diff options
| -rw-r--r-- | doc/gpgme-python-howto.texi | 85 | ||||
| -rw-r--r-- | lang/python/docs/gpgme-python-howto.org | 93 | ||||
| -rwxr-xr-x | lang/python/examples/howto/import-keys-hkp.py | 91 | 
3 files changed, 263 insertions, 6 deletions
| diff --git a/doc/gpgme-python-howto.texi b/doc/gpgme-python-howto.texi index e78c6f85..2863d57d 100644 --- a/doc/gpgme-python-howto.texi +++ b/doc/gpgme-python-howto.texi @@ -38,6 +38,7 @@ Introduction  * Python 2 versus Python 3::  * Examples:: +* Unofficial Drafts::  GPGME Concepts @@ -167,6 +168,7 @@ Python bindings to programmatically leverage the GPGME library.  @menu  * Python 2 versus Python 3::  * Examples:: +* Unofficial Drafts::  @end menu  @node Python 2 versus Python 3 @@ -198,6 +200,14 @@ types with which GPGME deals considerably easier.  All of the examples found in this document can be found as Python 3  scripts in the @samp{lang/python/examples/howto} directory. +@node Unofficial Drafts +@section Unofficial Drafts + +In addition to shipping with each release of GPGME, there is a section +on locations to read or download @ref{Draft Editions of this HOWTO, , draft editions} of this document from +at the end of it.  These are unofficial versions produced in between +major releases. +  @node GPGME Concepts  @chapter GPGME Concepts @@ -780,7 +790,7 @@ import requests  c = gpg.Context()  url = "https://sks-keyservers.net/pks/lookup"  pattern = input("Enter the pattern to search for key or user IDs: ") -payload = @{ "op": "get", "search": pattern @} +payload = @{"op": "get", "search": pattern@}  r = requests.get(url, verify=True, params=payload)  result = c.key_import(r.content) @@ -822,8 +832,77 @@ relative ease by which such key IDs can be reproduced, as demonstrated  by the Evil32 Project in 2014 (which was subsequently exploited in  2016). -Here is a variation on the above which checks the constrained -ProtonMail keyserver for ProtonMail public keys. +Performing the same task with the @uref{https://github.com/Selfnet/hkp4py, hkp4py module} (available via PyPI) +is not too much different, but does provide a number of options of +benefit to end users.  Not least of which being the ability to perform +some checks on a key before importing it or not.  For instance it may +be the policy of a site or project to only import keys which have not +been revoked.  The hkp4py module permits such checks prior to the +importing of the keys found. + +@example +import gpg +import hkp4py + +c = gpg.Context() +server = hkp4py.KeyServer("https://hkps.pool.sks-keyservers.net") +pattern = input("Enter the pattern to search for keys or user IDs: ") +results = [] + +try: +    keys = server.search(pattern) +    print("Found @{0@} key(s).".format(len(keys))) +except Exception as e: +    keys = [] +    for logrus in pattern.split(): +        if logrus.startswith("0x") is True: +            key = server.search(logrus) +        else: +            key = server.search("0x@{0@}".format(logrus)) +        keys.append(key[0]) +    print("Found @{0@} key(s).".format(len(keys))) + +for key in keys: +    import_result = c.key_import(key.key_blob) +    results.append(import_result) + +for result in results: +    if result is not None and hasattr(result, "considered") is False: +        print(result) +    elif result is not None and hasattr(result, "considered") is True: +        num_keys = len(result.imports) +        new_revs = result.new_revocations +        new_sigs = result.new_signatures +        new_subs = result.new_sub_keys +        new_uids = result.new_user_ids +        new_scrt = result.secret_imported +        nochange = result.unchanged +        print(""" +The total number of keys considered for import was:  @{0@} + +   Number of keys revoked:  @{1@} + Number of new signatures:  @{2@} +    Number of new subkeys:  @{3@} +   Number of new user IDs:  @{4@} +Number of new secret keys:  @{5@} + Number of unchanged keys:  @{6@} + +The key IDs for all considered keys were: +""".format(num_keys, new_revs, new_sigs, new_subs, new_uids, new_scrt, +           nochange)) +        for i in range(num_keys): +            print(result.imports[i].fpr) +        print("") +    else: +        pass +@end example + +Since the hkp4py module handles multiple keys just as effectively as +one (@samp{keys} is a list of responses per matching key), thie above +example is able to do a little bit more with the returned data. + +Here is a variation on the first example above which checks the +constrained ProtonMail keyserver for ProtonMail public keys.  @example  import gpg diff --git a/lang/python/docs/gpgme-python-howto.org b/lang/python/docs/gpgme-python-howto.org index 4373e0fa..58964f35 100644 --- a/lang/python/docs/gpgme-python-howto.org +++ b/lang/python/docs/gpgme-python-howto.org @@ -61,6 +61,17 @@ All of the examples found in this document can be found as Python 3  scripts in the =lang/python/examples/howto= directory. +** Unofficial Drafts +   :PROPERTIES: +   :CUSTOM_ID: unofficial-drafts +   :END: + +In addition to shipping with each release of GPGME, there is a section +on locations to read or download [[#draft-editions][draft editions]] of this document from +at the end of it.  These are unofficial versions produced in between +major releases. + +  * GPGME Concepts    :PROPERTIES:    :CUSTOM_ID: gpgme-concepts @@ -654,7 +665,7 @@ import requests  c = gpg.Context()  url = "https://sks-keyservers.net/pks/lookup"  pattern = input("Enter the pattern to search for key or user IDs: ") -payload = { "op": "get", "search": pattern } +payload = {"op": "get", "search": pattern}  r = requests.get(url, verify=True, params=payload)  result = c.key_import(r.content) @@ -696,8 +707,84 @@ relative ease by which such key IDs can be reproduced, as demonstrated  by the Evil32 Project in 2014 (which was subsequently exploited in  2016). -Here is a variation on the above which checks the constrained -ProtonMail keyserver for ProtonMail public keys. +Performing the same task with the [[https://github.com/Selfnet/hkp4py][hkp4py module]] (available via PyPI) +is not too much different, but does provide a number of options of +benefit to end users.  Not least of which being the ability to perform +some checks on a key before importing it or not.  For instance it may +be the policy of a site or project to only import keys which have not +been revoked.  The hkp4py module permits such checks prior to the +importing of the keys found. + +#+BEGIN_SRC python -i +import gpg +import hkp4py +import sys + +c = gpg.Context() +server = hkp4py.KeyServer("hkps://hkps.pool.sks-keyservers.net") +results = [] + +if len(sys.argv) > 2: +    pattern = " ".join(sys.argv[1:]) +elif len(sys.argv) == 2: +    pattern = sys.argv[1] +else: +    pattern = input("Enter the pattern to search for keys or user IDs: ") + +try: +    keys = server.search(pattern) +    print("Found {0} key(s).".format(len(keys))) +except Exception as e: +    keys = [] +    for logrus in pattern.split(): +        if logrus.startswith("0x") is True: +            key = server.search(logrus) +        else: +            key = server.search("0x{0}".format(logrus)) +        keys.append(key[0]) +    print("Found {0} key(s).".format(len(keys))) + +for key in keys: +    import_result = c.key_import(key.key_blob) +    results.append(import_result) + +for result in results: +    if result is not None and hasattr(result, "considered") is False: +        print(result) +    elif result is not None and hasattr(result, "considered") is True: +        num_keys = len(result.imports) +        new_revs = result.new_revocations +        new_sigs = result.new_signatures +        new_subs = result.new_sub_keys +        new_uids = result.new_user_ids +        new_scrt = result.secret_imported +        nochange = result.unchanged +        print(""" +The total number of keys considered for import was:  {0} + +   Number of keys revoked:  {1} + Number of new signatures:  {2} +    Number