Class: Arver::KeySaver
- Inherits:
-
Object
- Object
- Arver::KeySaver
- Defined in:
- lib/arver/key_saver.rb
Class Method Summary collapse
- .add(user, key) ⇒ Object
- .add_padding(key) ⇒ Object
- .backup_key_path(user) ⇒ Object
- .config_path ⇒ Object
- .deflate(string, level = 6) ⇒ Object
- .inflate(string) ⇒ Object
- .key_path(user) ⇒ Object
- .num_of_key_files(user) ⇒ Object
- .purge_keys(user) ⇒ Object
- .read(user) ⇒ Object
- .save(user, key) ⇒ Object
- .save_to(user, key, path) ⇒ Object
- .substract_padding(key) ⇒ Object
- .tmp_key_path(user) ⇒ Object
Class Method Details
.add(user, key) ⇒ Object
16 17 18 19 20 |
# File 'lib/arver/key_saver.rb', line 16 def self.add( user, key ) path = key_path( user ) filename = save_to( user, key, path ) File.join(path,filename) end |
.add_padding(key) ⇒ Object
119 120 121 122 123 124 125 126 127 128 129 |
# File 'lib/arver/key_saver.rb', line 119 def self.add_padding( key ) marker = "--"+SecureRandom.base64( 82 ) size = 200000 padding_size = size - key.size if padding_size <= 0 padding_size = 0 Arver::Log.warn( "Warning: Your arver keys exceed the maximal padding size, therefore i can no longer disguise how many keys you possess.") end padding = SecureRandom.base64( padding_size )[0..padding_size] marker +"\n"+ key + "\n" + marker + "\n" + padding end |
.backup_key_path(user) ⇒ Object
72 73 74 |
# File 'lib/arver/key_saver.rb', line 72 def self.backup_key_path( user ) "#{key_path(user)}.bak" end |
.config_path ⇒ Object
80 81 82 |
# File 'lib/arver/key_saver.rb', line 80 def self.config_path Arver::LocalConfig.instance.config_dir end |
.deflate(string, level = 6) ⇒ Object
22 23 24 25 26 27 |
# File 'lib/arver/key_saver.rb', line 22 def self.deflate(string, level=6) z = Zlib::Deflate.new(level) dst = z.deflate(string, Zlib::FINISH) z.close dst end |
.inflate(string) ⇒ Object
29 30 31 32 33 34 35 |
# File 'lib/arver/key_saver.rb', line 29 def self.inflate(string) zstream = Zlib::Inflate.new buf = zstream.inflate(string) zstream.finish zstream.close buf end |
.key_path(user) ⇒ Object
68 69 70 |
# File 'lib/arver/key_saver.rb', line 68 def self.key_path( user ) File.join("#{config_path}","keys","#{user}") end |
.num_of_key_files(user) ⇒ Object
88 89 90 |
# File 'lib/arver/key_saver.rb', line 88 def self.num_of_key_files( user ) Dir.entries( key_path( user ) ).size - 2 end |
.purge_keys(user) ⇒ Object
84 85 86 |
# File 'lib/arver/key_saver.rb', line 84 def self.purge_keys( user ) FileUtils.rm_rf( key_path( user ) ) end |
.read(user) ⇒ Object
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 |
# File 'lib/arver/key_saver.rb', line 92 def self.read( user ) GPGKeyManager.check_key_of( user ) return [] unless File.exist?( key_path( user ) ) decrypted = [] crypto = GPGME::Crypto.new Dir.entries( key_path( user ) ).sort.each do | file | unless( file == "." || file == ".." ) Arver::Log.trace( "Loading keyfile "+file ) key_encrypted = File.open( File.join( key_path( user ),file) ) begin decrypted_txt = crypto.decrypt( key_encrypted, { :passphrase_callback => method( :passfunc ) } ) rescue GPGME::Error => gpgerr Arver::Log.error( "GPGME Error #{gpgerr} Message: #{gpgerr.}" ) next end decrypted_key = substract_padding( decrypted_txt.read ) begin decrypted_key = inflate( decrypted_key ) rescue Zlib::DataError Log.write("You have an outdated key. Run garbage collect to update it.") end decrypted += [ decrypted_key ]; end end decrypted end |
.save(user, key) ⇒ Object
5 6 7 8 9 10 11 12 13 14 |
# File 'lib/arver/key_saver.rb', line 5 def self.save( user, key ) tmp_path = tmp_key_path( user ) back_path = backup_key_path( user ) path = key_path( user ) filename = save_to( user, key, tmp_path ) FileUtils.mv(path,back_path) if File.exist?(path) FileUtils.mv(tmp_path,path) FileUtils.rm_rf(back_path) File.join(path,filename) end |
.save_to(user, key, path) ⇒ Object
37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 |
# File 'lib/arver/key_saver.rb', line 37 def self.save_to( user, key, path ) #compress the key before applying padding, so the size after encryption+compression by gpg is more stable... key = deflate(key) unless GPGKeyManager.check_key_of( user ) Arver::Log.error( "Error no key for #{user}" ) return end gpg_key = GPGKeyManager.key_of( user ) key = add_padding( key ) crypto = GPGME::Crypto.new :armor => true begin if( Arver::RuntimeConfig.instance.trust_all ) encrypted = crypto.encrypt( key, {:recipients => gpg_key.fingerprint, :always_trust => true}) else encrypted = crypto.encrypt( key, {:recipients => gpg_key.fingerprint, :armor => true}) end rescue GPGME::Error => gpgerr Arver::Log.error( "GPGME Error #{gpgerr} Message: #{gpgerr.}" ) return end key_encrypted = encrypted.read unless( Arver::RuntimeConfig.instance.dry_run ) FileUtils.mkdir_p path unless File.exist?( path ) filename = "#{OpenSSL::Digest::SHA256.new << key_encrypted}" File.open( File.join("#{path}","#{filename}"), 'w' ) do |f| f.write key_encrypted end end filename end |
.substract_padding(key) ⇒ Object
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 |
# File 'lib/arver/key_saver.rb', line 131 def self.substract_padding( key ) if key[0...4] == "--- " Arver::Log.warn( "Warning: you are using deprecated unpadded keyfiles. Please run garbage collect!" ) return key end marker = "" striped_key = "" key.each_line do |line| if( marker.empty? ) marker = line elsif( line == marker ) break else striped_key += line end end striped_key.chomp end |
.tmp_key_path(user) ⇒ Object
76 77 78 |
# File 'lib/arver/key_saver.rb', line 76 def self.tmp_key_path( user ) File.join("#{config_path}","tmp","#{user}") end |