Github user omalley commented on a diff in the pull request:

    https://github.com/apache/orc/pull/213#discussion_r166682102
  
    --- Diff: java/core/src/java/org/apache/orc/InMemoryKeystore.java ---
    @@ -0,0 +1,403 @@
    +package org.apache.orc;
    +
    +import org.apache.commons.lang.StringUtils;
    +import org.apache.orc.impl.HadoopShims;
    +
    +import javax.crypto.BadPaddingException;
    +import javax.crypto.Cipher;
    +import javax.crypto.IllegalBlockSizeException;
    +import javax.crypto.spec.IvParameterSpec;
    +import javax.crypto.spec.SecretKeySpec;
    +import java.io.IOException;
    +import java.security.InvalidAlgorithmParameterException;
    +import java.security.InvalidKeyException;
    +import java.security.Key;
    +import java.security.NoSuchAlgorithmException;
    +import java.util.ArrayList;
    +import java.util.Arrays;
    +import java.util.HashMap;
    +import java.util.List;
    +import java.util.Map;
    +import java.util.concurrent.locks.ReentrantReadWriteLock;
    +
    +/**
    + * Licensed to the Apache Software Foundation (ASF) under one
    + * or more contributor license agreements.  See the NOTICE file
    + * distributed with this work for additional information
    + * regarding copyright ownership.  The ASF licenses this file
    + * to you under the Apache License, Version 2.0 (the
    + * "License"); you may not use this file except in compliance
    + * with the License.  You may obtain a copy of the License at
    + * <p>
    + * http://www.apache.org/licenses/LICENSE-2.0
    + * <p>
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +
    +/**
    + * This is an in-memory implementation of {@link HadoopShims.KeyProvider}.
    + * The primary use of this class is to ease testing.
    + */
    +public class InMemoryKeystore implements HadoopShims.KeyProvider {
    +
    +  /**
    +   * Support AES 256 ?
    +   */
    +  public static final boolean SUPPORTS_AES_256;
    +
    +  static {
    +    try {
    +      SUPPORTS_AES_256 = Cipher.getMaxAllowedKeyLength("AES") > 128;
    +    } catch (final NoSuchAlgorithmException e) {
    +      throw new IllegalArgumentException("Unknown algorithm", e);
    +    }
    +  }
    +
    +  /**
    +   * A map that stores the 'keyName@version'
    +   * and 'metadata + material' mapping.
    +   */
    +  private final Map<String, KeyVersion> keys;
    +
    +  /**
    +   * A map that store the keyName (without version)
    +   * and metadata associated with it.
    +   */
    +  private final Map<String, HadoopShims.KeyMetadata> meta = new 
HashMap<>();
    +
    +  private final ReentrantReadWriteLock rwl = new 
ReentrantReadWriteLock(true);
    +
    +  /* Create an instance */
    +  public InMemoryKeystore() {
    +    this(new HashMap<String, KeyVersion>());
    +  }
    +
    +  /**
    +   * Create an instance populating the given keys.
    +   *
    +   * @param keys Supplied map of keys
    +   */
    +  public InMemoryKeystore(final Map<String, KeyVersion> keys) {
    +    super();
    +    this.keys = keys;
    +  }
    +
    +  /**
    +   * Build a version string from a basename and version number. Converts
    +   * "/aaa/bbb" and 3 to "/aaa/bbb@3".
    +   *
    +   * @param name    the basename of the key
    +   * @param version the version of the key
    +   * @return the versionName of the key.
    +   */
    +  protected static String buildVersionName(final String name,
    +      final int version) {
    +    return name + "@" + version;
    +  }
    +
    +  /**
    +   * Get the list of key names from the key provider.
    +   *
    +   * @return a list of key names
    +   * @throws IOException
    +   */
    +  @Override
    +  public List<String> getKeyNames() throws IOException {
    +    return new ArrayList<>(meta.keySet());
    +  }
    +
    +  /**
    +   * Get the current metadata for a given key. This is used when encrypting
    +   * new data.
    +   *
    +   * @param keyName the name of a key
    +   * @return metadata for the current version of the key
    +   */
    +  @Override
    +  public HadoopShims.KeyMetadata getCurrentKeyVersion(final String 
keyName) {
    +
    +    /* prevent the material from leaking */
    +    final HadoopShims.KeyMetadata key = meta.get(keyName);
    +
    +    if (key == null) {
    +      return null;
    +    }
    +
    +    return new HadoopShims.KeyMetadata() {
    +
    +      @Override
    +      public String getKeyName() {
    +        return key.getKeyName();
    +      }
    +
    +      @Override
    +      public EncryptionAlgorithm getAlgorithm() {
    +        return key.getAlgorithm();
    +      }
    +
    +      @Override
    +      public int getVersion() {
    +        return key.getVersion();
    +      }
    +    };
    +
    +  }
    +
    +  /**
    +   * Create a metadata object while reading.
    +   *
    +   * @param keyName   the name of the key
    +   * @param version   the version of the key to use
    +   * @param algorithm the algorithm for that version of the key
    +   * @return the metadata for the key version
    +   */
    +  @Override
    +  public HadoopShims.KeyMetadata getKeyVersion(final String keyName,
    +      final int version, final EncryptionAlgorithm algorithm) {
    +    return new HadoopShims.KeyMetadata() {
    +
    +      @Override
    +      public String getKeyName() {
    +        return keyName;
    +      }
    +
    +      @Override
    +      public EncryptionAlgorithm getAlgorithm() {
    +        return algorithm;
    +      }
    +
    +      @Override
    +      public int getVersion() {
    +        return version;
    +      }
    +    };
    +  }
    +
    +  /**
    +   * Create a local key for the given key version and initialization 
vector.
