finish wkd store. add hkp key updates.
This commit is contained in:
		
							parent
							
								
									05df6253db
								
							
						
					
					
						commit
						caa625e2d1
					
				
							
								
								
									
										9
									
								
								main.go
									
									
									
									
									
								
							
							
						
						
									
										9
									
								
								main.go
									
									
									
									
									
								
							@ -127,6 +127,15 @@ func run(ctx context.Context) error {
 | 
			
		||||
		avatarApp.Routes(mux)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if env("DISABLE_WKD", "false") == "false" {
 | 
			
		||||
		avatarApp, err := keyproofs.NewWKDApp(ctx, env("WKD_PATH", "pub"), env("WKD_DOMAIN", "pub"))
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		avatarApp.Routes(mux)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if env("DISABLE_VCARD", "false") == "false" {
 | 
			
		||||
		vcardApp, err := keyproofs.NewVCardApp(ctx)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
 | 
			
		||||
@ -13,6 +13,7 @@ import (
 | 
			
		||||
 | 
			
		||||
	"github.com/rs/zerolog/log"
 | 
			
		||||
	"github.com/sour-is/crypto/openpgp"
 | 
			
		||||
	"github.com/sour-is/crypto/openpgp/packet"
 | 
			
		||||
	"github.com/tv42/zbase32"
 | 
			
		||||
	"golang.org/x/crypto/openpgp/armor"
 | 
			
		||||
)
 | 
			
		||||
@ -79,10 +80,16 @@ func (k EntityKey) Key() interface{} {
 | 
			
		||||
 | 
			
		||||
type Entity struct {
 | 
			
		||||
	Primary       *mail.Address
 | 
			
		||||
	SelfSignature *packet.Signature
 | 
			
		||||
	Emails        []*mail.Address
 | 
			
		||||
	Fingerprint   string
 | 
			
		||||
	Proofs        []string
 | 
			
		||||
	ArmorText     string
 | 
			
		||||
	entity        *openpgp.Entity
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (e *Entity) Serialize(f io.Writer) error {
 | 
			
		||||
	return e.entity.Serialize(f)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func getEntity(lis openpgp.EntityList) (*Entity, error) {
 | 
			
		||||
@ -97,6 +104,7 @@ func getEntity(lis openpgp.EntityList) (*Entity, error) {
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		entity.entity = e
 | 
			
		||||
		entity.Fingerprint = fmt.Sprintf("%X", e.PrimaryKey.Fingerprint)
 | 
			
		||||
 | 
			
		||||
		for name, ident := range e.Identities {
 | 
			
		||||
@ -126,6 +134,7 @@ func getEntity(lis openpgp.EntityList) (*Entity, error) {
 | 
			
		||||
 | 
			
		||||
			// If identity is self signed read notation data.
 | 
			
		||||
			if ident.SelfSignature != nil && ident.SelfSignature.NotationData != nil {
 | 
			
		||||
				entity.SelfSignature = ident.SelfSignature
 | 
			
		||||
				// Get proofs and append to list.
 | 
			
		||||
				if proofs, ok := ident.SelfSignature.NotationData["proof@metacode.biz"]; ok {
 | 
			
		||||
					entity.Proofs = append(entity.Proofs, proofs...)
 | 
			
		||||
@ -148,8 +157,11 @@ func ReadKey(r io.Reader, useArmored bool) (e *Entity, err error) {
 | 
			
		||||
	var w io.Writer = &buf
 | 
			
		||||
	e = &Entity{}
 | 
			
		||||
 | 
			
		||||
	defer func(){ if e != nil { e.ArmorText = buf.String() }}()
 | 
			
		||||
 | 
			
		||||
	defer func() {
 | 
			
		||||
		if e != nil {
 | 
			
		||||
			e.ArmorText = buf.String()
 | 
			
		||||
		}
 | 
			
		||||
	}()
 | 
			
		||||
 | 
			
		||||
	if !useArmored {
 | 
			
		||||
		var aw io.WriteCloser
 | 
			
		||||
 | 
			
		||||
@ -231,6 +231,7 @@ func NewProof(ctx context.Context, uri, fingerprint string) ProofResolver {
 | 
			
