[Pkg-privacy-commits] [msva-perl] 143/356: whitespace, licensing, attribution cleanup

Ximin Luo infinity0 at moszumanska.debian.org
Mon Aug 24 07:41:49 UTC 2015


This is an automated email from the git hooks/post-receive script.

infinity0 pushed a commit to branch debian
in repository msva-perl.

commit 3eca865988802b510eae7ff4c8f49dee02b4030b
Author: Daniel Kahn Gillmor <dkg at fifthhorseman.net>
Date:   Mon Oct 4 00:37:44 2010 -0400

    whitespace, licensing, attribution cleanup
---
 Crypt/Monkeysphere/MSVA/MarginalUI.pm | 170 ++++++++++++++++++----------------
 1 file changed, 92 insertions(+), 78 deletions(-)

diff --git a/Crypt/Monkeysphere/MSVA/MarginalUI.pm b/Crypt/Monkeysphere/MSVA/MarginalUI.pm
index 02dcb16..094f70c 100755
--- a/Crypt/Monkeysphere/MSVA/MarginalUI.pm
+++ b/Crypt/Monkeysphere/MSVA/MarginalUI.pm
@@ -1,9 +1,23 @@
 #----------------------------------------------------------------------
-# marginalUI
+# Monkeysphere Validation Agent, Perl version
+# Marginal User Interface for reasonable prompting
+# Copyright © 2010 Daniel Kahn Gillmor <dkg at fifthhorseman.net>,
+#                  Matthew James Goins <mjgoins at openflows.com>,
+#                  Jameson Graef Rollins <jrollins at finestructure.net>,
+#                  Elliot Winard <enw at caveteen.com>
 #
-# TODO: make the $heredoc a fucntion that takes the following args -
-#    end entity uid - string
-#    certifiers - list of certifiers
+# This program is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
 #
 #----------------------------------------------------------------------
 
@@ -22,88 +36,88 @@
     my $fprs = shift;
     my @subvalid_key_fprs = @{$fprs};
 
-          msvalog('debug', "%d subvalid_key_fprs\n", $#subvalid_key_fprs+1);
-          foreach my $keyfpr (@subvalid_key_fprs) {
-            my $fprx = sprintf('0x%.40s', $keyfpr->{fpr}->as_hex_string);
-            msvalog('debug', "checking on %s\n", $fprx);
-            foreach my $gpgkey ($gnupg->get_public_keys_with_sigs($fprx)) {
-              msvalog('debug', "found key %.40s\n", $gpgkey->fingerprint->as_hex_string);
-              # we're going to prompt the user here if we have any
-              # relevant certifiers:
-              my @valid_certifiers;
-              my @marginal_certifiers;
+    msvalog('debug', "%d subvalid_key_fprs\n", $#subvalid_key_fprs+1);
+    foreach my $keyfpr (@subvalid_key_fprs) {
+      my $fprx = sprintf('0x%.40s', $keyfpr->{fpr}->as_hex_string);
+      msvalog('debug', "checking on %s\n", $fprx);
+      foreach my $gpgkey ($gnupg->get_public_keys_with_sigs($fprx)) {
+        msvalog('debug', "found key %.40s\n", $gpgkey->fingerprint->as_hex_string);
+        # we're going to prompt the user here if we have any
+        # relevant certifiers:
+        my @valid_certifiers;
+        my @marginal_certifiers;
 
