add support for encrypting to multiple recipients / decrypting with multiple identities
- config options for reading identities/recipients from file - command line flags for both files, and identities/recipients straight from the command line - some cleanup and better help strings
This commit is contained in:
parent
f4df6f35eb
commit
da5adc9828
|
@ -7,6 +7,7 @@ import (
|
|||
"strings"
|
||||
"time"
|
||||
|
||||
"filippo.io/age"
|
||||
"git.burning.moe/celediel/agedit/internal/config"
|
||||
"git.burning.moe/celediel/agedit/pkg/editor"
|
||||
"git.burning.moe/celediel/agedit/pkg/encrypt"
|
||||
|
@ -46,26 +47,78 @@ var (
|
|||
}}
|
||||
|
||||
flags = []cli.Flag{
|
||||
&cli.StringFlag{
|
||||
&cli.StringSliceFlag{
|
||||
Name: "identity",
|
||||
Usage: "age identity file to decrypt with",
|
||||
Usage: "age `identity` (or identities) to decrypt with",
|
||||
Aliases: []string{"I"},
|
||||
Action: func(ctx *cli.Context, inputs []string) error {
|
||||
for _, input := range inputs {
|
||||
id, err := age.ParseX25519Identity(input)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
identities = append(identities, id)
|
||||
}
|
||||
return nil
|
||||
},
|
||||
},
|
||||
&cli.PathFlag{ // I dunno why PathFlag exists because cli.Path is just string
|
||||
Name: "identity-file",
|
||||
Usage: "read identity from `FILE`",
|
||||
Aliases: []string{"i"},
|
||||
Action: func(ctx *cli.Context, identity_file string) error {
|
||||
Action: func(ctx *cli.Context, identity_file cli.Path) error {
|
||||
if identity_file != "" {
|
||||
cfg.IdentityFile = identity_file
|
||||
}
|
||||
return nil
|
||||
},
|
||||
},
|
||||
&cli.StringSliceFlag{
|
||||
Name: "recipient",
|
||||
Usage: "age `recipient`s to encrypt to",
|
||||
Aliases: []string{"R"},
|
||||
Action: func(ctx *cli.Context, inputs []string) error {
|
||||
for _, input := range inputs {
|
||||
logger.Debugf("parsing public key from string %s", input)
|
||||
r, err := age.ParseX25519Recipient(input)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
recipients = append(recipients, r)
|
||||
}
|
||||
return nil
|
||||
},
|
||||
},
|
||||
&cli.PathFlag{
|
||||
Name: "recipient-file",
|
||||
Usage: "read recipients from `FILE`",
|
||||
Aliases: []string{"r"},
|
||||
Action: func(ctx *cli.Context, recipient_file cli.Path) error {
|
||||
if recipient_file != "" {
|
||||
cfg.RecipientFile = recipient_file
|
||||
}
|
||||
return nil
|
||||
},
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "out",
|
||||
Usage: "write to this file instead of the input file",
|
||||
Usage: "write to `FILE` instead of the input file",
|
||||
Aliases: []string{"o"},
|
||||
Action: func(ctx *cli.Context, out string) error {
|
||||
output_file = out
|
||||
return nil
|
||||
},
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "editor",
|
||||
Usage: "edit with specified `EDITOR` instead of $EDITOR",
|
||||
Aliases: []string{"e"},
|
||||
Action: func(ctx *cli.Context, editor string) error {
|
||||
cfg.Editor = editor
|
||||
return nil
|
||||
},
|
||||
},
|
||||
&cli.StringSliceFlag{
|
||||
Name: "editor-args",
|
||||
Usage: "`arg`uments to send to the editor",
|
||||
|
@ -76,7 +129,7 @@ var (
|
|||
},
|
||||
&cli.BoolFlag{
|
||||
Name: "force",
|
||||
Usage: "Re-encrypt the file even if no changes have been made.",
|
||||
Usage: "re-encrypt the file even if no changes have been made.",
|
||||
Aliases: []string{"f"},
|
||||
Action: func(ctx *cli.Context, b bool) error {
|
||||
force_overwrite = b
|
||||
|
@ -85,9 +138,8 @@ var (
|
|||
},
|
||||
&cli.StringFlag{
|
||||
Name: "log",
|
||||
Usage: "log level",
|
||||
Usage: "log `level`",
|
||||
Value: "warn",
|
||||
Aliases: []string{"l"},
|
||||
Action: func(ctx *cli.Context, s string) error {
|
||||
if lvl, err := log.ParseLevel(s); err == nil {
|
||||
logger.SetLevel(lvl)
|
||||
|
@ -101,15 +153,6 @@ var (
|
|||
return nil
|
||||
},
|
||||
},
|
||||
&cli.StringFlag{
|
||||
Name: "editor",
|
||||
Usage: "specify the editor to use",
|
||||
Aliases: []string{"e"},
|
||||
Action: func(ctx *cli.Context, editor string) error {
|
||||
cfg.Editor = editor
|
||||
return nil
|
||||
},
|
||||
},
|
||||
}
|
||||
)
|
||||
|
||||
|
@ -120,7 +163,7 @@ func before(ctx *cli.Context) error {
|
|||
return fmt.Errorf("no file to edit, use " + name + " -h for help")
|
||||
}
|
||||
|
||||
// do some setup
|
||||
// set some defaults
|
||||
cfg = config.Defaults
|
||||
cfg.Editor = env.GetEditor()
|
||||
