Migrate all backend at .minio.sys/config to encrypted backend (#8474)
- Supports migrating only when the credential ENVs are set, so any FS mode deployments which do not have ENVs set will continue to remain as is. - Credential ENVs can be rotated using MINIO_ACCESS_KEY_OLD and MINIO_SECRET_KEY_OLD envs, in such scenarios it allowed to rotate the encrypted content to a new admin key.master
parent
fa325665b1
commit
d28bcb4f84
@ -0,0 +1,308 @@ |
||||
/* |
||||
* MinIO Cloud Storage, (C) 2019 MinIO, Inc. |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
|
||||
package cmd |
||||
|
||||
import ( |
||||
"bytes" |
||||
"context" |
||||
"strings" |
||||
|
||||
etcd "github.com/coreos/etcd/clientv3" |
||||
"github.com/minio/minio/cmd/config" |
||||
"github.com/minio/minio/cmd/logger" |
||||
"github.com/minio/minio/pkg/auth" |
||||
"github.com/minio/minio/pkg/env" |
||||
"github.com/minio/minio/pkg/madmin" |
||||
) |
||||
|
||||
func handleEncryptedConfigBackend(objAPI ObjectLayer, server bool) error { |
||||
if !server { |
||||
return nil |
||||
} |
||||
|
||||
// If its server mode or nas gateway, migrate the backend.
|
||||
doneCh := make(chan struct{}) |
||||
defer close(doneCh) |
||||
|
||||
var encrypted bool |
||||
var err error |
||||
|
||||
// Migrating Config backend needs a retry mechanism for
|
||||
// the following reasons:
|
||||
// - Read quorum is lost just after the initialization
|
||||
// of the object layer.
|
||||
for range newRetryTimerSimple(doneCh) { |
||||
if encrypted, err = checkBackendEncrypted(objAPI); err != nil { |
||||
if err == errDiskNotFound || |
||||
strings.Contains(err.Error(), InsufficientReadQuorum{}.Error()) || |
||||
strings.Contains(err.Error(), InsufficientWriteQuorum{}.Error()) { |
||||
logger.Info("Waiting for config backend to be encrypted..") |
||||
continue |
||||
} |
||||
return err |
||||
} |
||||
break |
||||
} |
||||
|
||||
if encrypted { |
||||
// backend is encrypted, but credentials are not specified
|
||||
// we shall fail right here. if not proceed forward.
|
||||
if !globalConfigEncrypted || !globalActiveCred.IsValid() { |
||||
return config.ErrMissingCredentialsBackendEncrypted(nil) |
||||
} |
||||
} else { |
||||
// backend is not yet encrypted, check if encryption of
|
||||
// backend is requested if not return nil and proceed
|
||||
// forward.
|
||||
if !globalConfigEncrypted { |
||||
return nil |
||||
} |
||||
if !globalActiveCred.IsValid() { |
||||
return errInvalidArgument |
||||
} |
||||
} |
||||
|
||||
accessKeyOld := env.Get(config.EnvAccessKeyOld, "") |
||||
secretKeyOld := env.Get(config.EnvSecretKeyOld, "") |
||||
var activeCredOld auth.Credentials |
||||
if accessKeyOld != "" && secretKeyOld != "" { |
||||
activeCredOld, err = auth.CreateCredentials(accessKeyOld, secretKeyOld) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
} |
||||
|
||||
// Migrating Config backend needs a retry mechanism for
|
||||
// the following reasons:
|
||||
// - Read quorum is lost just after the initialization
|
||||
// of the object layer.
