dbf52bb4b4
Check that the signing key exists when the user issues the :sign command. The signing key ID will be displayed in the security status also, allowing the user to see what key will be used to sign the message. Signed-off-by: Tim Culverhouse <tim@timculverhouse.com> Tested-by: Jens Grassel <jens@wegtam.com>
66 lines
1.6 KiB
Go
66 lines
1.6 KiB
Go
package gpg
|
|
|
|
import (
|
|
"bytes"
|
|
"io"
|
|
"log"
|
|
"os/exec"
|
|
|
|
"git.sr.ht/~rjarry/aerc/lib/crypto/gpg/gpgbin"
|
|
"git.sr.ht/~rjarry/aerc/models"
|
|
"github.com/ProtonMail/go-crypto/openpgp"
|
|
"github.com/emersion/go-message/mail"
|
|
)
|
|
|
|
// Mail satisfies the PGPProvider interface in aerc
|
|
type Mail struct {
|
|
logger *log.Logger
|
|
}
|
|
|
|
func (m *Mail) Init(l *log.Logger) error {
|
|
m.logger = l
|
|
_, err := exec.LookPath("gpg")
|
|
return err
|
|
}
|
|
|
|
func (m *Mail) Decrypt(r io.Reader, decryptKeys openpgp.PromptFunction) (*models.MessageDetails, error) {
|
|
gpgReader, err := Read(r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
md := gpgReader.MessageDetails
|
|
md.SignatureValidity = models.Valid
|
|
if md.SignatureError != "" {
|
|
md.SignatureValidity = handleSignatureError(md.SignatureError)
|
|
}
|
|
return md, nil
|
|
}
|
|
|
|
func (m *Mail) ImportKeys(r io.Reader) error {
|
|
return gpgbin.Import(r)
|
|
}
|
|
|
|
func (m *Mail) Encrypt(buf *bytes.Buffer, rcpts []string, signer string, decryptKeys openpgp.PromptFunction, header *mail.Header) (io.WriteCloser, error) {
|
|
|
|
return Encrypt(buf, header.Header.Header, rcpts, signer)
|
|
}
|
|
|
|
func (m *Mail) Sign(buf *bytes.Buffer, signer string, decryptKeys openpgp.PromptFunction, header *mail.Header) (io.WriteCloser, error) {
|
|
return Sign(buf, header.Header.Header, signer)
|
|
}
|
|
|
|
func (m *Mail) Close() {}
|
|
|
|
func (m *Mail) GetSignerKeyId(s string) (string, error) {
|
|
return gpgbin.GetPrivateKeyId(s)
|
|
}
|
|
|
|
func handleSignatureError(e string) models.SignatureValidity {
|
|
if e == "gpg: missing public key" {
|
|
return models.UnknownEntity
|
|
}
|
|
if e == "gpg: header hash does not match actual sig hash" {
|
|
return models.MicalgMismatch
|
|
}
|
|
return models.UnknownValidity
|
|
}
|