blob: 199d065419dba50a1ed467e44611b0be7f91a8ba [file] [log] [blame]
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS-IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Example to showcase how to load an encrypted keyset."""
# [START tink_walkthrough_load_encrypted_keyset]
import tink
from tink import aead
def LoadEncryptedKeyset(json_serialized_encrypted_keyset: str, kms_key_uri: str,
associated_data: bytes) -> tink.KeysetHandle:
r"""Loads a JSON-serialized keyset that was encrypted with a KMS.
Prerequisites for this example:
- Register AEAD implementations of Tink.
- Register a KMS client for the given URI prefix. Tink Python provides
awskms.AwsKmsClient.register_client() and
gcpkms.GcpKmsClient.register_client() for AWS-KMS and Google Cloud KMS
respectively.
- Create a KMS encrypted keyset, for example using Tinkey with Google Cloud
KMS:
tinkey create-keyset --key-template AES128_GCM \
--out-format json --out encrypted_aead_keyset.json \
--master-key-uri gcp-kms://<KMS key uri> \
--credentials gcp_credentials.json
Args:
json_serialized_encrypted_keyset: JSON serialized keyset.
kms_key_uri: The URI of the KMS key to use to decrypt the keyset.
associated_data: Associated data.
Returns:
A handle to the loaded keyset.
Raises:
tink.TinkError in case of errors.
"""
# To obtain a primitive that uses the KMS to encrypt/decrypt we simply create
# keyset from the appropriate template and get an AEAD primitive from it.
template = aead.aead_key_templates.create_kms_aead_key_template(kms_key_uri)
keyset_handle = tink.new_keyset_handle(template)
kms_aead = keyset_handle.primitive(aead.Aead)
return tink.json_proto_keyset_format.parse_encrypted(
json_serialized_encrypted_keyset, kms_aead, associated_data
)
# [END tink_walkthrough_load_encrypted_keyset]