From 71b478048873795de2a9f19e2c3c2aad151fdeda Mon Sep 17 00:00:00 2001 From: Max Goedjen Date: Thu, 7 Apr 2022 21:41:20 -0700 Subject: [PATCH 01/12] Create add-to-project (#373) --- .github/workflows/add-to-project | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 .github/workflows/add-to-project diff --git a/.github/workflows/add-to-project b/.github/workflows/add-to-project new file mode 100644 index 0000000..bc6b94d --- /dev/null +++ b/.github/workflows/add-to-project @@ -0,0 +1,16 @@ +name: Add bugs to bugs project + +on: + issues: + types: + - opened + +jobs: + add-to-project: + name: Add issue to project + runs-on: ubuntu-latest + steps: + - uses: actions/add-to-project@v0.0.3 + with: + project-url: https://github.com/users/maxgoedjen/projects/1 + github-token: ${{ secrets.ADD_TO_PROJECT_PAT }} From 26d6ced9eea10dc83defbc82093cd18a03f039be Mon Sep 17 00:00:00 2001 From: Max Goedjen Date: Thu, 7 Apr 2022 21:44:37 -0700 Subject: [PATCH 02/12] Rename add-to-project to add-to-project.yml (#375) --- .github/workflows/{add-to-project => add-to-project.yml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename .github/workflows/{add-to-project => add-to-project.yml} (100%) diff --git a/.github/workflows/add-to-project b/.github/workflows/add-to-project.yml similarity index 100% rename from .github/workflows/add-to-project rename to .github/workflows/add-to-project.yml From 8744313ba12148bcd7115f8648f706afa6bd3ade Mon Sep 17 00:00:00 2001 From: Paul Hammond Date: Fri, 22 Apr 2022 19:37:28 -0700 Subject: [PATCH 03/12] Add sha-256 checksums to auditable build output (#377) --- .github/workflows/nightly.yml | 4 ++++ .github/workflows/release.yml | 4 ++++ 2 files changed, 8 insertions(+) diff --git a/.github/workflows/nightly.yml b/.github/workflows/nightly.yml index 231e49d..9bf7a43 100644 --- a/.github/workflows/nightly.yml +++ b/.github/workflows/nightly.yml @@ -40,8 +40,12 @@ jobs: run: xcrun notarytool submit --key ~/.private_keys/AuthKey_$APPLE_API_KEY_ID.p8 --key-id $APPLE_API_KEY_ID --issuer $APPLE_API_ISSUER Secretive.zip - name: Document SHAs run: | + echo "sha-512:" shasum -a 512 Secretive.zip shasum -a 512 Archive.zip + echo "sha-256:" + shasum -a 256 Secretive.zip + shasum -a 256 Archive.zip - name: Upload App to Artifacts uses: actions/upload-artifact@v1 with: diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 1245d81..d6beba2 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -64,8 +64,12 @@ jobs: run: xcrun notarytool submit --key ~/.private_keys/AuthKey_$APPLE_API_KEY_ID.p8 --key-id $APPLE_API_KEY_ID --issuer $APPLE_API_ISSUER Secretive.zip - name: Document SHAs run: | + echo "sha-512:" shasum -a 512 Secretive.zip shasum -a 512 Archive.zip + echo "sha-256:" + shasum -a 256 Secretive.zip + shasum -a 256 Archive.zip - name: Create Release id: create_release uses: actions/create-release@v1 From e77812c06c84ec1757afa5226b02da5182c6be2d Mon Sep 17 00:00:00 2001 From: TheBitStick Date: Wed, 4 May 2022 23:52:32 -0500 Subject: [PATCH 04/12] Added Mountain Duck Agent Configuration (#380) --- APP_CONFIG.md | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/APP_CONFIG.md b/APP_CONFIG.md index 2f0265d..ab21b7e 100644 --- a/APP_CONFIG.md +++ b/APP_CONFIG.md @@ -51,6 +51,31 @@ Add this to `~/Library/LaunchAgents/com.maxgoedjen.Secretive.SecretAgent.plist` Log out and log in again before launching Cyberduck. +## Mountain Duck + +Add this to `~/Library/LaunchAgents/com.maxgoedjen.Secretive.SecretAgent.plist` + +``` + + + + + Label + link-ssh-auth-sock + ProgramArguments + + /bin/sh + -c + /bin/ln -sf $HOME/Library/Containers/com.maxgoedjen.Secretive.SecretAgent/Data/socket.ssh $SSH_AUTH_SOCK + + RunAtLoad + + + +``` + +Log out and log in again before launching Mountain Duck. + ## GitKraken Add this to `~/Library/LaunchAgents/com.maxgoedjen.Secretive.SecretAgent.plist` From 5f055efa183e49663000c9a1049b9fa740ace0e3 Mon Sep 17 00:00:00 2001 From: Max Goedjen Date: Sat, 4 Jun 2022 15:25:13 -0700 Subject: [PATCH 05/12] Ignore unhandled (#385) --- Sources/SecretAgent/Notifier.swift | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Sources/SecretAgent/Notifier.swift b/Sources/SecretAgent/Notifier.swift index b93e3aa..8320784 100644 --- a/Sources/SecretAgent/Notifier.swift +++ b/Sources/SecretAgent/Notifier.swift @@ -154,7 +154,7 @@ class NotificationDelegate: NSObject, UNUserNotificationCenterDelegate { case Notifier.Constants.persistAuthenticationCategoryIdentitifier: handlePersistAuthenticationResponse(response: response) default: - fatalError() + break } completionHandler() From 403709ac837b7fc413504eb8502e0f20efd86fcb Mon Sep 17 00:00:00 2001 From: Kit Adams <47960871+KitAdams@users.noreply.github.com> Date: Wed, 31 Aug 2022 16:32:45 +1000 Subject: [PATCH 06/12] Add in config for nushell (#406) --- APP_CONFIG.