| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270 |
- package s3api
- import (
- "encoding/base64"
- "io"
- "net/http"
- "strings"
- "github.com/seaweedfs/seaweedfs/weed/glog"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
- "github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
- )
- // PutToFilerEncryptionResult holds the result of encryption processing
- type PutToFilerEncryptionResult struct {
- DataReader io.Reader
- SSEType string
- CustomerKey *SSECustomerKey
- SSEIV []byte
- SSEKMSKey *SSEKMSKey
- SSES3Key *SSES3Key
- SSEKMSMetadata []byte
- SSES3Metadata []byte
- }
- // calculatePartOffset calculates unique offset for each part to prevent IV reuse in multipart uploads
- // AWS S3 part numbers must start from 1, never 0 or negative
- func calculatePartOffset(partNumber int) int64 {
- // AWS S3 part numbers must start from 1, never 0 or negative
- if partNumber < 1 {
- glog.Errorf("Invalid partNumber: %d. Must be >= 1.", partNumber)
- return 0
- }
- // Using a large multiplier to ensure block offsets for different parts do not overlap.
- // S3 part size limit is 5GB, so this provides a large safety margin.
- partOffset := int64(partNumber-1) * s3_constants.PartOffsetMultiplier
- return partOffset
- }
- // handleSSECEncryption processes SSE-C encryption for the data reader
- func (s3a *S3ApiServer) handleSSECEncryption(r *http.Request, dataReader io.Reader) (io.Reader, *SSECustomerKey, []byte, s3err.ErrorCode) {
- // Handle SSE-C encryption if requested
- customerKey, err := ParseSSECHeaders(r)
- if err != nil {
- glog.Errorf("SSE-C header validation failed: %v", err)
- // Use shared error mapping helper
- errCode := MapSSECErrorToS3Error(err)
- return nil, nil, nil, errCode
- }
- // Apply SSE-C encryption if customer key is provided
- var sseIV []byte
- if customerKey != nil {
- encryptedReader, iv, encErr := CreateSSECEncryptedReader(dataReader, customerKey)
- if encErr != nil {
- return nil, nil, nil, s3err.ErrInternalError
- }
- dataReader = encryptedReader
- sseIV = iv
- }
- return dataReader, customerKey, sseIV, s3err.ErrNone
- }
- // handleSSEKMSEncryption processes SSE-KMS encryption for the data reader
- func (s3a *S3ApiServer) handleSSEKMSEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSEKMSKey, []byte, s3err.ErrorCode) {
- // Handle SSE-KMS encryption if requested
- if !IsSSEKMSRequest(r) {
- return dataReader, nil, nil, s3err.ErrNone
- }
- glog.V(3).Infof("handleSSEKMSEncryption: SSE-KMS request detected, processing encryption")
- // Parse SSE-KMS headers
- keyID := r.Header.Get(s3_constants.AmzServerSideEncryptionAwsKmsKeyId)
- bucketKeyEnabled := strings.ToLower(r.Header.Get(s3_constants.AmzServerSideEncryptionBucketKeyEnabled)) == "true"
- // Build encryption context
- bucket, object := s3_constants.GetBucketAndObject(r)
- encryptionContext := BuildEncryptionContext(bucket, object, bucketKeyEnabled)
- // Add any user-provided encryption context
- if contextHeader := r.Header.Get(s3_constants.AmzServerSideEncryptionContext); contextHeader != "" {
- userContext, err := parseEncryptionContext(contextHeader)
- if err != nil {
- return nil, nil, nil, s3err.ErrInvalidRequest
- }
- // Merge user context with default context
- for k, v := range userContext {
- encryptionContext[k] = v
- }
- }
- // Check if a base IV is provided (for multipart uploads)
- var encryptedReader io.Reader
- var sseKey *SSEKMSKey
- var encErr error
- baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSEKMSBaseIVHeader)
- if baseIVHeader != "" {
- // Decode the base IV from the header
- baseIV, decodeErr := base64.StdEncoding.DecodeString(baseIVHeader)
- if decodeErr != nil || len(baseIV) != 16 {
- return nil, nil, nil, s3err.ErrInternalError
- }
- // Use the provided base IV with unique part offset for multipart upload consistency
- encryptedReader, sseKey, encErr = CreateSSEKMSEncryptedReaderWithBaseIVAndOffset(dataReader, keyID, encryptionContext, bucketKeyEnabled, baseIV, partOffset)
- glog.V(4).Infof("Using provided base IV %x for SSE-KMS encryption", baseIV[:8])
- } else {
- // Generate a new IV for single-part uploads
- encryptedReader, sseKey, encErr = CreateSSEKMSEncryptedReaderWithBucketKey(dataReader, keyID, encryptionContext, bucketKeyEnabled)
- }
- if encErr != nil {
- return nil, nil, nil, s3err.ErrInternalError
- }
- // Prepare SSE-KMS metadata for later header setting
- sseKMSMetadata, metaErr := SerializeSSEKMSMetadata(sseKey)
- if metaErr != nil {
- return nil, nil, nil, s3err.ErrInternalError
- }
- return encryptedReader, sseKey, sseKMSMetadata, s3err.ErrNone
- }
- // handleSSES3MultipartEncryption handles multipart upload logic for SSE-S3 encryption
- func (s3a *S3ApiServer) handleSSES3MultipartEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSES3Key, s3err.ErrorCode) {
- keyDataHeader := r.Header.Get(s3_constants.SeaweedFSSSES3KeyDataHeader)
- baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSES3BaseIVHeader)
