Merge #11529: Read vault token from ~/.vault-token
This commit is contained in:
commit
f1803ba4b6
|
@ -27,6 +27,8 @@ IMPROVEMENTS:
|
||||||
command to initialize a new or existing Terraform configuration.
|
command to initialize a new or existing Terraform configuration.
|
||||||
* provisioners: All provisioners now respond very quickly to interrupts for
|
* provisioners: All provisioners now respond very quickly to interrupts for
|
||||||
fast cancellation. [GH-10934]
|
fast cancellation. [GH-10934]
|
||||||
|
* provider/vault: read vault token from `~/.vault-token` as a fallback for the
|
||||||
|
`VAULT_TOKEN` environment variable. [GH-11529]
|
||||||
|
|
||||||
BUG FIXES:
|
BUG FIXES:
|
||||||
|
|
||||||
|
|
|
@ -2,12 +2,14 @@ package vault
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
"log"
|
"log"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/hashicorp/terraform/helper/schema"
|
"github.com/hashicorp/terraform/helper/schema"
|
||||||
"github.com/hashicorp/terraform/terraform"
|
"github.com/hashicorp/terraform/terraform"
|
||||||
"github.com/hashicorp/vault/api"
|
"github.com/hashicorp/vault/api"
|
||||||
|
"github.com/mitchellh/go-homedir"
|
||||||
)
|
)
|
||||||
|
|
||||||
func Provider() terraform.ResourceProvider {
|
func Provider() terraform.ResourceProvider {
|
||||||
|
@ -22,7 +24,7 @@ func Provider() terraform.ResourceProvider {
|
||||||
"token": &schema.Schema{
|
"token": &schema.Schema{
|
||||||
Type: schema.TypeString,
|
Type: schema.TypeString,
|
||||||
Required: true,
|
Required: true,
|
||||||
DefaultFunc: schema.EnvDefaultFunc("VAULT_TOKEN", nil),
|
DefaultFunc: schema.EnvDefaultFunc("VAULT_TOKEN", ""),
|
||||||
Description: "Token to use to authenticate to Vault.",
|
Description: "Token to use to authenticate to Vault.",
|
||||||
},
|
},
|
||||||
"ca_cert_file": &schema.Schema{
|
"ca_cert_file": &schema.Schema{
|
||||||
|
@ -122,6 +124,21 @@ func providerConfigure(d *schema.ResourceData) (interface{}, error) {
|
||||||
return nil, fmt.Errorf("failed to configure Vault API: %s", err)
|
return nil, fmt.Errorf("failed to configure Vault API: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
token := d.Get("token").(string)
|
||||||
|
if token == "" {
|
||||||
|
// Use the vault CLI's token, if present.
|
||||||
|
homePath, err := homedir.Dir()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("Can't find home directory when looking for ~/.vault-token: %s", err)
|
||||||
|
}
|
||||||
|
tokenBytes, err := ioutil.ReadFile(homePath + "/.vault-token")
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("No vault token found: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
token = strings.TrimSpace(string(tokenBytes))
|
||||||
|
}
|
||||||
|
|
||||||
// In order to enforce our relatively-short lease TTL, we derive a
|
// In order to enforce our relatively-short lease TTL, we derive a
|
||||||
// temporary child token that inherits all of the policies of the
|
// temporary child token that inherits all of the policies of the
|
||||||
// token we were given but expires after max_lease_ttl_seconds.
|
// token we were given but expires after max_lease_ttl_seconds.
|
||||||
|
@ -135,7 +152,7 @@ func providerConfigure(d *schema.ResourceData) (interface{}, error) {
|
||||||
// can explicitly be revoked, and this limited scope won't apply to
|
// can explicitly be revoked, and this limited scope won't apply to
|
||||||
// any secrets that are *written* by Terraform to Vault.
|
// any secrets that are *written* by Terraform to Vault.
|
||||||
|
|
||||||
client.SetToken(d.Get("token").(string))
|
client.SetToken(token)
|
||||||
renewable := false
|
renewable := false
|
||||||
childTokenLease, err := client.Auth().Token().Create(&api.TokenCreateRequest{
|
childTokenLease, err := client.Auth().Token().Create(&api.TokenCreateRequest{
|
||||||
DisplayName: "terraform",
|
DisplayName: "terraform",
|
||||||
|
|
|
@ -84,6 +84,8 @@ variables in order to keep credential information out of the configuration.
|
||||||
|
|
||||||
* `token` - (Required) Vault token that will be used by Terraform to
|
* `token` - (Required) Vault token that will be used by Terraform to
|
||||||
authenticate. May be set via the `VAULT_TOKEN` environment variable.
|
authenticate. May be set via the `VAULT_TOKEN` environment variable.
|
||||||
|
If none is otherwise supplied, Terraform will attempt to read it from
|
||||||
|
`~/.vault-token` (where the vault command stores its current token).
|
||||||
Terraform will issue itself a new token that is a child of the one given,
|
Terraform will issue itself a new token that is a child of the one given,
|
||||||
with a short TTL to limit the exposure of any requested secrets.
|
with a short TTL to limit the exposure of any requested secrets.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue