2022-03-22 11:03:15 -04:00
|
|
|
package azure
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"net/url"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/Azure/azure-sdk-for-go/sdk/azcore"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/sdk/azcore/to"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/sdk/azidentity"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/sdk/keyvault/azkeys/crypto"
|
2022-06-29 10:13:01 -04:00
|
|
|
"github.com/edgelesssys/constellation/kms/internal/config"
|
|
|
|
"github.com/edgelesssys/constellation/kms/internal/storage"
|
2022-03-24 10:16:20 -04:00
|
|
|
"github.com/edgelesssys/constellation/kms/kms"
|
|
|
|
"github.com/edgelesssys/constellation/kms/kms/util"
|
2022-03-22 11:03:15 -04:00
|
|
|
)
|
|
|
|
|
2022-03-24 13:00:17 -04:00
|
|
|
type hsmClientAPI interface {
|
|
|
|
CreateOCTKey(ctx context.Context, name string, options *azkeys.CreateOCTKeyOptions) (azkeys.CreateOCTKeyResponse, error)
|
|
|
|
ImportKey(ctx context.Context, keyName string, key azkeys.JSONWebKey, options *azkeys.ImportKeyOptions) (azkeys.ImportKeyResponse, error)
|
|
|
|
GetKey(ctx context.Context, keyName string, options *azkeys.GetKeyOptions) (azkeys.GetKeyResponse, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
type cryptoClientAPI interface {
|
|
|
|
UnwrapKey(ctx context.Context, alg crypto.KeyWrapAlgorithm, encryptedKey []byte, options *crypto.UnwrapKeyOptions) (crypto.UnwrapKeyResponse, error)
|
|
|
|
WrapKey(ctx context.Context, alg crypto.KeyWrapAlgorithm, key []byte, options *crypto.WrapKeyOptions) (crypto.WrapKeyResponse, error)
|
|
|
|
}
|
|
|
|
|
2022-07-08 04:59:59 -04:00
|
|
|
// HSMDefaultCloud is the suffix for HSM Vaults.
|
2022-03-22 11:03:15 -04:00
|
|
|
const HSMDefaultCloud VaultSuffix = ".managedhsm.azure.net/"
|
|
|
|
|
|
|
|
// HSMClient implements the CloudKMS interface for Azure managed HSM.
|
|
|
|
type HSMClient struct {
|
2022-03-24 13:00:17 -04:00
|
|
|
credentials azcore.TokenCredential
|
|
|
|
client hsmClientAPI
|
|
|
|
storage kms.Storage
|
|
|
|
vaultURL string
|
|
|
|
newCryptoClient func(keyURL string, credential azcore.TokenCredential, options *crypto.ClientOptions) (cryptoClientAPI, error)
|
|
|
|
opts *crypto.ClientOptions
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewHSM initializes a KMS client for Azure manged HSM Key Vault.
|
|
|
|
func NewHSM(ctx context.Context, vaultName string, store kms.Storage, opts *Opts) (*HSMClient, error) {
|
|
|
|
if opts == nil {
|
|
|
|
opts = &Opts{}
|
|
|
|
}
|
|
|
|
cred, err := azidentity.NewDefaultAzureCredential(opts.credentials)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("loading credentials: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
vaultURL := vaultPrefix + vaultName + string(HSMDefaultCloud)
|
|
|
|
client, err := azkeys.NewClient(vaultURL, cred, (*azkeys.ClientOptions)(opts.client))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("creating HSM client: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-03-25 07:50:16 -04:00
|
|
|
// `azkeys.NewClient()` does not error if the vault is non existent
|
2022-03-22 11:03:15 -04:00
|
|
|
// Test here if we can reach the vault, and error otherwise
|
|
|
|
pager := client.ListKeys(&azkeys.ListKeysOptions{MaxResults: to.Int32Ptr(2)})
|
|
|
|
pager.NextPage(ctx)
|
|
|
|
if pager.Err() != nil {
|
|
|
|
return nil, fmt.Errorf("HSM not reachable: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if store == nil {
|
|
|
|
store = storage.NewMemMapStorage()
|
|
|
|
}
|
|
|
|
|
2022-03-24 13:00:17 -04:00
|
|
|
return &HSMClient{
|
|
|
|
vaultURL: vaultURL,
|
|
|
|
client: client,
|
|
|
|
credentials: cred,
|
|
|
|
storage: store,
|
|
|
|
opts: (*crypto.ClientOptions)(opts.client),
|
|
|
|
newCryptoClient: cryptoClientFactory,
|
|
|
|
}, nil
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// CreateKEK creates a new Key Encryption Key using Azure managed HSM.
|
|
|
|
//
|
|
|
|
// If no key material is provided, a new key is generated by the HSM, otherwise the key material is used to import the key.
