age_plugin/
lib.rs

1//! This crate provides an API for building age plugins.
2//!
3//! # Introduction
4//!
5//! The [age file encryption format] follows the "one well-oiled joint" design philosophy.
6//! The mechanism for extensibility (within a particular format version) is the recipient
7//! stanzas within the age header: file keys can be wrapped in any number of ways, and age
8//! clients are required to ignore stanzas that they do not understand.
9//!
10//! The core APIs that exercise this mechanism are:
11//! - A recipient that wraps a file key and returns a stanza.
12//! - An identity that unwraps a stanza and returns a file key.
13//!
14//! The age plugin system provides a mechanism for exposing these core APIs across process
15//! boundaries. It has two main components:
16//!
17//! - A map from recipients and identities to plugin binaries.
18//! - State machines for wrapping and unwrapping file keys.
19//!
20//! With this composable design, you can implement a recipient or identity that you might
21//! use directly with the [`age`] library crate, and also deploy it as a plugin binary for
22//! use with clients like [`rage`].
23//!
24//! [age file encryption format]: https://age-encryption.org/v1
25//! [`age`]: https://crates.io/crates/age
26//! [`rage`]: https://crates.io/crates/rage
27//!
28//! # Mapping recipients and identities to plugin binaries
29//!
30//! age plugins are identified by an arbitrary case-insensitive string `NAME`. This string
31//! is used in three places:
32//!
33//! - Plugin-compatible recipients are encoded using Bech32 with the HRP `age1name`
34//!   (lowercase).
35//! - Plugin-compatible identities are encoded using Bech32 with the HRP
36//!   `AGE-PLUGIN-NAME-` (uppercase).
37//! - Plugin binaries (to be started by age clients) are named `age-plugin-name`.
38//!
39//! Users interact with age clients by providing either recipients for file encryption, or
40//! identities for file decryption. When a plugin recipient or identity is provided, the
41//! age client searches the `PATH` for a binary with the corresponding plugin name.
42//!
43//! Recipient stanza types are not required to be correlated to specific plugin names.
44//! When decrypting, age clients will pass all recipient stanzas to every connected
45//! plugin. Plugins MUST ignore stanzas that they do not know about.
46//!
47//! A plugin binary may handle multiple recipient or identity types by being present in
48//! the `PATH` under multiple names. This can be implemented with symlinks or aliases to
49//! the canonical binary.
50//!
51//! Multiple plugin binaries can support the same recipient and identity types; the first
52//! binary found in the `PATH` will be used by age clients. Some Unix OSs support
53//! "alternatives", which plugin binaries should leverage if they provide support for a
54//! common recipient or identity type.
55//!
56//! Note that the identity specified by a user doesn't need to point to a specific
57//! decryption key, or indeed contain any key material at all. It only needs to contain
58//! sufficient information for the plugin to locate the necessary key material.
59//!
60//! ## Standard age keys
61//!
62//! A plugin MAY support decrypting files encrypted to native age recipients, by including
63//! support for the `x25519` recipient stanza. Such plugins will pick their own name, and
64//! users will use identity files containing identities that specify that plugin name.
65//!
66//! # Example plugin binary
67//!
68//! The following example uses `clap` to parse CLI arguments, but any argument parsing
69//! logic will work as long as it can detect the `--age-plugin=STATE_MACHINE` flag.
70//!
71//! ```
72//! use age_core::format::{FileKey, Stanza};
73//! use age_plugin::{
74//!     identity::{self, IdentityPluginV1},
75//!     print_new_identity,
76//!     recipient::{self, RecipientPluginV1},
77//!     Callbacks, PluginHandler, run_state_machine,
78//! };
79//! use clap::Parser;
80//!
81//! use std::collections::{HashMap, HashSet};
82//! use std::io;
83//!
84//! struct Handler;
85//!
86//! impl PluginHandler for Handler {
87//!     type RecipientV1 = RecipientPlugin;
88//!     type IdentityV1 = IdentityPlugin;
89//!
90//!     fn recipient_v1(self) -> io::Result<Self::RecipientV1> {
91//!         Ok(RecipientPlugin)
92//!     }
93//!
94//!     fn identity_v1(self) -> io::Result<Self::IdentityV1> {
95//!         Ok(IdentityPlugin)
96//!     }
97//! }
98//!
99//! struct RecipientPlugin;
100//!
101//! impl RecipientPluginV1 for RecipientPlugin {
102//!     fn add_recipient(
103//!         &mut self,
104//!         index: usize,
105//!         plugin_name: &str,
106//!         bytes: &[u8],
107//!     ) -> Result<(), recipient::Error> {
108//!         todo!()
109//!     }
110//!
