blob: b90d31585597b453e26072ffb25aaa748faf4b5a [file] [log] [blame]
// Licensed to the Apache Software Foundation (ASF) under one
// or more contributor license agreements. See the NOTICE file
// distributed with this work for additional information
// regarding copyright ownership. The ASF licenses this file
// to you under the Apache License, Version 2.0 (the
// "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
#include "parquet/encryption/internal_file_decryptor.h"
#include "arrow/util/logging.h"
#include "arrow/util/secure_string.h"
#include "parquet/encryption/encryption.h"
#include "parquet/encryption/encryption_internal.h"
#include "parquet/metadata.h"
using arrow::util::SecureString;
namespace parquet {
// Decryptor
Decryptor::Decryptor(std::unique_ptr<encryption::AesDecryptor> aes_decryptor,
SecureString key, std::string file_aad, std::string aad,
::arrow::MemoryPool* pool)
: aes_decryptor_(std::move(aes_decryptor)),
key_(std::move(key)),
file_aad_(std::move(file_aad)),
aad_(std::move(aad)),
pool_(pool) {}
Decryptor::~Decryptor() = default;
int32_t Decryptor::PlaintextLength(int32_t ciphertext_len) const {
return aes_decryptor_->PlaintextLength(ciphertext_len);
}
int32_t Decryptor::CiphertextLength(int32_t plaintext_len) const {
return aes_decryptor_->CiphertextLength(plaintext_len);
}
int32_t Decryptor::Decrypt(::arrow::util::span<const uint8_t> ciphertext,
::arrow::util::span<uint8_t> plaintext) {
return aes_decryptor_->Decrypt(ciphertext, key_.as_span(), str2span(aad_), plaintext);
}
// InternalFileDecryptor
InternalFileDecryptor::InternalFileDecryptor(
std::shared_ptr<FileDecryptionProperties> properties, const std::string& file_aad,
ParquetCipher::type algorithm, const std::string& footer_key_metadata,
::arrow::MemoryPool* pool)
: properties_(std::move(properties)),
file_aad_(file_aad),
algorithm_(algorithm),
footer_key_metadata_(footer_key_metadata),
pool_(pool) {}
const SecureString& InternalFileDecryptor::GetFooterKey() {
std::unique_lock lock(mutex_);
if (!footer_key_.empty()) {
return footer_key_;
}
// cache footer key to avoid repeated retrieval of key from the key_retriever
footer_key_ = properties_->footer_key();
// ignore footer key metadata if footer key is explicitly set via API
if (footer_key_.empty()) {
if (footer_key_metadata_.empty())
throw ParquetException("No footer key or key metadata");
if (properties_->key_retriever() == nullptr)
throw ParquetException("No footer key or key retriever");
try {
footer_key_ = properties_->key_retriever()->GetKey(footer_key_metadata_);
} catch (KeyAccessDeniedException& e) {
std::stringstream ss;
ss << "Footer key: access denied " << e.what() << "\n";
throw ParquetException(ss.str());
}
}
if (footer_key_.empty()) {
throw ParquetException(
"Footer key unavailable. Could not verify "
"plaintext footer metadata");
}
return footer_key_;
}
std::unique_ptr<Decryptor> InternalFileDecryptor::GetFooterDecryptor() {
std::string aad = encryption::CreateFooterAad(file_aad_);
return GetFooterDecryptor(aad, true);
}
std::unique_ptr<Decryptor> InternalFileDecryptor::GetFooterDecryptor(
const std::string& aad, bool metadata) {
const SecureString& footer_key = GetFooterKey();
auto key_len = static_cast<int32_t>(footer_key.size());
auto aes_decryptor = encryption::AesDecryptor::Make(algorithm_, key_len, metadata);
return std::make_unique<Decryptor>(std::move(aes_decryptor), footer_key, file_aad_, aad,
pool_);
}
SecureString InternalFileDecryptor::GetColumnKey(const std::string& column_path,
const std::string& column_key_metadata) {
SecureString column_key = properties_->column_key(column_path);
// No explicit column key given via API. Retrieve via key metadata.
if (column_key.empty() && !column_key_metadata.empty() &&
properties_->key_retriever() != nullptr) {
try {
column_key = properties_->key_retriever()->GetKey(column_key_metadata);
} catch (KeyAccessDeniedException& e) {
std::stringstream ss;
ss << "HiddenColumnException, path=" + column_path + " " << e.what() << "\n";
throw HiddenColumnException(ss.str());
}
if (column_key.empty()) {
throw HiddenColumnException("HiddenColumnException, path=" + column_path);
}
}
return column_key;
}
std::unique_ptr<Decryptor> InternalFileDecryptor::GetColumnDecryptor(
const std::string& column_path, const std::string& column_key_metadata,
const std::string& aad, bool metadata) {
const SecureString& column_key = GetColumnKey(column_path, column_key_metadata);
auto key_len = static_cast<int32_t>(column_key.size());
auto aes_decryptor = encryption::AesDecryptor::Make(algorithm_, key_len, metadata);
return std::make_unique<Decryptor>(std::move(aes_decryptor), column_key, file_aad_, aad,
pool_);
}
std::function<std::unique_ptr<Decryptor>()>
InternalFileDecryptor::GetColumnDecryptorFactory(
const ColumnCryptoMetaData* crypto_metadata, const std::string& aad, bool metadata) {
if (crypto_metadata->encrypted_with_footer_key()) {
return [this, aad, metadata]() { return GetFooterDecryptor(aad, metadata); };
}
// The column is encrypted with its own key
const std::string& column_key_metadata = crypto_metadata->key_metadata();
const std::string column_path = crypto_metadata->path_in_schema()->ToDotString();
const SecureString& column_key = GetColumnKey(column_path, column_key_metadata);
return [this, aad, metadata, column_key = column_key]() {
auto key_len = static_cast<int32_t>(column_key.size());
auto aes_decryptor = encryption::AesDecryptor::Make(algorithm_, key_len, metadata);
return std::make_unique<Decryptor>(std::move(aes_decryptor), column_key, file_aad_,
aad, pool_);
};
}
std::function<std::unique_ptr<Decryptor>()>
InternalFileDecryptor::GetColumnMetaDecryptorFactory(
InternalFileDecryptor* file_descryptor, const ColumnCryptoMetaData* crypto_metadata,
const std::string& aad) {
if (crypto_metadata == nullptr) {
// Column is not encrypted
return [] { return nullptr; };
}
if (file_descryptor == nullptr) {
throw ParquetException("Column is noted as encrypted but no file decryptor");
}
return file_descryptor->GetColumnDecryptorFactory(crypto_metadata, aad,
/*metadata=*/true);
}
std::function<std::unique_ptr<Decryptor>()>
InternalFileDecryptor::GetColumnDataDecryptorFactory(
InternalFileDecryptor* file_descryptor, const ColumnCryptoMetaData* crypto_metadata,
const std::string& aad) {
if (crypto_metadata == nullptr) {
// Column is not encrypted
return [] { return nullptr; };
}
if (file_descryptor == nullptr) {
throw ParquetException("Column is noted as encrypted but no file decryptor");
}
return file_descryptor->GetColumnDecryptorFactory(crypto_metadata, aad,
/*metadata=*/false);
}
void UpdateDecryptor(Decryptor* decryptor, int16_t row_group_ordinal,
int16_t column_ordinal, int8_t module_type) {
ARROW_DCHECK(!decryptor->file_aad().empty());
const std::string aad =
encryption::CreateModuleAad(decryptor->file_aad(), module_type, row_group_ordinal,
column_ordinal, kNonPageOrdinal);
decryptor->UpdateAad(aad);
}
} // namespace parquet