2020-07-06 09:39:24 +00:00
|
|
|
use std::path::PathBuf;
|
2020-09-28 15:40:12 +00:00
|
|
|
use std::io::Write;
|
|
|
|
use std::process::{Stdio, Command};
|
2020-07-06 09:39:24 +00:00
|
|
|
|
2020-07-08 08:56:16 +00:00
|
|
|
use anyhow::{bail, format_err, Error};
|
2020-07-06 09:39:24 +00:00
|
|
|
use serde::{Deserialize, Serialize};
|
2020-11-20 16:38:34 +00:00
|
|
|
use serde_json::Value;
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
use proxmox::api::api;
|
2020-11-20 16:38:34 +00:00
|
|
|
use proxmox::api::cli::{
|
|
|
|
CliCommand,
|
|
|
|
CliCommandMap,
|
|
|
|
format_and_print_result,
|
|
|
|
get_output_format,
|
|
|
|
OUTPUT_FORMAT,
|
|
|
|
};
|
2020-07-06 09:39:24 +00:00
|
|
|
use proxmox::sys::linux::tty;
|
|
|
|
use proxmox::tools::fs::{file_get_contents, replace_file, CreateOptions};
|
|
|
|
|
|
|
|
use proxmox_backup::backup::{
|
2020-11-20 16:38:32 +00:00
|
|
|
encrypt_key_with_passphrase,
|
|
|
|
load_and_decrypt_key,
|
|
|
|
store_key_config,
|
|
|
|
CryptConfig,
|
|
|
|
KeyConfig,
|
2020-11-20 16:38:34 +00:00
|
|
|
KeyDerivationConfig,
|
2020-07-06 09:39:24 +00:00
|
|
|
};
|
|
|
|
use proxmox_backup::tools;
|
|
|
|
|
2020-09-30 07:58:13 +00:00
|
|
|
#[api()]
|
|
|
|
#[derive(Debug, Serialize, Deserialize)]
|
|
|
|
#[serde(rename_all = "lowercase")]
|
|
|
|
/// Paperkey output format
|
|
|
|
pub enum PaperkeyFormat {
|
|
|
|
/// Format as Utf8 text. Includes QR codes as ascii-art.
|
|
|
|
Text,
|
|
|
|
/// Format as Html. Includes QR codes as png images.
|
|
|
|
Html,
|
|
|
|
}
|
|
|
|
|
2020-07-08 08:42:05 +00:00
|
|
|
pub const DEFAULT_ENCRYPTION_KEY_FILE_NAME: &str = "encryption-key.json";
|
2020-07-08 08:56:16 +00:00
|
|
|
pub const MASTER_PUBKEY_FILE_NAME: &str = "master-public.pem";
|
2020-07-08 08:42:05 +00:00
|
|
|
|
2020-07-08 08:56:16 +00:00
|
|
|
pub fn find_master_pubkey() -> Result<Option<PathBuf>, Error> {
|
|
|
|
super::find_xdg_file(MASTER_PUBKEY_FILE_NAME, "main public key file")
|
|
|
|
}
|
2020-07-06 09:39:24 +00:00
|
|
|
|
2020-07-08 08:56:16 +00:00
|
|
|
pub fn place_master_pubkey() -> Result<PathBuf, Error> {
|
|
|
|
super::place_xdg_file(MASTER_PUBKEY_FILE_NAME, "main public key file")
|
2020-07-06 09:39:24 +00:00
|
|
|
}
|
|
|
|
|
2020-07-08 08:42:05 +00:00
|
|
|
pub fn find_default_encryption_key() -> Result<Option<PathBuf>, Error> {
|
2020-07-08 08:56:16 +00:00
|
|
|
super::find_xdg_file(DEFAULT_ENCRYPTION_KEY_FILE_NAME, "default encryption key file")
|
2020-07-08 08:42:05 +00:00
|
|
|
}
|
2020-07-06 09:39:24 +00:00
|
|
|
|
2020-07-08 08:42:05 +00:00
|
|
|
pub fn place_default_encryption_key() -> Result<PathBuf, Error> {
|
2020-07-08 08:56:16 +00:00
|
|
|
super::place_xdg_file(DEFAULT_ENCRYPTION_KEY_FILE_NAME, "default encryption key file")
|
2020-07-06 09:39:24 +00:00
|
|
|
}
|
|
|
|
|
2020-07-08 11:52:17 +00:00
|
|
|
pub fn read_optional_default_encryption_key() -> Result<Option<Vec<u8>>, Error> {
|
|
|
|
find_default_encryption_key()?
