]>
git.saurik.com Git - apt.git/blob - methods/gpgv.cc
1 #include <apt-pkg/error.h>
2 #include <apt-pkg/acquire-method.h>
3 #include <apt-pkg/strutl.h>
4 #include <apt-pkg/fileutl.h>
15 #define GNUPGPREFIX "[GNUPG:]"
16 #define GNUPGBADSIG "[GNUPG:] BADSIG"
17 #define GNUPGNOPUBKEY "[GNUPG:] NO_PUBKEY"
18 #define GNUPGVALIDSIG "[GNUPG:] VALIDSIG"
19 #define GNUPGGOODSIG "[GNUPG:] GOODSIG"
20 #define GNUPGKEYEXPIRED "[GNUPG:] KEYEXPIRED"
21 #define GNUPGREVKEYSIG "[GNUPG:] REVKEYSIG"
22 #define GNUPGNODATA "[GNUPG:] NODATA"
24 class GPGVMethod
: public pkgAcqMethod
27 string
VerifyGetSigners(const char *file
, const char *outfile
,
28 vector
<string
> &GoodSigners
,
29 vector
<string
> &BadSigners
,
30 vector
<string
> &WorthlessSigners
,
31 vector
<string
> &NoPubKeySigners
);
34 virtual bool Fetch(FetchItem
*Itm
);
38 GPGVMethod() : pkgAcqMethod("1.0",SingleInstance
| SendConfig
) {};
41 string
GPGVMethod::VerifyGetSigners(const char *file
, const char *outfile
,
42 vector
<string
> &GoodSigners
,
43 vector
<string
> &BadSigners
,
44 vector
<string
> &WorthlessSigners
,
45 vector
<string
> &NoPubKeySigners
)
47 bool const Debug
= _config
->FindB("Debug::Acquire::gpgv", false);
48 // setup a (empty) stringstream for formating the return value
49 std::stringstream ret
;
53 std::clog
<< "inside VerifyGetSigners" << std::endl
;
59 string
const gpgvpath
= _config
->Find("Dir::Bin::gpg", "/usr/bin/gpgv");
60 // FIXME: remove support for deprecated APT::GPGV setting
61 string
const trustedFile
= _config
->FindFile("Dir::Etc::Trusted",
62 _config
->Find("APT::GPGV::TrustedKeyring", "/etc/apt/trusted.gpg").c_str());
63 string
const trustedPath
= _config
->FindDir("Dir::Etc::TrustedParts", "/etc/apt/trusted.gpg.d");
66 std::clog
<< "gpgv path: " << gpgvpath
<< std::endl
;
67 std::clog
<< "Keyring file: " << trustedFile
<< std::endl
;
68 std::clog
<< "Keyring path: " << trustedPath
<< std::endl
;
71 vector
<string
> keyrings
= GetListOfFilesInDir(trustedPath
, "gpg", false);
72 if (FileExists(trustedFile
) == true)
73 keyrings
.push_back(trustedFile
);
75 if (keyrings
.empty() == true)
77 // TRANSLATOR: %s is the trusted keyring parts directory
78 ioprintf(ret
, _("No keyring installed in %s."), trustedPath
.c_str());
83 return "Couldn't create pipe";
87 return string("Couldn't spawn new process") + strerror(errno
);
90 const char *Args
[400];
93 Args
[i
++] = gpgvpath
.c_str();
94 Args
[i
++] = "--status-fd";
96 Args
[i
++] = "--ignore-time-conflict";
97 for (vector
<string
>::const_iterator K
= keyrings
.begin();
98 K
!= keyrings
.end(); ++K
)
100 Args
[i
++] = "--keyring";
101 Args
[i
++] = K
->c_str();
102 // check overflow (minus a bit of extra space at the end)
103 if(i
>= sizeof(Args
)/sizeof(char*)-5) {
104 std::clog
<< _("E: Too many keyrings should be passed to gpgv. Exiting.") << std::endl
;
109 Configuration::Item
const *Opts
;
110 Opts
= _config
