forked from keybase/client
-
Notifications
You must be signed in to change notification settings - Fork 0
/
cmd_encrypt.go
125 lines (109 loc) · 2.86 KB
/
cmd_encrypt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
// Copyright 2015 Keybase, Inc. All rights reserved. Use of
// this source code is governed by the included BSD license.
package client
import (
"errors"
"golang.org/x/net/context"
"github.com/keybase/cli"
"github.com/keybase/client/go/libcmdline"
"github.com/keybase/client/go/libkb"
"github.com/keybase/client/go/protocol"
"github.com/keybase/go-framed-msgpack-rpc"
)
type CmdEncrypt struct {
libkb.Contextified
filter UnixFilter
recipients []string
trackOptions keybase1.TrackOptions
}
func NewCmdEncrypt(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command {
return cli.Command{
Name: "encrypt",
ArgumentHelp: "<usernames...>",
Usage: "Encrypt messages or files for keybase users",
Action: func(c *cli.Context) {
cl.ChooseCommand(&CmdEncrypt{
Contextified: libkb.NewContextified(g),
}, "encrypt", c)
},
Flags: []cli.Flag{
// TODO: Support anonymous receiver mode:
// https://keybase.atlassian.net/browse/CORE-2142
// .
//
// TODO: Make self-encryption optional:
// https://keybase.atlassian.net/browse/CORE-2143
// .
cli.StringFlag{
Name: "i, infile",
Usage: "Specify an input file.",
},
cli.BoolFlag{
Name: "l, local",
Usage: "Only track locally, don't send a statement to the server.",
},
cli.StringFlag{
Name: "m, message",
Usage: "Provide the message on the command line.",
},
cli.StringFlag{
Name: "o, outfile",
Usage: "Specify an outfile (stdout by default).",
},
cli.BoolFlag{
Name: "y",
Usage: "Approve remote tracking without prompting.",
},
},
}
}
func (c *CmdEncrypt) Run() error {
cli, err := GetSaltPackClient(c.G())
if err != nil {
return err
}
protocols := []rpc.Protocol{
NewStreamUIProtocol(),
NewSecretUIProtocol(c.G()),
NewIdentifyTrackUIProtocol(c.G()),
}
if err := RegisterProtocols(protocols); err != nil {
return err
}
snk, src, err := c.filter.ClientFilterOpen()
if err != nil {
return err
}
opts := keybase1.SaltPackEncryptOptions{
Recipients: c.recipients,
TrackOptions: c.trackOptions,
}
arg := keybase1.SaltPackEncryptArg{Source: src, Sink: snk, Opts: opts}
err = cli.SaltPackEncrypt(context.TODO(), arg)
cerr := c.filter.Close(err)
return libkb.PickFirstError(err, cerr)
}
func (c *CmdEncrypt) GetUsage() libkb.Usage {
return libkb.Usage{
API: true,
Config: true,
KbKeyring: true,
}
}
func (c *CmdEncrypt) ParseArgv(ctx *cli.Context) error {
if len(ctx.Args()) == 0 {
return errors.New("Encrypt needs at least one recipient")
}
c.recipients = ctx.Args()
msg := ctx.String("message")
outfile := ctx.String("outfile")
infile := ctx.String("infile")
if err := c.filter.FilterInit(msg, infile, outfile); err != nil {
return err
}
c.trackOptions = keybase1.TrackOptions{
LocalOnly: ctx.Bool("local"),
BypassConfirm: ctx.Bool("y"),
}
return nil
}