Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

6: Create tear-down scripts #27

Merged
merged 8 commits into from
Mar 27, 2024
Merged
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .env.example
Original file line number Diff line number Diff line change
@@ -1,5 +1,8 @@
PARTY_1_PROJECT=pprl-party-1
PARTY_1_KEY_VERSION=1

PARTY_2_PROJECT=pprl-party-2
PARTY_2_KEY_VERSION=1

WORKLOAD_AUTHOR_PROJECT=pprl-party-1
WORKLOAD_AUTHOR_PROJECT_REGION=europe-west2
Expand Down
16 changes: 16 additions & 0 deletions scripts/06-tear-down-operator.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
#!/bin/bash
#
# Tears down all billable resources for the workload operator.

echo "Loading functions and environment variables..."
source common.sh

set_gcp_project $WORKLOAD_OPERATOR_PROJECT

echo "Deleting workload virtual machine..."
gcloud compute instances delete \
matweldon marked this conversation as resolved.
Show resolved Hide resolved
projects/$WORKLOAD_OPERATOR_PROJECT/zones/$WORKLOAD_OPERATOR_PROJECT_ZONE/instances/pprl-cvm

delete_storage_bucket $ATTESTATION_BUCKET

delete_service_account $WORKLOAD_SERVICE_ACCOUNT_EMAIL
28 changes: 0 additions & 28 deletions scripts/06-tear-down.sh

This file was deleted.

10 changes: 10 additions & 0 deletions scripts/07-tear-down-author.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
#!/bin/bash
#
# Tears down all billable resources for the workload operator.
daffidwilde marked this conversation as resolved.
Show resolved Hide resolved

echo "Loading functions and environment variables..."
source common.sh

set_gcp_project $WORKLOAD_AUTHOR_PROJECT

delete_artifact_repository $ARTIFACT_REPOSITORY $WORKLOAD_AUTHOR_PROJECT_REGION
24 changes: 24 additions & 0 deletions scripts/08-tear-down-party.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
#!/bin/bash
#
# Tears down all billable resources for the workload operator.
daffidwilde marked this conversation as resolved.
Show resolved Hide resolved

echo "Loading functions and environment variables..."
source common.sh

export PROJECT_NAME=${1}
export PROJECT_KEY_VERSION=${2}
if [ ! $PROJECT_KEY_VERSION ]; then
do
export PROJECT_KEY_VERSION=1
done

set_gcp_project $PROJECT_NAME

delete_storage_bucket $PROJECT_NAME-bucket

destroy_kms_key_version \
$PROJECT_NAME-akek $PROJECT_NAME-akek-kr $PROJECT_LOCATION $PROJECT_KEY_VERSION

delete_workload_identity_pool $PROJECT_NAME-wip $PROJECT_LOCATION

delete_service_account $PROJECT_NAME-sa@$PROJECT_NAME.iam.gserviceaccount.com
11 changes: 6 additions & 5 deletions scripts/common.sh
Original file line number Diff line number Diff line change
Expand Up @@ -152,18 +152,19 @@ create_kms_encryption_key() {
# Key name
# Keyring name
# Location
# Key version
#######################################
destroy_kms_key() {
destroy_kms_key_version() {
gcloud kms keys list --keyring=${2} --location=${3} --filter="PRIMARY_STATE=(ENABLED)" | grep ${1}
if [[ $? -eq 0 ]]; then
gcloud kms keys versions destroy 1 --key ${1} --keyring ${2} --location ${3}
gcloud kms keys versions destroy ${4} --key ${1} --keyring ${2} --location ${3}
if [[ $? -eq 0 ]]; then
echo "Key ${1} is deleted successfully."
echo "Key ${1} version ${4} deleted successfully."
else
err "Failed to delete a key ${1}."
err "Failed to delete key ${1} version ${4}."
fi
else
echo "Key ${1} doesn't exist. Skipping the deletion of the key ${1}..."
echo "Key ${1} version ${4} doesn't exist. Skipping deletion..."
fi
}

Expand Down
21 changes: 13 additions & 8 deletions scripts/server.py
Original file line number Diff line number Diff line change
Expand Up @@ -323,8 +323,10 @@ def load_environment_variables(path: None | str = None) -> tuple[str, str, str,
Name of the second party.
location : str
Location of the workload identity pools and keyrings.
version : str
Version of the key encryption keys.
version_1 : str
Version of the key encryption key for the first party.
version_2 : str
Version of the key encryption key for the second party.
"""

environ = config.load_environment(path)
Expand All @@ -333,9 +335,10 @@ def load_environment_variables(path: None | str = None) -> tuple[str, str, str,
party_1 = environ.get("PARTY_1_PROJECT")
party_2 = environ.get("PARTY_2_PROJECT")
location = environ.get("PROJECT_LOCATION", "global")
version = environ.get("PROJECT_KEY_VERSION", 1)
version_1 = environ.get("PARTY_1_KEY_VERSION", 1)
version_2 = environ.get("PARTY_2_KEY_VERSION", 1)

return operator, party_1, party_2, location, version
return operator, party_1, party_2, location, version_1, version_2


def main():
Expand All @@ -346,15 +349,17 @@ def main():
logger.setup_logging()
logging.info("Logging set up.")

