mirror of
https://github.com/kopia/kopia.git
synced 2026-01-29 00:33:24 -05:00
* storage api put-blob retention options Co-authored-by: Shikhar Mall <shikhar@kasten.io>
288 lines
8.4 KiB
Go
288 lines
8.4 KiB
Go
package repo
|
|
|
|
import (
|
|
"context"
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/hmac"
|
|
"crypto/rand"
|
|
"crypto/sha256"
|
|
"encoding/json"
|
|
"io"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/kopia/kopia/internal/gather"
|
|
"github.com/kopia/kopia/repo/blob"
|
|
)
|
|
|
|
const (
|
|
defaultFormatEncryption = "AES256_GCM"
|
|
lengthOfRecoverBlockLength = 2 // number of bytes used to store recover block length
|
|
maxChecksummedFormatBytesLength = 65000
|
|
maxRecoverChunkLength = 65536
|
|
minRecoverableChunkLength = lengthOfRecoverBlockLength + 2
|
|
formatBlobChecksumSize = sha256.Size
|
|
)
|
|
|
|
// formatBlobChecksumSecret is a HMAC secret used for checksumming the format content.
|
|
// It's not really a secret, but will provide positive identification of blocks that
|
|
// are repository format blocks.
|
|
var formatBlobChecksumSecret = []byte("kopia-repository")
|
|
|
|
// FormatBlobID is the identifier of a BLOB that describes repository format.
|
|
const FormatBlobID = "kopia.repository"
|
|
|
|
var (
|
|
purposeAESKey = []byte("AES")
|
|
purposeAuthData = []byte("CHECKSUM")
|
|
|
|
errFormatBlobNotFound = errors.New("format blob not found")
|
|
)
|
|
|
|
type formatBlob struct {
|
|
Tool string `json:"tool"`
|
|
BuildVersion string `json:"buildVersion"`
|
|
BuildInfo string `json:"buildInfo"`
|
|
|
|
UniqueID []byte `json:"uniqueID"`
|
|
KeyDerivationAlgorithm string `json:"keyAlgo"`
|
|
|
|
Version string `json:"version"`
|
|
EncryptionAlgorithm string `json:"encryption"`
|
|
EncryptedFormatBytes []byte `json:"encryptedBlockFormat,omitempty"`
|
|
UnencryptedFormat *repositoryObjectFormat `json:"blockFormat,omitempty"`
|
|
}
|
|
|
|
// encryptedRepositoryConfig contains the configuration of repository that's persisted in encrypted format.
|
|
type encryptedRepositoryConfig struct {
|
|
Format repositoryObjectFormat `json:"format"`
|
|
}
|
|
|
|
func parseFormatBlob(b []byte) (*formatBlob, error) {
|
|
f := &formatBlob{}
|
|
|
|
if err := json.Unmarshal(b, &f); err != nil {
|
|
return nil, errors.Wrap(err, "invalid format blob")
|
|
}
|
|
|
|
return f, nil
|
|
}
|
|
|
|
// RecoverFormatBlob attempts to recover format blob replica from the specified file.
|
|
// The format blob can be either the prefix or a suffix of the given file.
|
|
// optionally the length can be provided (if known) to speed up recovery.
