Skip to content
This repository has been archived by the owner on Oct 24, 2023. It is now read-only.

feat: create kms key as part of cluster bootstrap #4170

Merged
merged 5 commits into from Jan 25, 2021

Conversation

aramase
Copy link
Member

@aramase aramase commented Jan 15, 2021

Reason for Change:

  • Create KMS key as part of cluster boostrap
    • This is the first step to making the kms key version mandatory for the kms plugin pod.
    • This will also allow BYOK configuration with KMS with the next KMS release.
    • Deterministic behavior instead of relying on runtime for key creation.
  • Fixes using premium sku with user-assigned managed identity

Issue Fixed:

Credit Where Due:

Does this change contain code from or inspired by another project?

  • No
  • Yes

If "Yes," did you notify that project's maintainers and provide attribution?

  • No
  • Yes

Requirements:

Notes:

cc @ritazh

@aramase aramase force-pushed the kms-v2 branch 6 times, most recently from 83bd5b4 to c142de6 Compare January 15, 2021 23:05
@codecov
Copy link

codecov bot commented Jan 15, 2021

Codecov Report

Merging #4170 (07f3123) into master (bcc8a73) will increase coverage by 0.03%.
The diff coverage is 75.00%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #4170      +/-   ##
==========================================
+ Coverage   73.27%   73.31%   +0.03%     
==========================================
  Files         135      135              
  Lines       20720    20765      +45     
==========================================
+ Hits        15183    15224      +41     
- Misses       4562     4566       +4     
  Partials      975      975              
Impacted Files Coverage Δ
pkg/engine/masterarmresources.go 67.16% <0.00%> (-1.02%) ⬇️
pkg/engine/params_k8s.go 80.13% <0.00%> (-0.56%) ⬇️
pkg/engine/templates_generated.go 44.19% <71.42%> (+0.49%) ⬆️
pkg/engine/armvariables.go 86.13% <100.00%> (+0.69%) ⬆️
pkg/engine/keyvaults.go 100.00% <100.00%> (ø)
pkg/engine/template_generator.go 68.30% <100.00%> (+0.29%) ⬆️
pkg/api/common/versions.go 96.37% <0.00%> (ø)

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update bcc8a73...07f3123. Read the comment docs.

@aramase aramase marked this pull request as ready for review January 16, 2021 00:06
@aramase
Copy link
Member Author

aramase commented Jan 16, 2021

CI failures are because of cloud-init payload limit:

$ az deployment group create --name kubernetes-southeastasia-63191 --resource-group kubernetes-southeastasia-63191 --template-file /__w/1/s/_output/kubernetes-southeastasia-63191/azuredeploy.json --parameters /__w/1/s/_output/kubernetes-southeastasia-63191/azuredeploy.parameters.json
..........2021/01/16 00:19:51 
Error from deployment for kubernetes-southeastasia-63191 in resource group kubernetes-southeastasia-63191:exit status 1
2021/01/16 00:19:51 Command Output: ValidationError: Deployment failed. Correlation ID: 959b9fbd-41f9-4e00-a67f-7218e9a6f9b2. {
  "error": {
    "code": "InvalidParameter",
    "message": "Custom data in OSProfile must be in Base64 encoding and with a maximum length of 87380 characters.",
    "target": "customData"
  }
}

@@ -192,9 +193,11 @@ func createKubernetesMasterResourcesVMSS(cs *api.ContainerService) []interface{}
}

if isKMSEnabled {
// TODO (aramase) remove storage account creation as part of kms plugin v0.0.11
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we do this in this PR?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The current release v0.0.10 is still dependent on the storage account to exist. I'll remove it when we cut a kms release v0.0.11 and update the version in aks-engine.

jackfrancis
jackfrancis previously approved these changes Jan 19, 2021
Copy link
Member

@jackfrancis jackfrancis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@@ -64,7 +64,7 @@ jobs:
k8sRelease: '1.18'
apimodel: 'examples/e2e-tests/kubernetes/release/default/definition.json'
createVNET: true
enableKMSEncryption: true
enableKMSEncryption: false
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't want to test this as part of PR gate anymore?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The new implementation brings excess cloud-init data overhead, which exceeds the allowed (64k bytes) limit when incorporated into the cluster config we're testing.

So we've added a discrete KMS-enabled cluster config to the set of jenkins-enabled cluster configs we test out of band.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's document how to run the kms-enabled jenkins job.

@aramase
Copy link
Member Author

aramase commented Jan 20, 2021

Tried to get the key version by using outputs and reference in arm-template but reference can't be used with variables or parameters.

Example arm snippet used:

    "resources": [
        {
            "type": "Microsoft.KeyVault/vaults/keys",
            "apiVersion": "2019-09-01",
            "name": "[concat(parameters('vaultName'), '/', parameters('keyName'))]",
            "location": "southcentralus",
            "properties": {
                "kty": "[parameters('keyType')]",
                "keyOps": "[parameters('keyOps')]",
                "keySize": "[parameters('keySize')]",
                "curveName": "[parameters('curveName')]"
            }
        }
    ],
    "variables": {
        "kmsEncryptionKey": "[resourceId('Microsoft.KeyVault/vaults/keys', parameters('vaultName'), parameters('keyName'))]"
    },
    "outputs": {
        "kmsKey": {
            "type": "string",
            "value": "[reference(resourceId('Microsoft.KeyVault/vaults/keys', parameters('vaultName'), parameters('keyName'))).keyUriWithVersion]"
        }
    }

https://docs.microsoft.com/en-us/azure/azure-resource-manager/templates/template-outputs?tabs=azure-powershell
https://docs.microsoft.com/en-us/azure/azure-resource-manager/templates/template-functions-resource?tabs=json#reference

SERVICE_PRINCIPAL_CLIENT_SECRET=$(jq -r '.aadClientSecret' ${AZURE_JSON_PATH})
TENANT_ID=$(jq -r '.tenantId' ${AZURE_JSON_PATH})
KMS_KEYVAULT_NAME=$(jq -r '.providerVaultName' ${AZURE_JSON_PATH})
KMS_KEY_NAME=$(jq -r '.providerKeyName' ${AZURE_JSON_PATH})
Copy link
Member

@ritazh ritazh Jan 20, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

where do you set the vault name and the key name in azure.json?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These 2 values are already set when azure.json is created the first time - https://github.com/Azure/aks-engine/blob/master/parts/k8s/cloud-init/artifacts/cse_config.sh#L212-L215

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was referring to how the keyname is passed into the cse_config.sh. But I see you are hardcoding it in the ARM template:
[concat(variables('clusterKeyVaultName'), '/', 'k8s')]",

@aramase
Copy link
Member Author

aramase commented Jan 21, 2021

@jackfrancis The pr-e2e (k8s_1_19_containerd_e2e) failure seems to be a flake. This PR is ready for final review and merge.

@ritazh Addressed comments. PTAL!

@acs-bot
Copy link

acs-bot commented Jan 25, 2021

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: aramase, jackfrancis, ritazh

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@jackfrancis jackfrancis merged commit 5d932f1 into Azure:master Jan 25, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants