js: Keyring listing keys

--

* implementing Keyring methods:

  - Keyring.getKeys: has an additional option that retrieves the armor
    and secret state once at the beginning. This is power hungry, but
    allows for Keys to be used directly (without querying gpgme-json
    each call)
  * permittedOperations.js: reflect recent changes in the native
    counterpart, adding more options
  * Key: adding two methods for retrieving the armored Key block and
    for finding out if the Key includes a secret subkey.
This commit is contained in:
Maximilian Krambach 2018-05-28 17:26:56 +02:00
parent d4adbf453d
commit 53ce2b94bc
6 changed files with 289 additions and 188 deletions

View File

@ -0,0 +1,30 @@
-----BEGIN PGP PUBLIC KEY BLOCK-----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=y6DD
-----END PGP PUBLIC KEY BLOCK-----

View File

@ -77,7 +77,7 @@ export class GPGME_Key {
* @returns {GPGME_Key|GPGME_Error} The Key object itself after values have * @returns {GPGME_Key|GPGME_Error} The Key object itself after values have
* been set * been set
*/ */
setKeydata(data){ setKeyData(data){
if (this._data === undefined) { if (this._data === undefined) {
this._data = {}; this._data = {};
} }
@ -161,11 +161,17 @@ export class GPGME_Key {
if (cached === false) { if (cached === false) {
let me = this; let me = this;
return new Promise(function(resolve, reject) { return new Promise(function(resolve, reject) {
me.refreshKey().then(function(key){ if (property === 'armor'){
resolve(key.get(property, true)); resolve(me.getArmor());
}, function(error){ } else if (property === 'hasSecret'){
reject(error); resolve(me.getHasSecret());
}); } else {
me.refreshKey().then(function(key){
resolve(key.get(property, true));
}, function(error){
reject(error);
});
}
}); });
} else { } else {
if (!this._data.hasOwnProperty(property)){ if (!this._data.hasOwnProperty(property)){
@ -188,10 +194,9 @@ export class GPGME_Key {
let msg = createMessage('keylist'); let msg = createMessage('keylist');
msg.setParameter('sigs', true); msg.setParameter('sigs', true);
msg.setParameter('keys', me._data.fingerprint); msg.setParameter('keys', me._data.fingerprint);
console.log(msg);
msg.post().then(function(result){ msg.post().then(function(result){
if (result.keys.length === 1){ if (result.keys.length === 1){
me.setKeydata(result.keys[0]); me.setKeyData(result.keys[0]);
resolve(me); resolve(me);
} else { } else {
reject(gpgme_error('KEY_NOKEY')); reject(gpgme_error('KEY_NOKEY'));
@ -202,25 +207,78 @@ export class GPGME_Key {
}); });
} }
//TODO:
/** /**
* Get the armored block of the non- secret parts of the Key. * Get the armored block of the non- secret parts of the Key.
* @returns {String} the armored Key block. * @returns {String} the armored Key block.
* Notice that this may be outdated cached info. Use the async getArmor if * Notice that this may be outdated cached info. Use the async getArmor if
* you need the most current info * you need the most current info
*/ */
// get armor(){ TODO } // get armor(){ TODO }
/** /**
* Query the armored block of the non- secret parts of the Key directly * Query the armored block of the non- secret parts of the Key directly
* from gpg. * from gpg.
* Async, returns Promise<String> * @returns {Promise<String>}
*/ */
// getArmor(){ TODO } getArmor(){
// let me = this;
return new Promise(function(resolve, reject) {
if (!me._data.fingerprint){
reject(gpgme_error('KEY_INVALID'));
}
let msg = createMessage('export');
msg.setParameter('armor', true);
msg.setParameter('keys', me._data.fingerprint);
msg.post().then(function(result){
me._data.armor = result.data;
resolve(result.data);
}, function(error){
reject(error);
});
});
}
// get hasSecret(){TODO} // confusing difference to Key.get('secret')! getHasSecret(){
// getHasSecret(){TODO async version} let me = this;
return new Promise(function(resolve, reject) {
if (!me._data.fingerprint){
reject(gpgme_error('KEY_INVALID'));
}
let msg = createMessage('keylist');
msg.setParameter('keys', me._data.fingerprint);
msg.setParameter('secret', true);
msg.post().then(function(result){
me._data.hasSecret = null;
if (result.keys === undefined || result.keys.length < 1) {
me._data.hasSecret = false;
resolve(false);
}
else if (result.keys.length === 1){
let key = result.keys[0];
if (!key.subkeys){
me._data.hasSecret = false;
resolve(false);
} else {
for (let i=0; i < key.subkeys.length; i++) {
if (key.subkeys[i].secret === true) {
me._data.hasSecret = true;
resolve(true);
break;
}
if (i === (key.subkeys.length -1)) {
me._data.hasSecret = false;
resolve(false);
}
}
}
} else {
reject(gpgme_error('CONN_UNEXPECTED_ANSWER'))
}
}, function(error){
})
});
}
} }
/** /**

