open-vault/http/sys_rekey.go

196 lines
4.9 KiB
Go
Raw Normal View History

2015-05-28 21:28:50 +00:00
package http
import (
"encoding/hex"
"errors"
"fmt"
"net/http"
2015-12-16 21:56:15 +00:00
"github.com/hashicorp/vault/helper/pgpkeys"
2015-05-28 21:28:50 +00:00
"github.com/hashicorp/vault/vault"
)
func handleSysRekeyInit(core *vault.Core) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case "GET":
handleSysRekeyInitGet(core, w, r)
case "POST", "PUT":
handleSysRekeyInitPut(core, w, r)
case "DELETE":
handleSysRekeyInitDelete(core, w, r)
default:
respondError(w, http.StatusMethodNotAllowed, nil)
}
})
}
func handleSysRekeyInitGet(core *vault.Core, w http.ResponseWriter, r *http.Request) {
// Get the current configuration
sealConfig, err := core.SealConfig()
if err != nil {
respondError(w, http.StatusInternalServerError, err)
return
}
if sealConfig == nil {
respondError(w, http.StatusBadRequest, fmt.Errorf(
"server is not yet initialized"))
return
}
// Get the rekey configuration
rekeyConf, err := core.RekeyConfig()
if err != nil {
respondError(w, http.StatusInternalServerError, err)
return
}
// Get the progress
progress, err := core.RekeyProgress()
if err != nil {
respondError(w, http.StatusInternalServerError, err)
return
}
// Format the status
status := &RekeyStatusResponse{
Started: false,
T: 0,
N: 0,
Progress: progress,
Required: sealConfig.SecretThreshold,
}
if rekeyConf != nil {
2015-12-16 21:56:15 +00:00
status.Nonce = rekeyConf.Nonce
2015-05-28 21:28:50 +00:00
status.Started = true
status.T = rekeyConf.SecretThreshold
status.N = rekeyConf.SecretShares
2015-12-16 21:56:15 +00:00
if rekeyConf.PGPKeys != nil && len(rekeyConf.PGPKeys) != 0 {
pgpFingerprints, err := pgpkeys.GetFingerprints(rekeyConf.PGPKeys, nil)
if err != nil {
respondError(w, http.StatusInternalServerError, err)
}
status.PGPFingerprints = pgpFingerprints
status.Backup = rekeyConf.Backup
}
2015-05-28 21:28:50 +00:00
}
respondOk(w, status)
}
func handleSysRekeyInitPut(core *vault.Core, w http.ResponseWriter, r *http.Request) {
// Parse the request
var req RekeyRequest
if err := parseRequest(r, &req); err != nil {
respondError(w, http.StatusBadRequest, err)
return
}
2015-12-16 21:56:15 +00:00
if req.Backup && len(req.PGPKeys) == 0 {
respondError(w, http.StatusBadRequest, fmt.Errorf("cannot request a backup of the new keys without providing PGP keys for encryption"))
}
2015-05-28 21:28:50 +00:00
// Initialize the rekey
err := core.RekeyInit(&vault.SealConfig{
SecretShares: req.SecretShares,
SecretThreshold: req.SecretThreshold,
2015-08-25 22:33:58 +00:00
PGPKeys: req.PGPKeys,
2015-12-16 21:56:15 +00:00
Backup: req.Backup,
2015-05-28 21:28:50 +00:00
})
if err != nil {
respondError(w, http.StatusBadRequest, err)
return
}
respondOk(w, nil)
}
func handleSysRekeyInitDelete(core *vault.Core, w http.ResponseWriter, r *http.Request) {
err := core.RekeyCancel()
if err != nil {
respondError(w, http.StatusInternalServerError, err)
return
}
respondOk(w, nil)
}
func handleSysRekeyUpdate(core *vault.Core) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
// Parse the request
var req RekeyUpdateRequest
if err := parseRequest(r, &req); err != nil {
respondError(w, http.StatusBadRequest, err)
return
}
if req.Key == "" {
respondError(
w, http.StatusBadRequest,
errors.New("'key' must specified in request body as JSON"))
return
}
// Decode the key, which is hex encoded
key, err := hex.DecodeString(req.Key)
if err != nil {
respondError(
w, http.StatusBadRequest,
errors.New("'key' must be a valid hex-string"))
return
}
// Use the key to make progress on rekey
2015-12-16 21:56:15 +00:00
result, err := core.RekeyUpdate(key, req.Nonce)
2015-05-28 21:28:50 +00:00
if err != nil {
respondError(w, http.StatusBadRequest, err)
return
}
// Format the response
resp := &RekeyUpdateResponse{}
if result != nil {
resp.Complete = true
2015-12-16 21:56:15 +00:00
resp.Nonce = req.Nonce
2015-05-28 21:28:50 +00:00
// Encode the keys
keys := make([]string, 0, len(result.SecretShares))
for _, k := range result.SecretShares {
keys = append(keys, hex.EncodeToString(k))
}
resp.Keys = keys
2015-12-16 21:56:15 +00:00
resp.Backup = result.Backup
resp.PGPFingerprints = result.PGPFingerprints
2015-05-28 21:28:50 +00:00
}
respondOk(w, resp)
})
}
type RekeyRequest struct {
SecretShares int `json:"secret_shares"`
SecretThreshold int `json:"secret_threshold"`
2015-08-25 22:33:58 +00:00
PGPKeys []string `json:"pgp_keys"`
2015-12-16 21:56:15 +00:00
Backup bool `json:"backup"`
2015-05-28 21:28:50 +00:00
}
type RekeyStatusResponse struct {
2015-12-16 21:56:15 +00:00
Nonce string `json:"nonce"`
Started bool `json:"started"`
T int `json:"t"`
N int `json:"n"`
Progress int `json:"progress"`
Required int `json:"required"`
PGPFingerprints []string `json:"pgp_fingerprints"`
Backup bool `json:"backup"`
2015-05-28 21:28:50 +00:00
}
type RekeyUpdateRequest struct {
2015-12-16 21:56:15 +00:00
Nonce string
Key string
2015-05-28 21:28:50 +00:00
}
type RekeyUpdateResponse struct {
2015-12-16 21:56:15 +00:00
Nonce string `json:"nonce"`
Complete bool `json:"complete"`
Keys []string `json:"keys"`
PGPFingerprints []string `json:"pgp_fingerprints"`
Backup bool `json:"backup"`
2015-05-28 21:28:50 +00:00
}