use crate::encryption::ciphers::{BlockDecryptor, RingGcmBlockDecryptor, TAG_LEN};
use crate::encryption::modules::{ModuleType, create_footer_aad, create_module_aad};
use crate::errors::{ParquetError, Result};
use crate::file::column_crypto_metadata::ColumnCryptoMetaData;
use crate::file::metadata::HeapSize;
use std::borrow::Cow;
use std::collections::HashMap;
use std::fmt::Formatter;
use std::io::Read;
use std::sync::Arc;
pub trait KeyRetriever: Send + Sync {
fn retrieve_key(&self, key_metadata: &[u8]) -> Result<Vec<u8>>;
}
pub(crate) fn read_and_decrypt<T: Read>(
decryptor: &Arc<dyn BlockDecryptor>,
input: &mut T,
aad: &[u8],
) -> Result<Vec<u8>> {
let mut len_bytes = [0; 4];
input.read_exact(&mut len_bytes)?;
let ciphertext_len = u32::from_le_bytes(len_bytes) as usize;
let mut ciphertext = vec![0; 4 + ciphertext_len];
input.read_exact(&mut ciphertext[4..])?;
decryptor.decrypt(&ciphertext, aad.as_ref())
}
#[derive(Debug, Clone)]
pub(crate) struct CryptoContext {
pub(crate) row_group_idx: usize,
pub(crate) column_ordinal: usize,
pub(crate) page_ordinal: Option<usize>,
pub(crate) dictionary_page: bool,
data_decryptor: Arc<dyn BlockDecryptor>,
metadata_decryptor: Arc<dyn BlockDecryptor>,
file_aad: Vec<u8>,
}
impl CryptoContext {
pub(crate) fn for_column(
file_decryptor: &FileDecryptor,
column_crypto_metadata: &ColumnCryptoMetaData,
row_group_idx: usize,
column_ordinal: usize,
) -> Result<Self> {
let (data_decryptor, metadata_decryptor) = match column_crypto_metadata {
ColumnCryptoMetaData::ENCRYPTION_WITH_FOOTER_KEY => {
let data_decryptor = file_decryptor.get_footer_decryptor()?;
let metadata_decryptor = file_decryptor.get_footer_decryptor()?;
(data_decryptor, metadata_decryptor)
}
ColumnCryptoMetaData::ENCRYPTION_WITH_COLUMN_KEY(column_key_encryption) => {
let key_metadata = &column_key_encryption.key_metadata;
let full_column_name;
let column_name = if column_key_encryption.path_in_schema.len() == 1 {
&column_key_encryption.path_in_schema[0]
} else {
full_column_name = column_key_encryption.path_in_schema.join(".");
&full_column_name
};
let data_decryptor = file_decryptor
.get_column_data_decryptor(column_name, key_metadata.as_deref())?;
let metadata_decryptor = file_decryptor
.get_column_metadata_decryptor(column_name, key_metadata.as_deref())?;
(data_decryptor, metadata_decryptor)
}
};
Ok(CryptoContext {
row_group_idx,
column_ordinal,
page_ordinal: None,
dictionary_page: false,
data_decryptor,
metadata_decryptor,
file_aad: file_decryptor.file_aad().clone(),
})
}
pub(crate) fn with_page_ordinal(&self, page_ordinal: usize) -> Self {
Self {
row_group_idx: self.row_group_idx,
column_ordinal: self.column_ordinal,
page_ordinal: Some(page_ordinal),
dictionary_page: false,
data_decryptor: self.data_decryptor.clone(),
metadata_decryptor: self.metadata_decryptor.clone(),
file_aad: self.file_aad.clone(),
}
}
pub(crate) fn create_page_header_aad(&self) -> Result<Vec<u8>> {
let module_type = if self.dictionary_page {
ModuleType::DictionaryPageHeader
} else {
ModuleType::DataPageHeader
};
create_module_aad(
self.file_aad(),
module_type,
self.row_group_idx,
self.column_ordinal,
self.page_ordinal,
)
}
pub(crate) fn create_page_aad(&self) -> Result<Vec<u8>> {
let module_type = if self.dictionary_page {
ModuleType::DictionaryPage
} else {
ModuleType::DataPage
};
create_module_aad(
self.file_aad(),
module_type,
self.row_group_idx,
self.column_ordinal,
self.page_ordinal,
)
}
pub(crate) fn create_column_index_aad(&self) -> Result<Vec<u8>> {
create_module_aad(
self.file_aad(),
ModuleType::ColumnIndex,
self.row_group_idx,
self.column_ordinal,
self.page_ordinal,
)
}
pub(crate) fn create_offset_index_aad(&self) -> Result<Vec<u8>> {
create_module_aad(
self.file_aad(),
ModuleType::OffsetIndex,
self.row_group_idx,
self.column_ordinal,
self.page_ordinal,
)
}
pub(crate) fn for_dictionary_page(&self) -> Self {
Self {
row_group_idx: self.row_group_idx,
column_ordinal: self.column_ordinal,
page_ordinal: self.page_ordinal,
dictionary_page: true,
data_decryptor: self.data_decryptor.clone(),
metadata_decryptor: self.metadata_decryptor.clone(),
file_aad: self.file_aad.clone(),
}
}
pub(crate) fn data_decryptor(&self) -> &Arc<dyn BlockDecryptor> {
&self.data_decryptor
}
pub(crate) fn metadata_decryptor(&self) -> &Arc<dyn BlockDecryptor> {
&self.metadata_decryptor
}
pub(crate) fn file_aad(&self) -> &Vec<u8> {
&self.file_aad
}
}
#[derive(Clone, PartialEq)]
struct ExplicitDecryptionKeys {
footer_key: Vec<u8>,
column_keys: HashMap<String, Vec<u8>>,
}
impl HeapSize for ExplicitDecryptionKeys {
fn heap_size(&self) -> usize {
self.footer_key.heap_size() + self.column_keys.heap_size()
}
}
#[derive(Clone)]
enum DecryptionKeys {
Explicit(ExplicitDecryptionKeys),
ViaRetriever(Arc<dyn KeyRetriever>),
}
impl PartialEq for DecryptionKeys {
fn eq(&self, other: &Self) -> bool {
match (self, other) {
(DecryptionKeys::Explicit(keys), DecryptionKeys::Explicit(other_keys)) => {
keys.footer_key == other_keys.footer_key
&& keys.column_keys == other_keys.column_keys
}
(DecryptionKeys::ViaRetriever(_), DecryptionKeys::ViaRetriever(_)) => true,
_ => false,
}
}
}
impl HeapSize for DecryptionKeys {
fn heap_size(&self) -> usize {
match self {
Self::Explicit(keys) => keys.heap_size(),
Self::ViaRetriever(_) => {
0
}
}
}
}
#[derive(Clone, PartialEq)]
pub struct FileDecryptionProperties {
keys: DecryptionKeys,
aad_prefix: Option<Vec<u8>>,
footer_signature_verification: bool,
}
impl HeapSize for FileDecryptionProperties {
fn heap_size(&self) -> usize {
self.keys.heap_size() + self.aad_prefix.heap_size()
}
}
impl FileDecryptionProperties {
pub fn builder(footer_key: Vec<u8>) -> DecryptionPropertiesBuilder {
DecryptionPropertiesBuilder::new(footer_key)
}
pub fn with_key_retriever(
key_retriever: Arc<dyn KeyRetriever>,
) -> DecryptionPropertiesBuilderWithRetriever {
DecryptionPropertiesBuilderWithRetriever::new(key_retriever)
}
pub fn aad_prefix(&self) -> Option<&Vec<u8>> {
self.aad_prefix.as_ref()
}
pub fn check_plaintext_footer_integrity(&self) -> bool {
self.footer_signature_verification
}
pub fn footer_key(&self, key_metadata: Option<&[u8]>) -> Result<Cow<'_, Vec<u8>>> {
match &self.keys {
DecryptionKeys::Explicit(keys) => Ok(Cow::Borrowed(&keys.footer_key)),
DecryptionKeys::ViaRetriever(retriever) => {
let key = retriever.retrieve_key(key_metadata.unwrap_or_default())?;
Ok(Cow::Owned(key))
}
}
}
pub fn column_key(
&self,
column_name: &str,
key_metadata: Option<&[u8]>,
) -> Result<Cow<'_, Vec<u8>>> {
match &self.keys {
DecryptionKeys::Explicit(keys) => match keys.column_keys.get(column_name) {
None => Err(general_err!(
"No column decryption key set for encrypted column '{}'",
column_name
)),
Some(key) => Ok(Cow::Borrowed(key)),
},
DecryptionKeys::ViaRetriever(retriever) => {
let key = retriever.retrieve_key(key_metadata.unwrap_or_default())?;
Ok(Cow::Owned(key))
}
}
}
pub fn column_keys(&self) -> (Vec<String>, Vec<Vec<u8>>) {
let mut column_names: Vec<String> = Vec::new();
let mut column_keys: Vec<Vec<u8>> = Vec::new();
if let DecryptionKeys::Explicit(keys) = &self.keys {
for (key, value) in keys.column_keys.iter() {
column_names.push(key.clone());
column_keys.push(value.clone());
}
}
(column_names, column_keys)
}
}
impl std::fmt::Debug for FileDecryptionProperties {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
write!(f, "FileDecryptionProperties {{ }}")
}
}
pub struct DecryptionPropertiesBuilder {
footer_key: Vec<u8>,
column_keys: HashMap<String, Vec<u8>>,
aad_prefix: Option<Vec<u8>>,
footer_signature_verification: bool,
}
impl DecryptionPropertiesBuilder {
pub fn new(footer_key: Vec<u8>) -> DecryptionPropertiesBuilder {
Self {
footer_key,
column_keys: HashMap::default(),
aad_prefix: None,
footer_signature_verification: true,
}
}
pub fn build(self) -> Result<Arc<FileDecryptionProperties>> {
let keys = DecryptionKeys::Explicit(ExplicitDecryptionKeys {
footer_key: self.footer_key,
column_keys: self.column_keys,
});
Ok(Arc::new(FileDecryptionProperties {
keys,
aad_prefix: self.aad_prefix,
footer_signature_verification: self.footer_signature_verification,
}))
}
pub fn with_aad_prefix(mut self, value: Vec<u8>) -> Self {
self.aad_prefix = Some(value);
self
}
pub fn with_column_key(mut self, column_name: &str, decryption_key: Vec<u8>) -> Self {
self.column_keys
.insert(column_name.to_string(), decryption_key);
self
}
pub fn with_column_keys(mut self, column_names: Vec<&str>, keys: Vec<Vec<u8>>) -> Result<Self> {
if column_names.len() != keys.len() {
return Err(general_err!(
"The number of column names ({}) does not match the number of keys ({})",
column_names.len(),
keys.len()
));
}
for (column_name, key) in column_names.into_iter().zip(keys.into_iter()) {
self.column_keys.insert(column_name.to_string(), key);
}
Ok(self)
}
pub fn disable_footer_signature_verification(mut self) -> Self {
self.footer_signature_verification = false;
self
}
}
pub struct DecryptionPropertiesBuilderWithRetriever {
key_retriever: Arc<dyn KeyRetriever>,
aad_prefix: Option<Vec<u8>>,
footer_signature_verification: bool,
}
impl DecryptionPropertiesBuilderWithRetriever {
pub fn new(key_retriever: Arc<dyn KeyRetriever>) -> DecryptionPropertiesBuilderWithRetriever {
Self {
key_retriever,
aad_prefix: None,
footer_signature_verification: true,
}
}
pub fn build(self) -> Result<Arc<FileDecryptionProperties>> {
let keys = DecryptionKeys::ViaRetriever(self.key_retriever);
Ok(Arc::new(FileDecryptionProperties {
keys,
aad_prefix: self.aad_prefix,
footer_signature_verification: self.footer_signature_verification,
}))
}
pub fn with_aad_prefix(mut self, value: Vec<u8>) -> Self {
self.aad_prefix = Some(value);
self
}
pub fn disable_footer_signature_verification(mut self) -> Self {
self.footer_signature_verification = false;
self
}
}
#[derive(Clone, Debug)]
pub(crate) struct FileDecryptor {
decryption_properties: Arc<FileDecryptionProperties>,
footer_decryptor: Arc<dyn BlockDecryptor>,
file_aad: Vec<u8>,
}
impl PartialEq for FileDecryptor {
fn eq(&self, other: &Self) -> bool {
self.decryption_properties == other.decryption_properties && self.file_aad == other.file_aad
}
}
impl HeapSize for FileDecryptor {
fn heap_size(&self) -> usize {
self.decryption_properties.heap_size()
+ (Arc::clone(&self.footer_decryptor) as Arc<dyn HeapSize>).heap_size()
+ self.file_aad.heap_size()
}
}
impl FileDecryptor {
pub(crate) fn new(
decryption_properties: &Arc<FileDecryptionProperties>,
footer_key_metadata: Option<&[u8]>,
aad_file_unique: Vec<u8>,
aad_prefix: Vec<u8>,
) -> Result<Self> {
let file_aad = [aad_prefix.as_slice(), aad_file_unique.as_slice()].concat();
let footer_key = decryption_properties.footer_key(footer_key_metadata)?;
let footer_decryptor = RingGcmBlockDecryptor::new(&footer_key).map_err(|e| {
general_err!(
"Invalid footer key. {}",
e.to_string().replace("Parquet error: ", "")
)
})?;
Ok(Self {
footer_decryptor: Arc::new(footer_decryptor),
decryption_properties: Arc::clone(decryption_properties),
file_aad,
})
}
pub(crate) fn get_footer_decryptor(&self) -> Result<Arc<dyn BlockDecryptor>> {
Ok(self.footer_decryptor.clone())
}
pub(crate) fn verify_plaintext_footer_signature(&self, plaintext_footer: &[u8]) -> Result<()> {
let tag = &plaintext_footer[plaintext_footer.len() - TAG_LEN..];
let aad = create_footer_aad(self.file_aad())?;
let footer_decryptor = self.get_footer_decryptor()?;
let computed_tag = footer_decryptor.compute_plaintext_tag(&aad, plaintext_footer)?;
if computed_tag != tag {
return Err(general_err!(
"Footer signature verification failed. Computed: {:?}, Expected: {:?}",
computed_tag,
tag
));
}
Ok(())
}
pub(crate) fn get_column_data_decryptor(
&self,
column_name: &str,
key_metadata: Option<&[u8]>,
) -> Result<Arc<dyn BlockDecryptor>> {
let column_key = self
.decryption_properties
.column_key(column_name, key_metadata)?;
Ok(Arc::new(RingGcmBlockDecryptor::new(&column_key)?))
}
pub(crate) fn get_column_metadata_decryptor(
&self,
column_name: &str,
key_metadata: Option<&[u8]>,
) -> Result<Arc<dyn BlockDecryptor>> {
self.get_column_data_decryptor(column_name, key_metadata)
}
pub(crate) fn file_aad(&self) -> &Vec<u8> {
&self.file_aad
}
}