Git Product home page Git Product logo

hashi-helper's Introduction

hashi-helper

hashi-helper is a tool meant to enable Disaster Recovery and Configuration Management for Consul and Vault clusters, by exposing configuration via a simple to use and share hcl format.

Requirements

  • Go 1.11

Building

To build a binary, run the following

# get this repo
go get github.com/seatgeek/hashi-helper

# go to the repo directory
cd $GOPATH/src/github.com/seatgeek/hashi-helper

# build the `hashi-helper` binary
make build

This will create a hashi-helper binary in your $GOPATH/bin directory.

Configuration

The following environment variables are required for setting configuration and keys in Consul and Vault.

  • VAULT_TOKEN environment variable (preferable a root/admin token)
  • VAULT_ADDR environment variable (example: http://127.0.0.1:8200)
  • CONSUL_ADDR_HTTP environment variable (example: http://127.0.0.1:8500)

Usage

hashi-helper [--global-flags] command [--command-flags]

Global Flags

--lint

Providing this flag will make hashi-helper only process configuration, and not push any changes to Consul or Vault

This is useful for CI pipelines

--variable

A number of key=value pairs to expose as template variables during template rendering.

The flag can be repeated any number of times. The order they are provided in is also the order they are read.

--var key1=value1 --var key2=value2

--var key1=value1 --var key2=value2 --var key1=value2 - key1 will be having the value value2

Aliases: --var key=value

--variable-file

A number of files to parse and expose as template variables template rendering.

The flag can be repeated any number of times. The order they are provided in is also the order they are read.

--variable-file example/conf.hcl --variable-file example/conf.json --variable-file example/conf.yaml

Aliases: --var-file value | --varf value

--concurrency

How many parallel requests to run in parallel against remote servers

Default: 2 * CPU Cores

Environment Key: CONCURRENCY

--log-level

Debug level of debug, info, warn/warning, error, fatal, panic

Default: info

Environment Key: LOG_LEVEL

--config-dir

One or more directories to recursively scan for hcl configuration files.

The flag can be repeated any number of times. The order they are provided in is also the order they are read.

--config-dir conf.d/

--config-dir conf.d/ --config-dir shared/

Environment Key: CONFIG_DIR

--config-file

One or more hcl configuration file to parse instead of a directory

The flag can be repeated any number of times. The order they are provided in is also the order they are read.

--config-file conf.d/config.hcl

--config-file conf.d/config.hcl --config-file conf.d/another_config.hcl

Environment key: CONFIG_FILE

--environment

The environment to process configuration for

Default: all

Environment Key: ENVIRONMENT

--application

The application to process for

Default: all

Environment Key: APPLICATION

Global Commands

push-all

Push all Consul and Vault data to remote servers (same as running vault-push-all and consul-push-all)

profile-edit

Decrypt (or create), open and encrypt the secure HASHI_HELPER_PROFILE_FILE (~/.vault_profiles.pgp) file containing your vault clusters

File format is as described below, a simple yaml file

---
# Sample config (yaml)
#
# all keys are optional
#

profile_name_1:
  vault:
    server: http://active.vault.service.consul:8200
    auth:
        token: <your vault token>
        unseal_token: <your unseal token>
  consul:
    server: http://consul.service.consul:8500
    auth:
        token: <your consul token>
  nomad:
    server: http://nomad.service.consul:4646
    auth:
        token: <your nomad token>

profile_name_2:
  vault:
    server: http://active.vault.service.consul:8200
    auth:
        method: github
        github_token: <your github token>
  consul:
    server: http://consul.service.consul:8500
    auth:
      method: vault
      creds_path: consul/creds/administrator
  nomad:
    server: http://nomad.service.consul:4646
    auth:
      method: vault
      creds_path: nomad/creds/administrator

profile-use

Decrypt the HASHI_HELPER_PROFILE_FILE and output bash/zsh compatible commands to set VAULT_ADDR, VAULT_TOKEN, ENVIRONMENT based on the profile you selected.

Example: $(hashi-helper profile-use name_1)

Consul

consul-push-all

Push all local consul state to remote consul cluster.

consul-push-services

Push all service{} stanza to remote Consul cluster

consul-push-kv

Push all kv{} stanza to remote Consul cluster

vault commands

vault-create-token

Create a Vault token, optionally encrypt it using keybase

  • --keybase optional - can be repeated for multiple recipients, token will be encrypted for all recipients to decrypt. If omitted, token is shown in cleartext in the shell
  • --id optional - The ID of the client token. Can only be specified by a root token. Otherwise, the token ID is a randomly generated UUID.
  • --display-name optional The display name of the token. Defaults to "token".
  • --ttl optional - The TTL period of the token, provided as "1h", where hour is the largest suffix. If not provided, the token is valid for the default lease TTL, or indefinitely if the root policy is used.
  • --period optional - If specified, the token will be periodic; it will have no maximum TTL (unless an "explicit-max-ttl" is also set) but every renewal will use the given period. Requires a root/sudo token to use.
  • --orphan Will create the token as orphan
  • --policy optional - Can be repeated for each policy needed. A list of policies for the token. This must be a subset of the policies belonging to the token making the request, unless root. If not specified, defaults to all the policies of the calling token.

