Quarkus - Amazon KMS Client

AWS Key Management Service (KMS) is a service that allows you to create and control the keys used to encrypt or digitally sign your data. Using KMS, you can create and manage cryptographic keys and control their use across a wide range of AWS services and in your application.

You can find more information about KMS at the AWS KMS website.

The KMS extension is based on AWS Java SDK 2.x. It’s a major rewrite of the 1.x code base that offers two programming models (Blocking & Async).

This technology is considered preview.

In preview, backward compatibility and presence in the ecosystem is not guaranteed. Specific improvements might require to change configuration or APIs and plans to become stable are under way. Feedback is welcome on our mailing list or as issues in our GitHub issue tracker.

For a full list of possible extension statuses, check our FAQ entry.

The Quarkus extension supports two programming models:

  • Blocking access using URL Connection HTTP client (by default) or the Apache HTTP Client

  • Asynchronous programming based on JDK’s CompletableFuture objects and the Netty HTTP client.

In this guide, we see how you can get your REST services to use KMS locally and on AWS.

Prerequisites

To complete this guide, you need:

  • JDK 1.8+ installed with JAVA_HOME configured appropriately

  • an IDE

  • Apache Maven 3.6.2+

  • An AWS Account to access the KMS service

  • Docker for your system to run KMS locally for testing purposes

Set up KMS locally

The easiest way to start working with KMS is to run a local instance as a container.

  1. docker run --rm --name local-kms 8011:4599 -e SERVICES=kms -e START_WEB=0 -d localstack/localstack:0.11.1

This starts a KMS instance that is accessible on port 8011.

Create an AWS profile for your local instance using AWS CLI:

  1. $ aws configure --profile localstack
  2. AWS Access Key ID [None]: test-key
  3. AWS Secret Access Key [None]: test-secret
  4. Default region name [None]: us-east-1
  5. Default output format [None]:

Create a KMS master key

Create a KMS master key queue using AWS CLI and store in MASTER_KEY_ARN environment variable.

  1. MASTER_KEY_ARN=`aws kms create-key --profile localstack --endpoint-url=http://localhost:8011 | cut -f3`

Generate a key data as 256-bit symmetric key (AES 256)

  1. aws kms generate-data-key --key-id $MASTER_KEY_ARN --key-spec AES_256 --profile localstack --endpoint-url=http://localhost:8011

Or, if you want to use your AWS account create a key using your default profile

  1. MASTER_KEY_ARN=`aws kms create-key | cut -f3`
  2. aws kms generate-data-key --key-id $MASTER_KEY_ARN --key-spec AES_256

Solution

The application built here allows to encrypt and decrypt text messages using a master key created on AWS KMS.

We recommend that you follow the instructions in the next sections and create the application step by step. However, you can go right to the completed example.

Clone the Git repository: git clone [https://github.com/quarkusio/quarkus-quickstarts.git](https://github.com/quarkusio/quarkus-quickstarts.git), or download an archive.

The solution is located in the amazon-kms-quickstart directory.

Creating the Maven project

First, we need a new project. Create a new project with the following command:

  1. mvn io.quarkus:quarkus-maven-plugin:1.7.6.Final:create \
  2. -DprojectGroupId=org.acme \
  3. -DprojectArtifactId=amazon-kms-quickstart \
  4. -DclassName="org.acme.kms.QuarkusKmsSyncResource" \
  5. -Dpath="/sync" \
  6. -Dextensions="resteasy-jsonb,amazon-kms,resteasy-mutiny"
  7. cd amazon-kms-quickstart

This command generates a Maven structure importing the RESTEasy/JAX-RS, Mutiny and Amazon KMS Client extensions. After this, the amazon-kms extension has been added to your pom.xml as well as the Mutiny support for RESTEasy.

Creating JSON REST service

In this example, we will create an application that allows to encrypt and decrypt text message provided in the request. The example application will demonstrate the two programming models supported by the extension.