		||||
				return &httpResolve{p, p.Verify, nil}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	default:
 | 
			
		||||
		p.Icon = "exclamation-triangle"
 | 
			
		||||
		p.Service = "unknown"
 | 
			
		||||
 | 
			
		||||
@ -64,7 +64,7 @@ func NewAvatarApp(ctx context.Context, path string) (*avatarApp, error) {
 | 
			
		||||
					kind := filepath.Base(path)
 | 
			
		||||
					name := filepath.Base(op.Name)
 | 
			
		||||
					if err := app.createLinks(kind, name); err != nil {
 | 
			
		||||
						fmt.Println(err)
 | 
			
		||||
						log.Err(err).Send()
 | 
			
		||||
					}
 | 
			
		||||
				case fsnotify.Remove, fsnotify.Rename:
 | 
			
		||||
					path = filepath.Dir(op.Name)
 | 
			
		||||
@ -76,7 +76,7 @@ func NewAvatarApp(ctx context.Context, path string) (*avatarApp, error) {
 | 
			
		||||
				default:
 | 
			
		||||
				}
 | 
			
		||||
			case err := <-watch.Errors:
 | 
			
		||||
				fmt.Println(err)
 | 
			
		||||
				log.Err(err).Send()
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	})
 | 
			
		||||
@ -100,10 +100,12 @@ func (app *avatarApp) CheckFiles(ctx context.Context) error {
 | 
			
		||||
			return fmt.Errorf("walk failed: %w", err)
 | 
			
		||||
		}
 | 
			
		||||
		if info.IsDir() {
 | 
			
		||||
			if info.Name() == ".links" {
 | 
			
		||||
			switch info.Name() {
 | 
			
		||||
			case "avatar", "bg", "cover":
 | 
			
		||||
				return nil
 | 
			
		||||
			default:
 | 
			
		||||
				return filepath.SkipDir
 | 
			
		||||
			}
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		path = filepath.Dir(path)
 | 
			
		||||
 | 
			
		||||
@ -2,9 +2,13 @@ package keyproofs
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"crypto/sha1"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"net"
 | 
			
		||||
	"net/http"
 | 
			
		||||
	"net/url"
 | 
			
		||||
	"os"
 | 
			
		||||
	"path/filepath"
 | 
			
		||||
	"strings"
 | 
			
		||||
@ -12,7 +16,9 @@ import (
 | 
			
		||||
	"github.com/fsnotify/fsnotify"
 | 
			
		||||
	"github.com/go-chi/chi"
 | 
			
		||||
	"github.com/rs/zerolog/log"
 | 
			
		||||
	"github.com/sour-is/crypto/openpgp"
 | 
			
		||||
	"github.com/sour-is/keyproofs/pkg/graceful"
 | 
			
		||||
	"github.com/tv42/zbase32"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type wkdApp struct {
 | 
			
		||||
@ -22,9 +28,10 @@ type wkdApp struct {
 | 
			
		||||
 | 
			
		||||
func NewWKDApp(ctx context.Context, path, domain string) (*wkdApp, error) {
 | 
			
		||||
	log := log.Ctx(ctx)
 | 
			
		||||
	log.Debug().Str("domain", domain).Str("path", path).Msg("NewWKDApp")
 | 
			
		||||
 | 
			
		||||
	path = filepath.Clean(path)
 | 
			
		||||
	app := &wkdApp{path: path}
 | 
			
		||||
	app := &wkdApp{path: path, domain: domain}
 | 
			
		||||
	err := app.CheckFiles(ctx)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
@ -57,7 +64,7 @@ func NewWKDApp(ctx context.Context, path, domain string) (*wkdApp, error) {
 | 
			
		||||
					kind := filepath.Base(path)
 | 
			
		||||
					name := filepath.Base(op.Name)
 | 
			
		||||
					if err := app.createLinks(kind, name); err != nil {
 | 
			
		||||
						fmt.Println(err)
 | 
			
		||||
						log.Err(err).Send()
 | 
			
		||||
					}
 | 
			
		||||
				case fsnotify.Remove, fsnotify.Rename:
 | 
			
		||||
					path = filepath.Dir(op.Name)
 | 
			
		||||
@ -69,7 +76,7 @@ func NewWKDApp(ctx context.Context, path, domain string) (*wkdApp, error) {
 | 
			
