Skip to content

Test with Docker build #16

Test with Docker build

Test with Docker build #16

Workflow file for this run

name: Test with Docker build
on:
workflow_dispatch:
push:
branches: [ "release" ]
pull_request:
branches: [ "release" ]
jobs:
build:
runs-on: ubuntu-latest
strategy:
matrix:
python-version: ["3.8"]
steps:
- uses: actions/checkout@v3
- name: Build the Docker image
run: "cd standalone && docker build . --file Dockerfile --tag rsa_sig2n:latest && cd .."
- name: Install Python dependencies for CVE-2017-11424
run: |
python -m pip install --upgrade pip
pip install PyJWT==1.7.1
- name: Run RS256 test with CVE-2017-11424
run: |
docker run rsa_sig2n python3 jwt_forgery.py `cat ./CVE-2017-11424/test_jwt/RS256/jwt0` `cat ./CVE-2017-11424/test_jwt/RS256/jwt1` | egrep '^eyJ' | tee CVE-2017-11424_RS256.tokens
./test_scripts/test_CVE-2017-11424.sh CVE-2017-11424_RS256.tokens
- name: Run RS384 test with CVE-2017-11424
run: |
docker run rsa_sig2n python3 jwt_forgery.py `cat ./CVE-2017-11424/test_jwt/RS384/jwt0` `cat ./CVE-2017-11424/test_jwt/RS384/jwt1` | egrep '^eyJ' | tee CVE-2017-11424_RS384.tokens
./test_scripts/test_CVE-2017-11424.sh CVE-2017-11424_RS384.tokens
- name: Run RS512 test with CVE-2017-11424
run: |
docker run rsa_sig2n python3 jwt_forgery.py `cat ./CVE-2017-11424/test_jwt/RS512/jwt0` `cat ./CVE-2017-11424/test_jwt/RS512/jwt1` | egrep '^eyJ' | tee CVE-2017-11424_RS512.tokens
./test_scripts/test_CVE-2017-11424.sh CVE-2017-11424_RS512.tokens