18 #include <boost/format.hpp>
37 #undef ZYPP_BASE_LOGGER_LOGGROUP
38 #define ZYPP_BASE_LOGGER_LOGGROUP "zypp::KeyRing"
40 #define GPG_BINARY "/usr/bin/gpg2"
54 {
return _keyRingDefaultAccept; }
58 MIL <<
"Set new KeyRing::DefaultAccept: " << value_r << endl;
59 _keyRingDefaultAccept = value_r;
93 struct CachedPublicKeyData
95 const std::list<PublicKeyData> & operator()(
const Pathname & keyring_r )
const
96 {
return getData( keyring_r ); }
107 Cache(
const Cache & rhs ) {}
110 typedef std::map<Pathname,Cache> CacheMap;
112 const std::list<PublicKeyData> & getData(
const Pathname & keyring_r )
const
115 if ( ! cache._keyringP )
118 cache._keyringP.reset(
new WatchFile( keyring_r/
"pubring.gpg",
WatchFile::NO_INIT ) );
120 return getData( keyring_r, cache );
123 const std::list<PublicKeyData> & getData(
const Pathname & keyring_r, Cache & cache_r )
const
125 if ( cache_r._keyringP->hasChanged() )
130 "--list-public-keys",
131 "--homedir", keyring_r.c_str(),
132 "--no-default-keyring",
136 "--with-fingerprint",
145 PublicKeyScanner scanner;
147 for( std::string line = prog.receiveLine(); !line.empty(); line = prog.receiveLine() )
149 scanner.scan( line );
153 cache_r._data.swap( scanner._keys );
154 MIL <<
"Found keys: " << cache_r._data << endl;
156 return cache_r._data;
171 Impl(
const Pathname & baseTmpDir )
176 MIL <<
"Current KeyRing::DefaultAccept: " << _keyRingDefaultAccept << endl;
180 void multiKeyImport(
const Pathname & keyfile_r,
bool trusted_r =
false );
181 void deleteKey(
const std::string &
id,
bool trusted );
200 void dumpPublicKey(
const std::string &
id,
bool trusted, std::ostream & stream )
209 const Pathname & file,
210 const std::string & filedesc,
211 const Pathname & signature,
220 bool verifyFile(
const Pathname & file,
const Pathname & signature,
const Pathname & keyring );
221 void importKey(
const Pathname & keyfile,
const Pathname & keyring );
226 void dumpPublicKey(
const std::string &
id,
const Pathname & keyring, std::ostream & stream );
229 void deleteKey(
const std::string &
id,
const Pathname & keyring );
231 std::list<PublicKey>
publicKeys(
const Pathname & keyring);
268 rpmdbEmitSignal->trustedKeyAdded( key );
269 emitSignal->trustedKeyAdded( key );
275 importKey( keyfile_r, trusted_r ? trustedKeyRing() : generalKeyRing() );
284 key = exportKey(
id, trustedKeyRing() );
287 deleteKey(
id, trusted ? trustedKeyRing() : generalKeyRing() );
294 rpmdbEmitSignal->trustedKeyRemoved( key );
295 emitSignal->trustedKeyRemoved( key );
301 MIL <<
"Searching key [" <<
id <<
"] in keyring " << keyring << endl;
302 const std::list<PublicKeyData> & keys(
publicKeyData( keyring ) );
303 for_( it, keys.begin(), keys.end() )
305 if (
id == (*it).id() )
315 return PublicKey( dumpPublicKeyToTmp( keyData.
id(), keyring ), keyData );
322 return PublicKey( dumpPublicKeyToTmp( keyData.
id(), keyring ), keyData );
325 WAR <<
"No key " <<
id <<
" to export from " << keyring << endl;
337 "--homedir", keyring.asString().c_str(),
338 "--no-default-keyring",
342 "--no-permission-warning",
358 MIL <<
"Going to export key " <<
id <<
" from " << keyring <<
" to " << tmpFile.
path() << endl;
360 std::ofstream os( tmpFile.
path().
c_str() );
367 const Pathname & file,
368 const std::string & filedesc,
369 const Pathname & signature,
373 MIL <<
"Going to verify signature for " << filedesc <<
" ( " << file <<
" ) with " << signature << endl;
376 if( signature.empty() || (!PathInfo( signature ).isExist()) )
378 bool res = report->askUserToAcceptUnsignedFile( filedesc, context );
379 MIL <<
"User decision on unsigned file: " << res << endl;
387 PublicKeyData trustedKeyData( publicKeyExists(
id, trustedKeyRing() ) );
388 if ( trustedKeyData )
390 MIL <<
"Key is trusted: " << trustedKeyData << endl;
394 PublicKeyData generalKeyData( publicKeyExists(
id, generalKeyRing() ) );
395 if ( generalKeyData )
402 MIL <<
"Key was updated. Saving new version into trusted keyring: " << generalKeyData << endl;
403 importKey( exportKey( generalKeyData, generalKeyRing() ),
true );
408 if ( ! trustedKeyData )
409 trustedKeyData = publicKeyExists(
id, trustedKeyRing() );
410 report->infoVerify( filedesc, trustedKeyData, context );
413 if ( verifyFile( file, signature, trustedKeyRing() ) )
417 return report->askUserToAcceptVerificationFailed( filedesc, exportKey( trustedKeyData, trustedKeyRing() ), context );
422 PublicKeyData generalKeyData( publicKeyExists(
id, generalKeyRing() ) );
423 if ( generalKeyData )
425 PublicKey key( exportKey( generalKeyData, generalKeyRing() ) );
426 MIL <<
"Exported key " <<
id <<
" to " << key.
