Add signature support to updatemgr

This commit is contained in:
Daniel 2022-08-22 23:28:37 +02:00
parent b1b31257b4
commit 168cf010ea
2 changed files with 99 additions and 65 deletions

View file

@ -7,6 +7,7 @@ import (
"io/ioutil"
"os"
"path/filepath"
"time"
"github.com/spf13/cobra"
@ -75,18 +76,26 @@ func release(cmd *cobra.Command, args []string) error {
}
func writeIndex(channel string, versions map[string]string) error {
// Create new index file.
indexFile := &updater.IndexFile{
Channel: channel,
Published: time.Now().UTC().Round(time.Second),
Releases: versions,
}
// Export versions and format them.
versionData, err := json.MarshalIndent(versions, "", " ")
confirmData, err := json.MarshalIndent(indexFile, "", " ")
if err != nil {
return err
}
// Build destination path.
indexFilePath := filepath.Join(registry.StorageDir().Path, channel+".json")
// Build index paths.
oldIndexPath := filepath.Join(registry.StorageDir().Path, channel+".json")
newIndexPath := filepath.Join(registry.StorageDir().Path, channel+".v2.json")
// Print preview.
fmt.Printf("%s (%s):\n", channel, indexFilePath)
fmt.Println(string(versionData))
fmt.Printf("%s\n%s\n%s\n\n", channel, oldIndexPath, newIndexPath)
fmt.Println(string(confirmData))
// Ask for confirmation.
if !confirm("\nDo you want to write this index?") {
@ -94,13 +103,33 @@ func writeIndex(channel string, versions map[string]string) error {
return nil
}
// Write new index to disk.
err = ioutil.WriteFile(indexFilePath, versionData, 0o0644) //nolint:gosec // 0644 is intended
// Write indexes.
err = writeAsJSON(oldIndexPath, versions)
if err != nil {
return fmt.Errorf("failed to write %s: %w", oldIndexPath, err)
}
err = writeAsJSON(newIndexPath, indexFile)
if err != nil {
return fmt.Errorf("failed to write %s: %w", newIndexPath, err)
}
return nil
}
func writeAsJSON(path string, data any) error {
// Marshal to JSON.
jsonData, err := json.MarshalIndent(data, "", " ")
if err != nil {
return err
}
fmt.Printf("written %s\n", indexFilePath)
// Write to disk.
err = ioutil.WriteFile(path, jsonData, 0o0644) //nolint:gosec
if err != nil {
return err
}
fmt.Printf("written %s\n", path)
return nil
}