    +   * Given a probabilistically unique iv, it will generate a unique key
    +   * with the master key at the specified version. This allows the 
encryption
    +   * to use this local key for the encryption and decryption without ever
    +   * having access to the master key.
    +   * <p>
    +   * This uses KeyProviderCryptoExtension.decryptEncryptedKey with a fixed 
key
    +   * of the appropriate length.
    +   *
    +   * @param key the master key version
    +   * @param iv  the unique initialization vector
    +   * @return the local key's material
    +   */
    +  @Override
    +  public Key getLocalKey(final HadoopShims.KeyMetadata key, final byte[] 
iv) {
    +
    +    rwl.writeLock().lock();
    +    try {
    +      final KeyVersion secret = keys
    +          .get(buildVersionName(key.getKeyName(), key.getVersion()));
    +      final Cipher cipher = secret.getAlgorithm().createCipher();
    +
    +      try {
    +        cipher.init(Cipher.ENCRYPT_MODE, new 
SecretKeySpec(secret.getMaterial(),
    +            secret.getAlgorithm().getAlgorithm()), new 
IvParameterSpec(iv));
    +      } catch (final InvalidKeyException e) {
    +        throw new IllegalStateException(
    +            "ORC bad encryption key for " + key.getKeyName(), e);
    +      } catch (final InvalidAlgorithmParameterException e) {
    +        throw new IllegalStateException(
    +            "ORC bad encryption parameter for " + key.getKeyName(), e);
    +      }
    +
    +      final byte[] buffer = new byte[secret.getAlgorithm().keyLength()];
    +
    +      try {
    +        cipher.doFinal(buffer);
    +      } catch (final IllegalBlockSizeException e) {
    +        throw new IllegalStateException(
    +            "ORC bad block size for " + key.getKeyName(), e);
    +      } catch (final BadPaddingException e) {
    +        throw new IllegalStateException(
    +            "ORC bad padding for " + key.getKeyName(), e);
    +      }
    +
    +      return new SecretKeySpec(buffer, 
secret.getAlgorithm().getAlgorithm());
    +    } finally {
    +      rwl.writeLock().unlock();
    +    }
    +
    +  }
    +
    +  /**
    +   * Function to add keys to the in-memory KeyStore.
    +   *
    +   * @param keyName   Name of the key to be added
    +   * @param algorithm Algorithm used
    +   * @param version   Key Version
    +   * @param masterKey Master key
    +   */
    +  public void addKey(String keyName, EncryptionAlgorithm algorithm, int 
version,
    +      byte[] masterKey) throws IOException {
    +
    +    if (!keyName.equals(StringUtils.lowerCase(keyName))) {
    +      throw new IOException("Key " + keyName + " must be lower case.");
    +    }
    +
    +    rwl.writeLock().lock();
    +    try {
    +
    +      if (meta.containsKey(keyName)) {
    +        throw new IOException("Key " + keyName + " already exists.");
    +      }
    +
    +      internalAddKey(keyName, algorithm, version, masterKey);
    +
    +    } finally {
    +      rwl.writeLock().unlock();
    +    }
    +
    +  }
    +
    +  /**
    +   * Function that takes care of adding the key.
    +   * NOTE: Here, if the key already exists with same name then this 
function overwrites it,
    +   * this is by design and is used by {@link #rollNewVersion(String, 
byte[])} function.
    +   * Also note, this function is not thread safe, thread safety is the
    +   * responsibility of the calling function.
    +   *
    +   * @param keyName   Name of the key to be added
    +   * @param algorithm Algorithm used
    +   * @param version   Key Version
    +   * @param masterKey Master key
    +   * @return The new key
    +   */
    +  private KeyVersion internalAddKey(String keyName,
    +      EncryptionAlgorithm algorithm, int version, byte[] masterKey) {
    +
    +    /* Test weather platform supports the algorithm */
    +    if (!SUPPORTS_AES_256 && (algorithm != EncryptionAlgorithm.AES_128)) {
    +      algorithm = EncryptionAlgorithm.AES_128;
    +    }
    +
    +    final byte[] buffer = new byte[algorithm.keyLength()];
    +    if (algorithm.keyLength() > masterKey.length) {
    +
    +      System.arraycopy(masterKey, 0, buffer, 0, masterKey.length);
    +      /* fill with zeros */
    +      Arrays.fill(buffer, masterKey.length, buffer.length - 1, (byte) 0);
    +
    +    } else {
    +      System.arraycopy(masterKey, 0, buffer, 0, algorithm.keyLength());
    +    }
    +
    +    final KeyVersion key = new KeyVersion(keyName, version, algorithm, 
buffer);
    +
    +    keys.put(buildVersionName(keyName, version), key);
    +    /* our metadata also contains key material, but it should be fine for 
testing */
    +    meta.put(keyName, key);
    +
    +    return key;
    +
    +  }
    +
    +  /**
    +   * Function to add keys to the in-memory KeyStore.
    +   * With default version 0
    +   *
    +   * @param keyName   Name of the key to be added
    +   * @param algorithm Algorithm used
    +   * @param masterKey Master key
    +   */
    +  public void addKey(String keyName, EncryptionAlgorithm algorithm,
    +      byte[] masterKey) throws IOException {
    +
    +    /* default version = 0 */
    +    this.addKey(keyName, algorithm, 0, masterKey);
    +  }
    +
    +  /**
    +   * Roll new version for the key i.e.
    +   * increments the version number by 1 and
    +   * uses the provided secret material.
    +   *
    +   * @param name name of the key to be rolled
    +   * @param material the new material to be used
    +   * @return KeyVersion The new rolled key
    +   * @throws IOException
    +   */
    +  public KeyVersion rollNewVersion(final String name, final byte[] 
material)
    --- End diff --
    
    You don't need rollNewVersion for an in-memory store.


---

Reply via email to