use std::env;
use std::io;
use anyhow::Context;
use sequoia_openpgp as openpgp;
use crate::openpgp::{
Packet,
parse::{Parse, PacketParserResult},
serialize::{Marshal, stream::Armorer},
};
use crate::openpgp::serialize::stream::{Message, LiteralWriter, Signer};
use crate::openpgp::policy::StandardPolicy as P;
fn main() -> openpgp::Result<()> {
let p = &P::new();
let args: Vec<String> = env::args().collect();
if args.len() < 2 {
return Err(anyhow::anyhow!("A simple notarizing filter.\n\n\
Usage: {} <secret-keyfile> [<secret-keyfile>...] \
<input >output\n", args[0]));
}
let mut keys = Vec::new();
for filename in &args[1..] {
let tsk = openpgp::Cert::from_file(filename)
.context("Failed to read key")?;
let mut n = 0;
for skb in tsk.keys()
.with_policy(p, None).alive().revoked(false).for_signing().secret()
{
keys.push({
let mut key = skb.key().clone();
if key.secret().is_encrypted() {
let password = rpassword::prompt_password(format!(
"Please enter password to decrypt {}/{}: ",
tsk, key
))?;
key.secret_mut()
.decrypt_in_place(skb.key(), &password.into())
.context("decryption failed")?;
}
n += 1;
key.into_keypair()?
});
}
if n == 0 {
return Err(anyhow::anyhow!("Found no suitable signing key on {}", tsk));
}
}
let mut sink = io::stdout();
let message = Message::new(&mut sink);
let message = Armorer::new(message).build()?;
let mut signer =
Signer::new(message, keys.pop().context("No key for signing")?)?;
for s in keys {
signer = signer.add_signer(s)?;
}
let mut message = signer.build().context("Failed to create signer")?;
let mut input = io::stdin();
let mut ppr
= openpgp::parse::PacketParser::from_reader(&mut input)
.context("Failed to build parser")?;
while let PacketParserResult::Some(mut pp) = ppr {
if let Err(err) = pp.possible_message() {
return Err(anyhow::anyhow!("Malformed OpenPGP message: {}", err));
}
match pp.packet {
Packet::PKESK(_) | Packet::SKESK(_) =>
return Err(anyhow::anyhow!("Encrypted messages are not supported")),
Packet::OnePassSig(ref ops) =>
ops.serialize(&mut message).context("Failed to serialize")?,
Packet::Literal(_) => {
let mut literal =
LiteralWriter::new(message).build()
.context("Failed to create literal writer")?;
io::copy(&mut pp, &mut literal)
.context("Failed to sign data")?;
message = literal.finalize_one()
.context("Failed to sign data")?
.unwrap();
},
Packet::Signature(ref sig) =>
sig.serialize(&mut message).context("Failed to serialize")?,
_ => (),
}
ppr = pp.recurse().context("Failed to recurse")?.1;
}
if let PacketParserResult::EOF(eof) = ppr {
if let Err(err) = eof.is_message() {
return Err(anyhow::anyhow!("Malformed OpenPGP message: {}", err));
}
} else {
unreachable!()
}
message.finalize()
.context("Failed to write data")?;
Ok(())
}