View File

@ -19,7 +19,7 @@
*/ */
import {createMessage} from './Message' import {createMessage} from './Message'
import {GPGME_Key} from './Key' import {GPGME_Key, createKey} from './Key'
import { isFingerprint } from './Helpers'; import { isFingerprint } from './Helpers';
import { gpgme_error } from './Errors'; import { gpgme_error } from './Errors';
@ -28,117 +28,54 @@ export class GPGME_Keyring {
} }
/** /**
* @param {String} (optional) pattern A pattern to search for, in userIds or KeyIds * @param {String} pattern (optional) pattern A pattern to search for,
* @param {Boolean} (optional) Include listing of secret keys * in userIds or KeyIds
* @param {Boolean} prepare_sync (optional, default true) if set to true,
* Key.armor and Key.hasSecret will be called, so they can be used
* inmediately. This allows for full synchronous use. If set to false,
* these will initially only be available as Promises in getArmor() and
* getHasSecret()
* @returns {Promise.<Array<GPGME_Key>>} * @returns {Promise.<Array<GPGME_Key>>}
* *
*/ */
getKeys(pattern, include_secret){ getKeys(pattern, prepare_sync){
let me = this; let me = this;
return new Promise(function(resolve, reject) { return new Promise(function(resolve, reject) {
let msg; let msg;
msg = createMessage('listkeys'); msg = createMessage('keylist');
if (pattern && typeof(pattern) === 'string'){ if (pattern && typeof(pattern) === 'string'){
msg.setParameter('pattern', pattern); msg.setParameter('keys', pattern);
}
if (include_secret){
msg.setParameter('with-secret', true);
} }
msg.setParameter('sigs', true); //TODO do we need this?
msg.post().then(function(result){ msg.post().then(function(result){
let fpr_list = [];
let resultset = []; let resultset = [];
if (!Array.isArray(result.keys)){ let promises = [];
//TODO check assumption keys = Array<String fingerprints> // TODO check if result.key is not empty
fpr_list = [result.keys]; for (let i=0; i< result.keys.length; i++){
} else { let k = createKey(result.keys[i].fingerprint, me);
fpr_list = result.keys; k.setKeyData(result.keys[i]);
} if (prepare_sync === true){
for (let i=0; i < fpr_list.length; i++){ promises.push(k.getArmor());
let newKey = new GPGME_Key(fpr_list[i]); promises.push(k.getHasSecret());
if (newKey instanceof GPGME_Key){
resultset.push(newKey);
} }
resultset.push(k);
}
if (promises.length > 0) {
Promise.all(promises).then(function (res){
resolve(resultset);
}, function(error){
reject(error);
});
} }
resolve(resultset);
}, function(error){ }, function(error){
reject(error); reject(error);
}); });
}); });
} }
// TODO:
/** // deleteKey(key, include_secret=false)
* @param {Object} flags subset filter expecting at least one of the // getKeysArmored(pattern) //just dump all armored keys
* filters described below. True will filter on the condition, False will // getDefaultKey() Big TODO
* reverse the filter, if not present or undefined, the filter will not be // importKeys(armoredKeys)
* considered. Please note that some combination may not make sense
* @param {Boolean} flags.secret Only Keys containing a secret part.
* @param {Boolean} flags.revoked revoked Keys only
* @param {Boolean} flags.expired Expired Keys only
* @param {String} (optional) pattern A pattern to search for, in userIds or KeyIds
* @returns {Promise Array<GPGME_Key>}
*
*/
getSubset(flags, pattern){
if (flags === undefined) {
throw('ERR_WRONG_PARAM');
};
let secretflag = false;
if (flags.hasOwnProperty(secret) && flags.secret){
secretflag = true;
}
this.getKeys(pattern, secretflag).then(function(queryset){
let resultset = [];
for (let i=0; i < queryset.length; i++ ){
let conditions = [];
let anticonditions = [];
if (secretflag === true){
conditions.push('hasSecret');
} else if (secretflag === false){
anticonditions.push('hasSecret');
}
/**
if (flags.defaultKey === true){
conditions.push('isDefault');
} else if (flags.defaultKey === false){
anticonditions.push('isDefault');
}
*/
/**
* if (flags.valid === true){
anticonditions.push('isInvalid');
} else if (flags.valid === false){
conditions.push('isInvalid');
}
*/
if (flags.revoked === true){
conditions.push('isRevoked');
} else if (flags.revoked === false){
anticonditions.push('isRevoked');
}
if (flags.expired === true){
conditions.push('isExpired');
} else if (flags.expired === false){
anticonditions.push('isExpired');
}
let decision = undefined;
for (let con = 0; con < conditions.length; con ++){
if (queryset[i][conditions[con]] !== true){
decision = false;
}
}
for (let acon = 0; acon < anticonditions.length; acon ++){
if (queryset[i][anticonditions[acon]] === true){
decision = false;
}
}
if (decision !== false){
resultset.push(queryset[i]);
}
}
return Promise.resolve(resultset);
}, function(error){
//TODO error handling
});
}
}; };

