]> Git — Sourcephile - git-remote-gpg.git/blob - git-remote-gpg
fix setting remote HEAD
[git-remote-gpg.git] / git-remote-gpg
1 #!/usr/bin/perl
2 our $VERSION = '2014.01.28';
3 # License
4 # This file is a git-remote-helpers(1) to use a gpg(1)
5 # as a cryptographic layer below git(1)'s objects.
6 # Copyright (C) 2014 Julien Moutinho
7 #
8 # This program is free software: you can redistribute it and/or modify
9 # it under the terms of the GNU General Public License as published
10 # by the Free Software Foundation, either version 3 of the License,
11 # or any later version.
12 #
13 # This program is distributed in the hope that it will be useful,
14 # but WITHOUT ANY WARRANTY; without even the implied warranty
15 # of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
16 # See the GNU General Public License for more details.
17 #
18 # You should have received a copy of the GNU General Public License
19 # along with this program. If not, see <http://www.gnu.org/licenses/>.
20 # Dependencies
21 use strict;
22 use warnings FATAL => qw(all);
23 use Carp;
24 use Cwd;
25 use File::Basename;
26 use File::Copy;
27 use File::Path;
28 use File::Spec::Functions qw(:ALL);
29 use File::Temp;
30 use Getopt::Long;
31 use IPC::Run;
32 # NOTE: to debug: IPCRUNDEBUG=basic|data|details|gory
33 use IO::Handle;
34 use JSON;
35 use POSIX qw(WNOHANG);
36 use URI;
37
38 require Pod::Usage;
39 require Data::Dumper;
40 # Trace utilities
41 sub trace (@) {
42 foreach my $msg (@_) {
43 print STDERR $msg
44 if defined $msg;
45 }
46 }
47 sub debug (@) {
48 my $call = (caller(1))[3];
49 if ($ENV{TRACE}) {
50 trace
51 ( "\e[35mDEBUG\e[m"
52 , "\e[30m\e[1m.", join('.', $call."\e[m")
53 , " ", (map {
54 ref $_ eq 'CODE'
55 ? $_->()
56 : Data::Dumper::Dumper($_)
57 } @_)
58 );
59 }
60 return 1;
61 }
62 sub info (@) {
63 my $call = (caller(1))[3];
64 trace
65 ( "\e[32mINFO\e[m"
66 , "\e[30m\e[1m.", join('.', $call."\e[m")
67 , " ", (ref $_ eq 'CODE'?(join("\n ", $_->()), "\n"):(@_, "\n"))
68 );
69 }
70 sub warning (@) {
71 local $Carp::CarpLevel = 1;
72 carp("\e[33mWARNING\e[m ", @_, "\n\t");
73 }
74 sub error (@) {
75 local $Carp::CarpLevel = 1;
76 croak("\e[31mERROR\e[m ", @_, "\n\t");
77 }
78 # System utilities
79 sub rm (@) {
80 foreach my $file (@_) {
81 debug(sub{"file=$file\n"});
82 if (-e $file) {
83 unlink($file)
84 or error("rm $file");
85 }
86 }
87 }
88 sub mkdir (@) {
89 foreach my $dir (@_) {
90 debug(sub{"dir=$dir\n"});
91 File::Path::make_path($dir, {verbose=>0, error => \my $error});
92 if (@$error) {
93 for my $diag (@$error) {
94 my ($dir, $message) = %$diag;
95 error("dir=$dir: $message");
96 }
97 }
98 }
99 }
100 # grg crypto
101 sub grg_rand ($$) {
102 my ($ctx, $size) = @_;
103 local $_;
104 IPC::Run::run([@{$ctx->{config}->{gpg}}
105 , '--armor', '--gen-rand', '1', $size]
106 , '>', \$_)
107 or error("failed to get random bits");
108 chomp;
109 return $_;
110 }
111 sub grg_hash ($$;$) {
112 my ($ctx, $algo, $run) = @_;
113 $run = sub {return @_} unless defined $run;
114 my $hash;
115 IPC::Run::run($run->([@{$ctx->{config}->{gpg}}
116 , '--with-colons', '--print-md', $algo]
117 , '>', \$hash))
118 or error("failed to hash data");
119 return ((split(':', $hash))[2]);
120 }
121 sub gpg_fingerprint($$$) {
122 my ($ctx, $id, $caps_needed) = @_;
123 my ($output);
124 my %h = ();
125 if (IPC::Run::run([@{$ctx->{config}->{gpg}}
126 , '--fixed-list-mode', '--with-colons', '--with-fingerprint', '--list-keys', $id]
127 , '>', \$output)) {
128 my @lines = split(/\n/,$output);
129 while (my $line = shift @lines) {
130 if (my ($longkeyid, $caps) = $line =~ m/^pub:[^:]*:[^:]*:[^:]*:([^:]*):[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:([^:]+):.*$/) {
131 my $skip = 0;
132 foreach my $cap (@$caps_needed) {
133 if (not ($caps =~ m/$cap/)) {
134 warning("skipping key 0x$longkeyid which has not usable capability: $cap, but matches: `$id'");
135 $skip = 1;
136 }
137 }
138 if (not $skip) {
139 my $fpr = undef;
140 my $uid = undef;
141 while ((not defined $fpr or not defined $uid)
142 and $line = shift @lines) {
