File: client_encryption.rb

package info (click to toggle)
ruby-mongo 2.23.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 15,020 kB
  • sloc: ruby: 110,810; makefile: 5
file content (313 lines) | stat: -rw-r--r-- 14,262 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
# frozen_string_literal: true
# rubocop:todo all

# Copyright (C) 2019-2020 MongoDB Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#   http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

module Mongo
  # ClientEncryption encapsulates explicit operations on a key vault
  # collection that cannot be done directly on a MongoClient. It
  # provides an API for explicitly encrypting and decrypting values,
  # and creating data keys.
  class ClientEncryption
    # Create a new ClientEncryption object with the provided options.
    #
    # @param [ Mongo::Client ] key_vault_client A Mongo::Client
    #   that is connected to the MongoDB instance where the key vault
    #   collection is stored.
    # @param [ Hash ] options The ClientEncryption options.
    #
    # @option options [ String ] :key_vault_namespace The name of the
    #   key vault collection in the format "database.collection".
    # @option options [ Hash ] :kms_providers A hash of key management service
    #   configuration information.
    #   @see Mongo::Crypt::KMS::Credentials for list of options for every
    #   supported provider.
    #   @note There may be more than one KMS provider specified.
    # @option options [ Hash ] :kms_tls_options TLS options to connect to KMS
    #   providers. Keys of the hash should be KSM provider names; values
    #   should be hashes of TLS connection options. The options are equivalent
    #   to TLS connection options of Mongo::Client.
    #   @see Mongo::Client#initialize for list of TLS options.
    # @option options [ Integer ] :timeout_ms The operation timeout in milliseconds.
    #    Must be a non-negative integer. An explicit value of 0 means infinite.
    #    The default value is unset which means the feature is disabled.
    #
    # @raise [ ArgumentError ] If required options are missing or incorrectly
    #   formatted.
    def initialize(key_vault_client, options = {})
      @encrypter = Crypt::ExplicitEncrypter.new(
        key_vault_client,
        options[:key_vault_namespace],
        Crypt::KMS::Credentials.new(options[:kms_providers]),
        Crypt::KMS::Validations.validate_tls_options(options[:kms_tls_options])
      )
    end

    # Generates a data key used for encryption/decryption and stores
    # that key in the KMS collection. The generated key is encrypted with
    # the KMS master key.
    #
    # @param [ String ] kms_provider The KMS provider to use. Valid values are
    #   "aws" and "local".
    # @param [ Hash ] options
    #
    # @option options [ Hash ] :master_key Information about the AWS master key.
    #   Required if kms_provider is "aws".
    #   - :region [ String ] The The AWS region of the master key (required).
    #   - :key [ String ] The Amazon Resource Name (ARN) of the master key (required).
    #   - :endpoint [ String ] An alternate host to send KMS requests to (optional).
    #     endpoint should be a host name with an optional port number separated
    #     by a colon (e.g. "kms.us-east-1.amazonaws.com" or
    #     "kms.us-east-1.amazonaws.com:443"). An endpoint in any other format
    #     will not be properly parsed.
    # @option options [ Array<String> ] :key_alt_names An optional array of
    #   strings specifying alternate names for the new data key.
    # @option options [ String | nil ] :key_material Optional
    #   96 bytes to use as custom key material for the data key being created.
    #   If :key_material option is given, the custom key material is used
    #   for encrypting and decrypting data.
    #
    # @return [ BSON::Binary ] The 16-byte UUID of the new data key as a
    #   BSON::Binary object with type :uuid.
    def create_data_key(kms_provider, options={})
      key_document = Crypt::KMS::MasterKeyDocument.new(kms_provider, options)

      key_alt_names = options[:key_alt_names]
      key_material = options[:key_material]
      @encrypter.create_and_insert_data_key(key_document, key_alt_names, key_material)
    end

