Utility tool to encrypt data using AWS KMS and store it in preferred backend.
AWS-KET (AWS KMS Encryption Tool) uses AWS KMS Key to encrypt and decrypt files/contents based on user provided kms keys and push them to a datastore backend (S3, RDS or DynamoDB).
This application will only work if you have AWS account with full privileges on KMS and S3 services in AWS. You should also have aws cli tool installed.
Note: Currently this tool only uses AWS region us-east-2 for usage of kms and s3.
git clone git@github.com:sayefiqb/aws-ket.git
cd awsket
python init.py
python app.py --text <TEXT_TO_ENCRYPT> --save <FILE_NAME_IN_S3>
python app.py --file <PATH_OF_FILE_TO_ENCRYPT> --save <FILE_NAME_IN_S3>
This will save with same name as remote
python app.py --decrypt <FILE_NAME_IN_S3>
OR
To specify name for saved file
python app.py --decrypt <FILE_NAME_IN_S3> --save <FILE_NAME_TO_SAVE_AS_IN_LOCAL>
To cleanup your S3 bucket and start over
python cleanup.py
pip install aws-ket
from awsket import ket
AWS_REGION = 'us-east-2'
KMS_ALIAS = 'alias/aws-ket'
user_name = ket.get_iam_user()['UserId'].lower()
bucket_name = f'aws-ket-{user_name}'
ket.create_s3_bucket(bucket_name, AWS_REGION)
alias_name = ket.check_alias(KMS_ALIAS, AWS_REGION)
kms_key_id = ket.create_kms_key(AWS_REGION)
alias_name = ket.create_kms_alias(kms_key_id, KMS_ALIAS, AWS_REGION)
from awsket import ket
AWS_REGION = 'us-east-2'
KMS_ALIAS = 'alias/aws-ket'
TEXT = 'This is a sample text for testing encryption! Happy coding :)'
FILE = 'EXAMPLE.txt'
user_name = ket.get_iam_user()['UserId'].lower()
bucket_name = f'aws-ket-{user_name}'
encrypted_string = ket.encrypt_text(KMS_ALIAS, TEXT, AWS_REGION)
ket.push_to_s3(bucket_name, FILE, encrypted_string, AWS_REGION)
from awsket import ket
AWS_REGION = 'us-east-2'
KMS_ALIAS = 'alias/aws-ket'
FILE = 'EXAMPLE.txt'
user_name = ket.get_iam_user()['UserId'].lower()
bucket_name = f'aws-ket-{user_name}'
decrypted_text = ket.decrypt_text(bucket_name, FILE, KMS_ALIAS, AWS_REGION)
print(decrypted_text)
This project uses Makefile as a command registry, with the following commands:
make: list available commandsmake develop: install and build this library and its dependencies using pipmake lint: perform lint using blackmake scan: run static analysis on code using flake8make test: run automated tests with pytestmake coverage: run automated tests with pytest and collect coverage informationcoverage output can also be found in html format in htmlcover directory.
First download the source code