->Tree("Acquire::gpgv::Options");
114 for (; Opts
!= 0; Opts
= Opts
->Next
)
116 if (Opts
->Value
.empty() == true)
118 Args
[i
++] = Opts
->Value
.c_str();
119 // check overflow (minus a bit of extra space at the end)
120 if(i
>= sizeof(Args
)/sizeof(char*)-5) {
121 std::clog
<< _("E: Argument list from Acquire::gpgv::Options too long. Exiting.") << std::endl
;
132 std::clog
<< "Preparing to exec: " << gpgvpath
;
133 for(unsigned int j
=0;Args
[j
] != NULL
; j
++)
134 std::clog
<< " " << Args
[j
];
135 std::clog
<< std::endl
;
137 int const nullfd
= open("/dev/null", O_RDONLY
);
139 // Redirect output to /dev/null; we read from the status fd
140 dup2(nullfd
, STDOUT_FILENO
);
141 dup2(nullfd
, STDERR_FILENO
);
142 // Redirect the pipe to the status fd (3)
145 putenv((char *)"LANG=");
146 putenv((char *)"LC_ALL=");
147 putenv((char *)"LC_MESSAGES=");
148 execvp(gpgvpath
.c_str(), (char **)Args
);
154 pipein
= fdopen(fd
[0], "r");
156 // Loop over the output of gpgv, and check the signatures.
157 size_t buffersize
= 64;
158 char *buffer
= (char *) malloc(buffersize
);
159 size_t bufferoff
= 0;
164 // Read a line. Sigh.
165 while ((c
= getc(pipein
)) != EOF
&& c
!= '\n')
167 if (bufferoff
== buffersize
)
168 buffer
= (char *) realloc(buffer
, buffersize
*= 2);
169 *(buffer
+bufferoff
) = c
;
172 if (bufferoff
== 0 && c
== EOF
)
174 *(buffer
+bufferoff
) = '\0';
177 std::clog
<< "Read: " << buffer
<< std::endl
;
179 // Push the data into three separate vectors, which
180 // we later concatenate. They're kept separate so
181 // if we improve the apt method communication stuff later
182 // it will be better.
183 if (strncmp(buffer
, GNUPGBADSIG
, sizeof(GNUPGBADSIG
)-1) == 0)
186 std::clog
<< "Got BADSIG! " << std::endl
;
187 BadSigners
.push_back(string(buffer
+sizeof(GNUPGPREFIX
)));
190 if (strncmp(buffer
, GNUPGNOPUBKEY
, sizeof(GNUPGNOPUBKEY
)-1) == 0)
193 std::clog
<< "Got NO_PUBKEY " << std::endl
;
194 NoPubKeySigners
.push_back(string(buffer
+sizeof(GNUPGPREFIX
)));
196 if (strncmp(buffer
, GNUPGNODATA
, sizeof(GNUPGBADSIG
)-1) == 0)
199 std::clog
<< "Got NODATA! " << std::endl
;
200 BadSigners
.push_back(string(buffer
+sizeof(GNUPGPREFIX
)));
202 if (strncmp(buffer
, GNUPGKEYEXPIRED
, sizeof(GNUPGKEYEXPIRED
)-1) == 0)
205 std::clog
<< "Got KEYEXPIRED! " << std::endl
;
206 WorthlessSigners
.push_back(string(buffer
+sizeof(GNUPGPREFIX
)));
208 if (strncmp(buffer
, GNUPGREVKEYSIG
, sizeof(GNUPGREVKEYSIG
)-1) == 0)
211 std::clog
<< "Got REVKEYSIG! " << std::endl
;
212 WorthlessSigners
.push_back(string(buffer
+sizeof(GNUPGPREFIX
)));
214 if (strncmp(buffer
, GNUPGGOODSIG
, sizeof(GNUPGGOODSIG
)-1) == 0)
216 char *sig
= buffer
+ sizeof(GNUPGPREFIX
);
217 char *p
= sig
+ sizeof("GOODSIG");
218 while (*p
&& isxdigit(*p
))
222 std::clog
<< "Got GOODSIG, key ID:" << sig
<< std::endl
;
223 GoodSigners
.push_back(string(sig
));
228 waitpid(pid
, &status
, 0);
231 std::clog