vault-find-token

Scan all tokens in the Vault server, optionally tokens matching certain conditions

Filter flags:

--filter-name jose will only match tokens where display name contains jose

--filter-policy root will only match tokens that have the policy root

--filter-path auth/github/login will only match tokens that have the path auth/github/login

--filter-meta-username jippi will only match tokens that have the meta[username] value jippi (GitHub auth backend injects this, as an example)

--filter-orphan will only match tokens that are orphaned

Action flags:

--delete-matches will match all tokens matching the filter flags. You will be asked to verify each token before deleting it.

vault-list-secrets

Print a list of local from conf.d/ (default) or remote secrets from Vault (--remote).

Add --detailed / DETAILED to show secret data rather than just the key names.

vault-pull-secrets

NOT IMPLEMENTED YET

Write remote Vault secrets to local disk in conf.d/

vault-push-all

Pushes all mounts, policies and secrets to a remote vault server

vault-push-auth

Write Vault auth {} stanza found in conf.d/ to remote vault server

vault-push-mounts

Mount and configure mount {} stanza found in conf.d/ to remote vault server

vault-push-policies

Write Vault policy {} stanza found in conf.d/ to remote vault server

vault-push-secrets

Write local secrets to remote Vault instance

vault-unseal-keybase

Unseal Vault using the raw unseal key from keybase / gpg init/rekey .

The command expect the raw base64encoded unseal key as env VAULT_UNSEAL_KEY or --unseal-key CLI argument

It basically automates echo "$VAULT_UNSEAL_KEY" | base64 -D | keybase pgp decrypt | xargs vault unseal -address http://<IP>:8200

Options
  • --unseal-key/ VAULT_UNSEAL_KEY (default: <empty>) The raw base64encoded unseal key as env or CLI argument
  • --consul-service-name / CONSUL_SERVICE_NAME (default: <empty>) If specified, the tool will try to lookup all vault servers in the configured Consul catalog and unseal all of them. This is the service name, e.g. vault
  • --consul-service-tag / CONSUL_SERVICE_TAG (default: standby) The Consul catalog tag to filter vault instances from if CONSUL_SERVICE_NAME is used.
  • --vault-protocol / VAULT_PROTOCOL (default: http) The protocol to use when constructing the VAULT_ADDR value when using CONSUL_SERVICE_NAME unseal strategy.

All VAULT_* env keys are preserved when using CONSUL_SERVICE_TAG, address is the only field being overwritten per vault instance found in the catalog. So you can still configure TLS and other Vault changes as usual with the environment.

Examples
  • VAULT_UNSEAL_KEY=$token hashi-helper vault-unseal-keybase
  • hashi-helper vault-unseal-keybase --unseal-key=$key
  • VAULT_CONSUL_SERVICE=vault VAULT_UNSEAL_KEY=$token hashi-helper vault-unseal-keybase
  • hashi-helper vault-unseal-keybase --unseal-key=$key --consul-service-name vault

Templating

hashi-helper version >= 2.0 support templating for configuration files.

All configuration files loaded are automatically rendered as a template using go text/template.

This is identical to how hashicorp/consul-template renders content.

Templates use [[ ]] brackes instead of the default {{ }} style to avoid clashes with HCL { } stanza definitions.

Variables

You can provide variables for templating through the CLI in various ways. All of these options can be provided any number of times

--variable-file <file> or --var-file <file>

--variable key=value or --var key=value

The tool can load files with extensions .hcl, .yaml/.yml and .json. Variables are loaded in the order they are provided in CLI, so it's possible to cascade / overwrite configuration files by using a specific loading order. --variable-file <file> are loaded before CLI --variable key=value arguments.

HCL variable file

consul_domain    = "consul"
environment_name = "staging"
environment_tld  = "stag"
db_default_ttl   = "9h"
db_max_ttl       = "72h"
my_key           = "hello world"

# a list of things

stuff = ["a", "b", "c"]

here_doc = <<-DOC
  something multiline
  that will be available
  as a single string
  DOC

YAML variable file

---
environment_name: "staging"
environment_tld: "stag"
db_default_ttl: "9h"
db_max_ttl: "72h"
my_key: "hello world"

# a list of things

stuff:
  - "a"
  - "b"
  - "c"

here_doc: |
  something multiline
  that will be available
  as a single string

JSON variable file

{
  "db_default_ttl": "9h",
  "db_max_ttl": "72h",
  "environment_name": "staging",
  "environment_tld": "stag",
  "here_doc": "something multiline\nthat will be available\nas a single string",
  "my_key":"hello world",
  "stuff": [
    "a",
    "b",
    "c"
  ]
}

Functions

This tool implement most of the features available in hashicorp/consul-template.

Additionally some useful functions in the context of hashi-helper is available, please see the list further down

consul-template compatability

The functions currently implemented can be found below.

lookup

lookup is used to lookup template variables inside a template. If the key do not exist, the template rendering will fail.

[[ lookup "my_key" ]] will output hello-world

lookupDefault

lookupDefault is used to lookup template variables inside a template. If the key do not exist, the default (2nd argument) will be returned.

[[ lookupDefault "my_key" "something" ]] will output hello-world

service

service is used to construct Consul service names programatically.

By default consul is used as the domain, but can be overwritten with a variable consul_domain

[[ service "test" ]] will output test.service.consul

Given --variable consul_domain=test.consul

[[ service "test" ]] will output test.service.test.consul

serviceWithTag

Also see service documentation above.

[[ serviceWithTag "test" "tag" ]] will output tag.test.service.consul

Given --variable consul_domain=test.consul

[[ serviceWithTag "test" "tag" ]] will output tag.test.service.test.consul

grantCredentials

Helper to output a policy path for credentials access.

This is useful for database and rabbitmq access policies.

[[ grantCredentials "db-test" "full" ]] will output

path "db-test/creds/full" {
  capabilities = ["read"]
}

grantCredentialsPolicy

Helper to output a full policy (with path) for credentials access.

This is useful for database and rabbitmq access policies.

[[ grantCredentialsPolicy "db-test" "full" ]] will output

policy "db-test-full" {
  path "db-test/creds/full" {
    capabilities = ["read"]
  }
}

githubAssignTeamPolicy

Helper to output a github team to vault policy mapping.

[[ githubAssignTeamPolicy "infra" "infra-policy" ]] will output

secret "/auth/github/map/teams/infra" {
  value = "infra-policy"
}

ldapAssignGroupPolicy

Helper to output a ldap group to vault policy mapping.

[[ ldapAssignGroupPolicy "infra" "infra-policy" ]] will output

secret "/auth/ldap/groups/infra" {
  value = "infra-policy"
}

Example

Please see examples/ folder for a working example on how templates work.

Each file is heavily documented explaining each step of the way.

When in the examples/ folder, you can run the following command to try it out.

hashi-helper \
  --lint \
  --log-level debug \
  --environment staging \
  -var-file ./staging/config.var.hcl \
  -config-dir ./staging/ \
  -config-dir ./shared \
  push-all

Workflow

The following is a sample workflow that may be used for organizations with Consul and Vault clusters in different environments. If your setup deviates from said description, feel free to modify your workflow.

Directory Structure

The directory structure is laid out like described below:

  • /${env}/apps/${app}.hcl (encrypted) Vault secrets or (cleartext) Consul KeyValue for an application in a specific environment.
  • /${env}/auth/${name}.hcl (encrypted) Vault auth backends for an specific environment ${env}.
  • /${env}/consul_services/${type}.hcl (cleartext) List of static Consul services that should be made available in an specific environment ${env}.
  • /${env}/databases/${name}/_mount.hcl (encrypted) Vault secret backend configuration for an specific mount ${name} in ${env}.
  • /${env}/databases/${name}/*.hcl (cleartext) Vault secret backend configuration for an specific Vault role belonging to mount ${name} in ${env}.

Configuration Examples

The following example assumes:

  • A service called api-admin in a production environment
  • IAM-based authentication to vault
  • An elasticache instance called shared
  • A mysql instance called db-api that should provide read-only access

Some string will need replacement

Vault app secret

The following can be stored in an encrypted file at production/apps/api-admin.hcl.

environment "production" {

  # application name must match the file name
  application "api-admin" {

    # Vault policy granting any user with policy api-admin-read-only read+list access to all secrets
    policy "api-admin-read-only" {
      path "secret/api-admin/*" {
        capabilities = ["read", "list"]
      }
    }

    # an sample secret, will be written to secrets/api-admin/API_URL in Vault
    secret "API_URL" {
      value = "http://localhost:8181"
    }

    # an sample secret, will be written to secrets/api-admin/TEST in Vault
    secret "TEST" {
      value = "http://localhost:8282"
    }

    # shorthand for API_URL and TEST above
    secrets {
      API_URL = "http://localhost:8181"
      TEST    = "http://localhost:8282"
    }
  }
}

Consul app KV

environment "production" {
  kv "name" "production" {}

  # application name must match the file name
  application "api-admin" {

    # cleartext shorthand configuration for the application, will be written to /api-admin/threads
    kv "threads" "10" {}

    # cleartext configuration for the application, will be written to /api-admin/config
    kv "config" {
      value = <<EOF
Some
file
value!
EOF
    }
  }
}

Vault auth

environment "production" {

  # The auth "name" can be anything, will be the "path" in auth configuration, e.g. the mount below will
  # make the "aws-ec2" secret backend available at "aws-ec2/" in the Vault API and CLI.
  #
  # The auth stanza maps to the Mount API ( https://www.vaultproject.io/api/system/auth.html#mount-auth-backend )
  # API endpoint: /sys/auth/:path (/sys/auth/aws-ec2)
  auth "aws-ec2" { # :path

    # Type must match the Vault auth types
    # based on this type, all config and role config below will map to settings found at https://www.vaultproject.io/docs/auth/aws.html
    type = "aws-ec2"

    # Client Configuration for the autb backend
    #
    # maps to the secret backend specific configuration
    # in this example it will be https://www.vaultproject.io/docs/auth/aws.html#auth-aws-config-client
    # key/value here is arbitrary and backend dependent, matches the Vaults docs 1:1 in keys and values
    #
    # API endpoint: /auth/:path/config/:config_name (/auth/aws-ec2/config/client)
    config "client" { # :config_name
      access_key = "XXXX"
      secret_key = "YYYY"
      max_ttl    = "1d"
    }

    # Auth backend type specific roles
    #
    # in this case it maps to https://www.vaultproject.io/docs/auth/aws.html#auth-aws-role-role-
    # key/value here is arbritary and backend dependent, matches the Vault docs 1:1 in keys and values
    #
    # API endpoint: /auth/:path/role/:role: (/auth/aws-ec2/role/api-admin-prod)
    role "api-admin-prod" { # :role
      policies                       = "global,sample-policy"
      max_ttl                        = "1h"
      allow_instance_migration       = false
      bound_vpc_id                   = "vpc-XXXXXX"
      bound_iam_instance_profile_arn = "arn:aws:iam::XXXXXXX:instance-profile/XXXX"
    }
  }

  auth "sg-github" {
    type = "github"

    # https://www.vaultproject.io/docs/auth/github.html#generate-a-github-personal-access-token
    #
    # API endpoint: auth/:name/config (auth/sg-github/config)
    config "" {
      organization = "seatgeek"
    }
  }
}

Consul services

The following can be stored in a cleartext file at production/consul_services/cache.hcl

environment "production" {

  # service name
  service "cache-shared" {
    # ID must be unique
    id      = "cache-shared"

    # Pseudo node name to attach the service to (we use "cache" or "rds" depending on service type)
    node    = "cache"

    # The IP or domain the service should resolve to
    address = "cache-shared.ang13m.YYYY.use1.cache.amazonaws.com"

    # The port the service exposes, used for SRV records and Consul API / Fabio
    port    = 6379

    # Optional list of tags
    tags    = ["master", "replica"]

    # Optional meta keys
    meta {
      my_key      = "my_value"
      another_key = "another value"
    }
  }
}

Vault mount

environment "production" {

  # the name / path the mount will be mounted at, must be unique for the environment
  mount "db-api" {

    # the mount backend type to use (see Vault docs)
    type = "database"

    # optional string
    max_lease_ttl     = "1h"

    # optional string
    default_lease_ttl = "1h"

    # optional boolean
    force_no_cache    = true

    # mount configuration, see Vault docs for details
    config "default" {
      plugin_name    = "mysql-rds-database-plugin"
      connection_url = "xxx:yyy@tcp(zzzz:3306)/"
      allowed_roles  = "*"
    }
  }
}

Vault mount role

# environment name must match the directory name
environment "production" {

  # the name *must* match the name from _mount.hcl !
  mount "db-api" {

    # the role name and configuration
    role "read-only" {
      # by convention, db_name matches the config{} stanza from the _mount example
      db_name     = "default"

      # How long time a token may be alive without being renwed
      default_ttl = "24h"

      # How long time a token can life, disregarding renewal timeout
      max_ttl     = "24h"

      # The SQL to execute when creating a user
      #
      # '{{name}}', '{{password}}' and '{{expiry}}' (used in postgres)
      creation_statements = <<-SQL
      CREATE USER '{{name}}'@'%' IDENTIFIED BY '{{password}}';
      GRANT SELECT ON api.* TO '{{name}}'@'%';
      SQL
    }
  }

  # policy name, granting users with policy "db-api-read-only" access to create credentials from the Vault mount
  # by convention the name is always ${mount_name}-${role_name}
  policy "db-api-read-only" {

    # the path to allow Vault read from, always ${mount_name}/creds/${role_name}
    path "db-api/creds/read-only" {
      capabilities = ["read"]
    }
  }

  # This will configure the GitHub team "rds-production-api-read-only" to have the policy "db-api-read-only"
  # when they "vault auth"
  secret "/auth/github/map/teams/rds-production-api-read-only" {
    value = "db-api-read-only"
  }
}

hashi-helper's People

Contributors

burdandrei avatar dependabot-preview[bot] avatar dependabot[bot] avatar directionless avatar druwadi avatar druwadisg avatar jippi avatar jonmcoe avatar josegonzalez avatar jpbelanger-mtl avatar komapa avatar lorenzo avatar mjrlee avatar oholiab avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

hashi-helper's Issues

Any chance of tagging v3.0.1?

