forked from TrueCloudLab/certificates
35 lines
988 B
Go
35 lines
988 B
Go
package kms
|
|
|
|
import (
|
|
"context"
|
|
"crypto"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/smallstep/certificates/kms/apiv1"
|
|
"github.com/smallstep/certificates/kms/cloudkms"
|
|
"github.com/smallstep/certificates/kms/softkms"
|
|
)
|
|
|
|
// KeyManager is the interface implemented by all the KMS.
|
|
type KeyManager interface {
|
|
GetPublicKey(req *apiv1.GetPublicKeyRequest) (*apiv1.GetPublicKeyResponse, error)
|
|
CreateKey(req *apiv1.CreateKeyRequest) (*apiv1.CreateKeyResponse, error)
|
|
CreateSigner(req *apiv1.CreateSignerRequest) (crypto.Signer, error)
|
|
}
|
|
|
|
// New initializes a new KMS from the given type.
|
|
func New(ctx context.Context, opts apiv1.Options) (KeyManager, error) {
|
|
if err := opts.Validate(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
switch apiv1.Type(strings.ToLower(opts.Type)) {
|
|
case apiv1.DefaultKMS, apiv1.SoftKMS:
|
|
return softkms.New(ctx, opts)
|
|
case apiv1.CloudKMS:
|
|
return cloudkms.New(ctx, opts)
|
|
default:
|
|
return nil, errors.Errorf("unsupported kms type '%s'", opts.Type)
|
|
}
|
|
}
|