111//!     fn add_identity(
112//!         &mut self,
113//!         index: usize,
114//!         plugin_name: &str,
115//!         bytes: &[u8]
116//!     ) -> Result<(), recipient::Error> {
117//!         todo!()
118//!     }
119//!
120//!     fn labels(&mut self) -> HashSet<String> {
121//!         todo!()
122//!     }
123//!
124//!     fn wrap_file_keys(
125//!         &mut self,
126//!         file_keys: Vec<FileKey>,
127//!         mut callbacks: impl Callbacks<recipient::Error>,
128//!     ) -> io::Result<Result<Vec<Vec<Stanza>>, Vec<recipient::Error>>> {
129//!         todo!()
130//!     }
131//! }
132//!
133//! struct IdentityPlugin;
134//!
135//! impl IdentityPluginV1 for IdentityPlugin {
136//!     fn add_identity(
137//!         &mut self,
138//!         index: usize,
139//!         plugin_name: &str,
140//!         bytes: &[u8]
141//!     ) -> Result<(), identity::Error> {
142//!         todo!()
143//!     }
144//!
145//!     fn unwrap_file_keys(
146//!         &mut self,
147//!         files: Vec<Vec<Stanza>>,
148//!         mut callbacks: impl Callbacks<identity::Error>,
149//!     ) -> io::Result<HashMap<usize, Result<FileKey, Vec<identity::Error>>>> {
150//!         todo!()
151//!     }
152//! }
153//!
154//! #[derive(Debug, Parser)]
155//! struct PluginOptions {
156//!     #[arg(help = "run the given age plugin state machine", long)]
157//!     age_plugin: Option<String>,
158//! }
159//!
160//! fn main() -> io::Result<()> {
161//!     let opts = PluginOptions::parse();
162//!
163//!     if let Some(state_machine) = opts.age_plugin {
164//!         // The plugin was started by an age client; run the state machine.
165//!         run_state_machine(&state_machine, Handler)?;
166//!         return Ok(());
167//!     }
168//!
169//!     // Here you can assume the binary is being run directly by a user,
170//!     // and perform administrative tasks like generating keys.
171//!
172//!     Ok(())
173//! }
174//! ```
175
176#![forbid(unsafe_code)]
177// Catch documentation errors caused by code changes.
178#![deny(rustdoc::broken_intra_doc_links)]
179#![deny(missing_docs)]
180
181use age_core::secrecy::SecretString;
182use bech32::Variant;
183use std::io;
184
185pub mod identity;
186pub mod recipient;
187
188// Plugin HRPs are age1[name] and AGE-PLUGIN-[NAME]-
189const PLUGIN_RECIPIENT_PREFIX: &str = "age1";
190const PLUGIN_IDENTITY_PREFIX: &str = "age-plugin-";
191
192/// Prints the newly-created identity and corresponding recipient to standard out.
193///
194/// A "created" time is included in the output, set to the current local time.
195pub fn print_new_identity(plugin_name: &str, identity: &[u8], recipient: &[u8]) {
196    use bech32::ToBase32;
197
198    println!(
199        "# created: {}",
200        chrono::Local::now().to_rfc3339_opts(chrono::SecondsFormat::Secs, true)
201    );
202    println!(
203        "# recipient: {}",
204        bech32::encode(
205            &format!("{}{}", PLUGIN_RECIPIENT_PREFIX, plugin_name),
206            recipient.to_base32(),
207            Variant::Bech32
208        )
209        .expect("HRP is valid")
210    );
211    println!(
212        "{}",
213        bech32::encode(
214            &format!("{}{}-", PLUGIN_IDENTITY_PREFIX, plugin_name),
215            identity.to_base32(),
216            Variant::Bech32,
217        )
218        .expect("HRP is valid")
219        .to_uppercase()
220    );
221}
222
223/// Runs the plugin state machine defined by `state_machine`.
224///
225/// This should be triggered if the `--age-plugin=state_machine` flag is provided as an
226/// argument when starting the plugin.
227pub fn run_state_machine(state_machine: &str, handler: impl PluginHandler) -> io::Result<()> {
228    use age_core::plugin::{IDENTITY_V1, RECIPIENT_V1};
229
230    match state_machine {
231        RECIPIENT_V1 => recipient::run_v1(handler.recipient_v1()?),
232        IDENTITY_V1 => identity::run_v1(handler.identity_v1()?),
233        _ => Err(io::Error::new(
234            io::ErrorKind::InvalidInput,
235            "unknown plugin state machine",
236        )),
237    }
238}
239
240/// The interfaces that age implementations will use to interact with an age plugin.
241///
242/// This trait exists to encapsulate the set of arguments to [`run_state_machine`] that
243/// different plugins may want to provide.
244///
245/// # How to implement this trait
246///
247/// ## Full plugins
248///
249/// - Set all associated types to your plugin's implementations.
250/// - Override all default methods of the trait.
251///
252/// ## Recipient-only plugins
253///
254/// - Set [`PluginHandler::RecipientV1`] to your plugin's implementation.
255/// - Override [`PluginHandler::recipient_v1`] to return an instance of your type.
256/// - Set [`PluginHandler::IdentityV1`] to [`std::convert::Infallible`].
257/// - Don't override [`PluginHandler::identity_v1`].
258///
259/// ## Identity-only plugins
260///
261/// - Set [`PluginHandler::RecipientV1`] to [`std::convert::Infallible`].
262/// - Don't override [`PluginHandler::recipient_v1`].
263/// - Set [`PluginHandler::IdentityV1`] to your plugin's implementation.
264/// - Override [`PluginHandler::identity_v1`] to return an instance of your type.
265pub trait PluginHandler: Sized {
266    /// The plugin's [`recipient-v1`] implementation.
267    ///
268    /// [`recipient-v1`]: https://c2sp.org/age-plugin#wrapping-with-recipient-v1
269    type RecipientV1: recipient::RecipientPluginV1;
270
271    /// The plugin's [`identity-v1`] implementation.
272    ///
273    /// [`identity-v1`]: https://c2sp.org/age-plugin#unwrapping-with-identity-v1
274    type IdentityV1: identity::IdentityPluginV1;
275
276    /// Returns an instance of the plugin's [`recipient-v1`] implementation.
277    ///
278    /// [`recipient-v1`]: https://c2sp.org/age-plugin#wrapping-with-recipient-v1
279    fn recipient_v1(self) -> io::Result<Self::RecipientV1> {
280        Err(io::Error::new(
281            io::ErrorKind::InvalidInput,
282            "plugin doesn't support recipient-v1 state machine",
283        ))
284    }
285
286    /// Returns an instance of the plugin's [`identity-v1`] implementation.
287    ///
288    /// [`identity-v1`]: https://c2sp.org/age-plugin#unwrapping-with-identity-v1
289    fn identity_v1(self) -> io::Result<Self::IdentityV1> {
290        Err(io::Error::new(
291            io::ErrorKind::InvalidInput,
292            "plugin doesn't support identity-v1 state machine",
293        ))
294    }
295}
296
297/// The interface that age plugins can use to interact with an age implementation.
298pub trait Callbacks<E> {
299    /// Shows a message to the user.
300    ///
301    /// This can be used to prompt the user to take some physical action, such as
302    /// inserting a hardware key.
303    fn message(&mut self, message: &str) -> age_core::plugin::Result<()>;
304
305    /// Requests that the user provides confirmation for some action.
306    ///
307    /// This can be used to, for example, request that a hardware key the plugin wants to
308    /// try either be plugged in, or skipped.
309    ///
310    /// - `message` is the request or call-to-action to be displayed to the user.
311    /// - `yes_string` and (optionally) `no_string` will be displayed on buttons or next
312    ///   to selection options in the user's UI.
313    ///
314    /// Returns:
315    /// - `Ok(true)` if the user selected the option marked with `yes_string`.
316    /// - `Ok(false)` if the user selected the option marked with `no_string` (or the
317    ///   default negative confirmation label).
318    /// - `Err(Error::Fail)` if the confirmation request could not be given to the user
319    ///   (for example, if there is no UI for displaying messages).
320    /// - `Err(Error::Unsupported)` if the user's client does not support this callback.
321    fn confirm(
322        &mut self,
323        message: &str,
324        yes_string: &str,
325        no_string: Option<&str>,
326    ) -> age_core::plugin::Result<bool>;
327
328    /// Requests a non-secret value from the user.
329    ///
330    /// `message` will be displayed to the user, providing context for the request.
331    ///
332    /// To request secrets, use [`Callbacks::request_secret`].
333    fn request_public(&mut self, message: &str) -> age_core::plugin::Result<String>;
334
335    /// Requests a secret value from the user, such as a passphrase.
336    ///
337    /// `message` will be displayed to the user, providing context for the request.
338    fn request_secret(&mut self, message: &str) -> age_core::plugin::Result<SecretString>;
339
340    /// Sends an error.
341    ///
342    /// Note: This API may be removed in a subsequent API refactor, after we've figured
343    /// out how errors should be handled overall, and how to distinguish between hard and
344    /// soft errors.
345    fn error(&mut self, error: E) -> age_core::plugin::Result<()>;
346}