taler-deployment

Deployment scripts and configuration files
Log | Files | Refs | README

commit c013414ee825b070ba442a20e295b83c6887cd87
parent 84a69c0fbcf99c82fec87e84f51625e3ddf1a7e8
Author: Marcello Stanisci <stanisci.m@gmail.com>
Date:   Sun,  9 Jun 2019 04:41:17 +0200

salting auditor input as well

Diffstat:
Mbin/taler-deployment-keyup | 9+++++----
1 file changed, 5 insertions(+), 4 deletions(-)

diff --git a/bin/taler-deployment-keyup b/bin/taler-deployment-keyup @@ -20,6 +20,7 @@ if ! test -f $(taler-config -s paths -o taler_deployment_shared -f)/hier.lock; t exit 1 fi +DATESALT=$(date +%s%N) AUDITOR_REQUEST_DIR=$(taler-config -s exchangedb -o auditor_inputs -f) AUDITOR_BASE_DIR=$(taler-config -s exchangedb -o auditor_base_dir -f) AUDITOR_PRIV=$(taler-config -s auditor -o auditor_priv_file -f) @@ -46,7 +47,7 @@ fi mkdir -p $AUDITOR_REQUEST_DIR taler-exchange-keyup \ -m $EXCHANGE_PRIV \ - -o $AUDITOR_REQUEST_DIR/auditor_request + -o $AUDITOR_REQUEST_DIR/auditor_request-${DATESALT} # or-ing with true as user A won't be able to # change permissions for user B's files. @@ -60,13 +61,13 @@ taler-auditor-exchange \ # Checks whether any denom key was generated, and # only sign it if so. -if [[ -s $AUDITOR_REQUEST_DIR/auditor_request ]]; then +if [[ -s $AUDITOR_REQUEST_DIR/auditor_request-${DATESALT} ]]; then echo "Signing key material by auditor.." taler-auditor-sign \ -u $TALER_ENV_URL_AUDITOR \ -m $EXCHANGE_PUB \ - -r "$AUDITOR_REQUEST_DIR/auditor_request" \ - -o "$AUDITOR_BASE_DIR/$(date +%s%N)" \ + -r "$AUDITOR_REQUEST_DIR/auditor_request-${DATESALT}" \ + -o "$AUDITOR_BASE_DIR/$DATESALT" \ -c ${HOME}/.config/taler.conf fi