Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/shyiko/kubesec

Secure Secret management for Kubernetes (with gpg, Google Cloud KMS and AWS KMS backends)
https://github.com/shyiko/kubesec

aws-kms google-cloud-kms gpg kubernetes secret

Last synced: 22 days ago
JSON representation

Secure Secret management for Kubernetes (with gpg, Google Cloud KMS and AWS KMS backends)

Awesome Lists containing this project

README

        

# kubesec ![Latest Version](https://img.shields.io/badge/latest-0.9.2-blue.svg) [![Build Status](https://travis-ci.org/shyiko/kubesec.svg?branch=master)](https://travis-ci.org/shyiko/kubesec)

Secure secret management for [Kubernetes](https://kubernetes.io/) (with [gpg](https://gnupg.org/),
[Google Cloud KMS](https://cloud.google.com/kms/) and [AWS KMS](https://aws.amazon.com/kms/) backends).

[![asciicast](https://asciinema.org/a/YCUk0q7e3qUi6kjqJq9NQdt6c.png)](https://asciinema.org/a/YCUk0q7e3qUi6kjqJq9NQdt6c)

In short, it allows you to encrypt [Secret](https://kubernetes.io/docs/concepts/configuration/secret/)s so that they can be stored in VCS along
with the rest of resources.
An example of encrypted Secret is shown below (note that only the "data" is encrypted (and that keys are left untouched)):

```yml
apiVersion: v1
kind: Secret
metadata:
name: myapp-default-0
type: Opaque
data:
KEY: TUFkWD1iuKs=.O....D...=
ANOTHER_KEY: iOy1nf90+M6FrrEIoymN6cOSUYM=.E...=.q...=
# ...
```

The nice thing about this approach (compared to complete file encryption) is that `git diff` and `git merge` become
so much more user-friendly (+ you can ascertain that specific entry is present even if you don't have the key to decrypt the secret).

`kubesec` is written in Go, works with (or without) [Yubikey](https://www.yubico.com/) ❤.

> For general-purpose secret management, take a look at [mozilla/sops](https://github.com/mozilla/sops)
(`kubesec`'s drawn a lot of inspiration from it).

## Installation

#### macOS

```sh
curl -sSL https://github.com/shyiko/kubesec/releases/download/0.9.2/kubesec-0.9.2-darwin-amd64 \
-o kubesec && chmod a+x kubesec && sudo mv kubesec /usr/local/bin/
```

Verify PGP signature (optional but recommended):

```
curl -sSL https://github.com/shyiko/kubesec/releases/download/0.9.2/kubesec-0.9.2-darwin-amd64.asc \
-o kubesec.asc
curl -sS https://keybase.io/shyiko/pgp_keys.asc | gpg --import
gpg --verify kubesec.asc /usr/local/bin/kubesec
```

> `gpg` can be installed with `brew install gnupg`

##### ... with [Homebrew](https://brew.sh/)

```
brew install shyiko/kubesec/kubesec
brew install shyiko/kubesec/kubesec --with-short-name # install as "ksec"
```

> `brew install shyiko/kubesec/kubesec` is equivalent to `brew tap shyiko/kubesec && brew install kubesec`.

#### Linux

```sh
curl -sSL https://github.com/shyiko/kubesec/releases/download/0.9.2/kubesec-0.9.2-linux-amd64 \
-o kubesec && chmod a+x kubesec && sudo mv kubesec /usr/local/bin/
```

Verify PGP signature (optional but recommended):

```
curl -sSL https://github.com/shyiko/kubesec/releases/download/0.9.2/kubesec-0.9.2-linux-amd64.asc \
-o kubesec.asc
curl -sS https://keybase.io/shyiko/pgp_keys.asc | gpg --import
gpg --verify kubesec.asc /usr/local/bin/kubesec
```

#### Windows

Download executable from the [Releases](https://github.com/shyiko/kubesec/releases) page.

## Usage

> **If you plan to use gpg**:
... but don't have a valid PGP key, see [GitHub Help - Generating a new GPG key](https://help.github.com/articles/generating-a-new-gpg-key/#platform-linux) on
how to generate one.
[gpg](https://gnupg.org/) (tested: 2.0+; recommended: 2.1+) must be available on the PATH.
It's also highly recommended to set up [gpg-agent](https://wiki.archlinux.org/index.php/GnuPG#gpg-agent) to avoid
constant passphrase re-entry.

