ca71942445
This removes (guix hash) and (guix pk-crypto), which now live as part of Guile-Gcrypt (version 0.1.0.) * guix/gcrypt.scm, guix/hash.scm, guix/pk-crypto.scm, tests/hash.scm, tests/pk-crypto.scm: Remove. * configure.ac: Test for Guile-Gcrypt. Remove LIBGCRYPT and LIBGCRYPT_LIBDIR assignments. * m4/guix.m4 (GUIX_ASSERT_LIBGCRYPT_USABLE): Remove. * README: Add Guile-Gcrypt to the dependencies; move libgcrypt as "required unless --disable-daemon". * doc/guix.texi (Requirements): Likewise. * gnu/packages/bash.scm, guix/derivations.scm, guix/docker.scm, guix/git.scm, guix/http-client.scm, guix/import/cpan.scm, guix/import/cran.scm, guix/import/crate.scm, guix/import/elpa.scm, guix/import/gnu.scm, guix/import/hackage.scm, guix/import/texlive.scm, guix/import/utils.scm, guix/nar.scm, guix/pki.scm, guix/scripts/archive.scm, guix/scripts/authenticate.scm, guix/scripts/download.scm, guix/scripts/hash.scm, guix/scripts/pack.scm, guix/scripts/publish.scm, guix/scripts/refresh.scm, guix/scripts/substitute.scm, guix/store.scm, guix/store/deduplication.scm, guix/tests.scm, tests/base32.scm, tests/builders.scm, tests/challenge.scm, tests/cpan.scm, tests/crate.scm, tests/derivations.scm, tests/gem.scm, tests/nar.scm, tests/opam.scm, tests/pki.scm, tests/publish.scm, tests/pypi.scm, tests/store-deduplication.scm, tests/store.scm, tests/substitute.scm: Adjust imports. * gnu/system/vm.scm: Likewise. (guile-sqlite3&co): Rename to... (gcrypt-sqlite3&co): ... this. Add GUILE-GCRYPT. (expression->derivation-in-linux-vm)[config]: Remove. (iso9660-image)[config]: Remove. (qemu-image)[config]: Remove. (system-docker-image)[config]: Remove. * guix/scripts/pack.scm: Adjust imports. (guile-sqlite3&co): Rename to... (gcrypt-sqlite3&co): ... this. Add GUILE-GCRYPT. (self-contained-tarball)[build]: Call 'make-config.scm' without #:libgcrypt argument. (squashfs-image)[libgcrypt]: Remove. [build]: Call 'make-config.scm' without #:libgcrypt. (docker-image)[config, json]: Remove. [build]: Add GUILE-GCRYPT to the extensions Remove (guix config) from the imported modules. * guix/self.scm (specification->package): Remove "libgcrypt", add "guile-gcrypt". (compiled-guix): Remove #:libgcrypt. [guile-gcrypt]: New variable. [dependencies]: Add it. [*core-modules*]: Remove #:libgcrypt from 'make-config.scm' call. Add #:extensions. [*config*]: Remove #:libgcrypt from 'make-config.scm' call. (%dependency-variables): Remove %libgcrypt. (make-config.scm): Remove #:libgcrypt. * build-aux/build-self.scm (guile-gcrypt): New variable. (make-config.scm): Remove #:libgcrypt. (build-program)[fake-gcrypt-hash]: New variable. Add (gcrypt hash) to the imported modules. Adjust load path assignments. * gnu/packages/package-management.scm (guix)[propagated-inputs]: Add GUILE-GCRYPT. [arguments]: In 'wrap-program' phase, add GUILE-GCRYPT to the search path.
130 lines
5.3 KiB
Scheme
130 lines
5.3 KiB
Scheme
;;; GNU Guix --- Functional package management for GNU
|
||
;;; Copyright © 2013, 2014, 2015, 2016, 2017 Ludovic Courtès <ludo@gnu.org>
|
||
;;;
|
||
;;; This file is part of GNU Guix.
|
||
;;;
|
||
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
||
;;; under the terms of the GNU General Public License as published by
|
||
;;; the Free Software Foundation; either version 3 of the License, or (at
|
||
;;; your option) any later version.
|
||
;;;
|
||
;;; GNU Guix is distributed in the hope that it will be useful, but
|
||
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
;;; GNU General Public License for more details.
|
||
;;;
|
||
;;; You should have received a copy of the GNU General Public License
|
||
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
||
|
||
(define-module (guix scripts authenticate)
|
||
#:use-module (guix config)
|
||
#:use-module (guix base16)
|
||
#:use-module (gcrypt pk-crypto)
|
||
#:use-module (guix pki)
|
||
#:use-module (guix ui)
|
||
#:use-module (ice-9 binary-ports)
|
||
#:use-module (ice-9 rdelim)
|
||
#:use-module (ice-9 match)
|
||
#:export (guix-authenticate))
|
||
|
||
;;; Commentary:
|
||
;;;
|
||
;;; This program is used internally by the daemon to sign exported archive
|
||
;;; (the 'export-paths' RPC), and to authenticate imported archives (the
|
||
;;; 'import-paths' RPC.)