		||||
				default:
 | 
			
		||||
				}
 | 
			
		||||
			case err := <-watch.Errors:
 | 
			
		||||
				fmt.Println(err)
 | 
			
		||||
				log.Err(err).Send()
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	})
 | 
			
		||||
@ -80,7 +87,7 @@ func NewWKDApp(ctx context.Context, path, domain string) (*wkdApp, error) {
 | 
			
		||||
func (app *wkdApp) CheckFiles(ctx context.Context) error {
 | 
			
		||||
	log := log.Ctx(ctx)
 | 
			
		||||
 | 
			
		||||
	for _, name := range []string{".links", "wkd"} {
 | 
			
		||||
	for _, name := range []string{".links", "keys"} {
 | 
			
		||||
		log.Debug().Msgf("mkdir: %s", filepath.Join(app.path, name))
 | 
			
		||||
		err := os.MkdirAll(filepath.Join(app.path, name), 0700)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
@ -92,12 +99,18 @@ func (app *wkdApp) CheckFiles(ctx context.Context) error {
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
		if info.IsDir() {
 | 
			
		||||
			if info.Name() == ".links" {
 | 
			
		||||
				return filepath.SkipDir
 | 
			
		||||
			}
 | 
			
		||||
		log.Debug().Msg(info.Name())
 | 
			
		||||
		if path == app.path {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
		if info.IsDir() {
 | 
			
		||||
			switch info.Name() {
 | 
			
		||||
			case "keys":
 | 
			
		||||
				return nil
 | 
			
		||||
			}
 | 
			
		||||
			return filepath.SkipDir
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		path = filepath.Dir(path)
 | 
			
		||||
		kind := filepath.Base(path)
 | 
			
		||||
@ -109,26 +122,48 @@ func (app *wkdApp) CheckFiles(ctx context.Context) error {
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (app *wkdApp) get(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	log := log.Ctx(r.Context())
 | 
			
		||||
func (app *wkdApp) getRedirect(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	ctx := r.Context()
 | 
			
		||||
	log := log.Ctx(ctx)
 | 
			
		||||
 | 
			
		||||
	log.Print(r.Host)
 | 
			
		||||
 | 
			
		||||
	kind := chi.URLParam(r, "kind")
 | 
			
		||||
	hash := chi.URLParam(r, "hash")
 | 
			
		||||
 | 
			
		||||
	if strings.ContainsRune(hash, '@') {
 | 
			
		||||
		avatarHost, _, err := styleSRV(r.Context(), hash)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			writeText(w, 500, err.Error())
 | 
			
		||||
			return
 | 
			
		||||
		hash, domain := hashHuman(hash)
 | 
			
		||||
		log.Debug().Str("hash", hash).Str("domain", domain).Msg("redirect")
 | 
			
		||||
		if host, adv := getWKDDomain(ctx, domain); adv {
 | 
			
		||||
			log.Debug().Str("host", host).Str("domain", domain).Bool("adv", adv).Msg("redirect")
 | 
			
		||||
			http.Redirect(w, r, fmt.Sprintf("https://%s/.well-known/openpgpkey/hu/%s/%s", host, domain, hash), http.StatusTemporaryRedirect)
 | 
			
		||||
		} else {
 | 
			
		||||
			log.Debug().Str("host", host).Str("domain", domain).Bool("adv", adv).Msg("redirect")
 | 
			
		||||
			http.Redirect(w, r, fmt.Sprintf("https://%s/.well-known/openpgpkey/hu/%s", domain, hash), http.StatusTemporaryRedirect)
 | 
			
		||||
		}
 | 
			
		||||
		hash = hashSHA256(strings.ToLower(hash))
 | 
			
		||||
		http.Redirect(w, r, fmt.Sprintf("https://%s/%s/%s?%s", avatarHost, kind, hash, r.URL.RawQuery), 301)
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fname := filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
 | 
			
		||||
	writeText(w, http.StatusBadRequest, "Bad Request")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (app *wkdApp) get(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	ctx := r.Context()
 | 
			
