PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/vault.py |
""" Functions to interact with Hashicorp Vault. =========================================== :maintainer: SaltStack :maturity: new :platform: all :note: If you see the following error, you'll need to upgrade ``requests`` to at least 2.4.2 .. code-block:: text <timestamp> [salt.pillar][CRITICAL][14337] Pillar render error: Failed to load ext_pillar vault: {'error': "request() got an unexpected keyword argument 'json'"} Configuration ------------- In addition to the module configuration, it is required for the Salt master to be configured to allow peer runs in order to use the Vault integration. .. versionchanged:: 3007.0 The ``vault`` configuration structure has changed significantly to account for many new features. If found, the old structure will be automatically translated to the new one. **Please update your peer_run configuration** to take full advantage of the updated modules. The old endpoint (``vault.generate_token``) will continue to work, but result in unnecessary roundtrips once your minions have been updated. To allow minions to pull configuration and credentials from the Salt master, add this segment to the master configuration file: .. code-block:: yaml peer_run: .*: - vault.get_config # always - vault.generate_new_token # relevant when `token` == `issue:type` - vault.generate_secret_id # relevant when `approle` == `issue:type` Minimally required configuration: .. code-block:: yaml vault: auth: token: abcdefg-hijklmnop-qrstuvw server: url: https://vault.example.com:8200 A sensible example configuration, e.g. in ``/etc/salt/master.d/vault.conf``: .. code-block:: yaml vault: auth: method: approle role_id: e5a7b66e-5d08-da9c-7075-71984634b882 secret_id: 841771dc-11c9-bbc7-bcac-6a3945a69cd9 cache: backend: file issue: token: role_name: salt_minion params: explicit_max_ttl: 30 num_uses: 10 policies: assign: - salt_minion - salt_role_{pillar[roles]} server: url: https://vault.example.com:8200 The above configuration requires the following policies for the master: .. code-block:: vaultpolicy # Issue tokens path "auth/token/create" { capabilities = ["create", "read", "update"] } # Issue tokens with token roles path "auth/token/create/*" { capabilities = ["create", "read", "update"] } A sensible example configuration that issues AppRoles to minions from a separate authentication endpoint (notice differing mounts): .. code-block:: yaml vault: auth: method: approle mount: approle # <-- mount the salt master authenticates at role_id: e5a7b66e-5d08-da9c-7075-71984634b882 secret_id: 841771dc-11c9-bbc7-bcac-6a3945a69cd9 cache: backend: file issue: type: approle approle: mount: salt-minions # <-- mount the salt master manages metadata: entity: minion-id: '{minion}' role: '{pillar[role]}' server: url: https://vault.example.com:8200 ext_pillar: - vault: path=salt/minions/{minion} - vault: path=salt/roles/{pillar[role]} The above configuration requires the following policies for the master: .. code-block:: vaultpolicy # List existing AppRoles path "auth/salt-minions/role" { capabilities = ["list"] } # Manage AppRoles path "auth/salt-minions/role/*" { capabilities = ["read", "create", "update", "delete"] } # Lookup mount accessor path "sys/auth/salt-minions" { capabilities = ["read", "sudo"] } # Lookup entities by alias name (role-id) and alias mount accessor path "identity/lookup/entity" { capabilities = ["create", "update"] allowed_parameters = { "alias_name" = [] "alias_mount_accessor" = ["auth_approle_0a1b2c3d"] } } # Manage entities with name prefix salt_minion_ path "identity/entity/name/salt_minion_*" { capabilities = ["read", "create", "update", "delete"] } # Create entity aliases – you can restrict the mount_accessor # This might allow privilege escalation in case the salt master # is compromised and the attacker knows the entity ID of an # entity with relevant policies attached - although you might # have other problems at that point. path "identity/entity-alias" { capabilities = ["create", "update"] allowed_parameters = { "id" = [] "canonical_id" = [] "mount_accessor" = ["auth_approle_0a1b2c3d"] "name" = [] } } This enables you to write templated ACL policies like: .. code-block:: vaultpolicy path "salt/data/minions/{{identity.entity.metadata.minion-id}}" { capabilities = ["read"] } path "salt/data/roles/{{identity.entity.metadata.role}}" { capabilities = ["read"] } .. note:: AppRole policies and entity metadata are generally not updated automatically. After a change, you will need to synchronize them by running :py:func:`vault.sync_approles <salt.runners.vault.sync_approles>` or :py:func:`vault.sync_entities <salt.runners.vault.sync_entities>` respectively. All possible master configuration options with defaults: .. code-block:: yaml vault: auth: approle_mount: approle approle_name: salt-master method: token role_id: <required if auth:method == approle> secret_id: null token: <required if auth:method == token> token_lifecycle: minimum_ttl: 10 renew_increment: null cache: backend: session config: 3600 kv_metadata: connection secret: ttl issue: allow_minion_override_params: false type: token approle: mount: salt-minions params: bind_secret_id: true secret_id_num_uses: 1 secret_id_ttl: 60 token_explicit_max_ttl: 60 token_num_uses: 10 secret_id_bound_cidrs: null token_ttl: null token_max_ttl: null token_no_default_policy: false token_period: null token_bound_cidrs: null token: role_name: null params: explicit_max_ttl: null num_uses: 1 ttl: null period: null no_default_policy: false renewable: true wrap: 30s keys: [] metadata: entity: minion-id: '{minion}' secret: saltstack-jid: '{jid}' saltstack-minion: '{minion}' saltstack-user: '{user}' policies: assign: - saltstack/minions - saltstack/{minion} cache_time: 60 refresh_pillar: null server: url: <required, e. g. https://vault.example.com:8200> namespace: null verify: null ``auth`` ~~~~~~~~ Contains authentication information for the local machine. approle_mount .. versionadded:: 3007.0 The name of the AppRole authentication mount point. Defaults to ``approle``. approle_name .. versionadded:: 3007.0 The name of the AppRole. Defaults to ``salt-master``. .. note:: Only relevant when a locally configured role_id/secret_id uses response wrapping. method Currently only ``token`` and ``approle`` auth types are supported. Defaults to ``token``. AppRole is the preferred way to authenticate with Vault as it provides some advanced options to control the authentication process. Please see the `Vault documentation <https://www.vaultproject.io/docs/auth/approle.html>`_ for more information. role_id The role ID of the AppRole. Required if ``auth:method`` == ``approle``. .. versionchanged:: 3007.0 In addition to a plain string, this can also be specified as a dictionary that includes ``wrap_info``, i.e. the return payload of a wrapping request. secret_id The secret ID of the AppRole. Only required if the configured AppRole requires it. .. versionchanged:: 3007.0 In addition to a plain string, this can also be specified as a dictionary that includes ``wrap_info``, i.e. the return payload of a wrapping request. token Token to authenticate to Vault with. Required if ``auth:method`` == ``token``. The token must be able to create tokens with the policies that should be assigned to minions. You can still use the token auth via a OS environment variable via this config example: .. code-block:: yaml vault: auth: method: token token: sdb://osenv/VAULT_TOKEN server: url: https://vault.service.domain:8200 osenv: driver: env And then export the VAULT_TOKEN variable in your OS: .. code-block:: bash export VAULT_TOKEN=11111111-1111-1111-1111-1111111111111 .. versionchanged:: 3007.0 In addition to a plain string, this can also be specified as a dictionary that includes ``wrap_info``, i.e. the return payload of a wrapping request. token_lifecycle Token renewal settings. .. note:: This setting can be specified inside a minion's configuration as well and will override the master's default for the minion. Token lifecycle settings have significancy for any authentication method, not just ``token``. ``minimum_ttl`` specifies the time (in seconds or as a time string like ``24h``) an in-use token should be valid for. If the current validity period is less than this and the token is renewable, a renewal will be attempted. If it is not renewable or a renewal does not extend the ttl beyond the specified minimum, a new token will be generated. .. note:: Since leases like database credentials are tied to a token, setting this to a much higher value than the default can be necessary, depending on your specific use case and configuration. ``renew_increment`` specifies