18 #include <boost/format.hpp>
37 #undef ZYPP_BASE_LOGGER_LOGGROUP
38 #define ZYPP_BASE_LOGGER_LOGGROUP "zypp::KeyRing"
41 #define GPG_BINARY "/usr/bin/gpg2"
55 {
return _keyRingDefaultAccept; }
59 MIL <<
"Set new KeyRing::DefaultAccept: " << value_r << endl;
60 _keyRingDefaultAccept = value_r;
94 struct CachedPublicKeyData
96 const std::list<PublicKeyData> & operator()(
const Pathname & keyring_r )
const
97 {
return getData( keyring_r ); }
105 Cache(
const Cache & rhs ) {}
107 void assertCache(
const Pathname & keyring_r )
116 bool hasChanged()
const
130 typedef std::map<Pathname,Cache> CacheMap;
132 const std::list<PublicKeyData> & getData(
const Pathname & keyring_r )
const
136 cache.assertCache( keyring_r );
137 return getData( keyring_r, cache );
140 const std::list<PublicKeyData> & getData(
const Pathname & keyring_r, Cache & cache_r )
const
142 if ( cache_r.hasChanged() )
147 "--list-public-keys",
148 "--homedir", keyring_r.c_str(),
149 "--no-default-keyring",
153 "--with-fingerprint",
162 PublicKeyScanner scanner;
164 for( std::string line = prog.receiveLine(); !line.empty(); line = prog.receiveLine() )
166 scanner.scan( line );
170 cache_r._data.swap( scanner._keys );
171 MIL <<
"Found keys: " << cache_r._data << endl;
173 return cache_r._data;
188 Impl(
const Pathname & baseTmpDir )
193 MIL <<
"Current KeyRing::DefaultAccept: " << _keyRingDefaultAccept << endl;
197 void multiKeyImport(
const Pathname & keyfile_r,
bool trusted_r =
false );
198 void deleteKey(
const std::string &
id,
bool trusted );
217 void dumpPublicKey(
const std::string &
id,
bool trusted, std::ostream & stream )
233 bool verifyFile(
const Pathname & file,
const Pathname & signature,
const Pathname & keyring );
234 void importKey(
const Pathname & keyfile,
const Pathname & keyring );
239 void dumpPublicKey(
const std::string &
id,
const Pathname & keyring, std::ostream & stream );
242 void deleteKey(
const std::string &
id,
const Pathname & keyring );
244 std::list<PublicKey>
publicKeys(
const Pathname & keyring);
281 rpmdbEmitSignal->trustedKeyAdded( key );
282 emitSignal->trustedKeyAdded( key );
288 importKey( keyfile_r, trusted_r ? trustedKeyRing() : generalKeyRing() );
297 key = exportKey(
id, trustedKeyRing() );
300 deleteKey(
id, trusted ? trustedKeyRing() : generalKeyRing() );
307 rpmdbEmitSignal->trustedKeyRemoved( key );
308 emitSignal->trustedKeyRemoved( key );
314 MIL <<
"Searching key [" <<
id <<
"] in keyring " << keyring << endl;
315 const std::list<PublicKeyData> & keys(
publicKeyData( keyring ) );
316 for_( it, keys.begin(), keys.end() )
318 if (
id == (*it).id() )
328 return PublicKey( dumpPublicKeyToTmp( keyData.
id(), keyring ), keyData );
335 return PublicKey( dumpPublicKeyToTmp( keyData.
id(), keyring ), keyData );
338 WAR <<
"No key " <<
id <<
" to export from " << keyring << endl;
350 "--homedir", keyring.asString().c_str(),
351 "--no-default-keyring",
355 "--no-permission-warning",
371 MIL <<
"Going to export key " <<
id <<
" from " << keyring <<
" to " << tmpFile.
path() << endl;
373 std::ofstream os( tmpFile.
path().
c_str() );
384 MIL <<
"Going to verify signature for " << filedesc <<
" ( " << file <<
" ) with " << signature << endl;
387 if( signature.empty() || (!PathInfo( signature ).isExist()) )
389 bool res = report->askUserToAcceptUnsignedFile( filedesc, context );
390 MIL <<
"User decision on unsigned file: " << res << endl;
398 PublicKeyData trustedKeyData( publicKeyExists(
id, trustedKeyRing() ) );
399 if ( trustedKeyData )
401 MIL <<
"Key is trusted: " << trustedKeyData << endl;
405 PublicKeyData generalKeyData( publicKeyExists(
id, generalKeyRing() ) );
406 if ( generalKeyData )
413 MIL <<
"Key was updated. Saving new version into trusted keyring: " << generalKeyData << endl;
414 importKey( exportKey( generalKeyData, generalKeyRing() ),
true );
419 if ( ! trustedKeyData )
420 trustedKeyData = publicKeyExists(
id, trustedKeyRing() );
421 report->infoVerify( filedesc, trustedKeyData, context );
424 if ( verifyFile( file, signature, trustedKeyRing() ) )
426 return (sigValid_r=
true);
430 return report->askUserToAcceptVerificationFailed( filedesc, exportKey( trustedKeyData, trustedKeyRing() ), context );
435 PublicKeyData generalKeyData( publicKeyExists(
id, generalKeyRing() ) );
436 if ( generalKeyData )
438 PublicKey key( exportKey( generalKeyData, generalKeyRing() ) );
439 MIL <<
"Exported key " <<
id <<
" to " << key.
