1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104
|
// -*- Mode: Go; indent-tabs-mode: t -*-
/*
* Copyright (C) 2021 Canonical Ltd
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 3 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package main
import (
"fmt"
"time"
"github.com/jessevdk/go-flags"
"github.com/snapcore/snapd/asserts"
"github.com/snapcore/snapd/asserts/signtool"
"github.com/snapcore/snapd/i18n"
)
type cmdExportKey struct {
Account string `long:"account"`
Positional struct {
KeyName keyName
} `positional-args:"true"`
}
func init() {
cmd := addCommand("export-key",
i18n.G("Export cryptographic public key"),
i18n.G(`
The export-key command exports a public key assertion body that may be
imported by other systems.
`),
func() flags.Commander {
return &cmdExportKey{}
}, map[string]string{
"account": i18n.G("Format public key material as a request for an account-key for this account-id"),
}, []argDesc{{
// TRANSLATORS: This needs to begin with < and end with >
name: i18n.G("<key-name>"),
// TRANSLATORS: This should not start with a lowercase letter.
desc: i18n.G("Name of key to export"),
}})
cmd.completeHidden = true
}
func (x *cmdExportKey) Execute(args []string) error {
if len(args) > 0 {
return ErrExtraArgs
}
keyName := string(x.Positional.KeyName)
if keyName == "" {
keyName = "default"
}
keypairMgr, err := signtool.GetKeypairManager()
if err != nil {
return err
}
if x.Account != "" {
privKey, err := keypairMgr.GetByName(keyName)
if err != nil {
return fmt.Errorf("cannot find key named %q: %v", keyName, err)
}
pubKey := privKey.PublicKey()
headers := map[string]any{
"account-id": x.Account,
"name": keyName,
"public-key-sha3-384": pubKey.ID(),
"since": time.Now().UTC().Format(time.RFC3339),
// XXX: To support revocation, we need to check for matching known assertions and set a suitable revision if we find one.
}
body, err := asserts.EncodePublicKey(pubKey)
if err != nil {
return err
}
assertion, err := asserts.SignWithoutAuthority(asserts.AccountKeyRequestType, headers, body, privKey)
if err != nil {
return err
}
fmt.Fprint(Stdout, string(asserts.Encode(assertion)))
} else {
encoded, err := keypairMgr.Export(keyName)
if err != nil {
return fmt.Errorf("cannot export key named %q: %v", keyName, err)
}
fmt.Fprintf(Stdout, "%s\n", encoded)
}
return nil
}
|