File size: 2,755 Bytes
1e92f2d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
package keyring

import (
	"context"
	"database/sql"
	"fmt"

	"github.com/target/goalert/gadb"
	"github.com/target/goalert/permission"
	"github.com/target/goalert/util/sqlutil"
)

// ReEncryptAll will re-encrypt all encrypted values in the database to the first key in the provided list, using the remaining keys as alternates
// for decryption. This function will return an error if any values fail to re-encrypt.
func ReEncryptAll(ctx context.Context, db *sql.DB, keys Keys) error {
	err := permission.LimitCheckAny(ctx, permission.Admin)
	if err != nil {
		return err
	}
	if len(keys) == 0 {
		return fmt.Errorf("no keys provided")
	}

	tx, err := db.BeginTx(ctx, nil)
	if err != nil {
		return fmt.Errorf("begin transaction: %w", err)
	}
	defer sqlutil.Rollback(ctx, "re-encrypt", tx)

	gdb := gadb.New(tx)

	err = gdb.Keyring_LockKeyrings(ctx)
	if err != nil {
		return fmt.Errorf("lock keyrings: %w", err)
	}

	rings, err := gdb.Keyring_GetKeyringSecrets(ctx)
	if err != nil {
		return fmt.Errorf("get keyring secrets: %w", err)
	}

	for _, ring := range rings {
		sign, signLabel, err := keys.Decrypt(ring.SigningKey)
		if err != nil {
			return fmt.Errorf("decrypt signing key for '%s': %w", ring.ID, err)
		}
		next, nextLabel, err := keys.Decrypt(ring.NextKey)
		if err != nil {
			return fmt.Errorf("decrypt next key for '%s': %w", ring.ID, err)
		}
		encSign, err := keys.Encrypt(signLabel, sign)
		if err != nil {
			return fmt.Errorf("encrypt signing key for '%s': %w", ring.ID, err)
		}
		encNext, err := keys.Encrypt(nextLabel, next)
		if err != nil {
			return fmt.Errorf("encrypt next key for '%s': %w", ring.ID, err)
		}
		err = gdb.Keyring_UpdateKeyringSecrets(ctx, gadb.Keyring_UpdateKeyringSecretsParams{
			ID:         ring.ID,
			SigningKey: encSign,
			NextKey:    encNext,
		})
		if err != nil {
			return fmt.Errorf("update keyring secrets for '%s': %w", ring.ID, err)
		}
	}

	err = gdb.Keyring_LockConfig(ctx)
	if err != nil {
		return fmt.Errorf("lock config: %w", err)
	}

	cfgs, err := gdb.Keyring_GetConfigPayloads(ctx)
	if err != nil {
		return fmt.Errorf("get config payloads: %w", err)
	}

	for _, cfg := range cfgs {
		dec, label, err := keys.Decrypt(cfg.Data)
		if err != nil {
			return fmt.Errorf("decrypt config payload for config #%d: %w", cfg.ID, err)
		}
		enc, err := keys.Encrypt(label, dec)
		if err != nil {
			return fmt.Errorf("encrypt config payload for #%d: %w", cfg.ID, err)
		}
		err = gdb.Keyring_UpdateConfigPayload(ctx, gadb.Keyring_UpdateConfigPayloadParams{
			ID:   cfg.ID,
			Data: enc,
		})
		if err != nil {
			return fmt.Errorf("update config payload for #%d: %w", cfg.ID, err)
		}
	}

	err = tx.Commit()
	if err != nil {
		return fmt.Errorf("commit transaction: %w", err)
	}

	return nil
}