetAssertion(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add sequence to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
sequence := 2
tracking, err := assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, *tracking)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 2,
Current: 2,
})
// and it was added to the history
vshist, err := assertstate.ValidationSetsHistory(st)
c.Assert(err, IsNil)
c.Check(vshist, DeepEquals, []map[string]*assertstate.ValidationSetTracking{{
fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 2,
Current: 2,
},
}})
}
func (s *assertMgrSuite) TestEnforceValidationSetAssertionUpdate(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add sequence to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
sequence := 2
tracking, err := assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 2,
Current: 2,
})
c.Check(tr, DeepEquals, *tracking)
// and it was added to the history
vshist, err := assertstate.ValidationSetsHistory(st)
c.Assert(err, IsNil)
c.Check(vshist, DeepEquals, []map[string]*assertstate.ValidationSetTracking{{
fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 2,
Current: 2,
},
}})
// not pinned
sequence = 0
tracking, err = assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 0,
Current: 2,
})
c.Check(tr, DeepEquals, *tracking)
}
func (s *assertMgrSuite) TestEnforceValidationSetAssertionPinToOlderSequence(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add sequences to the store
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
sequence := 2
tracking, err := assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 2,
Current: 2,
})
c.Check(tr, DeepEquals, *tracking)
// pin to older
sequence = 1
tracking, err = assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 1,
// and current points at the latest sequence available
Current: 2,
})
c.Check(tr, DeepEquals, *tracking)
}
func (s *assertMgrSuite) TestEnforceValidationSetAssertionAfterMonitor(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add and old assertion to local database
vsetAs1 := s.validationSetAssert(c, "bar", "1", "1", "required", "1")
c.Assert(assertstate.Add(st, vsetAs1), IsNil)
monitor := assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
Current: 1,
}
assertstate.UpdateValidationSet(st, &monitor)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
// add a newer sequence to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
sequence := 2
tracking, err := assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, nil)
c.Assert(err, IsNil)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 2,
Current: 2,
})
c.Check(tr, DeepEquals, *tracking)
}
func (s *assertMgrSuite) TestEnforceValidationSetAssertionIgnoreValidation(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add sequence to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("foo", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 3}),
}
sequence := 2
ignoreValidation := map[string]bool{}
_, err := assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, ignoreValidation)
wrongRevErr, ok := err.(*snapasserts.ValidationSetsValidationError)
c.Assert(ok, Equals, true)
c.Check(wrongRevErr.WrongRevisionSnaps["foo"], NotNil)
ignoreValidation["foo"] = true
tracking, err := assertstate.FetchAndApplyEnforcedValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0, snaps, ignoreValidation)
c.Assert(err, IsNil)
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
PinnedAt: 2,
Current: 2,
})
c.Check(tr, DeepEquals, *tracking)
}
func (s *assertMgrSuite) TestTryEnforceValidationSetsAssertionsValidationError(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// pretend we are already enforcing a validation set foo
snaps3 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
}}
vsetAs3 := s.validationSetAssertForSnaps(c, "foo", "1", "1", snaps3)
c.Assert(assertstate.Add(st, vsetAs3), IsNil)
assertstate.UpdateValidationSet(st, &assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
})
// add validation set assertions to the store
snaps1 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
"revision": "3",
},
map[string]interface{}{
"id": "aAqKhntON3vR7kwEbVPsILm7bUViPDaa",
"name": "other-snap",
"presence": "required",
}}
vsetAs := s.validationSetAssertForSnaps(c, "bar", "2", "2", snaps1)
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps2 := []interface{}{
map[string]interface{}{
"id": "cccchntON3vR7kwEbVPsILm7bUViPDcc",
"name": "invalid-snap",
"presence": "invalid",
}}
vsetAs2 := s.validationSetAssertForSnaps(c, "baz", "1", "1", snaps2)
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
// try to enforce extra validation sets bar and baz. some-snap is present (and required by foo at any revision),
// but needs to be at revision 3 to satisfy bar. invalid-snap is present but is invalid for baz.
installedSnaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("some-snap", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
snapasserts.NewInstalledSnap("invalid-snap", "cccchntON3vR7kwEbVPsILm7bUViPDcc", snap.Revision{N: 1}),
}
err := assertstate.TryEnforcedValidationSets(st, []string{fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()), fmt.Sprintf("%s/baz", s.dev1Acct.AccountID())}, 0, installedSnaps, nil)
verr, ok := err.(*snapasserts.ValidationSetsValidationError)
c.Assert(ok, Equals, true)
c.Check(verr.WrongRevisionSnaps, DeepEquals, map[string]map[snap.Revision][]string{
"some-snap": {
snap.R(3): []string{fmt.Sprintf("%s/bar", s.dev1Acct.AccountID())},
},
})
c.Check(verr.MissingSnaps, DeepEquals, map[string]map[snap.Revision][]string{
"other-snap": {
snap.R(0): []string{fmt.Sprintf("%s/bar", s.dev1Acct.AccountID())},
},
})
c.Check(verr.InvalidSnaps, DeepEquals, map[string][]string{"invalid-snap": {fmt.Sprintf("%s/baz", s.dev1Acct.AccountID())}})
// new assertions were not committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "baz",
"sequence": "1",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
}
func (s *assertMgrSuite) TestTryEnforceValidationSetsAssertionsOK(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// pretend we are already enforcing a validation set foo
snaps3 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
}}
vsetAs3 := s.validationSetAssertForSnaps(c, "foo", "1", "1", snaps3)
c.Assert(assertstate.Add(st, vsetAs3), IsNil)
assertstate.UpdateValidationSet(st, &assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
})
// add validation set assertions to the store
snaps1 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
"revision": "3",
}}
vsetAs := s.validationSetAssertForSnaps(c, "bar", "2", "2", snaps1)
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
snaps2 := []interface{}{
map[string]interface{}{
"id": "aAqKhntON3vR7kwEbVPsILm7bUViPDaa",
"name": "other-snap",
"presence": "optional",
}}
vsetAs2 := s.validationSetAssertForSnaps(c, "baz", "1", "1", snaps2)
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
installedSnaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("some-snap", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 3}),
}
err := assertstate.TryEnforcedValidationSets(st, []string{fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()), fmt.Sprintf("%s/baz=1", s.dev1Acct.AccountID())}, 0, installedSnaps, nil)
c.Assert(err, IsNil)
// new assertions were committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "baz",
"sequence": "1",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
// tracking was updated
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
Current: 2,
})
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "baz", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "baz",
Mode: assertstate.Enforce,
Current: 1,
PinnedAt: 1,
})
// and it was added to the history
// note, normally there would be a map with just "foo" as well, but there isn't one
// since we created the initial state in the test manually.
vshist, err := assertstate.ValidationSetsHistory(st)
c.Assert(err, IsNil)
c.Check(vshist, DeepEquals, []map[string]*assertstate.ValidationSetTracking{{
fmt.Sprintf("%s/foo", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
},
fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Enforce,
Current: 2,
},
fmt.Sprintf("%s/baz", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "baz",
Mode: assertstate.Enforce,
PinnedAt: 1,
Current: 1,
},
}})
}
func (s *assertMgrSuite) TestTryEnforceValidationSetsAssertionsAlreadyTrackedUpdateOK(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// pretend we are already enforcing a validation set foo
snaps3 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
}}
vsetAs1 := s.validationSetAssertForSnaps(c, "foo", "1", "1", snaps3)
c.Assert(assertstate.Add(st, vsetAs1), IsNil)
assertstate.UpdateValidationSet(st, &assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
})
// add validation set assertions to the store
snaps1 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
"revision": "3",
}}
vsetAs2 := s.validationSetAssertForSnaps(c, "foo", "2", "2", snaps1)
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
installedSnaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("some-snap", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 3}),
}
err := assertstate.TryEnforcedValidationSets(st, []string{fmt.Sprintf("%s/foo", s.dev1Acct.AccountID())}, 0, installedSnaps, nil)
c.Assert(err, IsNil)
// new assertion was committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
// tracking was updated
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "foo", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 2,
})
// and it was added to the history
// note, normally there would be a map with just "foo" as well, but there isn't one
// since we created the initial state in the test manually.
