You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
270 lines
9.6 KiB
270 lines
9.6 KiB
package s3api
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"io"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/seaweedfs/seaweedfs/weed/glog"
|
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
|
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
|
)
|
|
|
|
// PutToFilerEncryptionResult holds the result of encryption processing
|
|
type PutToFilerEncryptionResult struct {
|
|
DataReader io.Reader
|
|
SSEType string
|
|
CustomerKey *SSECustomerKey
|
|
SSEIV []byte
|
|
SSEKMSKey *SSEKMSKey
|
|
SSES3Key *SSES3Key
|
|
SSEKMSMetadata []byte
|
|
SSES3Metadata []byte
|
|
}
|
|
|
|
// calculatePartOffset calculates unique offset for each part to prevent IV reuse in multipart uploads
|
|
// AWS S3 part numbers must start from 1, never 0 or negative
|
|
func calculatePartOffset(partNumber int) int64 {
|
|
// AWS S3 part numbers must start from 1, never 0 or negative
|
|
if partNumber < 1 {
|
|
glog.Errorf("Invalid partNumber: %d. Must be >= 1.", partNumber)
|
|
return 0
|
|
}
|
|
// Using a large multiplier to ensure block offsets for different parts do not overlap.
|
|
// S3 part size limit is 5GB, so this provides a large safety margin.
|
|
partOffset := int64(partNumber-1) * s3_constants.PartOffsetMultiplier
|
|
return partOffset
|
|
}
|
|
|
|
// handleSSECEncryption processes SSE-C encryption for the data reader
|
|
func (s3a *S3ApiServer) handleSSECEncryption(r *http.Request, dataReader io.Reader) (io.Reader, *SSECustomerKey, []byte, s3err.ErrorCode) {
|
|
// Handle SSE-C encryption if requested
|
|
customerKey, err := ParseSSECHeaders(r)
|
|
if err != nil {
|
|
glog.Errorf("SSE-C header validation failed: %v", err)
|
|
// Use shared error mapping helper
|
|
errCode := MapSSECErrorToS3Error(err)
|
|
return nil, nil, nil, errCode
|
|
}
|
|
|
|
// Apply SSE-C encryption if customer key is provided
|
|
var sseIV []byte
|
|
if customerKey != nil {
|
|
encryptedReader, iv, encErr := CreateSSECEncryptedReader(dataReader, customerKey)
|
|
if encErr != nil {
|
|
return nil, nil, nil, s3err.ErrInternalError
|
|
}
|
|
dataReader = encryptedReader
|
|
sseIV = iv
|
|
}
|
|
|
|
return dataReader, customerKey, sseIV, s3err.ErrNone
|
|
}
|
|
|
|
// handleSSEKMSEncryption processes SSE-KMS encryption for the data reader
|
|
func (s3a *S3ApiServer) handleSSEKMSEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSEKMSKey, []byte, s3err.ErrorCode) {
|
|
// Handle SSE-KMS encryption if requested
|
|
if !IsSSEKMSRequest(r) {
|
|
return dataReader, nil, nil, s3err.ErrNone
|
|
}
|
|
|
|
glog.V(3).Infof("handleSSEKMSEncryption: SSE-KMS request detected, processing encryption")
|
|
|
|
// Parse SSE-KMS headers
|
|
keyID := r.Header.Get(s3_constants.AmzServerSideEncryptionAwsKmsKeyId)
|
|
bucketKeyEnabled := strings.ToLower(r.Header.Get(s3_constants.AmzServerSideEncryptionBucketKeyEnabled)) == "true"
|
|
|
|
// Build encryption context
|
|
bucket, object := s3_constants.GetBucketAndObject(r)
|
|
encryptionContext := BuildEncryptionContext(bucket, object, bucketKeyEnabled)
|
|
|
|
// Add any user-provided encryption context
|
|
if contextHeader := r.Header.Get(s3_constants.AmzServerSideEncryptionContext); contextHeader != "" {
|
|
userContext, err := parseEncryptionContext(contextHeader)
|
|
if err != nil {
|
|
return nil, nil, nil, s3err.ErrInvalidRequest
|
|
}
|
|
// Merge user context with default context
|
|
for k, v := range userContext {
|
|
encryptionContext[k] = v
|
|
}
|
|
}
|
|
|
|
