diff --git a/pkgs/clan-cli/clan_cli/secrets/sops.py b/pkgs/clan-cli/clan_cli/secrets/sops.py index ca32640ca..b79b41c6c 100644 --- a/pkgs/clan-cli/clan_cli/secrets/sops.py +++ b/pkgs/clan-cli/clan_cli/secrets/sops.py @@ -126,7 +126,11 @@ def update_keys(secret_path: Path, keys: list[str]) -> None: str(secret_path / "secret"), ], ) - subprocess.run(cmd, check=True) + res = subprocess.run(cmd) + if res.returncode != 0: + raise ClanError( + f"Failed to update keys for {secret_path}: sops exited with {res.returncode}" + ) def encrypt_file( @@ -177,7 +181,11 @@ def decrypt_file(secret_path: Path) -> str: cmd = nix_shell( ["sops"], ["sops", "--config", str(manifest), "--decrypt", str(secret_path)] ) - res = subprocess.run(cmd, check=True, stdout=subprocess.PIPE, text=True) + res = subprocess.run(cmd, stdout=subprocess.PIPE, text=True) + if res.returncode != 0: + raise ClanError( + f"Failed to decrypt {secret_path}: sops exited with {res.returncode}" + ) return res.stdout diff --git a/pkgs/clan-cli/tests/test_secrets_cli.py b/pkgs/clan-cli/tests/test_secrets_cli.py index 7f3c8163f..c93c63df4 100644 --- a/pkgs/clan-cli/tests/test_secrets_cli.py +++ b/pkgs/clan-cli/tests/test_secrets_cli.py @@ -107,10 +107,13 @@ def test_groups( @contextmanager def use_key(key: str, monkeypatch: pytest.MonkeyPatch) -> Iterator[None]: old_key = os.environ["SOPS_AGE_KEY_FILE"] + monkeypatch.delenv("SOPS_AGE_KEY_FILE") monkeypatch.setenv("SOPS_AGE_KEY", key) - yield - monkeypatch.delenv("SOPS_AGE_KEY") - monkeypatch.setenv("SOPS_AGE_KEY_FILE", old_key) + try: + yield + finally: + monkeypatch.delenv("SOPS_AGE_KEY") + monkeypatch.setenv("SOPS_AGE_KEY_FILE", old_key) def test_secrets( @@ -190,6 +193,23 @@ def test_secrets( capsys.readouterr() cli.run(["secrets", "get", "key"]) assert capsys.readouterr().out == "foo" + + # extend group will update secrets + cli.run(["secrets", "users", "add", "user2", age_keys[2].pubkey]) + cli.run(["secrets", "groups", "add-user", "admin-group", "user2"]) + + with use_key(age_keys[2].privkey, monkeypatch): # user2 + capsys.readouterr() + cli.run(["secrets", "get", "key"]) + assert capsys.readouterr().out == "foo" + + cli.run(["secrets", "groups", "remove-user", "admin-group", "user2"]) + with pytest.raises(ClanError), use_key(age_keys[2].privkey, monkeypatch): + # user2 is not in the group anymore + capsys.readouterr() + cli.run(["secrets", "get", "key"]) + print(capsys.readouterr().out) + cli.run(["secrets", "groups", "remove-secret", "admin-group", "key"]) cli.run(["secrets", "remove", "key"])