-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathexport.go
102 lines (86 loc) · 2.33 KB
/
export.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
// vault encrypt is an example of how to use the encrypt/decrypt methods
package main
import (
"context"
"encoding/base64"
"fmt"
"log"
"os"
"time"
"github.com/pangeacyber/pangea-go/pangea-sdk/v4/pangea"
"github.com/pangeacyber/pangea-go/pangea-sdk/v4/pangea/rsa"
"github.com/pangeacyber/pangea-go/pangea-sdk/v4/service/vault"
)
func main() {
token := os.Getenv("PANGEA_VAULT_TOKEN")
if token == "" {
log.Fatal("Unauthorized: No token present")
}
vaultcli := vault.New(&pangea.Config{
Token: token,
Domain: os.Getenv("PANGEA_DOMAIN"),
})
ctx := context.Background()
fmt.Println("Generate key with exportable field on true...")
name := "Go encrypt example " + time.Now().Format(time.RFC3339)
generateInput := &vault.SymmetricGenerateRequest{
Algorithm: vault.SYAaes256_cbc,
Purpose: vault.KPencryption,
CommonGenerateRequest: vault.CommonGenerateRequest{
Name: name,
},
Exportable: pangea.Bool(true),
}
generateResponse, err := vaultcli.SymmetricGenerate(ctx, generateInput)
if err != nil {
log.Fatal(err)
}
fmt.Println(pangea.Stringify(generateResponse.Result))
id := generateResponse.Result.ID
// Export with no encryption
fmt.Println("Exporting key without encryption...")
rExp, err := vaultcli.Export(ctx,
&vault.ExportRequest{
ID: id,
})
if err != nil {
log.Fatal(err)
}
fmt.Println(pangea.Stringify(rExp.Result))
// Export with encryption
fmt.Println("Export key encrypted...")
// Generate a RSA key pair
rsaPubKey, rsaPrivKey, err := rsa.GenerateKeyPair(4096)
if err != nil {
log.Fatal(err)
}
// Should send public key in PEM format to encrypt exported key
rsaPubKeyPEM, err := rsa.EncodePEMPublicKey(rsaPubKey)
if err != nil {
log.Fatal(err)
}
ea := vault.EEArsa4096_oaep_sha512
rExpEnc, err := vaultcli.Export(ctx,
&vault.ExportRequest{
ID: id,
Version: pangea.Int(1),
AsymmetricPublicKey: pangea.String(string(rsaPubKeyPEM)),
AsymmetricAlgorithm: &ea,
})
if err != nil {
log.Fatal(err)
}
// Decode base64 key field
expKeyDec, err := base64.StdEncoding.DecodeString(*rExpEnc.Result.Key)
if err != nil {
log.Fatal(err)
}
// Decrypt decoded field
expKey, err := rsa.DecryptSHA512(rsaPrivKey, expKeyDec)
if err != nil {
log.Fatal(err)
}
// Use decrypted key
fmt.Println("Decrypted key:")
fmt.Println(string(expKey))
}