vshist, err := assertstate.ValidationSetsHistory(st)
c.Assert(err, IsNil)
c.Check(vshist, DeepEquals, []map[string]*assertstate.ValidationSetTracking{{
fmt.Sprintf("%s/foo", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 2,
},
}})
}
func (s *assertMgrSuite) TestTryEnforceValidationSetsAssertionsConflictError(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// pretend we are already enforcing a validation set foo
snaps3 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
}}
vsetAs3 := s.validationSetAssertForSnaps(c, "foo", "1", "1", snaps3)
c.Assert(assertstate.Add(st, vsetAs3), IsNil)
assertstate.UpdateValidationSet(st, &assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
})
// add a validation set assertion to the store
snaps1 := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "invalid",
}}
vsetAs := s.validationSetAssertForSnaps(c, "bar", "2", "2", snaps1)
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
// try to enforce extra validation sets bar and baz. some-snap is present (and required by foo at any revision),
// but needs to be at revision 3 to satisfy bar. invalid-snap is present but is invalid for baz.
installedSnaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("some-snap", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
err := assertstate.TryEnforcedValidationSets(st, []string{fmt.Sprintf("%s/bar", s.dev1Acct.AccountID())}, 0, installedSnaps, nil)
_, ok := err.(*snapasserts.ValidationSetsConflictError)
c.Assert(ok, Equals, true)
c.Assert(err, ErrorMatches, `validation sets are in conflict:\n- cannot constrain snap "some-snap" as both invalid \(.*/bar\) and required at any revision \(.*/foo\).*`)
// new assertion wasn't committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(asserts.IsNotFound(err), Equals, true)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
}
func (s *assertMgrSuite) TestMonitorValidationSet(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add to the store
vsetAs := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs), IsNil)
sequence := 2
tr1, err := assertstate.MonitorValidationSet(st, s.dev1Acct.AccountID(), "bar", sequence, 0)
c.Assert(err, IsNil)
c.Check(tr1, DeepEquals, &assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
})
// and it has been committed
_, err = assertstate.DB(s.state).Find(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "bar",
"sequence": "2",
})
c.Assert(err, IsNil)
c.Check(s.fakeStore.(*fakeStore).opts.IsAutoRefresh, Equals, false)
var tr assertstate.ValidationSetTracking
c.Assert(assertstate.GetValidationSet(s.state, s.dev1Acct.AccountID(), "bar", &tr), IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
})
// and it was added to the history
vshist, err := assertstate.ValidationSetsHistory(st)
c.Assert(err, IsNil)
c.Check(vshist, DeepEquals, []map[string]*assertstate.ValidationSetTracking{{
fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
},
}})
}
func (s *assertMgrSuite) TestForgetValidationSet(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// add to the store
vsetAs1 := s.validationSetAssert(c, "bar", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs1), IsNil)
vsetAs2 := s.validationSetAssert(c, "baz", "2", "2", "required", "1")
c.Assert(s.storeSigning.Add(vsetAs2), IsNil)
tr1, err := assertstate.MonitorValidationSet(st, s.dev1Acct.AccountID(), "bar", 2, 0)
c.Assert(err, IsNil)
c.Check(tr1, DeepEquals, &assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
})
tr2, err := assertstate.MonitorValidationSet(st, s.dev1Acct.AccountID(), "baz", 2, 0)
c.Assert(err, IsNil)
c.Check(tr2, DeepEquals, &assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "baz",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
})