the amount of time the token's validity should be requested to be renewed for when renewing a token. When unset, will extend the token's validity by its default ttl. Set this to ``false`` to disable token renewals. .. note:: The Vault server is allowed to disregard this request. ``cache`` ~~~~~~~~~ Configures token/lease and metadata cache (for KV secrets) on all hosts as well as configuration cache on minions that receive issued credentials. backend .. versionchanged:: 3007.0 This used to be found in ``auth:token_backend``. The cache backend in use. Defaults to ``session``, which will store the Vault configuration in memory only for that specific Salt run. ``disk``/``file``/``localfs`` will force using the localfs driver, regardless of configured minion data cache. Setting this to anything else will use the default configured cache for minion data (:conf_master:`cache <cache>`), by default the local filesystem as well. clear_attempt_revocation .. versionadded:: 3007.0 When flushing still valid cached tokens and leases, attempt to have them revoked after a (short) delay. Defaults to ``60``. Set this to false to disable revocation (not recommended). clear_on_unauthorized .. versionadded:: 3007.0 When encountering an ``Unauthorized`` response with an otherwise valid token, flush the cache and request new credentials. Defaults to true. If your policies are relatively stable, disabling this will prevent a lot of unnecessary overhead, with the tradeoff that once they change, you might have to clear the cache manually or wait for the token to expire. config .. versionadded:: 3007.0 The time in seconds to cache queried configuration from the master. Defaults to ``3600`` (one hour). Set this to ``null`` to disable cache expiration. Changed ``server`` configuration on the master will still be recognized, but changes in ``auth`` and ``cache`` will need a manual update using ``vault.update_config`` or cache clearance using ``vault.clear_cache``. .. note:: Expiring the configuration will also clear cached authentication credentials and leases. expire_events .. versionadded:: 3007.0 Fire an event when the session cache containing leases is cleared (``vault/cache/<scope>/clear``) or cached leases have expired (``vault/lease/<cache_key>/expire``). A reactor can be employed to ensure fresh leases are issued. Defaults to false. kv_metadata .. versionadded:: 3007.0 The time in seconds to cache KV metadata used to determine if a path is using version 1/2 for. Defaults to ``connection``, which will clear the metadata cache once a new configuration is requested from the master. Setting this to ``null`` will keep the information indefinitely until the cache is cleared manually using ``vault.clear_cache`` with ``connection=false``. secret .. versionadded:: 3007.0 The time in seconds to cache tokens/secret IDs for. Defaults to ``ttl``, which caches the secret for as long as it is valid, unless a new configuration is requested from the master. ``issue`` ~~~~~~~~~ Configures authentication data issued by the master to minions. type .. versionadded:: 3007.0 The type of authentication to issue to minions. Can be ``token`` or ``approle``. Defaults to ``token``. To be able to issue AppRoles to minions, the master needs to be able to create new AppRoles on the configured auth mount (see policy example above). It is strongly encouraged to create a separate mount dedicated to minions. approle .. versionadded:: 3007.0 Configuration regarding issued AppRoles. ``mount`` specifies the name of the auth mount the master manages. Defaults to ``salt-minions``. This mount should be exclusively dedicated to the Salt master. ``params`` configures the AppRole the master creates for minions. See the `Vault AppRole API docs <https://www.vaultproject.io/api-docs/auth/approle#create-update-approle>`_ for details. If you update these params, you can update the minion AppRoles manually using the vault runner: ``salt-run vault.sync_approles``, but they will be updated automatically during a request by a minion as well. token .. versionadded:: 3007.0 Configuration regarding issued tokens. ``role_name`` specifies the role name for minion tokens created. Optional. .. versionchanged:: 3007.0 This used to be found in ``role_name``. If omitted, minion tokens will be created without any role, thus being able to inherit any master