| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446 | <?phpnamespace Aws\S3\Crypto;use Aws\Crypto\DecryptionTraitV2;use Aws\Exception\CryptoException;use Aws\HashingStream;use Aws\PhpHash;use Aws\Crypto\AbstractCryptoClientV2;use Aws\Crypto\EncryptionTraitV2;use Aws\Crypto\MetadataEnvelope;use Aws\Crypto\MaterialsProvider;use Aws\Crypto\Cipher\CipherBuilderTrait;use Aws\S3\S3Client;use GuzzleHttp\Promise;use GuzzleHttp\Promise\PromiseInterface;use GuzzleHttp\Psr7;/** * Provides a wrapper for an S3Client that supplies functionality to encrypt * data on putObject[Async] calls and decrypt data on getObject[Async] calls. * * AWS strongly recommends the upgrade to the S3EncryptionClientV2 (over the * S3EncryptionClient), as it offers updated data security best practices to our * customers who upgrade. S3EncryptionClientV2 contains breaking changes, so this * will require planning by engineering teams to migrate. New workflows should * just start with S3EncryptionClientV2. * * Note that for PHP versions of < 7.1, this class uses an AES-GCM polyfill * for encryption since there is no native PHP support. The performance for large * inputs will be a lot slower than for PHP 7.1+, so upgrading older PHP version * environments may be necessary to use this effectively. * * Example write path: * * <code> * use Aws\Crypto\KmsMaterialsProviderV2; * use Aws\S3\Crypto\S3EncryptionClientV2; * use Aws\S3\S3Client; * * $encryptionClient = new S3EncryptionClientV2( *     new S3Client([ *         'region' => 'us-west-2', *         'version' => 'latest' *     ]) * ); * $materialsProvider = new KmsMaterialsProviderV2( *     new KmsClient([ *         'profile' => 'default', *         'region' => 'us-east-1', *         'version' => 'latest', *     ], *    'your-kms-key-id' * ); * * $encryptionClient->putObject([ *     '@MaterialsProvider' => $materialsProvider, *     '@CipherOptions' => [ *         'Cipher' => 'gcm', *         'KeySize' => 256, *     ], *     '@KmsEncryptionContext' => ['foo' => 'bar'], *     'Bucket' => 'your-bucket', *     'Key' => 'your-key', *     'Body' => 'your-encrypted-data', * ]); * </code> * * Example read call (using objects from previous example): * * <code> * $encryptionClient->getObject([ *     '@MaterialsProvider' => $materialsProvider, *     '@CipherOptions' => [ *         'Cipher' => 'gcm', *         'KeySize' => 256, *     ], *     'Bucket' => 'your-bucket', *     'Key' => 'your-key', * ]); * </code> */class S3EncryptionClientV2 extends AbstractCryptoClientV2{    use CipherBuilderTrait;    use CryptoParamsTraitV2;    use DecryptionTraitV2;    use EncryptionTraitV2;    use UserAgentTrait;    const CRYPTO_VERSION = '2.1';    private $client;    private $instructionFileSuffix;    private $legacyWarningCount;    /**     * @param S3Client $client The S3Client to be used for true uploading and     *                         retrieving objects from S3 when using the     *                         encryption client.     * @param string|null $instructionFileSuffix Suffix for a client wide     *                                           default when using instruction     *                                           files for metadata storage.     */    public function __construct(        S3Client $client,        $instructionFileSuffix = null    ) {        $this->appendUserAgent($client, 'feat/s3-encrypt/' . self::CRYPTO_VERSION);        $this->client = $client;        $this->instructionFileSuffix = $instructionFileSuffix;        $this->legacyWarningCount = 0;    }    private static function getDefaultStrategy()    {        return new HeadersMetadataStrategy();    }    /**     * Encrypts the data in the 'Body' field of $args and promises to upload it     * to the specified location on S3.     *     * Note that for PHP versions of < 7.1, this operation uses an AES-GCM     * polyfill for encryption since there is no native PHP support. The     * performance for large inputs will be a lot slower than for PHP 7.1+, so     * upgrading older PHP version environments may be necessary to use this     * effectively.     *     * @param array $args Arguments for encrypting an object and uploading it     *                    to S3 via PutObject.     *     * The required configuration arguments are as follows:     *     * - @MaterialsProvider: (MaterialsProviderV2) Provides Cek, Iv, and Cek     *   encrypting/decrypting for encryption metadata.     * - @CipherOptions: (array) Cipher options for encrypting data. Only the     *   Cipher option is required. Accepts the following:     *       - Cipher: (string) gcm     *            See also: AbstractCryptoClientV2::$supportedCiphers     *       - KeySize: (int) 128|256     *            See also: MaterialsProvider::$supportedKeySizes     *       - Aad: (string) Additional authentication data. This option is     *            passed directly to OpenSSL when using gcm. Note if you pass in     *            Aad, the PHP SDK will be able to decrypt the resulting object,     *            but other AWS SDKs may not be able to do so.     * - @KmsEncryptionContext: (array) Only required if using     *   KmsMaterialsProviderV2. An associative array of key-value     *   pairs to be added to the encryption context for KMS key encryption. An     *   empty array may be passed if no additional context is desired.     *     * The optional configuration arguments are as follows:     *     * - @MetadataStrategy: (MetadataStrategy|string|null) Strategy for storing     *   MetadataEnvelope information. Defaults to using a     *   HeadersMetadataStrategy. Can either be a class implementing     *   MetadataStrategy, a class name of a predefined strategy, or empty/null     *   to default.     * - @InstructionFileSuffix: (string|null) Suffix used when writing to an     *   instruction file if using an InstructionFileMetadataHandler.     *     * @return PromiseInterface     *     * @throws \InvalidArgumentException Thrown when arguments above are not     *                                   passed or are passed incorrectly.     */    public function putObjectAsync(array $args)    {        $provider = $this->getMaterialsProvider($args);        unset($args['@MaterialsProvider']);        $instructionFileSuffix = $this->getInstructionFileSuffix($args);        unset($args['@InstructionFileSuffix']);        $strategy = $this->getMetadataStrategy($args, $instructionFileSuffix);        unset($args['@MetadataStrategy']);        $envelope = new MetadataEnvelope();        return Promise\Create::promiseFor($this->encrypt(            Psr7\Utils::streamFor($args['Body']),            $args,            $provider,            $envelope        ))->then(            function ($encryptedBodyStream) use ($args) {                $hash = new PhpHash('sha256');                $hashingEncryptedBodyStream = new HashingStream(                    $encryptedBodyStream,                    $hash,                    self::getContentShaDecorator($args)                );                return [$hashingEncryptedBodyStream, $args];            }        )->then(            function ($putObjectContents) use ($strategy, $envelope) {                list($bodyStream, $args) = $putObjectContents;                if ($strategy === null) {                    $strategy = self::getDefaultStrategy();                }                $updatedArgs = $strategy->save($envelope, $args);                $updatedArgs['Body'] = $bodyStream;                return $updatedArgs;            }        )->then(            function ($args) {                unset($args['@CipherOptions']);                return $this->client->putObjectAsync($args);            }        );    }    private static function getContentShaDecorator(&$args)    {        return function ($hash) use (&$args) {            $args['ContentSHA256'] = bin2hex($hash);        };    }    /**     * Encrypts the data in the 'Body' field of $args and uploads it to the     * specified location on S3.     *     * Note that for PHP versions of < 7.1, this operation uses an AES-GCM     * polyfill for encryption since there is no native PHP support. The     * performance for large inputs will be a lot slower than for PHP 7.1+, so     * upgrading older PHP version environments may be necessary to use this     * effectively.     *     * @param array $args Arguments for encrypting an object and uploading it     *                    to S3 via PutObject.     *     * The required configuration arguments are as follows:     *     * - @MaterialsProvider: (MaterialsProvider) Provides Cek, Iv, and Cek     *   encrypting/decrypting for encryption metadata.     * - @CipherOptions: (array) Cipher options for encrypting data. A Cipher     *   is required. Accepts the following options:     *       - Cipher: (string) gcm     *            See also: AbstractCryptoClientV2::$supportedCiphers     *       - KeySize: (int) 128|256     *            See also: MaterialsProvider::$supportedKeySizes     *       - Aad: (string) Additional authentication data. This option is     *            passed directly to OpenSSL when using gcm. Note if you pass in     *            Aad, the PHP SDK will be able to decrypt the resulting object,     *            but other AWS SDKs may not be able to do so.     * - @KmsEncryptionContext: (array) Only required if using     *   KmsMaterialsProviderV2. An associative array of key-value     *   pairs to be added to the encryption context for KMS key encryption. An     *   empty array may be passed if no additional context is desired.     *     * The optional configuration arguments are as follows:     *     * - @MetadataStrategy: (MetadataStrategy|string|null) Strategy for storing     *   MetadataEnvelope information. Defaults to using a     *   HeadersMetadataStrategy. Can either be a class implementing     *   MetadataStrategy, a class name of a predefined strategy, or empty/null     *   to default.     * - @InstructionFileSuffix: (string|null) Suffix used when writing to an     *   instruction file if an using an InstructionFileMetadataHandler was     *   determined.     *     * @return \Aws\Result PutObject call result with the details of uploading     *                     the encrypted file.     *     * @throws \InvalidArgumentException Thrown when arguments above are not     *                                   passed or are passed incorrectly.     */    public function putObject(array $args)    {        return $this->putObjectAsync($args)->wait();    }    /**     * Promises to retrieve an object from S3 and decrypt the data in the     * 'Body' field.     *     * @param array $args Arguments for retrieving an object from S3 via     *                    GetObject and decrypting it.     *     * The required configuration argument is as follows:     *     * - @MaterialsProvider: (MaterialsProviderInterface) Provides Cek, Iv, and Cek     *   encrypting/decrypting for decryption metadata. May have data loaded     *   from the MetadataEnvelope upon decryption.     * - @SecurityProfile: (string) Must be set to 'V2' or 'V2_AND_LEGACY'.     *      - 'V2' indicates that only objects encrypted with S3EncryptionClientV2     *        content encryption and key wrap schemas are able to be decrypted.     *      - 'V2_AND_LEGACY' indicates that objects encrypted with both     *        S3EncryptionClientV2 and older legacy encryption clients are able     *        to be decrypted.     *     * The optional configuration arguments are as follows:     *     * - SaveAs: (string) The path to a file on disk to save the decrypted     *   object data. This will be handled by file_put_contents instead of the     *   Guzzle sink.     *     * - @MetadataStrategy: (MetadataStrategy|string|null) Strategy for reading     *   MetadataEnvelope information. Defaults to determining based on object     *   response headers. Can either be a class implementing MetadataStrategy,     *   a class name of a predefined strategy, or empty/null to default.     * - @InstructionFileSuffix: (string) Suffix used when looking for an     *   instruction file if an InstructionFileMetadataHandler is being used.     * - @CipherOptions: (array) Cipher options for decrypting data. A Cipher     *   is required. Accepts the following options:     *       - Aad: (string) Additional authentication data. This option is     *            passed directly to OpenSSL when using gcm. It is ignored when     *            using cbc.     * - @KmsAllowDecryptWithAnyCmk: (bool) This allows decryption with     *   KMS materials for any KMS key ID, instead of needing the KMS key ID to     *   be specified and provided to the decrypt operation. Ignored for non-KMS     *   materials providers. Defaults to false.     *     * @return PromiseInterface     *     * @throws \InvalidArgumentException Thrown when required arguments are not     *                                   passed or are passed incorrectly.     */    public function getObjectAsync(array $args)    {        $provider = $this->getMaterialsProvider($args);        unset($args['@MaterialsProvider']);        $instructionFileSuffix = $this->getInstructionFileSuffix($args);        unset($args['@InstructionFileSuffix']);        $strategy = $this->getMetadataStrategy($args, $instructionFileSuffix);        unset($args['@MetadataStrategy']);        if (!isset($args['@SecurityProfile'])            || !in_array($args['@SecurityProfile'], self::$supportedSecurityProfiles)        ) {            throw new CryptoException("@SecurityProfile is required and must be"                . " set to 'V2' or 'V2_AND_LEGACY'");        }        // Only throw this legacy warning once per client        if (in_array($args['@SecurityProfile'], self::$legacySecurityProfiles)            && $this->legacyWarningCount < 1        ) {            $this->legacyWarningCount++;            trigger_error(                "This S3 Encryption Client operation is configured to"                    . " read encrypted data with legacy encryption modes. If you"                    . " don't have objects encrypted with these legacy modes,"                    . " you should disable support for them to enhance security. ",                E_USER_WARNING            );        }        $saveAs = null;        if (!empty($args['SaveAs'])) {            $saveAs = $args['SaveAs'];        }        $promise = $this->client->getObjectAsync($args)            ->then(                function ($result) use (                    $provider,                    $instructionFileSuffix,                    $strategy,                    $args                ) {                    if ($strategy === null) {                        $strategy = $this->determineGetObjectStrategy(                            $result,                            $instructionFileSuffix                        );                    }                    $envelope = $strategy->load($args + [                        'Metadata' => $result['Metadata']                    ]);                    $result['Body'] = $this->decrypt(                        $result['Body'],                        $provider,                        $envelope,                        $args                    );                    return $result;                }            )->then(                function ($result) use ($saveAs) {                    if (!empty($saveAs)) {                        file_put_contents(                            $saveAs,                            (string)$result['Body'],                            LOCK_EX                        );                    }                    return $result;                }            );        return $promise;    }    /**     * Retrieves an object from S3 and decrypts the data in the 'Body' field.     *     * @param array $args Arguments for retrieving an object from S3 via     *                    GetObject and decrypting it.     *     * The required configuration argument is as follows:     *     * - @MaterialsProvider: (MaterialsProviderInterface) Provides Cek, Iv, and Cek     *   encrypting/decrypting for decryption metadata. May have data loaded     *   from the MetadataEnvelope upon decryption.     * - @SecurityProfile: (string) Must be set to 'V2' or 'V2_AND_LEGACY'.     *      - 'V2' indicates that only objects encrypted with S3EncryptionClientV2     *        content encryption and key wrap schemas are able to be decrypted.     *      - 'V2_AND_LEGACY' indicates that objects encrypted with both     *        S3EncryptionClientV2 and older legacy encryption clients are able     *        to be decrypted.     *     * The optional configuration arguments are as follows:     *     * - SaveAs: (string) The path to a file on disk to save the decrypted     *   object data. This will be handled by file_put_contents instead of the     *   Guzzle sink.     * - @InstructionFileSuffix: (string|null) Suffix used when looking for an     *   instruction file if an InstructionFileMetadataHandler was detected.     * - @CipherOptions: (array) Cipher options for encrypting data. A Cipher     *   is required. Accepts the following options:     *       - Aad: (string) Additional authentication data. This option is     *            passed directly to OpenSSL when using gcm. It is ignored when     *            using cbc.     * - @KmsAllowDecryptWithAnyCmk: (bool) This allows decryption with     *   KMS materials for any KMS key ID, instead of needing the KMS key ID to     *   be specified and provided to the decrypt operation. Ignored for non-KMS     *   materials providers. Defaults to false.     *     * @return \Aws\Result GetObject call result with the 'Body' field     *                     wrapped in a decryption stream with its metadata     *                     information.     *     * @throws \InvalidArgumentException Thrown when arguments above are not     *                                   passed or are passed incorrectly.     */    public function getObject(array $args)    {        return $this->getObjectAsync($args)->wait();    }}
 |