openpgp.js

  1. /*
  2. Copyright 2021 Yarmo Mackenbach
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. import axios from 'axios'
  14. import { isUri } from 'valid-url'
  15. import { readKey, PublicKey } from 'openpgp'
  16. import HKP from '@openpgp/hkp-client'
  17. import WKD from '@openpgp/wkd-client'
  18. import { Claim } from './claim.js'
  19. import { ProfileType, PublicKeyEncoding, PublicKeyFetchMethod, PublicKeyType } from './enums.js'
  20. import { Profile } from './profile.js'
  21. import { Persona } from './persona.js'
  22. /**
  23. * Functions related to OpenPGP Profiles
  24. * @module openpgp
  25. */
  26. /**
  27. * Fetch a public key using keyservers
  28. * @function
  29. * @param {string} identifier - Fingerprint or email address
  30. * @param {string} [keyserverDomain] - Domain of the keyserver
  31. * @returns {Promise<Profile>} The profile from the fetched OpenPGP key
  32. * @example
  33. * const key1 = doip.keys.fetchHKP('alice@domain.tld');
  34. * const key2 = doip.keys.fetchHKP('123abc123abc');
  35. * const key3 = doip.keys.fetchHKP('123abc123abc', 'pgpkeys.eu');
  36. */
  37. export async function fetchHKP (identifier, keyserverDomain = 'keys.openpgp.org') {
  38. const keyserverBaseUrl = `https://${keyserverDomain ?? 'keys.openpgp.org'}`
  39. const hkp = new HKP(keyserverBaseUrl)
  40. const lookupOpts = {
  41. query: identifier
  42. }
  43. const publicKeyArmored = await hkp
  44. .lookup(lookupOpts)
  45. .catch((error) => {
  46. throw new Error(`Key does not exist or could not be fetched (${error})`)
  47. })
  48. if (!publicKeyArmored) {
  49. throw new Error('Key does not exist or could not be fetched')
  50. }
  51. const publicKey = await readKey({
  52. armoredKey: publicKeyArmored
  53. })
  54. .catch((error) => {
  55. throw new Error(`Key could not be read (${error})`)
  56. })
  57. const profile = await parsePublicKey(publicKey)
  58. profile.publicKey.fetch.method = PublicKeyFetchMethod.HKP
  59. profile.publicKey.fetch.query = identifier
  60. return profile
  61. }
  62. /**
  63. * Fetch a public key using Web Key Directory
  64. * @function
  65. * @param {string} identifier - Identifier of format 'username@domain.tld`
  66. * @returns {Promise<Profile>} The profile from the fetched OpenPGP key
  67. * @example
  68. * const key = doip.keys.fetchWKD('alice@domain.tld');
  69. */
  70. export async function fetchWKD (identifier) {
  71. const wkd = new WKD()
  72. const lookupOpts = {
  73. email: identifier
  74. }
  75. const publicKeyBinary = await wkd
  76. .lookup(lookupOpts)
  77. .catch((/** @type {Error} */ error) => {
  78. throw new Error(`Key does not exist or could not be fetched (${error})`)
  79. })
  80. if (!publicKeyBinary) {
  81. throw new Error('Key does not exist or could not be fetched')
  82. }
  83. const publicKey = await readKey({
  84. binaryKey: publicKeyBinary
  85. })
  86. .catch((error) => {
  87. throw new Error(`Key could not be read (${error})`)
  88. })
  89. const profile = await parsePublicKey(publicKey)
  90. profile.publicKey.fetch.method = PublicKeyFetchMethod.WKD
  91. profile.publicKey.fetch.query = identifier
  92. return profile
  93. }
  94. /**
  95. * Fetch a public key from Keybase
  96. * @function
  97. * @param {string} username - Keybase username
  98. * @param {string} fingerprint - Fingerprint of key
  99. * @returns {Promise<Profile>} The profile from the fetched OpenPGP key
  100. * @example
