diff --git a/CHANGELOG.md b/CHANGELOG.md index 9e9e351..d4705c5 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -5,11 +5,7 @@ SPDX-License-Identifier: CC0-1.0 # Cert-D-Java Changelog -## 0.2.4-SNAPSHOT -- Add constructor parameters to `BadDataException` -- Add support for OpenPGP v6 fingerprints - -## 0.2.3 +## 0.2.3-SNAPSHOT - Bump Bouncy Castle to `1.82` and switch to `jdk18on`-variants - Upgrade build system - Bump gradle to `8.8` diff --git a/pgp-cert-d-java/src/main/java/pgp/cert_d/PGPCertificateDirectory.java b/pgp-cert-d-java/src/main/java/pgp/cert_d/PGPCertificateDirectory.java index dfcdd8a..87d2512 100644 --- a/pgp-cert-d-java/src/main/java/pgp/cert_d/PGPCertificateDirectory.java +++ b/pgp-cert-d-java/src/main/java/pgp/cert_d/PGPCertificateDirectory.java @@ -31,7 +31,6 @@ public class PGPCertificateDirectory final Backend backend; final SubkeyLookup subkeyLookup; private final Pattern openPgpV4FingerprintPattern = Pattern.compile("^[a-f0-9]{40}$"); - private final Pattern openPgpV6FingerprintPattern = Pattern.compile("^[a-f0-9]{64}$"); /** * Constructor for a PGP certificate directory. @@ -46,13 +45,12 @@ public class PGPCertificateDirectory @Override public Certificate getByFingerprint(String fingerprint) throws BadDataException, BadNameException, IOException { - if (!openPgpV4FingerprintPattern.matcher(fingerprint).matches() && - !openPgpV6FingerprintPattern.matcher(fingerprint).matches()) { - throw new BadNameException("Queried fingerprint '" + fingerprint + "' does neither match OpenPGP v4 nor OpenPGP v6 format."); + if (!openPgpV4FingerprintPattern.matcher(fingerprint).matches()) { + throw new BadNameException(); } Certificate certificate = backend.readByFingerprint(fingerprint); if (certificate == null) { - throw new NoSuchElementException("No certificate with fingerprint '" + fingerprint + "' found."); + throw new NoSuchElementException(); } return certificate; } @@ -74,7 +72,7 @@ public class PGPCertificateDirectory if (keyMaterial != null) { return keyMaterial.asCertificate(); } - throw new NoSuchElementException("No certificate with special name '" + specialName + "' found."); + throw new NoSuchElementException(); } @Override @@ -131,7 +129,7 @@ public class PGPCertificateDirectory try { KeyMaterial keyMaterial = backend.readBySpecialName(SpecialNames.TRUST_ROOT); if (keyMaterial == null) { - throw new NoSuchElementException("No trust-root found."); + throw new NoSuchElementException(); } return keyMaterial; } catch (BadNameException e) { diff --git a/pgp-cert-d-java/src/main/java/pgp/cert_d/backend/FileBasedCertificateDirectoryBackend.java b/pgp-cert-d-java/src/main/java/pgp/cert_d/backend/FileBasedCertificateDirectoryBackend.java index affc5b8..08ac356 100644 --- a/pgp-cert-d-java/src/main/java/pgp/cert_d/backend/FileBasedCertificateDirectoryBackend.java +++ b/pgp-cert-d-java/src/main/java/pgp/cert_d/backend/FileBasedCertificateDirectoryBackend.java @@ -181,9 +181,7 @@ public class FileBasedCertificateDirectoryBackend implements PGPCertificateDirec Certificate certificate = reader.read(bufferedIn, tag).asCertificate(); if (!certificate.getFingerprint().equals(fingerprint)) { // TODO: Figure out more suitable exception - throw new BadDataException("Identified certificate fingerprint does not match queried fingerprint:\n" + - "found: " + certificate.getFingerprint() + "\n" + - "query: " + fingerprint); + throw new BadDataException(); } return certificate; @@ -244,9 +242,7 @@ public class FileBasedCertificateDirectoryBackend implements PGPCertificateDirec long tag = getTag(certFile); Certificate certificate = reader.read(new FileInputStream(certFile), tag).asCertificate(); if (!(subdirectory.getName() + certFile.getName()).equals(certificate.getFingerprint())) { - throw new BadDataException("Certificate fingerprint does not match file location+name.\n" + - "Fingerprint: " + certificate.getFingerprint() + "\n" + - "Location+name: " + subdirectory.getName() + certFile.getName()); + throw new BadDataException(); } return certificate; } catch (IOException e) { @@ -283,7 +279,7 @@ public class FileBasedCertificateDirectoryBackend implements PGPCertificateDirec existingCertificate = readBySpecialName(SpecialNames.TRUST_ROOT); certFile = resolver.getCertFileBySpecialName(SpecialNames.TRUST_ROOT); } catch (BadNameException e) { - throw new BadDataException("Unknown special name '" + SpecialNames.TRUST_ROOT + "'"); + throw new BadDataException(); } if (existingCertificate != null) { @@ -308,7 +304,7 @@ public class FileBasedCertificateDirectoryBackend implements PGPCertificateDirec existingCertificate = readByFingerprint(newCertificate.getFingerprint()); certFile = resolver.getCertFileByFingerprint(newCertificate.getFingerprint()); } catch (BadNameException e) { - throw new BadDataException("Malformed key fingerprint: " + newCertificate.getFingerprint()); + throw new BadDataException(); } if (existingCertificate != null) { @@ -328,7 +324,7 @@ public class FileBasedCertificateDirectoryBackend implements PGPCertificateDirec existingCertificate = readBySpecialName(specialName); certFile = resolver.getCertFileBySpecialName(specialName); } catch (BadNameException e) { - throw new BadDataException("Unknown special name '" + specialName + "'"); + throw new BadDataException(); } if (existingCertificate != null) { @@ -353,7 +349,7 @@ public class FileBasedCertificateDirectoryBackend implements PGPCertificateDirec private Long getTag(File file) throws IOException { if (!file.exists()) { - throw new NoSuchElementException("File '" + file.getAbsolutePath() + "' does not exist."); + throw new NoSuchElementException(); } Path path = file.toPath(); BasicFileAttributes attrs = Files.readAttributes(path, BasicFileAttributes.class); @@ -413,7 +409,7 @@ public class FileBasedCertificateDirectoryBackend implements PGPCertificateDirec */ public File getCertFileByFingerprint(String fingerprint) throws BadNameException { if (!isFingerprint(fingerprint)) { - throw new BadNameException("Malformed query fingerprint '" + fingerprint + "'"); + throw new BadNameException(); } // is fingerprint diff --git a/pgp-cert-d-java/src/test/java/pgp/cert_d/dummy/TestKeyMaterialReaderBackend.java b/pgp-cert-d-java/src/test/java/pgp/cert_d/dummy/TestKeyMaterialReaderBackend.java index 68f6cd8..2ef392d 100644 --- a/pgp-cert-d-java/src/test/java/pgp/cert_d/dummy/TestKeyMaterialReaderBackend.java +++ b/pgp-cert-d-java/src/test/java/pgp/cert_d/dummy/TestKeyMaterialReaderBackend.java @@ -43,7 +43,7 @@ public class TestKeyMaterialReaderBackend implements KeyMaterialReaderBackend { try { return readCertificate(new ByteArrayInputStream(out.toByteArray()), tag); } catch (IOException e1) { - throw new BadDataException("Cannot read certificate", e1); + throw new BadDataException(); } } } diff --git a/pgp-certificate-store/src/main/java/pgp/certificate_store/certificate/KeyMaterial.java b/pgp-certificate-store/src/main/java/pgp/certificate_store/certificate/KeyMaterial.java index 782aee6..1438b47 100644 --- a/pgp-certificate-store/src/main/java/pgp/certificate_store/certificate/KeyMaterial.java +++ b/pgp-certificate-store/src/main/java/pgp/certificate_store/certificate/KeyMaterial.java @@ -11,7 +11,8 @@ import java.util.Set; public interface KeyMaterial { /** - * Return the fingerprint of the certificate as lowercase hex characters. + * Return the fingerprint of the certificate as 40 lowercase hex characters. + * TODO: Allow OpenPGP V5 fingerprints * * @return fingerprint */ diff --git a/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadDataException.java b/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadDataException.java index 87a1af6..3bb7019 100644 --- a/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadDataException.java +++ b/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadDataException.java @@ -9,20 +9,4 @@ package pgp.certificate_store.exception; */ public class BadDataException extends Exception { - @Deprecated // pass cause and/or message - public BadDataException() { - super(); - } - - public BadDataException(Throwable cause) { - super(cause); - } - - public BadDataException(String message, Throwable cause) { - super(message, cause); - } - - public BadDataException(String message) { - super(message); - } } diff --git a/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadNameException.java b/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadNameException.java index e028739..957126e 100644 --- a/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadNameException.java +++ b/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/BadNameException.java @@ -9,7 +9,6 @@ package pgp.certificate_store.exception; */ public class BadNameException extends Exception { - @Deprecated // pass message public BadNameException() { super(); } diff --git a/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/NotAStoreException.java b/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/NotAStoreException.java index 401b757..a19aa9c 100644 --- a/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/NotAStoreException.java +++ b/pgp-certificate-store/src/main/java/pgp/certificate_store/exception/NotAStoreException.java @@ -9,7 +9,6 @@ package pgp.certificate_store.exception; */ public class NotAStoreException extends Exception { - @Deprecated // pass message public NotAStoreException() { super(); } diff --git a/version.gradle b/version.gradle index 0f736ed..98e8f08 100644 --- a/version.gradle +++ b/version.gradle @@ -4,8 +4,8 @@ allprojects { ext { - shortVersion = '0.2.4' - isSnapshot = true + shortVersion = '0.2.3' + isSnapshot = false javaSourceCompatibility = 11 bouncycastleVersion = '1.82' bouncyPgVersion = "$bouncycastleVersion"