Skip to content

Conversation

@dmihalcik-virtru
Copy link
Member

@dmihalcik-virtru dmihalcik-virtru commented Aug 14, 2024

  • During encrypt autoconfigure, load any KAS keys found in the policy service's Kas Registry that are associated with grants from the new 'cached' field in the kas registry, if it is set
  • These are then used to wrap any key access objects
  • This wasn't previously used since the SDK requires the key identifiers and algorithm which were not present in the old 'public key' field
  • Fixes Use stored KAS keys from kas registry, when available #1349
  • Adds a bats test that demonstrates loading a key from a KAS that is offline

@dmihalcik-virtru dmihalcik-virtru requested review from a team as code owners August 14, 2024 17:41
@github-actions

This comment has been minimized.

@dmihalcik-virtru dmihalcik-virtru marked this pull request as draft August 14, 2024 17:41
@jakedoublev
Copy link
Contributor

Sorry, just realized those comments ^^ should be on #1347 instead. Resolving here and adding there.

@github-actions
Copy link
Contributor

Warning

This pull request does not reference any issues. Please add a reference to an issue in the body of the pull request description.

@jakedoublev
Copy link
Contributor

This looks good to me, but it looks like the pipeline is ❌ and it will probably have conflicts with #1318 ?

Deferred to not block releases until everything is bumped
Lots of things are declared in the sdk package, so this is easier than factoring shared items into a helper package that would otherwise introduce bidirectional package deps between sdk (root) and autoconfigure (internal) packages
- Lets the SDK load kas keys from the policy service
- This was removed/unsupported before, since the SDK requires Key IDs, but the service previously did not store them
- Adds a sample round trip that loads a key from a non-existant KAS to validate that the SDK doesn't call out when the key is loaded into the policy service
@dmihalcik-virtru
Copy link
Member Author

This looks good to me, but it looks like the pipeline is ❌ and it will probably have conflicts with #1318 ?

yes, I'll fix that up after merging this.

jakedoublev
jakedoublev previously approved these changes Aug 19, 2024
@dmihalcik-virtru dmihalcik-virtru added this pull request to the merge queue Aug 20, 2024
Merged via the queue into main with commit fe628a0 Aug 20, 2024
@dmihalcik-virtru dmihalcik-virtru deleted the feature/store-kid-2 branch August 20, 2024 02:44
github-merge-queue bot pushed a commit that referenced this pull request Aug 20, 2024
🤖 I have created a release *beep* *boop*
---


##
[0.2.14](protocol/go/v0.2.13...protocol/go/v0.2.14)
(2024-08-20)


### Features

* **policy:** 1277 protos and service methods for Resource Mapping
Groups operations
([#1343](#1343))
([570f402](570f402))
* **sdk:** Load KAS keys from policy service
([#1346](#1346))
([fe628a0](fe628a0))

---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).

Co-authored-by: opentdf-automation[bot] <149537512+opentdf-automation[bot]@users.noreply.github.com>
github-merge-queue bot pushed a commit that referenced this pull request Aug 20, 2024
🤖 I have created a release *beep* *boop*
---


##
[0.3.9](sdk/v0.3.8...sdk/v0.3.9)
(2024-08-20)


### Features

* **sdk:** Load KAS keys from policy service
([#1346](#1346))
([fe628a0](fe628a0))
* **sdk:** support oauth2 tokensource with option
([#1394](#1394))
([2886c0f](2886c0f)),
closes [#1307](#1307)


### Bug Fixes

* **core:** Autobump sdk
([#1402](#1402))
([192e5e5](192e5e5))

---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).

Co-authored-by: opentdf-automation[bot] <149537512+opentdf-automation[bot]@users.noreply.github.com>
Co-authored-by: Jake Van Vorhis <[email protected]>
github-merge-queue bot pushed a commit that referenced this pull request Aug 20, 2024
🤖 I have created a release *beep* *boop*
---


##
[0.4.19](service/v0.4.18...service/v0.4.19)
(2024-08-20)


### Features

* **core:** add RPCs to namespaces service to handle assignment/removal
of KAS grants ([#1344](#1344))
([ee47d6c](ee47d6c))
* **core:** Adds key ids to kas registry
([#1347](#1347))
([e6c76ee](e6c76ee))
* **core:** further support in policy for namespace grants
([#1334](#1334))
([d56231e](d56231e))
* **core:** support grants to namespaces, definitions, and values in
GetAttributeByValueFqns
([#1353](#1353))
([42a3d74](42a3d74))
* **core:** validate kas uri
([#1351](#1351))
([2b70931](2b70931))
* **policy:** 1277 protos and service methods for Resource Mapping
Groups operations
([#1343](#1343))
([570f402](570f402))
* **sdk:** Load KAS keys from policy service
([#1346](#1346))
([fe628a0](fe628a0))
* **sdk:** public client and other enhancements to well-known SDK
functionality ([#1365](#1365))
([3be50a4](3be50a4))


### Bug Fixes

* **authz:** Add http routes for authorization to casbin policy
([#1355](#1355))
([3fbaf59](3fbaf59))
* **core:** align keycloak provisioning in one command
([#1381](#1381))
([c3611d2](c3611d2)),
closes [#1380](#1380)
* **core:** align policy kas grant assignments http gateway methods with
actions ([#1299](#1299))
([031c6ca](031c6ca))
* **core:** Autobump service
([#1340](#1340))
([3414670](3414670))
* **core:** Autobump service
([#1369](#1369))
([2ac2378](2ac2378))
* **core:** Autobump service
([#1403](#1403))
([8084e3e](8084e3e))
* **core:** Autobump service
([#1405](#1405))
([74a7f0c](74a7f0c))
* **core:** bump go version to 1.22
([#1407](#1407))
([c696cd1](c696cd1))
* **core:** cleanup sensitive info being logged from configuration
([#1366](#1366))
([2b6cf62](2b6cf62))
* **core:** policy kas grants list (filter params and namespace grants)
([#1342](#1342))
([f18ba68](f18ba68))
* **core:** policy migrations timestamps merge order
([#1325](#1325))
([2bf4290](2bf4290))
* **sdk:** align sdk with platform modes
([#1328](#1328))
([88ca6f7](88ca6f7))

---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).

Co-authored-by: opentdf-automation[bot] <149537512+opentdf-automation[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Use stored KAS keys from kas registry, when available

5 participants