-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathconfig.go
672 lines (632 loc) · 21.7 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
package main
import (
"bufio"
"bytes"
"encoding/json"
"fmt"
"io"
"io/ioutil"
"log"
"os"
"os/exec"
"path/filepath"
"strconv"
"strings"
forest "git.sr.ht/~whereswaldon/forest-go"
"git.sr.ht/~whereswaldon/forest-go/fields"
"golang.org/x/crypto/openpgp"
"golang.org/x/crypto/ssh/terminal"
"github.com/awnumar/memguard"
"github.com/awnumar/memguard/core"
)
// Tristate is a type with three possible values, true, false, and undefined
type Tristate string
const (
TristateTrue Tristate = "true"
TristateFalse Tristate = "false"
TristateUndefined Tristate = ""
)
// Config holds the user's runtime configuration
type Config struct {
// a PGP key ID for the user's private key that controls their arbor identity.
PGPUser string
// allows control over whether GPG support is used when it is available. Legal
// values are "true","false", and "" (empty string will enable it if gpg is available)
UseGPG Tristate
// the file name of the user's arbor identity node
IdentityID string
// where to store log and profile data
RuntimeDirectory string
// where application configuration is stored
ConfigDirectory string
// where arbor nodes are stored
GroveDirectory string
// The command to launch an editor for composing new messages
EditorCmd []string
// Secure memory enclave where pgp passphrase is stored
passphraseEnclave *memguard.Enclave
}
// NewConfig creates a config that is prepopulated with a runtime directory and an editor command that
// will work on many Linux systems
func NewConfig() *Config {
dir, err := ioutil.TempDir("", "arbor")
if err != nil {
log.Println("Failed to create temporary runtime directory, falling back to os-global temp dir")
dir = os.TempDir()
}
return &Config{
RuntimeDirectory: dir,
EditorCmd: []string{"xterm", "-e", os.ExpandEnv("$EDITOR"), "{}"},
}
}
// StartLogging configures logging to a file chosen based on the Config. If
// any io.Writers are provided, they will all receive logs in addition to the
// configured log file.
func (c *Config) StartLogging(additionalLogSinks ...io.Writer) error {
logPath := filepath.Join(c.RuntimeDirectory, "viewer.log")
log.Println("Logging to", logPath)
logFile, err := os.OpenFile(logPath, os.O_APPEND|os.O_RDWR|os.O_CREATE, 0660)
if err != nil {
return fmt.Errorf("Failed to open log file %s: %w", logPath, err)
}
writers := append([]io.Writer{logFile}, additionalLogSinks...)
log.SetOutput(io.MultiWriter(writers...))
log.SetFlags(log.Lshortfile | log.LstdFlags)
return nil
}
// DefaultConfigFilePath returns the path at which configuration should be stored
// by default on the current OS and for the current user.
func DefaultConfigFilePath() (string, error) {
configDir, err := os.UserConfigDir()
if err != nil {
return "", fmt.Errorf("failed looking up configuration dir: %w", err)
}
const wisteriaConfigDirName = "wisteria"
const wisteriaConfigFileNameJSON = "wisteria-config.json"
configFile := filepath.Join(configDir, wisteriaConfigDirName, wisteriaConfigFileNameJSON)
return configFile, nil
}
func DefaultGrovePath() (string, error) {
homeDir, err := os.UserHomeDir()
if err != nil {
return "", fmt.Errorf("failed finding user home directory: %w", err)
}
const wisteriaHistoryParentDir = "Documents"
const wisteriaHistoryDirName = "ArborHistory"
wisteriaHistoryPath := filepath.Join(homeDir, wisteriaHistoryParentDir, wisteriaHistoryDirName)
return wisteriaHistoryPath, nil
}
func (c *Config) LoadFromPath(configPath string) error {
configFile, err := os.Open(configPath)
if err != nil {
return fmt.Errorf("unable to open config file: %w", err)
}
defer configFile.Close()
if err := c.LoadFrom(configFile); err != nil {
return fmt.Errorf("unable to load config file: %w", err)
}
return nil
}
// LoadFrom loads the configuration from the given ReadCloser and closes it. It will error if
// it fails to read, parse, or validate the configuration that it reads.
