| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| from __future__ import absolute_import |
|
|
| import contextlib |
| import json |
|
|
| from sagemaker import utils |
|
|
| PRINCIPAL_TEMPLATE = ( |
| '["{account_id}", "{role_arn}", ' '"arn:{partition}:iam::{account_id}:role/{sagemaker_role}"] ' |
| ) |
|
|
| KEY_ALIAS = "SageMakerTestKMSKey" |
| KMS_S3_ALIAS = "SageMakerTestS3KMSKey" |
| POLICY_NAME = "default" |
| KEY_POLICY = """ |
| {{ |
| "Version": "2012-10-17", |
| "Id": "{id}", |
| "Statement": [ |
| {{ |
| "Sid": "Enable IAM User Permissions", |
| "Effect": "Allow", |
| "Principal": {{ |
| "AWS": {principal} |
| }}, |
| "Action": "kms:*", |
| "Resource": "*" |
| }} |
| ] |
| }} |
| """ |
|
|
|
|
| def _get_kms_key_arn(kms_client, alias): |
| try: |
| response = kms_client.describe_key(KeyId="alias/" + alias) |
| return response["KeyMetadata"]["Arn"] |
| except kms_client.exceptions.NotFoundException: |
| return None |
|
|
|
|
| def _get_kms_key_id(kms_client, alias): |
| try: |
| response = kms_client.describe_key(KeyId="alias/" + alias) |
| return response["KeyMetadata"]["KeyId"] |
| except kms_client.exceptions.NotFoundException: |
| return None |
|
|
|
|
| def _create_kms_key( |
| kms_client, account_id, region, role_arn=None, sagemaker_role="SageMakerRole", alias=KEY_ALIAS |
| ): |
| if role_arn: |
| principal = PRINCIPAL_TEMPLATE.format( |
| partition=utils._aws_partition(region), |
| account_id=account_id, |
| role_arn=role_arn, |
| sagemaker_role=sagemaker_role, |
| ) |
| else: |
| principal = '"{account_id}"'.format(account_id=account_id) |
|
|
| response = kms_client.create_key( |
| Policy=KEY_POLICY.format( |
| id=POLICY_NAME, principal=principal, sagemaker_role=sagemaker_role |
| ), |
| Description="KMS key for SageMaker Python SDK integ tests", |
| ) |
| key_arn = response["KeyMetadata"]["Arn"] |
|
|
| if alias: |
| kms_client.create_alias(AliasName="alias/" + alias, TargetKeyId=key_arn) |
| return key_arn |
|
|
|
|
| def _add_role_to_policy( |
| kms_client, account_id, role_arn, region, alias=KEY_ALIAS, sagemaker_role="SageMakerRole" |
| ): |
| key_id = _get_kms_key_id(kms_client, alias) |
| policy = kms_client.get_key_policy(KeyId=key_id, PolicyName=POLICY_NAME) |
| policy = json.loads(policy["Policy"]) |
| principal = policy["Statement"][0]["Principal"]["AWS"] |
|
|
| if role_arn not in principal or sagemaker_role not in principal: |
| principal = PRINCIPAL_TEMPLATE.format( |
| partition=utils._aws_partition(region), |
| account_id=account_id, |
| role_arn=role_arn, |
| sagemaker_role=sagemaker_role, |
| ) |
|
|
| kms_client.put_key_policy( |
| KeyId=key_id, |
| PolicyName=POLICY_NAME, |
| Policy=KEY_POLICY.format(id=POLICY_NAME, principal=principal), |
| ) |
|
|
|
|
| def get_or_create_kms_key( |
| sagemaker_session, role_arn=None, alias=KEY_ALIAS, sagemaker_role="SageMakerRole" |
| ): |
| kms_client = sagemaker_session.boto_session.client("kms") |
| kms_key_arn = _get_kms_key_arn(kms_client, alias) |
|
|
| region = sagemaker_session.boto_region_name |
| sts_client = sagemaker_session.boto_session.client( |
| "sts", region_name=region, endpoint_url=utils.sts_regional_endpoint(region) |
| ) |
| account_id = sts_client.get_caller_identity()["Account"] |
|
|
| if kms_key_arn is None: |
| return _create_kms_key(kms_client, account_id, region, role_arn, sagemaker_role, alias) |
|
|
| if role_arn: |
| _add_role_to_policy(kms_client, account_id, role_arn, region, alias, sagemaker_role) |
|
|
| return kms_key_arn |
|
|
|
|
| KMS_BUCKET_POLICY = """{{ |
| "Version": "2012-10-17", |
| "Id": "PutObjPolicy", |
| "Statement": [ |
| {{ |
| "Sid": "DenyIncorrectEncryptionHeader", |
| "Effect": "Deny", |
| "Principal": "*", |
| "Action": "s3:PutObject", |
| "Resource": "arn:{partition}:s3:::{bucket_name}/*", |
| "Condition": {{ |
| "StringNotEquals": {{ |
| "s3:x-amz-server-side-encryption": "aws:kms" |
| }} |
| }} |
| }}, |
| {{ |
| "Sid": "DenyUnEncryptedObjectUploads", |
| "Effect": "Deny", |
| "Principal": "*", |
| "Action": "s3:PutObject", |
| "Resource": "arn:{partition}:s3:::{bucket_name}/*", |
| "Condition": {{ |
| "Null": {{ |
| "s3:x-amz-server-side-encryption": "true" |
| }} |
| }} |
| }} |
| ] |
| }}""" |
|
|
|
|
| @contextlib.contextmanager |
| def bucket_with_encryption(sagemaker_session, sagemaker_role): |
| boto_session = sagemaker_session.boto_session |
| region = boto_session.region_name |
| sts_client = boto_session.client( |
| "sts", region_name=region, endpoint_url=utils.sts_regional_endpoint(region) |
| ) |
|
|
| account = sts_client.get_caller_identity()["Account"] |
| role_arn = sts_client.get_caller_identity()["Arn"] |
|
|
| kms_client = boto_session.client("kms", region_name=region) |
| kms_key_arn = _create_kms_key(kms_client, account, region, role_arn, sagemaker_role, None) |
|
|
| region = boto_session.region_name |
| bucket_name = "sagemaker-{}-{}-with-kms".format(region, account) |
|
|
| sagemaker_session._create_s3_bucket_if_it_does_not_exist(bucket_name=bucket_name, region=region) |
|
|
| s3_client = boto_session.client("s3", region_name=region) |
| s3_client.put_bucket_encryption( |
| Bucket=bucket_name, |
| ServerSideEncryptionConfiguration={ |
| "Rules": [ |
| { |
| "ApplyServerSideEncryptionByDefault": { |
| "SSEAlgorithm": "aws:kms", |
| "KMSMasterKeyID": kms_key_arn, |
| } |
| } |
| ] |
| }, |
| ) |
|
|
| s3_client.put_bucket_policy( |
| Bucket=bucket_name, |
| Policy=KMS_BUCKET_POLICY.format( |
| partition=utils._aws_partition(region), bucket_name=bucket_name |
| ), |
| ) |
|
|
| yield "s3://" + bucket_name, kms_key_arn |
|
|
| kms_client.schedule_key_deletion(KeyId=kms_key_arn, PendingWindowInDays=7) |
|
|