<< "gpgv exited\n";
234 if (WEXITSTATUS(status
) == 0)
236 if (GoodSigners
.empty())
237 return _("Internal error: Good signature, but could not determine key fingerprint?!");
240 else if (WEXITSTATUS(status
) == 1)
242 return _("At least one invalid signature was encountered.");
244 else if (WEXITSTATUS(status
) == 111)
246 ioprintf(ret
, _("Could not execute '%s' to verify signature (is gpgv installed?)"), gpgvpath
.c_str());
251 return _("Unknown error executing gpgv");
255 bool GPGVMethod::Fetch(FetchItem
*Itm
)
258 string Path
= Get
.Host
+ Get
.Path
; // To account for relative paths
260 vector
<string
> GoodSigners
;
261 vector
<string
> BadSigners
;
262 // a worthless signature is a expired or revoked one
263 vector
<string
> WorthlessSigners
;
264 vector
<string
> NoPubKeySigners
;
267 Res
.Filename
= Itm
->DestFile
;
270 // Run gpgv on file, extract contents and get the key ID of the signer
271 string msg
= VerifyGetSigners(Path
.c_str(), Itm
->DestFile
.c_str(),
272 GoodSigners
, BadSigners
, WorthlessSigners
,
274 if (GoodSigners
.empty() || !BadSigners
.empty() || !NoPubKeySigners
.empty())
277 // In this case, something bad probably happened, so we just go
278 // with what the other method gave us for an error message.
279 if (BadSigners
.empty() && WorthlessSigners
.empty() && NoPubKeySigners
.empty())
283 if (!BadSigners
.empty())
285 errmsg
+= _("The following signatures were invalid:\n");
286 for (vector
<string
>::iterator I
= BadSigners
.begin();
287 I
!= BadSigners
.end(); I
++)
288 errmsg
+= (*I
+ "\n");
290 if (!WorthlessSigners
.empty())
292 errmsg
+= _("The following signatures were invalid:\n");
293 for (vector
<string
>::iterator I
= WorthlessSigners
.begin();
294 I
!= WorthlessSigners
.end(); I
++)
295 errmsg
+= (*I
+ "\n");
297 if (!NoPubKeySigners
.empty())
299 errmsg
+= _("The following signatures couldn't be verified because the public key is not available:\n");
300 for (vector
<string
>::iterator I
= NoPubKeySigners
.begin();
301 I
!= NoPubKeySigners
.end(); I
++)
302 errmsg
+= (*I
+ "\n");
305 // this is only fatal if we have no good sigs or if we have at
306 // least one bad signature. good signatures and NoPubKey signatures
307 // happen easily when a file is signed with multiple signatures
308 if(GoodSigners
.empty() or !BadSigners
.empty())
309 return _error
->Error("%s", errmsg
.c_str());
312 // Just pass the raw output up, because passing it as a real data
313 // structure is too difficult with the method stuff. We keep it
314 // as three separate vectors for future extensibility.
315 Res
.GPGVOutput
= GoodSigners
;
316 Res
.GPGVOutput
.insert(Res
.GPGVOutput
.end(),BadSigners
.begin(),BadSigners
.end());
317 Res
.GPGVOutput
.insert(Res
.GPGVOutput
.end(),NoPubKeySigners
.begin(),NoPubKeySigners
.end());
320 if (_config
->FindB("Debug::Acquire::gpgv", false))
322 std::clog
<< "gpgv succeeded\n";
331 setlocale(LC_ALL
, "");