2017 © Pedro Peláez
 

project wolnosciowiec-image-repository

File storage service, built for ultra-low budget shared hostings with no footprint on performance

image

wolnosciowiec/wolnosciowiec-image-repository

File storage service, built for ultra-low budget shared hostings with no footprint on performance

  • Friday, June 1, 2018
  • by blackandred
  • Repository
  • 5 Watchers
  • 2 Stars
  • 31 Installations
  • PHP
  • 0 Dependents
  • 0 Suggesters
  • 2 Forks
  • 22 Open issues
  • 26 Versions
  • 0 % Grown

The README.md

Backup Repository

Coverage Status Test Artifact Hub, (*1)

Cloud-native, zero-knowledge, multi-tenant, security-first backup storage with minimal footprint., (*2)

TLDR; Primitive backup storage for E2E GPG-encrypted files, with multi-user, quotas, versioning, using a object storage (S3/Min.io/GCS etc.) and deployed on Kubernetes or standalone. No fancy stuff included, lightweight and stable as much as possible is the project target., (*3)

Natively supports: - Kubernetes (but does not require) - GPG E2E encryption - Configuration via GitOps (Configuration as a Code) - Multi-tenancy with configurable Quotas - Multiple cloud providers as a backend storage (all supported by GO Cloud), (*4)

Notice: - Project is more focusing on security than on performance - Due to E2E nature there is no incremental backups support. Incremental backups would need to be implemented client-side with some encrypted metadata stored on server. In the future it may be implemented, but is not our priority. Feel free to send a Pull Request, (*5)

Technology stack: - Kubernetes Client (client-go) - GORM for database support - GO Cloud for storage support - GIN + GIN JWT for web framework, (*6)

Requirements: - Kubernetes (if wanting to use Kubernetes) - PostgreSQL - About 128Mb ram for small scale usage (Note: We use Argon2di and performing file uploads + calculations on buffers) - Storage provider (S3, GCS, Min.io, local filesystem, and others supported by https://gocloud.dev/howto/blob/#services), (*7)

Support: - Any Kubernetes 1.20+ - K3s - OpenShift (with support for Routes, non-privileged, non-root containers) - PostgreSQL 11+ - SealedSecrets - Min.io, (*8)

Difference between other backups systems

Selecting a best tool depends on specific use case. Most common way on Kubernetes is to perform cloud-native volume snapshotting, there Velero project is the most recognized solution that integrates with cloud provides like AWS, Google Cloud or Azure and uses API calls to ask cloud provider for a snapshot., (*9)

Backup Repository approach uses application-native and more traditional method of performing backups - using tar, pg_dump, mysqldump and other application-native tools for Backup and Restore. This selected approach have pros and cons as following:, (*10)

Pros: - Possibility to back up selected part of data e.g. "database X inside PostgreSQL instance" - Control over data in terms of security: Everything GPG encrypted, storage does not know what is stored. Do you trust your cloud provider at 100%? - No dependency on public cloud - Volume driver agnostic, runs even on k3s with local storage provisioner, (*11)

Cons: - Responsibility for the process to be successful (not just an API call to provider) - No possibility to do a consistent block device snapshot - Slower and ineffective at very large scale - Maintenance and monitoring of scripts that perform backups, (*12)

Maturity

Notice: This software is currently in a pre-prod stage. We do not plan breaking changes to the functionality, but the API interface may still change. We recommend our official Backup Maker client that will be always up-to-date with API changes., (*13)

Star a repo, subscribe for releases to get informed., (*14)

Running

Application is written in GO and distributed as a single-binary file. Recommended way is to run it within a docker image on a Kubernetes cluster., (*15)

Running standalone

export AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE
export AWS_SECRET_ACCESS_KEY=wJaFuCKtnFEMI/CApItaliSM/bPxRfiCYEXAMPLEKEY

backup-repository \
    --db-password=postgres \
    --db-user=postgres \
    --db-password=postgres \
    --db-name=postgres \
    --jwt-secret-key="secret key" \
    --storage-url="s3://mybucket?endpoint=localhost:9000&disableSSL=true&s3ForcePathStyle=true&region=eu-central-1"

Installing via Helm

helm repo add riotkit-org https://riotkit-org.github.io/helm-of-revolution/
helm install backups riotkit-org/backup-repository-server -n backup-repository # --values ...

