-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Validate the provided decryption key against an encrypted backup and exit #130
Comments
I added a dry-run logic to the |
Moreover, rather than adding the I am not sure if the |
Much thanks!
Yep, I guess this area could be improved a lil. Currently it's not very clear that the tool writes the decrypted Although I think some people may also play around with decrypted db itself (in addition to post processed html/txt), so we might want to keep some way to write the decrypted db to disk. |
This commit also made `dry_run` and `keyfile_stream` keyword arguments Affects #130
I have moved the def decrypt_backup(
database: bytes,
key: Union[str, io.IOBase],
output: str = None,
crypt: Crypt = Crypt.CRYPT14,
show_crypt15: bool = False,
db_type: DbType = DbType.MESSAGE,
*,
dry_run: bool = False,
keyfile_stream: bool = False
) |
That does it for me. Thanks again. |
Good to hear that! I will leave this open until release. |
Hi, thanks for creating this tool!
I do automated periodic snapshots of my WhatsApp backup. I'm also interested in automating whether the decryption key I currently posses is valid for the latest snapshot. Currently it seems tricky to perform such a check without having the exporter write the decrypted db file to disk.
Does it seem interesting to have a param such as
--dry-run
, which'll only check whether the provided decryption key is valid for a given backup file and then exit with an appropriate return code? It'll help me keep in check whether my snapshots are dependable or not in the time of need.The text was updated successfully, but these errors were encountered: