Skip to content

Commit 20dcd93

Browse files
committed
Improve error message, fix test sv names
Signed-off-by: Aditya Sirish <[email protected]>
1 parent c974d7f commit 20dcd93

File tree

2 files changed

+36
-35
lines changed

2 files changed

+36
-35
lines changed

dsse/envelope.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ package dsse
22

33
import (
44
"encoding/base64"
5+
"fmt"
56
)
67

78
/*
@@ -45,7 +46,7 @@ func b64Decode(s string) ([]byte, error) {
4546
if err != nil {
4647
b, err = base64.URLEncoding.DecodeString(s)
4748
if err != nil {
48-
return nil, err
49+
return nil, fmt.Errorf("unable to base64 decode payload (is payload in the right format?)")
4950
}
5051
}
5152

dsse/sign_test.go

Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,13 @@ func TestPAE(t *testing.T) {
3939
})
4040
}
4141

42-
type nilsignerverifier int
42+
type nilSignerVerifier int
4343

44-
func (n nilsignerverifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
44+
func (n nilSignerVerifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
4545
return data, nil
4646
}
4747

48-
func (n nilsignerverifier) Verify(ctx context.Context, data, sig []byte) error {
48+
func (n nilSignerVerifier) Verify(ctx context.Context, data, sig []byte) error {
4949
if len(data) != len(sig) {
5050
return errLength
5151
}
@@ -59,21 +59,21 @@ func (n nilsignerverifier) Verify(ctx context.Context, data, sig []byte) error {
5959
return nil
6060
}
6161

62-
func (n nilsignerverifier) KeyID() (string, error) {
62+
func (n nilSignerVerifier) KeyID() (string, error) {
6363
return "nil", nil
6464
}
6565

66-
func (n nilsignerverifier) Public() crypto.PublicKey {
66+
func (n nilSignerVerifier) Public() crypto.PublicKey {
6767
return "nil-public"
6868
}
6969

70-
type nullsignerverifier int
70+
type nullSignerVerifier int
7171

72-
func (n nullsignerverifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
72+
func (n nullSignerVerifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
7373
return data, nil
7474
}
7575

76-
func (n nullsignerverifier) Verify(ctx context.Context, data, sig []byte) error {
76+
func (n nullSignerVerifier) Verify(ctx context.Context, data, sig []byte) error {
7777
if len(data) != len(sig) {
7878
return errLength
7979
}
@@ -87,11 +87,11 @@ func (n nullsignerverifier) Verify(ctx context.Context, data, sig []byte) error
8787
return nil
8888
}
8989

90-
func (n nullsignerverifier) KeyID() (string, error) {
90+
func (n nullSignerVerifier) KeyID() (string, error) {
9191
return "null", nil
9292
}
9393

94-
func (n nullsignerverifier) Public() crypto.PublicKey {
94+
func (n nullSignerVerifier) Public() crypto.PublicKey {
9595
return "null-public"
9696
}
9797

@@ -113,24 +113,24 @@ func (n errsigner) Public() crypto.PublicKey {
113113
return "err-public"
114114
}
115115

116-
type errsignerverifier int
116+
type errSignerVerifier int
117117

118118
var errVerify = fmt.Errorf("accepted signatures do not match threshold, Found: 0, Expected 1")
119119
var errThreshold = fmt.Errorf("invalid threshold")
120120

121-
func (n errsignerverifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
121+
func (n errSignerVerifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
122122
return data, nil
123123
}
124124

125-
func (n errsignerverifier) Verify(ctx context.Context, data, sig []byte) error {
125+
func (n errSignerVerifier) Verify(ctx context.Context, data, sig []byte) error {
126126
return errVerify
127127
}
128128

129-
func (n errsignerverifier) KeyID() (string, error) {
129+
func (n errSignerVerifier) KeyID() (string, error) {
130130
return "err", nil
131131
}
132132

133-
func (n errsignerverifier) Public() crypto.PublicKey {
133+
func (n errSignerVerifier) Public() crypto.PublicKey {
134134
return "err-public"
135135
}
136136

@@ -196,7 +196,7 @@ func TestNilSign(t *testing.T) {
196196
},
197197
}
198198

199-
var ns nilsignerverifier
199+
var ns nilSignerVerifier
200200
signer, err := NewEnvelopeSigner(ns)
201201
assert.Nil(t, err, "unexpected error")
202202

@@ -246,14 +246,14 @@ func newEcdsaKey() *ecdsa.PrivateKey {
246246
return &private
247247
}
248248

249-
type EcdsaSignerVerifier struct {
249+
type ecdsaSignerVerifier struct {
250250
keyID string
251251
key *ecdsa.PrivateKey
252252
rLen int
253253
verified bool
254254
}
255255

256-
func (es *EcdsaSignerVerifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
256+
func (es *ecdsaSignerVerifier) Sign(ctx context.Context, data []byte) ([]byte, error) {
257257
// Data is complete message, hash it and sign the digest
258258
digest := sha256.Sum256(data)
259259
r, s, err := rfc6979.SignECDSA(es.key, digest[:], sha256.New)
@@ -269,7 +269,7 @@ func (es *EcdsaSignerVerifier) Sign(ctx context.Context, data []byte) ([]byte, e
269269
return rawSig, nil
270270
}
271271

