I think this can be included if you test and verify the patch. Definetely
very useful.


On Sat, May 10, 2014 at 10:23 AM, Troy Sankey <sankey...@gmail.com> wrote:

> Hi sup developers,
>
> Recently I sent an encrypted message to a group of recipients, thinking
> that all their keys were still valid.  However, one of them had an
> expired key, so the message was not encrypted to that recipient and he
> could not read it.
>
> I want sup to prompt the user about potentially invalid keys before
> sending a message.  I think the code will look something like this:
>
>
> diff --git a/lib/sup/crypto.rb b/lib/sup/crypto.rb
> index fd8f824..88ae3cc 100644
> --- a/lib/sup/crypto.rb
> +++ b/lib/sup/crypto.rb
> @@ -167,6 +167,14 @@ EOS
>                                 {:operation => "encrypt", :options =>
> gpg_opts}) || gpg_opts
>      recipients = to + [from]
>      recipients = HookManager.run("gpg-expand-keys", { :recipients =>
> recipients }) || recipients
> +
> +    # make sure all recipients can be encrypted-to
> +    recipients.each do |recipient|
> +      if GPGME::Key.find(:public, recipient).length == 0 and
> !BufferManager.ask_yes_or_no("Could not encrypt to #{recipient}. Really
> send?")
> +        raise Error, "Send message cancelled."
> +      end
> +    end
> +
>      begin
>        if GPGME.respond_to?('encrypt')
>          cipher = GPGME.encrypt(recipients, format_payload(payload),
> gpg_opts)
>
>
> I have not tested this patch, so if it looks wrong then it probably is!
> Does anybody have any thoughts on this feature?
>
> Troy
>
> _______________________________________________
> Sup-devel mailing list
> Sup-devel@rubyforge.org
> http://rubyforge.org/mailman/listinfo/sup-devel
>
>
_______________________________________________
Sup-devel mailing list
Sup-devel@rubyforge.org
http://rubyforge.org/mailman/listinfo/sup-devel

Reply via email to