This is off the back of #34 and #35, a tag containing these fixes would really save me having to mess about with building from a fork or pinning to a git sha for our internal package building CI :)

SIGSEGV when running vault-list-secrets --remote --detailed

Hi, when tries it, a Sevg happened as below, maybe some fix need to make that be more reliable.
thanks,

$  ./hashi-helper  vault-list-secrets --remote --detailed
INFO[0000] value = http://localhost:8181                 app=api-admin env=production secret=API_URL
INFO[0000]
panic: runtime error: invalid memory address or nil pointer dereference
**[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x7ca144]**

goroutine 1 [running]:
github.com/seatgeek/hashi-helper/command/vault.secretListLocal(0xc4200c4b40, 0x8b3601, 0x6)
        **/Users/go_src/src/github.com/seatgeek/hashi-helper/command/vault/secrets_list.go:29 +0x184**
github.com/seatgeek/hashi-helper/command/vault.SecretsList(0xc4200c4b40, 0xc420049320, 0x778241)
        /Users/go_src/src/github.com/seatgeek/hashi-helper/command/vault/secrets_list.go:17 +0x87
main.main.func5(0xc4200c4b40, 0x100, 0xc4200c4b40)
        /Users/go_src/src/github.com/seatgeek/hashi-helper/main.go:101 +0x2b
gopkg.in/urfave/cli%2ev1.HandleAction(0x823ea0, 0x8cb2a8, 0xc4200c4b40, 0xc42005e700, 0x0)
        /Users/go_src/src/gopkg.in/urfave/cli.v1/app.go:485 +0xd4
gopkg.in/urfave/cli%2ev1.Command.Run(0x8b8623, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c2d0a, 0x27, 0x0, ...)
        /Users/go_src/src/gopkg.in/urfave/cli.v1/command.go:193 +0xb72
gopkg.in/urfave/cli%2ev1.(*App).Run(0xc4200d89c0, 0xc4200101c0, 0x4, 0x4, 0x0, 0x0)
        /Users/go_src/src/gopkg.in/urfave/cli.v1/app.go:250 +0x7d0
main.main()
        /Users/go_src/src/github.com/seatgeek/hashi-helper/main.go:255 +0x12d5

Dependabot can't resolve your Go dependency files

Dependabot can't resolve your Go dependency files.

As a result, Dependabot couldn't update your dependencies.

The error Dependabot encountered was:


If you think the above is an error on Dependabot's side please don't hesitate to get in touch - we'll do whatever we can to fix it.

View the update logs.

Configuring LDAP authentication engine & TTLs

Hi! hashi-helper is super helpful. I'm looking to move a lot of my vault configuration over that way and am running into a few things.

Configure LDAP Auth Engine

One thing that i'm not sure how to do as hashi-helper is right now is configure the LDAP authentication engine. I had tried something like:

environment "dev" {
    auth "ldap" {
        type = "ldap"
        config "" { # should write to /auth/ldap/config i imagine?
            url      = "ldap://blah"
            starttls = true
            #more ldap config bits here
        }
        duo "access" { # might? write to /auth/ldap/duo/access?
            host = "..."
            ikey = "..."
            skey = "..."
        }
        mfa_config "" { # /auth/ldap/mfa_config?
            type = "duo"
        }
        groups "vaultadmin" { # /auth/ldap/groups/vaultadmin?
            policies = "default,user-vaultadmin"
        }
    }
}

Is this something I'm going to have to wire up in type_vault_auth.go and parse_vault_auth.go? Or is there a generic "write key/value to place" resource thing i could use?

Auth engine TTLs

Let's say I want to set default lease/max lease TTLs for a particular auth engine...

environment "dev" {
    auth "aws-ec2" {
        type = "aws-ec2"
        role "testrole" {
            bound_account_id          = "1234"
            policies                  = "default,pki"
            disallow_reauthentication = true
            role_tag                  = "vault_role"
        }
        defaultleasettl = "24h"
        maxleasettl     = "8w"
    }
}

I get this when i run hashi-helper:

* invalid key 'defaultleasettl' in line 10:9
* invalid key 'maxleasettl' in line 11:9

I see the struct in type_vault_auth.go includes those TTL values, but i dont think it gets mapped into that in parse_vault_auth.go. Should I just tune this with the mount type instead?

    mount "auth/aws-ec2" {
        type              = "aws-ec2"
        default_lease_ttl = "1h"
        max_lease_ttl     = "1y"
    }

improve documentation around 'encrypted file' in workflow examples

As a potential user of hashi-helper, I would like for the documentation around encrypted file workflow to be more understandable.

In several places in the README.md, files are referred to as 'encrypted files', but there is little context given for how those files are encrypted - what is the tooling being used there? Is it that keybase encrypt is intended to be used, or something else? Or just that the vault-secret values stored in the files are somehow encrypted?