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/APP_CONFIG.md b/APP_CONFIG.md index ab21b7e..863177a 100644 --- a/APP_CONFIG.md +++ b/APP_CONFIG.md @@ -26,6 +26,15 @@ Host * IdentityAgent /Users/$YOUR_USERNAME/Library/Containers/com.maxgoedjen.Secretive.SecretAgent/Data/socket.ssh ``` +## nushell + +Add this to your `~/.ssh/config` (the path should match the socket path from the setup flow). + +``` +Host * + IdentityAgent /Users/$YOUR_USERNAME/Library/Containers/com.maxgoedjen.Secretive.SecretAgent/Data/socket.ssh +``` + ## Cyberduck Add this to `~/Library/LaunchAgents/com.maxgoedjen.Secretive.SecretAgent.plist` From e31db0f4facd1895a8c1116087c1bd66f889c677 Mon Sep 17 00:00:00 2001 From: Noah Berman <15199622+bermannoah@users.noreply.github.com> Date: Wed, 26 Oct 2022 09:48:31 +0100 Subject: [PATCH 07/12] Add line about help/setup tool to FAQ (#382) Co-authored-by: Max Goedjen --- FAQ.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/FAQ.md b/FAQ.md index ad8057e..6652ec9 100644 --- a/FAQ.md +++ b/FAQ.md @@ -12,6 +12,10 @@ Secretive relies on the `SSH_AUTH_SOCK` environment variable being respected. Th Please run `ssh -Tv git@github.com` in your terminal and paste the output in a [new GitHub issue](https://github.com/maxgoedjen/secretive/issues/new) with a description of your issue. +### Secretive was working for me, but now it has stopped + +Try running the "Setup Secretive" process by clicking on "Help", then "Setup Secretive." If that doesn't work, follow the process above. + ### Secretive prompts me to type my password instead of using my Apple Watch 1) Make sure you have enabled "Use your Apple Watch to unlock apps and your Mac" in System Preferences --> Security & Privacy: From fa0e81cd8e6f0b9a30d9a935574ad33967a78e34 Mon Sep 17 00:00:00 2001 From: unreality Date: Thu, 27 Oct 2022 13:19:21 +0800 Subject: [PATCH 08/12] Initial openssh certificate support (#416) * initial openssh certificate support * use the certificate to construct the public key instead of storing a map in memory * move certificate check into its own function and neaten up a few things * final requested changes Co-authored-by: Max Goedjen --- .../Sources/SecretAgentKit/Agent.swift | 112 +++++++++++++++++- 1 file changed, 108 insertions(+), 4 deletions(-) diff --git a/Sources/Packages/Sources/SecretAgentKit/Agent.swift b/Sources/Packages/Sources/SecretAgentKit/Agent.swift index acf3cde..bc37853 100644 --- a/Sources/Packages/Sources/SecretAgentKit/Agent.swift +++ b/Sources/Packages/Sources/SecretAgentKit/Agent.swift @@ -4,6 +4,25 @@ import OSLog import SecretKit import AppKit +enum OpenSSHCertificateError: Error { + case unsupportedType + case parsingFailed + case doesNotExist +} + +extension OpenSSHCertificateError: CustomStringConvertible { + public var description: String { + switch self { + case .unsupportedType: + return "The key type was unsupported" + case .parsingFailed: + return "Failed to properly parse the SSH certificate" + case .doesNotExist: + return "Certificate does not exist" + } + } +} + /// The `Agent` is an implementation of an SSH agent. It manages coordination and access between a socket, traces requests, notifies witnesses and passes requests to stores. public class Agent { @@ -11,6 +30,7 @@ public class Agent { private let witness: SigningWitness? private let writer = OpenSSHKeyWriter() private let requestTracer = SigningRequestTracer() + private let certsPath = (NSHomeDirectory() as NSString).appendingPathComponent("PublicKeys") as String /// Initializes an agent with a store list and a witness. /// - Parameters: @@ -83,12 +103,22 @@ extension Agent { var count = UInt32(secrets.count).bigEndian let countData = Data(bytes: &count, count: UInt32.bitWidth/8) var keyData = Data() - let writer = OpenSSHKeyWriter() + for secret in secrets { - let keyBlob = writer.data(secret: secret) + let keyBlob: Data + let curveData: Data + + if let (certBlob, certName) = try? checkForCert(secret: secret) { + keyBlob = certBlob + curveData = certName + } else { + keyBlob = writer.data(secret: secret) + curveData = writer.curveType(for: secret.algorithm, length: secret.keySize).data(using: .utf8)! + } + keyData.append(writer.lengthAndData(of: keyBlob)) - let curveData = writer.curveType(for: secret.algorithm, length: secret.keySize).data(using: .utf8)! keyData.append(writer.lengthAndData(of: curveData)) + } Logger().debug("Agent enumerated \(secrets.count) identities") return countData + keyData @@ -101,7 +131,13 @@ extension Agent { /// - Returns: An OpenSSH formatted Data payload containing the signed data response. func sign(data: Data, provenance: SigningRequestProvenance) throws -> Data { let reader = OpenSSHReader(data: data) - let hash = reader.readNextChunk() + var hash = reader.readNextChunk() + + // Check if hash is actually an openssh certificate and reconstruct the public key if it is + if let certPublicKey = try? getPublicKeyFromCert(certBlob: hash) { + hash = certPublicKey + } + guard let (store, secret) = secret(matching: hash) else { Logger().debug("Agent did not have a key matching \(hash as NSData)") throw AgentError.noMatchingKey @@ -161,6 +197,74 @@ extension Agent { return signedData } + + /// Reconstructs a public key from a ``Data`` object that contains an OpenSSH certificate. Currently only ecdsa certificates are supported + /// - Parameter certBlock: The openssh certificate to extract the public key from + /// - Returns: A ``Data`` object containing the public key in OpenSSH wire format + func getPublicKeyFromCert(certBlob: Data) throws -> Data { + let reader = OpenSSHReader(data: certBlob) + let certType = String(decoding: reader.readNextChunk(), as: UTF8.self) + + switch certType { + case "ecdsa-sha2-nistp256-cert-v01@openssh.com", + "ecdsa-sha2-nistp384-cert-v01@openssh.com", + "ecdsa-sha2-nistp521-cert-v01@openssh.com": + + _ = reader.readNextChunk() // nonce + let curveIdentifier = reader.readNextChunk() + let publicKey = reader.readNextChunk() + + if let curveType = certType.replacingOccurrences(of: "-cert-v01@openssh.com", with: "").data(using: .utf8) { + return writer.lengthAndData(of: curveType) + + writer.lengthAndData(of: curveIdentifier) + + writer.lengthAndData(of: publicKey) + } else { + throw OpenSSHCertificateError.parsingFailed + } + default: + throw OpenSSHCertificateError.unsupportedType + } + } + + + /// Attempts to find an OpenSSH Certificate that corresponds to a ``Secret`` + /// - Parameter secret: The secret to search for a certificate with + /// - Returns: Two ``Data`` objects containing the certificate and certificate name respectively + func checkForCert(secret: AnySecret) throws -> (Data, Data) { + let minimalHex = writer.openSSHMD5Fingerprint(secret: secret).replacingOccurrences(of: ":", with: "") + let certificatePath = certsPath.appending("/").appending("\(minimalHex)-cert.pub") + + if FileManager.default.fileExists(atPath: certificatePath) { + Logger().debug("Found certificate for \(secret.name)") + do { + let certContent = try String(contentsOfFile:certificatePath, encoding: .utf8) + let certElements = certContent.trimmingCharacters(in: .whitespacesAndNewlines).components(separatedBy: " ") + + if certElements.count >= 2 { + if let certDecoded = Data(base64Encoded: certElements[1] as String) { + if certElements.count >= 3 { + if let certName = certElements[2].data(using: .utf8) { + return (certDecoded, certName) + } else if let certName = secret.name.data(using: .utf8) { + Logger().info("Certificate for \(secret.name) does not have a name tag, using secret name instead") + return (certDecoded, certName) + } else { + throw OpenSSHCertificateError.parsingFailed + } + } + } else { + Logger().warning("Certificate found for \(secret.name) but failed to decode base64 key") + throw OpenSSHCertificateError.parsingFailed + } + } + } catch { + Logger().warning("Certificate found for \(secret.name) but failed to load") + throw OpenSSHCertificateError.parsingFailed + } + } + + throw OpenSSHCertificateError.doesNotExist + } } From 47d736cb0d9ee3baf9d66b8211e85b4b94a53d7e Mon Sep 17 00:00:00 2001 From: Max Goedjen Date: Wed, 26 Oct 2022 22:46:43 -0700 Subject: [PATCH 09/12] Don't delete public cert keys corrresponding to secretive-tracked keys (#417) --- .../PublicKeyStandinFileController.swift | 23 +++++++++++++++---- .../Secretive/Views/SecretDetailView.swift | 2 +- 2 files changed, 20 insertions(+), 5 deletions(-) diff --git a/Sources/Packages/Sources/SecretKit/PublicKeyStandinFileController.swift b/Sources/Packages/Sources/SecretKit/PublicKeyStandinFileController.swift index 3d84317..cbf40a6 100644 --- a/Sources/Packages/Sources/SecretKit/PublicKeyStandinFileController.swift +++ b/Sources/Packages/Sources/SecretKit/PublicKeyStandinFileController.swift @@ -15,15 +15,21 @@ public class PublicKeyFileStoreController { /// Writes out the keys specified to disk. /// - Parameter secrets: The Secrets to generate keys for. - /// - Parameter clear: Whether or not the directory should be erased before writing keys. + /// - Parameter clear: Whether or not any untracked files in the directory should be removed. public func generatePublicKeys(for secrets: [AnySecret], clear: Bool = false) throws { logger.log("Writing public keys to disk") if clear { - try? FileManager.default.removeItem(at: URL(fileURLWithPath: directory)) + let validPaths = Set(secrets.map { publicKeyPath(for: $0) }).union(Set(secrets.map { sshCertificatePath(for: $0) })) + let untracked = Set(try FileManager.default.contentsOfDirectory(atPath: directory) + .map { "\(directory)/\($0)" }) + .subtracting(validPaths) + for path in untracked { + try? FileManager.default.removeItem(at: URL(fileURLWithPath: path)) + } } try? FileManager.default.createDirectory(at: URL(fileURLWithPath: directory), withIntermediateDirectories: false, attributes: nil) for secret in secrets { - let path = path(for: secret) + let path = publicKeyPath(for: secret) guard let data = keyWriter.openSSHString(secret: secret).data(using: .utf8) else { continue } FileManager.default.createFile(atPath: path, contents: data, attributes: nil) } @@ -34,9 +40,18 @@ public class PublicKeyFileStoreController { /// - Parameter secret: The Secret to return the path for. /// - Returns: The path to the Secret's public key. /// - Warning: This method returning a path does not imply that a key has been written to disk already. This method only describes where it will be written to. - public func path(for secret: SecretType) -> String { + public func publicKeyPath(for secret: SecretType) -> String { let minimalHex = keyWriter.openSSHMD5Fingerprint(secret: secret).replacingOccurrences(of: ":", with: "") return directory.appending("/").appending("\(minimalHex).pub") } + /// The path for a Secret's SSH Certificate public key. + /// - Parameter secret: The Secret to return the path for. + /// - Returns: The path to the SSH Certificate public key. + /// - Warning: This method returning a path does not imply that a key has a SSH certificates. This method only describes where it will be. + public func sshCertificatePath(for secret: SecretType) -> String { + let minimalHex = keyWriter.openSSHMD5Fingerprint(secret: secret).replacingOccurrences(of: ":", with: "") + return directory.appending("/").appending("\(minimalHex)-cert.pub") + } + } diff --git a/Sources/Secretive/Views/SecretDetailView.swift b/Sources/Secretive/Views/SecretDetailView.swift index d756679..52978d7 100644 --- a/Sources/Secretive/Views/SecretDetailView.swift +++ b/Sources/Secretive/Views/SecretDetailView.swift @@ -21,7 +21,7 @@ struct SecretDetailView: View { CopyableView(title: "Public Key", image: Image(systemName: "key"), text: keyString) Spacer() .frame(height: 20) - CopyableView(title: "Public Key Path", image: Image(systemName: "lock.doc"), text: publicKeyFileStoreController.path(for: secret)) + CopyableView(title: "Public Key Path", image: Image(systemName: "lock.doc"), text: publicKeyFileStoreController.publicKeyPath(for: secret)) Spacer() } } From 20cbaac6f6f0ed4de3ee94f23bd4abd416ecfc3e Mon Sep 17 00:00:00 2001 From: Max Goedjen Date: Thu, 27 Oct 2022 00:20:22 -0700 Subject: [PATCH 10/12] Fix cstring init (#420) --- .../Sources/SecretAgentKit/SigningRequestTracer.swift | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/Sources/Packages/Sources/SecretAgentKit/SigningRequestTracer.swift b/Sources/Packages/Sources/SecretAgentKit/SigningRequestTracer.swift index 46917f8..7e87538 100644 --- a/Sources/Packages/Sources/SecretAgentKit/SigningRequestTracer.swift +++ b/Sources/Packages/Sources/SecretAgentKit/SigningRequestTracer.swift @@ -40,7 +40,10 @@ extension SigningRequestTracer { func process(from pid: Int32) -> SigningRequestProvenance.Process { var pidAndNameInfo = self.pidAndNameInfo(from: pid) let ppid = pidAndNameInfo.kp_eproc.e_ppid != 0 ? pidAndNameInfo.kp_eproc.e_ppid : nil - let procName = String(cString: &pidAndNameInfo.kp_proc.p_comm.0) + let procName = withUnsafeMutablePointer(to: &pidAndNameInfo.kp_proc.p_comm.0) { pointer in + String(cString: pointer) + } + let pathPointer = UnsafeMutablePointer.allocate(capacity: Int(MAXPATHLEN)) _ = proc_pidpath(pid, pathPointer, UInt32(MAXPATHLEN)) let path = String(cString: pathPointer) From 382913cb996dc01b5974dc6bb092b84dc00df61d Mon Sep 17 00:00:00 2001 From: Max Goedjen Date: Thu, 27 Oct 2022 00:40:01 -0700 Subject: [PATCH 11/12] Update workflows to macOS-latest and Xcode 14.1 (#421) * Update nightly.yml * Update release.yml * Update test.yml --- .github/workflows/nightly.yml | 6 +++--- .github/workflows/release.yml | 8 ++++---- .github/workflows/test.yml | 4 ++-- 3 files changed, 9 insertions(+), 9 deletions(-) diff --git a/.github/workflows/nightly.yml b/.github/workflows/nightly.yml index 9bf7a43..e18eb91 100644 --- a/.github/workflows/nightly.yml +++ b/.github/workflows/nightly.yml @@ -5,7 +5,7 @@ on: - cron: "0 8 * * *" jobs: build: - runs-on: macos-11.0 + runs-on: macOS-latest timeout-minutes: 10 steps: - uses: actions/checkout@v2 @@ -19,7 +19,7 @@ jobs: APPLE_API_KEY_ID: ${{ secrets.APPLE_API_KEY_ID }} run: ./.github/scripts/signing.sh - name: Set Environment - run: sudo xcrun xcode-select -s /Applications/Xcode_13.2.1.app + run: sudo xcrun xcode-select -s /Applications/Xcode_14.1.app - name: Update Build Number env: RUN_ID: ${{ github.run_id }} @@ -50,4 +50,4 @@ jobs: uses: actions/upload-artifact@v1 with: name: Secretive.zip - path: Secretive.zip \ No newline at end of file + path: Secretive.zip diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index d6beba2..7982ce9 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -6,7 +6,7 @@ on: - '*' jobs: test: - runs-on: macos-11.0 + runs-on: macOS-latest timeout-minutes: 10 steps: - uses: actions/checkout@v1 @@ -20,14 +20,14 @@ jobs: APPLE_API_KEY_ID: ${{ secrets.APPLE_API_KEY_ID }} run: ./.github/scripts/signing.sh - name: Set Environment - run: sudo xcrun xcode-select -s /Applications/Xcode_13.2.1.app + run: sudo xcrun xcode-select -s /Applications/Xcode_14.1.app - name: Test run: | pushd Sources/Packages swift test popd build: - runs-on: macos-11.0 + runs-on: macOS-latest timeout-minutes: 10 steps: - uses: actions/checkout@v2 @@ -41,7 +41,7 @@ jobs: APPLE_API_KEY_ID: ${{ secrets.APPLE_API_KEY_ID }} run: ./.github/scripts/signing.sh - name: Set Environment - run: sudo xcrun xcode-select -s /Applications/Xcode_13.2.1.app + run: sudo xcrun xcode-select -s /Applications/Xcode_14.1.app - name: Update Build Number env: TAG_NAME: ${{ github.ref }} diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index c21d0c5..ac6ad14 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -3,12 +3,12 @@ name: Test on: [push, pull_request] jobs: test: - runs-on: macos-11.0 + runs-on: macOS-latest timeout-minutes: 10 steps: - uses: actions/checkout@v2 - name: Set Environment - run: sudo xcrun xcode-select -s /Applications/Xcode_13.2.1.app + run: sudo xcrun xcode-select -s /Applications/Xcode_14.1.app - name: Test run: | pushd Sources/Packages From 3b254d33a52d09191c3898000ca47d0761e68c6d Mon Sep 17 00:00:00 2001 From: Max Goedjen Date: Sat, 17 Dec 2022 23:16:56 -0800 Subject: [PATCH 12/12] Fix for SecretAgent acting as if it has no keys after updating macOS (#427) * Allow reload pre-op * Fix tests * Make sure standin keys get rewritten on force update * Stub store --- .../Sources/SecretAgentKit/Agent.swift | 41 ++++++++++++------- .../SecretKit/Erasers/AnySecretStore.swift | 6 +++ .../Sources/SecretKit/Types/SecretStore.swift | 3 ++ .../SecureEnclaveStore.swift | 23 +++++++---- .../SmartCardSecretKit/SmartCardStore.swift | 22 ++++++---- .../Tests/SecretAgentKitTests/StubStore.swift | 3 ++ .../Preview Content/PreviewStore.swift | 3 ++ 7 files changed, 70 insertions(+), 31 deletions(-) diff --git a/Sources/Packages/Sources/SecretAgentKit/Agent.swift b/Sources/Packages/Sources/SecretAgentKit/Agent.swift