272-
func (es *EcdsaSignerVerifier) Verify(ctx context.Context, data, sig []byte) error {
272+
func (es *ecdsaSignerVerifier) Verify(ctx context.Context, data, sig []byte) error {
273273
var r big.Int
274274
var s big.Int
275275
digest := sha256.Sum256(data)
@@ -288,11 +288,11 @@ func (es *EcdsaSignerVerifier) Verify(ctx context.Context, data, sig []byte) err
288288
return errVerify
289289
}
290290

291-
func (es *EcdsaSignerVerifier) KeyID() (string, error) {
291+
func (es *ecdsaSignerVerifier) KeyID() (string, error) {
292292
return es.keyID, nil
293293
}
294294

295-
func (es *EcdsaSignerVerifier) Public() crypto.PublicKey {
295+
func (es *ecdsaSignerVerifier) Public() crypto.PublicKey {
296296
return es.key.Public()
297297
}
298298

@@ -302,7 +302,7 @@ func TestEcdsaSign(t *testing.T) {
302302
var keyID = "test key 123"
303303
var payloadType = "http://example.com/HelloWorld"
304304
var payload = "hello world"
305-
var ecdsa = &EcdsaSignerVerifier{
305+
var ecdsa = &ecdsaSignerVerifier{
306306
keyID: keyID,
307307
key: newEcdsaKey(),
308308
}
@@ -383,7 +383,7 @@ func TestVerifyOneProvider(t *testing.T) {
383383
var payloadType = "http://example.com/HelloWorld"
384384
var payload = "hello world"
385385

386-
var ns nilsignerverifier
386+
var ns nilSignerVerifier
387387
signer, err := NewEnvelopeSigner(ns)
388388
assert.Nil(t, err, "unexpected error")
389389

@@ -402,8 +402,8 @@ func TestVerifyMultipleProvider(t *testing.T) {
402402
var payloadType = "http://example.com/HelloWorld"
403403
var payload = "hello world"
404404

405-
var ns nilsignerverifier
406-
var null nullsignerverifier
405+
var ns nilSignerVerifier
406+
var null nullSignerVerifier
407407
signer, err := NewEnvelopeSigner(ns, null)
408408
assert.Nil(t, err, "unexpected error")
409409

@@ -421,8 +421,8 @@ func TestVerifyMultipleProviderThreshold(t *testing.T) {
421421
var payloadType = "http://example.com/HelloWorld"
422422
var payload = "hello world"
423423

424-
var ns nilsignerverifier
425-
var null nullsignerverifier
424+
var ns nilSignerVerifier
425+
var null nullSignerVerifier
426426
signer, err := NewMultiEnvelopeSigner(2, ns, null)
427427
assert.Nil(t, err)
428428
env, err := signer.SignPayload(context.TODO(), payloadType, []byte(payload))
@@ -436,8 +436,8 @@ func TestVerifyMultipleProviderThreshold(t *testing.T) {
436436
}
437437

438438
func TestVerifyMultipleProviderThresholdErr(t *testing.T) {
439-
var ns nilsignerverifier
440-
var null nullsignerverifier
439+
var ns nilSignerVerifier
440+
var null nullSignerVerifier
441441
_, err := NewMultiEnvelopeVerifier(3, ns, null)
442442
assert.Equal(t, errThreshold, err, "wrong error")
443443
_, err = NewMultiEnvelopeVerifier(0, ns, null)
@@ -448,7 +448,7 @@ func TestVerifyErr(t *testing.T) {
448448
var payloadType = "http://example.com/HelloWorld"
449449
var payload = "hello world"
450450

451-
var errsv errsignerverifier
451+
var errsv errSignerVerifier
452452
signer, err := NewEnvelopeSigner(errsv)
453453
assert.Nil(t, err, "unexpected error")
454454

@@ -524,8 +524,8 @@ func TestVerifyBadBase64(t *testing.T) {
524524
func TestVerifyNoMatch(t *testing.T) {
525525
var payloadType = "http://example.com/HelloWorld"
526526

527-
var ns nilsignerverifier
528-
var null nullsignerverifier
527+
var ns nilSignerVerifier
528+
var null nullSignerVerifier
529529
verifier, err := NewEnvelopeVerifier(ns, null)
530530
assert.Nil(t, err, "unexpected error")
531531

@@ -663,12 +663,12 @@ func TestVerifyPublicKeyID(t *testing.T) {
663663
var keyID = "SHA256:f4AuBLdH4Lj/dIuwAUXXebzoI9B/cJ4iSQ3/qByIl4M"
664664
// var keyID = "test key 123"
665665

666-
var s1 = &EcdsaSignerVerifier{
666+
var s1 = &ecdsaSignerVerifier{
667667
keyID: "",
668668
key: newEcdsaKey(),
669669
}
670670

671-
var s2 = &EcdsaSignerVerifier{
671+
var s2 = &ecdsaSignerVerifier{
672672
keyID: "",
673673
key: newEcdsaKey(),
674674
}

0 commit comments

Comments
 (0)