		||||
	log := log.Ctx(ctx)
 | 
			
		||||
 | 
			
		||||
	log.Print(r.Host)
 | 
			
		||||
 | 
			
		||||
	hash := chi.URLParam(r, "hash")
 | 
			
		||||
	domain := chi.URLParam(r, "domain")
 | 
			
		||||
	if domain == "" {
 | 
			
		||||
		domain = app.domain
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if strings.ContainsRune(hash, '@') {
 | 
			
		||||
		hash, domain = hashHuman(hash)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fname := filepath.Join(app.path, ".links", strings.Join([]string{"keys", domain, hash}, "-"))
 | 
			
		||||
	log.Debug().Msgf("path: %s", fname)
 | 
			
		||||
 | 
			
		||||
	f, err := os.Open(fname)
 | 
			
		||||
@ -145,6 +180,9 @@ func (app *wkdApp) get(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (app *wkdApp) Routes(r *chi.Mux) {
 | 
			
		||||
	r.MethodFunc("GET", "/wkd/{hash}", app.getRedirect)
 | 
			
		||||
	r.MethodFunc("GET", "/key/{hash}", app.get)
 | 
			
		||||
	r.MethodFunc("POST", "/pks/add", app.postKey)
 | 
			
		||||
	r.MethodFunc("GET", "/.well-known/openpgpkey/hu/{hash}", app.get)
 | 
			
		||||
	r.MethodFunc("GET", "/.well-known/openpgpkey/hu/{domain}/{hash}", app.get)
 | 
			
		||||
}
 | 
			
		||||
@ -157,8 +195,8 @@ func (app *wkdApp) createLinks(kind, name string) error {
 | 
			
		||||
	src := filepath.Join("..", kind, name)
 | 
			
		||||
	name = strings.ToLower(name)
 | 
			
		||||
 | 
			
		||||
	hash := hashMD5(name)
 | 
			
		||||
	link := filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
 | 
			
		||||
	hash, domain := hashHuman(name)
 | 
			
		||||
	link := filepath.Join(app.path, ".links", strings.Join([]string{kind, domain, hash}, "-"))
 | 
			
		||||
	err := app.replaceLink(src, link)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
@ -166,6 +204,14 @@ func (app *wkdApp) createLinks(kind, name string) error {
 | 
			
		||||
 | 
			
		||||
	return err
 | 
			
		||||
}
 | 
			
		||||
func hashHuman(name string) (string, string) {
 | 
			
		||||
	name = strings.ToLower(name)
 | 
			
		||||
	parts := strings.SplitN(name, "@", 2)
 | 
			
		||||
	hash := sha1.Sum([]byte(parts[0]))
 | 
			
		||||
	lp := zbase32.EncodeToString(hash[:])
 | 
			
		||||
 | 
			
		||||
	return lp, parts[1]
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (app *wkdApp) removeLinks(kind, name string) error {
 | 
			
		||||
	if !strings.ContainsRune(name, '@') {
 | 
			
		||||
@ -173,17 +219,13 @@ func (app *wkdApp) removeLinks(kind, name string) error {
 | 
			
		||||
	}
 | 
			
		||||
	name = strings.ToLower(name)
 | 
			
		||||
 | 
			
		||||
	hash := hashMD5(name)
 | 
			
		||||
	link := filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
 | 
			
		||||
	hash, domain := hashHuman(name)
 | 
			
		||||
	link := filepath.Join(app.path, ".links", strings.Join([]string{kind, domain, hash}, "-"))
 | 
			
		||||
	err := os.Remove(link)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	hash = hashSHA256(name)
 | 
			
		||||
	link = filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
 | 
			
		||||
	err = os.Remove(link)
 | 
			
		||||
 | 
			
		||||
	return err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -210,3 +252,129 @@ func (app *wkdApp) replaceLink(src, link string) error {
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func getWKDDomain(ctx context.Context, domain string) (string, bool) {
 | 
			
		||||
	cname, err := net.DefaultResolver.LookupCNAME(ctx, "openpgpkey."+domain)
 | 
			
		||||
	if err == nil {
 | 
			
		||||
		return strings.Trim(cname, "."), true
 | 
			
		||||
	}
 | 
			
		||||
	return domain, false
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (app *wkdApp) postKey(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	ctx := r.Context()
 | 
			