143 (not defined $fpr and (($fpr) = $line =~ m/^fpr:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:([0-9A-F]+):.*$/)) or
144 (not defined $uid and (($uid) = $line =~ m/^uid:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:([^:]+):.*$/)) or
145 1;
146 }
147 error("unable to extract fingerprint and user ID")
148 unless defined $fpr
149 and defined $uid;
150 $h{$fpr} = $uid;
151 }
152 }
153 }
154 }
155 error("unable to find any OpenPGP key with usable capability: ".join('', @$caps_needed)." for: `$id'")
156 unless scalar(%h) gt 0;
157 debug(sub{"$id -> "}, \%h);
158 return %h;
159 }
160 sub grg_encrypt_symmetric ($$$;$) {
161 my ($ctx, $clear, $key, $run) = @_;
162 $run = sub {return @_} unless defined $run;
163 IPC::Run::run($run->([@{$ctx->{config}->{gpg}}
164 , '--batch', '--yes'
165 , '--compress-algo', 'none'
166 , '--force-mdc'
167 , '--passphrase-fd', '3'
168 , '--s2k-mode', '1'
169 , '--trust-model', 'always'
170 , '--symmetric']
171 , '<', \$clear, '3<', \$key))
172 or error("failed to encrypt symmetrically data");
173 }
174 sub grg_decrypt_symmetric ($$$;$) {
175 my ($ctx, $key, $run) = @_;
176 $run = sub {return @_} unless defined $run;
177 IPC::Run::run($run->([@{$ctx->{config}->{gpg}}
178 , '--batch', '--no-default-keyring', '--keyring', '/dev/null', '--secret-keyring', '/dev/null'
179 , '--passphrase-fd', '3', '--quiet', '--decrypt']
180 , '3<', \$key))
181 or error("failed to decrypt symmetrically data");
182 }
183 sub grg_encrypt_asymmetric ($$;$) {
184 my ($ctx, $clear, $run) = @_;
185 $run = sub {return @_} unless defined $run;
186 my @recipients =
187 ( (map { ('--recipient', '0x'.$_) } (keys %{$ctx->{config}->{keys}}))
188 , (map { ('--hidden-recipient', '0x'.$_) } (keys %{$ctx->{config}->{'hidden-keys'}})) );
189 @recipients = ('--default-recipient-self')
190 if @recipients == 0;
191 IPC::Run::run($run->([@{$ctx->{config}->{gpg}}
192 , '--batch', '--yes'
193 , '--compress-algo', 'none'
194 , '--trust-model', 'always'
195 , '--sign', '--encrypt'
196 , ($ctx->{config}->{signingkey}->{fpr} ? ('--local-user', $ctx->{config}->{signingkey}->{fpr}) : ())
197 , @recipients ]
198 , '<', \$clear))
199 or error("failed to encrypt asymmetrically data");
200 }
201 sub grg_decrypt_asymmetric ($$;$) {
202 my ($ctx, $run) = @_;
203 my ($clear, $status);
204 $run = sub {return @_} unless defined $run;
205 IPC::Run::run($run->([@{$ctx->{config}->{gpg}}
206 , '--batch', '--no-default-keyring',
207 , '--status-fd', '3', '--quiet', '--decrypt']
208 , '>', \$clear, '3>', \$status))
209 or error("failed to decrypt asymmetrically data");
210 debug(sub{"status=\n$status"});
211 my @lines = split(/\n/,$status);
212 my ($enc_to, $goodsig, $validsig, $validpub, $goodmdc);
213 foreach my $line (@lines) {
214 (not defined $enc_to and (($enc_to) = $line =~ m/^\[GNUPG:\] ENC_TO ([0-9A-F]+).*$/)) or
215 (not defined $goodsig and (($goodsig) = $line =~ m/^\[GNUPG:\] GOODSIG ([0-9A-F]+).*$/)) or
216 (not defined $goodmdc and (($goodmdc) = $line =~ m/^\[GNUPG:\] (GOODMDC)$/)) or
217 (not defined $validsig and not defined $validpub and (($validsig, $validpub)
218 = $line =~ m/^\[GNUPG:\] VALIDSIG ([0-9A-F]+) [^ ]+ [^ ]+ [^ ]+ [^ ]+ [^ ]+ [^ ]+ [^ ]+ [^ ]+ ([0-9A-F]+).*$/)) or
219 1;
220 }
221 error("data expected to be encrypted")
222 unless $enc_to;
223 debug(sub{"enc_to=$enc_to\n"});
224 error("data expected to be signed")
225 unless $goodsig;
226 debug(sub{"goodsig=$goodsig\n"});
227 error("modification detection code incorrect")
228 unless $goodmdc;
229 debug(sub{"good_mdc=$goodmdc\n"});
230 error("data signature invalid")
231 unless $validsig and $validpub;
232 debug(sub{"validsig=$validsig\n"});
233 debug(sub{"validpub=$validpub\n"});
234 error("data signature refused")
235 unless exists $ctx->{config}->{keys}->{$validpub}
236 or exists $ctx->{config}->{'hidden-keys'}->{$validpub};
237 debug(sub{"accepted:$validpub\n"});
238 return $clear;
239 }
240 # grg remote I/O
241 sub grg_remote_fetch_file ($) {
242 my ($ctx) = @_;
243 # NOTE: avoid File::Copy::copy().