|
|
func RecoverFormatBlob(ctx context.Context, st blob.Storage, blobID blob.ID, optionalLength int64) ([]byte, error) {
|
|
if optionalLength > 0 {
|
|
return recoverFormatBlobWithLength(ctx, st, blobID, optionalLength)
|
|
}
|
|
|
|
var foundMetadata blob.Metadata
|
|
|
|
if err := st.ListBlobs(ctx, blobID, func(bm blob.Metadata) error {
|
|
if foundMetadata.BlobID != "" {
|
|
return errors.Errorf("found multiple blocks with a given prefix: %v", blobID)
|
|
}
|
|
foundMetadata = bm
|
|
return nil
|
|
}); err != nil {
|
|
return nil, errors.Wrap(err, "error")
|
|
}
|
|
|
|
if foundMetadata.BlobID == "" {
|
|
return nil, blob.ErrBlobNotFound
|
|
}
|
|
|
|
return recoverFormatBlobWithLength(ctx, st, foundMetadata.BlobID, foundMetadata.Length)
|
|
}
|
|
|
|
func recoverFormatBlobWithLength(ctx context.Context, st blob.Storage, blobID blob.ID, length int64) ([]byte, error) {
|
|
chunkLength := int64(maxRecoverChunkLength)
|
|
if chunkLength > length {
|
|
chunkLength = length
|
|
}
|
|
|
|
if chunkLength <= minRecoverableChunkLength {
|
|
return nil, errFormatBlobNotFound
|
|
}
|
|
|
|
// try prefix
|
|
var tmp gather.WriteBuffer
|
|
defer tmp.Close()
|
|
|
|
if err := st.GetBlob(ctx, blobID, 0, chunkLength, &tmp); err != nil {
|
|
return nil, errors.Wrapf(err, "error getting blob %v prefix", blobID)
|
|
}
|
|
|
|
prefixChunk := tmp.ToByteSlice()
|
|
|
|
l := decodeInt16(prefixChunk)
|
|
if l <= maxChecksummedFormatBytesLength && l+lengthOfRecoverBlockLength < len(prefixChunk) {
|
|
if b, ok := verifyFormatBlobChecksum(prefixChunk[lengthOfRecoverBlockLength : lengthOfRecoverBlockLength+l]); ok {
|
|
return b, nil
|
|
}
|
|
}
|
|
|
|
// try the suffix
|
|
if err := st.GetBlob(ctx, blobID, length-chunkLength, chunkLength, &tmp); err != nil {
|
|
return nil, errors.Wrapf(err, "error getting blob %v suffix", blobID)
|
|
}
|
|
|
|
suffixChunk := tmp.ToByteSlice()
|
|
|
|
l = decodeInt16(suffixChunk[len(suffixChunk)-lengthOfRecoverBlockLength:])
|
|
if l <= maxChecksummedFormatBytesLength && l+lengthOfRecoverBlockLength < len(suffixChunk) {
|
|
if b, ok := verifyFormatBlobChecksum(suffixChunk[len(suffixChunk)-lengthOfRecoverBlockLength-l : len(suffixChunk)-lengthOfRecoverBlockLength]); ok {
|
|
return b, nil
|
|
}
|
|
}
|
|
|
|
return nil, errFormatBlobNotFound
|
|
}
|
|
|
|
func decodeInt16(b []byte) int {
|
|
return int(b[0]) + int(b[1])<<8
|
|
}
|
|
|
|
func verifyFormatBlobChecksum(b []byte) ([]byte, bool) {
|
|
if len(b) < formatBlobChecksumSize {
|
|
return nil, false
|
|
}
|
|
|
|
data, checksum := b[0:len(b)-formatBlobChecksumSize], b[len(b)-formatBlobChecksumSize:]
|
|
h := hmac.New(sha256.New, formatBlobChecksumSecret)
|
|
h.Write(data)
|
|
actualChecksum := h.Sum(nil)
|
|
|
|
if !hmac.Equal(actualChecksum, checksum) {
|
|
return nil, false
|
|
}
|
|
|
|
return data, true
|
|
}
|
|
|
|
func writeFormatBlob(ctx context.Context, st blob.Storage, f *formatBlob) error {
|
|
buf := gather.NewWriteBuffer()
|
|
e := json.NewEncoder(buf)
|
|
e.SetIndent("", " ")
|
|
|
|
if err := e.Encode(f); err != nil {
|
|
return errors.Wrap(err, "unable to marshal format blob")
|
|
}
|
|
|
|
if err := st.PutBlob(ctx, FormatBlobID, buf.Bytes(), blob.PutOptions{}); err != nil {
|
|
return errors.Wrap(err, "unable to write format blob")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (f *formatBlob) decryptFormatBytes(masterKey []byte) (*repositoryObjectFormat, error) {
|
|
switch f.EncryptionAlgorithm {
|
|
case "NONE": // do nothing
|
|
return f.UnencryptedFormat, nil
|
|
|
|
case "AES256_GCM":
|
|
aead, authData, err := initCrypto(masterKey, f.UniqueID)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "cannot initialize cipher")
|
|
}
|
|
|
|
content := append([]byte(nil), f.EncryptedFormatBytes...)
