金库秘密ID的多次重复使用的方法
来源:stackoverflow
时间:2024-02-07 12:36:24 132浏览 收藏
偷偷努力,悄无声息地变强,然后惊艳所有人!哈哈,小伙伴们又来学习啦~今天我将给大家介绍《金库秘密ID的多次重复使用的方法》,这篇文章主要会讲到等等知识点,不知道大家对其都有多少了解,下面我们就一起来看一吧!当然,非常希望大家能多多评论,给出合理的建议,我们一起学习,一起进步!
所以我有一个 poc vault,里面有 dockerfile
类似的东西(完整的仓库在这里):
from hashicorp/vault run apk add --no-cache bash jq copy reseller1-policy.hcl /vault/config/reseller1-policy.hcl copy terraform-policy.hcl /vault/config/terraform-policy.hcl copy init_vault.sh /init_vault.sh expose 8200 entrypoint [ "/init_vault.sh" ] healthcheck \ --start-period=5s \ --interval=1s \ --timeout=1s \ --retries=30 \ cmd [ "/bin/sh", "-c", "[ -f /tmp/healthy ]" ]
init_vault.sh
包含:
#!/bin/sh set -e export vault_addr='http://127.0.0.1:8200' export vault_format='json' # spawn a new process for the development vault server and wait for it to come online # ref: https://www.vaultproject.io/docs/concepts/dev-server vault server -dev -dev-listen-address="0.0.0.0:8200" & sleep 5s # authenticate container's local vault cli # ref: https://www.vaultproject.io/docs/commands/login vault login -no-print "${vault_dev_root_token_id}" # add policy # ref: https://www.vaultproject.io/docs/concepts/policies vault policy write terraform-policy /vault/config/terraform-policy.hcl vault policy write reseller1-policy /vault/config/reseller1-policy.hcl # enable approle auth method # ref: https://www.vaultproject.io/docs/auth/approle vault auth enable approle # configure approle # ref: https://www.vaultproject.io/api/auth/approle#parameters vault write auth/approle/role/dummy_role \ token_policies=reseller1-policy \ token_num_uses=9000 \ secret_id_ttl="32d" \ token_ttl="32d" \ token_max_ttl="32d" # overwrite our role id vault write auth/approle/role/dummy_role/role-id role_id="${approle_role_id}" # for terraform # ref: https://www.vaultproject.io/docs/commands/token/create vault token create \ -id="${terraform_token}" \ -policy=terraform-policy \ -ttl="32d" # keep container alive tail -f /dev/null & trap 'kill %1' term ; wait
使用 reseller1-policy.hcl
:
# this section grants access for the app path "secret/data/dummy_config_yaml/reseller1/*" { capabilities = ["read"] } path "secret/dummy_config_yaml/reseller1/*" { # v1 capabilities = ["read"] }
和terraform-policy.hcl
:
# grant 'update' permission on the 'auth/approle/role//secret-id' path for generating a secret id path "auth/approle/role/dummy_role/secret-id" { capabilities = ["update"] } path "secret/data/dummy_config_yaml/*" { capabilities = ["create","update","read","patch","delete"] } path "secret/dummy_config_yaml/*" { # v1 capabilities = ["create","update","read","patch","delete"] } path "secret/metadata/dummy_config_yaml/*" { capabilities = ["list"] }
这是从 docker-compose.yml
开始的:
version: '3.3' services: testvaultserver1: build: ./vault-server/ cap_add: - ipc_lock environment: vault_dev_root_token_id: root approle_role_id: dummy_app terraform_token: dummyterraformtoken ports: - "8200:8200"
