Files
kopia/cli/password.go
Jarek Kowalski 1b014c875a simplified repository API password handling.
completely rewrote password storage:

- by default passwords are kept in OS-specific keyring (Keychain on macOS,
Windows Credentials Manager on Windows), which can be optionally disabled
to store password in a local file.

- on Linux keychain is disabled by default (does not work reliably
in terminal sessions), but can be enabled using command-line flag.
2018-09-07 21:34:31 -07:00

141 lines
3.2 KiB
Go

package cli
import (
"crypto/sha256"
"encoding/base64"
"fmt"
"io"
"io/ioutil"
"os"
"path/filepath"
"strings"
"github.com/bgentry/speakeasy"
keyring "github.com/zalando/go-keyring"
)
var (
password = app.Flag("password", "Repository password.").Envar("KOPIA_PASSWORD").Short('p').String()
)
func mustAskForNewRepositoryPassword() string {
for {
p1, err := askPass("Enter password to create new repository: ")
failOnError(err)
p2, err := askPass("Re-enter password for verification: ")
failOnError(err)
if p1 != p2 {
fmt.Println("Passwords don't match!")
} else {
return p1
}
}
}
func mustAskForExistingRepositoryPassword() string {
p1, err := askPass("Enter password to open repository: ")
failOnError(err)
fmt.Println()
return p1
}
func mustGetPasswordFromFlags(isNew bool, allowPersistent bool) string {
if !isNew && allowPersistent {
pass, ok := getPersistedPassword(repositoryConfigFileName(), getUserName())
if ok {
return pass
}
}
switch {
case *password != "":
return strings.TrimSpace(*password)
case isNew:
return mustAskForNewRepositoryPassword()
default:
return mustAskForExistingRepositoryPassword()
}
}
// askPass presents a given prompt and asks the user for password.
func askPass(prompt string) (string, error) {
for i := 0; i < 5; i++ {
p, err := speakeasy.Ask(prompt)
if err != nil {
return "", err
}
if len(p) == 0 {
continue
}
return p, nil
}
return "", fmt.Errorf("can't get password")
}
func getPersistedPassword(configFile string, username string) (string, bool) {
if *keyringEnabled {
kr, err := keyring.Get(getKeyringItemID(configFile), username)
if err == nil {
log.Debugf("password for %v retrieved from OS keyring")
return kr, true
}
}
b, err := ioutil.ReadFile(passwordFileName(configFile))
if err == nil {
s, err := base64.StdEncoding.DecodeString(string(b))
if err == nil {
log.Debugf("password for %v retrieved from password file", configFile)
return string(s), true
}
}
log.Debugf("could not find persisted password")
return "", false
}
func persistPassword(configFile string, username string, password string) error {
if *keyringEnabled {
log.Debugf("saving password to OS keyring...")
err := keyring.Set(getKeyringItemID(configFile), username, password)
if err == nil {
log.Infof("Saved password")
return nil
}
return err
}
fn := passwordFileName(configFile)
log.Infof("Saving password to file %v.", fn)
return ioutil.WriteFile(fn, []byte(base64.StdEncoding.EncodeToString([]byte(password))), 0600)
}
func deletePassword(configFile string, username string) {
// delete from both keyring and a file
if *keyringEnabled {
err := keyring.Delete(getKeyringItemID(configFile), username)
if err == nil {
log.Infof("deleted repository password for %v.", configFile)
} else if err != keyring.ErrNotFound {
log.Warningf("unable to delete keyring item %v: %v", getKeyringItemID(configFile), err)
}
}
_ = os.Remove(passwordFileName(configFile))
}
func getKeyringItemID(configFile string) string {
h := sha256.New()
io.WriteString(h, configFile) //nolint:errcheck
return fmt.Sprintf("%v-%x", filepath.Base(configFile), h.Sum(nil)[0:8])
}
func passwordFileName(configFile string) string {
return configFile + ".kopia-password"
}