Skip to content

docs(NODE-5423): export all public FLE types and classes #3794

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Aug 8, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 2 additions & 6 deletions src/client-side-encryption/auto_encrypter.ts
Original file line number Diff line number Diff line change
Expand Up @@ -14,11 +14,7 @@ import * as cryptoCallbacks from './crypto_callbacks';
import { MongoCryptInvalidArgumentError } from './errors';
import { MongocryptdManager } from './mongocryptd_manager';
import { type KMSProviders, refreshKMSCredentials } from './providers';
import {
type CSFLEKMSTlsOptions,
StateMachine,
type StateMachineExecutable
} from './state_machine';
import { type CSFLEKMSTlsOptions, StateMachine } from './state_machine';

/** @public */
export interface AutoEncryptionOptions {
Expand Down Expand Up @@ -229,7 +225,7 @@ const kDecoratedKeys = Symbol.for('@@mdb.decryptedKeys');
* @internal An internal class to be used by the driver for auto encryption
* **NOTE**: Not meant to be instantiated directly, this is for internal use only.
*/
export class AutoEncrypter implements StateMachineExecutable {
export class AutoEncrypter {
_client: MongoClient;
_bypassEncryption: boolean;
_keyVaultNamespace: string;
Expand Down
68 changes: 49 additions & 19 deletions src/client-side-encryption/client_encryption.ts
Original file line number Diff line number Diff line change
Expand Up @@ -24,14 +24,15 @@ import {
MongoCryptCreateEncryptedCollectionError,
MongoCryptInvalidArgumentError
} from './errors';
import { type KMSProvider, type KMSProviders, refreshKMSCredentials } from './providers/index';
import {
type CSFLEKMSTlsOptions,
StateMachine,
type StateMachineExecutable
} from './state_machine';
type ClientEncryptionDataKeyProvider,
type KMSProviders,
refreshKMSCredentials
} from './providers/index';
import { type CSFLEKMSTlsOptions, StateMachine } from './state_machine';

/**
* @public
* The schema for a DataKey in the key vault collection.
*/
export interface DataKey {
Expand All @@ -46,14 +47,21 @@ export interface DataKey {
}

/**
* @public
* The public interface for explicit in-use encryption
*/
export class ClientEncryption implements StateMachineExecutable {
export class ClientEncryption {
/** @internal */
_client: MongoClient;
/** @internal */
_keyVaultNamespace: string;
/** @internal */
_keyVaultClient: MongoClient;
/** @internal */
_proxyOptions: ProxyOptions;
/** @internal */
_tlsOptions: CSFLEKMSTlsOptions;
/** @internal */
_kmsProviders: KMSProviders;

/** @internal */
Expand Down Expand Up @@ -165,7 +173,7 @@ export class ClientEncryption implements StateMachineExecutable {
* ```
*/
createDataKey(
provider: KMSProvider,
provider: ClientEncryptionDataKeyProvider,
options?: ClientEncryptionCreateDataKeyProviderOptions,
callback?: Callback<DataKey>
) {
Expand Down Expand Up @@ -268,7 +276,10 @@ export class ClientEncryption implements StateMachineExecutable {
* }
* ```
*/
async rewrapManyDataKey(filter: Filter<DataKey>, options: RewrapManyDataKeyOptions) {
async rewrapManyDataKey(
filter: Filter<DataKey>,
options: ClientEncryptionRewrapManyDataKeyProviderOptions
) {
let keyEncryptionKeyBson = undefined;
if (options) {
const keyEncryptionKey = Object.assign({ provider: options.provider }, options.masterKey);
Expand Down Expand Up @@ -533,7 +544,7 @@ export class ClientEncryption implements StateMachineExecutable {
db: Db,
name: string,
options: {
provider: KMSProvider;
provider: ClientEncryptionDataKeyProvider;
createCollectionOptions: Omit<CreateCollectionOptions, 'encryptedFields'> & {
encryptedFields: Document;
};
Expand Down Expand Up @@ -569,7 +580,7 @@ export class ClientEncryption implements StateMachineExecutable {
(result): result is PromiseRejectedResult => result.status === 'rejected'
);
if (rejection != null) {
throw new MongoCryptCreateDataKeyError({ encryptedFields, cause: rejection.reason });
throw new MongoCryptCreateDataKeyError(encryptedFields, { cause: rejection.reason });
}
}

Expand All @@ -580,7 +591,7 @@ export class ClientEncryption implements StateMachineExecutable {
});
return { collection, encryptedFields };
} catch (cause) {
throw new MongoCryptCreateEncryptedCollectionError({ encryptedFields, cause });
throw new MongoCryptCreateEncryptedCollectionError(encryptedFields, { cause });
}
}

Expand Down Expand Up @@ -703,6 +714,7 @@ export class ClientEncryption implements StateMachineExecutable {
}

