1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
|
// Copyright (c) 2020, Control Command Inc. All rights reserved.
// Copyright (c) 2017-2020, Sylabs Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the
// LICENSE.md file distributed with the sources of this project regarding your
// rights to use or distribute this software.
package cli
import (
"context"
"fmt"
"os"
"github.com/spf13/cobra"
"github.com/sylabs/scs-key-client/client"
"github.com/sylabs/singularity/v4/docs"
"github.com/sylabs/singularity/v4/internal/pkg/buildcfg"
"github.com/sylabs/singularity/v4/internal/pkg/remote/endpoint"
"github.com/sylabs/singularity/v4/internal/pkg/sypgp"
"github.com/sylabs/singularity/v4/pkg/sylog"
)
// KeyPullCmd is `singularity key pull' and fetches public keys from a key server
var KeyPullCmd = &cobra.Command{
PreRun: checkGlobal,
Args: cobra.ExactArgs(1),
DisableFlagsInUseLine: true,
Run: func(cmd *cobra.Command, args []string) {
co, err := getKeyserverClientOpts(keyServerURI, endpoint.KeyserverPullOp)
if err != nil {
sylog.Fatalf("Keyserver client failed: %s", err)
}
if err := doKeyPullCmd(cmd.Context(), args[0], co...); err != nil {
sylog.Errorf("pull failed: %s", err)
os.Exit(2)
}
},
Use: docs.KeyPullUse,
Short: docs.KeyPullShort,
Long: docs.KeyPullLong,
Example: docs.KeyPullExample,
}
func doKeyPullCmd(ctx context.Context, fingerprint string, co ...client.Option) error {
var count int
var opts []sypgp.HandleOpt
path := ""
mode := os.FileMode(0o600)
if keyGlobalPubKey {
path = buildcfg.SINGULARITY_CONFDIR
opts = append(opts, sypgp.GlobalHandleOpt())
mode = os.FileMode(0o644)
}
keyring := sypgp.NewHandle(path, opts...)
// get matching keyring
el, err := sypgp.FetchPubkey(ctx, fingerprint, co...)
if err != nil {
return fmt.Errorf("unable to pull key from server: %v", err)
}
elstore, err := keyring.LoadPubKeyring()
if err != nil {
return err
}
// store in local cache
fp, err := os.OpenFile(keyring.PublicPath(), os.O_APPEND|os.O_CREATE|os.O_WRONLY, mode)
if err != nil {
return err
}
defer fp.Close()
for _, e := range el {
storeKey := true
for _, estore := range elstore {
if e.PrimaryKey.KeyId == estore.PrimaryKey.KeyId {
storeKey = false // Entity is already in keyring
break
}
}
if storeKey {
if err = e.Serialize(fp); err != nil {
return fmt.Errorf("unable to serialize key: %v", err)
}
count++
}
}
fmt.Printf("%v key(s) added to keyring of trust %s\n", count, keyring.PublicPath())
return nil
}
|