c.Assert(assertstate.ForgetValidationSet(st, s.dev1Acct.AccountID(), "bar"), IsNil)
// and it was added to the history
vshist, err := assertstate.ValidationSetsHistory(st)
c.Assert(err, IsNil)
c.Check(vshist, DeepEquals, []map[string]*assertstate.ValidationSetTracking{{
fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
},
}, {
fmt.Sprintf("%s/bar", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "bar",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
},
fmt.Sprintf("%s/baz", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "baz",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
},
}, {
fmt.Sprintf("%s/baz", s.dev1Acct.AccountID()): {
AccountID: s.dev1Acct.AccountID(),
Name: "baz",
Mode: assertstate.Monitor,
PinnedAt: 2,
Current: 2,
},
}})
}
func (s *assertMgrSuite) TestEnforceValidationSets(c *C) {
s.testEnforceValidationSets(c, 0)
}
func (s *assertMgrSuite) TestEnforceValidationSetsWithPinning(c *C) {
s.testEnforceValidationSets(c, 1)
}
func (s *assertMgrSuite) testEnforceValidationSets(c *C, pinnedSeq int) {
st := s.state
st.Lock()
defer st.Unlock()
// have a model and the store assertion available
snapstate.ReplaceStore(st, s.fakeStore)
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
c.Assert(assertstate.Add(st, s.storeSigning.StoreAccountKey("")), IsNil)
c.Assert(assertstate.Add(st, s.dev1Acct), IsNil)
c.Assert(assertstate.Add(st, s.dev1AcctKey), IsNil)
// validation set that we refreshed to enforce
snaps := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
}}
localVs := s.validationSetAssertForSnaps(c, "foo", "1", "1", snaps)
c.Assert(assertstate.Add(st, localVs), IsNil)
// add a more recent conflicting version to the store
snaps = []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "invalid",
}}
remoteVs := s.validationSetAssertForSnaps(c, "foo", "2", "1", snaps)
c.Assert(s.storeSigning.Add(remoteVs), IsNil)
requestedValSet := fmt.Sprintf("%s/foo", s.dev1Acct.AccountID())
var pinnedSeqs map[string]int
if pinnedSeq != 0 {
pinnedSeqs = make(map[string]int, 1)
pinnedSeqs[requestedValSet] = pinnedSeq
}
valSets := map[string]*asserts.ValidationSet{
requestedValSet: localVs,
}
installedSnaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("some-snap", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
err := assertstate.ApplyEnforcedValidationSets(st, valSets, pinnedSeqs, installedSnaps, nil, 0)
c.Assert(err, IsNil)
// the updated assertion wasn't fetched
valsetAssrt, err := assertstate.DB(s.state).FindSequence(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
}, -1, -1)
c.Assert(err, IsNil)
c.Assert(valsetAssrt, FitsTypeOf, &asserts.ValidationSet{})
c.Check(valsetAssrt.(*asserts.ValidationSet).Sequence(), Equals, 1)
var tr assertstate.ValidationSetTracking
err = assertstate.GetValidationSet(st, s.dev1Acct.AccountID(), "foo", &tr)
c.Assert(err, IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
PinnedAt: pinnedSeq,
})
}
func (s *assertMgrSuite) TestEnforceValidationSetsWithNoLocalAssertions(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// nothing in the DB; only in the store
snapstate.ReplaceStore(st, s.fakeStore)
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
// validation set that we refreshed to enforce
snaps := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
}}
oldVs := s.validationSetAssertForSnaps(c, "foo", "1", "1", snaps)
c.Assert(s.storeSigning.Add(oldVs), IsNil)
// add a more recent conflicting version to the store which shouldn't be pulled
snaps = []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "invalid",
}}
newVs := s.validationSetAssertForSnaps(c, "foo", "2", "1", snaps)
c.Assert(s.storeSigning.Add(newVs), IsNil)
valSets := map[string]*asserts.ValidationSet{