func (c *Config) LoadFrom(configFile io.Reader) error {
decoder := json.NewDecoder(configFile)
if err := decoder.Decode(c); err != nil {
return fmt.Errorf("failed decoding config file: %w", err)
}
if err := c.Validate(); err != nil {
return fmt.Errorf("failed validating configuration from file: %w", err)
}
return nil
}
// FileExists returns whether a wisteria configuration file exists at the default path.
func (c *Config) FileExists() (bool, error) {
defaultPath, err := DefaultConfigFilePath()
if err != nil {
return false, fmt.Errorf("unable to get default path: %w", err)
}
if _, err := os.Stat(defaultPath); err != nil {
return false, fmt.Errorf("unable to confirm existence of config file: %w", err)
}
return true, nil
}
// SaveTo persists this configuration within the given WriteCloser and then closes it.
func (c *Config) SaveTo(configFile io.Writer) error {
encoder := json.NewEncoder(configFile)
if err := encoder.Encode(c); err != nil {
return fmt.Errorf("failed writing config file: %w", err)
}
return nil
}
func (c *Config) SaveToPath(configpath string) (err error) {
if err := os.MkdirAll(filepath.Dir(configpath), 0755); err != nil {
return fmt.Errorf("failed ensuring config directory exists: %w", err)
}
configFile, err := os.OpenFile(configpath, os.O_CREATE|os.O_EXCL|os.O_WRONLY, 0664)
if err != nil {
return fmt.Errorf("couldn't save config file %s: %w", configpath, err)
}
defer func() {
if closeErr := configFile.Close(); closeErr != nil {
err = fmt.Errorf("failed closing config file: %w", err)
}
}()
return c.SaveTo(configFile)
}
// Validate errors if the configuration is invalid
func (c *Config) Validate() error {
switch {
case c.PGPUser == "":
return fmt.Errorf("PGPUser must be set")
case c.IdentityID == "":
return fmt.Errorf("Identity must be set")
case len(c.EditorCmd) < 2:
return fmt.Errorf("Editor Command %v is impossibly short", c.EditorCmd)
}
return nil
}
// EditFile returns an exec.Cmd that will open the provided filename, edit it, and block until the
// edit is completed.
func (c *Config) EditFile(filename string) *exec.Cmd {
out := make([]string, 0, len(c.EditorCmd))
for _, part := range c.EditorCmd {
if part == "{}" {
out = append(out, filename)
} else {
out = append(out, part)
}
}
return exec.Command(out[0], out[1:]...)
}
// KeyRingPath returns where the keyring holding the private key for the provided Identity
// *should* be stored (if wisteria manages it).
func (c *Config) KeyRingPath(identityID string) string {
const extension = ".key"
const keydir = "keys"
keyringFile := c.IdentityID + extension
keyringPath := filepath.Join(c.ConfigDirectory, keydir, keyringFile)
return keyringPath
}
// Builder creates a forest.Builder based on the configuration. This allows the client
// to create nodes on this user's behalf.
