github.com/verovm/record-replay@v1.9.7/signer/storage/aes_gcm_storage.go (about)

     1  // Copyright 2018 The go-ethereum Authors
     2  // This file is part of the go-ethereum library.
     3  //
     4  // The go-ethereum library is free software: you can redistribute it and/or modify
     5  // it under the terms of the GNU Lesser General Public License as published by
     6  // the Free Software Foundation, either version 3 of the License, or
     7  // (at your option) any later version.
     8  //
     9  // The go-ethereum library is distributed in the hope that it will be useful,
    10  // but WITHOUT ANY WARRANTY; without even the implied warranty of
    11  // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    12  // GNU Lesser General Public License for more details.
    13  //
    14  // You should have received a copy of the GNU Lesser General Public License
    15  // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
    16  
    17  package storage
    18  
    19  import (
    20  	"crypto/aes"
    21  	"crypto/cipher"
    22  	"crypto/rand"
    23  	"encoding/json"
    24  	"io"
    25  	"io/ioutil"
    26  	"os"
    27  
    28  	"github.com/ethereum/go-ethereum/log"
    29  )
    30  
    31  type storedCredential struct {
    32  	// The iv
    33  	Iv []byte `json:"iv"`
    34  	// The ciphertext
    35  	CipherText []byte `json:"c"`
    36  }
    37  
    38  // AESEncryptedStorage is a storage type which is backed by a json-file. The json-file contains
    39  // key-value mappings, where the keys are _not_ encrypted, only the values are.
    40  type AESEncryptedStorage struct {
    41  	// File to read/write credentials
    42  	filename string
    43  	// Key stored in base64
    44  	key []byte
    45  }
    46  
    47  // NewAESEncryptedStorage creates a new encrypted storage backed by the given file/key
    48  func NewAESEncryptedStorage(filename string, key []byte) *AESEncryptedStorage {
    49  	return &AESEncryptedStorage{
    50  		filename: filename,
    51  		key:      key,
    52  	}
    53  }
    54  
    55  // Put stores a value by key. 0-length keys results in noop.
    56  func (s *AESEncryptedStorage) Put(key, value string) {
    57  	if len(key) == 0 {
    58  		return
    59  	}
    60  	data, err := s.readEncryptedStorage()
    61  	if err != nil {
    62  		log.Warn("Failed to read encrypted storage", "err", err, "file", s.filename)
    63  		return
    64  	}
    65  	ciphertext, iv, err := encrypt(s.key, []byte(value), []byte(key))
    66  	if err != nil {
    67  		log.Warn("Failed to encrypt entry", "err", err)
    68  		return
    69  	}
    70  	encrypted := storedCredential{Iv: iv, CipherText: ciphertext}
    71  	data[key] = encrypted
    72  	if err = s.writeEncryptedStorage(data); err != nil {
    73  		log.Warn("Failed to write entry", "err", err)
    74  	}
    75  }
    76  
    77  // Get returns the previously stored value, or an error if it does not exist or
    78  // key is of 0-length.
    79  func (s *AESEncryptedStorage) Get(key string) (string, error) {
    80  	if len(key) == 0 {
    81  		return "", ErrZeroKey
    82  	}
    83  	data, err := s.readEncryptedStorage()
    84  	if err != nil {
    85  		log.Warn("Failed to read encrypted storage", "err", err, "file", s.filename)
    86  		return "", err
    87  	}
    88  	encrypted, exist := data[key]
    89  	if !exist {
    90  		log.Warn("Key does not exist", "key", key)
    91  		return "", ErrNotFound
    92  	}
    93  	entry, err := decrypt(s.key, encrypted.Iv, encrypted.CipherText, []byte(key))
    94  	if err != nil {
    95  		log.Warn("Failed to decrypt key", "key", key)
    96  		return "", err
    97  	}
    98  	return string(entry), nil
    99  }
   100  
   101  // Del removes a key-value pair. If the key doesn't exist, the method is a noop.
   102  func (s *AESEncryptedStorage) Del(key string) {
   103  	data, err := s.readEncryptedStorage()
   104  	if err != nil {
   105  		log.Warn("Failed to read encrypted storage", "err", err, "file", s.filename)
   106  		return
   107  	}
   108  	delete(data, key)
   109  	if err = s.writeEncryptedStorage(data); err != nil {
   110  		log.Warn("Failed to write entry", "err", err)
   111  	}
   112  }
   113  
   114  // readEncryptedStorage reads the file with encrypted creds
   115  func (s *AESEncryptedStorage) readEncryptedStorage() (map[string]storedCredential, error) {
   116  	creds := make(map[string]storedCredential)
   117  	raw, err := ioutil.ReadFile(s.filename)
   118  
   119  	if err != nil {
   120  		if os.IsNotExist(err) {
   121  			// Doesn't exist yet
   122  			return creds, nil
   123  		}
   124  		log.Warn("Failed to read encrypted storage", "err", err, "file", s.filename)
   125  	}
   126  	if err = json.Unmarshal(raw, &creds); err != nil {
   127  		log.Warn("Failed to unmarshal encrypted storage", "err", err, "file", s.filename)
   128  		return nil, err
   129  	}
   130  	return creds, nil
   131  }
   132  
   133  // writeEncryptedStorage write the file with encrypted creds
   134  func (s *AESEncryptedStorage) writeEncryptedStorage(creds map[string]storedCredential) error {
   135  	raw, err := json.Marshal(creds)
   136  	if err != nil {
   137  		return err
   138  	}
   139  	if err = ioutil.WriteFile(s.filename, raw, 0600); err != nil {
   140  		return err
   141  	}
   142  	return nil
   143  }
   144  
   145  // encrypt encrypts plaintext with the given key, with additional data
   146  // The 'additionalData' is used to place the (plaintext) KV-store key into the V,
   147  // to prevent the possibility to alter a K, or swap two entries in the KV store with eachother.
   148  func encrypt(key []byte, plaintext []byte, additionalData []byte) ([]byte, []byte, error) {
   149  	block, err := aes.NewCipher(key)
   150  	if err != nil {
   151  		return nil, nil, err
   152  	}
   153  	aesgcm, err := cipher.NewGCM(block)
   154  	nonce := make([]byte, aesgcm.NonceSize())
   155  	if _, err := io.ReadFull(rand.Reader, nonce); err != nil {
   156  		return nil, nil, err
   157  	}
   158  	if err != nil {
   159  		return nil, nil, err
   160  	}
   161  	ciphertext := aesgcm.Seal(nil, nonce, plaintext, additionalData)
   162  	return ciphertext, nonce, nil
   163  }
   164  
   165  func decrypt(key []byte, nonce []byte, ciphertext []byte, additionalData []byte) ([]byte, error) {
   166  	block, err := aes.NewCipher(key)
   167  	if err != nil {
   168  		return nil, err
   169  	}
   170  	aesgcm, err := cipher.NewGCM(block)
   171  	if err != nil {
   172  		return nil, err
   173  	}
   174  	plaintext, err := aesgcm.Open(nil, nonce, ciphertext, additionalData)
   175  	if err != nil {
   176  		return nil, err
   177  	}
   178  	return plaintext, nil
   179  }