Onionr/onionr/onionrcommands/pubkeymanager.py

109 lines
5.1 KiB
Python
Raw Permalink Normal View History

2019-03-08 01:08:06 +00:00
'''
Onionr - Private P2P Communication
2019-03-08 01:08:06 +00:00
This module defines user ID-related CLI commands
2019-03-08 01:08:06 +00:00
'''
'''
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
'''
2019-03-15 00:18:35 +00:00
import sys, getpass
2019-03-29 17:37:51 +00:00
import logger, onionrexceptions
from onionrutils import stringvalidators, bytesconverter
from onionrusers import onionrusers, contactmanager
import unpaddedbase32
2019-03-08 01:08:06 +00:00
def add_ID(o_inst):
try:
sys.argv[2]
assert sys.argv[2] == 'true'
except (IndexError, AssertionError) as e:
newID = o_inst.onionrCore._crypto.keyManager.addKey()[0]
else:
logger.warn('Deterministic keys require random and long passphrases.', terminal=True)
logger.warn('If a good passphrase is not used, your key can be easily stolen.', terminal=True)
logger.warn('You should use a series of hard to guess words, see this for reference: https://www.xkcd.com/936/', terminal=True)
2019-03-08 01:08:06 +00:00
pass1 = getpass.getpass(prompt='Enter at least %s characters: ' % (o_inst.onionrCore._crypto.deterministicRequirement,))
pass2 = getpass.getpass(prompt='Confirm entry: ')
if o_inst.onionrCore._crypto.safeCompare(pass1, pass2):
try:
logger.info('Generating deterministic key. This can take a while.', terminal=True)
2019-03-08 01:08:06 +00:00
newID, privKey = o_inst.onionrCore._crypto.generateDeterministic(pass1)
except onionrexceptions.PasswordStrengthError:
logger.error('Passphrase must use at least %s characters.' % (o_inst.onionrCore._crypto.deterministicRequirement,), terminal=True)
2019-03-08 01:08:06 +00:00
sys.exit(1)
else:
logger.error('Passwords do not match.', terminal=True)
2019-03-08 01:08:06 +00:00
sys.exit(1)
try:
o_inst.onionrCore._crypto.keyManager.addKey(pubKey=newID,
privKey=privKey)
except ValueError:
logger.error('That ID is already available, you can change to it with the change-id command.', terminal=True)
return
logger.info('Added ID: %s' % (bytesconverter.bytes_to_str(newID),), terminal=True)
2019-03-08 01:08:06 +00:00
def change_ID(o_inst):
try:
key = sys.argv[2]
key = unpaddedbase32.repad(key.encode()).decode()
2019-03-08 01:08:06 +00:00
except IndexError:
logger.warn('Specify pubkey to use', terminal=True)
2019-03-08 01:08:06 +00:00
else:
if stringvalidators.validate_pub_key(key):
2019-03-08 01:08:06 +00:00
if key in o_inst.onionrCore._crypto.keyManager.getPubkeyList():
o_inst.onionrCore.config.set('general.public_key', key)
o_inst.onionrCore.config.save()
logger.info('Set active key to: %s' % (key,), terminal=True)
logger.info('Restart Onionr if it is running.', terminal=True)
2019-03-08 01:08:06 +00:00
else:
logger.warn('That key does not exist', terminal=True)
2019-03-08 01:08:06 +00:00
else:
logger.warn('Invalid key %s' % (key,), terminal=True)
2019-03-08 01:08:06 +00:00
def friend_command(o_inst):
friend = ''
try:
# Get the friend command
action = sys.argv[2]
except IndexError:
logger.info('Syntax: friend add/remove/list [address]', terminal=True)
2019-03-08 01:08:06 +00:00
else:
action = action.lower()
if action == 'list':
# List out peers marked as our friend
for friend in contactmanager.ContactManager.list_friends(o_inst.onionrCore):
logger.info(friend.publicKey + ' - ' + friend.get_info('name'), terminal=True)
2019-03-08 01:08:06 +00:00
elif action in ('add', 'remove'):
try:
friend = sys.argv[3]
if not stringvalidators.validate_pub_key(friend):
2019-03-08 01:08:06 +00:00
raise onionrexceptions.InvalidPubkey('Public key is invalid')
if friend not in o_inst.onionrCore.listPeers():
raise onionrexceptions.KeyNotKnown
friend = onionrusers.OnionrUser(o_inst.onionrCore, friend)
except IndexError:
logger.warn('Friend ID is required.', terminal=True)
action = 'error' # set to 'error' so that the finally block does not process anything
2019-03-08 01:08:06 +00:00
except onionrexceptions.KeyNotKnown:
o_inst.onionrCore.addPeer(friend)
friend = onionrusers.OnionrUser(o_inst.onionrCore, friend)
finally:
if action == 'add':
friend.setTrust(1)
logger.info('Added %s as friend.' % (friend.publicKey,), terminal=True)
elif action == 'remove':
2019-03-08 01:08:06 +00:00
friend.setTrust(0)
logger.info('Removed %s as friend.' % (friend.publicKey,), terminal=True)
2019-03-08 01:08:06 +00:00
else:
logger.info('Syntax: friend add/remove/list [address]', terminal=True)