summaryrefslogtreecommitdiff
path: root/src/leap/soledad/__init__.py
diff options
context:
space:
mode:
authordrebs <drebs@leap.se>2013-03-11 12:20:11 -0300
committerdrebs <drebs@leap.se>2013-03-11 12:20:11 -0300
commitaa48da25c13c1565c72bf5f0cb93b49fbc27c29a (patch)
treecbe38da43cb6e80171c267dc2bf1e7e1789778a4 /src/leap/soledad/__init__.py
parenta3e4744390c29103918ad6180598f6a508e35041 (diff)
Add recovery document export.
Diffstat (limited to 'src/leap/soledad/__init__.py')
-rw-r--r--src/leap/soledad/__init__.py36
1 files changed, 36 insertions, 0 deletions
diff --git a/src/leap/soledad/__init__.py b/src/leap/soledad/__init__.py
index 5fe49d0a..d883a8d0 100644
--- a/src/leap/soledad/__init__.py
+++ b/src/leap/soledad/__init__.py
@@ -66,6 +66,7 @@ class Soledad(object):
'shared_db_url': '',
}
+ # TODO: separate username from provider, currently in user_email.
def __init__(self, user_email, prefix=None, gnupg_home=None,
secret_path=None, local_db_path=None,
config_file=None, shared_db_url=None, auth_token=None,
@@ -447,5 +448,40 @@ class Soledad(object):
# TODO: create authentication scheme for sync with server.
return self._db.sync(url, creds=None, autocreate=True)
+ #-------------------------------------------------------------------------
+ # Recovery document export and import
+ #-------------------------------------------------------------------------
+
+ def export_recovery_document(self, passphrase):
+ """
+ Exports username, provider, private key and key for symmetric
+ encryption, optionally encrypted with a password.
+
+ The LEAP client gives the user the option to export a text file with a
+ complete copy of their private keys and authorization information,
+ either password protected or not. This "recovery document" can be
+ printed or saved electronically as the user sees fit. If the user
+ needs to recover their data, they can load this recover document into
+ any LEAP client. The user can also type the recovery document in
+ manually, although it will be long and very painful to copy manually.
+
+ Contents of recovery document:
+
+ - username
+ - provider
+ - private key.
+ - key for symmetric encryption
+ """
+ data = json.dumps([
+ self._user_email,
+ self._gpg.export_keys(self._fingerprint, secret=True),
+ self._secret
+ ])
+ if passphrase:
+ data = str(self._gpg.encrypt(data, None, sign=None,
+ passphrase=passphrase,
+ symmetric=True))
+ return data
+
__all__ = ['backends', 'util', 'server', 'shared_db']