Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

how to prevent GPG from prompting for passphrase on decrypt #64

Open
nbi1 opened this issue Oct 13, 2024 · 1 comment
Open

how to prevent GPG from prompting for passphrase on decrypt #64

nbi1 opened this issue Oct 13, 2024 · 1 comment

Comments

@nbi1
Copy link

nbi1 commented Oct 13, 2024

Currently I see this in syslog when I attempt to send mail via msmtp:

dbus-daemon[1576]: [session uid=0 pid=1576] Activating service name='org.gnome.keyring.SystemPrompter' requested by ':1.1279' (uid=0 pid=74795 comm="pinentry --display :0.0")
gcr-prompter[74801]: cannot open display: :1
dbus-daemon[1576]: [session uid=0 pid=1576] Activated service 'org.gnome.keyring.SystemPrompter' failed: Process org.gnome.keyring.SystemPrompter exited with status 1
gpg-agent[74795]: No Gcr System Prompter available, falling back to curses
gpg-agent[74512]: failed to unprotect the secret key: Inappropriate ioctl for device
gpg-agent[74512]: failed to read the secret key
gpg-agent[74512]: command 'PKDECRYPT' failed: Inappropriate ioctl for device

So the msmtp invocation fails because oama fails due to GPG not being able to prompt successfully? Is there a clean mechanism by which oama can pass options to disable the prompt and get the info from a file? I know how to do this from the terminal command line, but the goal is to have scripted msmtp invocations taking place on a server. I'm trying to avoid hacks like rebuilding oama or filtering the decrypt call.

@pdobsan
Copy link
Owner

pdobsan commented Oct 14, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants