diff options
Diffstat (limited to 'keymanager')
45 files changed, 8322 insertions, 0 deletions
| diff --git a/keymanager/.gitattributes b/keymanager/.gitattributes new file mode 100644 index 0000000..9cde827 --- /dev/null +++ b/keymanager/.gitattributes @@ -0,0 +1 @@ +src/leap/keymanager/_version.py export-subst diff --git a/keymanager/.gitignore b/keymanager/.gitignore new file mode 100644 index 0000000..18bfcd6 --- /dev/null +++ b/keymanager/.gitignore @@ -0,0 +1,35 @@ +*.swp +*.swo +*.pyc +*.log +*.*~ +.* +*_rc.py +ui_*.py +!.coveragerc +!.tx +!.gitattributes +bin/ +build/ +core +debian/python-leap-client/ +dist/ +docs/_build +docs/covhtml +include/ +lib/ +local/ +share/ +src/leap/util/reqs.txt +src/leap.egg-info/ +src/leap_client.egg-info +src/leap/_branding.py +src/leap/certs/*.pem +src/*.egg-info +src/pysqlcipher +pkg/osx/dist +pkg/osx/build +MANIFEST +_trial_temp* +config/* +CHANGELOG~ diff --git a/keymanager/.gitlab-ci.yml b/keymanager/.gitlab-ci.yml new file mode 100644 index 0000000..bc95387 --- /dev/null +++ b/keymanager/.gitlab-ci.yml @@ -0,0 +1,2 @@ +test: +  script: tox diff --git a/keymanager/AUTHORS b/keymanager/AUTHORS new file mode 100644 index 0000000..5e64248 --- /dev/null +++ b/keymanager/AUTHORS @@ -0,0 +1,6 @@ +Tomás Touceda <chiiph@leap.se> +Ruben Pollan <meskio@sindominio.net> +Ivan Alejandro <ivanalejandro0@gmail.com> +drebs <drebs@leap.se> +Kali Kaneko <kali@leap.se> +Parménides GV <parmegv@sdf.org> diff --git a/keymanager/CHANGELOG.rst b/keymanager/CHANGELOG.rst new file mode 100644 index 0000000..3716025 --- /dev/null +++ b/keymanager/CHANGELOG.rst @@ -0,0 +1,29 @@ +0.5.1 - 04 Apr, 2016 +++++++++++++++++++++ + +Features +~~~~~~~~ +-  Create an iterator on EncryptionKey to be able to represent it as a dict + + +0.5.0 - 18 Apr, 2016 +++++++++++++++++++++ + +Features +~~~~~~~~ +- `#7485 <https://leap.se/code/issues/7485>`_: Move validation, usage and audited date to the active document. +- `#7713 <https://leap.se/code/issues/7713>`_: Update soledad documents by adding versioning field. +- `#7500 <https://leap.se/code/issues/7500>`_: Use fingerprints instead of key ids. +- `#7712 <https://leap.se/code/issues/7712>`_: Document the soledad docs fields. +- Make EncryptionKey aware of the active address. +- Defer encrypt, decrypt and gen_key operations from gnupg to external threads, +  limited by cpu core amount. + +Bugfixes +~~~~~~~~ +- `#7974 <https://leap.se/code/issues/7974>`_: Return KeyNotFound Failure if not valid key is given to put_raw_key. + +Misc +~~~~ +- This version includes changes in the Soledad Documents and minor modifications to the API. +- Changelog migrated to rst. diff --git a/keymanager/HISTORY.rst b/keymanager/HISTORY.rst new file mode 100644 index 0000000..0a9221d --- /dev/null +++ b/keymanager/HISTORY.rst @@ -0,0 +1,95 @@ +0.4.3 Oct 28, 2015: +  o self-repair the keyring if keys get duplicated. Closes: #7498 +  o catch request exceptions on key fetching. Closes #7410. +  o Don't repush a public key with different addres +  o use async events api. Closes #7224. +  o Use ca_bundle when fetching keys by url. +  o add logging to fetch_key. Related: #7410. +  o more verbosity in get_key wrong address log. +  o don't repush a public key with different address. Related #7420. + +0.4.2 Aug 26, 2015: +  o Style changes. +  o Tests updates. +  o Packaging improvements. + +0.4.1 Jul 10, 2015: +  o Remove the dependency on enum34. Closes: #7188. + +0.4.0 Jun 8, 2015: +  o Adapt to new events api on leap.common. Related to #5359. +  o Add 'fetch_key' method to fetch keys from a URI. Closes #5932. +  o Clean up API. +  o Fix call to python-gnupg's verify_file() method. Closes #6022. +  o KeyManager.put_key now accepts also ascii keys. +  o Multi uid support. Closes #6212. +  o Port keymanager to the new soledad async API. Closes #6368. +  o Return always KeyNotFound failure if fetch keys fails on an unknown error. +  o Upgrade keys if not successfully used and strict high validation level. +    Closes #6211. +  o Use addresses instead of keys for encrypt, decrypt, sign & verify. +    Closes #6346. +  o Expose info about the signing key. Closes #6366. +  o Fetched keys from other domain than its provider are set as 'Weak Chain' +    validation level. Closes #6815. +  o Keep old key after upgrade. Closes #6262. +  o New soledad doc struct for encryption-keys. Closes #6299. +  o Upgrade key when signed by old key. Closes #6240. + +0.3.8 Apr 4, 2014: +  o Properly raise KeyNotFound exception when looking for keys on +    nickserver. Fixes #5415. +  o Do not decode decrypted data, return as str. +  o Use a better version handler for the gnupg version check. +  o Memoize call to get_key. Closes #4784. +  o Update auth to interact with webapp v2. Fixes #5120. + +0.3.7 Dec 6, 2013: +  o Fix error return values on openpgp backend. +  o Remove address check when sending email and rely in the email +    client to verify that is correct. Closes #4491. +  o Support sending encrypted mails to addresses using the '+' sign. +  o Improve exception names and handling. + +0.3.6 Nov 15, 2013: +  o Default encoding to 'utf-8' in case of system encodings not +    set. Closes #4427. +  o Add verification of detached signatures. Closes #4375. +  o New openpgp method: parse_ascii_keys. +  o Expose openpgp methods in keymanager (parse_ascii_keys, put_key, +    delete_key). + +0.3.5 Nov 1, 2013: +  o Return unicode decrypted text to avoid encoding issues. Related to +    #4000. + +0.3.4 Oct 18, 2013: +  o Add option to choose cipher and digest algorithms when signing and +    encrypting. Closes #4030. + +0.3.3 Oct 4, 2013: +  o Add a sanity check for the correct version of gnupg. +  o Update code to use gnupg 1.2.2 python module. Closes #2342. + +0.3.2 Sep 6, 2013: +  o Do not raise exception when a GET request doesn't return 2XX +    code. Nickserver uses error codes for more verbosity in the +    result. +  o Accept unicode ascii keys along with str. + +0.3.1 Aug 23, 2013: +  o Signal different key related events, like key generation, key +    upload. +  o Update to new soledad package scheme (common, client and +    server). Closes #3487. +  o Packaging improvements: add versioneer and parse_requirements. + +0.3.0 Aug 9, 2013: +  o If a nickserver request fails in any way, notify and continue. +  o Options parameter in gnupg.GPG isn't supported by all versions, so +    removing it for the time being. +  o Add support for bundled gpg. Closes #3397. +  o Refactor API to include encrypt/decrypt/sign/verify in KeyManager. + +0.2.0 Jul 12, 2013: +  o Move keymanager to its own package diff --git a/keymanager/LICENSE b/keymanager/LICENSE new file mode 100644 index 0000000..bc08fe2 --- /dev/null +++ b/keymanager/LICENSE @@ -0,0 +1,619 @@ +                    GNU GENERAL PUBLIC LICENSE +                       Version 3, 29 June 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + +                            Preamble + +  The GNU General Public License is a free, copyleft license for +software and other kinds of works. + +  The licenses for most software and other practical works are designed +to take away your freedom to share and change the works.  By contrast, +the GNU General Public License is intended to guarantee your freedom to +share and change all versions of a program--to make sure it remains free +software for all its users.  We, the Free Software Foundation, use the +GNU General Public License for most of our software; it applies also to +any other work released this way by its authors.  You can apply it to +your programs, too. + +  When we speak of free software, we are referring to freedom, not +price.  Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + +  To protect your rights, we need to prevent others from denying you +these rights or asking you to surrender the rights.  Therefore, you have +certain responsibilities if you distribute copies of the software, or if +you modify it: responsibilities to respect the freedom of others. + +  For example, if you distribute copies of such a program, whether +gratis or for a fee, you must pass on to the recipients the same +freedoms that you received.  You must make sure that they, too, receive +or can get the source code.  And you must show them these terms so they +know their rights. + +  Developers that use the GNU GPL protect your rights with two steps: +(1) assert copyright on the software, and (2) offer you this License +giving you legal permission to copy, distribute and/or modify it. + +  For the developers' and authors' protection, the GPL clearly explains +that there is no warranty for this free software.  For both users' and +authors' sake, the GPL requires that modified versions be marked as +changed, so that their problems will not be attributed erroneously to +authors of previous versions. + +  Some devices are designed to deny users access to install or run +modified versions of the software inside them, although the manufacturer +can do so.  This is fundamentally incompatible with the aim of +protecting users' freedom to change the software.  The systematic +pattern of such abuse occurs in the area of products for individuals to +use, which is precisely where it is most unacceptable.  Therefore, we +have designed this version of the GPL to prohibit the practice for those +products.  If such problems arise substantially in other domains, we +stand ready to extend this provision to those domains in future versions +of the GPL, as needed to protect the freedom of users. + +  Finally, every program is threatened constantly by software patents. +States should not allow patents to restrict development and use of +software on general-purpose computers, but in those that do, we wish to +avoid the special danger that patents applied to a free program could +make it effectively proprietary.  To prevent this, the GPL assures that +patents cannot be used to render the program non-free. + +  The precise terms and conditions for copying, distribution and +modification follow. + +                       TERMS AND CONDITIONS + +  0. Definitions. + +  "This License" refers to version 3 of the GNU General Public License. + +  "Copyright" also means copyright-like laws that apply to other kinds of +works, such as semiconductor masks. + +  "The Program" refers to any copyrightable work licensed under this +License.  Each licensee is addressed as "you".  "Licensees" and +"recipients" may be individuals or organizations. + +  To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of an +exact copy.  The resulting work is called a "modified version" of the +earlier work or a work "based on" the earlier work. + +  A "covered work" means either the unmodified Program or a work based +on the Program. + +  To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy.  Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + +  To "convey" a work means any kind of propagation that enables other +parties to make or receive copies.  Mere interaction with a user through +a computer network, with no transfer of a copy, is not conveying. + +  An interactive user interface displays "Appropriate Legal Notices" +to the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License.  If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + +  1. Source Code. + +  The "source code" for a work means the preferred form of the work +for making modifications to it.  "Object code" means any non-source +form of a work. + +  A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + +  The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form.  A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + +  The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities.  However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work.  For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + +  The Corresponding Source need not include anything that users +can regenerate automatically from other parts of the Corresponding +Source. + +  The Corresponding Source for a work in source code form is that +same work. + +  2. Basic Permissions. + +  All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met.  This License explicitly affirms your unlimited +permission to run the unmodified Program.  The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work.  This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + +  You may make, run and propagate covered works that you do not +convey, without conditions so long as your license otherwise remains +in force.  You may convey covered works to others for the sole purpose +of having them make modifications exclusively for you, or provide you +with facilities for running those works, provided that you comply with +the terms of this License in conveying all material for which you do +not control copyright.  Those thus making or running the covered works +for you must do so exclusively on your behalf, under your direction +and control, on terms that prohibit them from making any copies of +your copyrighted material outside their relationship with you. + +  Conveying under any other circumstances is permitted solely under +the conditions stated below.  Sublicensing is not allowed; section 10 +makes it unnecessary. + +  3. Protecting Users' Legal Rights From Anti-Circumvention Law. + +  No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + +  When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such circumvention +is effected by exercising rights under this License with respect to +the covered work, and you disclaim any intention to limit operation or +modification of the work as a means of enforcing, against the work's +users, your or third parties' legal rights to forbid circumvention of +technological measures. + +  4. Conveying Verbatim Copies. + +  You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + +  You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + +  5. Conveying Modified Source Versions. + +  You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these conditions: + +    a) The work must carry prominent notices stating that you modified +    it, and giving a relevant date. + +    b) The work must carry prominent notices stating that it is +    released under this License and any conditions added under section +    7.  This requirement modifies the requirement in section 4 to +    "keep intact all notices". + +    c) You must license the entire work, as a whole, under this +    License to anyone who comes into possession of a copy.  This +    License will therefore apply, along with any applicable section 7 +    additional terms, to the whole of the work, and all its parts, +    regardless of how they are packaged.  This License gives no +    permission to license the work in any other way, but it does not +    invalidate such permission if you have separately received it. + +    d) If the work has interactive user interfaces, each must display +    Appropriate Legal Notices; however, if the Program has interactive +    interfaces that do not display Appropriate Legal Notices, your +    work need not make them do so. + +  A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit.  Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + +  6. Conveying Non-Source Forms. + +  You may convey a covered work in object code form under the terms +of sections 4 and 5, provided that you also convey the +machine-readable Corresponding Source under the terms of this License, +in one of these ways: + +    a) Convey the object code in, or embodied in, a physical product +    (including a physical distribution medium), accompanied by the +    Corresponding Source fixed on a durable physical medium +    customarily used for software interchange. + +    b) Convey the object code in, or embodied in, a physical product +    (including a physical distribution medium), accompanied by a +    written offer, valid for at least three years and valid for as +    long as you offer spare parts or customer support for that product +    model, to give anyone who possesses the object code either (1) a +    copy of the Corresponding Source for all the software in the +    product that is covered by this License, on a durable physical +    medium customarily used for software interchange, for a price no +    more than your reasonable cost of physically performing this +    conveying of source, or (2) access to copy the +    Corresponding Source from a network server at no charge. + +    c) Convey individual copies of the object code with a copy of the +    written offer to provide the Corresponding Source.  This +    alternative is allowed only occasionally and noncommercially, and +    only if you received the object code with such an offer, in accord +    with subsection 6b. + +    d) Convey the object code by offering access from a designated +    place (gratis or for a charge), and offer equivalent access to the +    Corresponding Source in the same way through the same place at no +    further charge.  You need not require recipients to copy the +    Corresponding Source along with the object code.  If the place to +    copy the object code is a network server, the Corresponding Source +    may be on a different server (operated by you or a third party) +    that supports equivalent copying facilities, provided you maintain +    clear directions next to the object code saying where to find the +    Corresponding Source.  Regardless of what server hosts the +    Corresponding Source, you remain obligated to ensure that it is +    available for as long as needed to satisfy these requirements. + +    e) Convey the object code using peer-to-peer transmission, provided +    you inform other peers where the object code and Corresponding +    Source of the work are being offered to the general public at no +    charge under subsection 6d. + +  A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + +  A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, family, +or household purposes, or (2) anything designed or sold for incorporation +into a dwelling.  In determining whether a product is a consumer product, +doubtful cases shall be resolved in favor of coverage.  For a particular +product received by a particular user, "normally used" refers to a +typical or common use of that class of product, regardless of the status +of the particular user or of the way in which the particular user +actually uses, or expects or is expected to use, the product.  A product +is a consumer product regardless of whether the product has substantial +commercial, industrial or non-consumer uses, unless such uses represent +the only significant mode of use of the product. + +  "Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to install +and execute modified versions of a covered work in that User Product from +a modified version of its Corresponding Source.  The information must +suffice to ensure that the continued functioning of the modified object +code is in no case prevented or interfered with solely because +modification has been made. + +  If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information.  But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + +  The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or updates +for a work that has been modified or installed by the recipient, or for +the User Product in which it has been modified or installed.  Access to a +network may be denied when the modification itself materially and +adversely affects the operation of the network or violates the rules and +protocols for communication across the network. + +  Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + +  7. Additional Terms. + +  "Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law.  If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + +  When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it.  (Additional permissions may be written to require their own +removal in certain cases when you modify the work.)  You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + +  Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders of +that material) supplement the terms of this License with terms: + +    a) Disclaiming warranty or limiting liability differently from the +    terms of sections 15 and 16 of this License; or + +    b) Requiring preservation of specified reasonable legal notices or +    author attributions in that material or in the Appropriate Legal +    Notices displayed by works containing it; or + +    c) Prohibiting misrepresentation of the origin of that material, or +    requiring that modified versions of such material be marked in +    reasonable ways as different from the original version; or + +    d) Limiting the use for publicity purposes of names of licensors or +    authors of the material; or + +    e) Declining to grant rights under trademark law for use of some +    trade names, trademarks, or service marks; or + +    f) Requiring indemnification of licensors and authors of that +    material by anyone who conveys the material (or modified versions of +    it) with contractual assumptions of liability to the recipient, for +    any liability that these contractual assumptions directly impose on +    those licensors and authors. + +  All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10.  If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term.  If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + +  If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + +  Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; +the above requirements apply either way. + +  8. Termination. + +  You may not propagate or modify a covered work except as expressly +provided under this License.  Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + +  However, if you cease all violation of this License, then your +license from a particular copyright holder is reinstated (a) +provisionally, unless and until the copyright holder explicitly and +finally terminates your license, and (b) permanently, if the copyright +holder fails to notify you of the violation by some reasonable means +prior to 60 days after the cessation. + +  Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + +  Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License.  If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + +  9. Acceptance Not Required for Having Copies. + +  You are not required to accept this License in order to receive or +run a copy of the Program.  Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance.  However, +nothing other than this License grants you permission to propagate or +modify any covered work.  These actions infringe copyright if you do +not accept this License.  Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + +  10. Automatic Licensing of Downstream Recipients. + +  Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License.  You are not responsible +for enforcing compliance by third parties with this License. + +  An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations.  If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + +  You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License.  For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + +  11. Patents. + +  A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based.  The +work thus licensed is called the contributor's "contributor version". + +  A contributor's "essential patent claims" are all patent claims +owned or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version.  For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + +  Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + +  In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement).  To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + +  If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients.  "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + +  If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + +  A patent license is "discriminatory" if it does not include within +the scope of its coverage, prohibits the exercise of, or is +conditioned on the non-exercise of one or more of the rights that are +specifically granted under this License.  You may not convey a covered +work if you are a party to an arrangement with a third party that is +in the business of distributing software, under which you make payment +to the third party based on the extent of your activity of conveying +the work, and under which the third party grants, to any of the +parties who would receive the covered work from you, a discriminatory +patent license (a) in connection with copies of the covered work +conveyed by you (or copies made from those copies), or (b) primarily +for and in connection with specific products or compilations that +contain the covered work, unless you entered into that arrangement, +or that patent license was granted, prior to 28 March 2007. + +  Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + +  12. No Surrender of Others' Freedom. + +  If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License.  If you cannot convey a +covered work so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you may +not convey it at all.  For example, if you agree to terms that obligate you +to collect a royalty for further conveying from those to whom you convey +the Program, the only way you could satisfy both those terms and this +License would be to refrain entirely from conveying the Program. + +  13. Use with the GNU Affero General Public License. + +  Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU Affero General Public License into a single +combined work, and to convey the resulting work.  The terms of this +License will continue to apply to the part which is the covered work, +but the special requirements of the GNU Affero General Public License, +section 13, concerning interaction through a network will apply to the +combination as such. + +  14. Revised Versions of this License. + +  The Free Software Foundation may publish revised and/or new versions of +the GNU General Public License from time to time.  Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +  Each version is given a distinguishing version number.  If the +Program specifies that a certain numbered version of the GNU General +Public License "or any later version" applies to it, you have the +option of following the terms and conditions either of that numbered +version or of any later version published by the Free Software +Foundation.  If the Program does not specify a version number of the +GNU General Public License, you may choose any version ever published +by the Free Software Foundation. + +  If the Program specifies that a proxy can decide which future +versions of the GNU General Public License can be used, that proxy's +public statement of acceptance of a version permanently authorizes you +to choose that version for the Program. + +  Later license versions may give you additional or different +permissions.  However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + +  15. Disclaimer of Warranty. + +  THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM +IS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +  16. Limitation of Liability. + +  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF +SUCH DAMAGES. + +  17. Interpretation of Sections 15 and 16. + +  If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. diff --git a/keymanager/MANIFEST.in b/keymanager/MANIFEST.in new file mode 100644 index 0000000..8a66511 --- /dev/null +++ b/keymanager/MANIFEST.in @@ -0,0 +1,5 @@ +include pkg/* +include versioneer.py +include LICENSE +include CHANGELOG.rst +include src/leap/keymanager/_version.py diff --git a/keymanager/README.rst b/keymanager/README.rst new file mode 100644 index 0000000..1d4b53e --- /dev/null +++ b/keymanager/README.rst @@ -0,0 +1,29 @@ +LEAP's Key Manager +================== +.. image:: https://badge.fury.io/py/leap.keymanager.svg +    :target: http://badge.fury.io/py/leap.keymanager +.. image:: https://img.shields.io/pypi/dm/leap.keymanager.svg +    :target: http://badge.fury.io/py/leap.keymanager + +The Key Manager is a `Nicknym`_ agent for the `LEAP`_ project, written in python using the `twisted`_ async framework. + +.. _`Nicknym`: https://leap.se/nicknym +.. _`LEAP`: https://leap.se/docs/ +.. _`twisted`: https://twistedmatrix.com/trac/ + + +running tests +------------- + +Use trial to run the test suite:: + +  trial leap.keymanager + +License +======= + +.. image:: https://raw.github.com/leapcode/bitmask_client/develop/docs/user/gpl.png + +leap.keymanager is released under the terms of the `GNU GPL version 3`_ or later. + +.. _`GNU GPL version 3`: http://www.gnu.org/licenses/gpl.txt diff --git a/keymanager/changes/VERSION_COMPAT b/keymanager/changes/VERSION_COMPAT new file mode 100644 index 0000000..cc00ecf --- /dev/null +++ b/keymanager/changes/VERSION_COMPAT @@ -0,0 +1,10 @@ +################################################# +# This file keeps track of the recent changes +# introduced in internal leap dependencies. +# Add your changes here so we can properly update +# requirements.pip during the release process. +# (leave header when resetting) +################################################# +# +# BEGIN DEPENDENCY LIST ------------------------- +# leap.foo.bar>=x.y.z diff --git a/keymanager/changes/next-changelog.txt b/keymanager/changes/next-changelog.txt new file mode 100644 index 0000000..d34022f --- /dev/null +++ b/keymanager/changes/next-changelog.txt @@ -0,0 +1,34 @@ +0.5.2 - xxx ++++++++++++++++++++++++++++++++ + +Please add lines to this file, they will be moved to the CHANGELOG.rst during +the next release. + +There are two template lines for each category, use them as reference. + +I've added a new category `Misc` so we can track doc/style/packaging stuff. + +Features +~~~~~~~~ +- `#8031 <https://leap.se/code/issues/8031>`_: Remove support for multiple key types. +- `#8068 <https://leap.se/code/issues/8068>`_: make get_all_keys aware of active addresses. +- `#6658 <https://leap.se/code/issues/6658>`_: Improve duplicated active documents fixup. +- `#8165 <https://leap.se/code/issues/8165>`_: Check key document versions and fail if it's unknown. +- Make ValidationLevels iterable + +- `#1234 <https://leap.se/code/issues/1234>`_: Description of the new feature corresponding with issue #1234. +- New feature without related issue number. + +Bugfixes +~~~~~~~~ +- `#1235 <https://leap.se/code/issues/1235>`_: Description for the fixed stuff corresponding with issue #1235. +- Bugfix without related issue number. + +Misc +~~~~ +- `#1236 <https://leap.se/code/issues/1236>`_: Description of the new feature corresponding with issue #1236. +- Some change without issue number. + +Known Issues +~~~~~~~~~~~~ +- `#1236 <https://leap.se/code/issues/1236>`_: Description of the known issue corresponding with issue #1236. diff --git a/keymanager/docs/leap-commit-template b/keymanager/docs/leap-commit-template new file mode 100644 index 0000000..8a5c7cd --- /dev/null +++ b/keymanager/docs/leap-commit-template @@ -0,0 +1,7 @@ +[bug|feat|docs|style|refactor|test|pkg|i18n] ... +... + +- Resolves: #XYZ +- Related: #XYZ +- Documentation: #XYZ +- Releases: XYZ diff --git a/keymanager/docs/leap-commit-template.README b/keymanager/docs/leap-commit-template.README new file mode 100644 index 0000000..ce8809e --- /dev/null +++ b/keymanager/docs/leap-commit-template.README @@ -0,0 +1,47 @@ +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +HOW TO USE THIS TEMPLATE: +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Run `git config commit.template docs/leap-commit-template` or +edit the .git/config for this project and add +`template = docs/leap-commit-template`  +under the [commit] block + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +COMMIT TEMPLATE FORMAT EXPLAINED +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +[type] <subject> + +<body> +<footer> + +Type should be one of the following: +- bug (bug fix) +- feat (new feature) +- docs (changes to documentation) +- style (formatting, pep8 violations, etc; no code change) +- refactor (refactoring production code) +- test (adding missing tests, refactoring tests; no production code change) +- pkg (packaging related changes; no production code change) +- i18n translation related changes + +Subject should use imperative tone and say what you did. +For example, use 'change', NOT 'changed' or 'changes'. + +The body should go into detail about changes made. + +The footer should contain any issue references or actions. +You can use one or several of the following: + +- Resolves: #XYZ +- Related: #XYZ +- Documentation: #XYZ +- Releases: XYZ + +The Documentation field should be included in every new feature commit, and it +should link to an issue in the bug tracker where the new feature is analyzed +and documented. + +For a full example of how to write a good commit message, check out +https://github.com/sparkbox/how_to/tree/master/style/git diff --git a/keymanager/docs/soledad-documents.rst b/keymanager/docs/soledad-documents.rst new file mode 100644 index 0000000..67055b2 --- /dev/null +++ b/keymanager/docs/soledad-documents.rst @@ -0,0 +1,77 @@ +================= +Soledad Documents +================= + +KeyManager uses two types of documents for the keyring: + +* key document, that stores each gpg key. + +* active document, that relates an address to its corresponding key. + + +Each key can have 0 or more active documents with a different email address +each: + +:: + +  .-------------.          .-------------. +  | foo@foo.com |          | bar@bar.com | +  '-------------'          '-------------' +         |                        |      +         |      .-----------.     |      +         |      |           |     |      +         |      |    key    |     |      +         '----->|           |<----' +                |           |      +                '-----------' + + +Fields in a key document: + +* uids + +* fingerprint + +* key_data + +* private. bool marking if the key is private or public + +* length + +* expiry_date + +* refreshed_at + +* version = 1 + +* type = "OpenPGPKey" + +* tags = ["keymanager-key"] + + +Fields in an active document: + +* address + +* fingerprint + +* private + +* validation + +* last_audited_at + +* encr_used + +* sign_used + +* version = 1 + +* type = "OpenPGPKey-active" + +* tags = ["keymanager-active"] + + +The meaning of validation, encr_used and sign_used is related to the `Transitional Key Validation`_ + +.. _Transitional Key Validation: https://leap.se/en/docs/design/transitional-key-validation diff --git a/keymanager/pkg/__init__.py b/keymanager/pkg/__init__.py new file mode 100644 index 0000000..e69de29 --- /dev/null +++ b/keymanager/pkg/__init__.py diff --git a/keymanager/pkg/generate_wheels.sh b/keymanager/pkg/generate_wheels.sh new file mode 100755 index 0000000..a13e2c7 --- /dev/null +++ b/keymanager/pkg/generate_wheels.sh @@ -0,0 +1,13 @@ +#!/bin/sh +# Generate wheels for dependencies +# Use at your own risk. + +if [ "$WHEELHOUSE" = "" ]; then +    WHEELHOUSE=$HOME/wheelhouse +fi + +pip wheel --wheel-dir $WHEELHOUSE pip +pip wheel --wheel-dir $WHEELHOUSE -r pkg/requirements.pip +if [ -f pkg/requirements-testing.pip ]; then +   pip wheel --wheel-dir $WHEELHOUSE -r pkg/requirements-testing.pip +fi diff --git a/keymanager/pkg/pip_install_requirements.sh b/keymanager/pkg/pip_install_requirements.sh new file mode 100755 index 0000000..8ca0956 --- /dev/null +++ b/keymanager/pkg/pip_install_requirements.sh @@ -0,0 +1,84 @@ +#!/bin/bash +# Update pip and install LEAP base/testing requirements. +# For convenience, $insecure_packages are allowed with insecure flags enabled. +# Use at your own risk. +# See $usage for help + +insecure_packages="" +leap_wheelhouse=https://lizard.leap.se/wheels + +show_help() { +    usage="Usage: $0 [--testing] [--use-leap-wheels]\n --testing\t\tInstall dependencies from requirements-testing.pip\n +\t\t\tOtherwise, it will install requirements.pip\n +--use-leap-wheels\tUse wheels from leap.se" +    echo -e $usage + +    exit 1 +} + +process_arguments() { +    testing=false +    while [ "$#" -gt 0 ]; do +	# From http://stackoverflow.com/a/31443098 +	case "$1" in +	    --help) show_help;; +	    --testing) testing=true; shift 1;; +	    --use-leap-wheels) use_leap_wheels=true; shift 1;; + +	    -h) show_help;; +	    -*) echo "unknown option: $1" >&2; exit 1;; +	esac +    done +} + +return_wheelhouse() { +    if $use_leap_wheels ; then +	WHEELHOUSE=$leap_wheelhouse +    elif [ "$WHEELHOUSE" = "" ]; then +	WHEELHOUSE=$HOME/wheelhouse +    fi + +    # Tested with bash and zsh +    if [[ $WHEELHOUSE != http* && ! -d "$WHEELHOUSE" ]]; then +	    mkdir $WHEELHOUSE +    fi + +    echo "$WHEELHOUSE" +} + +return_install_options() { +    wheelhouse=`return_wheelhouse` +    install_options="-U --find-links=$wheelhouse" +    if $use_leap_wheels ; then +	install_options="$install_options --trusted-host lizard.leap.se" +    fi + +    echo $install_options +} + +return_insecure_flags() { +    for insecure_package in $insecure_packages; do +	flags="$flags --allow-external $insecure_package --allow-unverified $insecure_package" +    done + +    echo $flags +} + +return_packages() { +    if $testing ; then +	packages="-r pkg/requirements-testing.pip" +    else +	packages="-r pkg/requirements.pip" +    fi + +    echo $packages +} + +process_arguments $@ +install_options=`return_install_options` +insecure_flags=`return_insecure_flags` +packages=`return_packages` + +pip install -U wheel +pip install $install_options pip +pip install $install_options $insecure_flags $packages diff --git a/keymanager/pkg/requirements-latest.pip b/keymanager/pkg/requirements-latest.pip new file mode 100644 index 0000000..148d42b --- /dev/null +++ b/keymanager/pkg/requirements-latest.pip @@ -0,0 +1,8 @@ +--index-url https://pypi.python.org/simple/ + +--allow-external u1db  --allow-unverified u1db +--allow-external dirspec  --allow-unverified dirspec +-e 'git+https://github.com/pixelated-project/leap_pycommon.git@develop#egg=leap.common' +-e 'git+https://github.com/pixelated-project/soledad.git@develop#egg=leap.soledad.common&subdirectory=common/' +-e 'git+https://github.com/pixelated-project/soledad.git@develop#egg=leap.soledad.client&subdirectory=client/' +-e . diff --git a/keymanager/pkg/requirements-leap.pip b/keymanager/pkg/requirements-leap.pip new file mode 100644 index 0000000..4ba1d81 --- /dev/null +++ b/keymanager/pkg/requirements-leap.pip @@ -0,0 +1 @@ +leap.common>=0.4.3 diff --git a/keymanager/pkg/requirements-testing.pip b/keymanager/pkg/requirements-testing.pip new file mode 100644 index 0000000..addda19 --- /dev/null +++ b/keymanager/pkg/requirements-testing.pip @@ -0,0 +1,11 @@ +mock +setuptools-trial +pep8 + +#----------------------------------------------------------------------------- +#Although it's not a package dependency, tests also depend on having +#soledad client installed. Commenting to avoid versioning problem, you should +#know what you are testing against :) +#----------------------------------------------------------------------------- + +#leap.soledad.client diff --git a/keymanager/pkg/requirements.pip b/keymanager/pkg/requirements.pip new file mode 100644 index 0000000..386b85c --- /dev/null +++ b/keymanager/pkg/requirements.pip @@ -0,0 +1,3 @@ +# if we bump the gnupg version, bump also the sanity check +# in keymanager.__init__ +gnupg>=1.4.0 diff --git a/keymanager/pkg/tools/get_authors.sh b/keymanager/pkg/tools/get_authors.sh new file mode 100755 index 0000000..0169bb1 --- /dev/null +++ b/keymanager/pkg/tools/get_authors.sh @@ -0,0 +1,2 @@ +#!/bin/sh +git log --format='%aN <%aE>' | awk '{arr[$0]++} END{for (i in arr){print arr[i], i;}}' | sort -rn | cut -d' ' -f2- diff --git a/keymanager/pkg/tools/with_venvwrapper.sh b/keymanager/pkg/tools/with_venvwrapper.sh new file mode 100755 index 0000000..2622978 --- /dev/null +++ b/keymanager/pkg/tools/with_venvwrapper.sh @@ -0,0 +1,15 @@ +#!/bin/bash + +#Wraps a command in a virtualenwrapper passed as first argument. +#Example: +#with_virtualenvwrapper.sh leap-bitmask ./run_tests.sh + +wd=`pwd` +source `which virtualenvwrapper.sh` +echo "Activating virtualenv " $1 +echo "------------------------------------" +workon $1 +cd $wd +echo "running version: " `pyver leap.keymanager` +echo "soledad version: " `pyver leap.soledad.common` +$2 $3 $4 $5 diff --git a/keymanager/pkg/utils.py b/keymanager/pkg/utils.py new file mode 100644 index 0000000..9c9211b --- /dev/null +++ b/keymanager/pkg/utils.py @@ -0,0 +1,101 @@ +# -*- coding: utf-8 -*- +# utils.py +# Copyright (C) 2013 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program.  If not, see <http://www.gnu.org/licenses/>. +""" +Utils to help in the setup process +""" +import os +import re +import sys + + +def is_develop_mode(): +    """ +    Returns True if we're calling the setup script using the argument for +    setuptools development mode. + +    This avoids messing up with dependency pinning and order, the +    responsibility of installing the leap dependencies is left to the +    developer. +    """ +    args = sys.argv +    devflags = "setup.py", "develop" +    if (args[0], args[1]) == devflags: +        return True +    return False + + +def get_reqs_from_files(reqfiles): +    """ +    Returns the contents of the top requirement file listed as a +    string list with the lines. + +    @param reqfiles: requirement files to parse +    @type reqfiles: list of str +    """ +    for reqfile in reqfiles: +        if os.path.isfile(reqfile): +            return open(reqfile, 'r').read().split('\n') + + +def parse_requirements(reqfiles=['requirements.txt', +                                 'requirements.pip', +                                 'pkg/requirements.pip']): +    """ +    Parses the requirement files provided. + +    The passed reqfiles list is a list of possible locations to try, the +    function will return the contents of the first path found. + +    Checks the value of LEAP_VENV_SKIP_PYSIDE to see if it should +    return PySide as a dep or not. Don't set, or set to 0 if you want +    to install it through pip. + +    @param reqfiles: requirement files to parse +    @type reqfiles: list of str +    """ + +    requirements = [] +    skip_pyside = os.getenv("LEAP_VENV_SKIP_PYSIDE", "0") != "0" +    for line in get_reqs_from_files(reqfiles): +        # -e git://foo.bar/baz/master#egg=foobar +        if re.match(r'\s*-e\s+', line): +            pass +            # do not try to do anything with externals on vcs +            # requirements.append(re.sub(r'\s*-e\s+.*#egg=(.*)$', r'\1', +            #                     line)) +            # http://foo.bar/baz/foobar/zipball/master#egg=foobar +        elif re.match(r'\s*https?:', line): +            requirements.append(re.sub(r'\s*https?:.*#egg=(.*)$', r'\1', +                                line)) +        # -f lines are for index locations, and don't get used here +        elif re.match(r'\s*-f\s+', line): +            pass + +        # argparse is part of the standard library starting with 2.7 +        # adding it to the requirements list screws distro installs +        elif line == 'argparse' and sys.version_info >= (2, 7): +            pass +        elif line == 'PySide' and skip_pyside: +            pass +        # do not include comments +        elif line.lstrip().startswith('#'): +            pass +        else: +            if line != '': +                requirements.append(line) + +    return requirements diff --git a/keymanager/setup.cfg b/keymanager/setup.cfg new file mode 100644 index 0000000..4a24b89 --- /dev/null +++ b/keymanager/setup.cfg @@ -0,0 +1,17 @@ +[aliases] +test = trial + +[pep8] +exclude = versioneer.py,_version.py,*.egg,build,docs +ignore = E731 + +[flake8] +exclude = versioneer.py,_version.py,*.egg,build,docs +ignore = E731 + +[versioneer] +VCS = git +style = pep440 +versionfile_source = src/leap/keymanager/_version.py +versionfile_build = leap/keymanager/_version.py +tag_prefix =  diff --git a/keymanager/setup.py b/keymanager/setup.py new file mode 100644 index 0000000..cde5f8b --- /dev/null +++ b/keymanager/setup.py @@ -0,0 +1,152 @@ +# -*- coding: utf-8 -*- +# setup.py +# Copyright (C) 2013 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +setup file for leap.keymanager +""" +import re +from setuptools import setup +from setuptools import find_packages +from setuptools import Command + +from pkg import utils + +import versioneer + +trove_classifiers = [ +    'Development Status :: 4 - Beta', +    'Intended Audience :: Developers', +    'License :: OSI Approved :: GNU General Public License v3 (GPLv3)', +    'Operating System :: OS Independent', +    'Programming Language :: Python', +    'Programming Language :: Python :: 2.6', +    'Programming Language :: Python :: 2.7', +    'Topic :: Communications :: Email', +    'Topic :: Internet', +    'Topic :: Security :: Cryptography', +    'Topic :: Software Development :: Libraries', +] + +DOWNLOAD_BASE = ('https://github.com/leapcode/bitmask_client/' +                 'archive/%s.tar.gz') +_versions = versioneer.get_versions() +VERSION = _versions['version'] +VERSION_REVISION = _versions['full-revisionid'] +DOWNLOAD_URL = "" + +# get the short version for the download url +_version_short = re.findall('\d+\.\d+\.\d+', VERSION) +if len(_version_short) > 0: +    VERSION_SHORT = _version_short[0] +    DOWNLOAD_URL = DOWNLOAD_BASE % VERSION_SHORT + +class freeze_debianver(Command): + +    """ +    Freezes the version in a debian branch. +    To be used after merging the development branch onto the debian one. +    """ +    user_options = [] +    template = r""" +# This file was generated by the `freeze_debianver` command in setup.py +# Using 'versioneer.py' (0.16) from +# revision-control system data, or from the parent directory name of an +# unpacked source archive. Distribution tarballs contain a pre-generated copy +# of this file. + +import json +import sys + +version_json = ''' +{ + "dirty": false, + "error": null, + "full-revisionid": "FULL_REVISIONID", + "version": "VERSION_STRING" +} +'''  # END VERSION_JSON + +def get_versions(): +    return json.loads(version_json) +""" + +    def initialize_options(self): +        pass + +    def finalize_options(self): +        pass + +    def run(self): +        proceed = str(raw_input( +            "This will overwrite the file _version.py. Continue? [y/N] ")) +        if proceed != "y": +            print("He. You scared. Aborting.") +            return +        subst_template = self.template.replace( +            'VERSION_STRING', VERSION_SHORT).replace( +            'FULL_REVISIONID', VERSION_REVISION) +        versioneer_cfg = versioneer.get_config_from_root('.') +        with open(versioneer_cfg.versionfile_source, 'w') as f: +            f.write(subst_template) + + +cmdclass = versioneer.get_cmdclass() +cmdclass["freeze_debianver"] = freeze_debianver + +# XXX add ref to docs + +requirements = utils.parse_requirements() + +if utils.is_develop_mode(): +    print +    print ("[WARNING] Skipping leap-specific dependencies " +           "because development mode is detected.") +    print ("[WARNING] You can install " +           "the latest published versions with " +           "'pip install -r pkg/requirements-leap.pip'") +    print ("[WARNING] Or you can instead do 'python setup.py develop' " +           "from the parent folder of each one of them.") +    print +else: +    requirements += utils.parse_requirements( +        reqfiles=["pkg/requirements-leap.pip"]) + +setup( +    name='leap.keymanager', +    version=VERSION, +    cmdclass=cmdclass, +    url='https://leap.se/', +    download_url=DOWNLOAD_URL, +    license='GPLv3+', +    description='LEAP\'s Key Manager', +    author='The LEAP Encryption Access Project', +    author_email='info@leap.se', +    maintainer='Kali Kaneko', +    maintainer_email='kali@leap.se', +    long_description=( +        "The Key Manager handles all types of keys to allow for " +        "point-to-point encryption between parties communicating through " +        "LEAP infrastructure." +    ), +    classifiers=trove_classifiers, +    namespace_packages=["leap"], +    packages=find_packages('src', exclude=['leap.keymanager.tests']), +    package_dir={'': 'src'}, +    test_suite='leap.keymanager.tests', +    install_requires=requirements, +    tests_require=utils.parse_requirements( +        reqfiles=['pkg/requirements-testing.pip']), +) diff --git a/keymanager/src/leap/__init__.py b/keymanager/src/leap/__init__.py new file mode 100644 index 0000000..f48ad10 --- /dev/null +++ b/keymanager/src/leap/__init__.py @@ -0,0 +1,6 @@ +# See http://peak.telecommunity.com/DevCenter/setuptools#namespace-packages +try: +    __import__('pkg_resources').declare_namespace(__name__) +except ImportError: +    from pkgutil import extend_path +    __path__ = extend_path(__path__, __name__) diff --git a/keymanager/src/leap/keymanager/__init__.py b/keymanager/src/leap/keymanager/__init__.py new file mode 100644 index 0000000..0b8a5b3 --- /dev/null +++ b/keymanager/src/leap/keymanager/__init__.py @@ -0,0 +1,842 @@ +# -*- coding: utf-8 -*- +# __init__.py +# Copyright (C) 2013 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +Key Manager is a Nicknym agent for LEAP client. +""" +# let's do a little sanity check to see if we're using the wrong gnupg +import fileinput +import os +import sys +import tempfile +import json +import urllib + +from leap.common import ca_bundle +from twisted.web import client +from twisted.web._responses import NOT_FOUND + +from ._version import get_versions + +try: +    from gnupg.gnupg import GPGUtilities +    assert(GPGUtilities)  # pyflakes happy +    from gnupg import __version__ as _gnupg_version +    if '-' in _gnupg_version: +        # avoid Parsing it as LegacyVersion, get just +        # the release numbers: +        _gnupg_version = _gnupg_version.split('-')[0] +    from pkg_resources import parse_version +    # We need to make sure that we're not colliding with the infamous +    # python-gnupg +    assert(parse_version(_gnupg_version) >= parse_version('1.4.0')) + +except (ImportError, AssertionError): +    print "*******" +    print "Ooops! It looks like there is a conflict in the installed version " +    print "of gnupg." +    print "GNUPG_VERSION:", _gnupg_version +    print +    print "Disclaimer: Ideally, we would need to work a patch and propose the " +    print "merge to upstream. But until then do: " +    print +    print "% pip uninstall python-gnupg" +    print "% pip install gnupg" +    print "*******" +    sys.exit(1) + +import logging + +from twisted.internet import defer +from urlparse import urlparse + +from leap.common.check import leap_assert +from leap.common.http import HTTPClient +from leap.common.events import emit_async, catalog +from leap.common.decorators import memoized_method + +from leap.keymanager.errors import ( +    KeyNotFound, +    KeyNotValidUpgrade, +    InvalidSignature +) +from leap.keymanager.validation import ValidationLevels, can_upgrade +from leap.keymanager.openpgp import OpenPGPScheme + +__version__ = get_versions()['version'] +del get_versions + +logger = logging.getLogger(__name__) + + +# +# The Key Manager +# + +class KeyManager(object): + +    # +    # server's key storage constants +    # + +    OPENPGP_KEY = 'openpgp' +    PUBKEY_KEY = "user[public_key]" + +    def __init__(self, address, nickserver_uri, soledad, token=None, +                 ca_cert_path=None, api_uri=None, api_version=None, uid=None, +                 gpgbinary=None): +        """ +        Initialize a Key Manager for user's C{address} with provider's +        nickserver reachable in C{nickserver_uri}. + +        :param address: The email address of the user of this Key Manager. +        :type address: str +        :param nickserver_uri: The URI of the nickserver. +        :type nickserver_uri: str +        :param soledad: A Soledad instance for local storage of keys. +        :type soledad: leap.soledad.Soledad +        :param token: The token for interacting with the webapp API. +        :type token: str +        :param ca_cert_path: The path to the CA certificate. +        :type ca_cert_path: str +        :param api_uri: The URI of the webapp API. +        :type api_uri: str +        :param api_version: The version of the webapp API. +        :type api_version: str +        :param uid: The user's UID. +        :type uid: str +        :param gpgbinary: Name for GnuPG binary executable. +        :type gpgbinary: C{str} +        """ +        self._address = address +        self._nickserver_uri = nickserver_uri +        self._soledad = soledad +        self._token = token +        self.ca_cert_path = ca_cert_path +        self.api_uri = api_uri +        self.api_version = api_version +        self.uid = uid +        self._openpgp = OpenPGPScheme(soledad, gpgbinary=gpgbinary) +        self._combined_ca_bundle = self._create_combined_bundle_file() +        self._async_client = HTTPClient(self._combined_ca_bundle) +        self._async_client_pinned = HTTPClient(self._ca_cert_path) + +    # +    # destructor +    # + +    def __del__(self): +        try: +            created_tmp_combined_ca_bundle = self._combined_ca_bundle not in \ +                [ca_bundle.where(), self._ca_cert_path] +            if created_tmp_combined_ca_bundle: +                os.remove(self._combined_ca_bundle) +        except OSError: +            pass + +    # +    # utilities +    # + +    def _create_combined_bundle_file(self): +        leap_ca_bundle = ca_bundle.where() + +        if self._ca_cert_path == leap_ca_bundle: +            return self._ca_cert_path   # don't merge file with itself +        elif not self._ca_cert_path: +            return leap_ca_bundle + +        tmp_file = tempfile.NamedTemporaryFile(delete=False) + +        with open(tmp_file.name, 'w') as fout: +            fin = fileinput.input(files=(leap_ca_bundle, self._ca_cert_path)) +            for line in fin: +                fout.write(line) +            fin.close() + +        return tmp_file.name + +    @defer.inlineCallbacks +    def _get_key_from_nicknym(self, address): +        """ +        Send a GET request to C{uri} containing C{data}. + +        :param address: The URI of the request. +        :type address: str + +        :return: A deferred that will be fired with GET content as json (dict) +        :rtype: Deferred +        """ +        try: +            uri = self._nickserver_uri + '?address=' + address +            content = yield self._fetch_and_handle_404_from_nicknym(uri, address) +            json_content = json.loads(content) + +        except KeyNotFound: +            raise +        except IOError as e: +            logger.warning("HTTP error retrieving key: %r" % (e,)) +            logger.warning("%s" % (content,)) +            raise KeyNotFound(e.message), None, sys.exc_info()[2] +        except ValueError as v: +            logger.warning("Invalid JSON data from key: %s" % (uri,)) +            raise KeyNotFound(v.message + ' - ' + uri), None, sys.exc_info()[2] + +        except Exception as e: +            logger.warning("Error retrieving key: %r" % (e,)) +            raise KeyNotFound(e.message), None, sys.exc_info()[2] +        # Responses are now text/plain, although it's json anyway, but +        # this will fail when it shouldn't +        # leap_assert( +        #     res.headers['content-type'].startswith('application/json'), +        #     'Content-type is not JSON.') +        defer.returnValue(json_content) + +    def _fetch_and_handle_404_from_nicknym(self, uri, address): +        """ +        Send a GET request to C{uri} containing C{data}. + +        :param uri: The URI of the request. +        :type uri: str +        :param address: The email corresponding to the key. +        :type address: str + +        :return: A deferred that will be fired with GET content as json (dict) +        :rtype: Deferred +        """ +        def check_404(response): +            if response.code == NOT_FOUND: +                message = '%s: %s key not found.' % (response.code, address) +                logger.warning(message) +                raise KeyNotFound(message), None, sys.exc_info()[2] +            return response + +        d = self._async_client_pinned.request(str(uri), 'GET', callback=check_404) +        d.addCallback(client.readBody) +        return d + +    @defer.inlineCallbacks +    def _get_with_combined_ca_bundle(self, uri, data=None): +        """ +        Send a GET request to C{uri} containing C{data}. + +        Instead of using the ca_cert provided on construction time, this +        version also uses the default certificates shipped with leap.common + +        :param uri: The URI of the request. +        :type uri: str +        :param data: The body of the request. +        :type data: dict, str or file + +        :return: A deferred that will be fired with the GET response +        :rtype: Deferred +        """ +        try: +            content = yield self._async_client.request(str(uri), 'GET') +        except Exception as e: +            logger.warning("There was a problem fetching key: %s" % (e,)) +            raise KeyNotFound(uri) +        if not content: +            raise KeyNotFound(uri) +        defer.returnValue(content) + +    @defer.inlineCallbacks +    def _put(self, uri, data=None): +        """ +        Send a PUT request to C{uri} containing C{data}. + +        The request will be sent using the configured CA certificate path to +        verify the server certificate and the configured session id for +        authentication. + +        :param uri: The URI of the request. +        :type uri: str +        :param data: The body of the request. +        :type data: dict, str or file + +        :return: A deferred that will be fired when PUT request finishes +        :rtype: Deferred +        """ +        leap_assert( +            self._token is not None, +            'We need a token to interact with webapp!') +        if type(data) == dict: +            data = urllib.urlencode(data) +        headers = {'Authorization': [str('Token token=%s' % self._token)]} +        headers['Content-Type'] = ['application/x-www-form-urlencoded'] +        try: +            res = yield self._async_client_pinned.request(str(uri), 'PUT', +                                                          body=str(data), +                                                          headers=headers) +        except Exception as e: +            logger.warning("Error uploading key: %r" % (e,)) +            raise e +        if 'error' in res: +            # FIXME: That's a workaround for 500, +            # we need to implement a readBody to assert response code +            logger.warning("Error uploading key: %r" % (res,)) +            raise Exception(res) + +    @memoized_method(invalidation=300) +    @defer.inlineCallbacks +    def _fetch_keys_from_server(self, address): +        """ +        Fetch keys bound to address from nickserver and insert them in +        local database. + +        :param address: The address bound to the keys. +        :type address: str + +        :return: A Deferred which fires when the key is in the storage, +                 or which fails with KeyNotFound if the key was not found on +                 nickserver. +        :rtype: Deferred + +        """ +        # request keys from the nickserver +        server_keys = yield self._get_key_from_nicknym(address) + +        # insert keys in local database +        if self.OPENPGP_KEY in server_keys: +            # nicknym server is authoritative for its own domain, +            # for other domains the key might come from key servers. +            validation_level = ValidationLevels.Weak_Chain +            _, domain = _split_email(address) +            if (domain == _get_domain(self._nickserver_uri)): +                validation_level = ValidationLevels.Provider_Trust + +            yield self.put_raw_key( +                server_keys['openpgp'], +                address=address, +                validation=validation_level) + +    # +    # key management +    # + +    def send_key(self): +        """ +        Send user's key to provider. + +        Public key bound to user's is sent to provider, which will sign it and +        replace any prior keys for the same address in its database. + +        :return: A Deferred which fires when the key is sent, or which fails +                 with KeyNotFound if the key was not found in local database. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ +        def send(pubkey): +            data = { +                self.PUBKEY_KEY: pubkey.key_data +            } +            uri = "%s/%s/users/%s.json" % ( +                self._api_uri, +                self._api_version, +                self._uid) +            d = self._put(uri, data) +            d.addCallback(lambda _: +                          emit_async(catalog.KEYMANAGER_DONE_UPLOADING_KEYS, +                                     self._address)) +            return d + +        d = self.get_key( +            self._address, private=False, fetch_remote=False) +        d.addCallback(send) +        return d + +    def get_key(self, address, private=False, fetch_remote=True): +        """ +        Return a key bound to address. + +        First, search for the key in local storage. If it is not available, +        then try to fetch from nickserver. + +        :param address: The address bound to the key. +        :type address: str +        :param private: Look for a private key instead of a public one? +        :type private: bool +        :param fetch_remote: If key not found in local storage try to fetch +                             from nickserver +        :type fetch_remote: bool + +        :return: A Deferred which fires with an EncryptionKey bound to address, +                 or which fails with KeyNotFound if no key was found neither +                 locally or in keyserver or fail with KeyVersionError if the +                 key has a format not supported by this version of KeyManager +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ +        logger.debug("getting key for %s" % (address,)) + +        emit_async(catalog.KEYMANAGER_LOOKING_FOR_KEY, address) + +        def key_found(key): +            emit_async(catalog.KEYMANAGER_KEY_FOUND, address) +            return key + +        def key_not_found(failure): +            if not failure.check(KeyNotFound): +                return failure + +            emit_async(catalog.KEYMANAGER_KEY_NOT_FOUND, address) + +            # we will only try to fetch a key from nickserver if fetch_remote +            # is True and the key is not private. +            if fetch_remote is False or private is True: +                return failure + +            emit_async(catalog.KEYMANAGER_LOOKING_FOR_KEY, address) +            d = self._fetch_keys_from_server(address) +            d.addCallback( +                lambda _: self._openpgp.get_key(address, private=False)) +            d.addCallback(key_found) +            return d + +        # return key if it exists in local database +        d = self._openpgp.get_key(address, private=private) +        d.addCallbacks(key_found, key_not_found) +        return d + +    def get_all_keys(self, private=False): +        """ +        Return all keys stored in local database. + +        :param private: Include private keys +        :type private: bool + +        :return: A Deferred which fires with a list of all keys in local db. +        :rtype: Deferred +        """ +        return self._openpgp.get_all_keys(private) + +    def gen_key(self): +        """ +        Generate a key bound to the user's address. + +        :return: A Deferred which fires with the generated EncryptionKey. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ + +        def signal_finished(key): +            emit_async( +                catalog.KEYMANAGER_FINISHED_KEY_GENERATION, self._address) +            return key + +        emit_async(catalog.KEYMANAGER_STARTED_KEY_GENERATION, self._address) + +        d = self._openpgp.gen_key(self._address) +        d.addCallback(signal_finished) +        return d + +    # +    # Setters/getters +    # + +    def _get_token(self): +        return self._token + +    def _set_token(self, token): +        self._token = token + +    token = property( +        _get_token, _set_token, doc='The session token.') + +    def _get_ca_cert_path(self): +        return self._ca_cert_path + +    def _set_ca_cert_path(self, ca_cert_path): +        self._ca_cert_path = ca_cert_path + +    ca_cert_path = property( +        _get_ca_cert_path, _set_ca_cert_path, +        doc='The path to the CA certificate.') + +    def _get_api_uri(self): +        return self._api_uri + +    def _set_api_uri(self, api_uri): +        self._api_uri = api_uri + +    api_uri = property( +        _get_api_uri, _set_api_uri, doc='The webapp API URI.') + +    def _get_api_version(self): +        return self._api_version + +    def _set_api_version(self, api_version): +        self._api_version = api_version + +    api_version = property( +        _get_api_version, _set_api_version, doc='The webapp API version.') + +    def _get_uid(self): +        return self._uid + +    def _set_uid(self, uid): +        self._uid = uid + +    uid = property( +        _get_uid, _set_uid, doc='The uid of the user.') + +    # +    # encrypt/decrypt and sign/verify API +    # + +    def encrypt(self, data, address, passphrase=None, sign=None, +                cipher_algo='AES256', fetch_remote=True): +        """ +        Encrypt data with the public key bound to address and sign with with +        the private key bound to sign address. + +        :param data: The data to be encrypted. +        :type data: str +        :param address: The address to encrypt it for. +        :type address: str +        :param passphrase: The passphrase for the secret key used for the +                           signature. +        :type passphrase: str +        :param sign: The address to be used for signature. +        :type sign: str +        :param cipher_algo: The cipher algorithm to use. +        :type cipher_algo: str +        :param fetch_remote: If key is not found in local storage try to fetch +                             from nickserver +        :type fetch_remote: bool + +        :return: A Deferred which fires with the encrypted data as str, or +                 which fails with KeyNotFound if no keys were found neither +                 locally or in keyserver or fails with KeyVersionError if the +                 key format is not supported or fails with EncryptError if +                 failed encrypting for some reason. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ + +        @defer.inlineCallbacks +        def encrypt(keys): +            pubkey, signkey = keys +            encrypted = yield self._openpgp.encrypt( +                data, pubkey, passphrase, sign=signkey, +                cipher_algo=cipher_algo) +            if not pubkey.encr_used: +                pubkey.encr_used = True +                yield self._openpgp.put_key(pubkey) +            defer.returnValue(encrypted) + +        dpub = self.get_key(address, private=False, +                            fetch_remote=fetch_remote) +        dpriv = defer.succeed(None) +        if sign is not None: +            dpriv = self.get_key(sign, private=True) +        d = defer.gatherResults([dpub, dpriv], consumeErrors=True) +        d.addCallbacks(encrypt, self._extract_first_error) +        return d + +    def decrypt(self, data, address, passphrase=None, verify=None, +                fetch_remote=True): +        """ +        Decrypt data using private key from address and verify with public key +        bound to verify address. + +        :param data: The data to be decrypted. +        :type data: str +        :param address: The address to whom data was encrypted. +        :type address: str +        :param passphrase: The passphrase for the secret key used for +                           decryption. +        :type passphrase: str +        :param verify: The address to be used for signature. +        :type verify: str +        :param fetch_remote: If key for verify not found in local storage try +                             to fetch from nickserver +        :type fetch_remote: bool + +        :return: A Deferred which fires with: +            * (decripted str, signing key) if validation works +            * (decripted str, KeyNotFound) if signing key not found +            * (decripted str, InvalidSignature) if signature is invalid +            * KeyNotFound failure if private key not found +            * DecryptError failure if decription failed +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ + +        @defer.inlineCallbacks +        def decrypt(keys): +            pubkey, privkey = keys +            decrypted, signed = yield self._openpgp.decrypt( +                data, privkey, passphrase=passphrase, verify=pubkey) +            if pubkey is None: +                signature = KeyNotFound(verify) +            elif signed: +                signature = pubkey +                if not pubkey.sign_used: +                    pubkey.sign_used = True +                    yield self._openpgp.put_key(pubkey) +                    defer.returnValue((decrypted, signature)) +            else: +                signature = InvalidSignature( +                    'Failed to verify signature with key %s' % +                    (pubkey.fingerprint,)) +            defer.returnValue((decrypted, signature)) + +        dpriv = self.get_key(address, private=True) +        dpub = defer.succeed(None) +        if verify is not None: +            dpub = self.get_key(verify, private=False, +                                fetch_remote=fetch_remote) +            dpub.addErrback(lambda f: None if f.check(KeyNotFound) else f) +        d = defer.gatherResults([dpub, dpriv], consumeErrors=True) +        d.addCallbacks(decrypt, self._extract_first_error) +        return d + +    def _extract_first_error(self, failure): +        return failure.value.subFailure + +    def sign(self, data, address, digest_algo='SHA512', clearsign=False, +             detach=True, binary=False): +        """ +        Sign data with private key bound to address. + +        :param data: The data to be signed. +        :type data: str +        :param address: The address to be used to sign. +        :type address: EncryptionKey +        :param digest_algo: The hash digest to use. +        :type digest_algo: str +        :param clearsign: If True, create a cleartext signature. +        :type clearsign: bool +        :param detach: If True, create a detached signature. +        :type detach: bool +        :param binary: If True, do not ascii armour the output. +        :type binary: bool + +        :return: A Deferred which fires with the signed data as str or fails +                 with KeyNotFound if no key was found neither locally or in +                 keyserver or fails with SignFailed if there was any error +                 signing. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ + +        def sign(privkey): +            return self._openpgp.sign( +                data, privkey, digest_algo=digest_algo, clearsign=clearsign, +                detach=detach, binary=binary) + +        d = self.get_key(address, private=True) +        d.addCallback(sign) +        return d + +    def verify(self, data, address, detached_sig=None, +               fetch_remote=True): +        """ +        Verify signed data with private key bound to address, eventually using +        detached_sig. + +        :param data: The data to be verified. +        :type data: str +        :param address: The address to be used to verify. +        :type address: EncryptionKey +        :param detached_sig: A detached signature. If given, C{data} is +                             verified using this detached signature. +        :type detached_sig: str +        :param fetch_remote: If key for verify not found in local storage try +                             to fetch from nickserver +        :type fetch_remote: bool + +        :return: A Deferred which fires with the signing EncryptionKey if +                 signature verifies, or which fails with InvalidSignature if +                 signature don't verifies or fails with KeyNotFound if no key +                 was found neither locally or in keyserver. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ + +        def verify(pubkey): +            signed = self._openpgp.verify( +                data, pubkey, detached_sig=detached_sig) +            if signed: +                if not pubkey.sign_used: +                    pubkey.sign_used = True +                    d = self._openpgp.put_key(pubkey) +                    d.addCallback(lambda _: pubkey) +                    return d +                return pubkey +            else: +                raise InvalidSignature( +                    'Failed to verify signature with key %s' % +                    (pubkey.fingerprint,)) + +        d = self.get_key(address, private=False, +                         fetch_remote=fetch_remote) +        d.addCallback(verify) +        return d + +    def delete_key(self, key): +        """ +        Remove key from storage. + +        :param key: The key to be removed. +        :type key: EncryptionKey + +        :return: A Deferred which fires when the key is deleted, or which fails +                 KeyNotFound if the key was not found on local storage. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ +        return self._openpgp.delete_key(key) + +    def put_key(self, key): +        """ +        Put key bound to address in local storage. + +        :param key: The key to be stored +        :type key: EncryptionKey + +        :return: A Deferred which fires when the key is in the storage, or +                 which fails with KeyNotValidUpdate if a key with the same +                 uid exists and the new one is not a valid update for it. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ + +        def old_key_not_found(failure): +            if failure.check(KeyNotFound): +                return None +            else: +                return failure + +        def check_upgrade(old_key): +            if key.private or can_upgrade(key, old_key): +                return self._openpgp.put_key(key) +            else: +                raise KeyNotValidUpgrade( +                    "Key %s can not be upgraded by new key %s" +                    % (old_key.fingerprint, key.fingerprint)) + +        d = self._openpgp.get_key(key.address, private=key.private) +        d.addErrback(old_key_not_found) +        d.addCallback(check_upgrade) +        return d + +    def put_raw_key(self, key, address, +                    validation=ValidationLevels.Weak_Chain): +        """ +        Put raw key bound to address in local storage. + +        :param key: The ascii key to be stored +        :type key: str +        :param address: address for which this key will be active +        :type address: str +        :param validation: validation level for this key +                           (default: 'Weak_Chain') +        :type validation: ValidationLevels + +        :return: A Deferred which fires when the key is in the storage, or +                 which fails with KeyAddressMismatch if address doesn't match +                 any uid on the key or fails with KeyNotFound if no OpenPGP +                 material was found in key or fails with KeyNotValidUpdate if a +                 key with the same uid exists and the new one is not a valid +                 update for it. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ +        pubkey, privkey = self._openpgp.parse_key(key, address) + +        if pubkey is None: +            return defer.fail(KeyNotFound(key)) + +        pubkey.validation = validation +        d = self.put_key(pubkey) +        if privkey is not None: +            d.addCallback(lambda _: self.put_key(privkey)) +        return d + +    @defer.inlineCallbacks +    def fetch_key(self, address, uri, validation=ValidationLevels.Weak_Chain): +        """ +        Fetch a public key bound to address from the network and put it in +        local storage. + +        :param address: The email address of the key. +        :type address: str +        :param uri: The URI of the key. +        :type uri: str +        :param validation: validation level for this key +                           (default: 'Weak_Chain') +        :type validation: ValidationLevels + +        :return: A Deferred which fires when the key is in the storage, or +                 which fails with KeyNotFound: if not valid key on uri or fails +                 with KeyAddressMismatch if address doesn't match any uid on +                 the key or fails with KeyNotValidUpdate if a key with the same +                 uid exists and the new one is not a valid update for it. +        :rtype: Deferred + +        :raise UnsupportedKeyTypeError: if invalid key type +        """ + +        logger.info("Fetch key for %s from %s" % (address, uri)) +        ascii_content = yield self._get_with_combined_ca_bundle(uri) + +        # XXX parse binary keys +        pubkey, _ = self._openpgp.parse_key(ascii_content, address) +        if pubkey is None: +            raise KeyNotFound(uri) + +        pubkey.validation = validation +        yield self.put_key(pubkey) + + +def _split_email(address): +    """ +    Split username and domain from an email address + +    :param address: an email address +    :type address: str + +    :return: username and domain from the email address +    :rtype: (str, str) +    """ +    if address.count("@") != 1: +        return None +    return address.split("@") + + +def _get_domain(url): +    """ +    Get the domain from an url + +    :param url: an url +    :type url: str + +    :return: the domain part of the url +    :rtype: str +    """ +    return urlparse(url).hostname diff --git a/keymanager/src/leap/keymanager/_version.py b/keymanager/src/leap/keymanager/_version.py new file mode 100644 index 0000000..b28c697 --- /dev/null +++ b/keymanager/src/leap/keymanager/_version.py @@ -0,0 +1,484 @@ + +# This file helps to compute a version number in source trees obtained from +# git-archive tarball (such as those provided by githubs download-from-tag +# feature). Distribution tarballs (built by setup.py sdist) and build +# directories (produced by setup.py build) will contain a much shorter file +# that just contains the computed version number. + +# This file is released into the public domain. Generated by +# versioneer-0.16 (https://github.com/warner/python-versioneer) + +"""Git implementation of _version.py.""" + +import errno +import os +import re +import subprocess +import sys + + +def get_keywords(): +    """Get the keywords needed to look up the version information.""" +    # these strings will be replaced by git during git-archive. +    # setup.py/versioneer.py will grep for the variable names, so they must +    # each be defined on a line of their own. _version.py will just call +    # get_keywords(). +    git_refnames = "$Format:%d$" +    git_full = "$Format:%H$" +    keywords = {"refnames": git_refnames, "full": git_full} +    return keywords + + +class VersioneerConfig: +    """Container for Versioneer configuration parameters.""" + + +def get_config(): +    """Create, populate and return the VersioneerConfig() object.""" +    # these strings are filled in when 'setup.py versioneer' creates +    # _version.py +    cfg = VersioneerConfig() +    cfg.VCS = "git" +    cfg.style = "pep440" +    cfg.tag_prefix = "" +    cfg.parentdir_prefix = "None" +    cfg.versionfile_source = "src/leap/keymanager/_version.py" +    cfg.verbose = False +    return cfg + + +class NotThisMethod(Exception): +    """Exception raised if a method is not valid for the current scenario.""" + + +LONG_VERSION_PY = {} +HANDLERS = {} + + +def register_vcs_handler(vcs, method):  # decorator +    """Decorator to mark a method as the handler for a particular VCS.""" +    def decorate(f): +        """Store f in HANDLERS[vcs][method].""" +        if vcs not in HANDLERS: +            HANDLERS[vcs] = {} +        HANDLERS[vcs][method] = f +        return f +    return decorate + + +def run_command(commands, args, cwd=None, verbose=False, hide_stderr=False): +    """Call the given command(s).""" +    assert isinstance(commands, list) +    p = None +    for c in commands: +        try: +            dispcmd = str([c] + args) +            # remember shell=False, so use git.cmd on windows, not just git +            p = subprocess.Popen([c] + args, cwd=cwd, stdout=subprocess.PIPE, +                                 stderr=(subprocess.PIPE if hide_stderr +                                         else None)) +            break +        except EnvironmentError: +            e = sys.exc_info()[1] +            if e.errno == errno.ENOENT: +                continue +            if verbose: +                print("unable to run %s" % dispcmd) +                print(e) +            return None +    else: +        if verbose: +            print("unable to find command, tried %s" % (commands,)) +        return None +    stdout = p.communicate()[0].strip() +    if sys.version_info[0] >= 3: +        stdout = stdout.decode() +    if p.returncode != 0: +        if verbose: +            print("unable to run %s (error)" % dispcmd) +        return None +    return stdout + + +def versions_from_parentdir(parentdir_prefix, root, verbose): +    """Try to determine the version from the parent directory name. + +    Source tarballs conventionally unpack into a directory that includes +    both the project name and a version string. +    """ +    dirname = os.path.basename(root) +    if not dirname.startswith(parentdir_prefix): +        if verbose: +            print("guessing rootdir is '%s', but '%s' doesn't start with " +                  "prefix '%s'" % (root, dirname, parentdir_prefix)) +        raise NotThisMethod("rootdir doesn't start with parentdir_prefix") +    return {"version": dirname[len(parentdir_prefix):], +            "full-revisionid": None, +            "dirty": False, "error": None} + + +@register_vcs_handler("git", "get_keywords") +def git_get_keywords(versionfile_abs): +    """Extract version information from the given file.""" +    # the code embedded in _version.py can just fetch the value of these +    # keywords. When used from setup.py, we don't want to import _version.py, +    # so we do it with a regexp instead. This function is not used from +    # _version.py. +    keywords = {} +    try: +        f = open(versionfile_abs, "r") +        for line in f.readlines(): +            if line.strip().startswith("git_refnames ="): +                mo = re.search(r'=\s*"(.*)"', line) +                if mo: +                    keywords["refnames"] = mo.group(1) +            if line.strip().startswith("git_full ="): +                mo = re.search(r'=\s*"(.*)"', line) +                if mo: +                    keywords["full"] = mo.group(1) +        f.close() +    except EnvironmentError: +        pass +    return keywords + + +@register_vcs_handler("git", "keywords") +def git_versions_from_keywords(keywords, tag_prefix, verbose): +    """Get version information from git keywords.""" +    if not keywords: +        raise NotThisMethod("no keywords at all, weird") +    refnames = keywords["refnames"].strip() +    if refnames.startswith("$Format"): +        if verbose: +            print("keywords are unexpanded, not using") +        raise NotThisMethod("unexpanded keywords, not a git-archive tarball") +    refs = set([r.strip() for r in refnames.strip("()").split(",")]) +    # starting in git-1.8.3, tags are listed as "tag: foo-1.0" instead of +    # just "foo-1.0". If we see a "tag: " prefix, prefer those. +    TAG = "tag: " +    tags = set([r[len(TAG):] for r in refs if r.startswith(TAG)]) +    if not tags: +        # Either we're using git < 1.8.3, or there really are no tags. We use +        # a heuristic: assume all version tags have a digit. The old git %d +        # expansion behaves like git log --decorate=short and strips out the +        # refs/heads/ and refs/tags/ prefixes that would let us distinguish +        # between branches and tags. By ignoring refnames without digits, we +        # filter out many common branch names like "release" and +        # "stabilization", as well as "HEAD" and "master". +        tags = set([r for r in refs if re.search(r'\d', r)]) +        if verbose: +            print("discarding '%s', no digits" % ",".join(refs-tags)) +    if verbose: +        print("likely tags: %s" % ",".join(sorted(tags))) +    for ref in sorted(tags): +        # sorting will prefer e.g. "2.0" over "2.0rc1" +        if ref.startswith(tag_prefix): +            r = ref[len(tag_prefix):] +            if verbose: +                print("picking %s" % r) +            return {"version": r, +                    "full-revisionid": keywords["full"].strip(), +                    "dirty": False, "error": None +                    } +    # no suitable tags, so version is "0+unknown", but full hex is still there +    if verbose: +        print("no suitable tags, using unknown + full revision id") +    return {"version": "0+unknown", +            "full-revisionid": keywords["full"].strip(), +            "dirty": False, "error": "no suitable tags"} + + +@register_vcs_handler("git", "pieces_from_vcs") +def git_pieces_from_vcs(tag_prefix, root, verbose, run_command=run_command): +    """Get version from 'git describe' in the root of the source tree. + +    This only gets called if the git-archive 'subst' keywords were *not* +    expanded, and _version.py hasn't already been rewritten with a short +    version string, meaning we're inside a checked out source tree. +    """ +    if not os.path.exists(os.path.join(root, ".git")): +        if verbose: +            print("no .git in %s" % root) +        raise NotThisMethod("no .git directory") + +    GITS = ["git"] +    if sys.platform == "win32": +        GITS = ["git.cmd", "git.exe"] +    # if there is a tag matching tag_prefix, this yields TAG-NUM-gHEX[-dirty] +    # if there isn't one, this yields HEX[-dirty] (no NUM) +    describe_out = run_command(GITS, ["describe", "--tags", "--dirty", +                                      "--always", "--long", +                                      "--match", "%s*" % tag_prefix], +                               cwd=root) +    # --long was added in git-1.5.5 +    if describe_out is None: +        raise NotThisMethod("'git describe' failed") +    describe_out = describe_out.strip() +    full_out = run_command(GITS, ["rev-parse", "HEAD"], cwd=root) +    if full_out is None: +        raise NotThisMethod("'git rev-parse' failed") +    full_out = full_out.strip() + +    pieces = {} +    pieces["long"] = full_out +    pieces["short"] = full_out[:7]  # maybe improved later +    pieces["error"] = None + +    # parse describe_out. It will be like TAG-NUM-gHEX[-dirty] or HEX[-dirty] +    # TAG might have hyphens. +    git_describe = describe_out + +    # look for -dirty suffix +    dirty = git_describe.endswith("-dirty") +    pieces["dirty"] = dirty +    if dirty: +        git_describe = git_describe[:git_describe.rindex("-dirty")] + +    # now we have TAG-NUM-gHEX or HEX + +    if "-" in git_describe: +        # TAG-NUM-gHEX +        mo = re.search(r'^(.+)-(\d+)-g([0-9a-f]+)$', git_describe) +        if not mo: +            # unparseable. Maybe git-describe is misbehaving? +            pieces["error"] = ("unable to parse git-describe output: '%s'" +                               % describe_out) +            return pieces + +        # tag +        full_tag = mo.group(1) +        if not full_tag.startswith(tag_prefix): +            if verbose: +                fmt = "tag '%s' doesn't start with prefix '%s'" +                print(fmt % (full_tag, tag_prefix)) +            pieces["error"] = ("tag '%s' doesn't start with prefix '%s'" +                               % (full_tag, tag_prefix)) +            return pieces +        pieces["closest-tag"] = full_tag[len(tag_prefix):] + +        # distance: number of commits since tag +        pieces["distance"] = int(mo.group(2)) + +        # commit: short hex revision ID +        pieces["short"] = mo.group(3) + +    else: +        # HEX: no tags +        pieces["closest-tag"] = None +        count_out = run_command(GITS, ["rev-list", "HEAD", "--count"], +                                cwd=root) +        pieces["distance"] = int(count_out)  # total number of commits + +    return pieces + + +def plus_or_dot(pieces): +    """Return a + if we don't already have one, else return a .""" +    if "+" in pieces.get("closest-tag", ""): +        return "." +    return "+" + + +def render_pep440(pieces): +    """Build up version string, with post-release "local version identifier". + +    Our goal: TAG[+DISTANCE.gHEX[.dirty]] . Note that if you +    get a tagged build and then dirty it, you'll get TAG+0.gHEX.dirty + +    Exceptions: +    1: no tags. git_describe was just HEX. 0+untagged.DISTANCE.gHEX[.dirty] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += plus_or_dot(pieces) +            rendered += "%d.g%s" % (pieces["distance"], pieces["short"]) +            if pieces["dirty"]: +                rendered += ".dirty" +    else: +        # exception #1 +        rendered = "0+untagged.%d.g%s" % (pieces["distance"], +                                          pieces["short"]) +        if pieces["dirty"]: +            rendered += ".dirty" +    return rendered + + +def render_pep440_pre(pieces): +    """TAG[.post.devDISTANCE] -- No -dirty. + +    Exceptions: +    1: no tags. 0.post.devDISTANCE +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"]: +            rendered += ".post.dev%d" % pieces["distance"] +    else: +        # exception #1 +        rendered = "0.post.dev%d" % pieces["distance"] +    return rendered + + +def render_pep440_post(pieces): +    """TAG[.postDISTANCE[.dev0]+gHEX] . + +    The ".dev0" means dirty. Note that .dev0 sorts backwards +    (a dirty tree will appear "older" than the corresponding clean one), +    but you shouldn't be releasing software with -dirty anyways. + +    Exceptions: +    1: no tags. 0.postDISTANCE[.dev0] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += ".post%d" % pieces["distance"] +            if pieces["dirty"]: +                rendered += ".dev0" +            rendered += plus_or_dot(pieces) +            rendered += "g%s" % pieces["short"] +    else: +        # exception #1 +        rendered = "0.post%d" % pieces["distance"] +        if pieces["dirty"]: +            rendered += ".dev0" +        rendered += "+g%s" % pieces["short"] +    return rendered + + +def render_pep440_old(pieces): +    """TAG[.postDISTANCE[.dev0]] . + +    The ".dev0" means dirty. + +    Eexceptions: +    1: no tags. 0.postDISTANCE[.dev0] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += ".post%d" % pieces["distance"] +            if pieces["dirty"]: +                rendered += ".dev0" +    else: +        # exception #1 +        rendered = "0.post%d" % pieces["distance"] +        if pieces["dirty"]: +            rendered += ".dev0" +    return rendered + + +def render_git_describe(pieces): +    """TAG[-DISTANCE-gHEX][-dirty]. + +    Like 'git describe --tags --dirty --always'. + +    Exceptions: +    1: no tags. HEX[-dirty]  (note: no 'g' prefix) +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"]: +            rendered += "-%d-g%s" % (pieces["distance"], pieces["short"]) +    else: +        # exception #1 +        rendered = pieces["short"] +    if pieces["dirty"]: +        rendered += "-dirty" +    return rendered + + +def render_git_describe_long(pieces): +    """TAG-DISTANCE-gHEX[-dirty]. + +    Like 'git describe --tags --dirty --always -long'. +    The distance/hash is unconditional. + +    Exceptions: +    1: no tags. HEX[-dirty]  (note: no 'g' prefix) +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        rendered += "-%d-g%s" % (pieces["distance"], pieces["short"]) +    else: +        # exception #1 +        rendered = pieces["short"] +    if pieces["dirty"]: +        rendered += "-dirty" +    return rendered + + +def render(pieces, style): +    """Render the given version pieces into the requested style.""" +    if pieces["error"]: +        return {"version": "unknown", +                "full-revisionid": pieces.get("long"), +                "dirty": None, +                "error": pieces["error"]} + +    if not style or style == "default": +        style = "pep440"  # the default + +    if style == "pep440": +        rendered = render_pep440(pieces) +    elif style == "pep440-pre": +        rendered = render_pep440_pre(pieces) +    elif style == "pep440-post": +        rendered = render_pep440_post(pieces) +    elif style == "pep440-old": +        rendered = render_pep440_old(pieces) +    elif style == "git-describe": +        rendered = render_git_describe(pieces) +    elif style == "git-describe-long": +        rendered = render_git_describe_long(pieces) +    else: +        raise ValueError("unknown style '%s'" % style) + +    return {"version": rendered, "full-revisionid": pieces["long"], +            "dirty": pieces["dirty"], "error": None} + + +def get_versions(): +    """Get version information or return default if unable to do so.""" +    # I am in _version.py, which lives at ROOT/VERSIONFILE_SOURCE. If we have +    # __file__, we can work backwards from there to the root. Some +    # py2exe/bbfreeze/non-CPython implementations don't do __file__, in which +    # case we can only use expanded keywords. + +    cfg = get_config() +    verbose = cfg.verbose + +    try: +        return git_versions_from_keywords(get_keywords(), cfg.tag_prefix, +                                          verbose) +    except NotThisMethod: +        pass + +    try: +        root = os.path.realpath(__file__) +        # versionfile_source is the relative path from the top of the source +        # tree (where the .git directory might live) to this file. Invert +        # this to find the root from __file__. +        for i in cfg.versionfile_source.split('/'): +            root = os.path.dirname(root) +    except NameError: +        return {"version": "0+unknown", "full-revisionid": None, +                "dirty": None, +                "error": "unable to find root of source tree"} + +    try: +        pieces = git_pieces_from_vcs(cfg.tag_prefix, root, verbose) +        return render(pieces, cfg.style) +    except NotThisMethod: +        pass + +    try: +        if cfg.parentdir_prefix: +            return versions_from_parentdir(cfg.parentdir_prefix, root, verbose) +    except NotThisMethod: +        pass + +    return {"version": "0+unknown", "full-revisionid": None, +            "dirty": None, +            "error": "unable to compute version"} diff --git a/keymanager/src/leap/keymanager/documents.py b/keymanager/src/leap/keymanager/documents.py new file mode 100644 index 0000000..2ed5376 --- /dev/null +++ b/keymanager/src/leap/keymanager/documents.py @@ -0,0 +1,101 @@ +# -*- coding: utf-8 -*- +# documents.py +# Copyright (C) 2013-2016 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +Soledad documents +""" +from twisted.internet import defer +from leap.common.check import leap_assert + +# +# Dictionary keys used for storing cryptographic keys. +# + +KEY_VERSION_KEY = 'version' +KEY_UIDS_KEY = 'uids' +KEY_ADDRESS_KEY = 'address' +KEY_TYPE_KEY = 'type' +KEY_FINGERPRINT_KEY = 'fingerprint' +KEY_DATA_KEY = 'key_data' +KEY_PRIVATE_KEY = 'private' +KEY_LENGTH_KEY = 'length' +KEY_EXPIRY_DATE_KEY = 'expiry_date' +KEY_LAST_AUDITED_AT_KEY = 'last_audited_at' +KEY_REFRESHED_AT_KEY = 'refreshed_at' +KEY_VALIDATION_KEY = 'validation' +KEY_ENCR_USED_KEY = 'encr_used' +KEY_SIGN_USED_KEY = 'sign_used' +KEY_TAGS_KEY = 'tags' + + +# +# Key storage constants +# + +KEYMANAGER_KEY_TAG = 'keymanager-key' +KEYMANAGER_ACTIVE_TAG = 'keymanager-active' +KEYMANAGER_ACTIVE_TYPE = '-active' + +# Version of the Soledad Document schema, +# it should be bumped each time the document format changes +KEYMANAGER_DOC_VERSION = 1 + + +# +# key indexing constants. +# + +TAGS_PRIVATE_INDEX = 'by-tags-private' +TYPE_FINGERPRINT_PRIVATE_INDEX = 'by-type-fingerprint-private' +TYPE_ADDRESS_PRIVATE_INDEX = 'by-type-address-private' +INDEXES = { +    TAGS_PRIVATE_INDEX: [ +        KEY_TAGS_KEY, +        'bool(%s)' % KEY_PRIVATE_KEY, +    ], +    TYPE_FINGERPRINT_PRIVATE_INDEX: [ +        KEY_TYPE_KEY, +        KEY_FINGERPRINT_KEY, +        'bool(%s)' % KEY_PRIVATE_KEY, +    ], +    TYPE_ADDRESS_PRIVATE_INDEX: [ +        KEY_TYPE_KEY, +        KEY_ADDRESS_KEY, +        'bool(%s)' % KEY_PRIVATE_KEY, +    ] +} + + +@defer.inlineCallbacks +def init_indexes(soledad): +    """ +    Initialize the database indexes. +    """ +    leap_assert(soledad is not None, +                "Cannot init indexes with null soledad") + +    indexes = yield soledad.list_indexes() +    db_indexes = dict(indexes) +    # Loop through the indexes we expect to find. +    for name, expression in INDEXES.items(): +        if name not in db_indexes: +            # The index does not yet exist. +            yield soledad.create_index(name, *expression) +        elif expression != db_indexes[name]: +            # The index exists but the definition is not what expected, +            # so we delete it and add the proper index expression. +            yield soledad.delete_index(name) +            yield soledad.create_index(name, *expression) diff --git a/keymanager/src/leap/keymanager/errors.py b/keymanager/src/leap/keymanager/errors.py new file mode 100644 index 0000000..dfff393 --- /dev/null +++ b/keymanager/src/leap/keymanager/errors.py @@ -0,0 +1,119 @@ +# -*- coding: utf-8 -*- +# errors.py +# Copyright (C) 2013 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + + +""" +Errors and exceptions used by the Key Manager. +""" + + +class KeyNotFound(Exception): +    """ +    Raised when key was no found on keyserver. +    """ +    pass + + +class KeyVersionError(KeyNotFound): +    """ +    Raised when key was found in the keyring but the version is not supported. + +    It will usually mean that it was created by a newer version of KeyManager. +    """ +    pass + + +class KeyAlreadyExists(Exception): +    """ +    Raised when attempted to create a key that already exists. +    """ +    pass + + +class KeyAttributesDiffer(Exception): +    """ +    Raised when trying to delete a key but the stored key differs from the key +    passed to the delete_key() method. +    """ +    pass + + +class NoPasswordGiven(Exception): +    """ +    Raised when trying to perform some action that needs a password without +    providing one. +    """ +    pass + + +class InvalidSignature(Exception): +    """ +    Raised when signature could not be verified. +    """ +    pass + + +class EncryptError(Exception): +    """ +    Raised upon failures of encryption. +    """ +    pass + + +class DecryptError(Exception): +    """ +    Raised upon failures of decryption. +    """ +    pass + + +class GPGError(Exception): +    """ +    Raised upon failures of encryption/decryption. +    """ +    pass + + +class SignFailed(Exception): +    """ +    Raised when failed to sign. +    """ +    pass + + +class KeyAddressMismatch(Exception): +    """ +    A mismatch between addresses. +    """ + + +class KeyFingerprintMismatch(Exception): +    """ +    A mismatch between fingerprints. +    """ + + +class KeyNotValidUpgrade(Exception): +    """ +    Already existing key can not be upgraded with the new key +    """ + + +class UnsupportedKeyTypeError(Exception): +    """ +    Invalid key type +    """ diff --git a/keymanager/src/leap/keymanager/keys.py b/keymanager/src/leap/keymanager/keys.py new file mode 100644 index 0000000..91ecf3a --- /dev/null +++ b/keymanager/src/leap/keymanager/keys.py @@ -0,0 +1,290 @@ +# -*- coding: utf-8 -*- +# keys.py +# Copyright (C) 2013-2016 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +Abstact key type and encryption scheme representations. +""" + + +import json +import logging +import re +import time + +from datetime import datetime + +from leap.keymanager import errors +from leap.keymanager.wrapper import TempGPGWrapper +from leap.keymanager.validation import ValidationLevels +from leap.keymanager import documents as doc + +logger = logging.getLogger(__name__) + + +# +# Key handling utilities +# + +def is_address(address): +    """ +    Return whether the given C{address} is in the form user@provider. + +    :param address: The address to be tested. +    :type address: str +    :return: Whether C{address} is in the form user@provider. +    :rtype: bool +    """ +    return bool(re.match('[\w.-]+@[\w.-]+', address)) + + +def build_key_from_dict(key, active=None): +    """ +    Build an OpenPGPKey key based on info in C{kdict}. + +    :param key: Dictionary with key data. +    :type key: dict +    :param active: Dictionary with active data. +    :type active: dict +    :return: An instance of the key. +    :rtype: C{kClass} +    """ +    address = None +    validation = ValidationLevels.Weak_Chain +    last_audited_at = None +    encr_used = False +    sign_used = False + +    if active: +        address = active[doc.KEY_ADDRESS_KEY] +        try: +            validation = ValidationLevels.get(active[doc.KEY_VALIDATION_KEY]) +        except ValueError: +            logger.error("Not valid validation level (%s) for key %s", +                         (active[doc.KEY_VALIDATION_KEY], +                          active[doc.KEY_FINGERPRINT_KEY])) +        last_audited_at = _to_datetime(active[doc.KEY_LAST_AUDITED_AT_KEY]) +        encr_used = active[doc.KEY_ENCR_USED_KEY] +        sign_used = active[doc.KEY_SIGN_USED_KEY] + +    expiry_date = _to_datetime(key[doc.KEY_EXPIRY_DATE_KEY]) +    refreshed_at = _to_datetime(key[doc.KEY_REFRESHED_AT_KEY]) + +    return OpenPGPKey( +        address=address, +        uids=key[doc.KEY_UIDS_KEY], +        fingerprint=key[doc.KEY_FINGERPRINT_KEY], +        key_data=key[doc.KEY_DATA_KEY], +        private=key[doc.KEY_PRIVATE_KEY], +        length=key[doc.KEY_LENGTH_KEY], +        expiry_date=expiry_date, +        last_audited_at=last_audited_at, +        refreshed_at=refreshed_at, +        validation=validation, +        encr_used=encr_used, +        sign_used=sign_used, +    ) + + +def _to_datetime(unix_time): +    if unix_time != 0: +        return datetime.fromtimestamp(unix_time) +    else: +        return None + + +def _to_unix_time(date): +    if date is not None: +        return int(time.mktime(date.timetuple())) +    else: +        return 0 + + +class OpenPGPKey(object): +    """ +    Base class for OpenPGP keys. +    """ + +    __slots__ = ('address', 'uids', 'fingerprint', 'key_data', +                 'private', 'length', 'expiry_date', 'validation', +                 'last_audited_at', 'refreshed_at', +                 'encr_used', 'sign_used', '_index', '_gpgbinary') + +    def __init__(self, address=None, gpgbinary=None, uids=[], fingerprint="", +                 key_data="", private=False, length=0, expiry_date=None, +                 validation=ValidationLevels.Weak_Chain, last_audited_at=None, +                 refreshed_at=None, encr_used=False, sign_used=False): +        self._gpgbinary = gpgbinary +        self.address = address +        if not uids and address: +            self.uids = [address] +        else: +            self.uids = uids +        self.fingerprint = fingerprint +        self.key_data = key_data +        self.private = private +        self.length = length +        self.expiry_date = expiry_date + +        self.validation = validation +        self.last_audited_at = last_audited_at +        self.refreshed_at = refreshed_at +        self.encr_used = encr_used +        self.sign_used = sign_used +        self._index = len(self.__slots__) + +    @property +    def signatures(self): +        """ +        Get the key signatures + +        :return: the key IDs that have signed the key +        :rtype: list(str) +        """ +        with TempGPGWrapper(keys=[self], gpgbinary=self._gpgbinary) as gpg: +            res = gpg.list_sigs(self.fingerprint) +            for uid, sigs in res.sigs.iteritems(): +                if parse_address(uid) in self.uids: +                    return sigs + +        return [] + +    def merge(self, newkey): +        if newkey.fingerprint != self.fingerprint: +            logger.critical( +                "Can't put a key whith the same key_id and different " +                "fingerprint: %s, %s" +                % (newkey.fingerprint, self.fingerprint)) +            raise errors.KeyFingerprintMismatch(newkey.fingerprint) + +        with TempGPGWrapper(gpgbinary=self._gpgbinary) as gpg: +            gpg.import_keys(self.key_data) +            gpg.import_keys(newkey.key_data) +            gpgkey = gpg.list_keys(secret=newkey.private).pop() + +            if gpgkey['expires']: +                self.expiry_date = datetime.fromtimestamp( +                    int(gpgkey['expires'])) +            else: +                self.expiry_date = None + +            self.uids = [] +            for uid in gpgkey['uids']: +                self.uids.append(parse_address(uid)) + +            self.length = int(gpgkey['length']) +            self.key_data = gpg.export_keys(gpgkey['fingerprint'], +                                            secret=self.private) + +        if newkey.validation > self.validation: +            self.validation = newkey.validation +        if newkey.last_audited_at > self.last_audited_at: +            self.validation = newkey.last_audited_at +        self.encr_used = newkey.encr_used or self.encr_used +        self.sign_used = newkey.sign_used or self.sign_used +        self.refreshed_at = datetime.now() + +    def get_json(self): +        """ +        Return a JSON string describing this key. + +        :return: The JSON string describing this key. +        :rtype: str +        """ +        expiry_date = _to_unix_time(self.expiry_date) +        refreshed_at = _to_unix_time(self.refreshed_at) + +        return json.dumps({ +            doc.KEY_UIDS_KEY: self.uids, +            doc.KEY_TYPE_KEY: self.__class__.__name__, +            doc.KEY_FINGERPRINT_KEY: self.fingerprint, +            doc.KEY_DATA_KEY: self.key_data, +            doc.KEY_PRIVATE_KEY: self.private, +            doc.KEY_LENGTH_KEY: self.length, +            doc.KEY_EXPIRY_DATE_KEY: expiry_date, +            doc.KEY_REFRESHED_AT_KEY: refreshed_at, +            doc.KEY_VERSION_KEY: doc.KEYMANAGER_DOC_VERSION, +            doc.KEY_TAGS_KEY: [doc.KEYMANAGER_KEY_TAG], +        }) + +    def get_active_json(self): +        """ +        Return a JSON string describing this key. + +        :return: The JSON string describing this key. +        :rtype: str +        """ +        last_audited_at = _to_unix_time(self.last_audited_at) + +        return json.dumps({ +            doc.KEY_ADDRESS_KEY: self.address, +            doc.KEY_TYPE_KEY: (self.__class__.__name__ + +                               doc.KEYMANAGER_ACTIVE_TYPE), +            doc.KEY_FINGERPRINT_KEY: self.fingerprint, +            doc.KEY_PRIVATE_KEY: self.private, +            doc.KEY_VALIDATION_KEY: str(self.validation), +            doc.KEY_LAST_AUDITED_AT_KEY: last_audited_at, +            doc.KEY_ENCR_USED_KEY: self.encr_used, +            doc.KEY_SIGN_USED_KEY: self.sign_used, +            doc.KEY_VERSION_KEY: doc.KEYMANAGER_DOC_VERSION, +            doc.KEY_TAGS_KEY: [doc.KEYMANAGER_ACTIVE_TAG], +        }) + +    def next(self): +        if self._index == 0: +            self._index = len(self.__slots__) +            raise StopIteration + +        self._index -= 1 +        key = self.__slots__[self._index] + +        if key.startswith('_'): +            return self.next() + +        value = getattr(self, key) +        if key == "validation": +            value = str(value) +        elif key in ["expiry_date", "last_audited_at", "refreshed_at"]: +            value = str(value) +        return key, value + +    def __iter__(self): +        return self + +    def __repr__(self): +        """ +        Representation of this class +        """ +        return u"<%s 0x%s (%s - %s)>" % ( +            self.__class__.__name__, +            self.fingerprint, +            self.address, +            "priv" if self.private else "publ") + + +def parse_address(address): +    """ +    Remove name, '<', '>' and the identity suffix after the '+' until the '@' +    e.g.: test_user+something@provider.com becomes test_user@provider.com +    since the key belongs to the identity without the '+' suffix. + +    :type address: str +    :rtype: str +    """ +    mail_regex = '(.*<)?([\w.-]+)(\+.*)?(@[\w.-]+)(>.*)?' +    match = re.match(mail_regex, address) +    if match is None: +        return None +    return ''.join(match.group(2, 4)) diff --git a/keymanager/src/leap/keymanager/migrator.py b/keymanager/src/leap/keymanager/migrator.py new file mode 100644 index 0000000..c73da2e --- /dev/null +++ b/keymanager/src/leap/keymanager/migrator.py @@ -0,0 +1,167 @@ +# -*- coding: utf-8 -*- +# migrator.py +# Copyright (C) 2015 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +""" +Document migrator +""" +# XXX: versioning has being added 12/2015 when keymanager was not +#      much in use in the wild. We can probably drop support for +#      keys without version at some point. + + +from collections import namedtuple +from twisted.internet.defer import gatherResults, succeed + +from leap.keymanager import documents as doc +from leap.keymanager.validation import ValidationLevels + + +KEY_ID_KEY = 'key_id' + +KeyDocs = namedtuple("KeyDocs", ['key', 'active']) + + +class KeyDocumentsMigrator(object): +    """ +    Migrate old KeyManager Soledad Documents to the newest schema +    """ + +    def __init__(self, soledad): +        self._soledad = soledad + +    def migrate(self): +        deferred_public = self._get_docs(private=False) +        deferred_public.addCallback(self._migrate_docs) + +        deferred_private = self._get_docs(private=True) +        deferred_private.addCallback(self._migrate_docs) + +        return gatherResults([deferred_public, deferred_private]) + +    def _get_docs(self, private=False): +        private_value = '1' if private else '0' + +        deferred_keys = self._soledad.get_from_index( +            doc.TAGS_PRIVATE_INDEX, +            doc.KEYMANAGER_KEY_TAG, +            private_value) +        deferred_active = self._soledad.get_from_index( +            doc.TAGS_PRIVATE_INDEX, +            doc.KEYMANAGER_ACTIVE_TAG, +            private_value) +        return gatherResults([deferred_keys, deferred_active]) + +    def _migrate_docs(self, (key_docs, active_docs)): +        def update_keys(keys): +            deferreds = [] +            for key_id in keys: +                key = keys[key_id].key +                actives = keys[key_id].active + +                d = self._migrate_actives(key, actives) +                deferreds.append(d) + +                d = self._migrate_key(key) +                deferreds.append(d) +            return gatherResults(deferreds) + +        d = self._buildKeyDict(key_docs, active_docs) +        d.addCallback(lambda keydict: self._filter_outdated(keydict)) +        d.addCallback(update_keys) + +    def _buildKeyDict(self, keys, actives): +        keydict = { +            fp2id(key.content[doc.KEY_FINGERPRINT_KEY]): KeyDocs(key, []) +            for key in keys} + +        deferreds = [] +        for active in actives: +            if KEY_ID_KEY in active.content: +                key_id = active.content[KEY_ID_KEY] +                if key_id not in keydict: +                    d = self._soledad.delete_doc(active) +                    deferreds.append(d) +                    continue +                keydict[key_id].active.append(active) + +        d = gatherResults(deferreds) +        d.addCallback(lambda _: keydict) +        return d + +    def _filter_outdated(self, keydict): +        outdated = {} +        for key_id, docs in keydict.items(): +            if ((docs.key and doc.KEY_VERSION_KEY not in docs.key.content) or +                    docs.active): +                outdated[key_id] = docs +        return outdated + +    def _migrate_actives(self, key, actives): +        if not key: +            deferreds = [] +            for active in actives: +                d = self._soledad.delete_doc(active) +                deferreds.append(d) +            return gatherResults(deferreds) + +        validation = str(ValidationLevels.Weak_Chain) +        last_audited = 0 +        encr_used = False +        sign_used = False +        fingerprint = key.content[doc.KEY_FINGERPRINT_KEY] +        if len(actives) == 1 and doc.KEY_VERSION_KEY not in key.content: +            # we can preserve the validation of the key if there is only one +            # active address for the key +            validation = key.content[doc.KEY_VALIDATION_KEY] +            last_audited = key.content[doc.KEY_LAST_AUDITED_AT_KEY] +            encr_used = key.content[doc.KEY_ENCR_USED_KEY] +            sign_used = key.content[doc.KEY_SIGN_USED_KEY] + +        deferreds = [] +        for active in actives: +            if doc.KEY_VERSION_KEY in active.content: +                continue + +            active.content[doc.KEY_VERSION_KEY] = doc.KEYMANAGER_DOC_VERSION +            active.content[doc.KEY_FINGERPRINT_KEY] = fingerprint +            active.content[doc.KEY_VALIDATION_KEY] = validation +            active.content[doc.KEY_LAST_AUDITED_AT_KEY] = last_audited +            active.content[doc.KEY_ENCR_USED_KEY] = encr_used +            active.content[doc.KEY_SIGN_USED_KEY] = sign_used +            del active.content[KEY_ID_KEY] +            d = self._soledad.put_doc(active) +            deferreds.append(d) +        return gatherResults(deferreds) + +    def _migrate_key(self, key): +        if not key or doc.KEY_VERSION_KEY in key.content: +            return succeed(None) + +        key.content[doc.KEY_VERSION_KEY] = doc.KEYMANAGER_DOC_VERSION +        key.content[doc.KEY_UIDS_KEY] = key.content[doc.KEY_ADDRESS_KEY] +        del key.content[doc.KEY_ADDRESS_KEY] +        del key.content[KEY_ID_KEY] +        del key.content[doc.KEY_VALIDATION_KEY] +        del key.content[doc.KEY_LAST_AUDITED_AT_KEY] +        del key.content[doc.KEY_ENCR_USED_KEY] +        del key.content[doc.KEY_SIGN_USED_KEY] +        return self._soledad.put_doc(key) + + +def fp2id(fingerprint): +    KEY_ID_LENGTH = 16 +    return fingerprint[-KEY_ID_LENGTH:] diff --git a/keymanager/src/leap/keymanager/openpgp.py b/keymanager/src/leap/keymanager/openpgp.py new file mode 100644 index 0000000..31c13df --- /dev/null +++ b/keymanager/src/leap/keymanager/openpgp.py @@ -0,0 +1,881 @@ +# -*- coding: utf-8 -*- +# openpgp.py +# Copyright (C) 2013-2016 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +Infrastructure for using OpenPGP keys in Key Manager. +""" +import logging +import os +import re +import tempfile +import traceback +import io + + +from datetime import datetime +from multiprocessing import cpu_count +from gnupg.gnupg import GPGUtilities +from twisted.internet import defer +from twisted.internet.threads import deferToThread + +from leap.common.check import leap_assert, leap_assert_type, leap_check +from leap.keymanager import errors +from leap.keymanager.wrapper import TempGPGWrapper +from leap.keymanager.keys import ( +    OpenPGPKey, +    is_address, +    parse_address, +    build_key_from_dict, +) +from leap.keymanager.documents import ( +    init_indexes, +    TAGS_PRIVATE_INDEX, +    TYPE_FINGERPRINT_PRIVATE_INDEX, +    TYPE_ADDRESS_PRIVATE_INDEX, +    KEY_UIDS_KEY, +    KEY_FINGERPRINT_KEY, +    KEY_PRIVATE_KEY, +    KEY_REFRESHED_AT_KEY, +    KEY_SIGN_USED_KEY, +    KEY_ENCR_USED_KEY, +    KEY_ADDRESS_KEY, +    KEY_TYPE_KEY, +    KEY_VERSION_KEY, +    KEYMANAGER_DOC_VERSION, +    KEYMANAGER_ACTIVE_TYPE, +    KEYMANAGER_KEY_TAG, +    KEYMANAGER_ACTIVE_TAG, +) + + +logger = logging.getLogger(__name__) + + +# +# A temporary GPG keyring wrapped to provide OpenPGP functionality. +# + +# This function will be used to call blocking GPG functions outside +# of Twisted reactor and match the concurrent calls to the amount of CPU cores +cpu_core_semaphore = defer.DeferredSemaphore(cpu_count()) + + +def from_thread(func, *args, **kwargs): +    call = lambda: deferToThread(func, *args, **kwargs) +    return cpu_core_semaphore.run(call) + + +# +# The OpenPGP wrapper +# + +class OpenPGPScheme(object): +    """ +    A wrapper for OpenPGP keys management and use (encryption, decyption, +    signing and verification). +    """ + +    # type used on the soledad documents +    KEY_TYPE = OpenPGPKey.