]> git-server-git.apps.pok.os.sepia.ceph.com Git - ceph.git/commit
rgw: add SSE-KMS with Vault using token auth
authorSergio de Carvalho <scarvalhojr@gmail.com>
Thu, 15 Aug 2019 14:09:08 +0000 (15:09 +0100)
committerSergio de Carvalho <scarvalhojr@gmail.com>
Tue, 1 Oct 2019 18:55:23 +0000 (19:55 +0100)
commit1e5b58ad50eae9b6df7f28baf511f4902cfbae4c
tree7dbddc3d842e1e004420d0f74b19d691d49ae81c
parent2b6056f935faf15c6ee54f49fac1268a64ca51f4
rgw: add SSE-KMS with Vault using token auth

Extend server-side encryption functionality in Rados Gateway to support
HashiCorp Vault as a Key Management System in addition to existing
support for OpenStack Barbican.

This is the first part of this change, supporting Vault's token-based
authentication only. Agent-based authentication as well as other
features such as Vault namespaces will be added in subsequent commits.

Note that Barbican remains the default backend for SSE-KMS
(rgw crypt s3 kms backend) to avoid breaking existing deployments.

Feature: https://tracker.ceph.com/issues/41062
Notes: https://pad.ceph.com/p/rgw_sse-kms

Implemented so far:
* Move existing SSE-KMS functions from rgw_crypt.cc to rgw_kms.cc
* Vault authentication with a token read from file
* Add new ceph.conf settings for Vault
* Document new ceph.conf settings
* Update main encryption documentation page
* Add documentation page for SSE-KMS using Vault

Signed-off-by: Andrea Baglioni <andrea.baglioni@workday.com>
Signed-off-by: Sergio de Carvalho <sergio.carvalho@workday.com>
14 files changed:
doc/radosgw/barbican.rst
doc/radosgw/config-ref.rst
doc/radosgw/encryption.rst
doc/radosgw/index.rst
doc/radosgw/vault.rst [new file with mode: 0644]
src/common/legacy_config_opts.h
src/common/options.cc
src/rgw/CMakeLists.txt
src/rgw/rgw_crypt.cc
src/rgw/rgw_kms.cc [new file with mode: 0644]
src/rgw/rgw_kms.h [new file with mode: 0644]
src/test/rgw/CMakeLists.txt
src/test/rgw/test_rgw_kms.cc [new file with mode: 0644]
src/vstart.sh