		||||
	log := log.Ctx(ctx)
 | 
			
		||||
 | 
			
		||||
	body, err := ioutil.ReadAll(r.Body)
 | 
			
		||||
	r.Body.Close()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusBadRequest, "ERR BODY")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	q, err := url.ParseQuery(string(body))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusBadRequest, "ERR PARSE")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	lis, err := openpgp.ReadArmoredKeyRing(strings.NewReader(q.Get("keytext")))
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusBadRequest, "ERR READ KEY")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	entity, err := getEntity(lis)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusBadRequest, "ERR ENTITY")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fname := filepath.Join(app.path, "keys", entity.Primary.Address)
 | 
			
		||||
 | 
			
		||||
	f, err := os.Open(fname)
 | 
			
		||||
	if os.IsNotExist(err) {
 | 
			
		||||
		out, err := os.Create(fname)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Err(err).Send()
 | 
			
		||||
			writeText(w, http.StatusInternalServerError, "ERR CREATE")
 | 
			
		||||
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		err = entity.Serialize(out)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Err(err).Send()
 | 
			
		||||
			writeText(w, http.StatusInternalServerError, "ERR WRITE")
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		w.Header().Set("X-HKP-Status", "Created key")
 | 
			
		||||
		writeText(w, http.StatusOK, "OK CREATED")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	current, err := openpgp.ReadKeyRing(f)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusInternalServerError, "ERR READ")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	f.Close()
 | 
			
		||||
 | 
			
		||||
	compare, err := getEntity(current)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusInternalServerError, "ERR PARSE")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if entity.Fingerprint != compare.Fingerprint {
 | 
			
		||||
		w.Header().Set("X-HKP-Status", "Mismatch fingerprint")
 | 
			
		||||
		writeText(w, http.StatusBadRequest, "ERR FINGERPRINT")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
	if entity.SelfSignature == nil || compare.SelfSignature == nil {
 | 
			
		||||
		w.Header().Set("X-HKP-Status", "Missing signature")
 | 
			
		||||
		writeText(w, http.StatusBadRequest, "ERR SIGNATURE")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	log.Debug().Msgf("%v < %v", entity.SelfSignature.CreationTime, compare.SelfSignature.CreationTime)
 | 
			
		||||
 | 
			
		||||
	if !compare.SelfSignature.CreationTime.Before(entity.SelfSignature.CreationTime) {
 | 
			
		||||
		w.Header().Set("X-HKP-Status", "out of date")
 | 
			
		||||
		writeText(w, http.StatusBadRequest, "ERR OUT OF DATE")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	out, err := os.Create(fname)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusInternalServerError, "ERR CREATE")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	err = entity.Serialize(out)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		log.Err(err).Send()
 | 
			
		||||
		writeText(w, http.StatusInternalServerError, "ERR WRITE")
 | 
			
		||||
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	w.Header().Set("X-HKP-Status", "Updated key")
 | 
			
		||||
	writeText(w, http.StatusOK, "OK UPDATED")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -55,6 +55,8 @@ func NewXMPP(ctx context.Context, config *xmpp.Config) (*connection, error) {
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	conn.client = cl
 | 
			
		||||
 | 
			
		||||
	sc := xmpp.NewStreamManager(cl, func(c xmpp.Sender) { log.Info().Msg("XMPP Client connected.") })
 | 
			
		||||
 | 
			
		||||
	wg.Go(func() error {
 | 
			
		||||
@ -68,13 +70,16 @@ func NewXMPP(ctx context.Context, config *xmpp.Config) (*connection, error) {
 | 
			
		||||
		log.Info().Msg("XMPP Client shutdown.")
 | 
			
		||||
	}()
 | 
			
		||||
 | 
			
		||||
	conn.client = cl
 | 
			
		||||
	return conn, err
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (conn *connection) GetXMPPVCard(ctx context.Context, jid string) (vc *VCard, err error) {
 | 
			
		||||
	log := log.Ctx(ctx)
 | 
			
		||||
 | 
			
		||||
	if err := conn.client.Resume(); err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var iq *stanza.IQ
 | 
			
		||||
	iq, err = stanza.NewIQ(stanza.Attrs{To: jid, Type: "get"})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user