Skip to content

Exercise 1: Add the AWS Encryption SDK

In this section, you will add client-side encryption to the Busy Engineer's Document Bucket using the AWS Encryption SDK and AWS KMS.

Background

In Getting Started, you set up your Busy Engineer's Document Bucket environment and selected a workshop language.

Now you will add the AWS Encryption SDK to encrypt objects on the client, before they are transmitted off of the host machine to the internet. You will use AWS KMS to provide a data key for each object, using a KMS Key that you set up in Getting Started.

Let's Go!

Starting Directory

Make sure you are in the exercises directory for the language of your choice:

1
cd ~/environment/workshop/exercises/java/add-esdk-start
1
cd ~/environment/workshop/exercises/node-typescript/add-esdk-start
1
cd ~/environment/workshop/exercises/node-javascript/add-esdk-start
1
cd ~/environment/workshop/exercises/python/add-esdk-start

Step 1: Add the ESDK Dependency

Look for ADD-ESDK-START comments in the code to help orient yourself.

Start by adding the Encryption SDK dependency to the code.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
// Edit ./src/main/java/sfw/example/esdkworkshop/Api.java
package sfw.example.esdkworkshop;

// ADD-ESDK-START: Add the ESDK Dependency
import com.amazonaws.encryptionsdk.AwsCrypto;
import com.amazonaws.encryptionsdk.CommitmentPolicy;
import com.amazonaws.encryptionsdk.CryptoResult;
import com.amazonaws.encryptionsdk.MasterKey;
import com.amazonaws.encryptionsdk.MasterKeyProvider;
import com.amazonaws.encryptionsdk.kms.KmsMasterKey;

...
  private final String tableName;
  private final String bucketName;
  // ADD-ESDK-START: Add the ESDK Dependency
  private final AwsCrypto awsEncryptionSdk;
  private final MasterKeyProvider mkp;

...

public Api(
    // ADD-ESDK-START: Add the ESDK Dependency
    AmazonDynamoDB ddbClient,
    String tableName,
    AmazonS3 s3Client,
    String bucketName,
    MasterKeyProvider<? extends MasterKey> mkp) {
  this.ddbClient = ddbClient;
  this.tableName = tableName;
  this.s3Client = s3Client
  // ADD-ESDK-START: Add the ESDK Dependency
  this.awsEncryptionSdk = AwsCrypto.builder()
      .withCommitmentPolicy(CommitmentPolicy.ForbidEncryptAllowDecrypt)
      .build();
  this.mkp = mkp;
}

// Save and close.
// Edit ./src/main/java/sfw/example/esdkworkshop/App.java
package sfw.example.esdkworkshop;

// ADD-ESDK-START: Add the ESDK Dependency
import com.amazonaws.encryptionsdk.kms.KmsMasterKeyProvider;
// Save and close.
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
// Edit ./src/store.ts

// ADD-ESDK-START: Add the ESDK Dependency
import { KmsKeyringNode, buildClient, CommitmentPolicy } from "@aws-crypto/client-node";
const { encryptStream } = buildClient(
    CommitmentPolicy.REQUIRE_ENCRYPT_REQUIRE_DECRYPT
)

// Save and exit

// Edit ./src/retrieve.ts

// ADD-ESDK-START: Add the ESDK Dependency
import { KmsKeyringNode, buildClient, CommitmentPolicy } from "@aws-crypto/client-node";
const { decryptStream } = buildClient(
    CommitmentPolicy.REQUIRE_ENCRYPT_REQUIRE_DECRYPT
)

// Save and exit
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
// Edit ./store.js

// ADD-ESDK-START: Add the ESDK Dependency
const { KmsKeyringNode, buildClient, CommitmentPolicy } = require("@aws-crypto/client-node");
const { encryptStream } = buildClient(
    CommitmentPolicy.REQUIRE_ENCRYPT_REQUIRE_DECRYPT
)

// Save and exit

// Edit ./retrieve.js

// ADD-ESDK-START: Add the ESDK Dependency
const { KmsKeyringNode, buildClient, CommitmentPolicy } = require("@aws-crypto/client-node");
const { decryptStream } = buildClient(
    CommitmentPolicy.REQUIRE_ENCRYPT_REQUIRE_DECRYPT
)

// Save and exit
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
# Edit src/document_bucket/__init__.py

# ADD-ESDK-START: Add the ESDK Dependency
import aws_encryption_sdk

# Save and exit
# Edit src/document_bucket/api.py

# ADD-ESDK-START: Add the ESDK Dependency
import aws_encryption_sdk
from aws_encryption_sdk import StrictAwsKmsMasterKeyProvider  # type: ignore
from aws_encryption_sdk.identifiers import CommitmentPolicy

# Add a Master Key Provider to your __init__
# ADD-ESDK-START: Add the ESDK Dependency
def __init__(self, bucket, table, master_key_provider: StrictAwsKmsMasterKeyProvider):
    self.bucket = bucket
    self.table = table
    # ADD-ESDK-START: Add the ESDK Dependency
    self.master_key_provider : StrictAwsKmsMasterKeyProvider = master_key_provider

# Save and exit

What Happened?

  1. You added a dependency on the AWS Encryption SDK library in your code
  2. (Java and Python) You changed the API to expect that a Keyring or Master Key Provider will be passed to your code to use in store and retrieve operations

Step 2: Add Encryption to store

Now that you have the AWS Encryption SDK imported, start encrypting your data before storing it.

1
2
3
4
5
6
7
8
// Edit ./src/main/java/sfw/example/esdkworkshop/Api.java
public PointerItem store(byte[] data, Map<String, String> context) {
    // ADD-ESDK-START: Add Encryption to store
    CryptoResult<byte[], KmsMasterKey> encryptedMessage = awsEncryptionSdk.encryptData(mkp, data);
    DocumentBundle bundle =
        DocumentBundle.fromDataAndContext(encryptedMessage.getResult(), context);
    writeItem(bundle.getPointer());
    ...
1
2
3
4
5
6
// Edit ./src/store.ts

// ADD-ESDK-START: Add Encryption to store
const Body = fileStream.pipe(encryptStream(encryptKeyring));

// Save and exit
1
2
3
4
5
6
// Edit ./store.js

// ADD-ESDK-START: Add Encryption to store
const Body = fileStream.pipe(encryptStream(encryptKeyring));

// Save and exit
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
# Edit src/document_bucket/api.py
# Find the store function and edit it to add the Master Key Provider
# and to write the encrypted data
    # ADD-ESDK-START: Add Encryption to store
    client = aws_encryption_sdk.EncryptionSDKClient(
        commitment_policy=CommitmentPolicy.REQUIRE_ENCRYPT_REQUIRE_DECRYPT
    )
    encrypted_data, header = client.encrypt(
        source=data,
        key_provider=self.master_key_provider,
    )
    ...
    self._write_object(encrypted_data, item)

What Happened?

The application will use the AWS Encryption SDK to encrypt your data client-side under a KMS Key before storing it by:

  1. Requesting a new data key using your Keyring or Master Key Provider
  2. Encrypting your data with the returned data key
  3. Returning the AWS Encryption SDK formatted encrypted message.
  4. Passing the encrypted message to the AWS S3 SDK for storage in S3

Step 3: Add Decryption to retrieve

Now that the application encypts your data before storing it, it will need to decrypt your data before returning it to the caller (at least for the data to be useful, anyway).

1
2
3
4
5
6
7
8
// Edit ./src/main/java/sfw/example/esdkworkshop/Api.java
// Find retrieve(...)
    byte[] data = getObjectData(key);
    // ADD-ESDK-START: Add Decryption to retrieve
    CryptoResult<byte[], KmsMasterKey> decryptedMessage = awsEncryptionSdk.decryptData(mkp, data);
    PointerItem pointer = getPointerItem(key);
    // ADD-ESDK-START: Add Decryption to retrieve
    return DocumentBundle.fromDataAndPointer(decryptedMessage.getResult(), pointer);
1
2
3
4
5
6
7
8
9
// Edit ./src/retrieve.ts

// ADD-ESDK-START: Add Decryption to retrieve
return s3
    .getObject({ Bucket, Key })
    .createReadStream()
    .pipe(decryptStream(decryptKeyring));

// Save and Exit
1
2
3
4
5
6
7
8
9
// Edit ./retrieve.js

// ADD-ESDK-START: Add Decryption to retrieve
return s3
    .getObject({ Bucket, Key })
    .createReadStream()
    .pipe(decryptStream(decryptKeyring));

