guix-git-authenticate.sh 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
  1. # GNU Guix --- Functional package management for GNU
  2. # Copyright © 2020, 2022 Ludovic Courtès <ludo@gnu.org>
  3. #
  4. # This file is part of GNU Guix.
  5. #
  6. # GNU Guix is free software; you can redistribute it and/or modify it
  7. # under the terms of the GNU General Public License as published by
  8. # the Free Software Foundation; either version 3 of the License, or (at
  9. # your option) any later version.
  10. #
  11. # GNU Guix is distributed in the hope that it will be useful, but
  12. # WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU General Public License
  17. # along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
  18. #
  19. # Test the 'guix git authenticate' command-line utility.
  20. #
  21. # Skip if we're not in a Git checkout.
  22. [ -d "$abs_top_srcdir/.git" ] || exit 77
  23. # Skip if there's no 'keyring' branch.
  24. guile -c '(use-modules (git))
  25. (member "refs/heads/keyring" (branch-list (repository-open ".")))' || \
  26. exit 77
  27. # Keep in sync with '%default-channels' in (guix channels)!
  28. intro_commit="9edb3f66fd807b096b48283debdcddccfea34bad"
  29. intro_signer="BBB0 2DDF 2CEA F6A8 0D1D E643 A2A0 6DF2 A33A 54FA"
  30. cache_key="test-$$"
  31. # This must fail because the end commit is not a descendant of $intro_commit.
  32. ! guix git authenticate "$intro_commit" "$intro_signer" \
  33. --cache-key="$cache_key" --stats \
  34. --end=9549f0283a78fe36f2d4ff2a04ef8ad6b0c02604
  35. # The v1.2.0 commit is a descendant of $intro_commit and it satisfies the
  36. # authorization invariant.
  37. v1_2_0_commit="a099685659b4bfa6b3218f84953cbb7ff9e88063"
  38. guix git authenticate "$intro_commit" "$intro_signer" \
  39. --cache-key="$cache_key" --stats \
  40. --end="$v1_2_0_commit"
  41. rm "$XDG_CACHE_HOME/guix/authentication/$cache_key"
  42. # Commit and signer of the 'v1.0.0' tag.
  43. v1_0_0_commit="6298c3ffd9654d3231a6f25390b056483e8f407c"
  44. v1_0_0_signer="3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5" # civodul
  45. v1_0_1_commit="d68de958b60426798ed62797ff7c96c327a672ac"
  46. # This should succeed because v1.0.0 is an ancestor of $intro_commit.
  47. guix git authenticate "$intro_commit" "$intro_signer" \
  48. --cache-key="$cache_key" --stats \
  49. --end="$v1_0_0_commit"
  50. # This should fail because these commits lack '.guix-authorizations'.
  51. ! guix git authenticate "$v1_0_0_commit" "$v1_0_0_signer" \
  52. --cache-key="$cache_key" --end="$v1_0_1_commit"
  53. # This should work thanks to '--historical-authorizations'.
  54. guix git authenticate "$v1_0_0_commit" "$v1_0_0_signer" \
  55. --cache-key="$cache_key" --end="$v1_0_1_commit" --stats \
  56. --historical-authorizations="$abs_top_srcdir/etc/historical-authorizations"