__name__ +    ACTIVE_TYPE = KEY_TYPE + KEYMANAGER_ACTIVE_TYPE + +    def __init__(self, soledad, gpgbinary=None): +        """ +        Initialize the OpenPGP wrapper. + +        :param soledad: A Soledad instance for key storage. +        :type soledad: leap.soledad.Soledad +        :param gpgbinary: Name for GnuPG binary executable. +        :type gpgbinary: C{str} +        """ +        self._soledad = soledad +        self._gpgbinary = gpgbinary +        self.deferred_init = init_indexes(soledad) +        self.deferred_init.addCallback(self._migrate_documents_schema) +        self._wait_indexes("get_key", "put_key", "get_all_keys") + +    def _migrate_documents_schema(self, _): +        from leap.keymanager.migrator import KeyDocumentsMigrator +        migrator = KeyDocumentsMigrator(self._soledad) +        return migrator.migrate() + +    def _wait_indexes(self, *methods): +        """ +        Methods that need to wait for the indexes to be ready. + +        Heavily based on +        http://blogs.fluidinfo.com/terry/2009/05/11/a-mixin-class-allowing-python-__init__-methods-to-work-with-twisted-deferreds/ + +        :param methods: methods that need to wait for the indexes to be ready +        :type methods: tuple(str) +        """ +        self.waiting = [] +        self.stored = {} + +        def restore(_): +            for method in self.stored: +                setattr(self, method, self.stored[method]) +            for d in self.waiting: +                d.callback(None) + +        def makeWrapper(method): +            def wrapper(*args, **kw): +                d = defer.Deferred() +                d.addCallback(lambda _: self.stored[method](*args, **kw)) +                self.waiting.append(d) +                return d +            return wrapper + +        for method in methods: +            self.stored[method] = getattr(self, method) +            setattr(self, method, makeWrapper(method)) + +        self.deferred_init.addCallback(restore) + +    # +    # Keys management +    # + +    def gen_key(self, address): +        """ +        Generate an OpenPGP keypair bound to C{address}. + +        :param address: The address bound to the key. +        :type address: str + +        :return: A Deferred which fires with the key bound to address, or fails +                 with KeyAlreadyExists if key already exists in local database. +        :rtype: Deferred +        """ +        # make sure the key does not already exist +        leap_assert(is_address(address), 'Not an user address: %s' % address) + +        @defer.inlineCallbacks +        def _gen_key(_): +            with TempGPGWrapper(gpgbinary=self._gpgbinary) as gpg: +                # TODO: inspect result, or use decorator +                params = gpg.gen_key_input( +                    key_type='RSA', +                    key_length=4096, +                    name_real=address, +                    name_email=address, +                    name_comment='') +                logger.info("About to generate keys... " +                            "This might take SOME time.") +                yield from_thread(gpg.gen_key, params) +                logger.info("Keys for %s have been successfully " +                            "generated." % (address,)) +                pubkeys = gpg.list_keys() + +                # assert for new key characteristics +                leap_assert( +                    len(pubkeys) is 1,  # a unitary keyring! +                    'Keyring has wrong number of keys: %d.' % len(pubkeys)) +                key = gpg.list_keys(secret=True).pop() +                leap_assert( +                    len(key['uids']) is 1,  # with just one uid! +                    'Wrong number of uids for key: %d.' % len(key['uids'])) +                uid_match = False +                for uid in key['uids']: +                    if re.match('.*<%s>$' % address, uid) is not None: +                        uid_match = True +                        break +                leap_assert(uid_match, 'Key not correctly bound to address.') + +                # insert both public and private keys in storage +                deferreds = [] +                for secret in [True, False]: +                    key = gpg.list_keys(secret=secret).pop() +                    openpgp_key = self._build_key_from_gpg( +                        key, +                        gpg.export_keys(key['fingerprint'], secret=secret), +                        address) +                    d = self.put_key(openpgp_key) +                    deferreds.append(d) +                yield defer.gatherResults(deferreds) + +        def key_already_exists(_): +            raise errors.KeyAlreadyExists(address) + +        d = self.get_key(address) +        d.addCallbacks(key_already_exists, _gen_key) +        d.addCallback(lambda _: self.get_key(address, private=True)) +        return d + +    def get_key(self, address, private=False): +        """ +        Get key bound to C{address} from local storage. + +        :param address: The address bound to the key. +        :type address: str +        :param private: Look for a private key instead of a public one? +        :type private: bool + +        :return: A Deferred which fires with the OpenPGPKey bound to address, +                 or which fails with KeyNotFound if the key was not found on +                 local storage. +        :rtype: Deferred +        """ +        address = parse_address(address) + +        def build_key((keydoc, activedoc)): +            if keydoc is None: +                raise errors.KeyNotFound(address) +            leap_assert( +                address in keydoc.content[KEY_UIDS_KEY], +                'Wrong address in key %s. Expected %s, found %s.' +                % (keydoc.content[KEY_FINGERPRINT_KEY], address, +                   keydoc.content[KEY_UIDS_KEY])) +            key = build_key_from_dict(keydoc.content, activedoc.content) +            key._gpgbinary = self._gpgbinary +            return key + +        d = self._get_key_doc(address, private) +        d.addCallback(build_key) +        return d + +    @defer.inlineCallbacks +    def get_all_keys(self, private=False): +        """ +        Return all keys stored in local database. + +        :param private: Include private keys +        :type private: bool + +        :return: A Deferred which fires with a list of all keys in local db. +        :rtype: Deferred +        """ +        HAS_ACTIVE = "has_active" + +        active_docs = yield self._soledad.get_from_index( +            TAGS_PRIVATE_INDEX, +            KEYMANAGER_ACTIVE_TAG, +            '1' if private else '0') +        key_docs = yield self._soledad.get_from_index( +            TAGS_PRIVATE_INDEX, +            KEYMANAGER_KEY_TAG, +            '1' if private else '0') + +        keys = [] +        fp = lambda doc: doc.content[KEY_FINGERPRINT_KEY] +        for active in active_docs: +            fp_keys = filter(lambda k: fp(k) == fp(active), key_docs) + +            if len(fp_keys) == 0: +                yield self._soledad.delete_doc(active) +                continue +            elif len(fp_keys) == 1: +                key = fp_keys[0] +            else: +                key = yield self._repair_key_docs(fp_keys) +            key.content[HAS_ACTIVE] = True +            keys.append(build_key_from_dict(key.content, active.content)) + +        unactive_keys = filter(lambda k: HAS_ACTIVE not in k.content, key_docs) +        keys += map(lambda k: build_key_from_dict(k.content), unactive_keys) +        defer.returnValue(keys) + +    def parse_key(self, key_data, address=None): +        """ +        Parses a key (or key pair) data and returns +        the OpenPGPKey keys. + +        :param key_data: the key data to be parsed. +        :type key_data: str or unicode +        :param address: Active address for the key. +        :type address: str + +        :returns: the public key and private key (if applies) for that data. +        :rtype: (public, private) -> tuple(OpenPGPKey, OpenPGPKey) +                the tuple may have one or both components None +        """ +        leap_assert_type(key_data, (str, unicode)) +        # TODO: add more checks for correct key data. +        leap_assert(key_data is not None, 'Data does not represent a key.') + +        priv_info, privkey = process_key( +            key_data, self._gpgbinary, secret=True) +        pub_info, pubkey = process_key( +            key_data, self._gpgbinary, secret=False) + +        if not pubkey: +            return (None, None) + +        openpgp_privkey = None +        if privkey: +            # build private key +            openpgp_privkey = self._build_key_from_gpg(priv_info, privkey, +                                                       address) +            leap_check(pub_info['fingerprint'] == priv_info['fingerprint'], +                       'Fingerprints for public and private key differ.', +                       errors.KeyFingerprintMismatch) +        # build public key +        openpgp_pubkey = self._build_key_from_gpg(pub_info, pubkey, address) + +        return (openpgp_pubkey, openpgp_privkey) + +    def put_raw_key(self, key_data, address): +        """ +        Put key contained in C{key_data} in local storage. + +        :param key_data: The key data to be stored. +        :type key_data: str or unicode +        :param address: address for which this key will be active +        :type address: str + +        :return: A Deferred which fires when the OpenPGPKey is in the storage. +        :rtype: Deferred +        """ +        leap_assert_type(key_data, (str, unicode)) + +        openpgp_privkey = None +        try: +            openpgp_pubkey, openpgp_privkey = self.parse_key( +                key_data, address) +        except (errors.KeyAddressMismatch, errors.KeyFingerprintMismatch) as e: +            return defer.fail(e) + +        def put_key(_, key): +            return self.put_key(key) + +        d = defer.succeed(None) +        if openpgp_pubkey is not None: +            d.addCallback(put_key, openpgp_pubkey) +        if openpgp_privkey is not None: +            d.addCallback(put_key, openpgp_privkey) +        return d + +    def put_key(self, key): +        """ +        Put C{key} in local storage. + +        :param key: The key to be stored. +        :type key: OpenPGPKey + +        :return: A Deferred which fires when the key is in the storage. +        :rtype: Deferred +        """ +        def merge_and_put((keydoc, activedoc)): +            if not keydoc: +                return put_new_key(activedoc) + +            active_content = None +            if activedoc: +                active_content = activedoc.content +            oldkey = build_key_from_dict(keydoc.content, active_content) + +            key.merge(oldkey) +            keydoc.set_json(key.get_json()) +            d = self._soledad.put_doc(keydoc) +            d.addCallback(put_active, activedoc) +            return d + +        def put_new_key(activedoc): +            deferreds = [] +            if activedoc: +                d = self._soledad.delete_doc(activedoc) +                deferreds.append(d) +            for json in [key.get_json(), key.get_active_json()]: +                d = self._soledad.create_doc_from_json(json) +                deferreds.append(d) +            return defer.gatherResults(deferreds) + +        def put_active(_, activedoc): +            active_json = key.get_active_json() +            if activedoc: +                activedoc.set_json(active_json) +                d = self._soledad.put_doc(activedoc) +            else: +                d = self._soledad.create_doc_from_json(active_json) +            return d + +        def get_active_doc(keydoc): +            d = self._get_active_doc_from_address(key.address, key.private) +            d.addCallback(lambda activedoc: (keydoc, activedoc)) +            return d + +        d = self._get_key_doc_from_fingerprint(key.fingerprint, key.private) +        d.addCallback(get_active_doc) +        d.addCallback(merge_and_put) +        return d + +    def _get_key_doc(self, address, private=False): +        """ +        Get the document with a key (public, by default) bound to C{address}. + +        If C{private} is True, looks for a private key instead of a public. + +        :param address: The address bound to the key. +        :type address: str +        :param private: Whether to look for a private key. +        :type private: bool + +        :return: A Deferred which fires with a touple of two SoledadDocument +                 (keydoc, activedoc) or None if it does not exist. +        :rtype: Deferred +        """ +        def get_key_from_active_doc(activedoc): +            if not activedoc: +                return (None, None) +            fingerprint = activedoc.content[KEY_FINGERPRINT_KEY] +            d = self._get_key_doc_from_fingerprint(fingerprint, private) +            d.addCallback(delete_active_if_no_key, activedoc) +            return d + +        def delete_active_if_no_key(keydoc, activedoc): +            if not keydoc: +                d = self._soledad.delete_doc(activedoc) +                d.addCallback(lambda _: (None, None)) +                return d +            return (keydoc, activedoc) + +        d = self._get_active_doc_from_address(address, private) +        d.addCallback(get_key_from_active_doc) +        return d + +    def _build_key_from_gpg(self, key, key_data, address=None): +        """ +        Build an OpenPGPKey for C{address} based on C{key} from +        local gpg storage. + +        GPG key data has to be queried independently in this +        wrapper, so we receive it in C{key_data}. + +        :param address: Active address for the key. +        :type address: str +        :param key: Key obtained from GPG storage. +        :type key: dict +        :param key_data: Key data obtained from GPG storage. +        :type key_data: str +        :return: An instance of the key. +        :rtype: OpenPGPKey +        """ +        return build_gpg_key(key, key_data, address, self._gpgbinary) + +    def delete_key(self, key): +        """ +        Remove C{key} from storage. + +        :param key: The key to be removed. +        :type key: EncryptionKey + +        :return: A Deferred which fires when the key is deleted, or which +                 fails with KeyNotFound if the key was not found on local +                 storage. +        :rtype: Deferred +        """ +        leap_assert_type(key, OpenPGPKey) + +        def delete_docs(activedocs): +            deferreds = [] +            for doc in activedocs: +                d = self._soledad.delete_doc(doc) +                deferreds.append(d) +            return defer.gatherResults(deferreds) + +        def get_key_docs(_): +            return self._soledad.get_from_index( +                TYPE_FINGERPRINT_PRIVATE_INDEX, +                self.KEY_TYPE, +                key.fingerprint, +                '1' if key.private else '0') + +        def delete_key(docs): +            if len(docs) == 0: +                raise errors.KeyNotFound(key) +            elif len(docs) > 1: +                logger.warning("There is more than one key for fingerprint %s" +                               % key.fingerprint) + +            has_deleted = False +            deferreds = [] +            for doc in docs: +                if doc.content['fingerprint'] == key.fingerprint: +                    d = self._soledad.delete_doc(doc) +                    deferreds.append(d) +                    has_deleted = True +            if not has_deleted: +                raise errors.KeyNotFound(key) +            return defer.gatherResults(deferreds) + +        d = self._soledad.get_from_index( +            TYPE_FINGERPRINT_PRIVATE_INDEX, +            self.ACTIVE_TYPE, +            key.fingerprint, +            '1' if key.private else '0') +        d.addCallback(delete_docs) +        d.addCallback(get_key_docs) +        d.addCallback(delete_key) +        return d + +    # +    # Data encryption, decryption, signing and verifying +    # + +    @staticmethod +    def _assert_gpg_result_ok(result): +        """ +        Check if GPG result is 'ok' and log stderr outputs. + +        :param result: GPG results, which have a field calld 'ok' that states +                       whether the gpg operation was successful or not. +        :type result: object + +        :raise GPGError: Raised when the gpg operation was not successful. +        """ +        stderr = getattr(result, 'stderr', None) +        if stderr: +            logger.debug("%s" % (stderr,)) +        if getattr(result, 'ok', None) is not True: +            raise errors.GPGError( +                'Failed to encrypt/decrypt: %s' % stderr) + +    @defer.inlineCallbacks +    def encrypt(self, data, pubkey, passphrase=None, sign=None, +                cipher_algo='AES256'): +        """ +        Encrypt C{data} using public @{pubkey} and sign with C{sign} key. + +        :param data: The data to be encrypted. +        :type data: str +        :param pubkey: The key used to encrypt. +        :type pubkey: OpenPGPKey +        :param sign: The key used for signing. +        :type sign: OpenPGPKey +        :param cipher_algo: The cipher algorithm to use. +        :type cipher_algo: str + +        :return: A Deferred that will be fired with the encrypted data. +        :rtype: defer.Deferred + +        :raise EncryptError: Raised if failed encrypting for some reason. +        """ +        leap_assert_type(pubkey, OpenPGPKey) +        leap_assert(pubkey.private is False, 'Key is not public.') +        keys = [pubkey] +        if sign is not None: +            leap_assert_type(sign, OpenPGPKey) +            leap_assert(sign.private is True) +            keys.append(sign) +        with TempGPGWrapper(keys, self._gpgbinary) as gpg: +            result = yield from_thread( +                gpg.encrypt, +                data, pubkey.fingerprint, +                default_key=sign.fingerprint if sign else None, +                passphrase=passphrase, symmetric=False, +                cipher_algo=cipher_algo) +            # Here we cannot assert for correctness of sig because the sig is +            # in the ciphertext. +            # result.ok    - (bool) indicates if the operation succeeded +            # result.data  - (bool) contains the result of the operation +            try: +                self._assert_gpg_result_ok(result) +                defer.returnValue(result.data) +            except errors.GPGError as e: +                logger.warning('Failed to encrypt: %s.' % str(e)) +                raise errors.EncryptError() + +    @defer.inlineCallbacks +    def decrypt(self, data, privkey, passphrase=None, verify=None): +        """ +        Decrypt C{data} using private @{privkey} and verify with C{verify} key. + +        :param data: The data to be decrypted. +        :type data: str +        :param privkey: The key used to decrypt. +        :type privkey: OpenPGPKey +        :param passphrase: The passphrase for the secret key used for +                           decryption. +        :type passphrase: str +        :param verify: The key used to verify a signature. +        :type verify: OpenPGPKey + +        :return: Deferred that will fire with the decrypted data and +                 if signature verifies (unicode, bool) +        :rtype: Deferred + +        :raise DecryptError: Raised if failed decrypting for some reason. +        """ +        leap_assert(privkey.private is True, 'Key is not private.') +        keys = [privkey] +        if verify is not None: +            leap_assert_type(verify, OpenPGPKey) +            leap_assert(verify.private is False) +            keys.append(verify) +        with TempGPGWrapper(keys, self._gpgbinary) as gpg: +            try: +                result = yield from_thread(gpg.decrypt, +                                           data, passphrase=passphrase, +                                           always_trust=True) +                self._assert_gpg_result_ok(result) + +                # verify signature +                sign_valid = False +                if (verify is not None and +                        result.valid is True and +                        verify.fingerprint == result.pubkey_fingerprint): +                    sign_valid = True + +                defer.returnValue((result.data, sign_valid)) +            except errors.GPGError as e: +                logger.warning('Failed to decrypt: %s.' % str(e)) +                raise errors.DecryptError(str(e)) + +    def is_encrypted(self, data): +        """ +        Return whether C{data} was asymmetrically encrypted using OpenPGP. + +        :param data: The data we want to know about. +        :type data: str + +        :return: Whether C{data} was encrypted using this wrapper. +        :rtype: bool +        """ +        with TempGPGWrapper(gpgbinary=self._gpgbinary) as gpg: +            gpgutil = GPGUtilities(gpg) +            return gpgutil.is_encrypted_asym(data) + +    def sign(self, data, privkey, digest_algo='SHA512', clearsign=False, +             detach=True, binary=False): +        """ +        Sign C{data} with C{privkey}. + +        :param data: The data to be signed. +        :type data: str + +        :param privkey: The private key to be used to sign. +        :type privkey: OpenPGPKey +        :param digest_algo: The hash digest to use. +        :type digest_algo: str +        :param clearsign: If True, create a cleartext signature. +        :type clearsign: bool +        :param detach: If True, create a detached signature. +        :type detach: bool +        :param binary: If True, do not ascii armour the output. +        :type binary: bool + +        :return: The ascii-armored signed data. +        :rtype: str +        """ +        leap_assert_type(privkey, OpenPGPKey) +        leap_assert(privkey.private is True) + +        # result.fingerprint - contains the fingerprint of the key used to +        #                      sign. +        with TempGPGWrapper(privkey, self._gpgbinary) as gpg: +            result = gpg.sign(data, default_key=privkey.fingerprint, +                              digest_algo=digest_algo, clearsign=clearsign, +                              detach=detach, binary=binary) +            rfprint = privkey.fingerprint +            privkey = gpg.list_keys(secret=True).pop() +            kfprint = privkey['fingerprint'] +            if result.fingerprint is None: +                raise errors.SignFailed( +                    'Failed to sign with key %s: %s' % +                    (privkey['fingerprint'], result.stderr)) +            leap_assert( +                result.fingerprint == kfprint, +                'Signature and private key fingerprints mismatch: ' +                '%s != %s' % (rfprint, kfprint)) +        return result.data + +    def verify(self, data, pubkey, detached_sig=None): +        """ +        Verify signed C{data} with C{pubkey}, eventually using +        C{detached_sig}. + +        :param data: The data to be verified. +        :type data: str +        :param pubkey: The public key to be used on verification. +        :type pubkey: OpenPGPKey +        :param detached_sig: A detached signature. If given, C{data} is +                             verified against this detached signature. +        :type detached_sig: str + +        :return: signature matches +        :rtype: bool +        """ +        leap_assert_type(pubkey, OpenPGPKey) +        leap_assert(pubkey.private is False) +        with TempGPGWrapper(pubkey, self._gpgbinary) as gpg: +            result = None +            if detached_sig is None: +                result = gpg.verify(data) +            else: +                # to verify using a detached sig we have to use +                # gpg.verify_file(), which receives the data as a binary +                # stream and the name of a file containing the signature. +                sf, sfname = tempfile.mkstemp() +                with os.fdopen(sf, 'w') as sfd: +                    sfd.write(detached_sig) +                result = gpg.verify_file(io.BytesIO(data), sig_file=sfname) +                os.unlink(sfname) +            gpgpubkey = gpg.list_keys().pop() +            valid = result.valid +            rfprint = result.fingerprint +            kfprint = gpgpubkey['fingerprint'] +            return valid and rfprint == kfprint + +    def _get_active_doc_from_address(self, address, private): +        d = self._soledad.get_from_index( +            TYPE_ADDRESS_PRIVATE_INDEX, +            self.ACTIVE_TYPE, +            address, +            '1' if private else '0') +        d.addCallback(self._repair_and_get_doc, self._repair_active_docs) +        d.addCallback(self._check_version) +        return d + +    def _get_key_doc_from_fingerprint(self, fingerprint, private): +        d = self._soledad.get_from_index( +            TYPE_FINGERPRINT_PRIVATE_INDEX, +            self.KEY_TYPE, +            fingerprint, +            '1' if private else '0') +        d.addCallback(self._repair_and_get_doc, self._repair_key_docs) +        d.addCallback(self._check_version) +        return d + +    def _repair_and_get_doc(self, doclist, repair_func): +        if len(doclist) is 0: +            return None +        elif len(doclist) > 1: +            return repair_func(doclist) +        return doclist[0] + +    def _check_version(self, doc): +        if doc is not None: +            version = doc.content[KEY_VERSION_KEY] +            if version > KEYMANAGER_DOC_VERSION: +                raise errors.KeyVersionError(str(version)) +        return doc + +    def _repair_key_docs(self, doclist): +        """ +        If there is more than one key for a key id try to self-repair it + +        :return: a Deferred that will be fired with the valid key doc once all +                 the deletions are completed +        :rtype: Deferred +        """ +        def log_key_doc(doc): +            logger.error("\t%s: %s" % (doc.content[KEY_UIDS_KEY], +                                       doc.content[KEY_FINGERPRINT_KEY])) + +        def cmp_key(d1, d2): +            return cmp(d1.content[KEY_REFRESHED_AT_KEY], +                       d2.content[KEY_REFRESHED_AT_KEY]) + +        return self._repair_docs(doclist, cmp_key, log_key_doc) + +    @defer.inlineCallbacks +    def _repair_active_docs(self, doclist): +        """ +        If there is more than one active doc for an address try to self-repair +        it + +        :return: a Deferred that will be fired with the valid active doc once +                 all the deletions are completed +        :rtype: Deferred +        """ +        keys = {} +        for doc in doclist: +            fp = doc.content[KEY_FINGERPRINT_KEY] +            private = doc.content[KEY_PRIVATE_KEY] +            try: +                key = yield self._get_key_doc_from_fingerprint(fp, private) +                keys[fp] = key +            except Exception: +                pass + +        def log_active_doc(doc): +            logger.error("\t%s: %s" % (doc.content[KEY_ADDRESS_KEY], +                                       doc.content[KEY_FINGERPRINT_KEY])) + +        def cmp_active(d1, d2): +            # XXX: for private keys it will be nice to check which key is known +            #      by the nicknym server and keep this one. But this needs a +            #      refactor that might not be worth it. +            used1 = (d1.content[KEY_SIGN_USED_KEY] + +                     d1.content[KEY_ENCR_USED_KEY]) +            used2 = (d2.content[KEY_SIGN_USED_KEY] + +                     d2.content[KEY_ENCR_USED_KEY]) +            res = cmp(used1, used2) +            if res != 0: +                return res + +            key1 = keys[d1.content[KEY_FINGERPRINT_KEY]] +            key2 = keys[d2.content[KEY_FINGERPRINT_KEY]] +            return cmp(key1.content[KEY_REFRESHED_AT_KEY], +                       key2.content[KEY_REFRESHED_AT_KEY]) + +        doc = yield self._repair_docs(doclist, cmp_active, log_active_doc) +        defer.returnValue(doc) + +    def _repair_docs(self, doclist, cmp_func, log_func): +        logger.error("BUG ---------------------------------------------------") +        logger.error("There is more than one doc of type %s:" +                     % (doclist[0].content[KEY_TYPE_KEY],)) + +        doclist.sort(cmp=cmp_func, reverse=True) +        log_func(doclist[0]) +        deferreds = [] +        for doc in doclist[1:]: +            log_func(doc) +            d = self._soledad.delete_doc(doc) +            deferreds.append(d) + +        logger.error("") +        logger.error(traceback.extract_stack()) +        logger.error("BUG (please report above info) ------------------------") +        d = defer.gatherResults(deferreds, consumeErrors=True) +        d.addCallback(lambda _: doclist[0]) +        return d + + +def process_key(key_data, gpgbinary, secret=False): +    with TempGPGWrapper(gpgbinary=gpgbinary) as gpg: +        try: +            gpg.import_keys(key_data) +            info = gpg.list_keys(secret=secret).pop() +            key = gpg.export_keys(info['fingerprint'], secret=secret) +        except IndexError: +            info = {} +            key = None +    return info, key + + +def build_gpg_key(key_info, key_data, address=None, gpgbinary=None): +    expiry_date = None +    if key_info['expires']: +        expiry_date = datetime.fromtimestamp(int(key_info['expires'])) +    uids = [] +    for uid in key_info['uids']: +        uids.append(parse_address(uid)) +    if address and address not in uids: +        raise errors.KeyAddressMismatch("UIDs %s found, but expected %s" +                                        % (str(uids), address)) + +    return OpenPGPKey( +        address=address, +        uids=uids, +        gpgbinary=gpgbinary, +        fingerprint=key_info['fingerprint'], +        key_data=key_data, +        private=True if key_info['type'] == 'sec' else False, +        length=int(key_info['length']), +        expiry_date=expiry_date, +        refreshed_at=datetime.now()) diff --git a/keymanager/src/leap/keymanager/validation.py b/keymanager/src/leap/keymanager/validation.py new file mode 100644 index 0000000..16a897e --- /dev/null +++ b/keymanager/src/leap/keymanager/validation.py @@ -0,0 +1,129 @@ +# -*- coding: utf-8 -*- +# __init__.py +# Copyright (C) 2014 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +""" +Validation levels implementation for key managment. + +See: +    https://leap.se/en/docs/design/transitional-key-validation +""" + + +from datetime import datetime + + +class ValidationLevel(object): +    """ +    A validation level + +    Meant to be used to compare levels or get its string representation. +    """ +    def __init__(self, name, value): +        self.name = name +        self.value = value + +    def __cmp__(self, other): +        return cmp(self.value, other.value) + +    def __str__(self): +        return self.name + +    def __repr__(self): +        return "<ValidationLevel: %s (%d)>" % (self.name, self.value) + + +class _ValidationLevels(object): +    """ +    Handler class to manage validation levels. It should have only one global +    instance 'ValidationLevels'. + +    The levels are attributes of the instance and can be used like: +       ValidationLevels.Weak_Chain +       ValidationLevels.get("Weak_Chain") +    """ +    _level_names = ("Weak_Chain", +                    "Provider_Trust", +                    "Provider_Endorsement", +                    "Third_Party_Endorsement", +                    "Third_Party_Consensus", +                    "Historically_Auditing", +                    "Known_Key", +                    "Fingerprint") + +    def __init__(self): +        for name in self._level_names: +            setattr(self, name, +                    ValidationLevel(name, self._level_names.index(name))) + +    def get(self, name): +        """ +        Get the ValidationLevel of a name + +        :param name: name of the level +        :type name: str +        :rtype: ValidationLevel +        """ +        return getattr(self, name) + +    def __iter__(self): +        return iter(self._level_names) + + +ValidationLevels = _ValidationLevels() + + +def can_upgrade(new_key, old_key): +    """ +    :type new_key: EncryptionKey +    :type old_key: EncryptionKey +    :rtype: bool +    """ +    # First contact +    if old_key is None: +        return True + +    # An update of the same key +    if new_key.fingerprint == old_key.fingerprint: +        return True + +    # Manually verified fingerprint +    if new_key.validation == ValidationLevels.Fingerprint: +        return True + +    # Expired key and higher validation level +    if (old_key.expiry_date is not None and +            old_key.expiry_date < datetime.now() and +            new_key.validation >= old_key.validation): +        return True + +    # No expiration date and higher validation level +    if (old_key.expiry_date is None and +            new_key.validation > old_key.validation): +        return True + +    # Not successfully used and strict high validation level +    if (not (old_key.sign_used and old_key.encr_used) and +            new_key.validation > old_key.validation): +        return True + +    # New key signed by the old key +    # XXX: signatures are using key-ids instead of fingerprints +    key_id = old_key.fingerprint[-16:] +    if key_id in new_key.signatures: +        return True + +    return False diff --git a/keymanager/src/leap/keymanager/wrapper.py b/keymanager/src/leap/keymanager/wrapper.py new file mode 100644 index 0000000..4f36cec --- /dev/null +++ b/keymanager/src/leap/keymanager/wrapper.py @@ -0,0 +1,134 @@ +# -*- coding: utf-8 -*- +# wrapper.py +# Copyright (C) 2016 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +GPG wrapper for temporary keyrings +""" +import os +import shutil +import tempfile +from gnupg import GPG + +from leap.common.check import leap_assert + + +class TempGPGWrapper(object): +    """ +    A context manager that wraps a temporary GPG keyring which only contains +    the keys given at object creation. +    """ + +    def __init__(self, keys=None, gpgbinary=None): +        """ +        Create an empty temporary keyring and import any given C{keys} into +        it. + +        :param keys: OpenPGP key, or list of. +        :type keys: OpenPGPKey or list of OpenPGPKeys +        :param gpgbinary: Name for GnuPG binary executable. +        :type gpgbinary: C{str} +        """ +        self._gpg = None +        self._gpgbinary = gpgbinary +        if not keys: +            keys = list() +        if not isinstance(keys, list): +            keys = [keys] +        self._keys = keys + +    def __enter__(self): +        """ +        Build and return a GPG keyring containing the keys given on +        object creation. + +        :return: A GPG instance containing the keys given on object creation. +        :rtype: gnupg.GPG +        """ +        self._build_keyring() +        return self._gpg + +    def __exit__(self, exc_type, exc_value, traceback): +        """ +        Ensure the gpg is properly destroyed. +        """ +        # TODO handle exceptions and log here +        self._destroy_keyring() + +    def _build_keyring(self): +        """ +        Create a GPG keyring containing the keys given on object creation. + +        :return: A GPG instance containing the keys given on object creation. +        :rtype: gnupg.GPG +        """ +        privkeys = [key for key in self._keys if key and key.private is True] +        publkeys = [key for key in self._keys if key and key.private is False] +        # here we filter out public keys that have a correspondent +        # private key in the list because the private key_data by +        # itself is enough to also have the public key in the keyring, +        # and we want to count the keys afterwards. + +        privfps = map(lambda privkey: privkey.fingerprint, privkeys) +        publkeys = filter( +            lambda pubkey: pubkey.fingerprint not in privfps, publkeys) + +        listkeys = lambda: self._gpg.list_keys() +        listsecretkeys = lambda: self._gpg.list_keys(secret=True) + +        self._gpg = GPG(binary=self._gpgbinary, +                        homedir=tempfile.mkdtemp()) +        leap_assert(len(listkeys()) is 0, 'Keyring not empty.') + +        # import keys into the keyring: +        # concatenating ascii-armored keys, which is correctly +        # understood by GPG. + +        self._gpg.import_keys("".join( +            [x.key_data for x in publkeys + privkeys])) + +        # assert the number of keys in the keyring +        leap_assert( +            len(listkeys()) == len(publkeys) + len(privkeys), +            'Wrong number of public keys in keyring: %d, should be %d)' % +            (len(listkeys()), len(publkeys) + len(privkeys))) +        leap_assert( +            len(listsecretkeys()) == len(privkeys), +            'Wrong number of private keys in keyring: %d, should be %d)' % +            (len(listsecretkeys()), len(privkeys))) + +    def _destroy_keyring(self): +        """ +        Securely erase the keyring. +        """ +        # TODO: implement some kind of wiping of data or a more +        # secure way that +        # does not write to disk. + +        try: +            for secret in [True, False]: +                for key in self._gpg.list_keys(secret=secret): +                    self._gpg.delete_keys( +                        key['fingerprint'], +                        secret=secret) +            leap_assert(len(self._gpg.list_keys()) is 0, 'Keyring not empty!') + +        except: +            raise + +        finally: +            leap_assert(self._gpg.homedir != os.path.expanduser('~/.gnupg'), +                        "watch out! Tried to remove default gnupg home!") +            shutil.rmtree(self._gpg.homedir) diff --git a/keymanager/tests/common.py b/keymanager/tests/common.py new file mode 100644 index 0000000..8eb5d4e --- /dev/null +++ b/keymanager/tests/common.py @@ -0,0 +1,326 @@ +# -*- coding: utf-8 -*- +# test_keymanager.py +# Copyright (C) 2013 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +Base classes for the Key Manager tests. +""" + +import distutils.spawn +import os.path + +from twisted.internet.defer import gatherResults +from twisted.trial import unittest + +from leap.common.testing.basetest import BaseLeapTest +from leap.soledad.client import Soledad +from leap.keymanager import KeyManager + +PATH = os.path.dirname(os.path.realpath(__file__)) + +ADDRESS = 'leap@leap.se' +ADDRESS_2 = 'anotheruser@leap.se' + + +class KeyManagerWithSoledadTestCase(unittest.TestCase, BaseLeapTest): + +    def setUp(self): +        self.gpg_binary_path = self._find_gpg() + +        self._soledad = Soledad( +            u"leap@leap.se", +            u"123456", +            secrets_path=self.tempdir + "/secret.gpg", +            local_db_path=self.tempdir + "/soledad.u1db", +            server_url='', +            cert_file=None, +            auth_token=None, +            syncable=False +        ) + +    def tearDown(self): +        km = self._key_manager() + +        # wait for the indexes to be ready for the tear down +        d = km._openpgp.deferred_init +        d.addCallback(lambda _: self.delete_all_keys(km)) +        d.addCallback(lambda _: self._soledad.close()) +        return d + +    def delete_all_keys(self, km): +        def delete_keys(keys): +            deferreds = [] +            for key in keys: +                d = km._openpgp.delete_key(key) +                deferreds.append(d) +            return gatherResults(deferreds) + +        def check_deleted(_, private): +            d = km.get_all_keys(private=private) +            d.addCallback(lambda keys: self.assertEqual(keys, [])) +            return d + +        deferreds = [] +        for private in [True, False]: +            d = km.get_all_keys(private=private) +            d.addCallback(delete_keys) +            d.addCallback(check_deleted, private) +            deferreds.append(d) +        return gatherResults(deferreds) + +    def _key_manager(self, user=ADDRESS, url='', token=None, +                     ca_cert_path=None): +        return KeyManager(user, url, self._soledad, token=token, +                          gpgbinary=self.gpg_binary_path, +                          ca_cert_path=ca_cert_path) + +    def _find_gpg(self): +        gpg_path = distutils.spawn.find_executable('gpg') +        if gpg_path is not None: +            return os.path.realpath(gpg_path) +        else: +            return "/usr/bin/gpg" + +    def get_public_binary_key(self): +        with open(PATH + '/fixtures/public_key.bin', 'r') as binary_public_key: +            return binary_public_key.read() + +    def get_private_binary_key(self): +        with open( +                PATH + '/fixtures/private_key.bin', 'r') as binary_private_key: +            return binary_private_key.read() + + +# key 24D18DDF: public key "Leap Test Key <leap@leap.se>" +KEY_FINGERPRINT = "E36E738D69173C13D709E44F2F455E2824D18DDF" +PUBLIC_KEY = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1.4.10 (GNU/Linux) + +mQINBFC9+dkBEADNRfwV23TWEoGc/x0wWH1P7PlXt8MnC2Z1kKaKKmfnglVrpOiz +iLWoiU58sfZ0L5vHkzXHXCBf6Eiy/EtUIvdiWAn+yASJ1mk5jZTBKO/WMAHD8wTO +zpMsFmWyg3xc4DkmFa9KQ5EVU0o/nqPeyQxNMQN7px5pPwrJtJFmPxnxm+aDkPYx +irDmz/4DeDNqXliazGJKw7efqBdlwTHkl9Akw2gwy178pmsKwHHEMOBOFFvX61AT +huKqHYmlCGSliwbrJppTG7jc1/ls3itrK+CWTg4txREkSpEVmfcASvw/ZqLbjgfs +d/INMwXnR9U81O8+7LT6yw/ca4ppcFoJD7/XJbkRiML6+bJ4Dakiy6i727BzV17g +wI1zqNvm5rAhtALKfACha6YO43aJzairO4II1wxVHvRDHZn2IuKDDephQ3Ii7/vb +hUOf6XCSmchkAcpKXUOvbxm1yfB1LRa64mMc2RcZxf4mW7KQkulBsdV5QG2276lv +U2UUy2IutXcGP5nXC+f6sJJGJeEToKJ57yiO/VWJFjKN8SvP+7AYsQSqINUuEf6H +T5gCPCraGMkTUTPXrREvu7NOohU78q6zZNaL3GW8ai7eSeANSuQ8Vzffx7Wd8Y7i +Pw9sYj0SMFs1UgjbuL6pO5ueHh+qyumbtAq2K0Bci0kqOcU4E9fNtdiovQARAQAB +tBxMZWFwIFRlc3QgS2V5IDxsZWFwQGxlYXAuc2U+iQI3BBMBCAAhBQJQvfnZAhsD +BQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEC9FXigk0Y3fT7EQAKH3IuRniOpb +T/DDIgwwjz3oxB/W0DDMyPXowlhSOuM0rgGfntBpBb3boezEXwL86NPQxNGGruF5 +hkmecSiuPSvOmQlqlS95NGQp6hNG0YaKColh+Q5NTspFXCAkFch9oqUje0LdxfSP +QfV9UpeEvGyPmk1I9EJV/YDmZ4+Djge1d7qhVZInz4Rx1NrSyF/Tc2EC0VpjQFsU +Y9Kb2YBBR7ivG6DBc8ty0jJXi7B4WjkFcUEJviQpMF2dCLdonCehYs1PqsN1N7j+ +eFjQd+hqVMJgYuSGKjvuAEfClM6MQw7+FmFwMyLgK/Ew/DttHEDCri77SPSkOGSI +txCzhTg6798f6mJr7WcXmHX1w1Vcib5FfZ8vTDFVhz/XgAgArdhPo9V6/1dgSSiB +KPQ/spsco6u5imdOhckERE0lnAYvVT6KE81TKuhF/b23u7x+Wdew6kK0EQhYA7wy +7LmlaNXc7rMBQJ9Z60CJ4JDtatBWZ0kNrt2VfdDHVdqBTOpl0CraNUjWE5YMDasr +K2dF5IX8D3uuYtpZnxqg0KzyLg0tzL0tvOL1C2iudgZUISZNPKbS0z0v+afuAAnx +2pTC3uezbh2Jt8SWTLhll4i0P4Ps5kZ6HQUO56O+/Z1cWovX+mQekYFmERySDR9n +3k1uAwLilJmRmepGmvYbB8HloV8HqwgguQINBFC9+dkBEAC0I/xn1uborMgDvBtf +H0sEhwnXBC849/32zic6udB6/3Efk9nzbSpL3FSOuXITZsZgCHPkKarnoQ2ztMcS +sh1ke1C5gQGms75UVmM/nS+2YI4vY8OX/GC/on2vUyncqdH+bR6xH5hx4NbWpfTs +iQHmz5C6zzS/kuabGdZyKRaZHt23WQ7JX/4zpjqbC99DjHcP9BSk7tJ8wI4bkMYD +uFVQdT9O6HwyKGYwUU4sAQRAj7XCTGvVbT0dpgJwH4RmrEtJoHAx4Whg8mJ710E0 +GCmzf2jqkNuOw76ivgk27Kge+Hw00jmJjQhHY0yVbiaoJwcRrPKzaSjEVNgrpgP3 +lXPRGQArgESsIOTeVVHQ8fhK2YtTeCY9rIiO+L0OX2xo9HK7hfHZZWL6rqymXdyS +fhzh/f6IPyHFWnvj7Brl7DR8heMikygcJqv+ed2yx7iLyCUJ10g12I48+aEj1aLe +dP7lna32iY8/Z0SHQLNH6PXO9SlPcq2aFUgKqE75A/0FMk7CunzU1OWr2ZtTLNO1 +WT/13LfOhhuEq9jTyTosn0WxBjJKq18lnhzCXlaw6EAtbA7CUwsD3CTPR56aAXFK +3I7KXOVAqggrvMe5Tpdg5drfYpI8hZovL5aAgb+7Y5ta10TcJdUhS5K3kFAWe/td +U0cmWUMDP1UMSQ5Jg6JIQVWhSwARAQABiQIfBBgBCAAJBQJQvfnZAhsMAAoJEC9F +Xigk0Y3fRwsP/i0ElYCyxeLpWJTwo1iCLkMKz2yX1lFVa9nT1BVTPOQwr/IAc5OX +NdtbJ14fUsKL5pWgW8OmrXtwZm1y4euI1RPWWubG01ouzwnGzv26UcuHeqC5orZj +cOnKtL40y8VGMm8LoicVkRJH8blPORCnaLjdOtmA3rx/v2EXrJpSa3AhOy0ZSRXk +ZSrK68AVNwamHRoBSYyo0AtaXnkPX4+tmO8X8BPfj125IljubvwZPIW9VWR9UqCE +VPfDR1XKegVb6VStIywF7kmrknM1C5qUY28rdZYWgKorw01hBGV4jTW0cqde3N51 +XT1jnIAa+NoXUM9uQoGYMiwrL7vNsLlyyiW5ayDyV92H/rIuiqhFgbJsHTlsm7I8 +oGheR784BagAA1NIKD1qEO9T6Kz9lzlDaeWS5AUKeXrb7ZJLI1TTCIZx5/DxjLqM +Tt/RFBpVo9geZQrvLUqLAMwdaUvDXC2c6DaCPXTh65oCZj/hqzlJHH+RoTWWzKI+ +BjXxgUWF9EmZUBrg68DSmI+9wuDFsjZ51BcqvJwxyfxtTaWhdoYqH/UQS+D1FP3/ +diZHHlzwVwPICzM9ooNTgbrcDzyxRkIVqsVwBq7EtzcvgYUyX53yG25Giy6YQaQ2 +ZtQ/VymwFL3XdUWV6B/hU4PVAFvO3qlOtdJ6TpE+nEWgcWjCv5g7RjXX +=MuOY +-----END PGP PUBLIC KEY BLOCK----- +""" +PRIVATE_KEY = """ +-----BEGIN PGP PRIVATE KEY BLOCK----- +Version: GnuPG v1.4.10 (GNU/Linux) + +lQcYBFC9+dkBEADNRfwV23TWEoGc/x0wWH1P7PlXt8MnC2Z1kKaKKmfnglVrpOiz +iLWoiU58sfZ0L5vHkzXHXCBf6Eiy/EtUIvdiWAn+yASJ1mk5jZTBKO/WMAHD8wTO +zpMsFmWyg3xc4DkmFa9KQ5EVU0o/nqPeyQxNMQN7px5pPwrJtJFmPxnxm+aDkPYx +irDmz/4DeDNqXliazGJKw7efqBdlwTHkl9Akw2gwy178pmsKwHHEMOBOFFvX61AT +huKqHYmlCGSliwbrJppTG7jc1/ls3itrK+CWTg4txREkSpEVmfcASvw/ZqLbjgfs +d/INMwXnR9U81O8+7LT6yw/ca4ppcFoJD7/XJbkRiML6+bJ4Dakiy6i727BzV17g +wI1zqNvm5rAhtALKfACha6YO43aJzairO4II1wxVHvRDHZn2IuKDDephQ3Ii7/vb +hUOf6XCSmchkAcpKXUOvbxm1yfB1LRa64mMc2RcZxf4mW7KQkulBsdV5QG2276lv +U2UUy2IutXcGP5nXC+f6sJJGJeEToKJ57yiO/VWJFjKN8SvP+7AYsQSqINUuEf6H +T5gCPCraGMkTUTPXrREvu7NOohU78q6zZNaL3GW8ai7eSeANSuQ8Vzffx7Wd8Y7i +Pw9sYj0SMFs1UgjbuL6pO5ueHh+qyumbtAq2K0Bci0kqOcU4E9fNtdiovQARAQAB +AA/+JHtlL39G1wsH9R6UEfUQJGXR9MiIiwZoKcnRB2o8+DS+OLjg0JOh8XehtuCs +E/8oGQKtQqa5bEIstX7IZoYmYFiUQi9LOzIblmp2vxOm+HKkxa4JszWci2/ZmC3t +KtaA4adl9XVnshoQ7pijuCMUKB3naBEOAxd8s9d/JeReGIYkJErdrnVfNk5N71Ds +FmH5Ll3XtEDvgBUQP3nkA6QFjpsaB94FHjL3gDwum/cxzj6pCglcvHOzEhfY0Ddb +J967FozQTaf2JW3O+w3LOqtcKWpq87B7+O61tVidQPSSuzPjCtFF0D2LC9R/Hpky +KTMQ6CaKja4MPhjwywd4QPcHGYSqjMpflvJqi+kYIt8psUK/YswWjnr3r4fbuqVY +VhtiHvnBHQjz135lUqWvEz4hM3Xpnxydx7aRlv5NlevK8+YIO5oFbWbGNTWsPZI5 +jpoFBpSsnR1Q5tnvtNHauvoWV+XN2qAOBTG+/nEbDYH6Ak3aaE9jrpTdYh0CotYF +q7csANsDy3JvkAzeU6WnYpsHHaAjqOGyiZGsLej1UcXPFMosE/aUo4WQhiS8Zx2c +zOVKOi/X5vQ2GdNT9Qolz8AriwzsvFR+bxPzyd8V6ALwDsoXvwEYinYBKK8j0OPv +OOihSR6HVsuP9NUZNU9ewiGzte/+/r6pNXHvR7wTQ8EWLcEIAN6Zyrb0bHZTIlxt +VWur/Ht2mIZrBaO50qmM5RD3T5oXzWXi/pjLrIpBMfeZR9DWfwQwjYzwqi7pxtYx +nJvbMuY505rfnMoYxb4J+cpRXV8MS7Dr1vjjLVUC9KiwSbM3gg6emfd2yuA93ihv +Pe3mffzLIiQa4mRE3wtGcioC43nWuV2K2e1KjxeFg07JhrezA/1Cak505ab/tmvP +4YmjR5c44+yL/YcQ3HdFgs4mV+nVbptRXvRcPpolJsgxPccGNdvHhsoR4gwXMS3F +RRPD2z6x8xeN73Q4KH3bm01swQdwFBZbWVfmUGLxvN7leCdfs9+iFJyqHiCIB6Iv +mQfp8F0IAOwSo8JhWN+V1dwML4EkIrM8wUb4yecNLkyR6TpPH/qXx4PxVMC+vy6x +sCtjeHIwKE+9vqnlhd5zOYh7qYXEJtYwdeDDmDbL8oks1LFfd+FyAuZXY33DLwn0 +cRYsr2OEZmaajqUB3NVmj3H4uJBN9+paFHyFSXrH68K1Fk2o3n+RSf2EiX+eICwI +L6rqoF5sSVUghBWdNegV7qfy4anwTQwrIMGjgU5S6PKW0Dr/3iO5z3qQpGPAj5OW +ATqPWkDICLbObPxD5cJlyyNE2wCA9VVc6/1d6w4EVwSq9h3/WTpATEreXXxTGptd +LNiTA1nmakBYNO2Iyo3djhaqBdWjk+EIAKtVEnJH9FAVwWOvaj1RoZMA5DnDMo7e +SnhrCXl8AL7Z1WInEaybasTJXn1uQ8xY52Ua4b8cbuEKRKzw/70NesFRoMLYoHTO +dyeszvhoDHberpGRTciVmpMu7Hyi33rM31K9epA4ib6QbbCHnxkWOZB+Bhgj1hJ8 +xb4RBYWiWpAYcg0+DAC3w9gfxQhtUlZPIbmbrBmrVkO2GVGUj8kH6k4UV6kUHEGY +HQWQR0HcbKcXW81ZXCCD0l7ROuEWQtTe5Jw7dJ4/QFuqZnPutXVRNOZqpl6eRShw +7X2/a29VXBpmHA95a88rSQsL+qm7Fb3prqRmuMCtrUZgFz7HLSTuUMR867QcTGVh +cCBUZXN0IEtleSA8bGVhcEBsZWFwLnNlPokCNwQTAQgAIQUCUL352QIbAwULCQgH +AwUVCgkICwUWAgMBAAIeAQIXgAAKCRAvRV4oJNGN30+xEACh9yLkZ4jqW0/wwyIM +MI896MQf1tAwzMj16MJYUjrjNK4Bn57QaQW926HsxF8C/OjT0MTRhq7heYZJnnEo +rj0rzpkJapUveTRkKeoTRtGGigqJYfkOTU7KRVwgJBXIfaKlI3tC3cX0j0H1fVKX +hLxsj5pNSPRCVf2A5mePg44HtXe6oVWSJ8+EcdTa0shf03NhAtFaY0BbFGPSm9mA +QUe4rxugwXPLctIyV4uweFo5BXFBCb4kKTBdnQi3aJwnoWLNT6rDdTe4/nhY0Hfo +alTCYGLkhio77gBHwpTOjEMO/hZhcDMi4CvxMPw7bRxAwq4u+0j0pDhkiLcQs4U4 +Ou/fH+pia+1nF5h19cNVXIm+RX2fL0wxVYc/14AIAK3YT6PVev9XYEkogSj0P7Kb +HKOruYpnToXJBERNJZwGL1U+ihPNUyroRf29t7u8flnXsOpCtBEIWAO8Muy5pWjV +3O6zAUCfWetAieCQ7WrQVmdJDa7dlX3Qx1XagUzqZdAq2jVI1hOWDA2rKytnReSF +/A97rmLaWZ8aoNCs8i4NLcy9Lbzi9QtornYGVCEmTTym0tM9L/mn7gAJ8dqUwt7n +s24dibfElky4ZZeItD+D7OZGeh0FDuejvv2dXFqL1/pkHpGBZhEckg0fZ95NbgMC +4pSZkZnqRpr2GwfB5aFfB6sIIJ0HGARQvfnZARAAtCP8Z9bm6KzIA7wbXx9LBIcJ +1wQvOPf99s4nOrnQev9xH5PZ820qS9xUjrlyE2bGYAhz5Cmq56ENs7THErIdZHtQ +uYEBprO+VFZjP50vtmCOL2PDl/xgv6J9r1Mp3KnR/m0esR+YceDW1qX07IkB5s+Q +us80v5LmmxnWcikWmR7dt1kOyV/+M6Y6mwvfQ4x3D/QUpO7SfMCOG5DGA7hVUHU/ +Tuh8MihmMFFOLAEEQI+1wkxr1W09HaYCcB+EZqxLSaBwMeFoYPJie9dBNBgps39o +6pDbjsO+or4JNuyoHvh8NNI5iY0IR2NMlW4mqCcHEazys2koxFTYK6YD95Vz0RkA +K4BErCDk3lVR0PH4StmLU3gmPayIjvi9Dl9saPRyu4Xx2WVi+q6spl3ckn4c4f3+ +iD8hxVp74+wa5ew0fIXjIpMoHCar/nndsse4i8glCddINdiOPPmhI9Wi3nT+5Z2t +9omPP2dEh0CzR+j1zvUpT3KtmhVICqhO+QP9BTJOwrp81NTlq9mbUyzTtVk/9dy3 +zoYbhKvY08k6LJ9FsQYySqtfJZ4cwl5WsOhALWwOwlMLA9wkz0eemgFxStyOylzl +QKoIK7zHuU6XYOXa32KSPIWaLy+WgIG/u2ObWtdE3CXVIUuSt5BQFnv7XVNHJllD +Az9VDEkOSYOiSEFVoUsAEQEAAQAP/1AagnZQZyzHDEgw4QELAspYHCWLXE5aZInX +wTUJhK31IgIXNn9bJ0hFiSpQR2xeMs9oYtRuPOu0P8oOFMn4/z374fkjZy8QVY3e +PlL+3EUeqYtkMwlGNmVw5a/NbNuNfm5Darb7pEfbYd1gPcni4MAYw7R2SG/57GbC +9gucvspHIfOSfBNLBthDzmK8xEKe1yD2eimfc2T7IRYb6hmkYfeds5GsqvGI6mwI +85h4uUHWRc5JOlhVM6yX8hSWx0L60Z3DZLChmc8maWnFXd7C8eQ6P1azJJbW71Ih +7CoK0XW4LE82vlQurSRFgTwfl7wFYszW2bOzCuhHDDtYnwH86Nsu0DC78ZVRnvxn +E8Ke/AJgrdhIOo4UAyR+aZD2+2mKd7/waOUTUrUtTzc7i8N3YXGi/EIaNReBXaq+ +ZNOp24BlFzRp+FCF/pptDW9HjPdiV09x0DgICmeZS4Gq/4vFFIahWctg52NGebT0 +Idxngjj+xDtLaZlLQoOz0n5ByjO/Wi0ANmMv1sMKCHhGvdaSws2/PbMR2r4caj8m +KXpIgdinM/wUzHJ5pZyF2U/qejsRj8Kw8KH/tfX4JCLhiaP/mgeTuWGDHeZQERAT +xPmRFHaLP9/ZhvGNh6okIYtrKjWTLGoXvKLHcrKNisBLSq+P2WeFrlme1vjvJMo/ +jPwLT5o9CADQmcbKZ+QQ1ZM9v99iDZol7SAMZX43JC019sx6GK0u6xouJBcLfeB4 +OXacTgmSYdTa9RM9fbfVpti01tJ84LV2SyL/VJq/enJF4XQPSynT/tFTn1PAor6o +tEAAd8fjKdJ6LnD5wb92SPHfQfXqI84rFEO8rUNIE/1ErT6DYifDzVCbfD2KZdoF +cOSp7TpD77sY1bs74ocBX5ejKtd+aH99D78bJSMM4pSDZsIEwnomkBHTziubPwJb +OwnATy0LmSMAWOw5rKbsh5nfwCiUTM20xp0t5JeXd+wPVWbpWqI2EnkCEN+RJr9i +7dp/ymDQ+Yt5wrsN3NwoyiexPOG91WQVCADdErHsnglVZZq9Z8Wx7KwecGCUurJ2 +H6lKudv5YOxPnAzqZS5HbpZd/nRTMZh2rdXCr5m2YOuewyYjvM757AkmUpM09zJX +MQ1S67/UX2y8/74TcRF97Ncx9HeELs92innBRXoFitnNguvcO6Esx4BTe1OdU6qR +ER3zAmVf22Le9ciXbu24DN4mleOH+OmBx7X2PqJSYW9GAMTsRB081R6EWKH7romQ +waxFrZ4DJzZ9ltyosEJn5F32StyLrFxpcrdLUoEaclZCv2qka7sZvi0EvovDVEBU +e10jOx9AOwf8Gj2ufhquQ6qgVYCzbP+YrodtkFrXRS3IsljIchj1M2ffB/0bfoUs +rtER9pLvYzCjBPg8IfGLw0o754Qbhh/ReplCRTusP/fQMybvCvfxreS3oyEriu/G +GufRomjewZ8EMHDIgUsLcYo2UHZsfF7tcazgxMGmMvazp4r8vpgrvW/8fIN/6Adu +tF+WjWDTvJLFJCe6O+BFJOWrssNrrra1zGtLC1s8s+Wfpe+bGPL5zpHeebGTwH1U +22eqgJArlEKxrfarz7W5+uHZJHSjF/K9ZvunLGD0n9GOPMpji3UO3zeM8IYoWn7E +/EWK1XbjnssNemeeTZ+sDh+qrD7BOi+vCX1IyBxbfqnQfJZvmcPWpruy1UsO+aIC +0GY8Jr3OL69dDQ21jueJAh8EGAEIAAkFAlC9+dkCGwwACgkQL0VeKCTRjd9HCw/+ +LQSVgLLF4ulYlPCjWIIuQwrPbJfWUVVr2dPUFVM85DCv8gBzk5c121snXh9Swovm +laBbw6ate3BmbXLh64jVE9Za5sbTWi7PCcbO/bpRy4d6oLmitmNw6cq0vjTLxUYy +bwuiJxWREkfxuU85EKdouN062YDevH+/YResmlJrcCE7LRlJFeRlKsrrwBU3BqYd +GgFJjKjQC1peeQ9fj62Y7xfwE9+PXbkiWO5u/Bk8hb1VZH1SoIRU98NHVcp6BVvp +VK0jLAXuSauSczULmpRjbyt1lhaAqivDTWEEZXiNNbRyp17c3nVdPWOcgBr42hdQ +z25CgZgyLCsvu82wuXLKJblrIPJX3Yf+si6KqEWBsmwdOWybsjygaF5HvzgFqAAD +U0goPWoQ71PorP2XOUNp5ZLkBQp5etvtkksjVNMIhnHn8PGMuoxO39EUGlWj2B5l +Cu8tSosAzB1pS8NcLZzoNoI9dOHrmgJmP+GrOUkcf5GhNZbMoj4GNfGBRYX0SZlQ +GuDrwNKYj73C4MWyNnnUFyq8nDHJ/G1NpaF2hiof9RBL4PUU/f92JkceXPBXA8gL +Mz2ig1OButwPPLFGQhWqxXAGrsS3Ny+BhTJfnfIbbkaLLphBpDZm1D9XKbAUvdd1 +RZXoH+FTg9UAW87eqU610npOkT6cRaBxaMK/mDtGNdc= +=JTFu +-----END PGP PRIVATE KEY BLOCK----- +""" + +# key 7FEE575A: public key "anotheruser <anotheruser@leap.se>" +PUBLIC_KEY_2 = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1.4.10 (GNU/Linux) + +mI0EUYwJXgEEAMbTKHuPJ5/Gk34l9Z06f+0WCXTDXdte1UBoDtZ1erAbudgC4MOR +gquKqoj3Hhw0/ILqJ88GcOJmKK/bEoIAuKaqlzDF7UAYpOsPZZYmtRfPC2pTCnXq +Z1vdeqLwTbUspqXflkCkFtfhGKMq5rH8GV5a3tXZkRWZhdNwhVXZagC3ABEBAAG0 +IWFub3RoZXJ1c2VyIDxhbm90aGVydXNlckBsZWFwLnNlPoi4BBMBAgAiBQJRjAle +AhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRB/nfpof+5XWotuA/4tLN4E +gUr7IfLy2HkHAxzw7A4rqfMN92DIM9mZrDGaWRrOn3aVF7VU1UG7MDkHfPvp/cFw +ezoCw4s4IoHVc/pVlOkcHSyt4/Rfh248tYEJmFCJXGHpkK83VIKYJAithNccJ6Q4 +JE/o06Mtf4uh/cA1HUL4a4ceqUhtpLJULLeKo7iNBFGMCV4BBADsyQI7GR0wSAxz +VayLjuPzgT+bjbFeymIhjuxKIEwnIKwYkovztW+4bbOcQs785k3Lp6RzvigTpQQt +Z/hwcLOqZbZw8t/24+D+Pq9mMP2uUvCFFqLlVvA6D3vKSQ/XNN+YB919WQ04jh63 +yuRe94WenT1RJd6xU1aaUff4rKizuQARAQABiJ8EGAECAAkFAlGMCV4CGwwACgkQ +f536aH/uV1rPZQQAqCzRysOlu8ez7PuiBD4SebgRqWlxa1TF1ujzfLmuPivROZ2X +Kw5aQstxgGSjoB7tac49s0huh4X8XK+BtJBfU84JS8Jc2satlfwoyZ35LH6sDZck +I+RS/3we6zpMfHs3vvp9xgca6ZupQxivGtxlJs294TpJorx+mFFqbV17AzQ= +=Thdu +-----END PGP PUBLIC KEY BLOCK----- +""" + +PRIVATE_KEY_2 = """ +-----BEGIN PGP PRIVATE KEY BLOCK----- +Version: GnuPG v1.4.10 (GNU/Linux) + +lQHYBFGMCV4BBADG0yh7jyefxpN+JfWdOn/tFgl0w13bXtVAaA7WdXqwG7nYAuDD +kYKriqqI9x4cNPyC6ifPBnDiZiiv2xKCALimqpcwxe1AGKTrD2WWJrUXzwtqUwp1 +6mdb3Xqi8E21LKal35ZApBbX4RijKuax/BleWt7V2ZEVmYXTcIVV2WoAtwARAQAB +AAP7BLuSAx7tOohnimEs74ks8l/L6dOcsFQZj2bqs4AoY3jFe7bV0tHr4llypb/8 +H3/DYvpf6DWnCjyUS1tTnXSW8JXtx01BUKaAufSmMNg9blKV6GGHlT/Whe9uVyks +7XHk/+9mebVMNJ/kNlqq2k+uWqJohzC8WWLRK+d1tBeqDsECANZmzltPaqUsGV5X +C3zszE3tUBgptV/mKnBtopKi+VH+t7K6fudGcG+bAcZDUoH/QVde52mIIjjIdLje +uajJuHUCAO1mqh+vPoGv4eBLV7iBo3XrunyGXiys4a39eomhxTy3YktQanjjx+ty +GltAGCs5PbWGO6/IRjjvd46wh53kzvsCAO0J97gsWhzLuFnkxFAJSPk7RRlyl7lI +1XS/x0Og6j9XHCyY1OYkfBm0to3UlCfkgirzCYlTYObCofzdKFIPDmSqHbQhYW5v +dGhlcnVzZXIgPGFub3RoZXJ1c2VyQGxlYXAuc2U+iLgEEwECACIFAlGMCV4CGwMG +CwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEH+d+mh/7ldai24D/i0s3gSBSvsh +8vLYeQcDHPDsDiup8w33YMgz2ZmsMZpZGs6fdpUXtVTVQbswOQd8++n9wXB7OgLD +izgigdVz+lWU6RwdLK3j9F+Hbjy1gQmYUIlcYemQrzdUgpgkCK2E1xwnpDgkT+jT +oy1/i6H9wDUdQvhrhx6pSG2kslQst4qjnQHYBFGMCV4BBADsyQI7GR0wSAxzVayL +juPzgT+bjbFeymIhjuxKIEwnIKwYkovztW+4bbOcQs785k3Lp6RzvigTpQQtZ/hw +cLOqZbZw8t/24+D+Pq9mMP2uUvCFFqLlVvA6D3vKSQ/XNN+YB919WQ04jh63yuRe +94WenT1RJd6xU1aaUff4rKizuQARAQABAAP9EyElqJ3dq3EErXwwT4mMnbd1SrVC +rUJrNWQZL59mm5oigS00uIyR0SvusOr+UzTtd8ysRuwHy5d/LAZsbjQStaOMBILx +77TJveOel0a1QK0YSMF2ywZMCKvquvjli4hAtWYz/EwfuzQN3t23jc5ny+GqmqD2 +3FUxLJosFUfLNmECAO9KhVmJi+L9dswIs+2Dkjd1eiRQzNOEVffvYkGYZyKxNiXF +UA5kvyZcB4iAN9sWCybE4WHZ9jd4myGB0MPDGxkCAP1RsXJbbuD6zS7BXe5gwunO +2q4q7ptdSl/sJYQuTe1KNP5d/uGsvlcFfsYjpsopasPjFBIncc/2QThMKlhoEaEB +/0mVAxpT6SrEvUbJ18z7kna24SgMPr3OnPMxPGfvNLJY/Xv/A17YfoqjmByCvsKE +JCDjopXtmbcrZyoEZbEht9mko4ifBBgBAgAJBQJRjAleAhsMAAoJEH+d+mh/7lda +z2UEAKgs0crDpbvHs+z7ogQ+Enm4EalpcWtUxdbo83y5rj4r0TmdlysOWkLLcYBk +o6Ae7WnOPbNIboeF/FyvgbSQX1POCUvCXNrGrZX8KMmd+Sx+rA2XJCPkUv98Hus6 +THx7N776fcYHGumbqUMYrxrcZSbNveE6SaK8fphRam1dewM0 +=a5gs +-----END PGP PRIVATE KEY BLOCK----- +""" diff --git a/keymanager/tests/fixtures/private_key.bin b/keymanager/tests/fixtures/private_key.binBinary files differ new file mode 100644 index 0000000..ab17431 --- /dev/null +++ b/keymanager/tests/fixtures/private_key.bin diff --git a/keymanager/tests/fixtures/public_key.bin b/keymanager/tests/fixtures/public_key.binBinary files differ new file mode 100644 index 0000000..ab17431 --- /dev/null +++ b/keymanager/tests/fixtures/public_key.bin diff --git a/keymanager/tests/test_keymanager.py b/keymanager/tests/test_keymanager.py new file mode 100644 index 0000000..b4ab805 --- /dev/null +++ b/keymanager/tests/test_keymanager.py @@ -0,0 +1,609 @@ +# -*- coding: utf-8 -*- +# test_keymanager.py +# Copyright (C) 2013 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + + +""" +Tests for the Key Manager. +""" + +from os import path +import json +import urllib +from datetime import datetime +import tempfile +import pkg_resources +from leap.common import ca_bundle +from mock import Mock, MagicMock, patch +from twisted.internet import defer +from twisted.trial import unittest +from twisted.web._responses import NOT_FOUND + +from leap.keymanager import client + +from leap.keymanager import errors +from leap.keymanager.keys import ( +    OpenPGPKey, +    is_address, +    build_key_from_dict, +) +from leap.keymanager.validation import ValidationLevels + +from common import ( +    KeyManagerWithSoledadTestCase, +    ADDRESS, +    ADDRESS_2, +    KEY_FINGERPRINT, +    PUBLIC_KEY, +    PUBLIC_KEY_2, +    PRIVATE_KEY, +    PRIVATE_KEY_2, +) + + +NICKSERVER_URI = "http://leap.se/" +REMOTE_KEY_URL = "http://site.domain/key" +INVALID_MAIL_ADDRESS = "notexistingemail@example.org" + + +class KeyManagerUtilTestCase(unittest.TestCase): + +    def test_is_address(self): +        self.assertTrue( +            is_address('user@leap.se'), +            'Incorrect address detection.') +        self.assertFalse( +            is_address('userleap.se'), +            'Incorrect address detection.') +        self.assertFalse( +            is_address('user@'), +            'Incorrect address detection.') +        self.assertFalse( +            is_address('@leap.se'), +            'Incorrect address detection.') + +    def test_build_key_from_dict(self): +        kdict = { +            'uids': [ADDRESS], +            'fingerprint': KEY_FINGERPRINT, +            'key_data': PUBLIC_KEY, +            'private': False, +            'length': 4096, +            'expiry_date': 0, +            'refreshed_at': 1311239602, +        } +        adict = { +            'address': ADDRESS, +            'private': False, +            'last_audited_at': 0, +            'validation': str(ValidationLevels.Weak_Chain), +            'encr_used': False, +            'sign_used': True, +        } +        key = build_key_from_dict(kdict, adict) +        self.assertEqual( +            kdict['uids'], key.uids, +            'Wrong data in key.') +        self.assertEqual( +            kdict['fingerprint'], key.fingerprint, +            'Wrong data in key.') +        self.assertEqual( +            kdict['key_data'], key.key_data, +            'Wrong data in key.') +        self.assertEqual( +            kdict['private'], key.private, +            'Wrong data in key.') +        self.assertEqual( +            kdict['length'], key.length, +            'Wrong data in key.') +        self.assertEqual( +            None, key.expiry_date, +            'Wrong data in key.') +        self.assertEqual( +            None, key.last_audited_at, +            'Wrong data in key.') +        self.assertEqual( +            datetime.fromtimestamp(kdict['refreshed_at']), key.refreshed_at, +            'Wrong data in key.') +        self.assertEqual( +            adict['address'], key.address, +            'Wrong data in key.') +        self.assertEqual( +            ValidationLevels.get(adict['validation']), key.validation, +            'Wrong data in key.') +        self.assertEqual( +            adict['encr_used'], key.encr_used, +            'Wrong data in key.') +        self.assertEqual( +            adict['sign_used'], key.sign_used, +            'Wrong data in key.') + + +class KeyManagerKeyManagementTestCase(KeyManagerWithSoledadTestCase): + +    @defer.inlineCallbacks +    def _test_gen_key(self): +        km = self._key_manager() +        key = yield km.gen_key() +        self.assertIsInstance(key, OpenPGPKey) +        self.assertEqual( +            'leap@leap.se', key.address, 'Wrong address bound to key.') +        self.assertEqual( +            4096, key.length, 'Wrong key length.') + +    @defer.inlineCallbacks +    def test_get_all_keys_in_db(self): +        km = self._key_manager() +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        # get public keys +        keys = yield km.get_all_keys(False) +        self.assertEqual(len(keys), 1, 'Wrong number of keys') +        self.assertTrue(ADDRESS in keys[0].uids) +        self.assertFalse(keys[0].private) +        # get private keys +        keys = yield km.get_all_keys(True) +        self.assertEqual(len(keys), 1, 'Wrong number of keys') +        self.assertTrue(ADDRESS in keys[0].uids) +        self.assertTrue(keys[0].private) + +    @defer.inlineCallbacks +    def test_get_public_key(self): +        km = self._key_manager() +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        # get the key +        key = yield km.get_key(ADDRESS, private=False, fetch_remote=False) +        self.assertTrue(key is not None) +        self.assertTrue(ADDRESS in key.uids) +        self.assertEqual( +            key.fingerprint.lower(), KEY_FINGERPRINT.lower()) +        self.assertFalse(key.private) + +    @defer.inlineCallbacks +    def test_get_public_key_with_binary_private_key(self): +        km = self._key_manager() +        yield km._openpgp.put_raw_key(self.get_private_binary_key(), ADDRESS) +        # get the key +        key = yield km.get_key(ADDRESS, private=False, fetch_remote=False) +        self.assertTrue(key is not None) +        self.assertTrue(ADDRESS in key.uids) +        self.assertEqual( +            key.fingerprint.lower(), KEY_FINGERPRINT.lower()) +        self.assertFalse(key.private) + +    @defer.inlineCallbacks +    def test_get_private_key(self): +        km = self._key_manager() +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        # get the key +        key = yield km.get_key(ADDRESS, private=True, fetch_remote=False) +        self.assertTrue(key is not None) +        self.assertTrue(ADDRESS in key.uids) +        self.assertEqual( +            key.fingerprint.lower(), KEY_FINGERPRINT.lower()) +        self.assertTrue(key.private) + +    def test_send_key_raises_key_not_found(self): +        km = self._key_manager() +        d = km.send_key() +        return self.assertFailure(d, errors.KeyNotFound) + +    @defer.inlineCallbacks +    def test_send_key(self): +        """ +        Test that request is well formed when sending keys to server. +        """ +        token = "mytoken" +        km = self._key_manager(token=token) +        yield km._openpgp.put_raw_key(PUBLIC_KEY, ADDRESS) +        km._async_client_pinned.request = Mock(return_value=defer.succeed('')) +        # the following data will be used on the send +        km.ca_cert_path = 'capath' +        km.session_id = 'sessionid' +        km.uid = 'myuid' +        km.api_uri = 'apiuri' +        km.api_version = 'apiver' +        yield km.send_key() +        # setup expected args +        pubkey = yield km.get_key(km._address) +        data = urllib.urlencode({ +            km.PUBKEY_KEY: pubkey.key_data, +        }) +        headers = {'Authorization': [str('Token token=%s' % token)]} +        headers['Content-Type'] = ['application/x-www-form-urlencoded'] +        url = '%s/%s/users/%s.json' % ('apiuri', 'apiver', 'myuid') +        km._async_client_pinned.request.assert_called_once_with( +            str(url), 'PUT', body=str(data), +            headers=headers +        ) + +    def test_fetch_keys_from_server(self): +        """ +        Test that the request is well formed when fetching keys from server. +        """ +        km = self._key_manager(url=NICKSERVER_URI) +        expected_url = NICKSERVER_URI + '?address=' + ADDRESS_2 + +        def verify_the_call(_): +            used_kwargs = km._async_client_pinned.request.call_args[1] +            km._async_client_pinned.request.assert_called_once_with( +                expected_url, 'GET', **used_kwargs) + +        d = self._fetch_key(km, ADDRESS_2, PUBLIC_KEY_2) +        d.addCallback(verify_the_call) +        return d + +    def test_key_not_found_is_raised_if_key_search_responds_404(self): +        """ +        Test if key search request comes back with a 404 response then +        KeyNotFound is raised, with corresponding error message. +        """ +        km = self._key_manager(url=NICKSERVER_URI) +        client.readBody = Mock(return_value=defer.succeed(None)) +        km._async_client_pinned.request = Mock( +            return_value=defer.succeed(None)) +        url = NICKSERVER_URI + '?address=' + INVALID_MAIL_ADDRESS + +        d = km._fetch_and_handle_404_from_nicknym(url, INVALID_MAIL_ADDRESS) + +        def check_key_not_found_is_raised_if_404(_): +            used_kwargs = km._async_client_pinned.request.call_args[1] +            check_404_callback = used_kwargs['callback'] +            fake_response = Mock() +            fake_response.code = NOT_FOUND +            with self.assertRaisesRegexp( +                    errors.KeyNotFound, +                    '404: %s key not found.' % INVALID_MAIL_ADDRESS): +                check_404_callback(fake_response) + +        d.addCallback(check_key_not_found_is_raised_if_404) +        return d + +    def test_non_existing_key_from_nicknym_is_relayed(self): +        """ +        Test if key search requests throws KeyNotFound, the same error is +        raised. +        """ +        km = self._key_manager(url=NICKSERVER_URI) +        key_not_found_exception = errors.KeyNotFound('some message') +        km._async_client_pinned.request = Mock( +            side_effect=key_not_found_exception) + +        def assert_key_not_found_raised(error): +            self.assertEqual(error.value, key_not_found_exception) + +        d = km._get_key_from_nicknym(INVALID_MAIL_ADDRESS) +        d.addErrback(assert_key_not_found_raised) + +    @defer.inlineCallbacks +    def test_get_key_fetches_from_server(self): +        """ +        Test that getting a key successfuly fetches from server. +        """ +        km = self._key_manager(url=NICKSERVER_URI) + +        key = yield self._fetch_key(km, ADDRESS, PUBLIC_KEY) +        self.assertIsInstance(key, OpenPGPKey) +        self.assertTrue(ADDRESS in key.uids) +        self.assertEqual(key.validation, ValidationLevels.Provider_Trust) + +    @defer.inlineCallbacks +    def test_get_key_fetches_other_domain(self): +        """ +        Test that getting a key successfuly fetches from server. +        """ +        km = self._key_manager(url=NICKSERVER_URI) + +        key = yield self._fetch_key(km, ADDRESS_OTHER, PUBLIC_KEY_OTHER) +        self.assertIsInstance(key, OpenPGPKey) +        self.assertTrue(ADDRESS_OTHER in key.uids) +        self.assertEqual(key.validation, ValidationLevels.Weak_Chain) + +    def _fetch_key(self, km, address, key): +        """ +        :returns: a Deferred that will fire with the OpenPGPKey +        """ +        data = json.dumps({'address': address, 'openpgp': key}) + +        client.readBody = Mock(return_value=defer.succeed(data)) + +        # mock the fetcher so it returns the key for ADDRESS_2 +        km._async_client_pinned.request = Mock( +            return_value=defer.succeed(None)) +        km.ca_cert_path = 'cacertpath' +        # try to key get without fetching from server +        d_fail = km.get_key(address, fetch_remote=False) +        d = self.assertFailure(d_fail, errors.KeyNotFound) +        # try to get key fetching from server. +        d.addCallback(lambda _: km.get_key(address)) +        return d + +    @defer.inlineCallbacks +    def test_put_key_ascii(self): +        """ +        Test that putting ascii key works +        """ +        km = self._key_manager(url=NICKSERVER_URI) + +        yield km.put_raw_key(PUBLIC_KEY, ADDRESS) +        key = yield km.get_key(ADDRESS) +        self.assertIsInstance(key, OpenPGPKey) +        self.assertTrue(ADDRESS in key.uids) + +    @defer.inlineCallbacks +    def test_put_key_binary(self): +        """ +        Test that putting binary key works +        """ +        km = self._key_manager(url=NICKSERVER_URI) + +        yield km.put_raw_key(self.get_public_binary_key(), ADDRESS) +        key = yield km.get_key(ADDRESS) + +        self.assertIsInstance(key, OpenPGPKey) +        self.assertTrue(ADDRESS in key.uids) + +    @defer.inlineCallbacks +    def test_fetch_uri_ascii_key(self): +        """ +        Test that fetch key downloads the ascii key and gets included in +        the local storage +        """ +        km = self._key_manager() + +        km._async_client.request = Mock(return_value=defer.succeed(PUBLIC_KEY)) + +        yield km.fetch_key(ADDRESS, "http://site.domain/key") +        key = yield km.get_key(ADDRESS) +        self.assertEqual(KEY_FINGERPRINT, key.fingerprint) + +    @defer.inlineCallbacks +    def test_fetch_uri_binary_key(self): +        """ +        Test that fetch key downloads the binary key and gets included in +        the local storage +        """ +        km = self._key_manager() + +        km._async_client.request = Mock( +            return_value=defer.succeed(self.get_public_binary_key())) + +        yield km.fetch_key(ADDRESS, "http://site.domain/key") +        key = yield km.get_key(ADDRESS) +        self.assertEqual(KEY_FINGERPRINT, key.fingerprint) + +    def test_fetch_uri_empty_key(self): +        """ +        Test that fetch key raises KeyNotFound if no key in the url +        """ +        km = self._key_manager() + +        km._async_client.request = Mock(return_value=defer.succeed("")) +        d = km.fetch_key(ADDRESS, "http://site.domain/key") +        return self.assertFailure(d, errors.KeyNotFound) + +    def test_fetch_uri_address_differ(self): +        """ +        Test that fetch key raises KeyAttributesDiffer if the address +        don't match +        """ +        km = self._key_manager() + +        km._async_client.request = Mock(return_value=defer.succeed(PUBLIC_KEY)) +        d = km.fetch_key(ADDRESS_2, "http://site.domain/key") +        return self.assertFailure(d, errors.KeyAddressMismatch) + +    def _mock_get_response(self, km, body): +        km._async_client.request = MagicMock(return_value=defer.succeed(body)) + +        return km._async_client.request + +    @defer.inlineCallbacks +    def test_fetch_key_uses_ca_bundle_if_none_specified(self): +        ca_cert_path = None +        km = self._key_manager(ca_cert_path=ca_cert_path) +        get_mock = self._mock_get_response(km, PUBLIC_KEY_OTHER) + +        yield km.fetch_key(ADDRESS_OTHER, REMOTE_KEY_URL) + +        get_mock.assert_called_once_with(REMOTE_KEY_URL, 'GET') + +    @defer.inlineCallbacks +    def test_fetch_key_uses_ca_bundle_if_empty_string_specified(self): +        ca_cert_path = '' +        km = self._key_manager(ca_cert_path=ca_cert_path) +        get_mock = self._mock_get_response(km, PUBLIC_KEY_OTHER) + +        yield km.fetch_key(ADDRESS_OTHER, REMOTE_KEY_URL) + +        get_mock.assert_called_once_with(REMOTE_KEY_URL, 'GET') + +    @defer.inlineCallbacks +    def test_fetch_key_use_default_ca_bundle_if_set_as_ca_cert_path(self): +        ca_cert_path = ca_bundle.where() +        km = self._key_manager(ca_cert_path=ca_cert_path) +        get_mock = self._mock_get_response(km, PUBLIC_KEY_OTHER) + +        yield km.fetch_key(ADDRESS_OTHER, REMOTE_KEY_URL) + +        get_mock.assert_called_once_with(REMOTE_KEY_URL, 'GET') + +    @defer.inlineCallbacks +    def test_fetch_uses_combined_ca_bundle_otherwise(self): +        with tempfile.NamedTemporaryFile() as tmp_input, \ +                tempfile.NamedTemporaryFile(delete=False) as tmp_output: +            ca_content = pkg_resources.resource_string('leap.common.testing', +                                                       'cacert.pem') +            ca_cert_path = tmp_input.name +            self._dump_to_file(ca_cert_path, ca_content) + +            with patch('leap.keymanager.tempfile.NamedTemporaryFile') as mock: +                mock.return_value = tmp_output +                km = self._key_manager(ca_cert_path=ca_cert_path) +                get_mock = self._mock_get_response(km, PUBLIC_KEY_OTHER) + +                yield km.fetch_key(ADDRESS_OTHER, REMOTE_KEY_URL) + +                # assert that combined bundle file is passed to get call +                get_mock.assert_called_once_with(REMOTE_KEY_URL, 'GET') + +                # assert that files got appended +                expected = self._slurp_file(ca_bundle.where()) + ca_content +                self.assertEqual(expected, self._slurp_file(tmp_output.name)) + +            del km  # force km out of scope +            self.assertFalse(path.exists(tmp_output.name)) + +    def _dump_to_file(self, filename, content): +            with open(filename, 'w') as out: +                out.write(content) + +    def _slurp_file(self, filename): +        with open(filename) as f: +            content = f.read() +        return content + +    @defer.inlineCallbacks +    def test_decrypt_updates_sign_used_for_signer(self): +        # given +        km = self._key_manager() +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        yield km._openpgp.put_raw_key(PRIVATE_KEY_2, ADDRESS_2) +        encdata = yield km.encrypt('data', ADDRESS, sign=ADDRESS_2, +                                   fetch_remote=False) +        yield km.decrypt( +            encdata, ADDRESS, verify=ADDRESS_2, fetch_remote=False) + +        # when +        key = yield km.get_key(ADDRESS_2, fetch_remote=False) + +        # then +        self.assertEqual(True, key.sign_used) + +    @defer.inlineCallbacks +    def test_decrypt_does_not_update_sign_used_for_recipient(self): +        # given +        km = self._key_manager() +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        yield km._openpgp.put_raw_key(PRIVATE_KEY_2, ADDRESS_2) +        encdata = yield km.encrypt('data', ADDRESS, sign=ADDRESS_2, +                                   fetch_remote=False) +        yield km.decrypt( +            encdata, ADDRESS, verify=ADDRESS_2, fetch_remote=False) + +        # when +        key = yield km.get_key( +            ADDRESS, private=False, fetch_remote=False) + +        # then +        self.assertEqual(False, key.sign_used) + + +class KeyManagerCryptoTestCase(KeyManagerWithSoledadTestCase): + +    RAW_DATA = 'data' + +    @defer.inlineCallbacks +    def test_keymanager_openpgp_encrypt_decrypt(self): +        km = self._key_manager() +        # put raw private key +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        yield km._openpgp.put_raw_key(PRIVATE_KEY_2, ADDRESS_2) +        # encrypt +        encdata = yield km.encrypt(self.RAW_DATA, ADDRESS, sign=ADDRESS_2, +                                   fetch_remote=False) +        self.assertNotEqual(self.RAW_DATA, encdata) +        # decrypt +        rawdata, signingkey = yield km.decrypt( +            encdata, ADDRESS, verify=ADDRESS_2, fetch_remote=False) +        self.assertEqual(self.RAW_DATA, rawdata) +        key = yield km.get_key(ADDRESS_2, private=False, fetch_remote=False) +        self.assertEqual(signingkey.fingerprint, key.fingerprint) + +    @defer.inlineCallbacks +    def test_keymanager_openpgp_encrypt_decrypt_wrong_sign(self): +        km = self._key_manager() +        # put raw keys +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        yield km._openpgp.put_raw_key(PRIVATE_KEY_2, ADDRESS_2) +        # encrypt +        encdata = yield km.encrypt(self.RAW_DATA, ADDRESS, sign=ADDRESS_2, +                                   fetch_remote=False) +        self.assertNotEqual(self.RAW_DATA, encdata) +        # verify +        rawdata, signingkey = yield km.decrypt( +            encdata, ADDRESS, verify=ADDRESS, fetch_remote=False) +        self.assertEqual(self.RAW_DATA, rawdata) +        self.assertTrue(isinstance(signingkey, errors.InvalidSignature)) + +    @defer.inlineCallbacks +    def test_keymanager_openpgp_sign_verify(self): +        km = self._key_manager() +        # put raw private keys +        yield km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        signdata = yield km.sign(self.RAW_DATA, ADDRESS, detach=False) +        self.assertNotEqual(self.RAW_DATA, signdata) +        # verify +        signingkey = yield km.verify(signdata, ADDRESS, fetch_remote=False) +        key = yield km.get_key(ADDRESS, private=False, fetch_remote=False) +        self.assertEqual(signingkey.fingerprint, key.fingerprint) + +    def test_keymanager_encrypt_key_not_found(self): +        km = self._key_manager() +        d = km._openpgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        d.addCallback( +            lambda _: km.encrypt(self.RAW_DATA, ADDRESS_2, sign=ADDRESS, +                                 fetch_remote=False)) +        return self.assertFailure(d, errors.KeyNotFound) + +if __name__ == "__main__": +    import unittest +    unittest.main() + +# key 0F91B402: someone@somedomain.org +# 9420 EC7B 6DCB 867F 5592  E6D1 7504 C974 0F91 B402 +ADDRESS_OTHER = "someone@somedomain.org" +PUBLIC_KEY_OTHER = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1 + +mQENBFUZFLwBCADRzTstykRAV3aWysLAV4O3DXdpXhV3Cww8Pfc6m1bVxAT2ifcL +kLWEaIkOB48SYIHbYzqOi1/h5abJf+5n4uhaIks+FsjsXYo1XOiYpVCNf7+xLnUM +jkmglKT5sASr61QDcFMqWfGTJ8iUTNVCJZ2k14QJ4Vss/ntnV9uB7Ef7wU7RZvxr +wINH/0LfKPsGE9l2qNpKUAAmg2bHn9YdsHj1sqlW7eZpwvefYrQej4KBaL2oq3vt +QQOdXGFqWYMe3cX+bQ1DAMG3ttTF6EGkY97BK7A18I/RJiLujWCEAkMzFr5SK9KU +AOMj6MpjfTOE+GfUKsu7/gGt42eMBFsIOvsZABEBAAG0IFNvbWVvbmUgPHNvbWVv +bmVAc29tZWRvbWFpbi5vcmc+iQE4BBMBAgAiBQJVGRS8AhsDBgsJCAcDAgYVCAIJ +CgsEFgIDAQIeAQIXgAAKCRB1BMl0D5G0AlFsCAC33LhxBRwO64T6DgTb4/39aLpi +9T3yAmXBAHC7Q+4f37IBX5fJBRKu4Lvfp6KherOl/I/Jj34yv8pm0j+kXeWktfxZ +cW+mv2vjBHQVopiUSyMVh7caFSq9sKm+oQdo6oIl9DHSARegbkCn2+0b4VxgJpyj +TZBMyUMD2AayivQU4QHOM3KCozhLNNDbpKy7LH0MSAUDmRaJsPk1zK15lQocK/7R +Z5yF4rdrdzDWrVucZJc09yntSqTGECue3W2GBCaBlb/O1c9xei4MTb4nSHS5Gp/7 +hcjrvIrgPpehndk8ZRREN/Y8uk1W5fbWzx+5z8g31RCGWBQw4NAnG10NZ3oEuQEN +BFUZFLwBCADocYZmLu1iXIE6gKqniR6Z8UDC5XnqgK+BEJwi1abe9zWhjgKeW9Vv +u1i194wuCUiNkP/bMvwMBZLTslDzqxl32ETk9FvB3kWy80S8MDjQJ15IN4I622fq +MEWwtQ0WrRay9VV6M8H2mIf71/1d5T9ysWK4XRyv+N7eRhfg7T2uhrpNyKdCZzjq +2wlgpVkMY7gtxTqJseM+qS5UNiReGxtoOXFLzzmagFgbqK88eMeZJZt8yKf81xhP +SWLTxaVaeBEAlajvEkxZJrrDQuc+maTwtMxmNUe815wJnpcRF8VD91GUpSLAN6EC +1QuJUl6Lc2o2tcHeo6CGsDZ96o0J8pFhABEBAAGJAR8EGAECAAkFAlUZFLwCGwwA +CgkQdQTJdA+RtAKcdwgApzHPhwwaZ9TBjgOytke/hPE0ht/EJ5nRiIda2PucoPh6 +DwnaI8nvmGXUfC4qFy6LM8/fJHof1BqLnMbx8MCLurnm5z30q8RhLE3YWM11zuMy +6wkHGmi/6S1G4okC+Uu8AA4K//HBo8bLcqGVWRnFAmCqy6VMAofsQvmM7vHbRj56 +U919Bki/7I6kcxPEzO73Umh3o82VP/Hz3JMigRNBRfG3jPrX04RLJj3Ib5lhQIDw +XrO8VHz9foOpY+rJnWj+6QAozxorzZYShu6H0GR1nIuqWMwli1nrx6BeIJAVz5cg +QzEd9yAN+81fkIBaa6Y8LCBxV03JCc2J4eCUKXd1gg== +=gDzy +-----END PGP PUBLIC KEY BLOCK----- +""" diff --git a/keymanager/tests/test_migrator.py b/keymanager/tests/test_migrator.py new file mode 100644 index 0000000..64cd8e1 --- /dev/null +++ b/keymanager/tests/test_migrator.py @@ -0,0 +1,176 @@ +# -*- coding: utf-8 -*- +# test_migrator.py +# Copyright (C) 2015 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + + +""" +Tests for the migrator. +""" + + +from collections import namedtuple +from mock import Mock +from twisted.internet.defer import succeed, inlineCallbacks + +from leap.keymanager.migrator import KeyDocumentsMigrator, KEY_ID_KEY +from leap.keymanager.documents import ( +    TAGS_PRIVATE_INDEX, +    KEYMANAGER_ACTIVE_TAG, +    KEYMANAGER_KEY_TAG, +    KEYMANAGER_DOC_VERSION, + +    KEY_ADDRESS_KEY, +    KEY_UIDS_KEY, +    KEY_VERSION_KEY, +    KEY_FINGERPRINT_KEY, +    KEY_VALIDATION_KEY, +    KEY_LAST_AUDITED_AT_KEY, +    KEY_ENCR_USED_KEY, +    KEY_SIGN_USED_KEY, +) +from leap.keymanager.validation import ValidationLevels + +from common import ( +    KeyManagerWithSoledadTestCase, +    ADDRESS, +    ADDRESS_2, +    KEY_FINGERPRINT, +) + + +class OpenPGPCryptoTestCase(KeyManagerWithSoledadTestCase): +    @inlineCallbacks +    def test_simple_migration(self): +        get_from_index = self._soledad.get_from_index +        delete_doc = self._soledad.delete_doc +        put_doc = self._soledad.put_doc + +        def my_get_from_index(*args): +            docs = [] +            if (args[0] == TAGS_PRIVATE_INDEX and +                    args[2] == '0'): +                SoledadDocument = namedtuple("SoledadDocument", ["content"]) +                if args[1] == KEYMANAGER_KEY_TAG: +                    docs = [SoledadDocument({ +                        KEY_ADDRESS_KEY: [ADDRESS], +                        KEY_ID_KEY: KEY_FINGERPRINT[-16:], +                        KEY_FINGERPRINT_KEY: KEY_FINGERPRINT, +                        KEY_VALIDATION_KEY: str(ValidationLevels.Weak_Chain), +                        KEY_LAST_AUDITED_AT_KEY: 0, +                        KEY_ENCR_USED_KEY: True, +                        KEY_SIGN_USED_KEY: False, +                    })] +                if args[1] == KEYMANAGER_ACTIVE_TAG: +                    docs = [SoledadDocument({ +                        KEY_ID_KEY: KEY_FINGERPRINT[-16:], +                    })] +            return succeed(docs) + +        self._soledad.get_from_index = my_get_from_index +        self._soledad.delete_doc = Mock(return_value=succeed(None)) +        self._soledad.put_doc = Mock(return_value=succeed(None)) + +        try: +            migrator = KeyDocumentsMigrator(self._soledad) +            yield migrator.migrate() +            call_list = self._soledad.put_doc.call_args_list +        finally: +            self._soledad.get_from_index = get_from_index +            self._soledad.delete_doc = delete_doc +            self._soledad.put_doc = put_doc + +        self.assertEqual(len(call_list), 2) +        active = call_list[0][0][0] +        key = call_list[1][0][0] + +        self.assertTrue(KEY_ID_KEY not in active.content) +        self.assertEqual(active.content[KEY_VERSION_KEY], +                         KEYMANAGER_DOC_VERSION) +        self.assertEqual(active.content[KEY_FINGERPRINT_KEY], KEY_FINGERPRINT) +        self.assertEqual(active.content[KEY_VALIDATION_KEY], +                         str(ValidationLevels.Weak_Chain)) +        self.assertEqual(active.content[KEY_LAST_AUDITED_AT_KEY], 0) +        self.assertEqual(active.content[KEY_ENCR_USED_KEY], True) +        self.assertEqual(active.content[KEY_SIGN_USED_KEY], False) + +        self.assertTrue(KEY_ID_KEY not in key.content) +        self.assertTrue(KEY_ADDRESS_KEY not in key.content) +        self.assertTrue(KEY_VALIDATION_KEY not in key.content) +        self.assertTrue(KEY_LAST_AUDITED_AT_KEY not in key.content) +        self.assertTrue(KEY_ENCR_USED_KEY not in key.content) +        self.assertTrue(KEY_SIGN_USED_KEY not in key.content) +        self.assertEqual(key.content[KEY_UIDS_KEY], [ADDRESS]) + +    @inlineCallbacks +    def test_two_active_docs(self): +        get_from_index = self._soledad.get_from_index +        delete_doc = self._soledad.delete_doc +        put_doc = self._soledad.put_doc + +        def my_get_from_index(*args): +            docs = [] +            if (args[0] == TAGS_PRIVATE_INDEX and +                    args[2] == '0'): +                SoledadDocument = namedtuple("SoledadDocument", ["content"]) +                if args[1] == KEYMANAGER_KEY_TAG: +                    validation = str(ValidationLevels.Provider_Trust) +                    docs = [SoledadDocument({ +                        KEY_ADDRESS_KEY: [ADDRESS, ADDRESS_2], +                        KEY_ID_KEY: KEY_FINGERPRINT[-16:], +                        KEY_FINGERPRINT_KEY: KEY_FINGERPRINT, +                        KEY_VALIDATION_KEY: validation, +                        KEY_LAST_AUDITED_AT_KEY: 1984, +                        KEY_ENCR_USED_KEY: True, +                        KEY_SIGN_USED_KEY: False, +                    })] +                if args[1] == KEYMANAGER_ACTIVE_TAG: +                    docs = [ +                        SoledadDocument({ +                            KEY_ADDRESS_KEY: ADDRESS, +                            KEY_ID_KEY: KEY_FINGERPRINT[-16:], +                        }), +                        SoledadDocument({ +                            KEY_ADDRESS_KEY: ADDRESS_2, +                            KEY_ID_KEY: KEY_FINGERPRINT[-16:], +                        }), +                    ] +            return succeed(docs) + +        self._soledad.get_from_index = my_get_from_index +        self._soledad.delete_doc = Mock(return_value=succeed(None)) +        self._soledad.put_doc = Mock(return_value=succeed(None)) + +        try: +            migrator = KeyDocumentsMigrator(self._soledad) +            yield migrator.migrate() +            call_list = self._soledad.put_doc.call_args_list +        finally: +            self._soledad.get_from_index = get_from_index +            self._soledad.delete_doc = delete_doc +            self._soledad.put_doc = put_doc + +        self.assertEqual(len(call_list), 3) +        for active in [call[0][0] for call in call_list][:2]: +            self.assertTrue(KEY_ID_KEY not in active.content) +            self.assertEqual(active.content[KEY_VERSION_KEY], +                             KEYMANAGER_DOC_VERSION) +            self.assertEqual(active.content[KEY_FINGERPRINT_KEY], +                             KEY_FINGERPRINT) +            self.assertEqual(active.content[KEY_VALIDATION_KEY], +                             str(ValidationLevels.Weak_Chain)) +            self.assertEqual(active.content[KEY_LAST_AUDITED_AT_KEY], 0) +            self.assertEqual(active.content[KEY_ENCR_USED_KEY], False) +            self.assertEqual(active.content[KEY_SIGN_USED_KEY], False) diff --git a/keymanager/tests/test_openpgp.py b/keymanager/tests/test_openpgp.py new file mode 100644 index 0000000..1f78ad4 --- /dev/null +++ b/keymanager/tests/test_openpgp.py @@ -0,0 +1,365 @@ +# -*- coding: utf-8 -*- +# test_keymanager.py +# Copyright (C) 2014 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + + +""" +Tests for the OpenPGP support on Key Manager. +""" + + +from datetime import datetime +from mock import Mock +from twisted.internet.defer import inlineCallbacks, gatherResults, succeed + +from leap.keymanager import ( +    KeyNotFound, +    openpgp, +) +from leap.keymanager.documents import ( +    TYPE_FINGERPRINT_PRIVATE_INDEX, +    TYPE_ADDRESS_PRIVATE_INDEX, +) +from leap.keymanager.keys import OpenPGPKey + +from common import ( +    KeyManagerWithSoledadTestCase, +    ADDRESS, +    ADDRESS_2, +    KEY_FINGERPRINT, +    PUBLIC_KEY, +    PUBLIC_KEY_2, +    PRIVATE_KEY, +    PRIVATE_KEY_2, +) + + +class OpenPGPCryptoTestCase(KeyManagerWithSoledadTestCase): + +    # set the trial timeout to 20min, needed by the key generation test +    timeout = 1200 + +    @inlineCallbacks +    def _test_openpgp_gen_key(self): +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield self._assert_key_not_found(pgp, 'user@leap.se') +        key = yield pgp.gen_key('user@leap.se') +        self.assertIsInstance(key, OpenPGPKey) +        self.assertEqual( +            'user@leap.se', key.address, 'Wrong address bound to key.') +        self.assertEqual( +            4096, key.length, 'Wrong key length.') + +    @inlineCallbacks +    def test_openpgp_put_delete_key(self): +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield self._assert_key_not_found(pgp, ADDRESS) +        yield pgp.put_raw_key(PUBLIC_KEY, ADDRESS) +        key = yield pgp.get_key(ADDRESS, private=False) +        yield pgp.delete_key(key) +        yield self._assert_key_not_found(pgp, ADDRESS) + +    @inlineCallbacks +    def test_openpgp_put_ascii_key(self): +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield self._assert_key_not_found(pgp, ADDRESS) +        yield pgp.put_raw_key(PUBLIC_KEY, ADDRESS) +        key = yield pgp.get_key(ADDRESS, private=False) +        self.assertIsInstance(key, OpenPGPKey) +        self.assertTrue( +            ADDRESS in key.address, 'Wrong address bound to key.') +        self.assertEqual( +            4096, key.length, 'Wrong key length.') +        yield pgp.delete_key(key) +        yield self._assert_key_not_found(pgp, ADDRESS) + +    @inlineCallbacks +    def test_get_public_key(self): +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield self._assert_key_not_found(pgp, ADDRESS) +        yield pgp.put_raw_key(PUBLIC_KEY, ADDRESS) +        yield self._assert_key_not_found(pgp, ADDRESS, private=True) +        key = yield pgp.get_key(ADDRESS, private=False) +        self.assertTrue(ADDRESS in key.address) +        self.assertFalse(key.private) +        self.assertEqual(KEY_FINGERPRINT, key.fingerprint) +        yield pgp.delete_key(key) +        yield self._assert_key_not_found(pgp, ADDRESS) + +    @inlineCallbacks +    def test_openpgp_encrypt_decrypt(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) + +        # encrypt +        yield pgp.put_raw_key(PUBLIC_KEY, ADDRESS) +        pubkey = yield pgp.get_key(ADDRESS, private=False) +        cyphertext = yield pgp.encrypt(data, pubkey) + +        self.assertTrue(cyphertext is not None) +        self.assertTrue(cyphertext != '') +        self.assertTrue(cyphertext != data) +        self.assertTrue(pgp.is_encrypted(cyphertext)) +        self.assertTrue(pgp.is_encrypted(cyphertext)) + +        # decrypt +        yield self._assert_key_not_found(pgp, ADDRESS, private=True) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        decrypted, _ = yield pgp.decrypt(cyphertext, privkey) +        self.assertEqual(decrypted, data) + +        yield pgp.delete_key(pubkey) +        yield pgp.delete_key(privkey) +        yield self._assert_key_not_found(pgp, ADDRESS, private=False) +        yield self._assert_key_not_found(pgp, ADDRESS, private=True) + +    @inlineCallbacks +    def test_verify_with_private_raises(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        signed = pgp.sign(data, privkey) +        self.assertRaises( +            AssertionError, +            pgp.verify, signed, privkey) + +    @inlineCallbacks +    def test_sign_with_public_raises(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PUBLIC_KEY, ADDRESS) +        self.assertRaises( +            AssertionError, +            pgp.sign, data, ADDRESS, OpenPGPKey) + +    @inlineCallbacks +    def test_verify_with_wrong_key_raises(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        signed = pgp.sign(data, privkey) +        yield pgp.put_raw_key(PUBLIC_KEY_2, ADDRESS_2) +        wrongkey = yield pgp.get_key(ADDRESS_2) +        self.assertFalse(pgp.verify(signed, wrongkey)) + +    @inlineCallbacks +    def test_encrypt_sign_with_public_raises(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        pubkey = yield pgp.get_key(ADDRESS, private=False) +        self.failureResultOf( +            pgp.encrypt(data, privkey, sign=pubkey), +            AssertionError) + +    @inlineCallbacks +    def test_decrypt_verify_with_private_raises(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        pubkey = yield pgp.get_key(ADDRESS, private=False) +        encrypted_and_signed = yield pgp.encrypt( +            data, pubkey, sign=privkey) +        self.failureResultOf( +            pgp.decrypt(encrypted_and_signed, privkey, verify=privkey), +            AssertionError) + +    @inlineCallbacks +    def test_decrypt_verify_with_wrong_key(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        pubkey = yield pgp.get_key(ADDRESS, private=False) +        encrypted_and_signed = yield pgp.encrypt(data, pubkey, sign=privkey) +        yield pgp.put_raw_key(PUBLIC_KEY_2, ADDRESS_2) +        wrongkey = yield pgp.get_key(ADDRESS_2) +        decrypted, validsign = yield pgp.decrypt(encrypted_and_signed, +                                                 privkey, +                                                 verify=wrongkey) +        self.assertEqual(decrypted, data) +        self.assertFalse(validsign) + +    @inlineCallbacks +    def test_sign_verify(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        signed = pgp.sign(data, privkey, detach=False) +        pubkey = yield pgp.get_key(ADDRESS, private=False) +        validsign = pgp.verify(signed, pubkey) +        self.assertTrue(validsign) + +    @inlineCallbacks +    def test_encrypt_sign_decrypt_verify(self): +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) + +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        pubkey = yield pgp.get_key(ADDRESS, private=False) +        privkey = yield pgp.get_key(ADDRESS, private=True) + +        yield pgp.put_raw_key(PRIVATE_KEY_2, ADDRESS_2) +        pubkey2 = yield pgp.get_key(ADDRESS_2, private=False) +        privkey2 = yield pgp.get_key(ADDRESS_2, private=True) + +        data = 'data' +        encrypted_and_signed = yield pgp.encrypt( +            data, pubkey2, sign=privkey) +        res, validsign = yield pgp.decrypt( +            encrypted_and_signed, privkey2, verify=pubkey) +        self.assertEqual(data, res) +        self.assertTrue(validsign) + +    @inlineCallbacks +    def test_sign_verify_detached_sig(self): +        data = 'data' +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PRIVATE_KEY, ADDRESS) +        privkey = yield pgp.get_key(ADDRESS, private=True) +        signature = yield pgp.sign(data, privkey, detach=True) +        pubkey = yield pgp.get_key(ADDRESS, private=False) +        validsign = pgp.verify(data, pubkey, detached_sig=signature) +        self.assertTrue(validsign) + +    @inlineCallbacks +    def test_self_repair_three_keys(self): +        refreshed_keep = datetime(2007, 1, 1) +        self._insert_key_docs([datetime(2005, 1, 1), +                               refreshed_keep, +                               datetime(2001, 1, 1)]) +        delete_doc = self._mock_delete_doc() + +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        key = yield pgp.get_key(ADDRESS, private=False) +        self.assertEqual(key.refreshed_at, refreshed_keep) +        self.assertEqual(self.count, 2) +        self._soledad.delete_doc = delete_doc + +    @inlineCallbacks +    def test_self_repair_no_keys(self): +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PUBLIC_KEY, ADDRESS) + +        get_from_index = self._soledad.get_from_index +        delete_doc = self._soledad.delete_doc + +        def my_get_from_index(*args): +            if (args[0] == TYPE_FINGERPRINT_PRIVATE_INDEX and +                    args[2] == KEY_FINGERPRINT): +                return succeed([]) +            return get_from_index(*args) + +        self._soledad.get_from_index = my_get_from_index +        self._soledad.delete_doc = Mock(return_value=succeed(None)) + +        try: +            yield self.assertFailure(pgp.get_key(ADDRESS, private=False), +                                     KeyNotFound) +            # it should have deleted the index +            self.assertEqual(self._soledad.delete_doc.call_count, 1) +        finally: +            self._soledad.get_from_index = get_from_index +            self._soledad.delete_doc = delete_doc + +    @inlineCallbacks +    def test_self_repair_put_keys(self): +        self._insert_key_docs([datetime(2005, 1, 1), +                               datetime(2007, 1, 1), +                               datetime(2001, 1, 1)]) +        delete_doc = self._mock_delete_doc() + +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) +        yield pgp.put_raw_key(PUBLIC_KEY, ADDRESS) +        self._soledad.delete_doc = delete_doc +        self.assertEqual(self.count, 2) + +    @inlineCallbacks +    def test_self_repair_six_active_docs(self): +        pgp = openpgp.OpenPGPScheme( +            self._soledad, gpgbinary=self.gpg_binary_path) + +        k1 = OpenPGPKey(ADDRESS, fingerprint="1", +                        refreshed_at=datetime(2005, 1, 1)) +        k2 = OpenPGPKey(ADDRESS, fingerprint="2", +                        refreshed_at=datetime(2007, 1, 1)) +        k3 = OpenPGPKey(ADDRESS, fingerprint="3", +                        refreshed_at=datetime(2007, 1, 1), +                        encr_used=True, sign_used=True) +        k4 = OpenPGPKey(ADDRESS, fingerprint="4", +                        refreshed_at=datetime(2007, 1, 1), +                        sign_used=True) +        k5 = OpenPGPKey(ADDRESS, fingerprint="5", +                        refreshed_at=datetime(2007, 1, 1), +                        encr_used=True) +        k6 = OpenPGPKey(ADDRESS, fingerprint="6", +                        refreshed_at=datetime(2006, 1, 1), +                        encr_used=True, sign_used=True) +        keys = (k1, k2, k3, k4, k5, k6) +        for key in keys: +            yield self._soledad.create_doc_from_json(key.get_json()) +            yield self._soledad.create_doc_from_json(key.get_active_json()) + +        delete_doc = self._mock_delete_doc() + +        key = yield pgp.get_key(ADDRESS, private=False) +        self._soledad.delete_doc = delete_doc +        self.assertEqual(self.count, 5) +        self.assertEqual(key.fingerprint, "3") + +    def _assert_key_not_found(self, pgp, address, private=False): +        d = pgp.get_key(address, private=private) +        return self.assertFailure(d, KeyNotFound) + +    @inlineCallbacks +    def _insert_key_docs(self, refreshed_at): +        for date in refreshed_at: +            key = OpenPGPKey(ADDRESS, fingerprint=KEY_FINGERPRINT, +                             refreshed_at=date) +            yield self._soledad.create_doc_from_json(key.get_json()) +        yield self._soledad.create_doc_from_json(key.get_active_json()) + +    def _mock_delete_doc(self): +        delete_doc = self._soledad.delete_doc +        self.count = 0 + +        def my_delete_doc(*args): +            self.count += 1 +            return delete_doc(*args) +        self._soledad.delete_doc = my_delete_doc +        return delete_doc diff --git a/keymanager/tests/test_validation.py b/keymanager/tests/test_validation.py new file mode 100644 index 0000000..4aa0795 --- /dev/null +++ b/keymanager/tests/test_validation.py @@ -0,0 +1,502 @@ +# -*- coding: utf-8 -*- +# __init__.py +# Copyright (C) 2014 LEAP +# +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +""" +Tests for the Validation Levels +""" + +import unittest +from datetime import datetime +from twisted.internet.defer import inlineCallbacks + +from leap.keymanager.errors import KeyNotValidUpgrade +from leap.keymanager.validation import ValidationLevels + +from common import ( +    KeyManagerWithSoledadTestCase, +    ADDRESS, +    PUBLIC_KEY, +    ADDRESS_2, +    PUBLIC_KEY_2, +    PRIVATE_KEY_2, +    KEY_FINGERPRINT +) + + +class ValidationLevelsTestCase(KeyManagerWithSoledadTestCase): + +    @inlineCallbacks +    def test_none_old_key(self): +        km = self._key_manager() +        yield km.put_raw_key(PUBLIC_KEY, ADDRESS) +        key = yield km.get_key(ADDRESS, fetch_remote=False) +        self.assertEqual(key.fingerprint, KEY_FINGERPRINT) + +    @inlineCallbacks +    def test_cant_upgrade(self): +        km = self._key_manager() +        yield km.put_raw_key(PUBLIC_KEY, ADDRESS, +                             validation=ValidationLevels.Provider_Trust) +        d = km.put_raw_key(UNRELATED_KEY, ADDRESS) +        yield self.assertFailure(d, KeyNotValidUpgrade) + +    @inlineCallbacks +    def test_fingerprint_level(self): +        km = self._key_manager() +        yield km.put_raw_key(PUBLIC_KEY, ADDRESS) +        yield km.put_raw_key(UNRELATED_KEY, ADDRESS, +                             validation=ValidationLevels.Fingerprint) +        key = yield km.get_key(ADDRESS, fetch_remote=False) +        self.assertEqual(key.fingerprint, UNRELATED_FINGERPRINT) + +    @inlineCallbacks +    def test_expired_key(self): +        km = self._key_manager() +        yield km.put_raw_key(EXPIRED_KEY, ADDRESS) +        yield km.put_raw_key(UNRELATED_KEY, ADDRESS) +        key = yield km.get_key(ADDRESS, fetch_remote=False) +        self.assertEqual(key.fingerprint, UNRELATED_FINGERPRINT) + +    @inlineCallbacks +    def test_expired_fail_lower_level(self): +        km = self._key_manager() +        yield km.put_raw_key( +            EXPIRED_KEY, ADDRESS, +            validation=ValidationLevels.Third_Party_Endorsement) +        d = km.put_raw_key( +            UNRELATED_KEY, ADDRESS, +            validation=ValidationLevels.Provider_Trust) +        yield self.assertFailure(d, KeyNotValidUpgrade) + +    @inlineCallbacks +    def test_roll_back(self): +        km = self._key_manager() +        yield km.put_raw_key(EXPIRED_KEY_UPDATED, ADDRESS) +        yield km.put_raw_key(EXPIRED_KEY, ADDRESS) +        key = yield km.get_key(ADDRESS, fetch_remote=False) +        self.assertEqual(key.expiry_date, EXPIRED_KEY_NEW_EXPIRY_DATE) + +    @inlineCallbacks +    def test_not_used(self): +        km = self._key_manager() +        yield km.put_raw_key(UNEXPIRED_KEY, ADDRESS, +                             validation=ValidationLevels.Provider_Trust) +        yield km.put_raw_key(UNRELATED_KEY, ADDRESS, +                             validation=ValidationLevels.Provider_Endorsement) +        key = yield km.get_key(ADDRESS, fetch_remote=False) +        self.assertEqual(key.fingerprint, UNRELATED_FINGERPRINT) + +    @inlineCallbacks +    def test_used_with_verify(self): +        TEXT = "some text" + +        km = self._key_manager() +        yield km.put_raw_key(UNEXPIRED_PRIVATE, ADDRESS) +        signature = yield km.sign(TEXT, ADDRESS) +        yield self.delete_all_keys(km) + +        yield km.put_raw_key(UNEXPIRED_KEY, ADDRESS) +        yield km.encrypt(TEXT, ADDRESS) +        yield km.verify(TEXT, ADDRESS, detached_sig=signature) + +        d = km.put_raw_key( +            UNRELATED_KEY, ADDRESS, +            validation=ValidationLevels.Provider_Endorsement) +        yield self.assertFailure(d, KeyNotValidUpgrade) + +    @inlineCallbacks +    def test_used_with_decrypt(self): +        TEXT = "some text" + +        km = self._key_manager() +        yield km.put_raw_key(UNEXPIRED_PRIVATE, ADDRESS) +        yield km.put_raw_key(PUBLIC_KEY_2, ADDRESS_2) +        encrypted = yield km.encrypt(TEXT, ADDRESS_2, sign=ADDRESS) +        yield self.delete_all_keys(km) + +        yield km.put_raw_key(UNEXPIRED_KEY, ADDRESS) +        yield km.put_raw_key(PRIVATE_KEY_2, ADDRESS_2) +        yield km.encrypt(TEXT, ADDRESS) +        yield km.decrypt(encrypted, ADDRESS_2, verify=ADDRESS) + +        d = km.put_raw_key( +            UNRELATED_KEY, ADDRESS, +            validation=ValidationLevels.Provider_Endorsement) +        yield self.assertFailure(d, KeyNotValidUpgrade) + +    @inlineCallbacks +    def test_signed_key(self): +        km = self._key_manager() +        yield km.put_raw_key(PUBLIC_KEY, ADDRESS) +        yield km.put_raw_key(SIGNED_KEY, ADDRESS) +        key = yield km.get_key(ADDRESS, fetch_remote=False) +        self.assertEqual(key.fingerprint, SIGNED_FINGERPRINT) + +    @inlineCallbacks +    def test_two_uuids(self): +        TEXT = "some text" + +        km = self._key_manager() +        yield km.put_raw_key(UUIDS_PRIVATE, ADDRESS_2) +        signature = yield km.sign(TEXT, ADDRESS_2) +        yield self.delete_all_keys(km) + +        yield km.put_raw_key(UUIDS_KEY, ADDRESS_2) +        yield km.put_raw_key(UUIDS_KEY, ADDRESS) +        yield km.encrypt(TEXT, ADDRESS_2) +        yield km.verify(TEXT, ADDRESS_2, detached_sig=signature) + +        d = km.put_raw_key( +            PUBLIC_KEY_2, ADDRESS_2, +            validation=ValidationLevels.Provider_Endorsement) +        yield self.assertFailure(d, KeyNotValidUpgrade) +        key = yield km.get_key(ADDRESS_2, fetch_remote=False) +        self.assertEqual(key.fingerprint, UUIDS_FINGERPRINT) + +        yield km.put_raw_key( +            PUBLIC_KEY, ADDRESS, +            validation=ValidationLevels.Provider_Endorsement) +        key = yield km.get_key(ADDRESS, fetch_remote=False) +        self.assertEqual(key.fingerprint, KEY_FINGERPRINT) + + +# Key material for testing + +# key 901FBCA5: public key "Leap Test Key <leap@leap.se>" +UNRELATED_FINGERPRINT = "ABCCD9C8270B6A8D5633FAC9D04DB2E4901FBCA5" +UNRELATED_KEY = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1 + +mQENBFQ9VDoBCACbKflcEhUXZULOT4Fwc2ifRUllJpusd2uX5oeDlZdZ15uLY2eF +LcxnAdIWkI/PsXimh0ev/Pf4oCynfmt02I3c2d9F0N6JXWnRiP+p098oPOcqeEqL +N3CrkH1RVnEXNeJ/Fu7tkD61SBXl1MytMfcHyhN5arg8OcVAjcmghX53+92jFhC9 +8ss87H/qEe5vEX/ahP3tiL5ULvaS4GIX+XB0O3yCVdRoRG9lqMIBP/ZqCkKrNll8 +dT12a6ByG/rWharZUeUETiM4Y+JjDUUaEC2YhNF9k52JNGanLH9LTTtlKy5WTT+E +C6T6VMAtkwcBDpkXr5sBB/N+Y1z0Fp359lIXABEBAAG0HExlYXAgVGVzdCBLZXkg +PGxlYXBAbGVhcC5zZT6JATgEEwECACIFAlQ9VDoCGwMGCwkIBwMCBhUIAgkKCwQW +AgMBAh4BAheAAAoJENBNsuSQH7ylsSUIAIxUFbkeTdHbCF/LVA2U+ktnR1iVikAY +vFK+U+Bto11/AO4Kew2eWniDch/sqLQOoSydtP42z2z3/Al3u7LhQ8bElQHPDY78 +t49qweyJi00V3vCKCdWwPJnPM5eJOIrZHCbwIgeXCsXxVNJVyziVqMuum+px1h2d +1YJZXYejT8rzwa3yBPAsGWRAWETeTvUuyjPMFa59scbnaDuY+bwQ2r/qG9m7UyHU +h2kAHC5sf1rixVOY6rLhw75gQHE/L2BZJRfVsDQqIpEMh2OgMfNbL928jncjwQvc +/IXXwSUx7y50ll+uNh+TVLf0MlUjKdHmHqnGBMlIIWojWJuKxYmOOoO5AQ0EVD1U +OgEIAM/TlhWVSI+tl5XBUAcf60RxjpHQkmdfq1i1jgwUgu/638EKzBfLcnRYX8Rn +DO9CWnHcql/4hp226fIWZN/SyReE81n7UkLDMAglhHgiezHMSH1GYVu4IlfpLVXn +brLVo83KioH5MPFWmZv5tigpU/G8dTx9yVGv1//YW2qqRYYqeIKJfapBaY/bNqyD +vYRfZo1K2brtHx4bToY6mALRF4ruV5SVZGS69e4Sh692C2pXSVbCpRhQ/2WnvkZH +leFIdmNmQN61MC1k26A620Rm+pAsXX71dln0u96xbrCgEVbi6ccfXzbFKtVmThVB +w11CLvVTviOm99TmcgpmDS4cf08AEQEAAYkBHwQYAQIACQUCVD1UOgIbDAAKCRDQ +TbLkkB+8pR+fB/0SeTcRr1duN7VYWdtng1+jO0ornIBtUraglN01dEEmiwN83DTi +J37i+nll+4is7BtiXqhumRptKh1v8UUMyFX/rjjoojCJBg5NExsiOYl3O4le68oF +3+XC+n7yrlyNmI15+3dcQmC9F6HN8EBZgrn5YPKGIOMHTGatB5PryMKg2IKiN5GZ +E0hmrOQgmcGrkeqysKACQYUHTasSk2IY1l1G5YQglqCaBh4+UC82Dmg5fTBbHjxP +YhhojkP4aD/0YW7dgql3nzYqvPCAjBH1Cf6rA9HvAJwUP9Ig/okcrrPEKm638+mG ++vNIuLqIkA4oFLBAAIrgMiQZ+NZz9uD6DJE7 +=FO7G +-----END PGP PUBLIC KEY BLOCK----- +""" + +# key A1885A7C: public key "Leap Test Key <leap@leap.se>" +EXPIRED_FINGERPRINT = "7C1F68B0E14157B09B5F4ADE6F15F004A1885A7C" +EXPIRED_KEY = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1.4.12 (GNU/Linux) + +mQENBBvrfd0BCADGNpspaNhsbhSjKioCWrE2MTTYC+Sdpes22RabdhQyOCWvlSbj +b8p0y3kmnMOtVBT+c22/w7eu2YBfIpS4RswgE5ypr/1kZLFQueVe/cp29GjPvLwJ +82A3EOHcmXs8rSJ76h2bnkySvbJawz9rwCcaXhpdAwC+sjWvbqiwZYEL+90I4Xp3 +acDh9vNtPxDCg5RdI0bfdIEBGgHTfsda3kWGvo1wH5SgrTRq0+EcTI7aJgkMmM/A +IhnpACE52NvGdG9eB3x7xyQFsQqK8F0XvEev2UJH4SR7vb+Z7FNTJKCy6likYbSV +wGGFuowFSESnzXuUI6PcjyuO6FUbMgeM5euFABEBAAG0HExlYXAgVGVzdCBLZXkg +PGxlYXBAbGVhcC5zZT6JAT4EEwECACgFAhvrfd0CGwMFCQABUYAGCwkIBwMCBhUI +AgkKCwQWAgMBAh4BAheAAAoJEG8V8AShiFp8VNkH/iCQcXkTfMOVlL2rQRyZtJEO +Lr5uTyyY8O6ubeNCHqZzlIopiPAsv4hIYjjMDvOfZ9R53YgmbacUm0rvh1B4MSUf +k+sa9/tequ3y44LUKp7AB6NyyLgVOU5ngl2w+bi7CgXAep3oP4joYKcU0mmSAc2S +2Gj85DVqP0kdzNs47esvyj7g1TOfdBwmLsTx/219H+w3dNBeyCQWkYCYNh7MX/Ba +SZ+P0xr4FetcOVPM3wAzUtDG7hKsgccoIXt0FWhG/nn8cETfGH+o3W/ky7Jktatx +DGDHoZJvAaG2B2ey1pAQlezr8p/O+ZVABiigHk1S+myBHyhlXzUcjhQnEG7aHZ65 +AQ0EG+t93QEIAKqRq/2sBDW4g3FU+11LhixT+GosrfVvnitz3S9k2tBXok/wYpI1 +XeA+kTHiF0LaqoaciDRvkA9DvhDbSrNM1yeuYRyZiHlTmoPZ/Fkl60oA2cyLd1L5 +sXbuipY3TEiakugdSU4rzgi0hFycm6Go6yq2G6eC6UALvD9CTMdZHw40TadG9xpm +4thYPuJ1kPH8/bkbTi9sLHoApYgL+7ssje8w4epr0qD4IGxeKwJPf/tbTRpnd8w3 +leldixHHKAutNt49p0pkXlORAHRpUmp+KMZhFvCvIPwe9o5mYtMR7sDRxjY61ZEQ +KLyKoh5wsJsaPXBjdG7cf6G/cBcwvnQVUHcAEQEAAYkBJQQYAQIADwUCG+t93QIb +DAUJAAFRgAAKCRBvFfAEoYhafOPgB/9z4YCyT/N0262HtegHykhsyykuqEeNb1LV +D9INcP+RbCX/0IjFgP4DTMPP7qqF1OBwR276maALT321Gqxc5HN5YrwxGdmoyBLm +unaQJJlD+7B1C+jnO6r4m44obvJ/NMERxVyzkXap3J2VgRIO1wNLI9I0sH6Kj5/j +Mgy06OwXDcqIc+jB4sIJ3Tnm8LZ3phJzNEm9mI8Ak0oJ7IEcMndR6DzmRt1rJQcq +K/D7hOG02zvyRhxF27U1qR1MxeU/gNnOx8q4dnVyWB+EiV1sFl4iTOyYHEsoyd7W +Osuse7+NkyUHgMXMVW7cz+nU7iO+ht2rkBtv+Z5LGlzgHTeFjKci +=WhX+ +-----END PGP PUBLIC KEY BLOCK----- +""" +# updated expiration date +EXPIRED_KEY_NEW_EXPIRY_DATE = datetime.fromtimestamp(2049717872) +EXPIRED_KEY_UPDATED = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1.4.12 (GNU/Linux) + +mQENBBvrfd0BCADGNpspaNhsbhSjKioCWrE2MTTYC+Sdpes22RabdhQyOCWvlSbj +b8p0y3kmnMOtVBT+c22/w7eu2YBfIpS4RswgE5ypr/1kZLFQueVe/cp29GjPvLwJ +82A3EOHcmXs8rSJ76h2bnkySvbJawz9rwCcaXhpdAwC+sjWvbqiwZYEL+90I4Xp3 +acDh9vNtPxDCg5RdI0bfdIEBGgHTfsda3kWGvo1wH5SgrTRq0+EcTI7aJgkMmM/A +IhnpACE52NvGdG9eB3x7xyQFsQqK8F0XvEev2UJH4SR7vb+Z7FNTJKCy6likYbSV +wGGFuowFSESnzXuUI6PcjyuO6FUbMgeM5euFABEBAAG0HExlYXAgVGVzdCBLZXkg +PGxlYXBAbGVhcC5zZT6JAT4EEwECACgCGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4B +AheABQJUlDCSBQleQLiTAAoJEG8V8AShiFp8t3QH/1eqkVIScXmqaCVeno3VSKiH +HqnxiHcEgtpNRfUlP6tLD4H6QPEpvoUI9S/8HSYi3nbDGXEX8ycKlnwxjdIqWSOW +xj91/7uQAo+dP9QaVJ6xgaAiqzN1x3JzX3Js1wTodmNV0TfmGjxwnC5up/xK7/pd +KuDP3woDsRlwy8Lgj67mkn49xfAFHo6hI6SD36UBDAC/ELq6kZaba4Kk0fEVHCEz +HX0B09ZIY9fmf305cEB3dNh6SMQgKtH0wKozaqI2UM2B+cs3z08bC+YuUUh7UJTH +yr+hI7vF4/WEeJB3fuhP3xsumLhV8P47DaJ7oivmtsDEbAJFKqvigEqNES73Xpy5 +AQ0EG+t93QEIAKqRq/2sBDW4g3FU+11LhixT+GosrfVvnitz3S9k2tBXok/wYpI1 +XeA+kTHiF0LaqoaciDRvkA9DvhDbSrNM1yeuYRyZiHlTmoPZ/Fkl60oA2cyLd1L5 +sXbuipY3TEiakugdSU4rzgi0hFycm6Go6yq2G6eC6UALvD9CTMdZHw40TadG9xpm +4thYPuJ1kPH8/bkbTi9sLHoApYgL+7ssje8w4epr0qD4IGxeKwJPf/tbTRpnd8w3 +leldixHHKAutNt49p0pkXlORAHRpUmp+KMZhFvCvIPwe9o5mYtMR7sDRxjY61ZEQ +KLyKoh5wsJsaPXBjdG7cf6G/cBcwvnQVUHcAEQEAAYkBJQQYAQIADwIbDAUCVJQw +3QUJXkC4/QAKCRBvFfAEoYhafEtiB/9hMfSFNMxtlIJDJArG4JwR7sBOatYUT858 +qZnTgGETZN8wXpeEpXWKdDdmCX9aeE9jsDNgSQ5WWpqU21bGMXh1IGjAzmqTqq3/ +ik1vALuaVfr6OqjTzrJVQujT61CGed26xpP3Zh8hLKyKa+dXnX/VpgZS42wZLPx2 +wcODfANmTfE2AhMap/RyDy21q4nau+z2hMEOKdtF8dpP+pEvzoN5ZexYP1hfT+Av +oFPyVB5YtEMfxTEshDKRPjbdgNmw4faKXd5Cbelo4YxxpO16FHb6gzIdjOX15vQ+ +KwcVXzg9xk4D3cr1mnTCops/iv6TXvcw4Wbo70rrKXwkjl8LKjOP +=sHoe +-----END PGP PUBLIC KEY BLOCK----- +""" +UNEXPIRED_KEY = EXPIRED_KEY_UPDATED +UNEXPIRED_PRIVATE = """ +-----BEGIN PGP PRIVATE KEY BLOCK----- +Version: GnuPG v1.4.12 (GNU/Linux) + +lQOYBBvrfd0BCADGNpspaNhsbhSjKioCWrE2MTTYC+Sdpes22RabdhQyOCWvlSbj +b8p0y3kmnMOtVBT+c22/w7eu2YBfIpS4RswgE5ypr/1kZLFQueVe/cp29GjPvLwJ +82A3EOHcmXs8rSJ76h2bnkySvbJawz9rwCcaXhpdAwC+sjWvbqiwZYEL+90I4Xp3 +acDh9vNtPxDCg5RdI0bfdIEBGgHTfsda3kWGvo1wH5SgrTRq0+EcTI7aJgkMmM/A +IhnpACE52NvGdG9eB3x7xyQFsQqK8F0XvEev2UJH4SR7vb+Z7FNTJKCy6likYbSV +wGGFuowFSESnzXuUI6PcjyuO6FUbMgeM5euFABEBAAEAB/0cwelrGEdmG+Z/RxZx +4anvpzNNMRSJ0Xu508SVk4vElCQrlaPfFZC1t0ZW1XcHsQ5Gsy/gxaA4YbK1RXV2 +8uvvWh5oTsdLByzj/cSLLp5u+cYxyuaBOb/jiAiCPVEFnEec23pQ4fumwpebgX5f +FLGCVYAqWc2EMqOFVgnAEJ9TbIWRnCkN04r1WSc7eLcUlH+vTp4HUPd6PQj56zSr +J5beeviHgYB76M6mcM/BRzLmcl4M7bgx5olp8A0Wz7ub+hXICmNQyqpE8qZeyGjq +v4T/6BSpsp5yEGDMkahFyO7OwB7UI6SZGkdnWKGeXOWG48so6cFdZ8dxRGx49gFL +1rP1BADfYjQDfmBpB6tC1MyATb1MUK/1CN7wC5w7fXCtPbYNiqc9s27W9NXQReHD +GOU04weU+ZJsV6Fwlt3oRD2j05vNdhbqKseLdsm27/kg2GWZvjamriHqZ94sw6yk +fg3MqPb4JdFzBZVHqD50AHASx2rMshBeMVo27LhcADCWM9P8bwQA4yeRonbIAUls +yAwWIRCMel2JY1u/zmJrg8FFAG2LYx+pYaxkRxjSJNlQQV7o6aYiU3Yw+nXvj5Pz +IdOdimWfFb8eZ3U6tbognJxjwU8vV3ili40O7SENgloeM/nzg+nQjIaS9utfE8Et +juV7f9OWi8Fo+xzSOvUGwoL/zW5t+UsD/0bm+5ch53Sm1ITCn7yfMrp0YaT+YC3Y +mNNfrfbFpEd20ky4K9COIFDFCJmMyKLx/jSajcf4JqrxB/mOmHHAF9CeL7LUy/XV +O8Ec5lkovicDIDT1b+pQYEYvh5UBJmoq1R5nbNLo70gFtGP6b4+t27Gxks5VLhF/ +BVvxK7xjmkBETnq0HExlYXAgVGVzdCBLZXkgPGxlYXBAbGVhcC5zZT6JAT4EEwEC +ACgCGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheABQJUURIXBQld/ZovAAoJEG8V +8AShiFp8xUcIALcAHZbaxvyhHRGOrwDddbH0fFDK0AqKTsIT7y4D/HLFCP5zG3Ck +7qGPZdkHXZfzq8rIb+zUjW3oJIVI1IucHxG2T5kppa8RFCBAFlRWYf6R3isX3YL0 +d3QSragjoxRNPcHNU8ALHcvfSonFHBoi4fH44rvgksAiT68SsdPaoXDlabx5T15e +vu/7T5e/DGMQVPMxiaSuSQhbOKuMk2wcFdmLtBYHLZPa54hHPNhEDyxLgtKKph0g +Obk9ojKfH9kPvLveIcpS5CqTJfN/kqBz7CJWwEeAi2iG3H1OEB25aCUdTxXSRNlG +qEgcWPaWxtc1RzlARu7LB64OUZuRy4puiAGdA5gEG+t93QEIAKqRq/2sBDW4g3FU ++11LhixT+GosrfVvnitz3S9k2tBXok/wYpI1XeA+kTHiF0LaqoaciDRvkA9DvhDb +SrNM1yeuYRyZiHlTmoPZ/Fkl60oA2cyLd1L5sXbuipY3TEiakugdSU4rzgi0hFyc +m6Go6yq2G6eC6UALvD9CTMdZHw40TadG9xpm4thYPuJ1kPH8/bkbTi9sLHoApYgL ++7ssje8w4epr0qD4IGxeKwJPf/tbTRpnd8w3leldixHHKAutNt49p0pkXlORAHRp +Ump+KMZhFvCvIPwe9o5mYtMR7sDRxjY61ZEQKLyKoh5wsJsaPXBjdG7cf6G/cBcw +vnQVUHcAEQEAAQAH/A0TCHNz3Yi+oXis8m2WzeyU7Sw6S4VOLnoXMgOhf/JLXVoy +S2P4qj73nMqNkYni2AJkej5GtOyunSGOpZ2zzKQyhigajq76HRRxP5oXwX7VLNy0 +bguSrys2IrJb/8Fq88rN/+H5kpvxNlog+P79wzTta5Y9/yIVJDNXIip/ptVARhA7 +CrdDyE4EaPjcWCS3/9a4R8JDZl19PlTE23DD5ffZv5wNEX38oZkDCK4Si+kqhvm7 +g0Upr49hnvqRPXoi46OBAoUh9yVTKaNDMsRWblvno7k3+MF0CCnix5p5JR74bGnZ +8kS14qXXkAa58uMaAIcv86+mHNovXhaxcog+8k0EAM8wWyWPjdO2xbwwB0hS2E9i +IO/X26uhLY3/tozbOekvqXKvwIy/xdWNVHr7eukAS+oIY10iczgKkMgquoqvzR4q +UY5WI0iC0iMLUGV7xdxusPl+aCbGKomtN/H3JR2Wecgje7K/3o5BtUDM6Fr2KPFb ++uf/gqVkoMmp3O/DjhDlBADSwMHuhfStF+eDXwSQ4WJ3uXP8n4M4t9J2zXO366BB +CAJg8enzwQi62YB+AOhP9NiY5ZrEySk0xGsnVgex2e7V5ilm1wd1z2el3g9ecfVj +yu9mwqHKT811xsLjqQC84JN+qHM/7t7TSgczY2vD8ho2O8bBZzuoiX+QIPYUXkDy +KwP8DTeHjnI6vAP2uVRnaY+bO53llyO5DDp4pnpr45yL47geciElq3m3jXFjHwos +mmkOlYAL07JXeZK+LwbhxmbrwLxXNJB//P7l8ByRsmIrWvPuPzzcKig1KnFqvFO1 +5wGU0Pso2qWZU+idrhCdG+D8LRSQ0uibOFCcjFdM0JOJ7e1RdIkBJQQYAQIADwUC +G+t93QIbDAUJAAFRgAAKCRBvFfAEoYhafOPgB/9z4YCyT/N0262HtegHykhsyyku +qEeNb1LVD9INcP+RbCX/0IjFgP4DTMPP7qqF1OBwR276maALT321Gqxc5HN5Yrwx +GdmoyBLmunaQJJlD+7B1C+jnO6r4m44obvJ/NMERxVyzkXap3J2VgRIO1wNLI9I0 +sH6Kj5/jMgy06OwXDcqIc+jB4sIJ3Tnm8LZ3phJzNEm9mI8Ak0oJ7IEcMndR6Dzm +Rt1rJQcqK/D7hOG02zvyRhxF27U1qR1MxeU/gNnOx8q4dnVyWB+EiV1sFl4iTOyY +HEsoyd7WOsuse7+NkyUHgMXMVW7cz+nU7iO+ht2rkBtv+Z5LGlzgHTeFjKci +=dZE8 +-----END PGP PRIVATE KEY BLOCK----- +""" + +# key CA1AD31E: public key "Leap Test Key <leap@leap.se>" +# signed by E36E738D69173C13D709E44F2F455E2824D18DDF +SIGNED_FINGERPRINT = "6704CF3362087DA23E3D2DF8ED81DFD1CA1AD31E" +SIGNED_KEY = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1.4.12 (GNU/Linux) + +mQENBFQ9DHMBCADJXyNVzTQ+NnmSDbR6q8jjDsnqk/IgKrMBkpjNxUa/0HQ4o0Yh +pklzR1hIc/jsdgq42A0++pqdfQFeRc2NVw/NnE/9uzW73YuaWg5XnWGjuAP3UeRI +3xjL/cscEFmGfGkuGvFpIVa7GBPqz1SMBXWULJbkCE1pnHfgqh0R7oc5u0omnsln +0zIrmLX1ufpDRSUedjSgIfd6VqbkPm3NJuZE4NVn6spHG3zTxqcaPCG0xLfHw7eS +qgUdz0BFaxqtQiXffBpA3KvGJW0792VjDh4M6kDvpeYpKRmB9oEYlT3n3KvQrdPE +B3N5KrzJj1QIL990q4NQdqjg+jUE5zCJsTdzABEBAAG0HExlYXAgVGVzdCBLZXkg +PGxlYXBAbGVhcC5zZT6JATgEEwECACIFAlQ9DHMCGwMGCwkIBwMCBhUIAgkKCwQW +AgMBAh4BAheAAAoJEO2B39HKGtMeI/4H/0/OG1OqtQEoYscvJ+BZ3ZrM2pEk7KDd +7AEEf6QIGSd38GFyn/pve24cpRLv7phKNy9dX9VJhTDobpKvK0ZT/yQO3FVlySAN +NVpu93/jrLnrW51J3p/GP952NtUAEP5l1uyYIKZ1W3RLWws72Lh34HTaHAWC94oF +vnS42IYdTn4y6lfizL+wYD6CnfrIpHm8v3NABEQZ8e/jllrRK0pnOxAdFv/TpWEl +8AnTZXcejSBgCG6UmDtrRKfgoQlGJEIH61QSqHpRIwkepQVYexUwgcLFAZPI9Hvw +N5pZQ5Z+XcsYTGtLNEpF7YW6ykLDRTAv6LiBQPkBX8TDKhkh95Cs3sKJAhwEEAEC +AAYFAlQ9DgIACgkQL0VeKCTRjd/pABAAsNPbiGwuZ469NxwTgf3+EMoWZNHf5ZRa +ZbzKKesLFEElMdX3Q/MkVc1T8Rsy9Fdn1tf/H6glwuKyqWeXNkxa86VT6gck9WV6 +bslFIl/vJpb3dcmiCCM1tSCYpX0yE0fqebMihcfvNqDw3GdZBUo7R0pWN6BEh4iM +YYWTAtuPCrbsv+2bSid1ZLIO6FIF5kskg60h/IbSr+A+DSBgyyjf9fbUv6MoyMw8 +08GtCAx6VGJhTTC/RkWIA+N3n83W5XQFszOOg/PAAg0JMUXUBGvjfYJ5fcB8cfuw +1XZe9uWsDmYpwfVEtDajrLbatkXAu22pjIJnB4cVqiD+4hHbBCFkeZIfdRsPEINO +UacsjVZV5/EPDN9OpkvZbkrLJ6eaQnmQZnFclquNHUCqFI0QYUml0BXXaZq+aEJ9 +N9x00kdYV1xW6zkL+MGgxdViC5n6dwJcU3MANrykV8Cc5/x+wmwY8AXbHzU7MxvY +nGlAYsAZHhf4ZlEdAO6C329VotMxBLFd5DJZZoN+ysaOpsUNRl0JO41+6bbI141l +DCmzWUG4iTI70zxsgzZGgEt0HlMDoIxElPcy/jDKi1IfEDmveK+QR9WphM40Ayvx +VTeA6g9WagmoHopQs/D/Kbi3Q8izFDfXTwA52DUxTjyUEFn0jEOiG9BFmnIkQ6LE +3WkIJFd3D0+5AQ0EVD0McwEIALRXukBsOrcA/rNJ4SV4I64cGdN8q9Gl5RpLl8cS +L5+SGHp6KoCL4daBqpbxdhE/Ylb3QmPt2SBZbTkwJ2yuczELOyhH6R13OWRWCgkd +dYLZsm/sEzu7dVoFQ4peKTGDzI8mQ/s157wRkz/8iSUYjJjeM3g0NI55FVcefibN +pOOFRaYGUh8itofRFOu7ipZ9F8zRJdBwqISe1gemNBR+O3G3Srm34PYu6sZRsdLU +Nf+81+/ynQWQseVpbz8X93sx/onIYIY0w+kxIE0oR/gBBjdsMOp7EfcvtbGTgplQ ++Zxln/pV2bVFkGkjKniFEEfi4eCPknCj0+67qKRt/Fc9n98AEQEAAYkBHwQYAQIA +CQUCVD0McwIbDAAKCRDtgd/RyhrTHmmcCACpTbjOYjvvr8/rD60bDyhnfcKvpavO +1/gZtMeEmw5gysp10mOXwhc2XuC3R1A6wVbVgGuOp5RxlxI4w8xwwxMFSp6u2rS5 +jm5slXBKB2i3KE6Sao9uZKP2K4nS8Qc+DhathfgafI39vPtBmsb1SJd5W1njNnYY +hARRpViUcVdfvW3VRpDACZ79PBs4ZQQ022NsNAPwm/AJvAw2S42Y9tjTnaLVRLfH +lzdErcGTBnfEIi0mQF/11k/THBJxx7vaFt8YXiDlWLUkg5XW3xK9mkETbaTv+/tB +X2+l7IOSt+31KQCBFN/VmhTySJOVQC1d2A56lSH2c/DWVClji+x3suzn +=xprj +-----END PGP PUBLIC KEY BLOCK----- +""" + +# key 0x1DDBAEB928D982F7: public key two uuids +#    uid                  anotheruser <anotheruser@leap.se> +#    uid                  Leap Test Key <leap@leap.se> +UUIDS_FINGERPRINT = "21690ED054C1B2F3ACE963D38FCC7DEFB4EE5A9B" +UUIDS_KEY = """ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1 + +mQENBFZwjz0BCADHpVg7js8PK9gQXx3Z+Jtj6gswYZpeXRdIUfZBSebWNGKwXxC9 +ZZDjnQc3l6Kezh7ra/hB6xulDbj3vXi66V279QSOuFAKMIudlJehb86bUiVk9Ppy +kdrn44P40ZdVmw2m61WrKnvBelKW7pIF/EB/dY1uUonSfR56f/BxL5a5jGi2uI2y +2hTPnZEksoKQsjsp1FckPFwVGzRKVzYl3lsorL5oiHd450G2B3VRw8AZ8Eqq6bzf +jNrrA3TOMmEIYdADPqqnBj+xbnOCGBsvx+iAhGRxUckVJqW92SXlNNds8kEyoE0t +9B6eqe0MrrlcK3SLe03j85T9f1o3An53rV/3ABEBAAG0HExlYXAgVGVzdCBLZXkg +PGxlYXBAbGVhcC5zZT6JAT0EEwEIACcFAlZwjz0CGwMFCRLMAwAFCwkIBwMFFQoJ +CAsFFgMCAQACHgECF4AACgkQj8x977TuWpu4ZggAgk6rVtOCqYwM720Bs3k+wsWu +IVPUqnlPbSWph/PKBKWYE/5HoIGdvfN9jJxwpCM5x/ivPe1zeJ0qa9SnO66kolHU +7qC8HRWC67R4znO4Zrs2I+SgwRHAPPbqMVPsNs5rS0D6DCcr+LXtJF+LLAsIwDfw +mXEsKbX5H5aBmmDnfq0pGx05E3tKs5l09VVESvVZYOCM9b4FtdLVvgbKAD+KYDW1 +5A/PzOvyYjZu2FGtPKmNmqHD3KW8cmrcI/7mRR08FnNGbbpgXPZ2GPKgkUllY9N7 +E9lg4eaYH2fIWun293kbqp8ueELZvoU1jUQrP5B+eqBWTvIucqdQqJaiWn9pELQh +YW5vdGhlcnVzZXIgPGFub3RoZXJ1c2VyQGxlYXAuc2U+iQE9BBMBCAAnBQJWcI9a +AhsDBQkSzAMABQsJCAcDBRUKCQgLBRYDAgEAAh4BAheAAAoJEI/Mfe+07lqblRMH +/17vK2WOd0F7EegA5ELOrM+QJPKpLK4e6WdROUpS1hvRQcAOqadCCpYPSTTG/HnO +d9/Q9Q/G3xHHlk6nl1qHRkVlp0iVWyBZFn1s8lgGz/FFUEXXRj7I5RGmKSNgDlqA +un2OrwB2m+DH6pMjizu/RUfIJM2bSgViuvjCQoaLYLcFiULJlWHb/2WgpvesFyAc +0oc9AkXuaCEo50XQlrt8Bh++6rfbAMAS7ZrHluFPIY+y4eVl+MU/QkoGYAVgiLLV +5tnvbDZWNs8ixw4ubqKXYj5mK55sapokhOqObEfY6D3p7YpdQO/IhBneCw9gKOxa +wYAPhCOrJC8JmE69I1Nk8Bu5AQ0EVnCPPQEIANUivsrR2jwb8C9wPONn0HS3YYCI +/IVlLdw/Ia23ogBF1Uh8ORNg1G/t0/6S7IKDZ2gGgWw25u9TjWRRWsxO9tjOPi2d +YuhwlQRnq5Or+LzIEKRs9GnJMLFT0kR9Nrhw4UyaN6tWkR9p1Py7ux8RLmDEMAs3 +fBfVMLMmQRerJ5SyCUiq/lm9aYTLCC+vkjE01C+2oI0gcWGfLDjiJbaD4AazzibP +fBe41BIk7WaCJyEcBqfrgW/Seof43FhSKRGgc5nx3HH1DMz9AtYfKnVS5DgoBGpO +hxgzIJN3/hFHPicRlYoHxLUE48GcFfQFEJ78RXeBuieXAkDxNczHnLkEPx8AEQEA +AYkBJQQYAQgADwUCVnCPPQIbDAUJEswDAAAKCRCPzH3vtO5amyRIB/9IsWUWrvbH +njw2ZCiIV++lHgIntAcuQIbZIjyMXoM+imHsPrsDOUT65yi9Xp1pUyZEKtGkZvP4 +p7HRzJL+RWiWEN7sgQfNqqev8BF2/xmxkmiSuXHJ0PSaC5DmLfFDyvvSU6H5VPud +NszKIHtyoS6ph6TH8GXzFmNiHaTOZKdmVxlyLj1/DN+d63M+ARZIe7gB6jmP/gg4 +o52icfTcqLkkppYn8g1A9bdJ3k8qqExNPTf2llDscuD9VzpebFbPqfcYqR71GfG7 +Kmg7qGnZtNac1ERvknI/fmmCQydGk5pOh0KUTgeLG2qB07cqCUBbOXaweNWbiM9E +vtQLNMD9Gn7D +=MCXv +-----END PGP PUBLIC KEY BLOCK----- +""" +UUIDS_PRIVATE = """ +-----BEGIN PGP PRIVATE KEY BLOCK----- +Version: GnuPG v1 + +lQOYBFZwjz0BCADHpVg7js8PK9gQXx3Z+Jtj6gswYZpeXRdIUfZBSebWNGKwXxC9 +ZZDjnQc3l6Kezh7ra/hB6xulDbj3vXi66V279QSOuFAKMIudlJehb86bUiVk9Ppy +kdrn44P40ZdVmw2m61WrKnvBelKW7pIF/EB/dY1uUonSfR56f/BxL5a5jGi2uI2y +2hTPnZEksoKQsjsp1FckPFwVGzRKVzYl3lsorL5oiHd450G2B3VRw8AZ8Eqq6bzf +jNrrA3TOMmEIYdADPqqnBj+xbnOCGBsvx+iAhGRxUckVJqW92SXlNNds8kEyoE0t +9B6eqe0MrrlcK3SLe03j85T9f1o3An53rV/3ABEBAAEAB/9Lzeg2lP7hz8/2R2da +QB8gTNl6wVSPx+DzQMuz9o+DfdiLB02f3FSrWBBJd3XzvmfXE+Prg423mgJFbtfM +gJdqqpnUZv9dHxmj96urTHyyVPqF3s7JecAYlDaj31EK3BjO7ERW/YaH7B432NXx +F9qVitjsrsJN/dv4v2NYVq1wPcdDB05ge9WP+KRec7xvdTudH4Kov0iMZ+1Nksfn +lrowGuMYBGWDlTNoBoEYxDD2lqVaiOjyjx5Ss8btS59IlXxApOFZTezekl7hUI2B +1fDQ1GELL6BKVKxApGSD5XAgVlqkek4RhoHmg4gKSymfbFV5oRp1v1kC0JIGvnB1 +W5/BBADKzagL4JRnhWGubLec917B3se/3y1aHrEmO3T0IzxnUMD5yvg81uJWi5Co +M05Nu/Ny/Fw1VgoF8MjiGnumB2KKytylu8LKLarDxPpLxabOBCQLHrLQOMsmesjR +Cg3iYl/EeM/ooAufaN4IObcu6Pa8//rwNE7Fz1ZsIyJefN4fnwQA/AOpqA2BvHoH +VRYh4NVuMLhF1YdKqcd/T/dtSqszcadkmG4+vAL76r3jYxScRoNGQaIkpBnzP0ry +Adb0NDuBgSe/Cn44kqT7JJxTMfJNrw2rBMMUYZHdQrck2pf5R4fZ74yJyvCKg5pQ +QAl1gTSi6PJvPwpc7m7Kr4kHBVDlgKkEAJKkVrtq/v2+jSA+/osa4YC5brsDQ08X +pvZf0MBkc5/GDfusHyE8HGFnVY5ycrS85TBCrhc7suFu59pF4wEeXsqxqNf02gRe +B+btPwR7yki73iyXs4cbuszHMD03UnbvItFAybD5CC+oR9kG5noI0TzJNUNX9Vkq +xATf819dhwtgTha0HExlYXAgVGVzdCBLZXkgPGxlYXBAbGVhcC5zZT6JAT0EEwEI +ACcFAlZwjz0CGwMFCRLMAwAFCwkIBwMFFQoJCAsFFgMCAQACHgECF4AACgkQj8x9 +77TuWpu4ZggAgk6rVtOCqYwM720Bs3k+wsWuIVPUqnlPbSWph/PKBKWYE/5HoIGd +vfN9jJxwpCM5x/ivPe1zeJ0qa9SnO66kolHU7qC8HRWC67R4znO4Zrs2I+SgwRHA +PPbqMVPsNs5rS0D6DCcr+LXtJF+LLAsIwDfwmXEsKbX5H5aBmmDnfq0pGx05E3tK +s5l09VVESvVZYOCM9b4FtdLVvgbKAD+KYDW15A/PzOvyYjZu2FGtPKmNmqHD3KW8 +cmrcI/7mRR08FnNGbbpgXPZ2GPKgkUllY9N7E9lg4eaYH2fIWun293kbqp8ueELZ +voU1jUQrP5B+eqBWTvIucqdQqJaiWn9pELQhYW5vdGhlcnVzZXIgPGFub3RoZXJ1 +c2VyQGxlYXAuc2U+iQE9BBMBCAAnBQJWcI9aAhsDBQkSzAMABQsJCAcDBRUKCQgL +BRYDAgEAAh4BAheAAAoJEI/Mfe+07lqblRMH/17vK2WOd0F7EegA5ELOrM+QJPKp +LK4e6WdROUpS1hvRQcAOqadCCpYPSTTG/HnOd9/Q9Q/G3xHHlk6nl1qHRkVlp0iV +WyBZFn1s8lgGz/FFUEXXRj7I5RGmKSNgDlqAun2OrwB2m+DH6pMjizu/RUfIJM2b +SgViuvjCQoaLYLcFiULJlWHb/2WgpvesFyAc0oc9AkXuaCEo50XQlrt8Bh++6rfb +AMAS7ZrHluFPIY+y4eVl+MU/QkoGYAVgiLLV5tnvbDZWNs8ixw4ubqKXYj5mK55s +apokhOqObEfY6D3p7YpdQO/IhBneCw9gKOxawYAPhCOrJC8JmE69I1Nk8BudA5gE +VnCPPQEIANUivsrR2jwb8C9wPONn0HS3YYCI/IVlLdw/Ia23ogBF1Uh8ORNg1G/t +0/6S7IKDZ2gGgWw25u9TjWRRWsxO9tjOPi2dYuhwlQRnq5Or+LzIEKRs9GnJMLFT +0kR9Nrhw4UyaN6tWkR9p1Py7ux8RLmDEMAs3fBfVMLMmQRerJ5SyCUiq/lm9aYTL +CC+vkjE01C+2oI0gcWGfLDjiJbaD4AazzibPfBe41BIk7WaCJyEcBqfrgW/Seof4 +3FhSKRGgc5nx3HH1DMz9AtYfKnVS5DgoBGpOhxgzIJN3/hFHPicRlYoHxLUE48Gc +FfQFEJ78RXeBuieXAkDxNczHnLkEPx8AEQEAAQAH+wRSCn0RCPP7+v/zLgDMG3Eq +QHs7C6dmmCnlS7j6Rnnr8HliL0QBy/yi3Q/Fia7RnBiDPT9k04SZdH3KmmUW2rEl +aSRCkv00PwkSUuuQ6l9lTNUQclnsnqSRlusVgLT3cNG9NJCwFgwFeLBQ2+ey0PZc +M78edlEDXNPc3CfvK8O7WK74YiNJqIQCs7aDJSv0s7O/asRQyMCsl/UYtMV6W03d +eauS3bM41ll7GVfHMgkChFUQHb+19JHzSq4yeqQ/vS30ASugFxB3Omomp95sRL/w +60y51faLyTKD4AN3FhDfeIEfh1ggN2UT70qzC3+F8TvxQQHEBhNQKlhWVbWTp+0E +ANkcyokvn+09OIO/YDxF3aB37gA3J37d6NXos6pdvqUPOVSHvmF/hiM0FO2To6vu +ex/WcDQafPm4eiW6oNllwtZhWU2tr34bZD4PIuktSX2Ax2v5QtZ4d1CVdDEwbYn/ +fmR+nif1fTKTljZragaI9Rt6NWhfh7UGt62iIKh0lbhLBAD7T5wHY8V1yqlnyByG +K7nt+IHnND2I7Hk58yxKjv2KUNYxWZeOAQTQmfQXjJ+BOmw6oHMmDmGvdjSxIE+9 +j9nezEONxzVVjEDTKBeEnUeDY1QGDyDyW1/AhLJ52yWGTNrmKcGV4KmaYnhDzq7Z +aqJVRcFMF9TAfhrEGGhRdD83/QQA6xAqjWiu6tbaDurVuce64mA1R3T7HJ81gEaX +I+eJNDJb7PK3dhFETgyc3mcepWFNJkoXqx2ADhG8jLqK4o/N/QlV5PQgeHmhz09V +Z7MNhivGxDKZoxX6Bouh+qs5OkatcGFhTz//+FHSfusV2emxNiwd4QIsizxaltqh +W1ke0bA7eYkBJQQYAQgADwUCVnCPPQIbDAUJEswDAAAKCRCPzH3vtO5amyRIB/9I +sWUWrvbHnjw2ZCiIV++lHgIntAcuQIbZIjyMXoM+imHsPrsDOUT65yi9Xp1pUyZE +KtGkZvP4p7HRzJL+RWiWEN7sgQfNqqev8BF2/xmxkmiSuXHJ0PSaC5DmLfFDyvvS +U6H5VPudNszKIHtyoS6ph6TH8GXzFmNiHaTOZKdmVxlyLj1/DN+d63M+ARZIe7gB +6jmP/gg4o52icfTcqLkkppYn8g1A9bdJ3k8qqExNPTf2llDscuD9VzpebFbPqfcY +qR71GfG7Kmg7qGnZtNac1ERvknI/fmmCQydGk5pOh0KUTgeLG2qB07cqCUBbOXaw +eNWbiM9EvtQLNMD9Gn7D +=/3u/ +-----END PGP PRIVATE KEY BLOCK----- +""" + +if __name__ == "__main__": +    unittest.main() diff --git a/keymanager/tox.ini b/keymanager/tox.ini new file mode 100644 index 0000000..7667788 --- /dev/null +++ b/keymanager/tox.ini @@ -0,0 +1,14 @@ +[tox] +envlist = py27 + +[testenv] +commands = py.test {posargs} +deps = +    pytest +    pdbpp +    mock +    setuptools-trial +    pep8 +    leap.soledad.client +setenv = +    HOME=/tmp diff --git a/keymanager/versioneer.py b/keymanager/versioneer.py new file mode 100644 index 0000000..7ed2a21 --- /dev/null +++ b/keymanager/versioneer.py @@ -0,0 +1,1774 @@ + +# Version: 0.16 + +"""The Versioneer - like a rocketeer, but for versions. + +The Versioneer +============== + +* like a rocketeer, but for versions! +* https://github.com/warner/python-versioneer +* Brian Warner +* License: Public Domain +* Compatible With: python2.6, 2.7, 3.3, 3.4, 3.5, and pypy +* [![Latest Version] +(https://pypip.in/version/versioneer/badge.svg?style=flat) +](https://pypi.python.org/pypi/versioneer/) +* [![Build Status] +(https://travis-ci.org/warner/python-versioneer.png?branch=master) +](https://travis-ci.org/warner/python-versioneer) + +This is a tool for managing a recorded version number in distutils-based +python projects. The goal is to remove the tedious and error-prone "update +the embedded version string" step from your release process. Making a new +release should be as easy as recording a new tag in your version-control +system, and maybe making new tarballs. + + +## Quick Install + +* `pip install versioneer` to somewhere to your $PATH +* add a `[versioneer]` section to your setup.cfg (see below) +* run `versioneer install` in your source tree, commit the results + +## Version Identifiers + +Source trees come from a variety of places: + +* a version-control system checkout (mostly used by developers) +* a nightly tarball, produced by build automation +* a snapshot tarball, produced by a web-based VCS browser, like github's +  "tarball from tag" feature +* a release tarball, produced by "setup.py sdist", distributed through PyPI + +Within each source tree, the version identifier (either a string or a number, +this tool is format-agnostic) can come from a variety of places: + +* ask the VCS tool itself, e.g. "git describe" (for checkouts), which knows +  about recent "tags" and an absolute revision-id +* the name of the directory into which the tarball was unpacked +* an expanded VCS keyword ($Id$, etc) +* a `_version.py` created by some earlier build step + +For released software, the version identifier is closely related to a VCS +tag. Some projects use tag names that include more than just the version +string (e.g. "myproject-1.2" instead of just "1.2"), in which case the tool +needs to strip the tag prefix to extract the version identifier. For +unreleased software (between tags), the version identifier should provide +enough information to help developers recreate the same tree, while also +giving them an idea of roughly how old the tree is (after version 1.2, before +version 1.3). Many VCS systems can report a description that captures this, +for example `git describe --tags --dirty --always` reports things like +"0.7-1-g574ab98-dirty" to indicate that the checkout is one revision past the +0.7 tag, has a unique revision id of "574ab98", and is "dirty" (it has +uncommitted changes. + +The version identifier is used for multiple purposes: + +* to allow the module to self-identify its version: `myproject.__version__` +* to choose a name and prefix for a 'setup.py sdist' tarball + +## Theory of Operation + +Versioneer works by adding a special `_version.py` file into your source +tree, where your `__init__.py` can import it. This `_version.py` knows how to +dynamically ask the VCS tool for version information at import time. + +`_version.py` also contains `$Revision$` markers, and the installation +process marks `_version.py` to have this marker rewritten with a tag name +during the `git archive` command. As a result, generated tarballs will +contain enough information to get the proper version. + +To allow `setup.py` to compute a version too, a `versioneer.py` is added to +the top level of your source tree, next to `setup.py` and the `setup.cfg` +that configures it. This overrides several distutils/setuptools commands to +compute the version when invoked, and changes `setup.py build` and `setup.py +sdist` to replace `_version.py` with a small static file that contains just +the generated version data. + +## Installation + +First, decide on values for the following configuration variables: + +* `VCS`: the version control system you use. Currently accepts "git". + +* `style`: the style of version string to be produced. See "Styles" below for +  details. Defaults to "pep440", which looks like +  `TAG[+DISTANCE.gSHORTHASH[.dirty]]`. + +* `versionfile_source`: + +  A project-relative pathname into which the generated version strings should +  be written. This is usually a `_version.py` next to your project's main +  `__init__.py` file, so it can be imported at runtime. If your project uses +  `src/myproject/__init__.py`, this should be `src/myproject/_version.py`. +  This file should be checked in to your VCS as usual: the copy created below +  by `setup.py setup_versioneer` will include code that parses expanded VCS +  keywords in generated tarballs. The 'build' and 'sdist' commands will +  replace it with a copy that has just the calculated version string. + +  This must be set even if your project does not have any modules (and will +  therefore never import `_version.py`), since "setup.py sdist" -based trees +  still need somewhere to record the pre-calculated version strings. Anywhere +  in the source tree should do. If there is a `__init__.py` next to your +  `_version.py`, the `setup.py setup_versioneer` command (described below) +  will append some `__version__`-setting assignments, if they aren't already +  present. + +* `versionfile_build`: + +  Like `versionfile_source`, but relative to the build directory instead of +  the source directory. These will differ when your setup.py uses +  'package_dir='. If you have `package_dir={'myproject': 'src/myproject'}`, +  then you will probably have `versionfile_build='myproject/_version.py'` and +  `versionfile_source='src/myproject/_version.py'`. + +  If this is set to None, then `setup.py build` will not attempt to rewrite +  any `_version.py` in the built tree. If your project does not have any +  libraries (e.g. if it only builds a script), then you should use +  `versionfile_build = None`. To actually use the computed version string, +  your `setup.py` will need to override `distutils.command.build_scripts` +  with a subclass that explicitly inserts a copy of +  `versioneer.get_version()` into your script file. See +  `test/demoapp-script-only/setup.py` for an example. + +* `tag_prefix`: + +  a string, like 'PROJECTNAME-', which appears at the start of all VCS tags. +  If your tags look like 'myproject-1.2.0', then you should use +  tag_prefix='myproject-'. If you use unprefixed tags like '1.2.0', this +  should be an empty string, using either `tag_prefix=` or `tag_prefix=''`. + +* `parentdir_prefix`: + +  a optional string, frequently the same as tag_prefix, which appears at the +  start of all unpacked tarball filenames. If your tarball unpacks into +  'myproject-1.2.0', this should be 'myproject-'. To disable this feature, +  just omit the field from your `setup.cfg`. + +This tool provides one script, named `versioneer`. That script has one mode, +"install", which writes a copy of `versioneer.py` into the current directory +and runs `versioneer.py setup` to finish the installation. + +To versioneer-enable your project: + +* 1: Modify your `setup.cfg`, adding a section named `[versioneer]` and +  populating it with the configuration values you decided earlier (note that +  the option names are not case-sensitive): + +  ```` +  [versioneer] +  VCS = git +  style = pep440 +  versionfile_source = src/myproject/_version.py +  versionfile_build = myproject/_version.py +  tag_prefix = +  parentdir_prefix = myproject- +  ```` + +* 2: Run `versioneer install`. This will do the following: + +  * copy `versioneer.py` into the top of your source tree +  * create `_version.py` in the right place (`versionfile_source`) +  * modify your `__init__.py` (if one exists next to `_version.py`) to define +    `__version__` (by calling a function from `_version.py`) +  * modify your `MANIFEST.in` to include both `versioneer.py` and the +    generated `_version.py` in sdist tarballs + +  `versioneer install` will complain about any problems it finds with your +  `setup.py` or `setup.cfg`. Run it multiple times until you have fixed all +  the problems. + +* 3: add a `import versioneer` to your setup.py, and add the following +  arguments to the setup() call: + +        version=versioneer.get_version(), +        cmdclass=versioneer.get_cmdclass(), + +* 4: commit these changes to your VCS. To make sure you won't forget, +  `versioneer install` will mark everything it touched for addition using +  `git add`. Don't forget to add `setup.py` and `setup.cfg` too. + +## Post-Installation Usage + +Once established, all uses of your tree from a VCS checkout should get the +current version string. All generated tarballs should include an embedded +version string (so users who unpack them will not need a VCS tool installed). + +If you distribute your project through PyPI, then the release process should +boil down to two steps: + +* 1: git tag 1.0 +* 2: python setup.py register sdist upload + +If you distribute it through github (i.e. users use github to generate +tarballs with `git archive`), the process is: + +* 1: git tag 1.0 +* 2: git push; git push --tags + +Versioneer will report "0+untagged.NUMCOMMITS.gHASH" until your tree has at +least one tag in its history. + +## Version-String Flavors + +Code which uses Versioneer can learn about its version string at runtime by +importing `_version` from your main `__init__.py` file and running the +`get_versions()` function. From the "outside" (e.g. in `setup.py`), you can +import the top-level `versioneer.py` and run `get_versions()`. + +Both functions return a dictionary with different flavors of version +information: + +* `['version']`: A condensed version string, rendered using the selected +  style. This is the most commonly used value for the project's version +  string. The default "pep440" style yields strings like `0.11`, +  `0.11+2.g1076c97`, or `0.11+2.g1076c97.dirty`. See the "Styles" section +  below for alternative styles. + +* `['full-revisionid']`: detailed revision identifier. For Git, this is the +  full SHA1 commit id, e.g. "1076c978a8d3cfc70f408fe5974aa6c092c949ac". + +* `['dirty']`: a boolean, True if the tree has uncommitted changes. Note that +  this is only accurate if run in a VCS checkout, otherwise it is likely to +  be False or None + +* `['error']`: if the version string could not be computed, this will be set +  to a string describing the problem, otherwise it will be None. It may be +  useful to throw an exception in setup.py if this is set, to avoid e.g. +  creating tarballs with a version string of "unknown". + +Some variants are more useful than others. Including `full-revisionid` in a +bug report should allow developers to reconstruct the exact code being tested +(or indicate the presence of local changes that should be shared with the +developers). `version` is suitable for display in an "about" box or a CLI +`--version` output: it can be easily compared against release notes and lists +of bugs fixed in various releases. + +The installer adds the following text to your `__init__.py` to place a basic +version in `YOURPROJECT.__version__`: + +    from ._version import get_versions +    __version__ = get_versions()['version'] +    del get_versions + +## Styles + +The setup.cfg `style=` configuration controls how the VCS information is +rendered into a version string. + +The default style, "pep440", produces a PEP440-compliant string, equal to the +un-prefixed tag name for actual releases, and containing an additional "local +version" section with more detail for in-between builds. For Git, this is +TAG[+DISTANCE.gHEX[.dirty]] , using information from `git describe --tags +--dirty --always`. For example "0.11+2.g1076c97.dirty" indicates that the +tree is like the "1076c97" commit but has uncommitted changes (".dirty"), and +that this commit is two revisions ("+2") beyond the "0.11" tag. For released +software (exactly equal to a known tag), the identifier will only contain the +stripped tag, e.g. "0.11". + +Other styles are available. See details.md in the Versioneer source tree for +descriptions. + +## Debugging + +Versioneer tries to avoid fatal errors: if something goes wrong, it will tend +to return a version of "0+unknown". To investigate the problem, run `setup.py +version`, which will run the version-lookup code in a verbose mode, and will +display the full contents of `get_versions()` (including the `error` string, +which may help identify what went wrong). + +## Updating Versioneer + +To upgrade your project to a new release of Versioneer, do the following: + +* install the new Versioneer (`pip install -U versioneer` or equivalent) +* edit `setup.cfg`, if necessary, to include any new configuration settings +  indicated by the release notes +* re-run `versioneer install` in your source tree, to replace +  `SRC/_version.py` +* commit any changed files + +### Upgrading to 0.16 + +Nothing special. + +### Upgrading to 0.15 + +Starting with this version, Versioneer is configured with a `[versioneer]` +section in your `setup.cfg` file. Earlier versions required the `setup.py` to +set attributes on the `versioneer` module immediately after import. The new +version will refuse to run (raising an exception during import) until you +have provided the necessary `setup.cfg` section. + +In addition, the Versioneer package provides an executable named +`versioneer`, and the installation process is driven by running `versioneer +install`. In 0.14 and earlier, the executable was named +`versioneer-installer` and was run without an argument. + +### Upgrading to 0.14 + +0.14 changes the format of the version string. 0.13 and earlier used +hyphen-separated strings like "0.11-2-g1076c97-dirty". 0.14 and beyond use a +plus-separated "local version" section strings, with dot-separated +components, like "0.11+2.g1076c97". PEP440-strict tools did not like the old +format, but should be ok with the new one. + +### Upgrading from 0.11 to 0.12 + +Nothing special. + +### Upgrading from 0.10 to 0.11 + +You must add a `versioneer.VCS = "git"` to your `setup.py` before re-running +`setup.py setup_versioneer`. This will enable the use of additional +version-control systems (SVN, etc) in the future. + +## Future Directions + +This tool is designed to make it easily extended to other version-control +systems: all VCS-specific components are in separate directories like +src/git/ . The top-level `versioneer.py` script is assembled from these +components by running make-versioneer.py . In the future, make-versioneer.py +will take a VCS name as an argument, and will construct a version of +`versioneer.py` that is specific to the given VCS. It might also take the +configuration arguments that are currently provided manually during +installation by editing setup.py . Alternatively, it might go the other +direction and include code from all supported VCS systems, reducing the +number of intermediate scripts. + + +## License + +To make Versioneer easier to embed, all its code is dedicated to the public +domain. The `_version.py` that it creates is also in the public domain. +Specifically, both are released under the Creative Commons "Public Domain +Dedication" license (CC0-1.0), as described in +https://creativecommons.org/publicdomain/zero/1.0/ . + +""" + +from __future__ import print_function +try: +    import configparser +except ImportError: +    import ConfigParser as configparser +import errno +import json +import os +import re +import subprocess +import sys + + +class VersioneerConfig: +    """Container for Versioneer configuration parameters.""" + + +def get_root(): +    """Get the project root directory. + +    We require that all commands are run from the project root, i.e. the +    directory that contains setup.py, setup.cfg, and versioneer.py . +    """ +    root = os.path.realpath(os.path.abspath(os.getcwd())) +    setup_py = os.path.join(root, "setup.py") +    versioneer_py = os.path.join(root, "versioneer.py") +    if not (os.path.exists(setup_py) or os.path.exists(versioneer_py)): +        # allow 'python path/to/setup.py COMMAND' +        root = os.path.dirname(os.path.realpath(os.path.abspath(sys.argv[0]))) +        setup_py = os.path.join(root, "setup.py") +        versioneer_py = os.path.join(root, "versioneer.py") +    if not (os.path.exists(setup_py) or os.path.exists(versioneer_py)): +        err = ("Versioneer was unable to run the project root directory. " +               "Versioneer requires setup.py to be executed from " +               "its immediate directory (like 'python setup.py COMMAND'), " +               "or in a way that lets it use sys.argv[0] to find the root " +               "(like 'python path/to/setup.py COMMAND').") +        raise VersioneerBadRootError(err) +    try: +        # Certain runtime workflows (setup.py install/develop in a setuptools +        # tree) execute all dependencies in a single python process, so +        # "versioneer" may be imported multiple times, and python's shared +        # module-import table will cache the first one. So we can't use +        # os.path.dirname(__file__), as that will find whichever +        # versioneer.py was first imported, even in later projects. +        me = os.path.realpath(os.path.abspath(__file__)) +        if os.path.splitext(me)[0] != os.path.splitext(versioneer_py)[0]: +            print("Warning: build in %s is using versioneer.py from %s" +                  % (os.path.dirname(me), versioneer_py)) +    except NameError: +        pass +    return root + + +def get_config_from_root(root): +    """Read the project setup.cfg file to determine Versioneer config.""" +    # This might raise EnvironmentError (if setup.cfg is missing), or +    # configparser.NoSectionError (if it lacks a [versioneer] section), or +    # configparser.NoOptionError (if it lacks "VCS="). See the docstring at +    # the top of versioneer.py for instructions on writing your setup.cfg . +    setup_cfg = os.path.join(root, "setup.cfg") +    parser = configparser.SafeConfigParser() +    with open(setup_cfg, "r") as f: +        parser.readfp(f) +    VCS = parser.get("versioneer", "VCS")  # mandatory + +    def get(parser, name): +        if parser.has_option("versioneer", name): +            return parser.get("versioneer", name) +        return None +    cfg = VersioneerConfig() +    cfg.VCS = VCS +    cfg.style = get(parser, "style") or "" +    cfg.versionfile_source = get(parser, "versionfile_source") +    cfg.versionfile_build = get(parser, "versionfile_build") +    cfg.tag_prefix = get(parser, "tag_prefix") +    if cfg.tag_prefix in ("''", '""'): +        cfg.tag_prefix = "" +    cfg.parentdir_prefix = get(parser, "parentdir_prefix") +    cfg.verbose = get(parser, "verbose") +    return cfg + + +class NotThisMethod(Exception): +    """Exception raised if a method is not valid for the current scenario.""" + +# these dictionaries contain VCS-specific tools +LONG_VERSION_PY = {} +HANDLERS = {} + + +def register_vcs_handler(vcs, method):  # decorator +    """Decorator to mark a method as the handler for a particular VCS.""" +    def decorate(f): +        """Store f in HANDLERS[vcs][method].""" +        if vcs not in HANDLERS: +            HANDLERS[vcs] = {} +        HANDLERS[vcs][method] = f +        return f +    return decorate + + +def run_command(commands, args, cwd=None, verbose=False, hide_stderr=False): +    """Call the given command(s).""" +    assert isinstance(commands, list) +    p = None +    for c in commands: +        try: +            dispcmd = str([c] + args) +            # remember shell=False, so use git.cmd on windows, not just git +            p = subprocess.Popen([c] + args, cwd=cwd, stdout=subprocess.PIPE, +                                 stderr=(subprocess.PIPE if hide_stderr +                                         else None)) +            break +        except EnvironmentError: +            e = sys.exc_info()[1] +            if e.errno == errno.ENOENT: +                continue +            if verbose: +                print("unable to run %s" % dispcmd) +                print(e) +            return None +    else: +        if verbose: +            print("unable to find command, tried %s" % (commands,)) +        return None +    stdout = p.communicate()[0].strip() +    if sys.version_info[0] >= 3: +        stdout = stdout.decode() +    if p.returncode != 0: +        if verbose: +            print("unable to run %s (error)" % dispcmd) +        return None +    return stdout +LONG_VERSION_PY['git'] = ''' +# This file helps to compute a version number in source trees obtained from +# git-archive tarball (such as those provided by githubs download-from-tag +# feature). Distribution tarballs (built by setup.py sdist) and build +# directories (produced by setup.py build) will contain a much shorter file +# that just contains the computed version number. + +# This file is released into the public domain. Generated by +# versioneer-0.16 (https://github.com/warner/python-versioneer) + +"""Git implementation of _version.py.""" + +import errno +import os +import re +import subprocess +import sys + + +def get_keywords(): +    """Get the keywords needed to look up the version information.""" +    # these strings will be replaced by git during git-archive. +    # setup.py/versioneer.py will grep for the variable names, so they must +    # each be defined on a line of their own. _version.py will just call +    # get_keywords(). +    git_refnames = "%(DOLLAR)sFormat:%%d%(DOLLAR)s" +    git_full = "%(DOLLAR)sFormat:%%H%(DOLLAR)s" +    keywords = {"refnames": git_refnames, "full": git_full} +    return keywords + + +class VersioneerConfig: +    """Container for Versioneer configuration parameters.""" + + +def get_config(): +    """Create, populate and return the VersioneerConfig() object.""" +    # these strings are filled in when 'setup.py versioneer' creates +    # _version.py +    cfg = VersioneerConfig() +    cfg.VCS = "git" +    cfg.style = "%(STYLE)s" +    cfg.tag_prefix = "%(TAG_PREFIX)s" +    cfg.parentdir_prefix = "%(PARENTDIR_PREFIX)s" +    cfg.versionfile_source = "%(VERSIONFILE_SOURCE)s" +    cfg.verbose = False +    return cfg + + +class NotThisMethod(Exception): +    """Exception raised if a method is not valid for the current scenario.""" + + +LONG_VERSION_PY = {} +HANDLERS = {} + + +def register_vcs_handler(vcs, method):  # decorator +    """Decorator to mark a method as the handler for a particular VCS.""" +    def decorate(f): +        """Store f in HANDLERS[vcs][method].""" +        if vcs not in HANDLERS: +            HANDLERS[vcs] = {} +        HANDLERS[vcs][method] = f +        return f +    return decorate + + +def run_command(commands, args, cwd=None, verbose=False, hide_stderr=False): +    """Call the given command(s).""" +    assert isinstance(commands, list) +    p = None +    for c in commands: +        try: +            dispcmd = str([c] + args) +            # remember shell=False, so use git.cmd on windows, not just git +            p = subprocess.Popen([c] + args, cwd=cwd, stdout=subprocess.PIPE, +                                 stderr=(subprocess.PIPE if hide_stderr +                                         else None)) +            break +        except EnvironmentError: +            e = sys.exc_info()[1] +            if e.errno == errno.ENOENT: +                continue +            if verbose: +                print("unable to run %%s" %% dispcmd) +                print(e) +            return None +    else: +        if verbose: +            print("unable to find command, tried %%s" %% (commands,)) +        return None +    stdout = p.communicate()[0].strip() +    if sys.version_info[0] >= 3: +        stdout = stdout.decode() +    if p.returncode != 0: +        if verbose: +            print("unable to run %%s (error)" %% dispcmd) +        return None +    return stdout + + +def versions_from_parentdir(parentdir_prefix, root, verbose): +    """Try to determine the version from the parent directory name. + +    Source tarballs conventionally unpack into a directory that includes +    both the project name and a version string. +    """ +    dirname = os.path.basename(root) +    if not dirname.startswith(parentdir_prefix): +        if verbose: +            print("guessing rootdir is '%%s', but '%%s' doesn't start with " +                  "prefix '%%s'" %% (root, dirname, parentdir_prefix)) +        raise NotThisMethod("rootdir doesn't start with parentdir_prefix") +    return {"version": dirname[len(parentdir_prefix):], +            "full-revisionid": None, +            "dirty": False, "error": None} + + +@register_vcs_handler("git", "get_keywords") +def git_get_keywords(versionfile_abs): +    """Extract version information from the given file.""" +    # the code embedded in _version.py can just fetch the value of these +    # keywords. When used from setup.py, we don't want to import _version.py, +    # so we do it with a regexp instead. This function is not used from +    # _version.py. +    keywords = {} +    try: +        f = open(versionfile_abs, "r") +        for line in f.readlines(): +            if line.strip().startswith("git_refnames ="): +                mo = re.search(r'=\s*"(.*)"', line) +                if mo: +                    keywords["refnames"] = mo.group(1) +            if line.strip().startswith("git_full ="): +                mo = re.search(r'=\s*"(.*)"', line) +                if mo: +                    keywords["full"] = mo.group(1) +        f.close() +    except EnvironmentError: +        pass +    return keywords + + +@register_vcs_handler("git", "keywords") +def git_versions_from_keywords(keywords, tag_prefix, verbose): +    """Get version information from git keywords.""" +    if not keywords: +        raise NotThisMethod("no keywords at all, weird") +    refnames = keywords["refnames"].strip() +    if refnames.startswith("$Format"): +        if verbose: +            print("keywords are unexpanded, not using") +        raise NotThisMethod("unexpanded keywords, not a git-archive tarball") +    refs = set([r.strip() for r in refnames.strip("()").split(",")]) +    # starting in git-1.8.3, tags are listed as "tag: foo-1.0" instead of +    # just "foo-1.0". If we see a "tag: " prefix, prefer those. +    TAG = "tag: " +    tags = set([r[len(TAG):] for r in refs if r.startswith(TAG)]) +    if not tags: +        # Either we're using git < 1.8.3, or there really are no tags. We use +        # a heuristic: assume all version tags have a digit. The old git %%d +        # expansion behaves like git log --decorate=short and strips out the +        # refs/heads/ and refs/tags/ prefixes that would let us distinguish +        # between branches and tags. By ignoring refnames without digits, we +        # filter out many common branch names like "release" and +        # "stabilization", as well as "HEAD" and "master". +        tags = set([r for r in refs if re.search(r'\d', r)]) +        if verbose: +            print("discarding '%%s', no digits" %% ",".join(refs-tags)) +    if verbose: +        print("likely tags: %%s" %% ",".join(sorted(tags))) +    for ref in sorted(tags): +        # sorting will prefer e.g. "2.0" over "2.0rc1" +        if ref.startswith(tag_prefix): +            r = ref[len(tag_prefix):] +            if verbose: +                print("picking %%s" %% r) +            return {"version": r, +                    "full-revisionid": keywords["full"].strip(), +                    "dirty": False, "error": None +                    } +    # no suitable tags, so version is "0+unknown", but full hex is still there +    if verbose: +        print("no suitable tags, using unknown + full revision id") +    return {"version": "0+unknown", +            "full-revisionid": keywords["full"].strip(), +            "dirty": False, "error": "no suitable tags"} + + +@register_vcs_handler("git", "pieces_from_vcs") +def git_pieces_from_vcs(tag_prefix, root, verbose, run_command=run_command): +    """Get version from 'git describe' in the root of the source tree. + +    This only gets called if the git-archive 'subst' keywords were *not* +    expanded, and _version.py hasn't already been rewritten with a short +    version string, meaning we're inside a checked out source tree. +    """ +    if not os.path.exists(os.path.join(root, ".git")): +        if verbose: +            print("no .git in %%s" %% root) +        raise NotThisMethod("no .git directory") + +    GITS = ["git"] +    if sys.platform == "win32": +        GITS = ["git.cmd", "git.exe"] +    # if there is a tag matching tag_prefix, this yields TAG-NUM-gHEX[-dirty] +    # if there isn't one, this yields HEX[-dirty] (no NUM) +    describe_out = run_command(GITS, ["describe", "--tags", "--dirty", +                                      "--always", "--long", +                                      "--match", "%%s*" %% tag_prefix], +                               cwd=root) +    # --long was added in git-1.5.5 +    if describe_out is None: +        raise NotThisMethod("'git describe' failed") +    describe_out = describe_out.strip() +    full_out = run_command(GITS, ["rev-parse", "HEAD"], cwd=root) +    if full_out is None: +        raise NotThisMethod("'git rev-parse' failed") +    full_out = full_out.strip() + +    pieces = {} +    pieces["long"] = full_out +    pieces["short"] = full_out[:7]  # maybe improved later +    pieces["error"] = None + +    # parse describe_out. It will be like TAG-NUM-gHEX[-dirty] or HEX[-dirty] +    # TAG might have hyphens. +    git_describe = describe_out + +    # look for -dirty suffix +    dirty = git_describe.endswith("-dirty") +    pieces["dirty"] = dirty +    if dirty: +        git_describe = git_describe[:git_describe.rindex("-dirty")] + +    # now we have TAG-NUM-gHEX or HEX + +    if "-" in git_describe: +        # TAG-NUM-gHEX +        mo = re.search(r'^(.+)-(\d+)-g([0-9a-f]+)$', git_describe) +        if not mo: +            # unparseable. Maybe git-describe is misbehaving? +            pieces["error"] = ("unable to parse git-describe output: '%%s'" +                               %% describe_out) +            return pieces + +        # tag +        full_tag = mo.group(1) +        if not full_tag.startswith(tag_prefix): +            if verbose: +                fmt = "tag '%%s' doesn't start with prefix '%%s'" +                print(fmt %% (full_tag, tag_prefix)) +            pieces["error"] = ("tag '%%s' doesn't start with prefix '%%s'" +                               %% (full_tag, tag_prefix)) +            return pieces +        pieces["closest-tag"] = full_tag[len(tag_prefix):] + +        # distance: number of commits since tag +        pieces["distance"] = int(mo.group(2)) + +        # commit: short hex revision ID +        pieces["short"] = mo.group(3) + +    else: +        # HEX: no tags +        pieces["closest-tag"] = None +        count_out = run_command(GITS, ["rev-list", "HEAD", "--count"], +                                cwd=root) +        pieces["distance"] = int(count_out)  # total number of commits + +    return pieces + + +def plus_or_dot(pieces): +    """Return a + if we don't already have one, else return a .""" +    if "+" in pieces.get("closest-tag", ""): +        return "." +    return "+" + + +def render_pep440(pieces): +    """Build up version string, with post-release "local version identifier". + +    Our goal: TAG[+DISTANCE.gHEX[.dirty]] . Note that if you +    get a tagged build and then dirty it, you'll get TAG+0.gHEX.dirty + +    Exceptions: +    1: no tags. git_describe was just HEX. 0+untagged.DISTANCE.gHEX[.dirty] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += plus_or_dot(pieces) +            rendered += "%%d.g%%s" %% (pieces["distance"], pieces["short"]) +            if pieces["dirty"]: +                rendered += ".dirty" +    else: +        # exception #1 +        rendered = "0+untagged.%%d.g%%s" %% (pieces["distance"], +                                          pieces["short"]) +        if pieces["dirty"]: +            rendered += ".dirty" +    return rendered + + +def render_pep440_pre(pieces): +    """TAG[.post.devDISTANCE] -- No -dirty. + +    Exceptions: +    1: no tags. 0.post.devDISTANCE +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"]: +            rendered += ".post.dev%%d" %% pieces["distance"] +    else: +        # exception #1 +        rendered = "0.post.dev%%d" %% pieces["distance"] +    return rendered + + +def render_pep440_post(pieces): +    """TAG[.postDISTANCE[.dev0]+gHEX] . + +    The ".dev0" means dirty. Note that .dev0 sorts backwards +    (a dirty tree will appear "older" than the corresponding clean one), +    but you shouldn't be releasing software with -dirty anyways. + +    Exceptions: +    1: no tags. 0.postDISTANCE[.dev0] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += ".post%%d" %% pieces["distance"] +            if pieces["dirty"]: +                rendered += ".dev0" +            rendered += plus_or_dot(pieces) +            rendered += "g%%s" %% pieces["short"] +    else: +        # exception #1 +        rendered = "0.post%%d" %% pieces["distance"] +        if pieces["dirty"]: +            rendered += ".dev0" +        rendered += "+g%%s" %% pieces["short"] +    return rendered + + +def render_pep440_old(pieces): +    """TAG[.postDISTANCE[.dev0]] . + +    The ".dev0" means dirty. + +    Eexceptions: +    1: no tags. 0.postDISTANCE[.dev0] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += ".post%%d" %% pieces["distance"] +            if pieces["dirty"]: +                rendered += ".dev0" +    else: +        # exception #1 +        rendered = "0.post%%d" %% pieces["distance"] +        if pieces["dirty"]: +            rendered += ".dev0" +    return rendered + + +def render_git_describe(pieces): +    """TAG[-DISTANCE-gHEX][-dirty]. + +    Like 'git describe --tags --dirty --always'. + +    Exceptions: +    1: no tags. HEX[-dirty]  (note: no 'g' prefix) +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"]: +            rendered += "-%%d-g%%s" %% (pieces["distance"], pieces["short"]) +    else: +        # exception #1 +        rendered = pieces["short"] +    if pieces["dirty"]: +        rendered += "-dirty" +    return rendered + + +def render_git_describe_long(pieces): +    """TAG-DISTANCE-gHEX[-dirty]. + +    Like 'git describe --tags --dirty --always -long'. +    The distance/hash is unconditional. + +    Exceptions: +    1: no tags. HEX[-dirty]  (note: no 'g' prefix) +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        rendered += "-%%d-g%%s" %% (pieces["distance"], pieces["short"]) +    else: +        # exception #1 +        rendered = pieces["short"] +    if pieces["dirty"]: +        rendered += "-dirty" +    return rendered + + +def render(pieces, style): +    """Render the given version pieces into the requested style.""" +    if pieces["error"]: +        return {"version": "unknown", +                "full-revisionid": pieces.get("long"), +                "dirty": None, +                "error": pieces["error"]} + +    if not style or style == "default": +        style = "pep440"  # the default + +    if style == "pep440": +        rendered = render_pep440(pieces) +    elif style == "pep440-pre": +        rendered = render_pep440_pre(pieces) +    elif style == "pep440-post": +        rendered = render_pep440_post(pieces) +    elif style == "pep440-old": +        rendered = render_pep440_old(pieces) +    elif style == "git-describe": +        rendered = render_git_describe(pieces) +    elif style == "git-describe-long": +        rendered = render_git_describe_long(pieces) +    else: +        raise ValueError("unknown style '%%s'" %% style) + +    return {"version": rendered, "full-revisionid": pieces["long"], +            "dirty": pieces["dirty"], "error": None} + + +def get_versions(): +    """Get version information or return default if unable to do so.""" +    # I am in _version.py, which lives at ROOT/VERSIONFILE_SOURCE. If we have +    # __file__, we can work backwards from there to the root. Some +    # py2exe/bbfreeze/non-CPython implementations don't do __file__, in which +    # case we can only use expanded keywords. + +    cfg = get_config() +    verbose = cfg.verbose + +    try: +        return git_versions_from_keywords(get_keywords(), cfg.tag_prefix, +                                          verbose) +    except NotThisMethod: +        pass + +    try: +        root = os.path.realpath(__file__) +        # versionfile_source is the relative path from the top of the source +        # tree (where the .git directory might live) to this file. Invert +        # this to find the root from __file__. +        for i in cfg.versionfile_source.split('/'): +            root = os.path.dirname(root) +    except NameError: +        return {"version": "0+unknown", "full-revisionid": None, +                "dirty": None, +                "error": "unable to find root of source tree"} + +    try: +        pieces = git_pieces_from_vcs(cfg.tag_prefix, root, verbose) +        return render(pieces, cfg.style) +    except NotThisMethod: +        pass + +    try: +        if cfg.parentdir_prefix: +            return versions_from_parentdir(cfg.parentdir_prefix, root, verbose) +    except NotThisMethod: +        pass + +    return {"version": "0+unknown", "full-revisionid": None, +            "dirty": None, +            "error": "unable to compute version"} +''' + + +@register_vcs_handler("git", "get_keywords") +def git_get_keywords(versionfile_abs): +    """Extract version information from the given file.""" +    # the code embedded in _version.py can just fetch the value of these +    # keywords. When used from setup.py, we don't want to import _version.py, +    # so we do it with a regexp instead. This function is not used from +    # _version.py. +    keywords = {} +    try: +        f = open(versionfile_abs, "r") +        for line in f.readlines(): +            if line.strip().startswith("git_refnames ="): +                mo = re.search(r'=\s*"(.*)"', line) +                if mo: +                    keywords["refnames"] = mo.group(1) +            if line.strip().startswith("git_full ="): +                mo = re.search(r'=\s*"(.*)"', line) +                if mo: +                    keywords["full"] = mo.group(1) +        f.close() +    except EnvironmentError: +        pass +    return keywords + + +@register_vcs_handler("git", "keywords") +def git_versions_from_keywords(keywords, tag_prefix, verbose): +    """Get version information from git keywords.""" +    if not keywords: +        raise NotThisMethod("no keywords at all, weird") +    refnames = keywords["refnames"].strip() +    if refnames.startswith("$Format"): +        if verbose: +            print("keywords are unexpanded, not using") +        raise NotThisMethod("unexpanded keywords, not a git-archive tarball") +    refs = set([r.strip() for r in refnames.strip("()").split(",")]) +    # starting in git-1.8.3, tags are listed as "tag: foo-1.0" instead of +    # just "foo-1.0". If we see a "tag: " prefix, prefer those. +    TAG = "tag: " +    tags = set([r[len(TAG):] for r in refs if r.startswith(TAG)]) +    if not tags: +        # Either we're using git < 1.8.3, or there really are no tags. We use +        # a heuristic: assume all version tags have a digit. The old git %d +        # expansion behaves like git log --decorate=short and strips out the +        # refs/heads/ and refs/tags/ prefixes that would let us distinguish +        # between branches and tags. By ignoring refnames without digits, we +        # filter out many common branch names like "release" and +        # "stabilization", as well as "HEAD" and "master". +        tags = set([r for r in refs if re.search(r'\d', r)]) +        if verbose: +            print("discarding '%s', no digits" % ",".join(refs-tags)) +    if verbose: +        print("likely tags: %s" % ",".join(sorted(tags))) +    for ref in sorted(tags): +        # sorting will prefer e.g. "2.0" over "2.0rc1" +        if ref.startswith(tag_prefix): +            r = ref[len(tag_prefix):] +            if verbose: +                print("picking %s" % r) +            return {"version": r, +                    "full-revisionid": keywords["full"].strip(), +                    "dirty": False, "error": None +                    } +    # no suitable tags, so version is "0+unknown", but full hex is still there +    if verbose: +        print("no suitable tags, using unknown + full revision id") +    return {"version": "0+unknown", +            "full-revisionid": keywords["full"].strip(), +            "dirty": False, "error": "no suitable tags"} + + +@register_vcs_handler("git", "pieces_from_vcs") +def git_pieces_from_vcs(tag_prefix, root, verbose, run_command=run_command): +    """Get version from 'git describe' in the root of the source tree. + +    This only gets called if the git-archive 'subst' keywords were *not* +    expanded, and _version.py hasn't already been rewritten with a short +    version string, meaning we're inside a checked out source tree. +    """ +    if not os.path.exists(os.path.join(root, ".git")): +        if verbose: +            print("no .git in %s" % root) +        raise NotThisMethod("no .git directory") + +    GITS = ["git"] +    if sys.platform == "win32": +        GITS = ["git.cmd", "git.exe"] +    # if there is a tag matching tag_prefix, this yields TAG-NUM-gHEX[-dirty] +    # if there isn't one, this yields HEX[-dirty] (no NUM) +    describe_out = run_command(GITS, ["describe", "--tags", "--dirty", +                                      "--always", "--long", +                                      "--match", "%s*" % tag_prefix], +                               cwd=root) +    # --long was added in git-1.5.5 +    if describe_out is None: +        raise NotThisMethod("'git describe' failed") +    describe_out = describe_out.strip() +    full_out = run_command(GITS, ["rev-parse", "HEAD"], cwd=root) +    if full_out is None: +        raise NotThisMethod("'git rev-parse' failed") +    full_out = full_out.strip() + +    pieces = {} +    pieces["long"] = full_out +    pieces["short"] = full_out[:7]  # maybe improved later +    pieces["error"] = None + +    # parse describe_out. It will be like TAG-NUM-gHEX[-dirty] or HEX[-dirty] +    # TAG might have hyphens. +    git_describe = describe_out + +    # look for -dirty suffix +    dirty = git_describe.endswith("-dirty") +    pieces["dirty"] = dirty +    if dirty: +        git_describe = git_describe[:git_describe.rindex("-dirty")] + +    # now we have TAG-NUM-gHEX or HEX + +    if "-" in git_describe: +        # TAG-NUM-gHEX +        mo = re.search(r'^(.+)-(\d+)-g([0-9a-f]+)$', git_describe) +        if not mo: +            # unparseable. Maybe git-describe is misbehaving? +            pieces["error"] = ("unable to parse git-describe output: '%s'" +                               % describe_out) +            return pieces + +        # tag +        full_tag = mo.group(1) +        if not full_tag.startswith(tag_prefix): +            if verbose: +                fmt = "tag '%s' doesn't start with prefix '%s'" +                print(fmt % (full_tag, tag_prefix)) +            pieces["error"] = ("tag '%s' doesn't start with prefix '%s'" +                               % (full_tag, tag_prefix)) +            return pieces +        pieces["closest-tag"] = full_tag[len(tag_prefix):] + +        # distance: number of commits since tag +        pieces["distance"] = int(mo.group(2)) + +        # commit: short hex revision ID +        pieces["short"] = mo.group(3) + +    else: +        # HEX: no tags +        pieces["closest-tag"] = None +        count_out = run_command(GITS, ["rev-list", "HEAD", "--count"], +                                cwd=root) +        pieces["distance"] = int(count_out)  # total number of commits + +    return pieces + + +def do_vcs_install(manifest_in, versionfile_source, ipy): +    """Git-specific installation logic for Versioneer. + +    For Git, this means creating/changing .gitattributes to mark _version.py +    for export-time keyword substitution. +    """ +    GITS = ["git"] +    if sys.platform == "win32": +        GITS = ["git.cmd", "git.exe"] +    files = [manifest_in, versionfile_source] +    if ipy: +        files.append(ipy) +    try: +        me = __file__ +        if me.endswith(".pyc") or me.endswith(".pyo"): +            me = os.path.splitext(me)[0] + ".py" +        versioneer_file = os.path.relpath(me) +    except NameError: +        versioneer_file = "versioneer.py" +    files.append(versioneer_file) +    present = False +    try: +        f = open(".gitattributes", "r") +        for line in f.readlines(): +            if line.strip().startswith(versionfile_source): +                if "export-subst" in line.strip().split()[1:]: +                    present = True +        f.close() +    except EnvironmentError: +        pass +    if not present: +        f = open(".gitattributes", "a+") +        f.write("%s export-subst\n" % versionfile_source) +        f.close() +        files.append(".gitattributes") +    run_command(GITS, ["add", "--"] + files) + + +def versions_from_parentdir(parentdir_prefix, root, verbose): +    """Try to determine the version from the parent directory name. + +    Source tarballs conventionally unpack into a directory that includes +    both the project name and a version string. +    """ +    dirname = os.path.basename(root) +    if not dirname.startswith(parentdir_prefix): +        if verbose: +            print("guessing rootdir is '%s', but '%s' doesn't start with " +                  "prefix '%s'" % (root, dirname, parentdir_prefix)) +        raise NotThisMethod("rootdir doesn't start with parentdir_prefix") +    return {"version": dirname[len(parentdir_prefix):], +            "full-revisionid": None, +            "dirty": False, "error": None} + +SHORT_VERSION_PY = """ +# This file was generated by 'versioneer.py' (0.16) from +# revision-control system data, or from the parent directory name of an +# unpacked source archive. Distribution tarballs contain a pre-generated copy +# of this file. + +import json +import sys + +version_json = ''' +%s +'''  # END VERSION_JSON + + +def get_versions(): +    return json.loads(version_json) +""" + + +def versions_from_file(filename): +    """Try to determine the version from _version.py if present.""" +    try: +        with open(filename) as f: +            contents = f.read() +    except EnvironmentError: +        raise NotThisMethod("unable to read _version.py") +    mo = re.search(r"version_json = '''\n(.*)'''  # END VERSION_JSON", +                   contents, re.M | re.S) +    if not mo: +        raise NotThisMethod("no version_json in _version.py") +    return json.loads(mo.group(1)) + + +def write_to_version_file(filename, versions): +    """Write the given version number to the given _version.py file.""" +    os.unlink(filename) +    contents = json.dumps(versions, sort_keys=True, +                          indent=1, separators=(",", ": ")) +    with open(filename, "w") as f: +        f.write(SHORT_VERSION_PY % contents) + +    print("set %s to '%s'" % (filename, versions["version"])) + + +def plus_or_dot(pieces): +    """Return a + if we don't already have one, else return a .""" +    if "+" in pieces.get("closest-tag", ""): +        return "." +    return "+" + + +def render_pep440(pieces): +    """Build up version string, with post-release "local version identifier". + +    Our goal: TAG[+DISTANCE.gHEX[.dirty]] . Note that if you +    get a tagged build and then dirty it, you'll get TAG+0.gHEX.dirty + +    Exceptions: +    1: no tags. git_describe was just HEX. 0+untagged.DISTANCE.gHEX[.dirty] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += plus_or_dot(pieces) +            rendered += "%d.g%s" % (pieces["distance"], pieces["short"]) +            if pieces["dirty"]: +                rendered += ".dirty" +    else: +        # exception #1 +        rendered = "0+untagged.%d.g%s" % (pieces["distance"], +                                          pieces["short"]) +        if pieces["dirty"]: +            rendered += ".dirty" +    return rendered + + +def render_pep440_pre(pieces): +    """TAG[.post.devDISTANCE] -- No -dirty. + +    Exceptions: +    1: no tags. 0.post.devDISTANCE +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"]: +            rendered += ".post.dev%d" % pieces["distance"] +    else: +        # exception #1 +        rendered = "0.post.dev%d" % pieces["distance"] +    return rendered + + +def render_pep440_post(pieces): +    """TAG[.postDISTANCE[.dev0]+gHEX] . + +    The ".dev0" means dirty. Note that .dev0 sorts backwards +    (a dirty tree will appear "older" than the corresponding clean one), +    but you shouldn't be releasing software with -dirty anyways. + +    Exceptions: +    1: no tags. 0.postDISTANCE[.dev0] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += ".post%d" % pieces["distance"] +            if pieces["dirty"]: +                rendered += ".dev0" +            rendered += plus_or_dot(pieces) +            rendered += "g%s" % pieces["short"] +    else: +        # exception #1 +        rendered = "0.post%d" % pieces["distance"] +        if pieces["dirty"]: +            rendered += ".dev0" +        rendered += "+g%s" % pieces["short"] +    return rendered + + +def render_pep440_old(pieces): +    """TAG[.postDISTANCE[.dev0]] . + +    The ".dev0" means dirty. + +    Eexceptions: +    1: no tags. 0.postDISTANCE[.dev0] +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"] or pieces["dirty"]: +            rendered += ".post%d" % pieces["distance"] +            if pieces["dirty"]: +                rendered += ".dev0" +    else: +        # exception #1 +        rendered = "0.post%d" % pieces["distance"] +        if pieces["dirty"]: +            rendered += ".dev0" +    return rendered + + +def render_git_describe(pieces): +    """TAG[-DISTANCE-gHEX][-dirty]. + +    Like 'git describe --tags --dirty --always'. + +    Exceptions: +    1: no tags. HEX[-dirty]  (note: no 'g' prefix) +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        if pieces["distance"]: +            rendered += "-%d-g%s" % (pieces["distance"], pieces["short"]) +    else: +        # exception #1 +        rendered = pieces["short"] +    if pieces["dirty"]: +        rendered += "-dirty" +    return rendered + + +def render_git_describe_long(pieces): +    """TAG-DISTANCE-gHEX[-dirty]. + +    Like 'git describe --tags --dirty --always -long'. +    The distance/hash is unconditional. + +    Exceptions: +    1: no tags. HEX[-dirty]  (note: no 'g' prefix) +    """ +    if pieces["closest-tag"]: +        rendered = pieces["closest-tag"] +        rendered += "-%d-g%s" % (pieces["distance"], pieces["short"]) +    else: +        # exception #1 +        rendered = pieces["short"] +    if pieces["dirty"]: +        rendered += "-dirty" +    return rendered + + +def render(pieces, style): +    """Render the given version pieces into the requested style.""" +    if pieces["error"]: +        return {"version": "unknown", +                "full-revisionid": pieces.get("long"), +                "dirty": None, +                "error": pieces["error"]} + +    if not style or style == "default": +        style = "pep440"  # the default + +    if style == "pep440": +        rendered = render_pep440(pieces) +    elif style == "pep440-pre": +        rendered = render_pep440_pre(pieces) +    elif style == "pep440-post": +        rendered = render_pep440_post(pieces) +    elif style == "pep440-old": +        rendered = render_pep440_old(pieces) +    elif style == "git-describe": +        rendered = render_git_describe(pieces) +    elif style == "git-describe-long": +        rendered = render_git_describe_long(pieces) +    else: +        raise ValueError("unknown style '%s'" % style) + +    return {"version": rendered, "full-revisionid": pieces["long"], +            "dirty": pieces["dirty"], "error": None} + + +class VersioneerBadRootError(Exception): +    """The project root directory is unknown or missing key files.""" + + +def get_versions(verbose=False): +    """Get the project version from whatever source is available. + +    Returns dict with two keys: 'version' and 'full'. +    """ +    if "versioneer" in sys.modules: +        # see the discussion in cmdclass.py:get_cmdclass() +        del sys.modules["versioneer"] + +    root = get_root() +    cfg = get_config_from_root(root) + +    assert cfg.VCS is not None, "please set [versioneer]VCS= in setup.cfg" +    handlers = HANDLERS.get(cfg.VCS) +    assert handlers, "unrecognized VCS '%s'" % cfg.VCS +    verbose = verbose or cfg.verbose +    assert cfg.versionfile_source is not None, \ +        "please set versioneer.versionfile_source" +    assert cfg.tag_prefix is not None, "please set versioneer.tag_prefix" + +    versionfile_abs = os.path.join(root, cfg.versionfile_source) + +    # extract version from first of: _version.py, VCS command (e.g. 'git +    # describe'), parentdir. This is meant to work for developers using a +    # source checkout, for users of a tarball created by 'setup.py sdist', +    # and for users of a tarball/zipball created by 'git archive' or github's +    # download-from-tag feature or the equivalent in other VCSes. + +    get_keywords_f = handlers.get("get_keywords") +    from_keywords_f = handlers.get("keywords") +    if get_keywords_f and from_keywords_f: +        try: +            keywords = get_keywords_f(versionfile_abs) +            ver = from_keywords_f(keywords, cfg.tag_prefix, verbose) +            if verbose: +                print("got version from expanded keyword %s" % ver) +            return ver +        except NotThisMethod: +            pass + +    try: +        ver = versions_from_file(versionfile_abs) +        if verbose: +            print("got version from file %s %s" % (versionfile_abs, ver)) +        return ver +    except NotThisMethod: +        pass + +    from_vcs_f = handlers.get("pieces_from_vcs") +    if from_vcs_f: +        try: +            pieces = from_vcs_f(cfg.tag_prefix, root, verbose) +            ver = render(pieces, cfg.style) +            if verbose: +                print("got version from VCS %s" % ver) +            return ver +        except NotThisMethod: +            pass + +    try: +        if cfg.parentdir_prefix: +            ver = versions_from_parentdir(cfg.parentdir_prefix, root, verbose) +            if verbose: +                print("got version from parentdir %s" % ver) +            return ver +    except NotThisMethod: +        pass + +    if verbose: +        print("unable to compute version") + +    return {"version": "0+unknown", "full-revisionid": None, +            "dirty": None, "error": "unable to compute version"} + + +def get_version(): +    """Get the short version string for this project.""" +    return get_versions()["version"] + + +def get_cmdclass(): +    """Get the custom setuptools/distutils subclasses used by Versioneer.""" +    if "versioneer" in sys.modules: +        del sys.modules["versioneer"] +        # this fixes the "python setup.py develop" case (also 'install' and +        # 'easy_install .'), in which subdependencies of the main project are +        # built (using setup.py bdist_egg) in the same python process. Assume +        # a main project A and a dependency B, which use different versions +        # of Versioneer. A's setup.py imports A's Versioneer, leaving it in +        # sys.modules by the time B's setup.py is executed, causing B to run +        # with the wrong versioneer. Setuptools wraps the sub-dep builds in a +        # sandbox that restores sys.modules to it's pre-build state, so the +        # parent is protected against the child's "import versioneer". By +        # removing ourselves from sys.modules here, before the child build +        # happens, we protect the child from the parent's versioneer too. +        # Also see https://github.com/warner/python-versioneer/issues/52 + +    cmds = {} + +    # we add "version" to both distutils and setuptools +    from distutils.core import Command + +    class cmd_version(Command): +        description = "report generated version string" +        user_options = [] +        boolean_options = [] + +        def initialize_options(self): +            pass + +        def finalize_options(self): +            pass + +        def run(self): +            vers = get_versions(verbose=True) +            print("Version: %s" % vers["version"]) +            print(" full-revisionid: %s" % vers.get("full-revisionid")) +            print(" dirty: %s" % vers.get("dirty")) +            if vers["error"]: +                print(" error: %s" % vers["error"]) +    cmds["version"] = cmd_version + +    # we override "build_py" in both distutils and setuptools +    # +    # most invocation pathways end up running build_py: +    #  distutils/build -> build_py +    #  distutils/install -> distutils/build ->.. +    #  setuptools/bdist_wheel -> distutils/install ->.. +    #  setuptools/bdist_egg -> distutils/install_lib -> build_py +    #  setuptools/install -> bdist_egg ->.. +    #  setuptools/develop -> ? + +    # we override different "build_py" commands for both environments +    if "setuptools" in sys.modules: +        from setuptools.command.build_py import build_py as _build_py +    else: +        from distutils.command.build_py import build_py as _build_py + +    class cmd_build_py(_build_py): +        def run(self): +            root = get_root() +            cfg = get_config_from_root(root) +            versions = get_versions() +            _build_py.run(self) +            # now locate _version.py in the new build/ directory and replace +            # it with an updated value +            if cfg.versionfile_build: +                target_versionfile = os.path.join(self.build_lib, +                                                  cfg.versionfile_build) +                print("UPDATING %s" % target_versionfile) +                write_to_version_file(target_versionfile, versions) +    cmds["build_py"] = cmd_build_py + +    if "cx_Freeze" in sys.modules:  # cx_freeze enabled? +        from cx_Freeze.dist import build_exe as _build_exe + +        class cmd_build_exe(_build_exe): +            def run(self): +                root = get_root() +                cfg = get_config_from_root(root) +                versions = get_versions() +                target_versionfile = cfg.versionfile_source +                print("UPDATING %s" % target_versionfile) +                write_to_version_file(target_versionfile, versions) + +                _build_exe.run(self) +                os.unlink(target_versionfile) +                with open(cfg.versionfile_source, "w") as f: +                    LONG = LONG_VERSION_PY[cfg.VCS] +                    f.write(LONG % +                            {"DOLLAR": "$", +                             "STYLE": cfg.style, +                             "TAG_PREFIX": cfg.tag_prefix, +                             "PARENTDIR_PREFIX": cfg.parentdir_prefix, +                             "VERSIONFILE_SOURCE": cfg.versionfile_source, +                             }) +        cmds["build_exe"] = cmd_build_exe +        del cmds["build_py"] + +    # we override different "sdist" commands for both environments +    if "setuptools" in sys.modules: +        from setuptools.command.sdist import sdist as _sdist +    else: +        from distutils.command.sdist import sdist as _sdist + +    class cmd_sdist(_sdist): +        def run(self): +            versions = get_versions() +            self._versioneer_generated_versions = versions +            # unless we update this, the command will keep using the old +            # version +            self.distribution.metadata.version = versions["version"] +            return _sdist.run(self) + +        def make_release_tree(self, base_dir, files): +            root = get_root() +            cfg = get_config_from_root(root) +            _sdist.make_release_tree(self, base_dir, files) +            # now locate _version.py in the new base_dir directory +            # (remembering that it may be a hardlink) and replace it with an +            # updated value +            target_versionfile = os.path.join(base_dir, cfg.versionfile_source) +            print("UPDATING %s" % target_versionfile) +            write_to_version_file(target_versionfile, +                                  self._versioneer_generated_versions) +    cmds["sdist"] = cmd_sdist + +    return cmds + + +CONFIG_ERROR = """ +setup.cfg is missing the necessary Versioneer configuration. You need +a section like: + + [versioneer] + VCS = git + style = pep440 + versionfile_source = src/myproject/_version.py + versionfile_build = myproject/_version.py + tag_prefix = + parentdir_prefix = myproject- + +You will also need to edit your setup.py to use the results: + + import versioneer + setup(version=versioneer.get_version(), +       cmdclass=versioneer.get_cmdclass(), ...) + +Please read the docstring in ./versioneer.py for configuration instructions, +edit setup.cfg, and re-run the installer or 'python versioneer.py setup'. +""" + +SAMPLE_CONFIG = """ +# See the docstring in versioneer.py for instructions. Note that you must +# re-run 'versioneer.py setup' after changing this section, and commit the +# resulting files. + +[versioneer] +#VCS = git +#style = pep440 +#versionfile_source = +#versionfile_build = +#tag_prefix = +#parentdir_prefix = + +""" + +INIT_PY_SNIPPET = """ +from ._version import get_versions +__version__ = get_versions()['version'] +del get_versions +""" + + +def do_setup(): +    """Main VCS-independent setup function for installing Versioneer.""" +    root = get_root() +    try: +        cfg = get_config_from_root(root) +    except (EnvironmentError, configparser.NoSectionError, +            configparser.NoOptionError) as e: +        if isinstance(e, (EnvironmentError, configparser.NoSectionError)): +            print("Adding sample versioneer config to setup.cfg", +                  file=sys.stderr) +            with open(os.path.join(root, "setup.cfg"), "a") as f: +                f.write(SAMPLE_CONFIG) +        print(CONFIG_ERROR, file=sys.stderr) +        return 1 + +    print(" creating %s" % cfg.versionfile_source) +    with open(cfg.versionfile_source, "w") as f: +        LONG = LONG_VERSION_PY[cfg.VCS] +        f.write(LONG % {"DOLLAR": "$", +                        "STYLE": cfg.style, +                        "TAG_PREFIX": cfg.tag_prefix, +                        "PARENTDIR_PREFIX": cfg.parentdir_prefix, +                        "VERSIONFILE_SOURCE": cfg.versionfile_source, +                        }) + +    ipy = os.path.join(os.path.dirname(cfg.versionfile_source), +                       "__init__.py") +    if os.path.exists(ipy): +        try: +            with open(ipy, "r") as f: +                old = f.read() +        except EnvironmentError: +            old = "" +        if INIT_PY_SNIPPET not in old: +            print(" appending to %s" % ipy) +            with open(ipy, "a") as f: +                f.write(INIT_PY_SNIPPET) +        else: +            print(" %s unmodified" % ipy) +    else: +        print(" %s doesn't exist, ok" % ipy) +        ipy = None + +    # Make sure both the top-level "versioneer.py" and versionfile_source +    # (PKG/_version.py, used by runtime code) are in MANIFEST.in, so +    # they'll be copied into source distributions. Pip won't be able to +    # install the package without this. +    manifest_in = os.path.join(root, "MANIFEST.in") +    simple_includes = set() +    try: +        with open(manifest_in, "r") as f: +            for line in f: +                if line.startswith("include "): +                    for include in line.split()[1:]: +                        simple_includes.add(include) +    except EnvironmentError: +        pass +    # That doesn't cover everything MANIFEST.in can do +    # (http://docs.python.org/2/distutils/sourcedist.html#commands), so +    # it might give some false negatives. Appending redundant 'include' +    # lines is safe, though. +    if "versioneer.py" not in simple_includes: +        print(" appending 'versioneer.py' to MANIFEST.in") +        with open(manifest_in, "a") as f: +            f.write("include versioneer.py\n") +    else: +        print(" 'versioneer.py' already in MANIFEST.in") +    if cfg.versionfile_source not in simple_includes: +        print(" appending versionfile_source ('%s') to MANIFEST.in" % +              cfg.versionfile_source) +        with open(manifest_in, "a") as f: +            f.write("include %s\n" % cfg.versionfile_source) +    else: +        print(" versionfile_source already in MANIFEST.in") + +    # Make VCS-specific changes. For git, this means creating/changing +    # .gitattributes to mark _version.py for export-time keyword +    # substitution. +    do_vcs_install(manifest_in, cfg.versionfile_source, ipy) +    return 0 + + +def scan_setup_py(): +    """Validate the contents of setup.py against Versioneer's expectations.""" +    found = set() +    setters = False +    errors = 0 +    with open("setup.py", "r") as f: +        for line in f.readlines(): +            if "import versioneer" in line: +                found.add("import") +            if "versioneer.get_cmdclass()" in line: +                found.add("cmdclass") +            if "versioneer.get_version()" in line: +                found.add("get_version") +            if "versioneer.VCS" in line: +                setters = True +            if "versioneer.versionfile_source" in line: +                setters = True +    if len(found) != 3: +        print("") +        print("Your setup.py appears to be missing some important items") +        print("(but I might be wrong). Please make sure it has something") +        print("roughly like the following:") +        print("") +        print(" import versioneer") +        print(" setup( version=versioneer.get_version(),") +        print("        cmdclass=versioneer.get_cmdclass(),  ...)") +        print("") +        errors += 1 +    if setters: +        print("You should remove lines like 'versioneer.VCS = ' and") +        print("'versioneer.versionfile_source = ' . This configuration") +        print("now lives in setup.cfg, and should be removed from setup.py") +        print("") +        errors += 1 +    return errors + +if __name__ == "__main__": +    cmd = sys.argv[1] +    if cmd == "setup": +        errors = do_setup() +        errors += scan_setup_py() +        if errors: +            sys.exit(1) | 