// Check if a base IV is provided (for multipart uploads)
|
|
var encryptedReader io.Reader
|
|
var sseKey *SSEKMSKey
|
|
var encErr error
|
|
|
|
baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSEKMSBaseIVHeader)
|
|
if baseIVHeader != "" {
|
|
// Decode the base IV from the header
|
|
baseIV, decodeErr := base64.StdEncoding.DecodeString(baseIVHeader)
|
|
if decodeErr != nil || len(baseIV) != 16 {
|
|
return nil, nil, nil, s3err.ErrInternalError
|
|
}
|
|
// Use the provided base IV with unique part offset for multipart upload consistency
|
|
encryptedReader, sseKey, encErr = CreateSSEKMSEncryptedReaderWithBaseIVAndOffset(dataReader, keyID, encryptionContext, bucketKeyEnabled, baseIV, partOffset)
|
|
glog.V(4).Infof("Using provided base IV %x for SSE-KMS encryption", baseIV[:8])
|
|
} else {
|
|
// Generate a new IV for single-part uploads
|
|
encryptedReader, sseKey, encErr = CreateSSEKMSEncryptedReaderWithBucketKey(dataReader, keyID, encryptionContext, bucketKeyEnabled)
|
|
}
|
|
|
|
if encErr != nil {
|
|
return nil, nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
// Prepare SSE-KMS metadata for later header setting
|
|
sseKMSMetadata, metaErr := SerializeSSEKMSMetadata(sseKey)
|
|
if metaErr != nil {
|
|
return nil, nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
return encryptedReader, sseKey, sseKMSMetadata, s3err.ErrNone
|
|
}
|
|
|
|
// handleSSES3MultipartEncryption handles multipart upload logic for SSE-S3 encryption
|
|
func (s3a *S3ApiServer) handleSSES3MultipartEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSES3Key, s3err.ErrorCode) {
|
|
keyDataHeader := r.Header.Get(s3_constants.SeaweedFSSSES3KeyDataHeader)
|
|
baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSES3BaseIVHeader)
|
|
|
|
glog.V(4).Infof("handleSSES3MultipartEncryption: using provided key and base IV for multipart part")
|
|
|
|
// Decode the key data
|
|
keyData, decodeErr := base64.StdEncoding.DecodeString(keyDataHeader)
|
|
if decodeErr != nil {
|
|
return nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
// Deserialize the SSE-S3 key
|
|
keyManager := GetSSES3KeyManager()
|
|
key, deserializeErr := DeserializeSSES3Metadata(keyData, keyManager)
|
|
if deserializeErr != nil {
|
|
return nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
// Decode the base IV
|
|
baseIV, decodeErr := base64.StdEncoding.DecodeString(baseIVHeader)
|
|
if decodeErr != nil || len(baseIV) != s3_constants.AESBlockSize {
|
|
return nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
// Use the provided base IV with unique part offset for multipart upload consistency
|
|
encryptedReader, _, encErr := CreateSSES3EncryptedReaderWithBaseIV(dataReader, key, baseIV, partOffset)
|
|
if encErr != nil {
|
|
return nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
glog.V(4).Infof("handleSSES3MultipartEncryption: using provided base IV %x", baseIV[:8])
|
|
return encryptedReader, key, s3err.ErrNone
|
|
}
|
|
|
|
// handleSSES3SinglePartEncryption handles single-part upload logic for SSE-S3 encryption
|
|
func (s3a *S3ApiServer) handleSSES3SinglePartEncryption(dataReader io.Reader) (io.Reader, *SSES3Key, s3err.ErrorCode) {
|
|
glog.V(4).Infof("handleSSES3SinglePartEncryption: generating new key for single-part upload")
|
|
|
|
keyManager := GetSSES3KeyManager()
|
|
key, err := keyManager.GetOrCreateKey("")
|
|
if err != nil {
|
|
return nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
// Create encrypted reader
|
|
encryptedReader, iv, encErr := CreateSSES3EncryptedReader(dataReader, key)
|
|
if encErr != nil {
|
|
return nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
// Store IV on the key object for later decryption
|
|
key.IV = iv
|
|
|
|
// Store the key for later use
|
|
keyManager.StoreKey(key)
|
|
|
|
return encryptedReader, key, s3err.ErrNone
|
|
}
|
|
|
|
// handleSSES3Encryption processes SSE-S3 encryption for the data reader
|
|
func (s3a *S3ApiServer) handleSSES3Encryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSES3Key, []byte, s3err.ErrorCode) {
|
|
if !IsSSES3RequestInternal(r) {
|
|
return dataReader, nil, nil, s3err.ErrNone
|
|
}
|
|
|
|
glog.V(3).Infof("handleSSES3Encryption: SSE-S3 request detected, processing encryption")
|
|
|
|
var encryptedReader io.Reader
|
|
var sseS3Key *SSES3Key
|
|
var errCode s3err.ErrorCode
|
|
|
|
// Check if this is multipart upload (key data and base IV provided)
|
|
keyDataHeader := r.Header.Get(s3_constants.SeaweedFSSSES3KeyDataHeader)
|
|
baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSES3BaseIVHeader)
|
|
|
|
if keyDataHeader != "" && baseIVHeader != "" {
|
|
// Multipart upload: use provided key and base IV
|
|
encryptedReader, sseS3Key, errCode = s3a.handleSSES3MultipartEncryption(r, dataReader, partOffset)
|
|
} else {
|
|
// Single-part upload: generate new key and IV
|
|
encryptedReader, sseS3Key, errCode = s3a.handleSSES3SinglePartEncryption(dataReader)
|
|
}
|
|
|
|
if errCode != s3err.ErrNone {
|
|
return nil, nil, nil, errCode
|
|
}
|
|
|
|
// Prepare SSE-S3 metadata for later header setting
|
|
sseS3Metadata, metaErr := SerializeSSES3Metadata(sseS3Key)
|
|
if metaErr != nil {
|
|
return nil, nil, nil, s3err.ErrInternalError
|
|
}
|
|
|
|
glog.V(3).Infof("handleSSES3Encryption: prepared SSE-S3 metadata for object")
|
|
return encryptedReader, sseS3Key, sseS3Metadata, s3err.ErrNone
|
|
}
|
|
|
|
// handleAllSSEEncryption processes all SSE types in sequence and returns the final encrypted reader
|
|
// This eliminates repetitive dataReader assignments and centralizes SSE processing
|
|
func (s3a *S3ApiServer) handleAllSSEEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (*PutToFilerEncryptionResult, s3err.ErrorCode) {
|
|
result := &PutToFilerEncryptionResult{
|
|
DataReader: dataReader,
|
|
}
|
|
|
|
// Handle SSE-C encryption first
|
|
encryptedReader, customerKey, sseIV, errCode := s3a.handleSSECEncryption(r, result.DataReader)
|
|
if errCode != s3err.ErrNone {
|
|
return nil, errCode
|
|
}
|
|
result.DataReader = encryptedReader
|
|
result.CustomerKey = customerKey
|
|
result.SSEIV = sseIV
|
|
|
|
// Handle SSE-KMS encryption
|
|
encryptedReader, sseKMSKey, sseKMSMetadata, errCode := s3a.handleSSEKMSEncryption(r, result.DataReader, partOffset)
|
|
if errCode != s3err.ErrNone {
|
|
return nil, errCode
|
|
}
|
|
result.DataReader = encryptedReader
|
|
result.SSEKMSKey = sseKMSKey
|
|
result.SSEKMSMetadata = sseKMSMetadata
|
|
|
|
// Handle SSE-S3 encryption
|
|
encryptedReader, sseS3Key, sseS3Metadata, errCode := s3a.handleSSES3Encryption(r, result.DataReader, partOffset)
|
|
if errCode != s3err.ErrNone {
|
|
return nil, errCode
|
|
}
|
|
result.DataReader = encryptedReader
|
|
result.SSES3Key = sseS3Key
|
|
result.SSES3Metadata = sseS3Metadata
|
|
|
|
// Set SSE type for response headers
|
|
if customerKey != nil {
|
|
result.SSEType = s3_constants.SSETypeC
|
|
} else if sseKMSKey != nil {
|
|
result.SSEType = s3_constants.SSETypeKMS
|
|
} else if sseS3Key != nil {
|
|
result.SSEType = s3_constants.SSETypeS3
|
|
}
|
|
|
|
return result, s3err.ErrNone
|
|
}
|