mirror of
https://github.com/sobolevn/git-secret
synced 2024-11-08 19:10:31 +00:00
Merge remote-tracking branch 'dist/master'
This commit is contained in:
commit
6bc56d94df
@ -1,10 +1,12 @@
|
||||
# Changelog
|
||||
|
||||
## {Next Version}
|
||||
## {{Next Version}}
|
||||
|
||||
### Bugfixes
|
||||
|
||||
- Don't let reveal clobber secret files (#579)
|
||||
- In 'tell', warn about disabled, revoked, expired, or invalid keys (#552, #508, #317, #290, #283, #238)
|
||||
- Error if 'tell' is used on an email address with multiple keys (#552)
|
||||
- Don't let 'reveal' clobber secret files (#579)
|
||||
|
||||
### Misc
|
||||
|
||||
@ -34,7 +36,7 @@
|
||||
### Features
|
||||
|
||||
- Support SECRETS_PINENTRY env var for gnupg --pinentry-mode parameter (#221)
|
||||
- Show output from gnupg if 'hide' fails (#516)
|
||||
- Show output from gnupg if 'hide' fails (#516, #202, #317)
|
||||
- Add support for Busybox (#478)
|
||||
|
||||
### Bugfixes
|
||||
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -7,14 +7,16 @@ git-secret-tell - adds a person, who can access private data.
|
||||
|
||||
|
||||
## DESCRIPTION
|
||||
`git-secret-tell` receives an email addresses as an input, searches for the `gpg`-key in the `gpg`'s
|
||||
`homedir` by these emails, then imports a person's public key into the `git-secret`'s inner keychain.
|
||||
`git-secret-tell` receives one or more email addresses as an input, searches for the `gpg`-key in the `gpg`
|
||||
`homedir` by these emails, then imports the corresponding public key into `git-secret`'s inner keychain.
|
||||
From this moment this person can encrypt new files with the keyring which contains their key,
|
||||
but they cannot decrypt the old files, which were already encrypted without their key.
|
||||
The files should be re-encrypted with the new keyring by someone who has the unencrypted files.
|
||||
|
||||
**Do not manually import secret key into `git-secret`**. Anyways, it won't work with any of the secret-keys imported.
|
||||
Versions of `git-secret tell` after 0.3.2 will warn about keys that are expired, revoked, or otherwise invalid,
|
||||
and also if multiple keys are found for a single email address.
|
||||
|
||||
**Do not manually import secret keys into `git-secret`**. It won't work with imported secret keys anyway.
|
||||
|
||||
## OPTIONS
|
||||
|
||||
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -539,7 +539,7 @@ function _exe_is_busybox {
|
||||
echo "$is_busybox"
|
||||
}
|
||||
|
||||
|
||||
# this is used by just about every command
|
||||
function _user_required {
|
||||
# This function does a bunch of validations:
|
||||
# 1. It calls `_secrets_dir_exists` to verify that "$_SECRETS_DIR" exists.
|
||||
@ -608,15 +608,16 @@ function _assert_keychain_contains_emails {
|
||||
if [[ $email != *"@"* ]]; then
|
||||
_abort "does not appear to be an email: $email"
|
||||
fi
|
||||
local email_ok=0
|
||||
local emails_found=0
|
||||
for uid in $gpg_uids; do
|
||||
if [[ "$uid" == "$email" ]]; then
|
||||
email_ok=1
|
||||
break
|
||||
emails_found=$((emails_found+1))
|
||||
fi
|
||||
done
|
||||
if [[ $email_ok -eq 0 ]]; then
|
||||
_abort "email not found in gpg keyring: $email"
|
||||
if [[ $emails_found -eq 0 ]]; then
|
||||
_abort "no key found in gpg keyring for: $email"
|
||||
elif [[ $emails_found -gt 1 ]]; then
|
||||
_abort "$emails_found keys found in gpg keyring for: $email"
|
||||
fi
|
||||
done
|
||||
}
|
||||
@ -630,7 +631,7 @@ function _get_encrypted_filename {
|
||||
echo "${filename}${SECRETS_EXTENSION}" | sed -e 's#^\./##'
|
||||
}
|
||||
|
||||
|
||||
# this is used throughout this file, and in 'whoknows'
|
||||
function _get_users_in_gpg_keyring {
|
||||
# show the users in the gpg keyring.
|
||||
# `whoknows` command uses it internally.
|
||||
@ -642,19 +643,41 @@ function _get_users_in_gpg_keyring {
|
||||
args+=( "--homedir" "$homedir" )