index bc37853..ce1c8b4 100644 --- a/Sources/Packages/Sources/SecretAgentKit/Agent.swift +++ b/Sources/Packages/Sources/SecretAgentKit/Agent.swift @@ -31,13 +31,14 @@ public class Agent { private let writer = OpenSSHKeyWriter() private let requestTracer = SigningRequestTracer() private let certsPath = (NSHomeDirectory() as NSString).appendingPathComponent("PublicKeys") as String + private let logger = Logger(subsystem: "com.maxgoedjen.secretive.secretagent.agent", category: "") /// Initializes an agent with a store list and a witness. /// - Parameters: /// - storeList: The `SecretStoreList` to make available. /// - witness: A witness to notify of requests. public init(storeList: SecretStoreList, witness: SigningWitness? = nil) { - Logger().debug("Agent is running") + logger.debug("Agent is running") self.storeList = storeList self.witness = witness } @@ -53,16 +54,16 @@ extension Agent { /// - Return value: /// - Boolean if data could be read @discardableResult public func handle(reader: FileHandleReader, writer: FileHandleWriter) -> Bool { - Logger().debug("Agent handling new data") + logger.debug("Agent handling new data") let data = Data(reader.availableData) guard data.count > 4 else { return false} let requestTypeInt = data[4] guard let requestType = SSHAgent.RequestType(rawValue: requestTypeInt) else { writer.write(OpenSSHKeyWriter().lengthAndData(of: SSHAgent.ResponseType.agentFailure.data)) - Logger().debug("Agent returned \(SSHAgent.ResponseType.agentFailure.debugDescription)") + logger.debug("Agent returned \(SSHAgent.ResponseType.agentFailure.debugDescription)") return true } - Logger().debug("Agent handling request of type \(requestType.debugDescription)") + logger.debug("Agent handling request of type \(requestType.debugDescription)") let subData = Data(data[5...]) let response = handle(requestType: requestType, data: subData, reader: reader) writer.write(response) @@ -70,23 +71,25 @@ extension Agent { } func handle(requestType: SSHAgent.RequestType, data: Data, reader: FileHandleReader) -> Data { + // Depending on the launch context (such as after macOS update), the agent may need to reload secrets before acting + reloadSecretsIfNeccessary() var response = Data() do { switch requestType { case .requestIdentities: response.append(SSHAgent.ResponseType.agentIdentitiesAnswer.data) response.append(identities()) - Logger().debug("Agent returned \(SSHAgent.ResponseType.agentIdentitiesAnswer.debugDescription)") + logger.debug("Agent returned \(SSHAgent.ResponseType.agentIdentitiesAnswer.debugDescription)") case .signRequest: let provenance = requestTracer.provenance(from: reader) response.append(SSHAgent.ResponseType.agentSignResponse.data) response.append(try sign(data: data, provenance: provenance)) - Logger().debug("Agent returned \(SSHAgent.ResponseType.agentSignResponse.debugDescription)") + logger.debug("Agent returned \(SSHAgent.ResponseType.agentSignResponse.debugDescription)") } } catch { response.removeAll() response.append(SSHAgent.ResponseType.agentFailure.data) - Logger().debug("Agent returned \(SSHAgent.ResponseType.agentFailure.debugDescription)") + logger.debug("Agent returned \(SSHAgent.ResponseType.agentFailure.debugDescription)") } let full = OpenSSHKeyWriter().lengthAndData(of: response) return full @@ -120,7 +123,7 @@ extension Agent { keyData.append(writer.lengthAndData(of: curveData)) } - Logger().debug("Agent enumerated \(secrets.count) identities") + logger.log("Agent enumerated \(secrets.count) identities") return countData + keyData } @@ -139,7 +142,7 @@ extension Agent { } guard let (store, secret) = secret(matching: hash) else { - Logger().debug("Agent did not have a key matching \(hash as NSData)") + logger.debug("Agent did not have a key matching \(hash as NSData)") throw AgentError.noMatchingKey } @@ -193,7 +196,7 @@ extension Agent { try witness.witness(accessTo: secret, from: store, by: provenance) } - Logger().debug("Agent signed request") + logger.debug("Agent signed request") return signedData } @@ -235,7 +238,7 @@ extension Agent { let certificatePath = certsPath.appending("/").appending("\(minimalHex)-cert.pub") if FileManager.default.fileExists(atPath: certificatePath) { - Logger().debug("Found certificate for \(secret.name)") + logger.debug("Found certificate for \(secret.name)") do { let certContent = try String(contentsOfFile:certificatePath, encoding: .utf8) let certElements = certContent.trimmingCharacters(in: .whitespacesAndNewlines).components(separatedBy: " ") @@ -246,19 +249,19 @@ extension Agent { if let certName = certElements[2].data(using: .utf8) { return (certDecoded, certName) } else if let certName = secret.name.data(using: .utf8) { - Logger().info("Certificate for \(secret.name) does not have a name tag, using secret name instead") + logger.info("Certificate for \(secret.name) does not have a name tag, using secret name instead") return (certDecoded, certName) } else { throw OpenSSHCertificateError.parsingFailed } } } else { - Logger().warning("Certificate found for \(secret.name) but failed to decode base64 key") + logger.warning("Certificate found for \(secret.name) but failed to decode base64 key") throw OpenSSHCertificateError.parsingFailed } } } catch { - Logger().warning("Certificate found for \(secret.name) but failed to load") + logger.warning("Certificate found for \(secret.name) but failed to load") throw OpenSSHCertificateError.parsingFailed } } @@ -270,6 +273,16 @@ extension Agent { extension Agent { + /// Gives any store with no loaded secrets a chance to reload. + func reloadSecretsIfNeccessary() { + for store in storeList.stores { + if store.secrets.isEmpty { + logger.debug("Store \(store.name, privacy: .public) has no loaded secrets. Reloading.") + store.reloadSecrets() + } + } + } + /// Finds a ``Secret`` matching a specified hash whos signature was requested. /// - Parameter hash: The hash to match against. /// - Returns: A ``Secret`` and the ``SecretStore`` containing it, if a match is found. diff --git a/Sources/Packages/Sources/SecretKit/Erasers/AnySecretStore.swift b/Sources/Packages/Sources/SecretKit/Erasers/AnySecretStore.swift index 4a05975..0cb6c40 100644 --- a/Sources/Packages/Sources/SecretKit/Erasers/AnySecretStore.swift +++ b/Sources/Packages/Sources/SecretKit/Erasers/AnySecretStore.swift @@ -12,6 +12,7 @@ public class AnySecretStore: SecretStore { private let _sign: (Data, AnySecret, SigningRequestProvenance) throws -> Data private let _existingPersistedAuthenticationContext: (AnySecret) -> PersistedAuthenticationContext? private let _persistAuthentication: (AnySecret, TimeInterval) throws -> Void + private let _reloadSecrets: () -> Void private var sink: AnyCancellable? @@ -24,6 +25,7 @@ public class AnySecretStore: SecretStore { _sign = { try secretStore.sign(data: $0, with: $1.base as! SecretStoreType.SecretType, for: $2) } _existingPersistedAuthenticationContext = { secretStore.existingPersistedAuthenticationContext(secret: $0.base as! SecretStoreType.SecretType) } _persistAuthentication = { try secretStore.persistAuthentication(secret: $0.base as! SecretStoreType.SecretType, forDuration: $1) } + _reloadSecrets = { secretStore.reloadSecrets() } sink = secretStore.objectWillChange.sink { _ in self.objectWillChange.send() } @@ -57,6 +59,10 @@ public class AnySecretStore: SecretStore { try _persistAuthentication(secret, duration) } + public func reloadSecrets() { + _reloadSecrets() + } + } public class AnySecretStoreModifiable: AnySecretStore, SecretStoreModifiable { diff --git a/Sources/Packages/Sources/SecretKit/Types/SecretStore.swift b/Sources/Packages/Sources/SecretKit/Types/SecretStore.swift index 2251f5e..f13fec7 100644 --- a/Sources/Packages/Sources/SecretKit/Types/SecretStore.swift +++ b/Sources/Packages/Sources/SecretKit/Types/SecretStore.swift @@ -36,6 +36,9 @@ public protocol SecretStore: ObservableObject, Identifiable { /// - Note: This is used for temporarily unlocking access to a secret which would otherwise require authentication every single use. This is useful for situations where the user anticipates several rapid accesses to a authorization-guarded secret. func persistAuthentication(secret: SecretType, forDuration duration: TimeInterval) throws + /// Requests that the store reload secrets from any backing store, if neccessary. + func reloadSecrets() + } /// A SecretStore that the Secretive admin app can modify. diff --git a/Sources/Packages/Sources/SecureEnclaveSecretKit/SecureEnclaveStore.swift b/Sources/Packages/Sources/SecureEnclaveSecretKit/SecureEnclaveStore.swift index 814d4af..13e15e2 100644 --- a/Sources/Packages/Sources/SecureEnclaveSecretKit/SecureEnclaveStore.swift +++ b/Sources/Packages/Sources/SecureEnclaveSecretKit/SecureEnclaveStore.swift @@ -24,7 +24,7 @@ extension SecureEnclave { /// Initializes a Store. public init() { DistributedNotificationCenter.default().addObserver(forName: .secretStoreUpdated, object: nil, queue: .main) { _ in - self.reloadSecrets(notifyAgent: false) + self.reloadSecretsInternal(notifyAgent: false) } loadSecrets() } @@ -68,7 +68,7 @@ extension SecureEnclave { throw KeychainError(statusCode: nil) } try savePublicKey(publicKey, name: name) - reloadSecrets() + reloadSecretsInternal() } public func delete(secret: Secret) throws { @@ -80,7 +80,7 @@ extension SecureEnclave { if status != errSecSuccess { throw KeychainError(statusCode: status) } - reloadSecrets() + reloadSecretsInternal() } public func update(secret: Secret, name: String) throws { @@ -97,7 +97,7 @@ extension SecureEnclave { if status != errSecSuccess { throw KeychainError(statusCode: status) } - reloadSecrets() + reloadSecretsInternal() } public func sign(data: Data, with secret: SecretType, for provenance: SigningRequestProvenance) throws -> Data { @@ -163,6 +163,10 @@ extension SecureEnclave { } } + public func reloadSecrets() { + reloadSecretsInternal(notifyAgent: false) + } + } } @@ -171,12 +175,15 @@ extension SecureEnclave.Store { /// Reloads all secrets from the store. /// - Parameter notifyAgent: A boolean indicating whether a distributed notification should be posted, notifying other processes (ie, the SecretAgent) to reload their stores as well. - private func reloadSecrets(notifyAgent: Bool = true) { + private func reloadSecretsInternal(notifyAgent: Bool = true) { + let before = secrets secrets.removeAll() loadSecrets() - NotificationCenter.default.post(name: .secretStoreReloaded, object: self) - if notifyAgent { - DistributedNotificationCenter.default().postNotificationName(.secretStoreUpdated, object: nil, deliverImmediately: true) + if secrets != before { + NotificationCenter.default.post(name: .secretStoreReloaded, object: self) + if notifyAgent { + DistributedNotificationCenter.default().postNotificationName(.secretStoreUpdated, object: nil, deliverImmediately: true) + } } } diff --git a/Sources/Packages/Sources/SmartCardSecretKit/SmartCardStore.swift b/Sources/Packages/Sources/SmartCardSecretKit/SmartCardStore.swift index 4f90983..ef7c23e 100644 --- a/Sources/Packages/Sources/SmartCardSecretKit/SmartCardStore.swift +++ b/Sources/Packages/Sources/SmartCardSecretKit/SmartCardStore.swift @@ -89,6 +89,19 @@ extension SmartCard { public func persistAuthentication(secret: SmartCard.Secret, forDuration: TimeInterval) throws { } + /// Reloads all secrets from the store. + public func reloadSecrets() { + DispatchQueue.main.async { + self.isAvailable = self.tokenID != nil + let before = self.secrets + self.secrets.removeAll() + self.loadSecrets() + if self.secrets != before { + NotificationCenter.default.post(name: .secretStoreReloaded, object: self) + } + } + } + } } @@ -102,15 +115,6 @@ extension SmartCard.Store { reloadSecrets() } - /// Reloads all secrets from the store. - private func reloadSecrets() { - DispatchQueue.main.async { - self.isAvailable = self.tokenID != nil - self.secrets.removeAll() - self.loadSecrets() - } - } - /// Loads all secrets from the store. private func loadSecrets() { guard let tokenID = tokenID else { return } diff --git a/Sources/Packages/Tests/SecretAgentKitTests/StubStore.swift b/Sources/Packages/Tests/SecretAgentKitTests/StubStore.swift index a4fd344..ae6af46 100644 --- a/Sources/Packages/Tests/SecretAgentKitTests/StubStore.swift +++ b/Sources/Packages/Tests/SecretAgentKitTests/StubStore.swift @@ -78,6 +78,9 @@ extension Stub { public func persistAuthentication(secret: Stub.Secret, forDuration duration: TimeInterval) throws { } + public func reloadSecrets() { + } + } } diff --git a/Sources/Secretive/Preview Content/PreviewStore.swift b/Sources/Secretive/Preview Content/PreviewStore.swift index a557f36..839273e 100644 --- a/Sources/Secretive/Preview Content/PreviewStore.swift +++ b/Sources/Secretive/Preview Content/PreviewStore.swift @@ -47,6 +47,9 @@ extension Preview { func persistAuthentication(secret: Preview.Secret, forDuration duration: TimeInterval) throws { } + func reloadSecrets() { + } + } class StoreModifiable: Store, SecretStoreModifiable {