2018-02-15 21:34:47 +01:00
|
|
|
#!/usr/bin/env sh
|
|
|
|
|
|
|
|
# Here is a script to deploy cert to hashicorp vault
|
|
|
|
# (https://www.vaultproject.io/)
|
2019-10-05 15:06:58 +02:00
|
|
|
#
|
2018-02-15 21:34:47 +01:00
|
|
|
# it requires the vault binary to be available in PATH, and the following
|
|
|
|
# environment variables:
|
2019-10-05 15:06:58 +02:00
|
|
|
#
|
2018-02-15 21:34:47 +01:00
|
|
|
# VAULT_PREFIX - this contains the prefix path in vault
|
|
|
|
# VAULT_ADDR - vault requires this to find your vault server
|
2022-12-23 09:34:18 +01:00
|
|
|
# VAULT_SAVE_TOKEN - set to anything if you want to save the token
|
|
|
|
# VAULT_RENEW_TOKEN - set to anything if you want to renew the token to default TTL before deploying
|
2018-02-15 21:34:47 +01:00
|
|
|
#
|
|
|
|
# additionally, you need to ensure that VAULT_TOKEN is avialable or
|
|
|
|
# `vault auth` has applied the appropriate authorization for the vault binary
|
|
|
|
# to access the vault server
|
|
|
|
|
|
|
|
#returns 0 means success, otherwise error.
|
|
|
|
|
|
|
|
######## Public functions #####################
|
|
|
|
|
|
|
|
#domain keyfile certfile cafile fullchain
|
2018-02-20 15:11:45 +01:00
|
|
|
vault_cli_deploy() {
|
2018-02-15 21:34:47 +01:00
|
|
|
|
|
|
|
_cdomain="$1"
|
|
|
|
_ckey="$2"
|
|
|
|
_ccert="$3"
|
|
|
|
_cca="$4"
|
|
|
|
_cfullchain="$5"
|
|
|
|
|
|
|
|
_debug _cdomain "$_cdomain"
|
|
|
|
_debug _ckey "$_ckey"
|
|
|
|
_debug _ccert "$_ccert"
|
|
|
|
_debug _cca "$_cca"
|
|
|
|
_debug _cfullchain "$_cfullchain"
|
|
|
|
|
|
|
|
# validate required env vars
|
2022-12-23 09:34:18 +01:00
|
|
|
_getdeployconf VAULT_PREFIX
|
2018-02-16 15:01:26 +01:00
|
|
|
if [ -z "$VAULT_PREFIX" ]; then
|
2018-02-15 21:34:47 +01:00
|
|
|
_err "VAULT_PREFIX needs to be defined (contains prefix path in vault)"
|
|
|
|
return 1
|
|
|
|
fi
|
2022-12-23 09:34:18 +01:00
|
|
|
_savedeployconf VAULT_PREFIX "$VAULT_PREFIX"
|
2018-02-15 21:34:47 +01:00
|
|
|
|
2022-12-23 09:34:18 +01:00
|
|
|
_getdeployconf VAULT_ADDR
|
2018-02-16 15:01:26 +01:00
|
|
|
if [ -z "$VAULT_ADDR" ]; then
|
2018-02-15 21:34:47 +01:00
|
|
|
_err "VAULT_ADDR needs to be defined (contains vault connection address)"
|
|
|
|
return 1
|
|
|
|
fi
|
2022-12-23 09:34:18 +01:00
|
|
|
_savedeployconf VAULT_ADDR "$VAULT_ADDR"
|
|
|
|
|
|
|
|
_getdeployconf VAULT_SAVE_TOKEN
|
|
|
|
_savedeployconf VAULT_SAVE_TOKEN "$VAULT_SAVE_TOKEN"
|
|
|
|
|
|
|
|
_getdeployconf VAULT_RENEW_TOKEN
|
|
|
|
_savedeployconf VAULT_RENEW_TOKEN "$VAULT_RENEW_TOKEN"
|
|
|
|
|
|
|
|
_getdeployconf VAULT_TOKEN
|
|
|
|
if [ -z "$VAULT_TOKEN" ]; then
|
|
|
|
_err "VAULT_TOKEN needs to be defined"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
if [ -n "$VAULT_SAVE_TOKEN" ]; then
|
|
|
|
