-
-
Notifications
You must be signed in to change notification settings - Fork 479
/
mime.go
60 lines (45 loc) · 1.31 KB
/
mime.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
package secparse
import (
"bufio"
"bytes"
"errors"
"fmt"
"io"
"net/textproto"
"strings"
"github.com/gopasspw/gopass/pkg/gopass/secrets"
)
// ErrUnknown is returned when the secret is not recognized.
var ErrUnknown = fmt.Errorf("unknown secrets type")
// parseLegacyMIME is a fallback parser for the transient MIME format.
func parseLegacyMIME(buf []byte) (*secrets.AKV, error) {
var hdr textproto.MIMEHeader
body := &bytes.Buffer{}
var pw string
r := bufio.NewReader(bytes.NewReader(buf))
line, err := r.ReadString('\n')
if err != nil {
return nil, fmt.Errorf("failed to read line: %w", err)
}
if strings.TrimSpace(line) != secrets.Ident {
return nil, fmt.Errorf("%s: %w", line, ErrUnknown)
}
tpr := textproto.NewReader(r)
hdr, err = tpr.ReadMIMEHeader()
// we can reach EOF is there are no new line at the end of the secret file after the MIME header.
if err != nil && !errors.Is(err, io.EOF) {
return nil, &secrets.PermanentError{Err: err}
}
if _, err := io.Copy(body, r); err != nil {
return nil, &secrets.PermanentError{Err: err}
}
if sv := hdr.Get("Password"); sv != "" {
pw = sv
hdr.Del("Password")
}
data := make(map[string][]string, len(hdr))
for k := range hdr {
data[strings.ToLower(k)] = hdr.Values(k)
}
return secrets.NewAKVWithData(pw, data, body.String(), true), nil
}