    # Encrypts a value using the specified encryption key and algorithm.
    #
    # @param [ Object ] value The value to encrypt.
    # @param [ Hash ] options
    #
    # @option options [ BSON::Binary ] :key_id A BSON::Binary object of type :uuid
    #   representing the UUID of the encryption key as it is stored in the key
    #   vault collection.
    # @option options [ String ] :key_alt_name The alternate name for the
    #   encryption key.
    # @option options [ String ] :algorithm The algorithm used to encrypt the value.
    #   Valid algorithms are "AEAD_AES_256_CBC_HMAC_SHA_512-Deterministic",
    #   "AEAD_AES_256_CBC_HMAC_SHA_512-Random", "Indexed", "Unindexed".
    # @option options [ Integer | nil ] :contention_factor Contention factor
    #   to be applied if encryption algorithm is set to "Indexed". If not
    #   provided, it defaults to a value of 0. Contention factor should be set
    #   only if encryption algorithm is set to "Indexed".
    # @option options [ String | nil ] query_type Query type to be applied
    # if encryption algorithm is set to "Indexed". Query type should be set
    #   only if encryption algorithm is set to "Indexed". The only allowed
    #   value is "equality".
    #
    # @note The :key_id and :key_alt_name options are mutually exclusive. Only
    #   one is required to perform explicit encryption.
    #
    # @return [ BSON::Binary ] A BSON Binary object of subtype 6 (ciphertext)
    #   representing the encrypted value.
    #
    # @raise [ ArgumentError ] if either contention_factor or query_type
    #   is set, and algorithm is not "Indexed".
    def encrypt(value, options={})
      @encrypter.encrypt(value, options)
    end

    # Encrypts a Match Expression or Aggregate Expression to query a range index.
    #
    # @example Encrypt Match Expression.
    #   encryption.encrypt_expression(
    #     {'$and' =>  [{'field' => {'$gt' => 10}}, {'field' =>  {'$lt' => 20 }}]}
    #   )
    # @example Encrypt Aggregate Expression.
    #   encryption.encrypt_expression(
    #     {'$and' =>  [{'$gt' => ['$field', 10]}, {'$lt' => ['$field', 20]}}
    #   )
    #   {$and: [{$gt: [<fieldpath>, <value1>]}, {$lt: [<fieldpath>, <value2>]}]
    # Only supported when queryType is "range" and algorithm is "Range".
    # @note: The Range algorithm is experimental only. It is not intended
    #   for public use. It is subject to breaking changes.
    #
    # @param [ Hash ] expression Expression to encrypt.
    # # @param [ Hash ] options
    # @option options [ BSON::Binary ] :key_id A BSON::Binary object of type :uuid
    #   representing the UUID of the encryption key as it is stored in the key
    #   vault collection.
    # @option options [ String ] :key_alt_name The alternate name for the
    #   encryption key.
    # @option options [ String ] :algorithm The algorithm used to encrypt the
    #   expression. The only allowed value is "Range"
    # @option options [ Integer | nil ] :contention_factor Contention factor
    #   to be applied If not  provided, it defaults to a value of 0.
    # @option options [ String | nil ] query_type Query type to be applied.
    #   The only allowed value is "range".
    #
    # @note The :key_id and :key_alt_name options are mutually exclusive. Only
    #   one is required to perform explicit encryption.
    #
    # @return [ BSON::Binary ] A BSON Binary object of subtype 6 (ciphertext)
    #   representing the encrypted expression.
    #
    # @raise [ ArgumentError ] if disallowed values in options are set.
    def encrypt_expression(expression, options = {})
      @encrypter.encrypt_expression(expression, options)
    end

    # Decrypts a value that has already been encrypted.
    #
    # @param [ BSON::Binary ] value A BSON Binary object of subtype 6 (ciphertext)
    #   that will be decrypted.
    #
    # @return [ Object ] The decrypted value.
    def decrypt(value)
      @encrypter.decrypt(value)
    end

    # Adds a key_alt_name for the key in the key vault collection with the given id.
    #
    # @param [ BSON::Binary ] id Id of the key to add new key alt name.
    # @param [ String ] key_alt_name New key alt name to add.
    #
    # @return [ BSON::Document | nil ] Document describing the identified key
    #   before adding the key alt name, or nil if no such key.
    def add_key_alt_name(id, key_alt_name)
      @encrypter.add_key_alt_name(id, key_alt_name)
    end

    # Removes the key with the given id from the key vault collection.
    #
    # @param [ BSON::Binary ] id Id of the key to delete.
    #
    # @return [ Operation::Result ] The response from the database for the delete_one
    #   operation that deletes the key.
    def delete_key(id)
      @encrypter.delete_key(id)
    end

    # Finds a single key with the given id.
    #
    # @param [ BSON::Binary ] id Id of the key to get.
    #
    # @return [ BSON::Document | nil ] The found key document or nil
    #   if not found.
    def get_key(id)
      @encrypter.get_key(id)
    end