E.g., "The following can be stored in an encrypted file at production/apps/api-admin.hcl".

The code block following is in cleartext, and clearly the whole thing is meant to be crypto'ed, but no where else in the docs does it say how we should do that, or what the workflow is to make our locally-encrypted stuff usable with the vault-push-all or vault-push-secrets commands.

Unable compile: type *http.Client has no field or method CloseIdleConnections

$ go get github.com/seatgeek/hashi-helper# github.com/hashicorp/vault/vendor/github.com/hashicorp/go-retryablehttp
go/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/go-retryablehttp/client.go:447:17: c.HTTPClient.CloseIdleConnections undefined (type *http.Client has no field or method CloseIdleConnections)
go/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/go-retryablehttp/client.go:507:16: c.HTTPClient.CloseIdleConnections undefined (type *http.Client has no field or method CloseIdleConnections)
go/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/go-retryablehttp/client.go:538:16: c.HTTPClient.CloseIdleConnections undefined (type *http.Client has no field or method CloseIdleConnections)
go/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/go-retryablehttp/client.go:545:15: c.HTTPClient.CloseIdleConnections undefined (type *http.Client has no field or method CloseIdleConnections)
go/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/go-retryablehttp/client.go:554:14: c.HTTPClient.CloseIdleConnections undefined (type *http.Client has no field or method CloseIdleConnections)

I fix it by https://godoc.org/golang.org/dl/go1.12.8, so go version will be 1.22.8

Missing VAULT_ADDR on vault-unseal-keybase without --consul-service-name causes SIGSEGV

To repro:

  • set CONSUL_HTTP_ADDR
  • set VAULT_UNSEAL_KEY
  • run hashi-helper vault-unseal-keybase
$ hashi-helper vault-unseal-keybase
INFO[0000] Decoding VAULT_UNSEAL_KEY
INFO[0000] Decrypting VAULT_UNSEAL_KEY
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x10ff5a6]

goroutine 1 [running]:
github.com/seatgeek/hashi-helper/vendor/github.com/Sirupsen/logrus.(*Entry).Info(0x0, 0xc420108f60, 0x1, 0x1)
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/vendor/github.com/Sirupsen/logrus/entry.go:139 +0x26
github.com/seatgeek/hashi-helper/command/vault.sendUnseal(0xc420186000, 0x42, 0x0, 0x0, 0x0)
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/command/vault/unseal_keybase.go:89 +0xa3
github.com/seatgeek/hashi-helper/command/vault.UnsealKeybase(0xc4200b6dc0, 0xc4201092a8, 0x137aec1)
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/command/vault/unseal_keybase.go:47 +0xc29
main.main.func4(0xc4200b6dc0, 0x0, 0xc4200b6dc0)
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/main.go:87 +0x2b
github.com/seatgeek/hashi-helper/vendor/gopkg.in/urfave/cli%2ev1.HandleAction(0x141fe60, 0x14cd150, 0xc4200b6dc0, 0xc42005c500, 0x0)
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/vendor/gopkg.in/urfave/cli.v1/app.go:485 +0xd2
github.com/seatgeek/hashi-helper/vendor/gopkg.in/urfave/cli%2ev1.Command.Run(0x14b7e9f, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14c45c8, 0x31, 0x0, ...)
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/vendor/gopkg.in/urfave/cli.v1/command.go:193 +0xa99
github.com/seatgeek/hashi-helper/vendor/gopkg.in/urfave/cli%2ev1.(*App).Run(0xc42007f040, 0xc42000a080, 0x2, 0x2, 0x0, 0x0)
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/vendor/gopkg.in/urfave/cli.v1/app.go:250 +0x758
main.main()
    /Users/jose/.go/1.9.1/src/github.com/seatgeek/hashi-helper/main.go:280 +0x1653

[parser] rework parser so file order for resources won't matter

Today partial resources (e.g. mount -> role without mount config) must be in files that are lexically sorted after the full mount config (hense the best practice of prefixing the mount config file with _)

Rewriting the parser to be two pass, one to extract all resources and one to merge them together so order of files won't matter

Arrays resulting from lookups have unquoted members

I'm creating a PKI role that looks like:

environment "all" {
  secret "/user-ca/roles/user" {
    "allowed_domains" = [[ lookup "all_engineers" ]]
    ...
  }
}

where all_engineers is populated by passing in a variables file of the format:

{
  "all_engineers": [
    "joel",
    "jolene",
    ...
  ]
}

when I attempt to apply this configuration, I get the error Could not format HCL file user_ca.hcl: At 3:26: unexpected token while parsing list: IDENT

If I then (erroneously, but for debug purposes) put the templated lookup inside quotes, it's populated with a string literal of the result of the lookup (the array of usernames) whereby none of the members are quoted (which is consistent with the IDENT problem). This is counter to what I would expect to be the default behaviour to render as a list of quoted strings.