path() << endl;
440 MIL <<
"Key " <<
id <<
" " << key.
name() <<
" is not trusted" << endl;
447 MIL <<
"User wants to trust key " <<
id <<
" " << key.
name() << endl;
450 Pathname whichKeyring;
453 MIL <<
"User wants to import key " <<
id <<
" " << key.
name() << endl;
455 whichKeyring = trustedKeyRing();
458 whichKeyring = generalKeyRing();
461 if ( verifyFile( file, signature, whichKeyring ) )
463 MIL <<
"File signature is verified" << endl;
464 return (sigValid_r=
true);
468 MIL <<
"File signature check fails" << endl;
469 if ( report->askUserToAcceptVerificationFailed( filedesc, key, context ) )
471 MIL <<
"User continues anyway." << endl;
476 MIL <<
"User does not want to continue" << endl;
483 MIL <<
"User does not want to trust key " <<
id <<
" " << key.
name() << endl;
490 MIL <<
"File [" << file <<
"] ( " << filedesc <<
" ) signed with unknown key [" <<
id <<
"]" << endl;
491 if ( report->askUserToAcceptUnknownKey( filedesc,
id, context ) )
493 MIL <<
"User wants to accept unknown key " <<
id << endl;
498 MIL <<
"User does not want to accept unknown key " <<
id << endl;
508 const std::list<PublicKeyData> & keys(
publicKeyData( keyring ) );
509 std::list<PublicKey> ret;
511 for_( it, keys.begin(), keys.end() )
513 PublicKey key( exportKey( *it, keyring ) );
514 ret.push_back( key );
515 MIL <<
"Found key " << key << endl;
522 if ( ! PathInfo( keyfile ).isExist() )
525 _(
"Tried to import not existent key %s into keyring %s"))
526 % keyfile.asString() % keyring.asString())));
532 "--homedir", keyring.asString().c_str(),
533 "--no-default-keyring",
537 "--no-permission-warning",
539 keyfile.asString().c_str(),
553 "--homedir", keyring.asString().c_str(),
554 "--no-default-keyring",
566 int code = prog.
close();
570 MIL <<
"Deleted key " <<
id <<
" from keyring " << keyring << endl;
576 if ( ! PathInfo( signature ).isFile() )
578 _(
"Signature file %s not found"))% signature.asString())));
580 MIL <<
"Determining key id if signature " << signature << endl;
588 "--homedir", tmppath.c_str(),
589 "--no-default-keyring",
595 signature.asString().c_str(),
604 str::regex rxNoKey(
"^\\[GNUPG:\\] NO_PUBKEY (.+)\n$" );
612 if ( what.
size() >= 1 )
623 MIL <<
"no output" << endl;
626 MIL <<
"Determined key id [" <<
id <<
"] for signature " << signature << endl;
637 "--homedir", keyring.asString().c_str(),
638 "--no-default-keyring",
644 signature.asString().c_str(),
645 file.asString().c_str(),
661 return ( prog.
close() == 0 ) ?
true :
false;
void importKey(const PublicKey &key, bool trusted=false)
imports a key from a file.
const std::list< PublicKeyData > & publicKeyData()
PublicKey exportTrustedPublicKey(const PublicKeyData &keyData)
Export a trusted public key identified by its key data.
PublicKey exportPublicKey(const PublicKeyData &keyData)
const Pathname trustedKeyRing() const
void dumpPublicKey(const std::string &id, bool trusted, std::ostream &stream)
void deleteKey(const std::string &id, bool trusted)
PublicKey exportKey(const std::string &id, const Pathname &keyring)
bool isKeyTrusted(const std::string &id)
#define ZYPP_THROW(EXCPT)
Drops a logline and throws the Exception.
const std::list< PublicKeyData > & trustedPublicKeyData()
This basically means, we knew the key, but it was not trusted.
PublicKey exportPublicKey(const PublicKeyData &keyData)
Export a public key identified by its key data.