244 while (my ($file, undef) = each %{$ctx->{remote}->{fetch}}) {
245 my $path = File::Spec->catfile($ctx->{remote}->{uri}->file, $file);
246 if (-r $path) {
247 my $h = $ctx->{remote}->{fetch}->{$file};
248 $h->{path} = $path;
249 $h->{preserve} = 1;
250 }
251 else { return 0; }
252 }
253 return 1;
254 }
255 sub grg_remote_fetch_rsync ($) {
256 my ($ctx) = @_;
257 my $uri = $ctx->{remote}->{uri}->clone;
258 my @src;
259 if ($uri->opaque =~ m{^//}) {
260 $uri->fragment(undef);
261 $uri->query(undef);
262 @src = map { $uri->path($_); $uri->as_string; }
263 (keys %{$ctx->{remote}->{fetch}});
264 }
265 else {
266 my ($authority, $path, $fragment)
267 = $uri->as_string =~ m|^rsync:(?:([^/#:]+):)?([^?#]*)(?:#(.*))?$|;
268 @src = map { "$authority:$path/$_" }
269 (keys %{$ctx->{remote}->{fetch}});
270 }
271 IPC::Run::run([@{$ctx->{config}->{rsync}}
272 , '-i', '--ignore-times', '--inplace', '--progress'
273 , @src
274 , $ctx->{'dir-cache'}.'/']
275 , '>&2')
276 }
277 sub grg_remote_fetch_sftp ($) {
278 my ($ctx) = @_;
279 IPC::Run::run([@{$ctx->{config}->{curl}}
280 , '--show-error'
281 , '--output', File::Spec->catfile($ctx->{'dir-cache'}, '#1')
282 , File::Spec->catfile($ctx->{remote}->{uri}->as_string
283 , '{'.join(',', (keys %{$ctx->{remote}->{fetch}})).'}') ])
284 }
285 sub grg_remote_fetch ($$) {
286 my ($ctx, $files) = @_;
287 debug(sub{'files='}, $files);
288 my $scheme = $ctx->{remote}->{uri}->scheme;
289 $ctx->{remote}->{fetch}
290 = {map { $_ =>
291 { path => File::Spec->catfile($ctx->{'dir-cache'}, $_)
292 , preserve => 0 }
293 } @$files};
294 my $fct =
295 { file => \&grg_remote_fetch_file
296 , rsync => \&grg_remote_fetch_rsync
297 , sftp => \&grg_remote_fetch_sftp
298 }->{$scheme};
299 error("URL scheme not supported: `$scheme'")
300 unless $fct;
301 $fct->($ctx)
302 or $ctx->{remote}->{fetch} = {};
303 return $ctx->{remote}->{fetch};
304 }
305 sub grg_remote_init_file ($) {
306 my ($ctx) = @_;
307 my $dst = $ctx->{remote}->{uri}->file;
308 &mkdir($dst);
309 return 1;
310 }
311 sub grg_remote_init_rsync ($) {
312 my ($ctx) = @_;
313 my $tmp = File::Temp->tempdir('grg_rsync_XXXXXXXX', CLEANUP => 1);
314 my $uri = $ctx->{remote}->{uri}->clone;
315 my ($path, $dst);
316 if ($uri->opaque =~ m{^//}) {
317 $uri->fragment(undef);
318 $uri->query(undef);
319 $path = $uri->path;
320 $dst = $uri->as_string;
321 }
322 else {
323 my ($authority, $fragment);
324 ($authority, $path, $fragment)
325 = $uri->as_string =~ m|^rsync:(?:([^/#:]+):)?([^?#]*)(?:#(.*))?$|;
326 $dst = "$authority:";
327 }
328 &mkdir(File::Spec->catdir($tmp, $path));
329 IPC::Run::run([@{$ctx->{config}->{rsync}}
330 , '-i', '--recursive', '--relative'
331 , '--exclude=*', '.'
332 , $dst]
333 , '>&2'
334 , init => sub { chdir $tmp or die $!; })
335 }
336 sub grg_remote_init_sftp ($) {
337 my ($ctx) = @_;
338 my $path = $ctx->{remote}->{uri}->path;
339 my $uri = $ctx->{remote}->{uri}->clone;
340 $uri->fragment(undef);
341 $uri->path(undef);
342 $uri->query(undef);
343 IPC::Run::run([@{$ctx->{config}->{curl}}
344 , '--show-error', '--ftp-create-dirs'
345 , '-Q', "+mkdir ".$path
346 , $uri->as_string])
347 }
348 sub grg_remote_init ($) {
349 my ($ctx) = @_;
350 my $scheme = $ctx->{remote}->{uri}->scheme;
351 my $fct =
352 { file => \&grg_remote_init_file
353 , rsync => \&grg_remote_init_rsync
354 , sftp => \&grg_remote_init_sftp
355 }->{$scheme};
356 error("URL scheme not supported: `$scheme'")
357 unless $fct;
358 $fct->($ctx)
359 or error("remote init failed");
360 return;
361 }
362 sub grg_remote_push_file ($) {
363 my ($ctx) = @_;
364 my $ok = 1;
365 foreach my $file (@{$ctx->{remote}->{push}}) {
366 my $src = File::Spec->catfile($ctx->{'dir-cache'}, $file);
367 my $dst = File::Spec->catfile($ctx->{remote}->{uri}->file, $file);
368 debug(sub{"File::Copy::move('$src', '$dst')\n"});
369 if (not File::Copy::move($src, $dst)) {
370 $ok = 0;
371 last;
372 }
373 }
374 return $ok;
375 }
376 sub grg_remote_push_rsync ($) {
377 my ($ctx) = @_;
378 my $uri = $ctx->{remote}->{uri}->clone;
379 $uri->fragment(undef);
380 $uri->query(undef);
381 my ($path, $dst);
382 if ($uri->opaque =~ m{^//}) {
383 $uri->fragment(undef);
384 $uri->query(undef);
385 $dst = $uri->as_string;
386 }
387 else {
388 my ($authority, $path, $fragment)
389 = $uri->as_string =~ m|^rsync:(?:([^/#:]+):)?([^?#]*)(?:#(.*))?$|;
390 $dst = "$authority:$path/";
391 }
392 IPC::Run::run([@{$ctx->{config}->{rsync}}
393 , '-i', '--relative'
394 , (@{$ctx->{remote}->{push}})
395 , $dst]
396 , '>&2'
397 , init => sub { chdir $ctx->{'dir-cache'} or die $!; });
398 }
399 sub grg_remote_push_sftp ($) {
400 my ($ctx) = @_;
401 my $uri = $ctx->{remote}->{uri}->clone;
402 $uri->fragment('');
403 $uri->query('');
404 IPC::Run::run([@{$ctx->{config}->{curl}}
405 , '--show-error', '--ftp-create-dirs', '--upload-file'
406 , '{'.join(',', @{$ctx->{remote}->{push}}).'}'
407 , $uri->as_string.'/'])
408 }
409 sub grg_remote_push ($) {
410 my ($ctx) = @_;
411 my $scheme = $ctx->{remote}->{uri}->scheme;
412 grg_remote_init($ctx)
413 unless $ctx->{remote}->{checked};
414 return 1
415 if @{$ctx->{remote}->{push}} == 0;
416 my $fct =
417 { file => \&grg_remote_push_file
418 , rsync => \&grg_remote_push_rsync
419 , sftp => \&grg_remote_push_sftp
420 }->{$scheme};
421 error("URL scheme not supported: `$scheme'")
422 unless $fct;
423 $fct->($ctx)
424 or error("remote push failed");
425 rm(map {File::Spec->catfile($ctx->{'dir-cache'}, $_)} @{$ctx->{remote}->{push}});
426 return 1;
427 }
428 sub grg_remote_remove ($) {
429 my ($ctx) = @_;
430 #my $scheme = $ctx->{remote}->{uri}->scheme;
431 #my $fct =
432 # { file => sub {
433 # File::Copy::remove_tree
434 # ( map { File::Spec->catfile($ctx->{remote}->{uri}->path, $_) } @$files
435 # , verbose => 1 )
436 # }
437 # , rsync => sub {
438 # IPC::Run::run([@{$ctx->{config}->{rsync}}
439 # , '--verbose', '--ignore-times', '--recursive', '--delete'
440 # , @$files
441 # , $ctx->{remote}->{uri}])
442 # }
443 # , sftp => sub {
444 # IPC::Run::run([@{$ctx->{config}->{curl}}
445 # , '--show-error'
446 # , map { ('-Q', 'rm '.$_) } @$files
447 # , $ctx->{remote}->{uri}])
448 # }
449 # }->{$scheme};
450 #error("URL scheme not supported: `$scheme'")
451 # unless $fct;
452 #$fct->($ctx, $ctx->{remote}->{remove})
453 # or error("remote remove failed");
454 #return;
455 }
456 # grg packing
457 sub grg_pack_fetch ($$) {
458 my ($ctx, $fetch_objects) = @_;
459 local $_;
460 # %remote_objects
461 my %remote_objects = ();
462 while (my ($pack_id, $pack) = each %{$ctx->{manifest}->{packs}}) {
463 foreach my $obj (@{$pack->{objects}}) {
464 $remote_objects{$obj} = $pack_id;
465 }
466 }
467 # @packs_to_fetch
468 my %packs_to_fetch = ();
469 foreach my $obj (@$fetch_objects) {
470 my @packs = ($remote_objects{$obj});
