github.com/apache/arrow/go/v7@v7.0.1/parquet/internal/encryption/encryptor.go (about)

     1  // Licensed to the Apache Software Foundation (ASF) under one
     2  // or more contributor license agreements.  See the NOTICE file
     3  // distributed with this work for additional information
     4  // regarding copyright ownership.  The ASF licenses this file
     5  // to you under the Apache License, Version 2.0 (the
     6  // "License"); you may not use this file except in compliance
     7  // with the License.  You may obtain a copy of the License at
     8  //
     9  // http://www.apache.org/licenses/LICENSE-2.0
    10  //
    11  // Unless required by applicable law or agreed to in writing, software
    12  // distributed under the License is distributed on an "AS IS" BASIS,
    13  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    14  // See the License for the specific language governing permissions and
    15  // limitations under the License.
    16  
    17  package encryption
    18  
    19  import (
    20  	"io"
    21  
    22  	"github.com/apache/arrow/go/v7/arrow/memory"
    23  	"github.com/apache/arrow/go/v7/parquet"
    24  )
    25  
    26  // FileEncryptor is the interface for constructing encryptors for the different
    27  // sections of a parquet file.
    28  type FileEncryptor interface {
    29  	// GetFooterEncryptor returns an encryptor for the footer metadata
    30  	GetFooterEncryptor() Encryptor
    31  	// GetFooterSigningEncryptor returns an encryptor for creating the signature
    32  	// for the footer as opposed to encrypting the footer bytes directly.
    33  	GetFooterSigningEncryptor() Encryptor
    34  	// GetColumnMetaEncryptor returns an encryptor for the metadata only of the requested
    35  	// column path string.
    36  	GetColumnMetaEncryptor(columnPath string) Encryptor
    37  	// GetColumnDataEncryptor returns an encryptor for the column data ONLY of
    38  	// the requested column path string.
    39  	GetColumnDataEncryptor(columnPath string) Encryptor
    40  	// WipeOutEncryptionKeys deletes the keys that were used for encryption,
    41  	// called after every successfully encrypted file to ensure against accidental
    42  	// key re-use.
    43  	WipeOutEncryptionKeys()
    44  }
    45  
    46  type fileEncryptor struct {
    47  	props                  *parquet.FileEncryptionProperties
    48  	columnDataMap          map[string]Encryptor
    49  	columnMetaDataMap      map[string]Encryptor
    50  	footerSigningEncryptor Encryptor
    51  	footerEncryptor        Encryptor
    52  
    53  	// Key must be 16, 24, or 32 bytes in length thus there could be up to
    54  	// three types of meta_encryptors and data_encryptors
    55  	metaEncryptor *aesEncryptor
    56  	dataEncryptor *aesEncryptor
    57  
    58  	mem memory.Allocator
    59  }
    60  
    61  // NewFileEncryptor returns a new encryptor using the given encryption properties.
    62  //
    63  // Panics if the properties passed have already been used to construct an encryptor
    64  // ie: props.IsUtilized returns true. If mem is nil, will default to memory.DefaultAllocator
    65  func NewFileEncryptor(props *parquet.FileEncryptionProperties, mem memory.Allocator) FileEncryptor {
    66  	if props.IsUtilized() {
    67  		panic("re-using encryption properties for another file")
    68  	}
    69  
    70  	props.SetUtilized()
    71  	if mem == nil {
    72  		mem = memory.DefaultAllocator
    73  	}
    74  
    75  	return &fileEncryptor{
    76  		props:             props,
    77  		mem:               mem,
    78  		columnDataMap:     make(map[string]Encryptor),
    79  		columnMetaDataMap: make(map[string]Encryptor),
    80  	}
    81  }
    82  
    83  func (e *fileEncryptor) WipeOutEncryptionKeys() {
    84  	e.props.WipeOutEncryptionKeys()
    85  }
    86  
    87  func (e *fileEncryptor) GetFooterEncryptor() Encryptor {
    88  	if e.footerEncryptor == nil {
    89  		alg := e.props.Algorithm().Algo
    90  		footerAad := CreateFooterAad(e.props.FileAad())
    91  		footerKey := e.props.FooterKey()
    92  		enc := e.getMetaAesEncryptor(alg)
    93  		e.footerEncryptor = &encryptor{
    94  			aesEncryptor: enc,
    95  			key:          []byte(footerKey),
    96  			fileAad:      e.props.FileAad(),
    97  			aad:          footerAad,
    98  			mem:          e.mem,
    99  		}
   100  	}
   101  	return e.footerEncryptor
   102  }
   103  
   104  func (e *fileEncryptor) GetFooterSigningEncryptor() Encryptor {
   105  	if e.footerSigningEncryptor == nil {
   106  		alg := e.props.Algorithm().Algo
   107  		footerAad := CreateFooterAad(e.props.FileAad())
   108  		footerKey := e.props.FooterKey()
   109  		enc := e.getMetaAesEncryptor(alg)
   110  		e.footerSigningEncryptor = &encryptor{
   111  			aesEncryptor: enc,
   112  			key:          []byte(footerKey),
   113  			fileAad:      e.props.FileAad(),
   114  			aad:          footerAad,
   115  			mem:          e.mem,
   116  		}
   117  	}
   118  	return e.footerSigningEncryptor
   119  }
   120  
   121  func (e *fileEncryptor) getMetaAesEncryptor(alg parquet.Cipher) *aesEncryptor {
   122  	if e.metaEncryptor == nil {
   123  		e.metaEncryptor = NewAesEncryptor(alg, true)
   124  	}
   125  	return e.metaEncryptor
   126  }
   127  
   128  func (e *fileEncryptor) getDataAesEncryptor(alg parquet.Cipher) *aesEncryptor {
   129  	if e.dataEncryptor == nil {
   130  		e.dataEncryptor = NewAesEncryptor(alg, false)
   131  	}
   132  	return e.dataEncryptor
   133  }
   134  
   135  func (e *fileEncryptor) GetColumnMetaEncryptor(columnPath string) Encryptor {
   136  	return e.getColumnEncryptor(columnPath, true)
   137  }
   138  
   139  func (e *fileEncryptor) GetColumnDataEncryptor(columnPath string) Encryptor {
   140  	return e.getColumnEncryptor(columnPath, false)
   141  }
   142  
   143  func (e *fileEncryptor) getColumnEncryptor(columnPath string, metadata bool) Encryptor {
   144  	if metadata {
   145  		if enc, ok := e.columnMetaDataMap[columnPath]; ok {
   146  			return enc
   147  		}
   148  	} else {
   149  		if enc, ok := e.columnDataMap[columnPath]; ok {
   150  			return enc
   151  		}
   152  	}
   153  
   154  	columnProp := e.props.ColumnEncryptionProperties(columnPath)
   155  	if columnProp == nil {
   156  		return nil
   157  	}
   158  
   159  	var key string
   160  	if columnProp.IsEncryptedWithFooterKey() {
   161  		key = e.props.FooterKey()
   162  	} else {
   163  		key = columnProp.Key()
   164  	}
   165  
   166  	alg := e.props.Algorithm().Algo
   167  	var enc *aesEncryptor
   168  	if metadata {
   169  		enc = e.getMetaAesEncryptor(alg)
   170  	} else {
   171  		enc = e.getDataAesEncryptor(alg)
   172  	}
   173  
   174  	fileAad := e.props.FileAad()
   175  	ret := &encryptor{
   176  		aesEncryptor: enc,
   177  		key:          []byte(key),
   178  		fileAad:      fileAad,
   179  		aad:          "",
   180  		mem:          e.mem,
   181  	}
   182  	if metadata {
   183  		e.columnMetaDataMap[columnPath] = ret
   184  	} else {
   185  		e.columnDataMap[columnPath] = ret
   186  	}
   187  	return ret
   188  }
   189  
   190  // Encryptor is the basic interface for encryptors, for now there's only the single
   191  // aes encryptor implementation, but having it as an interface allows easy addition
   192  // manipulation of encryptor implementations in the future.
   193  type Encryptor interface {
   194  	// FileAad returns the file level AAD bytes for this encryptor
   195  	FileAad() string
   196  	// UpdateAad sets the aad bytes for encryption to the provided string
   197  	UpdateAad(string)
   198  	// Allocator returns the allocator that was used to construct the encryptor
   199  	Allocator() memory.Allocator
   200  	// CiphertextSizeDelta returns the extra bytes that will be added to the ciphertext
   201  	// for a total size of len(plaintext) + CiphertextSizeDelta bytes
   202  	CiphertextSizeDelta() int
   203  	// Encrypt writes the encrypted ciphertext for src to w and returns the total
   204  	// number of bytes written.
   205  	Encrypt(w io.Writer, src []byte) int
   206  	// EncryptColumnMetaData returns true if the column metadata should be encrypted based on the
   207  	// column encryption settings and footer encryption setting.
   208  	EncryptColumnMetaData(encryptFooter bool, properties *parquet.ColumnEncryptionProperties) bool
   209  }
   210  
   211  type encryptor struct {
   212  	aesEncryptor *aesEncryptor
   213  	key          []byte
   214  	fileAad      string
   215  	aad          string
   216  	mem          memory.Allocator
   217  }
   218  
   219  func (e *encryptor) FileAad() string             { return e.fileAad }
   220  func (e *encryptor) UpdateAad(aad string)        { e.aad = aad }
   221  func (e *encryptor) Allocator() memory.Allocator { return e.mem }
   222  func (e *encryptor) CiphertextSizeDelta() int    { return e.aesEncryptor.CiphertextSizeDelta() }
   223  
   224  func (e *encryptor) EncryptColumnMetaData(encryptFooter bool, properties *parquet.ColumnEncryptionProperties) bool {
   225  	if properties == nil || !properties.IsEncrypted() {
   226  		return false
   227  	}
   228  	if !encryptFooter {
   229  		return false
   230  	}
   231  	// if not encrypted with footer key then encrypt the metadata
   232  	return !properties.IsEncryptedWithFooterKey()
   233  }
   234  
   235  func (e *encryptor) Encrypt(w io.Writer, src []byte) int {
   236  	return e.aesEncryptor.Encrypt(w, src, e.key, []byte(e.aad))
   237  }