Merge pull request #21543 from overleaf/jpa-s3-seec-kek-rotation

[object-persistor] s3SSEC: add support for (automatic) KEK rotation

GitOrigin-RevId: 315082e894c74e276a8efbc46b41ec7e102f9010
This commit is contained in:
Jakob Ackermann
2024-11-08 09:31:44 +01:00
committed by Copybot
parent 859901ac0c
commit bec73ddfae
6 changed files with 268 additions and 33 deletions

View File

@@ -6,6 +6,7 @@ class ReadError extends OError {}
class SettingsError extends OError {}
class NotImplementedError extends OError {}
class AlreadyWrittenError extends OError {}
class NoKEKMatchedError extends OError {}
module.exports = {
NotFoundError,
@@ -14,4 +15,5 @@ module.exports = {
SettingsError,
NotImplementedError,
AlreadyWrittenError,
NoKEKMatchedError,
}

View File

@@ -1,31 +1,62 @@
// @ts-check
const Stream = require('stream')
const { promisify } = require('util')
const Crypto = require('crypto')
const Stream = require('stream')
const fs = require('fs')
const { promisify } = require('util')
const { WritableBuffer } = require('@overleaf/stream-utils')
const { S3Persistor, SSECOptions } = require('./S3Persistor.js')
const {
AlreadyWrittenError,
NoKEKMatchedError,
NotFoundError,
NotImplementedError,
ReadError,
} = require('./Errors')
const logger = require('@overleaf/logger')
const generateKey = promisify(Crypto.generateKey)
/**
* @typedef {Object} Settings
* @property {(bucketName: string, path: string) => {bucketName: string, path: string}} pathToDataEncryptionKeyPath
* @property {(bucketName: string, path: string) => boolean} pathIsProjectFolder
* @property {() => Promise<Buffer>} getKeyEncryptionKey
* @typedef {import('aws-sdk').AWSError} AWSError
*/
const {
NotFoundError,
NotImplementedError,
AlreadyWrittenError,
} = require('./Errors')
const fs = require('fs')
/**
* @typedef {Object} Settings
* @property {boolean} automaticallyRotateDEKEncryption
* @property {boolean} ignoreErrorsFromDEKReEncryption
* @property {(bucketName: string, path: string) => {bucketName: string, path: string}} pathToDataEncryptionKeyPath
* @property {(bucketName: string, path: string) => boolean} pathIsProjectFolder
* @property {() => Promise<Array<Buffer>>} getKeyEncryptionKeys
*/
/**
* Helper function to make TS happy when accessing error properties
* AWSError is not an actual class, so we cannot use instanceof.
* @param {any} err
* @return {err is AWSError}
*/
function isAWSError(err) {
return !!err
}
/**
* @param {any} err
* @return {boolean}
*/
function isForbiddenError(err) {
if (!err || !(err instanceof ReadError || err instanceof NotFoundError)) {
return false
}
const cause = err.cause
if (!isAWSError(cause)) return false
return cause.statusCode === 403
}
class PerProjectEncryptedS3Persistor extends S3Persistor {
/** @type Settings */
/** @type {Settings} */
#settings
/** @type Promise<SSECOptions> */
#keyEncryptionKeyOptions
/** @type {Promise<Array<SSECOptions>>} */
#availableKeyEncryptionKeysPromise
/**
* @param {Settings} settings
@@ -33,13 +64,21 @@ class PerProjectEncryptedS3Persistor extends S3Persistor {
constructor(settings) {
super(settings)
this.#settings = settings
this.#keyEncryptionKeyOptions = this.#settings
.getKeyEncryptionKey()
.then(keyAsBuffer => new SSECOptions(keyAsBuffer))
this.#availableKeyEncryptionKeysPromise = this.#settings
.getKeyEncryptionKeys()
.then(keysAsBuffer => {
if (keysAsBuffer.length === 0) throw new Error('no kek provided')
return keysAsBuffer.map(buffer => new SSECOptions(buffer))
})
}
async ensureKeyEncryptionKeyLoaded() {
await this.#keyEncryptionKeyOptions
async ensureKeyEncryptionKeysLoaded() {
await this.#availableKeyEncryptionKeysPromise
}
async #getCurrentKeyEncryptionKey() {
const available = await this.#availableKeyEncryptionKeysPromise
return available[0]
}
/**
@@ -48,9 +87,17 @@ class PerProjectEncryptedS3Persistor extends S3Persistor {
*/
async getDataEncryptionKeySize(bucketName, path) {
const dekPath = this.#settings.pathToDataEncryptionKeyPath(bucketName, path)
return await super.getObjectSize(dekPath.bucketName, dekPath.path, {
ssecOptions: await this.#keyEncryptionKeyOptions,
})
for (const ssecOptions of await this.#availableKeyEncryptionKeysPromise) {
try {
return await super.getObjectSize(dekPath.bucketName, dekPath.path, {
ssecOptions,
})
} catch (err) {
if (isForbiddenError(err)) continue
throw err
}
}
throw new NoKEKMatchedError('no kek matched')
}
/**
@@ -91,7 +138,7 @@ class PerProjectEncryptedS3Persistor extends S3Persistor {
{
// Do not overwrite any objects if already created
ifNoneMatch: '*',
ssecOptions: await this.#keyEncryptionKeyOptions,
ssecOptions: await this.#getCurrentKeyEncryptionKey(),
}
)
return new SSECOptions(dataEncryptionKey)
@@ -104,11 +151,42 @@ class PerProjectEncryptedS3Persistor extends S3Persistor {
*/
async #getExistingDataEncryptionKeyOptions(bucketName, path) {
const dekPath = this.#settings.pathToDataEncryptionKeyPath(bucketName, path)
const res = await super.getObjectStream(dekPath.bucketName, dekPath.path, {
ssecOptions: await this.#keyEncryptionKeyOptions,
})
let res
let kekIndex = 0
for (const ssecOptions of await this.#availableKeyEncryptionKeysPromise) {
try {
res = await super.getObjectStream(dekPath.bucketName, dekPath.path, {
ssecOptions,
})
} catch (err) {
if (isForbiddenError(err)) {
kekIndex++
continue
}
throw err
}
}
if (!res) throw new NoKEKMatchedError('no kek matched')
const buf = new WritableBuffer()
await Stream.promises.pipeline(res, buf)
if (kekIndex !== 0 && this.#settings.automaticallyRotateDEKEncryption) {
try {
await super.sendStream(
dekPath.bucketName,
dekPath.path,
Stream.Readable.from([buf.getContents()]),
{ ssecOptions: await this.#getCurrentKeyEncryptionKey() }
)
} catch (err) {
if (this.#settings.ignoreErrorsFromDEKReEncryption) {
logger.warn({ err, ...dekPath }, 'failed to persist re-encrypted DEK')
} else {
throw err
}
}
}
return new SSECOptions(buf.getContents())
}

View File

@@ -179,7 +179,8 @@ class S3Persistor extends AbstractPersistor {
case 200: // full response
case 206: // partial response
return resolve(undefined)
case 403: // AccessDenied is handled the same as NoSuchKey
case 403: // AccessDenied
return // handled by stream.on('error') handler below
case 404: // NoSuchKey
return reject(new NotFoundError('not found'))
default:

View File

@@ -93,6 +93,12 @@ describe('S3PersistorTests', function () {
setTimeout(() => {
if (this.err) return ReadStream.emit('error', this.err)
this.emit('httpHeaders', this.statusCode)
if (this.statusCode === 403) {
ReadStream.emit('error', S3AccessDeniedError)
}
if (this.statusCode === 404) {
ReadStream.emit('error', S3NotFoundError)
}
})
return ReadStream
}
@@ -359,7 +365,7 @@ describe('S3PersistorTests', function () {
})
it('wraps the error', function () {
expect(error.cause).to.exist
expect(error.cause).to.equal(S3AccessDeniedError)
})
it('stores the bucket and key in the error', function () {