basegocloud.go 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. package kms
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "time"
  6. "gocloud.dev/secrets"
  7. // import awskms package
  8. _ "gocloud.dev/secrets/awskms"
  9. // import gcpkms package
  10. _ "gocloud.dev/secrets/gcpkms"
  11. // import hashivault package
  12. _ "gocloud.dev/secrets/hashivault"
  13. )
  14. type baseGCloudSecret struct {
  15. baseSecret
  16. masterKey string
  17. url string
  18. }
  19. func (s *baseGCloudSecret) Encrypt() error {
  20. if s.Status != SecretStatusPlain {
  21. return errWrongSecretStatus
  22. }
  23. if s.Payload == "" {
  24. return errInvalidSecret
  25. }
  26. payload := s.Payload
  27. key := ""
  28. mode := 0
  29. if s.masterKey != "" {
  30. localSecret := newLocalSecret(s.baseSecret, s.masterKey)
  31. err := localSecret.Encrypt()
  32. if err != nil {
  33. return err
  34. }
  35. payload = localSecret.GetPayload()
  36. key = localSecret.GetKey()
  37. mode = localSecret.GetMode()
  38. }
  39. ctx, cancelFn := context.WithDeadline(context.Background(), time.Now().Add(defaultTimeout))
  40. defer cancelFn()
  41. keeper, err := secrets.OpenKeeper(ctx, s.url)
  42. if err != nil {
  43. return err
  44. }
  45. defer keeper.Close()
  46. ciphertext, err := keeper.Encrypt(context.Background(), []byte(payload))
  47. if err != nil {
  48. return err
  49. }
  50. s.Payload = base64.StdEncoding.EncodeToString(ciphertext)
  51. s.Key = key
  52. s.Mode = mode
  53. return nil
  54. }
  55. func (s *baseGCloudSecret) Decrypt() error {
  56. encrypted, err := base64.StdEncoding.DecodeString(s.Payload)
  57. if err != nil {
  58. return err
  59. }
  60. ctx, cancelFn := context.WithDeadline(context.Background(), time.Now().Add(defaultTimeout))
  61. defer cancelFn()
  62. keeper, err := secrets.OpenKeeper(ctx, s.url)
  63. if err != nil {
  64. return err
  65. }
  66. defer keeper.Close()
  67. plaintext, err := keeper.Decrypt(context.Background(), encrypted)
  68. if err != nil {
  69. return err
  70. }
  71. payload := string(plaintext)
  72. if s.Key != "" {
  73. baseSecret := baseSecret{
  74. Status: SecretStatusSecretBox,
  75. Payload: string(plaintext),
  76. Key: s.Key,
  77. AdditionalData: s.AdditionalData,
  78. Mode: s.Mode,
  79. }
  80. localSecret := newLocalSecret(baseSecret, s.masterKey)
  81. err = localSecret.Decrypt()
  82. if err != nil {
  83. return err
  84. }
  85. payload = localSecret.GetPayload()
  86. }
  87. s.Status = SecretStatusPlain
  88. s.Payload = payload
  89. s.Key = ""
  90. s.AdditionalData = ""
  91. s.Mode = 0
  92. return nil
  93. }