|
|
|
|
.map(file_get_contents)
|
|
|
|
.transpose()
|
|
|
|
}
|
|
|
|
|
2020-07-06 09:39:24 +00:00
|
|
|
pub fn get_encryption_key_password() -> Result<Vec<u8>, Error> {
|
|
|
|
// fixme: implement other input methods
|
|
|
|
|
|
|
|
use std::env::VarError::*;
|
|
|
|
match std::env::var("PBS_ENCRYPTION_PASSWORD") {
|
|
|
|
Ok(p) => return Ok(p.as_bytes().to_vec()),
|
|
|
|
Err(NotUnicode(_)) => bail!("PBS_ENCRYPTION_PASSWORD contains bad characters"),
|
|
|
|
Err(NotPresent) => {
|
|
|
|
// Try another method
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we're on a TTY, query the user for a password
|
|
|
|
if tty::stdin_isatty() {
|
|
|
|
return Ok(tty::read_password("Encryption Key Password: ")?);
|
|
|
|
}
|
|
|
|
|
|
|
|
bail!("no password input mechanism available");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[api(
|
|
|
|
default: "scrypt",
|
|
|
|
)]
|
|
|
|
#[derive(Clone, Copy, Debug, Deserialize, Serialize)]
|
|
|
|
#[serde(rename_all = "kebab-case")]
|
|
|
|
/// Key derivation function for password protected encryption keys.
|
|
|
|
pub enum Kdf {
|
|
|
|
/// Do not encrypt the key.
|
|
|
|
None,
|
|
|
|
|
|
|
|
/// Encrypt they key with a password using SCrypt.
|
|
|
|
Scrypt,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for Kdf {
|
|
|
|
#[inline]
|
|
|
|
fn default() -> Self {
|
|
|
|
Kdf::Scrypt
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[api(
|
|
|
|
input: {
|
|
|
|
properties: {
|
|
|
|
kdf: {
|
|
|
|
type: Kdf,
|
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
path: {
|
|
|
|
description:
|
|
|
|
"Output file. Without this the key will become the new default encryption key.",
|
|
|
|
optional: true,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)]
|
|
|
|
/// Create a new encryption key.
|
|
|
|
fn create(kdf: Option<Kdf>, path: Option<String>) -> Result<(), Error> {
|
|
|
|
let path = match path {
|
|
|
|
Some(path) => PathBuf::from(path),
|
2020-07-10 07:57:55 +00:00
|
|
|
None => {
|
|
|
|
let path = place_default_encryption_key()?;
|
|
|
|
println!("creating default key at: {:?}", path);
|
|
|
|
path
|
|
|
|
}
|
2020-07-06 09:39:24 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
let kdf = kdf.unwrap_or_default();
|
|
|
|
|
2020-11-20 16:38:32 +00:00
|
|
|
let mut key_array = [0u8; 32];
|
|
|
|
proxmox::sys::linux::fill_with_random_data(&mut key_array)?;
|
|
|
|
let crypt_config = CryptConfig::new(key_array.clone())?;
|
|
|
|
let key = key_array.to_vec();
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
match kdf {
|
|
|
|
Kdf::None => {
|
2020-09-12 13:10:47 +00:00
|
|
|
let created = proxmox::tools::time::epoch_i64();
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
store_key_config(
|
|
|
|
&path,
|
|
|
|
false,
|
|
|
|
KeyConfig {
|
|
|
|
kdf: None,
|
|
|
|
created,
|
|
|
|
modified: created,
|
|
|
|
data: key,
|
2020-11-20 16:38:32 +00:00
|
|
|
fingerprint: Some(crypt_config.fingerprint()),
|
2020-07-06 09:39:24 +00:00
|
|
|
},
|
|
|
|
)?;
|
|
|
|
}
|
|
|
|
Kdf::Scrypt => {
|
|
|
|
// always read passphrase from tty
|
|
|
|
if !tty::stdin_isatty() {
|
|
|
|
bail!("unable to read passphrase - no tty");
|
|
|
|
}
|
|
|
|
|
|
|
|
let password = tty::read_and_verify_password("Encryption Key Password: ")?;
|
|
|
|
|
2020-11-20 16:38:32 +00:00
|
|
|
let mut key_config = encrypt_key_with_passphrase(&key, &password)?;
|
|
|
|
key_config.fingerprint = Some(crypt_config.fingerprint());
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
store_key_config(&path, false, key_config)?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[api(
|
|
|
|
input: {
|
|
|
|
properties: {
|
|
|
|
kdf: {
|
|
|
|
type: Kdf,
|
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
path: {
|
|
|
|
description: "Key file. Without this the default key's password will be changed.",
|
|
|
|
optional: true,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)]
|
|
|
|
/// Change the encryption key's password.
|
|
|
|
fn change_passphrase(kdf: Option<Kdf>, path: Option<String>) -> Result<(), Error> {
|
|
|
|
let path = match path {
|
|
|
|
Some(path) => PathBuf::from(path),
|
2020-07-10 07:57:55 +00:00
|
|
|
None => {
|
|
|
|
let path = find_default_encryption_key()?
|
|
|
|
.ok_or_else(|| {
|
|
|
|
format_err!("no encryption file provided and no default file found")
|
|
|
|
})?;
|
|
|
|
println!("updating default key at: {:?}", path);
|
|
|
|
path
|
|
|
|
}
|
2020-07-06 09:39:24 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
let kdf = kdf.unwrap_or_default();
|
|
|
|
|
|
|
|
if !tty::stdin_isatty() {
|
|
|
|
bail!("unable to change passphrase - no tty");
|
|
|
|
}
|
|
|
|
|
2020-11-20 16:38:32 +00:00
|
|
|
let (key, created, fingerprint) = load_and_decrypt_key(&path, &get_encryption_key_password)?;
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
match kdf {
|
|
|
|
Kdf::None => {
|
2020-09-12 13:10:47 +00:00
|
|
|
let modified = proxmox::tools::time::epoch_i64();
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
store_key_config(
|
|
|
|
&path,
|
|
|
|
true,
|
|
|
|
KeyConfig {
|
|
|
|
kdf: None,
|
|
|
|
created, // keep original value
|
|
|
|
modified,
|
|
|
|
data: key.to_vec(),
|
2020-11-20 16:38:32 +00:00
|
|
|
fingerprint: Some(fingerprint),
|
2020-07-06 09:39:24 +00:00
|
|
|
},
|
|
|
|
)?;
|
|
|
|
}
|
|
|
|
Kdf::Scrypt => {
|
|
|
|
let password = tty::read_and_verify_password("New Password: ")?;
|
|
|
|
|
|
|
|
let mut new_key_config = encrypt_key_with_passphrase(&key, &password)?;
|
|
|
|
new_key_config.created = created; // keep original value
|
2020-11-20 16:38:32 +00:00
|
|
|
new_key_config.fingerprint = Some(fingerprint);
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
store_key_config(&path, true, new_key_config)?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-11-20 16:38:34 +00:00
|
|
|
#[api(
|
|
|
|
input: {
|
|
|
|
properties: {
|
|
|
|
path: {
|
|
|
|
description: "Key file. Without this the default key's metadata will be shown.",
|
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
"output-format": {
|
|
|
|
schema: OUTPUT_FORMAT,
|
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)]
|
|
|
|
/// Print the encryption key's metadata.
|
|
|
|
fn show_key(
|
|
|
|
path: Option<String>,
|
|
|
|
param: Value,
|
|
|
|
) -> Result<(), Error> {
|
|
|
|
let path = match path {
|
|
|
|
Some(path) => PathBuf::from(path),
|
|
|
|
None => {
|
|
|
|
let path = find_default_encryption_key()?
|
|
|
|
.ok_or_else(|| {
|
|
|
|
format_err!("no encryption file provided and no default file found")
|
|
|
|
})?;
|
|
|
|
path
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let output_format = get_output_format(¶m);
|
|
|
|
let config: KeyConfig = serde_json::from_slice(&file_get_contents(path.clone())?)?;
|
|
|
|
|
|
|
|
if output_format == "text" {
|
|
|
|
println!("Path: {:?}", path);
|
|
|
|
match config.kdf {
|
|
|
|
Some(KeyDerivationConfig::PBKDF2 { .. }) => println!("KDF: pbkdf2"),
|
|
|
|
Some(KeyDerivationConfig::Scrypt { .. }) => println!("KDF: scrypt"),
|
|
|
|
None => println!("KDF: none (plaintext key)"),
|
|
|
|
};
|
|
|
|
println!("Created: {}", proxmox::tools::time::epoch_to_rfc3339_utc(config.created)?);
|
|
|
|
println!("Modified: {}", proxmox::tools::time::epoch_to_rfc3339_utc(config.modified)?);
|
|
|
|
match config.fingerprint {
|
|
|
|
Some(fp) => println!("Fingerprint: {}", fp),
|
|
|
|
None => println!("Fingerprint: none (legacy key)"),
|
|
|
|
};
|
|
|
|
} else {
|
|
|
|
format_and_print_result(&serde_json::to_value(config)?, &output_format);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-07-06 09:39:24 +00:00
|
|
|
#[api(
|
|
|
|
input: {
|
|
|
|
properties: {
|
|
|
|
path: {
|
|
|
|
description: "Path to the PEM formatted RSA public key.",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)]
|
|
|
|
/// Import an RSA public key used to put an encrypted version of the symmetric backup encryption
|
|
|
|
/// key onto the backup server along with each backup.
|
|
|
|
fn import_master_pubkey(path: String) -> Result<(), Error> {
|
|
|
|
let pem_data = file_get_contents(&path)?;
|
|
|
|
|
|
|
|
if let Err(err) = openssl::pkey::PKey::public_key_from_pem(&pem_data) {
|
|
|
|
bail!("Unable to decode PEM data - {}", err);
|
|
|
|
}
|
|
|
|
|
2020-07-08 08:56:16 +00:00
|
|
|
let target_path = place_master_pubkey()?;
|
2020-07-06 09:39:24 +00:00
|
|
|
|
|
|
|
replace_file(&target_path, &pem_data, CreateOptions::new())?;
|
|
|
|
|
|
|
|
println!("Imported public master key to {:?}", target_path);
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[api]
|
|
|
|
/// Create an RSA public/private key pair used to put an encrypted version of the symmetric backup
|
|
|
|
/// encryption key onto the backup server along with each backup.
|
|
|
|
fn create_master_key() -> Result<(), Error> {
|
|
|
|
// we need a TTY to query the new password
|
|
|
|
if !tty::stdin_isatty() {
|
|
|
|
bail!("unable to create master key - no tty");
|
|
|
|
}
|
|
|
|
|
|
|
|
let rsa = openssl::rsa::Rsa::generate(4096)?;
|
|
|
|
let pkey = openssl::pkey::PKey::from_rsa(rsa)?;
|
|
|
|
|
|
|
|
let password = String::from_utf8(tty::read_and_verify_password("Master Key Password: ")?)?;
|
|
|
|
|
|
|
|
let pub_key: Vec<u8> = pkey.public_key_to_pem()?;
|
|
|
|
let filename_pub = "master-public.pem";
|
|
|
|
println!("Writing public master key to {}", filename_pub);
|
|
|
|
replace_file(filename_pub, pub_key.as_slice(), CreateOptions::new())?;
|
|
|
|
|
|
|
|
let cipher = openssl::symm::Cipher::aes_256_cbc();
|
|
|
|
let priv_key: Vec<u8> = pkey.private_key_to_pem_pkcs8_passphrase(cipher, password.as_bytes())?;
|
|
|
|
|
|
|
|
let filename_priv = "master-private.pem";
|
|
|
|
println!("Writing private master key to {}", filename_priv);
|
|
|
|
replace_file(filename_priv, priv_key.as_slice(), CreateOptions::new())?;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-09-28 15:40:12 +00:00
|
|
|
#[api(
|
|
|
|
input: {
|
|
|
|
properties: {
|
|
|
|
path: {
|
|
|
|
description: "Key file. Without this the default key's will be used.",
|
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
subject: {
|
|
|
|
description: "Include the specified subject as titel text.",
|
|
|
|
optional: true,
|
|
|
|
},
|
2020-09-30 07:58:13 +00:00
|
|
|
"output-format": {
|
|
|
|
type: PaperkeyFormat,
|
|
|
|
description: "Output format. Text or Html.",
|
|
|
|
optional: true,
|
|
|
|
},
|
2020-09-28 15:40:12 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
)]
|
|
|
|
/// Generate a printable, human readable text file containing the encryption key.
|
|
|
|
///
|
|
|
|
/// This also includes a scanable QR code for fast key restore.
|
2020-09-30 07:58:13 +00:00
|
|
|
fn paper_key(
|
|
|
|
path: Option<String>,
|
|
|
|
subject: Option<String>,
|
|
|
|
output_format: Option<PaperkeyFormat>,
|
|
|
|
) -> Result<(), Error> {
|
2020-09-28 15:40:12 +00:00
|
|
|
let path = match path {
|
|
|
|
Some(path) => PathBuf::from(path),
|
|
|
|
None => {
|
|
|
|
let path = find_default_encryption_key()?
|
|
|
|
.ok_or_else(|| {
|
|
|
|
format_err!("no encryption file provided and no default file found")
|
|
|
|
})?;
|
|
|
|
path
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let data = file_get_contents(&path)?;
|
2020-09-29 06:19:33 +00:00
|
|
|
let data = std::str::from_utf8(&data)?;
|
2020-09-28 15:40:12 +00:00
|
|
|
|
2020-09-30 07:58:13 +00:00
|
|
|
let format = output_format.unwrap_or(PaperkeyFormat::Html);
|
|
|
|
|
|
|
|
match format {
|
|
|
|
PaperkeyFormat::Html => paperkey_html(data, subject),
|
|
|
|
PaperkeyFormat::Text => paperkey_text(data, subject),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn cli() -> CliCommandMap {
|
|
|
|
let key_create_cmd_def = CliCommand::new(&API_METHOD_CREATE)
|
|
|
|
.arg_param(&["path"])
|
|
|
|
.completion_cb("path", tools::complete_file_name);
|
|
|
|
|
|
|
|
let key_change_passphrase_cmd_def = CliCommand::new(&API_METHOD_CHANGE_PASSPHRASE)
|
|
|
|
.arg_param(&["path"])
|
|
|
|
.completion_cb("path", tools::complete_file_name);
|
|
|
|
|
|
|
|
let key_create_master_key_cmd_def = CliCommand::new(&API_METHOD_CREATE_MASTER_KEY);
|
|
|
|
let key_import_master_pubkey_cmd_def = CliCommand::new(&API_METHOD_IMPORT_MASTER_PUBKEY)
|
|
|
|
.arg_param(&["path"])
|
|
|
|
.completion_cb("path", tools::complete_file_name);
|
|
|
|
|
2020-11-20 16:38:34 +00:00
|
|
|
let key_show_cmd_def = CliCommand::new(&API_METHOD_SHOW_KEY)
|
|
|
|
.arg_param(&["path"])
|
|
|
|
.completion_cb("path", tools::complete_file_name);
|
|
|
|
|
2020-09-30 07:58:13 +00:00
|
|
|
let paper_key_cmd_def = CliCommand::new(&API_METHOD_PAPER_KEY)
|
|
|
|
.arg_param(&["path"])
|
|
|
|
.completion_cb("path", tools::complete_file_name);
|
|
|
|
|
|
|
|
CliCommandMap::new()
|
|
|
|
.insert("create", key_create_cmd_def)
|
|
|
|
.insert("create-master-key", key_create_master_key_cmd_def)
|
|
|
|
.insert("import-master-pubkey", key_import_master_pubkey_cmd_def)
|
|
|
|
.insert("change-passphrase", key_change_passphrase_cmd_def)
|
2020-11-20 16:38:34 +00:00
|
|
|
.insert("show", key_show_cmd_def)
|
2020-10-13 07:44:40 +00:00
|
|
|
.insert("paperkey", paper_key_cmd_def)
|
2020-09-30 07:58:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn paperkey_html(data: &str, subject: Option<String>) -> Result<(), Error> {
|
|
|
|
|
|
|
|
let img_size_pt = 500;
|
|
|
|
|
|
|
|
println!("<!DOCTYPE html>");
|
|
|
|
println!("<html lang=\"en\">");
|
|
|
|
println!("<head>");
|
|
|
|
println!("<meta charset=\"utf-8\">");
|
|
|
|
println!("<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">");
|
|
|
|
println!("<title>Proxmox Backup Paperkey</title>");
|
|
|
|
println!("<style type=\"text/css\">");
|
|
|
|
|
|
|
|
println!(" p {{");
|
|
|
|
println!(" font-size: 12pt;");
|
|
|
|
println!(" font-family: monospace;");
|
|
|
|
println!(" white-space: pre-wrap;");
|
|
|
|
println!(" line-break: anywhere;");
|
|
|
|
println!(" }}");
|
|
|
|
|
|
|
|
println!("</style>");
|
|
|
|
|
|
|
|
println!("</head>");
|
|
|
|
|
|
|
|
println!("<body>");
|
|
|
|
|
2020-09-28 15:40:12 +00:00
|
|
|
if let Some(subject) = subject {
|
2020-09-30 07:58:13 +00:00
|
|
|
println!("<p>Subject: {}</p>", subject);
|
2020-09-28 15:40:12 +00:00
|
|
|
}
|
|
|
|
|
2020-09-29 06:19:33 +00:00
|
|
|
if data.starts_with("-----BEGIN ENCRYPTED PRIVATE KEY-----\n") {
|
2020-09-30 07:58:13 +00:00
|
|
|
let lines: Vec<String> = data.lines()
|
|
|
|
.map(|s| s.trim_end())
|
|
|
|
.filter(|s| !s.is_empty())
|
|
|
|
.map(String::from)
|
|
|
|
.collect();
|
|
|
|
|
|
|
|
if !lines[lines.len()-1].starts_with("-----END ENCRYPTED PRIVATE KEY-----") {
|
|
|
|
bail!("unexpected key format");
|
|
|
|
}
|
|
|
|
|
|
|
|
if lines.len() < 20 {
|
|
|
|
bail!("unexpected key format");
|
|
|
|
}
|
|
|
|
|
|
|
|
const BLOCK_SIZE: usize = 20;
|
|
|
|
let blocks = (lines.len() + BLOCK_SIZE -1)/BLOCK_SIZE;
|
2020-09-28 15:40:12 +00:00
|
|
|
|
2020-09-30 07:58:13 +00:00
|
|
|
for i in 0..blocks {
|
|
|
|
let start = i*BLOCK_SIZE;
|
|
|
|
let mut end = start + BLOCK_SIZE;
|
|
|
|
if end > lines.len() {
|
|
|
|
end = lines.len();
|
|
|
|
}
|
|
|
|
let data = &lines[start..end];
|
|
|
|
|
|
|
|
println!("<div style=\"page-break-inside: avoid;page-break-after: always\">");
|
|
|
|
println!("<p>");
|
|
|
|
|
|
|
|
for l in start..end {
|
|
|
|
println!("{:02}: {}", l, lines[l]);
|
|
|
|
}
|
|
|
|
|
|
|
|
println!("</p>");
|
|
|
|
|
|
|
|
let data = data.join("\n");
|
2020-10-20 10:04:51 +00:00
|
|
|
let qr_code = generate_qr_code("svg", data.as_bytes())?;
|
2020-09-30 07:58:13 +00:00
|
|
|
let qr_code = base64::encode_config(&qr_code, base64::STANDARD_NO_PAD);
|
|
|
|
|
|
|
|
println!("<center>");
|
|
|
|
println!("<img");
|
|
|
|
println!("width=\"{}pt\" height=\"{}pt\"", img_size_pt, img_size_pt);
|
2020-10-20 10:04:51 +00:00
|
|
|
println!("src=\"data:image/svg+xml;base64,{}\"/>", qr_code);
|
2020-09-30 07:58:13 +00:00
|
|
|
println!("</center>");
|
|
|
|
println!("</div>");
|
|
|
|
}
|
|
|
|
|
|
|
|
println!("</body>");
|
|
|
|
println!("</html>");
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
|
|
|
let key_config: KeyConfig = serde_json::from_str(&data)?;
|
|
|
|
let key_text = serde_json::to_string_pretty(&key_config)?;
|
|
|
|
|
|
|
|
println!("<div style=\"page-break-inside: avoid\">");
|
|
|
|
|
|
|
|
println!("<p>");
|
|
|
|
|
|
|
|
println!("-----BEGIN PROXMOX BACKUP KEY-----");
|
|
|
|
|
|
|
|
for line in key_text.lines() {
|
|
|
|
println!("{}", line);
|
|
|
|
}
|
|
|
|
|
|
|
|
println!("-----END PROXMOX BACKUP KEY-----");
|
|
|
|
|
|
|
|
println!("</p>");
|
|
|
|
|
2020-10-20 10:04:51 +00:00
|
|
|
let qr_code = generate_qr_code("svg", key_text.as_bytes())?;
|
2020-09-30 07:58:13 +00:00
|
|
|
let qr_code = base64::encode_config(&qr_code, base64::STANDARD_NO_PAD);
|
|
|
|
|
|
|
|
println!("<center>");
|
|
|
|
println!("<img");
|
|
|
|
println!("width=\"{}pt\" height=\"{}pt\"", img_size_pt, img_size_pt);
|
2020-10-20 10:04:51 +00:00
|
|
|
println!("src=\"data:image/svg+xml;base64,{}\"/>", qr_code);
|
2020-09-30 07:58:13 +00:00
|
|
|
println!("</center>");
|
|
|
|
|
|
|
|
println!("</div>");
|
|
|
|
|
|
|
|
println!("</body>");
|
|
|
|
println!("</html>");
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn paperkey_text(data: &str, subject: Option<String>) -> Result<(), Error> {
|
|
|
|
|
|
|
|
if let Some(subject) = subject {
|
|
|
|
println!("Subject: {}\n", subject);
|
|
|
|
}
|
|
|
|
|
|
|
|
if data.starts_with("-----BEGIN ENCRYPTED PRIVATE KEY-----\n") {
|
2020-09-29 06:19:33 +00:00
|
|
|
let lines: Vec<String> = data.lines()
|
|
|
|
.map(|s| s.trim_end())
|
|
|
|
.filter(|s| !s.is_empty())
|
|
|
|
.map(String::from)
|
|
|
|
.collect();
|
2020-09-28 15:40:12 +00:00
|
|
|
|
2020-09-29 06:19:33 +00:00
|
|
|
if !lines[lines.len()-1].starts_with("-----END ENCRYPTED PRIVATE KEY-----") {
|
|
|
|
bail!("unexpected key format");
|
|
|
|
}
|
|
|
|
|
|
|
|
if lines.len() < 20 {
|
|
|
|
bail!("unexpected key format");
|
|
|
|
}
|
|
|
|
|
|
|
|
const BLOCK_SIZE: usize = 5;
|
|
|
|
let blocks = (lines.len() + BLOCK_SIZE -1)/BLOCK_SIZE;
|
|
|
|
|
|
|
|
for i in 0..blocks {
|
|
|
|
let start = i*BLOCK_SIZE;
|
|
|
|
let mut end = start + BLOCK_SIZE;
|
|
|
|
if end > lines.len() {
|
|
|
|
end = lines.len();
|
|
|
|
}
|
|
|
|
let data = &lines[start..end];
|
|
|
|
|
|
|
|
for l in start..end {
|
2020-09-30 07:58:13 +00:00
|
|
|
println!("{:-2}: {}", l, lines[l]);
|
2020-09-29 06:19:33 +00:00
|
|
|
}
|
|
|
|
let data = data.join("\n");
|
|
|
|
let qr_code = generate_qr_code("utf8i", data.as_bytes())?;
|
2020-09-30 07:58:13 +00:00
|
|
|
let qr_code = String::from_utf8(qr_code)
|
|
|
|
.map_err(|_| format_err!("Failed to read qr code (got non-utf8 data)"))?;
|
2020-09-29 06:19:33 +00:00
|
|
|
println!("{}", qr_code);
|
|
|
|
println!("{}", char::from(12u8)); // page break
|
|
|
|
|
|
|
|
}
|
|
|
|
return Ok(());
|
2020-09-28 15:40:12 +00:00
|
|
|
}
|
|
|
|
|
2020-09-29 06:19:33 +00:00
|
|
|
let key_config: KeyConfig = serde_json::from_str(&data)?;
|
|
|
|
let key_text = serde_json::to_string_pretty(&key_config)?;
|
2020-09-28 15:40:12 +00:00
|
|
|
|
2020-09-29 06:19:33 +00:00
|
|
|
println!("-----BEGIN PROXMOX BACKUP KEY-----");
|
|
|
|
println!("{}", key_text);
|
|
|
|
println!("-----END PROXMOX BACKUP KEY-----");
|
|
|
|
|
|
|
|
let qr_code = generate_qr_code("utf8i", key_text.as_bytes())?;
|
2020-09-30 07:58:13 +00:00
|
|
|
let qr_code = String::from_utf8(qr_code)
|
|
|
|
.map_err(|_| format_err!("Failed to read qr code (got non-utf8 data)"))?;
|
2020-09-29 06:19:33 +00:00
|
|
|
|
|
|
|
println!("{}", qr_code);
|
2020-09-28 15:40:12 +00:00
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-09-30 07:58:13 +00:00
|
|
|
fn generate_qr_code(output_type: &str, data: &[u8]) -> Result<Vec<u8>, Error> {
|
2020-09-29 06:19:33 +00:00
|
|
|
|
|
|
|
let mut child = Command::new("qrencode")
|
2020-09-30 07:58:13 +00:00
|
|
|
.args(&["-t", output_type, "-m0", "-s1", "-lm", "--output", "-"])
|
2020-09-29 06:19:33 +00:00
|
|
|
.stdin(Stdio::piped())
|
|
|
|
.stdout(Stdio::piped())
|
|
|
|
.spawn()?;
|
|
|
|
|
|
|
|
{
|
|
|
|
let stdin = child.stdin.as_mut()
|
|
|
|
.ok_or_else(|| format_err!("Failed to open stdin"))?;
|
|
|
|
stdin.write_all(data)
|
|
|
|
.map_err(|_| format_err!("Failed to write to stdin"))?;
|
|
|
|
}
|
|
|
|
|
|
|
|
let output = child.wait_with_output()
|
|
|
|
.map_err(|_| format_err!("Failed to read stdout"))?;
|
|
|
|
|
2020-09-30 07:58:13 +00:00
|
|
|
let output = crate::tools::command_output(output, None)?;
|
2020-09-29 06:19:33 +00:00
|
|
|
|
|
|
|
Ok(output)
|
|
|
|
}
|