Compare commits

...

10 Commits

4 changed files with 157 additions and 167 deletions

View File

@ -1,6 +1,6 @@
# sig #
# git-sig #
The simple code signature toolchain for git repos.
The simple multisig toolchain for git repos.
## Features
@ -10,7 +10,7 @@ The simple code signature toolchain for git repos.
* Verify code changes made since last time minimum valid signatures were present
* Allow user to manually verify new keys and add to alias groups on the fly
* Prompt user to install or upgrade any required tools as needed
* Signs aginst git agnostic "tree hash" so signatures survive rebases
* Signs notes against git "tree hash" so signatures survive a rebase
* So long as the directory contents at a given ref do not change
## Install
@ -18,15 +18,17 @@ The simple code signature toolchain for git repos.
1. Clone
```
git clone git@gitlab.com/pchq/sig.git sig
git clone https://codeberg.org/distrust/git-sig.git
```
2. Review source code and signatures manually
Using `sig` to verify the signatures of `sig` itself is not recommended.
Using `git-sig` to verify the signatures of `git-sig` itself is not
recommended as it could simply lie to you.
Consider using the following one liner which is much faster to review:
```
git fetch origin refs/notes/signatures:refs/notes/signatures
while read -r line; do \
gpg --verify \
<(printf "$line" | sed 's/.*pgp://g'| openssl base64 -d -A) \
@ -37,68 +39,75 @@ The simple code signature toolchain for git repos.
3. Copy to `$PATH`
```
cp sig ~/.local/bin/
cp git-sig ~/.local/bin/
```
## Usage
* sig verify [-g,--group=<group>] [-t,--threshold=<N>] [-r,--ref=<ref> ] [-d,--diff=<branch>]
* Verify m-of-n signatures by given group are present for a given git ref.
* sig add
* Add signature to this git ref
* sig fetch [-g,--group=<group>]
* Fetch key by fingerprint. Optionally add to group.
* sig help
* Show help text.
* sig version
* Show version information.
```
git sig add [-m,--method=<note|tag>] [-p,--push]
Add signature for this repository
git sig remove
Remove all signatures on current ref
git sig verify [-g,--group=<group>] [-t,--threshold=<N>] [d,--diff=<branch>]
Verify m-of-n signatures by given group are present for directory.
git sig push [-r,--remote=<remote>]
Push all signatures on current ref
git sig fetch [-g,--group=<group>]
Fetch key by fingerprint. Optionally add to group.
git sig help
Show this text.
git sig version
Show version information.
```
## Methods
### Git
This method verifies the current HEAD was signed exactly as-is by one or more
keys.
This counts the commit signature, and any number of signed tags pointing at
this ref.
* Note
* Store/Verify signatures via Git Notes (default)
* Can be exported and verified by external tools even without git history
* Tag
* Any git signed tags count towards total signatures
* Can optionally store new signatures as "sig-*" signed tag
* Commit
* Signed commits count as one valid signature
### Assumptions
- Single sig mode: Repo contents controlled by signer
- Multi-sig mode: Repo contents verified by multiple signers
- Multi-sig group mode: Repo contents approved by specified individuals
- Hashing scheme for respective backend is not broken: (sha256)
- Hashing scheme is not broken: (SHA1, blame Torvalds)
## Examples
#### Verify at least one signature is present with a known key
```
sig verify
git sig verify
```
#### Verify 2 unique signatures from known keys
```
sig verify --threshold 2
git sig verify --threshold 2
```
#### Verify 3 unique signatures from specified signing group
```
sig verify --threshold 3 --group myteam
git sig verify --threshold 3 --group myteam
```
#### Show diff between HEAD and last ref with 2 verified unique signatures
```
sig verify --threshold 2 --diff
git sig verify --threshold 2 --diff
```
#### Add signature
```
sig add
git sig add
```
## Frequently Asked Questions

View File

@ -6,6 +6,9 @@ readonly MIN_GPG_VERSION=2.2
readonly MIN_OPENSSL_VERSION=1.1
readonly MIN_GETOPT_VERSION=2.33
GIT_SIG_GPG_VERIFY_COMMAND=${GIT_SIG_GPG_VERIFY_COMMAND:-gpg}
GIT_SIG_SIGN_COMMAND=${GIT_SIG_SIGN_COMMAND:-gpg}
## Private Functions
### Exit with error message
@ -97,7 +100,7 @@ check_tools(){
for cmd in "$@"; do
command -v "$1" >/dev/null || die "Error: $cmd not found"
case $cmd in
gpg)
${GIT_SIG_VERIFY_COMMAND})
version=$(gpg --version | head -n1 | cut -d" " -f3)
check_version "gnupg" "${version}" "${MIN_GPG_VERSION}"
;;
@ -116,7 +119,7 @@ check_tools(){
### Get primary UID for a given fingerprint
get_uid(){
local -r fp="${1?}"
gpg --list-keys --with-colons "${fp}" 2>&1 \
${GIT_SIG_VERIFY_COMMAND} --list-keys --with-colons "${fp}" 2>&1 \
| awk -F: '$1 == "uid" {print $10}' \
| head -n1
}
@ -124,7 +127,7 @@ get_uid(){
### Get primary fingerprint for given search
get_primary_fp(){
local -r search="${1?}"
gpg --list-keys --with-colons "${search}" 2>&1 \
${GIT_SIG_VERIFY_COMMAND} --list-keys --with-colons "${search}" 2>&1 \
| awk -F: '$1 == "fpr" {print $10}' \
| head -n1
}
@ -132,7 +135,7 @@ get_primary_fp(){
### Get fingerprint for a given pgp file
get_file_fp(){
local -r filename="${1?}"
gpg --list-packets "${filename}" \
${GIT_SIG_VERIFY_COMMAND} --list-packets "${filename}" \
| grep keyid \
| sed 's/.*keyid //g'
}
@ -168,7 +171,7 @@ group_add_fp(){
done
echo "Adding key \"${fp}\" to group \"${group_name}\""
gpg --list-keys >/dev/null 2>&1
${GIT_SIG_VERIFY_COMMAND} --list-keys >/dev/null 2>&1
printf 'group:0:%s' "${data%?}" \
| gpgconf --change-options gpg >/dev/null 2>&1
}
@ -176,7 +179,7 @@ group_add_fp(){
### Get fingerprints for a given group
group_get_fps(){
local -r group_name=${1?}
gpg --with-colons --list-config group \
${GIT_SIG_VERIFY_COMMAND} --with-colons --list-config group \
| grep -i "^cfg:group:${group_name}:" \
| cut -d ':' -f4
}
@ -209,19 +212,7 @@ group_check_fp(){
tree_hash() {
local -r ref="${1:-HEAD}"
local -r target=$(git rev-parse "$ref")
local -r current=$(git rev-parse HEAD)
[ "$target" == "$current" ] || git checkout "$target" >/dev/null 2>&1
mkdir -p ".${PROGRAM}"
printf "%s" "$( \
find . -type f -not -path "./.git/*" \
-exec openssl sha256 -r {} \;\
)" \
| sed -e 's/ \*/ /g' -e 's/ \.\// /g' \
| LC_ALL=C sort -k2 \
| openssl sha256 -r \
| sed -e 's/ .*//g'
[ "$target" == "$current" ] || git checkout "$current" >/dev/null 2>&1
git rev-parse "${ref}^{tree}"
}
sig_generate(){
@ -233,7 +224,7 @@ sig_generate(){
local -r body="sig:$version:$vcs_ref:$tree_hash:$review_hash:$sig_type"
local -r signature=$(\
printf "%s" "$body" \
| gpg \
| ${GIT_SIG_SIGN_COMMAND} \
--detach-sign \
--local-user "$key" \
| openssl base64 -A \
@ -298,7 +289,7 @@ verify_git_note(){
return 1;
}
gpg_sig_raw="$(
gpg --verify --status-fd=1 \
${GIT_SIG_VERIFY_COMMAND} --verify --status-fd=1 \
<(printf '%s' "$sig" | openssl base64 -d -A) \
<(printf '%s' "$body") 2>/dev/null \
)"
@ -326,7 +317,13 @@ verify_git_notes(){
verify_git_commit(){
local -r ref="${1:-HEAD}"
local gpg_sig_raw
gpg_sig_raw=$(git verify-commit "$ref" --raw 2>&1)
gpg_sig_raw=$( \
git \
-c "gpg.program=$GIT_SIG_VERIFY_COMMAND" \
verify-commit "$ref" \
--raw \
2>&1 \
)
parse_gpg_status "$gpg_sig_raw"
}
@ -351,9 +348,9 @@ verify(){
local -r group="${2}"
local -r ref=${3:-HEAD}
local sig_count=0 seen_fps fp commit_sig tag_sigs note_sigs
[ -d .git ] || [ -L .git ] || [ -f .git ] \
git rev-parse --git-dir >/dev/null 2>&1 \
|| die "Error: This folder is not a git repository"
if [[ $(git diff --stat) != '' ]]; then
if [[ $(git diff --stat) != '' ]]; then
die "Error: git tree is dirty"
fi
@ -367,7 +364,7 @@ verify(){
fi
tag_sigs=$(verify_git_tags "$ref") && \
while IFS= read -r line; do
while IFS= read -r line; do
IFS=':' read -r -a sig <<< "$line"
fp="${sig[1]}"
uid="${sig[5]}"
@ -378,7 +375,7 @@ verify(){
done <<< "$tag_sigs"
note_sigs=$(verify_git_notes "$ref") && \
while IFS= read -r line; do
while IFS= read -r line; do
IFS=':' read -r -a sig <<< "$line"
fp="${sig[1]}"
uid="${sig[5]}"
@ -387,7 +384,7 @@ verify(){
echo "Error: $error";
return 1;
}
echo "Verified signed git note commit by \"${uid}\""
echo "Verified signed git note by \"${uid}\""
if [[ "${seen_fps}" != *"${fp}"* ]]; then
seen_fps+=" ${fp}"
fi
@ -423,7 +420,7 @@ get_temp(){
## Add signed tag pointing at this commit.
## Optionally push to origin.
sign_tag(){
[ -d '.git' ] \
git rev-parse --git-dir >/dev/null 2>&1 \
|| die "Not a git repository"
command -v git >/dev/null \
|| die "Git not installed"
@ -443,7 +440,7 @@ sign_tag(){
## Add signed git note to this commit
## Optionally push to origin.
sign_note() {
[ -d '.git' ] \
git rev-parse --git-dir >/dev/null 2>&1 \
|| die "Not a git repository"
command -v git >/dev/null \
|| die "Git not installed"
@ -461,17 +458,21 @@ sign_note() {
[[ "$push" -eq "0" ]] || $PROGRAM push
}
## Public Commands
cmd_remove() {
git notes --ref signatures remove
}
cmd_verify() {
local opts threshold=1 group="" method="" diff=""
opts="$(getopt -o t:g:m:d:: -l threshold:,group:,ref:,diff:: -n "$PROGRAM" -- "$@")"
local opts threshold=1 remote="origin" group="" method="" diff=""
opts="$(getopt -o t:g:m:o:d:: -l threshold:,group:,ref:,remote:,diff:: -n "$PROGRAM" -- "$@")"
eval set -- "$opts"
while true; do case $1 in
-t|--threshold) threshold="$2"; shift 2 ;;
-g|--group) group="$2"; shift 2 ;;
-r|--ref) ref="$2"; shift 2 ;;
-o|--remote) remote="$2"; shift 2 ;;
-d|--diff) diff="1"; shift 2 ;;
--) shift; break ;;
esac done
@ -498,48 +499,6 @@ cmd_verify() {
return 1
}
cmd_fetch() {
local opts group="" group_fps=""
opts="$(getopt -o g: -l group: -n "$PROGRAM" -- "$@")"
eval set -- "$opts"
while true; do case $1 in
-g|--group) group="${2:-1}"; shift 2 ;;
--) shift; break ;;
esac done
[ $# -eq 1 ] || \
die "Usage: $PROGRAM fetch <fingerprint> [-g,--group=<group>]"
local -r fingerprint=${1}
if [ -n "$group" ]; then
group_fps=$(group_get_fps "${group_name}")
if [[ "${group_fps}" == *"${fingerprint}"* ]]; then
echo "Key \"${fingerprint}\" is already in group \"${group}\""
else
group_add_fp "${fingerprint}" "${group}"
fi
fi
gpg --list-keys "${fingerprint}" > /dev/null 2>&1 \
&& echo "Key \"${fingerprint}\" is already in local keychain" \
&& return 0
echo "Requested key is not in keyring. Trying keyservers..."