/**
* @internal
* Ask the user for KMS credentials.
*
* This returns anything that looks like the kmsProviders original input
Expand All @@ -718,6 +730,7 @@ export class ClientEncryption implements StateMachineExecutable {
}

/**
* @internal
* A helper that perform explicit encryption of values and expressions.
* Explicitly encrypt a provided value. Note that either `options.keyId` or `options.keyAltName` must
* be specified. Specifying both `options.keyId` and `options.keyAltName` is considered an error.
Expand Down Expand Up @@ -780,6 +793,7 @@ export class ClientEncryption implements StateMachineExecutable {
}

/**
* @public
* Options to provide when encrypting data.
*/
export interface ClientEncryptionEncryptOptions {
Expand Down Expand Up @@ -817,9 +831,12 @@ export interface ClientEncryptionEncryptOptions {
rangeOptions?: RangeOptions;
}

/** @experimental */
export interface RewrapManyDataKeyOptions {
provider: KMSProvider;
/**
* @public
* @experimental
*/
export interface ClientEncryptionRewrapManyDataKeyProviderOptions {
provider: ClientEncryptionDataKeyProvider;
masterKey?:
| AWSEncryptionKeyOptions
| AzureEncryptionKeyOptions
Expand All @@ -828,6 +845,7 @@ export interface RewrapManyDataKeyOptions {
}

/**
* @public
* Additional settings to provide when creating a new `ClientEncryption` instance.
*/
export interface ClientEncryptionOptions {
Expand Down Expand Up @@ -858,6 +876,7 @@ export interface ClientEncryptionOptions {
}

/**
* @public
* Configuration options for making an AWS encryption key
*/
export interface AWSEncryptionKeyOptions {
Expand All @@ -878,6 +897,7 @@ export interface AWSEncryptionKeyOptions {
}

/**
* @public
* Configuration options for making an AWS encryption key
*/
export interface GCPEncryptionKeyOptions {
Expand Down Expand Up @@ -913,6 +933,7 @@ export interface GCPEncryptionKeyOptions {
}

/**
* @public
* Configuration options for making an Azure encryption key
*/
export interface AzureEncryptionKeyOptions {
Expand All @@ -933,6 +954,7 @@ export interface AzureEncryptionKeyOptions {
}

/**
* @public
* Options to provide when creating a new data key.
*/
export interface ClientEncryptionCreateDataKeyProviderOptions {
Expand All @@ -955,35 +977,43 @@ export interface ClientEncryptionCreateDataKeyProviderOptions {
keyMaterial?: Buffer | Binary;
}

/** @experimental */
export interface RewrapManyDataKeyOptions {
provider: KMSProvider;
/**
* @public
* @experimental
*/
export interface ClientEncryptionRewrapManyDataKeyProviderOptions {
provider: ClientEncryptionDataKeyProvider;
masterKey?:
| AWSEncryptionKeyOptions
| AzureEncryptionKeyOptions
| GCPEncryptionKeyOptions
| undefined;
}

/** @experimental */
/**
* @public
* @experimental
*/
export interface ClientEncryptionRewrapManyDataKeyResult {
/** The result of rewrapping data keys. If unset, no keys matched the filter. */
bulkWriteResult?: BulkWriteResult;
}

/**
* @public
* RangeOptions specifies index options for a Queryable Encryption field supporting "rangePreview" queries.
* min, max, sparsity, and range must match the values set in the encryptedFields of the destination collection.
* For double and decimal128, min/max/precision must all be set, or all be unset.
*/
interface RangeOptions {
export interface RangeOptions {
min?: any;
max?: any;
sparsity: Long;
precision?: number;
}

/**
* @public
* Options to provide when encrypting data.
*/
export interface ClientEncryptionEncryptOptions {
Expand Down
4 changes: 2 additions & 2 deletions src/client-side-encryption/errors.ts
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ export class MongoCryptInvalidArgumentError extends MongoCryptError {
export class MongoCryptCreateDataKeyError extends MongoCryptError {
encryptedFields: Document;
/** @internal */
constructor({ encryptedFields, cause }: { encryptedFields: Document; cause: Error }) {
constructor(encryptedFields: Document, { cause }: { cause: Error }) {
super(`Unable to complete creating data keys: ${cause.message}`, { cause });
this.encryptedFields = encryptedFields;
}
Expand All @@ -54,7 +54,7 @@ export class MongoCryptCreateDataKeyError extends MongoCryptError {
export class MongoCryptCreateEncryptedCollectionError extends MongoCryptError {
encryptedFields: Document;
/** @internal */
constructor({ encryptedFields, cause }: { encryptedFields: Document; cause: Error }) {
constructor(encryptedFields: Document, { cause }: { cause: Error }) {
super(`Unable to create collection: ${cause.message}`, { cause });
this.encryptedFields = encryptedFields;
}
Expand Down
7 changes: 5 additions & 2 deletions src/client-side-encryption/providers/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ import { loadGCPCredentials } from './gcp';
/**
* @public
*/
export type KMSProvider = 'aws' | 'azure' | 'gcp' | 'local';
export type ClientEncryptionDataKeyProvider = 'aws' | 'azure' | 'gcp' | 'local' | 'kmip';