|
|
|
|
func (c *HSMClient) CreateKEK(ctx context.Context, keyID string, key []byte) error {
|
|
|
|
if len(key) == 0 {
|
|
|
|
if _, err := c.client.CreateOCTKey(ctx, keyID, &azkeys.CreateOCTKeyOptions{
|
|
|
|
HardwareProtected: true,
|
|
|
|
KeySize: to.Int32Ptr(config.SymmetricKeyLength * 8),
|
|
|
|
Tags: config.KmsTags,
|
|
|
|
}); err != nil {
|
|
|
|
return fmt.Errorf("creating new KEK: %w", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
jwk := azkeys.JSONWebKey{
|
|
|
|
K: key,
|
|
|
|
KeyOps: []*string{
|
|
|
|
to.StringPtr("wrapKey"),
|
|
|
|
to.StringPtr("unwrapKey"),
|
|
|
|
},
|
|
|
|
KeyType: (*azkeys.KeyType)(to.StringPtr(string(azkeys.OctHSM))),
|
|
|
|
}
|
|
|
|
importOpts := &azkeys.ImportKeyOptions{
|
|
|
|
Hsm: to.BoolPtr(true),
|
|
|
|
KeyAttributes: &azkeys.KeyAttributes{
|
|
|
|
Attributes: azkeys.Attributes{
|
|
|
|
Enabled: to.BoolPtr(true),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Tags: config.KmsTags,
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := c.client.ImportKey(ctx, keyID, jwk, importOpts); err != nil {
|
|
|
|
return fmt.Errorf("importing KEK to Azure HSM: %w", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDEK loads an encrypted DEK from storage and unwraps it using an HSM-backed key.
|
|
|
|
func (c *HSMClient) GetDEK(ctx context.Context, kekID string, keyID string, dekSize int) ([]byte, error) {
|
|
|
|
encryptedDEK, err := c.storage.Get(ctx, keyID)
|
|
|
|
if err != nil {
|
|
|
|
if !errors.Is(err, storage.ErrDEKUnset) {
|
|
|
|
return nil, fmt.Errorf("loading encrypted DEK from storage: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the DEK does not exist we generate a new random DEK and save it to storage
|
|
|
|
newDEK, err := util.GetRandomKey(dekSize)
|
|
|
|
if err != nil {
|
2022-06-09 10:04:30 -04:00
|
|
|
return nil, fmt.Errorf("key generation: %w", err)
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
if err := c.putDEK(ctx, kekID, keyID, newDEK); err != nil {
|
|
|
|
return nil, fmt.Errorf("creating new DEK: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return newDEK, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
version, err := c.getKeyVersion(ctx, kekID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to detect key version: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-03-24 13:00:17 -04:00
|
|
|
cryptoClient, err := c.newCryptoClient(fmt.Sprintf("%skeys/%s/%s", c.vaultURL, kekID, version), c.credentials, c.opts)
|
2022-03-22 11:03:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("creating crypto client for KEK: %s: %w", kekID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := cryptoClient.UnwrapKey(ctx, crypto.AES256, encryptedDEK, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("unwrapping key: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return res.Result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// putDEK wraps a key using an HSM-backed key and saves it to storage.
|
|
|
|
func (c *HSMClient) putDEK(ctx context.Context, kekID, keyID string, plainDEK []byte) error {
|
|
|
|
version, err := c.getKeyVersion(ctx, kekID)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to detect key version: %w", err)
|
|
|
|
}
|
2022-03-24 13:00:17 -04:00
|
|
|
cryptoClient, err := c.newCryptoClient(fmt.Sprintf("%skeys/%s/%s", c.vaultURL, kekID, version), c.credentials, c.opts)
|
2022-03-22 11:03:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("creating crypto client for KEK: %s: %w", kekID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := cryptoClient.WrapKey(ctx, crypto.AES256, plainDEK, &crypto.WrapKeyOptions{})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("wrapping key: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.storage.Put(ctx, keyID, res.Result)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getKeyVersion detects the latests version number of a given key.
|
|
|
|
func (c *HSMClient) getKeyVersion(ctx context.Context, kekID string) (string, error) {
|
|
|
|
kek, err := c.client.GetKey(ctx, kekID, &azkeys.GetKeyOptions{})
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
parsed, err := url.Parse(*kek.Key.ID)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
path := strings.Split(strings.TrimPrefix(parsed.Path, "/keys/"), "/")
|
|
|
|
if len(path) != 2 {
|
|
|
|
return "", fmt.Errorf("invalid key ID URL: %s", *kek.Key.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
return path[1], nil
|
|
|
|
}
|
2022-03-24 13:00:17 -04:00
|
|
|
|
|
|
|
func cryptoClientFactory(keyURL string, credential azcore.TokenCredential, options *crypto.ClientOptions) (cryptoClientAPI, error) {
|
|
|
|
return crypto.NewClient(keyURL, credential, options)
|
|
|
|
}
|