of new subkeys:  {3} +   Number of new user IDs:  {4} +Number of new secret keys:  {5} + Number of unchanged keys:  {6} + +The key IDs for all considered keys were: +""".format(num_keys, new_revs, new_sigs, new_subs, new_uids, new_scrt, +           nochange)) +        for i in range(num_keys): +            print(result.imports[i].fpr) +        print("") +    else: +        pass +#+END_SRC + +Since the hkp4py module handles multiple keys just as effectively as +one (=keys= is a list of responses per matching key), thie above +example is able to do a little bit more with the returned data. + +Here is a variation on the first example above which checks the +constrained ProtonMail keyserver for ProtonMail public keys.  #+BEGIN_SRC python -i  import gpg diff --git a/lang/python/examples/howto/import-keys-hkp.py b/lang/python/examples/howto/import-keys-hkp.py new file mode 100755 index 00000000..d50e465a --- /dev/null +++ b/lang/python/examples/howto/import-keys-hkp.py @@ -0,0 +1,91 @@ +#!/usr/bin/env python3 +# -*- coding: utf-8 -*- + +from __future__ import absolute_import, division, unicode_literals + +import gpg +import hkp4py +import sys + +# Copyright (C) 2018 Ben McGinnes <[email protected]> +# +# This program is free software; you can redistribute it and/or modify it under +# the terms of the GNU General Public License as published by the Free Software +# Foundation; either version 2 of the License, or (at your option) any later +# version. +# +# This program is free software; you can redistribute it and/or modify it under +# the terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# This program is distributed in the hope that it will be useful, but WITHOUT +# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS +# FOR A PARTICULAR PURPOSE.  See the GNU General Public License and the GNU +# Lesser General Public License for more details. +# +# You should have received a copy of the GNU General Public License and the GNU +# Lesser General Public along with this program; if not, see +# <http://www.gnu.org/licenses/>. + +print(""" +This script imports one or more public keys from the SKS keyservers. +""") + +c = gpg.Context() +server = hkp4py.KeyServer("hkps://hkps.pool.sks-keyservers.net") +results = [] + +if len(sys.argv) > 2: +    pattern = " ".join(sys.argv[1:]) +elif len(sys.argv) == 2: +    pattern = sys.argv[1] +else: +    pattern = input("Enter the pattern to search for keys or user IDs: ") + +try: +    keys = server.search(pattern) +    print("Found {0} key(s).".format(len(keys))) +except Exception as e: +    keys = [] +    for logrus in pattern.split(): +        if logrus.startswith("0x") is True: +            key = server.search(logrus) +        else: +            key = server.search("0x{0}".format(logrus)) +        keys.append(key[0]) +    print("Found {0} key(s).".format(len(keys))) + +for key in keys: +    import_result = c.key_import(key.key_blob) +    results.append(import_result) + +for result in results: +    if result is not None and hasattr(result, "considered") is False: +        print(result) +    elif result is not None and hasattr(result, "considered") is True: +        num_keys = len(result.imports) +        new_revs = result.new_revocations +        new_sigs = result.new_signatures +        new_subs = result.new_sub_keys +        new_uids = result.new_user_ids +        new_scrt = result.secret_imported +        nochange = result.unchanged +        print(""" +The total number of keys considered for import was:  {0} + +   Number of keys revoked:  {1} + Number of new signatures:  {2} +    Number of new subkeys:  {3} +   Number of new user IDs:  {4} +Number of new secret keys:  {5} + Number of unchanged keys:  {6} + +The key IDs for all considered keys were: +""".format(num_keys, new_revs, new_sigs, new_subs, new_uids, new_scrt, +           nochange)) +        for i in range(num_keys): +            print(result.imports[i].fpr) +        print("") +    else: +        pass | 