token policy (including token creation capabilities). Example configuration: https://www.nomadproject.io/docs/vault-integration/index.html#vault-token-role-configuration ``params`` configures the tokens the master issues to minions. .. versionchanged:: 3007.0 This used to be found in ``auth:ttl`` and ``auth:uses``. The possible parameters were synchronized with the Vault nomenclature: * ``ttl`` previously was mapped to ``explicit_max_ttl`` on Vault, not ``ttl``. For the same behavior as before, you will need to set ``explicit_max_ttl`` now. * ``uses`` is now called ``num_uses``. See the `Vault token API docs <https://developer.hashicorp.com/vault/api-docs/auth/token#create-token>`_ for details. To make full use of multi-use tokens, you should configure a cache that survives a single session (e.g. ``disk``). .. note:: If unset, the master issues single-use tokens to minions, which can be quite expensive. allow_minion_override_params .. versionchanged:: 3007.0 This used to be found in ``auth:allow_minion_override``. Whether to allow minions to request to override parameters for issuing credentials. See ``issue_params`` below. wrap .. versionadded:: 3007.0 The time a minion has to unwrap a wrapped secret issued by the master. Set this to false to disable wrapping, otherwise a time string like ``30s`` can be used. Defaults to ``30s``. ``keys`` ~~~~~~~~ List of keys to use to unseal vault server with the ``vault.unseal`` runner. ``metadata`` ~~~~~~~~~~~~ .. versionadded:: 3007.0 Configures metadata for the issued entities/secrets. Values have to be strings and can be templated with the following variables: - ``{jid}`` Salt job ID that issued the secret. - ``{minion}`` The minion ID the secret was issued for. - ``{user}`` The user the Salt daemon issuing the secret was running as. - ``{pillar[<var>]}`` A minion pillar value that does not depend on Vault. - ``{grains[<var>]}`` A minion grain value. .. note:: Values have to be strings, hence templated variables that resolve to lists will be concatenated to a lexicographically sorted comma-separated list (Python ``list.sort()``). entity Configures the metadata associated with the minion entity inside Vault. Entities are only created when issuing AppRoles to minions. secret Configures the metadata associated with issued tokens/secret IDs. They are logged in plaintext to the Vault audit log. ``policies`` ~~~~~~~~~~~~ .. versionchanged:: 3007.0 This used to specify the list of policies associated with a minion token only. The equivalent is found in ``assign``. assign List of policies that are assigned to issued minion authentication data, either token or AppRole. They can be static strings or string templates with - ``{minion}`` The minion ID. - ``{pillar[<var>]}`` A minion pillar value. - ``{grains[<var>]}`` A minion grain value. For pillar and grain values, lists are expanded, so ``salt_role_{pillar[roles]}`` with ``[a, b]`` results in ``salt_role_a`` and ``salt_role_b`` to be issued. Defaults to ``[saltstack/minions, saltstack/{minion}]``. .. versionadded:: 3006.0 Policies can be templated with pillar values as well: ``salt_role_{pillar[roles]}``. Make sure to only reference pillars that are not sourced from Vault since the latter ones might be unavailable during policy rendering. If you use the Vault integration in one of your pillar ``sls`` files, all values from that file will be absent during policy rendering, even the ones that do not depend on Vault. .. important:: See :ref:`Is Targeting using Grain Data Secure? <faq-grain-security>` for important security information. In short, everything except ``grains[id]`` is minion-controlled. .. note:: List members which do not have simple string representations, such as dictionaries or objects, do not work and will throw an exception. Strings and numbers are examples of types which work well. cache_time .. versionadded:: 3007.0 Number of seconds compiled templated policies are cached on the master. This is important when using pillar values in templates, since compiling the pillar is an expensive operation. .. note:: Only effective when issuing tokens to minions. Token policies need to be compiled every time a token is requested, while AppRole-associated policies are written to Vault configuration the first time authentication data is requested (they can be refreshed on demand by running ``salt-run vault.sync_approles``). They will also be refreshed in case other issuance parameters are changed (such as uses/ttl), either on the master or the minion (if allow_minion_override_params is True). refresh_pillar .. versionadded:: 3007.0 Whether to refresh the minion pillar when compiling templated policies that contain pillar variables. Only effective when issuing tokens to minions (see note on cache_time above). - ``null`` (default) only compiles the pillar when no cached pillar is found. - ``false`` never compiles the pillar. This means templated policies that contain pillar values are skipped if no cached pillar is found. - ``true`` always compiles the pillar. This can cause additional strain on the master since the compilation is costly. .. note:: Hardcoded to True when issuing AppRoles. Using cached pillar data only (refresh_pillar=False) might cause the policies to be out of sync. If there is no cached pillar data available for the minion, pillar templates will fail to render at all. If you use pillar values for templating policies and do not disable refreshing pillar data, make sure the relevant values are not sourced from Vault (ext_pillar, sdb) or from a pillar sls file that uses the vault execution/sdb module. Although this will often work when cached pillar data is available, if the master needs to compile the pillar data during policy rendering, all Vault modules will be broken to prevent an infinite loop. ``server`` ~~~~~~~~~~ .. versionchanged:: 3007.0 The values found in here were found in the ``vault`` root namespace previously. Configures Vault server details. url URL of your Vault installation. Required. verify Configures certificate verification behavior when issuing requests to the Vault server. If unset, requests will use the CA certificates bundled with ``certifi``. For details, please see `the requests documentation <https://requests.readthedocs.io/en/master/user/advanced/#ssl-cert-verification>`_. .. versionadded:: 2018.3.0 .. versionchanged:: 3007.0 Minions again respect the master configuration value, which was changed implicitly in v3001. If this value is set in the minion configuration as well, it will take precedence. In addition, this value can now be set to a PEM-encoded CA certificate to use as the sole trust anchor for certificate chain verification. namespace Optional Vault namespace. Used with Vault Enterprise. For details please see: https://www.vaultproject.io/docs/enterprise/namespaces .. versionadded:: 3004 Minion configuration (optional): ``config_location`` ~~~~~~~~~~~~~~~~~~~ Where to get the connection details for calling vault. By default, vault will try to determine if it needs to request the connection details from the master or from the local config. This optional option will force vault to use the connection details from the master or the local config. Can only be either ``master`` or ``local``. .. versionadded:: 3006.0 ``issue_params`` ~~~~~~~~~~~~~~~~ Request overrides for token/AppRole issuance. This needs to be allowed on the master by setting ``issue:allow_minion_override_params`` to true. See the master configuration ``issue:token:params`` or ``issue:approle:params`` for reference. .. versionchanged:: 3007.0 For token issuance, this used to be found in ``auth:ttl`` and ``auth:uses``. Mind that the parameter names have been synchronized with Vault, see notes above (TLDR: ``ttl`` => ``explicit_max_ttl``, ``uses`` => ``num_uses``. .. note:: ``auth:token_lifecycle`` and ``server:verify`` can be set on the minion as well. .. _vault-setup: """ import logging import salt.utils.vault as vault from salt.defaults import NOT_SET from salt.exceptions import CommandExecutionError, SaltException, SaltInvocationError log = logging.getLogger(__name__) __deprecated__ = ( 3009, "vault", "https://github.com/salt-extensions/saltext-vault", ) def read_secret(path, key=None, metadata=False, default=NOT_SET): """ Return the value of <key> at <path> in vault, or entire secret. .. versionchanged:: 3001 The ``default`` argument has been added. When the path or path/key combination is not found, an exception will be raised, unless a default is provided. CLI Example: .. code-block:: bash salt '*' vault.read_secret salt/kv/secret Required policy: .. code-block:: vaultpolicy path "<mount>/<secret>" { capabilities = ["read"] } # or KV v2 path "<mount>/data/<secret>" { capabilities = ["read"] } path The path to the secret, including mount. key The data field at <path> to read. If unspecified, returns the whole dataset. metadata .. versionadded:: 3001 If using KV v2 backend, display full results, including metadata. Defaults to False. default .. versionadded:: 3001 When the path or path/key combination is not found, an exception will be raised, unless a default is provided here. """ if default == NOT_SET: default = CommandExecutionError if key is not None: metadata = False log.debug("Reading Vault secret for %s at %s", __grains__.get("id"), path) try: data = vault.read_kv(path, __opts__, __context__, include_metadata=metadata) if key is not None: return data[key] return data except Exception as err: # pylint: disable=broad-except if default is CommandExecutionError: raise CommandExecutionError( f"Failed to read secret! {type(err).__name__}: {err}" ) from err return default def write_secret(path, **kwargs): """ Set secret dataset at <path>. The vault policy used must allow this. Fields are specified as arbitrary keyword arguments. CLI Example: .. code-block:: bash salt '*' vault.write_secret "secret/my/secret" user="foo" password="bar" Required policy: .. code-block:: vaultpolicy path "<mount>/<secret>" { capabilities = ["create", "update"] } # or KV v2 path "<mount>/data/<secret>" { capabilities = ["create", "update"] } path The path to the secret, including mount. """ log.debug("Writing vault secrets for %s at %s", __grains__.get("id"), path) data = {x: y for x, y in kwargs.items() if not x.startswith("__")} try: res = vault.write_kv(path, data, __opts__, __context__) if isinstance(res, dict): return res["data"] return res except Exception as err: # pylint: disable=broad-except log.error("Failed to write secret! %s: %s", type(err).__name__, err) return False def write_raw(path, raw): """ Set raw data at <path>. The vault policy used must allow this. CLI Example: .. code-block:: bash salt '*' vault.write_raw "secret/my/secret" '{"user":"foo","password": "bar"}' Required policy: see write_secret path The path to the secret, including mount. raw Secret data to write to <path>. Has to be a mapping. """ log.debug("Writing vault secrets for %s at %s", __grains__.get("id"), path) try: res = vault.write_kv(path, raw, __opts__, __context__) if isinstance(res, dict): return res["data"] return res except Exception as err: # pylint: disable=broad-except log.error("Failed to write secret! %s: %s", type(err).__name__, err) return False def patch_secret(path, **kwargs): """ Patch secret dataset at <path>. Fields are specified as arbitrary keyword arguments. .. note:: This works even for older Vault versions, KV v1 and with missing ``patch`` capability, but will use more than one request to simulate the functionality by issuing a read and update request. For proper, single-request patching, requires versions of KV v2 that support the ``patch`` capability and the ``patch`` capability to be available for the path. .. note:: This uses JSON Merge Patch format internally. Keys set to ``null`` (JSON/YAML)/``None`` (Python) will be deleted. CLI Example: .. code-block:: bash salt '*' vault.patch_secret "secret/my/secret" password="baz" Required policy: .. code-block:: vaultpolicy # Proper patching path "<mount>/data/<secret>" { capabilities = ["patch"] } # OR (!), for older KV v2 setups: path "<mount>/data/<secret>" { capabilities = ["read", "update"] } # OR (!), for KV v1 setups: path "<mount>/<secret>" { capabilities = ["read", "update"] } path The path to the secret, including mount. """ log.debug("Patching vault secrets for %s at %s", __grains__.get("id"), path) data = {x: y for x, y in kwargs.items() if not x.startswith("__")} try: res = vault.patch_kv(path, data, __opts__, __context__) if isinstance(res, dict): return res["data"] return res except Exception as err: # pylint: disable=broad-except log.error("Failed to patch secret! %s: %s", type(err).