As a workaround I've had to hack together:

    "allowed_domains" = [ [[ range $i, $name := lookup "all_engineers" ]][[if $i]] ,[[end]]"[[$name]]"[[end]] ]

which templates out the list as I want it formatted - this isn't ideal!

I'm happy to try to fix this myself but I'd appreciate guidance on where to look and whether you'd accept this patch in the first place.

[bug] Build failed: cannot use vc Client in argument to h.Auth

go/bin/go1.12.8 get github.com/seatgeek/hashi-helper
# github.com/seatgeek/hashi-helper/command/profile
go/src/github.com/seatgeek/hashi-helper/command/profile/use_profile.go:277:24: cannot use vc (type *"github.com/hashicorp/vault/api".Client) as type *"github.com/hashicorp/vault/vendor/github.com/hashicorp/vault/api".Client in argument to h.Auth

Cannot get latest version: module contains a go.mod file, so module path should be github.com/seatgeek/hashi-helper/v3

Background

The github.com/seatgeek/hashi-helper uses Go modules and the current release version is v3. And it’s module path is "github.com/seatgeek/hashi-helper", instead of "github.com/seatgeek/hashi-helper/v3". It must comply with the specification of "Releasing Modules for v2 or higher" available in the Modules documentation. Quoting the specification:

A package that has opted in to modules must include the major version in the import path to import any v2+ modules
To preserve import compatibility, the go command requires that modules with major version v2 or later use a module path with that major version as the final element. For example, version v2.0.0 of example.com/m must instead use module path example.com/m/v2.
https://github.com/golang/go/wiki/Modules#releasing-modules-v2-or-higher

Steps to Reproduce

GO111MODULE=on, run go get targeting any version >= v3.2.1 of the seatgeek/hashi-helper:

$ go get github.com/seatgeek/[email protected]
go: finding github.com/seatgeek/hashi-helper v3.3.3
go: finding github.com/seatgeek/hashi-helper v3.3.3
go get github.com/seatgeek/[email protected]: github.com/seatgeek/[email protected]: invalid version: module contains a go.mod file, so major version must be compatible: should be v0 or v1, not v3

run go get github.com/seatgeek/hashi-helper, the version will stuck in v3.2.0:

$go get github.com/seatgeek/hashi-helper
go: downloading github.com/seatgeek/hashi-helper v3.2.0+incompatible
go: github.com/seatgeek/hashi-helper upgrade => v3.2.0+incompatible

SO anyone using Go modules will not be able to easily use any newer version of seatgeek/hashi-helper.

Solution

1. Kill the go.mod files, rolling back to GOPATH.

This would push them back to not being managed by Go modules (instead of incorrectly using Go modules).
Ensure compatibility for downstream module-aware projects and module-unaware projects projects

2. Fix module path to strictly follow SIV rules.

Patch the go.mod file to declare the module path as github.com/seatgeek/hashi-helper/v3 as per the specs. And adjust all internal imports.
The downstream projects might be negatively affected in their building if they are module-unaware (Go versions older than 1.9.7 and 1.10.3; Or use third-party dependency management tools, such as: Dep, glide,govendor…).

If you don't want to break the above repos. This method can provides better backwards-compatibility.
Release a v2 or higher module through the major subdirectory strategy: Create a new v3 subdirectory (github.com/seatgeek/hashi-helper/v3) and place a new go.mod file in that subdirectory. The module path must end with /v3. Copy or move the code into the v3 subdirectory. Update import statements within the module to also use /v3 (import "github.com/seatgeek/hashi-helper/v3/…"). Tag the release with v3.x.y.

3. Suggest your downstream module users use hash instead of a version tag.

If the standard rule of go modules conflicts with your development mode. Or not intended to be used as a library and does not make any guarantees about the API. So you can’t comply with the specification of "Releasing Modules for v2 or higher" available in the Modules documentation.
Regardless, since it's against one of the design choices of Go, it'll be a bit of a hack. Instead of go get github.com/seatgeek/hashi-helper@version-tag, module users need to use this following way to get the seatgeek/hashi-helper:
(1) Search for the tag you want (in browser)
(2) Get the commit hash for the tag you want
(3) Run go get github.com/seatgeek/hashi-helper@commit-hash
(4) Edit the go.mod file to put a comment about which version you actually used
This will make it difficult for module users to get and upgrade seatgeek/hashi-helper.

Summary

You can make a choice to fix DM issues by balancing your own development schedules/mode against the affects on the downstream projects.

For this issue, Solution 2 can maximize your benefits and with minimal impacts to your downstream projects the ecosystem.

References

Missing vendor file?

I'm not very familier with govendor, on osx I get the following:

brannon:hashi-helper seph$ git status
On branch master
Your branch is up-to-date with 'origin/master'.
nothing to commit, working directory clean

brannon:hashi-helper seph$ git log | head -1
commit 969ca9ce0ef1560b279b83130d1e570b35aa18ad

brannon:hashi-helper seph$ make build
go get github.com/kardianos/govendor
govendor sync
Error: Vendor file at "vendor" not found.
govendor sync
	Ensures the contents of the vendor folder matches the vendor file.
	Options:
		-n           dry run, print out action only
		-insecure    allow downloading over insecure connection
		-v           verbose output
make: *** [install] Error 2

It sounds like I should have a vendor/vendor.json?

