Skip to content

Commit 975fb2c

Browse files
committed
Get NPM signing keys from @sigstore/tuf
Instead of hardcoding NPM signing keys for verification we get them from sigstore’s TUF repository. This is in line with how npm implements signature verification. Fixes #616, #612
1 parent 7f7336b commit 975fb2c

10 files changed

+275
-45
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
diff --git a/dist/fetcher.js b/dist/fetcher.js
2+
index f966ce1bb0cdc6c785ce1263f1faea15d3fe764c..3b50fa0c24fd5f6e9e29cf398a3d3bf13836fabd 100644
3+
--- a/dist/fetcher.js
4+
+++ b/dist/fetcher.js
5+
@@ -6,7 +6,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
6+
exports.DefaultFetcher = exports.BaseFetcher = void 0;
7+
const debug_1 = __importDefault(require("debug"));
8+
const fs_1 = __importDefault(require("fs"));
9+
-const make_fetch_happen_1 = __importDefault(require("make-fetch-happen"));
10+
+const stream = require("node:stream");
11+
const util_1 = __importDefault(require("util"));
12+
const error_1 = require("./error");
13+
const tmpfile_1 = require("./utils/tmpfile");
14+
@@ -61,14 +61,13 @@ class DefaultFetcher extends BaseFetcher {
15+
}
16+
async fetch(url) {
17+
log('GET %s', url);
18+
- const response = await (0, make_fetch_happen_1.default)(url, {
19+
- timeout: this.timeout,
20+
- retry: this.retry,
21+
+ const response = await globalThis.fetch(url, {
22+
+ timeout: this.timeout && AbortSignal.timeout(this.timeout)
23+
});
24+
if (!response.ok || !response?.body) {
25+
throw new error_1.DownloadHTTPError('Failed to download', response.status);
26+
}
27+
- return response.body;
28+
+ return stream.Readable.fromWeb(response.body);
29+
}
30+
}
31+
exports.DefaultFetcher = DefaultFetcher;

README.md

+11-2
Original file line numberDiff line numberDiff line change
@@ -316,8 +316,17 @@ same major line. Should you need to upgrade to a new major, use an explicit
316316
[`proxy-from-env`](https://github.com/Rob--W/proxy-from-env).
317317

318318
- `COREPACK_INTEGRITY_KEYS` can be set to an empty string or `0` to
319-
instruct Corepack to skip integrity checks, or to a JSON string containing
320-
custom keys.
319+
instruct Corepack to skip signature verification, or to a JSON string
320+
containing custom keys. The format based on the response of the
321+
`GET /-/npm/v1/keys` endpoint of npm registry under the `npm` key. That is,
322+
323+
```bash
324+
curl https://registry.npmjs.org/-/npm/v1/keys | jq -c '{npm: .keys}'
325+
```
326+
327+
See the [npm documentation on
328+
signatures](https://docs.npmjs.com/about-registry-signatures) for more
329+
information.
321330

322331
## Troubleshooting
323332

package.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@
1818
"license": "MIT",
1919
"packageManager": "yarn@4.6.0+sha512.5383cc12567a95f1d668fbe762dfe0075c595b4bfff433be478dbbe24e05251a8e8c3eb992a986667c1d53b6c3a9c85b8398c35a960587fbd9fa3a0915406728",
2020
"devDependencies": {
21+
"@sigstore/tuf": "^3.1.0",
2122
"@types/debug": "^4.1.5",
2223
"@types/node": "^20.4.6",
2324
"@types/proxy-from-env": "^1",
@@ -43,7 +44,8 @@
4344
"which": "^5.0.0"
4445
},
4546
"resolutions": {
46-
"undici-types": "6.x"
47+
"undici-types": "6.x",
48+
"tuf-js@npm:^3.0.1": "patch:tuf-js@npm%3A3.0.1#~/.yarn/patches/tuf-js-npm-3.0.1-9135d15fbd.patch"
4749
},
4850
"scripts": {
4951
"build": "run clean && run build:bundle && tsx ./mkshims.ts",

sources/corepackUtils.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -289,7 +289,7 @@ export async function installVersion(installTarget: string, locator: Locator, {s
289289
if (signatures! == null || integrity! == null)
290290
({signatures, integrity} = (await npmRegistryUtils.fetchTarballURLAndSignature(registry.package, version)));
291291

