X-Git-Url: https://the.earth.li/gitweb/?a=blobdiff_plain;ds=sidebyside;f=onak.c;h=a27ff983e78908d6de2e57013173d7b97d7118cf;hb=837ef213d51dfa1469eee8fbb48003988dd133c1;hp=f67c969e513e47382cff59e1e5be867de36ed0bc;hpb=c04c1c60469823c01268187ec49102d1ff540806;p=onak.git
diff --git a/onak.c b/onak.c
index f67c969..a27ff98 100644
--- a/onak.c
+++ b/onak.c
@@ -15,8 +15,7 @@
* more details.
*
* You should have received a copy of the GNU General Public License along with
- * this program; if not, write to the Free Software Foundation, Inc., 51
- * Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ * this program. If not, see .
*/
#include
@@ -28,6 +27,8 @@
#include
#include
+#include "build-config.h"
+
#include "armor.h"
#include "charfuncs.h"
#include "cleankey.h"
@@ -42,26 +43,31 @@
#include "onak-conf.h"
#include "parsekey.h"
#include "photoid.h"
-#include "version.h"
-void find_keys(char *search, uint64_t keyid, uint8_t *fp, bool ishex,
- bool isfp, bool fingerprint, bool skshash, bool exact,
- bool verbose)
+void find_keys(struct onak_dbctx *dbctx,
+ char *search, uint64_t keyid,
+ struct openpgp_fingerprint *fingerprint,
+ bool ishex, bool isfp, bool dispfp, bool skshash,
+ bool exact, bool verbose)
{
struct openpgp_publickey *publickey = NULL;
int count = 0;
if (ishex) {
- count = config.dbbackend->fetch_key_id(keyid, &publickey,
+ count = dbctx->fetch_key_id(dbctx, keyid, &publickey,
false);
- } else if (isfp) {
- count = config.dbbackend->fetch_key_fp(fp, MAX_FINGERPRINT_LEN,
+ } else if (isfp && exact) {
+ count = dbctx->fetch_key(dbctx, fingerprint,
+ &publickey, false);
+ } else if (isfp && !exact) {
+ count = dbctx->fetch_key_fp(dbctx, fingerprint,
&publickey, false);
} else {
- count = config.dbbackend->fetch_key_text(search, &publickey);
+ count = dbctx->fetch_key_text(dbctx, search, &publickey);
}
if (publickey != NULL) {
- key_index(publickey, verbose, fingerprint, skshash, false);
+ key_index(dbctx, publickey, verbose, dispfp, skshash,
+ false);
free_publickey(publickey);
} else if (count == 0) {
puts("Key not found.");
@@ -146,6 +152,7 @@ void usage(void) {
puts("\tgetphoto - retrieves the first photoid on the given key and"
" dumps to\n\t stdout");
puts("\tindex - search for a key and list it");
+ puts("\treindex - retrieve and re-store a key in the backend db");
puts("\tvindex - search for a key and list it and its signatures");
}
@@ -160,20 +167,21 @@ int main(int argc, char *argv[])
char *search = NULL;
char *end = NULL;
uint64_t keyid = 0;
- uint8_t fp[MAX_FINGERPRINT_LEN];
int i;
+ bool exact = false;
bool ishex = false;
bool isfp = false;
- bool verbose = false;
bool update = false;
bool binary = false;
- bool fingerprint = false;
+ bool dispfp = false;
bool skshash = false;
int optchar;
struct dump_ctx dumpstate;
struct skshash hash;
+ struct onak_dbctx *dbctx;
+ struct openpgp_fingerprint fingerprint;
- while ((optchar = getopt(argc, argv, "bc:fsuv")) != -1 ) {
+ while ((optchar = getopt(argc, argv, "bc:efsuv")) != -1 ) {
switch (optchar) {
case 'b':
binary = true;
@@ -181,8 +189,11 @@ int main(int argc, char *argv[])
case 'c':
configfile = strdup(optarg);
break;
+ case 'e':
+ exact = true;
+ break;
case 'f':
- fingerprint = true;
+ dispfp = true;
break;
case 's':
skshash = true;
@@ -191,7 +202,6 @@ int main(int argc, char *argv[])
update = true;
break;
case 'v':
- verbose = true;
setlogthreshold(LOGTHING_INFO);
break;
}
@@ -204,17 +214,17 @@ int main(int argc, char *argv[])
if ((argc - optind) < 1) {
usage();
} else if (!strcmp("dump", argv[optind])) {
- config.dbbackend->initdb(true);
+ dbctx = config.dbinit(config.backend, true);
