basegocloud.go 2.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. package kms
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "time"
  6. "gocloud.dev/secrets"
  7. // import awskms package
  8. _ "gocloud.dev/secrets/awskms"
  9. // import gcpkms package
  10. _ "gocloud.dev/secrets/gcpkms"
  11. // import hashivault package
  12. _ "gocloud.dev/secrets/hashivault"
  13. )
  14. type baseGCloudSecret struct {
  15. baseSecret
  16. masterKey string
  17. url string
  18. }
  19. func (s *baseGCloudSecret) Encrypt() error {
  20. if s.Status != SecretStatusPlain {
  21. return errWrongSecretStatus
  22. }
  23. if s.Payload == "" {
  24. return errInvalidSecret
  25. }
  26. payload := s.Payload
  27. key := ""
  28. if s.masterKey != "" {
  29. localSecret := newLocalSecret(s.baseSecret, s.masterKey)
  30. err := localSecret.Encrypt()
  31. if err != nil {
  32. return err
  33. }
  34. payload = localSecret.GetPayload()
  35. key = localSecret.GetKey()
  36. }
  37. ctx, cancelFn := context.WithDeadline(context.Background(), time.Now().Add(defaultTimeout))
  38. defer cancelFn()
  39. keeper, err := secrets.OpenKeeper(ctx, s.url)
  40. if err != nil {
  41. return err
  42. }
  43. defer keeper.Close()
  44. ciphertext, err := keeper.Encrypt(context.Background(), []byte(payload))
  45. if err != nil {
  46. return err
  47. }
  48. s.Payload = base64.StdEncoding.EncodeToString(ciphertext)
  49. s.Key = key
  50. return nil
  51. }
  52. func (s *baseGCloudSecret) Decrypt() error {
  53. encrypted, err := base64.StdEncoding.DecodeString(s.Payload)
  54. if err != nil {
  55. return err
  56. }
  57. ctx, cancelFn := context.WithDeadline(context.Background(), time.Now().Add(defaultTimeout))
  58. defer cancelFn()
  59. keeper, err := secrets.OpenKeeper(ctx, s.url)
  60. if err != nil {
  61. return err
  62. }
  63. defer keeper.Close()
  64. plaintext, err := keeper.Decrypt(context.Background(), encrypted)
  65. if err != nil {
  66. return err
  67. }
  68. payload := string(plaintext)
  69. if s.Key != "" {
  70. baseSecret := baseSecret{
  71. Status: SecretStatusSecretBox,
  72. Payload: string(plaintext),
  73. Key: s.Key,
  74. AdditionalData: s.AdditionalData,
  75. }
  76. localSecret := newLocalSecret(baseSecret, s.masterKey)
  77. err = localSecret.Decrypt()
  78. if err != nil {
  79. return err
  80. }
  81. payload = localSecret.GetPayload()
  82. }
  83. s.Status = SecretStatusPlain
  84. s.Payload = payload
  85. s.Key = ""
  86. s.AdditionalData = ""
  87. return nil
  88. }