292-
npmRegistryUtils.verifySignature({signatures, integrity, packageName: registry.package, version});
292+
await npmRegistryUtils.verifySignature({signatures, integrity, packageName: registry.package, version});
293293
// @ts-expect-error ignore readonly
294294
build[1] = Buffer.from(integrity.slice(`sha512-`.length), `base64`).toString(`hex`);
295295
}

sources/npmRegistryUtils.ts

+92-16
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,14 @@
1+
import * as sigstoreTuf from '@sigstore/tuf';
12
import {UsageError} from 'clipanion';
2-
import {createVerify} from 'crypto';
3+
import assert from 'node:assert';
4+
import * as crypto from 'node:crypto';
5+
import * as path from 'node:path';
36

47
import defaultConfig from '../config.json';
58

69
import {shouldSkipIntegrityCheck} from './corepackUtils';
10+
import * as debugUtils from './debugUtils';
11+
import * as folderUtils from './folderUtils';
712
import * as httpUtils from './httpUtils';
813

914
// load abbreviated metadata as that's all we need for these calls
@@ -32,30 +37,101 @@ export async function fetchAsJson(packageName: string, version?: string) {
3237
return httpUtils.fetchAsJson(`${npmRegistryUrl}/${packageName}${version ? `/${version}` : ``}`, {headers});
3338
}
3439

35-
export function verifySignature({signatures, integrity, packageName, version}: {
40+
interface KeyInfo {
41+
keyid: string;
42+
key: crypto.KeyObject;
43+
}
44+
45+
async function fetchSigstoreTufKeys(): Promise<Array<KeyInfo> | null> {
46+
// This follows the implementation for npm.
47+
// See https://github.com/npm/cli/blob/3a80a7b7d168c23b5e297cba7b47ba5b9875934d/lib/utils/verify-signatures.js#L174
48+
let keysRaw: string;
49+
try {
50+
const sigstoreTufClient = await sigstoreTuf.initTUF({cachePath: path.join(folderUtils.getCorepackHomeFolder(), `_tuf`)});
51+
keysRaw = await sigstoreTufClient.getTarget(`registry.npmjs.org/keys.json`);
52+
} catch (error) {
53+
console.warn(`Failed to get signing keys from Sigstore TUF repo`, error);
54+
return null;
55+
}
56+
57+
// The format of the key file is undocumented but follows `PublicKey` from
58+
// sigstore/protobuf-specs.
59+
// See https://github.com/sigstore/protobuf-specs/blob/main/gen/pb-typescript/src/__generated__/sigstore_common.ts
60+
const keysFromSigstore = JSON.parse(keysRaw) as {keys: Array<{keyId: string, publicKey: {rawBytes: string, keyDetails: string}}>};
61+
62+
return keysFromSigstore.keys.filter(key => {
63+
if (key.publicKey.keyDetails === `PKIX_ECDSA_P256_SHA_256`) {
64+
return true;
65+
} else {
66+
debugUtils.log(`Unsupported verification key type ${key.publicKey.keyDetails}`);
67+
return false;
68+
}
69+
}).map(k => ({
70+
keyid: k.keyId,
71+
key: crypto.createPublicKey({key: Buffer.from(k.publicKey.rawBytes, `base64`), format: `der`, type: `spki`}),
72+
}));
73+
}
74+
75+
async function getVerificationKeys(): Promise<Array<KeyInfo>> {
76+
let keys: Array<{keyid: string, key: string}>;
77+
78+
if (process.env.COREPACK_INTEGRITY_KEYS) {
79+
// We use the format of the `GET /-/npm/v1/keys` endpoint with `npm` instead
80+
// of `keys` as the wrapping key.
81+
const keysFromEnv = JSON.parse(process.env.COREPACK_INTEGRITY_KEYS) as {npm: Array<{keyid: string, key: string}>};
82+
keys = keysFromEnv.npm;
83+
debugUtils.log(`Using COREPACK_INTEGRITY_KEYS to verify signatures: ${keys.map(k => k.keyid).join(`, `)}`);
84+
return keys.map(k => ({
85+
keyid: k.keyid,
86+
key: crypto.createPublicKey(`-----BEGIN PUBLIC KEY-----\n${k.key}\n-----END PUBLIC KEY-----`,
87+
),
88+
}));
89+
}
90+
91+
92+
const sigstoreKeys = await fetchSigstoreTufKeys();
93+
if (sigstoreKeys) {
94+
debugUtils.log(`Using NPM keys from @sigstore/tuf to verify signatures: ${sigstoreKeys.map(k => k.keyid).join(`, `)}`);
95+
return sigstoreKeys;
96+
}
97+
98+
debugUtils.log(`Falling back to built-in npm verification keys`);
99+
return defaultConfig.keys.npm.map(k => ({
100+
keyid: k.keyid,
101+
key: crypto.createPublicKey(`-----BEGIN PUBLIC KEY-----\n${k.key}\n-----END PUBLIC KEY-----`,
102+
),
103+
}));
104+
}
105+
106+
let verificationKeysCache: Promise<Array<{ keyid: string, key: crypto.KeyObject }>> | null = null;
107+
108+
export async function verifySignature({signatures, integrity, packageName, version}: {
36109
signatures: Array<{keyid: string, sig: string}>;
37110
integrity: string;
38111
packageName: string;
39112
version: string;
40113
}) {
41-
const {npm: keys} = process.env.COREPACK_INTEGRITY_KEYS ?
42-
JSON.parse(process.env.COREPACK_INTEGRITY_KEYS) as typeof defaultConfig.keys :
43-
defaultConfig.keys;
114+
if (!verificationKeysCache)
115+
verificationKeysCache = getVerificationKeys();
44116