|
||||
fi
|
||||
|
||||
# we use --fixed-list-mode so older versions of gpg emit 'uid:' lines.
|
||||
# here gawk splits on colon as --with-colon, exact matches field 1 as 'uid', and selects field 10 "User-ID"
|
||||
# the gensub regex extracts email from <> within field 10. (If there's no <>, then field is just an email address
|
||||
# (and maybe a comment) and the regex just passes it through.)
|
||||
# sed at the end removes any 'comment' that appears in parentheses, for #530
|
||||
# 3>&- closes fd 3 for bats, see https://github.com/bats-core/bats-core#file-descriptor-3-read-this-if-bats-hangs
|
||||
## We use --fixed-list-mode so older versions of gpg emit 'uid:' lines.
|
||||
## Gawk splits on colon as --with-colon, matches field 1 as 'uid',
|
||||
result=$($SECRETS_GPG_COMMAND "${args[@]}" --no-permission-warning --list-public-keys --with-colon --fixed-list-mode | \
|
||||
gawk -F: '$1~/uid/{print gensub(/.*<(.*)>.*/, "\\1", "g", $10); }' | \
|
||||
sed 's/([^)]*)//g' 3>&-)
|
||||
gawk -F: '$1=="uid"' )
|
||||
|
||||
echo "$result"
|
||||
# For #508 / #552: warn user if gpg indicates keys are one of:
|
||||
# i=invalid, d=disabled, r=revoked, e=expired, n=not valid
|
||||
# See https://github.com/gpg/gnupg/blob/master/doc/DETAILS#field-2---validity # for more on gpg 'validity codes'.
|
||||
local invalid_lines
|
||||
invalid_lines=$(echo "$result" | gawk -F: '$2=="i" || $2=="d" || $2=="r" || $2=="e" || $2=="n"')
|
||||
|
||||
local emails
|
||||
emails=$(_extract_emails_from_gpg_output "$result")
|
||||
|
||||
local emails_with_invalid_keys
|
||||
emails_with_invalid_keys=$(_extract_emails_from_gpg_output "$invalid_lines")
|
||||
|
||||
if [[ -n "$emails_with_invalid_keys" ]]; then
|
||||
_warn "at least one key for email(s) is revoked, expired, or otherwise invalid: $emails_with_invalid_keys"
|
||||
fi
|
||||
|
||||
echo "$emails"
|
||||
}
|
||||
|
||||
function _extract_emails_from_gpg_output {
|
||||
local result=$1
|
||||
|
||||
# gensub() outputs email from <> within field 10, "User-ID". If there's no <>, then field is just an email address
|
||||
# (and maybe a comment) and we pass it through.
|
||||
# Sed at the end removes any 'comment' that appears in parentheses, for #530
|
||||
# 3>&- closes fd 3 for bats, see https://github.com/bats-core/bats-core#file-descriptor-3-read-this-if-bats-hangs
|
||||
local emails
|
||||
emails=$(echo "$result" | gawk -F: '{print gensub(/.*<(.*)>.*/, "\\1", "g", $10); }' | sed 's/([^)]*)//g' 3>&-)
|
||||
echo "$emails"
|
||||
}
|
||||
|
||||
function _get_users_in_gitsecret_keyring {
|
||||
# show the users in the gitsecret keyring.
|
||||
|
@ -64,7 +64,7 @@ function tell {
|
||||
if [[ "${#emails[@]}" -eq 0 ]]; then
|
||||
# If after possible addition of git_email, emails are still empty,
|
||||
# we should raise an exception.
|
||||
_abort "you must provide at least one email address."
|
||||
_abort "you must use -m or provide at least one email address."
|
||||
fi
|
||||
|
||||
_assert_keychain_contains_emails "$homedir" "${emails[@]}"
|
||||
|
@ -105,7 +105,8 @@ function teardown {
|
||||
run git secret add -i "$test_file"
|
||||
[ "$status" -eq 0 ]
|
||||
|
||||
run _file_has_line "$test_file" "../.gitignore"
|
||||
[[ -f "$current_dir/.gitignore" ]]
|
||||
run _file_has_line "$test_file" "$current_dir/.gitignore"
|
||||
[ "$status" -eq 0 ]
|
||||
|
||||
# .gitignore was not created:
|
||||
|
@ -18,7 +18,7 @@ function teardown {
|
||||
unset_current_state
|
||||
}
|
||||
|
||||
@test "test 'hide' using expired key" {
|
||||
@test "run 'hide' using expired key" {
|
||||
FILE_TO_HIDE="$TEST_DEFAULT_FILENAME"
|
||||
FILE_CONTENTS="hidden content юникод"
|
||||
set_state_secret_add "$FILE_TO_HIDE" "$FILE_CONTENTS"
|
||||
@ -34,6 +34,11 @@ function teardown {
|
||||
}
|
||||
|
||||
|
||||
@test "run 'whoknows' using expired key" {
|
||||
run git secret whoknows
|
||||
[ $status -eq 0 ]
|
||||
}
|
||||
|
||||
@test "run 'whoknows -l' on only expired user" {
|
||||
run git secret whoknows -l
|
||||
[ "$status" -eq 0 ]
|
||||
@ -50,7 +55,7 @@ function teardown {
|
||||
|
||||
|
||||
|
||||
@test "run 'whoknows -l' on expired and normal user" {
|
||||
@test "run 'whoknows -l' on normal key and expired key" {
|
||||
install_fixture_key "$TEST_DEFAULT_USER"
|
||||
set_state_secret_tell "$TEST_DEFAULT_USER"
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user