|
||||
for range newRetryTimerSimple(doneCh) { |
||||
// Migrate IAM configuration
|
||||
if err = migrateConfigPrefixToEncrypted(objAPI, activeCredOld, encrypted); err != nil { |
||||
if err == errDiskNotFound || |
||||
strings.Contains(err.Error(), InsufficientReadQuorum{}.Error()) || |
||||
strings.Contains(err.Error(), InsufficientWriteQuorum{}.Error()) { |
||||
logger.Info("Waiting for config backend to be encrypted..") |
||||
continue |
||||
} |
||||
return err |
||||
} |
||||
break |
||||
} |
||||
return nil |
||||
} |
||||
|
||||
const ( |
||||
backendEncryptedFile = "backend-encrypted" |
||||
) |
||||
|
||||
var ( |
||||
backendEncryptedFileValue = []byte("encrypted") |
||||
) |
||||
|
||||
func checkBackendEtcdEncrypted(ctx context.Context, client *etcd.Client) (bool, error) { |
||||
data, err := readKeyEtcd(ctx, client, backendEncryptedFile) |
||||
if err != nil && err != errConfigNotFound { |
||||
return false, err |
||||
} |
||||
return err == nil && bytes.Equal(data, backendEncryptedFileValue), nil |
||||
} |
||||
|
||||
func checkBackendEncrypted(objAPI ObjectLayer) (bool, error) { |
||||
data, err := readConfig(context.Background(), objAPI, backendEncryptedFile) |
||||
if err != nil && err != errConfigNotFound { |
||||
return false, err |
||||
} |
||||
return err == nil && bytes.Equal(data, backendEncryptedFileValue), nil |
||||
} |
||||
|
||||
func migrateIAMConfigsEtcdToEncrypted(client *etcd.Client) error { |
||||
ctx, cancel := context.WithTimeout(context.Background(), defaultContextTimeout) |
||||
defer cancel() |
||||
|
||||
encrypted, err := checkBackendEtcdEncrypted(ctx, client) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
|
||||
if encrypted { |
||||
// backend is encrypted, but credentials are not specified
|
||||
// we shall fail right here. if not proceed forward.
|
||||
if !globalConfigEncrypted || !globalActiveCred.IsValid() { |
||||
return config.ErrMissingCredentialsBackendEncrypted(nil) |
||||
} |
||||
} else { |
||||
// backend is not yet encrypted, check if encryption of
|
||||
// backend is requested if not return nil and proceed
|
||||
// forward.
|
||||
if !globalConfigEncrypted { |
||||
return nil |
||||
} |
||||
if !globalActiveCred.IsValid() { |
||||
return errInvalidArgument |
||||
} |
||||
} |
||||
|
||||
accessKeyOld := env.Get(config.EnvAccessKeyOld, "") |
||||
secretKeyOld := env.Get(config.EnvSecretKeyOld, "") |
||||
var activeCredOld auth.Credentials |
||||
if accessKeyOld != "" && secretKeyOld != "" { |
||||
activeCredOld, err = auth.CreateCredentials(accessKeyOld, secretKeyOld) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
} |
||||
|
||||
if encrypted { |
||||
// No key rotation requested, and backend is
|
||||
// already encrypted. We proceed without migration.
|
||||
if !activeCredOld.IsValid() { |
||||
return nil |
||||
} |
||||
|
||||
// No real reason to rotate if old and new creds are same.
|
||||
if activeCredOld.Equal(globalActiveCred) { |
||||
return nil |
||||
} |
||||
} |
||||
|
||||
if !activeCredOld.IsValid() { |
||||
logger.Info("Attempting a one time encrypt of all IAM users and policies on etcd") |
||||
} else { |
||||
logger.Info("Attempting a rotation of encrypted IAM users and policies on etcd with newly supplied credentials") |
||||
} |
||||
|
||||
r, err := client.Get(ctx, minioConfigPrefix, etcd.WithPrefix(), etcd.WithKeysOnly()) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
for _, kv := range r.Kvs { |
||||
var ( |
||||
cdata []byte |
||||
cencdata []byte |
||||
) |
||||
cdata, err = readKeyEtcd(ctx, client, string(kv.Key)) |
||||
if err != nil { |
||||
switch err { |
||||
case errConfigNotFound: |
||||
// Perhaps not present or someone deleted it.
|
||||
continue |
||||
} |
||||
return err |
||||
} |
||||
// Is rotating of creds requested?
|
||||
if activeCredOld.IsValid() { |
||||
cdata, err = madmin.DecryptData(activeCredOld.String(), bytes.NewReader(cdata)) |
||||
if err != nil { |
||||
if err == madmin.ErrMaliciousData { |
||||
return config.ErrInvalidRotatingCredentialsBackendEncrypted(nil) |
||||
} |
||||
return err |
||||
} |
||||
} |
||||
|
||||
cencdata, err = madmin.EncryptData(globalActiveCred.String(), cdata) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err = saveKeyEtcd(ctx, client, string(kv.Key), cencdata); err != nil { |
||||
return err |
||||
} |
||||
} |
||||
return saveKeyEtcd(ctx, client, backendEncryptedFile, backendEncryptedFileValue) |
||||
} |
||||
|
||||
func migrateConfigPrefixToEncrypted(objAPI ObjectLayer, activeCredOld auth.Credentials, encrypted bool) error { |
||||
if encrypted { |
||||
// No key rotation requested, and backend is
|
||||
// already encrypted. We proceed without migration.
|
||||
if !activeCredOld.IsValid() { |
||||
return nil |
||||
} |
||||
|
||||
// No real reason to rotate if old and new creds are same.
|
||||
if activeCredOld.Equal(globalActiveCred) { |
||||
return nil |
||||
} |
||||
} |
||||
|
||||
if !activeCredOld.IsValid() { |
||||
logger.Info("Attempting a one time encrypt of all config, IAM users and policies on MinIO backend") |
||||
} else { |
||||
logger.Info("Attempting a rotation of encrypted config, IAM users and policies on MinIO with newly supplied credentials") |
||||
} |
||||
|
||||
// Construct path to config/transaction.lock for locking
|
||||
transactionConfigPrefix := minioConfigPrefix + "/transaction.lock" |
||||
|
||||
// As object layer's GetObject() and PutObject() take respective lock on minioMetaBucket
|
||||
// and configFile, take a transaction lock to avoid data race between readConfig()
|
||||
// and saveConfig().
|
||||
objLock := globalNSMutex.NewNSLock(context.Background(), minioMetaBucket, transactionConfigPrefix) |
||||
if err := objLock.GetLock(globalOperationTimeout); err != nil { |
||||
return err |
||||
} |
||||
defer objLock.Unlock() |
||||
|
||||
var marker string |
||||
for { |
||||
res, err := objAPI.ListObjects(context.Background(), minioMetaBucket, minioConfigPrefix, marker, "", maxObjectList) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
for _, obj := range res.Objects { |
||||
var ( |
||||
cdata []byte |
||||
cencdata []byte |
||||
) |
||||
|
||||
cdata, err = readConfig(context.Background(), objAPI, obj.Name) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
|
||||
// Is rotating of creds requested?
|
||||
if activeCredOld.IsValid() { |
||||
cdata, err = madmin.DecryptData(activeCredOld.String(), bytes.NewReader(cdata)) |
||||
if err != nil { |
||||
if err == madmin.ErrMaliciousData { |
||||
return config.ErrInvalidRotatingCredentialsBackendEncrypted(nil) |
||||
} |
||||
return err |
||||
} |
||||
} |
||||
|
||||
cencdata, err = madmin.EncryptData(globalActiveCred.String(), cdata) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err = saveConfig(context.Background(), objAPI, obj.Name, cencdata); err != nil { |
||||
return err |
||||
} |
||||
} |
||||
|
||||
if !res.IsTruncated { |
||||
break |
||||
} |
||||
|
||||
marker = res.NextMarker |
||||
} |
||||
|
||||
return saveConfig(context.Background(), objAPI, backendEncryptedFile, backendEncryptedFileValue) |
||||
} |
Loading…
Reference in new issue