|
|
if len(content) < aead.NonceSize() {
|
|
return nil, errors.Errorf("invalid encrypted payload, too short")
|
|
}
|
|
|
|
nonce := content[0:aead.NonceSize()]
|
|
payload := content[aead.NonceSize():]
|
|
|
|
plainText, err := aead.Open(payload[:0], nonce, payload, authData)
|
|
if err != nil {
|
|
return nil, errors.Errorf("unable to decrypt repository format, invalid credentials?")
|
|
}
|
|
|
|
var erc encryptedRepositoryConfig
|
|
if err := json.Unmarshal(plainText, &erc); err != nil {
|
|
return nil, errors.Wrap(err, "invalid repository format")
|
|
}
|
|
|
|
return &erc.Format, nil
|
|
|
|
default:
|
|
return nil, errors.Errorf("unknown encryption algorithm: '%v'", f.EncryptionAlgorithm)
|
|
}
|
|
}
|
|
|
|
func initCrypto(masterKey, repositoryID []byte) (cipher.AEAD, []byte, error) {
|
|
aesKey := deriveKeyFromMasterKey(masterKey, repositoryID, purposeAESKey, 32) // nolint:gomnd
|
|
authData := deriveKeyFromMasterKey(masterKey, repositoryID, purposeAuthData, 32) // nolint:gomnd
|
|
|
|
blk, err := aes.NewCipher(aesKey)
|
|
if err != nil {
|
|
return nil, nil, errors.Wrap(err, "cannot create cipher")
|
|
}
|
|
|
|
aead, err := cipher.NewGCM(blk)
|
|
if err != nil {
|
|
return nil, nil, errors.Wrap(err, "cannot create cipher")
|
|
}
|
|
|
|
return aead, authData, nil
|
|
}
|
|
|
|
func encryptFormatBytes(f *formatBlob, format *repositoryObjectFormat, masterKey, repositoryID []byte) error {
|
|
switch f.EncryptionAlgorithm {
|
|
case "NONE":
|
|
f.UnencryptedFormat = format
|
|
return nil
|
|
|
|
case "AES256_GCM":
|
|
content, err := json.Marshal(&encryptedRepositoryConfig{Format: *format})
|
|
if err != nil {
|
|
return errors.Wrap(err, "can't marshal format to JSON")
|
|
}
|
|
|
|
aead, authData, err := initCrypto(masterKey, repositoryID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "unable to initialize crypto")
|
|
}
|
|
|
|
nonceLength := aead.NonceSize()
|
|
noncePlusContentLength := nonceLength + len(content)
|
|
cipherText := make([]byte, noncePlusContentLength+aead.Overhead())
|
|
|
|
// Store nonce at the beginning of ciphertext.
|
|
nonce := cipherText[0:nonceLength]
|
|
if _, err := io.ReadFull(rand.Reader, nonce); err != nil {
|
|
return errors.Wrap(err, "error reading random bytes for nonce")
|
|
}
|
|
|
|
b := aead.Seal(cipherText[nonceLength:nonceLength], nonce, content, authData)
|
|
content = nonce[0 : nonceLength+len(b)]
|
|
f.EncryptedFormatBytes = content
|
|
|
|
return nil
|
|
|
|
default:
|
|
return errors.Errorf("unknown encryption algorithm: '%v'", f.EncryptionAlgorithm)
|
|
}
|
|
}
|
|
|
|
func addFormatBlobChecksumAndLength(fb []byte) ([]byte, error) {
|
|
h := hmac.New(sha256.New, formatBlobChecksumSecret)
|
|
h.Write(fb)
|
|
checksummedFormatBytes := h.Sum(fb)
|
|
|
|
l := len(checksummedFormatBytes)
|
|
if l > maxChecksummedFormatBytesLength {
|
|
return nil, errors.Errorf("format blob too big: %v", l)
|
|
}
|
|
|
|
// return <length><checksummed-bytes><length>
|
|
result := append([]byte(nil), byte(l), byte(l>>8)) //nolint:gomnd
|
|
result = append(result, checksummedFormatBytes...)
|
|
result = append(result, byte(l), byte(l>>8)) //nolint:gomnd
|
|
|
|
return result, nil
|
|
}
|