-              # FIXME: if there are multiple keys in the OpenPGP WoT
-              # with the same key material and the same User ID
-              # attached, we'll be throwing multiple prompts per query
-              # (until the user selects one or cancels them all).
-              # That's a mess, but i'm not sure what the better thing
-              # to do is.
-              foreach my $user_id ($gpgkey->user_ids) {
-                msvalog('debug', "found EE User ID %s\n", $user_id->as_string);
-                if ($user_id->as_string eq $uid) {
-                  # get a list of the certifiers of the relevant User ID for the key
-                  foreach my $cert (@{$user_id->signatures}) {
-                    if ($cert->hex_id =~ /^([A-Fa-f0-9]{16})$/) {
-                      my $certid = $1;
-                      msvalog('debug', "found certifier 0x%.16s\n", $certid);
-                      if ($cert->is_valid()) {
-                        foreach my $certifier ($gnupg->get_public_keys(sprintf('0x%.40s!', $certid))) {
-                          my $valid_cuid = 0;
-                          my $marginal = undef;
-                          foreach my $cuid ($certifier->user_ids) {
-                            # grab the first full or ultimate user ID on
-                            # this certifier's key:
-                            if ($cuid->validity =~ /^[fu]$/) {
-                              push(@valid_certifiers, { key_id => $cert->hex_id,
-                                                        user_id => $cuid->as_string,
-                                                      } );
-                              $valid_cuid = 1;
-                              last;
-                            } elsif ($cuid->validity =~ /^[m]$/) {
-                              $marginal = { key_id => $cert->hex_id,
-                                            user_id => $cuid->as_string,
-                                          };
-                            }
-                          }
-                          push(@marginal_certifiers, $marginal)
-                            if (! $valid_cuid && defined $marginal);
-                        }
+        # FIXME: if there are multiple keys in the OpenPGP WoT
+        # with the same key material and the same User ID
+        # attached, we'll be throwing multiple prompts per query
+        # (until the user selects one or cancels them all).
+        # That's a mess, but i'm not sure what the better thing
+        # to do is.
+        foreach my $user_id ($gpgkey->user_ids) {
+          msvalog('debug', "found EE User ID %s\n", $user_id->as_string);
+          if ($user_id->as_string eq $uid) {
+            # get a list of the certifiers of the relevant User ID for the key
+            foreach my $cert (@{$user_id->signatures}) {
+              if ($cert->hex_id =~ /^([A-Fa-f0-9]{16})$/) {
+                my $certid = $1;
+                msvalog('debug', "found certifier 0x%.16s\n", $certid);
+                if ($cert->is_valid()) {
+                  foreach my $certifier ($gnupg->get_public_keys(sprintf('0x%.40s!', $certid))) {
+                    my $valid_cuid = 0;
+                    my $marginal = undef;
+                    foreach my $cuid ($certifier->user_ids) {
+                      # grab the first full or ultimate user ID on
+                      # this certifier's key:
+                      if ($cuid->validity =~ /^[fu]$/) {
+                        push(@valid_certifiers, { key_id => $cert->hex_id,
+                                                  user_id => $cuid->as_string,
+                                                } );
+                        $valid_cuid = 1;
+                        last;
+                      } elsif ($cuid->validity =~ /^[m]$/) {
+                        $marginal = { key_id => $cert->hex_id,
+                                      user_id => $cuid->as_string,
+                                    };
                       }
-                    } else {
-                      msvalog('error', "certifier ID does not fit expected pattern '%s'\n", $cert->hex_id);
                     }
+                    push(@marginal_certifiers, $marginal)
+                      if (! $valid_cuid && defined $marginal);
                   }
                 }
-                # else ## do we care at all about other User IDs on this key?
-
-                # We now know the list of fully/ultimately-valid
-                # certifiers, and a separate list of marginally-valid
-                # certifiers.
-                if ($#valid_certifiers == -1) {
-                  msvalog('info', "No valid certifiers, so no marginal UI\n");
-                } else {
-                  my $certifier_list = join("\n", map { sprintf("[%s] %s", $_->{key_id}, $_->{user_id}) } @valid_certifiers);
-                  my $msg = sprintf("The matching key we found for [%s] is not %svalid.\n(Key Fingerprint: 0x%.40s)\n----\nBut it was certified by the following folks:\n%s",
-                                    $uid,
-                                    ('m' == $keyfpr->{val} ? 'fully ' : ''),
-                                    $keyfpr->{fpr}->as_hex_string,
-                                    $certifier_list,
-                                   );
-                  # FIXME: what about revoked certifications?
-                  # FIXME: what about expired certifications?
-                  # FIXME: what about certifications ostensibly made in the future?
-                  msvalog('info', "%s\n", $msg);
-                  my $resp = prompt($msg);
-                  if ($resp) {
-                    return $resp;
-                  }
-                }
-                # FIXME: not doing anything with @marginal_certifiers
-                # -- that'd be yet more queries to gpg :(
+              } else {
+                msvalog('error', "certifier ID does not fit expected pattern '%s'\n", $cert->hex_id);
               }
             }
           }
+          # else ## do we care at all about other User IDs on this key?
+
+          # We now know the list of fully/ultimately-valid
+          # certifiers, and a separate list of marginally-valid
+          # certifiers.
+          if ($#valid_certifiers == -1) {
+            msvalog('info', "No valid certifiers, so no marginal UI\n");
+          } else {
+            my $certifier_list = join("\n", map { sprintf("[%s] %s", $_->{key_id}, $_->{user_id}) } @valid_certifiers);
+            my $msg = sprintf("The matching key we found for [%s] is not %svalid.\n(Key Fingerprint: 0x%.40s)\n----\nBut it was certified by the following folks:\n%s",
+                              $uid,
+                              ('m' == $keyfpr->{val} ? 'fully ' : ''),
+                              $keyfpr->{fpr}->as_hex_string,
+                              $certifier_list,
+                             );
+            # FIXME: what about revoked certifications?
+            # FIXME: what about expired certifications?
+            # FIXME: what about certifications ostensibly made in the future?
+            msvalog('info', "%s\n", $msg);
+            my $resp = prompt($msg);
+            if ($resp) {
+              return $resp;
+            }
+          }
+          # FIXME: not doing anything with @marginal_certifiers
+          # -- that'd be yet more queries to gpg :(
+        }
+      }
+    }
     return 0;
   }
 

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-privacy/packages/msva-perl.git



More information about the Pkg-privacy-commits mailing list