fmt.Sprintf("%s/foo", s.dev1Acct.AccountID()): oldVs,
}
pinnedSeqs := map[string]int{fmt.Sprintf("%s/foo", s.dev1Acct.AccountID()): 1}
installedSnaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("some-snap", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 1}),
}
err := assertstate.ApplyEnforcedValidationSets(st, valSets, pinnedSeqs, installedSnaps, nil, 0)
c.Assert(err, IsNil)
// the old assertion is in the state
vsAssrt, err := assertstate.DB(s.state).FindSequence(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
}, -1, -1)
c.Assert(err, IsNil)
c.Assert(vsAssrt, FitsTypeOf, &asserts.ValidationSet{})
c.Check(vsAssrt.(*asserts.ValidationSet).Sequence(), Equals, 1)
assrt, err := assertstate.DB(s.state).Find(asserts.AccountKeyType, map[string]string{
"public-key-sha3-384": oldVs.SignKeyID(),
})
c.Assert(err, IsNil)
c.Assert(assrt, FitsTypeOf, &asserts.AccountKey{})
var tr assertstate.ValidationSetTracking
err = assertstate.GetValidationSet(st, s.dev1Acct.AccountID(), "foo", &tr)
c.Assert(err, IsNil)
c.Check(tr, DeepEquals, assertstate.ValidationSetTracking{
AccountID: s.dev1Acct.AccountID(),
Name: "foo",
Mode: assertstate.Enforce,
Current: 1,
// the map key contains a sequence number so this should be pinned
PinnedAt: 1,
})
}
func (s *assertMgrSuite) TestEnforceValidationSetsWithMismatchedPinnedSeq(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
// nothing in the DB; only in the store
snapstate.ReplaceStore(st, s.fakeStore)
s.setupModelAndStore(c)
vs := s.validationSetAssertForSnaps(c, "foo", "1", "1", []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
}})
// user requested op with sequence 2 but we're passing a different sequence
vsKey := fmt.Sprintf("%s/foo", s.dev1Acct.AccountID())
valSets := map[string]*asserts.ValidationSet{
vsKey: vs,
}
pinnedSeqs := map[string]int{vsKey: 2}
err := assertstate.ApplyEnforcedValidationSets(st, valSets, pinnedSeqs, nil, nil, 0)
c.Assert(err, ErrorMatches, fmt.Sprintf("internal error: trying to enforce validation set %q with sequence point 1 different than pinned 2", vsKey))
}
func (s *assertMgrSuite) TestEnforceValidationSetsWithUnmetConstraints(c *C) {
st := s.state
st.Lock()
defer st.Unlock()
snapstate.ReplaceStore(st, s.fakeStore)
storeAs := s.setupModelAndStore(c)
c.Assert(s.storeSigning.Add(storeAs), IsNil)
snaps := []interface{}{
map[string]interface{}{
"id": "qOqKhntON3vR7kwEbVPsILm7bUViPDzz",
"name": "some-snap",
"presence": "required",
"revision": "1",
}}
vs := s.validationSetAssertForSnaps(c, "foo", "1", "1", snaps)
c.Assert(s.storeSigning.Add(vs), IsNil)
valSets := map[string]*asserts.ValidationSet{
fmt.Sprintf("%s/foo", s.dev1Acct.AccountID()): vs,
}
installedSnaps := []*snapasserts.InstalledSnap{
snapasserts.NewInstalledSnap("some-snap", "qOqKhntON3vR7kwEbVPsILm7bUViPDzz", snap.Revision{N: 2}),
}
err := assertstate.ApplyEnforcedValidationSets(st, valSets, nil, installedSnaps, nil, 0)
c.Assert(err, FitsTypeOf, &snapasserts.ValidationSetsValidationError{})
_, err = assertstate.DB(s.state).FindSequence(asserts.ValidationSetType, map[string]string{
"series": "16",
"account-id": s.dev1Acct.AccountID(),
"name": "foo",
}, -1, -1)
c.Assert(err, testutil.ErrorIs, &asserts.NotFoundError{})
_, err = assertstate.DB(s.state).Find(asserts.AccountKeyType, map[string]string{
"public-key-sha3-384": vs.SignKeyID(),
})
c.Assert(err, testutil.ErrorIs, &asserts.NotFoundError{})
err = assertstate.GetValidationSet(st, s.dev1Acct.AccountID(), "foo", &assertstate.ValidationSetTracking{})
c.Assert(err, testutil.ErrorIs, &state.NoStateError{})
}
Loading...
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
Go
1
https://gitee.com/mysnapcore/mysnapd.git
git@gitee.com:mysnapcore/mysnapd.git
mysnapcore
mysnapd
mysnapd
v0.0.1

搜索帮助