add support for encrypting to multiple recipients / decrypting with multiple identities

- config options for reading identities/recipients from file
- command line flags for both files, and identities/recipients straight from the command line
- some cleanup and better help strings
This commit is contained in:
Lilian Jónsdóttir 2024-03-23 14:07:48 -07:00
parent f4df6f35eb
commit da5adc9828
4 changed files with 216 additions and 65 deletions

View file

@ -7,6 +7,7 @@ import (
"strings" "strings"
"time" "time"
"filippo.io/age"
"git.burning.moe/celediel/agedit/internal/config" "git.burning.moe/celediel/agedit/internal/config"
"git.burning.moe/celediel/agedit/pkg/editor" "git.burning.moe/celediel/agedit/pkg/editor"
"git.burning.moe/celediel/agedit/pkg/encrypt" "git.burning.moe/celediel/agedit/pkg/encrypt"
@ -46,26 +47,78 @@ var (
}} }}
flags = []cli.Flag{ flags = []cli.Flag{
&cli.StringFlag{ &cli.StringSliceFlag{
Name: "identity", Name: "identity",
Usage: "age identity file to decrypt with", Usage: "age `identity` (or identities) to decrypt with",
Aliases: []string{"I"},
Action: func(ctx *cli.Context, inputs []string) error {
for _, input := range inputs {
id, err := age.ParseX25519Identity(input)
if err != nil {
return err
}
identities = append(identities, id)
}
return nil
},
},
&cli.PathFlag{ // I dunno why PathFlag exists because cli.Path is just string
Name: "identity-file",
Usage: "read identity from `FILE`",
Aliases: []string{"i"}, Aliases: []string{"i"},
Action: func(ctx *cli.Context, identity_file string) error { Action: func(ctx *cli.Context, identity_file cli.Path) error {
if identity_file != "" { if identity_file != "" {
cfg.IdentityFile = identity_file cfg.IdentityFile = identity_file
} }
return nil return nil
}, },
}, },
&cli.StringSliceFlag{
Name: "recipient",
Usage: "age `recipient`s to encrypt to",
Aliases: []string{"R"},
Action: func(ctx *cli.Context, inputs []string) error {
for _, input := range inputs {
logger.Debugf("parsing public key from string %s", input)
r, err := age.ParseX25519Recipient(input)
if err != nil {
return err
}
recipients = append(recipients, r)
}
return nil
},
},
&cli.PathFlag{
Name: "recipient-file",
Usage: "read recipients from `FILE`",
Aliases: []string{"r"},
Action: func(ctx *cli.Context, recipient_file cli.Path) error {
if recipient_file != "" {
cfg.RecipientFile = recipient_file
}
return nil
},
},
&cli.StringFlag{ &cli.StringFlag{
Name: "out", Name: "out",
Usage: "write to this file instead of the input file", Usage: "write to `FILE` instead of the input file",
Aliases: []string{"o"}, Aliases: []string{"o"},
Action: func(ctx *cli.Context, out string) error { Action: func(ctx *cli.Context, out string) error {
output_file = out output_file = out
return nil return nil
}, },
}, },
&cli.StringFlag{
Name: "editor",
Usage: "edit with specified `EDITOR` instead of $EDITOR",
Aliases: []string{"e"},
Action: func(ctx *cli.Context, editor string) error {
cfg.Editor = editor
return nil
},
},
&cli.StringSliceFlag{ &cli.StringSliceFlag{
Name: "editor-args", Name: "editor-args",
Usage: "`arg`uments to send to the editor", Usage: "`arg`uments to send to the editor",
@ -76,7 +129,7 @@ var (
}, },
&cli.BoolFlag{ &cli.BoolFlag{
Name: "force", Name: "force",
Usage: "Re-encrypt the file even if no changes have been made.", Usage: "re-encrypt the file even if no changes have been made.",
Aliases: []string{"f"}, Aliases: []string{"f"},
Action: func(ctx *cli.Context, b bool) error { Action: func(ctx *cli.Context, b bool) error {
force_overwrite = b force_overwrite = b
@ -85,9 +138,8 @@ var (
}, },
&cli.StringFlag{ &cli.StringFlag{
Name: "log", Name: "log",
Usage: "log level", Usage: "log `level`",
Value: "warn", Value: "warn",
Aliases: []string{"l"},
