diff options
author | Daniel Mueller <deso@posteo.net> | 2020-08-28 18:44:45 -0700 |
---|---|---|
committer | Daniel Mueller <deso@posteo.net> | 2020-08-28 18:44:45 -0700 |
commit | b605614e5b3dab828e4f33c300836deab421be34 (patch) | |
tree | 5d0f250f0ae24ba595b983c79fa9bad9045a650b | |
parent | 11344455b0629f989d8b78c27ed0e7d654fc74ef (diff) | |
download | nitrocli-b605614e5b3dab828e4f33c300836deab421be34.tar.gz nitrocli-b605614e5b3dab828e4f33c300836deab421be34.tar.bz2 |
Use anyhow for error handling
This patch changes our error handling approach from the ground up:
instead of having a globally used Error enum that contains variants for
all possible errors, we now use anyhow's Error type. This approach is
more dynamic (and not statically typed), but it allows for more fine
grained error messages and overall more user-friendly error reporting.
Overall it also is a net simplification. While we have one dynamic cast
now, in order to be able to handle erroneous password/PIN entries
correctly, that is considered a reasonable compromise.
-rw-r--r-- | CHANGELOG.md | 2 | ||||
-rw-r--r-- | Cargo.lock | 7 | ||||
-rw-r--r-- | Cargo.toml | 3 | ||||
-rw-r--r-- | src/arg_util.rs | 2 | ||||
-rw-r--r-- | src/args.rs | 16 | ||||
-rw-r--r-- | src/commands.rs | 377 | ||||
-rw-r--r-- | src/main.rs | 7 | ||||
-rw-r--r-- | src/pinentry.rs | 62 | ||||
-rw-r--r-- | src/tests/otp.rs | 14 | ||||
-rw-r--r-- | src/tests/pws.rs | 18 | ||||
-rw-r--r-- | src/tests/status.rs | 9 |
11 files changed, 277 insertions, 240 deletions
diff --git a/CHANGELOG.md b/CHANGELOG.md index d92255d..7c65644 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,6 +1,8 @@ Unreleased ---------- - Changed default OTP format from `hex` to `base32` +- Improved error reporting format and fidelity + - Added `anyhow` dependency in version `1.0.32` - Updated minimum required Rust version to `1.42.0` - Bumped `nitrokey` dependency to `0.7.1` @@ -10,6 +10,12 @@ dependencies = [ ] [[package]] +name = "anyhow" +version = "1.0.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6b602bfe940d21c130f3895acd65221e8a61270debe89d628b9cb4e3ccb8569b" + +[[package]] name = "base32" version = "0.4.0" source = "registry+https://github.com/rust-lang/crates.io-index" @@ -86,6 +92,7 @@ checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400" name = "nitrocli" version = "0.3.3" dependencies = [ + "anyhow", "base32", "libc", "nitrokey", @@ -46,6 +46,9 @@ lto = true codegen-units = 1 incremental = false +[dependencies.anyhow] +version = "1.0" + [dependencies.base32] version = "0.4.0" diff --git a/src/arg_util.rs b/src/arg_util.rs index 3a4c001..be361c7 100644 --- a/src/arg_util.rs +++ b/src/arg_util.rs @@ -50,7 +50,7 @@ macro_rules! Command { pub fn execute( self, ctx: &mut crate::ExecCtx<'_>, - ) -> crate::Result<()> { + ) -> anyhow::Result<()> { match self { $( $name::$var$((tr!(args, $inner)))? => $exec(ctx $(,tr!(args, $inner))?), diff --git a/src/args.rs b/src/args.rs index 56a10b4..0f548e4 100644 --- a/src/args.rs +++ b/src/args.rs @@ -134,16 +134,14 @@ pub enum ConfigOption<T> { } impl<T> ConfigOption<T> { - pub fn try_from(disable: bool, value: Option<T>, name: &'static str) -> Result<Self, String> { + pub fn try_from(disable: bool, value: Option<T>, name: &'static str) -> anyhow::Result<Self> { if disable { - if value.is_some() { - Err(format!( - "--{name} and --no-{name} are mutually exclusive", - name = name - )) - } else { - Ok(ConfigOption::Disable) - } + anyhow::ensure!( + value.is_none(), + "--{name} and --no-{name} are mutually exclusive", + name = name + ); + Ok(ConfigOption::Disable) } else { match value { Some(value) => Ok(ConfigOption::Enable(value)), diff --git a/src/commands.rs b/src/commands.rs index a2b6004..c9dd629 100644 --- a/src/commands.rs +++ b/src/commands.rs @@ -17,13 +17,15 @@ // * along with this program. If not, see <http://www.gnu.org/licenses/>. * // ************************************************************************* +use std::convert::TryFrom as _; use std::fmt; use std::mem; -use std::result; use std::thread; use std::time; use std::u8; +use anyhow::Context as _; + use libc::sync; use nitrokey::ConfigureOtp; @@ -32,16 +34,8 @@ use nitrokey::GenerateOtp; use nitrokey::GetPasswordSafe; use crate::args; -use crate::error; -use crate::error::Error; use crate::pinentry; use crate::ExecCtx; -use crate::Result; - -/// Create an `error::Error` with an error message of the format `msg: err`. -fn get_error(msg: &'static str, err: nitrokey::Error) -> Error { - Error::NitrokeyError(Some(msg), err) -} /// Set `libnitrokey`'s log level based on the execution context's verbosity. fn set_log_level(ctx: &mut ExecCtx<'_>) { @@ -60,53 +54,52 @@ fn set_log_level(ctx: &mut ExecCtx<'_>) { } /// Connect to any Nitrokey device and do something with it. -fn with_device<F>(ctx: &mut ExecCtx<'_>, op: F) -> Result<()> +fn with_device<F>(ctx: &mut ExecCtx<'_>, op: F) -> anyhow::Result<()> where - F: FnOnce(&mut ExecCtx<'_>, nitrokey::DeviceWrapper<'_>) -> Result<()>, + F: FnOnce(&mut ExecCtx<'_>, nitrokey::DeviceWrapper<'_>) -> anyhow::Result<()>, { - let mut manager = nitrokey::take()?; + let mut manager = + nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?; + set_log_level(ctx); let device = match ctx.model { - Some(model) => manager.connect_model(model.into()).map_err(|_| { - let error = format!