Added 2 phases: 1. secret-reencrypt - This phase can be used to reecnrypt the existing secrets with new key. To do so SOPS_IMPORT_PGP must contain old public key and new private key (but may also include other data). SOPS_PGP_FP must contain fingerprint of new private key. 2. secret-show - This phase may be useful for some users that need to see what generated by secret-generate phase. Disabled SOPS debug by default. To enable it back run commands with env variable DEBUG_SOPS_GPG=true Change-Id: Id7fe13d6943d386577df25dba4aaa83e62e58980
25 KiB
Secrets generation and encryption how-to-guide
Overview of the current approach selected for secrets generation and encryption
Airshipctl consumes site manifests in order to deploy k8s cluster or update its configuration. All manifests must be stored in the SCM system: e.g. git. For security reasons this data can’t be stored in plain-text form. There are several tools that may help to handle the complexity of dealing with encrypted manifests. One of them is Mozilla SOPS, which was selected to encrypt/decrypt Airshipctl manifests.
Airshipctl has a standard approach with introduction of VariableCatalogues as a configuration source and kustomize Replacement plugin which must be used to put the values to different yaml documents. Different secrets such as passwords, keys and certificates must be presented in VariableCatalogues as well. Some of them can be ‘externally provided’ - e.g. ldap credentials are typically created in some external system, e.g. Active Directory and k8s cluster just has to use them. Other secrets may be ‘internally generated’ - e.g. several Openstack-helm charts may want the same Keystone password and if not a single external system doesn’t need that password it can be generated by Airshipctl. This document is dedicated to the explanation of the technical details on how it’s currently done in Airshipctl and its manifests.
SOPS krm-function overview
Airshipctl uses kustomize along with different krm-functions that extend its functionality:
Replacement krm-function that is needed to avoid duplication of data in documents
Templater krm-function that is needed to produce new yaml documents based on the provided parameters.
There is a standard catalog of krm-functions.
It includes the standard krm-function: gcr.io/kpt-functions/sops
that can be used to perform decryption and encryption right in kustomize. Please refer to the example configurations that can be used to encrypt and decrypt the set of existing yamls.
Please note that to make that krm-function work it’s necessary to provide the following ENV variables:
To encrypt:
SOPS_IMPORT_PGP
must contain public or private key (set of keys)SOPS_PGP_FP
must contain a fingerprint of the public key from the list of provided keys inSOPS_IMPORT_PGP
that will be used for encryption.
To decrypt:
SOPS_IMPORT_PGP
must contain a private key (set of keys) that will be used to decrypt. Function will fail if it can’t find the key with fingerprint that was used for encryption
The gating scripts set that env variables here.
Templater krm-function use-cases overview
Templater krm-function allows users to call Sprig functions. Sprig has a set of functions that may generate random values, passwords, CAs, keys and certificates. If it’s not possible to use the standard set of sprig functions for some important Airshipctl use-cases, it’s always possible to extend that set of functions: the latest version of templater krm-function introduces extension library where this can be done. The set of already added functions can be found here.
The example on how to generate different types of secrets with templater krm-function may be found here.
Essentially the set of steps that airshipctl must perform when it’s necessary to generate/regenerate/import new set of secrets is the following:
- Either:
- Run templater that produces VariableCatalogue yaml with generated parameters
- Just import the yaml document with the existing external credentials. If the document doesn’t have the required structure it’s possible to use replacement transformer to move the needed values to the right places of the required yaml
- Use Sops krm-function to encrypt the yaml
- Store the encrypted document in the document module of the site
This phase performs that steps.
The following steps are used during standard procedure or yaml rendering for other phases: Kustomize reads the encrypted VariableCatalogue Kustomize applies Sops transformer to decrypt the encrypted fields This decrypted VariableCatalogue in included into the list of all catalogues and may be referenced in replacement plugin That is done by all phases. And this set of steps is done basically this line.
Let’s show how this feature works under the hood.
GenericContainer feature overview
In order to implement all that functionality it was necessary to introduce a new feature called GenericContainer. It’s a type of Executor (see this document) and it allows to run Container with a document bundle as input. Krm-function can be run by GenericContainer. It may be that we may add some other types of API with containers.
Krm-functions accept a set of yamls and config as input and return a modified set of yamls.
GenericContainer executor may just output it to stdout. Or it may store it as kpt fn sink
does.
In particular we’re using the second option to store our generated and encrypted yamls to the specific place from which other manifests will take that file.
As it’s possible to see generator kustomization performs decryption using sops krm-function.
