76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
|
# File 'lib/puppet/functions/hiera_vault.rb', line 76
Puppet::Functions.create_function(:hiera_vault) do
begin
require 'json'
rescue LoadError => e
raise Puppet::DataBinding::LookupError, '[hiera-vault] Must install json gem to use hiera-vault backend'
end
begin
require 'vault'
rescue LoadError => e
raise Puppet::DataBinding::LookupError, '[hiera-vault] Must install vault gem to use hiera-vault backend'
end
begin
require 'debouncer'
rescue LoadError => e
raise Puppet::DataBinding::LookupError, '[hiera-vault] Must install debouncer gem to use hiera-vault backend'
end
begin
rescue LoadError => e
raise Puppet::DataBinding::LookupError, '[hiera-vault] Must install thread gem to use hiera-vault backend'
end
dispatch :lookup_key do
param 'Variant[String, Numeric]', :key
param 'Hash', :options
param 'Puppet::LookupContext', :context
end
$cache = Cache.new
$hiera_vault_mutex = Mutex.new
$hiera_vault_client = Vault::Client.new
$hiera_vault_shutdown = Debouncer.new(10) do
$hiera_vault_mutex.synchronize do
$hiera_vault_client.shutdown
$hiera_vault_client = nil
end
end
def vault_token(options)
token = nil
token = ENV['VAULT_TOKEN'] unless ENV['VAULT_TOKEN'].nil?
token ||= options['token'] unless options['token'].nil?
token = File.read(token).strip.chomp if token.to_s.start_with?('/') and File.exist?(token)
token
end
def lookup_key(key, options, context)
if confine_keys = options['confine_to_keys']
raise ArgumentError, '[hiera-vault] confine_to_keys must be an array' unless confine_keys.is_a?(Array)
begin
confine_keys = confine_keys.map { |r| Regexp.new(r) }
rescue StandardError => e
raise Puppet::DataBinding::LookupError, "[hiera-vault] creating regexp failed with: #{e}"
end
regex_key_match = Regexp.union(confine_keys)
unless key[regex_key_match] == key
context.explain { "[hiera-vault] Skipping hiera_vault backend because key '#{key}' does not match confine_to_keys" }
context.not_found
end
end
if strip_from_keys = options['strip_from_keys']
raise ArgumentError, '[hiera-vault] strip_from_keys must be an array' unless strip_from_keys.is_a?(Array)
strip_from_keys.each do |prefix|
key = key.gsub(Regexp.new(prefix), '')
end
end
if vault_token(options) == 'IGNORE-VAULT'
context.explain { '[hiera-vault] token set to IGNORE-VAULT - Quitting early' }
return context.not_found
end
raise ArgumentError, '[hiera-vault] no token set in options and no token in VAULT_TOKEN' if vault_token(options).nil?
result = vault_get(key, options, context)
continue_if_not_found = options['continue_if_not_found'] || false
return result unless result.nil? and continue_if_not_found
context.not_found
end
def vault_get(key, options, context)
raise ArgumentError, "[hiera-vault] invalid value for default_field_parse: '#{options['default_field_parse']}', should be one of 'string','json'" unless ['string', 'json', nil].include?(options['default_field_parse'])
raise ArgumentError, "[hiera-vault] invalid value for default_field_behavior: '#{options['default_field_behavior']}', should be one of 'ignore','only'" unless ['ignore', 'only', nil].include?(options['default_field_behavior'])
raise ArgumentError, "[hiera-vault] invalid value for cache_for: '#{options['cache_for']}', should be a number or nil" if !options['cache_for'].nil? && (!options['cache_for'].is_a? Numeric)
$hiera_vault_mutex.synchronize do
cached_value = $cache.get(key, options)
return cached_value.value unless cached_value.nil?
