You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							270 lines
						
					
					
						
							9.6 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							270 lines
						
					
					
						
							9.6 KiB
						
					
					
				
								package s3api
							 | 
						|
								
							 | 
						|
								import (
							 | 
						|
									"encoding/base64"
							 | 
						|
									"io"
							 | 
						|
									"net/http"
							 | 
						|
									"strings"
							 | 
						|
								
							 | 
						|
									"github.com/seaweedfs/seaweedfs/weed/glog"
							 | 
						|
									"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
							 | 
						|
									"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
							 | 
						|
								)
							 | 
						|
								
							 | 
						|
								// PutToFilerEncryptionResult holds the result of encryption processing
							 | 
						|
								type PutToFilerEncryptionResult struct {
							 | 
						|
									DataReader     io.Reader
							 | 
						|
									SSEType        string
							 | 
						|
									CustomerKey    *SSECustomerKey
							 | 
						|
									SSEIV          []byte
							 | 
						|
									SSEKMSKey      *SSEKMSKey
							 | 
						|
									SSES3Key       *SSES3Key
							 | 
						|
									SSEKMSMetadata []byte
							 | 
						|
									SSES3Metadata  []byte
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// calculatePartOffset calculates unique offset for each part to prevent IV reuse in multipart uploads
							 | 
						|
								// AWS S3 part numbers must start from 1, never 0 or negative
							 | 
						|
								func calculatePartOffset(partNumber int) int64 {
							 | 
						|
									// AWS S3 part numbers must start from 1, never 0 or negative
							 | 
						|
									if partNumber < 1 {
							 | 
						|
										glog.Errorf("Invalid partNumber: %d. Must be >= 1.", partNumber)
							 | 
						|
										return 0
							 | 
						|
									}
							 | 
						|
									// Using a large multiplier to ensure block offsets for different parts do not overlap.
							 | 
						|
									// S3 part size limit is 5GB, so this provides a large safety margin.
							 | 
						|
									partOffset := int64(partNumber-1) * s3_constants.PartOffsetMultiplier
							 | 
						|
									return partOffset
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// handleSSECEncryption processes SSE-C encryption for the data reader
							 | 
						|
								func (s3a *S3ApiServer) handleSSECEncryption(r *http.Request, dataReader io.Reader) (io.Reader, *SSECustomerKey, []byte, s3err.ErrorCode) {
							 | 
						|
									// Handle SSE-C encryption if requested
							 | 
						|
									customerKey, err := ParseSSECHeaders(r)
							 | 
						|
									if err != nil {
							 | 
						|
										glog.Errorf("SSE-C header validation failed: %v", err)
							 | 
						|
										// Use shared error mapping helper
							 | 
						|
										errCode := MapSSECErrorToS3Error(err)
							 | 
						|
										return nil, nil, nil, errCode
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Apply SSE-C encryption if customer key is provided
							 | 
						|
									var sseIV []byte
							 | 
						|
									if customerKey != nil {
							 | 
						|
										encryptedReader, iv, encErr := CreateSSECEncryptedReader(dataReader, customerKey)
							 | 
						|
										if encErr != nil {
							 | 
						|
											return nil, nil, nil, s3err.ErrInternalError
							 | 
						|
										}
							 | 
						|
										dataReader = encryptedReader
							 | 
						|
										sseIV = iv
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									return dataReader, customerKey, sseIV, s3err.ErrNone
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// handleSSEKMSEncryption processes SSE-KMS encryption for the data reader
							 | 
						|
								func (s3a *S3ApiServer) handleSSEKMSEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSEKMSKey, []byte, s3err.ErrorCode) {
							 | 
						|
									// Handle SSE-KMS encryption if requested
							 | 
						|
									if !IsSSEKMSRequest(r) {
							 | 
						|
										return dataReader, nil, nil, s3err.ErrNone
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									glog.V(3).Infof("handleSSEKMSEncryption: SSE-KMS request detected, processing encryption")
							 | 
						|
								
							 | 
						|
									// Parse SSE-KMS headers
							 | 
						|
									keyID := r.Header.Get(s3_constants.AmzServerSideEncryptionAwsKmsKeyId)
							 | 
						|
									bucketKeyEnabled := strings.ToLower(r.Header.Get(s3_constants.AmzServerSideEncryptionBucketKeyEnabled)) == "true"
							 | 
						|
								
							 | 
						|
									// Build encryption context
							 | 
						|
									bucket, object := s3_constants.GetBucketAndObject(r)
							 | 
						|
									encryptionContext := BuildEncryptionContext(bucket, object, bucketKeyEnabled)
							 | 
						|
								
