rage: Allow piping input when encrypting with passphrase on Unix

Closes str4d/rage#374.
This commit is contained in:
Jack Grigg 2024-08-28 13:22:36 +00:00
parent 51760e34ba
commit a709c93c92
6 changed files with 43 additions and 4 deletions

View file

@ -12,6 +12,10 @@ to 1.0.0 are beta releases.
### Added ### Added
- Partial French translation! - Partial French translation!
### Fixed
- [Unix] Files can now be encrypted with `rage --passphrase` when piped over
stdin, without requiring an explicit `-` argument as `INPUT`.
## [0.10.0] - 2024-02-04 ## [0.10.0] - 2024-02-04
### Added ### Added
- Russian translation! - Russian translation!

View file

@ -23,7 +23,10 @@ macro_rules! wlnfl {
pub(crate) enum EncryptError { pub(crate) enum EncryptError {
Age(age::EncryptError), Age(age::EncryptError),
BrokenPipe { is_stdout: bool, source: io::Error }, BrokenPipe {
is_stdout: bool,
source: io::Error,
},
IdentityRead(age::cli_common::ReadError), IdentityRead(age::cli_common::ReadError),
Io(io::Error), Io(io::Error),
MissingRecipients, MissingRecipients,
@ -31,6 +34,7 @@ pub(crate) enum EncryptError {
MixedRecipientAndPassphrase, MixedRecipientAndPassphrase,
MixedRecipientsFileAndPassphrase, MixedRecipientsFileAndPassphrase,
PassphraseTimedOut, PassphraseTimedOut,
#[cfg(not(unix))]
PassphraseWithoutFileArgument, PassphraseWithoutFileArgument,
PluginNameFlag, PluginNameFlag,
} }
@ -84,6 +88,7 @@ impl fmt::Display for EncryptError {
wfl!(f, "err-enc-mixed-recipients-file-passphrase") wfl!(f, "err-enc-mixed-recipients-file-passphrase")
} }
EncryptError::PassphraseTimedOut => wfl!(f, "err-passphrase-timed-out"), EncryptError::PassphraseTimedOut => wfl!(f, "err-passphrase-timed-out"),
#[cfg(not(unix))]
EncryptError::PassphraseWithoutFileArgument => { EncryptError::PassphraseWithoutFileArgument => {
wfl!(f, "err-enc-passphrase-without-file") wfl!(f, "err-enc-passphrase-without-file")
} }

View file

@ -108,6 +108,7 @@ fn encrypt(opts: AgeOptions) -> Result<(), error::EncryptError> {
(Format::Binary, file_io::OutputFormat::Binary) (Format::Binary, file_io::OutputFormat::Binary)
}; };
#[cfg(not(unix))]
let has_file_argument = opts.input.is_some(); let has_file_argument = opts.input.is_some();
let (input, output) = set_up_io(opts.input, opts.output, output_format)?; let (input, output) = set_up_io(opts.input, opts.output, output_format)?;
@ -134,8 +135,13 @@ fn encrypt(opts: AgeOptions) -> Result<(), error::EncryptError> {
return Err(error::EncryptError::MixedRecipientsFileAndPassphrase); return Err(error::EncryptError::MixedRecipientsFileAndPassphrase);
} }
if !has_file_argument { // The `rpassword` crate opens `/dev/tty` directly on Unix, so we don't have
return Err(error::EncryptError::PassphraseWithoutFileArgument); // any conflict with stdin.
#[cfg(not(unix))]
{
if !has_file_argument {
return Err(error::EncryptError::PassphraseWithoutFileArgument);
}
} }
match read_or_generate_passphrase() { match read_or_generate_passphrase() {

View file

@ -1,4 +1,12 @@
#[test] #[test]
fn cli_tests() { fn cli_tests() {
trycmd::TestCases::new().case("tests/cmd/*/*.toml"); let tests = trycmd::TestCases::new();
tests.case("tests/cmd/*/*.toml");
#[cfg(unix)]
tests.case("tests/unix/*/*.toml");
#[cfg(not(unix))]
tests.case("tests/windows/*/*.toml");
} }

View file

@ -0,0 +1,16 @@
bin.name = "rage"
args = "-p"
status = "failed"
stdin = ""
stdout = ""
stderr = """
Error: Parsing Error: Error { input: "", code: Tag }
[ Did rage not do what you expected? Could an error be more useful? ]
[ Tell us: https://str4d.xyz/rage/report ]
"""
# We get an error from the `pinentry` crate because we've passed a real but invalid binary
# that does not speak the pinentry protocol.
[env.add]
PINENTRY_PROGRAM = "true"