Skip to content

Commit

Permalink
adds support for S3 SSE with KMS
Browse files Browse the repository at this point in the history
Signed-off-by: Mathias Merscher <Mathias.Merscher@dg-i.net>
  • Loading branch information
madddi committed Aug 11, 2017
1 parent bc08174 commit 9e66aa0
Show file tree
Hide file tree
Showing 5 changed files with 31 additions and 18 deletions.
30 changes: 16 additions & 14 deletions docs/config-definition.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
# Ark Config definition

* [Overview][10]
* [Example][11]
* [Parameter Reference][8]
* [Main config][9]
* [Overview][11]
* [Example][12]
* [Parameter Reference][9]
* [Main config][10]
* [AWS][0]
* [GCP][1]
* [Azure][2]
Expand Down Expand Up @@ -70,28 +70,30 @@ The configurable parameters are as follows:
| `disableSSL` | bool | `false` | Set this to `true` if you are using Minio (or another local, S3-compatible storage service) and your deployment is not secured. |
| `s3ForcePathStyle` | bool | `false` | Set this to `true` if you are using a local storage service like Minio. |
| `s3Url` | string | Required field for non-AWS-hosted storage| *Example*: http://minio:9000<br><br>You can specify the AWS S3 URL here for explicitness, but Ark can already generate it from `region`, `availabilityZone`, and `bucket`. This field is primarily for local sotrage services like Minio.|
| `kmsKeyID` | string | Empty | *Example*: "502b409c-4da1-419f-a16e-eif453b3i49f"<br><br>Specify an [AWS KMS key][5] id to enable encryption of the backups stored in S3. Only works with AWS S3 and may require explicitly granting key usage rights.|

### GCP
| Key | Type | Default | Meaning |
| --- | --- | --- | --- |
| `project` | string | Required Field | *Example*: "project-example-3jsn23"<br><br> See the [Project ID documentation][5] for details. |
| `zone` | string | Required Field | *Example*: "us-central1-a"<br><br>See [GCP documentation][6] for the full list. |
| `project` | string | Required Field | *Example*: "project-example-3jsn23"<br><br> See the [Project ID documentation][6] for details. |
| `zone` | string | Required Field | *Example*: "us-central1-a"<br><br>See [GCP documentation][7] for the full list. |

### Azure
| Key | Type | Default | Meaning |
| --- | --- | --- | --- |
| `location` | string | Required Field | *Example*: "Canada East"<br><br>See [the list of available locations][7] (note that this particular page refers to them as "Regions"). |
| `location` | string | Required Field | *Example*: "Canada East"<br><br>See [the list of available locations][8] (note that this particular page refers to them as "Regions"). |
| `apiTimeout` | metav1.Duration | 1m0s | How long to wait for an API Azure request to complete before timeout. |

[0]: #aws
[1]: #gcp
[2]: #azure
[3]: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#concepts-available-regions
[4]: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#concepts-availability-zones
[5]: https://cloud.google.com/resource-manager/docs/creating-managing-projects#identifying_projects
[6]: https://cloud.google.com/compute/docs/regions-zones/regions-zones
[7]: https://azure.microsoft.com/en-us/regions/
[8]: #parameter-reference
[9]: #main-config-parameters
[10]: #overview
[11]: #example
[5]: http://docs.aws.amazon.com/kms/latest/developerguide/overview.html
[6]: https://cloud.google.com/resource-manager/docs/creating-managing-projects#identifying_projects
[7]: https://cloud.google.com/compute/docs/regions-zones/regions-zones
[8]: https://azure.microsoft.com/en-us/regions/
[9]: #parameter-reference
[10]: #main-config-parameters
[11]: #overview
[12]: #example
1 change: 1 addition & 0 deletions pkg/apis/ark/v1/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -98,6 +98,7 @@ type AWSConfig struct {
DisableSSL bool `json:"disableSSL"`
S3ForcePathStyle bool `json:"s3ForcePathStyle"`
S3Url string `json:"s3Url"`
KMSKeyID string `json:"kmsKeyId"`
}

// GCPConfig is configuration information for connecting to GCP.
Expand Down
11 changes: 10 additions & 1 deletion pkg/cloudprovider/aws/object_storage_adapter.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,16 +27,25 @@ import (
var _ cloudprovider.ObjectStorageAdapter = &objectStorageAdapter{}

type objectStorageAdapter struct {
s3 *s3.S3
s3 *s3.S3
kmsKeyID string
}

func (op *objectStorageAdapter) PutObject(bucket string, key string, body io.ReadSeeker) error {

req := &s3.PutObjectInput{
Bucket: &bucket,
Key: &key,
Body: body,
}

// if kmsKeyID is not empty, enable "aws:kms" encryption and amend the key ID
if op.kmsKeyID != "" {
sseType := "aws:kms"
req.ServerSideEncryption = &sseType
req.SSEKMSKeyId = &op.kmsKeyID
}

_, err := op.s3.PutObject(req)

return err
Expand Down
5 changes: 3 additions & 2 deletions pkg/cloudprovider/aws/storage_adapter.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ type storageAdapter struct {

var _ cloudprovider.StorageAdapter = &storageAdapter{}

func NewStorageAdapter(config *aws.Config, availabilityZone string) (cloudprovider.StorageAdapter, error) {
func NewStorageAdapter(config *aws.Config, availabilityZone string, KMSKeyID string) (cloudprovider.StorageAdapter, error) {
sess, err := session.NewSession(config)
if err != nil {
return nil, err
Expand All @@ -48,7 +48,8 @@ func NewStorageAdapter(config *aws.Config, availabilityZone string) (cloudprovid
az: availabilityZone,
},
objectStorage: &objectStorageAdapter{
s3: s3.New(sess),
s3: s3.New(sess),
kmsKeyID: KMSKeyID,
},
}, nil
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/cmd/server/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -324,7 +324,7 @@ func getAWSCloudProvider(cloudConfig api.CloudProviderConfig) (cloudprovider.Sto
)
}

return arkaws.NewStorageAdapter(awsConfig, cloudConfig.AWS.AvailabilityZone)
return arkaws.NewStorageAdapter(awsConfig, cloudConfig.AWS.AvailabilityZone, cloudConfig.AWS.KMSKeyID)
}

func getGCPCloudProvider(cloudConfig api.CloudProviderConfig) (cloudprovider.StorageAdapter, error) {
Expand Down

0 comments on commit 9e66aa0

Please sign in to comment.