Step-by-step Operator instructions
Manual operations that are automated by Airshipctl related to generation and encryption
Password generation
Airshipctl has variety of options to generate passwords:
- derivePassword from Sprig library
- regexGen
Without automation it would be necessary to generate passwords based on the polices manually (with some external tools).
Key/CA/Cert Generation
K8s requires the user to have a key/cert in order to be able to authenticate. Without Airshipctl it would be necessary to use openssl tool and run several commands in right order to generate key/CA, and after that to generate user key, create CSR and get user certificate signed with this CA, e.g.
# getting CA key/crt -> tls.key/tls.crt
openssl req -x509 -subj "/CN=Kubernetes API" -new -newkey rsa:2048 -nodes -keyout tls.key -sha256 -days 3650 -out tls.crt
# generating admin’s key and creating CSR
openssl req -subj "/CN=admin/O=system:masters" -new -newkey rsa:2048 -nodes -out admin.csr -keyout admin.key -out admin.csr
# signing CSR with CA and getting admin’s cert
openssl x509 -req -in admin.csr -CA tls.crt -CAkey tls.key -CAcreateserial -out admin.crt -days 365 -sha256
After that it would be necessary to convert it to base64 form and put it in the right place in the model, which is very tiresome and error-prone operation especially along generation.
Airshipctl allows to do the same with running one phase to generate and encrypt all secrets.
Secrets encryption with Mozilla SOPS
SOPS is a very powerful tool for encryption of different documents. Check its site to get all possible ways to use it. In this document we’re going to describe only the way how it’s already used.
If you have a VariableCatalogue that contains secrets and you want to encrypt it with SOPS using PGP, you’ll need to generate a pair of keys (public and private). Public will be used for encryption and Private for description.
The easiest way to generate sops keys - to use gpg wizard:
gpg --full-generate-key
If it should be done by automation there are some other command options that allow you to specify params instead of interactive mode. E.g. please refer to this link.
In the Airshipctl gate we’re using SOPs pre-generated keys from here. They can be imported as it’s demonstrated here. To encrypt file with 1 yaml it’s necessary to use the command:
SOPS_PGP_FP='FBC7B9E2A4F9289AC0C1D4843D16CEE4A27381B4' sops -e <file name>
SOPS_PGP_FP
must contain a fingerprint of one of the public keys that gpg already has on the local machine.
Note: Sops allows you to set several fingerprints. During decryption it’s possible to have only one of them.
To decrypt file manually (the private key has to be present) just simply do:
sops -d <file name>
We hope that it won’t be necessary to do these actions manually, because airshipctl already has automation that does encryption of generated secrets and decryption of secrets that will be used by manifests right during phase execution.
But It’s good to know one very useful command (that requires private key to be imported to gpg)
sops <file name>
This will decrypt the file and will open it in the editor. It will be possible to perform needed modifications. Once finished just close the editor and sops will encrypt the modified document and put it back. This may be a really-really useful command for some users and very simple at the same time.
Generation/Regeneration and encryption of secrets in manifests
Now when we have all the information about what is going on under the hood, let’s see how Airshipctl automates generation and encryption.
Note: This section will require the reader to understand how kustomize works in very good details. The good start will be the official documentation, but that may not be enough. Here are some documents that were created during design of airshipctl:
- Reusable kustomize modules
- Kustomize evolution
- Kustomize evolution - Video about krm-functions in Airshipctl
- Documentation about Airshipctl Phases
Now let’s refer to the way how the current version of manifests works for gating. Let’s start from the secrets generator.
To run it it’s just necessary to run the phase:
airshipctl phase run secret-generate
And it’s done each time we run integration testing in CI in this file.
This phase creates the bundle by running kustomize for target/generator
inside the site directory. And that kustomization through a special directory that allows to override template values runs the following templater.
This config file defines the following structure of VariableCatalogue:
apiVersion: airshipit.org/v1alpha1
kind: VariableCatalogue
metadata:
labels:
airshipit.org/deploy-k8s: "false"
name: generated-secrets
annotations:
config.kubernetes.io/path: secrets.yaml
ephemeralClusterCa:...
ephemeralKubeconfig:..
targetClusterCa:...
targetKubeconfig:...
isoImage:...
Please pay attention to the annotation config.kubernetes.io/path
- it defines the name of the file where this document will be stored by phase. It’s possible to define several VariableCatalogues with unique names of files (it even may contain directories).
When this template is executed it generates keys/certs/passwords and renders them as a Variable catalog with the name generated-secrets
.
Now if we refer back to the Phase descritption we’ll see that it’s type is GenericContainer with the name encrypter
.
