2015-04-16 00:08:12 +00:00
|
|
|
package transit
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/base64"
|
2015-06-18 01:51:05 +00:00
|
|
|
"fmt"
|
2016-05-03 03:46:39 +00:00
|
|
|
"sync"
|
2015-04-16 00:08:12 +00:00
|
|
|
|
2016-07-28 19:19:27 +00:00
|
|
|
"github.com/hashicorp/vault/helper/errutil"
|
2015-04-16 00:08:12 +00:00
|
|
|
"github.com/hashicorp/vault/logical"
|
|
|
|
"github.com/hashicorp/vault/logical/framework"
|
|
|
|
)
|
|
|
|
|
2016-01-27 21:24:11 +00:00
|
|
|
func (b *backend) pathEncrypt() *framework.Path {
|
2015-04-16 00:08:12 +00:00
|
|
|
return &framework.Path{
|
2015-08-21 07:56:13 +00:00
|
|
|
Pattern: "encrypt/" + framework.GenericNameRegex("name"),
|
2015-04-16 00:08:12 +00:00
|
|
|
Fields: map[string]*framework.FieldSchema{
|
|
|
|
"name": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Name of the policy",
|
|
|
|
},
|
|
|
|
|
|
|
|
"plaintext": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Plaintext value to encrypt",
|
|
|
|
},
|
2015-07-05 21:12:07 +00:00
|
|
|
|
|
|
|
"context": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Description: "Context for key derivation. Required for derived keys.",
|
|
|
|
},
|
2016-08-05 21:52:44 +00:00
|
|
|
|
|
|
|
"nonce": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
2016-08-07 19:53:40 +00:00
|
|
|
Description: "Nonce for when convergent encryption is used",
|
2016-08-05 21:52:44 +00:00
|
|
|
},
|
2016-09-21 14:29:42 +00:00
|
|
|
|
|
|
|
"type": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeString,
|
|
|
|
Default: "aes256-gcm96",
|
|
|
|
Description: `When performing an upsert operation, the type of key
|
|
|
|
to create. Currently, "aes256-gcm96" (symmetric) is the
|
|
|
|
only type supported. Defaults to "aes256-gcm96".`,
|
|
|
|
},
|
|
|
|
|
|
|
|
"convergent_encryption": &framework.FieldSchema{
|
|
|
|
Type: framework.TypeBool,
|
|
|
|
Description: `Whether to support convergent encryption.
|
|
|
|
This is only supported when using a key with
|
|
|
|
key derivation enabled and will require all
|
|
|
|
requests to carry both a context and 96-bit
|
|
|
|
(12-byte) nonce. The given nonce will be used
|
|
|
|
in place of a randomly generated nonce. As a
|
|
|
|
result, when the same context and nonce are
|
|
|
|
supplied, the same ciphertext is generated. It
|
|
|
|
is *very important* when using this mode that
|
|
|
|
you ensure that all nonces are unique for a
|
|
|
|
given context. Failing to do so will severely
|
|
|
|
impact the ciphertext's security.`,
|
|
|
|
},
|
2015-04-16 00:08:12 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
Callbacks: map[logical.Operation]framework.OperationFunc{
|
2016-02-02 14:58:12 +00:00
|
|
|
logical.CreateOperation: b.pathEncryptWrite,
|
2016-01-27 21:24:11 +00:00
|
|
|
logical.UpdateOperation: b.pathEncryptWrite,
|
2015-04-16 00:08:12 +00:00
|
|
|
},
|
2015-04-27 19:47:09 +00:00
|
|
|
|
2016-02-02 14:58:12 +00:00
|
|
|
ExistenceCheck: b.pathEncryptExistenceCheck,
|
|
|
|
|
2015-04-27 19:47:09 +00:00
|
|
|
HelpSynopsis: pathEncryptHelpSyn,
|
|
|
|
HelpDescription: pathEncryptHelpDesc,
|
2015-04-16 00:08:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-02 14:58:12 +00:00
|
|
|
func (b *backend) pathEncryptExistenceCheck(
|
|
|
|
req *logical.Request, d *framework.FieldData) (bool, error) {
|
|
|
|
name := d.Get("name").(string)
|
2016-05-03 03:46:39 +00:00
|
|
|
p, lock, err := b.lm.GetPolicyShared(req.Storage, name)
|
|
|
|
if lock != nil {
|
|
|
|
defer lock.RUnlock()
|
|
|
|
}
|
2016-02-02 14:58:12 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
2016-04-26 15:39:19 +00:00
|
|
|
return p != nil, nil
|
2016-02-02 14:58:12 +00:00
|
|
|
}
|
|
|
|
|
2016-01-27 21:24:11 +00:00
|
|
|
func (b *backend) pathEncryptWrite(
|
2015-04-16 00:08:12 +00:00
|
|
|
req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
|
|
|
name := d.Get("name").(string)
|
2016-09-13 16:00:04 +00:00
|
|
|
|
|
|
|
valueRaw, ok := d.GetOk("plaintext")
|
|
|
|
if !ok {
|
2015-04-16 00:08:12 +00:00
|
|
|
return logical.ErrorResponse("missing plaintext to encrypt"), logical.ErrInvalidRequest
|
|
|
|
}
|
2016-09-13 16:00:04 +00:00
|
|
|
value := valueRaw.(string)
|
2016-08-05 21:52:44 +00:00
|
|
|
|
2015-07-05 21:37:51 +00:00
|
|
|
// Decode the context if any