Class representing one GPG Public Keys data.
const std::string & asString() const
String representation.
bool isKeyKnown(const std::string &id)
void dumpPublicKey(const std::string &id, bool trusted, std::ostream &stream)
PublicKeyData publicKeyExists(const std::string &id, const Pathname &keyring)
Get PublicKeyData for ID (false if ID is not found).
void multiKeyImport(const Pathname &keyfile_r, bool trusted_r=false)
std::list< PublicKey > trustedPublicKeys()
Get a list of trusted public keys in the keyring (incl.
bool verifyFile(const Pathname &file, const Pathname &signature, const Pathname &keyring)
virtual bool askUserToAcceptUnsignedFile(const std::string &file, const KeyContext &keycontext=KeyContext())
KeyRing(const Pathname &baseTmpDir)
Default ctor.
std::list< PublicKeyData > trustedPublicKeyData()
Get a list of trusted public key data in the keyring (key data only)
bool verifyFileSignatureWorkflow(const Pathname &file, const std::string &filedesc, const Pathname &signature, bool &sigValid_r, const KeyContext &keycontext=KeyContext())
Follows a signature verification interacting with the user.
#define for_(IT, BEG, END)
Convenient for-loops using iterator.
Provide a new empty temporary file and delete it when no longer needed.
virtual bool askUserToAcceptUnknownKey(const std::string &file, const std::string &id, const KeyContext &keycontext=KeyContext())
we DONT know the key, only its id, but we have never seen it, the difference with trust key is that i...
CachedPublicKeyData cachedPublicKeyData
Functor returning the keyrings data (cached).
virtual void infoVerify(const std::string &file_r, const PublicKeyData &keyData_r, const KeyContext &keycontext=KeyContext())
Informal callback showing the trusted key that will be used for verification.
PublicKey exportTrustedPublicKey(const PublicKeyData &keyData)
KeyTrust
User reply options for the askUserToTrustKey callback.
Pathname path() const
File containig the ASCII armored key.
static void setDefaultAccept(DefaultAccept value_r)
Set the active accept bits.
Provide a new empty temporary directory and recursively delete it when no longer needed.
filesystem::TmpDir _trusted_tmp_dir
bool verifyFileSignature(const Pathname &file, const Pathname &signature)
Execute a program and give access to its io An object of this class encapsulates the execution of an ...
std::list< PublicKeyData > _data
bool verifyFileSignatureWorkflow(const Pathname &file, const std::string &filedesc, const Pathname &signature, bool &sigValid_r, const KeyContext &keycontext=KeyContext())
filesystem::TmpFile dumpPublicKeyToTmp(const std::string &id, const Pathname &keyring)
const char * c_str() const
String representation.
std::string fingerprint() const
Key fingerprint.
IMPL_PTR_TYPE(Application)
std::list< PublicKey > trustedPublicKeys()
scoped_ptr< WatchFile > _keyringP
void importKey(const PublicKey &key, bool trusted=false)
std::string receiveLine()
Read one line from the input stream.
Impl(const Pathname &baseTmpDir)
bool isKeyKnown(const std::string &id)
true if the key id is knows, that means at least exist on the untrusted keyring
void multiKeyImport(const Pathname &keyfile_r, bool trusted_r=false)
Initial import from RpmDb.
const Pathname generalKeyRing() const
User has chosen not to trust the key.
int close()
Wait for the progamm to complete.
virtual KeyTrust askUserToAcceptKey(const PublicKey &key, const KeyContext &keycontext=KeyContext())
Ask user to trust and/or import the key to trusted keyring.
scoped_ptr< WatchFile > _keyringK
static DefaultAccept defaultAccept()
Get the active accept bits.
RW_pointer< Impl > _pimpl
Pointer to implementation.
Regular expression match result.
Class representing one GPG Public Key (PublicKeyData + ASCII armored in a tempfile).
std::list< PublicKeyData > publicKeyData()
Get a list of public key data in the keyring (key data only)
Base class for Exception.
std::list< PublicKey > publicKeys()
std::string id() const
Key ID.
void deleteKey(const std::string &id, bool trusted=false)
removes a key from the keyring.
bool verifyFileTrustedSignature(const Pathname &file, const Pathname &signature)
bool verifyFileTrustedSignature(const Pathname &file, const Pathname &signature)
bool regex_match(const std::string &s, smatch &matches, const regex ®ex)
regex ZYPP_STR_REGEX regex ZYPP_STR_REGEX
const std::list< PublicKeyData > & publicKeyData(const Pathname &keyring)
bool isKeyTrusted(const std::string &id)
true if the key id is trusted
Date created() const
Creation / last modification date (latest selfsig).
Easy-to use interface to the ZYPP dependency resolver.
std::string readSignatureKeyId(const Pathname &signature)
reads the public key id from a signature
bool verifyFileSignature(const Pathname &file, const Pathname &signature)
Verifies a file against a signature, with no user interaction.
std::string readSignatureKeyId(const Pathname &signature)
virtual bool askUserToAcceptVerificationFailed(const std::string &file, const PublicKey &key, const KeyContext &keycontext=KeyContext())
The file filedesc is signed but the verification failed.
std::list< PublicKey > publicKeys()
Get a list of public keys in the keyring (incl.
filesystem::TmpDir _general_tmp_dir