Edited by: Shaun Mouton (@sdmouton)
Chef, nee Opscode, has long used Amazon Web Services. In fact, the original iteration of "Hosted Enterprise Chef," "The Opscode Platform," was deployed entirely in EC2. In the time since, AWS has introduced many excellent features and libraries to work with them, including Identity and Access Management (IAM), and the AWS SDK. Especially relevant to our interests is the Ruby SDK, which is available as the
aws-sdk
RubyGem. Additionally, the operations team at Nordstrom has released a gem for managing encrypted data bags called chef-vault
. In this post, I will describe how we use the AWS IAM feature, how we automate it with the aws-sdk gem, and store secrets securely using chef-vault.Definitions
First, here are a few definitions and references for readers.- Hosted Enterprise Chef - Enterprise Chef as a hosted service.
- AWS IAM - management system for authentication/authorization to Amazon Web Services resources such as EC2, S3, and others.
- AWS SDK for Ruby - RubyGem providing Ruby classes for AWS services.
- Encrypted Data Bags - Feature of Chef Server and Enterprise Chef that allows users to encrypt data content with a shared secret.
- Chef Vault - RubyGem to encrypt data bags using public keys of nodes on a chef server.
How We Use AWS and IAM
We have used AWS for a long time, before the IAM feature existed. Originally with The Opscode Platform, we used EC2 to run all the instances. While we have moved our production systems to a dedicated hosting environment, we do have non-production services in EC2. We also have some external monitoring systems in EC2. Hosted Enterprise Chef uses S3 to store cookbook content. Those with an account can see this withknife cookbook show COOKBOOK VERSION
, and note the URL for the files. We also use S3 for storing the packages from our omnibus build tool. The omnitruck metadata API service exposes this.All these AWS resources - EC2 instances, S3 buckets - are distributed across a few different AWS accounts. Before IAM, there was no way to have data segregation because the account credentials were shared across the entire account. For (hopefully obvious) security reasons, we need to have the customer content separate from our non-production EC2 instances. Similarly, we need to have the metadata about the omnibus packages separate from the packages themselves. In order to manage all these different accounts and their credentials which need to be automatically distributed to systems that need them, we use IAM users, encrypted data bags, and chef.
Unfortunately, using various accounts adds complexity in managing all this, but through the tooling I'm about to describe, it is a lot easier to manage now than it was in the past. We use a fairly simple data file format of JSON data, and a Ruby script that uses the AWS SDK RubyGem. I'll describe the parts of the JSON file, and then the script.
IAM Permissions
IAM allows customers to create separate groups which are containers of users to have permissions to different AWS resources. Customers can manage these through the AWS console, or through the API. The API uses JSON documents to manage the policy statement of permissions the user has to AWS resources. Here's an example:Granted to an IAM user, this will allow that user to perform all S3 actions to the bucket{ "Statement": [ { "Action": "s3:*", "Effect": "Allow", "Resource": [ "arn:aws:s3:::an-s3-bucket", "arn:aws:s3:::an-s3-bucket/*" ] } ] }
an-s3-bucket
and all the files it contains. Without the /*
, only operations against the bucket itself would be allowed. To set read-only permissions, use only the List and Get actions:Since this is JSON data, we can easily parse and manipulate this through the API. I'll cover that shortly."Action": [ "s3:List*", "s3:Get*" ]
See the IAM policy documentation for more information.
Chef Vault
We use data bags to store secret credentials we want to configure through Chef recipes. In order to protect these secrets further, we encrypt the data bags, using chef-vault. As I have previously written about chef-vault in general, this section will describe what we're interested in from our automation perspective.Chef vault itself is concerned with three things:
- The content to encrypt.
- The nodes that should have access (via a search query).
- The administrators (human users) who should have access.
Data File Format
The script reads a JSON file, described here:This is an example of the JSON we use. The fields:{ "accounts": [ "an-aws-account-name" ], "user": "secret-files", "group": "secret-files", "policy": { "Statement": [ { "Action": "s3:*", "Effect": "Allow", "Resource": [ "arn:aws:s3:::secret-files", "arn:aws:s3:::secret-files/*" ] } ] }, "search_query": "role:secret-files-server" }
accounts
: an array of AWS account names that have authentication credentials configured in~/.aws/config
- see my post about managing multiple AWS accountsuser
: the IAM user to create.group
: the IAM group for the created user. We use a 1:1 user:group mapping.policy
: the IAM policy of permissions, with the action, the effect, and the AWS resources. See the IAM documentation for more information about this.search_query
: the Chef search query to perform to get the nodes that should have access to the resources. For example, this one will allow all nodes that have the Chef rolesecret-files-server
in their expanded run list.
Create IAM Script
Note This script is cleaned up to save space and get to the meat of it. I'm planning to make it into a knife plugin but haven't gotten a round tuit yet.This is invoked with:require 'inifile' require 'aws-sdk' require 'json' filename = ARGV[0] dirname = File.dirname(filename) aws_data = JSON.parse(IO.read(filename)) aws_data['accounts'].each do |account| aws_creds = {} aws_access_keys = {} # load the aws config for the specified account IniFile.load("#{ENV['HOME']}/.aws/config")[account].map{|k,v| aws_creds[k.gsub(/aws_/,'')]=v} iam = AWS::IAM.new(aws_creds) # Create the group group = iam.groups.create(aws_data['group']) # Load policy from the JSON file policy = AWS::IAM::Policy.from_json(aws_data['policy'].to_json) group.policies[aws_data['group']] = policy # Create the user user = iam.users.create(aws_data['user']) # Add the user to the group user.groups.add(group) # Create the access keys access_keys = user.access_keys.create aws_access_keys['aws_access_key_id'] = access_keys.credentials.fetch(:access_key_id) aws_access_keys['aws_secret_access_key'] = access_keys.credentials.fetch(:secret_access_key) # Create the JSON content to encrypt w/ Chef Vault vault_file = File.open("#{File.dirname(__FILE__)}/../data_bags/vault/#{account}_#{aws_data['user']}_unencrypted.json", 'w') vault_file.puts JSON.pretty_generate( { 'id' => "#{account}_#{aws_data['user']}", 'data' => aws_access_keys, 'search_query' => aws_data['search_query'] } ) vault_file.close # This would be loaded directly with Chef Vault if this were a knife plugin... puts <<-eoh data-blogger-escaped---admins="" data-blogger-escaped---json="" data-blogger-escaped---mode="" data-blogger-escaped---search="" data-blogger-escaped--="" data-blogger-escaped--sd="" data-blogger-escaped-account="" data-blogger-escaped-admins="" data-blogger-escaped-aws_data="" data-blogger-escaped-be="" data-blogger-escaped-client="" data-blogger-escaped-code="" data-blogger-escaped-create="" data-blogger-escaped-data_bags="" data-blogger-escaped-encrypt="" data-blogger-escaped-end="" data-blogger-escaped-eoh="" data-blogger-escaped-humans="" data-blogger-escaped-knife="" data-blogger-escaped-list="" data-blogger-escaped-of="" data-blogger-escaped-paste="" data-blogger-escaped-search_query="" data-blogger-escaped-should="" data-blogger-escaped-unencrypted.json="" data-blogger-escaped-user="" data-blogger-escaped-vault="" data-blogger-escaped-who="">
The script iterates over each of the AWS account credentials named in the% ./create-iam.rb ./iam-json-data/filename.json
accounts
field of the JSON file named, and loads the credentials from the ~/.aws/config
file. Then, it uses the aws-sdk
Ruby library to authenticate a connection to AWS IAM API endpoint. This instance object, iam
, then uses methods to work with the API to create the group, user, policy, etc. The policy comes from the JSON document as described above. It will create user access keys, and it writes these, along with some other metadata for Chef Vault to a new JSON file that will be loaded and encrypted with the knife encrypt
plugin.As described, it will display a command to copy/paste. This is technical debt, as it was easier than directly working with the Chef Vault API at the time :).
Using Knife Encrypt
After running the script, we have an unencrypted JSON file in the Chef repository'sdata_bags/vault
directory, named for the user created, e.g., data_bags/vault/secret-files_unencrypted.json
.The{ "id": "secret-files", "data": { "aws_access_key_id": "the access key generated through the AWS API", "aws_secret_access_key": "the secret key generated through the AWS API" }, "search_query": "roles:secret-files-server" }
knife encrypt
command is from the plugin that Chef Vault provides. The output of the create-iam.rb
script outputs how to use this:% knife encrypt create vault an-aws-account-name_secret-files \ --search 'roles:secret-files-server' \ --mode client \ --json data_bags/vault/an-aws-account-name_secret-files_unencrypted.json \ --admins "`knife user list | paste -sd ',' -`"
Results
After running thecreate-iam.rb
script with the example data file, and the unencrypted JSON output, we'll have the following:- An IAM group in the AWS account named
secret-files
. - An IAM user named
secret-files
added to thesecret-files
. - Permission for the
secret-files
user to perform any S3 operations
on thesecret-files
bucket (and files it contains). - A Chef Data Bag Item named
an-aws-account-name_secret-files
in thevault
Bag, which will have encrypted contents. - All nodes matching the search
roles:secret-files-server
will be present as clients in the iteman-aws-account-name_secret-files_keys
(in thevault
bag). - All users who exist on the Chef Server will be admins in the
an-aws-account-name_secret-files_keys
item.
knife decrypt
command.The way% knife decrypt vault secret-files data --mode client vault/an-aws-account-name_secret-files data: {"aws_access_key_id"=>"the key", "aws_secret_access_key"=>"the secret key"}
knife decrypt
works is you give it the field of encrypted data to encrypt which is why the unencrypted JSON had a field named data
created - so we could use that to access any of the encrypted data we wanted. Similarly, we could use search_query
instead of data to get the search query used, in case we wanted to update the access list of nodes.In a recipe, we use the
chef-vault
cookbook's chef_vault_item
helper method to access the content:require 'chef-vault' aws = chef_vault_item('vault', 'an-aws-account_secret-files')['data']
Conclusion
I wrote this script to automate the creation of a few dozen IAM users across several AWS accounts. Unsurprisingly, it took longer to test the recipe code and access to AWS resources across the various Chef recipes, than it took to write the script and run it.Hopefully this is useful for those who are using AWS and Chef, and were wondering how to manage IAM users. Since this is "done" I may or may not get around to releasing a knife plugin.
No comments :
Post a Comment