blob: ec819dc0940cf72ad710b0516ee7c962d3e8617f [file] [log] [blame]
// Copyright 2017 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package awskms
import (
"encoding/csv"
"errors"
"fmt"
"os"
"regexp"
"strconv"
"strings"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/credentials"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/kms"
"github.com/aws/aws-sdk-go/service/kms/kmsiface"
"github.com/google/tink/go/core/registry"
"github.com/google/tink/go/tink"
)
const (
awsPrefix = "aws-kms://"
)
var (
errCred = errors.New("invalid credential path")
errBadFile = errors.New("cannot open credential path")
errCredCSV = errors.New("malformed credential CSV file")
)
// awsClient is a wrapper around an AWS SDK provided KMS client that can
// instantiate Tink primitives.
type awsClient struct {
keyURIPrefix string
kms kmsiface.KMSAPI
encryptionContextName EncryptionContextName
}
// ClientOption is an interface for defining options that are passed to
// [NewClientWithOptions].
type ClientOption interface{ set(*awsClient) error }
type option func(*awsClient) error
func (o option) set(a *awsClient) error { return o(a) }
// WithCredentialPath instantiates the underlying AWS KMS client using the
// credentials located at credentialPath.
//
// credentialPath can specify a file in CSV format as provided in the IAM
// console or an INI-style credentials file.
//
// See https://docs.aws.amazon.com/cli/latest/userguide/cli-authentication-user.html#cli-authentication-user-configure-csv
// and https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html#cli-configure-files-format.
func WithCredentialPath(credentialPath string) ClientOption {
return option(func(a *awsClient) error {
if a.kms != nil {
return errors.New("WithCredentialPath option cannot be used, KMS client already set")
}
k, err := getKMSFromCredentialPath(a.keyURIPrefix, credentialPath)
if err != nil {
return err
}
a.kms = k
return nil
})
}
// WithKMS sets the underlying AWS KMS client to kms, a preexisting AWS KMS
// client instance.
//
// It's the callers responsibility to ensure that the configured region of kms
// aligns with the region in key URIs passed to this client. Otherwise, API
// requests will fail.
func WithKMS(kms kmsiface.KMSAPI) ClientOption {
return option(func(a *awsClient) error {
if a.kms != nil {
return errors.New("WithKMS option cannot be used, KMS client already set")
}
a.kms = kms
return nil
})
}
// EncryptionContextName specifies the name used in the EncryptionContext field
// of EncryptInput and DecryptInput requests. See [WithEncryptionContextName]
// for further details.
type EncryptionContextName uint
const (
// AssociatedData will set the EncryptionContext name to "associatedData".
AssociatedData EncryptionContextName = 1 + iota
// LegacyAdditionalData will set the EncryptionContext name to "additionalData".
LegacyAdditionalData
)
var encryptionContextNames = map[EncryptionContextName]string{
AssociatedData: "associatedData",
LegacyAdditionalData: "additionalData",
}
func (n EncryptionContextName) valid() bool {
_, ok := encryptionContextNames[n]
return ok
}
func (n EncryptionContextName) String() string {
if !n.valid() {
return "unrecognized value " + strconv.Itoa(int(n))
}
return encryptionContextNames[n]
}
// WithEncryptionContextName sets the name which maps to the base64 encoded
// associated data within the EncryptionContext field of EncrypInput and
// DecryptInput requests.
//
// The default is [AssociatedData], which is compatible with the Tink AWS KMS
// extensions in other languages. In older versions of this packge, before this
// option was present, "additionalData" was hardcoded.
//
// This option is provided to facilitate compatibility with older ciphertexts.
func WithEncryptionContextName(name EncryptionContextName) ClientOption {
return option(func(a *awsClient) error {
if !name.valid() {
return fmt.Errorf("invalid EncryptionContextName: %v", name)
}
if a.encryptionContextName != 0 {
return errors.New("encryptionContextName already set")
}
a.encryptionContextName = name
return nil
})
}
// NewClientWithOptions returns a [registry.KMSClient] which wraps an AWS KMS
// client and will handle keys whose URIs start with uriPrefix.
//
// By default, the client will use default credentials.
//
// AEAD primitives produced by this client will use [AssociatedData] when
// serializing associated data.
func NewClientWithOptions(uriPrefix string, opts ...ClientOption) (registry.KMSClient, error) {
if !strings.HasPrefix(strings.ToLower(uriPrefix), awsPrefix) {
return nil, fmt.Errorf("uriPrefix must start with %q, but got %q", awsPrefix, uriPrefix)
}
a := &awsClient{
keyURIPrefix: uriPrefix,
}
// Process options, if any.
for _, opt := range opts {
if err := opt.set(a); err != nil {
return nil, fmt.Errorf("failed setting option: %v", err)
}
}
// Populate values not defined via options.
if a.kms == nil {
k, err := getKMS(uriPrefix)
if err != nil {
return nil, err
}
a.kms = k
}
if a.encryptionContextName == 0 {
a.encryptionContextName = AssociatedData
}
return a, nil
}
// NewClient returns a KMSClient backed by AWS KMS using default credentials to
// handle keys whose URIs start with uriPrefix.
//
// uriPrefix must have the following format:
//
// aws-kms://arn:<partition>:kms:<region>:[<path>]
//
// See https://docs.aws.amazon.com/IAM/latest/UserGuide/reference-arns.html
//
// AEAD primitives produced by this client will use [LegacyAdditionalData] when
// serializing associated data.
//
// Deprecated: Instead, use [NewClientWithOptions].
//
// awskms.NewClientWithOptions(uriPrefix)
func NewClient(uriPrefix string) (registry.KMSClient, error) {
return NewClientWithOptions(uriPrefix, WithEncryptionContextName(LegacyAdditionalData))
}
// NewClientWithCredentials returns a KMSClient backed by AWS KMS using the given
// credentials to handle keys whose URIs start with uriPrefix.
//
// uriPrefix must have the following format:
//
// aws-kms://arn:<partition>:kms:<region>:[<path>]
//
// See https://docs.aws.amazon.com/IAM/latest/UserGuide/reference-arns.html
//
// credentialPath can specify a file in CSV format as provided in the IAM
// console or an INI-style credentials file.
//
// See https://docs.aws.amazon.com/cli/latest/userguide/cli-authentication-user.html#cli-authentication-user-configure-csv
// and https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html#cli-configure-files-format.
//
// AEAD primitives produced by this client will use [LegacyAdditionalData] when
// serializing associated data.
//
// Deprecated: Instead use [NewClientWithOptions] and [WithCredentialPath].
//
// awskms.NewClientWithOptions(uriPrefix, awskms.WithCredentialPath(credentialPath))
func NewClientWithCredentials(uriPrefix string, credentialPath string) (registry.KMSClient, error) {
return NewClientWithOptions(uriPrefix, WithCredentialPath(credentialPath), WithEncryptionContextName(LegacyAdditionalData))
}
// NewClientWithKMS returns a KMSClient backed by AWS KMS using the provided
// instance of the AWS SDK KMS client.
//
// The caller is responsible for ensuring that the region specified in the KMS
// client is consitent with the region specified within uriPrefix.
//
// uriPrefix must have the following format:
//
// aws-kms://arn:<partition>:kms:<region>:[<path>]
//
// See https://docs.aws.amazon.com/IAM/latest/UserGuide/reference-arns.html
//
// AEAD primitives produced by this client will use [LegacyAdditionalData] when
// serializing associated data.
//
// Deprecated: Instead use [NewClientWithOptions] and [WithKMS].
//
// awskms.NewClientWithOptions(uriPrefix, awskms.WithKMS(kms))
func NewClientWithKMS(uriPrefix string, kms kmsiface.KMSAPI) (registry.KMSClient, error) {
return NewClientWithOptions(uriPrefix, WithKMS(kms), WithEncryptionContextName(LegacyAdditionalData))
}
// Supported returns true if keyURI starts with the URI prefix provided when
// creating the client.
func (c *awsClient) Supported(keyURI string) bool {
return strings.HasPrefix(keyURI, c.keyURIPrefix)
}
// GetAEAD returns an implementation of the AEAD interface which performs
// cryptographic operations remotely via AWS KMS using keyURI.
//
// keyUri must be supported by this client and must have the following format:
//
// aws-kms://arn:<partition>:kms:<region>:<path>
//
// See https://docs.aws.amazon.com/IAM/latest/UserGuide/reference-arns.html
func (c *awsClient) GetAEAD(keyURI string) (tink.AEAD, error) {
if !c.Supported(keyURI) {
return nil, fmt.Errorf("keyURI must start with prefix %s, but got %s", c.keyURIPrefix, keyURI)
}
uri := strings.TrimPrefix(keyURI, awsPrefix)
return newAWSAEAD(uri, c.kms, c.encryptionContextName), nil
}
func getKMS(uriPrefix string) (*kms.KMS, error) {
r, err := getRegion(uriPrefix)
if err != nil {
return nil, err
}
session, err := session.NewSession(&aws.Config{
Region: aws.String(r),
})
if err != nil {
return nil, err
}
return kms.New(session), nil
}
func getKMSFromCredentialPath(uriPrefix string, credentialPath string) (*kms.KMS, error) {
r, err := getRegion(uriPrefix)
if err != nil {
return nil, err
}
var creds *credentials.Credentials
if len(credentialPath) == 0 {
return nil, errCred
}
c, err := extractCredsCSV(credentialPath)
switch err {
case nil:
creds = credentials.NewStaticCredentialsFromCreds(*c)
case errBadFile, errCredCSV:
return nil, err
default:
// Fallback to load the credential path as .ini shared credentials.
creds = credentials.NewSharedCredentials(credentialPath, "default")
}
session, err := session.NewSession(&aws.Config{
Credentials: creds,
Region: aws.String(r),
})
if err != nil {
return nil, err
}
return kms.New(session), nil
}
// extractCredsCSV extracts credentials from a CSV file.
//
// A CSV formatted credentials file can be obtained when an AWS IAM user is
// created through the IAM console.
//
// Properties of a properly formatted CSV file:
//
// 1. The first line consists of the headers:
// "User name,Password,Access key ID,Secret access key,Console login link"
// 2. The second line contains 5 comma separated values.
func extractCredsCSV(file string) (*credentials.Value, error) {
f, err := os.Open(file)
if err != nil {
return nil, errBadFile
}
defer f.Close()
lines, err := csv.NewReader(f).ReadAll()
if err != nil {
return nil, err
}
// It is possible that the file is an AWS .ini credential file, and it can be
// parsed as 1-column CSV file as well. A real AWS credentials.csv is never 1 column.
if len(lines) > 0 && len(lines[0]) == 1 {
return nil, errors.New("not a valid CSV credential file")
}
if len(lines) < 2 {
return nil, errCredCSV
}
if len(lines[1]) < 4 {
return nil, errCredCSV
}
return &credentials.Value{
AccessKeyID: lines[1][2],
SecretAccessKey: lines[1][3],
}, nil
}
// getRegion extracts the region from keyURI.
func getRegion(keyURI string) (string, error) {
re1, err := regexp.Compile(`aws-kms://arn:(aws[a-zA-Z0-9-_]*):kms:([a-z0-9-]+):`)
if err != nil {
return "", err
}
r := re1.FindStringSubmatch(keyURI)
if len(r) != 3 {
return "", errors.New("extracting region from URI failed")
}
return r[2], nil
}