func (c *Config) Builder(store forest.Store) (*forest.Builder, error) {
var (
signer forest.Signer
err error
)
if c.PGPUser != "" && c.UseGPG == TristateTrue {
signer, err = forest.NewGPGSigner(c.PGPUser)
asGPG := signer.(*forest.GPGSigner)
asGPG.Rewriter = func(cmd *exec.Cmd) error {
cmd.Stderr = log.Writer()
return nil
}
} else {
// assume wisteria manages the private key
keyringPath := c.KeyRingPath(c.IdentityID)
data, err := ioutil.ReadFile(keyringPath)
if err != nil {
return nil, fmt.Errorf("failed reading key file %s: %w", keyringPath, err)
}
keys, err := openpgp.ReadKeyRing(bytes.NewBuffer(data))
if err != nil {
return nil, fmt.Errorf("failed parsing key file %s: %w", keyringPath, err)
}
if len(keys) < 1 {
return nil, fmt.Errorf("expected keyring %s to contain at least one key", keyringPath)
}
key := keys[0]
if c.passphraseEnclave == nil {
return nil, fmt.Errorf("passphrase enclave is nil")
}
b, err := c.passphraseEnclave.Open()
if err != nil {
return nil, fmt.Errorf("failed accessing keyring passphrase: %w", err)
}
defer b.Destroy()
if err := key.PrivateKey.Decrypt(b.Bytes()); err != nil {
return nil, fmt.Errorf("failed decrypting keyring with enclave passphrase: %w", err)
}
for i, subkey := range key.Subkeys {
if err := subkey.PrivateKey.Decrypt(b.Bytes()); err != nil {
return nil, fmt.Errorf("failed decrypting subkey at index %d: %w", i, err)
}
}
signer, err = forest.NewNativeSigner(keys[0])
}
if err != nil {
return nil, fmt.Errorf("failed creating signer: %w", err)
}
identity, err := c.IdentityNode(store)
if err != nil {
return nil, fmt.Errorf("failed getting identity node: %w", err)
}
return forest.As(identity, signer), nil
}
func (c *Config) IdentityNode(store forest.Store) (*forest.Identity, error) {
identityID := &fields.QualifiedHash{}
if err := identityID.UnmarshalText([]byte(c.IdentityID)); err != nil {
return nil, fmt.Errorf("failed to unmarshal IdentityID %s into QualifiedHash: %w", c.IdentityID, err)
}
identity, has, err := store.GetIdentity(identityID)
if err != nil {
return nil, fmt.Errorf("failed to get identity %s: %w", c.IdentityID, err)
} else if !has {
return nil, fmt.Errorf("store does not contain identity %s", c.IdentityID)
}
return identity.(*forest.Identity), nil
}
// Unixify ensures that a string contains only unix-style newlines, converting
// windows-style ones as necessary
func Unixify(in string) string {
return strings.ReplaceAll(in, "\r\n", "\n")
}
// Prompter can display text to the user and can ask them to make simple choices.
type Prompter interface {
Choose(prompt string, slice []interface{}, formatter func(element interface{}) string) (choice interface{}, err error)
PromptLine(prompt string) (input string, err error)
PromptSecure(prompt string) (input []byte, err error)
Display(message string) error
}
// StdoutPrompter asks the user to make choices in an interactive text prompt
type StdoutPrompter struct {
Out io.Writer
// SecureFD is the file descriptor of a TTY that can be used directly to
// prompt for password entry (this allows disabling echo)
SecureFD int
In *bufio.Reader
}
// NewStdoutPrompter creates a new prompter that can ask for user input in an
// interactive terminal session.