471 while (my $pack_id = shift @packs) {
472 if (not exists $packs_to_fetch{$pack_id}) {
473 $packs_to_fetch{$pack_id} = 1;
474 my $manifest_pack = $ctx->{manifest}->{packs}->{$pack_id};
475 error("manifest is missing a dependency pack: $pack_id")
476 unless defined $manifest_pack;
477 @packs = (@packs, @{$manifest_pack->{deps}});
478 }
479 }
480 }
481 my @packs_to_fetch = keys %packs_to_fetch;
482 my $packs_fetched = grg_remote_fetch($ctx, [@packs_to_fetch]);
483 foreach my $pack_id (@packs_to_fetch) {
484 my $pack_fetched
485 = exists $packs_fetched->{$pack_id}
486 ? $packs_fetched->{$pack_id}
487 : {path => File::Spec->catfile($ctx->{'dir-cache'}, $pack_id), preserve => 0};
488 my $manifest_pack = $ctx->{manifest}->{packs}->{$pack_id};
489 my $pack_key = $manifest_pack->{key};
490 my $pack_data;
491 grg_decrypt_symmetric($ctx, $pack_key, sub {
492 push @{$_[0]}, ($pack_fetched->{path});
493 return (@_, '>', \$pack_data);
494 });
495 my $pack_hash_algo = $manifest_pack->{hash_algo};
496 my $pack_hash = grg_hash($ctx
497 , $pack_hash_algo
498 , sub { return (@_, '<', \$pack_data); });
499 error("pack data hash differs from pack manifest hash")
500 unless $pack_hash eq $manifest_pack->{hash};
501 rm($pack_fetched)
502 unless $pack_fetched->{preserve};
503 IPC::Run::run(['git', 'index-pack', '-v', '--stdin']
504 , '<', \$pack_data
505 , '>&2');
506 }
507 }
508 sub grg_pack_push ($$) {
509 my ($ctx, $push_objects) = @_;
510 local $_;
511 debug(sub{"push_objects=\n"}, $push_objects);
512 # %remote_objects
513 my %remote_objects = ();
514 while (my ($pack_id, $pack) = each %{$ctx->{manifest}->{packs}}) {
515 foreach my $obj (@{$pack->{objects}}) {
516 $remote_objects{$obj} = $pack_id;
517 }
518 }
519 # @common_objects
520 IPC::Run::run(['git', 'cat-file', '--batch-check']
521 , '<', \join("\n", keys %remote_objects)
522 , '>', \$_)
523 or error("failed to query local git objects");
524 my @common_objects
525 = map {
526 if ($_ =~ m/ missing$/) { () }
527 else { s/ .*//; $_ }
528 } (split(/\n/, $_));
529 # @pack_objects, @pack_deps_objects
530 IPC::Run::run(['git', 'rev-list', '--objects-edge', '--stdin', '--']
531 , '<', \join("\n", ((map {'^'.$_} @common_objects), @$push_objects))
532 , '>', \$_)
533 or error("failed to query objects to pack");
534 my @pack_objects_edge = split(/\n/, $_);
535 foreach (@pack_objects_edge) {s/ .*//}
536 my @pack_objects = grep {m/^[^-]/} @pack_objects_edge;
537 my @pack_deps_objects = grep {s/^-//} @pack_objects_edge;
538 # %pack_deps
539 my %pack_deps = ();
540 foreach my $obj (@pack_deps_objects) {
541 my $pack = $remote_objects{$obj};
542 error("manifest is missing object dependencies")
543 unless defined $pack;
544 $pack_deps{$pack} = 1;
545 }
546 if (@pack_objects > 0) {
547 # $pack_id
548 my $pack_id;
549 my $pack_id_try = 0;
550 while (not defined $pack_id
551 or exists $ctx->{manifest}->{packs}->{$pack_id}) {
552 $pack_id = grg_rand($ctx, $ctx->{config}->{'pack-filename-size'});
553 $pack_id =~ s{/}{-}g;
554 error("failed to pick an unused random pack filename after 512 tries; retry or increase grg.pack-filename-size")
555 if $pack_id_try++ >= 512;
556 }
557 my $pack_key = grg_rand($ctx, $ctx->{config}->{'pack-key-size'});
558 my $pack_data;
559 IPC::Run::run(['git', 'pack-objects', '--stdout']
560 , '<', \join("\n", @pack_objects)
561 , '>', \$pack_data)
562 or error("failed to pack objects to push");
563 my $pack_hash = grg_hash($ctx
564 , $ctx->{config}->{'pack-hash-algo'}
565 , sub { return (@_, '<', \$pack_data); });
566 grg_encrypt_symmetric($ctx, $pack_data, $pack_key, sub {
567 push @{$_[0]}, ('--output', File::Spec->catfile($ctx->{'dir-cache'}, $pack_id));
568 return @_;
569 });
570 push @{$ctx->{remote}->{push}}, $pack_id;
571 $ctx->{manifest}->{packs}->{$pack_id} =
572 { deps => [keys %pack_deps]
573 , hash => $pack_hash
574 , hash_algo => $ctx->{config}->{'pack-hash-algo'}
575 , key => $pack_key
576 , objects => \@pack_objects
577 };
578 }
579 }
580 # grg manifest
581 sub grg_manifest_fetch ($) {
582 my ($ctx) = @_;
583 $ctx->{manifest} =
584 { 'hidden-keys' => {}
585 , keys => {}
