diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index b14e525..35e0981 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -11,7 +11,7 @@ jobs: - uses: actions/checkout@v1 - uses: actions-rs/toolchain@v1 with: - toolchain: 1.37.0 + toolchain: 1.39.0 override: true # Ensure all code has been formatted with rustfmt @@ -39,7 +39,7 @@ jobs: - uses: actions/checkout@v1 - uses: actions-rs/toolchain@v1 with: - toolchain: 1.37.0 + toolchain: 1.39.0 override: true - name: cargo fetch uses: actions-rs/cargo@v1 @@ -69,7 +69,7 @@ jobs: - uses: actions/checkout@v1 - uses: actions-rs/toolchain@v1 with: - toolchain: 1.37.0 + toolchain: 1.39.0 override: true - name: Add target run: rustup target add ${{ matrix.target }} diff --git a/README.md b/README.md index fce28e7..bc9aece 100644 --- a/README.md +++ b/README.md @@ -106,7 +106,7 @@ brew install rage On Windows, Linux, and macOS, you can use the [pre-built binaries](https://github.com/str4d/rage/releases). -If your system has Rust 1.37+ installed (either via `rustup` or a system +If your system has Rust 1.39+ installed (either via `rustup` or a system package), you can build directly from source: ``` diff --git a/age/src/format.rs b/age/src/format.rs index e8f7734..29c14e4 100644 --- a/age/src/format.rs +++ b/age/src/format.rs @@ -8,6 +8,9 @@ use std::io::{self, Read, Write}; use crate::primitives::HmacWriter; +#[cfg(feature = "async")] +use futures::io::{AsyncRead, AsyncReadExt}; + pub(crate) mod plugin; pub(crate) mod scrypt; pub(crate) mod ssh_ed25519; @@ -150,6 +153,27 @@ impl Header { } } + #[cfg(feature = "async")] + pub(crate) async fn read_async(mut input: R) -> io::Result { + let mut data = vec![]; + loop { + match read::header(&data) { + Ok((_, header)) => break Ok(header), + Err(nom::Err::Incomplete(nom::Needed::Size(n))) => { + // Read the needed additional bytes. We need to be careful how the + // parser is constructed, because if we read more than we need, the + // remainder of the input will be truncated. + let m = data.len(); + data.resize(m + n, 0); + input.read_exact(&mut data[m..m + n]).await?; + } + Err(_) => { + break Err(io::Error::new(io::ErrorKind::InvalidData, "invalid header")); + } + } + } + } + pub(crate) fn write(&self, mut output: W) -> io::Result<()> { cookie_factory::gen(write::header(self), &mut output) .map(|_| ()) diff --git a/age/src/protocol.rs b/age/src/protocol.rs index e60ad3d..4dd0601 100644 --- a/age/src/protocol.rs +++ b/age/src/protocol.rs @@ -17,6 +17,9 @@ use crate::{ Format, }; +#[cfg(feature = "async")] +use futures::io::{AsyncRead, AsyncReadExt, BufReader as AsyncBufReader}; + pub mod decryptor; const HEADER_KEY_LABEL: &[u8] = b"header"; @@ -176,6 +179,42 @@ impl Decryptor> { } } +#[cfg(feature = "async")] +impl Decryptor> { + /// Attempts to create a decryptor for an age file. + /// + /// Returns an error if the input does not contain a valid age file. + pub async fn new_async(input: R) -> Result { + let mut input = ArmoredReader::from_async_reader(input); + let header = Header::read_async(&mut input).await?; + + match &header { + Header::V1(v1_header) => { + let mut nonce = [0; 16]; + input.read_exact(&mut nonce).await?; + + // Enforce structural requirements on the v1 header. + let any_scrypt = v1_header.recipients.iter().any(|r| { + if let RecipientStanza::Scrypt(_) = r { + true + } else { + false + } + }); + + if any_scrypt && v1_header.recipients.len() == 1 { + Ok(decryptor::PassphraseDecryptor::new_async(input, header, nonce).into()) + } else if !any_scrypt { + Ok(decryptor::RecipientsDecryptor::new_async(input, header, nonce).into()) + } else { + Err(Error::InvalidHeader) + } + } + Header::Unknown(_) => Err(Error::UnknownFormat), + } + } +} + #[cfg(test)] mod tests { use secrecy::SecretString; diff --git a/age/src/protocol/decryptor.rs b/age/src/protocol/decryptor.rs index 9a848a5..ff6b9f0 100644 --- a/age/src/protocol/decryptor.rs +++ b/age/src/protocol/decryptor.rs @@ -14,6 +14,9 @@ use crate::{ }, }; +#[cfg(feature = "async")] +use futures::io::AsyncBufRead; + struct BaseDecryptor { /// The age file. input: ArmoredReader, @@ -80,6 +83,44 @@ impl RecipientsDecryptor { } } +#[cfg(feature = "async")] +impl RecipientsDecryptor { + pub(super) fn new_async(input: ArmoredReader, header: Header, nonce: [u8; 16]) -> Self { + RecipientsDecryptor(BaseDecryptor { + input, + header, + nonce, + }) + } + + /// Attempts to decrypt the age file. + /// + /// The decryptor will have no callbacks registered, so it will be unable to use + /// identities that require e.g. a passphrase to decrypt. + /// + /// If successful, returns a reader that will provide the plaintext. + pub fn decrypt_async(self, identities: &[Identity]) -> Result, Error> { + self.decrypt_async_with_callbacks(identities, &NoCallbacks) + } + + /// Attempts to decrypt the age file. + /// + /// If successful, returns a reader that will provide the plaintext. + pub fn decrypt_async_with_callbacks( + mut self, + identities: &[Identity], + callbacks: &dyn Callbacks, + ) -> Result, Error> { + self.0 + .obtain_payload_key(|r| { + identities + .iter() + .find_map(|key| key.unwrap_file_key(r, callbacks)) + }) + .map(|payload_key| Stream::decrypt_async(&payload_key, self.0.input)) + } +} + /// Decryptor for an age file encrypted with a passphrase. pub struct PassphraseDecryptor(BaseDecryptor); @@ -114,3 +155,36 @@ impl PassphraseDecryptor { .map(|payload_key| Stream::decrypt(&payload_key, self.0.input)) } } + +#[cfg(feature = "async")] +impl PassphraseDecryptor { + pub(super) fn new_async(input: ArmoredReader, header: Header, nonce: [u8; 16]) -> Self { + PassphraseDecryptor(BaseDecryptor { + input, + header, + nonce, + }) + } + + /// Attempts to decrypt the age file. + /// + /// `max_work_factor` is the maximum accepted work factor. If `None`, the default + /// maximum is adjusted to around 16 seconds of work. + /// + /// If successful, returns a reader that will provide the plaintext. + pub fn decrypt_async( + mut self, + passphrase: &SecretString, + max_work_factor: Option, + ) -> Result, Error> { + self.0 + .obtain_payload_key(|r| { + if let RecipientStanza::Scrypt(s) = r { + s.unwrap_file_key(passphrase, max_work_factor).transpose() + } else { + None + } + }) + .map(|payload_key| Stream::decrypt_async(&payload_key, self.0.input)) + } +} diff --git a/rust-toolchain b/rust-toolchain index bf50e91..5edffce 100644 --- a/rust-toolchain +++ b/rust-toolchain @@ -1 +1 @@ -1.37.0 +1.39.0