Add support for AWS S3 Server-Side Encryption support
This adds support for AWS S3 SSE with S3 managed keys, this means the data is encrypted at rest and the encryption is handled transparently to the end user as well as in the AWS Console.
Points to double check
I'm unsure on the best way to the handle the default. I've followed the multipart_upload
de facto in the app. I'm happy to change this if required or if it will impact elsewhere e.g. omnibus packages
I also think I've managed to catch all of the documentation for this change as well.
Why is this required
Many enterprises require good backup support but also for this to be encrypted. By default backups aren't encrypted, this allows at rest encryption to be supported in GitLab backups providing a layer of security should the physical media not be properly disposed of.
Relates to issue #2478 (closed).
Merge request reports
Activity
For me this looks good. @jacobvosmaer You have more experience with S3 and AWS, what do you think?
Updated to make the documentation read that it's optional, I've also commented out the lines by default so if a user wishes to add this they must do this manually and it won't happen automatically. I can change this as there's no charge and Amazon host the keys for the user so there's no key management to worry about.
I've also rebased as well to reflect the release of 8.0 since building this.
Thanks @paulbeattie
319 319 # # Use multipart uploads when file size reaches 100MB, see 320 320 # # http://docs.aws.amazon.com/AmazonS3/latest/dev/uploadobjusingmpu.html 321 321 # multipart_chunk_size: 104857600 322 # # Turns on AWS Server-Side Encryption with Amazon S3-Managed Keys for backups, this is optional 323 # # encryption: 'AES256' @marin do we need to add omnibus support for this or are we already dropping in a JSON hash?
@jacobvosmaer We need to add support, only upload_connection settings are a hash. Please create an issue for this in omnibus-gitlab.
mentioned in commit 958af6f5
mentioned in issue omnibus-gitlab#836 (closed)