// GetOrCreateTimestampKey returns the timestamp key for the gun. It uses the store to // lookup an existing timestamp key and the crypto to generate a new one if none is // found. It attempts to handle the race condition that may occur if 2 servers try to // create the key at the same time by simply querying the store a second time if it // receives a conflict when writing. func GetOrCreateTimestampKey(gun string, store storage.MetaStore, crypto signed.CryptoService, fallBackAlgorithm data.KeyAlgorithm) (data.PublicKey, error) { keyAlgorithm, public, err := store.GetTimestampKey(gun) if err == nil { return data.NewPublicKey(keyAlgorithm, public), nil } if _, ok := err.(*storage.ErrNoKey); ok { key, err := crypto.Create("timestamp", fallBackAlgorithm) if err != nil { return nil, err } logrus.Debug("Creating new timestamp key for ", gun, ". With algo: ", key.Algorithm()) err = store.SetTimestampKey(gun, key.Algorithm(), key.Public()) if err == nil { return key, nil } if _, ok := err.(*storage.ErrTimestampKeyExists); ok { keyAlgorithm, public, err = store.GetTimestampKey(gun) if err != nil { return nil, err } return data.NewPublicKey(keyAlgorithm, public), nil } return nil, err } return nil, err }
// GetOrCreateTimestampKey returns the timestamp key for the gun. It uses the store to // lookup an existing timestamp key and the crypto to generate a new one if none is // found. It attempts to handle the race condition that may occur if 2 servers try to // create the key at the same time by simply querying the store a second time if it // receives a conflict when writing. func GetOrCreateTimestampKey(gun string, store storage.MetaStore, crypto signed.CryptoService, fallBackAlgorithm data.KeyAlgorithm) (*data.TUFKey, error) { keyAlgorithm, public, err := store.GetTimestampKey(gun) if err == nil { return data.NewTUFKey(keyAlgorithm, public, nil), nil } if _, ok := err.(*storage.ErrNoKey); ok { key, err := crypto.Create("timestamp", fallBackAlgorithm) if err != nil { return nil, err } err = store.SetTimestampKey(gun, key.Algorithm(), key.Public()) if err == nil { return &key.TUFKey, nil } if _, ok := err.(*storage.ErrTimestampKeyExists); ok { keyAlgorithm, public, err = store.GetTimestampKey(gun) if err != nil { return nil, err } return data.NewTUFKey(keyAlgorithm, public, nil), nil } return nil, err } return nil, err }
// GetOrCreateTimestampKey returns the timestamp key for the gun. It uses the store to // lookup an existing timestamp key and the crypto to generate a new one if none is // found. It attempts to handle the race condition that may occur if 2 servers try to // create the key at the same time by simply querying the store a second time if it // receives a conflict when writing. func GetOrCreateTimestampKey(gun string, store storage.MetaStore, crypto signed.CryptoService) (*data.TUFKey, error) { cipher, public, err := store.GetTimestampKey(gun) if err == nil { return data.NewTUFKey(cipher, public, nil), nil } if _, ok := err.(*storage.ErrNoKey); ok { key, err := crypto.Create("timestamp") if err != nil { return nil, err } err = store.SetTimestampKey(gun, key.Cipher(), key.Public()) if err == nil { return &key.TUFKey, nil } if _, ok := err.(*storage.ErrTimestampKeyExists); ok { cipher, public, err = store.GetTimestampKey(gun) if err != nil { return nil, err } return data.NewTUFKey(cipher, public, nil), nil } return nil, err } return nil, err }
func initRepo(t *testing.T, cryptoService signed.CryptoService, keyDB *keys.KeyDB) *TufRepo { rootKey, err := cryptoService.Create("root", data.ED25519Key) if err != nil { t.Fatal(err) } targetsKey, err := cryptoService.Create("targets", data.ED25519Key) if err != nil { t.Fatal(err) } snapshotKey, err := cryptoService.Create("snapshot", data.ED25519Key) if err != nil { t.Fatal(err) } timestampKey, err := cryptoService.Create("timestamp", data.ED25519Key) if err != nil { t.Fatal(err) } keyDB.AddKey(rootKey) keyDB.AddKey(targetsKey) keyDB.AddKey(snapshotKey) keyDB.AddKey(timestampKey) rootRole := &data.Role{ Name: "root", RootRole: data.RootRole{ KeyIDs: []string{rootKey.ID()}, Threshold: 1, }, } targetsRole := &data.Role{ Name: "targets", RootRole: data.RootRole{ KeyIDs: []string{targetsKey.ID()}, Threshold: 1, }, } snapshotRole := &data.Role{ Name: "snapshot", RootRole: data.RootRole{ KeyIDs: []string{snapshotKey.ID()}, Threshold: 1, }, } timestampRole := &data.Role{ Name: "timestamp", RootRole: data.RootRole{ KeyIDs: []string{timestampKey.ID()}, Threshold: 1, }, } keyDB.AddRole(rootRole) keyDB.AddRole(targetsRole) keyDB.AddRole(snapshotRole) keyDB.AddRole(timestampRole) repo := NewTufRepo(keyDB, cryptoService) err = repo.InitRepo(false) if err != nil { t.Fatal(err) } return repo }