1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
|
// Copyright 2017-2018 int08h LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//!
//! CLI used to encrypt the Roughenough long-term key using one of the KMS implementations
//!
extern crate clap;
#[macro_use]
extern crate log;
extern crate hex;
extern crate ring;
extern crate roughenough;
extern crate simple_logger;
extern crate untrusted;
use clap::{App, Arg};
use roughenough::VERSION;
#[cfg(feature = "awskms")]
fn aws_kms(kms_key: &str, plaintext_seed: &[u8]) {
use roughenough::kms::{AwsKms, EnvelopeEncryption};
let client = AwsKms::from_arn(kms_key).unwrap();
match EnvelopeEncryption::encrypt_seed(&client, &plaintext_seed) {
Ok(encrypted_blob) => {
println!("key_protection: \"{}\"", kms_key);
println!("seed: {}", hex::encode(&encrypted_blob));
}
Err(e) => {
error!("Error: {:?}", e);
}
}
}
#[cfg(feature = "gcpkms")]
fn gcp_kms(kms_key: &str, plaintext_seed: &[u8]) {
use roughenough::kms::{EnvelopeEncryption, GcpKms};
let client = GcpKms::from_resource_id(kms_key).unwrap();
match EnvelopeEncryption::encrypt_seed(&client, &plaintext_seed) {
Ok(encrypted_blob) => {
println!("key_protection: \"{}\"", kms_key);
println!("seed: {}", hex::encode(&encrypted_blob));
}
Err(e) => {
error!("Error: {:?}", e);
}
}
}
#[allow(unused_variables)]
pub fn main() {
use log::Level;
simple_logger::init_with_level(Level::Info).unwrap();
let matches = App::new("roughenough-kms")
.version(VERSION)
.long_about("Encrypt a Roughenough server's long-term seed using a KMS")
.arg(
Arg::with_name("KEY_ID")
.short("k")
.long("kms-key")
.takes_value(true)
.required(true)
.help("Identity of the KMS key to be used"),
).arg(
Arg::with_name("SEED")
.short("s")
.long("seed")
.takes_value(true)
.required(true)
.help("32 byte hex seed for the server's long-term identity"),
).get_matches();
let kms_key = matches.value_of("KEY_ID").unwrap();
let plaintext_seed = matches
.value_of("SEED")
.map(|seed| hex::decode(seed).expect("Error parsing seed value"))
.unwrap();
if plaintext_seed.len() != 32 {
error!(
"Seed must be 32 bytes long; provided seed is {}",
plaintext_seed.len()
);
return;
}
if cfg!(feature = "awskms") {
#[cfg(feature = "awskms")]
aws_kms(kms_key, &plaintext_seed);
} else if cfg!(feature = "gcpkms") {
#[cfg(feature = "gcpkms")]
gcp_kms(kms_key, &plaintext_seed);
} else {
warn!("KMS support is not enabled, nothing to do");
}
}
|