func NewStdoutPrompter(in io.Reader, secureFD int, out io.Writer) *StdoutPrompter {
return &StdoutPrompter{
Out: out,
SecureFD: secureFD,
In: bufio.NewReader(in),
}
}
// Choose asks the user to choose from among a list of options. The formatter
// function is used to display each option to the user
func (s *StdoutPrompter) Choose(prompt string, slice []interface{}, formatter func(element interface{}) string) (choice interface{}, err error) {
if len(slice) < 1 {
return nil, fmt.Errorf("Cannot choose from empty option list")
}
success := false
attempts := 0
index := 0
const maxAttempts = 5
for !success && attempts < maxAttempts {
fmt.Fprintln(s.Out)
attempts++
fmt.Fprintln(s.Out, prompt)
for i, v := range slice {
fmt.Fprintf(s.Out, "\t%d) %s\n", i, formatter(v))
}
fmt.Print("Your choice: ")
str, err := s.In.ReadString("\n"[0])
if err != nil {
fmt.Fprintf(s.Out, "Error reading input: %v", err)
continue
}
index, err = strconv.Atoi(strings.ReplaceAll(Unixify(str), "\n", ""))
if err != nil {
fmt.Fprintf(s.Out, "Input must be a number: %v", err)
continue
}
if index >= len(slice) || index < 0 {
fmt.Fprintf(s.Out, "Index %d is out of range", index)
continue
}
success = true
}
if !success {
return nil, fmt.Errorf("max input attempts exceeded")
}
return slice[index], nil
}
// PromptLine asks the user for a single line of free-form input text
func (s *StdoutPrompter) PromptLine(prompt string) (input string, err error) {
success := false
attempts := 0
const maxAttempts = 5
for !success && attempts < maxAttempts {
fmt.Fprintln(s.Out)
attempts++
fmt.Fprintln(s.Out, prompt)
input, err = s.In.ReadString("\n"[0])
if err != nil {
fmt.Fprintf(s.Out, "Error reading input: %v", err)
continue
}
input = strings.TrimSpace(input)
if len(input) < 1 {
fmt.Fprintf(s.Out, "Cannot use only whitespace")
continue
}
success = true
}
if !success {
return "", fmt.Errorf("max input attempts exceeded")
}
return input, nil
}
// PromptSecure asks the user for a single line of free-form input text that will
// be unmodified (no string trimming)
func (s *StdoutPrompter) PromptSecure(prompt string) (input []byte, err error) {
success := false
attempts := 0
const maxAttempts = 5
for !success && attempts < maxAttempts {
fmt.Fprintln(s.Out)
attempts++
fmt.Fprintln(s.Out, prompt)
input, err = terminal.ReadPassword(s.SecureFD)
if err != nil {
fmt.Fprintf(s.Out, "Error reading input: %v", err)
continue
}
if len(input) < 1 {
fmt.Fprintf(s.Out, "Passphrase cannot be empty\n")
continue
}
success = true
}
if !success {
return nil, fmt.Errorf("max input attempts exceeded")
}
return input, nil
}
// Display shows a message to the user
func (s *StdoutPrompter) Display(message string) error {
_, err := fmt.Fprintln(s.Out, message)
return err
}
func GPGAvailable() bool {
gpgCommand, err := forest.FindGPG()
if err != nil {
return false
}
return gpgCommand != ""
}
func GetSecretKeys() ([]string, error) {
gpgCommand, err := forest.FindGPG()
if err != nil {
return nil, fmt.Errorf("Failed to find gpg installation: %v", err)
}
cmd := exec.Command(gpgCommand, "--list-secret-keys", "--with-colons")
out, err := cmd.StdoutPipe()
if err != nil {
return nil, fmt.Errorf("Failed to create gpg stdout pipe: %v", err)
}
if err := cmd.Start(); err != nil {
return nil, fmt.Errorf("Failed starting to list gpg secret keys: %v", err)
}
b, err := ioutil.ReadAll(out)
if err != nil {
return nil, fmt.Errorf("Failed reading gpg stdout: %v", err)
}
if err := cmd.Wait(); err != nil {
return nil, fmt.Errorf("Failed listing gpg secret keys: %v", err)
}
lines := strings.Split(string(b), "\n")
ids := []string{}
const commentPosition = 9 // the field number of the user info comment
for _, line := range lines {
if strings.HasPrefix(line, "uid") {
ids = append(ids, strings.Split(line, ":")[commentPosition])
}
}
return ids, nil
}
type Wizard struct {
Prompter
*Config
}
// ConfigurePassphrase prompts the user to enter their
func (w *Wizard) ConfigurePassphrase(prompt string) error {
// get a passphrase
passphrase, err := w.PromptSecure(prompt)
defer func() {
//erase passphrase from memory no matter what
fullViewOfSlice := passphrase[:cap(passphrase)]
for i := range fullViewOfSlice {
fullViewOfSlice[i] = 0
}
}()
if err != nil {
return fmt.Errorf("failed reading passphrase from user: %w", err)
}
enclave, err := core.NewEnclave(passphrase)
if err != nil {
return fmt.Errorf("failed creating secure enclave: %w", err)
}
w.Config.passphraseEnclave = &memguard.Enclave{Enclave: enclave}
return nil
}
// ConfigureNewIdentity creates a completely new identity using an existing GPG key
// The identity will be stored in the provided forest.Store implementation
func (w *Wizard) ConfigureNewIdentity(store forest.Store) (err error) {
// do we have GPG?
// if we have it, choose an existing key or create a new one
// if we don't create a new key natively
var (
signer forest.Signer
//only used if gpg support is not
entity *openpgp.Entity
)
if w.Config.UseGPG == TristateTrue {
secKeys, err := GetSecretKeys()
if err != nil {
return fmt.Errorf("Failed to list available secret keys: %v", err)
}
asInterface := make([]interface{}, len(secKeys))
for i := range secKeys {
asInterface[i] = secKeys[i]
}
const createNewOption = "Create a new key"
asInterface = append(asInterface, createNewOption)
secKey, err := w.Choose("Choose a gpg private key for this identity:", asInterface, func(i interface{}) string {
return i.(string)
})
if secKey.(string) == createNewOption {
w.Display(fmt.Sprintf("\nTo create a new key, run:\n\ngpg --generate-key\n\nRe-run %v when you've done that.\n", os.Args[0]))
return fmt.Errorf("Closing so that you can generate a key")
}
signer, err = forest.NewGPGSigner(secKey.(string))
if err != nil {
return fmt.Errorf("Unable to construct a signer from gpg key for %s: %v", secKey, err)
}
} else {
w.Display("Couldn't find an installation of GPG. That's okay, but if you want the strongest possible security, you may wish to install it before continuing.")
entity, err = openpgp.NewEntity("wisteria", "", "", nil)
if err != nil {
return fmt.Errorf("failed to generate new openpgp keys: %w", err)
}
defer func() {
// if the rest of this function didn't fail, save the private key and
// propagate the error upwards if it fails
if err == nil {
if err := w.PersistNewPrivateKey(entity); err != nil {
err = fmt.Errorf("failed saving new private key: %w", err)
}
}
}()
// guard against failing to sign the public key (depending on whether
// this api changes again):
// https://github.com/golang/go/issues/25463#issuecomment-390778292
// This should force the public identity within this entity to be
// signed by the private key. We can then serialize the identity in
// a way that GPG is happy with (in theory).
if err := entity.SerializePrivate(ioutil.Discard, nil); err != nil {
return fmt.Errorf("failed preserializing private key: %w", err)
}
signer, err = forest.NewNativeSigner(entity)
if err != nil {
return fmt.Errorf("failed to create a native signer for new openpgp entity: %w", err)
}
}
username, err := w.PromptLine("Enter a username:")
if err != nil {
return fmt.Errorf("failed to get username: %v", err)
}
identity, err := forest.NewIdentity(signer, username, []byte{})
if err != nil {
return fmt.Errorf("failed to create identity: %v", err)
}
if err := store.Add(identity); err != nil {
return fmt.Errorf("error saving new identity %s: %v", identity.ID(), err)
}
w.IdentityID = identity.ID().String()
return nil
}
// PersistNewPrivateKey saves the new private key entity to disk in an encrypted
// format using the passphrase available in the PassphraseEnclave
func (w *Wizard) PersistNewPrivateKey(entity *openpgp.Entity) error {
w.Display(`It's time to secure your Arbor identity! This passphrase protects
your account from theft. If you forget it, you will have to make a new account.
