2017-03-16 09:27:35 +08:00
// Copyright 2017 The Gitea Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.
package models
import (
"bytes"
2017-03-22 18:43:54 +08:00
"container/list"
"crypto"
2017-03-16 09:27:35 +08:00
"encoding/base64"
"fmt"
2017-03-22 18:43:54 +08:00
"hash"
"io"
2017-03-16 09:27:35 +08:00
"strings"
"time"
2019-03-27 17:33:00 +08:00
"code.gitea.io/gitea/modules/git"
2017-03-22 18:43:54 +08:00
"code.gitea.io/gitea/modules/log"
2019-10-16 21:42:42 +08:00
"code.gitea.io/gitea/modules/setting"
2019-08-15 22:46:21 +08:00
"code.gitea.io/gitea/modules/timeutil"
2017-03-22 18:43:54 +08:00
2017-06-14 08:43:43 +08:00
"github.com/keybase/go-crypto/openpgp"
"github.com/keybase/go-crypto/openpgp/armor"
"github.com/keybase/go-crypto/openpgp/packet"
2019-10-17 17:26:49 +08:00
"xorm.io/xorm"
2017-03-16 09:27:35 +08:00
)
// GPGKey represents a GPG key.
type GPGKey struct {
2019-08-15 22:46:21 +08:00
ID int64 ` xorm:"pk autoincr" `
OwnerID int64 ` xorm:"INDEX NOT NULL" `
KeyID string ` xorm:"INDEX CHAR(16) NOT NULL" `
PrimaryKeyID string ` xorm:"CHAR(16)" `
Content string ` xorm:"TEXT NOT NULL" `
CreatedUnix timeutil . TimeStamp ` xorm:"created" `
ExpiredUnix timeutil . TimeStamp
AddedUnix timeutil . TimeStamp
2017-03-16 09:27:35 +08:00
SubsKey [ ] * GPGKey ` xorm:"-" `
Emails [ ] * EmailAddress
CanSign bool
CanEncryptComms bool
CanEncryptStorage bool
CanCertify bool
}
2019-04-15 00:43:56 +08:00
//GPGKeyImport the original import of key
type GPGKeyImport struct {
KeyID string ` xorm:"pk CHAR(16) NOT NULL" `
Content string ` xorm:"TEXT NOT NULL" `
}
2017-03-16 09:27:35 +08:00
// BeforeInsert will be invoked by XORM before inserting a record
func ( key * GPGKey ) BeforeInsert ( ) {
2019-08-15 22:46:21 +08:00
key . AddedUnix = timeutil . TimeStampNow ( )
2017-03-16 09:27:35 +08:00
}
2017-10-02 00:52:35 +08:00
// AfterLoad is invoked from XORM after setting the values of all fields of this object.
func ( key * GPGKey ) AfterLoad ( session * xorm . Session ) {
err := session . Where ( "primary_key_id=?" , key . KeyID ) . Find ( & key . SubsKey )
if err != nil {
2019-04-02 15:48:31 +08:00
log . Error ( "Find Sub GPGkeys[%s]: %v" , key . KeyID , err )
2017-03-16 09:27:35 +08:00
}
}
// ListGPGKeys returns a list of public keys belongs to given user.
2020-01-25 03:00:29 +08:00
func ListGPGKeys ( uid int64 , listOptions ListOptions ) ( [ ] * GPGKey , error ) {
sess := x . Where ( "owner_id=? AND primary_key_id=''" , uid )
if listOptions . Page != 0 {
sess = listOptions . setSessionPagination ( sess )
}
keys := make ( [ ] * GPGKey , 0 , 2 )
return keys , sess . Find ( & keys )
2017-03-16 09:27:35 +08:00
}
// GetGPGKeyByID returns public key by given ID.
func GetGPGKeyByID ( keyID int64 ) ( * GPGKey , error ) {
key := new ( GPGKey )
2017-10-05 12:43:04 +08:00
has , err := x . ID ( keyID ) . Get ( key )
2017-03-16 09:27:35 +08:00
if err != nil {
return nil , err
} else if ! has {
return nil , ErrGPGKeyNotExist { keyID }
}
return key , nil
}
2019-10-16 21:42:42 +08:00
// GetGPGKeysByKeyID returns public key by given ID.
func GetGPGKeysByKeyID ( keyID string ) ( [ ] * GPGKey , error ) {
keys := make ( [ ] * GPGKey , 0 , 1 )
return keys , x . Where ( "key_id=?" , keyID ) . Find ( & keys )
}
2019-04-15 00:43:56 +08:00
// GetGPGImportByKeyID returns the import public armored key by given KeyID.
func GetGPGImportByKeyID ( keyID string ) ( * GPGKeyImport , error ) {
key := new ( GPGKeyImport )
has , err := x . ID ( keyID ) . Get ( key )
if err != nil {
return nil , err
} else if ! has {
return nil , ErrGPGKeyImportNotExist { keyID }
}
return key , nil
}
2017-03-16 09:27:35 +08:00
// checkArmoredGPGKeyString checks if the given key string is a valid GPG armored key.