Let’s create a org.acme.kms.QuarkusKmsSyncResource that will provide an API to encrypt and decrypt message using the synchronous client.

  1. package org.acme.kms;
  2. import javax.inject.Inject;
  3. import javax.ws.rs.Consumes;
  4. import javax.ws.rs.POST;
  5. import javax.ws.rs.Path;
  6. import javax.ws.rs.Produces;
  7. import javax.ws.rs.core.MediaType;
  8. import org.apache.commons.codec.binary.Base64;
  9. import org.eclipse.microprofile.config.inject.ConfigProperty;
  10. import software.amazon.awssdk.core.SdkBytes;
  11. import software.amazon.awssdk.services.kms.KmsClient;
  12. import software.amazon.awssdk.services.kms.model.DecryptResponse;
  13. @Path("/sync")
  14. @Produces(MediaType.TEXT_PLAIN)
  15. @Consumes(MediaType.TEXT_PLAIN)
  16. public class QuarkusKmsSyncResource {
  17. @Inject
  18. KmsClient kms;
  19. @ConfigProperty(name = "key.arn")
  20. String keyArn;
  21. @POST
  22. @Path("/encrypt")
  23. public String encrypt(String data) {
  24. SdkBytes encryptedBytes = kms.encrypt(req -> req.keyId(keyArn).plaintext(SdkBytes.fromUtf8String(data))).ciphertextBlob();
  25. return Base64.encodeBase64String(encryptedBytes.asByteArray());
  26. }
  27. @POST
  28. @Path("/decrypt")
  29. public String decrypt(String data) {
  30. SdkBytes encryptedData = SdkBytes.fromByteArray(Base64.decodeBase64(data.getBytes()));
  31. DecryptResponse decrypted = kms.decrypt(req -> req.keyId(keyArn).ciphertextBlob(encryptedData));
  32. return decrypted.plaintext().asUtf8String();
  33. }
  34. }

An encrypted message is in the form of a bytes array. To return it to the user we need to encode it as Base64 string in the encrypt endpoint. On the decrypt endpoint we need to decode from the Base64 string back to the bytes array before sending it out to the KMS client.

Configuring KMS clients

Both KMS clients (sync and async) are configurable via the application.properties file that can be provided in the src/main/resources directory. Additionally, you need to add to the classpath a proper implementation of the sync client. By default the extension uses the URL connection HTTP client, so you need to add a URL connection client dependency to the pom.xml file:

  1. <dependency>
  2. <groupId>software.amazon.awssdk</groupId>
  3. <artifactId>url-connection-client</artifactId>
  4. </dependency>

If you want to use Apache HTTP client instead, configure it as follows:

  1. quarkus.kms.sync-client.type=apache

And add the following dependency to the application pom.xml:

  1. <dependency>
  2. <groupId>software.amazon.awssdk</groupId>
  3. <artifactId>apache-client</artifactId>
  4. </dependency>

If you’re going to use a local KMS instance, configure it as follows:

  1. quarkus.kms.endpoint-override=http://localhost:8011
  2. quarkus.kms.aws.region=us-east-1
  3. quarkus.kms.aws.credentials.type=static
  4. quarkus.kms.aws.credentials.static-provider.access-key-id=test-key
  5. quarkus.kms.aws.credentials.static-provider.secret-access-key=test-secret
  • quarkus.kms.aws.region - It’s required by the client, but since you’re using a local KMS instance use us-east-1 as it’s a default region of localstack’s KMS.

  • quarkus.kms.aws.credentials.type - Set static credentials provider with any values for access-key-id and secret-access-key

  • quarkus.kms.endpoint-override - Override the KMS client to use a local instance instead of an AWS service

If you want to work with an AWS account, you can simply remove or comment out all Amazon KMS related properties. By default, the KMS client extension will use the default credentials provider chain that looks for credentials in this order:

  • Java System Properties - aws.accessKeyId and aws.secretAccessKey

  • Environment Variables - AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY

  • Credential profiles file at the default location (~/.aws/credentials) shared by all AWS SDKs and the AWS CLI

  • Credentials delivered through the Amazon ECS if the AWS_CONTAINER_CREDENTIALS_RELATIVE_URI environment variable is set and the security manager has permission to access the variable,

  • Instance profile credentials delivered through the Amazon EC2 metadata service

And the region from your AWS CLI profile will be used.

Next steps

Packaging

Packaging your application is as simple as ./mvnw clean package. It can be run with java -Dkey.arn=$MASTER_KEY_ARN -jar target/amazon-kms-quickstart-1.0-SNAPSHOT-runner.jar.

With GraalVM installed, you can also create a native executable binary: ./mvnw clean package -Dnative. Depending on your system, that will take some time.

Going asynchronous

Thanks to the AWS SDK v2.x used by the Quarkus extension, you can use the asynchronous programming model out of the box.

Create a org.acme.kms.QuarkusKmsAsyncResource REST resource that will be similar to our QuarkusKmsSyncResource but using an asynchronous programming model.

  1. package org.acme.kms;
  2. import io.smallrye.mutiny.Uni;
  3. import javax.inject.Inject;
  4. import javax.ws.rs.Consumes;
  5. import javax.ws.rs.POST;
  6. import javax.ws.rs.Path;
  7. import javax.ws.rs.Produces;
  8. import javax.ws.rs.core.MediaType;
  9. import org.apache.commons.codec.binary.Base64;
  10. import org.eclipse.microprofile.config.inject.ConfigProperty;
  11. import software.amazon.awssdk.core.SdkBytes;
  12. import software.amazon.awssdk.services.kms.KmsAsyncClient;
  13. import software.amazon.awssdk.services.kms.model.DecryptResponse;
  14. import software.amazon.awssdk.services.kms.model.EncryptResponse;
  15. @Path("/async")
  16. @Produces(MediaType.TEXT_PLAIN)
  17. @Consumes(MediaType.TEXT_PLAIN)
  18. public class QuarkusKmsAsyncResource {
  19. @Inject
  20. KmsAsyncClient kms;
  21. @ConfigProperty(name = "key.arn")
  22. String keyArn;
  23. @POST
  24. @Path("/encrypt")
  25. public Uni<String> encrypt(String data) {
  26. return Uni.createFrom().completionStage(kms.encrypt(req -> req.keyId(keyArn).plaintext(SdkBytes.fromUtf8String(data))))
  27. .onItem().transform(EncryptResponse::ciphertextBlob)
  28. .onItem().transform(blob -> Base64.encodeBase64String(blob.asByteArray()));
  29. }
  30. @POST
  31. @Path("/decrypt")
  32. public Uni<String> decrypt(String data) {
  33. return Uni.createFrom().item(SdkBytes.fromByteArray(Base64.decodeBase64(data.getBytes())))
  34. .onItem().transformToUni(msg ->
  35. Uni.createFrom().completionStage(kms.decrypt(req -> req.keyId(keyArn).ciphertextBlob(msg)))
  36. )
  37. .onItem().transform(DecryptResponse::plaintext)
  38. .onItem().transform(SdkBytes::asUtf8String);
  39. }
  40. }

We create Uni instances from the CompletionStage objects returned by the asynchronous KMS client, and then transform the emitted item.

And we need to add the Netty HTTP client dependency to the pom.xml:

  1. <dependency>
  2. <groupId>software.amazon.awssdk</groupId>
  3. <artifactId>netty-nio-client</artifactId>
  4. </dependency>

Configuration Reference

About the Duration format

The format for durations uses the standard java.time.Duration format. You can learn more about it in the Duration#parse() javadoc.

You can also provide duration values starting with a number. In this case, if the value consists only of a number, the converter treats the value as seconds. Otherwise, PT is implicitly prepended to the value to obtain a standard java.time.Duration format.

About the MemorySize format

A size configuration option recognises string in this format (shown as a regular expression): [0-9]+[KkMmGgTtPpEeZzYy]?. If no suffix is given, assume bytes.