-
-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for Secret Management, using the SecretMangement module and custom logic #980
Comments
Seems like a great idea to easily use secrets in Pode! 😄 |
… var scope, and general scope clean-up
I've been working on this for the last few days on and off when I can, and managed to put it all together 😄 It's fairly similar to what's above, but with tweaks. Still the same, to start with, is the need to
Register-PodeSecretVault -Name 'FriendlyVaultName' -ModuleName 'Az.KeyVault' -VaultParameters @{
AZKVaultName = 'VaultNameInAzure'
SubscriptionId = $SubscriptionId
}
Register-PodeSecretVault -Name 'HcpVault' `
-VaultParameters @{
Address = 'http://127.0.0.1:8200'
} `
-ScriptBlock {
param($config, $key)
return (vault kv get -format json -address $config.Address -mount secret $key | ConvertFrom-Json -AsHashtable).data.data
} The Mount-PodeSecret -Name 'Github' -Vault 'HcpVault' -Key 'tools/github' Getting and updating secrets can still be done either via $value = $secret:NAME
$secret:NAME = 'VALUE' I've also added additional functionality for interacting with secrets in vaults more adhoc, without having to mount them first - but you still need to register a vault:
|
I've thought about this feature on and off, but finally might have something that could work. But it's totally open for comments though, so please feel free! 😄
The idea is to add in Secret Management support - both using the SecretManagement module, but also support for custom logic as well. To get secrets back can be done using
$secret:<name>
, or a function for external modules/functions.Functions
Register Vault
To start with you'll need to "register" the secret vault you wish to use. Akin to the SecretManagement module this will be done using a
Register-PodeSecretVault
function.They'll be 2 initial ways of registering a vault: one for SecretManagement, and one for Custom:
In both a
-Name
is required and should be unique, this will be the name used to reference the vault later on.For SecretManagement the
-Name
sometimes needs to match the actual vault name, so if you want a more friendly name here then you can use-VaultName
for the real name.-VaultParameters
are the same as the VaultParameters in SecretManagement.In both you'll spot
-CacheTtl
, and if set, any secrets retrieved will be cached for this number of seconds.-ArgumentList
is an array of arguments to supply to the-ScriptBlock
, along with "key" from adding a secret.For Custom, there's also the option to have custom
-Connect
logic - such as logging into a vault, getting an auth token, etc.. This will be called once, and the token cached (with expiry). On expiry, it will be called again. The token will be supplied to the scriptblock for retrieving the secret.Add Secret
After registering a vault, you'll need to "add" a secret to Pode using
Add-PodeSecret
. This is the same regardless of how the vault was registered, but you can specify the "key" for the secret to be looked up by using either a-ScriptBlock
or a raw-Key
string value:The key returned should be the path/name of the secret (ie: in hashicorp vault it could be
database/creds
, and in the register scriptblock this is appended ontokv/data
).You'll also spot there's a
-NoCache
, so if you register a vault with global secret caching here you can disable it. Or you have have no global caching, and enable it for specific secrets using-CacheTtl
.Get Secret
The main way to get a secret in Routes, TImers, etc. will be using the secret variable scope:
Or, you could use the
Get-PodeSecret
function (which the above will use internally):Example
SecretManagement
The following example will use the
SecretManagement.Hashicorp.Vault.KV
extension module for SecretManagement, to retrieve a secret from a HashiCorp Vault:Custom
Or, the same as above for HashiCorp Vault, but using the
vault
CLI:The text was updated successfully, but these errors were encountered: