mirror of
https://codeberg.org/guix/guix.git
synced 2025-10-02 02:15:12 +00:00
Previously, we'd spawn 'guix authenticate' once for each item that has to be signed (when exporting) or authenticated (when importing). Now, we spawn it once for all and then follow a request/reply protocol. This reduces the wall-clock time of: guix archive --export -r $(guix build coreutils -d) from 30s to 2s. * guix/scripts/authenticate.scm (sign-with-key): Return the signature instead of displaying it. Raise a &formatted-message instead of calling 'leave'. (validate-signature): Likewise. (read-command): New procedure. (define-enumerate-type, reply-code): New macros. (guix-authenticate)[send-reply]: New procedure. Change to read commands from current-input-port. * nix/libstore/local-store.cc (runAuthenticationProgram): Remove. (authenticationAgent, readInteger, readAuthenticateReply): New functions. (signHash, verifySignature): Rewrite in terms of the agent. * tests/store.scm ("import not signed"): Remove 'pk' call. ("import signed by unauthorized key"): Check the error message of C. * tests/guix-authenticate.sh: Rewrite using the new protocol. fixlet
193 lines
7.4 KiB
Scheme
193 lines
7.4 KiB
Scheme
;;; GNU Guix --- Functional package management for GNU
|
||
;;; Copyright © 2013, 2014, 2015, 2016, 2017, 2020 Ludovic Courtès <ludo@gnu.org>
|
||
;;;
|
||
;;; This file is part of GNU Guix.
|
||
;;;
|
||
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
||
;;; under the terms of the GNU General Public License as published by
|
||
;;; the Free Software Foundation; either version 3 of the License, or (at
|
||
;;; your option) any later version.
|
||
;;;
|
||
;;; GNU Guix is distributed in the hope that it will be useful, but
|
||
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
;;; GNU General Public License for more details.
|
||
;;;
|
||
;;; You should have received a copy of the GNU General Public License
|
||
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
||
|
||
(define-module (guix scripts authenticate)
|
||
#:use-module (guix scripts)
|
||
#:use-module (guix base16)
|
||
#:use-module (gcrypt pk-crypto)
|
||
#:use-module (guix pki)
|
||
#:use-module (guix ui)
|
||
#:use-module (guix diagnostics)
|
||
#:use-module (srfi srfi-34)
|
||
#:use-module (srfi srfi-35)
|
||
#:use-module (rnrs bytevectors)
|
||
#:use-module (ice-9 binary-ports)
|
||
#:use-module (ice-9 rdelim)
|
||
#:use-module (ice-9 match)
|
||
#:export (guix-authenticate))
|
||
|
||
;;; Commentary:
|
||
;;;
|
||
;;; This program is used internally by the daemon to sign exported archive
|
||
;;; (the 'export-paths' RPC), and to authenticate imported archives (the
|
||
;;; 'import-paths' RPC.)
|
||
;;;
|
||
;;; Code:
|
||
|
||
(define read-canonical-sexp
|
||
;; Read a gcrypt sexp from a port and return it.
|
||
(compose string->canonical-sexp read-string))
|
||
|
||
(define (sign-with-key key-file sha256)
|
||
"Sign the hash SHA256 (a bytevector) with KEY-FILE, and return the signature
|
||
as a canonical sexp that includes both the hash and the actual signature."
|
||
(let* ((secret-key (call-with-input-file key-file read-canonical-sexp))
|
||
(public-key (if (string-suffix? ".sec" key-file)
|
||
(call-with-input-file
|
||
(string-append (string-drop-right key-file 4)
|
||
".pub")
|
||
read-canonical-sexp)
|
||
(raise
|
||
(formatted-message
|
||
(G_ "cannot find public key for secret key '~a'~%")
|
||
key-file))))
|
||
(data (bytevector->hash-data sha256
|
||
#:key-type (key-type public-key)))
|
||
(signature (signature-sexp data secret-key public-key)))
|
||
signature))
|
||
|
||
(define (validate-signature signature)
|
||
"Validate SIGNATURE, a canonical sexp. Check whether its public key is
|
||
authorized, verify the signature, and return the signed data (a bytevector)
|
||
upon success."
|
||
(let* ((subject (signature-subject signature))
|
||
(data (signature-signed-data signature)))
|
||
(if (and data subject)
|
||
(if (authorized-key? subject)
|
||
(if (valid-signature? signature)
|
||
(hash-data->bytevector data) ; success
|
||
(raise
|
||
(formatted-message (G_ "invalid signature: ~a")
|
||
(canonical-sexp->string signature))))
|
||
(raise
|
||
(formatted-message (G_ "unauthorized public key: ~a")
|
||
(canonical-sexp->string subject))))
|
||
(raise
|
||
(formatted-message (G_ "corrupt signature data: ~a")
|
||
(canonical-sexp->string signature))))))
|
||
|
||
(define (read-command port)
|
||
"Read a command from PORT and return the command and arguments as a list of
|
||
strings. Return the empty list when the end-of-file is reached.