Documentation

For documentation please look into ./docs directory

NOTICE: You are probably reading documentation at main branch, please consider selecting a versioned tag from branch/tag selector., (*16)

Ecosystem

  • Backup Maker: Uploading & Downloading backups with automated GPG encryption support. CLI client + BMG (Backup Maker procedures Generator) for generating customizable Backup & Restore procedures.
  • RKC: Part of Space Harbor project, contains CLI integration of Space Harbor K8s cluster with Backup Repository
  • PGBR: PostgreSQL helpers to be used with BackupMaker for reliable backups using native mechanism of dump & restore

Find more projects in the Github Community., (*17)

Security

  • For authentication JSON Web Token was used
  • Tokens are long-term due to usage nature
  • All JWT's can be revoked anytime. There is a list of generated tokens stored in configuration (only sha256 shortcuts)
  • Passwords are encoded with argon2di (winner of the 2015 Password Hashing Competition, recommended by OWASP)
  • All objects are managed by RBAC (Role Based Access Control) and ACL (Access Control Lists)
  • Server works on uid=65532, non-root container
  • There is a separate ServiceAccount using namespace-scoped roles
  • We use distroless images
  • By default, we set requests and limits for kind: Pod in Kubernetes
  • Built-in simple Request Rate limiter to protect against DoS attacks on application side (Note: The limit is PER application instance. For more advanced limiting please configure your reverse-proxy properly)
  • Each BackupUser can be optionally restricted to connect only from allowed IP addresses
Argon2Config{
    time:    1,
    memory:  64 * 1024,
    threads: 4,
    keyLen:  32,
}

RBAC

Objects of type kind: BackupUser (users that can login to Backup Repository server) have a list of global roles. Global roles are granting access to all objects of given type in the system., (*18)

If somebody has a collectionManager in its profile, then in all collections that person is a manager which means browsing, deleting, editing, creating., (*19)

---
apiVersion: backups.riotkit.org/v1alpha1
kind: BackupUser
# ...
spec:
    # ...
    roles:
        - collectionManager

Scoped RBAC

Most of the object types implements accessControl to specify permissions for given users in scope of this object., (*20)

---
apiVersion: backups.riotkit.org/v1alpha1
kind: BackupCollection
# ...
spec:
    # ...
    accessControl:
        - name: admin
          roles:
              - collectionManager

RBAC in code

Domain objects should implement a logic that checks given Actor if it can act specifically in context of this object., (*21)

func (u User) CanViewMyProfile(actor User) bool {
    // rbac
    if actor.Spec.Roles.HasRole(security.RoleUserManager) {
        return true
    }

    // user can view self info
    return u.Spec.Email == actor.Spec.Email
}

ACL in code

func (c Collection) CanUploadToMe(user *users.User) bool {
    if user.Spec.Roles.HasRole(security.RoleBackupUploader) {
        return true
    }

    for _, permitted := range c.Spec.AccessControl {
        if permitted.UserName == user.Metadata.Name && permitted.Roles.HasRole(security.RoleBackupUploader) {
            return true
        }
    }

    return false
}

Backup Windows

Good practice is to limit how often versions can be submitted. Attacker would need to be very patient to overwrite your past backups with malicious ones., (*22)

In emergency cases System Administrator or person with uploadsAnytime role can upload backups between backup windows. Be careful! Do not set up automated backups with administrator account or with account that has uploadsAnytime role., (*23)

---
apiVersion: backups.riotkit.org/v1alpha1
kind: BackupCollection
# ...
spec:
    # ...
    window:
        # allow to send backups only everyday starting from 00:30 to 01:30
        - from: "00 30 * * *"
          duration: 1h

Quota

System administrator can create a collection with specified storage limits on single file, whole collection, select a rotation strategy., (*24)

Concept is simple - there can be stored X versions of Y size in given collection., (*25)

Additionally, there is such thing as extra space which allows to upload a file that exceeds the limit to not break the backup pipeline. Such situation is immediately reported in a collection health check as a warning., (*26)

---
apiVersion: backups.riotkit.org/v1alpha1
kind: BackupCollection
# ...
spec:
    # ...
    maxBackupsCount: 5
    maxOneVersionSize: 1M
    maxCollectionSize: 5M

Extra space

The following example allows uploading files of 1 MB size normally, but optionally allows uploading larger files that could in summary take additional 5MB. For example one of uploaded versions can be a 5MB file, or there could be two versions of 2,5MB file each - both exceeding the soft limit of maxOneVersionSize. The maxCollectionSize is a hard limit., (*27)

maxBackupsCount = 5
maxOneVersionSize = 1MB
maxCollectionSize = 10MB

estimatedCollectionSize = maxBackupsCount * maxOneVersionSize = 5 * 1MB = 5MB
extraSpace = maxCollectionSize - estimatedCollectionSize = 10MB - 5MB
---
apiVersion: backups.riotkit.org/v1alpha1
kind: BackupCollection
# ...
spec:
    # ...
    maxBackupsCount: 5
    maxOneVersionSize: 1M
    maxCollectionSize: 10M

Rotation

Rotation Strategies gives control over backup versioning., (*28)

fifo

First in first out. When adding a new version deletes oldest., (*29)

---
apiVersion: backups.riotkit.org/v1alpha1
kind: BackupCollection
# ...
spec:
    # ...
    strategyName: fifo

Contributing

Security policy

The Versions