Action: func(ctx *cli.Context, s string) error { Action: func(ctx *cli.Context, s string) error {
if lvl, err := log.ParseLevel(s); err == nil { if lvl, err := log.ParseLevel(s); err == nil {
logger.SetLevel(lvl) logger.SetLevel(lvl)
@ -101,15 +153,6 @@ var (
return nil return nil
}, },
}, },
&cli.StringFlag{
Name: "editor",
Usage: "specify the editor to use",
Aliases: []string{"e"},
Action: func(ctx *cli.Context, editor string) error {
cfg.Editor = editor
return nil
},
},
} }
) )
@ -120,7 +163,7 @@ func before(ctx *cli.Context) error {
return fmt.Errorf("no file to edit, use " + name + " -h for help") return fmt.Errorf("no file to edit, use " + name + " -h for help")
} }
// do some setup // set some defaults
cfg = config.Defaults cfg = config.Defaults
cfg.Editor = env.GetEditor() cfg.Editor = env.GetEditor()
cfg_dir := env.GetConfigDir(name) cfg_dir := env.GetConfigDir(name)
@ -150,6 +193,7 @@ func before(ctx *cli.Context) error {
// action does the actual thing // action does the actual thing
func action(ctx *cli.Context) error { func action(ctx *cli.Context) error {
// make sure input file exists
if _, err := os.Stat(input_file); os.IsNotExist(err) { if _, err := os.Stat(input_file); os.IsNotExist(err) {
return err return err
} }
@ -159,18 +203,55 @@ func action(ctx *cli.Context) error {
logger.Debug("out file not specified, using input", "outfile", output_file) logger.Debug("out file not specified, using input", "outfile", output_file)
} }
// read from identity file if exists and no identities have been supplied
if len(identities) == 0 {
if _, err := os.Stat(cfg.IdentityFile); os.IsNotExist(err) { if _, err := os.Stat(cfg.IdentityFile); os.IsNotExist(err) {
return fmt.Errorf("identity file unset, use -i or set one in the config file") return fmt.Errorf("identity file unset and no identities supplied, use -i to specify an idenitity file or set one in the config file, or use -I to specify an age private key")
}
if id, err := encrypt.ReadIdentityFromFile(cfg.IdentityFile); err != nil {
return err
} else { } else {
identity = id f, err := os.Open(cfg.IdentityFile)
if err != nil {
return fmt.Errorf("couldn't open identity file: %v", err)
}
if ids, err := age.ParseIdentities(f); err != nil {
return fmt.Errorf("couldn't parse identities: %v", err)
} else {
identities = append(identities, ids...)
}
}
} }
logger.Debug("read identity from file", "id", identity.Recipient())
decrypted, err := encrypt.Decrypt(input_file, identity) // read from recipient file if it exists and no recipients have been supplied
if len(recipients) == 0 {
if _, err := os.Stat(cfg.RecipientFile); os.IsNotExist(err) {
return fmt.Errorf("recipient file doesn't exist")
} else {
f, err := os.Open(cfg.RecipientFile)
if err != nil {
return fmt.Errorf("couldn't open recipient file: %v", err)
}
if rs, err := age.ParseRecipients(f); err != nil {
return fmt.Errorf("couldn't parse recipients: %v", err)
} else {
recipients = append(recipients, rs...)
}
}
}
// get recipients from specified identities
for _, id := range identities {
// TODO: figure out how age actually intends for
// TODO: a recpient to be retrieved from an age.Identity
// TODO: beccause this is stupid and I hate it
actual_id, err := age.ParseX25519Identity(fmt.Sprint(id))
if err != nil {
return fmt.Errorf("couldn't get recipient? %v", err)
}
recipients = append(recipients, actual_id.Recipient())
}
// try to decrypt the file
decrypted, err := encrypt.Decrypt(input_file, identities...)
if err != nil { if err != nil {
return err return err
} }
@ -189,7 +270,8 @@ func action(ctx *cli.Context) error {
return nil return nil
} }
err = encrypt.Encrypt(edited, output_file, identity) // actually re-encrypt the data
err = encrypt.Encrypt(edited, output_file, recipients...)
if err != nil { if err != nil {
return err return err
} }

