|
package keyring |
|
|
|
import ( |
|
"context" |
|
"database/sql" |
|
"fmt" |
|
|
|
"github.com/target/goalert/gadb" |
|
"github.com/target/goalert/permission" |
|
"github.com/target/goalert/util/sqlutil" |
|
) |
|
|
|
|
|
|
|
func ReEncryptAll(ctx context.Context, db *sql.DB, keys Keys) error { |
|
err := permission.LimitCheckAny(ctx, permission.Admin) |
|
if err != nil { |
|
return err |
|
} |
|
if len(keys) == 0 { |
|
return fmt.Errorf("no keys provided") |
|
} |
|
|
|
tx, err := db.BeginTx(ctx, nil) |
|
if err != nil { |
|
return fmt.Errorf("begin transaction: %w", err) |
|
} |
|
defer sqlutil.Rollback(ctx, "re-encrypt", tx) |
|
|
|
gdb := gadb.New(tx) |
|
|
|
err = gdb.Keyring_LockKeyrings(ctx) |
|
if err != nil { |
|
return fmt.Errorf("lock keyrings: %w", err) |
|
} |
|
|
|
rings, err := gdb.Keyring_GetKeyringSecrets(ctx) |
|
if err != nil { |
|
return fmt.Errorf("get keyring secrets: %w", err) |
|
} |
|
|
|
for _, ring := range rings { |
|
sign, signLabel, err := keys.Decrypt(ring.SigningKey) |
|
if err != nil { |
|
return fmt.Errorf("decrypt signing key for '%s': %w", ring.ID, err) |
|
} |
|
next, nextLabel, err := keys.Decrypt(ring.NextKey) |
|
if err != nil { |
|
return fmt.Errorf("decrypt next key for '%s': %w", ring.ID, err) |
|
} |
|
encSign, err := keys.Encrypt(signLabel, sign) |
|
if err != nil { |
|
return fmt.Errorf("encrypt signing key for '%s': %w", ring.ID, err) |
|
} |
|
encNext, err := keys.Encrypt(nextLabel, next) |
|
if err != nil { |
|
return fmt.Errorf("encrypt next key for '%s': %w", ring.ID, err) |
|
} |
|
err = gdb.Keyring_UpdateKeyringSecrets(ctx, gadb.Keyring_UpdateKeyringSecretsParams{ |
|
ID: ring.ID, |
|
SigningKey: encSign, |
|
NextKey: encNext, |
|
}) |
|
if err != nil { |
|
return fmt.Errorf("update keyring secrets for '%s': %w", ring.ID, err) |
|
} |
|
} |
|
|
|
err = gdb.Keyring_LockConfig(ctx) |
|
if err != nil { |
|
return fmt.Errorf("lock config: %w", err) |
|
} |
|
|
|
cfgs, err := gdb.Keyring_GetConfigPayloads(ctx) |
|
if err != nil { |
|
return fmt.Errorf("get config payloads: %w", err) |
|
} |
|
|
|
for _, cfg := range cfgs { |
|
dec, label, err := keys.Decrypt(cfg.Data) |
|
if err != nil { |
|
return fmt.Errorf("decrypt config payload for config #%d: %w", cfg.ID, err) |
|
} |
|
enc, err := keys.Encrypt(label, dec) |
|
if err != nil { |
|
return fmt.Errorf("encrypt config payload for #%d: %w", cfg.ID, err) |
|
} |
|
err = gdb.Keyring_UpdateConfigPayload(ctx, gadb.Keyring_UpdateConfigPayloadParams{ |
|
ID: cfg.ID, |
|
Data: enc, |
|
}) |
|
if err != nil { |
|
return fmt.Errorf("update config payload for #%d: %w", cfg.ID, err) |
|
} |
|
} |
|
|
|
err = tx.Commit() |
|
if err != nil { |
|
return fmt.Errorf("commit transaction: %w", err) |
|
} |
|
|
|
return nil |
|
} |
|
|