							 | 
						|
									// Add any user-provided encryption context
							 | 
						|
									if contextHeader := r.Header.Get(s3_constants.AmzServerSideEncryptionContext); contextHeader != "" {
							 | 
						|
										userContext, err := parseEncryptionContext(contextHeader)
							 | 
						|
										if err != nil {
							 | 
						|
											return nil, nil, nil, s3err.ErrInvalidRequest
							 | 
						|
										}
							 | 
						|
										// Merge user context with default context
							 | 
						|
										for k, v := range userContext {
							 | 
						|
											encryptionContext[k] = v
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Check if a base IV is provided (for multipart uploads)
							 | 
						|
									var encryptedReader io.Reader
							 | 
						|
									var sseKey *SSEKMSKey
							 | 
						|
									var encErr error
							 | 
						|
								
							 | 
						|
									baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSEKMSBaseIVHeader)
							 | 
						|
									if baseIVHeader != "" {
							 | 
						|
										// Decode the base IV from the header
							 | 
						|
										baseIV, decodeErr := base64.StdEncoding.DecodeString(baseIVHeader)
							 | 
						|
										if decodeErr != nil || len(baseIV) != 16 {
							 | 
						|
											return nil, nil, nil, s3err.ErrInternalError
							 | 
						|
										}
							 | 
						|
										// Use the provided base IV with unique part offset for multipart upload consistency
							 | 
						|
										encryptedReader, sseKey, encErr = CreateSSEKMSEncryptedReaderWithBaseIVAndOffset(dataReader, keyID, encryptionContext, bucketKeyEnabled, baseIV, partOffset)
							 | 
						|
										glog.V(4).Infof("Using provided base IV %x for SSE-KMS encryption", baseIV[:8])
							 | 
						|
									} else {
							 | 
						|
										// Generate a new IV for single-part uploads
							 | 
						|
										encryptedReader, sseKey, encErr = CreateSSEKMSEncryptedReaderWithBucketKey(dataReader, keyID, encryptionContext, bucketKeyEnabled)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									if encErr != nil {
							 | 
						|
										return nil, nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Prepare SSE-KMS metadata for later header setting
							 | 
						|
									sseKMSMetadata, metaErr := SerializeSSEKMSMetadata(sseKey)
							 | 
						|
									if metaErr != nil {
							 | 
						|
										return nil, nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									return encryptedReader, sseKey, sseKMSMetadata, s3err.ErrNone
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// handleSSES3MultipartEncryption handles multipart upload logic for SSE-S3 encryption
							 | 
						|
								func (s3a *S3ApiServer) handleSSES3MultipartEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSES3Key, s3err.ErrorCode) {
							 | 
						|
									keyDataHeader := r.Header.Get(s3_constants.SeaweedFSSSES3KeyDataHeader)
							 | 
						|
									baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSES3BaseIVHeader)
							 | 
						|
								
							 | 
						|
									glog.V(4).Infof("handleSSES3MultipartEncryption: using provided key and base IV for multipart part")
							 | 
						|
								
							 | 
						|
									// Decode the key data
							 | 
						|
									keyData, decodeErr := base64.StdEncoding.DecodeString(keyDataHeader)
							 | 
						|
									if decodeErr != nil {
							 | 
						|
										return nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Deserialize the SSE-S3 key
							 | 
						|
									keyManager := GetSSES3KeyManager()
							 | 
						|
									key, deserializeErr := DeserializeSSES3Metadata(keyData, keyManager)
							 | 
						|
									if deserializeErr != nil {
							 | 
						|
										return nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Decode the base IV
							 | 
						|
									baseIV, decodeErr := base64.StdEncoding.DecodeString(baseIVHeader)
							 | 
						|
									if decodeErr != nil || len(baseIV) != s3_constants.AESBlockSize {
							 | 
						|
										return nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Use the provided base IV with unique part offset for multipart upload consistency
							 | 
						|
									encryptedReader, _, encErr := CreateSSES3EncryptedReaderWithBaseIV(dataReader, key, baseIV, partOffset)
							 | 
						|
									if encErr != nil {
							 | 
						|
										return nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									glog.V(4).Infof("handleSSES3MultipartEncryption: using provided base IV %x", baseIV[:8])
							 | 
						|
									return encryptedReader, key, s3err.ErrNone
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// handleSSES3SinglePartEncryption handles single-part upload logic for SSE-S3 encryption
							 | 
						|
								func (s3a *S3ApiServer) handleSSES3SinglePartEncryption(dataReader io.Reader) (io.Reader, *SSES3Key, s3err.ErrorCode) {
							 | 
						|
									glog.V(4).Infof("handleSSES3SinglePartEncryption: generating new key for single-part upload")
							 | 
						|
								
							 | 
						|
									keyManager := GetSSES3KeyManager()
							 | 
						|
									key, err := keyManager.GetOrCreateKey("")
							 | 
						|
									if err != nil {
							 | 
						|
										return nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Create encrypted reader
							 | 
						|
									encryptedReader, iv, encErr := CreateSSES3EncryptedReader(dataReader, key)
							 | 
						|
									if encErr != nil {
							 | 
						|
										return nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Store IV on the key object for later decryption
							 | 
						|
									key.IV = iv
							 | 
						|
								
							 | 
						|
									// Store the key for later use
							 | 
						|
									keyManager.StoreKey(key)
							 | 
						|
								
							 | 
						|
									return encryptedReader, key, s3err.ErrNone
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// handleSSES3Encryption processes SSE-S3 encryption for the data reader
							 | 
						|
								func (s3a *S3ApiServer) handleSSES3Encryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSES3Key, []byte, s3err.ErrorCode) {
							 | 
						|
									if !IsSSES3RequestInternal(r) {
							 | 
						|
										return dataReader, nil, nil, s3err.ErrNone
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									glog.V(3).Infof("handleSSES3Encryption: SSE-S3 request detected, processing encryption")
							 | 
						|
								
							 | 
						|
									var encryptedReader io.Reader
							 | 
						|
									var sseS3Key *SSES3Key
							 | 
						|
									var errCode s3err.ErrorCode
							 | 
						|
								
							 | 
						|
									// Check if this is multipart upload (key data and base IV provided)
							 | 
						|
									keyDataHeader := r.Header.Get(s3_constants.SeaweedFSSSES3KeyDataHeader)
							 | 
						|
									baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSES3BaseIVHeader)
							 | 
						|
								
							 | 
						|
									if keyDataHeader != "" && baseIVHeader != "" {
							 | 
						|
										// Multipart upload: use provided key and base IV
							 | 
						|
										encryptedReader, sseS3Key, errCode = s3a.handleSSES3MultipartEncryption(r, dataReader, partOffset)
							 | 
						|
									} else {
							 | 
						|
										// Single-part upload: generate new key and IV
							 | 
						|
										encryptedReader, sseS3Key, errCode = s3a.handleSSES3SinglePartEncryption(dataReader)
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									if errCode != s3err.ErrNone {
							 | 
						|
										return nil, nil, nil, errCode
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Prepare SSE-S3 metadata for later header setting
							 | 
						|
									sseS3Metadata, metaErr := SerializeSSES3Metadata(sseS3Key)
							 | 
						|
									if metaErr != nil {
							 | 
						|
										return nil, nil, nil, s3err.ErrInternalError
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									glog.V(3).Infof("handleSSES3Encryption: prepared SSE-S3 metadata for object")
							 | 
						|
									return encryptedReader, sseS3Key, sseS3Metadata, s3err.ErrNone
							 | 
						|
								}
							 | 
						|
								
							 | 
						|
								// handleAllSSEEncryption processes all SSE types in sequence and returns the final encrypted reader
							 | 
						|
								// This eliminates repetitive dataReader assignments and centralizes SSE processing
							 | 
						|
								func (s3a *S3ApiServer) handleAllSSEEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (*PutToFilerEncryptionResult, s3err.ErrorCode) {
							 | 
						|
									result := &PutToFilerEncryptionResult{
							 | 
						|
										DataReader: dataReader,
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									// Handle SSE-C encryption first
							 | 
						|
									encryptedReader, customerKey, sseIV, errCode := s3a.handleSSECEncryption(r, result.DataReader)
							 | 
						|
									if errCode != s3err.ErrNone {
							 | 
						|
										return nil, errCode
							 | 
						|
									}
							 | 
						|
									result.DataReader = encryptedReader
							 | 
						|
									result.CustomerKey = customerKey
							 | 
						|
									result.SSEIV = sseIV
							 | 
						|
								
							 | 
						|
									// Handle SSE-KMS encryption
							 | 
						|
									encryptedReader, sseKMSKey, sseKMSMetadata, errCode := s3a.handleSSEKMSEncryption(r, result.DataReader, partOffset)
							 | 
						|
									if errCode != s3err.ErrNone {
							 | 
						|
										return nil, errCode
							 | 
						|
									}
							 | 
						|
									result.DataReader = encryptedReader
							 | 
						|
									result.SSEKMSKey = sseKMSKey
							 | 
						|
									result.SSEKMSMetadata = sseKMSMetadata
							 | 
						|
								
							 | 
						|
									// Handle SSE-S3 encryption
							 | 
						|
									encryptedReader, sseS3Key, sseS3Metadata, errCode := s3a.handleSSES3Encryption(r, result.DataReader, partOffset)
							 | 
						|
									if errCode != s3err.ErrNone {
							 | 
						|
										return nil, errCode
							 | 
						|
									}
							 | 
						|
									result.DataReader = encryptedReader
							 | 
						|
									result.SSES3Key = sseS3Key
							 | 
						|
									result.SSES3Metadata = sseS3Metadata
							 | 
						|
								
							 | 
						|
									// Set SSE type for response headers
							 | 
						|
									if customerKey != nil {
							 | 
						|
										result.SSEType = s3_constants.SSETypeC
							 | 
						|
									} else if sseKMSKey != nil {
							 | 
						|
										result.SSEType = s3_constants.SSETypeKMS
							 | 
						|
									} else if sseS3Key != nil {
							 | 
						|
										result.SSEType = s3_constants.SSETypeS3
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									return result, s3err.ErrNone
							 | 
						|
								}
							 |