open-vault/vault/seal/seal_testing.go

84 lines
1.5 KiB
Go
Raw Normal View History

package seal
import (
"context"
2019-02-01 19:29:55 +00:00
"github.com/hashicorp/vault/helper/xor"
"github.com/hashicorp/vault/sdk/physical"
)
type TestSeal struct {
Type string
2019-02-01 19:29:55 +00:00
secret []byte
}
var _ Access = (*TestSeal)(nil)
2019-02-01 19:29:55 +00:00
func NewTestSeal(secret []byte) *TestSeal {
return &TestSeal{
Type: Test,
2019-02-01 19:29:55 +00:00
secret: secret,
}
}
func (s *TestSeal) Init(_ context.Context) error {
return nil
}
func (t *TestSeal) Finalize(_ context.Context) error {
return nil
}
func (t *TestSeal) SealType() string {
return t.Type
}
func (t *TestSeal) KeyID() string {
return "static-key"
}
func (t *TestSeal) Encrypt(_ context.Context, plaintext []byte) (*physical.EncryptedBlobInfo, error) {
2019-02-01 19:29:55 +00:00
ct, err := t.obscureBytes(plaintext)
if err != nil {
return nil, err
}
return &physical.EncryptedBlobInfo{
2019-02-01 19:29:55 +00:00
Ciphertext: ct,
2019-01-22 22:23:20 +00:00
KeyInfo: &physical.SealKeyInfo{
KeyID: t.KeyID(),
},
}, nil
}
func (t *TestSeal) Decrypt(_ context.Context, dwi *physical.EncryptedBlobInfo) ([]byte, error) {
2019-02-01 19:29:55 +00:00
return t.obscureBytes(dwi.Ciphertext)
}
2019-02-01 19:29:55 +00:00
// obscureBytes is a helper to simulate "encryption/decryption"
// on protected values.
2019-02-01 19:29:55 +00:00
func (t *TestSeal) obscureBytes(in []byte) ([]byte, error) {
out := make([]byte, len(in))
2019-02-01 19:29:55 +00:00
if len(t.secret) != 0 {
// make sure they are the same length
localSecret := make([]byte, len(in))
copy(localSecret, t.secret)
var err error
out, err = xor.XORBytes(in, localSecret)
if err != nil {
return nil, err
}
} else {
// if there is no secret, simply reverse the string
for i := 0; i < len(in); i++ {
out[i] = in[len(in)-1-i]
}
}
2019-02-01 19:29:55 +00:00
return out, nil
}