-
Notifications
You must be signed in to change notification settings - Fork 0
/
rotate.go
144 lines (126 loc) · 4.63 KB
/
rotate.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
package main
import (
"context"
"errors"
"fmt"
"log/slog"
"time"
"github.com/aws/aws-sdk-go-v2/service/kms"
"github.com/aws/aws-sdk-go-v2/service/kms/types"
)
type CmdRotate struct {
MinimumAge time.Duration `help:"Minimum age the 'current' key must have to be considered for rotation." default:"24h"`
Force bool `help:"Force rotation of keys regardless of age."`
KeySpec string `help:"Key specification to use for new keys." default:"RSA_2048"`
}
// Performs a key rotation operation.
// "current" key becomes "previous" and is scheduled for deletion.
// "next" key becomes "current".
// A new key is created with the "next" alias.
func (r *CmdRotate) Run(ktx *Context) error {
keyCurrent, err := r.getOrCreateKMSKey(ktx, keySuffixCurrent)
if err != nil {
return fmt.Errorf("getting current key: %w", err)
}
// NOTE: no pagination! We assume we always have < 50 aliases.
currentAliases, err := ktx.kms.ListAliases(context.Background(), &kms.ListAliasesInput{
KeyId: keyCurrent.KeyMetadata.KeyId,
})
if err != nil {
return fmt.Errorf("listing aliases for current key: %w", err)
}
for _, alias := range currentAliases.Aliases {
if *alias.AliasName != *ktx.keyAlias(keySuffixCurrent) {
continue
}
slog.Debug("Found current alias", "name", *alias.AliasName, "lastUpdated", *alias.LastUpdatedDate)
if time.Since(*alias.LastUpdatedDate) < r.MinimumAge && !r.Force {
return fmt.Errorf("current key %s is too new to be considered for rotation", *keyCurrent.KeyMetadata.KeyId)
}
}
keyPrevious, err := ktx.kms.DescribeKey(context.Background(), &kms.DescribeKeyInput{
KeyId: ktx.keyAlias(keySuffixPrevious),
})
if notFound := new(types.NotFoundException); err != nil && !errors.As(err, ¬Found) {
return fmt.Errorf("getting previous key: %w", err)
}
if err := updateOrCreateAlias(ktx, keySuffixPrevious, keyCurrent.KeyMetadata.KeyId); err != nil {
return fmt.Errorf("updating alias for previous key: %w", err)
}
keyNext, err := r.getOrCreateKMSKey(ktx, keySuffixNext)
if err != nil {
return fmt.Errorf("getting next key: %w", err)
}
if err := updateOrCreateAlias(ktx, keySuffixCurrent, keyNext.KeyMetadata.KeyId); err != nil {
return fmt.Errorf("updating alias for current key: %w", err)
}
if _, err := ktx.kms.DeleteAlias(context.Background(), &kms.DeleteAliasInput{
AliasName: ktx.keyAlias(keySuffixNext),
}); err != nil {
return fmt.Errorf("deleting next alias: %w", err)
}
if _, err := r.getOrCreateKMSKey(ktx, keySuffixNext); err != nil {
return fmt.Errorf("creating new key: %w", err)
}
if keyPrevious != nil {
// schedule deletion last to ensure we don't lose the key on error
if _, err := ktx.kms.ScheduleKeyDeletion(context.Background(), &kms.ScheduleKeyDeletionInput{
KeyId: keyPrevious.KeyMetadata.KeyId,
}); err != nil {
return fmt.Errorf("scheduling deletion of previous key: %w", err)
}
}
return nil
}
func (r *CmdRotate) getOrCreateKMSKey(ktx *Context, keySuffix string) (*kms.DescribeKeyOutput, error) {
keyAlias := ktx.keyAlias(keySuffix)
dk, err := ktx.kms.DescribeKey(context.Background(), &kms.DescribeKeyInput{
KeyId: keyAlias,
})
if err == nil {
return dk, nil
} else if notFound := new(types.NotFoundException); errors.As(err, ¬Found) {
slog.Info("Key does not exist, creating", "keyAlias", *keyAlias)
k, err := ktx.kms.CreateKey(context.Background(), &kms.CreateKeyInput{
KeySpec: types.KeySpec(r.KeySpec),
KeyUsage: types.KeyUsageTypeSignVerify, // TODO: also support encrypt/decrypt keys?
Tags: []types.Tag{
{
TagKey: ptr("ManagedBy"),
TagValue: ptr("kms-jkws-manager"),
},
},
})
if err != nil {
return nil, fmt.Errorf("creating key: %w", err)
}
if _, err := ktx.kms.CreateAlias(context.Background(), &kms.CreateAliasInput{
AliasName: keyAlias,
TargetKeyId: k.KeyMetadata.KeyId,
}); err != nil {
return nil, fmt.Errorf("creating alias for %s: %w", *k.KeyMetadata.KeyId, err)
}
return ktx.kms.DescribeKey(context.Background(), &kms.DescribeKeyInput{
KeyId: keyAlias,
})
}
return nil, err
}
func updateOrCreateAlias(ktx *Context, keySuffix string, keyID *string) error {
_, err := ktx.kms.UpdateAlias(context.Background(), &kms.UpdateAliasInput{
AliasName: ktx.keyAlias(keySuffix),
TargetKeyId: keyID,
})
if notFound := new(types.NotFoundException); errors.As(err, ¬Found) {
_, err := ktx.kms.CreateAlias(context.Background(), &kms.CreateAliasInput{
AliasName: ktx.keyAlias(keySuffix),
TargetKeyId: keyID,
})
if err != nil {
return fmt.Errorf("creating %s alias: %w", keySuffix, err)
}
} else if err != nil {
return fmt.Errorf("updating %s alias: %w", keySuffix, err)
}
return nil
}