Files
opentf/internal/encryption/keyprovider/pbkdf2/example_decrypt_test.go

62 lines
1.8 KiB
Go

// Copyright (c) The OpenTofu Authors
// SPDX-License-Identifier: MPL-2.0
// Copyright (c) 2023 HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package pbkdf2_test
import (
"fmt"
"github.com/opentofu/opentofu/internal/encryption/keyprovider"
"github.com/opentofu/opentofu/internal/encryption/keyprovider/pbkdf2"
"github.com/opentofu/opentofu/internal/encryption/config"
)
var configuration = `key_provider "pbkdf2" "foo" {
passphrase = "correct-horse-battery-staple"
}
`
// This example is a bare-bones configuration for a static key provider.
// It is mainly intended to demonstrate how you can use parse configuration
// and construct a static key provider from it.
func Example_decrypt() {
configStruct := pbkdf2.New().ConfigStruct()
// Parse the config:
parsedConfig, diags := config.LoadConfigFromString("config.hcl", configuration)
if diags.HasErrors() {
panic(diags)
}
// The `pbkdf2` key provider config has its own decoding so use that instead of gohcl
decoder := configStruct.(keyprovider.SelfDecodingConfig)
if err := decoder.DecodeConfig(parsedConfig.KeyProviderConfigs[0].Body, nil); err != nil {
panic(err)
}
// Create the actual key provider.
keyProvider, keyMeta, err := configStruct.Build()
if err != nil {
panic(err)
}
// Fill in the metadata stored with the encrypted form:
meta := keyMeta.(*pbkdf2.Metadata)
meta.Salt = []byte{0x10, 0xec, 0x3d, 0x3f, 0xe0, 0x2a, 0xd2, 0xbe, 0xe6, 0xf1, 0xf5, 0x54, 0xf, 0x8e, 0x6b, 0xbe, 0x3b, 0x8b, 0x29, 0x44, 0x5c, 0xf5, 0x2, 0xd2, 0x7d, 0x47, 0xad, 0x55, 0x4a, 0xa8, 0x97, 0x1f}
meta.Iterations = 600000
meta.HashFunction = "sha512"
meta.KeyLength = 32
// Get decryption key from the provider.
keys, _, err := keyProvider.Provide(meta)
if err != nil {
panic(err)
}
fmt.Printf("%x", keys.DecryptionKey)
// Output: 225872367198760137e0a18580433447bbf578fbe2b87ff36aef3c175fe5709c
}