Source code for saltext.boto3.states.boto3_kms

"""
Manage KMS keys, key policies and grants using boto3.
=====================================================

    Renamed from ``boto_kms`` to ``boto3_kms`` and updated to call the
    refactored ``boto3_kms`` execution module.

Create and destroy KMS keys. Be aware that this interacts with Amazon's
services, and so may incur charges.

:depends:
  - boto3 >= 1.28.0
  - botocore >= 1.31.0

This module uses ``boto3``, which can be installed via package, or pip.

This module accepts explicit kms credentials but can also utilize
IAM roles assigned to the instance through Instance Profiles. Dynamic
credentials are then automatically obtained from AWS API and no further
configuration is necessary. More information available `here
<http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html>`_.

If IAM roles are not used you need to specify them either in a pillar file or
in the minion's config file:

.. code-block:: yaml

    kms.keyid: GKTADJGHEIQSXMKKRBJ08H
    kms.key: askdjghsdfjkghWupUjasdflkdfklgjsdfjajkghs

It's also possible to specify ``key``, ``keyid`` and ``region`` via a profile,
either passed in as a dict, or as a string to pull from pillars or minion
config:

.. code-block:: yaml

    myprofile:
        keyid: GKTADJGHEIQSXMKKRBJ08H
        key: askdjghsdfjkghWupUjasdflkdfklgjsdfjajkghs
        region: us-east-1

.. code-block:: yaml

    Ensure mykey key exists:
      boto3_kms.key_present:
        - name: mykey
        - region: us-east-1

    # Using a profile from pillars
    Ensure mykey key exists:
      boto3_kms.key_present:
        - name: mykey
        - region: us-east-1
        - profile: myprofile

    # Passing in a profile
    Ensure mykey key exists:
      boto3_kms.key_present:
        - name: mykey
        - region: us-east-1
        - profile:
            keyid: GKTADJGHEIQSXMKKRBJ08H
            key: askdjghsdfjkghWupUjasdflkdfklgjsdfjajkghs

.. versionadded:: 1.0.0
"""

from salt.exceptions import SaltInvocationError
from salt.utils import dictupdate


