* Interface for secrets * Add secretbox secrets implementation * Start working on box * typo * Add asymmetric encryption implementation * go mod tidy * Fix review comments Co-authored-by: Asim Aslam <asim@aslam.me>
		
			
				
	
	
		
			74 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			74 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Package secretbox is a config/secrets implementation that uses nacl/secretbox
 | |
| // to do symmetric encryption / verification
 | |
| package secretbox
 | |
| 
 | |
| import (
 | |
| 	"github.com/micro/go-micro/v2/config/secrets"
 | |
| 	"github.com/pkg/errors"
 | |
| 	"golang.org/x/crypto/nacl/secretbox"
 | |
| 
 | |
| 	"crypto/rand"
 | |
| )
 | |
| 
 | |
| const keyLength = 32
 | |
| 
 | |
| type secretBox struct {
 | |
| 	options secrets.Options
 | |
| 
 | |
| 	secretKey [keyLength]byte
 | |
| }
 | |
| 
 | |
| // NewCodec returns a secretbox codec
 | |
| func NewCodec(opts ...secrets.Option) secrets.Codec {
 | |
| 	sb := &secretBox{}
 | |
| 	for _, o := range opts {
 | |
| 		o(&sb.options)
 | |
| 	}
 | |
| 	return sb
 | |
| }
 | |
| 
 | |
| func (s *secretBox) Init(opts ...secrets.Option) error {
 | |
| 	for _, o := range opts {
 | |
| 		o(&s.options)
 | |
| 	}
 | |
| 	if len(s.options.SecretKey) == 0 {
 | |
| 		return errors.New("no secret key is defined")
 | |
| 	}
 | |
| 	if len(s.options.SecretKey) != keyLength {
 | |
| 		return errors.Errorf("secret key must be %d bytes long", keyLength)
 | |
| 	}
 | |
| 	copy(s.secretKey[:], s.options.SecretKey)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (s *secretBox) Options() secrets.Options {
 | |
| 	return s.options
 | |
| }
 | |
| 
 | |
| func (s *secretBox) String() string {
 | |
| 	return "nacl-secretbox"
 | |
| }
 | |
| 
 | |
| func (s *secretBox) Encrypt(in []byte, opts ...secrets.EncryptOption) ([]byte, error) {
 | |
| 	// no opts are expected, so they are ignored
 | |
| 
 | |
| 	// there must be a unique nonce for each message
 | |
| 	var nonce [24]byte
 | |
| 	if _, err := rand.Reader.Read(nonce[:]); err != nil {
 | |
| 		return []byte{}, errors.Wrap(err, "couldn't obtain a random nonce from crypto/rand")
 | |
| 	}
 | |
| 	return secretbox.Seal(nonce[:], in, &nonce, &s.secretKey), nil
 | |
| }
 | |
| 
 | |
| func (s *secretBox) Decrypt(in []byte, opts ...secrets.DecryptOption) ([]byte, error) {
 | |
| 	// no options are expected, so they are ignored
 | |
| 
 | |
| 	var decryptNonce [24]byte
 | |
| 	copy(decryptNonce[:], in[:24])
 | |
| 	decrypted, ok := secretbox.Open(nil, in[24:], &decryptNonce, &s.secretKey)
 | |
| 	if !ok {
 | |
| 		return []byte{}, errors.New("decryption failed (is the key set correctly?)")
 | |
| 	}
 | |
| 	return decrypted, nil
 | |
| }
 |