586 , packs => {}
587 , refs => {}
588 , version => undef
589 };
590 my $fetched = grg_remote_fetch($ctx, [$ctx->{'manifest-file'}]);
591 my $crypt = $fetched->{$ctx->{'manifest-file'}}->{path};
592 if (defined $crypt) {
593 $ctx->{remote}->{checked} = 1;
594 my $json;
595 grg_decrypt_asymmetric($ctx, sub {
596 push @{$_[0]}, $crypt;
597 return (@_, '>', \$json); });
598 rm($fetched->{$ctx->{'manifest-file'}}->{path})
599 unless $fetched->{$ctx->{'manifest-file'}}->{preserve};
600 my $manifest;
601 ($manifest = JSON::decode_json($json) and ref $manifest eq 'HASH')
602 or error("failed to decode JSON manifest");
603 $ctx->{manifest} = {%{$ctx->{manifest}}, %$manifest};
604 foreach my $slot (qw(keys hidden-keys)) {
605 while (my ($fpr, $uid) = each %{$ctx->{manifest}->{$slot}}) {
606 my %keys = gpg_fingerprint($ctx, '0x'.$fpr, ['E']);
607 my ($fpr, $uid) = each %keys;
608 $ctx->{config}->{$slot}->{$fpr} = $uid;
609 }
610 }
611 }
612 else {
613 debug(sub{'ctx='}, $ctx);
614 if ($ctx->{command} eq 'push' or $ctx->{command} eq 'list for-push') {
615 $ctx->{remote}->{checked} = 0;
616 }
617 elsif ($ctx->{remote}->{checking}) {
618 exit 100;
619 }
620 else {
621 error("remote checking failed");
622 }
623 }
624 }
625 sub grg_manifest_push ($) {
626 my ($ctx) = @_;
627 foreach my $slot (qw(keys hidden-keys)) {
628 $ctx->{manifest}->{$slot} = {};
629 while (my ($fpr, $uid) = each %{$ctx->{config}->{$slot}}) {
630 $ctx->{manifest}->{$slot}->{$fpr} = $uid;
631 }
632 }
633 my $json = JSON::encode_json($ctx->{manifest})
634 or error("failed to encode JSON manifest");
635 grg_encrypt_asymmetric($ctx, $json, sub {
636 push @{$_[0]}
637 , ('--output', File::Spec->catfile($ctx->{'dir-cache'}, $ctx->{'manifest-file'}));
638 return @_; });
639 push @{$ctx->{remote}->{push}}, $ctx->{'manifest-file'};
640 }
641 # grg config
642 sub grg_config_read($) {
643 my ($ctx) = @_;
644 my $cfg = $ctx->{config};
645 local $/ = "\n";
646
647 foreach my $name (qw(gpg signingkey keys)
648 , grep { !m/^(gpg|signingkey|keys)$/ } (keys %$cfg)) {
649 my $value;
650 IPC::Run::run(['git', 'config', '--get', 'remote.'.$ctx->{remote}->{name}.'.'.$name, '.+'], '>', \$value) or
651 IPC::Run::run(['git', 'config', '--get', 'grg.'.$name, '.+'], '>', \$value) or 1;
652 if ($name eq 'signingkey') {
653 IPC::Run::run(['git', 'config', '--get', 'user.'.$name, '.+'], '>', \$value)
654 if (not $value);
655 chomp $value;
656 my %keys = gpg_fingerprint($ctx, $value, ['S']);
657 warning("signing key ID is not matching a unique key: taking only one")
658 unless scalar(keys %keys) == 1;
659 my ($fpr, $uid) = each %keys;
660 $cfg->{$name} = {fpr => $fpr, uid => $uid};
661 }
662 elsif ($name eq 'keys' or $name eq 'hidden-keys') {
663 IPC::Run::run(['git', 'config', '--get', 'user.'.$name, '.+'], '>', \$value)
664 if (not $value);
665 chomp $value;
666 my @ids = split(/,/, $value);
667 if (@ids > 0) {
668 foreach my $key (@ids) {
669 my %keys = gpg_fingerprint($ctx, $key, ['E']);
670 while (my ($fpr, $uid) = each %keys) {
671 $cfg->{$name}->{$fpr} = $uid;
672 }
673 }
674 }
675 }
676 elsif (grep(/^$name$/, qw(curl gpg rsync))) {
677 IPC::Run::run(['git', 'config', '--get', $name.'.program', '.+'], '>', \$value)
678 if (not $value);
679 $cfg->{$name} = [split(' ', $value)]
680 if $value;
681 }
682 else {
683 chomp $value;
684 $cfg->{$name} = $value
685 if $value;
686 }
687 }
688 error("no signingkey configured; to do so you may use one of following commands:\n"
689 , "\t\$ git config remote.'$ctx->{remote}->{name}'.signingkey \$your_openpgp_id\n"
690 , "\t\$ git config grg.signingkey \$your_openpgp_id\n"
691 , "\t\$ git config user.signingkey \$your_openpgp_id"
692 ) unless defined $cfg->{signingkey};
693 if ( (scalar (keys %{$cfg->{keys}}) == 0)
694 and (scalar (keys %{$cfg->{'hidden-keys'}}) == 0) ) {
695 $cfg->{keys} = { $cfg->{signingkey}->{fpr} => $cfg->{signingkey}->{uid} };
696 }
697
698 debug(sub{'config='},$cfg);
699 }
700 # grg system
701 sub grg_connect ($) {
702 my ($ctx) = @_;
703 grg_config_read($ctx);
704 grg_manifest_fetch($ctx);
705 }
706 sub grg_disconnect ($) {