("Nitrokey {} device not found", model.as_user_facing_str()); - Error::Error(error) + Some(model) => manager.connect_model(model.into()).with_context(|| { + anyhow::anyhow!("Nitrokey {} device not found", model.as_user_facing_str()) })?, - None => manager - .connect() - .map_err(|_| Error::from("Nitrokey device not found"))?, + None => manager.connect().context("Nitrokey device not found")?, }; op(ctx, device) } /// Connect to a Nitrokey Storage device and do something with it. -fn with_storage_device<F>(ctx: &mut ExecCtx<'_>, op: F) -> Result<()> +fn with_storage_device<F>(ctx: &mut ExecCtx<'_>, op: F) -> anyhow::Result<()> where - F: FnOnce(&mut ExecCtx<'_>, nitrokey::Storage<'_>) -> Result<()>, + F: FnOnce(&mut ExecCtx<'_>, nitrokey::Storage<'_>) -> anyhow::Result<()>, { - let mut manager = nitrokey::take()?; + let mut manager = + nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?; + set_log_level(ctx); if let Some(model) = ctx.model { if model != args::DeviceModel::Storage { - return Err(Error::from( - "This command is only available on the Nitrokey Storage", - )); + anyhow::bail!("This command is only available on the Nitrokey Storage"); } } let device = manager .connect_storage() - .map_err(|_| Error::from("Nitrokey Storage device not found"))?; + .context("Nitrokey Storage device not found")?; op(ctx, device) } /// Connect to any Nitrokey device, retrieve a password safe handle, and /// do something with it. -fn with_password_safe<F>(ctx: &mut ExecCtx<'_>, mut op: F) -> Result<()> +fn with_password_safe<F>(ctx: &mut ExecCtx<'_>, mut op: F) -> anyhow::Result<()> where - F: FnMut(&mut ExecCtx<'_>, nitrokey::PasswordSafe<'_, '_>) -> Result<()>, + F: FnMut(&mut ExecCtx<'_>, nitrokey::PasswordSafe<'_, '_>) -> anyhow::Result<()>, { with_device(ctx, |ctx, mut device| { let pin_entry = pinentry::PinEntry::from(args::PinType::User, &device)?; @@ -118,7 +111,7 @@ where move |ctx, _, pin| { let pws = device .get_password_safe(pin) - .map_err(|err| ((), Error::from(err)))?; + .map_err(|err| ((), err.into()))?; op(ctx, pws).map_err(|err| ((), err)) }, @@ -136,10 +129,10 @@ fn authenticate<'mgr, D, A, F>( pin_type: args::PinType, msg: &'static str, op: F, -) -> Result<A> +) -> anyhow::Result<A> where D: Device<'mgr>, - F: FnMut(&mut ExecCtx<'_>, D, &str) -> result::Result<A, (D, nitrokey::Error)>, + F: FnMut(&mut ExecCtx<'_>, D, &str) -> Result<A, (D, anyhow::Error)>, { let pin_entry = pinentry::PinEntry::from(pin_type, &device)?; @@ -147,7 +140,10 @@ where } /// Authenticate the given device with the user PIN. -fn authenticate_user<'mgr, T>(ctx: &mut ExecCtx<'_>, device: T) -> Result<nitrokey::User<'mgr, T>> +fn authenticate_user<'mgr, T>( + ctx: &mut ExecCtx<'_>, + device: T, +) -> anyhow::Result<nitrokey::User<'mgr, T>> where T: Device<'mgr>, { @@ -156,12 +152,21 @@ where device, args::PinType::User, "Could not authenticate as user", - |_ctx, device, pin| device.authenticate_user(pin), + |_ctx, device, pin| { + device.authenticate_user(pin).or_else(|(x, err)| { + Err(err) + .context("Failed to authenticate as user") + .map_err(|err| (x, err)) + }) + }, ) } /// Authenticate the given device with the admin PIN. -fn authenticate_admin<'mgr, T>(ctx: &mut ExecCtx<'_>, device: T) -> Result<nitrokey::Admin<'mgr, T>> +fn authenticate_admin<'mgr, T>( + ctx: &mut ExecCtx<'_>, + device: T, +) -> anyhow::Result<nitrokey::Admin<'mgr, T>> where T: Device<'mgr>, { @@ -170,7 +175,13 @@ where device, args::PinType::Admin, "Could not authenticate as admin", - |_ctx, device, pin| device.authenticate_admin(pin), + |_ctx, device, pin| { + device.authenticate_admin(pin).or_else(|(x, err)| { + Err(err) + .context("Failed to authenticate as admin") + .map_err(|err| (x, err)) + }) + }, ) } @@ -201,16 +212,15 @@ fn get_volume_status(status: &nitrokey::VolumeStatus) -> &'static str { /// the first try, this function will call `op` with `data`. At the /// second or third try, it will call `op` with the data returned by the /// previous call to `op`. -fn try_with_pin_and_data_with_pinentry<D, F, R, E>( +fn try_with_pin_and_data_with_pinentry<D, F, R>( ctx: &mut ExecCtx<'_>, pin_entry: &pinentry::PinEntry, - msg: &'static str, + _msg: &'static str, data: D, mut op: F, -) -> Result<R> +) -> anyhow::Result<R> where - F: FnMut(&mut ExecCtx<'_>, D, &str) -> result::Result<R, (D, E)>, - E: error::TryInto<nitrokey::Error>, + F: FnMut(&mut ExecCtx<'_>, D, &str) -> Result<R, (D, anyhow::Error)>, { let mut data = data; let mut retry = 3; @@ -219,10 +229,10 @@ where let pin = pinentry::inquire(ctx, pin_entry, pinentry::Mode::Query, error_msg)?; match op(ctx, data, &pin) { Ok(result) => return Ok(result), - Err((new_data, err)) => match err.try_into() { + Err((new_data, err)) => match err.downcast::<nitrokey::Error>() { Ok(err) => match err { nitrokey::Error::CommandError(nitrokey::CommandError::WrongPassword) => { - pinentry::clear(pin_entry)?; + pinentry::clear(pin_entry).context("Failed to clear cached secret")?; retry -= 1; if retry > 0 { @@ -230,27 +240,26 @@ where data = new_data; continue; } - return Err(get_error(msg, err)); + anyhow::bail!(err); } - err => return Err(get_error(msg, err)), + err => anyhow::bail!(err), }, - Err(err) => return Err(err), + Err(err) => anyhow::bail!(err), }, }; } } /// Try to execute the given function with a PIN. -fn try_with_pin_and_data<D, F, R, E>( +fn try_with_pin_and_data<D, F, R>( ctx: &mut ExecCtx<'_>, pin_entry: &pinentry::PinEntry, msg: &'static str, data: D, mut op: F, -) -> Result<R> +) -> anyhow::Result<R> where - F: FnMut(&mut ExecCtx<'_>, D, &str) -> result::Result<R, (D, E)>, - E: Into<Error> + error::TryInto<nitrokey::Error>, + F: FnMut(&mut ExecCtx<'_>, D, &str) -> Result<R, (D, anyhow::Error)>, { let pin = match pin_entry.pin_type() { // Ideally we would not clone here, but that would require us to @@ -261,13 +270,10 @@ where }; if let Some(pin) = pin { - let pin = pin.to_str().ok_or_else(|| { - Error::Error(format!( - "{}: Failed to read PIN due to invalid Unicode data", - msg - )) - })?; - op(ctx, data, &pin).map_err(|(_, err)| err.into()) + let pin = pin + .to_str() + .ok_or_else(|| anyhow::anyhow!("Failed to read PIN: Invalid Unicode data found"))?; + op(ctx, data, &pin).map_err(|(_, err)| err) } else { try_with_pin_and_data_with_pinentry(ctx, pin_entry, msg, data, op) } @@ -277,15 +283,14 @@ where /// /// This function behaves exactly as `try_with_pin_and_data`, but /// it refrains from passing any data to it. -fn try_with_pin<F, E>( +fn try_with_pin<F>( ctx: &mut ExecCtx<'_>, pin_entry: &pinentry::PinEntry, msg: &'static str, mut op: F, -) -> Result<()> +) -> anyhow::Result<()> where - F: FnMut(&str) -> result::Result<(), E>, - E: Into<Error> + error::TryInto<nitrokey::Error>, + F: FnMut(&str) -> anyhow::Result<()>, { try_with_pin_and_data(ctx, pin_entry, msg, (), |_ctx, data, pin| { op(pin).map_err(|err| (data, err)) @@ -293,7 +298,10 @@ where } /// Pretty print the status of a Nitrokey Storage. -fn print_storage_status(ctx: &mut ExecCtx<'_>, status: &nitrokey::StorageStatus) -> Result<()> { +fn print_storage_status( + ctx: &mut ExecCtx<'_>, + status: &nitrokey::StorageStatus, +) -> anyhow::Result<()> { println!( ctx, r#" Storage: @@ -327,10 +335,10 @@ fn print_status( ctx: &mut ExecCtx<'_>, model: &'static str, device: &nitrokey::DeviceWrapper<'_>, -) -> Result<()> { +) -> anyhow::Result<()> { let serial_number = device .get_serial_number() - .map_err(|err| get_error("Could not query the serial number", err))?; + .context("Could not query the serial number")?; println!( ctx, @@ -342,15 +350,21 @@ fn print_status( admin retry count: {arc}"#, model = model, id = serial_number, - fwv = device.get_firmware_version()?, - urc = device.get_user_retry_count()?, - arc = device.get_admin_retry_count()?, + fwv = device + .get_firmware_version() + .context("Failed to retrieve firmware version")?, + urc = device + .get_user_retry_count() + .context("Failed to retrieve user retry count")?, + arc = device + .get_admin_retry_count() + .context("Failed to retrieve admin retry count")?, )?; if let nitrokey::DeviceWrapper::Storage(device) = device { let status = device .get_storage_status() - .map_err(|err| get_error("Getting Storage status failed", err))?; + .context("Failed to retrieve storage status")?; print_storage_status(ctx, &status) } else { @@ -359,7 +373,7 @@ fn print_status( } /// Inquire the status of the nitrokey. -pub fn status(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn status(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_device(ctx, |ctx, device| { let model = match device { nitrokey::DeviceWrapper::Pro(_) => "Pro", @@ -370,15 +384,17 @@ pub fn status(ctx: &mut ExecCtx<'_>) -> Result<()> { } /// List the attached Nitrokey devices. -pub fn list(ctx: &mut ExecCtx<'_>, no_connect: bool) -> Result<()> { +pub fn list(ctx: &mut ExecCtx<'_>, no_connect: bool) -> anyhow::Result<()> { set_log_level(ctx); - let device_infos = nitrokey::list_devices()?; + let device_infos = + nitrokey::list_devices().context("Failed to list connected Nitrokey devices")?; if device_infos.is_empty() { println!(ctx, "No Nitrokey device connected")?; } else { println!(ctx, "device path\tmodel\tserial number")?; - let mut manager = nitrokey::take()?; + let mut manager = + nitrokey::take().context("Failed to acquire access to Nitrokey device manager")?; for device_info in device_infos { let model = device_info @@ -394,8 +410,13 @@ pub fn list(ctx: &mut ExecCtx<'_>, no_connect: bool) -> Result<()> { if no_connect { "N/A".to_string() } else { - let device = manager.connect_path(device_info.path.clone())?; - device.get_serial_number()?.to_string() + let device = manager + .connect_path(device_info.path.clone()) + .context("Failed to connect to Nitrokey")?; + device + .get_serial_number() + .context("Failed to retrieve device serial number")? + .to_string() } } }; @@ -408,16 +429,18 @@ pub fn list(ctx: &mut ExecCtx<'_>, no_connect: bool) -> Result<()> { } /// Perform a factory reset. -pub fn reset(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn reset(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_device(ctx, |ctx, mut device| { let pin_entry = pinentry::PinEntry::from(args::PinType::Admin, &device)?; // To force the user to enter the admin PIN before performing a // factory reset, we clear the pinentry cache for the admin PIN. - pinentry::clear(&pin_entry)?; + pinentry::clear(&pin_entry).context("Failed to clear cached secret")?; try_with_pin(ctx, &pin_entry, "Factory reset failed", |pin| { - device.factory_reset(&pin)?; + device + .factory_reset(&pin) + .context("Failed to reset to factory settings")?; // Work around for a timing issue between factory_reset and // build_aes_key, see // https://github.com/Nitrokey/nitrokey-storage-firmware/issues/80 @@ -426,13 +449,18 @@ pub fn reset(ctx: &mut ExecCtx<'_>) -> Result<()> { // build_aes_key after a factory reset on Pro devices. // https://github.com/Nitrokey/nitrokey-pro-firmware/issues/57 let _ = device.get_user_retry_count(); - device.build_aes_key(nitrokey::DEFAULT_ADMIN_PIN) + device + .build_aes_key(nitrokey::DEFAULT_ADMIN_PIN) + .context("Failed to rebuild AES key") }) }) } /// Change the configuration of the unencrypted volume. -pub fn unencrypted_set(ctx: &mut ExecCtx<'_>, mode: args::UnencryptedVolumeMode) -> Result<()> { +pub fn unencrypted_set( + ctx: &mut ExecCtx<'_>, + mode: args::UnencryptedVolumeMode, +) -> anyhow::Result<()> { with_storage_device(ctx, |ctx, mut device| { let pin_entry = pinentry::PinEntry::from(args::PinType::Admin, &device)?; let mode = match mode { @@ -448,13 +476,17 @@ pub fn unencrypted_set(ctx: &mut ExecCtx<'_>, mode: args::UnencryptedVolumeMode) ctx, &pin_entry, "Changing unencrypted volume mode failed", - |pin| device.set_unencrypted_volume_mode(&pin, mode), + |pin| { + device + .set_unencrypted_volume_mode(&pin, mode) + .context("Failed to change unencrypted volume mode") + }, ) }) } /// Open the encrypted volume on the Nitrokey. -pub fn encrypted_open(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn encrypted_open(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_storage_device(ctx, |ctx, mut device| { let pin_entry = pinentry::PinEntry::from(args::PinType::User, &device)?; @@ -463,13 +495,15 @@ pub fn encrypted_open(ctx: &mut ExecCtx<'_>) -> Result<()> { unsafe { sync() }; try_with_pin(ctx, &pin_entry, "Opening encrypted volume failed", |pin| { - device.enable_encrypted_volume(&pin) + device + .enable_encrypted_volume(&pin) + .context("Failed to open encrypted volume") }) }) } /// Close the previously opened encrypted volume. -pub fn encrypted_close(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn encrypted_close(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_storage_device(ctx, |_ctx, mut device| { // Flush all filesystem caches to disk. We are mostly interested in // making sure that the encrypted volume on the Nitrokey we are @@ -479,40 +513,41 @@ pub fn encrypted_close(ctx: &mut ExecCtx<'_>) -> Result<()> { device .disable_encrypted_volume() - .map_err(|err| get_error("Closing encrypted volume failed", err)) + .context("Failed to close encrypted volume") }) } /// Create a hidden volume. -pub fn hidden_create(ctx: &mut ExecCtx<'_>, slot: u8, start: u8, end: u8) -> Result<()> { +pub fn hidden_create(ctx: &mut ExecCtx<'_>, slot: u8, start: u8, end: u8) -> anyhow::Result<()> { with_storage_device(ctx, |ctx, mut device| { let pwd_entry = pinentry::PwdEntry::from(&device)?; let pwd = if let Some(pwd) = &ctx.password { pwd .to_str() - .ok_or_else(|| Error::from("Failed to read password: invalid Unicode data found")) + .ok_or_else(|| anyhow::anyhow!("Failed to read password: invalid unicode data found")) .map(ToOwned::to_owned) } else { - pinentry::choose(ctx, &pwd_entry) + pinentry::choose(ctx, &pwd_entry).context("Failed to select new PIN") }?; device .create_hidden_volume(slot, start, end, &pwd) - .map_err(|err| get_error("Creating hidden volume failed", err)) + .context("Failed to create hidden volume") }) } /// Open a hidden volume. -pub fn hidden_open(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn hidden_open(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_storage_device(ctx, |ctx, mut device| { let pwd_entry = pinentry::PwdEntry::from(&device)?; let pwd = if let Some(pwd) = &ctx.password { pwd .to_str() - .ok_or_else(|| Error::from("Failed to read password: invalid Unicode data found")) + .ok_or_else(|| anyhow::anyhow!("Failed to read password: Invalid Unicode data found")) .map(ToOwned::to_owned) } else { pinentry::inquire(ctx, &pwd_entry, pinentry::Mode::Query, None) + .context("Failed to inquire PIN") }?; // We may forcefully close an encrypted volume, if active, so be sure @@ -521,18 +556,18 @@ pub fn hidden_open(ctx: &mut ExecCtx<'_>) -> Result<()> { device .enable_hidden_volume(&pwd) - .map_err(|err| get_error("Opening hidden volume failed", err)) + .context("Failed to open hidden volume") }) } /// Close a previously opened hidden volume. -pub fn hidden_close(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn hidden_close(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_storage_device(ctx, |_ctx, mut device| { unsafe { sync() }; device .disable_hidden_volume() - .map_err(|err| get_error("Closing hidden volume failed", err)) + .context("Failed to close hidden volume") }) } @@ -545,11 +580,9 @@ fn format_option<T: fmt::Display>(option: Option<T>) -> String { } /// Read the Nitrokey configuration. -pub fn config_get(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn config_get(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_device(ctx, |ctx, device| { - let config = device - .get_config() - .map_err(|err| get_error("Could not get configuration", err))?; + let config = device.get_config().context("Failed to get configuration")?; println!( ctx, r#"Config: @@ -567,10 +600,13 @@ pub fn config_get(ctx: &mut ExecCtx<'_>) -> Result<()> { } /// Write the Nitrokey configuration. -pub fn config_set(ctx: &mut ExecCtx<'_>, args: args::ConfigSetArgs) -> Result<()> { - let numlock = args::ConfigOption::try_from(args.no_numlock, args.numlock, "numlock")?; - let capslock = args::ConfigOption::try_from(args.no_capslock, args.capslock, "capslock")?; - let scrollock = args::ConfigOption::try_from(args.no_scrollock, args.scrollock, "scrollock")?; +pub fn config_set(ctx: &mut ExecCtx<'_>, args: args::ConfigSetArgs) -> anyhow::Result<()> { + let numlock = args::ConfigOption::try_from(args.no_numlock, args.numlock, "numlock") + .context("Failed to apply numlock configuration")?; + let capslock = args::ConfigOption::try_from(args.no_capslock, args.capslock, "capslock") + .context("Failed to apply capslock configuration")?; + let scrollock = args::ConfigOption::try_from(args.no_scrollock, args.scrollock, "scrollock") + .context("Failed to apply scrollock configuration")?; let otp_pin = if args.otp_pin { Some(true) } else if args.no_otp_pin { @@ -583,7 +619,7 @@ pub fn config_set(ctx: &mut ExecCtx<'_>, args: args::ConfigSetArgs) -> Result<() let mut device = authenticate_admin(ctx, device)?; let config = device .get_config() - .map_err(|err| get_error("Could not get configuration", err))?; + .context("Failed to get current configuration")?; let config = nitrokey::Config { numlock: numlock.or(config.numlock), capslock: capslock.or(config.capslock), @@ -592,20 +628,18 @@ pub fn config_set(ctx: &mut ExecCtx<'_>, args: args::ConfigSetArgs) -> Result<() }; device .write_config(config) - .map_err(|err| get_error("Could not set configuration", err)) + .context("Failed to set new configuration") }) } /// Lock the Nitrokey device. -pub fn lock(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn lock(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_device(ctx, |_ctx, mut device| { - device - .lock() - .map_err(|err| get_error("Could not lock the device", err)) + device.lock().context("Failed to lock the device") }) } -fn get_otp<T>(slot: u8, algorithm: args::OtpAlgorithm, device: &mut T) -> Result<String> +fn get_otp<T>(slot: u8, algorithm: args::OtpAlgorithm, device: &mut T) -> anyhow::Result<String> where T: GenerateOtp, { @@ -613,13 +647,13 @@ where args::OtpAlgorithm::Hotp => device.get_hotp_code(slot), args::OtpAlgorithm::Totp => device.get_totp_code(slot), } - .map_err(|err| get_error("Could not generate OTP", err)) + .context("Failed to generate OTP") } -fn get_unix_timestamp() -> Result<u64> { +fn get_unix_timestamp() -> anyhow::Result<u64> { time::SystemTime::now() .duration_since(time::UNIX_EPOCH) - .map_err(|_| Error::from("Current system time is before the Unix epoch")) + .context("Current system time is before the Unix epoch") .map(|duration| duration.as_secs()) } @@ -629,22 +663,22 @@ pub fn otp_get( slot: u8, algorithm: args::OtpAlgorithm, time: Option<u64>, -) -> Result<()> { +) -> anyhow::Result<()> { with_device(ctx, |ctx, mut device| { if algorithm == args::OtpAlgorithm::Totp { device .set_time( match time { Some(time) => time, - None => get_unix_timestamp()?, + None => get_unix_timestamp().context("Failed to retrieve current time")?, }, true, ) - .map_err(|err| get_error("Could not set time", err))?; + .context("Failed to set new time")?; } let config = device .get_config() - .map_err(|err| get_error("Could not get device configuration", err))?; + .context("Failed to get get current device configuration")?; let otp = if config.user_password { let mut user = authenticate_user(ctx, device)?; get_otp(slot, algorithm, &mut user) @@ -670,25 +704,23 @@ fn format_bytes(bytes: &[u8]) -> String { /// libnitrokey expects secrets as hexadecimal strings. This function transforms an ASCII string /// into a hexadecimal string or returns an error if the given string contains non-ASCII /// characters. -fn prepare_ascii_secret(secret: &str) -> Result<String> { +fn prepare_ascii_secret(secret: &str) -> anyhow::Result<String> { if secret.is_ascii() { Ok(format_bytes(&secret.as_bytes())) } else { - Err(Error::from( - "The given secret is not an ASCII string despite --format ascii being set", - )) + anyhow::bail!("The given secret is not an ASCII string as expected") } } /// Prepare a base32 secret string for libnitrokey. -fn prepare_base32_secret(secret: &str) -> Result<String> { +fn prepare_base32_secret(secret: &str) -> anyhow::Result<String> { base32::decode(base32::Alphabet::RFC4648 { padding: false }, secret) .map(|vec| format_bytes(&vec)) - .ok_or_else(|| Error::from("Could not parse base32 secret")) + .ok_or_else(|| anyhow::anyhow!("Failed to parse base32 secret")) } /// Configure a one-time password slot on the Nitrokey device. -pub fn otp_set(ctx: &mut ExecCtx<'_>, mut args: args::OtpSetArgs) -> Result<()> { +pub fn otp_set(ctx: &mut ExecCtx<'_>, mut args: args::OtpSetArgs) -> anyhow::Result<()> { let mut data = nitrokey::OtpSlotData { number: args.slot, name: mem::take(&mut args.name), @@ -721,20 +753,24 @@ pub fn otp_set(ctx: &mut ExecCtx<'_>, mut args: args::OtpSetArgs) -> Result<()> args::OtpAlgorithm::Hotp => device.write_hotp_slot(data, args.counter), args::OtpAlgorithm::Totp => device.write_totp_slot(data, args.time_window), } - .map_err(|err| get_error("Could not write OTP slot", err))?; + .context("Failed to write OTP slot")?; Ok(()) }) } /// Clear an OTP slot. -pub fn otp_clear(ctx: &mut ExecCtx<'_>, slot: u8, algorithm: args::OtpAlgorithm) -> Result<()> { +pub fn otp_clear( + ctx: &mut ExecCtx<'_>, + slot: u8, + algorithm: args::OtpAlgorithm, +) -> anyhow::Result<()> { with_device(ctx, |ctx, device| { let mut device = authenticate_admin(ctx, device)?; match algorithm { args::OtpAlgorithm::Hotp => device.erase_hotp_slot(slot), args::OtpAlgorithm::Totp => device.erase_totp_slot(slot), } - .map_err(|err| get_error("Could not clear OTP slot", err))?; + .context("Failed to clear OTP slot")?; Ok(()) }) } @@ -744,19 +780,16 @@ fn print_otp_status( algorithm: args::OtpAlgorithm, device: &nitrokey::DeviceWrapper<'_>, all: bool, -) -> Result<()> { +) -> anyhow::Result<()> { let mut slot: u8 = 0; loop { let result = match algorithm { args::OtpAlgorithm::Hotp => device.get_hotp_slot_name(slot), args::OtpAlgorithm::Totp => device.get_totp_slot_name(slot), }; - slot = match slot.checked_add(1) { - Some(slot) => slot, - None => { - return Err(Error::from("Integer overflow when iterating OTP slots")); - } - }; + slot = slot + .checked_add(1) + .ok_or_else(|| anyhow::anyhow!("Encountered integer overflow when iterating OTP slots"))?; let name = match result { Ok(name) => name, Err(nitrokey::Error::LibraryError(nitrokey::LibraryError::InvalidSlot)) => return Ok(()), @@ -767,14 +800,14 @@ fn print_otp_status( continue; } } - Err(err) => return Err(get_error("Could not check OTP slot", err)), + Err(err) => return Err(err).context("Failed to check OTP slot"), }; println!(ctx, "{}\t{}\t{}", algorithm, slot - 1, name)?; } } /// Print the status of the OTP slots. -pub fn otp_status(ctx: &mut ExecCtx<'_>, all: bool) -> Result<()> { +pub fn otp_status(ctx: &mut ExecCtx<'_>, all: bool) -> anyhow::Result<()> { with_device(ctx, |ctx, device| { println!(ctx, "alg\tslot\tname")?; print_otp_status(ctx, args::OtpAlgorithm::Hotp, &device, all)?; @@ -784,10 +817,12 @@ pub fn otp_status(ctx: &mut ExecCtx<'_>, all: bool) -> Result<()> { } /// Clear the PIN stored by various operations. -pub fn pin_clear(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn pin_clear(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_device(ctx, |_ctx, device| { - pinentry::clear(&pinentry::PinEntry::from(args::PinType::Admin, &device)?)?; - pinentry::clear(&pinentry::PinEntry::from(args::PinType::User, &device)?)?; + pinentry::clear(&pinentry::PinEntry::from(args::PinType::Admin, &device)?) + .context("Failed to clear admin PIN")?; + pinentry::clear(&pinentry::PinEntry::from(args::PinType::User, &device)?) + .context("Failed to clear user PIN")?; Ok(()) }) } @@ -796,7 +831,11 @@ pub fn pin_clear(ctx: &mut ExecCtx<'_>) -> Result<()> { /// /// If the user has set the respective environment variable for the /// given PIN type, it will be used. -fn choose_pin(ctx: &mut ExecCtx<'_>, pin_entry: &pinentry::PinEntry, new: bool) -> Result<String> { +fn choose_pin( + ctx: &mut ExecCtx<'_>, + pin_entry: &pinentry::PinEntry, + new: bool, +) -> anyhow::Result<String> { let new_pin = match pin_entry.pin_type() { args::PinType::Admin => { if new { @@ -817,15 +856,15 @@ fn choose_pin(ctx: &mut ExecCtx<'_>, pin_entry: &pinentry::PinEntry, new: bool) if let Some(new_pin) = new_pin { new_pin .to_str() - .ok_or_else(|| Error::from("Failed to read PIN: invalid Unicode data found")) + .ok_or_else(|| anyhow::anyhow!("Failed to read PIN: Invalid Unicode data found")) .map(ToOwned::to_owned) } else { - pinentry::choose(ctx, pin_entry) + pinentry::choose(ctx, pin_entry).context("Failed to select PIN") } } /// Change a PIN. -pub fn pin_set(ctx: &mut ExecCtx<'_>, pin_type: args::PinType) -> Result<()> { +pub fn pin_set(ctx: &mut ExecCtx<'_>, pin_type: args::PinType) -> anyhow::Result<()> { with_device(ctx, |ctx, mut device| { let pin_entry = pinentry::PinEntry::from(pin_type, &device)?; let new_pin = choose_pin(ctx, &pin_entry, true)?; @@ -835,8 +874,12 @@ pub fn pin_set(ctx: &mut ExecCtx<'_>, pin_type: args::PinType) -> Result<()> { &pin_entry, "Could not change the PIN", |current_pin| match pin_type { - args::PinType::Admin => device.change_admin_pin(¤t_pin, &new_pin), - args::PinType::User => device.change_user_pin(¤t_pin, &new_pin), + args::PinType::Admin => device + .change_admin_pin(¤t_pin, &new_pin) + .context("Failed to change admin PIN"), + args::PinType::User => device + .change_user_pin(¤t_pin, &new_pin) + .context("Failed to change user PIN"), }, )?; @@ -848,7 +891,7 @@ pub fn pin_set(ctx: &mut ExecCtx<'_>, pin_type: args::PinType) -> Result<()> { } /// Unblock and reset the user PIN. -pub fn pin_unblock(ctx: &mut ExecCtx<'_>) -> Result<()> { +pub fn pin_unblock(ctx: &mut ExecCtx<'_>) -> anyhow::Result<()> { with_device(ctx, |ctx, mut device| { let pin_entry = pinentry::PinEntry::from(args::PinType::User, &device)?; let user_pin = choose_pin(ctx, &pin_entry, false)?; @@ -858,7 +901,11 @@ pub fn pin_unblock(ctx: &mut ExecCtx<'_>) -> Result<()> { ctx, &pin_entry, "Could not unblock the user PIN", - |admin_pin| device.unlock_user_pin(&admin_pin, &user_pin), + |admin_pin| { + device + .unlock_user_pin(&admin_pin, &user_pin) + .context("Failed to unblock user PIN") + }, ) }) } @@ -866,10 +913,10 @@ pub fn pin_unblock(ctx: &mut ExecCtx<'_>) -> Result<()> { fn print_pws_data( ctx: &mut ExecCtx<'_>, description: &'static str, - result: result::Result<String, nitrokey::Error>, + result: Result<String, nitrokey::Error>, quiet: bool, -) -> Result<()> { - let value = result.map_err(|err| get_error("Could not access PWS slot", err))?; +) -> anyhow::Result<()> { + let value = result.context("Failed to access PWS slot")?; if quiet { println!