cfg_dir := env.GetConfigDir(name)
|
||||
|
@ -150,6 +193,7 @@ func before(ctx *cli.Context) error {
|
|||
|
||||
// action does the actual thing
|
||||
func action(ctx *cli.Context) error {
|
||||
// make sure input file exists
|
||||
if _, err := os.Stat(input_file); os.IsNotExist(err) {
|
||||
return err
|
||||
}
|
||||
|
@ -159,18 +203,55 @@ func action(ctx *cli.Context) error {
|
|||
logger.Debug("out file not specified, using input", "outfile", output_file)
|
||||
}
|
||||
|
||||
// read from identity file if exists and no identities have been supplied
|
||||
if len(identities) == 0 {
|
||||
if _, err := os.Stat(cfg.IdentityFile); os.IsNotExist(err) {
|
||||
return fmt.Errorf("identity file unset, use -i or set one in the config file")
|
||||
}
|
||||
|
||||
if id, err := encrypt.ReadIdentityFromFile(cfg.IdentityFile); err != nil {
|
||||
return err
|
||||
return fmt.Errorf("identity file unset and no identities supplied, use -i to specify an idenitity file or set one in the config file, or use -I to specify an age private key")
|
||||
} else {
|
||||
identity = id
|
||||
f, err := os.Open(cfg.IdentityFile)
|
||||
if err != nil {
|
||||
return fmt.Errorf("couldn't open identity file: %v", err)
|
||||
}
|
||||
if ids, err := age.ParseIdentities(f); err != nil {
|
||||
return fmt.Errorf("couldn't parse identities: %v", err)
|
||||
} else {
|
||||
identities = append(identities, ids...)
|
||||
}
|
||||
}
|
||||
}
|
||||
logger.Debug("read identity from file", "id", identity.Recipient())
|
||||
|
||||
decrypted, err := encrypt.Decrypt(input_file, identity)
|
||||
// read from recipient file if it exists and no recipients have been supplied
|
||||
if len(recipients) == 0 {
|
||||
if _, err := os.Stat(cfg.RecipientFile); os.IsNotExist(err) {
|
||||
return fmt.Errorf("recipient file doesn't exist")
|
||||
} else {
|
||||
f, err := os.Open(cfg.RecipientFile)
|
||||
if err != nil {
|
||||
return fmt.Errorf("couldn't open recipient file: %v", err)
|
||||
}
|
||||
if rs, err := age.ParseRecipients(f); err != nil {
|
||||
return fmt.Errorf("couldn't parse recipients: %v", err)
|
||||
} else {
|
||||
recipients = append(recipients, rs...)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// get recipients from specified identities
|
||||
for _, id := range identities {
|
||||
// TODO: figure out how age actually intends for
|
||||
// TODO: a recpient to be retrieved from an age.Identity
|
||||
// TODO: beccause this is stupid and I hate it
|
||||
actual_id, err := age.ParseX25519Identity(fmt.Sprint(id))
|
||||
if err != nil {
|
||||
return fmt.Errorf("couldn't get recipient? %v", err)
|
||||
}
|
||||
|
||||
recipients = append(recipients, actual_id.Recipient())
|
||||
}
|
||||
|
||||
// try to decrypt the file
|
||||
decrypted, err := encrypt.Decrypt(input_file, identities...)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
@ -189,7 +270,8 @@ func action(ctx *cli.Context) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
err = encrypt.Encrypt(edited, output_file, identity)
|
||||
// actually re-encrypt the data
|
||||
err = encrypt.Encrypt(edited, output_file, recipients...)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
|
|
@ -4,6 +4,7 @@ import (
|
|||
"os"
|
||||
|
||||
"git.burning.moe/celediel/agedit/internal/config"
|
||||
"git.burning.moe/celediel/agedit/pkg/editor"
|
||||
|
||||
"filippo.io/age"
|
||||
"github.com/charmbracelet/log"
|
||||
|
@ -11,12 +12,12 @@ import (
|
|||
)
|
||||
|
||||
var (
|
||||
identity *age.X25519Identity
|
||||
identities []age.Identity
|
||||
recipients []age.Recipient
|
||||
logger *log.Logger
|
||||
cfg config.Config
|
||||
configFile string
|
||||
|
||||
edt editor.Editor
|
||||
configFile string
|
||||
input_file, output_file string
|
||||
force_overwrite bool
|
||||
)
|
||||
|
@ -31,6 +32,7 @@ func main() {
|
|||
Before: before,
|
||||
Action: action,
|
||||
CustomAppHelpTemplate: help_template,
|
||||
UseShortOptionHandling: true,
|
||||
}
|
||||
|
||||
if err := app.Run(os.Args); err != nil {
|
||||
|
|
|
@ -11,18 +11,18 @@ import (
|
|||
)
|
||||
|
||||
// Encrypt encrypts bytes into filename
|
||||
func Encrypt(data []byte, filename string, identity *age.X25519Identity) error {
|
||||
func Encrypt(data []byte, filename string, recipients ...age.Recipient) error {
|
||||
var (
|
||||
w io.WriteCloser
|
||||
out = &bytes.Buffer{}
|
||||
err error
|
||||
)
|
||||
|
||||
if identity == nil {
|
||||
return errors.New("nil identity??")
