2022-04-25 13:30:44 +00:00
|
|
|
package gpgbin
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
|
|
|
|
"git.sr.ht/~rjarry/aerc/models"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Decrypt runs gpg --decrypt on the contents of r. If the packet is signed,
|
|
|
|
// the signature is also verified
|
|
|
|
func Decrypt(r io.Reader) (*models.MessageDetails, error) {
|
|
|
|
md := new(models.MessageDetails)
|
|
|
|
orig, err := ioutil.ReadAll(r)
|
|
|
|
if err != nil {
|
|
|
|
return md, err
|
|
|
|
}
|
|
|
|
args := []string{"--decrypt"}
|
|
|
|
g := newGpg(bytes.NewReader(orig), args)
|
2022-06-27 12:31:31 +00:00
|
|
|
_ = g.cmd.Run()
|
|
|
|
outRdr := bytes.NewReader(g.stdout.Bytes())
|
|
|
|
// Always parse stdout, even if there was an error running command.
|
|
|
|
// We'll find the error in the parsing
|
|
|
|
err = parse(outRdr, md)
|
2022-04-25 13:30:44 +00:00
|
|
|
if err != nil {
|
|
|
|
err = parseError(g.stderr.String())
|
|
|
|
switch GPGErrors[err.Error()] {
|
|
|
|
case ERROR_NO_PGP_DATA_FOUND:
|
|
|
|
md.Body = bytes.NewReader(orig)
|
|
|
|
return md, nil
|
|
|
|
default:
|
2022-05-04 03:41:29 +00:00
|
|
|
return nil, err
|
2022-04-25 13:30:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return md, nil
|
|
|
|
}
|