View file

@ -1,26 +1,19 @@
package main
import (
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"os"
"path/filepath"
"strings"
"time"
"github.com/spf13/cobra"
"github.com/safing/jess"
"github.com/safing/jess/filesig"
"github.com/safing/jess/truststores"
"github.com/safing/portbase/formats/dsd"
"github.com/safing/portbase/updater"
)
const letterFileExtension = ".letter"
func init() {
rootCmd.AddCommand(signCmd)
signCmd.PersistentFlags().StringVarP(&envelopeName, "envelope", "", "",
@ -33,6 +26,7 @@ func init() {
signCmd.PersistentFlags().StringVarP(&trustStoreKeyring, "tskeyring", "", "",
"specify a truststore keyring namespace (default loaded from JESS_TS_KEYRING env variable) - lower priority than tsdir",
)
// FIXME: Add silent flag to suppress verification checks.
signCmd.AddCommand(signIndexCmd)
}
@ -68,7 +62,7 @@ func sign(cmd *cobra.Command, args []string) error {
// Get all resources and iterate over all versions.
export := registry.Export()
var fails int
var verified, signed, fails int
for _, rv := range export {
for _, version := range rv.Versions {
file := version.GetFile()
@ -89,6 +83,7 @@ func sign(cmd *cobra.Command, args []string) error {
fails++
} else {
fmt.Printf("[ OK ] valid signature for %s: signed by %s\n", file.Path(), getSignedByMany(fileData, trustStore))
verified++
}
case os.IsNotExist(err):
@ -105,6 +100,7 @@ func sign(cmd *cobra.Command, args []string) error {
fails++
} else {
fmt.Printf("[SIGN] signed %s with %s\n", file.Path(), getSignedBySingle(fileData, trustStore))
signed++
}
default:
@ -122,12 +118,6 @@ func sign(cmd *cobra.Command, args []string) error {
}
func signIndex(cmd *cobra.Command, args []string) error {
// FIXME:
// Do not sign embedded, but also as a separate file.
// Slightly more complex, but it makes all the other handling easier.
indexFilePath := args[0]
// Setup trust store.
trustStore, err := setupTrustStore()
if err != nil {
@ -140,54 +130,69 @@ func signIndex(cmd *cobra.Command, args []string) error {
return err
}
// Read index file.
indexData, err := ioutil.ReadFile(indexFilePath)
if err != nil {
return fmt.Errorf("failed to read index file %s: %w", indexFilePath, err)
// Resolve globs.
files := make([]string, 0, len(args))
for _, arg := range args {
matches, err := filepath.Glob(arg)
if err != nil {
return err
}
files = append(files, matches...)
}
// Load index.
resourceVersions := make(map[string]string)
err = json.Unmarshal(indexData, &resourceVersions)
if err != nil {
return fmt.Errorf("failed to parse index file: %w", err)
// Go through all files.
var fails int
for _, file := range files {
sigFile := file + filesig.Extension
// Ignore matches for the signatures.
if strings.HasSuffix(file, filesig.Extension) {
continue
}
// Check if there is an existing signature.
_, err := os.Stat(sigFile)
switch {
case err == nil || os.IsExist(err):
// If the file exists, just verify.
fileData, err := filesig.VerifyFile(
file,
sigFile,
nil,
trustStore,
)
if err == nil {
fmt.Printf("[ OK ] valid signature for %s: signed by %s\n", file, getSignedByMany(fileData, trustStore))
continue
}
fallthrough
case os.IsNotExist(err):
// Attempt to sign file.
fileData, err := filesig.SignFile(
file,
sigFile,
nil,
signingEnvelope,
trustStore,
)
if err != nil {
fmt.Printf("[FAIL] failed to sign %s: %s\n", file, err)
fails++
} else {
fmt.Printf("[SIGN] signed %s with %s\n", file, getSignedBySingle(fileData, trustStore))
}
default:
// File access error.
fmt.Printf("[FAIL] failed to access %s: %s\n", sigFile, err)
fails++
}
}
// Create signed index file structure.
index := updater.IndexFile{
Channel: strings.TrimSuffix(filepath.Base(indexFilePath), filepath.Ext(indexFilePath)),
Published: time.Now(),
Expires: time.Now().Add(3 * 31 * 24 * time.Hour), // Expires in 3 Months.
Versions: resourceVersions,
if fails > 0 {
return fmt.Errorf("signing or checking failed on %d files", fails)
}
// Serialize index.
indexData, err = dsd.Dump(index, dsd.CBOR)
if err != nil {
return fmt.Errorf("failed to serialize index structure: %w", err)
}
// Sign index.
session, err := signingEnvelope.Correspondence(trustStore)
if err != nil {
return fmt.Errorf("failed to prepare signing: %w", err)
}
signedIndex, err := session.Close(indexData)
if err != nil {
return fmt.Errorf("failed to sign: %w", err)
}
// Write new file.
signedIndexData, err := signedIndex.ToDSD(dsd.CBOR)
if err != nil {
return fmt.Errorf("failed to serialize signed index: %w", err)
}
signedIndexFilePath := strings.TrimSuffix(indexFilePath, filepath.Ext(indexFilePath)) + letterFileExtension
err = ioutil.WriteFile(signedIndexFilePath, signedIndexData, 0o644) //nolint:gosec // Permission is ok.
if err != nil {
return fmt.Errorf("failed to write signed index to %s: %w", signedIndexFilePath, err)
}
return nil
}