/**
* @public
Expand Down Expand Up @@ -132,7 +132,10 @@ export interface KMSProviders {
*
* @internal - exposed for testing purposes only
*/
export function isEmptyCredentials(providerName: KMSProvider, kmsProviders: KMSProviders): boolean {
export function isEmptyCredentials(
providerName: ClientEncryptionDataKeyProvider,
kmsProviders: KMSProviders
): boolean {
const provider = kmsProviders[providerName];
if (provider == null) {
return false;
Expand Down
27 changes: 16 additions & 11 deletions src/client-side-encryption/state_machine.ts
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ import { BufferPool, type Callback, MongoDBCollectionNamespace } from '../utils'
import { type DataKey } from './client_encryption';
import { MongoCryptError } from './errors';
import { type MongocryptdManager } from './mongocryptd_manager';
import { type KMSProvider, type KMSProviders } from './providers';
import { type ClientEncryptionDataKeyProvider, type KMSProviders } from './providers';

let socks: SocksLib | null = null;
function loadSocks(): SocksLib {
Expand Down Expand Up @@ -97,19 +97,21 @@ declare module 'mongodb-client-encryption' {
* - tlsAllowInvalidCertificates
* - tlsAllowInvalidHostnames
* - tlsInsecure
*
* These options are not included in the type, and are ignored if provided.
*/
export type CSFLETlsOptions = Pick<
export type ClientEncryptionTlsOptions = Pick<
MongoClientOptions,
'tlsCAFile' | 'tlsCertificateKeyFile' | 'tlsCertificateKeyFilePassword'
>;

/** @public */
export type CSFLEKMSTlsOptions = {
aws?: CSFLETlsOptions;
gcp?: CSFLETlsOptions;
kmip?: CSFLETlsOptions;
local?: CSFLETlsOptions;
azure?: CSFLETlsOptions;
aws?: ClientEncryptionTlsOptions;
gcp?: ClientEncryptionTlsOptions;
kmip?: ClientEncryptionTlsOptions;
local?: ClientEncryptionTlsOptions;
azure?: ClientEncryptionTlsOptions;
};

/**
Expand All @@ -122,14 +124,14 @@ export type CSFLEKMSTlsOptions = {
export interface StateMachineExecutable {
_keyVaultNamespace: string;
_keyVaultClient: MongoClient;
askForKMSCredentials: () => Promise<KMSProviders>;

/** only used for auto encryption */
_metaDataClient?: MongoClient;
/** only used for auto encryption */
_mongocryptdClient?: MongoClient;
/** only used for auto encryption */
_mongocryptdManager?: MongocryptdManager;
askForKMSCredentials: () => Promise<KMSProviders>;
}

export type StateMachineOptions = {
Expand Down Expand Up @@ -402,7 +404,7 @@ export class StateMachine {

const tlsOptions = this.options.tlsOptions;
if (tlsOptions) {
const kmsProvider = request.kmsProvider as KMSProvider;
const kmsProvider = request.kmsProvider as ClientEncryptionDataKeyProvider;
const providerTlsOptions = tlsOptions[kmsProvider];
if (providerTlsOptions) {
const error = this.validateTlsOptions(kmsProvider, providerTlsOptions);
Expand Down Expand Up @@ -441,7 +443,10 @@ export class StateMachine {
*
* @returns An error if any option is invalid.
*/
validateTlsOptions(kmsProvider: string, tlsOptions: CSFLETlsOptions): MongoCryptError | void {
validateTlsOptions(
kmsProvider: string,
tlsOptions: ClientEncryptionTlsOptions
): MongoCryptError | void {
const tlsOptionNames = Object.keys(tlsOptions);
for (const option of INSECURE_TLS_OPTIONS) {
if (tlsOptionNames.includes(option)) {
Expand All @@ -456,7 +461,7 @@ export class StateMachine {
* @param tlsOptions - The client TLS options for the provider.
* @param options - The existing connection options.
*/
setTlsOptions(tlsOptions: CSFLETlsOptions, options: tls.ConnectionOptions) {
setTlsOptions(tlsOptions: ClientEncryptionTlsOptions, options: tls.ConnectionOptions) {
if (tlsOptions.tlsCertificateKeyFile) {
const cert = fs.readFileSync(tlsOptions.tlsCertificateKeyFile);
options.cert = options.key = cert;
Expand Down
Loading