707 my ($ctx) = @_;
708 grg_remote_push($ctx);
709 }
710 # grg commands
711 sub gpg_command_answer ($) {
712 my @cmd = @_;
713 debug(sub{join('', @cmd)."\n"});
714 print STDOUT (@cmd, "\n");
715 }
716 sub grg_command_capabilities ($) {
717 my ($ctx) = @_;
718 $ctx->{command} = 'capabilities';
719 gpg_command_answer("fetch");
720 gpg_command_answer("push");
721 gpg_command_answer("");
722 STDOUT->flush;
723 }
724 sub grg_command_fetch ($$) {
725 my ($ctx, $fetch_refs) = @_;
726 $ctx->{command} = 'fetch';
727 debug(sub{"fetch_refs="}, $fetch_refs);
728 grg_connect($ctx);
729 # @fetch_objects
730 my @fetch_objects= ();
731 foreach my $ref (@$fetch_refs) {
732 push @fetch_objects, $ref->{sha1};
733 }
734 grg_pack_fetch($ctx, \@fetch_objects);
735 }
736 sub grg_command_list ($$) {
737 my ($ctx, $command) = @_;
738 $ctx->{command} = $command;
739 grg_connect($ctx);
740 while (my ($ref, $obj) = each %{$ctx->{manifest}->{refs}}) {
741 gpg_command_answer("$obj $ref");
742 };
743 gpg_command_answer("");
744 }
745 sub grg_command_push ($$) {
746 my ($ctx, $push_refs) = @_;
747 local $_;
748 $ctx->{command} = 'push';
749 debug(sub{"push_refs="}, $push_refs);
750 grg_connect($ctx);
751 # @push_objects
752 my @push_objects= ();
753 foreach my $ref (@$push_refs) {
754 IPC::Run::run(['git', 'rev-list', '--ignore-missing', '--max-count=1', $ref->{src}, '--']
755 , '>', \$_)
756 or error("failed to dereference ref to push: ".$ref->{src});
757 chomp;
758 $ref->{src_obj} = $_;
759 push @push_objects, $_;
760 }
761 grg_pack_push($ctx, \@push_objects);
762 my $manifest_refs = $ctx->{manifest}->{refs};
763 foreach my $ref (@$push_refs) {
764 $manifest_refs->{$ref->{dst}} = $ref->{src_obj};
765 }
766 $manifest_refs->{HEAD}
767 = $push_refs->[-1]->{src_obj}
768 unless @$push_refs == 0;
769 grg_manifest_push($ctx);
770 grg_disconnect($ctx);
771 }
772 sub grg_commands(@) {
773 my ($ctx) = @_;
774 my $line = undef;
775 local $/ = "\n";
776 #STDOUT->autoflush(1);
777 while (defined $line or (not eof(*STDIN) and
778 (defined($line = readline(*STDIN)))
779 ? (chomp $line or 1)
780 : error("readline failed: $!")
781 )) {
782 debug(sub{"line=\"",$line,"\"\n"});
783 $ctx->{command} = undef;
784 if ($line eq 'capabilities') {
785 grg_command_capabilities($ctx);
786 $line = undef;
787 }
788 elsif ($line =~ m/^fetch .*$/) {
789 my @refs = ();
790 my ($sha1, $name);
791 while ((defined $line or (not eof(*STDIN) and
792 ((defined($line = readline(*STDIN)))
793 ? (chomp $line or 1)
794 : error("readline failed: $!")))) and
795 (($sha1, $name) = ($line =~ m/^fetch ([0-9a-f]{40}) (.+)$/))
796 ) {
797 debug(sub{"fetch line=\"",$line,"\"\n"});
798 push @refs, {sha1=>$sha1, name=>$name};
799 $line = undef;
800 }
801 error("failed to parse command: $line")
802 if @refs == 0;
803 grg_command_fetch($ctx, \@refs);
804 }
805 elsif ($line eq 'list' or $line eq 'list for-push') {
806 grg_command_list($ctx, $line);
807 $line = undef;
808 }
809 elsif ($line =~ m/^push .*$/) {
810 my @refs = ();
811 my ($force, $src, $dst);
812 while ((defined $line or (not eof(*STDIN) and
813 ((defined($line = readline(*STDIN)))
814 ? (chomp $line or 1)
815 : error("readline failed: $!")))) and
816 (($force, $src, $dst) = ($line =~ m/^push (\+)?([^:]+):(.+)$/))
817 ) {
818 debug(sub{"push line=\"",$line,"\"\n"});
819 push @refs, {force=>(defined $force), src=>$src, dst=>$dst};
820 $line = undef;
821 }
822 error("failed to parse command: $line")
823 if @refs == 0;
824 grg_command_push($ctx, \@refs);
825 }
826 elsif ($line =~ m/^$/) {
827 $line = undef;
828 {
829 local $SIG{'PIPE'} = 'IGNORE';
830 gpg_command_answer("");
831 }
832 return 0;
833 }
834 else {
835 warning("unsupported command supplied: `$line'");
836 $line = undef;
837 }
838 }
839 }
840 sub main {
841 $ENV{GIT_DIR} = $ENV{GIT_DIR} || '.git';
842 $ENV{GITCEPTION} = ($ENV{GITCEPTION} || '') . '+';
843 my $ctx =
844 { command => undef
845 , config =>
846 { curl => ['curl']
847 , gpg => ['gpg']
848 , keys => {}
849 , 'hidden-keys' => {}
850 , 'manifest-hash-algo' => 'SHA224' # NOTE: SHA512, SHA384, SHA256, SHA224 supported.
851 , 'pack-filename-size' => 42
852 , 'pack-hash-algo' => 'SHA224' # NOTE: SHA512, SHA384, SHA256, SHA224 supported.
853 , 'pack-key-size' => 64
854 , signingkey => undef
855 , rsync => ['rsync']
856 }
857 , 'dir-cache' => undef
858 , manifest => {}
859 , 'manifest-file' => undef
860 , remote =>
861 { checking => 0
862 , checked => undef
863 , name => undef
864 , uri => undef
865 , push => []
866 }
867 };
868 Getopt::Long::Configure
869 ( 'auto_version'
870 , 'pass_through'
871 , 'require_order'
872 );
873 Getopt::Long::GetOptions
874 ( help => sub { Pod::Usage::pod2usage
875 ( -exitstatus => 0
876 , -sections => ['SYNOPSIS', 'OPTIONS', 'REMOTES', 'CONFIG']
877 , -verbose => 99 ); }
878 , man => sub { Pod::Usage::pod2usage(-verbose => 2); }
879 , check => sub {
880 $ctx->{remote}->{checking} = 1;
881 }
882 );
883 if (not $ctx->{remote}->{checking}) {
884 my $name = shift @ARGV;
885 Pod::Usage::pod2usage(-verbose => 1)
886 unless defined $name;
887 ($ctx->{remote}->{name}) = ($name =~ m/^((\w|-)+)$/);
888 error("valid name of remote Git required, got: `$name'")
889 unless $ctx->{remote}->{name};
890 }
891 my $uri = shift @ARGV;
892 Pod::Usage::pod2usage(-verbose => 1)
893 unless defined $uri;
894 $ctx->{remote}->{uri} = URI->new($uri);
895 error("valid URL of remote Git required, got: `$uri'")
896 unless $ctx->{remote}->{uri};
897 my $fragment = $ctx->{remote}->{uri}->fragment;
898 $fragment = ''
899 unless defined $fragment;
900 $ctx->{'manifest-file'} = grg_hash($ctx
901 , $ctx->{config}->{'manifest-hash-algo'}
902 , sub { return (@_, '<', \$fragment); });
903 if (-d $ENV{GIT_DIR}) {
904 $ctx->{'dir-cache'} = File::Spec->catdir
905 ( $ENV{GIT_DIR}, 'cache', 'remotes'
906 , $ctx->{remote}->{name}, 'gpg');
907 &mkdir($ctx->{'dir-cache'});
908 }
909 else {
910 $ctx->{'dir-cache'} = File::Temp->tempdir('grg_cache_XXXXXXXX', CLEANUP => 1);
911 }
912 debug(sub{"ctx="},$ctx);
913 grg_commands($ctx);
914 }
915 main;
916 1;
917 __END__
918
919 =encoding utf8
920
921 =head1 NAME
922
923 git-remote-gpg - git-remote-helpers(1) to encrypt remote repository through gpg(1)
924
925 =head1 SYNOPSIS
926
927 =item git-remote-gpg $gpg_remote $gpg_url
928
929 =item git-remote-gpg --check $gpg_url
930
931 =head1 OPTIONS
932
933 =over 8
934
935 =item B<-h>, B<--help>
936
937 =item B<--version>
938
939 =back
940
941 =head1 REMOTES
942
943 =head2 Via rsync(1)
944
945 =item git remote add $remote gpg::rsync:${user:+$user@}$host:$path
946
947 =item git remote add $remote gpg::rsync://${user:+$user@}$host${port:+:$port}/$path
948
949 =head2 Via curl(1)
950
951 =item git remote add $remote gpg::sftp://${user:+$user@}$host${port:+:$port}/$path
952
953 =head2 Via File::Copy(3pm)
954
955 =item git remote add $remote gpg::file://$path
956
957 =head1 CONFIG
958
959 =head2 git-config(1)
960
961 =over 8
962
963 =item B<grg.curl>
964
965 =item B<grg.gpg>
966
967 =item B<grg.keys>
968
969 =item B<grg.hidden-keys>
970
971 =item B<grg.manifest-hash-algo>
972
973 =item B<grg.pack-filename-size>
974
975 =item B<grg.pack-hash-algo>
976
977 =item B<grg.pack-key-size>
978
979 =item B<grg.signingkey>
980
981 =item B<grg.rsync>
982
983 =back
984
985 =cut