The definition of that executor is the following:
apiVersion: airshipit.org/v1alpha1
kind: GenericContainer
metadata:
name: encrypter
labels:
airshipit.org/deploy-k8s: "false"
spec:
sinkOutputDir: "target/generator/results/generated"
image: gcr.io/kpt-fn-contrib/sops:v0.1.0
envVars:
- SOPS_IMPORT_PGP
- SOPS_PGP_FP
config: |
apiVersion: v1
kind: ConfigMap
data:
cmd: encrypt
unencrypted-regex: '^(kind|apiVersion|group|metadata)$'
Basically this executor accepts the bundle, runs krm-function gcr.io/kpt-fn-contrib/sops:v0.1.0
with configuration from config
field and stores the result to the directory target/generator/results/generated
based on the filenames/hierarchy defined by annotation config.kubernetes.io/path
. Sops krm-function in its turn encrypts documents and that means that target/generator/results/generated
will contain encrypted yamls. To make that work the user will need just to specify 2 environment variables:
SOPS_IMPORT_PGP
SOPS_PGP_FP
Possible option how to encrypt externally provided secrets
First of all - it’s possible to make as many phases as needed, each phase will cover its separate procedure, e.g.: change of LDAP credentials, update some external passwords.
The only limitation is that each procedure has to have it’s own VariableCatalogues - that just allows not to decrypte/re-encrypt values from all VariableCatalogues.
For Externally provided secrets
we should use some unencrypted VariableCatalogue as a resource instead of templater. The encryption executor configuration will look the same.
Moreover, it’s possible to combine several secret sources in 1 phase, e.g. if we need to encrypt generated and externally provided secrets, just create another directory with kustomization, and put there different resources:
- Local files with
externally provided secrets
in form of unencrypted variable catalogues - Directory
target/generator
.
Update phase’s documentEntryPoint with the new path to the created directory. Now when you run the phase - all these files along with newly generated secrets will be encrypted.
Decryption of secrets and using them
The current implementation of manifests doesn’t require explicit decryption of files. All secrets are decrypted on the spot. Here are the details of how it was achieved:
All encrypted documents are listed in the following kustomization file.
This kustomization file performs decryption by invoking decrypt-secrets
transformer, that is just a sops krm-function configuration that decrypts all encrypted documents.
Note: we made a special kustomization for decrypt-secrets configuration just to be able to modify it a bit depending on the environment variable TOLERATE_DECRYPTION_FAILURES
value. If it’s true we’re adding parameter cmd-tolerate-failures: true
to sops configuration.
Once decrypted that VariableCatalogues may be imported as well as other catalogues. E.g.: See this line in the kustomization file. And it’s possible to use their values as a source for replacement transformer. E.g. this replacement plugin configuration updates fields of kubeconfig in order to put there generated keys/certs.
To get even more familiar with that approach and understand all details please refer to the [following commit] (a252b248bc
).
Decryption and printing the generated secrets to the screen
In some cases it may be necessary to see what was generated by the templater in unencrypted form. For example, new SSH-keys were generated and it's necessary to get
the private in order to be able to login to the node. Since in general it maybe very useful another phase called secret-show
has been introduced.
It decrypts and prints out the generated secrets.
Master key rotation
This procedure may be done in many different ways depending on the organizational processes. There are 2 different approaches that may be used:
- when we create a new key - all secrets are getting re-encrypted with that new key
- when we create a new key - we're using it for generation/encryption of new secrets, but the old one stays valid till the last secret encrypted with it is getting regenerated and encrypted with new one. That means that old and new keys are used for decryption in parallel during some 'overlap' period. This is be similar to the approach that Sealed secrets project selected.
Both approaches are possible taking into account that fact that SOPS allows you to have several private keys to decrypt data and it selects the needed one automatically.
Nevertheless for the sake of simplicity we're currently implemented the first approach in our manifests. There is a phase called secret-reecnrypt
that allows to perform master key rotation.
In order to do so please follow the following steps:
- generate new master key pair using, e.g. using gpg wizard:
gpg --full-generate-key
Note: please make sure you know the fingerprint of the newly generated key.
- append the env variable
SOPS_IMPORT_PGP
with the new keypair (don't delete the prvious one at this step, because it's needed for decryption). - set the env variable
SOPS_PGP_FP
to the value of the NEW private key fingerprint. That means that the new key will be used for encryption. - run
airshipctl phase run secret-reecnrypt
. make sure it runs successfully. - check that all encrypted files were updated and that pgp.fp field for all of them equal to the value you specified in
SOPS_PGP_FP
. - now it's possible to delete the old master key from
SOPS_IMPORT_PGP
. Once done it's possible to runairshipctl phase run secret-show
to ensure that the keys will be decrypted properly. - commit the changes to the site manifests.