然后在 shell 上运行一些脚本 copy_config2vault_secret2tmp.sh
:
terraform_token=`cat docker-compose.yml | grep terraform_token | cut -d':' -f2 | xargs echo -n` vault_address="127.0.0.1:8200" # retrieve secret for appsecret so dummy app can load the /tmp/secret curl \ --request post \ --header "x-vault-token: ${terraform_token}" \ --header "x-vault-wrap-ttl: 32d" \ "${vault_address}/v1/auth/approle/role/dummy_role/secret-id" > /tmp/debug cat /tmp/debug | jq -r '.wrap_info.token' > /tmp/secret # check appsecret exists cat /tmp/debug cat /tmp/secret vault_docker=`docker ps| grep vault | cut -d' ' -f 1` echo 'put secret' cat config.yaml | docker exec -i $vault_docker vault -v kv put -address=http://127.0.0.1:8200 -mount=secret dummy_config_yaml/reseller1/region99 raw=- echo 'check secret length' docker exec -i $vault_docker vault -v kv get -address=http://127.0.0.1:8200 -mount=secret dummy_config_yaml/reseller1/region99 | wc -l
然后创建一个程序来读取机密并从保管库检索 config.yaml
:
package main import ( "context" "fmt" "log" "time" vault "github.com/hashicorp/vault/api" "github.com/hashicorp/vault/api/auth/approle" ) const approleid = `dummy_app` func main() { conf, err := tryusevault(`http://127.0.0.1:8200`, `secret/data/dummy_config_yaml/reseller1/region99`) if err != nil { log.println(err) return } log.println(conf) } func tryusevault(address, configpath string) (string, error) { ctx, cancel := context.withtimeout(context.background(), 30*time.second) defer cancel() const secretfile = `/tmp/secret` config := vault.defaultconfig() // modify for more granular configuration config.address = address client, err := vault.newclient(config) if err != nil { return ``, fmt.errorf(`failed to create vault client: %w`, err) } approlesecretid := &approle.secretid{ fromfile: secretfile, } approleauth, err := approle.newapproleauth( approleid, approlesecretid, approle.withwrappingtoken(), // only required if the secretid is response-wrapped ) if err != nil { return ``, fmt.errorf(`failed to create approle auth: %w`, err) } authinfo, err := client.auth().login(ctx, approleauth) if err != nil { return ``, fmt.errorf(`failed to login to vault: %w`, err) } if authinfo == nil { return ``, fmt.errorf(`failed to login to vault: authinfo is nil`) } log.println("connecting to vault: success!") secret, err := client.logical().read(configpath) if err != nil { return ``, fmt.errorf(`failed to read secret from vault: %w`, err) } if secret == nil { return ``, fmt.errorf(`failed to read secret from vault: secret is nil`) } if len(secret.data) == 0 { return ``, fmt.errorf(`failed to read secret from vault: secret.data is empty`) } data := secret.data[`data`] if data == nil { return ``, fmt.errorf(`failed to read secret from vault: secret.data.data is nil`) } m, ok := data.(map[string]interface{}) if !ok { return ``, fmt.errorf(`failed to read secret from vault: secret.data.data is not a map[string]interface{}`) } raw, ok := m[`raw`] if !ok { return ``, fmt.errorf(`failed to read secret from vault: secret.data.data.raw is nil`) } rawstr, ok := raw.(string) if !ok { return ``, fmt.errorf(`failed to read secret from vault: secret.data.data.raw is not a string`) } // set viper from string return rawstr, nil }
