mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			125 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			125 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package http
 | |
| 
 | |
| import (
 | |
| 	"encoding/hex"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 
 | |
| 	"github.com/hashicorp/errwrap"
 | |
| 	"github.com/hashicorp/vault/logical"
 | |
| 	"github.com/hashicorp/vault/vault"
 | |
| )
 | |
| 
 | |
| func handleSysSeal(core *vault.Core) http.Handler {
 | |
| 	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | |
| 		if r.Method != "PUT" {
 | |
| 			respondError(w, http.StatusMethodNotAllowed, nil)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		// Get the auth for the request so we can access the token directly
 | |
| 		req := requestAuth(r, &logical.Request{})
 | |
| 
 | |
| 		// Seal with the token above
 | |
| 		if err := core.Seal(req.ClientToken); err != nil {
 | |
| 			respondError(w, http.StatusInternalServerError, err)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		respondOk(w, nil)
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func handleSysUnseal(core *vault.Core) http.Handler {
 | |
| 	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | |
| 		if r.Method != "PUT" {
 | |
| 			respondError(w, http.StatusMethodNotAllowed, nil)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		// Parse the request
 | |
| 		var req UnsealRequest
 | |
| 		if err := parseRequest(r, &req); err != nil {
 | |
| 			respondError(w, http.StatusBadRequest, err)
 | |
| 			return
 | |
| 		}
 | |
| 		if req.Key == "" {
 | |
| 			respondError(
 | |
| 				w, http.StatusBadRequest,
 | |
| 				errors.New("'key' must specified in request body as JSON"))
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		// Decode the key, which is hex encoded
 | |
| 		key, err := hex.DecodeString(req.Key)
 | |
| 		if err != nil {
 | |
| 			respondError(
 | |
| 				w, http.StatusBadRequest,
 | |
| 				errors.New("'key' must be a valid hex-string"))
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		// Attempt the unseal
 | |
| 		if _, err := core.Unseal(key); err != nil {
 | |
| 			// Ignore ErrInvalidKey because its a user error that we
 | |
| 			// mask away. We just show them the seal status.
 | |
| 			if !errwrap.ContainsType(err, new(vault.ErrInvalidKey)) {
 | |
| 				respondError(w, http.StatusInternalServerError, err)
 | |
| 				return
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// Return the seal status
 | |
| 		handleSysSealStatusRaw(core, w, r)
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func handleSysSealStatus(core *vault.Core) http.Handler {
 | |
| 	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | |
| 		if r.Method != "GET" {
 | |
| 			respondError(w, http.StatusMethodNotAllowed, nil)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		handleSysSealStatusRaw(core, w, r)
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func handleSysSealStatusRaw(core *vault.Core, w http.ResponseWriter, r *http.Request) {
 | |
| 	sealed, err := core.Sealed()
 | |
| 	if err != nil {
 | |
| 		respondError(w, http.StatusInternalServerError, err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	sealConfig, err := core.SealConfig()
 | |
| 	if err != nil {
 | |
| 		respondError(w, http.StatusInternalServerError, err)
 | |
| 		return
 | |
| 	}
 | |
| 	if sealConfig == nil {
 | |
| 		respondError(w, http.StatusBadRequest, fmt.Errorf(
 | |
| 			"server is not yet initialized"))
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	respondOk(w, &SealStatusResponse{
 | |
| 		Sealed:   sealed,
 | |
| 		T:        sealConfig.SecretThreshold,
 | |
| 		N:        sealConfig.SecretShares,
 | |
| 		Progress: core.SecretProgress(),
 | |
| 	})
 | |
| }
 | |
| 
 | |
| type SealStatusResponse struct {
 | |
| 	Sealed   bool `json:"sealed"`
 | |
| 	T        int  `json:"t"`
 | |
| 	N        int  `json:"n"`
 | |
| 	Progress int  `json:"progress"`
 | |
| }
 | |
| 
 | |
| type UnsealRequest struct {
 | |
| 	Key string
 | |
| }
 | 
