https://git.schokokeks.org/derivepassphrase.git/tree/b685fdd3a683a781d48c35832818f9c4e0f6790aRecent commits to derivepassphrase.git (b685fdd3a683a781d48c35832818f9c4e0f6790a)2024-09-27T19:05:16+02:00tag:gitlist.org,2012:commit/b685fdd3a683a781d48c35832818f9c4e0f6790aAdd hypothesis-based tests (and bugfix) for the vault derivation scheme2024-09-27T19:05:16+02:00Marco Riccisoftware@the13thletter.info
<pre>There are currently three such property-based tests: a test for general
adherence to constraints (with small numbers), and two tests
specifically for length and repeat constraints (with larger numbers).
Combining these into a single test caused the test runs to vary wildly
in execution time, which is undesirable from a configuration point of
view (and also causes hypothesis to complain).
The hypothesis tests actually uncovered a bug in the API specification
of the vault derivation scheme: during generation, we may run out of
possible characters for the next letter due to repeat constraints, but
only realize this now. This already generated a `ValueError`, but with
a confusing error message, and the documentation seemed to suggest that
all unsatisfiable constraints are already detected at construction time.
So now explicitly mention that constraint unsatisfiability may be
detected both in the `Vault` constructor and in `Vault.generate`, and
handle lower-lever `ValueError`s in `Vault.generate` explicitly too.
</pre>
tag:gitlist.org,2012:commit/bf906f3d8786229aba3513eef084814cd5b85b07Set up the "hypothesis" testing library2024-09-27T17:32:46+02:00Marco Riccisoftware@the13thletter.info
<pre>"hypothesis" is a Python library for property-based testing, i.e. for
asserting that the output of the tested code satisfies some property by
generating valid test inputs and testing these. For `derivepassphrase`
in particular, this means generating different passphrase constraint
settings and testing that the generated passphrases match these
constraints, no matter what constraints exactly are chosen (within
reason). The hypothesis library provides methods to generate test input
(test function parameter values, or custom walks for state machine-like
systems) and, for failing examples, shrink those to shorter/simpler ones
exhibiting the same error.
By its nature, hypothesis runs unit test functions multiple times with
different inputs, and so takes much longer than normal unit tests. (In
the default configuration, 200 examples per test are run.) It is
therefore sensible to set up alternate testing profiles with more or
less examples per test, and to include a mechanism in the test runner to
switch to these profiles. The hypothesis documentation provides an
explicit example for profile setup for pytest use, plus three sensible
configurations "ci", "dev" and "debug", which I copied. The pytest
command-line as called by `hatch test` is also straightforward to adapt:
add `--hypothesis-profile=...` to all pytest invocations. However, the
shape of the `hatch test` environment matrix no longer matches the
reality of scenarios we'd like to test (because we added a new
dimension: slow, thorough testing, or fast testing). So use this
opportunity to also clean up the matrix.
</pre>
tag:gitlist.org,2012:commit/ef6258d3cec6e30cda8968f822b223aaf0cb0f8aMerge topic branch 'issue12-ssh-agent-spawning' into master2024-09-22T19:23:07+02:00Marco Riccisoftware@the13thletter.info
<pre>* t/issue12-ssh-agent-spawning:
Remove debugging-only code and add missing docstring in pytest fixtures
</pre>
tag:gitlist.org,2012:commit/d01a4dc9631e6281c268228d281903643147e3f8Remove debugging-only code and add missing docstring in pytest fixtures2024-09-22T19:19:38+02:00Marco Riccisoftware@the13thletter.info
<pre></pre>
tag:gitlist.org,2012:commit/dd606b3a051f0ba3bc76d0ef6e14ba3fb5d87298Merge topic branch 'issue12-ssh-agent-spawning' into master2024-09-22T18:40:33+02:00Marco Riccisoftware@the13thletter.info
<pre>* t/issue12-ssh-agent-spawning:
Add Changelog entry for the test suite SSH agent spawner
Add test fixture for manually spawning known SSH agents
Retire non-repeatability check for unsuitable SSH keys in the tests
Add principal support for uploading SSH keys to the agent
Simplify some SSH agent key uploading tests
Support passing expected SSH agent response codes
GitHub: Closes #12.
</pre>
tag:gitlist.org,2012:commit/0f8ad24096b08640eb38687821d09f13a656967cAdd Changelog entry for the test suite SSH agent spawner2024-09-22T18:36:19+02:00Marco Riccisoftware@the13thletter.info
<pre></pre>
tag:gitlist.org,2012:commit/63b51df7a39fd642ca079ac390014d23f617b972Add test fixture for manually spawning known SSH agents2024-09-22T16:37:58+02:00Marco Riccisoftware@the13thletter.info
<pre>Include pytest fixtures to spawn known SSH agents and interface with
the running SSH agent, in an agent-agnostic way. Move the key loading
parts from the test functions into the test fixtures.
This generally makes the actual test functions somewhat cleaner and
easier to read, but because the monkeypatch fixture interferes with
these new fixtures, the net improvements to readibility are only
moderate. The test functions do however profit directly from
reduced copy-and-paste in the key loading part.
Pageant is one of the supported agents, and it behaves markedly
differently than OpenSSH's agent. In particular, Pageant does not
support adding keys with constraints or re-submitting a key it is
already holding, and *every* key type Pageant currently offers yields
a deterministic signature. Furthermore, a bug concerning output
buffering in Pageant 0.81 and lower currently makes it impossible to use
Pageant as a subprocess properly without correctly guessing the socket
address. (This has already been reported upstream.) On the other hand,
Pageant supports ed448 keys, which OpenSSH doesn't. So, implementing
support for Pageant was very valuable to highlight areas where the code
made unreasonable assumptions about SSH agent behavior, in particular
the availability and behavior of the system SSH agent service.
The new fixtures live in `tests/conftest.py`, following a relevant
pytest convention. The fixtures themselves are necessarily platform-
and runtime-dependent, so even though they are test code that should be
included in test coverage, all parts dealing with querying the system,
spawning programs, error handling related to the former and ensuring
a certain functionality is available (or skipping the test otherwise)
are excluded from test coverage. In particular, this includes the
entire fixture to ensure a running agent, and the cleanup part of the
agent with loaded keys fixture; I have however tried various
constellations by hand to ensure the code works if certain agents are
available or unavailable.
</pre>
tag:gitlist.org,2012:commit/7c1d055316e9e6a254c91e9b9f206cddbec4df8fRetire non-repeatability check for unsuitable SSH keys in the tests2024-09-21T12:17:48+02:00Marco Riccisoftware@the13thletter.info
<pre>DSA and ECDSA keys use a nonce during signing, and it is well-known that
reusing the nonce for another signature allows the private key to be
derived directly from those two signatures. Because of this, many
implementations choose the nonce via a high-quality random number
generator. This leads to DSA and ECDSA signatures being non-repeatable,
i.e. signing the same document twice leads to two different
signatures/binary strings. OpenSSH's agent behaves this way.
However, various implementations of DSA or DSA variants have attempted
to find a way to avoid the random number generator by choosing the nonce
deterministically (but still unpredictably, for an attacker): EdDSA
mandates a specific nonce as part of the specification, and RFC 6979
outlines a different deterministic nonce scheme for all (other) DSA
variants. All versions of PuTTY/Pageant use deterministic nonce
generation (a homegrown system in 0.80 and lower, RFC 6979 afterwards),
so DSA and ECDSA signatures by Pageant *are* repeatable. And there is
no reason why OpenSSH couldn't adopt RFC 6979 in the future.
Therefore, remove the check for repeatability in the tests. The `Vault`
class check for key suitability remains unchanged, because while
DSA/ECDSA keys *can* use repeatable signatures, such use is not
*guaranteed*.
</pre>
tag:gitlist.org,2012:commit/3035794147127de9be9b42cf96353e598389b71aAdd principal support for uploading SSH keys to the agent2024-09-21T12:10:20+02:00Marco Riccisoftware@the13thletter.info
<pre>Add the necessary protocol numbers to the `SSH_AGENT` and `SSH_AGENTC`
enums, and the necessary `private_key_blob` data to the
`tests.SUPPORTED_KEYS` and `tests.UNSUITABLE_KEYS` objects.
This suffices for key uploads without constraints, but adding a key
*with* constraints still requires knowledge about the encoding of the
constraints in the agent protocol.
</pre>
tag:gitlist.org,2012:commit/ddce2cbfe9821f95d24d3e2649edbac6f3801574Simplify some SSH agent key uploading tests2024-09-21T11:58:57+02:00Marco Riccisoftware@the13thletter.info
<pre>Remove unused test parameters, which were used solely for display
purposes to generate a readable test ID. Instead of this, use the `ids`
parameter of `pytest.mark.parametrize` directly.
</pre>