#### Encryption

```sh
# encrypt existing Secret (see `kubesec create` below on how to create encrypted secret from scratch)
kubesec encrypt secret.yml
# same as above but output is written back to secret.yml (instead of stdout)
kubesec encrypt -i secret.yml

# NOTE: if you don't specify --key - default PGP key will be used
# in other words, `kubesec encrypt secret.yml` is identical to
kubesec encrypt --key=pgp:default secret.yml

# NOTE: multiple --key|s can be specified if needed
# (and they don't have to be of the same type, i.e. `--key=pgp:... --key=arn:...`
# is perfectly valid)

# encrypt with PGP key ("pgp:" prefix is optional)
kubesec encrypt --key=pgp:6206C32E111611688694CF5530BDA87E3E71C268 secret.yml

# avoid gpgagent for pgp passprhase when encrypting with PGP key ("pgp:" prefix is optional)
kubesec encrypt --passphrase= --key=pgp:6206C32E111611688694CF5530BDA87E3E71C268 secret.yml

# encrypt with Google Cloud KMS key ("gcp:" prefix is optional)
#
# NOTE: you'll need either to `gcloud auth application-default login` or set
# GOOGLE_APPLICATION_CREDENTIALS=/path/to/credentials.json
# before attempting secret encryption/decryption
#
# https://developers.google.com/identity/protocols/application-default-credentials#howtheywork
kubesec encrypt --key=gcp: secret.yml
kubesec encrypt \
--key=gcp:projects/project-0/locations/global/keyRings/keyring-0/cryptoKeys/key-0 secret.yml

# encrypt with AWS KMS key ("aws:" prefix is optional)
#
# NOTE: you might need to `aws configure` (if you don't have ~/.aws/credentials already)
#
# http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html
kubesec encrypt --key=aws: secret.yml
kubesec encrypt \
--key=aws:arn:aws:kms:us-west-1:000000000000:key/00000000-0000-0000-0000-000000000000 secret.yml

# add ...D89 key & drop ...310 key (leave all other keys untouched)
kubesec encrypt --key=+pgp:160A7A9CF46221A56B06AD64461A804F2609FD89 \
--key=-pgp:6206C32E111611688694CF5530BDA87E3E71C268 secret.yml
# NOTE: removal of a key will automatically result in data encryption key rotation
# you will also need to change all the secrets as whoever you removed from the chain of trust might
# still have access to the previous version of a file

# encrypt content of stdin
cat secret.yml | kubesec encrypt -

# create encrypted Secret from key=value pair(s) / file(s)
kubesec create secret-name \
--data key=value \
--data file:pki/ca.crt \
--data file:hostname.key=pki/private/server.key \
-o secret.enc.yml
```

#### Decryption

```sh
# decrypt a Secret
# (usually combined with kubectl (`kubesec decrypt secret.enc.yml | kubectl apply -f -`))
kubesec decrypt secret.enc.yml

# decrypt without invoking gpgagent - useful for unattended interaction or for alternate keyrings
#
# You can prevent these lines ending up in history with a space
# see https://www.linuxjournal.com/content/using-bash-history-more-efficiently-histcontrol or https://superuser.com/questions/352788/how-to-prevent-a-command-in-the-zshell-from-being-saved-into-history
kubesec decrypt --keyring alternate.keyring --passphrase= secret.yml

# decrypt to a custom Go Template (http://golang.org/pkg/text/template) string
kubesec decrypt secret.enc.yml --cleartext --template='KEY={{ .data.KEY }}'
kubesec decrypt secret.enc.yml --cleartext \
--template=$'{{ range $k, $v := .data }}{{ $k }}={{ $v }}\n{{ end }}' > .env
```

#### Modification

```sh
# open decrypted Secret in $EDITOR (it will be automatically re-encrypted upon save)
kubesec edit -i secret.enc.yml
kubesec edit -i --key= secret.enc.yml
# same as above but secret.enc.yml will be created if it doesn't exist
kubesec edit -if secret.enc.yml

# batch editing (noninteractive)
kubesec patch -i secret.enc.yml --data key1=secret_string --data file:key2=path/to/file

# "decrypt, modify-in-any-way-you-like, re-encrypt"
kubesec decrypt --cleartext secret.enc.yml -o secret.yml
# edit secret.yml using your favourite editor / tool
kubesec encrypt --cleartext secret.yml -o secret.enc.yml --parent=secret.enc.yml
# --parent=path/to/encrypted/secret.enc.yml above is used to preserve keys, DEK and IVs (when safe)
```

#### Introspection

```sh
# show information about the Secret (who has access to the "data", last modification date, etc)
kubesec introspect secret.enc.yml
```

#### Tab completion

```sh
# bash
source <(kubesec completion bash)

# zsh
source <(kubesec completion zsh)
```

> `-` can be used anywhere (where a file is expected) to reference `stdin`.
> (for more information see `kubesec --help`)

## Example(s)

#### #1 (basic)

```sh
kubesec create secret-name -d key=value -d file:path/to/file -o secret.enc.yml
kubesec decrypt secret.enc.yml | kubectl apply -f -
```

## Playground

If you have `docker` installed you don't need to download `kubesec` binary just to try it out.
Instead, launch a container and start playing:

```sh
docker run -it --rm shyiko/kubesec-playground:0.9.2 /bin/bash
$ kubesec encrypt secret.yml
```

> `shyiko/kubesec-playground` image contains `gpg` 2.1+, kubesec, vim (as a default $EDITOR) and
secret PGP key of Jean-Luc Picard (PGP fingerprint - 6206C32E111611688694CF5530BDA87E3E71C268).

> Dockerfile [is included within this repo](kubesec-playground.dockerfile).

## Encryption Protocol

- "data" values are encrypted with AES-GCM
(each value is padded to a block-size (48 bytes by default) and then encrypted using a shared (resource-unique, randomly generated) 256-bit DEK & a 96-bit random IV).
- DEK is encrypted (and signed in case of PGP) with `--key`(s) before being stored in a Secret as `# kubesec:::...` (one entry for each `--key`).

In addition to the above, kubesec also generates MAC (AES-GMAC, with AAD constructed from both the "data" and the `--key`(s)). If MAC is missing or invalid -
decryption will fail (`kubesec edit -i --recompute-mac ` can be used to recompute MAC when necessary (e.g. after `git merge`)).

## Reporting Security Issues

Please reach me at https://keybase.io/shyiko.

## Development

> PREREQUISITE: [go1.9](https://golang.org/dl/)+.

```sh
git clone https://github.com/shyiko/kubesec $GOPATH/src/github.com/shyiko/kubesec
cd $GOPATH/src/github.com/shyiko/kubesec
make fetch

go run kubesec.go
```

## Legal

All code, unless specified otherwise, is licensed under the [Apache-2.0](LICENSE) license.
Copyright (c) 2018 Stanley Shyiko.