1
0
Fork 0
dpkg/scripts/Dpkg/OpenPGP/Backend/GnuPG.pm
Daniel Baumann 1879661313
Adding upstream version 1.22.20.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
2025-06-20 21:21:00 +02:00

246 lines
6.7 KiB
Perl

# Copyright © 2007, 2022 Guillem Jover <guillem@debian.org>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <https://www.gnu.org/licenses/>.
=encoding utf8
=head1 NAME
Dpkg::OpenPGP::Backend::GnuPG - OpenPGP backend for GnuPG
=head1 DESCRIPTION
This module provides a class that implements the OpenPGP backend
for GnuPG.
B<Note>: This is a private module, its API can change at any time.
=cut
package Dpkg::OpenPGP::Backend::GnuPG 0.01;
use strict;
use warnings;
use POSIX qw(:sys_wait_h);
use File::Basename;
use File::Temp;
use File::Copy;
use Dpkg::ErrorHandling;
use Dpkg::IPC;
use Dpkg::File;
use Dpkg::Path qw(find_command);
use Dpkg::OpenPGP::ErrorCodes;
use parent qw(Dpkg::OpenPGP::Backend);
sub DEFAULT_CMDV {
return [ qw(gpgv-sq gpgv) ];
}
sub DEFAULT_CMDSTORE {
return [ qw(gpg-agent) ];
}
sub DEFAULT_CMD {
return [ qw(gpg-sq gpg) ];
}
sub has_keystore {
my $self = shift;
return 0 if not defined $self->{cmdstore};
return 1 if ($ENV{GNUPGHOME} && -e $ENV{GNUPGHOME}) ||
($ENV{HOME} && -e "$ENV{HOME}/.gnupg");
return 0;
}
sub can_use_key {
my ($self, $key) = @_;
# With gpg, a secret key always requires gpg-agent (the key store).
return $self->has_keystore();
}
sub get_trusted_keyrings {
my $self = shift;
my $keystore;
if ($ENV{GNUPGHOME} && -e $ENV{GNUPGHOME}) {
$keystore = $ENV{GNUPGHOME};
} elsif ($ENV{HOME} && -e "$ENV{HOME}/.gnupg") {
$keystore = "$ENV{HOME}/.gnupg";
} else {
return;
}
my @keyrings;
foreach my $keyring (qw(trustedkeys.kbx trustedkeys.gpg)) {
push @keyrings, "$keystore/$keyring" if -r "$keystore/$keyring";
}
return @keyrings;
}
sub _gpg_exec
{
my ($self, @exec) = @_;
my ($stdout, $stderr);
spawn(exec => \@exec, wait_child => 1, nocheck => 1, timeout => 10,
to_string => \$stdout, error_to_string => \$stderr);
if (WIFEXITED($?)) {
my $status = WEXITSTATUS($?);
print { *STDERR } "$stdout$stderr" if $status;
return $status;
} else {
subprocerr("@exec");
}
}
sub _gpg_options_weak_digests {
my @gpg_weak_digests = map {
(qw(--weak-digest), $_)
} qw(SHA1 RIPEMD160);
return @gpg_weak_digests;
}
sub _gpg_verify {
my ($self, $signeddata, $sig, $data, @certs) = @_;
return OPENPGP_MISSING_CMD if ! $self->has_verify_cmd();
my $gpg_home = File::Temp->newdir('dpkg-gpg-verify.XXXXXXXX', TMPDIR => 1);
my @exec;
if ($self->{cmdv}) {
push @exec, $self->{cmdv};
# We need to touch the trustedkeys.gpg keyring, otherwise gpgv will
# emit an error about the trustedkeys.kbx file being of unknown type.
file_touch("$gpg_home/trustedkeys.gpg");
} else {
push @exec, $self->{cmd};
push @exec, qw(--no-options --no-default-keyring --batch --quiet);
}
push @exec, _gpg_options_weak_digests();
push @exec, '--homedir', $gpg_home;
foreach my $cert (@certs) {
my $certring = File::Temp->new(UNLINK => 1, SUFFIX => '.pgp');
my $rc;
if ($cert =~ m{\.kbx$}) {
# Accept GnuPG apparent keybox-format keyrings as-is.
$rc = 1;
} else {
# Note that these _pgp_* functions are only necessary while relying on
# gpgv, and gpgv itself does not verify multiple signatures correctly
# (see https://bugs.debian.org/1010955).
$rc = $self->dearmor('PUBLIC KEY BLOCK', $cert, $certring);
}
$certring = $cert if $rc;
push @exec, '--keyring', $certring;
}
push @exec, '--output', $data if defined $data;
if (! $self->{cmdv}) {
push @exec, '--verify';
}
push @exec, $sig if defined $sig;
push @exec, $signeddata;
my $rc = $self->_gpg_exec(@exec);
return OPENPGP_NO_SIG if $rc;
return OPENPGP_OK;
}
sub inline_verify {
my ($self, $inlinesigned, $data, @certs) = @_;
return $self->_gpg_verify($inlinesigned, undef, $data, @certs);
}
sub verify {
my ($self, $data, $sig, @certs) = @_;
return $self->_gpg_verify($data, $sig, undef, @certs);
}
sub _gpg_fixup_newline {
my $origfile = shift;
my $signdir = File::Temp->newdir('dpkg-sign.XXXXXXXX', TMPDIR => 1);
my $signfile = $signdir . q(/) . basename($origfile);
copy($origfile, $signfile);
# Make sure the file to sign ends with a newline, as GnuPG does not adhere
# to the OpenPGP specification (see <https://dev.gnupg.org/T7106>).
open my $signfh, '>>', $signfile
or syserr(g_('cannot open %s'), $signfile);
print { $signfh } "\n";
close $signfh
or syserr(g_('cannot close %s'), $signfile);
# Return the dir object so that it is kept in scope in the caller, and
# thus not cleaned up within this function.
return ($signdir, $signfile);
}
sub inline_sign {
my ($self, $data, $inlinesigned, $key) = @_;
return OPENPGP_MISSING_CMD if ! $self->has_backend_cmd();
my ($signdir, $signfile);
if ($self->{cmd} !~ m{/gpg-sq$}) {
($signdir, $signfile) = _gpg_fixup_newline($data);
} else {
$signfile = $data;
}
my @exec = ($self->{cmd});
push @exec, _gpg_options_weak_digests();
push @exec, qw(--utf8-strings --textmode --armor);
# Set conformance level.
push @exec, '--openpgp';
# Set secure algorithm preferences.
push @exec, '--personal-digest-preferences', 'SHA512 SHA384 SHA256 SHA224';
if ($key->type eq 'keyfile') {
# Promote the keyfile keyhandle to a keystore, this way we share the
# same gpg-agent and can get any password cached.
my $gpg_home = File::Temp->newdir('dpkg-sign.XXXXXXXX', TMPDIR => 1);
push @exec, '--homedir', $gpg_home;
$self->_gpg_exec(@exec, qw(--quiet --no-tty --batch --import), $key->handle);
$key->set('keystore', $gpg_home);
} elsif ($key->type eq 'keystore') {
push @exec, '--homedir', $key->handle;
} else {
push @exec, '--local-user', $key->handle;
}
push @exec, '--output', $inlinesigned;
my $rc = $self->_gpg_exec(@exec, '--clearsign', $signfile);
return OPENPGP_CMD_CANNOT_SIGN if $rc;
return OPENPGP_OK;
}
=head1 CHANGES
=head2 Version 0.xx
This is a private module.
=cut
1;