Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CLDSRV-559 AWS KMS backend + account level encryption key #5682

Merged
merged 6 commits into from
Oct 9, 2024

Conversation

nicolas2bert
Copy link
Contributor

  • Introduce a new KMS backend that supports the AWS KMS protocol.
  • Implement a more efficient approach to managing default encryption keys. Instead of creating a master encryption key per bucket, a single default master encryption key is associated with the account. This simplifies key management. The default key id will be stored in the account metadata.

Add configuration mechanism for the new AWS KMS connector.
Depends on changes in Arsenal to have support of this new connector.
available

Up to now, the datakey was always generated using a locally generated
random number.
This commit allow to use the "generateDataKey" operation of a KMS when
it is implemented. It fallback to random number generation if not
available.
The benefit of generating the datakey in the KMS is a better entropy
source resulting in a "better" datakey.
@bert-e
Copy link
Contributor

bert-e commented Sep 26, 2024

Hello nicolas2bert,

My role is to assist you with the merge of this
pull request. Please type @bert-e help to get information
on this process, or consult the user documentation.

Available options
name description privileged authored
/after_pull_request Wait for the given pull request id to be merged before continuing with the current one.
/bypass_author_approval Bypass the pull request author's approval
/bypass_build_status Bypass the build and test status
/bypass_commit_size Bypass the check on the size of the changeset TBA
/bypass_incompatible_branch Bypass the check on the source branch prefix
/bypass_jira_check Bypass the Jira issue check
/bypass_peer_approval Bypass the pull request peers' approval
/bypass_leader_approval Bypass the pull request leaders' approval
/approve Instruct Bert-E that the author has approved the pull request. ✍️
/create_pull_requests Allow the creation of integration pull requests.
/create_integration_branches Allow the creation of integration branches.
/no_octopus Prevent Wall-E from doing any octopus merge and use multiple consecutive merge instead
/unanimity Change review acceptance criteria from one reviewer at least to all reviewers
/wait Instruct Bert-E not to run until further notice.
Available commands
name description privileged
/help Print Bert-E's manual in the pull request.
/status Print Bert-E's current status in the pull request TBA
/clear Remove all comments from Bert-E from the history TBA
/retry Re-start a fresh build TBA
/build Re-start a fresh build TBA
/force_reset Delete integration branches & pull requests, and restart merge process from the beginning.
/reset Try to remove integration branches unless there are commits on them which do not appear on the source branch.

Status report is not available.

@bert-e
Copy link
Contributor

bert-e commented Sep 26, 2024

Incorrect fix version

The Fix Version/s in issue CLDSRV-559 contains:

  • None

Considering where you are trying to merge, I ignored possible hotfix versions and I expected to find:

  • 7.70.52

  • 8.6.29

  • 8.7.50

  • 8.8.33

Please check the Fix Version/s of CLDSRV-559, or the target
branch of this pull request.

@nicolas2bert
Copy link
Contributor Author

ping

@bert-e
Copy link
Contributor

bert-e commented Sep 26, 2024

Request integration branches

Waiting for integration branch creation to be requested by the user.

To request integration branches, please comment on this pull request with the following command:

/create_integration_branches

Alternatively, the /approve and /create_pull_requests commands will automatically
create the integration branches.

.forEach(existing => {
const hasKey = target.masterKeyId ? 'a' : 'no';
const { algo } = target;
it('should override bucket encryption settings with '
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note to reviewer: Here I have not changed anything in the test, just improved the description a bit.

lib/Config.js Outdated
Comment on lines 1103 to 1104
ak: process.env.AWS_ACCESS_KEY_ID,
sk: process.env.AWS_SECRET_ACCESS_KEY
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
ak: process.env.AWS_ACCESS_KEY_ID,
sk: process.env.AWS_SECRET_ACCESS_KEY
accessKey: process.env.AWS_ACCESS_KEY_ID,
secretKey: process.env.AWS_SECRET_ACCESS_KEY

cipherBundle.masterKeyId,
log, (err, plainTextDataKey, cipheredDataKey) => {
if (err) {
log.debug('error from kms',
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You may want to log this with error level? Your call, and the original code was also logging in debug level. Also maybe add some context like "error generating a new data key from KMS"

})
} else {
log.debug('creating a new data key');
const dataKey = Common.createDataKey();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
const dataKey = Common.createDataKey();
const plainTextDataKey = Common.createDataKey();

if (client.supportsDefaultKeyPerAccount && config.defaultEncryptionKeyPerAccount) {
return vault.getOrCreateEncryptionKeyId(bucket.getOwner(), log, (err, data) => {
if (err) {
log.debug('error retreiving or creating the default encryption key at the account level from vault',
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
log.debug('error retreiving or creating the default encryption key at the account level from vault',
log.debug('error retrieving or creating the default encryption key at the account level from vault',

}

const { encryptionKeyId, action } = data;
log.trace('default encryption key retreived or created at the account level from vault',
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
log.trace('default encryption key retreived or created at the account level from vault',
log.trace('default encryption key retrieved or created at the account level from vault',

sinon.restore();
});

it('should delete the bucket-level encryption key is AES256 algorithm', done => {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
it('should delete the bucket-level encryption key is AES256 algorithm', done => {
it('should delete the bucket-level encryption key if AES256 algorithm', done => {

/* There are 2 ways of generating a datakey :
- using the generateDataKey of the KMS backend if it exists
(currently only implemented for the AWS KMS backend). This is
the prefered solution since a dedicated KMS should offer a better
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
the prefered solution since a dedicated KMS should offer a better
the preferred solution since a dedicated KMS should offer a better

@bert-e
Copy link
Contributor

bert-e commented Oct 3, 2024

Incorrect fix version

The Fix Version/s in issue CLDSRV-559 contains:

  • 7.70.52

  • 8.6.29

  • 8.7.50

  • 8.8.33

Considering where you are trying to merge, I ignored possible hotfix versions and I expected to find:

  • 7.70.52

  • 8.6.29

  • 8.7.50

  • 8.8.34

Please check the Fix Version/s of CLDSRV-559, or the target
branch of this pull request.

@bert-e
Copy link
Contributor

bert-e commented Oct 9, 2024

Request integration branches

Waiting for integration branch creation to be requested by the user.

To request integration branches, please comment on this pull request with the following command:

/create_integration_branches

Alternatively, the /approve and /create_pull_requests commands will automatically
create the integration branches.

@nicolas2bert
Copy link
Contributor Author

/create_integration_branches

@bert-e
Copy link
Contributor

bert-e commented Oct 9, 2024

Conflict

A conflict has been raised during the creation of
integration branch w/8.6/improvement/CLDSRV-559/kms with contents from improvement/CLDSRV-559/kms
and development/8.6.

I have not created the integration branch.

Here are the steps to resolve this conflict:

 $ git fetch
 $ git checkout -B w/8.6/improvement/CLDSRV-559/kms origin/development/8.6
 $ git merge origin/improvement/CLDSRV-559/kms
 $ # <intense conflict resolution>
 $ git commit
 $ git push -u origin w/8.6/improvement/CLDSRV-559/kms

The following options are set: create_integration_branches

@bert-e
Copy link
Contributor

bert-e commented Oct 9, 2024

Conflict

A conflict has been raised during the creation of
integration branch w/8.7/improvement/CLDSRV-559/kms with contents from w/8.6/improvement/CLDSRV-559/kms
and development/8.7.

I have not created the integration branch.

Here are the steps to resolve this conflict:

 $ git fetch
 $ git checkout -B w/8.7/improvement/CLDSRV-559/kms origin/development/8.7
 $ git merge origin/w/8.6/improvement/CLDSRV-559/kms
 $ # <intense conflict resolution>
 $ git commit
 $ git push -u origin w/8.7/improvement/CLDSRV-559/kms

The following options are set: create_integration_branches

@bert-e
Copy link
Contributor

bert-e commented Oct 9, 2024

Conflict

A conflict has been raised during the creation of
integration branch w/8.8/improvement/CLDSRV-559/kms with contents from w/8.7/improvement/CLDSRV-559/kms
and development/8.8.

I have not created the integration branch.

Here are the steps to resolve this conflict:

 $ git fetch
 $ git checkout -B w/8.8/improvement/CLDSRV-559/kms origin/development/8.8
 $ git merge origin/w/8.7/improvement/CLDSRV-559/kms
 $ # <intense conflict resolution>
 $ git commit
 $ git push -u origin w/8.8/improvement/CLDSRV-559/kms

The following options are set: create_integration_branches

@bert-e
Copy link
Contributor

bert-e commented Oct 9, 2024

Waiting for approval

The following approvals are needed before I can proceed with the merge:

  • the author

  • 2 peers

The following options are set: create_integration_branches

@nicolas2bert
Copy link
Contributor Author

@bert-e approve

@bert-e
Copy link
Contributor

bert-e commented Oct 9, 2024

I have successfully merged the changeset of this pull request
into targetted development branches:

  • ✔️ development/7.70

  • ✔️ development/8.6

  • ✔️ development/8.7

  • ✔️ development/8.8

The following branches have NOT changed:

  • development/7.10
  • development/7.4

Please check the status of the associated issue CLDSRV-559.

Goodbye nicolas2bert.

The following options are set: approve, create_integration_branches

@bert-e bert-e merged commit b7169de into development/7.70 Oct 9, 2024
11 checks passed
@bert-e bert-e deleted the improvement/CLDSRV-559/kms branch October 9, 2024 16:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants