This repository has been archived by the owner on Apr 4, 2023. It is now read-only.
/
aws_kms.go
109 lines (85 loc) · 2.19 KB
/
aws_kms.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
package aws_kms
import (
"fmt"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/kms"
"github.com/jetstack/vault-unsealer/pkg/kv"
)
type awsKMS struct {
store kv.Service
kmsService *kms.KMS
kmsID string
}
var _ kv.Service = &awsKMS{}
func NewWithSession(sess *session.Session, store kv.Service, kmsID string) (kv.Service, error) {
if kmsID == "" {
return nil, fmt.Errorf("invalid kmsID specified: '%s'", kmsID)
}
return &awsKMS{
store: store,
kmsService: kms.New(sess),
kmsID: kmsID,
}, nil
}
func New(store kv.Service, kmsID string) (kv.Service, error) {
sess, err := session.NewSession()
if err != nil {
return nil, err
}
return NewWithSession(sess, store, kmsID)
}
func (a *awsKMS) decrypt(cipherText []byte) ([]byte, error) {
out, err := a.kmsService.Decrypt(&kms.DecryptInput{
CiphertextBlob: cipherText,
EncryptionContext: map[string]*string{
"Tool": aws.String("vault-unsealer"),
},
GrantTokens: []*string{},
})
return out.Plaintext, err
}
func (a *awsKMS) Get(key string) ([]byte, error) {
cipherText, err := a.store.Get(key)
if err != nil {
return nil, err
}
return a.decrypt(cipherText)
}
func (a *awsKMS) encrypt(plainText []byte) ([]byte, error) {
out, err := a.kmsService.Encrypt(&kms.EncryptInput{
KeyId: aws.String(a.kmsID),
Plaintext: plainText,
EncryptionContext: map[string]*string{
"Tool": aws.String("vault-unsealer"),
},
GrantTokens: []*string{},
})
return out.CiphertextBlob, err
}
func (a *awsKMS) Set(key string, val []byte) error {
cipherText, err := a.encrypt(val)
if err != nil {
return err
}
return a.store.Set(key, cipherText)
}
func (g *awsKMS) Test(key string) error {
inputString := "test"
err := g.store.Test(key)
if err != nil {
return fmt.Errorf("test of backend store failed: %s", err.Error())
}
cipherText, err := g.encrypt([]byte(inputString))
if err != nil {
return err
}
plainText, err := g.decrypt(cipherText)
if err != nil {
return err
}
if string(plainText) != inputString {
return fmt.Errorf("encryped and decryped text doesn't match: exp: '%v', act: '%v'", inputString, string(plainText))
}
return nil
}