// Licensed to the Apache Software Foundation (ASF) under one // or more contributor license agreements. See the NOTICE file // distributed with this work for additional information // regarding copyright ownership. The ASF licenses this file // to you under the Apache License, Version 2.0 (the // "License"); you may not use this file except in compliance // with the License. You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. #pragma once #include #include #include "parquet/encryption/key_encryption_key.h" #include "parquet/encryption/kms_client.h" #include "parquet/encryption/kms_client_factory.h" #include "parquet/encryption/two_level_cache_with_expiration.h" #include "parquet/platform.h" namespace parquet::encryption { static constexpr uint64_t kCacheCleanPeriodForKeyRotation = 60 * 60; // 1 hour // KeyToolkit is a utility that keeps various tools for key management (such as key // rotation, kms client instantiation, cache control, etc), plus a number of auxiliary // classes for internal use. class PARQUET_EXPORT KeyToolkit { public: KeyToolkit() { last_cache_clean_for_key_rotation_time_ = {}; } /// KMS client two level cache: token -> KMSInstanceId -> KmsClient TwoLevelCacheWithExpiration>& kms_client_cache_per_token() { return kms_client_cache_; } /// Key encryption key two level cache for wrapping: token -> MasterEncryptionKeyId -> /// KeyEncryptionKey TwoLevelCacheWithExpiration& kek_write_cache_per_token() { return key_encryption_key_write_cache_; } /// Key encryption key two level cache for unwrapping: token -> KeyEncryptionKeyId -> /// KeyEncryptionKeyBytes TwoLevelCacheWithExpiration& kek_read_cache_per_token() { return key_encryption_key_read_cache_; } std::shared_ptr GetKmsClient( const KmsConnectionConfig& kms_connection_config, double cache_entry_lifetime_ms); /// Flush any caches that are tied to the (compromised) access_token void RemoveCacheEntriesForToken(const std::string& access_token); void RemoveCacheEntriesForAllTokens(); void RegisterKmsClientFactory(std::shared_ptr kms_client_factory) { if (kms_client_factory_ != NULLPTR) { throw ParquetException("KMS client factory has already been registered."); } kms_client_factory_ = std::move(kms_client_factory); } /// Key rotation. In the single wrapping mode, decrypts data keys with old master keys, /// then encrypts them with new master keys. In the double wrapping mode, decrypts KEKs /// (key encryption keys) with old master keys, generates new KEKs and encrypts them /// with new master keys. Works only if key material is not stored internally in file /// footers. Not supported in local key wrapping mode. Method can be run by multiple /// threads, but each thread must work on different files. void RotateMasterKeys(const KmsConnectionConfig& kms_connection_config, const std::string& parquet_file_path, const std::shared_ptr<::arrow::fs::FileSystem>& file_system, bool double_wrapping, double cache_lifetime_seconds); private: TwoLevelCacheWithExpiration> kms_client_cache_; TwoLevelCacheWithExpiration key_encryption_key_write_cache_; TwoLevelCacheWithExpiration key_encryption_key_read_cache_; std::shared_ptr kms_client_factory_; mutable ::arrow::util::Mutex last_cache_clean_for_key_rotation_time_mutex_; internal::TimePoint last_cache_clean_for_key_rotation_time_; }; // "data encryption key" and "master key identifier" are paired together as output when // parsing from "key material" class PARQUET_EXPORT KeyWithMasterId { public: KeyWithMasterId(std::string key_bytes, std::string master_id) : key_bytes_(std::move(key_bytes)), master_id_(std::move(master_id)) {} const std::string& data_key() const { return key_bytes_; } const std::string& master_id() const { return master_id_; } private: const std::string key_bytes_; const std::string master_id_; }; } // namespace parquet::encryption