|
||
|
||
Commands are newline-terminated and must look something like this:
|
||
|
||
COMMAND 3:abc 5:abcde 1:x
|
||
|
||
where COMMAND is an alphanumeric sequence and the remainder is the command
|
||
arguments. Each argument is written as its length (in characters), followed
|
||
by colon, followed by the given number of characters."
|
||
(define (consume-whitespace port)
|
||
(let ((chr (lookahead-u8 port)))
|
||
(when (eqv? chr (char->integer #\space))
|
||
(get-u8 port)
|
||
(consume-whitespace port))))
|
||
|
||
(match (read-delimited " \t\n\r" port)
|
||
((? eof-object?)
|
||
'())
|
||
(command
|
||
(let loop ((result (list command)))
|
||
(consume-whitespace port)
|
||
(let ((next (lookahead-u8 port)))
|
||
(cond ((eqv? next (char->integer #\newline))
|
||
(get-u8 port)
|
||
(reverse result))
|
||
((eof-object? next)
|
||
(reverse result))
|
||
(else
|
||
(let* ((len (string->number (read-delimited ":" port)))
|
||
(str (utf8->string
|
||
(get-bytevector-n port len))))
|
||
(loop (cons str result))))))))))
|
||
|
||
(define-syntax define-enumerate-type ;TODO: factorize
|
||
(syntax-rules ()
|
||
((_ name->int (name id) ...)
|
||
(define-syntax name->int
|
||
(syntax-rules (name ...)
|
||
((_ name) id) ...)))))
|
||
|
||
;; Codes used when reply to requests.
|
||
(define-enumerate-type reply-code
|
||
(success 0)
|
||
(command-not-found 404)
|
||
(command-failed 500))
|
||
|
||
|
||
;;;
|
||
;;; Entry point.
|
||
;;;
|
||
|
||
(define-command (guix-authenticate . args)
|
||
(category internal)
|
||
(synopsis "sign or verify signatures on normalized archives (nars)")
|
||
|
||
(define (send-reply code str)
|
||
;; Send CODE and STR as a reply to our client.
|
||
(let ((bv (string->utf8 str)))
|
||
(format #t "~a ~a:" code (bytevector-length bv))
|
||
(put-bytevector (current-output-port) bv)
|
||
(force-output (current-output-port))))
|
||
|
||
;; Signature sexps written to stdout may contain binary data, so force
|
||
;; ISO-8859-1 encoding so that things are not mangled. See
|
||
;; <http://bugs.gnu.org/17312> for details.
|
||
(set-port-encoding! (current-output-port) "ISO-8859-1")
|
||
(set-port-conversion-strategy! (current-output-port) 'error)
|
||
|
||
;; Same goes for input ports.
|
||
(with-fluids ((%default-port-encoding "ISO-8859-1")
|
||
(%default-port-conversion-strategy 'error))
|
||
(match args
|
||
(("--help")
|
||
(display (G_ "Usage: guix authenticate OPTION...
|
||
Sign data or verify signatures. This tool is meant to be used internally by
|
||
'guix-daemon'.\n")))
|
||
(("--version")
|
||
(show-version-and-exit "guix authenticate"))
|
||
(()
|
||
(let loop ()
|
||
(guard (c ((formatted-message? c)
|
||
(send-reply (reply-code command-failed)
|
||
(apply format #f
|
||
(G_ (formatted-message-string c))
|
||
(formatted-message-arguments c)))))
|
||
;; Read a request on standard input and reply.
|
||
(match (read-command (current-input-port))
|
||
(("sign" signing-key (= base16-string->bytevector hash))
|
||
(let ((signature (sign-with-key signing-key hash)))
|
||
(send-reply (reply-code success)
|
||
(canonical-sexp->string signature))))
|
||
(("verify" signature)
|
||
(send-reply (reply-code success)
|
||
(bytevector->base16-string
|
||
(validate-signature
|
||
(string->canonical-sexp signature)))))
|
||
(()
|
||
(exit 0))
|
||
(commands
|
||
(warning (G_ "~s: invalid command; ignoring~%") commands)
|
||
(send-reply (reply-code command-not-found)
|
||
"invalid command"))))
|
||
|
||
(loop)))
|
||
(_
|
||
(leave (G_ "wrong arguments~%"))))))
|
||
|
||
;;; authenticate.scm ends here
|