2016-05-26 07:58:50 +00:00
|
|
|
/**
|
|
|
|
* Mailvelope - secure email with OpenPGP encryption for Webmail
|
|
|
|
* Copyright (C) 2016 Mailvelope GmbH
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License version 3
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
'use strict';
|
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
const log = require('npmlog');
|
|
|
|
const util = require('./util');
|
|
|
|
|
2016-05-26 11:45:32 +00:00
|
|
|
/**
|
|
|
|
* Database documents have the format:
|
|
|
|
* {
|
2016-05-27 17:57:48 +00:00
|
|
|
* _id: "02C134D079701934", // the 16 byte key id in uppercase hex
|
2016-05-26 11:45:32 +00:00
|
|
|
* publicKeyArmored: "-----BEGIN PGP PUBLIC KEY BLOCK----- ... -----END PGP PUBLIC KEY BLOCK-----"
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
const DB_TYPE = 'publickey';
|
|
|
|
|
2016-05-26 07:58:50 +00:00
|
|
|
/**
|
|
|
|
* A controller that handlers PGP public keys queries to the database
|
|
|
|
*/
|
|
|
|
class PublicKey {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create an instance of the controller
|
2016-05-27 17:57:48 +00:00
|
|
|
* @param {Object} openpgp An instance of OpenPGP.js
|
|
|
|
* @param {Object} mongo An instance of the MongoDB client
|
|
|
|
* @param {Object} email An instance of the Email Sender
|
|
|
|
* @param {Object} userid An instance of the UserId controller
|
2016-05-26 07:58:50 +00:00
|
|
|
*/
|
2016-05-27 17:57:48 +00:00
|
|
|
constructor(openpgp, mongo, email, userid) {
|
|
|
|
this._openpgp = openpgp;
|
2016-05-26 07:58:50 +00:00
|
|
|
this._mongo = mongo;
|
2016-05-27 17:57:48 +00:00
|
|
|
this._email = email;
|
|
|
|
this._userid = userid;
|
2016-05-26 07:58:50 +00:00
|
|
|
}
|
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
/**
|
|
|
|
* Persist a new public key
|
|
|
|
* @param {String} options.publicKeyArmored The ascii armored pgp key block
|
|
|
|
* @param {String} options.primaryEmail (optional) The key's primary email address
|
|
|
|
* @yield {undefined}
|
|
|
|
*/
|
|
|
|
*put(options) {
|
|
|
|
// parse key block
|
|
|
|
let publicKeyArmored = options.publicKeyArmored;
|
|
|
|
let params = this.parseKey(publicKeyArmored);
|
|
|
|
// check for existing verfied key by id or email addresses
|
|
|
|
let verified = yield this._userid.getVerfied(params);
|
|
|
|
if (verified) {
|
|
|
|
throw util.error(304, 'Key for this user already exists: ' + verified.stringify());
|
|
|
|
}
|
|
|
|
// delete old/unverified key and user ids with the same key id
|
|
|
|
yield this.remove({ keyid:params.keyid });
|
|
|
|
// persist new key
|
|
|
|
let r = yield this._mongo.create({ _id:params.keyid, publicKeyArmored }, DB_TYPE);
|
|
|
|
if (r.insertedCount !== 1) {
|
|
|
|
throw util.error(500, 'Failed to persist key');
|
|
|
|
}
|
|
|
|
// persist new user ids
|
|
|
|
let userIds = yield this._userid.batch(params);
|
2016-05-28 08:49:26 +00:00
|
|
|
// send mails to verify user ids (send only one if primary email is provided)
|
2016-05-27 17:57:48 +00:00
|
|
|
yield this._email.sendVerification({ userIds, primaryEmail:options.primaryEmail });
|
|
|
|
}
|
2016-05-26 11:45:32 +00:00
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
/**
|
|
|
|
* Parse an ascii armored pgp key block and get its parameters.
|
|
|
|
* @param {String} publicKeyArmored The ascii armored pgp key block
|
|
|
|
* @return {Object} The key's id and user ids
|
|
|
|
*/
|
|
|
|
parseKey(publicKeyArmored) {
|
|
|
|
let keys, userIds = [];
|
|
|
|
try {
|
|
|
|
keys = this._openpgp.key.readArmored(publicKeyArmored).keys;
|
|
|
|
} catch(e) {
|
|
|
|
log.error('public-key', 'Failed to parse PGP key:\n%s', publicKeyArmored, e);
|
|
|
|
throw util.error(500, 'Failed to parse PGP key');
|
|
|
|
}
|
|
|
|
// get key user ids
|
|
|
|
keys.forEach(key => userIds = userIds.concat(key.getUserIds()));
|
|
|
|
userIds = util.deDup(userIds);
|
|
|
|
// get key id
|
|
|
|
return {
|
|
|
|
keyid: keys[0].primaryKey.getKeyId().toHex().toUpperCase(),
|
|
|
|
userIds: util.parseUserIds(userIds)
|
|
|
|
};
|
2016-05-26 11:45:32 +00:00
|
|
|
}
|
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
verify() {
|
2016-05-26 11:45:32 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
/**
|
|
|
|
* Fetch a verified public key from the database. Either the key id or the
|
|
|
|
* email address muss be provided.
|
|
|
|
* @param {String} options.keyid (optional) The public key id
|
|
|
|
* @param {String} options.email (optional) The user's email address
|
|
|
|
* @yield {Object} The public key document
|
|
|
|
*/
|
|
|
|
*get(options) {
|
|
|
|
let keyid = options.keyid, email = options.email;
|
|
|
|
let verified = yield this._userid.getVerfied({
|
|
|
|
keyid: keyid ? keyid.toUpperCase() : undefined,
|
|
|
|
userIds: email ? [{ email:email.toLowerCase() }] : undefined
|
|
|
|
});
|
2016-05-28 08:49:26 +00:00
|
|
|
if (!verified) {
|
2016-05-27 17:57:48 +00:00
|
|
|
throw util.error(404, 'Key not found');
|
|
|
|
}
|
2016-05-28 08:49:26 +00:00
|
|
|
return yield this._mongo.get({ _id:verified.keyid }, DB_TYPE);
|
2016-05-26 11:45:32 +00:00
|
|
|
}
|
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
flagForRemove() {
|
2016-05-26 11:45:32 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
verifyRemove() {
|
|
|
|
|
|
|
|
}
|
2016-05-26 11:45:32 +00:00
|
|
|
|
2016-05-27 17:57:48 +00:00
|
|
|
/**
|
|
|
|
* Delete a public key document and its corresponding user id documents.
|
|
|
|
* @param {String} options.keyid The key id
|
|
|
|
* @yield {undefined}
|
|
|
|
*/
|
|
|
|
*remove(options) {
|
|
|
|
// remove key document
|
|
|
|
yield this._mongo.remove({ _id:options.keyid }, DB_TYPE);
|
|
|
|
// remove matching user id documents
|
|
|
|
yield this._userid.remove({ keyid:options.keyid });
|
2016-05-26 11:45:32 +00:00
|
|
|
}
|
|
|
|
|
2016-05-26 07:58:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
module.exports = PublicKey;
|