// The function returns the actual public key on success
2020-08-21 18:45:50 +08:00
func checkArmoredGPGKeyString ( content string ) ( openpgp . EntityList , error ) {
2017-03-16 09:27:35 +08:00
list , err := openpgp . ReadArmoredKeyRing ( strings . NewReader ( content ) )
if err != nil {
2017-04-26 21:10:43 +08:00
return nil , ErrGPGKeyParsing { err }
2017-03-16 09:27:35 +08:00
}
2020-08-21 18:45:50 +08:00
return list , nil
2017-03-16 09:27:35 +08:00
}
2019-04-15 00:43:56 +08:00
//addGPGKey add key, import and subkeys to database
func addGPGKey ( e Engine , key * GPGKey , content string ) ( err error ) {
//Add GPGKeyImport
if _ , err = e . Insert ( GPGKeyImport {
KeyID : key . KeyID ,
Content : content ,
} ) ; err != nil {
return err
}
// Save GPG primary key.
if _ , err = e . Insert ( key ) ; err != nil {
return err
}
// Save GPG subs key.
for _ , subkey := range key . SubsKey {
if err := addGPGSubKey ( e , subkey ) ; err != nil {
return err
}
}
return nil
}
//addGPGSubKey add subkeys to database
func addGPGSubKey ( e Engine , key * GPGKey ) ( err error ) {
2017-03-16 09:27:35 +08:00
// Save GPG primary key.
if _ , err = e . Insert ( key ) ; err != nil {
return err
}
// Save GPG subs key.
for _ , subkey := range key . SubsKey {
2019-04-15 00:43:56 +08:00
if err := addGPGSubKey ( e , subkey ) ; err != nil {
2017-03-16 09:27:35 +08:00
return err
}
}
return nil
}
// AddGPGKey adds new public key to database.
2020-08-21 18:45:50 +08:00
func AddGPGKey ( ownerID int64 , content string ) ( [ ] * GPGKey , error ) {
ekeys , err := checkArmoredGPGKeyString ( content )
2017-03-16 09:27:35 +08:00
if err != nil {
return nil , err
}
sess := x . NewSession ( )
2017-06-21 08:57:05 +08:00
defer sess . Close ( )
2017-03-16 09:27:35 +08:00
if err = sess . Begin ( ) ; err != nil {
return nil , err
}
2020-08-21 18:45:50 +08:00
keys := make ( [ ] * GPGKey , 0 , len ( ekeys ) )
for _ , ekey := range ekeys {
// Key ID cannot be duplicated.
has , err := sess . Where ( "key_id=?" , ekey . PrimaryKey . KeyIdString ( ) ) .
Get ( new ( GPGKey ) )
if err != nil {
return nil , err
} else if has {
return nil , ErrGPGKeyIDAlreadyUsed { ekey . PrimaryKey . KeyIdString ( ) }
}
2017-03-16 09:27:35 +08:00
2020-08-21 18:45:50 +08:00
//Get DB session
2017-03-16 09:27:35 +08:00
2020-08-21 18:45:50 +08:00
key , err := parseGPGKey ( ownerID , ekey )
if err != nil {
return nil , err
}
2017-03-16 09:27:35 +08:00
2020-08-21 18:45:50 +08:00
if err = addGPGKey ( sess , key , content ) ; err != nil {
return nil , err
}
keys = append ( keys , key )
}
return keys , sess . Commit ( )
2017-03-16 09:27:35 +08:00
}
2019-04-15 00:43:56 +08:00
//base64EncPubKey encode public key content to base 64
2017-03-16 09:27:35 +08:00
func base64EncPubKey ( pubkey * packet . PublicKey ) ( string , error ) {
var w bytes . Buffer
err := pubkey . Serialize ( & w )
if err != nil {
return "" , err
}
return base64 . StdEncoding . EncodeToString ( w . Bytes ( ) ) , nil
}
2019-04-15 00:43:56 +08:00
//base64DecPubKey decode public key content from base 64
func base64DecPubKey ( content string ) ( * packet . PublicKey , error ) {
b , err := readerFromBase64 ( content )
if err != nil {
return nil , err
}
//Read key
p , err := packet . Read ( b )
if err != nil {
return nil , err
}
//Check type
pkey , ok := p . ( * packet . PublicKey )
if ! ok {
return nil , fmt . Errorf ( "key is not a public key" )
}
return pkey , nil
}
//GPGKeyToEntity retrieve the imported key and the traducted entity
func GPGKeyToEntity ( k * GPGKey ) ( * openpgp . Entity , error ) {
impKey , err := GetGPGImportByKeyID ( k . KeyID )
if err != nil {
return nil , err
}
2020-08-21 18:45:50 +08:00
keys , err := checkArmoredGPGKeyString ( impKey . Content )
if err != nil {
return nil , err
}
return keys [ 0 ] , err
2019-04-15 00:43:56 +08:00
}
2017-03-16 09:27:35 +08:00
//parseSubGPGKey parse a sub Key
func parseSubGPGKey ( ownerID int64 , primaryID string , pubkey * packet . PublicKey , expiry time . Time ) ( * GPGKey , error ) {
content , err := base64EncPubKey ( pubkey )
if err != nil {
return nil , err
}
return & GPGKey {
OwnerID : ownerID ,
KeyID : pubkey . KeyIdString ( ) ,
PrimaryKeyID : primaryID ,
Content : content ,
2019-08-15 22:46:21 +08:00
CreatedUnix : timeutil . TimeStamp ( pubkey . CreationTime . Unix ( ) ) ,
ExpiredUnix : timeutil . TimeStamp ( expiry . Unix ( ) ) ,
2017-03-16 09:27:35 +08:00
CanSign : pubkey . CanSign ( ) ,
CanEncryptComms : pubkey . PubKeyAlgo . CanEncrypt ( ) ,
CanEncryptStorage : pubkey . PubKeyAlgo . CanEncrypt ( ) ,
CanCertify : pubkey . PubKeyAlgo . CanSign ( ) ,
} , nil
}
2019-04-16 08:32:15 +08:00
//getExpiryTime extract the expire time of primary key based on sig
func getExpiryTime ( e * openpgp . Entity ) time . Time {
expiry := time . Time { }
2017-03-16 09:27:35 +08:00
//Extract self-sign for expire date based on : https://github.com/golang/crypto/blob/master/openpgp/keys.go#L165
var selfSig * packet . Signature
for _ , ident := range e . Identities {
if selfSig == nil {
selfSig = ident . SelfSignature
} else if ident . SelfSignature . IsPrimaryId != nil && * ident . SelfSignature . IsPrimaryId {
selfSig = ident . SelfSignature
break
}
}
if selfSig . KeyLifetimeSecs != nil {
2019-04-16 08:32:15 +08:00
expiry = e . PrimaryKey . CreationTime . Add ( time . Duration ( * selfSig . KeyLifetimeSecs ) * time . Second )
2017-03-16 09:27:35 +08:00
}
2019-04-16 08:32:15 +08:00
return expiry
}
//parseGPGKey parse a PrimaryKey entity (primary key + subs keys + self-signature)
func parseGPGKey ( ownerID int64 , e * openpgp . Entity ) ( * GPGKey , error ) {
pubkey := e . PrimaryKey
expiry := getExpiryTime ( e )
2017-03-16 09:27:35 +08:00
//Parse Subkeys
subkeys := make ( [ ] * GPGKey , len ( e . Subkeys ) )
for i , k := range e . Subkeys {
subs , err := parseSubGPGKey ( ownerID , pubkey . KeyIdString ( ) , k . PublicKey , expiry )
if err != nil {
2020-05-29 05:25:54 +08:00
return nil , ErrGPGKeyParsing { ParseError : err }
2017-03-16 09:27:35 +08:00
}
subkeys [ i ] = subs
}
//Check emails
userEmails , err := GetEmailAddresses ( ownerID )
if err != nil {
return nil , err
}
2017-09-05 21:45:18 +08:00
emails := make ( [ ] * EmailAddress , 0 , len ( e . Identities ) )
2017-03-16 09:27:35 +08:00
for _ , ident := range e . Identities {
2020-08-16 16:44:34 +08:00
if ident . Revocation != nil {
continue
}
2017-06-17 18:56:40 +08:00
email := strings . ToLower ( strings . TrimSpace ( ident . UserId . Email ) )
2017-03-16 09:27:35 +08:00
for _ , e := range userEmails {
2017-09-05 21:45:18 +08:00
if e . Email == email {
emails = append ( emails , e )
2017-03-16 09:27:35 +08:00
break
}
}
2017-09-05 21:45:18 +08:00
}
//In the case no email as been found
if len ( emails ) == 0 {
failedEmails := make ( [ ] string , 0 , len ( e . Identities ) )
for _ , ident := range e . Identities {
failedEmails = append ( failedEmails , ident . UserId . Email )
2017-03-16 09:27:35 +08:00
}
2017-09-05 21:45:18 +08:00
return nil , ErrGPGNoEmailFound { failedEmails }
2017-03-16 09:27:35 +08:00
}
2017-09-05 21:45:18 +08:00
2017-03-16 09:27:35 +08:00
content , err := base64EncPubKey ( pubkey )
if err != nil {
return nil , err
}
return & GPGKey {
OwnerID : ownerID ,
KeyID : pubkey . KeyIdString ( ) ,
PrimaryKeyID : "" ,
Content : content ,
2019-08-15 22:46:21 +08:00
CreatedUnix : timeutil . TimeStamp ( pubkey . CreationTime . Unix ( ) ) ,
ExpiredUnix : timeutil . TimeStamp ( expiry . Unix ( ) ) ,
2017-03-16 09:27:35 +08:00
Emails : emails ,
SubsKey : subkeys ,
CanSign : pubkey . CanSign ( ) ,
CanEncryptComms : pubkey . PubKeyAlgo . CanEncrypt ( ) ,
CanEncryptStorage : pubkey . PubKeyAlgo . CanEncrypt ( ) ,
CanCertify : pubkey . PubKeyAlgo . CanSign ( ) ,
} , nil
}
// deleteGPGKey does the actual key deletion
func deleteGPGKey ( e * xorm . Session , keyID string ) ( int64 , error ) {
if keyID == "" {
return 0 , fmt . Errorf ( "empty KeyId forbidden" ) //Should never happen but just to be sure
}
2019-04-15 00:43:56 +08:00
//Delete imported key
n , err := e . Where ( "key_id=?" , keyID ) . Delete ( new ( GPGKeyImport ) )
if err != nil {
return n , err
}
2017-03-16 09:27:35 +08:00
return e . Where ( "key_id=?" , keyID ) . Or ( "primary_key_id=?" , keyID ) . Delete ( new ( GPGKey ) )
}
// DeleteGPGKey deletes GPG key information in database.
func DeleteGPGKey ( doer * User , id int64 ) ( err error ) {
key , err := GetGPGKeyByID ( id )
if err != nil {
if IsErrGPGKeyNotExist ( err ) {
return nil
}
return fmt . Errorf ( "GetPublicKeyByID: %v" , err )
}
// Check if user has access to delete this key.
if ! doer . IsAdmin && doer . ID != key . OwnerID {
return ErrGPGKeyAccessDenied { doer . ID , key . ID }
}
sess := x . NewSession ( )
2017-06-21 08:57:05 +08:00
defer sess . Close ( )
2017-03-16 09:27:35 +08:00
if err = sess . Begin ( ) ; err != nil {
return err
}
if _ , err = deleteGPGKey ( sess , key . KeyID ) ; err != nil {
return err
}
2017-09-19 16:08:30 +08:00
return sess . Commit ( )
2017-03-16 09:27:35 +08:00
}
2017-03-22 18:43:54 +08:00
// CommitVerification represents a commit validation of signature
type CommitVerification struct {
2019-10-16 21:42:42 +08:00
Verified bool
Warning bool
Reason string
SigningUser * User
CommittingUser * User
SigningEmail string
SigningKey * GPGKey
2020-02-28 03:20:55 +08:00
TrustStatus string
2017-03-22 18:43:54 +08:00
}
// SignCommit represents a commit with validation of signature.
type SignCommit struct {
Verification * CommitVerification
* UserCommit
}
2019-10-16 21:42:42 +08:00
const (
// BadSignature is used as the reason when the signature has a KeyID that is in the db
// but no key that has that ID verifies the signature. This is a suspicious failure.
BadSignature = "gpg.error.probable_bad_signature"
// BadDefaultSignature is used as the reason when the signature has a KeyID that matches the
// default Key but is not verified by the default key. This is a suspicious failure.
BadDefaultSignature = "gpg.error.probable_bad_default_signature"
// NoKeyFound is used as the reason when no key can be found to verify the signature.
NoKeyFound = "gpg.error.no_gpg_keys_found"
)
2017-03-22 18:43:54 +08:00
func readerFromBase64 ( s string ) ( io . Reader , error ) {
bs , err := base64 . StdEncoding . DecodeString ( s )
if err != nil {
return nil , err
}
return bytes . NewBuffer ( bs ) , nil
}
func populateHash ( hashFunc crypto . Hash , msg [ ] byte ) ( hash . Hash , error ) {
h := hashFunc . New ( )
if _ , err := h . Write ( msg ) ; err != nil {
return nil , err
}
return h , nil
}
// readArmoredSign read an armored signature block with the given type. https://sourcegraph.com/github.com/golang/crypto/-/blob/openpgp/read.go#L24:6-24:17
func readArmoredSign ( r io . Reader ) ( body io . Reader , err error ) {
block , err := armor . Decode ( r )
if err != nil {
return
}
if block . Type != openpgp . SignatureType {
return nil , fmt . Errorf ( "expected '" + openpgp . SignatureType + "', got: " + block . Type )
}
return block . Body , nil
}
func extractSignature ( s string ) ( * packet . Signature , error ) {
r , err := readArmoredSign ( strings . NewReader ( s ) )
if err != nil {
return nil , fmt . Errorf ( "Failed to read signature armor" )
}
p , err := packet . Read ( r )
if err != nil {
return nil , fmt . Errorf ( "Failed to read signature packet" )
}
sig , ok := p . ( * packet . Signature )
if ! ok {
return nil , fmt . Errorf ( "Packet is not a signature" )
}
return sig , nil
}
func verifySign ( s * packet . Signature , h hash . Hash , k * GPGKey ) error {
//Check if key can sign
if ! k . CanSign {
return fmt . Errorf ( "key can not sign" )
}
//Decode key
2019-04-15 00:43:56 +08:00
pkey , err := base64DecPubKey ( k . Content )
2017-03-22 18:43:54 +08:00
if err != nil {
return err
}
return pkey . VerifySignature ( h , s )
}
2019-10-16 21:42:42 +08:00
func hashAndVerify ( sig * packet . Signature , payload string , k * GPGKey , committer , signer * User , email string ) * CommitVerification {
//Generating hash of commit
hash , err := populateHash ( sig . Hash , [ ] byte ( payload ) )
if err != nil { //Skipping failed to generate hash
log . Error ( "PopulateHash: %v" , err )
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.generate_hash" ,
}
}
if err := verifySign ( sig , hash , k ) ; err == nil {
return & CommitVerification { //Everything is ok
CommittingUser : committer ,
Verified : true ,
2020-08-13 22:54:54 +08:00
Reason : fmt . Sprintf ( "%s / %s" , signer . Name , k . KeyID ) ,
2019-10-16 21:42:42 +08:00
SigningUser : signer ,
SigningKey : k ,
SigningEmail : email ,
}
}
return nil
}
func hashAndVerifyWithSubKeys ( sig * packet . Signature , payload string , k * GPGKey , committer , signer * User , email string ) * CommitVerification {
commitVerification := hashAndVerify ( sig , payload , k , committer , signer , email )
if commitVerification != nil {
return commitVerification
}
//And test also SubsKey
for _ , sk := range k . SubsKey {
commitVerification := hashAndVerify ( sig , payload , sk , committer , signer , email )
if commitVerification != nil {
return commitVerification
}
}
return nil
}
func hashAndVerifyForKeyID ( sig * packet . Signature , payload string , committer * User , keyID , name , email string ) * CommitVerification {
if keyID == "" {
return nil
}
keys , err := GetGPGKeysByKeyID ( keyID )
if err != nil {
log . Error ( "GetGPGKeysByKeyID: %v" , err )
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.failed_retrieval_gpg_keys" ,
}
}
if len ( keys ) == 0 {
return nil
}
for _ , key := range keys {
2020-07-07 02:33:34 +08:00
var primaryKeys [ ] * GPGKey
if key . PrimaryKeyID != "" {
primaryKeys , err = GetGPGKeysByKeyID ( key . PrimaryKeyID )
if err != nil {
log . Error ( "GetGPGKeysByKeyID: %v" , err )
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.failed_retrieval_gpg_keys" ,
}
}
}
2019-10-16 21:42:42 +08:00
activated := false
if len ( email ) != 0 {
for _ , e := range key . Emails {
if e . IsActivated && strings . EqualFold ( e . Email , email ) {
activated = true
email = e . Email
break
}
}
2020-07-07 02:33:34 +08:00
if ! activated {
for _ , pkey := range primaryKeys {
for _ , e := range pkey . Emails {
if e . IsActivated && strings . EqualFold ( e . Email , email ) {
activated = true
email = e . Email
break
}
}
if activated {
break
}
}
}
2019-10-16 21:42:42 +08:00
} else {
for _ , e := range key . Emails {
if e . IsActivated {
activated = true
email = e . Email
break
}
}
2020-07-07 02:33:34 +08:00
if ! activated {
for _ , pkey := range primaryKeys {
for _ , e := range pkey . Emails {
if e . IsActivated {
activated = true
email = e . Email
break
}
}
if activated {
break
}
}
}
2019-10-16 21:42:42 +08:00
}
2020-07-07 02:33:34 +08:00
2019-10-16 21:42:42 +08:00
if ! activated {
continue
}
signer := & User {
Name : name ,
Email : email ,
}
if key . OwnerID != 0 {
owner , err := GetUserByID ( key . OwnerID )
if err == nil {
signer = owner
} else if ! IsErrUserNotExist ( err ) {
log . Error ( "Failed to GetUserByID: %d for key ID: %d (%s) %v" , key . OwnerID , key . ID , key . KeyID , err )
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.no_committer_account" ,
}
2017-03-22 18:43:54 +08:00
}
}
2019-10-16 21:42:42 +08:00
commitVerification := hashAndVerifyWithSubKeys ( sig , payload , key , committer , signer , email )
if commitVerification != nil {
return commitVerification
}
}
// This is a bad situation ... We have a key id that is in our database but the signature doesn't match.
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Warning : true ,
Reason : BadSignature ,
}
}
2017-03-22 18:43:54 +08:00
2019-10-16 21:42:42 +08:00
// ParseCommitWithSignature check if signature is good against keystore.
func ParseCommitWithSignature ( c * git . Commit ) * CommitVerification {
var committer * User
if c . Committer != nil {
var err error
2017-03-22 18:43:54 +08:00
//Find Committer account
2019-10-16 21:42:42 +08:00
committer , err = GetUserByEmail ( c . Committer . Email ) //This finds the user by primary email or activated email so commit will not be valid if email is not
if err != nil { //Skipping not user for commiter
committer = & User {
Name : c . Committer . Name ,
Email : c . Committer . Email ,
}
2018-03-04 10:45:01 +08:00
// We can expect this to often be an ErrUserNotExist. in the case
// it is not, however, it is important to log it.
if ! IsErrUserNotExist ( err ) {
2019-04-02 15:48:31 +08:00
log . Error ( "GetUserByEmail: %v" , err )
2019-10-16 21:42:42 +08:00
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.no_committer_account" ,
}
2018-03-04 10:45:01 +08:00
}
2019-10-16 21:42:42 +08:00
}
}
// If no signature just report the committer
if c . Signature == nil {
return & CommitVerification {
CommittingUser : committer ,
Verified : false , //Default value
Reason : "gpg.error.not_signed_commit" , //Default value
}
}
//Parsing signature
sig , err := extractSignature ( c . Signature . Signature )
if err != nil { //Skipping failed to extract sign
log . Error ( "SignatureRead err: %v" , err )
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.extract_sign" ,
}
}
keyID := ""
if sig . IssuerKeyId != nil && ( * sig . IssuerKeyId ) != 0 {
keyID = fmt . Sprintf ( "%X" , * sig . IssuerKeyId )
}
if keyID == "" && sig . IssuerFingerprint != nil && len ( sig . IssuerFingerprint ) > 0 {
keyID = fmt . Sprintf ( "%X" , sig . IssuerFingerprint [ 12 : 20 ] )
}
defaultReason := NoKeyFound
// First check if the sig has a keyID and if so just look at that
if commitVerification := hashAndVerifyForKeyID (
sig ,
c . Signature . Payload ,
committer ,
keyID ,
setting . AppName ,
"" ) ; commitVerification != nil {
if commitVerification . Reason == BadSignature {
defaultReason = BadSignature
} else {
return commitVerification
2017-03-22 18:43:54 +08:00
}
2019-10-16 21:42:42 +08:00
}
2017-03-22 18:43:54 +08:00
2019-10-16 21:42:42 +08:00
// Now try to associate the signature with the committer, if present
if committer . ID != 0 {
2020-01-25 03:00:29 +08:00
keys , err := ListGPGKeys ( committer . ID , ListOptions { } )
2017-06-28 23:14:26 +08:00
if err != nil { //Skipping failed to get gpg keys of user
2019-04-02 15:48:31 +08:00
log . Error ( "ListGPGKeys: %v" , err )
2017-03-22 18:43:54 +08:00
return & CommitVerification {
2019-10-16 21:42:42 +08:00
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.failed_retrieval_gpg_keys" ,
2017-03-22 18:43:54 +08:00
}
}
for _ , k := range keys {
2017-09-05 21:45:18 +08:00
//Pre-check (& optimization) that emails attached to key can be attached to the commiter email and can validate
canValidate := false
2019-10-16 21:42:42 +08:00
email := ""
2017-09-05 21:45:18 +08:00
for _ , e := range k . Emails {
2019-10-16 21:42:42 +08:00
if e . IsActivated && strings . EqualFold ( e . Email , c . Committer . Email ) {
2017-09-05 21:45:18 +08:00
canValidate = true
2019-10-16 21:42:42 +08:00
email = e . Email
2017-09-05 21:45:18 +08:00
break
}
}
if ! canValidate {
continue //Skip this key
}
2019-10-16 21:42:42 +08:00
commitVerification := hashAndVerifyWithSubKeys ( sig , c . Signature . Payload , k , committer , committer , email )
if commitVerification != nil {
return commitVerification
2017-03-22 18:43:54 +08:00
}
2019-10-16 21:42:42 +08:00
}
}
if setting . Repository . Signing . SigningKey != "" && setting . Repository . Signing . SigningKey != "default" && setting . Repository . Signing . SigningKey != "none" {
// OK we should try the default key
gpgSettings := git . GPGSettings {
Sign : true ,
KeyID : setting . Repository . Signing . SigningKey ,
Name : setting . Repository . Signing . SigningName ,
Email : setting . Repository . Signing . SigningEmail ,
}
if err := gpgSettings . LoadPublicKeyContent ( ) ; err != nil {
log . Error ( "Error getting default signing key: %s %v" , gpgSettings . KeyID , err )
} else if commitVerification := verifyWithGPGSettings ( & gpgSettings , sig , c . Signature . Payload , committer , keyID ) ; commitVerification != nil {
if commitVerification . Reason == BadSignature {
defaultReason = BadSignature
} else {
return commitVerification
2017-03-22 18:43:54 +08:00
}
}
2019-10-16 21:42:42 +08:00
}
defaultGPGSettings , err := c . GetRepositoryDefaultPublicGPGKey ( false )
if err != nil {
log . Error ( "Error getting default public gpg key: %v" , err )
2019-10-21 06:26:36 +08:00
} else if defaultGPGSettings == nil {
log . Warn ( "Unable to get defaultGPGSettings for unattached commit: %s" , c . ID . String ( ) )
2019-10-16 21:42:42 +08:00
} else if defaultGPGSettings . Sign {
if commitVerification := verifyWithGPGSettings ( defaultGPGSettings , sig , c . Signature . Payload , committer , keyID ) ; commitVerification != nil {
if commitVerification . Reason == BadSignature {
defaultReason = BadSignature
} else {
return commitVerification
}
2017-03-22 18:43:54 +08:00
}
}
2019-10-16 21:42:42 +08:00
return & CommitVerification { //Default at this stage
CommittingUser : committer ,
Verified : false ,
Warning : defaultReason != NoKeyFound ,
Reason : defaultReason ,
SigningKey : & GPGKey {
KeyID : keyID ,
} ,
}
}
func verifyWithGPGSettings ( gpgSettings * git . GPGSettings , sig * packet . Signature , payload string , committer * User , keyID string ) * CommitVerification {
// First try to find the key in the db
if commitVerification := hashAndVerifyForKeyID ( sig , payload , committer , gpgSettings . KeyID , gpgSettings . Name , gpgSettings . Email ) ; commitVerification != nil {
return commitVerification
2017-03-22 18:43:54 +08:00
}
2019-10-16 21:42:42 +08:00
// Otherwise we have to parse the key
2020-08-21 18:45:50 +08:00
ekeys , err := checkArmoredGPGKeyString ( gpgSettings . PublicKeyContent )
2019-10-16 21:42:42 +08:00
if err != nil {
log . Error ( "Unable to get default signing key: %v" , err )
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.generate_hash" ,
}
}
2020-08-21 18:45:50 +08:00
for _ , ekey := range ekeys {
pubkey := ekey . PrimaryKey
content , err := base64EncPubKey ( pubkey )
2020-06-03 23:36:41 +08:00
if err != nil {
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.generate_hash" ,
}
}
2020-08-21 18:45:50 +08:00
k := & GPGKey {
2020-06-03 23:36:41 +08:00
Content : content ,
2020-08-21 18:45:50 +08:00
CanSign : pubkey . CanSign ( ) ,
KeyID : pubkey . KeyIdString ( ) ,
}
for _ , subKey := range ekey . Subkeys {
content , err := base64EncPubKey ( subKey . PublicKey )
if err != nil {
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Reason : "gpg.error.generate_hash" ,
}
}
k . SubsKey = append ( k . SubsKey , & GPGKey {
Content : content ,
CanSign : subKey . PublicKey . CanSign ( ) ,
KeyID : subKey . PublicKey . KeyIdString ( ) ,
} )
}
if commitVerification := hashAndVerifyWithSubKeys ( sig , payload , k , committer , & User {
Name : gpgSettings . Name ,
Email : gpgSettings . Email ,
} , gpgSettings . Email ) ; commitVerification != nil {
return commitVerification
}
if keyID == k . KeyID {
// This is a bad situation ... We have a key id that matches our default key but the signature doesn't match.
return & CommitVerification {
CommittingUser : committer ,
Verified : false ,
Warning : true ,
Reason : BadSignature ,
}
2019-10-16 21:42:42 +08:00
}
}
return nil
2017-03-22 18:43:54 +08:00
}
// ParseCommitsWithSignature checks if signaute of commits are corresponding to users gpg keys.
2020-02-28 03:20:55 +08:00
func ParseCommitsWithSignature ( oldCommits * list . List , repository * Repository ) * list . List {
2017-03-22 18:43:54 +08:00
var (
newCommits = list . New ( )
e = oldCommits . Front ( )
)
2020-09-20 00:44:55 +08:00
keyMap := map [ string ] bool { }
2020-02-28 03:20:55 +08:00
2017-03-22 18:43:54 +08:00
for e != nil {
c := e . Value . ( UserCommit )
2020-02-28 03:20:55 +08:00
signCommit := SignCommit {
2017-03-22 18:43:54 +08:00
UserCommit : & c ,
Verification : ParseCommitWithSignature ( c . Commit ) ,
2020-02-28 03:20:55 +08:00
}
2020-09-20 00:44:55 +08:00
_ = CalculateTrustStatus ( signCommit . Verification , repository , & keyMap )
2020-02-28 03:20:55 +08:00
newCommits . PushBack ( signCommit )
2017-03-22 18:43:54 +08:00
e = e . Next ( )
}
return newCommits
}
2020-02-28 03:20:55 +08:00
// CalculateTrustStatus will calculate the TrustStatus for a commit verification within a repository
2020-09-20 00:44:55 +08:00
func CalculateTrustStatus ( verification * CommitVerification , repository * Repository , keyMap * map [ string ] bool ) ( err error ) {
if ! verification . Verified {
return
}
2020-02-28 03:20:55 +08:00
2020-09-20 00:44:55 +08:00
// There are several trust models in Gitea
trustModel := repository . GetTrustModel ( )
// In the Committer trust model a signature is trusted if it matches the committer
// - it doesn't matter if they're a collaborator, the owner, Gitea or Github
// NB: This model is commit verification only
if trustModel == CommitterTrustModel {
// default to "unmatched"
verification . TrustStatus = "unmatched"
// We can only verify against users in our database but the default key will match
// against by email if it is not in the db.
if ( verification . SigningUser . ID != 0 &&
verification . CommittingUser . ID == verification . SigningUser . ID ) ||
( verification . SigningUser . ID == 0 && verification . CommittingUser . ID == 0 &&
verification . SigningUser . Email == verification . CommittingUser . Email ) {
verification . TrustStatus = "trusted"
2020-02-28 03:20:55 +08:00
}
2020-09-20 00:44:55 +08:00
return
2020-02-28 03:20:55 +08:00
}
2020-09-20 00:44:55 +08:00
// Now we drop to the more nuanced trust models...
verification . TrustStatus = "trusted"
if verification . SigningUser . ID == 0 {
// This commit is signed by the default key - but this key is not assigned to a user in the DB.
// However in the CollaboratorCommitterTrustModel we cannot mark this as trusted
// unless the default key matches the email of a non-user.
if trustModel == CollaboratorCommitterTrustModel && ( verification . CommittingUser . ID != 0 ||
verification . SigningUser . Email != verification . CommittingUser . Email ) {
verification . TrustStatus = "untrusted"
}
return
}
var isMember bool
if keyMap != nil {
var has bool
isMember , has = ( * keyMap ) [ verification . SigningKey . KeyID ]
if ! has {
isMember , err = repository . IsOwnerMemberCollaborator ( verification . SigningUser . ID )
( * keyMap ) [ verification . SigningKey . KeyID ] = isMember
}
} else {
isMember , err = repository . IsOwnerMemberCollaborator ( verification . SigningUser . ID )
}
if ! isMember {
verification . TrustStatus = "untrusted"
if verification . CommittingUser . ID != verification . SigningUser . ID {
// The committing user and the signing user are not the same
// This should be marked as questionable unless the signing user is a collaborator/team member etc.
verification . TrustStatus = "unmatched"
}
} else if trustModel == CollaboratorCommitterTrustModel && verification . CommittingUser . ID != verification . SigningUser . ID {
// The committing user and the signing user are not the same and our trustmodel states that they must match
verification . TrustStatus = "unmatched"
}
2020-02-28 03:20:55 +08:00
return
}