k8s.io/apiserver@v0.31.1/pkg/apis/apiserver/types_encryption.go (about)

     1  /*
     2  Copyright 2018 The Kubernetes Authors.
     3  
     4  Licensed under the Apache License, Version 2.0 (the "License");
     5  you may not use this file except in compliance with the License.
     6  You may obtain a copy of the License at
     7  
     8      http://www.apache.org/licenses/LICENSE-2.0
     9  
    10  Unless required by applicable law or agreed to in writing, software
    11  distributed under the License is distributed on an "AS IS" BASIS,
    12  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    13  See the License for the specific language governing permissions and
    14  limitations under the License.
    15  */
    16  
    17  package apiserver
    18  
    19  import (
    20  	"fmt"
    21  
    22  	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
    23  )
    24  
    25  // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    26  
    27  /*
    28  EncryptionConfiguration stores the complete configuration for encryption providers.
    29  It also allows the use of wildcards to specify the resources that should be encrypted.
    30  Use '*.<group>' to encrypt all resources within a group or '*.*' to encrypt all resources.
    31  '*.' can be used to encrypt all resource in the core group.  '*.*' will encrypt all
    32  resources, even custom resources that are added after API server start.
    33  Use of wildcards that overlap within the same resource list or across multiple
    34  entries are not allowed since part of the configuration would be ineffective.
    35  Resource lists are processed in order, with earlier lists taking precedence.
    36  
    37  Example:
    38  
    39  	kind: EncryptionConfiguration
    40  	apiVersion: apiserver.config.k8s.io/v1
    41  	resources:
    42  	- resources:
    43  	  - events
    44  	  providers:
    45  	  - identity: {}  # do not encrypt events even though *.* is specified below
    46  	- resources:
    47  	  - secrets
    48  	  - configmaps
    49  	  - pandas.awesome.bears.example
    50  	  providers:
    51  	  - aescbc:
    52  	      keys:
    53  	      - name: key1
    54  	        secret: c2VjcmV0IGlzIHNlY3VyZQ==
    55  	- resources:
    56  	  - '*.apps'
    57  	  providers:
    58  	  - aescbc:
    59  	      keys:
    60  	      - name: key2
    61  	        secret: c2VjcmV0IGlzIHNlY3VyZSwgb3IgaXMgaXQ/Cg==
    62  	- resources:
    63  	  - '*.*'
    64  	  providers:
    65  	  - aescbc:
    66  	      keys:
    67  	      - name: key3
    68  	        secret: c2VjcmV0IGlzIHNlY3VyZSwgSSB0aGluaw==
    69  */
    70  type EncryptionConfiguration struct {
    71  	metav1.TypeMeta
    72  	// resources is a list containing resources, and their corresponding encryption providers.
    73  	Resources []ResourceConfiguration
    74  }
    75  
    76  // ResourceConfiguration stores per resource configuration.
    77  type ResourceConfiguration struct {
    78  	// resources is a list of kubernetes resources which have to be encrypted. The resource names are derived from `resource` or `resource.group` of the group/version/resource.
    79  	// eg: pandas.awesome.bears.example is a custom resource with 'group': awesome.bears.example, 'resource': pandas.
    80  	// Use '*.*' to encrypt all resources and '*.<group>' to encrypt all resources in a specific group.
    81  	// eg: '*.awesome.bears.example' will encrypt all resources in the group 'awesome.bears.example'.
    82  	// eg: '*.' will encrypt all resources in the core group (such as pods, configmaps, etc).
    83  	Resources []string
    84  	// providers is a list of transformers to be used for reading and writing the resources to disk.
    85  	// eg: aesgcm, aescbc, secretbox, identity, kms.
    86  	Providers []ProviderConfiguration
    87  }
    88  
    89  // ProviderConfiguration stores the provided configuration for an encryption provider.
    90  type ProviderConfiguration struct {
    91  	// aesgcm is the configuration for the AES-GCM transformer.
    92  	AESGCM *AESConfiguration
    93  	// aescbc is the configuration for the AES-CBC transformer.
    94  	AESCBC *AESConfiguration
    95  	// secretbox is the configuration for the Secretbox based transformer.
    96  	Secretbox *SecretboxConfiguration
    97  	// identity is the (empty) configuration for the identity transformer.
    98  	Identity *IdentityConfiguration
    99  	// kms contains the name, cache size and path to configuration file for a KMS based envelope transformer.
   100  	KMS *KMSConfiguration
   101  }
   102  
   103  // AESConfiguration contains the API configuration for an AES transformer.
   104  type AESConfiguration struct {
   105  	// keys is a list of keys to be used for creating the AES transformer.
   106  	// Each key has to be 32 bytes long for AES-CBC and 16, 24 or 32 bytes for AES-GCM.
   107  	Keys []Key
   108  }
   109  
   110  // SecretboxConfiguration contains the API configuration for an Secretbox transformer.
   111  type SecretboxConfiguration struct {
   112  	// keys is a list of keys to be used for creating the Secretbox transformer.
   113  	// Each key has to be 32 bytes long.
   114  	Keys []Key
   115  }
   116  
   117  // Key contains name and secret of the provided key for a transformer.
   118  type Key struct {
   119  	// name is the name of the key to be used while storing data to disk.
   120  	Name string
   121  	// secret is the actual key, encoded in base64.
   122  	Secret string
   123  }
   124  
   125  // String implements Stringer interface in a log safe way.
   126  func (k Key) String() string {
   127  	return fmt.Sprintf("Name: %s, Secret: [REDACTED]", k.Name)
   128  }
   129  
   130  // IdentityConfiguration is an empty struct to allow identity transformer in provider configuration.
   131  type IdentityConfiguration struct{}
   132  
   133  // KMSConfiguration contains the name, cache size and path to configuration file for a KMS based envelope transformer.
   134  type KMSConfiguration struct {
   135  	// apiVersion of KeyManagementService
   136  	// +optional
   137  	APIVersion string
   138  	// name is the name of the KMS plugin to be used.
   139  	Name string
   140  	// cachesize is the maximum number of secrets which are cached in memory. The default value is 1000.
   141  	// Set to a negative value to disable caching. This field is only allowed for KMS v1 providers.
   142  	// +optional
   143  	CacheSize *int32
   144  	// endpoint is the gRPC server listening address, for example "unix:///var/run/kms-provider.sock".
   145  	Endpoint string
   146  	// timeout for gRPC calls to kms-plugin (ex. 5s). The default is 3 seconds.
   147  	// +optional
   148  	Timeout *metav1.Duration
   149  }