Dependabot can't resolve your Go dependency files

Dependabot can't resolve your Go dependency files.

As a result, Dependabot couldn't update your dependencies.

The error Dependabot encountered was:


If you think the above is an error on Dependabot's side please don't hesitate to get in touch - we'll do whatever we can to fix it.

View the update logs.

[bug] No default to all when no environment specified.

The documentation reads:
--environment / ENVIRONMENT: The environment to process for (optional; default: all)

But if the --environment is not explicitly defined it get's skipped.

Example config file to setup nomad vault roles/auth/policy
(this might not be a fully real working example)

environment "dev" {

    auth "nomad-cluster-aws" {
      type = "aws"

      role "nomad-cluster" { # :role
        policies                       = "nomad-server"
        max_ttl                        = "6h"
        period                         = "1h"
        allow_instance_migration       = false
        bound_iam_role_arn             = "arn:aws:iam::99999999999:role/nomad"
        }
    }


    auth "nomad-server-token" {
      type = "token"

      role "nomad-server" { # :role
        disallowed_policies = "nomad-server"
        explicit_max_ttl    = 0
        name                = "nomad-cluster"
        orphan              = false
        period              = 3600
        renewable           = true
      }
    }


    policy "nomad-server" {
          # Allow creating tokens under "nomad-cluster" token role. The token role name
          # should be updated if "nomad-cluster" is not used.
          path "auth/token/create/nomad-cluster" {
            capabilities = ["update"]
          }

          # Allow looking up "nomad-cluster" token role. The token role name should be
          # updated if "nomad-cluster" is not used.
          path "auth/token/roles/nomad-cluster" {
            capabilities = ["read"]
          }

          # Allow looking up incoming tokens to validate they have permissions to access
          # the tokens they are requesting. This is only required if
          # `allow_unauthenticated` is set to false.
          path "auth/token/lookup" {
            capabilities = ["update"]
          }

          # Allow revoking tokens that should no longer exist. This allows revoking
          # tokens for dead tasks.
          path "auth/token/revoke-accessor" {
            capabilities = ["update"]
          }

          # Allow checking the capabilities of our own token. This is used to validate the
          # token upon startup.
          path "/sys/capabilities-self" {
            capabilities = ["update"]
          }

          # Allow our own token to be renewed.
          path "auth/token/renew-self" {
            capabilities = ["update"]
          }
    }

}

No --environment specified.

$ hashi-helper --log-level=debug --config-file=dev.hcl  vault-push-all
DEBU[0000] Parsing file dev.hcl
DEBU[0000]   Found environment dev
DEBU[0000]   Scanning for applications
DEBU[0000]   Scanning for vault auth backends
DEBU[0000]   Scanning for vault secrets
DEBU[0000]   Scanning for vault policies
DEBU[0000]   Scanning for vault mounts
DEBU[0000]   Scanning for consul services
DEBU[0000]   Scanning for consul KV
$ 

With environment specified.

$ hashi-helper --log-level=debug --config-file=dev.hcl --environment=dev vault-push-all
DEBU[0000] Parsing file dev.hcl
DEBU[0000]   Found environment dev
DEBU[0000]   Scanning for applications
DEBU[0000]   Scanning for vault auth backends
DEBU[0000]   Scanning for vault secrets
DEBU[0000]   Scanning for vault policies
DEBU[0000]   Scanning for vault mounts
DEBU[0000]   Scanning for consul services
DEBU[0000]   Scanning for consul KV
INFO[0000] Auth backend nomad-cluster-aws already exist
INFO[0000]   Writing auth backend role: auth/nomad-cluster-aws/role/nomad-cluster
[...]

Pull all secrets?

I would like to pull all secrets from a remote but I notice that this feature hasn't been implemented yet.

Any ETA on this feature?

Dependabot can't resolve your Go dependency files

Dependabot can't resolve your Go dependency files.

As a result, Dependabot couldn't update your dependencies.

The error Dependabot encountered was:


If you think the above is an error on Dependabot's side please don't hesitate to get in touch - we'll do whatever we can to fix it.

View the update logs.

is this possible to use @ in configuration file?

for example, like vault CLI, use the content of a file as the input?

environment "production" {

  # the name/path the mount will be mounted at,
  # must be unique for the environment
  auth "kubernetes" {

    # the mount backend type to use (see Vault docs)
    type = "kubernetes"

    # mount configuration, see Vault docs for details
    config ""{
        kubernetes_host = "..."
        kubernetes_ca_cert = "@/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
    }

  }
}

seems it will be treated as a string, instead of read the file content.

thanks,

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.