com.mongodb.reactivestreams.client.vault.ClientEncryption Maven / Gradle / Ivy
Show all versions of mongodb-driver-reactivestreams Show documentation
/*
* Copyright 2008-present MongoDB, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.mongodb.reactivestreams.client.vault;
import com.mongodb.AutoEncryptionSettings;
import com.mongodb.MongoUpdatedEncryptedFieldsException;
import com.mongodb.annotations.Beta;
import com.mongodb.client.model.CreateCollectionOptions;
import com.mongodb.client.model.CreateEncryptedCollectionParams;
import com.mongodb.client.model.vault.DataKeyOptions;
import com.mongodb.client.model.vault.EncryptOptions;
import com.mongodb.client.model.vault.RewrapManyDataKeyOptions;
import com.mongodb.client.model.vault.RewrapManyDataKeyResult;
import com.mongodb.client.result.DeleteResult;
import com.mongodb.lang.Nullable;
import com.mongodb.reactivestreams.client.FindPublisher;
import com.mongodb.reactivestreams.client.MongoDatabase;
import org.bson.BsonBinary;
import org.bson.BsonDocument;
import org.bson.BsonValue;
import org.bson.conversions.Bson;
import org.reactivestreams.Publisher;
import java.io.Closeable;
/**
* The Key vault.
*
* Used to create data encryption keys, and to explicitly encrypt and decrypt values when auto-encryption is not an option.
*
* @since 1.12
*/
public interface ClientEncryption extends Closeable {
/**
* Create a data key with the given KMS provider.
*
*
* Creates a new key document and inserts into the key vault collection.
*
*
* @param kmsProvider the KMS provider
* @return a Publisher containing the identifier for the created data key
*/
Publisher createDataKey(String kmsProvider);
/**
* Create a data key with the given KMS provider and options.
*
*
* Creates a new key document and inserts into the key vault collection.
*
*
* @param kmsProvider the KMS provider
* @param dataKeyOptions the options for data key creation
* @return a Publisher containing the identifier for the created data key
*/
Publisher createDataKey(String kmsProvider, DataKeyOptions dataKeyOptions);
/**
* Encrypt the given value with the given options.
*
* The driver may throw an exception for prohibited BSON value types
*
*
* @param value the value to encrypt
* @param options the options for data encryption
* @return a Publisher containing the encrypted value, a BSON binary of subtype 6
*/
Publisher encrypt(BsonValue value, EncryptOptions options);
/**
* Encrypts a Match Expression or Aggregate Expression to query a range index.
*
* The expression is expected to be in one of the following forms:
*
* - A Match Expression of this form:
* {@code {$and: [{
: {$gt: }}, {: {$lt: }}]}}
*
* - An Aggregate Expression of this form:
* {@code {$and: [{$gt: [
, ]}, {$lt: [, ]}] }}
*
*
* {@code $gt} may also be {@code $gte}. {@code $lt} may also be {@code $lte}.
*
* Only supported when queryType is "rangePreview" and algorithm is "RangePreview".
*
Note: The Range algorithm is experimental only. It is not intended for public use. It is subject to breaking changes.
*
* @param expression the Match Expression or Aggregate Expression
* @param options the options
* @return a Publisher containing the queryable encrypted range expression
* @since 4.9
* @mongodb.server.release 6.2
* @mongodb.driver.manual /core/queryable-encryption/ queryable encryption
* @mongodb.driver.manual reference/operator/aggregation/match/ $match
*/
@Beta(Beta.Reason.SERVER)
Publisher encryptExpression(Bson expression, EncryptOptions options);
/**
* Decrypt the given value.
*
* @param value the value to decrypt, which must be of subtype 6
* @return a Publisher containing the decrypted value
*/
Publisher decrypt(BsonBinary value);
/**
* Removes the key document with the given data key from the key vault collection.
* @param id the data key UUID (BSON binary subtype 0x04)
* @return a Publisher containing the delete result
* @since 4.7
*/
Publisher deleteKey(BsonBinary id);
/**
* Finds a single key document with the given UUID (BSON binary subtype 0x04).
*
* @param id the data key UUID (BSON binary subtype 0x04)
* @return a Publisher containing the single key document or an empty publisher if there is no match
* @since 4.7
*/
@Nullable
Publisher getKey(BsonBinary id);
/**
* Finds all documents in the key vault collection.
* @return a find publisher for the documents in the key vault collection
* @since 4.7
*/
FindPublisher getKeys();
/**
* Adds a keyAltName to the keyAltNames array of the key document in the key vault collection with the given UUID.
*
* @param id the data key UUID (BSON binary subtype 0x04)
* @param keyAltName the alternative key name to add to the keyAltNames array
* @return a Publisher containing the previous version of the key document or an empty publisher if no match
* @since 4.7
*/
Publisher addKeyAltName(BsonBinary id, String keyAltName);
/**
* Removes a keyAltName from the keyAltNames array of the key document in the key vault collection with the given id.
*
* @param id the data key UUID (BSON binary subtype 0x04)
* @param keyAltName the alternative key name
* @return a Publisher containing the previous version of the key document or an empty publisher if there is no match
* @since 4.7
*/
Publisher removeKeyAltName(BsonBinary id, String keyAltName);
/**
* Returns a key document in the key vault collection with the given keyAltName.
*
* @param keyAltName the alternative key name
* @return a Publisher containing the matching key document or an empty publisher if there is no match
* @since 4.7
*/
Publisher getKeyByAltName(String keyAltName);
/**
* Decrypts multiple data keys and (re-)encrypts them with the current masterKey.
*
* @param filter the filter
* @return a Publisher containing the result
* @since 4.7
*/
Publisher rewrapManyDataKey(Bson filter);
/**
* Decrypts multiple data keys and (re-)encrypts them with a new masterKey, or with their current masterKey if a new one is not given.
*
* @param filter the filter
* @param options the options
* @return a Publisher containing the result
* @since 4.7
*/
Publisher rewrapManyDataKey(Bson filter, RewrapManyDataKeyOptions options);
/**
* {@linkplain MongoDatabase#createCollection(String, CreateCollectionOptions) Create} a new collection with encrypted fields,
* automatically {@linkplain #createDataKey(String, DataKeyOptions) creating}
* new data encryption keys when needed based on the configured
* {@link CreateCollectionOptions#getEncryptedFields() encryptedFields}, which must be specified.
* This method does not modify the configured {@code encryptedFields} when creating new data keys,
* instead it creates a new configuration if needed.
*
* @param database The database to use for creating the collection.
* @param collectionName The name for the collection to create.
* @param createCollectionOptions Options for creating the collection.
* @param createEncryptedCollectionParams Auxiliary parameters for creating an encrypted collection.
* @return A publisher of the (potentially updated) {@code encryptedFields} configuration that was used to create the
* collection. A user may use this document to configure {@link AutoEncryptionSettings#getEncryptedFieldsMap()}.
*
* {@linkplain org.reactivestreams.Subscriber#onError(Throwable) Signals} {@link MongoUpdatedEncryptedFieldsException}
* if an exception happens after creating at least one data key. This exception makes the updated {@code encryptedFields}
* {@linkplain MongoUpdatedEncryptedFieldsException#getEncryptedFields() available} to the caller.
*
* @since 4.9
* @mongodb.server.release 7.0
* @mongodb.driver.manual reference/command/create Create Command
*/
Publisher createEncryptedCollection(MongoDatabase database, String collectionName,
CreateCollectionOptions createCollectionOptions, CreateEncryptedCollectionParams createEncryptedCollectionParams);
@Override
void close();
}