open-vault/vault/seal
Seth Vargo c3f1043c24 Reduce required permissions for the GCPCKMS auto-unsealer (#5999)
This changes the behavior of the GCPCKMS auto-unsealer setup to attempt
encryption instead of a key lookup. Key lookups are a different API
method not covered by roles/cloudkms.cryptoKeyEncrypterDecrypter. This
means users must grant an extended scope to their service account
(granting the ability to read key data) which only seems to be used to
validate the existence of the key.

Worse, the only roles that include this permission are overly verbose
(e.g. roles/viewer which gives readonly access to everything in the
project and roles/cloudkms.admin which gives full control over all key
operations). This leaves the user stuck between choosing to create a
custom IAM role (which isn't fun) or grant overly broad permissions.

By changing to an encrypt call, we get better verification of the unseal
permissions and users can reduce scope to a single role.
2019-01-04 16:29:31 -05:00
..
alicloudkms autoseal: fix error typos (#5877) 2018-11-29 16:07:08 -08:00
awskms Don't read AWS env vars (#5974) 2019-01-04 15:03:57 -05:00
azurekeyvault fix key version tracking (#5757) 2018-11-12 09:52:31 -08:00
gcpckms Reduce required permissions for the GCPCKMS auto-unsealer (#5999) 2019-01-04 16:29:31 -05:00
envelope.go
envelope_test.go
seal.go Add HSMAutoDeprecated for ent upgrade (#5704) 2018-11-06 09:42:03 -08:00
seal_testing.go