mirror of
https://github.com/juspay/hyperswitch.git
synced 2025-10-30 01:27:31 +08:00
fix: kms decryption of redis_temp_locker_encryption_key (#2650)
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
949937e364
commit
5a6601fad4
@ -120,6 +120,14 @@ pub enum KmsError {
|
||||
/// The KMS client has not been initialized.
|
||||
#[error("The KMS client has not been initialized")]
|
||||
KmsClientNotInitialized,
|
||||
|
||||
/// The KMS client has not been initialized.
|
||||
#[error("Hex decode failed")]
|
||||
HexDecodeFailed,
|
||||
|
||||
/// The KMS client has not been initialized.
|
||||
#[error("Utf8 decode failed")]
|
||||
Utf8DecodeFailed,
|
||||
}
|
||||
|
||||
impl KmsConfig {
|
||||
@ -140,7 +148,7 @@ impl KmsConfig {
|
||||
/// A wrapper around a KMS value that can be decrypted.
|
||||
#[derive(Clone, Debug, Default, serde::Deserialize, Eq, PartialEq)]
|
||||
#[serde(transparent)]
|
||||
pub struct KmsValue(Secret<String>);
|
||||
pub struct KmsValue(pub Secret<String>);
|
||||
|
||||
impl common_utils::ext_traits::ConfigExt for KmsValue {
|
||||
fn is_empty_after_trim(&self) -> bool {
|
||||
|
||||
@ -1,5 +1,6 @@
|
||||
use common_utils::errors::CustomResult;
|
||||
use external_services::kms::{decrypt::KmsDecrypt, KmsClient, KmsError};
|
||||
use error_stack::{IntoReport, ResultExt};
|
||||
use external_services::kms::{decrypt::KmsDecrypt, KmsClient, KmsError, KmsValue};
|
||||
use masking::ExposeInterface;
|
||||
|
||||
use crate::configs::settings;
|
||||
@ -41,6 +42,19 @@ impl KmsDecrypt for settings::ActiveKmsSecrets {
|
||||
kms_client: &KmsClient,
|
||||
) -> CustomResult<Self::Output, KmsError> {
|
||||
self.jwekey = self.jwekey.expose().decrypt_inner(kms_client).await?.into();
|
||||
self.redis_temp_locker_encryption_key = hex::decode(
|
||||
KmsValue(
|
||||
String::from_utf8(self.redis_temp_locker_encryption_key.expose())
|
||||
.into_report()
|
||||
.change_context(KmsError::Utf8DecodeFailed)?
|
||||
.into(),
|
||||
)
|
||||
.decrypt_inner(kms_client)
|
||||
.await?,
|
||||
)
|
||||
.into_report()
|
||||
.change_context(KmsError::HexDecodeFailed)?
|
||||
.into();
|
||||
Ok(self)
|
||||
}
|
||||
}
|
||||
|
||||
@ -52,7 +52,7 @@ pub enum Subcommand {
|
||||
#[derive(Clone)]
|
||||
pub struct ActiveKmsSecrets {
|
||||
pub jwekey: masking::Secret<Jwekey>,
|
||||
pub redis_temp_locker_encryption_key: masking::Secret<String>,
|
||||
pub redis_temp_locker_encryption_key: masking::Secret<Vec<u8>>,
|
||||
}
|
||||
|
||||
#[derive(Debug, Deserialize, Clone, Default)]
|
||||
|
||||
@ -721,7 +721,6 @@ fn get_redis_temp_locker_encryption_key(state: &routes::AppState) -> RouterResul
|
||||
.kms_secrets
|
||||
.redis_temp_locker_encryption_key
|
||||
.peek()
|
||||
.as_bytes()
|
||||
.to_owned();
|
||||
|
||||
#[cfg(not(feature = "kms"))]
|
||||
|
||||
@ -132,6 +132,7 @@ impl AppState {
|
||||
.locker
|
||||
.redis_temp_locker_encryption_key
|
||||
.clone()
|
||||
.into_bytes()
|
||||
.into(),
|
||||
}
|
||||
.decrypt_inner(kms_client)
|
||||
|
||||
Reference in New Issue
Block a user