View file

@ -4,6 +4,7 @@ import (
"os" "os"
"git.burning.moe/celediel/agedit/internal/config" "git.burning.moe/celediel/agedit/internal/config"
"git.burning.moe/celediel/agedit/pkg/editor"
"filippo.io/age" "filippo.io/age"
"github.com/charmbracelet/log" "github.com/charmbracelet/log"
@ -11,12 +12,12 @@ import (
) )
var ( var (
identity *age.X25519Identity identities []age.Identity
recipients []age.Recipient
logger *log.Logger logger *log.Logger
cfg config.Config cfg config.Config
configFile string
edt editor.Editor edt editor.Editor
configFile string
input_file, output_file string input_file, output_file string
force_overwrite bool force_overwrite bool
) )
@ -31,6 +32,7 @@ func main() {
Before: before, Before: before,
Action: action, Action: action,
CustomAppHelpTemplate: help_template, CustomAppHelpTemplate: help_template,
UseShortOptionHandling: true,
} }
if err := app.Run(os.Args); err != nil { if err := app.Run(os.Args); err != nil {

View file

@ -11,18 +11,18 @@ import (
) )
// Encrypt encrypts bytes into filename // Encrypt encrypts bytes into filename
func Encrypt(data []byte, filename string, identity *age.X25519Identity) error { func Encrypt(data []byte, filename string, recipients ...age.Recipient) error {
var ( var (
w io.WriteCloser w io.WriteCloser
out = &bytes.Buffer{} out = &bytes.Buffer{}
err error err error
) )
if identity == nil { if len(recipients) == 0 {
return errors.New("nil identity??") return errors.New("no recepients? who's trying to encrypt?")
} }
if w, err = age.Encrypt(out, identity.Recipient()); err != nil { if w, err = age.Encrypt(out, recipients...); err != nil {
return err return err
} }
@ -40,7 +40,7 @@ func Encrypt(data []byte, filename string, identity *age.X25519Identity) error {
} }
// Decrypt decrypts bytes from filename // Decrypt decrypts bytes from filename
func Decrypt(filename string, identity *age.X25519Identity) ([]byte, error) { func Decrypt(filename string, identities ...age.Identity) ([]byte, error) {
var ( var (
f *os.File f *os.File
r io.Reader r io.Reader
@ -51,7 +51,7 @@ func Decrypt(filename string, identity *age.X25519Identity) ([]byte, error) {
return nil, err return nil, err
} }
if r, err = age.Decrypt(f, identity); err != nil { if r, err = age.Decrypt(f, identities...); err != nil {
return nil, err return nil, err
} }

View file

@ -5,14 +5,12 @@ import (
"os" "os"
"testing" "testing"
"filippo.io/age"
"git.burning.moe/celediel/agedit/pkg/tmpfile" "git.burning.moe/celediel/agedit/pkg/tmpfile"
) )
var generator = tmpfile.NewGenerator("test_", ".txt", 18) var (
generator = tmpfile.NewGenerator("test_", ".txt", 18)
// TestEncryptionDecryption writes a string to a file, encrypts it, then decrypts it, and reads the string.
func TestEncryptionDecryption(t *testing.T) {
var (
strings_to_write = []string{ strings_to_write = []string{
"hello world", "hello world",
"hola mundo", "hola mundo",
@ -25,9 +23,11 @@ func TestEncryptionDecryption(t *testing.T) {
"გამარჯობა მსოფლიო", "გამარჯობა მსოფლიო",
"अभिवादन पृथ्वी", "अभिवादन पृथ्वी",
} }
) )
id, err := NewIdentity() // TestEncryptionDecryption writes a string to a file, encrypts it, then decrypts it, and reads the string.
func TestEncryptionDecryption(t *testing.T) {
id, err := age.GenerateX25519Identity()
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
@ -49,7 +49,7 @@ func TestEncryptionDecryption(t *testing.T) {
t.Fatal(err) t.Fatal(err)
} }
if err = Encrypt(b, encrypted_outname, id); err != nil { if err = Encrypt(b, encrypted_outname, id.Recipient()); err != nil {
t.Fatal(err) t.Fatal(err)
} }
@ -73,6 +73,73 @@ func TestEncryptionDecryption(t *testing.T) {
} }
} }
func TestMultipleIdentities(t *testing.T) {
var (
identities []age.Identity
recipients []age.Recipient
)
for i := 0; i <= 10; i++ {
id, err := age.GenerateX25519Identity()
if err != nil {
t.Fatalf("age broke: %v", err)
}
identities = append(identities, id)
recipients = append(recipients, id.Recipient())
}
for _, str := range strings_to_write {
var (
outname string = generator.GenerateFullPath()
encrypted_outname string = outname + ".age"
b []byte
err error
)
t.Run("testing writing "+str, func(t *testing.T) {
if err = os.WriteFile(outname, []byte(str), fs.FileMode(0600)); err != nil {
t.Fatal(err)
}
if b, err = os.ReadFile(outname); err != nil {
t.Fatal(err)
}
if err = Encrypt(b, encrypted_outname, recipients...); err != nil {
t.Fatal(err)
}
// try decrypting with each identity
for _, id := range identities {
if b, err = Decrypt(encrypted_outname, id); err != nil {
t.Fatal(err)
}
if string(b) != str {
t.Fatal(string(b) + " isn't the same as " + str)
}
}
// then all of them because why not
if b, err = Decrypt(encrypted_outname, identities...); err != nil {
t.Fatal(err)
}
if string(b) != str {
t.Fatal(string(b) + " isn't the same as " + str)
}
if err = os.Remove(outname); err != nil {
t.Fatal(err)
}
if err = os.Remove(encrypted_outname); err != nil {
t.Fatal(err)
}
})
}
}
// TestNewIdentity creats a new identity, writes it to file, then re-reads it back from the file. // TestNewIdentity creats a new identity, writes it to file, then re-reads it back from the file.
func TestNewIdentity(t *testing.T) { func TestNewIdentity(t *testing.T) {
for i := 0; i <= 1000; i++ { for i := 0; i <= 1000; i++ {