There is no password recovery.`)
prompt := "Enter a secure passphrase (nothing will print, but just hit enter when you're done):"
if err := w.ConfigurePassphrase(prompt); err != nil {
return fmt.Errorf("failed prompting for passphrase: %w", err)
}
passphraseBuf, err := w.passphraseEnclave.Open()
if err != nil {
return fmt.Errorf("failed opening passphrase enclave: %w", err)
}
defer passphraseBuf.Destroy()
if err := entity.PrivateKey.Encrypt(passphraseBuf.Bytes()); err != nil {
return fmt.Errorf("failed encrypting primary private key with passphrase: %w", err)
}
for i := range entity.Subkeys {
if err := entity.Subkeys[i].PrivateKey.Encrypt(passphraseBuf.Bytes()); err != nil {
return fmt.Errorf("failed encrypting subkey private key at index %d with passphrase: %w", i, err)
}
}
// write encrypted entity to file
keyringPath := w.KeyRingPath(w.IdentityID)
keyDir := filepath.Dir(keyringPath)
if err := os.MkdirAll(keyDir, 0770); err != nil {
return fmt.Errorf("failed creating directory %s to store private keys: %w", keyDir, err)
}
keyFile, err := os.OpenFile(keyringPath, os.O_CREATE|os.O_EXCL|os.O_WRONLY, 0660)
if err != nil {
return fmt.Errorf("failed opening key file %s: %w", keyringPath, err)
}
defer func() {
// must defer anonymous function in order to actually handle the error returned from
// closing the file. Since we are writing an important file, it is critical to handle
// a possible error here.
if closeErr := keyFile.Close(); closeErr != nil {
// override the return value of the function to be this error
err = fmt.Errorf("failed saving private key file %s: %w", keyringPath, err)
return
}
}()
if err := entity.SerializePrivateWithoutSigning(keyFile, nil); err != nil {
return fmt.Errorf("failed writing private key into file %s: %w", keyringPath, err)
}
return nil
}
// ConfigureIdentity sets up an identity in the Wizard's config. It creates a new one
// if the user requests it.
func (w *Wizard) ConfigureIdentity(store forest.Store) error {
count := 1024
identities, err := store.Recent(fields.NodeTypeIdentity, count)
if err != nil {
return fmt.Errorf("failed looking up recent identities: %w", err)
}
// make sure we get *all* identities
for len(identities) == count {
count *= 2
identities, err = store.Recent(fields.NodeTypeIdentity, count)
if err != nil {
return fmt.Errorf("failed looking up recent identities: %w", err)
}
}
asGeneric := make([]interface{}, len(identities))
for i := range identities {
asGeneric[i] = identities[i]
}
// ensure that we have a typed nil to represent a the choice to create a new identity
var makeNew *forest.Identity = nil
asGeneric = append(asGeneric, makeNew)
choiceInterface, err := w.Choose("Please choose an identity:", asGeneric, func(i interface{}) string {
id := i.(*forest.Identity)
if id == nil {
return "create a new identity"
}
idString := id.ID().String()
return fmt.Sprintf("%-16s %60s", string(id.Name.Blob), idString)
})
if err != nil {
return fmt.Errorf("Error reading user response: %v", err)
}
choice := choiceInterface.(*forest.Identity)
if choice != nil {
w.IdentityID = choice.ID().String()
return nil
}
return w.ConfigureNewIdentity(store)
}
// Run populates the config by asking the user for information and
// inferring from the runtime environment
func (w *Wizard) Run(store forest.Store) error {
err := w.ConfigureIdentity(store)
if err != nil {
return fmt.Errorf("Error configuring user identity: %v", err)
}
identity, err := w.IdentityNode(store)
if err != nil {
return fmt.Errorf("Error getting identity node: %w", err)
}
key, err := identity.PublicKey.AsEntity()
if err != nil {
return fmt.Errorf("Error extracting key: %v", err)
}
pgpIds := []string{}
for keyID := range key.Identities {
pgpIds = append(pgpIds, keyID)
}
w.PGPUser = pgpIds[0]
return nil
}