mirror of
https://github.com/opentffoundation/opentf.git
synced 2026-04-06 09:01:42 -04:00
Signed-off-by: Janos <86970079+janosdebugs@users.noreply.github.com> Signed-off-by: Christian Mesh <christianmesh1@gmail.com> Co-authored-by: Christian Mesh <christianmesh1@gmail.com> Co-authored-by: James Humphries <jamesh@spacelift.io>
65 lines
1.8 KiB
Go
65 lines
1.8 KiB
Go
// Copyright (c) The OpenTofu Authors
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
// Copyright (c) 2023 HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
package pbkdf2_test
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/hashicorp/hcl/v2/gohcl"
|
|
"github.com/opentofu/opentofu/internal/encryption/keyprovider/pbkdf2"
|
|
|
|
"github.com/opentofu/opentofu/internal/encryption/config"
|
|
)
|
|
|
|
var configuration = `key_provider "pbkdf2" "foo" {
|
|
passphrase = "correct-horse-battery-staple"
|
|
}
|
|
`
|
|
|
|
// This example is a bare-bones configuration for a static key provider.
|
|
// It is mainly intended to demonstrate how you can use parse configuration
|
|
// and construct a static key provider from it.
|
|
func Example_decrypt() {
|
|
configStruct := pbkdf2.New().ConfigStruct()
|
|
|
|
// Parse the config:
|
|
parsedConfig, diags := config.LoadConfigFromString("config.hcl", configuration)
|
|
if diags.HasErrors() {
|
|
panic(diags)
|
|
}
|
|
|
|
// Use gohcl to parse the hcl block from parsedConfig into the static configuration struct:
|
|
if err := gohcl.DecodeBody(
|
|
parsedConfig.KeyProviderConfigs[0].Body,
|
|
nil,
|
|
configStruct,
|
|
); err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
// Create the actual key provider.
|
|
keyProvider, keyMeta, err := configStruct.Build()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
// Fill in the metadata stored with the encrypted form:
|
|
meta := keyMeta.(*pbkdf2.Metadata)
|
|
meta.Salt = []byte{0x10, 0xec, 0x3d, 0x3f, 0xe0, 0x2a, 0xd2, 0xbe, 0xe6, 0xf1, 0xf5, 0x54, 0xf, 0x8e, 0x6b, 0xbe, 0x3b, 0x8b, 0x29, 0x44, 0x5c, 0xf5, 0x2, 0xd2, 0x7d, 0x47, 0xad, 0x55, 0x4a, 0xa8, 0x97, 0x1f}
|
|
meta.Iterations = 600000
|
|
meta.HashFunction = "sha512"
|
|
meta.KeyLength = 32
|
|
|
|
// Get decryption key from the provider.
|
|
keys, _, err := keyProvider.Provide(meta)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
fmt.Printf("%x", keys.DecryptionKey)
|
|
// Output: 225872367198760137e0a18580433447bbf578fbe2b87ff36aef3c175fe5709c
|
|
}
|