File tree 2 files changed +3
-3
lines changed
2 files changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -332,15 +332,15 @@ impl Account {
332
332
& self . inner . id
333
333
}
334
334
335
- /// Account key rollover
335
+ /// Update the account's authentication key
336
336
///
337
337
/// This is useful if you want to change the ACME account key of an existing account, e.g.
338
338
/// to mitigate the risk of a key compromise. This method creates a new client key and changes
339
339
/// the key associated with the existing account. `self` will be updated with the new key,
340
340
/// and a fresh set of [`AccountCredentials`] will be returned to update stored credentials.
341
341
///
342
342
/// See <https://datatracker.ietf.org/doc/html/rfc8555#section-7.3.5> for more information.
343
- pub async fn change_key ( & mut self ) -> Result < AccountCredentials , Error > {
343
+ pub async fn update_key ( & mut self ) -> Result < AccountCredentials , Error > {
344
344
let new_key_url = match self . inner . client . directory . key_change . as_deref ( ) {
345
345
Some ( url) => url,
346
346
None => return Err ( "Account key rollover not supported by ACME CA" . into ( ) ) ,
Original file line number Diff line number Diff line change @@ -341,7 +341,7 @@ async fn change_key() -> Result<(), Box<dyn StdError>> {
341
341
let mut env = Environment :: new ( EnvironmentConfig :: default ( ) ) . await ?;
342
342
343
343
// Change the account key
344
- let new_credentials = env. account . change_key ( ) . await ?;
344
+ let new_credentials = env. account . update_key ( ) . await ?;
345
345
346
346
// Using the old ACME account key should now produce malformed error.
347
347
let Err ( Error :: Api ( problem) ) = env
You can’t perform that action at this time.
0 commit comments