dumpstate.count = dumpstate.filenum = 0;
dumpstate.maxcount = 100000;
dumpstate.fd = -1;
dumpstate.filebase = "keydump.%d.pgp";
- config.dbbackend->iterate_keys(dump_func, &dumpstate);
+ dbctx->iterate_keys(dbctx, dump_func, &dumpstate);
if (dumpstate.fd != -1) {
close(dumpstate.fd);
dumpstate.fd = -1;
}
- config.dbbackend->cleanupdb();
+ dbctx->cleanupdb(dbctx);
} else if (!strcmp("add", argv[optind])) {
if (binary) {
result = read_openpgp_stream(stdin_getchar, NULL,
@@ -231,14 +241,18 @@ int main(int argc, char *argv[])
logthing(LOGTHING_INFO, "Finished reading %d keys.",
result);
- result = cleankeys(keys);
+ dbctx = config.dbinit(config.backend, false);
+ result = cleankeys(dbctx, &keys,
+ config.clean_policies);
logthing(LOGTHING_INFO, "%d keys cleaned.",
result);
- config.dbbackend->initdb(false);
logthing(LOGTHING_NOTICE, "Got %d new keys.",
- config.dbbackend->update_keys(&keys,
- false));
+ dbctx->update_keys(dbctx, &keys,
+ &config.blacklist,
+ (config.clean_policies &
+ ONAK_CLEAN_UPDATE_ONLY),
+ false));
if (keys != NULL && update) {
flatten_publickey(keys,
&packets,
@@ -255,7 +269,7 @@ int main(int argc, char *argv[])
free_packet_list(packets);
packets = NULL;
}
- config.dbbackend->cleanupdb();
+ dbctx->cleanupdb(dbctx);
} else {
rc = 1;
logthing(LOGTHING_NOTICE, "No keys read.");
@@ -269,6 +283,7 @@ int main(int argc, char *argv[])
logthing(LOGTHING_NOTICE, "No changes.");
}
} else if (!strcmp("clean", argv[optind])) {
+ dbctx = config.dbinit(config.backend, true);
if (binary) {
result = read_openpgp_stream(stdin_getchar, NULL,
&packets, 0);
@@ -286,7 +301,8 @@ int main(int argc, char *argv[])
result);
if (keys != NULL) {
- result = cleankeys(keys);
+ result = cleankeys(dbctx, &keys,
+ config.clean_policies);
logthing(LOGTHING_INFO, "%d keys cleaned.",
result);
@@ -315,37 +331,58 @@ int main(int argc, char *argv[])
free_publickey(keys);
keys = NULL;
}
+ dbctx->cleanupdb(dbctx);
+ } else if (!strcmp("dumpconfig", argv[optind])) {
+ if ((argc - optind) == 2) {
+ writeconfig(argv[optind + 1]);
+ } else {
+ /* Dump config to stdout */
+ writeconfig(NULL);
+ }
} else if ((argc - optind) == 2) {
search = argv[optind+1];
if (search != NULL && strlen(search) == 42 &&
search[0] == '0' && search[1] == 'x') {
- for (i = 0; i < MAX_FINGERPRINT_LEN; i++) {
- fp[i] = (hex2bin(search[2 + i * 2]) << 4) +
+ /* v4 fingerprint */
+ fingerprint.length = 20;
+ for (i = 0; i < 20; i++) {
+ fingerprint.fp[i] =
+ (hex2bin(search[2 + i * 2]) << 4) +
+ hex2bin(search[3 + i * 2]);
+ }
+ isfp = true;
+ } else if (search != NULL && strlen(search) == 66 &&
+ search[0] == '0' && search[1] == 'x') {
+ /* v5 fingerprint */
+ fingerprint.length = 32;
+ for (i = 0; i < 32; i++) {
+ fingerprint.fp[i] =
+ (hex2bin(search[2 + i * 2]) << 4) +
hex2bin(search[3 + i * 2]);
}
isfp = true;
} else if (search != NULL) {
- keyid = strtoul(search, &end, 16);
+ keyid = strtouq(search, &end, 16);
if (*search != 0 &&
end != NULL &&
*end == 0) {
ishex = true;
}
}
- config.dbbackend->initdb(false);
+ dbctx = config.dbinit(config.backend, false);
if (!strcmp("index", argv[optind])) {
- find_keys(search, keyid, fp, ishex, isfp,
- fingerprint, skshash,
- false, false);
+ find_keys(dbctx, search, keyid, &fingerprint, ishex,
+ isfp, dispfp, skshash,
+ exact, false);
} else if (!strcmp("vindex", argv[optind])) {
- find_keys(search, keyid, fp, ishex, isfp,
- fingerprint, skshash,
- false, true);
+ find_keys(dbctx, search, keyid, &fingerprint, ishex,
+ isfp, dispfp, skshash,
+ exact, true);
} else if (!strcmp("getphoto", argv[optind])) {
if (!ishex) {
puts("Can't get a key on uid text."
" You must supply a keyid.");
- } else if (config.dbbackend->fetch_key_id(keyid, &keys,
+ } else if (dbctx->fetch_key_id(dbctx, keyid, &keys,
false)) {
unsigned char *photo = NULL;
size_t length = 0;
@@ -363,20 +400,29 @@ int main(int argc, char *argv[])
puts("Key not found");
}
} else if (!strcmp("delete", argv[optind])) {
- config.dbbackend->delete_key(
- config.dbbackend->getfullkeyid(keyid),
- false);
+ if (!isfp) {
+ if (dbctx->fetch_key_id(dbctx, keyid, &keys,
+ false)) {
+ get_fingerprint(keys->publickey,
+ &fingerprint);
+ dbctx->delete_key(dbctx, &fingerprint,
+ false);
+ free_publickey(keys);
+ keys = NULL;
+ }
+ } else
+ dbctx->delete_key(dbctx, &fingerprint, false);
} else if (!strcmp("get", argv[optind])) {
if (!(ishex || isfp)) {
puts("Can't get a key on uid text."
" You must supply a keyid / "
"fingerprint.");
} else if ((isfp &&
- config.dbbackend->fetch_key_fp(fp,
- MAX_FINGERPRINT_LEN,
+ dbctx->fetch_key_fp(dbctx,
+ &fingerprint,
&keys, false)) ||
(ishex &&
- config.dbbackend->fetch_key_id(keyid,
+ dbctx->fetch_key_id(dbctx, keyid,
&keys, false))) {
logthing(LOGTHING_INFO, "Got key.");
flatten_publickey(keys,
@@ -400,7 +446,7 @@ int main(int argc, char *argv[])
} else if (!strcmp("hget", argv[optind])) {
if (!parse_skshash(search, &hash)) {
puts("Couldn't parse sks hash.");
- } else if (config.dbbackend->fetch_key_skshash(&hash,
+ } else if (dbctx->fetch_key_skshash(dbctx, &hash,
&keys)) {
logthing(LOGTHING_INFO, "Got key.");
flatten_publickey(keys,
@@ -421,14 +467,26 @@ int main(int argc, char *argv[])
} else {
puts("Key not found");
}
+ } else if (!strcmp("reindex", argv[optind])) {
+ dbctx->starttrans(dbctx);
+ if (dbctx->fetch_key_id(dbctx, keyid, &keys, true)) {
+ get_fingerprint(keys->publickey, &fingerprint);
+ dbctx->delete_key(dbctx, &fingerprint, true);
+ cleankeys(dbctx, &keys, config.clean_policies);
+ dbctx->store_key(dbctx, keys, true, false);
+ } else {
+ puts("Key not found");
+ }
+ dbctx->endtrans(dbctx);
}
- config.dbbackend->cleanupdb();
+ dbctx->cleanupdb(dbctx);
} else {
usage();
}
cleanuplogthing();
cleanupconfig();
+ free(configfile);
return rc;
}