3 # password store management tool
5 # Copyright (c) 2008 Peter Palfrader <peter@palfrader.org>
7 # Permission is hereby granted, free of charge, to any person obtaining
8 # a copy of this software and associated documentation files (the
9 # "Software"), to deal in the Software without restriction, including
10 # without limitation the rights to use, copy, modify, merge, publish,
11 # distribute, sublicense, and/or sell copies of the Software, and to
12 # permit persons to whom the Software is furnished to do so, subject to
13 # the following conditions:
15 # The above copyright notice and this permission notice shall be
16 # included in all copies or substantial portions of the Software.
18 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
19 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
20 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
21 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
22 # LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
23 # OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
24 # WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
31 Thread.abort_on_exception = true
33 GNUPG = "/usr/bin/gpg"
35 $program_name = File.basename($0, '.*')
37 $editor = ENV['EDITOR']
39 %w{/usr/bin/sensible-editor /usr/bin/editor /usr/bin/vi}.each do |editor|
40 if FileTest.executable?(editor)
50 @@keyid_fpr_mapping = {}
52 def GnuPG.readwrite3(intxt, infd, stdoutfd, stderrfd, statusfd)
53 outtxt, stderrtxt, statustxt = ''
54 thread_in = Thread.new {
58 thread_out = Thread.new {
59 outtxt = stdoutfd.read
62 thread_err = Thread.new {
63 errtxt = stderrfd.read
66 thread_status = Thread.new {
67 statustxt = statusfd.read
74 thread_status.join if thread_status
76 return outtxt, stderrtxt, statustxt
79 def GnuPG.gpgcall(intxt, args, require_success = false)
83 statR, statW = IO.pipe
93 exec(GNUPG, "--status-fd=#{statW.fileno}", *args)
94 raise ("Calling gnupg failed")
100 (outtxt, stderrtxt, statustxt) = readwrite3(intxt, inW, outR, errR, statR);
101 wpid, status = Process.waitpid2 pid
102 throw "Unexpected pid: #{pid} vs #{wpid}" unless pid == wpid
103 throw "Process has not exited!?" unless status.exited?
104 throw "gpg call did not exit sucessfully" if (require_success and status.exitstatus != 0)
105 return outtxt, stderrtxt, statustxt, status.exitstatus
108 def GnuPG.init_keys()
110 (outtxt, stderrtxt, statustxt) = GnuPG.gpgcall('', %w{--fast-list-mode --with-colons --with-fingerprint --list-secret-keys}, true)
113 outtxt.split("\n").each do |line|
114 parts = line.split(':')
115 if (parts[0] == "ssb" or parts[0] == "sec")
116 @@my_keys.push parts[4]
117 elsif (parts[0] == "fpr")
118 @@my_fprs.push parts[9]
122 # This is for my private keys, so we can tell if a file is encrypted to us
123 def GnuPG.get_my_keys()
127 # And this is for my private keys also, so we can tell if we are encrypting to ourselves
128 def GnuPG.get_my_fprs()
133 # This maps public keyids to fingerprints, so we can figure
134 # out if a file that is encrypted to a bunch of keys is
135 # encrypted to the fingerprints it should be encrypted to
136 def GnuPG.get_fpr_from_keyid(keyid)
137 fpr = @@keyid_fpr_mapping[keyid]
138 # this can be null, if we tried to find the fpr but failed to find the key in our keyring
140 STDERR.puts "Warning: No key found for keyid #{keyid}"
144 def GnuPG.get_fprs_from_keyids(keyids)
145 learn_fingerprints_from_keyids(keyids)
146 return keyids.collect{ |k| get_fpr_from_keyid(k) }
149 # this is to load the keys we will soon be asking about into
150 # our keyid-fpr-mapping hash
151 def GnuPG.learn_fingerprints_from_keyids(keyids)
152 need_to_learn = keyids.reject{ |k| @@keyid_fpr_mapping.has_key?(k) }
153 if need_to_learn.size > 0
154 args = %w{--fast-list-mode --with-colons --with-fingerprint --list-keys}
155 args.concat need_to_learn
156 (outtxt, stderrtxt, statustxt) = GnuPG.gpgcall('', args, true)
160 outtxt.split("\n").each do |line|
161 parts = line.split(':')
162 if (parts[0] == "pub")
164 elsif (parts[0] == "fpr")
166 @@keyid_fpr_mapping[pub] = fpr
167 elsif (parts[0] == "sub")
168 @@keyid_fpr_mapping[parts[4]] = fpr
172 need_to_learn.reject{ |k| @@keyid_fpr_mapping.has_key?(k) }.each { |k| @@keyid_fpr_mapping[k] = nil }
176 def read_input(query, default_yes=true)
184 print "#{query} #{append} "
185 i = STDIN.readline.chomp.downcase
204 f = File.open('.users')
205 rescue Exception => e
214 f.readlines.each do |line|
218 if (m = /^([a-zA-Z0-9-]+)\s*=\s*([0-9A-Fa-f]{40})\s*$/.match line)
221 if @users.has_key?(user)
222 STDERR.puts "User #{user} redefined at line #{lno}!"
226 elsif (m = /^(@[a-zA-Z0-9-]+)\s*=\s*(.*)$/.match line)
229 if @groups.has_key?(group)
230 STDERR.puts "Group #{group} redefined at line #{lno}!"
233 members = members.split(/[\t ,]+/)
234 @groups[group] = { "members" => members }
240 return (name =~ /^@/)
242 def check_exists(x, whence, fatal=true)
245 ok=false unless (@groups.has_key?(x))
247 ok=false unless @users.has_key?(x)
250 STDERR.puts( (fatal ? "Error: " : "Warning: ") + "#{whence} contains unknown member #{x}")
256 @groups.each_pair do |groupname, group|
257 group['members'].each do |member|
258 check_exists(member, "Group #{groupname}")
260 group['members_to_do'] = group['members'].clone
266 @groups.each_pair do |groupname, group|
267 group['keys'] = [] unless group['keys']
269 still_contains_groups = false
270 group['members_to_do'].each do |member|
272 if @groups[member]['members_to_do'].size == 0
273 group['keys'].concat @groups[member]['keys']
274 group['members_to_do'].delete(member)
277 still_contains_groups = true
280 group['keys'].push @users[member]
281 group['members_to_do'].delete(member)
285 all_expanded = false if still_contains_groups
287 break if all_expanded
289 cyclic_groups = @groups.keys.reject{|name| @groups[name]['members_to_do'].size == 0}.join(", ")
290 STDERR.puts "Cyclic group memberships in #{cyclic_groups}?"
296 def expand_targets(targets)
300 unless check_exists(t, "access line", false)
305 fprs.concat @groups[t]['keys']
315 attr_reader :accessible, :encrypted, :readable, :readers
317 def EncryptedFile.determine_readable(readers)
318 GnuPG.get_my_keys.each do |keyid|
319 return true if readers.include?(keyid)
324 def EncryptedFile.list_readers(statustxt)
326 statustxt.split("\n").each do |line|
327 m = /^\[GNUPG:\] ENC_TO ([0-9A-F]+)/.match line
334 def EncryptedFile.targets(text)
335 metaline = text.split("\n").first
336 m = /^access: (.*)/.match metaline
338 return m[1].strip.split(/[\t ,]+/)
342 def initialize(filename, new=false)
343 @groupconfig = GroupConfig.new
347 unless FileTest.readable?(filename)
352 @encrypted_content = File.read(filename)
353 (outtxt, stderrtxt, statustxt) = GnuPG.gpgcall(@encrypted_content, %w{--with-colons --no-default-keyring --secret-keyring=/dev/null --keyring=/dev/null})
354 @encrypted = !(statustxt =~ /\[GNUPG:\] NODATA/)
356 @readers = EncryptedFile.list_readers(statustxt)
357 @readable = EncryptedFile.determine_readable(@readers)
362 (outtxt, stderrtxt, statustxt, exitstatus) = GnuPG.gpgcall(@encrypted_content, %w{--decrypt})
363 if !@new and exitstatus != 0
364 proceed = read_input("Warning: gpg returned non-zero exit status #{exitstatus} when decrypting #{@filename}. Proceed?", false)
365 exit(0) unless proceed
366 elsif !@new and outtxt.length == 0
367 proceed = read_input("Warning: #{@filename} decrypted to an empty file. Proceed?")
368 exit(0) unless proceed
374 def encrypt(content, recipients)
375 args = recipients.collect{ |r| "--recipient=#{r}"}
376 args.push "--trust-model=always"
377 args.push "--encrypt"
378 (outtxt, stderrtxt, statustxt, exitstatus) = GnuPG.gpgcall(content, args)
381 proceed = read_input("Warning: gpg returned non-zero exit status #{exitstatus} when encrypting #{@filename}. Proceed (or try again)?")
382 return false unless proceed
383 elsif outtxt.length == 0
384 tryagain = read_input("Error: #{@filename} decrypted to an empty file. Edit again (or exit)?")
385 return false if tryagain
393 def determine_encryption_targets(content)
394 targets = EncryptedFile.targets(content)
396 tryagain = read_input("Warning: Did not find targets to encrypt to in header. Try again (or exit)?", true)
397 return false if tryagain
401 ok, expanded = @groupconfig.expand_targets(targets)
402 if (expanded.size == 0)
403 tryagain = read_input("Errors in access header. Edit again (or exit)?", true)
404 return false if tryagain
407 tryagain = read_input("Warnings in access header. Edit again (or continue)?", true)
408 return false if tryagain
412 GnuPG.get_my_fprs.each do |fpr|
413 if expanded.include?(fpr)
419 tryagain = read_input("File is not being encrypted to you. Edit again (or continue)?", true)
420 return false if tryagain
423 return true, expanded
426 def write_back(content, targets)
427 ok, encrypted = encrypt(content, targets)
428 return false unless ok
430 File.open(@filename,"w").write(encrypted)
436 def help(parser, code=0, io=STDOUT)
437 io.puts "Usage: #{$program_name} ls [<directory> ...]"
438 io.puts parser.summarize
439 io.puts "Lists the contents of the given directory/directories, or the current"
440 io.puts "directory if none is given. For each file show whether it is PGP-encrypted"
441 io.puts "file, and if yes whether we can read it."
447 dir = Dir.open(dirname)
448 rescue Exception => e
453 Dir.chdir(dirname) do
454 unless FileTest.exists?(".users")
455 STDERR.puts "The .users file does not exists here. This is not a password store, is it?"
458 dir.sort.each do |filename|
459 next if (filename =~ /^\./) and not (@all >= 3)
460 stat = File::Stat.new(filename)
462 puts "(sym) #{filename}" if (@all >= 2)
463 elsif stat.directory?
464 puts "(dir) #{filename}" if (@all >= 2)
466 puts "(other) #{filename}" if (@all >= 2)
468 f = EncryptedFile.new(filename)
470 puts "(!perm) #{filename}"
472 puts "(file) #{filename}" if (@all >= 2)
474 puts "(ok) #{filename}"
476 puts "(locked) #{filename}" if (@all >= 1)
485 ARGV.options do |opts|
486 opts.on_tail("-h", "--help" , "Display this help screen") { help(opts) }
487 opts.on_tail("-a", "--all" , "Show all files (use up to 3 times to show even more than all)") { @all = @all+1 }
492 dirs.push('.') unless dirs.size > 0
493 dirs.each { |dir| ls_dir(dir) }
498 def help(parser, code=0, io=STDOUT)
499 io.puts "Usage: #{$program_name} ed <filename>"
500 io.puts parser.summarize
501 io.puts "Decrypts the file, spawns an editor, and encrypts it again"
506 encrypted_file = EncryptedFile.new(filename, @new)
507 if !@new and !encrypted_file.readable && !@force
508 STDERR.puts "#{filename} is probably not readable"
512 encrypted_to = GnuPG.get_fprs_from_keyids(encrypted_file.readers).sort
514 content = encrypted_file.decrypt
515 original_content = content
517 oldsize = content.length
518 tempfile = Tempfile.open('pws')
519 tempfile.puts content
521 system($editor, tempfile.path)
523 throw "Process has not exited!?" unless status.exited?
524 unless status.exitstatus == 0
525 proceed = read_input("Warning: Editor did not exit successfully (exit code #{status.exitstatus}. Proceed?")
526 exit(0) unless proceed
528 tempfile.seek(0, IO::SEEK_SET)
529 content = tempfile.read
532 newsize = content.length
533 tempfile.seek(0, IO::SEEK_SET)
534 clearsize = (newsize > oldsize) ? newsize : oldsize
535 tempfile.print "\0"*clearsize
539 if content.length == 0
540 proceed = read_input("Warning: Content is now empty. Proceed?")
541 exit(0) unless proceed
544 ok, targets = encrypted_file.determine_encryption_targets(content)
547 if (original_content == content)
548 if (targets.sort == encrypted_to)
549 proceed = read_input("Nothing changed. Re-encrypt anyway?", false)
550 exit(0) unless proceed
552 STDERR.puts("Info: Content not changed but re-encrypting anyway because the list of keys changed")
556 success = encrypted_file.write_back(content, targets)
562 ARGV.options do |opts|
563 opts.on_tail("-h", "--help" , "Display this help screen") { help(opts) }
564 opts.on_tail("-n", "--new" , "Edit new file") { |@new| }
565 opts.on_tail("-f", "--force" , "Spawn an editor even if the file is probably not readable") { |@force| }
568 help(ARGV.options, 1, STDERR) if ARGV.length != 1
569 filename = ARGV.shift
572 if FileTest.exists?(filename)
573 STDERR.puts "#{filename} does exist"
577 if !FileTest.exists?(filename)
578 STDERR.puts "#{filename} does not exist"
580 elsif !FileTest.file?(filename)
581 STDERR.puts "#{filename} is not a regular file"
583 elsif !FileTest.readable?(filename)
584 STDERR.puts "#{filename} is not accessible (unix perms)"
589 dirname = File.dirname(filename)
590 basename = File.basename(filename)
598 def help(code=0, io=STDOUT)
599 io.puts "Usage: #{$program_name} ed"
600 io.puts " #{$program_name} ls"
601 io.puts " #{$program_name} help"
602 io.puts "Call #{$program_name} <command> --help for additional options/parameters"
626 # vim:set shiftwidth=2: