mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-12-29 07:42:23 -05:00
7b4bf4ee88
* guix/scripts/git/authenticate.scm (%default-options): Remove ‘keyring-reference’. (config-value, configured-introduction, configured-keyring-reference) (configured?, record-configuration, current-branch): New procedures. (guix-git-authenticate)[missing-arguments]: New procedure. Use ‘configured-introduction’ when zero arguments are given. Use ‘configured-keyring-reference’ when ‘-k’ is not passed. Add call to ‘record-configuration’. * doc/guix.texi (Invoking guix git authenticate): Document it. Change-Id: I66e111a83f50407b52da71662629947f83a78bbc
75 lines
3 KiB
Bash
75 lines
3 KiB
Bash
# GNU Guix --- Functional package management for GNU
|
|
# Copyright © 2020, 2022, 2024 Ludovic Courtès <ludo@gnu.org>
|
|
#
|
|
# This file is part of GNU Guix.
|
|
#
|
|
# GNU Guix is free software; you can redistribute it and/or modify it
|
|
# under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or (at
|
|
# your option) any later version.
|
|
#
|
|
# GNU Guix is distributed in the hope that it will be useful, but
|
|
# WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
#
|
|
# Test the 'guix git authenticate' command-line utility.
|
|
#
|
|
|
|
# Skip if we're not in a Git checkout.
|
|
[ -d "$abs_top_srcdir/.git" ] || exit 77
|
|
|
|
# Skip if there's no 'keyring' branch.
|
|
guile -c '(use-modules (git))
|
|
(member "refs/heads/keyring" (branch-list (repository-open ".")))' || \
|
|
exit 77
|
|
|
|
# Keep in sync with '%default-channels' in (guix channels)!
|
|
intro_commit="9edb3f66fd807b096b48283debdcddccfea34bad"
|
|
intro_signer="BBB0 2DDF 2CEA F6A8 0D1D E643 A2A0 6DF2 A33A 54FA"
|
|
|
|
cache_key="test-$$"
|
|
|
|
# This must fail because the end commit is not a descendant of $intro_commit.
|
|
guix git authenticate "$intro_commit" "$intro_signer" \
|
|
--cache-key="$cache_key" --stats \
|
|
--end=9549f0283a78fe36f2d4ff2a04ef8ad6b0c02604 && false
|
|
|
|
# The v1.2.0 commit is a descendant of $intro_commit and it satisfies the
|
|
# authorization invariant.
|
|
v1_2_0_commit="a099685659b4bfa6b3218f84953cbb7ff9e88063"
|
|
guix git authenticate "$intro_commit" "$intro_signer" \
|
|
--cache-key="$cache_key" --stats \
|
|
--end="$v1_2_0_commit"
|
|
|
|
# Check a commit that came soon after v1.2.0. No need to repeat $intro_commit
|
|
# and $intro_signer because it should have been recorded in '.git/config'.
|
|
after_v1_2_0="be4d9527b55b6829e33a6e0727496af25927a786"
|
|
guix git authenticate \
|
|
--cache-key="$cache_key" --stats \
|
|
--end="$v1_2_0_commit"
|
|
|
|
rm "$XDG_CACHE_HOME/guix/authentication/$cache_key"
|
|
|
|
# Commit and signer of the 'v1.0.0' tag.
|
|
v1_0_0_commit="6298c3ffd9654d3231a6f25390b056483e8f407c"
|
|
v1_0_0_signer="3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5" # civodul
|
|
v1_0_1_commit="d68de958b60426798ed62797ff7c96c327a672ac"
|
|
|
|
# This should succeed because v1.0.0 is an ancestor of $intro_commit.
|
|
guix git authenticate "$intro_commit" "$intro_signer" \
|
|
--cache-key="$cache_key" --stats \
|
|
--end="$v1_0_0_commit"
|
|
|
|
# This should fail because these commits lack '.guix-authorizations'.
|
|
guix git authenticate "$v1_0_0_commit" "$v1_0_0_signer" \
|
|
--cache-key="$cache_key" --end="$v1_0_1_commit" && false
|
|
|
|
# This should work thanks to '--historical-authorizations'.
|
|
guix git authenticate "$v1_0_0_commit" "$v1_0_0_signer" \
|
|
--cache-key="$cache_key" --end="$v1_0_1_commit" --stats \
|
|
--historical-authorizations="$abs_top_srcdir/etc/historical-authorizations"
|