blob: d3fc7dcaaf5f4b802c2d5ef0e0811446e7ba457e [file] [log] [blame]
// Copyright 2019 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
package hcvault_test
import (
"crypto/tls"
"log"
"github.com/google/tink/go/aead"
"github.com/google/tink/go/core/registry"
"github.com/google/tink/go/integration/hcvault"
"github.com/google/tink/go/keyset"
)
func Example() {
const keyURI = "hcvault://hcvault.corp.com:8200/transit/keys/key-1"
vaultClient, err := hcvault.NewClient(keyURI, tlsConfig(), vaultToken())
if err != nil {
log.Fatal(err)
}
registry.RegisterKMSClient(vaultClient)
dek := aead.AES128CTRHMACSHA256KeyTemplate()
kh, err := keyset.NewHandle(aead.KMSEnvelopeAEADKeyTemplate(keyURI, dek))
if err != nil {
log.Fatal(err)
}
a, err := aead.New(kh)
if err != nil {
log.Fatal(err)
}
ct, err := a.Encrypt([]byte("this data needs to be encrypted"), nil)
if err != nil {
log.Fatal(err)
}
_, err = a.Decrypt(ct, nil)
if err != nil {
log.Fatal(err)
}
}
func tlsConfig() *tls.Config {
// Return a TLS configuration used to communicate with Vault server via HTTPS.
return nil
}
func vaultToken() string {
return "" // Your Vault token.
}