path() << endl;
427 MIL <<
"Key " <<
id <<
" " << key.
name() <<
" is not trusted" << endl;
434 MIL <<
"User wants to trust key " <<
id <<
" " << key.
name() << endl;
437 Pathname whichKeyring;
440 MIL <<
"User wants to import key " <<
id <<
" " << key.
name() << endl;
442 whichKeyring = trustedKeyRing();
445 whichKeyring = generalKeyRing();
448 if ( verifyFile( file, signature, whichKeyring ) )
450 MIL <<
"File signature is verified" << endl;
455 MIL <<
"File signature check fails" << endl;
456 if ( report->askUserToAcceptVerificationFailed( filedesc, key, context ) )
458 MIL <<
"User continues anyway." << endl;
463 MIL <<
"User does not want to continue" << endl;
470 MIL <<
"User does not want to trust key " <<
id <<
" " << key.
name() << endl;
477 MIL <<
"File [" << file <<
"] ( " << filedesc <<
" ) signed with unknown key [" <<
id <<
"]" << endl;
478 if ( report->askUserToAcceptUnknownKey( filedesc,
id, context ) )
480 MIL <<
"User wants to accept unknown key " <<
id << endl;
485 MIL <<
"User does not want to accept unknown key " <<
id << endl;
495 const std::list<PublicKeyData> & keys(
publicKeyData( keyring ) );
496 std::list<PublicKey> ret;
498 for_( it, keys.begin(), keys.end() )
500 PublicKey key( exportKey( *it, keyring ) );
501 ret.push_back( key );
502 MIL <<
"Found key " << key << endl;
509 if ( ! PathInfo( keyfile ).isExist() )
512 _(
"Tried to import not existent key %s into keyring %s"))
513 % keyfile.asString() % keyring.asString())));
519 "--homedir", keyring.asString().c_str(),
520 "--no-default-keyring",
524 "--no-permission-warning",
526 keyfile.asString().c_str(),
540 "--homedir", keyring.asString().c_str(),
541 "--no-default-keyring",
553 int code = prog.
close();
557 MIL <<
"Deleted key " <<
id <<
" from keyring " << keyring << endl;
563 if ( ! PathInfo( signature ).isFile() )
565 _(
"Signature file %s not found"))% signature.asString())));
567 MIL <<
"Determining key id if signature " << signature << endl;
575 "--no-default-keyring",
581 signature.asString().c_str(),
590 str::regex rxNoKey(
"^\\[GNUPG:\\] NO_PUBKEY (.+)\n$" );
598 if ( what.
size() >= 1 )
609 MIL <<
"no output" << endl;
612 MIL <<
"Determined key id [" <<
id <<
"] for signature " << signature << endl;
623 "--homedir", keyring.asString().c_str(),
624 "--no-default-keyring",
630 signature.asString().c_str(),
631 file.asString().c_str(),
647 return ( prog.
close() == 0 ) ?
true :
false;
691 const Pathname & file,
692 const std::string filedesc,
693 const Pathname & signature,
void importKey(const PublicKey &key, bool trusted=false)
imports a key from a file.
const std::list< PublicKeyData > & publicKeyData()
PublicKey exportTrustedPublicKey(const PublicKeyData &keyData)
Export a trusted public key identified by its key data.
PublicKey exportPublicKey(const PublicKeyData &keyData)
const Pathname trustedKeyRing() const
void dumpPublicKey(const std::string &id, bool trusted, std::ostream &stream)
void deleteKey(const std::string &id, bool trusted)
PublicKey exportKey(const std::string &id, const Pathname &keyring)
bool isKeyTrusted(const std::string &id)
bool verifyFileSignatureWorkflow(const Pathname &file, const std::string filedesc, const Pathname &signature, const KeyContext &keycontext=KeyContext())
Follows a signature verification interacting with the user.
#define ZYPP_THROW(EXCPT)
Drops a logline and throws the Exception.
const std::list< PublicKeyData > & trustedPublicKeyData()
This basically means, we knew the key, but it was not trusted.
PublicKey exportPublicKey(const PublicKeyData &keyData)
Export a public key identified by its key data.
