| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | from __future__ import absolute_import |
| |
|
| | import contextlib |
| | import json |
| |
|
| | from sagemaker import utils |
| |
|
| | PRINCIPAL_TEMPLATE = ( |
| | '["{account_id}", "{role_arn}", ' '"arn:{partition}:iam::{account_id}:role/{sagemaker_role}"] ' |
| | ) |
| |
|
| | KEY_ALIAS = "SageMakerTestKMSKey" |
| | KMS_S3_ALIAS = "SageMakerTestS3KMSKey" |
| | POLICY_NAME = "default" |
| | KEY_POLICY = """ |
| | {{ |
| | "Version": "2012-10-17", |
| | "Id": "{id}", |
| | "Statement": [ |
| | {{ |
| | "Sid": "Enable IAM User Permissions", |
| | "Effect": "Allow", |
| | "Principal": {{ |
| | "AWS": {principal} |
| | }}, |
| | "Action": "kms:*", |
| | "Resource": "*" |
| | }} |
| | ] |
| | }} |
| | """ |
| |
|
| |
|
| | def _get_kms_key_arn(kms_client, alias): |
| | try: |
| | response = kms_client.describe_key(KeyId="alias/" + alias) |
| | return response["KeyMetadata"]["Arn"] |
| | except kms_client.exceptions.NotFoundException: |
| | return None |
| |
|
| |
|
| | def _get_kms_key_id(kms_client, alias): |
| | try: |
| | response = kms_client.describe_key(KeyId="alias/" + alias) |
| | return response["KeyMetadata"]["KeyId"] |
| | except kms_client.exceptions.NotFoundException: |
| | return None |
| |
|
| |
|
| | def _create_kms_key( |
| | kms_client, account_id, region, role_arn=None, sagemaker_role="SageMakerRole", alias=KEY_ALIAS |
| | ): |
| | if role_arn: |
| | principal = PRINCIPAL_TEMPLATE.format( |
| | partition=utils._aws_partition(region), |
| | account_id=account_id, |
| | role_arn=role_arn, |
| | sagemaker_role=sagemaker_role, |
| | ) |
| | else: |
| | principal = '"{account_id}"'.format(account_id=account_id) |
| |
|
| | response = kms_client.create_key( |
| | Policy=KEY_POLICY.format( |
| | id=POLICY_NAME, principal=principal, sagemaker_role=sagemaker_role |
| | ), |
| | Description="KMS key for SageMaker Python SDK integ tests", |
| | ) |
| | key_arn = response["KeyMetadata"]["Arn"] |
| |
|
| | if alias: |
| | kms_client.create_alias(AliasName="alias/" + alias, TargetKeyId=key_arn) |
| | return key_arn |
| |
|
| |
|
| | def _add_role_to_policy( |
| | kms_client, account_id, role_arn, region, alias=KEY_ALIAS, sagemaker_role="SageMakerRole" |
| | ): |
| | key_id = _get_kms_key_id(kms_client, alias) |
| | policy = kms_client.get_key_policy(KeyId=key_id, PolicyName=POLICY_NAME) |
| | policy = json.loads(policy["Policy"]) |
| | principal = policy["Statement"][0]["Principal"]["AWS"] |
| |
|
| | if role_arn not in principal or sagemaker_role not in principal: |
| | principal = PRINCIPAL_TEMPLATE.format( |
| | partition=utils._aws_partition(region), |
| | account_id=account_id, |
| | role_arn=role_arn, |
| | sagemaker_role=sagemaker_role, |
| | ) |
| |
|
| | kms_client.put_key_policy( |
| | KeyId=key_id, |
| | PolicyName=POLICY_NAME, |
| | Policy=KEY_POLICY.format(id=POLICY_NAME, principal=principal), |
| | ) |
| |
|
| |
|
| | def get_or_create_kms_key( |
| | sagemaker_session, role_arn=None, alias=KEY_ALIAS, sagemaker_role="SageMakerRole" |
| | ): |
| | kms_client = sagemaker_session.boto_session.client("kms") |
| | kms_key_arn = _get_kms_key_arn(kms_client, alias) |
| |
|
| | region = sagemaker_session.boto_region_name |
| | sts_client = sagemaker_session.boto_session.client( |
| | "sts", region_name=region, endpoint_url=utils.sts_regional_endpoint(region) |
| | ) |
| | account_id = sts_client.get_caller_identity()["Account"] |
| |
|
| | if kms_key_arn is None: |
| | return _create_kms_key(kms_client, account_id, region, role_arn, sagemaker_role, alias) |
| |
|
| | if role_arn: |
| | _add_role_to_policy(kms_client, account_id, role_arn, region, alias, sagemaker_role) |
| |
|
| | return kms_key_arn |
| |
|
| |
|
| | KMS_BUCKET_POLICY = """{{ |
| | "Version": "2012-10-17", |
| | "Id": "PutObjPolicy", |
| | "Statement": [ |
| | {{ |
| | "Sid": "DenyIncorrectEncryptionHeader", |
| | "Effect": "Deny", |
| | "Principal": "*", |
| | "Action": "s3:PutObject", |
| | "Resource": "arn:{partition}:s3:::{bucket_name}/*", |
| | "Condition": {{ |
| | "StringNotEquals": {{ |
| | "s3:x-amz-server-side-encryption": "aws:kms" |
| | }} |
| | }} |
| | }}, |
| | {{ |
| | "Sid": "DenyUnEncryptedObjectUploads", |
| | "Effect": "Deny", |
| | "Principal": "*", |
| | "Action": "s3:PutObject", |
| | "Resource": "arn:{partition}:s3:::{bucket_name}/*", |
| | "Condition": {{ |
| | "Null": {{ |
| | "s3:x-amz-server-side-encryption": "true" |
| | }} |
| | }} |
| | }} |
| | ] |
| | }}""" |
| |
|
| |
|
| | @contextlib.contextmanager |
| | def bucket_with_encryption(sagemaker_session, sagemaker_role): |
| | boto_session = sagemaker_session.boto_session |
| | region = boto_session.region_name |
| | sts_client = boto_session.client( |
| | "sts", region_name=region, endpoint_url=utils.sts_regional_endpoint(region) |
| | ) |
| |
|
| | account = sts_client.get_caller_identity()["Account"] |
| | role_arn = sts_client.get_caller_identity()["Arn"] |
| |
|
| | kms_client = boto_session.client("kms", region_name=region) |
| | kms_key_arn = _create_kms_key(kms_client, account, region, role_arn, sagemaker_role, None) |
| |
|
| | region = boto_session.region_name |
| | bucket_name = "sagemaker-{}-{}-with-kms".format(region, account) |
| |
|
| | sagemaker_session._create_s3_bucket_if_it_does_not_exist(bucket_name=bucket_name, region=region) |
| |
|
| | s3_client = boto_session.client("s3", region_name=region) |
| | s3_client.put_bucket_encryption( |
| | Bucket=bucket_name, |
| | ServerSideEncryptionConfiguration={ |
| | "Rules": [ |
| | { |
| | "ApplyServerSideEncryptionByDefault": { |
| | "SSEAlgorithm": "aws:kms", |
| | "KMSMasterKeyID": kms_key_arn, |
| | } |
| | } |
| | ] |
| | }, |
| | ) |
| |
|
| | s3_client.put_bucket_policy( |
| | Bucket=bucket_name, |
| | Policy=KMS_BUCKET_POLICY.format( |
| | partition=utils._aws_partition(region), bucket_name=bucket_name |
| | ), |
| | ) |
| |
|
| | yield "s3://" + bucket_name, kms_key_arn |
| |
|
| | kms_client.schedule_key_deletion(KeyId=kms_key_arn, PendingWindowInDays=7) |
| |
|