  101. * const key = doip.keys.fetchKeybase('alice', '123abc123abc');
  102. */
  103. export async function fetchKeybase (username, fingerprint) {
  104. const keyLink = `https://keybase.io/${username}/pgp_keys.asc?fingerprint=${fingerprint}`
  105. let rawKeyContent
  106. try {
  107. rawKeyContent = await axios.get(
  108. keyLink,
  109. {
  110. responseType: 'text'
  111. }
  112. )
  113. .then((/** @type {import('axios').AxiosResponse} */ response) => {
  114. if (response.status === 200) {
  115. return response
  116. }
  117. })
  118. .then((/** @type {import('axios').AxiosResponse} */ response) => response.data)
  119. } catch (e) {
  120. throw new Error(`Error fetching Keybase key: ${e.message}`)
  121. }
  122. const publicKey = await readKey({
  123. armoredKey: rawKeyContent
  124. })
  125. .catch((error) => {
  126. throw new Error(`Key does not exist or could not be fetched (${error})`)
  127. })
  128. const profile = await parsePublicKey(publicKey)
  129. profile.publicKey.fetch.method = PublicKeyFetchMethod.HTTP
  130. profile.publicKey.fetch.query = null
  131. profile.publicKey.fetch.resolvedUrl = keyLink
  132. return profile
  133. }
  134. /**
  135. * Get a public key from armored public key text data
  136. * @function
  137. * @param {string} rawKeyContent - Plaintext ASCII-formatted public key data
  138. * @returns {Promise<Profile>} The profile from the armored public key
  139. * @example
  140. * const plainkey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
  141. *
  142. * mQINBF0mIsIBEADacleiyiV+z6FIunvLWrO6ZETxGNVpqM+WbBQKdW1BVrJBBolg
  143. * [...]
  144. * =6lib
  145. * -----END PGP PUBLIC KEY BLOCK-----`
  146. * const key = doip.keys.fetchPlaintext(plainkey);
  147. */
  148. export async function fetchPlaintext (rawKeyContent) {
  149. const publicKey = await readKey({
  150. armoredKey: rawKeyContent
  151. })
  152. .catch((error) => {
  153. throw new Error(`Key could not be read (${error})`)
  154. })
  155. const profile = await parsePublicKey(publicKey)
  156. return profile
  157. }
  158. /**
  159. * Fetch a public key using an URI
  160. * @function
  161. * @param {string} uri - URI that defines the location of the key
  162. * @returns {Promise<Profile>} The profile from the fetched OpenPGP key
  163. * @example
  164. * const key1 = doip.keys.fetchURI('hkp:alice@domain.tld');
  165. * const key2 = doip.keys.fetchURI('hkp:123abc123abc');
  166. * const key3 = doip.keys.fetchURI('wkd:alice@domain.tld');
  167. */
  168. export async function fetchURI (uri) {
  169. if (!isUri(uri)) {
  170. throw new Error('Invalid URI')
  171. }
  172. const re = /([a-zA-Z0-9]*):([a-zA-Z0-9@._=+-]*)(?::([a-zA-Z0-9@._=+-]*))?/
  173. const match = uri.match(re)
  174. if (!match[1]) {
  175. throw new Error('Invalid URI')
  176. }
  177. switch (match[1]) {
  178. case 'hkp':
  179. return await fetchHKP(
  180. match[3] ? match[3] : match[2],
  181. match[3] ? match[2] : null
  182. )
  183. case 'wkd':
  184. return await fetchWKD(match[2])
  185. case 'kb':
  186. return await fetchKeybase(match[2], match.length >= 4 ? match[3] : null)
  187. default:
  188. throw new Error('Invalid URI protocol')
  189. }
  190. }
  191. /**
  192. * Fetch a public key
  193. *
  194. * This function will attempt to detect the identifier and fetch the key
  195. * accordingly. If the identifier is an email address, it will first try and
  196. * fetch the key using WKD and then HKP. Otherwise, it will try HKP only.