117+
const keys = await verificationKeysCache;
45118
const key = keys.find(({keyid}) => signatures.some(s => s.keyid === keyid));
46-
const signature = signatures.find(({keyid}) => keyid === key?.keyid);
119+
if (key == null)
120+
throw new Error(`Cannot find key to verify signature. signature keys: ${signatures.map(s => s.keyid)}, verification keys: ${keys.map(k => k.keyid)}`);
121+
122+
const signature = signatures.find(({keyid}) => keyid === key.keyid);
123+
assert(signature);
47124

48-
if (key == null || signature == null) throw new Error(`Cannot find matching keyid: ${JSON.stringify({signatures, keys})}`);
125+
const verifier = crypto.createVerify(`SHA256`);
126+
const payload = `${packageName}@${version}:${integrity}`;
127+
verifier.end(payload);
128+
const valid = verifier.verify(key, signature.sig, `base64`);
49129

50-
const verifier = createVerify(`SHA256`);
51-
verifier.end(`${packageName}@${version}:${integrity}`);
52-
const valid = verifier.verify(
53-
`-----BEGIN PUBLIC KEY-----\n${key.key}\n-----END PUBLIC KEY-----`,
54-
signature.sig,
55-
`base64`,
56-
);
57130
if (!valid) {
58-
throw new Error(`Signature does not match`);
131+
throw new Error(
132+
`Signature verification failed for ${payload} with key ${key.keyid}\n` +
133+
`If you are using a custom registry you can set COREPACK_INTEGRITY_KEYS.`,
134+
);
59135
}
60136
}
61137

@@ -65,7 +141,7 @@ export async function fetchLatestStableVersion(packageName: string) {
65141
const {version, dist: {integrity, signatures, shasum}} = metadata;
66142

67143
if (!shouldSkipIntegrityCheck()) {
68-
verifySignature({
144+
await verifySignature({
69145
packageName, version,
70146
integrity, signatures,
71147
});

tests/_registryServer.mjs

+29-13
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,14 @@ import {gzipSync} from 'node:zlib';
77
let privateKey, keyid;
88

99
switch (process.env.TEST_INTEGRITY) {
10+
case `invalid_npm_signature`: {
11+
({privateKey} = generateKeyPairSync(`ec`, {
12+
namedCurve: `sect239k1`,
13+
}));
14+
// Known npm signing key
15+
keyid = `SHA256:DhQ8wR5APBvFHLF/+Tc+AYvPOdTpcIDqOhxsBHRwC7U`;
16+
break;
17+
}
1018
case `invalid_signature`: {
1119
({privateKey} = generateKeyPairSync(`ec`, {
1220
namedCurve: `sect239k1`,
@@ -199,41 +207,49 @@ server.listen(0, `localhost`);
199207
await once(server, `listening`);
200208

201209
const {address, port} = server.address();
210+
const serverAddress = `${address.includes(`:`) ? `[${address}]` : address}:${port}`;
211+
202212
switch (process.env.AUTH_TYPE) {
203213
case `PROXY`:
204214
// The proxy set up above will redirect all requests to our custom registry,
205215
process.env.COREPACK_NPM_REGISTRY = `http://user:pass@example.com`;
206216
break;
207217

208218
case `COREPACK_NPM_REGISTRY`:
209-
process.env.COREPACK_NPM_REGISTRY = `http://user:pass@${address.includes(`:`) ? `[${address}]` : address}:${port}`;
219+
process.env.COREPACK_NPM_REGISTRY = `http://user:pass@${serverAddress}`;
210220
break;
211221

212222
case `COREPACK_NPM_TOKEN`:
213-
process.env.COREPACK_NPM_REGISTRY = `http://${address.includes(`:`) ? `[${address}]` : address}:${port}`;
223+
process.env.COREPACK_NPM_REGISTRY = `http://${serverAddress}`;
214224
process.env.COREPACK_NPM_TOKEN = TOKEN_MOCK;
215225
break;
216226

217227
case `COREPACK_NPM_PASSWORD`:
218-
process.env.COREPACK_NPM_REGISTRY = `http://${address.includes(`:`) ? `[${address}]` : address}:${port}`;
228+
process.env.COREPACK_NPM_REGISTRY = `http://${serverAddress}`;
219229
process.env.COREPACK_NPM_USERNAME = `user`;
220230
process.env.COREPACK_NPM_PASSWORD = `pass`;
221231
break;
222232

223233
default: throw new Error(`Invalid AUTH_TYPE in env`, {cause: process.env.AUTH_TYPE});
224234
}
225235

226-
if (process.env.NOCK_ENV === `replay`) {
227-
const originalFetch = globalThis.fetch;
228-
globalThis.fetch = function fetch(i) {
229-
if (!`${i}`.startsWith(
230-
process.env.AUTH_TYPE === `PROXY` ?
231-
`http://example.com` :
232-
`http://${address.includes(`:`) ? `[${address}]` : address}:${port}`))
233-
throw new Error(`Unexpected request to ${i}`);
236+
const passthroughUrls = [
237+
process.env.AUTH_TYPE === `PROXY` ?
238+
`http://example.com` :
239+
`http://${serverAddress}`,
240+
];
241+
242+
if (!process.env.BLOCK_SIGSTORE_TUF_REQUESTS)
243+
passthroughUrls.push(`https://tuf-repo-cdn.sigstore.dev/`);
234244

245+
246+
const originalFetch = globalThis.fetch;
247+
globalThis.fetch = function fetch(url) {
248+
if (passthroughUrls.some(passthroughUrl => url.toString().startsWith(passthroughUrl)))
235249
return Reflect.apply(originalFetch, this, arguments);
236-
};
237-
}
250+
251+
252+
throw new Error(`Unexpected request to ${url}`);
253+
};
238254

239255
server.unref();

0 commit comments

Comments
 (0)