View File

@ -45,6 +45,7 @@
export const permittedOperations = { export const permittedOperations = {
encrypt: { encrypt: {
pinentry: true, //TODO only with signing_keys
required: { required: {
'keys': { 'keys': {
allowed: ['string'], allowed: ['string'],
@ -59,38 +60,42 @@ export const permittedOperations = {
allowed: ['string'], allowed: ['string'],
allowed_data: ['cms', 'openpgp'] allowed_data: ['cms', 'openpgp']
}, },
'chunksize': { 'signing_keys': {
allowed: ['number'] allowed: ['string'],
}, array_allowed: true
'base64': {
allowed: ['boolean']
},
'mime': {
allowed: ['boolean']
},
'armor': {
allowed: ['boolean']
},
'always-trust': {
allowed: ['boolean']
},
'no-encrypt-to': {
allowed: ['string'],
array_allowed: true
},
'no-compress': {
allowed: ['boolean']
},
'throw-keyids': {
allowed: ['boolean']
},
'want-address': {
allowed: ['boolean']
},
'wrap': {
allowed: ['boolean']
},
}, },
'chunksize': {
allowed: ['number']
},
'base64': {
allowed: ['boolean']
},
'mime': {
allowed: ['boolean']
},
'armor': {
allowed: ['boolean']
},
'always-trust': {
allowed: ['boolean']
},
'no-encrypt-to': {
allowed: ['string'],
array_allowed: true
},
'no-compress': {
allowed: ['boolean']
},
'throw-keyids': {
allowed: ['boolean']
},
'want-address': {
allowed: ['boolean']
},
'wrap': {
allowed: ['boolean']
}
},
answer: { answer: {
type: ['ciphertext'], type: ['ciphertext'],
data: ['data'], data: ['data'],
@ -122,12 +127,7 @@ export const permittedOperations = {
type: ['plaintext'], type: ['plaintext'],
data: ['data'], data: ['data'],
params: ['base64', 'mime'], params: ['base64', 'mime'],
infos: [] // TODO pending. Info about signatures and validity infos: ['signatures']
//{
//signatures: [{
//Key : <String>Fingerprint,
//valid: <Boolean>
// }]
} }
}, },
@ -208,61 +208,107 @@ export const permittedOperations = {
'validate': { 'validate': {
allowed: ['boolean'] allowed: ['boolean']
}, },
// 'pattern': { TODO
// allowed: ['string']
// },
'keys': { 'keys': {
allowed: ['string'], allowed: ['string'],
array_allowed: true array_allowed: true
} }
}, },
answer: { answer: {
type: [], type: ['keys'],
data: [], data: [],
params: [], params: ['base64'],
infos: ['keys'] infos: ['keys']
} }
}, },
/** export: {
importkey: { required: {},
optional: {
'protocol': {
allowed: ['string'],
allowed_data: ['cms', 'openpgp']
},
'chunksize': {
allowed: ['number'],
},
'keys': {
allowed: ['string'],
array_allowed: true
},
'armor': {
allowed: ['boolean']
},
'extern': {
allowed: ['boolean']
},
'minimal': {
allowed: ['boolean']
},
'raw': {
allowed: ['boolean']
},
'pkcs12':{
allowed: ['boolean']
}
// secret: not yet implemented
},
answer: {
type: ['keys'],
data: ['data'],
params: ['base64']
}
},
import: {
required: { required: {
'keyarmored': { 'data': {
allowed: ['string'] allowed: ['string']
} }
}, },
optional: {
'protocol': {
allowed: ['string'],
allowed_data: ['cms', 'openpgp']
},
'base64': {
allowed: ['boolean']
},
},
answer: { answer: {
type: ['TBD'], infos: ['result'],
infos: ['TBD'], type: [],
// for each key if import was a success, data: [],
// and if it was an update of preexisting key params: []
} }
}, },
*/
/** delete: {
deletekey: {
pinentry: true, pinentry: true,
required: { required:{
'fingerprint': { 'key': {
allowed: ['string'], allowed: ['string']
// array_allowed: TBD Allow several Keys to be deleted at once? }
}, },
optional: { optional: {
'TBD' //Flag to delete secret Key ? 'protocol': {
} allowed: ['string'],
answer: { allowed_data: ['cms', 'openpgp']
type ['TBD'], },
infos: [''] // 'secret': { not yet implemented
// TBD (optional) Some kind of 'ok' if delete was successful. // allowed: ['boolean']
} // }
}
*/
},
answer: {
data: [],
params:['success'],
infos: []
}
},
/** /**
*TBD get armored secret different treatment from keyinfo! *TBD get armored secret different treatment from keyinfo!
* TBD key modification? * TBD key modification?
* encryptsign: TBD
*/ */
version: { version: {

