local.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. package kms
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "encoding/hex"
  6. "io"
  7. "github.com/minio/sha256-simd"
  8. "gocloud.dev/secrets/localsecrets"
  9. "golang.org/x/crypto/hkdf"
  10. )
  11. const (
  12. localProviderName = "Local"
  13. )
  14. type localSecret struct {
  15. baseSecret
  16. masterKey string
  17. }
  18. func newLocalSecret(base baseSecret, masterKey string) SecretProvider {
  19. return &localSecret{
  20. baseSecret: base,
  21. masterKey: masterKey,
  22. }
  23. }
  24. func (s *localSecret) Name() string {
  25. return localProviderName
  26. }
  27. func (s *localSecret) IsEncrypted() bool {
  28. return s.Status == SecretStatusSecretBox
  29. }
  30. func (s *localSecret) Encrypt() error {
  31. if s.Status != SecretStatusPlain {
  32. return errWrongSecretStatus
  33. }
  34. if s.Payload == "" {
  35. return errInvalidSecret
  36. }
  37. secretKey, err := localsecrets.NewRandomKey()
  38. if err != nil {
  39. return err
  40. }
  41. key, err := s.deriveKey(secretKey[:], false)
  42. if err != nil {
  43. return err
  44. }
  45. keeper := localsecrets.NewKeeper(key)
  46. defer keeper.Close()
  47. ciphertext, err := keeper.Encrypt(context.Background(), []byte(s.Payload))
  48. if err != nil {
  49. return err
  50. }
  51. s.Key = hex.EncodeToString(secretKey[:])
  52. s.Payload = base64.StdEncoding.EncodeToString(ciphertext)
  53. s.Status = SecretStatusSecretBox
  54. s.Mode = s.getEncryptionMode()
  55. return nil
  56. }
  57. func (s *localSecret) Decrypt() error {
  58. if !s.IsEncrypted() {
  59. return errWrongSecretStatus
  60. }
  61. encrypted, err := base64.StdEncoding.DecodeString(s.Payload)
  62. if err != nil {
  63. return err
  64. }
  65. secretKey, err := hex.DecodeString(s.Key)
  66. if err != nil {
  67. return err
  68. }
  69. key, err := s.deriveKey(secretKey[:], true)
  70. if err != nil {
  71. return err
  72. }
  73. keeper := localsecrets.NewKeeper(key)
  74. defer keeper.Close()
  75. plaintext, err := keeper.Decrypt(context.Background(), encrypted)
  76. if err != nil {
  77. return err
  78. }
  79. s.Status = SecretStatusPlain
  80. s.Payload = string(plaintext)
  81. s.Key = ""
  82. s.AdditionalData = ""
  83. s.Mode = 0
  84. return nil
  85. }
  86. func (s *localSecret) deriveKey(key []byte, isForDecryption bool) ([32]byte, error) {
  87. var masterKey []byte
  88. if s.masterKey == "" || (isForDecryption && s.Mode == 0) {
  89. var combined []byte
  90. combined = append(combined, key...)
  91. if s.AdditionalData != "" {
  92. combined = append(combined, []byte(s.AdditionalData)...)
  93. }
  94. combined = append(combined, key...)
  95. hash := sha256.Sum256(combined)
  96. masterKey = hash[:]
  97. } else {
  98. masterKey = []byte(s.masterKey)
  99. }
  100. var derivedKey [32]byte
  101. var info []byte
  102. if s.AdditionalData != "" {
  103. info = []byte(s.AdditionalData)
  104. }
  105. kdf := hkdf.New(sha256.New, masterKey, key, info)
  106. if _, err := io.ReadFull(kdf, derivedKey[:]); err != nil {
  107. return derivedKey, err
  108. }
  109. return derivedKey, nil
  110. }
  111. func (s *localSecret) getEncryptionMode() int {
  112. if s.masterKey == "" {
  113. return 0
  114. }
  115. return 1
  116. }