Google Cloud KMS
This guide explains how to set up Google Cloud KMS encryption for Obot.
Prerequisites
gcloud
cli installed and logged in.- The proper permissions and credentials to access it
1. Create a KMS Keyring
gcloud kms keyrings create obot-keyring \
--location global
Create the KMS Key
gcloud kms keys create obot-key \
--location global \
--keyring obot-keyring \
--purpose encryption
Grant permissions to the serviceaccount that will be using the key
gcloud kms keys add-iam-policy-binding obot-key \
--location global \
--keyring obot-keyring \
--member "<your obot principal identity>" \
--role roles/cloudkms.cryptoKeyEncrypterDecrypter
Obot environment variables
Make sure the following environment variables are set on Obot when you run it:
OBOT_SERVER_ENCRYPTION_PROVIDER=gcp
OBOT_GCP_KMS_KEY_URI=projects/<your project>/locations/<your location>/keyRings/<your key ring>/cryptoKeys/<your key>
Google Cloud credentials
Some form of credentials is required for Obot to authenticate with Google Cloud for encryption and decryption. It will look for credentials in the following formats, in this order, until it finds one:
- A JSON file pointed to by the
GOOGLE_APPLICATION_CREDENTIALS
environment variable - A JSON file located at
$HOME/.config/gcloud/application_default_credentials.json
- If running on GCE or GKE, it will automatically attempt to fetch credentials from the metadata server
If using a JSON file (one of the first two options), the file must be in one of the following two formats:
- The
credentials.json
format (see here) - A file containing some of the following fields:
// Service Account fields
"client_email"`
"private_key_id"`
"private_key"`
"auth_uri"`
"token_uri"`
"project_id"`
"universe_domain"`
// User Credential fields
// (These typically come from gcloud auth.)
"client_secret"`
"client_id"`
"refresh_token"`