operator, party_1, party_2, location, version = load_environment_variables(".env")
operator, party_1, party_2, location, version_1, version_2 = load_environment_variables(
".env"
)
parties = (party_1, party_2)

logging.info("Downloading embedder...")
embedder = download_embedder(parties, operator)

logging.info("Preparing assets...")
data_1, dek_1 = prepare_party_assets(party_1, operator, location, version)
data_2, dek_2 = prepare_party_assets(party_2, operator, location, version)
data_1, dek_1 = prepare_party_assets(party_1, operator, location, version_1)
data_2, dek_2 = prepare_party_assets(party_2, operator, location, version_2)

logging.info("Performing matching...")
outputs = perform_matching(data_1, data_2, embedder)
Expand All @@ -368,7 +373,7 @@ def main():
# Set up local logging and storage
logging.basicConfig(encoding="utf-8", level=logging.INFO)

operator, party_1, party_2, location, version = load_environment_variables()
operator, party_1, party_2, *_ = load_environment_variables()
inpath_1, outpath_1 = build_local_file_paths(party_1)
inpath_2, outpath_2 = build_local_file_paths(party_2)
embedder = load_embedder()
Expand Down
10 changes: 8 additions & 2 deletions src/pprl/app/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ def home():
environ = config.load_environment()
parties = (environ.get("PARTY_1_PROJECT"), environ.get("PARTY_2_PROJECT"))
app.config["env"] = environ
app.config["parties"] = parties

return flask.render_template("home.html", parties=parties)

Expand Down Expand Up @@ -109,11 +110,16 @@ def upload_to_gcp(data, embedder):
"""Encrypt and upload the data to GCP, then wait for results."""

app.config["submission_time"] = datetime.now(timezone.utc)
party_config = app.config.get("config")
party = app.config.get("party")
environ = app.config.get("env")

location = environ.get("PROJECT_LOCATION", "global")

party_num = next(i + 1 for i, part in enumerate(app.config["parties"]) if party == part)
version = environ.get(f"PARTY_{party_num}_KEY_VERSION", 1)

data_encrypted, dek = encryption.encrypt_data(data)
dek_encrypted = encryption.encrypt_dek(dek, party, party_config)
dek_encrypted = encryption.encrypt_dek(dek, party, location, version)
app.config["dek"] = dek

store = app.config.get("store")
Expand Down
20 changes: 10 additions & 10 deletions src/pprl/encryption.py
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ def decrypt_data(encrypted: bytes, key: bytes) -> pd.DataFrame:


def _build_key_version_path(
party: str, location: str, version: int, client: kms.KeyManagementServiceClient
party: str, location: str, version: int | str, client: kms.KeyManagementServiceClient
) -> str:
"""
Build a full key version path for retrieval from KMS.
Expand All @@ -75,7 +75,7 @@ def _build_key_version_path(
Name of the party whose key to retrieve.
location : str
Location of the keyring on which the key lives.
version : int
version : int | str
Version of the key to retrieve.
client : google.cloud.kms.KeyManagementServiceClient
Connection to KMS.
Expand All @@ -92,7 +92,7 @@ def _build_key_version_path(
return path


def _get_public_key(party: str, location: str, version: int, **kwargs: dict) -> bytes:
def _get_public_key(party: str, location: str, version: int | str, **kwargs: dict) -> bytes:
"""
Get the public key from the GCP Key Management Service (KMS).

Expand All @@ -102,7 +102,7 @@ def _get_public_key(party: str, location: str, version: int, **kwargs: dict) ->
Name of the party.
location : str
Location of the keyring on which the key lives.
version : int
version : int | str
Key version to use.
**kwargs : dict
Keyword arguments to pass when creating an instance of
Expand All @@ -123,7 +123,7 @@ def _get_public_key(party: str, location: str, version: int, **kwargs: dict) ->


def encrypt_dek(
dek: bytes, party: str, location: str = "global", version: int = 1, **kwargs: dict
dek: bytes, party: str, location: str = "global", version: int | str = 1, **kwargs
) -> bytes:
"""
Encrypt the data encryption key.
Expand All @@ -139,8 +139,8 @@ def encrypt_dek(
Name of the party.
location : str
Location of the keyring on which the key lives.
version : int
Version of the assymetric key to get from GCP. Default is 1.
version : int | str
Version of the asymmetric key to get from GCP. Default is 1.
**kwargs : dict
Keyword arguments to pass when creating an instance of
`google.cloud.kms.KeyManagementServiceClient`.
Expand All @@ -166,7 +166,7 @@ def encrypt_dek(


def decrypt_dek(
encrypted: bytes, party: str, location: str = "global", version: int = 1, **kwargs
encrypted: bytes, party: str, location: str = "global", version: int | str = 1, **kwargs
) -> bytes:
"""
Decrypt a data encryption key using an asymmetric key held on KMS.
Expand All @@ -183,8 +183,8 @@ def decrypt_dek(
Name of the party whose key we are decrypting.
location : str
Location of the keyring on which the key lives.
version : int
Version of the assymetric key to get from GCP. Default is 1.
version : int | str
Version of the asymmetric key to get from GCP. Default is 1.
**kwargs : dict
Keyword arguments to pass when creating an instance of
`google.cloud.kms.KeyManagementServiceClient`.
Expand Down
Loading