  197. *
  198. * This function will also try and parse the input as a plaintext key
  199. * @function
  200. * @param {string} identifier - URI that defines the location of the key
  201. * @returns {Promise<Profile>} The profile from the fetched OpenPGP key
  202. * @example
  203. * const key1 = doip.keys.fetch('alice@domain.tld');
  204. * const key2 = doip.keys.fetch('123abc123abc');
  205. */
  206. export async function fetch (identifier) {
  207. const re = /([a-zA-Z0-9@._=+-]*)(?::([a-zA-Z0-9@._=+-]*))?/
  208. const match = identifier.match(re)
  209. let profile = null
  210. // Attempt plaintext
  211. try {
  212. profile = await fetchPlaintext(identifier)
  213. } catch (e) {}
  214. // Attempt WKD
  215. if (!profile && identifier.includes('@')) {
  216. try {
  217. profile = await fetchWKD(match[1])
  218. } catch (e) {}
  219. }
  220. // Attempt HKP
  221. if (!profile) {
  222. profile = await fetchHKP(
  223. match[2] ? match[2] : match[1],
  224. match[2] ? match[1] : null
  225. )
  226. }
  227. if (!profile) {
  228. throw new Error('Key does not exist or could not be fetched')
  229. }
  230. return profile
  231. }
  232. /**
  233. * Process a public key to get a profile
  234. * @function
  235. * @param {PublicKey} publicKey - The public key to parse
  236. * @returns {Promise<Profile>} The profile from the processed OpenPGP key
  237. * @example
  238. * const key = doip.keys.fetchURI('hkp:alice@domain.tld');
  239. * const profile = doip.keys.parsePublicKey(key);
  240. * profile.personas[0].claims.forEach(claim => {
  241. * console.log(claim.uri);
  242. * });
  243. */
  244. export async function parsePublicKey (publicKey) {
  245. if (!(publicKey && (publicKey instanceof PublicKey))) {
  246. throw new Error('Invalid public key')
  247. }
  248. const fingerprint = publicKey.getFingerprint()
  249. const primaryUser = await publicKey.getPrimaryUser()
  250. const users = publicKey.users
  251. const personas = []
  252. users.forEach((user, i) => {
  253. if (!user.userID) return
  254. const pe = new Persona(user.userID.name, [])
  255. pe.setIdentifier(user.userID.userID)
  256. pe.setDescription(user.userID.comment)
  257. pe.setEmailAddress(user.userID.email)
  258. if ('selfCertifications' in user && user.selfCertifications.length > 0) {
  259. const selfCertification = user.selfCertifications.sort((e1, e2) => e2.created.getTime() - e1.created.getTime())[0]
  260. if (selfCertification.revoked) {
  261. pe.revoke()
  262. }
  263. const notations = selfCertification.rawNotations
  264. pe.claims = notations
  265. .filter(
  266. ({ name, humanReadable }) =>
  267. humanReadable && (name === 'proof@ariadne.id' || name === 'proof@metacode.biz')
  268. )
  269. .map(
  270. ({ value }) =>
  271. new Claim(new TextDecoder().decode(value), `openpgp4fpr:${fingerprint}`)
  272. )
  273. }
  274. personas.push(pe)
  275. })
  276. const profile = new Profile(ProfileType.OPENPGP, `openpgp4fpr:${fingerprint}`, personas)
  277. profile.primaryPersonaIndex = primaryUser.index
  278. profile.publicKey.keyType = PublicKeyType.OPENPGP
  279. profile.publicKey.fingerprint = fingerprint
  280. profile.publicKey.encoding = PublicKeyEncoding.ARMORED_PGP
  281. profile.publicKey.encodedKey = publicKey.armor()
  282. profile.publicKey.key = publicKey
  283. return profile
  284. }