Eli Schwartz <[email protected]> writes: > The current state of verify-sig support is a bit awkward. We rely on > validating distfiles against a known trusted keyring, but creating the > known trusted keyring is basically all manual verification. We somehow > decide an ascii armored key is good enough without any portage > assistance, then arrange to download it and trust it by Manifest hash. > How do we know when updating a key is actually safe? > > This eclass handles the problem in a manner inspired in part by pacman. > We require an eclass variable that lists all permitted PGP fingerprints, > and the eclass is responsible checking that list against the keys we > will install. It comes with a mechanism for computing SRC_URI for a > couple of well known locations, or you can append your own in the > ebuild. > > Key rotations, both expected and malicious, are easily detected by > checking the git log for changes to declared fingerprints in a bump. The > former can be rationalized in the commit message. So can the latter, but > in most cases those will be rejected during peer review.
LGTM. Thanks. > > Signed-off-by: Eli Schwartz <[email protected]> > --- > eclass/sec-keys.eclass | 202 +++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 202 insertions(+) > create mode 100644 eclass/sec-keys.eclass > > diff --git a/eclass/sec-keys.eclass b/eclass/sec-keys.eclass > new file mode 100644 > index 000000000000..1db752de30a1 > --- /dev/null > +++ b/eclass/sec-keys.eclass > @@ -0,0 +1,202 @@ > +# Copyright 2024-2025 Gentoo Authors > +# Distributed under the terms of the GNU General Public License v2 > + > +# @ECLASS: sec-keys.eclass > +# @MAINTAINER: > +# Eli Schwartz <[email protected]> > +# @AUTHOR: > +# Eli Schwartz <[email protected]> > +# @SUPPORTED_EAPIS: 8 > +# @BLURB: Provides a uniform way of handling ebuilds which package PGP key > material > +# @DESCRIPTION: > +# This eclass provides a streamlined approach to finding suitable source > +# material for OpenPGP keys used by the verify-sig eclass. Its primary > +# purpose is to permit developers to easily and securely package new > +# sec-keys/* packages. The eclass removes the risk of developers > +# accidentally packaging malformed key material, or neglecting to > +# notice when PGP identities have changed. > +# > +# To use the eclass, define SEC_KEYS_VALIDPGPKEYS to contain the > +# fingerprint of the key and the short name of the key's owner. > +# > +# @EXAMPLE: > +# Example use: > +# > +# @CODE > +# SEC_KEYS_VALIDPGPKEYS=( > +# '3DB7F3CA6C1D90B99FE25B38D4B476A4D175C54F:bjones:ubuntu' > +# '4EC8A4DB7D2E01C00AF36C49E5C587B5E286C65A:jsmith:github,openpgp' > +# # key only available on personal website, use manual SRC_URI > +# '5FD9B5EC8E3F12D11BA47D50F6D698C6F397D76B:awhite:manual' > +# ) > +# > +# inherit sec-keys > +# > +# SRC_URI+="https://awhite.com/awhite.gpg -> awhite-${PV}.gpg" > +# @CODE > + > +case ${EAPI} in > + 8) ;; > + *) die "${ECLASS}: EAPI ${EAPI:-0} not supported" ;; > +esac > + > +if [[ ! ${_SEC_KEYS_ECLASS} ]]; then > +_SEC_KEYS_ECLASS=1 > + > +inherit edo > + > +# @ECLASS_VARIABLE: SEC_KEYS_VALIDPGPKEYS > +# @PRE_INHERIT > +# @DEFAULT_UNSET > +# @DESCRIPTION: > +# Mapping of fingerprints, name, and optional locations of PGP keys to > +# include, separated by colons. The allowed values for a location are: > +# > +# - gentoo -- fetch key by fingerprint from https://keys.gentoo.org > +# > +# - github -- fetch key from github.com/${name}.pgp > +# > +# - openpgp -- fetch key by fingerprint from https://keys.openpgp.org > +# > +# - ubuntu -- fetch key by fingerprint from http://keyserver.ubuntu.com > +# > +# - manual -- do not add to SRC_URI, the ebuild will provide a custom > +# download location > +_sec_keys_set_globals() { > + local key fingerprint name loc locations=() remote > + > + for key in "${SEC_KEYS_VALIDPGPKEYS[@]}"; do > + fingerprint=${key%%:*} > + name=${key#${fingerprint}:}; name=${name%%:*} > + IFS=, read -r -a locations <<<"${key##*:}" > + [[ ${locations[@]} ]] || die "${ECLASS}: ${name}: PGP key > remote is mandatory" > + for loc in "${locations[@]}"; do > + case ${loc} in > + gentoo) > remote="https://keys.gentoo.org/pks/lookup?op=get&search=0x${fingerprint}";; > + github) > remote="https://github.com/${name}.gpg";; > + openpgp) > remote="https://keys.openpgp.org/vks/v1/by-fingerprint/${fingerprint}";; > + ubuntu) > remote="https://keyserver.ubuntu.com/pks/lookup?op=get&search=0x${fingerprint}";; > + # provided via manual SRC_URI > + manual) continue;; > + *) die "${ECLASS}: unknown PGP key remote: > ${loc}";; > + esac > + SRC_URI+=" > + ${remote} -> > openpgp-keys-${name}-${loc}-${PV}.asc > + " > + done > + done > +} > +_sec_keys_set_globals > +unset -f _sec_keys_set_globals > + > +S=${WORKDIR} > + > +LICENSE="public-domain" > +SLOT="0" > + > +IUSE="test" > +PROPERTIES="test_network" > +RESTRICT="!test? ( test )" > + > +BDEPEND=" > + app-crypt/gnupg > + test? ( app-crypt/pgpdump ) > +" > + > + > + > +# @FUNCTION: sec-keys_src_compile > +# @DESCRIPTION: > +# Default src_compile override that: > +# > +# - imports all public keys into a keyring > +# > +# - validates that they are listed in SEC_KEYS_VALIDPGPKEYS > +# > +# - minifies and exports them back into a unified keyfile > +sec-keys_src_compile() { > + local -x GNUPGHOME=${WORKDIR}/gnupg > + local fingerprint > + local gpg_command=(gpg --export-options export-minimal) > + > + mkdir -m700 -p "${GNUPGHOME}" || die > + cat <<- EOF > "${GNUPGHOME}"/gpg.conf || die > + no-secmem-warning > + EOF > + > + pushd "${DISTDIR}" >/dev/null || die > + gpg --import ${A} || die > + popd >/dev/null || die > + > + local line imported_keys=() found=0 > + while IFS=: read -r -a line; do > + if [[ ${line[0]} = pub ]]; then > + # new key > + found=0 > + elif [[ ${found} = 0 && ${line[0]} = fpr ]]; then > + # primary fingerprint > + imported_keys+=("${line[9]}") > + found=1 > + fi > + done < <(gpg --batch --list-keys --with-colons || die) > + > + printf '%s\n' "${imported_keys[@]}" | sort > imported_keys.list || die > + printf '%s\n' "${SEC_KEYS_VALIDPGPKEYS[@]%%:*}" | sort > > allowed_keys.list || die > + > + local extra_keys=($(comm -23 imported_keys.list allowed_keys.list || > die)) > + local missing_keys=($(comm -13 imported_keys.list allowed_keys.list || > die)) > + > + if [[ ${#extra_keys[@]} != 0 ]]; then > + die "Too many keys found. Suspicious keys: ${extra_keys[@]}" > + fi > + if [[ ${#missing_keys[@]} != 0 ]]; then > + die "Too few keys found. Unavailable keys: ${missing_keys[@]}" > + fi > + > + for fingerprint in "${SEC_KEYS_VALIDPGPKEYS[@]%%:*}"; do > + local uids=() > + mapfile -t uids < <("${gpg_command[@]}" --list-key > --with-colons ${fingerprint} | awk -F: '/^uid/{print $10}' || die) > + edo "${gpg_command[@]}" "${uids[@]/#/--comment=}" --export > --armor "${fingerprint}" > "${fingerprint}.asc" > + cat ${fingerprint}.asc >> ${PN#openpgp-keys-}.asc || die > + done > +} > + > +sec-keys_src_test() { > + local -x GNUPGHOME=${WORKDIR}/gnupg > + local key fingerprint name server > + local gpg_command=(gpg --export-options export-minimal) > + > + # Best-effort attempt to check for updates. keyservers can and usually > + # do fail for weird reasons, (such as being unable to import a key > + # without a uid) as well as normal reasons, like the key being exclusive > + # to a different keyserver. this isn't a reason to fail src_test. > + for server in keys.gentoo.org keys.openpgp.org keyserver.ubuntu.com; do > + gpg --refresh-keys --keyserver "hkps://${server}" > + done > + for key in "${SEC_KEYS_VALIDPGPKEYS[@]}"; do > + if [[ ${key##*:} = *github* ]]; then > + name=${key#*:}; name=${name%%:*} > + wget -qO- https://github.com/${name}.gpg | gpg --import > || die I (still) think this should have a pipestatus, if nothing else to be a good example and avoid possible lint issues down the road. > + fi > + done > + > + for fingerprint in "${SEC_KEYS_VALIDPGPKEYS[@]%%:*}"; do > + pgpdump "${fingerprint}.asc" > "${fingerprint}.pgpdump" || die > + "${gpg_command[@]}" --export "${fingerprint}" | pgpdump > > "${fingerprint}.pgpdump.new" || die ... and here. > + diff -u "${fingerprint}.pgpdump" "${fingerprint}.pgpdump.new" > || die "updates available for PGP key: ${fingerprint}" > + done > + > +} > + > +# @FUNCTION: sec-keys_src_install > +# @DESCRIPTION: > +# Default src_install override that installs an ascii-armored keyfile > +# installed to the standard /usr/share/openpgp-keys. > +sec-keys_src_install() { > + insinto /usr/share/openpgp-keys > + doins ${PN#openpgp-keys-}.asc > +} > + > +fi > + > +EXPORT_FUNCTIONS src_compile src_test src_install