|
|
|
|
contextRaw := d.Get("context").(string)
|
|
|
|
var context []byte
|
2016-09-13 16:00:04 +00:00
|
|
|
var err error
|
2015-07-05 21:37:51 +00:00
|
|
|
if len(contextRaw) != 0 {
|
|
|
|
context, err = base64.StdEncoding.DecodeString(contextRaw)
|
|
|
|
if err != nil {
|
2016-08-08 20:30:48 +00:00
|
|
|
return logical.ErrorResponse("failed to base64-decode context"), logical.ErrInvalidRequest
|
2015-07-05 21:37:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-05 21:52:44 +00:00
|
|
|
// Decode the nonce if any
|
|
|
|
nonceRaw := d.Get("nonce").(string)
|
|
|
|
var nonce []byte
|
|
|
|
if len(nonceRaw) != 0 {
|
|
|
|
nonce, err = base64.StdEncoding.DecodeString(nonceRaw)
|
|
|
|
if err != nil {
|
2016-08-08 20:30:48 +00:00
|
|
|
return logical.ErrorResponse("failed to base64-decode nonce"), logical.ErrInvalidRequest
|
2016-08-05 21:52:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-27 21:24:11 +00:00
|
|
|
// Get the policy
|
2016-09-01 15:57:28 +00:00
|
|
|
var p *policy
|
2016-05-03 03:46:39 +00:00
|
|
|
var lock *sync.RWMutex
|
2016-04-26 15:39:19 +00:00
|
|
|
var upserted bool
|
|
|
|
if req.Operation == logical.CreateOperation {
|
2016-09-21 14:29:42 +00:00
|
|
|
convergent := d.Get("convergent_encryption").(bool)
|
|
|
|
if convergent && len(context) == 0 {
|
|
|
|
return logical.ErrorResponse("convergent encryption requires derivation to be enabled, so context is required"), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
polReq := policyRequest{
|
|
|
|
storage: req.Storage,
|
|
|
|
name: name,
|
|
|
|
derived: len(context) != 0,
|
|
|
|
convergent: convergent,
|
|
|
|
}
|
|
|
|
|
|
|
|
keyType := d.Get("type").(string)
|
|
|
|
switch keyType {
|
|
|
|
case "aes256-gcm96":
|
|
|
|
polReq.keyType = keyType_AES256_GCM96
|
|
|
|
case "ecdsa-p256":
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("key type %v not supported for this operation", keyType)), logical.ErrInvalidRequest
|
|
|
|
default:
|
|
|
|
return logical.ErrorResponse(fmt.Sprintf("unknown key type %v", keyType)), logical.ErrInvalidRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
p, lock, upserted, err = b.lm.GetPolicyUpsert(polReq)
|
|
|
|
|
2016-04-26 15:39:19 +00:00
|
|
|
} else {
|
2016-05-03 03:46:39 +00:00
|
|
|
p, lock, err = b.lm.GetPolicyShared(req.Storage, name)
|
|
|
|
}
|
|
|
|
if lock != nil {
|
|
|
|
defer lock.RUnlock()
|
2016-04-26 15:39:19 +00:00
|
|
|
}
|
2016-01-27 21:24:11 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-04-26 15:39:19 +00:00
|
|
|
if p == nil {
|
|
|
|
return logical.ErrorResponse("policy not found"), logical.ErrInvalidRequest
|
2015-04-16 00:08:12 +00:00
|
|
|
}
|
|
|
|
|
2016-08-05 21:52:44 +00:00
|
|
|
ciphertext, err := p.Encrypt(context, nonce, value)
|
2015-04-16 00:08:12 +00:00
|
|
|
if err != nil {
|
2015-09-14 20:28:46 +00:00
|
|
|
switch err.(type) {
|
2016-07-28 19:19:27 +00:00
|
|
|
case errutil.UserError:
|
2015-09-14 20:28:46 +00:00
|
|
|
return logical.ErrorResponse(err.Error()), logical.ErrInvalidRequest
|
2016-07-28 19:19:27 +00:00
|
|
|
case errutil.InternalError:
|
2015-09-14 20:28:46 +00:00
|
|
|
return nil, err
|
|
|
|
default:
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-04-16 00:08:12 +00:00
|
|
|
}
|
|
|
|
|
2015-09-14 20:28:46 +00:00
|
|
|
if ciphertext == "" {
|
|
|
|
return nil, fmt.Errorf("empty ciphertext returned")
|
2015-04-16 00:08:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Generate the response
|
|
|
|
resp := &logical.Response{
|
|
|
|
Data: map[string]interface{}{
|
2015-09-14 20:28:46 +00:00
|
|
|
"ciphertext": ciphertext,
|
2015-04-16 00:08:12 +00:00
|
|
|
},
|
|
|
|
}
|
2016-04-26 15:39:19 +00:00
|
|
|
|
|
|
|
if req.Operation == logical.CreateOperation && !upserted {
|
|
|
|
resp.AddWarning("Attempted creation of the key during the encrypt operation, but it was created beforehand")
|
|
|
|
}
|
|
|
|
|
2015-04-16 00:08:12 +00:00
|
|
|
return resp, nil
|
|
|
|
}
|
2015-04-27 19:47:09 +00:00
|
|
|
|
|
|
|
const pathEncryptHelpSyn = `Encrypt a plaintext value using a named key`
|
|
|
|
|
|
|
|
const pathEncryptHelpDesc = `
|
|
|
|
This path uses the named key from the request path to encrypt a user
|
|
|
|
provided plaintext. The plaintext must be base64 encoded.
|
|
|
|
`
|