__name__, err) return False def delete_secret(path, *args): """ Delete secret at <path>. The vault policy used must allow this. If <path> is on KV v2, the secret will be soft-deleted. CLI Example: .. code-block:: bash salt '*' vault.delete_secret "secret/my/secret" salt '*' vault.delete_secret "secret/my/secret" 1 2 3 Required policy: .. code-block:: vaultpolicy path "<mount>/<secret>" { capabilities = ["delete"] } # or KV v2 path "<mount>/data/<secret>" { capabilities = ["delete"] } # KV v2 versions path "<mount>/delete/<secret>" { capabilities = ["update"] } path The path to the secret, including mount. .. versionadded:: 3007.0 For KV v2, you can specify versions to soft-delete as supplemental positional arguments. """ log.debug("Deleting vault secrets for %s in %s", __grains__.get("id"), path) try: return vault.delete_kv(path, __opts__, __context__, versions=list(args) or None) except Exception as err: # pylint: disable=broad-except log.error("Failed to delete secret! %s: %s", type(err).__name__, err) return False def destroy_secret(path, *args): """ .. versionadded:: 3001 Destroy specified secret versions <path>. The vault policy used must allow this. Only supported on Vault KV version 2. CLI Example: .. code-block:: bash salt '*' vault.destroy_secret "secret/my/secret" 1 2 Required policy: .. code-block:: vaultpolicy path "<mount>/destroy/<secret>" { capabilities = ["update"] } path The path to the secret, including mount. You can specify versions to destroy as supplemental positional arguments. At least one is required. """ if not args: raise SaltInvocationError("Need at least one version to destroy.") log.debug("Destroying vault secrets for %s in %s", __grains__.get("id"), path) try: return vault.destroy_kv(path, list(args), __opts__, __context__) except Exception as err: # pylint: disable=broad-except log.error("Failed to destroy secret! %s: %s", type(err).__name__, err) return False def list_secrets(path, default=NOT_SET, keys_only=False): """ List secret keys at <path>. The vault policy used must allow this. The path should end with a trailing slash. .. versionchanged:: 3001 The ``default`` argument has been added. When the path or path/key combination is not found, an exception will be raised, unless a default is provided. CLI Example: .. code-block:: bash salt '*' vault.list_secrets "secret/my/" Required policy: .. code-block:: vaultpolicy path "<mount>/<path>" { capabilities = ["list"] } # or KV v2 path "<mount>/metadata/<path>" { capabilities = ["list"] } path The path to the secret, including mount. default .. versionadded:: 3001 When the path is not found, an exception will be raised, unless a default is provided here. keys_only .. versionadded:: 3007.0 This function used to return a dictionary like ``{"keys": ["some/", "some/key"]}``. Setting this to True will only return the list of keys. For backwards-compatibility reasons, this defaults to False. """ if default == NOT_SET: default = CommandExecutionError log.debug("Listing vault secret keys for %s in %s", __grains__.get("id"), path) try: keys = vault.list_kv(path, __opts__, __context__) if keys_only: return keys # this is the way Salt behaved previously return {"keys": keys} except Exception as err: # pylint: disable=broad-except if default is CommandExecutionError: raise CommandExecutionError( f"Failed to list secrets! {type(err).__name__}: {err}" ) from err return default def clear_cache(connection=True, session=False): """ .. versionadded:: 3007.0 Delete Vault caches. Will ensure the current token and associated leases are revoked by default. The cache is organized in a hierarchy: ``/vault/connection/session/leases``. (*italics* mark data that is only cached when receiving configuration from a master) ``connection`` contains KV metadata (by default), *configuration* and *(AppRole) auth credentials*. ``session`` contains the currently active token. ``leases`` contains leases issued to the currently active token like database credentials. CLI Example: .. code-block:: bash salt '*' vault.clear_cache salt '*' vault.clear_cache session=True connection Only clear the cached data scoped to a connection. This includes configuration, auth credentials, the currently active auth token as well as leases and KV metadata (by default). Defaults to true. Set this to false to clear all Vault caches. session Only clear the cached data scoped to a session. This only includes leases and the currently active auth token, but not configuration or (AppRole) auth credentials. Defaults to false. Setting this to true will keep the connection cache, regardless of ``connection``. """ return vault.clear_cache( __opts__, __context__, connection=connection, session=session ) def clear_token_cache(): """ .. versionchanged:: 3001 .. versionchanged:: 3007.0 This is now an alias for ``vault.clear_cache`` with ``connection=True``. Delete minion Vault token cache. CLI Example: .. code-block:: bash salt '*' vault.clear_token_cache """ log.debug("Deleting vault connection cache.") return clear_cache(connection=True, session=False) def policy_fetch(policy): """ .. versionadded:: 3007.0 Fetch the rules associated with an ACL policy. Returns None if the policy does not exist. CLI Example: .. code-block:: bash salt '*' vault.policy_fetch salt_minion Required policy: .. code-block:: vaultpolicy path "sys/policy/<policy>" { capabilities = ["read"] } policy The name of the policy to fetch. """ # there is also "sys/policies/acl/{policy}" endpoint = f"sys/policy/{policy}" try: data = vault.query("GET", endpoint, __opts__, __context__) return data["rules"] except vault.VaultNotFoundError: return None except SaltException as err: raise CommandExecutionError(f"{type(err).__name__}: {err}") from err def policy_write(policy, rules): r""" .. versionadded:: 3007.0 Create or update an ACL policy. CLI Example: .. code-block:: bash salt '*' vault.policy_write salt_minion 'path "secret/foo" {...}' Required policy: .. code-block:: vaultpolicy path "sys/policy/<policy>" { capabilities = ["create", "update"] } policy The name of the policy to create/update. rules Rules to write, formatted as in-line HCL. """ endpoint = f"sys/policy/{policy}" payload = {"policy": rules} try: return vault.query("POST", endpoint, __opts__, __context__, payload=payload) except SaltException as err: raise CommandExecutionError(f"{type(err).__name__}: {err}") from err def policy_delete(policy): """ .. versionadded:: 3007.0 Delete an ACL policy. Returns False if the policy did not exist. CLI Example: .. code-block:: bash salt '*' vault.policy_delete salt_minion Required policy: .. code-block:: vaultpolicy path "sys/policy/<policy>" { capabilities = ["delete"] } policy The name of the policy to delete. """ endpoint = f"sys/policy/{policy}" try: return vault.query("DELETE", endpoint, __opts__, __context__) except vault.VaultNotFoundError: return False except SaltException as err: raise CommandExecutionError(f"{type(err).__name__}: {err}") from err def policies_list(): """ .. versionadded:: 3007.0 List all ACL policies. CLI Example: .. code-block:: bash salt '*' vault.policies_list Required policy: .. code-block:: vaultpolicy path "sys/policy" { capabilities = ["read"] } """ try: return vault.query("GET", "sys/policy", __opts__, __context__)["policies"] except SaltException as err: raise CommandExecutionError(f"{type(err).__name__}: {err}") from err def query(method, endpoint, payload=None): """ .. versionadded:: 3007.0 Issue arbitrary queries against the Vault API. CLI Example: .. code-block:: bash salt '*' vault.query GET auth/token/lookup-self Required policy: Depends on the query. You can ask the vault CLI to output the necessary policy: .. code-block:: bash vault read -output-policy auth/token/lookup-self method HTTP method to use. endpoint Vault API endpoint to issue the request against. Do not include ``/v1/``. payload Optional dictionary to use as JSON payload. """ try: return vault.query(method, endpoint, __opts__, __context__, payload=payload) except SaltException as err: raise CommandExecutionError(f"{type(err).__name__}: {err}") from err def update_config(keep_session=False): """ .. versionadded:: 3007.0 Attempt to update the cached configuration without clearing the currently active Vault session. CLI Example: .. code-block:: bash salt '*' vault.update_config keep_session Only update configuration that can be updated without creating a new login session. If this is false, still tries to keep the active session, but might clear it if the server configuration has changed significantly. Defaults to False. """ return vault.update_config(__opts__, __context__, keep_session=keep_session) def get_server_config(): """ .. versionadded:: 3007.0 Return the server connection configuration that's currently in use by Salt. Contains ``url``, ``verify`` and ``namespace``. CLI Example: .. code-block:: bash salt '*' vault.get_server_config """ try: client = vault.get_authd_client(__opts__, __context__) return client.get_config() except SaltException as err: raise CommandExecutionError(f"{type(err).__name__}: {err}") from err