67 lines
1.3 KiB
Go
67 lines
1.3 KiB
Go
package aws
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"log"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/kms"
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
)
|
|
|
|
func dataSourceAwsKmsCiphetext() *schema.Resource {
|
|
return &schema.Resource{
|
|
Read: dataSourceAwsKmsCiphetextRead,
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
"plaintext": {
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
|
|
"key_id": {
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
|
|
"context": &schema.Schema{
|
|
Type: schema.TypeMap,
|
|
Optional: true,
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
},
|
|
|
|
"ciphertext_blob": {
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func dataSourceAwsKmsCiphetextRead(d *schema.ResourceData, meta interface{}) error {
|
|
conn := meta.(*AWSClient).kmsconn
|
|
|
|
d.SetId(time.Now().UTC().String())
|
|
|
|
req := &kms.EncryptInput{
|
|
KeyId: aws.String(d.Get("key_id").(string)),
|
|
Plaintext: []byte(d.Get("plaintext").(string)),
|
|
}
|
|
|
|
if ec := d.Get("context"); ec != nil {
|
|
req.EncryptionContext = stringMapToPointers(ec.(map[string]interface{}))
|
|
}
|
|
|
|
log.Printf("[DEBUG] KMS encrypt for key: %s", d.Get("key_id").(string))
|
|
|
|
resp, err := conn.Encrypt(req)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
d.Set("ciphertext_blob", base64.StdEncoding.EncodeToString(resp.CiphertextBlob))
|
|
|
|
return nil
|
|
}
|