mirror of
https://github.com/pgpainless/pgpainless.git
synced 2024-11-30 00:02:06 +01:00
163 lines
6.1 KiB
Markdown
163 lines
6.1 KiB
Markdown
# User Guide PGPainless-CLI
|
|
|
|
The module `pgpainless-cli` contains a command line application which conforms to the
|
|
[Stateless OpenPGP Command Line Interface](https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/).
|
|
|
|
You can use it to generate keys, encrypt, sign and decrypt messages, as well as verify signatures.
|
|
|
|
## Implementation
|
|
|
|
Essentially, `pgpainless-cli` is just a very small composing module, which injects `pgpainless-sop` as a
|
|
concrete implementation of `sop-java` into `sop-java-picocli`.
|
|
|
|
## Install
|
|
|
|
The `pgpainless-cli` command line application is available in Debian unstable / Ubuntu 22.10 and can be installed via APT:
|
|
```shell
|
|
$ sudo apt install pgpainless-cli
|
|
```
|
|
|
|
This method comes with man-pages:
|
|
```shell
|
|
$ man pgpainless-cli
|
|
```
|
|
|
|
## Build
|
|
|
|
To build a standalone *fat*-jar:
|
|
```shell
|
|
$ cd pgpainless-cli/
|
|
$ gradle shadowJar
|
|
```
|
|
|
|
The fat-jar can afterwards be found in `build/libs/`.
|
|
|
|
To build a [distributable](https://docs.gradle.org/current/userguide/distribution_plugin.html):
|
|
|
|
```shell
|
|
$ cd pgpainless-cli/
|
|
$ gradle installDist
|
|
```
|
|
|
|
Afterwards, an uncompressed distributable is installed in `build/install/`.
|
|
To execute the application, you can call `build/install/bin/pgpainless-cli{.bat}`
|
|
|
|
Building / updating man pages is a two-step process.
|
|
The contents of the man pages is largely defined by the `sop-java-picocli` source code.
|
|
|
|
In order to generate a fresh set of man pages from the `sop-java-picocli` source, you need to clone that repository
|
|
next to the `pgpainless` repository:
|
|
```shell
|
|
$ ls
|
|
pgpainless
|
|
$ git clone https://github.com/pgpainless/sop-java.git
|
|
$ ls
|
|
pgpainless sop-java
|
|
```
|
|
|
|
Next, you need to execute the `asciiDoctor` gradle task inside the sop-java repository:
|
|
```shell
|
|
$ cd sop-java
|
|
$ gradle asciiDoctor
|
|
```
|
|
|
|
This will generate generic sop manpages in `sop-java-picocli/build/docs/manpage/`.
|
|
|
|
Next, you need to execute a script for converting the `sop` manpages to fit the `pgpainless-cli` command with the help
|
|
of a script in the `pgpainless` repository:
|
|
```shell
|
|
$ cd ../pgpainless/pgpainless-cli
|
|
$ ./rewriteManPages.sh
|
|
```
|
|
|
|
The resulting updated man pages are placed in `packaging/man/`.
|
|
|
|
## Usage
|
|
|
|
Hereafter, the program will be referred to as `pgpainless-cli`.
|
|
|
|
```
|
|
$ pgpainless-cli help
|
|
Stateless OpenPGP Protocol
|
|
Usage: pgpainless-cli [--stacktrace] [COMMAND]
|
|
|
|
Options:
|
|
--stacktrace Print stacktrace
|
|
|
|
Commands:
|
|
version Display version information about the tool
|
|
list-profiles Emit a list of profiles supported by the identified
|
|
subcommand
|
|
generate-key Generate a secret key
|
|
change-key-password Update the password of a key
|
|
revoke-key Generate revocation certificates
|
|
extract-cert Extract a public key certificate from a secret key
|
|
sign Create a detached message signature
|
|
verify Verify a detached signature
|
|
encrypt Encrypt a message from standard input
|
|
decrypt Decrypt a message
|
|
inline-detach Split signatures from a clearsigned message
|
|
inline-sign Create an inline-signed message
|
|
inline-verify Verify an inline-signed message
|
|
armor Add ASCII Armor to standard input
|
|
dearmor Remove ASCII Armor from standard input
|
|
help Display usage information for the specified subcommand
|
|
|
|
Exit Codes:
|
|
0 Successful program execution
|
|
1 Generic program error
|
|
3 Verification requested but no verifiable signature found
|
|
13 Unsupported asymmetric algorithm
|
|
17 Certificate is not encryption capable
|
|
19 Usage error: Missing argument
|
|
23 Incomplete verification instructions
|
|
29 Unable to decrypt
|
|
31 Password is not human-readable
|
|
37 Unsupported Option
|
|
41 Invalid data or data of wrong type encountered
|
|
53 Non-text input received where text was expected
|
|
59 Output file already exists
|
|
61 Input file does not exist
|
|
67 Cannot unlock password protected secret key
|
|
69 Unsupported subcommand
|
|
71 Unsupported special prefix (e.g. "@ENV/@FD") of indirect parameter
|
|
73 Ambiguous input (a filename matching the designator already exists)
|
|
79 Key is not signing capable
|
|
83 Options were supplied that are incompatible with each other
|
|
89 The requested profile is unsupported, or the indicated subcommand does
|
|
not accept profiles
|
|
```
|
|
|
|
To get help on a subcommand, e.g. `encrypt`, just call the help subcommand followed by the subcommand you
|
|
are interested in (e.g. `pgpainless-cli help encrypt`).
|
|
|
|
## Examples
|
|
```shell
|
|
$ # Generate a key
|
|
$ pgpainless-cli generate-key "Alice <alice@pgpainless.org>" > key.asc
|
|
$ # Extract a certificate from a key
|
|
$ cat key.asc | pgpainless-cli extract-cert > cert.asc
|
|
$ # Create an encrypted signed message
|
|
$ echo "Hello, World!" | pgpainless-cli encrypt cert.asc --sign-with key.asc > msg.asc
|
|
$ # Decrypt an encrypted message and verify the signature
|
|
$ cat msg.asc | pgpainless-cli decrypt key.asc --verify-with cert.asc --verifications-out verifications.txt
|
|
Hello, World!
|
|
$ cat verifications.txt
|
|
2022-11-15T21:25:48Z 4FF67C69150209ED8139DE22578CB2FABD5D7897 9000235358B8CEA6A368EC86DE56DC2D942ACAA4
|
|
```
|
|
|
|
## Indirect Data Types
|
|
|
|
Some commands take options whose arguments are indirect data types. Those are arguments which are not used directly,
|
|
but instead they point to a place where the argument value can be sourced from, such as a file, an environment variable
|
|
or a file descriptor.
|
|
|
|
It is important to keep in mind, that options like `--with-password` or `--with-key-password` are examples for such
|
|
indirect data types. If you want to unlock a key whose password is `sw0rdf1sh`, you *cannot* provide the password
|
|
like `--with-key-password sw0rdf1sh`, but instead you have to either write out the password into a file and provide
|
|
the file's path (e.g. `--with-key-password /path/to/file`), store the password in an environment variable and pass that
|
|
(e.g. `--with-key-password @ENV:myvar`), or provide a numbered file descriptor from which the password can be read
|
|
(e.g. `--with-key-password @FD:4`).
|
|
|
|
Note, that environment variables and file descriptors can only be used to pass input data to the program.
|
|
For output parameters (e.g. `--verifications-out`) only file paths are allowed.
|