|
||
;;;
|
||
;;; Code:
|
||
|
||
(define read-canonical-sexp
|
||
;; Read a gcrypt sexp from a port and return it.
|
||
(compose string->canonical-sexp read-string))
|
||
|
||
(define (read-hash-data port key-type)
|
||
"Read sha256 hash data from PORT and return it as a gcrypt sexp. KEY-TYPE
|
||
is a symbol representing the type of public key algo being used."
|
||
(let* ((hex (read-string port))
|
||
(bv (base16-string->bytevector (string-trim-both hex))))
|
||
(bytevector->hash-data bv #:key-type key-type)))
|
||
|
||
(define (sign-with-key key-file port)
|
||
"Sign the hash read from PORT with KEY-FILE, and write an sexp that includes
|
||
both the hash and the actual signature."
|
||
(let* ((secret-key (call-with-input-file key-file read-canonical-sexp))
|
||
(public-key (if (string-suffix? ".sec" key-file)
|
||
(call-with-input-file
|
||
(string-append (string-drop-right key-file 4)
|
||
".pub")
|
||
read-canonical-sexp)
|
||
(leave
|
||
(G_ "cannot find public key for secret key '~a'~%")
|
||
key-file)))
|
||
(data (read-hash-data port (key-type public-key)))
|
||
(signature (signature-sexp data secret-key public-key)))
|
||
(display (canonical-sexp->string signature))
|
||
#t))
|
||
|
||
(define (validate-signature port)
|
||
"Read the signature from PORT (which is as produced above), check whether
|
||
its public key is authorized, verify the signature, and print the signed data
|
||
to stdout upon success."
|
||
(let* ((signature (read-canonical-sexp port))
|
||
(subject (signature-subject signature))
|
||
(data (signature-signed-data signature)))
|
||
(if (and data subject)
|
||
(if (authorized-key? subject)
|
||
(if (valid-signature? signature)
|
||
(let ((hash (hash-data->bytevector data)))
|
||
(display (bytevector->base16-string hash))
|
||
#t) ; success
|
||
(leave (G_ "error: invalid signature: ~a~%")
|
||
(canonical-sexp->string signature)))
|
||
(leave (G_ "error: unauthorized public key: ~a~%")
|
||
(canonical-sexp->string subject)))
|
||
(leave (G_ "error: corrupt signature data: ~a~%")
|
||
(canonical-sexp->string signature)))))
|
||
|
||
|
||
;;;
|
||
;;; Entry point with 'openssl'-compatible interface. We support this
|
||
;;; interface because that's what the daemon expects, and we want to leave it
|
||
;;; unmodified currently.
|
||
;;;
|
||
|
||
(define (guix-authenticate . args)
|
||
;; Signature sexps written to stdout may contain binary data, so force
|
||
;; ISO-8859-1 encoding so that things are not mangled. See
|
||
;; <http://bugs.gnu.org/17312> for details.
|
||
(set-port-encoding! (current-output-port) "ISO-8859-1")
|
||
(set-port-conversion-strategy! (current-output-port) 'error)
|
||
|
||
;; Same goes for input ports.
|
||
(with-fluids ((%default-port-encoding "ISO-8859-1")
|
||
(%default-port-conversion-strategy 'error))
|
||
(match args
|
||
;; As invoked by guix-daemon.
|
||
(("rsautl" "-sign" "-inkey" key "-in" hash-file)
|
||
(call-with-input-file hash-file
|
||
(lambda (port)
|
||
(sign-with-key key port))))
|
||
;; As invoked by Nix/Crypto.pm (used by Hydra.)
|
||
(("rsautl" "-sign" "-inkey" key)
|
||
(sign-with-key key (current-input-port)))
|
||
;; As invoked by guix-daemon.
|
||
(("rsautl" "-verify" "-inkey" _ "-pubin" "-in" signature-file)
|
||
(call-with-input-file signature-file
|
||
(lambda (port)
|
||
(validate-signature port))))
|
||
;; As invoked by Nix/Crypto.pm (used by Hydra.)
|
||
(("rsautl" "-verify" "-inkey" _ "-pubin")
|
||
(validate-signature (current-input-port)))
|
||
(("--help")
|
||
(display (G_ "Usage: guix authenticate OPTION...
|
||
Sign or verify the signature on the given file. This tool is meant to
|
||
be used internally by 'guix-daemon'.\n")))
|
||
(("--version")
|
||
(show-version-and-exit "guix authenticate"))
|
||
(else
|
||
(leave (G_ "wrong arguments"))))))
|
||
|
||
;;; authenticate.scm ends here
|