func decryptConf(encryptedConf []byte) (decryptedConf []byte, err error) { store := &sopsyaml.Store{} metadata, err := store.UnmarshalMetadata(encryptedConf) if err != nil { return } key, err := metadata.GetDataKey() if err != nil { return } branch, err := store.Unmarshal(encryptedConf) if err != nil { return } tree := sops.Tree{Branch: branch, Metadata: metadata} cipher := aes.Cipher{} mac, err := tree.Decrypt(key, cipher) if err != nil { return } originalMac, err := cipher.Decrypt( metadata.MessageAuthenticationCode, key, []byte(metadata.LastModified.Format(time.RFC3339)), ) if originalMac != mac { return } return store.Marshal(tree.Branch) }
func decryptFile(store sops.Store, fileBytes []byte, ignoreMac bool) (sops.Tree, error) { var tree sops.Tree metadata, err := store.UnmarshalMetadata(fileBytes) if err != nil { return tree, cli.NewExitError(fmt.Sprintf("Error loading file: %s", err), exitCouldNotReadInputFile) } key, err := metadata.GetDataKey() if err != nil { return tree, cli.NewExitError(err.Error(), exitCouldNotRetrieveKey) } branch, err := store.Unmarshal(fileBytes) if err != nil { return tree, cli.NewExitError(fmt.Sprintf("Error loading file: %s", err), exitCouldNotReadInputFile) } tree = sops.Tree{Branch: branch, Metadata: metadata} cipher := aes.Cipher{} mac, err := tree.Decrypt(key, cipher) if err != nil { return tree, cli.NewExitError(fmt.Sprintf("Error decrypting tree: %s", err), exitErrorDecryptingTree) } originalMac, err := cipher.Decrypt(metadata.MessageAuthenticationCode, key, []byte(metadata.LastModified.Format(time.RFC3339))) if originalMac != mac && !ignoreMac { return tree, cli.NewExitError(fmt.Sprintf("MAC mismatch. File has %s, computed %s", originalMac, mac), 9) } return tree, nil }
func decryptTree(tree sops.Tree, ignoreMac bool) (sops.Tree, map[string][]interface{}, error) { cipher := aes.Cipher{} stash := make(map[string][]interface{}) key, err := tree.Metadata.GetDataKey() if err != nil { return tree, nil, cli.NewExitError(err.Error(), exitCouldNotRetrieveKey) } computedMac, err := tree.Decrypt(key, cipher, stash) if err != nil { return tree, nil, cli.NewExitError(fmt.Sprintf("Error decrypting tree: %s", err), exitErrorDecryptingTree) } fileMac, _, err := cipher.Decrypt(tree.Metadata.MessageAuthenticationCode, key, tree.Metadata.LastModified.Format(time.RFC3339)) if fileMac != computedMac && !ignoreMac { return tree, nil, cli.NewExitError(fmt.Sprintf("MAC mismatch. File has %s, computed %s", fileMac, computedMac), exitMacMismatch) } return tree, stash, nil }