1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
use async_trait::async_trait;
use crate::error::{Error, KmsError, Result};
use derive_more::Deref;
use kvproto::encryptionpb::MasterKeyKms;
#[derive(Debug, Clone)]
pub struct Location {
pub region: String,
pub endpoint: String,
}
#[derive(Debug, Clone)]
pub struct Config {
pub key_id: KeyId,
pub location: Location,
pub vendor: String,
}
impl Config {
pub fn from_proto(mk: MasterKeyKms) -> Result<Self> {
Ok(Config {
key_id: KeyId::new(mk.key_id)?,
location: Location {
region: mk.region,
endpoint: mk.endpoint,
},
vendor: mk.vendor,
})
}
}
#[derive(PartialEq, Debug, Clone, Deref)]
pub struct KeyId(String);
impl KeyId {
pub fn new(id: String) -> Result<KeyId> {
if id.is_empty() {
let msg = "KMS key id can not be empty";
Err(Error::KmsError(KmsError::EmptyKey(msg.to_owned())))
} else {
Ok(KeyId(id))
}
}
}
#[derive(PartialEq, Clone, Debug, Deref)]
pub struct EncryptedKey(Vec<u8>);
impl EncryptedKey {
pub fn new(key: Vec<u8>) -> Result<Self> {
if key.is_empty() {
Err(Error::KmsError(KmsError::EmptyKey(
"Encrypted Key".to_owned(),
)))
} else {
Ok(Self(key))
}
}
}
#[derive(Deref)]
pub struct PlainKey(Vec<u8>);
impl PlainKey {
pub fn new(key: Vec<u8>) -> Result<Self> {
Ok(Self(key))
}
}
impl std::fmt::Debug for PlainKey {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.debug_tuple("PlainKey")
.field(&"REDACTED".to_string())
.finish()
}
}
#[derive(Debug)]
pub struct DataKeyPair {
pub encrypted: EncryptedKey,
pub plaintext: PlainKey,
}
#[async_trait]
pub trait KmsProvider: Sync + Send + 'static + std::fmt::Debug {
async fn generate_data_key(&self) -> Result<DataKeyPair>;
async fn decrypt_data_key(&self, data_key: &EncryptedKey) -> Result<Vec<u8>>;
fn name(&self) -> &str;
}