5f5542cb91
(very unlikely) potential timing attack between init-ing and fetching status. Fixes #1054
117 lines
2.5 KiB
Go
117 lines
2.5 KiB
Go
package api
|
|
|
|
func (c *Sys) RekeyStatus() (*RekeyStatusResponse, error) {
|
|
r := c.c.NewRequest("GET", "/v1/sys/rekey/init")
|
|
resp, err := c.c.RawRequest(r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
var result RekeyStatusResponse
|
|
err = resp.DecodeJSON(&result)
|
|
return &result, err
|
|
}
|
|
|
|
func (c *Sys) RekeyInit(config *RekeyInitRequest) (*RekeyStatusResponse, error) {
|
|
r := c.c.NewRequest("PUT", "/v1/sys/rekey/init")
|
|
if err := r.SetJSONBody(config); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
resp, err := c.c.RawRequest(r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
var result RekeyStatusResponse
|
|
err = resp.DecodeJSON(&result)
|
|
return &result, err
|
|
}
|
|
|
|
func (c *Sys) RekeyCancel() error {
|
|
r := c.c.NewRequest("DELETE", "/v1/sys/rekey/init")
|
|
resp, err := c.c.RawRequest(r)
|
|
if err == nil {
|
|
defer resp.Body.Close()
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (c *Sys) RekeyUpdate(shard, nonce string) (*RekeyUpdateResponse, error) {
|
|
body := map[string]interface{}{
|
|
"key": shard,
|
|
"nonce": nonce,
|
|
}
|
|
|
|
r := c.c.NewRequest("PUT", "/v1/sys/rekey/update")
|
|
if err := r.SetJSONBody(body); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
resp, err := c.c.RawRequest(r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
var result RekeyUpdateResponse
|
|
err = resp.DecodeJSON(&result)
|
|
return &result, err
|
|
}
|
|
|
|
func (c *Sys) RekeyRetrieveBackup() (*RekeyRetrieveResponse, error) {
|
|
r := c.c.NewRequest("GET", "/v1/sys/rekey/backup")
|
|
resp, err := c.c.RawRequest(r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
var result RekeyRetrieveResponse
|
|
err = resp.DecodeJSON(&result)
|
|
return &result, err
|
|
}
|
|
|
|
func (c *Sys) RekeyDeleteBackup() error {
|
|
r := c.c.NewRequest("DELETE", "/v1/sys/rekey/backup")
|
|
resp, err := c.c.RawRequest(r)
|
|
if err == nil {
|
|
defer resp.Body.Close()
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
type RekeyInitRequest struct {
|
|
SecretShares int `json:"secret_shares"`
|
|
SecretThreshold int `json:"secret_threshold"`
|
|
PGPKeys []string `json:"pgp_keys"`
|
|
Backup bool
|
|
}
|
|
|
|
type RekeyStatusResponse struct {
|
|
Nonce string
|
|
Started bool
|
|
T int
|
|
N int
|
|
Progress int
|
|
Required int
|
|
PGPFingerprints []string `json:"pgp_fingerprints"`
|
|
Backup bool
|
|
}
|
|
|
|
type RekeyUpdateResponse struct {
|
|
Nonce string
|
|
Complete bool
|
|
Keys []string
|
|
PGPFingerprints []string `json:"pgp_fingerprints"`
|
|
Backup bool
|
|
}
|
|
|
|
type RekeyRetrieveResponse struct {
|
|
Nonce string
|
|
Keys map[string][]string
|
|
}
|