for server in \
ha.pool.sks-keyservers.net \
hkp://keyserver.ubuntu.com:80 \
hkp://p80.pool.sks-keyservers.net:80 \
pgp.mit.edu \
; do
echo "Fetching key \"${fingerprint}\" from \"${server}\"";
gpg \
--recv-key \
--keyserver "$server" \
--keyserver-options timeout=10 \
--recv-keys "${fingerprint}" \
&& break
done
}
cmd_add(){
local opts method="" push="0"
opts="$(getopt -o m:p:: -l method:,push:: -n "$PROGRAM" -- "$@")"
@ -550,27 +509,44 @@ cmd_add(){
--) shift; break ;;
esac done
case $method in
git) sign_note "$push" ;;
note) sign_note "$push" ;;
tag) sign_tag "$push" ;;
*) sign_note "$push" ;;
esac
}
cmd_push() {
[ "$#" -eq 0 ] || { usage push; exit 1; }
git fetch origin refs/notes/signatures:refs/notes/origin/signatures
git notes --ref signatures merge -s cat_sort_uniq origin/signatures
git push --tags origin refs/notes/signatures
local opts remote="origin" push="0"
opts="$(getopt -o r: -l remote: -n "$PROGRAM" -- "$@")"
eval set -- "$opts"
while true; do case $1 in
-r|--remote) remote="$2"; shift 2 ;;
--) shift; break ;;
esac done
git push --tags "$remote" refs/notes/signatures
}
cmd_pull() {
local opts remote="origin"
opts="$(getopt -o r: -l remote: -n "$PROGRAM" -- "$@")"
eval set -- "$opts"
while true; do case $1 in
-r|--remote) remote="$2"; shift 2 ;;
--) shift; break ;;
esac done
git fetch "$remote" refs/notes/signatures:refs/notes/${remote}/signatures
git notes --ref signatures merge -s cat_sort_uniq "${remote}"/signatures
}
cmd_version() {
cat <<-_EOF
==============================================
= sig: simple multisig trust toolchain =
= =
= v0.2 =
= =
= https://github.com/distrust-foundation/sig =
==============================================
==========================================
= git-sig: multisig trust for git =
= =
= v0.4 =
= =
= https://codeberg.org/distrust/git-sig =
==========================================
_EOF
}
@ -578,21 +554,25 @@ cmd_usage() {
cmd_version
cat <<-_EOF
Usage:
$PROGRAM add [-m,--method=<note|tag>] [-p,--push]
git sig add [-m,--method=<note|tag>] [-p,--push]
Add signature for this repository
$PROGRAM verify [-g,--group=<group>] [-t,--threshold=<N>] [d,--diff=<branch>]
git sig remove
Remove all signatures on current ref
git sig verify [-g,--group=<group>] [-t,--threshold=<N>] [d,--diff=<branch>]
Verify m-of-n signatures by given group are present for directory.
$PROGRAM fetch [-g,--group=<group>]
Fetch key by fingerprint. Optionally add to group.
$PROGRAM help
git sig push [-r,--remote=<remote>]
Push all signatures on current ref
git sig pull [-r,--remote=<remote>]
Pull all signatures for current ref
git sig help
Show this text.
$PROGRAM version
git sig version
Show version information.
_EOF
}
# Verify all tools in this list are installed at needed versions
check_tools git head cut find sort sed getopt gpg openssl
check_tools git head cut find sort sed getopt openssl ${GIT_SIG_VERIFY_COMMAND}
# Allow entire script to be namespaced based on filename
readonly PROGRAM="${0##*/}"
@ -601,8 +581,9 @@ readonly PROGRAM="${0##*/}"
case "$1" in
verify) shift; cmd_verify "$@" ;;
add) shift; cmd_add "$@" ;;
fetch) shift; cmd_fetch "$@" ;;
push) shift; cmd_push "$@" ;;
remove) shift; cmd_remove "$@" ;;
push) shift; cmd_push "$@" ;;
pull) shift; cmd_pull "$@" ;;
version|--version) shift; cmd_version "$@" ;;
help|--help) shift; cmd_usage "$@" ;;
*) cmd_usage "$@" ;;

View File

@ -1,38 +1,38 @@
load test_helper
@test "Outputs help if run without arguments" {
run sig
run git-sig
[ "$status" -eq 0 ]
echo "${output}" | grep "simple multisig trust toolchain"
echo "${output}" | grep "multisig trust for git"
}
@test "Outputs help if run with help" {
run sig help
run git-sig help
[ "$status" -eq 0 ]
echo "${output}" | grep "simple multisig trust toolchain"
echo "${output}" | grep "multisig trust for git"
}
@test "Outputs version if run with version" {
run sig version
run git-sig version
[ "$status" -eq 0 ]
echo "${output}" | grep "v0.2"
echo "${output}" | grep "v0.3"
}
@test "Outputs advice to install missing openssl" {
sudo rm /usr/bin/openssl
run sig version
run git-sig version
echo "${output}" | grep "apt install openssl"
}
@test "Outputs advice to install missing gpg" {
sudo rm /usr/bin/gpg
run sig version
run git-sig version
echo "${output}" | grep "apt install gnupg"
}
@test "Outputs advice to install missing getopt" {
sudo rm /usr/bin/getopt
run sig version
run git-sig version
echo "${output}" | grep "apt install getopt"
}
@ -43,26 +43,26 @@ load test_helper
git add .
git commit -m "initial commit"
echo "dirty" > somefile
run sig verify
run git-sig verify
[ "$status" -eq 1 ]
}
@test "Exit 1 if git method requested but not a repo" {
run sig verify
run git-sig verify
[ "$status" -eq 1 ]
}
@test "Verify succeeds when 1 unique git sig requirement is satisfied" {
@test "Verify succeeds when 1 unique git git-sig requirement is satisfied" {
set_identity "user1"
echo "test string" > somefile
git init
git add .
git commit -m "initial commit"
run sig verify
run git-sig verify
[ "$status" -eq 0 ]
}
@test "Verify succeeds when 3 unique git sig requirement is satisfied" {
@test "Verify succeeds when 3 unique git git-sig requirement is satisfied" {
git init
set_identity "user1"
echo "test string 1" > somefile1
@ -70,60 +70,60 @@ load test_helper
git commit -m "user1 commit"
set_identity "user2"
git log
sig add
git-sig add
set_identity "user3"
sig add
run sig verify --threshold 3
git-sig add
run git-sig verify --threshold 3
[ "$status" -eq 0 ]
}
@test "Verify fails when 2 unique git sig requirement is not satisfied" {
@test "Verify fails when 2 unique git git-sig requirement is not satisfied" {
git init
set_identity "user1"
echo "test string 1" > somefile1
git add .
git commit -m "user1 commit"
sig add
run sig verify --threshold 2
git-sig add
run git-sig verify --threshold 2
[ "$status" -eq 1 ]
}
@test "Verify succeeds when 1 group git sig requirement is satisifed" {
@test "Verify succeeds when 1 group git git-sig requirement is satisifed" {
set_identity "user1"
echo "test string" > somefile
git init
git add .
git commit -m "initial commit"
sig fetch --group maintainers AE08157232C35F04309FA478C5EBC4A7CF55A2D0
run sig verify --group maintainers
git-sig fetch --group maintainers AE08157232C35F04309FA478C5EBC4A7CF55A2D0
run git-sig verify --group maintainers
[ "$status" -eq 0 ]
}
@test "Verify succeeds when 3 group git sig requirement is satisifed" {
@test "Verify succeeds when 3 group git git-sig requirement is satisifed" {
set_identity "user1"
echo "test string" > somefile1
git init
git add .
git commit -m "User 1 Commit"
set_identity "user2"
sig add
git-sig add
set_identity "user3"
sig add
sig fetch --group maintainers AE08157232C35F04309FA478C5EBC4A7CF55A2D0
sig fetch --group maintainers BE4D60F6CFD2237A8AF978583C51CADD33BD0EE8
sig fetch --group maintainers 3E45AC9E190B4EE32BAE9F61A331AFB540761D69
run sig verify --threshold 3 --group maintainers
git-sig add
git-sig fetch --group maintainers AE08157232C35F04309FA478C5EBC4A7CF55A2D0
git-sig fetch --group maintainers BE4D60F6CFD2237A8AF978583C51CADD33BD0EE8
git-sig fetch --group maintainers 3E45AC9E190B4EE32BAE9F61A331AFB540761D69
run git-sig verify --threshold 3 --group maintainers
[ "$status" -eq 0 ]
}
@test "Verify fails when 2 group git sig requirement is not satisifed" {
@test "Verify fails when 2 group git git-sig requirement is not satisifed" {
set_identity "user1"
echo "test string" > somefile
git init
git add .
git commit -m "initial commit"
sig fetch --group maintainers AE08157232C35F04309FA478C5EBC4A7CF55A2D0
run sig verify --threshold 2 --group maintainers
git-sig fetch --group maintainers AE08157232C35F04309FA478C5EBC4A7CF55A2D0
run git-sig verify --threshold 2 --group maintainers
[ "$status" -eq 1 ]
}
@ -136,14 +136,14 @@ load test_helper
git commit -m "User 1 Commit"
set_identity "user2"
sig add
git-sig add
set_identity "user1"
echo "updated test string" > somefile1
git add .
git commit -m "User 1 Update Commit"
run sig verify --threshold 2 --ref HEAD~1
run git-sig verify --threshold 2 --ref HEAD~1
[ "$status" -eq 0 ]
}
@ -156,7 +156,7 @@ load test_helper
git commit -m "User 1 Commit"
set_identity "user2"
sig add
git-sig add
set_identity "user1"
git checkout -b feature_branch
@ -164,7 +164,7 @@ load test_helper
git add .
git commit -m "User 1 Update Commit"
run sig verify --diff --ref master --threshold 2
run git-sig verify --diff --ref master --threshold 2
[ "$status" -eq 0 ]
echo "${output}" | grep "updated test string"
}
@ -178,10 +178,10 @@ load test_helper
git commit -m "User 1 Commit 1"
set_identity "user2"
sig add
git-sig add
set_identity "user3"
sig add
set_identity "user3"
git-sig add
set_identity "user1"
echo "test string 2" > testfile
@ -189,7 +189,7 @@ load test_helper
git commit -m "User 1 Commit 2"
set_identity "user2"
sig add
git-sig add
set_identity "user1"
git checkout -b feature_branch
@ -197,7 +197,7 @@ load test_helper
git add .
git commit -m "User 1 Commit 3"
run sig verify --diff --threshold 3
run git-sig verify --diff --threshold 3
[ "$status" -eq 0 ]
echo "${output}" | grep "updated test string"
}

View File

@ -8,7 +8,7 @@ setup(){
bin_dir=/tmp/bin
temp_dir=$(mktemp -d -t test-XXXXXXXXXX)
mkdir -p /tmp/bin
ln -sfn /home/test/sig/sig /tmp/bin/sig
ln -sfn /home/test/sig/git-sig /tmp/bin/git-sig
export PATH=${bin_dir}:${PATH}
cd "$temp_dir" || return 1
rm -rf ~/.gnupg