mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-17 11:50:18 +00:00
rbd: Implement Key Protect KMS integration for Ceph CSI
This commit adds the support for HPCS/Key Protect IBM KMS service to Ceph CSI service. EncryptDEK() and DecryptDEK() of RBD volumes are done with the help of key protect KMS server by wrapping and unwrapping the DEK and by using the DEKStoreMetadata. Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
This commit is contained in:
parent
c4eaf6e747
commit
9200bc7a00
@ -60,5 +60,12 @@ data:
|
||||
"KMS_SECRET_NAME": "ceph-csi-aws-credentials",
|
||||
"AWS_REGION": "us-west-2"
|
||||
}
|
||||
kp-metadata-test: |-
|
||||
{
|
||||
"KMS_PROVIDER": "kp-metadata",
|
||||
"KMS_SECRET_NAME": "ceph-csi-kp-credentials",
|
||||
"KP_SERVICE_INSTANCE_ID": "7abef064-01dd-4237-9ea5-8b3890970be3",
|
||||
"KP_REGION": "us-south-2",
|
||||
}
|
||||
metadata:
|
||||
name: csi-kms-connection-details
|
||||
|
@ -90,6 +90,12 @@ data:
|
||||
"user-secrets-metadata-test": {
|
||||
"encryptionKMSType": "metadata",
|
||||
"secretName": "storage-encryption-secret"
|
||||
},
|
||||
"kp-metadata-test": {
|
||||
"encryptionKMSType": "kp-metadata",
|
||||
"secretName": "ceph-csi-kp-credentials",
|
||||
"keyProtectRegionKey": "us-south-2",
|
||||
"keyProtectServiceInstanceID": "7abef064-01dd-4237-9ea5-8b3890970be3"
|
||||
}
|
||||
}
|
||||
metadata:
|
||||
|
13
examples/kms/vault/kp-credentials.yaml
Normal file
13
examples/kms/vault/kp-credentials.yaml
Normal file
@ -0,0 +1,13 @@
|
||||
---
|
||||
# This is an example Kubernetes Secret that can be created in the Kubernetes
|
||||
# Namespace where Ceph-CSI is deployed. The contents of this Secret will be
|
||||
# used to connect to the Key Protect KMS.
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: ceph-csi-kp-credentials
|
||||
stringData:
|
||||
KP_SERVICE_API_KEY: "UhMN3Jko1pCpDPpFV65N8dYANBv5vF97QuNHqXVHmKa0"
|
||||
KP_CUSTOMER_ROOT_KEY: "c7a9aa91-5cb5-48da-a821-e85c27b99d92"
|
||||
KP_SESSION_TOKEN: ""
|
||||
KP_CRK_ARN: ""
|
226
internal/kms/keyprotect.go
Normal file
226
internal/kms/keyprotect.go
Normal file
@ -0,0 +1,226 @@
|
||||
/*
|
||||
Copyright 2021 The Ceph-CSI Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package kms
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/base64"
|
||||
"errors"
|
||||
"fmt"
|
||||
|
||||
"github.com/ceph/ceph-csi/internal/util/k8s"
|
||||
|
||||
kp "github.com/IBM/keyprotect-go-client"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
)
|
||||
|
||||
const (
|
||||
kmsTypeKeyProtectMetadata = "kp-metadata"
|
||||
|
||||
// keyProtectMetadataDefaultSecretsName is the default name of the Kubernetes Secret
|
||||
// that contains the credentials to access the Key Protect KMS. The name of
|
||||
// the Secret can be configured by setting the `KMS_SECRET_NAME`
|
||||
// option.
|
||||
//
|
||||
// #nosec:G101, value not credential, just references token.
|
||||
keyProtectMetadataDefaultSecretsName = "ceph-csi-kp-credentials"
|
||||
|
||||
// keyProtectSecretNameKey contains the name of the Kubernetes Secret that has
|
||||
// the credentials to access the Key ProtectKMS.
|
||||
//
|
||||
// #nosec:G101, no hardcoded secret, this is a configuration key.
|
||||
keyProtectSecretNameKey = "KMS_SECRET_NAME"
|
||||
keyProtectRegionKey = "KP_REGION"
|
||||
|
||||
keyProtectServiceInstanceID = "KP_SERVICE_INSTANCE_ID"
|
||||
// The following options are part of the Kubernetes Secrets.
|
||||
// #nosec:G101, no hardcoded secrets, only configuration keys.
|
||||
keyProtectServiceAPIKey = "KP_SERVICE_API_KEY"
|
||||
KeyProtectCustomerRootKey = "KP_CUSTOMER_ROOT_KEY"
|
||||
|
||||
keyProtectSessionToken = "KP_SESSION_TOKEN"
|
||||
keyProtectCRK = "KP_CRK_ARN"
|
||||
)
|
||||
|
||||
var _ = RegisterProvider(Provider{
|
||||
UniqueID: kmsTypeKeyProtectMetadata,
|
||||
Initializer: initKeyProtectKMS,
|
||||
})
|
||||
|
||||
// KeyProtectKMS store the KMS connection information retrieved from the kms configmap.
