mirror of https://github.com/k3s-io/k3s
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
77 lines
2.0 KiB
77 lines
2.0 KiB
package cluster |
|
|
|
import ( |
|
"crypto/aes" |
|
"crypto/cipher" |
|
"crypto/rand" |
|
"crypto/sha1" |
|
"encoding/base64" |
|
"fmt" |
|
"io" |
|
"strings" |
|
|
|
"github.com/k3s-io/k3s/pkg/util" |
|
"golang.org/x/crypto/pbkdf2" |
|
) |
|
|
|
// storageKey returns the etcd key for storing bootstrap data for a given passphrase. |
|
// The key is derived from the sha256 hash of the passphrase. |
|
func storageKey(passphrase string) string { |
|
return "/bootstrap/" + util.ShortHash(passphrase, 12) |
|
} |
|
|
|
// encrypt encrypts a byte slice using aes+gcm with a pbkdf2 key derived from the passphrase and a random salt. |
|
// It returns a byte slice containing the salt and base64-encoded ciphertext. |
|
func encrypt(passphrase string, plaintext []byte) ([]byte, error) { |
|
salt, err := util.Random(8) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
clearKey := pbkdf2.Key([]byte(passphrase), []byte(salt), 4096, 32, sha1.New) |
|
key, err := aes.NewCipher(clearKey) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
gcm, err := cipher.NewGCM(key) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
nonce := make([]byte, gcm.NonceSize()) |
|
_, err = io.ReadFull(rand.Reader, nonce) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
sealed := gcm.Seal(nonce, nonce, plaintext, nil) |
|
return []byte(salt + ":" + base64.StdEncoding.EncodeToString(sealed)), nil |
|
} |
|
|
|
// decrypt attempts to decrypt the byte slice using the supplied passphrase. |
|
// The input byte slice should be the ciphertext output from the encrypt function. |
|
func decrypt(passphrase string, ciphertext []byte) ([]byte, error) { |
|
parts := strings.SplitN(string(ciphertext), ":", 2) |
|
if len(parts) != 2 { |
|
return nil, fmt.Errorf("invalid cipher text, not : delimited") |
|
} |
|
|
|
clearKey := pbkdf2.Key([]byte(passphrase), []byte(parts[0]), 4096, 32, sha1.New) |
|
key, err := aes.NewCipher(clearKey) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
gcm, err := cipher.NewGCM(key) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
data, err := base64.StdEncoding.DecodeString(parts[1]) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
return gcm.Open(nil, data[:gcm.NonceSize()], data[gcm.NonceSize():], nil) |
|
}
|
|
|