mirror of
https://github.com/minio/minio.git
synced 2024-12-27 07:35:55 -05:00
09626d78ff
With this commit, MinIO generates root credentials automatically and deterministically if: - No root credentials have been set. - A KMS (KES) is configured. - API access for the root credentials is disabled (lockdown mode). Before, MinIO defaults to `minioadmin` for both the access and secret keys. Now, MinIO generates unique root credentials automatically on startup using the KMS. Therefore, it uses the KMS HMAC function to generate pseudo-random values. These values never change as long as the KMS key remains the same, and the KMS key must continue to exist since all IAM data is encrypted with it. Backward compatibility: This commit should not cause existing deployments to break. It only changes the root credentials of deployments that have a KMS configured (KES, not a static key) but have not set any admin credentials. Such implementations should be rare or not exist at all. Even if the worst case would be updating root credentials in mc or other clients used to administer the cluster. Root credentials are anyway not intended for regular S3 operations. Signed-off-by: Andreas Auernhammer <github@aead.dev>
51 lines
1.9 KiB
Go
51 lines
1.9 KiB
Go
// Copyright (c) 2015-2022 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package kms
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/minio/kms-go/kes"
|
|
)
|
|
|
|
// KeyManager is the generic interface that handles KMS key operations
|
|
type KeyManager interface {
|
|
// CreateKey creates a new key at the KMS with the given key ID.
|
|
CreateKey(ctx context.Context, keyID string) error
|
|
|
|
// DeleteKey deletes a key at the KMS with the given key ID.
|
|
// Please note that is a dangerous operation.
|
|
// Once a key has been deleted all data that has been encrypted with it cannot be decrypted
|
|
// anymore, and therefore, is lost.
|
|
DeleteKey(ctx context.Context, keyID string) error
|
|
|
|
// ListKeys lists all key names.
|
|
ListKeys(ctx context.Context) (*kes.ListIter[string], error)
|
|
|
|
// ImportKey imports a cryptographic key into the KMS.
|
|
ImportKey(ctx context.Context, keyID string, bytes []byte) error
|
|
|
|
// EncryptKey Encrypts and authenticates a (small) plaintext with the cryptographic key
|
|
// The plaintext must not exceed 1 MB
|
|
EncryptKey(keyID string, plaintext []byte, context Context) ([]byte, error)
|
|
|
|
// HMAC computes the HMAC of the given msg and key with the given
|
|
// key ID.
|
|
HMAC(ctx context.Context, keyID string, msg []byte) ([]byte, error)
|
|
}
|