aboutsummaryrefslogtreecommitdiff
path: root/perl/lib/Nix
diff options
context:
space:
mode:
authorEelco Dolstra <eelco.dolstra@logicblox.com>2014-01-21 15:30:01 +0100
committerEelco Dolstra <eelco.dolstra@logicblox.com>2014-01-21 15:30:01 +0100
commit81628a6ccc6ce496735b22492bee15c9ad46f072 (patch)
treed1ec18b84514d2f44700082f8d800efb929a7678 /perl/lib/Nix
parentb1db599dd05e86f65e73dc40584913e6e78c2bac (diff)
parent5ef8508a92997dbd7f8aa501b64fd283fb1c7bb8 (diff)
Merge branch 'master' into make
Conflicts: src/libexpr/eval.cc
Diffstat (limited to 'perl/lib/Nix')
-rw-r--r--perl/lib/Nix/Config.pm.in3
-rw-r--r--perl/lib/Nix/Crypto.pm42
-rw-r--r--perl/lib/Nix/Manifest.pm40
-rw-r--r--perl/lib/Nix/Store.xs2
4 files changed, 83 insertions, 4 deletions
diff --git a/perl/lib/Nix/Config.pm.in b/perl/lib/Nix/Config.pm.in
index ee9d865ca..e07d4c08f 100644
--- a/perl/lib/Nix/Config.pm.in
+++ b/perl/lib/Nix/Config.pm.in
@@ -13,6 +13,7 @@ $storeDir = $ENV{"NIX_STORE_DIR"} || "@storedir@";
$bzip2 = "@bzip2@";
$xz = "@xz@";
$curl = "@curl@";
+$openssl = "@openssl@";
$useBindings = "@perlbindings@" eq "yes";
@@ -32,7 +33,7 @@ sub readConfig {
open CONFIG, "<$config" or die "cannot open `$config'";
while (<CONFIG>) {
- /^\s*([\w|-]+)\s*=\s*(.*)$/ or next;
+ /^\s*([\w\-\.]+)\s*=\s*(.*)$/ or next;
$config{$1} = $2;
}
close CONFIG;
diff --git a/perl/lib/Nix/Crypto.pm b/perl/lib/Nix/Crypto.pm
new file mode 100644
index 000000000..0286e88d3
--- /dev/null
+++ b/perl/lib/Nix/Crypto.pm
@@ -0,0 +1,42 @@
+package Nix::Crypto;
+
+use strict;
+use MIME::Base64;
+use Nix::Store;
+use Nix::Config;
+use IPC::Open2;
+
+our @ISA = qw(Exporter);
+our @EXPORT = qw(signString isValidSignature);
+
+sub signString {
+ my ($privateKeyFile, $s) = @_;
+ my $hash = hashString("sha256", 0, $s);
+ my ($from, $to);
+ my $pid = open2($from, $to, $Nix::Config::openssl, "rsautl", "-sign", "-inkey", $privateKeyFile);
+ print $to $hash;
+ close $to;
+ local $/ = undef;
+ my $sig = <$from>;
+ close $from;
+ waitpid($pid, 0);
+ die "$0: OpenSSL returned exit code $? while signing hash\n" if $? != 0;
+ my $sig64 = encode_base64($sig, "");
+ return $sig64;
+}
+
+sub isValidSignature {
+ my ($publicKeyFile, $sig64, $s) = @_;
+ my ($from, $to);
+ my $pid = open2($from, $to, $Nix::Config::openssl, "rsautl", "-verify", "-inkey", $publicKeyFile, "-pubin");
+ print $to decode_base64($sig64);
+ close $to;
+ my $decoded = <$from>;
+ close $from;
+ waitpid($pid, 0);
+ return 0 if $? != 0;
+ my $hash = hashString("sha256", 0, $s);
+ return $decoded eq $hash;
+}
+
+1;
diff --git a/perl/lib/Nix/Manifest.pm b/perl/lib/Nix/Manifest.pm
index 04c699b43..015c92835 100644
--- a/perl/lib/Nix/Manifest.pm
+++ b/perl/lib/Nix/Manifest.pm
@@ -8,6 +8,7 @@ use File::stat;
use File::Path;
use Fcntl ':flock';
use Nix::Config;
+use Nix::Crypto;
our @ISA = qw(Exporter);
our @EXPORT = qw(readManifest writeManifest updateManifestDB addPatch deleteOldManifests parseNARInfo);
@@ -394,9 +395,10 @@ sub deleteOldManifests {
# Parse a NAR info file.
sub parseNARInfo {
- my ($storePath, $content) = @_;
+ my ($storePath, $content, $requireValidSig, $location) = @_;
- my ($storePath2, $url, $fileHash, $fileSize, $narHash, $narSize, $deriver, $system);
+ my ($storePath2, $url, $fileHash, $fileSize, $narHash, $narSize, $deriver, $system, $sig);
+ my $signedData = "";
my $compression = "bzip2";
my @refs;
@@ -412,11 +414,13 @@ sub parseNARInfo {
elsif ($1 eq "References") { @refs = split / /, $2; }
elsif ($1 eq "Deriver") { $deriver = $2; }
elsif ($1 eq "System") { $system = $2; }
+ elsif ($1 eq "Signature") { $sig = $2; last; }
+ $signedData .= "$line\n";
}
return undef if $storePath ne $storePath2 || !defined $url || !defined $narHash;
- return
+ my $res =
{ url => $url
, compression => $compression
, fileHash => $fileHash
@@ -427,6 +431,36 @@ sub parseNARInfo {
, deriver => $deriver
, system => $system
};
+
+ if ($requireValidSig) {
+ if (!defined $sig) {
+ warn "NAR info file `$location' lacks a signature; ignoring\n";
+ return undef;
+ }
+ my ($sigVersion, $keyName, $sig64) = split ";", $sig;
+ $sigVersion //= 0;
+ if ($sigVersion != 1) {
+ warn "NAR info file `$location' has unsupported version $sigVersion; ignoring\n";
+ return undef;
+ }
+ return undef unless defined $keyName && defined $sig64;
+ my $publicKeyFile = $Nix::Config::config{"binary-cache-public-key-$keyName"};
+ if (!defined $publicKeyFile) {
+ warn "NAR info file `$location' is signed by unknown key `$keyName'; ignoring\n";
+ return undef;
+ }
+ if (! -f $publicKeyFile) {
+ die "binary cache public key file `$publicKeyFile' does not exist\n";
+ return undef;
+ }
+ if (!isValidSignature($publicKeyFile, $sig64, $signedData)) {
+ warn "NAR info file `$location' has an invalid signature; ignoring\n";
+ return undef;
+ }
+ $res->{signedBy} = $keyName;
+ }
+
+ return $res;
}
diff --git a/perl/lib/Nix/Store.xs b/perl/lib/Nix/Store.xs
index c449ed524..d46af57e6 100644
--- a/perl/lib/Nix/Store.xs
+++ b/perl/lib/Nix/Store.xs
@@ -20,6 +20,8 @@ void doInit()
if (!store) {
try {
settings.processEnvironment();
+ settings.loadConfFile();
+ settings.update();
settings.lockCPU = false;
store = openStore();
} catch (Error & e) {