// Save and Exit
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
# Edit src/document_bucket/api.py
# Find the retrieve function and edit it to add a call to decrypt the
# encrypted data before returning it
        item = self._get_pointer_item(PointerQuery.from_key(pointer_key))
        # ADD-ESDK-START: Add Decryption to retrieve
        encrypted_data = self._get_object(item)
        client = aws_encryption_sdk.EncryptionSDKClient(
            commitment_policy=CommitmentPolicy.REQUIRE_ENCRYPT_REQUIRE_DECRYPT
        )
        plaintext, header = client.decrypt(
            source=encrypted_data, key_provider=self.master_key_provider
        )
        return DocumentBundle.from_data_and_context(
            plaintext, item.context
        )

# Save and exit

What Happened?

The application now decrypts data client-side, as well.

The data returned from S3 for retrieve is encrypted. Before returning that data to the user, you added a call to the AWS Encryption SDK to decrypt the data. Under the hood, the Encryption SDK is:

  1. Reading the AWS Encryption SDK formatted encrypted message
  2. Calling KMS to request to decrypt your encrypted message's encrypted data key using the Faythe KMS Key
  3. Using the decrypted data key to decrypt the encrypted message
  4. Returning the plaintext and Encryption SDK headers to you

Step 4: Configure the Faythe KMS Key in the Encryption SDK

Now that you have declared your dependencies and updated your code to encrypt and decrypt data, the final step is to pass through the configuration to the AWS Encryption SDK to start using your KMS Keys to protect your data.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
// Edit ./src/main/java/sfw/example/esdkworkshop/App.java
    AmazonS3 s3Client = AmazonS3ClientBuilder.defaultClient();

    // ADD-ESDK-START: Configure the Faythe KMS Key in the Encryption SDK
    // Load configuration of KMS resources
    String faytheKmsKey = stateConfig.contents.state.FaytheKmsKey;

    // Set up the Master Key Provider to use KMS
    KmsMasterKeyProvider mkp = KmsMasterKeyProvider.builder().buildStrict(faytheKmsKey);

    return new Api(ddbClient, tableName, s3Client, bucketName, mkp);
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
// Edit ./src/store.ts

// ADD-ESDK-START: Configure the Faythe KMS Key in the Encryption SDK
const faytheKmsKey = config.state.getFaytheKmsKey();
const encryptKeyring = new KmsKeyringNode({
generatorKeyId: faytheKmsKey
});

// Save and exit

// Edit ./src/retrieve.ts

// ADD-ESDK-START: Set up a keyring to use Faythe's KMS Key for decrypting.
const faytheKmsKey = config.state.getFaytheKmsKey();
const decryptKeyring = new KmsKeyringNode({ keyIds: [faytheKmsKey] });

// Save and exit
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
// Edit ./store.js

// ADD-ESDK-START: Configure the Faythe KMS Key in the Encryption SDK
const faytheKmsKey = config.state.getFaytheKmsKey();
const encryptKeyring = new KmsKeyringNode({
generatorKeyId: faytheKmsKey
});

// Save and exit

// Edit ./retrieve.js

// ADD-ESDK-START: Set up a keyring to use Faythe's KMS Key for decrypting.
const faytheKmsKey = config.state.getFaytheKmsKey();
const decryptKeyring = new KmsKeyringNode({ keyIds: [faytheKmsKey] });

// Save and exit
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
# Edit src/document_bucket/__init__.py

    ...

    # ADD-ESDK-START: Configure the Faythe KMS Key in the Encryption SDK
    # Pull configuration of KMS resources
    faythe_kms_key = state["FaytheKmsKey"]
    # And the Master Key Provider configuring how to use KMS
    kms_key = [faythe_kms_key]
    mkp = aws_encryption_sdk.StrictAwsKmsMasterKeyProvider(key_ids=kms_key)

    operations = DocumentBucketOperations(bucket, table, mkp)

# Save and exit

What Happened?

In Getting Started, you launched CloudFormation stacks for KMS Keys. One of these KMS Keys was nicknamed Faythe. As part of launching these templates, the KMS Key's Amazon Resource Name (ARN) was written to a configuration file on disk, the state variable that is loaded and parsed.

Now Faythe's ARN is pulled into a variable, and used to initialize a Keyring or Master Key Provider that will use the Faythe KMS Key. That new Keyring/Master Key Provider is passed into your API, and you are set to start encrypting and decrypting with KMS and the Encryption SDK.

Checking Your Work

Want to check your progress, or compare what you've done versus a finished example?

Check out the code in one of the -complete folders to compare.

1
cd ~/environment/workshop/exercises/java/add-esdk-complete
1
cd ~/environment/workshop/exercises/node-typescript/add-esdk-complete
1
cd ~/environment/workshop/exercises/node-javascript/add-esdk-complete
1
cd ~/environment/workshop/exercises/python/add-esdk-complete

Try it Out

Now that the code is written, let's load it up and try it out.

If you'd like to try a finished example, use your language's -complete directory as described above.

Experiment using the API as much as you like.

To get started, here are some things to try:

For more things to try, check out Explore Further, below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
// Compile your code
mvn compile

// To use the API programmatically, use this target to launch jshell
mvn jshell:run
/open startup.jsh
Api documentBucket = App.initializeDocumentBucket();
documentBucket.list();
documentBucket.store("Store me in the Document Bucket!".getBytes());
for (PointerItem item : documentBucket.list()) {
    DocumentBundle document = documentBucket.retrieve(item.partitionKey().getS());
    System.out.println(document.getPointer().partitionKey().getS() + " : " + new String(document.getData(), java.nio.charset.StandardCharsets.UTF_8));
}
// Ctrl+D to exit jshell

// Or, to run logic that you write in App.java, use this target after compile
mvn exec:java
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
node
list = require("./list.js")
store = require("./store.js")
retrieve = require("./retrieve")
list().then(console.log)
store(fs.createReadStream("./store.js")).then(r => {
// Just storing the s3 key
key = r.Key
console.log(r)
})
list().then(console.log)
(() => {retrieve(key).pipe(process.stdout)})()
// Ctrl-D when finished to exit the REPL
1
2
3
4
5
6
./cli.js list
./cli.js store ./store.js
# Note the "Key" value
./cli.js list
# Note the "reference" value
./cli.js retrieve $KeyOrReferenceValue
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
node -r ts-node/register
;({list} = require("./src/list.ts"))
;({store} = require("./src/store.ts"))
;({retrieve} = require("./src/retrieve.ts"))
list().then(console.log)
store(fs.createReadStream("./src/store.ts")).then(r => {
// Just storing the s3 key
key = r.Key
console.log(r)
})
list().then(console.log)
(() => {retrieve(key).pipe(process.stdout)})()
// Ctrl-D when finished to exit the REPL
1
2
3
4
5
6
./cli.ts list
./cli.ts store ./src/store.ts
# Note the "Key" value
./cli.ts list
# Note the "reference" value
./cli.ts retrieve $KeyOrReferenceValue
1
2
3
4
5
6
7
8
tox -e repl
import document_bucket
ops = document_bucket.initialize()
ops.list()
item = ops.store(b'some data')
ops.list()
ops.retrieve(item.partition_key)
# Ctrl-D when finished to exit the REPL

Explore Further

  • AWS Cloud Development Kit - Check out the ~/environment/workshop/cdk directory to see how the workshop resources are described using CDK.
  • Alice, Bob, and Friends - Who are Faythe and Walter?
  • Leveraging the Message Format - The AWS Encryption SDK Message Format is an open standard. Can you write something to detect whether an entry in the Document Bucket has been encrypted in this format or not, and retrieve or decrypt appropriately?
  • More Test Content - Small test strings are enough to get started, but you might be curious to see what the behavior and performance looks like with larger documents. What if you add support for loading files to and from disk to the Document Bucket?
  • Configuration Glue - If you are curious how the Document Bucket is configured, take a peek at ~/environment/workshop/cdk/Makefile and the make state target, as well as config.toml in the exercises root ~/environment/workshop/exercises/config.toml. The Busy Engineer's Document Bucket uses a base TOML file to set standard names for all CloudFormation resources and a common place to discover the real deployed set. Then it uses the AWS Cloud Development Kit (CDK) to deploy the resources and write out their identifiers to the state file. Applications use the base TOML file config.toml to locate the state file and pull the expected resource names. And that's how the system bootstraps all the resources it needs!

Next exercise

Now that you are encrypting and decrypting, how about adding Multiple KMS Keys?