$hiera_vault_client = Vault::Client.new if $hiera_vault_client.nil?
begin
$hiera_vault_client.configure do |config|
config.address = options['address'] unless options['address'].nil?
config.token = vault_token(options)
config.ssl_pem_file = options['ssl_pem_file'] unless options['ssl_pem_file'].nil?
config.ssl_verify = options['ssl_verify'] unless options['ssl_verify'].nil?
config.ssl_ca_cert = options['ssl_ca_cert'] if config.respond_to? :ssl_ca_cert
config.ssl_ca_path = options['ssl_ca_path'] if config.respond_to? :ssl_ca_path
config.ssl_ciphers = options['ssl_ciphers'] if config.respond_to? :ssl_ciphers
end
raise Puppet::DataBinding::LookupError, '[hiera-vault] vault is sealed' if $hiera_vault_client.sys.seal_status.sealed?
context.explain { "[hiera-vault] Client configured to connect to #{$hiera_vault_client.address}" }
rescue StandardError => e
$hiera_vault_shutdown.call
$hiera_vault_client = nil
raise Puppet::DataBinding::LookupError, "[hiera-vault] Skipping backend. Configuration error: #{e}"
end
answer = nil
strict_mode = (options.key?('strict_mode') and options['strict_mode'])
raise ArgumentError, '[hiera-vault] generic is no longer valid - change to kv' if options['mounts']['generic']
kv_mounts = options['mounts'].dup
kv_mounts.each_pair do |mount, paths|
interpolate(context, paths).each do |path|
secretpath = context.interpolate(File.join(mount, path))
context.explain { "[hiera-vault] Looking in path #{secretpath} for #{key}" }
secret = nil
paths = []
if options.fetch('v2_guess_mount', true)
paths << [:v2, File.join(mount, path, 'data', key).chomp('/')]
paths << [:v2, File.join(mount, 'data', path, key).chomp('/')]
else
paths << [:v2, File.join(mount, path, key).chomp('/')]
paths << [:v2, File.join(mount, key).chomp('/')] if key.start_with?(path)
end
paths << [:v1, File.join(mount, path, key)] if options.fetch('v1_lookup', true)
paths.each do |version_path|
version = version_path[0]
path = version_path[1]
context.explain { "[hiera-vault] Checking path: #{path}" }
response = $hiera_vault_client.logical.read(path)
next if response.nil?
secret = version == :v1 ? response.data : response.data[:data]
rescue Vault::HTTPConnectionError
msg = "[hiera-vault] Could not connect to read secret: #{secretpath}"
context.explain { msg }
raise Puppet::DataBinding::LookupError, msg
rescue Vault::HTTPError => e
msg = "[hiera-vault] Could not read secret #{secretpath}: #{e.errors.join("\n").rstrip}"
context.explain { msg }
raise Puppet::DataBinding::LookupError, "#{msg} - (strict_mode is true so raising as error)" if strict_mode
end
next if secret.nil?
context.explain { "[hiera-vault] Read secret: #{key}" }
if options['default_field'] and (['ignore', nil].include?(options['default_field_behavior']) ||
(secret.has_key?(options['default_field'].to_sym) && secret.length == 1))
unless secret.has_key?(options['default_field'].to_sym)
$cache.set(key, nil, options)
return nil
end
new_answer = secret[options['default_field'].to_sym]
if options['default_field_parse'] == 'json'
begin
new_answer = JSON.parse(new_answer, quirks_mode: true)
rescue JSON::ParserError => e
context.explain { "[hiera-vault] Could not parse string as json: #{e}" }
end
end
else
new_answer = secret.each_with_object({}) do |(k, v), h|
h[k.to_s] = stringify_keys v
end
end
unless new_answer.nil?
answer = new_answer
break
end
end
break unless answer.nil?
end
raise Puppet::DataBinding::LookupError, "[hiera-vault] Could not find secret #{key}" if answer.nil? and strict_mode
answer = context.not_found if answer.nil?
$hiera_vault_shutdown.call
$cache.set(key, answer, options)
return answer
end
end
def stringify_keys(value)
case value
when String
value
when Hash
result = {}
value.each_pair { |k, v| result[k.to_s] = stringify_keys v }
result
when Array
value.map { |v| stringify_keys v }
else
value
end
end
def interpolate(context, paths)
allowed_paths = []
paths.each do |path|
path = context.interpolate(path)
segments = path.split('/').map { |segment| segment.split(',') }
allowed_paths += build_paths(segments) unless segments.empty?
end
allowed_paths
end
def build_paths(segments)
paths = [[]]
segments.each do |segment|
p = paths.dup
paths.clear
segment.each do |option|
p.each do |path|
paths << (path + [option])
end
end
end
paths.map { |p| File.join(*p) }
end
end
|