summaryrefslogtreecommitdiff
path: root/src/leap/bitmask/cli/keys.py
diff options
context:
space:
mode:
Diffstat (limited to 'src/leap/bitmask/cli/keys.py')
-rw-r--r--src/leap/bitmask/cli/keys.py124
1 files changed, 124 insertions, 0 deletions
diff --git a/src/leap/bitmask/cli/keys.py b/src/leap/bitmask/cli/keys.py
new file mode 100644
index 00000000..d74c40a8
--- /dev/null
+++ b/src/leap/bitmask/cli/keys.py
@@ -0,0 +1,124 @@
+# -*- coding: utf-8 -*-
+# keys
+# Copyright (C) 2016 LEAP
+#
+# This program is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+"""
+Bitmask Command Line interface: keys
+"""
+import argparse
+import sys
+
+from colorama import Fore
+
+from leap.bitmask.cli import command
+from leap.keymanager.validation import ValidationLevels
+
+
+class Keys(command.Command):
+ service = 'keys'
+ usage = '''{name} keys <subcommand>
+
+Bitmask Keymanager management service
+
+SUBCOMMANDS:
+
+ list List all known keys
+ export Export a given key
+ insert Insert a key to the key storage
+ delete Delete a key from the key storage
+'''.format(name=command.appname)
+
+ def list(self, raw_args):
+ parser = argparse.ArgumentParser(
+ description='Bitmask list keys',
+ prog='%s %s %s' % tuple(sys.argv[:3]))
+ parser.add_argument('--private', action='store_true',
+ help='Use private keys (by default uses public)')
+ subargs = parser.parse_args(raw_args)
+
+ self.data += ['list']
+ if subargs.private:
+ self.data += ['private']
+ else:
+ self.data += ['public']
+
+ return self._send(self._print_key_list)
+
+ def export(self, raw_args):
+ parser = argparse.ArgumentParser(
+ description='Bitmask export key',
+ prog='%s %s %s' % tuple(sys.argv[:3]))
+ parser.add_argument('--private', action='store_true',
+ help='Use private keys (by default uses public)')
+ parser.add_argument('address', nargs=1,
+ help='email address of the key')
+ subargs = parser.parse_args(raw_args)
+ self.data += ['export', subargs.address[0]]
+
+ return self._send(self._print_key)
+
+ def insert(self, raw_args):
+ parser = argparse.ArgumentParser(
+ description='Bitmask import key',
+ prog='%s %s %s' % tuple(sys.argv[:3]))
+ parser.add_argument('--validation', choices=list(ValidationLevels),
+ default='Fingerprint',
+ help='Validation level for the key')
+ parser.add_argument('file', nargs=1,
+ help='file where the key is stored')
+ parser.add_argument('address', nargs=1,
+ help='email address of the key')
+ subargs = parser.parse_args(raw_args)
+
+ with open(subargs.file[0], 'r') as keyfile:
+ rawkey = keyfile.read()
+ self.data += ['insert', subargs.address[0], subargs.validation,
+ rawkey]
+
+ return self._send(self._print_key)
+
+ def delete(self, raw_args):
+ parser = argparse.ArgumentParser(
+ description='Bitmask delete key',
+ prog='%s %s %s' % tuple(sys.argv[:3]))
+ parser.add_argument('--private', action='store_true',
+ help='Use private keys (by default uses public)')
+ parser.add_argument('address', nargs=1,
+ help='email address of the key')
+ subargs = parser.parse_args(raw_args)
+ self.data += ['delete', subargs.address[0]]
+
+ return self._send()
+
+ def _print_key_list(self, keys):
+ for key in keys:
+ print(Fore.GREEN +
+ key["fingerprint"] + " " + key['address'] +
+ Fore.RESET)
+
+ def _print_key(self, key):
+ print(Fore.GREEN)
+ print("Uids: " + ', '.join(key['uids']))
+ print("Fingerprint:" + key['fingerprint'])
+ print("Length: " + str(key['length']))
+ print("Expiration: " + key['expiry_date'])
+ print("Validation: " + key['validation'])
+ print("Used: " + "sig:" +
+ str(key['sign_used']) + ", encr:" +
+ str(key['encr_used']))
+ print("Refreshed: " + key['refreshed_at'])
+ print(Fore.RESET)
+ print("")
+ print(key['key_data'])