(ctx, "{}", value)?; } else { @@ -878,20 +925,17 @@ fn print_pws_data( Ok(()) } -fn check_slot(pws: &nitrokey::PasswordSafe<'_, '_>, slot: u8) -> Result<()> { +fn check_slot(pws: &nitrokey::PasswordSafe<'_, '_>, slot: u8) -> anyhow::Result<()> { if slot >= nitrokey::SLOT_COUNT { - return Err(nitrokey::Error::from(nitrokey::LibraryError::InvalidSlot).into()); + anyhow::bail!("Slot {} is not valid", slot); } let status = pws .get_slot_status() - .map_err(|err| get_error("Could not read PWS slot status", err))?; + .context("Failed to read PWS slot status")?; if status[slot as usize] { Ok(()) } else { - Err(get_error( - "Could not access PWS slot", - nitrokey::CommandError::SlotNotProgrammed.into(), - )) + anyhow::bail!("Slot {} is not programmed", slot) } } @@ -903,9 +947,9 @@ pub fn pws_get( show_login: bool, show_password: bool, quiet: bool, -) -> Result<()> { +) -> anyhow::Result<()> { with_password_safe(ctx, |ctx, pws| { - check_slot(&pws, slot)?; + check_slot(&pws, slot).context("Failed to access PWS slot")?; let show_all = !show_name && !show_login && !show_password; if show_all || show_name { @@ -928,20 +972,18 @@ pub fn pws_set( name: &str, login: &str, password: &str, -) -> Result<()> { +) -> anyhow::Result<()> { with_password_safe(ctx, |_ctx, mut pws| { pws .write_slot(slot, name, login, password) - .map_err(|err| get_error("Could not write PWS slot", err)) + .context("Failed to write PWS slot") }) } /// Clear a PWS slot. -pub fn pws_clear(ctx: &mut ExecCtx<'_>, slot: u8) -> Result<()> { +pub fn pws_clear(ctx: &mut ExecCtx<'_>, slot: u8) -> anyhow::Result<()> { with_password_safe(ctx, |_ctx, mut pws| { - pws - .erase_slot(slot) - .map_err(|err| get_error("Could not clear PWS slot", err)) + pws.erase_slot(slot).context("Failed to clear PWS slot") }) } @@ -950,15 +992,12 @@ fn print_pws_slot( pws: &nitrokey::PasswordSafe<'_, '_>, slot: usize, programmed: bool, -) -> Result<()> { - if slot > u8::MAX as usize { - return Err(Error::from("Invalid PWS slot number")); - } - let slot = slot as u8; +) -> anyhow::Result<()> { + let slot = u8::try_from(slot).map_err(|_| anyhow::anyhow!("Invalid PWS slot number"))?; let name = if programmed { pws .get_slot_name(slot) - .map_err(|err| get_error("Could not read PWS slot", err))? + .context("Failed to read PWS slot name")? } else { "[not programmed]".to_string() }; @@ -967,11 +1006,11 @@ fn print_pws_slot( } /// Print the status of all PWS slots. -pub fn pws_status(ctx: &mut ExecCtx<'_>, all: bool) -> Result<()> { +pub fn pws_status(ctx: &mut ExecCtx<'_>, all: bool) -> anyhow::Result<()> { with_password_safe(ctx, |ctx, pws| { let slots = pws .get_slot_status() - .map_err(|err| get_error("Could not read PWS slot status", err))?; + .context("Failed to read PWS slot status")?; println!(ctx, "slot\tname")?; for (i, &value) in slots.iter().enumerate().filter(|(_, &value)| all || value) { print_pws_slot(ctx, &pws, i, value)?; diff --git a/src/main.rs b/src/main.rs index 27097c9..4f08d21 100644 --- a/src/main.rs +++ b/src/main.rs @@ -79,11 +79,8 @@ use std::env; use std::ffi; use std::io; use std::process; -use std::result; -use crate::error::Error; - -type Result<T> = result::Result<T, Error>; +use anyhow::Result; const NITROCLI_ADMIN_PIN: &str = "NITROCLI_ADMIN_PIN"; const NITROCLI_USER_PIN: &str = "NITROCLI_USER_PIN"; @@ -202,7 +199,7 @@ fn run<'ctx, 'io: 'ctx>(ctx: &'ctx mut RunCtx<'io>, args: Vec<String>) -> i32 { match handle_arguments(ctx, args) { Ok(()) => 0, Err(err) => { - let _ = eprintln!(ctx, "{}", err); + let _ = eprintln!(ctx, "{:?}", err); 1 } } diff --git a/src/pinentry.rs b/src/pinentry.rs index e1dec3e..510d7b0 100644 --- a/src/pinentry.rs +++ b/src/pinentry.rs @@ -19,12 +19,12 @@ use std::borrow; use std::fmt; -use std::io; use std::process; use std::str; +use anyhow::Context as _; + use crate::args; -use crate::error::Error; use crate::ExecCtx; type CowStr = borrow::Cow<'static, str>; @@ -49,12 +49,15 @@ pub struct PinEntry { } impl PinEntry { - pub fn from<'mgr, D>(pin_type: args::PinType, device: &D) -> crate::Result<Self> + pub fn from<'mgr, D>(pin_type: args::PinType, device: &D) -> anyhow::Result<Self> where D: nitrokey::Device<'mgr>, { let model = device.get_model(); - let serial = device.get_serial_number()?; + let serial = device + .get_serial_number() + .context("Failed to retrieve serial number")?; + Ok(Self { pin_type, model, @@ -122,12 +125,15 @@ pub struct PwdEntry { } impl PwdEntry { - pub fn from<'mgr, D>(device: &D) -> crate::Result<Self> + pub fn from<'mgr, D>(device: &D) -> anyhow::Result<Self> where D: nitrokey::Device<'mgr>, { let model = device.get_model(); - let serial = device.get_serial_number()?; + let serial = device + .get_serial_number() + .context("Failed to retrieve serial number")?; + Ok(Self { model, serial }) } } @@ -186,7 +192,7 @@ impl Mode { } } -fn parse_pinentry_pin<R>(response: R) -> crate::Result<String> +fn parse_pinentry_pin<R>(response: R) -> anyhow::Result<String> where R: AsRef<str>, { @@ -208,9 +214,9 @@ where // specially. if !lines.is_empty() && lines[0].starts_with("ERR ") { let (_, error) = lines[0].split_at(4); - return Err(Error::from(error)); + anyhow::bail!("{}", error); } - Err(Error::Error(format!("Unexpected response: {}", string))) + anyhow::bail!