|
||||
if len(recipients) == 0 {
|
||||
return errors.New("no recepients? who's trying to encrypt?")
|
||||
}
|
||||
|
||||
if w, err = age.Encrypt(out, identity.Recipient()); err != nil {
|
||||
if w, err = age.Encrypt(out, recipients...); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
|
@ -40,7 +40,7 @@ func Encrypt(data []byte, filename string, identity *age.X25519Identity) error {
|
|||
}
|
||||
|
||||
// Decrypt decrypts bytes from filename
|
||||
func Decrypt(filename string, identity *age.X25519Identity) ([]byte, error) {
|
||||
func Decrypt(filename string, identities ...age.Identity) ([]byte, error) {
|
||||
var (
|
||||
f *os.File
|
||||
r io.Reader
|
||||
|
@ -51,7 +51,7 @@ func Decrypt(filename string, identity *age.X25519Identity) ([]byte, error) {
|
|||
return nil, err
|
||||
}
|
||||
|
||||
if r, err = age.Decrypt(f, identity); err != nil {
|
||||
if r, err = age.Decrypt(f, identities...); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
|
|
|
@ -5,14 +5,12 @@ import (
|
|||
"os"
|
||||
"testing"
|
||||
|
||||
"filippo.io/age"
|
||||
"git.burning.moe/celediel/agedit/pkg/tmpfile"
|
||||
)
|
||||
|
||||
var generator = tmpfile.NewGenerator("test_", ".txt", 18)
|
||||
|
||||
// TestEncryptionDecryption writes a string to a file, encrypts it, then decrypts it, and reads the string.
|
||||
func TestEncryptionDecryption(t *testing.T) {
|
||||
var (
|
||||
generator = tmpfile.NewGenerator("test_", ".txt", 18)
|
||||
strings_to_write = []string{
|
||||
"hello world",
|
||||
"hola mundo",
|
||||
|
@ -27,7 +25,9 @@ func TestEncryptionDecryption(t *testing.T) {
|
|||
}
|
||||
)
|
||||
|
||||
id, err := NewIdentity()
|
||||
// TestEncryptionDecryption writes a string to a file, encrypts it, then decrypts it, and reads the string.
|
||||
func TestEncryptionDecryption(t *testing.T) {
|
||||
id, err := age.GenerateX25519Identity()
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
@ -49,7 +49,7 @@ func TestEncryptionDecryption(t *testing.T) {
|
|||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if err = Encrypt(b, encrypted_outname, id); err != nil {
|
||||
if err = Encrypt(b, encrypted_outname, id.Recipient()); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
|
@ -73,6 +73,73 @@ func TestEncryptionDecryption(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
func TestMultipleIdentities(t *testing.T) {
|
||||
var (
|
||||
identities []age.Identity
|
||||
recipients []age.Recipient
|
||||
)
|
||||
|
||||
for i := 0; i <= 10; i++ {
|
||||
id, err := age.GenerateX25519Identity()
|
||||
if err != nil {
|
||||
t.Fatalf("age broke: %v", err)
|
||||
}
|
||||
identities = append(identities, id)
|
||||
recipients = append(recipients, id.Recipient())
|
||||
}
|
||||
|
||||
for _, str := range strings_to_write {
|
||||
var (
|
||||
outname string = generator.GenerateFullPath()
|
||||
encrypted_outname string = outname + ".age"
|
||||
b []byte
|
||||
err error
|
||||
)
|
||||
|
||||
t.Run("testing writing "+str, func(t *testing.T) {
|
||||
if err = os.WriteFile(outname, []byte(str), fs.FileMode(0600)); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if b, err = os.ReadFile(outname); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if err = Encrypt(b, encrypted_outname, recipients...); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
// try decrypting with each identity
|
||||
for _, id := range identities {
|
||||
if b, err = Decrypt(encrypted_outname, id); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if string(b) != str {
|
||||
t.Fatal(string(b) + " isn't the same as " + str)
|
||||
}
|
||||
}
|
||||
|
||||
// then all of them because why not
|
||||
if b, err = Decrypt(encrypted_outname, identities...); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if string(b) != str {
|
||||
t.Fatal(string(b) + " isn't the same as " + str)
|
||||
}
|
||||
|
||||
if err = os.Remove(outname); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if err = os.Remove(encrypted_outname); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
// TestNewIdentity creats a new identity, writes it to file, then re-reads it back from the file.
|
||||
func TestNewIdentity(t *testing.T) {
|
||||
for i := 0; i <= 1000; i++ {
|
||||
|
|
Loading…
Reference in a new issue