_savedeployconf VAULT_TOKEN "$VAULT_TOKEN"
|
|
|
|
fi
|
2018-02-15 21:34:47 +01:00
|
|
|
|
2022-12-23 12:32:06 +01:00
|
|
|
_migratedeployconf FABIO VAULT_FABIO_MODE
|
|
|
|
|
2020-07-16 06:13:15 +02:00
|
|
|
VAULT_CMD=$(command -v vault)
|
2018-02-16 15:19:47 +01:00
|
|
|
if [ ! $? ]; then
|
2018-02-15 21:34:47 +01:00
|
|
|
_err "cannot find vault binary!"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2022-12-23 09:34:18 +01:00
|
|
|
if [ -n "$VAULT_RENEW_TOKEN" ]; then
|
2022-12-27 19:47:49 +01:00
|
|
|
_info "Renew the Vault token to default TTL"
|
2022-12-23 09:34:18 +01:00
|
|
|
if ! $VAULT_CMD token renew; then
|
2022-12-27 19:47:49 +01:00
|
|
|
_err "Failed to renew the Vault token"
|
2022-12-23 09:34:18 +01:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2022-12-23 12:32:06 +01:00
|
|
|
if [ -n "$VAULT_FABIO_MODE" ]; then
|
2022-12-27 19:47:49 +01:00
|
|
|
_info "Writing certificate and key to ${VAULT_PREFIX}/${_cdomain} in Fabio mode"
|
2021-03-29 15:10:14 +02:00
|
|
|
$VAULT_CMD kv put "${VAULT_PREFIX}/${_cdomain}" cert=@"$_cfullchain" key=@"$_ckey" || return 1
|
2018-12-10 14:55:21 +01:00
|
|
|
else
|
2022-12-27 19:47:49 +01:00
|
|
|
_info "Writing certificate to ${VAULT_PREFIX}/${_cdomain}/cert.pem"
|
2021-03-29 15:10:14 +02:00
|
|
|
$VAULT_CMD kv put "${VAULT_PREFIX}/${_cdomain}/cert.pem" value=@"$_ccert" || return 1
|
2022-12-27 19:47:49 +01:00
|
|
|
_info "Writing key to ${VAULT_PREFIX}/${_cdomain}/cert.key"
|
2021-03-29 15:10:14 +02:00
|
|
|
$VAULT_CMD kv put "${VAULT_PREFIX}/${_cdomain}/cert.key" value=@"$_ckey" || return 1
|
2022-12-27 19:47:49 +01:00
|
|
|
_info "Writing CA certificate to ${VAULT_PREFIX}/${_cdomain}/ca.pem"
|
2022-12-23 09:34:18 +01:00
|
|
|
$VAULT_CMD kv put "${VAULT_PREFIX}/${_cdomain}/ca.pem" value=@"$_cca" || return 1
|
2022-12-27 19:47:49 +01:00
|
|
|
_info "Writing full-chain certificate to ${VAULT_PREFIX}/${_cdomain}/fullchain.pem"
|
2021-03-29 15:10:14 +02:00
|
|
|
$VAULT_CMD kv put "${VAULT_PREFIX}/${_cdomain}/fullchain.pem" value=@"$_cfullchain" || return 1
|
2022-12-23 09:34:18 +01:00
|
|
|
|
|
|
|
# To make it compatible with the wrong ca path `chain.pem` which was used in former versions
|
|
|
|
if $VAULT_CMD kv get "${VAULT_PREFIX}/${_cdomain}/chain.pem" >/dev/null; then
|
|
|
|
_err "The CA certificate has moved from chain.pem to ca.pem, if you don't depend on chain.pem anymore, you can delete it to avoid this warning"
|
2022-12-27 19:47:49 +01:00
|
|
|
_info "Updating CA certificate to ${VAULT_PREFIX}/${_cdomain}/chain.pem for backward compatibility"
|
2022-12-23 09:34:18 +01:00
|
|
|
$VAULT_CMD kv put "${VAULT_PREFIX}/${_cdomain}/chain.pem" value=@"$_cca" || return 1
|
|
|
|
fi
|
2018-12-10 14:55:21 +01:00
|
|
|
fi
|
2018-02-15 21:34:47 +01:00
|
|
|
|
|
|
|
}
|