[pbs-devel] [PATCH proxmox-backup v2 4/5] fix #3887: api: access: allow secret regeneration
Hannes Laimer
h.laimer at proxmox.com
Fri Apr 4 17:10:16 CEST 2025
... through the token PUT endpoint by adding a new `regenerate` bool
parameter.
Signed-off-by: Hannes Laimer <h.laimer at proxmox.com>
---
src/api2/access/user.rs | 32 +++++++++++++++++++++++++++++---
1 file changed, 29 insertions(+), 3 deletions(-)
diff --git a/src/api2/access/user.rs b/src/api2/access/user.rs
index a51ee8f3f..478bb799b 100644
--- a/src/api2/access/user.rs
+++ b/src/api2/access/user.rs
@@ -14,7 +14,8 @@ use proxmox_tfa::api::TfaConfig;
use pbs_api_types::{
ApiToken, Authid, Tokenname, User, UserUpdater, UserWithTokens, Userid, ENABLE_USER_SCHEMA,
EXPIRE_USER_SCHEMA, PASSWORD_FORMAT, PBS_PASSWORD_SCHEMA, PRIV_PERMISSIONS_MODIFY,
- PRIV_SYS_AUDIT, PROXMOX_CONFIG_DIGEST_SCHEMA, SINGLE_LINE_COMMENT_SCHEMA,
+ PRIV_SYS_AUDIT, PROXMOX_CONFIG_DIGEST_SCHEMA, REGENERATE_TOKEN_SCHEMA,
+ SINGLE_LINE_COMMENT_SCHEMA,
};
use pbs_config::{acl::AclTree, token_shadow, CachedUserInfo};
@@ -558,6 +559,10 @@ pub enum DeletableTokenProperty {
schema: EXPIRE_USER_SCHEMA,
optional: true,
},
+ regenerate: {
+ schema: REGENERATE_TOKEN_SCHEMA,
+ optional: true,
+ },
delete: {
description: "List of properties to delete.",
type: Array,
@@ -571,6 +576,16 @@ pub enum DeletableTokenProperty {
schema: PROXMOX_CONFIG_DIGEST_SCHEMA,
},
},
+ },
+ returns: {
+ description: "Regenerated secret, if regenerate is set.",
+ properties: {
+ secret: {
+ type: String,
+ optional: true,
+ description: "The new API token secret",
+ },
+ },
},
access: {
permission: &Permission::Or(&[
@@ -586,9 +601,10 @@ pub fn update_token(
comment: Option<String>,
enable: Option<bool>,
expire: Option<i64>,
+ regenerate: Option<bool>,
delete: Option<Vec<DeletableTokenProperty>>,
digest: Option<String>,
-) -> Result<(), Error> {
+) -> Result<Value, Error> {
let _lock = pbs_config::user::lock_config()?;
let (mut config, expected_digest) = pbs_config::user::config()?;
@@ -628,11 +644,21 @@ pub fn update_token(
data.expire = if expire > 0 { Some(expire) } else { None };
}
+ let new_secret = if regenerate.unwrap_or_default() {
+ Some(token_shadow::generate_and_set_secret(&tokenid)?)
+ } else {
+ None
+ };
+
config.set_data(&tokenid_string, "token", &data)?;
pbs_config::user::save_config(&config)?;
- Ok(())
+ if let Some(secret) = new_secret {
+ Ok(json!({"secret": secret}))
+ } else {
+ Ok(Value::Null)
+ }
}
#[api(
--
2.39.5
More information about the pbs-devel
mailing list