summaryrefslogtreecommitdiffstats
path: root/models/gpg_key.go
diff options
context:
space:
mode:
authorAntoine GIRARD <sapk@users.noreply.github.com>2017-04-26 15:10:43 +0200
committerLunny Xiao <xiaolunwen@gmail.com>2017-04-26 21:10:43 +0800
commit8371f94d06cefbd65392af3b5c0f1fd1057429f7 (patch)
treed6bf49ee4406be76e5429bc70da4a5dee22e3cab /models/gpg_key.go
parentb7da5a6cb7c725232c1053a1ca705a6ac0dad467 (diff)
downloadgitea-8371f94d06cefbd65392af3b5c0f1fd1057429f7.tar.gz
gitea-8371f94d06cefbd65392af3b5c0f1fd1057429f7.zip
Rework SSH key management UI to add GPG (#1293)
* Rework SSH key management UI to add GPG * Add more detail to gpg key display * Update CHANGELOG.md * Implement deletion UI * Implement adding gpg UI * Various fixes - Fix duplicate entry in locale - Re-generate hash before verification since they are consumed * Add missing translation * Split template * Catch not found/verified email error
Diffstat (limited to 'models/gpg_key.go')
-rw-r--r--models/gpg_key.go33
1 files changed, 21 insertions, 12 deletions
diff --git a/models/gpg_key.go b/models/gpg_key.go
index 1c9d17d0e2..862bd88596 100644
--- a/models/gpg_key.go
+++ b/models/gpg_key.go
@@ -89,7 +89,7 @@ func GetGPGKeyByID(keyID int64) (*GPGKey, error) {
func checkArmoredGPGKeyString(content string) (*openpgp.Entity, error) {
list, err := openpgp.ReadArmoredKeyRing(strings.NewReader(content))
if err != nil {
- return nil, err
+ return nil, ErrGPGKeyParsing{err}
}
return list[0], nil
}
@@ -219,7 +219,7 @@ func parseGPGKey(ownerID int64, e *openpgp.Entity) (*GPGKey, error) {
}
}
if emails[n] == nil {
- return nil, fmt.Errorf("Failed to found email or is not confirmed : %s", ident.UserId.Email)
+ return nil, ErrGPGEmailNotFound{ident.UserId.Email}
}
n++
}
@@ -400,17 +400,16 @@ func ParseCommitWithSignature(c *git.Commit) *CommitVerification {
}
}
- //Generating hash of commit
- hash, err := populateHash(sig.Hash, []byte(c.Signature.Payload))
- if err != nil { //Skipping ailed to generate hash
- log.Error(3, "PopulateHash: %v", err)
- return &CommitVerification{
- Verified: false,
- Reason: "gpg.error.generate_hash",
- }
- }
-
for _, k := range keys {
+ //Generating hash of commit
+ hash, err := populateHash(sig.Hash, []byte(c.Signature.Payload))
+ if err != nil { //Skipping ailed to generate hash
+ log.Error(3, "PopulateHash: %v", err)
+ return &CommitVerification{
+ Verified: false,
+ Reason: "gpg.error.generate_hash",
+ }
+ }
//We get PK
if err := verifySign(sig, hash, k); err == nil {
return &CommitVerification{ //Everything is ok
@@ -422,6 +421,16 @@ func ParseCommitWithSignature(c *git.Commit) *CommitVerification {
}
//And test also SubsKey
for _, sk := range k.SubsKey {
+
+ //Generating hash of commit
+ hash, err := populateHash(sig.Hash, []byte(c.Signature.Payload))
+ if err != nil { //Skipping ailed to generate hash
+ log.Error(3, "PopulateHash: %v", err)
+ return &CommitVerification{
+ Verified: false,
+ Reason: "gpg.error.generate_hash",
+ }
+ }
if err := verifySign(sig, hash, sk); err == nil {
return &CommitVerification{ //Everything is ok
Verified: true,