Troubleshooting typical cases
Note: In order to make troubleshotting possible please set env variable DEBUG_SOPS_GPG=true
to see all debug output.
Validate keys fingerprints
Sops function fails with the following typical output:
gpg: keybox '/tmp/pubring.kbx' created
gpg: /tmp/trustdb.gpg: trustdb created
gpg: key D8720D957C3D3074: public key "SOPS Functional Tests Key 2 (https://github.com/mozilla/sops/) <secops@mozilla.com>" imported
gpg: key D8720D957C3D3074: secret key imported
gpg: key 3D16CEE4A27381B4: public key "SOPS Functional Tests Key 1 (https://github.com/mozilla/sops/) <secops@mozilla.com>" imported
gpg: key D8720D957C3D3074: "SOPS Functional Tests Key 2 (https://github.com/mozilla/sops/) <secops@mozilla.com>" not changed
gpg: key 19F9B5DAEA91FF86: public key "SOPS Functional Tests Key 3 (https://github.com/mozilla/sops/) <secops@mozilla.com>" imported
gpg: Total number processed: 4
gpg: imported: 3
gpg: unchanged: 1
gpg: secret keys read: 1
gpg: secret keys imported: 1
[ERROR] Sops command results in error for
apiVersion: airshipit.org/v1alpha1
kind: VariableCatalogue
metadata:
labels:
airshipit.org/deploy-k8s: 'false'
name: password-secret
passwordRandom1: 'ENC[AES256_GCM,data:o1xUrKiOPaucB+U2JSg=,iv:vJkmHG5B9/xiQA+qfRHyYwQFKIG1P0S0k8qwFCEyICk=,tag:MqLeMZ3BXhNKaUKvZoLStw==,type:str]'
sops:
azure_kv: []
gcp_kms: []
hc_vault: []
kms: []
lastmodified: '2021-01-14T11:23:10Z'
mac: 'ENC[AES256_GCM,data:7aMFeEfn5MXU9M7U+rQ7fIcWG6A6BZILsvgVyEl+esa8EhEsOL6dRfITq2x+1t6ft+H5nRqbO5GyXJ3mhu7n/x5FBVVqBcZrvydojrqBWizXA4HQAc3t8OS3D1I2WLLx+S7mI5AiKDERGZX4ImiahSebqL/bNfpYdDQP+gX8+vQ=,iv:zchumZaGhTpyEEsJMMlW/e1vieqjVKT32Kiv0LuLPlk=,tag:q0vWzGZ8D4HYHTvdRymG0g==,type:str]'
pgp:
- created_at: '2021-01-14T11:23:10Z'
enc: |
-----BEGIN PGP MESSAGE-----
hQEMAyUpShfNkFB/AQf+IIXYumKkSmzMHCoJVXculVowkez4aUI/OpdNw2CPWNDd
3Kzea6kTv64ef+kll9DhczP0gVlgUZ0p0MenBfmkI4qt3wr5fyRUVjUpfF/R8Gmc
9GZf4myDD5T2wDJVCkNmO2wogbZ7IZaGdx0HV3DihvSGg0xcGBUaFp/zeR9vXTQs
a+CecTBm4+7uLnDvHf4Rathy3gnlLrLLdsJXRgEOJ2Fqp/JjoqFqsWOol9lFwALM
yRkxbWjeL7ePddXBZ8QmOB/AB0RKSRQ2Yd9RXpp1gSFKn5NOfWIZsaVgdds2zOw5
R5syWHhfzVylAxNrKJYIgr9hLje48W/Y6GSezkGvG9JcAebQzVP53UtXkwJSIjda
86WAFwpgpZ0sEG7zpSpxS8p4g3XsXjOdD2b0y/dwXGYK5oeOjb/wGYFf1EX0p0xk
BqGQ8JHxikqW8oEuyEgeg96uEMZb1Vy7u657zPw=
=VfIN
-----END PGP MESSAGE-----
fp: FBC7B9E2A4F9289AC0C1D4843D16CEE4A27381B4
unencrypted_regex: ^(kind|apiVersion|group|metadata)$
version: 3.6.1
Failed to get the data key required to decrypt the SOPS file.
Group 0: FAILED
FBC7B9E2A4F9289AC0C1D4843D16CEE4A27381B4: FAILED
- | could not decrypt data key with PGP key:
| golang.org/x/crypto/openpgp error: Could not load secring:
| open /tmp/secring.gpg: no such file or directory; GPG binary
| error: exit status 2
Recovery failed because no master key was able to decrypt the file. In
order for SOPS to recover the file, at least one key has to be successful,
but none were.
