builtin.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. package kms
  2. import (
  3. "crypto/aes"
  4. "crypto/cipher"
  5. "crypto/rand"
  6. "crypto/sha256"
  7. "encoding/hex"
  8. "errors"
  9. "io"
  10. sdkkms "github.com/sftpgo/sdk/kms"
  11. )
  12. var (
  13. errMalformedCiphertext = errors.New("malformed ciphertext")
  14. )
  15. type builtinSecret struct {
  16. BaseSecret
  17. }
  18. func init() {
  19. RegisterSecretProvider(sdkkms.SchemeBuiltin, sdkkms.SecretStatusAES256GCM, newBuiltinSecret)
  20. }
  21. func newBuiltinSecret(base BaseSecret, url, masterKey string) SecretProvider {
  22. return &builtinSecret{
  23. BaseSecret: base,
  24. }
  25. }
  26. func (s *builtinSecret) Name() string {
  27. return "Builtin"
  28. }
  29. func (s *builtinSecret) IsEncrypted() bool {
  30. return s.Status == sdkkms.SecretStatusAES256GCM
  31. }
  32. func (s *builtinSecret) deriveKey(key []byte) []byte {
  33. var combined []byte
  34. combined = append(combined, key...)
  35. if s.AdditionalData != "" {
  36. combined = append(combined, []byte(s.AdditionalData)...)
  37. }
  38. combined = append(combined, key...)
  39. hash := sha256.Sum256(combined)
  40. return hash[:]
  41. }
  42. func (s *builtinSecret) Encrypt() error {
  43. if s.Payload == "" {
  44. return ErrInvalidSecret
  45. }
  46. switch s.Status {
  47. case sdkkms.SecretStatusPlain:
  48. key := make([]byte, 32)
  49. if _, err := io.ReadFull(rand.Reader, key); err != nil {
  50. return err
  51. }
  52. block, err := aes.NewCipher(s.deriveKey(key))
  53. if err != nil {
  54. return err
  55. }
  56. gcm, err := cipher.NewGCM(block)
  57. if err != nil {
  58. return err
  59. }
  60. nonce := make([]byte, gcm.NonceSize())
  61. if _, err = io.ReadFull(rand.Reader, nonce); err != nil {
  62. return err
  63. }
  64. var aad []byte
  65. if s.AdditionalData != "" {
  66. aad = []byte(s.AdditionalData)
  67. }
  68. ciphertext := gcm.Seal(nonce, nonce, []byte(s.Payload), aad)
  69. s.Key = hex.EncodeToString(key)
  70. s.Payload = hex.EncodeToString(ciphertext)
  71. s.Status = sdkkms.SecretStatusAES256GCM
  72. return nil
  73. default:
  74. return ErrWrongSecretStatus
  75. }
  76. }
  77. func (s *builtinSecret) Decrypt() error {
  78. switch s.Status {
  79. case sdkkms.SecretStatusAES256GCM:
  80. encrypted, err := hex.DecodeString(s.Payload)
  81. if err != nil {
  82. return err
  83. }
  84. key, err := hex.DecodeString(s.Key)
  85. if err != nil {
  86. return err
  87. }
  88. block, err := aes.NewCipher(s.deriveKey(key))
  89. if err != nil {
  90. return err
  91. }
  92. gcm, err := cipher.NewGCM(block)
  93. if err != nil {
  94. return err
  95. }
  96. nonceSize := gcm.NonceSize()
  97. if len(encrypted) < nonceSize {
  98. return errMalformedCiphertext
  99. }
  100. nonce, ciphertext := encrypted[:nonceSize], encrypted[nonceSize:]
  101. var aad []byte
  102. if s.AdditionalData != "" {
  103. aad = []byte(s.AdditionalData)
  104. }
  105. plaintext, err := gcm.Open(nil, nonce, ciphertext, aad)
  106. if err != nil {
  107. return err
  108. }
  109. s.Status = sdkkms.SecretStatusPlain
  110. s.Payload = string(plaintext)
  111. s.Key = ""
  112. s.AdditionalData = ""
  113. return nil
  114. default:
  115. return ErrWrongSecretStatus
  116. }
  117. }
  118. func (s *builtinSecret) Clone() SecretProvider {
  119. baseSecret := BaseSecret{
  120. Status: s.Status,
  121. Payload: s.Payload,
  122. Key: s.Key,
  123. AdditionalData: s.AdditionalData,
  124. Mode: s.Mode,
  125. }
  126. return newBuiltinSecret(baseSecret, "", "")
  127. }