View File

@ -44,7 +44,11 @@ export const whatever_params = {
four_invalid_params: ['<(((-<', '>°;==;~~', '^^', '{{{{o}}}}'], four_invalid_params: ['<(((-<', '>°;==;~~', '^^', '{{{{o}}}}'],
} }
export const key_params = { export const key_params = {
// A Key you own (= having a secret Key) in GPG. See testkey.pub/testkey.sec
validKeyFingerprint: 'D41735B91236FDB882048C5A2301635EEFF0CB05', validKeyFingerprint: 'D41735B91236FDB882048C5A2301635EEFF0CB05',
// A Key you do not own (= having no secret Key) in GPG. See testkey2.pub
validFingerprintNoSecret: 'E059A1E0866D31AE131170884D9A2E13304153D1',
// A Key not in your Keyring. This is just a random hex string.
invalidKeyFingerprint: 'CDC3A2B2860625CCBFC5AAAAAC6D1B604967FC4A', invalidKeyFingerprint: 'CDC3A2B2860625CCBFC5AAAAAC6D1B604967FC4A',
validKeyProperties: ['expired', 'disabled','invalid','can_encrypt', validKeyProperties: ['expired', 'disabled','invalid','can_encrypt',
'can_sign','can_certify','can_authenticate','secret','is_qualified'] 'can_sign','can_certify','can_authenticate','secret','is_qualified']

View File

@ -197,7 +197,34 @@ function unittests (){
expect(result).to.be.a('boolean'); expect(result).to.be.a('boolean');
done(); done();
}); });
}) });
it('Non-cached key async armored Key', function (done){
let key = createKey(kp.validKeyFingerprint);
key.get('armor', false).then(function(result){
expect(result).to.be.a('string');
expect(result).to.include('KEY BLOCK-----');
done();
});
});
it('Non-cached key async hasSecret', function (done){
let key = createKey(kp.validKeyFingerprint);
key.get('hasSecret', false).then(function(result){
expect(result).to.be.a('boolean');
done();
});
});
it('Non-cached key async hasSecret (no secret in Key)', function (done){
let key = createKey(kp.validFingerprintNoSecret);
expect(key).to.be.an.instanceof(GPGME_Key);
key.get('hasSecret', false).then(function(result){
expect(result).to.be.a('boolean');
expect(result).to.equal(false);
done();
});
});
it('Querying non-existing Key returns an error', function(done) { it('Querying non-existing Key returns an error', function(done) {
let key = createKey(kp.invalidKeyFingerprint); let key = createKey(kp.invalidKeyFingerprint);
@ -224,7 +251,6 @@ function unittests (){
expect(key.fingerprint.code).to.equal('KEY_INVALID'); expect(key.fingerprint.code).to.equal('KEY_INVALID');
} }
}); });
// TODO: tests for subkeys // TODO: tests for subkeys
// TODO: tests for userids // TODO: tests for userids
// TODO: some invalid tests for key/keyring // TODO: some invalid tests for key/keyring
@ -236,19 +262,19 @@ function unittests (){
let keyring = new GPGME_Keyring; let keyring = new GPGME_Keyring;
expect(keyring).to.be.an.instanceof(GPGME_Keyring); expect(keyring).to.be.an.instanceof(GPGME_Keyring);
expect(keyring.getKeys).to.be.a('function'); expect(keyring.getKeys).to.be.a('function');
expect(keyring.getSubset).to.be.a('function');
}); });
it('correct initialization', function(){ it('Loading Keys from Keyring, to be used synchronously', function(done){
let keyring = new GPGME_Keyring; let keyring = new GPGME_Keyring;
expect(keyring).to.be.an.instanceof(GPGME_Keyring); keyring.getKeys(null, true).then(function(result){
expect(keyring.getKeys).to.be.a('function'); expect(result).to.be.an('array');
expect(keyring.getSubset).to.be.a('function'); expect(result[0]).to.be.an.instanceof(GPGME_Key);
expect(result[0].get('armor')).to.be.a('string');
expect(result[0].get('armor')).to.include(
'-----END PGP PUBLIC KEY BLOCK-----');
done();
});
}); });
//TODO not yet implemented:
// getKeys(pattern, include_secret) //note: pattern can be null
// getSubset(flags, pattern)
// available Boolean flags: secret revoked expired
}); });
describe('GPGME_Message', function(){ describe('GPGME_Message', function(){