[docs] def __virtual__(): """ Only load if the boto3_kms execution module is available. """ if "boto3_kms.describe_key" in __salt__: return "boto3_kms" return ( False, "The boto3_kms state module could not be loaded: boto3_kms execution module is unavailable.", )
[docs] def key_present( name, policy, description=None, key_usage=None, grants=None, manage_grants=False, key_rotation=False, enabled=True, region=None, key=None, keyid=None, profile=None, ): """ Ensure the KMS key exists. KMS keys can not be deleted, so this function must be used to ensure the key is enabled or disabled. name Name of the key. policy Key usage policy. description Description of the key. key_usage Specifies the intended use of the key. Can only be set on creation, defaults to ENCRYPT_DECRYPT, which is also the only supported option. grants A list of grants to apply to the key. Not currently implemented. manage_grants Whether or not to manage grants. False by default, which will not manage any grants. key_rotation Whether or not key rotation is enabled for the key. False by default. enabled Whether or not the key is enabled. True by default. region Region to connect to. key Secret key to be used. keyid Access key to be used. profile A dict with region, key and keyid, or a pillar key (string) that contains a dict with region, key and keyid. Example: .. code-block:: yaml ensure-key-present: boto3_kms.key_present: - name: example """ if not policy: raise SaltInvocationError("policy is a required argument.") if grants and not isinstance(grants, list): raise SaltInvocationError("manage_grants must be a list.") if not isinstance(manage_grants, bool): raise SaltInvocationError("manage_grants must be true or false.") if not isinstance(key_rotation, bool): raise SaltInvocationError("key_rotation must be true or false.") if not isinstance(enabled, bool): raise SaltInvocationError("enabled must be true or false.") # TODO: support grant from pillars. # TODO: support key policy from pillars. ret = {"name": name, "result": True, "comment": "", "changes": {}} _ret = _key_present( name, policy, description, key_usage, key_rotation, enabled, region, key, keyid, profile, ) ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"]) ret["comment"] = " ".join([ret["comment"], _ret["comment"]]) if not _ret["result"]: ret["result"] = _ret["result"] if ret["result"] is False: return ret # TODO: add grants_present function return ret
def _key_present( name, policy, description, key_usage, key_rotation, enabled, region, key, keyid, profile, ): ret = {"result": True, "comment": "", "changes": {}} alias = f"alias/{name}" r = __salt__["boto3_kms.key_exists"](alias, region, key, keyid, profile) if "error" in r: ret["result"] = False ret["comment"] = "Error when attempting to find key: {}.".format(r["error"]["message"]) return ret if not r["result"]: if __opts__["test"]: ret["comment"] = "Key is set to be created." ret["result"] = None return ret rc = __salt__["boto3_kms.create_key"]( policy, description, key_usage, region, key, keyid, profile ) if "error" in rc: ret["result"] = False ret["comment"] = "Failed to create key: {}".format(rc["error"]["message"]) return ret key_metadata = rc["key_metadata"] kms_key_id = key_metadata["KeyId"] rn = __salt__["boto3_kms.create_alias"](alias, kms_key_id, region, key, keyid, profile) if "error" in rn: # We can't recover from this. KMS only exposes enable/disable # and disable is not necessarily a great action here. AWS sucks # for not including alias in the create_key call. ret["result"] = False ret["comment"] = ( "Failed to create key alias for key_id {}. This resource " "will be left dangling. Please clean manually. " "Error: {}".format(kms_key_id, rn["error"]["message"]) ) return ret ret["changes"]["old"] = {"key": None} ret["changes"]["new"] = {"key": name} ret["comment"] = f"Key {name} created." else: rd = __salt__["boto3_kms.describe_key"](alias, region, key, keyid, profile) if "error" in rd: ret["result"] = False ret["comment"] = "Failed to update key: {}.".format(rd["error"]["message"]) return ret key_metadata = rd["key_metadata"] _ret = _key_description(key_metadata, description, region, key, keyid, profile) ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"]) ret["comment"] = " ".join([ret["comment"], _ret["comment"]]) if not _ret["result"]: ret["result"] = _ret["result"] if ret["result"] is False: return ret _ret = _key_policy(key_metadata, policy, region, key, keyid, profile) ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"]) ret["comment"] = " ".join([ret["comment"], _ret["comment"]]) if not _ret["result"]: ret["result"] = _ret["result"] if ret["result"] is False: return ret # Actions that need to occur whether creating or updating _ret = _key_enabled(key_metadata, enabled, region, key, keyid, profile) ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"]) ret["comment"] = " ".join([ret["comment"], _ret["comment"]]) if not _ret["result"]: ret["result"] = _ret["result"] if ret["result"] is False: return ret _ret = _key_rotation(key_metadata, key_rotation, region, key, keyid, profile) ret["changes"] = dictupdate.update(ret["changes"], _ret["changes"]) ret["comment"] = " ".join([ret["comment"], _ret["comment"]]) if not _ret["result"]: ret["result"] = _ret["result"] return ret def _key_enabled(key_metadata, enabled, region, key, keyid, profile): ret = {"result": True, "comment": "", "changes": {}} kms_key_id = key_metadata["KeyId"] if key_metadata["Enabled"] == enabled: return ret if __opts__["test"]: ret["comment"] = "Key set to have enabled status updated." ret["result"] = None return ret if enabled: re = __salt__["boto3_kms.enable_key"](kms_key_id, region, key, keyid, profile) event = "Enabled" else: re = __salt__["boto3_kms.disable_key"](kms_key_id, region, key, keyid, profile) event = "Disabled" if "error" in re: ret["result"] = False ret["comment"] = "Failed to update key enabled status: {}.".format(re["error"]["message"]) else: ret["comment"] = f"{event} key." return ret def _key_description(key_metadata, description, region, key, keyid, profile): ret = {"result": True, "comment": "", "changes": {}} if key_metadata["Description"] == description: return ret if __opts__["test"]: ret["comment"] = "Key set to have description updated." ret["result"] = None return ret rdu = __salt__["boto3_kms.update_key_description"]( key_metadata["KeyId"], description, region, key, keyid, profile ) if "error" in rdu: ret["result"] = False ret["comment"] = "Failed to update key description: {}.".format(rdu["error"]["message"]) else: ret["comment"] = "Updated key description." return ret def _key_rotation(key_metadata, key_rotation, region, key, keyid, profile): ret = {"result": True, "comment": "", "changes": {}} kms_key_id = key_metadata["KeyId"] rke = __salt__["boto3_kms.get_key_rotation_status"](kms_key_id, region, key, keyid, profile) if rke["result"] == key_rotation: return ret if __opts__["test"]: ret["comment"] = "Key set to have key rotation policy updated." ret["result"] = None return ret if not key_metadata["Enabled"]: ret["comment"] = "Key is disabled, not changing key rotation policy." ret["result"] = None return ret if key_rotation: rk = __salt__["boto3_kms.enable_key_rotation"](kms_key_id, region, key, keyid, profile) else: rk = __salt__["boto3_kms.disable_key_rotation"](kms_key_id, region, key, keyid, profile) if "error" in rk: # Just checking for the key being disabled isn't enough, since key # disabling is very eventually consistent, so we have a long race # condition to handle. We check the error message to see if the failure # was due to a key being disabled. if "is disabled" in rk["error"]["message"]: msg = "Key is disabled, not changing key rotation policy." ret["result"] = None ret["comment"] = msg return ret ret["result"] = False ret["comment"] = "Failed to set key rotation: {}.".format(rk["error"]["message"]) else: ret["changes"] = { "old": {"key_rotation": not key_rotation}, "new": {"key_rotation": key_rotation}, } ret["comment"] = f"Set key rotation policy to {key_rotation}." return ret def _key_policy(key_metadata, policy, region, key, keyid, profile): ret = {"result": True, "comment": "", "changes": {}} kms_key_id = key_metadata["KeyId"] rkp = __salt__["boto3_kms.get_key_policy"](kms_key_id, "default", region, key, keyid, profile) if rkp["key_policy"] == policy: return ret if __opts__["test"]: ret["comment"] = "{} Key set to have key policy updated.".format(ret["comment"]) ret["result"] = None return ret rpkp = __salt__["boto3_kms.put_key_policy"]( kms_key_id, "default", policy, region, key, keyid, profile ) if "error" in rpkp: ret["result"] = False ret["comment"] = "{} Failed to update key policy: {}".format( ret["comment"], rpkp["error"]["message"] ) else: ret["comment"] = "Updated key policy." return ret