keystore/secure_string.go (18 lines of code) (raw):
// Licensed to Elasticsearch B.V. under one or more contributor
// license agreements. See the NOTICE file distributed with
// this work for additional information regarding copyright
// ownership. Elasticsearch B.V. licenses this file to you under
// the Apache License, Version 2.0 (the "License"); you may
// not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
package keystore
// SecureString Initial implementation for a SecureString representation in
// beats, currently we keep the password into a Bytes array, we need to implement a way
// to safely clean that array.
//
// Investigate memguard: https://github.com/awnumar/memguard
type SecureString struct {
value []byte
}
// NewSecureString return a struct representing a secrets string.
func NewSecureString(value []byte) *SecureString {
return &SecureString{
value: value,
}
}
// Get returns the byte value of the secret, or an error if we cannot return it.
func (s *SecureString) Get() ([]byte, error) {
return s.value, nil
}
// String custom string implementation to make sure we don't bleed this struct into a string.
func (s SecureString) String() string {
return "<SecureString>"
}
// GoString implements the GoStringer interface to hide the secret value.
func (s SecureString) GoString() string {
return s.String()
}