Class representing one GPG Public Keys data.
const std::string & asString() const
String representation.
bool isKeyKnown(const std::string &id)
void dumpPublicKey(const std::string &id, bool trusted, std::ostream &stream)
PublicKeyData publicKeyExists(const std::string &id, const Pathname &keyring)
Get PublicKeyData for ID (false if ID is not found).
void multiKeyImport(const Pathname &keyfile_r, bool trusted_r=false)
std::list< PublicKey > trustedPublicKeys()
Get a list of trusted public keys in the keyring (incl.
bool verifyFile(const Pathname &file, const Pathname &signature, const Pathname &keyring)
virtual bool askUserToAcceptUnsignedFile(const std::string &file, const KeyContext &keycontext=KeyContext())
KeyRing(const Pathname &baseTmpDir)
Default ctor.
std::list< PublicKeyData > trustedPublicKeyData()
Get a list of trusted public key data in the keyring (key data only)
#define for_(IT, BEG, END)
Convenient for-loops using iterator.
Provide a new empty temporary file and delete it when no longer needed.
virtual bool askUserToAcceptUnknownKey(const std::string &file, const std::string &id, const KeyContext &keycontext=KeyContext())
we DONT know the key, only its id, but we have never seen it, the difference with trust key is that i...
CachedPublicKeyData cachedPublicKeyData
Functor returning the keyrings data (cached).
virtual void infoVerify(const std::string &file_r, const PublicKeyData &keyData_r, const KeyContext &keycontext=KeyContext())
Informal callback showing the trusted key that will be used for verification.
PublicKey exportTrustedPublicKey(const PublicKeyData &keyData)
KeyTrust
User reply options for the askUserToTrustKey callback.
Pathname path() const
File containig the ASCII armored key.
static void setDefaultAccept(DefaultAccept value_r)
Set the active accept bits.
Provide a new empty temporary directory and recursively delete it when no longer needed.
filesystem::TmpDir _trusted_tmp_dir
bool verifyFileSignature(const Pathname &file, const Pathname &signature)
Execute a program and give access to its io An object of this class encapsulates the execution of an ...
std::list< PublicKeyData > _data
filesystem::TmpFile dumpPublicKeyToTmp(const std::string &id, const Pathname &keyring)
const char * c_str() const
String representation.
std::string fingerprint() const
Key fingerprint.
IMPL_PTR_TYPE(Application)
std::list< PublicKey > trustedPublicKeys()
scoped_ptr< WatchFile > _keyringP
void importKey(const PublicKey &key, bool trusted=false)
#define _(MSG)
Return translated text.
std::string receiveLine()
Read one line from the input stream.
Impl(const Pathname &baseTmpDir)
bool isKeyKnown(const std::string &id)
true if the key id is knows, that means at least exist on the untrusted keyring
void multiKeyImport(const Pathname &keyfile_r, bool trusted_r=false)
Initial import from RpmDb.
const Pathname generalKeyRing() const
User has chosen not to trust the key.
int close()
Wait for the progamm to complete.
virtual KeyTrust askUserToAcceptKey(const PublicKey &key, const KeyContext &keycontext=KeyContext())
Ask user to trust and/or import the key to trusted keyring.
static DefaultAccept defaultAccept()
Get the active accept bits.
RW_pointer< Impl > _pimpl
Pointer to implementation.
Regular expression match result.
Class representing one GPG Public Key (PublicKeyData + ASCII armored in a tempfile).
std::list< PublicKeyData > publicKeyData()
Get a list of public key data in the keyring (key data only)
Base class for Exception.
std::list< PublicKey > publicKeys()
bool verifyFileSignatureWorkflow(const Pathname &file, const std::string &filedesc, const Pathname &signature, const KeyContext &keycontext=KeyContext())
std::string id() const
Key ID.
void deleteKey(const std::string &id, bool trusted=false)
removes a key from the keyring.
bool verifyFileTrustedSignature(const Pathname &file, const Pathname &signature)
bool verifyFileTrustedSignature(const Pathname &file, const Pathname &signature)
bool regex_match(const std::string &s, smatch &matches, const regex ®ex)
regex ZYPP_STR_REGEX regex ZYPP_STR_REGEX
const std::list< PublicKeyData > & publicKeyData(const Pathname &keyring)
bool isKeyTrusted(const std::string &id)
true if the key id is trusted
Date created() const
Creation / last modification date (latest selfsig).
Easy-to use interface to the ZYPP dependency resolver.
std::string readSignatureKeyId(const Pathname &signature)
reads the public key id from a signature
bool verifyFileSignature(const Pathname &file, const Pathname &signature)
Verifies a file against a signature, with no user interaction.
std::string readSignatureKeyId(const Pathname &signature)
virtual bool askUserToAcceptVerificationFailed(const std::string &file, const PublicKey &key, const KeyContext &keycontext=KeyContext())
The file filedesc is signed but the verification failed.
std::list< PublicKey > publicKeys()
Get a list of public keys in the keyring (incl.
filesystem::TmpDir _general_tmp_dir