- glog.V(4).Infof("handleSSES3MultipartEncryption: using provided key and base IV for multipart part")
- // Decode the key data
- keyData, decodeErr := base64.StdEncoding.DecodeString(keyDataHeader)
- if decodeErr != nil {
- return nil, nil, s3err.ErrInternalError
- }
- // Deserialize the SSE-S3 key
- keyManager := GetSSES3KeyManager()
- key, deserializeErr := DeserializeSSES3Metadata(keyData, keyManager)
- if deserializeErr != nil {
- return nil, nil, s3err.ErrInternalError
- }
- // Decode the base IV
- baseIV, decodeErr := base64.StdEncoding.DecodeString(baseIVHeader)
- if decodeErr != nil || len(baseIV) != s3_constants.AESBlockSize {
- return nil, nil, s3err.ErrInternalError
- }
- // Use the provided base IV with unique part offset for multipart upload consistency
- encryptedReader, _, encErr := CreateSSES3EncryptedReaderWithBaseIV(dataReader, key, baseIV, partOffset)
- if encErr != nil {
- return nil, nil, s3err.ErrInternalError
- }
- glog.V(4).Infof("handleSSES3MultipartEncryption: using provided base IV %x", baseIV[:8])
- return encryptedReader, key, s3err.ErrNone
- }
- // handleSSES3SinglePartEncryption handles single-part upload logic for SSE-S3 encryption
- func (s3a *S3ApiServer) handleSSES3SinglePartEncryption(dataReader io.Reader) (io.Reader, *SSES3Key, s3err.ErrorCode) {
- glog.V(4).Infof("handleSSES3SinglePartEncryption: generating new key for single-part upload")
- keyManager := GetSSES3KeyManager()
- key, err := keyManager.GetOrCreateKey("")
- if err != nil {
- return nil, nil, s3err.ErrInternalError
- }
- // Create encrypted reader
- encryptedReader, iv, encErr := CreateSSES3EncryptedReader(dataReader, key)
- if encErr != nil {
- return nil, nil, s3err.ErrInternalError
- }
- // Store IV on the key object for later decryption
- key.IV = iv
- // Store the key for later use
- keyManager.StoreKey(key)
- return encryptedReader, key, s3err.ErrNone
- }
- // handleSSES3Encryption processes SSE-S3 encryption for the data reader
- func (s3a *S3ApiServer) handleSSES3Encryption(r *http.Request, dataReader io.Reader, partOffset int64) (io.Reader, *SSES3Key, []byte, s3err.ErrorCode) {
- if !IsSSES3RequestInternal(r) {
- return dataReader, nil, nil, s3err.ErrNone
- }
- glog.V(3).Infof("handleSSES3Encryption: SSE-S3 request detected, processing encryption")
- var encryptedReader io.Reader
- var sseS3Key *SSES3Key
- var errCode s3err.ErrorCode
- // Check if this is multipart upload (key data and base IV provided)
- keyDataHeader := r.Header.Get(s3_constants.SeaweedFSSSES3KeyDataHeader)
- baseIVHeader := r.Header.Get(s3_constants.SeaweedFSSSES3BaseIVHeader)
- if keyDataHeader != "" && baseIVHeader != "" {
- // Multipart upload: use provided key and base IV
- encryptedReader, sseS3Key, errCode = s3a.handleSSES3MultipartEncryption(r, dataReader, partOffset)
- } else {
- // Single-part upload: generate new key and IV
- encryptedReader, sseS3Key, errCode = s3a.handleSSES3SinglePartEncryption(dataReader)
- }
- if errCode != s3err.ErrNone {
- return nil, nil, nil, errCode
- }
- // Prepare SSE-S3 metadata for later header setting
- sseS3Metadata, metaErr := SerializeSSES3Metadata(sseS3Key)
- if metaErr != nil {
- return nil, nil, nil, s3err.ErrInternalError
- }
- glog.V(3).Infof("handleSSES3Encryption: prepared SSE-S3 metadata for object")
- return encryptedReader, sseS3Key, sseS3Metadata, s3err.ErrNone
- }
- // handleAllSSEEncryption processes all SSE types in sequence and returns the final encrypted reader
- // This eliminates repetitive dataReader assignments and centralizes SSE processing
- func (s3a *S3ApiServer) handleAllSSEEncryption(r *http.Request, dataReader io.Reader, partOffset int64) (*PutToFilerEncryptionResult, s3err.ErrorCode) {
- result := &PutToFilerEncryptionResult{
- DataReader: dataReader,
- }
- // Handle SSE-C encryption first
- encryptedReader, customerKey, sseIV, errCode := s3a.handleSSECEncryption(r, result.DataReader)
- if errCode != s3err.ErrNone {
- return nil, errCode
- }
- result.DataReader = encryptedReader
- result.CustomerKey = customerKey
- result.SSEIV = sseIV
- // Handle SSE-KMS encryption
- encryptedReader, sseKMSKey, sseKMSMetadata, errCode := s3a.handleSSEKMSEncryption(r, result.DataReader, partOffset)
- if errCode != s3err.ErrNone {
- return nil, errCode
- }
- result.DataReader = encryptedReader
- result.SSEKMSKey = sseKMSKey
- result.SSEKMSMetadata = sseKMSMetadata
- // Handle SSE-S3 encryption
- encryptedReader, sseS3Key, sseS3Metadata, errCode := s3a.handleSSES3Encryption(r, result.DataReader, partOffset)
- if errCode != s3err.ErrNone {
- return nil, errCode
- }
- result.DataReader = encryptedReader
- result.SSES3Key = sseS3Key
- result.SSES3Metadata = sseS3Metadata
- // Set SSE type for response headers
- if customerKey != nil {
- result.SSEType = s3_constants.SSETypeC
- } else if sseKMSKey != nil {
- result.SSEType = s3_constants.SSETypeKMS
- } else if sseS3Key != nil {
- result.SSEType = s3_constants.SSETypeS3
- }
- return result, s3err.ErrNone
- }
|