mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-04 10:03:42 +08:00 
			
		
		
		
	update the dependency to v0.7.0 to be closer to what docker/cli uses; https://github.com/theupdateframework/notary/compare/v0.6.1...v0.7.0 Note that docker/cli is slightly ahead of v0.7.0, and uses bf96a202a09a; https://github.com/theupdateframework/notary/compare/v0.7.0...bf96a202a09a Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
		
			
				
	
	
		
			163 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			163 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package cryptoservice
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/x509"
 | 
						|
	"encoding/pem"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	"github.com/sirupsen/logrus"
 | 
						|
	"github.com/theupdateframework/notary"
 | 
						|
	"github.com/theupdateframework/notary/trustmanager"
 | 
						|
	"github.com/theupdateframework/notary/tuf/data"
 | 
						|
	"github.com/theupdateframework/notary/tuf/utils"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	// ErrNoValidPrivateKey is returned if a key being imported doesn't
 | 
						|
	// look like a private key
 | 
						|
	ErrNoValidPrivateKey = errors.New("no valid private key found")
 | 
						|
 | 
						|
	// ErrRootKeyNotEncrypted is returned if a root key being imported is
 | 
						|
	// unencrypted
 | 
						|
	ErrRootKeyNotEncrypted = errors.New("only encrypted root keys may be imported")
 | 
						|
 | 
						|
	// EmptyService is an empty crypto service
 | 
						|
	EmptyService = NewCryptoService()
 | 
						|
)
 | 
						|
 | 
						|
// CryptoService implements Sign and Create, holding a specific GUN and keystore to
 | 
						|
// operate on
 | 
						|
type CryptoService struct {
 | 
						|
	keyStores []trustmanager.KeyStore
 | 
						|
}
 | 
						|
 | 
						|
// NewCryptoService returns an instance of CryptoService
 | 
						|
func NewCryptoService(keyStores ...trustmanager.KeyStore) *CryptoService {
 | 
						|
	return &CryptoService{keyStores: keyStores}
 | 
						|
}
 | 
						|
 | 
						|
// Create is used to generate keys for targets, snapshots and timestamps
 | 
						|
func (cs *CryptoService) Create(role data.RoleName, gun data.GUN, algorithm string) (data.PublicKey, error) {
 | 
						|
	if algorithm == data.RSAKey {
 | 
						|
		return nil, fmt.Errorf("%s keys can only be imported", data.RSAKey)
 | 
						|
	}
 | 
						|
 | 
						|
	privKey, err := utils.GenerateKey(algorithm)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to generate %s key: %v", algorithm, err)
 | 
						|
	}
 | 
						|
	logrus.Debugf("generated new %s key for role: %s and keyID: %s", algorithm, role.String(), privKey.ID())
 | 
						|
	pubKey := data.PublicKeyFromPrivate(privKey)
 | 
						|
 | 
						|
	return pubKey, cs.AddKey(role, gun, privKey)
 | 
						|
}
 | 
						|
 | 
						|
// GetPrivateKey returns a private key and role if present by ID.
 | 
						|
func (cs *CryptoService) GetPrivateKey(keyID string) (k data.PrivateKey, role data.RoleName, err error) {
 | 
						|
	for _, ks := range cs.keyStores {
 | 
						|
		if k, role, err = ks.GetKey(keyID); err == nil {
 | 
						|
			return
 | 
						|
		}
 | 
						|
		switch err.(type) {
 | 
						|
		case trustmanager.ErrPasswordInvalid, trustmanager.ErrAttemptsExceeded:
 | 
						|
			return
 | 
						|
		default:
 | 
						|
			continue
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return // returns whatever the final values were
 | 
						|
}
 | 
						|
 | 
						|
// GetKey returns a key by ID
 | 
						|
func (cs *CryptoService) GetKey(keyID string) data.PublicKey {
 | 
						|
	privKey, _, err := cs.GetPrivateKey(keyID)
 | 
						|
	if err != nil {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	return data.PublicKeyFromPrivate(privKey)
 | 
						|
}
 | 
						|
 | 
						|
// GetKeyInfo returns role and GUN info of a key by ID
 | 
						|
func (cs *CryptoService) GetKeyInfo(keyID string) (trustmanager.KeyInfo, error) {
 | 
						|
	for _, store := range cs.keyStores {
 | 
						|
		if info, err := store.GetKeyInfo(keyID); err == nil {
 | 
						|
			return info, nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return trustmanager.KeyInfo{}, fmt.Errorf("Could not find info for keyID %s", keyID)
 | 
						|
}
 | 
						|
 | 
						|
// RemoveKey deletes a key by ID
 | 
						|
func (cs *CryptoService) RemoveKey(keyID string) (err error) {
 | 
						|
	for _, ks := range cs.keyStores {
 | 
						|
		ks.RemoveKey(keyID)
 | 
						|
	}
 | 
						|
	return // returns whatever the final values were
 | 
						|
}
 | 
						|
 | 
						|
// AddKey adds a private key to a specified role.
 | 
						|
// The GUN is inferred from the cryptoservice itself for non-root roles
 | 
						|
func (cs *CryptoService) AddKey(role data.RoleName, gun data.GUN, key data.PrivateKey) (err error) {
 | 
						|
	// First check if this key already exists in any of our keystores
 | 
						|
	for _, ks := range cs.keyStores {
 | 
						|
		if keyInfo, err := ks.GetKeyInfo(key.ID()); err == nil {
 | 
						|
			if keyInfo.Role != role {
 | 
						|
				return fmt.Errorf("key with same ID already exists for role: %s", keyInfo.Role.String())
 | 
						|
			}
 | 
						|
			logrus.Debugf("key with same ID %s and role %s already exists", key.ID(), keyInfo.Role.String())
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
	// If the key didn't exist in any of our keystores, add and return on the first successful keystore
 | 
						|
	for _, ks := range cs.keyStores {
 | 
						|
		// Try to add to this keystore, return if successful
 | 
						|
		if err = ks.AddKey(trustmanager.KeyInfo{Role: role, Gun: gun}, key); err == nil {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return // returns whatever the final values were
 | 
						|
}
 | 
						|
 | 
						|
// ListKeys returns a list of key IDs valid for the given role
 | 
						|
func (cs *CryptoService) ListKeys(role data.RoleName) []string {
 | 
						|
	var res []string
 | 
						|
	for _, ks := range cs.keyStores {
 | 
						|
		for k, r := range ks.ListKeys() {
 | 
						|
			if r.Role == role {
 | 
						|
				res = append(res, k)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
// ListAllKeys returns a map of key IDs to role
 | 
						|
func (cs *CryptoService) ListAllKeys() map[string]data.RoleName {
 | 
						|
	res := make(map[string]data.RoleName)
 | 
						|
	for _, ks := range cs.keyStores {
 | 
						|
		for k, r := range ks.ListKeys() {
 | 
						|
			res[k] = r.Role // keys are content addressed so don't care about overwrites
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
// CheckRootKeyIsEncrypted makes sure the root key is encrypted. We have
 | 
						|
// internal assumptions that depend on this.
 | 
						|
func CheckRootKeyIsEncrypted(pemBytes []byte) error {
 | 
						|
	block, _ := pem.Decode(pemBytes)
 | 
						|
	if block == nil {
 | 
						|
		return ErrNoValidPrivateKey
 | 
						|
	}
 | 
						|
 | 
						|
	if block.Type == "ENCRYPTED PRIVATE KEY" {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	if !notary.FIPSEnabled() && x509.IsEncryptedPEMBlock(block) {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	return ErrRootKeyNotEncrypted
 | 
						|
}
 |