It’s necessary to pay attention to the first part of the message - where gpg performs key import and compares it with the fingerprint of the key in the encrypted document itself. The fingerprint that was used is (from sops.pgp.fp):
fp: FBC7B9E2A4F9289AC0C1D4843D16CEE4A27381B4
In the sops krm function logs it’s possible to see that the following public keys are imported: D8720D957C3D3074 3D16CEE4A27381B4 D8720D957C3D3074 (second time :) ) 19F9B5DAEA91FF86 And only 1 private key is imported: D8720D957C3D3074
Pgp shows only last 16 symbols of fingerprint. Our fingerprint's last 16 symbols are: 3D16CEE4A27381B4
.
It’s clear that the imported bundle with public and private key didn’t have a private key with this fingerprint. That was the reason why sops wasn’t able to decrypt the document. The solution is - to make sure that all needed keys are imported.
Validate format of the encrypted message
UPD: the root-cause of that behavior was identified here.
Here is another typical output:
...
sops:
azure_kv: []
gcp_kms: []
hc_vault: []
kms: []
lastmodified: '2021-02-12T17:01:46Z'
mac: 'ENC[AES256_GCM,data:JeDU6fOEC1Yz5vIWS5A9TJfqC3SpVds+96F27fH7UXOLxLzSEQjCbQFXdZzW3FEJvFPrPz8KcnWsm1VZQJRZIpyJCNhJfpq302CadUsohs4kLVbgoSHkXWtTVYLSQn6BmjfSaMeghJAQ6LgqE7AtgpSnc5d+F8kuRDr/AQE0Nv0=,iv:T4dzbWQFSzPAZjEevch79MTjKmsd1Ia4t5xiY5+ZAVw=,tag:Zf5XM4OieHGXx4s/3UO2Tw==,type:str]'
pgp:
- created_at: '2021-02-12T17:01:44Z'
enc: |-
-----BEGIN PGP MESSAGE-----
wcBMAyUpShfNkFB/AQgAibVYA6Cu3LcZ0/Q//4DRpUnVQ8iRUfTBAzDihvE36hFt
haKwbA/zwdivwNpVCdyw0qoAGwMrXlaSFhsrpdXDNV1dPqVoOzRd5EBIl13xbQGP
hqR4c4BKIkJM4hGO3LpNNLi6cR9lMmUi06TGVp2GkO8aCVmbTK6Q8RdHRtKisxfb
pEpiMl9vpequ2IgnWhd+XSy6rCMWpldLzqT1dBMSjSON0TBtLOXB2gqWaszGNhDs
pfuYo1F0xO86HblgOURTLJ+lr0rhPMn55iiNL1JG5hQcj0to4UKTCKCpOZZrAk0n
MbfrwIRDC9Nd5xVjl/TNA1IQN9DAapHYWMMHsl3LOdLgAeR0uJnuZ5rwHEokMits
zhxV4RHG4BfgjOHP5uBw4ubrJxjgHeXL4YBiGY+oPNtaLRI+xzXtw7uT27pwa0ww
7PFJ3SGcZeCV5ImYQXqdwF70smk47EMHNUbijA5WNeEpkQA=
=Zv9X
-----END PGP MESSAGE-----
fp: FBC7B9E2A4F9289AC0C1D4843D16CEE4A27381B4
unencrypted_regex: ^(kind|apiVersion|group|metadata)$
version: 3.6.1
…
Failed to get the data key required to decrypt the SOPS file.
Group 0: FAILED
FBC7B9E2A4F9289AC0C1D4843D16CEE4A27381B4: FAILED
- | could not decrypt data key with PGP key:
| golang.org/x/crypto/openpgp error: Could not load secring:
| open /tmp/secring.gpg: no such file or directory; GPG binary
| error: exit status 2
Recovery failed because no master key was able to decrypt the file. In
order for SOPS to recover the file, at least one key has to be successful,
but none were.
In fact this is a pretty rare issue, but still I saw that once. The problem is the following part
enc: |-
-----BEGIN PGP MESSAGE-----
wcBMAyUpShfNkFB/AQgAibVYA6Cu3LcZ0/Q//4DRpUnVQ8iRUfTBAzDihvE36hFt
should have one empty line after -----BEGIN PGP MESSAGE-----
. It should look like this:
enc: |-
-----BEGIN PGP MESSAGE-----
wcBMAyUpShfNkFB/AQgAibVYA6Cu3LcZ0/Q//4DRpUnVQ8iRUfTBAzDihvE36hFt
Sops typically starts working after that correction.