它工作正常,但问题是,秘密只能使用一次
$ ./copy_config2vault_secret2tmp.sh {"request_id":"","lease_id":"","renewable":false,"lease_duration":0,"data":null,"wrap_info":{"token":"hvs.caesidse_hr3-cw1cllotqovahes55vi1mcdemmbwbsavds6gh4khgh2cy5qdzq0bzlxrtj6muzjufroegpswfrzv0e","accessor":"7jlabmbzgvhkpckad7qkpx5j","ttl":2764800,"creation_time":"2023-07-18t19:34:48.619332723z","creation_path":"auth/approle/role/dummy_role/secret-id","wrapped_accessor":"2493fc83-aaf6-7553-dd04-2ccedc39a4b1"},"warnings":null,"auth":null} hvs.caesidse_hr3-cw1cllotqovahes55vi1mcdemmbwbsavds6gh4khgh2cy5qdzq0bzlxrtj6muzjufroegpswfrzv0e put secret ================== secret path ================== secret/data/dummy_config_yaml/reseller1/region99 ======= metadata ======= key value --- ----- created_time 2023-07-18t19:34:48.827508755z custom_metadatadeletion_time n/a destroyed false version 9 check secret length 19
一旦工作正常即可检索它:
$ go run main.go 2023/07/19 02:35:52 connecting to vault: success! 2023/07/19 02:35:52 this: is: some: secret: a35)*&bn)(*&%tn_@#
但是当我第二次运行它时,它总是出错(除非我再次运行 get secret copy_config2vault_secret2tmp.sh
脚本):
$ go run main.go 2023/07/19 02:36:06 failed to login to vault: unable to log in to auth method: unable to unwrap response wrapping token: Error making API request. URL: PUT http://127.0.0.1:8200/v1/sys/wrapping/unwrap Code: 400. Errors: * wrapping token is not valid or does not exist
秘密id是否被设计为只能使用一次?或者如果不是,可能的原因是什么?
正确答案
包装令牌仅限一次性使用。这就是为什么只有在运行 Go 应用程序之前执行 copy_config2vault_secret2tmp.sh
时它才有效。
作为 Vault 文档的参考:
当新创建的令牌被包装时,Vault 会插入生成的令牌 将令牌放入一次性令牌的小隔间中,返回该令牌 一次性包装令牌。取回秘密需要解开包装 针对此包装令牌的操作。
这个特定部分解释了包装令牌的使用可能有助于理解细节: https://developer.hashicorp.com/vault/tutorials/secrets-management/cubbyhole-response-wrapping#step-2-unwrap-the-secret
好了,本文到此结束,带大家了解了《金库秘密ID的多次重复使用的方法》,希望本文对你有所帮助!关注golang学习网公众号,给大家分享更多Golang知识!
-
502 收藏
-
502 收藏
-
501 收藏
-
501 收藏
-
501 收藏
-
139 收藏
-
204 收藏
-
325 收藏
-
477 收藏
-
486 收藏
-
439 收藏
-
357 收藏
-
352 收藏
-
101 收藏
-
440 收藏
-
212 收藏
-
143 收藏
-
- 前端进阶之JavaScript设计模式
- 设计模式是开发人员在软件开发过程中面临一般问题时的解决方案,代表了最佳的实践。本课程的主打内容包括JS常见设计模式以及具体应用场景,打造一站式知识长龙服务,适合有JS基础的同学学习。
- 立即学习 542次学习
-
- GO语言核心编程课程
- 本课程采用真实案例,全面具体可落地,从理论到实践,一步一步将GO核心编程技术、编程思想、底层实现融会贯通,使学习者贴近时代脉搏,做IT互联网时代的弄潮儿。
- 立即学习 508次学习
-
- 简单聊聊mysql8与网络通信
- 如有问题加微信:Le-studyg;在课程中,我们将首先介绍MySQL8的新特性,包括性能优化、安全增强、新数据类型等,帮助学生快速熟悉MySQL8的最新功能。接着,我们将深入解析MySQL的网络通信机制,包括协议、连接管理、数据传输等,让
- 立即学习 497次学习
-
- JavaScript正则表达式基础与实战
- 在任何一门编程语言中,正则表达式,都是一项重要的知识,它提供了高效的字符串匹配与捕获机制,可以极大的简化程序设计。
- 立即学习 487次学习
-
- 从零制作响应式网站—Grid布局
- 本系列教程将展示从零制作一个假想的网络科技公司官网,分为导航,轮播,关于我们,成功案例,服务流程,团队介绍,数据部分,公司动态,底部信息等内容区块。网站整体采用CSSGrid布局,支持响应式,有流畅过渡和展现动画。
- 立即学习 484次学习