("Unexpected response: {}", string) } /// Inquire a secret from the user. @@ -226,7 +232,7 @@ pub fn inquire<E>( entry: &E, mode: Mode, error_msg: Option<&str>, -) -> crate::Result<String> +) -> anyhow::Result<String> where E: SecretEntry, { @@ -256,30 +262,28 @@ where .arg(command) .arg("/bye") .output() - .map_err(|err| match err.kind() { - io::ErrorKind::NotFound => { - io::Error::new(io::ErrorKind::NotFound, "gpg-connect-agent not found") - } - _ => err, - })?; - parse_pinentry_pin(str::from_utf8(&output.stdout)?) + .context("Failed to invoke gpg-connect-agent")?; + + let response = + str::from_utf8(&output.stdout).context("Failed to parse gpg-connect-agent output as UTF-8")?; + parse_pinentry_pin(response).context("Failed to parse pinentry secret") } -fn check<E>(entry: &E, secret: &str) -> crate::Result<()> +fn check<E>(entry: &E, secret: &str) -> anyhow::Result<()> where E: SecretEntry, { if secret.len() < usize::from(entry.min_len()) { - Err(Error::Error(format!( + anyhow::bail!( "The secret must be at least {} characters long", entry.min_len() - ))) + ) } else { Ok(()) } } -pub fn choose<E>(ctx: &mut ExecCtx<'_>, entry: &E) -> crate::Result<String> +pub fn choose<E>(ctx: &mut ExecCtx<'_>, entry: &E) -> anyhow::Result<String> where E: SecretEntry, { @@ -292,13 +296,13 @@ where clear(entry)?; if chosen != confirmed { - Err(Error::from("Entered secrets do not match")) + anyhow::bail!("Entered secrets do not match") } else { Ok(chosen) } } -fn parse_pinentry_response<R>(response: R) -> crate::Result<()> +fn parse_pinentry_response<R>(response: R) -> anyhow::Result<()> where R: AsRef<str>, { @@ -309,11 +313,11 @@ where // We got the only valid answer we accept. return Ok(()); } - Err(Error::Error(format!("Unexpected response: {}", string))) + anyhow::bail!("Unexpected response: {}", string) } /// Clear the cached secret represented by the given entry. -pub fn clear<E>(entry: &E) -> crate::Result<()> +pub fn clear<E>(entry: &E) -> anyhow::Result<()> where E: SecretEntry, { @@ -322,9 +326,13 @@ where let output = process::Command::new("gpg-connect-agent") .arg(command) .arg("/bye") - .output()?; + .output() + .context("Failed to invoke gpg-connect-agent")?; + + let response = str::from_utf8(&output.stdout) + .context("Failed to parse gpg-connect-agent output as UTF-8")?; - parse_pinentry_response(str::from_utf8(&output.stdout)?) + parse_pinentry_response(response).context("Failed to parse pinentry response") } else { Ok(()) } diff --git a/src/tests/otp.rs b/src/tests/otp.rs index 7361688..65c1cb5 100644 --- a/src/tests/otp.rs +++ b/src/tests/otp.rs @@ -28,7 +28,7 @@ fn set_invalid_slot_raw(model: nitrokey::Model) { assert_ne!(rc, 0); assert_eq!(out, b""); - assert_eq!(&err[..24], b"Could not write OTP slot"); + assert_eq!(&err[..24], b"Failed to write OTP slot"); } #[test_device] @@ -37,12 +37,8 @@ fn set_invalid_slot(model: nitrokey::Model) { .handle(&["otp", "set", "100", "name", "1234", "-f", "hex"]) .unwrap_err() .to_string(); - let expected = format!( - "Could not write OTP slot: {}", - nitrokey::Error::LibraryError(nitrokey::LibraryError::InvalidSlot) - ); - assert_eq!(err, expected); + assert_eq!(err, "Failed to write OTP slot"); } #[test_device] @@ -122,10 +118,6 @@ fn clear(model: nitrokey::Model) -> crate::Result<()> { let res = ncli.handle(&["otp", "get", "3"]); let err = res.unwrap_err().to_string(); - let expected = format!( - "Could not generate OTP: {}", - nitrokey::Error::CommandError(nitrokey::CommandError::SlotNotProgrammed) - ); - assert_eq!(err, expected); + assert_eq!(err, "Failed to generate OTP"); Ok(()) } diff --git a/src/tests/pws.rs b/src/tests/pws.rs index 7f8107e..910ef92 100644 --- a/src/tests/pws.rs +++ b/src/tests/pws.rs @@ -25,12 +25,8 @@ fn set_invalid_slot(model: nitrokey::Model) { .handle(&["pws", "set", "100", "name", "login", "1234"]) .unwrap_err() .to_string(); - let expected = format!( - "Could not write PWS slot: {}", - nitrokey::Error::LibraryError(nitrokey::LibraryError::InvalidSlot) - ); - assert_eq!(err, expected); + assert_eq!(err, "Failed to write PWS slot"); } #[test_device] @@ -97,11 +93,7 @@ fn set_reset_get(model: nitrokey::Model) -> crate::Result<()> { let res = ncli.handle(&["pws", "get", "2"]); let err = res.unwrap_err().to_string(); - let expected = format!( - "Could not access PWS slot: {}", - nitrokey::Error::CommandError(nitrokey::CommandError::SlotNotProgrammed) - ); - assert_eq!(err, expected); + assert_eq!(err, "Failed to access PWS slot"); Ok(()) } @@ -113,10 +105,6 @@ fn clear(model: nitrokey::Model) -> crate::Result<()> { let res = ncli.handle(&["pws", "get", "10"]); let err = res.unwrap_err().to_string(); - let expected = format!( - "Could not access PWS slot: {}", - nitrokey::Error::CommandError(nitrokey::CommandError::SlotNotProgrammed) - ); - assert_eq!(err, expected); + assert_eq!(err, "Failed to access PWS slot"); Ok(()) } diff --git a/src/tests/status.rs b/src/tests/status.rs index e80fadc..c617a9e 100644 --- a/src/tests/status.rs +++ b/src/tests/status.rs @@ -19,15 +19,18 @@ use super::*; -// This test acts as verification that conversion of Error::Error -// variants into the proper exit code works properly. #[test_device] fn not_found_raw() { let (rc, out, err) = Nitrocli::new().run(&["status"]); assert_ne!(rc, 0); assert_eq!(out, b""); - assert_eq!(err, b"Nitrokey device not found\n"); + let expected = r#"Nitrokey device not found + +Caused by: + Communication error: Could not connect to a Nitrokey device +"#; + assert_eq!(err, expected.as_bytes()); } #[test_device] |