|
||||
type KeyProtectKMS struct {
|
||||
// basic options to get the secret
|
||||
namespace string
|
||||
secretName string
|
||||
|
||||
// standard KeyProtect configuration options
|
||||
client *kp.Client
|
||||
serviceAPIKey string
|
||||
customerRootKey string
|
||||
serviceInstanceID string
|
||||
region string
|
||||
sessionToken string
|
||||
crk string
|
||||
}
|
||||
|
||||
func initKeyProtectKMS(args ProviderInitArgs) (EncryptionKMS, error) {
|
||||
kms := &KeyProtectKMS{
|
||||
namespace: args.Namespace,
|
||||
}
|
||||
// required options for further configuration (getting secrets)
|
||||
err := setConfigString(&kms.secretName, args.Config, keyProtectSecretNameKey)
|
||||
if errors.Is(err, errConfigOptionInvalid) {
|
||||
return nil, err
|
||||
} else if errors.Is(err, errConfigOptionMissing) {
|
||||
kms.secretName = keyProtectMetadataDefaultSecretsName
|
||||
}
|
||||
|
||||
err = setConfigString(&kms.serviceInstanceID, args.Config, keyProtectServiceInstanceID)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// read the Kubernetes Secret with credentials
|
||||
secrets, err := kms.getSecrets()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to get secrets for %T: %w", kms,
|
||||
err)
|
||||
}
|
||||
|
||||
err = setConfigString(&kms.serviceAPIKey, secrets, keyProtectServiceAPIKey)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
err = setConfigString(&kms.customerRootKey, secrets, KeyProtectCustomerRootKey)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// keyProtectSessionToken is optional
|
||||
err = setConfigString(&kms.sessionToken, secrets, keyProtectSessionToken)
|
||||
if errors.Is(err, errConfigOptionInvalid) {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// KeyProtect Region is optional
|
||||
err = setConfigString(&kms.region, args.Config, keyProtectRegionKey)
|
||||
if errors.Is(err, errConfigOptionInvalid) {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// crk arn is optional
|
||||
err = setConfigString(&kms.crk, secrets, keyProtectCRK)
|
||||
if errors.Is(err, errConfigOptionInvalid) {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return kms, nil
|
||||
}
|
||||
|
||||
func (kms *KeyProtectKMS) getSecrets() (map[string]interface{}, error) {
|
||||
c, err := k8s.NewK8sClient()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to connect to Kubernetes to "+
|
||||
"get Secret %s/%s: %w", kms.namespace, kms.secretName, err)
|
||||
}
|
||||
|
||||
secret, err := c.CoreV1().Secrets(kms.namespace).Get(context.TODO(),
|
||||
kms.secretName, metav1.GetOptions{})
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to get Secret %s/%s: %w",
|
||||
kms.namespace, kms.secretName, err)
|
||||
}
|
||||
|
||||
config := make(map[string]interface{})
|
||||
|
||||
for k, v := range secret.Data {
|
||||
switch k {
|
||||
case keyProtectServiceAPIKey, KeyProtectCustomerRootKey, keyProtectSessionToken, keyProtectCRK:
|
||||
config[k] = string(v)
|
||||
default:
|
||||
return nil, fmt.Errorf("unsupported option for KMS "+
|
||||
"provider %q: %s", kmsTypeKeyProtectMetadata, k)
|
||||
}
|
||||
}
|
||||
|
||||
return config, nil
|
||||
}
|
||||
|
||||
func (kms *KeyProtectKMS) Destroy() {
|
||||
// Nothing to do.
|
||||
}
|
||||
|
||||
func (kms *KeyProtectKMS) RequiresDEKStore() DEKStoreType {
|
||||
return DEKStoreMetadata
|
||||
}
|
||||
|
||||
func (kms *KeyProtectKMS) getService() error {
|
||||
// Use your Service API Key and your KeyProtect Service Instance ID to create a ClientConfig
|
||||
cc := kp.ClientConfig{
|
||||
BaseURL: kp.DefaultBaseURL,
|
||||
APIKey: kms.serviceAPIKey,
|
||||
InstanceID: kms.serviceInstanceID,
|
||||
}
|
||||
|
||||
// Build a new client from the config
|
||||
client, err := kp.New(cc, kp.DefaultTransport())
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to create keyprotect client: %w", err)
|
||||
}
|
||||
kms.client = client
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// EncryptDEK uses the KeyProtect KMS and the configured CRK to encrypt the DEK.
|
||||
func (kms *KeyProtectKMS) EncryptDEK(volumeID, plainDEK string) (string, error) {
|
||||
if err := kms.getService(); err != nil {
|
||||
return "", fmt.Errorf("could not get KMS service: %w", err)
|
||||
}
|
||||
|
||||
dekByteSlice := []byte(plainDEK)
|
||||
aadVolID := []string{volumeID}
|
||||
result, err := kms.client.Wrap(context.TODO(), kms.customerRootKey, dekByteSlice, &aadVolID)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("failed to wrap the DEK: %w", err)
|
||||
}
|
||||
|
||||
// base64 encode the encrypted DEK, so that storing it should not have
|
||||
// issues
|
||||
|
||||
return base64.StdEncoding.EncodeToString(result), nil
|
||||
}
|
||||
|
||||
// DecryptDEK uses the Key protect KMS and the configured CRK to decrypt the DEK.
|
||||
func (kms *KeyProtectKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) {
|
||||
if err := kms.getService(); err != nil {
|
||||
return "", fmt.Errorf("could not get KMS service: %w", err)
|
||||
}
|
||||
|
||||
ciphertextBlob, err := base64.StdEncoding.DecodeString(encryptedDEK)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("failed to decode base64 cipher: %w",
|
||||
err)
|
||||
}
|
||||
|
||||
result, err := kms.client.Unwrap(context.TODO(), kms.customerRootKey, ciphertextBlob, nil)
|
||||
if err != nil {
|
||||
return "", fmt.Errorf("failed to unwrap the DEK: %w", err)
|
||||
}
|
||||
|
||||
return string(result), nil
|
||||
}
|
Loading…
Reference in New Issue
Block a user