Skip to content

Commit

Permalink
Use observer timestamp for comparison against certificate chain valid…
Browse files Browse the repository at this point in the history
…ity period (#180)
  • Loading branch information
codysoyland authored May 17, 2024
1 parent 8f5944c commit 03535ca
Show file tree
Hide file tree
Showing 2 changed files with 63 additions and 2 deletions.
4 changes: 2 additions & 2 deletions pkg/verify/certificate.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,10 +24,10 @@ import (

func VerifyLeafCertificate(observerTimestamp time.Time, leafCert x509.Certificate, trustedMaterial root.TrustedMaterial) error { // nolint: revive
for _, ca := range trustedMaterial.FulcioCertificateAuthorities() {
if !ca.ValidityPeriodStart.IsZero() && leafCert.NotBefore.Before(ca.ValidityPeriodStart) {
if !ca.ValidityPeriodStart.IsZero() && observerTimestamp.Before(ca.ValidityPeriodStart) {
continue
}
if !ca.ValidityPeriodEnd.IsZero() && leafCert.NotAfter.After(ca.ValidityPeriodEnd) {
if !ca.ValidityPeriodEnd.IsZero() && observerTimestamp.After(ca.ValidityPeriodEnd) {
continue
}

Expand Down
61 changes: 61 additions & 0 deletions pkg/verify/certificate_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
// Copyright 2023 The Sigstore Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package verify_test

import (
"testing"
"time"

"github.com/sigstore/sigstore-go/pkg/testing/ca"
"github.com/sigstore/sigstore-go/pkg/verify"
"github.com/stretchr/testify/assert"
)

func TestVerifyValidityPeriod(t *testing.T) {
virtualSigstore, err := ca.NewVirtualSigstore()
assert.NoError(t, err)

leaf, _, err := virtualSigstore.GenerateLeafCert("example@example.com", "issuer")
assert.NoError(t, err)

tests := []struct {
name string
observerTimestamp time.Time
wantErr bool
}{
{
name: "before validity period",
observerTimestamp: time.Now().Add(time.Hour * -24),
wantErr: true,
},
{
name: "inside validity period",
observerTimestamp: time.Now(),
wantErr: false,
},
{
name: "after validity period",
observerTimestamp: time.Now().Add(time.Hour * 24),
wantErr: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if err := verify.VerifyLeafCertificate(tt.observerTimestamp, *leaf, virtualSigstore); (err != nil) != tt.wantErr {
t.Errorf("VerifyLeafCertificate() error = %v, wantErr %v", err, tt.wantErr)
}
})
}
}

0 comments on commit 03535ca

Please sign in to comment.