    # Returns a key in the key vault collection with the given key_alt_name.
    #
    # @param [ String ] key_alt_name Key alt name to find a key.
    #
    # @return [ BSON::Document | nil ] The found key document or nil
    #   if not found.
    def get_key_by_alt_name(key_alt_name)
      @encrypter.get_key_by_alt_name(key_alt_name)
    end

    # Returns all keys in the key vault collection.
    #
    # @return [ Collection::View ] Keys in the key vault collection.
    def get_keys
      @encrypter.get_keys
    end
    alias :keys :get_keys

    # Removes a key_alt_name from a key in the key vault collection with the given id.
    #
    # @param [ BSON::Binary ] id Id of the key to remove key alt name.
    # @param [ String ] key_alt_name Key alt name to remove.
    #
    # @return [ BSON::Document | nil ] Document describing the identified key
    #   before removing the key alt name, or nil if no such key.
    def remove_key_alt_name(id, key_alt_name)
      @encrypter.remove_key_alt_name(id, key_alt_name)
    end

    # Decrypts multiple data keys and (re-)encrypts them with a new master_key,
    #   or with their current master_key if a new one is not given.
    #
    # @param [ Hash ] filter Filter used to find keys to be updated.
    # @param [ Hash ] options
    #
    # @option options [ String ] :provider KMS provider to encrypt keys.
    # @option options [ Hash | nil ] :master_key Document describing master key
    #   to encrypt keys.
    #
    # @return [ Crypt::RewrapManyDataKeyResult ] Result of the operation.
    def rewrap_many_data_key(filter, opts = {})
      @encrypter.rewrap_many_data_key(filter, opts)
    end

    # Create collection with encrypted fields.
    #
    # If :encryption_fields contains a keyId with a null value, a data key
    # will be automatically generated and assigned to keyId value.
    #
    # @note This method does not update the :encrypted_fields_map in the client's
    #   :auto_encryption_options. Therefore, in order to use the collection
    #   created by this method with automatic encryption, the user must create
    #   a new client after calling this function with the :encrypted_fields returned.
    #
    # @param [ Mongo::Database ] database Database to create collection in.
    # @param [ String ] coll_name Name of collection to create.
    # @param [ Hash ] coll_opts Options for collection to create.
    # @param [ String ] kms_provider KMS provider to encrypt fields.
    # @param [ Hash | nil ] master_key Document describing master key to encrypt fields.
    #
    # @return [ Array<Operation::Result, Hash> ] The result of the create
    #   collection operation and the encrypted fields map used to create
    #   the collection.
    def create_encrypted_collection(database, coll_name, coll_opts, kms_provider, master_key)
      raise ArgumentError, 'coll_opts must contain :encrypted_fields' unless coll_opts[:encrypted_fields]

      encrypted_fields = create_data_keys(coll_opts[:encrypted_fields], kms_provider, master_key)
      begin
        new_coll_opts = coll_opts.dup.merge(encrypted_fields: encrypted_fields)
        [database[coll_name].create(new_coll_opts), encrypted_fields]
      rescue Mongo::Error => e
        raise Error::CryptError, "Error creating collection with encrypted fields \
              #{encrypted_fields}: #{e.class}: #{e.message}"
      end
    end

    private

    # Create data keys for fields in encrypted_fields that has :keyId key,
    # but the value is nil.
    #
    # @param [ Hash ] encrypted_fields Encrypted fields map.
    # @param [ String ] kms_provider KMS provider to encrypt fields.
    # @param [ Hash | nil ] master_key Document describing master key to encrypt fields.
    #
    # @return [ Hash ] Encrypted fields map with keyIds for fields
    #   that did not have one.
    def create_data_keys(encrypted_fields, kms_provider, master_key)
      encrypted_fields = encrypted_fields.dup
      # We must return the partially formed encrypted_fields hash if an error
      # occurs - https://github.com/mongodb/specifications/blob/master/source/client-side-encryption/client-side-encryption.md#create-encrypted-collection-helper
      # Thefore, we do this in a loop instead of using #map.
      encrypted_fields[:fields].size.times do |i|
        field = encrypted_fields[:fields][i]
        next unless field.is_a?(Hash) && field.fetch(:keyId, false).nil?

        begin
          encrypted_fields[:fields][i][:keyId] = create_data_key(kms_provider, master_key: master_key)
        rescue Error::CryptError => e
          raise Error::CryptError, "Error creating data key for field #{field[:path]} \
              with encrypted fields #{encrypted_fields}: #{e.class}: #{e.message}"
        end
      end
      encrypted_fields
    end
  end
end