Securely manage passwords, certs, and other secrets in Chef
The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:
Gem that allows you to encrypt a Chef Data Bag Item using the public keys of a list of chef nodes. This allows only those chef nodes to decrypt the encrypted values.
For a more detailed explanation of how chef-vault works, please refer to this blog post Chef Vault – what is it and what can it do for you? by Nell Shamrell-Harrington.
Be sure you are running the latest version Chef. Versions earlier than 0.10.0 don't support plugins:
gem install chef
This plugin is distributed as a Ruby Gem. To install it, run:
gem install chef-vault
Depending on your system's configuration, you may need to run this command with root privileges.
There is a git pre-commit hook to help you keep your chefstyle up to date. If you wish to use it, simply:
mv hooks/pre-commit .git/hooks/ chmod +x .git/hooks/pre-commit
To run your changes locally:
bundle install bundle exec knife vault
There are some unit tests that can be run with:
bundle exec rspec spec/
There are cucumber tests. Run the whole suite with:
bundle exec rake features
If you get any failures, you can run the specific feature that failed with:
bundle exec cucumber features/.feature
If you want to test things out directly, after a failure you can go into the test directory and try out the commands that failed:
cd tmp/aruba bundle exec knife
-VVto the above to get a full stacktrace.
If you are seeing rubocop errors in travis for your pull request, run:
bundle exec chefstyle -a
This will fix up your rubocop errors automatically, and warn you about any it can't.
See KNIFE_EXAMPLES.md for examples of commands
To set 'client' as the default mode, add the following line to the config.rb file.
knife[:vault_mode] = 'client'
To set the default list of admins for creating and updating vaults, add the following line to the config.rb file.
knife[:vault_admins] = [ 'example-alice', 'example-bob', 'example-carol' ]
(These values can be overridden on the command line by using -A)
NOTE: chef-vault 1.0 knife commands are not supported! Please use chef-vault 2.0 commands.
knife vault create VAULT ITEM VALUES knife vault edit VAULT ITEM knife vault refresh VAULT ITEM knife vault update VAULT ITEM VALUES [--clean] knife vault remove VAULT ITEM VALUES knife vault delete VAULT ITEM knife vault rotate keys VAULT ITEM knife vault rotate all keys knife vault show VAULT [ITEM] [VALUES] knife vault download VAULT ITEM PATH knife vault isvault VAULT ITEM knife vault itemtype VAULT ITEM
Note: Creating a VAULT ITEM with an ITEM name ending in "_keys" causes the VAULT to treat it as an ordinary
data_baginstead of as a vault.
|-M MODE||--mode MODE||Chef mode to run in. Can be set in config.rb||solo||solo, client||all|
|-S SEARCH||--search SEARCH||Chef Server SOLR Search Of Nodes||create, remove , update|
|-C CLIENTS||--clients CLIENTS||Chef clients to be added as clients, can be comma list||create, remove , update|
|-A ADMINS||--admins ADMINS||Chef clients or users to be vault admins, can be comma list||create, remove, update|
|-J FILE||--json FILE||JSON file to be used for values, will be merged with VALUES if VALUES is passed||create, update|
|--file FILE||File that chef-vault should encrypt. It adds "file-content" & "file-name" keys to the vault item||create, update|
|-p DATA||--print DATA||Print extra vault data||search, clients, admins, all||show|
|-F FORMAT||--format FORMAT||Format for decrypted output||summary||summary, json, yaml, pp||show|
|--clean-unknown-clients||Remove unknown clients during key rotation||refresh, remove, rotate|
|--clean||Clean clients list before performing search||refresh, update|
|--keys-mode||method to use to manage keys||default||default, sparse|
To use this gem in a recipe to decrypt data you must first install the gem via a chef_gem resource. Once the gem is installed require the gem and then you can create a new instance of ChefVault.
NOTE: chef-vault 1.0 style decryption is supported, however it has been deprecated and chef-vault 2.0 decryption should be used instead
chef_gem 'chef-vault' do compile_time true if respond_to?(:compile_time) end
item = ChefVault::Item.load("passwords", "root") item["password"]
Note that in this case, the gem needs to be installed at compile time because the require statement is at the top-level of the recipe. If you move the require of chef-vault and the call to
::loadto library or provider code, you can install the gem in the converge phase instead.
Normally, the value of
Chef::Config[:node_name]is used to find the per-node encrypted secret in the keys data bag item, and the value of
Chef::Config[:client_key]is used to locate the private key to decrypt this secret.
These can be overridden by passing a hash with the keys
item = ChefVault::Item.load( 'passwords', 'root', node_name: 'service_foo', client_key_path: '/secure/place/service_foo.pem' ) item['password']
The above example assumes that you have transferred
/secure/place/service_foo.pemto your system via a secure channel.
This usage allows you to decrypt a vault using a key shared among several nodes, which can be helpful when working in cloud environments or other configurations where nodes are created dynamically.
The chef-vault cookbook contains a recipe to install the chef-vault gem and a helper method
chef_vault_helperwhich makes it easier to test cookbooks that use chef-vault using Test Kitchen.
ChefVault provides a helper method to determine if a data bag item is a vault, which can be helpful if you produce a recipe for community consumption and want to support both normal data bags and vaults:
if ChefVault::Item.vault?('passwords', 'root') item = ChefVault::Item.load('passwords', 'root') else item = Chef::DataBagItem.load('passwords', 'root') end
This functionality is also available from the command line as
knife vault isvault VAULT ITEM.
ChefVault provides a helper method to determine the type of a data bag item. It returns one of the symbols :normal, :encrypted or :vault
case ChefVault::Item.data_bag_item_type('passwords', 'root') when :normal ... when :encrypted ... when :vault ... end
This functionality is also available from the command line as
knife vault itemtype VAULT ITEM.
chef-vaultcan be used as a stand alone binary to decrypt values stored in Chef. It requires that Chef is installed on the system and that you have a valid config.rb. This is useful if you want to mix
chef-vaultinto non-Chef recipe code, for example some other script where you want to protect a password.
It does still require that the data bag has been encrypted for the user's or client's pem and pushed to the Chef server. It mixes Chef into the gem and uses it to go grab the data bag.
chef-vault --helpto see all all available options
chef-vault -v passwords -i root -a password -k /etc/chef/config.rb
As more nodes use a shared key, some operations like refresh or update can execute more efficiently using sparse mode (see issue #237).
To create a vault item using sparse mode, pass the value
knife vault create.
To use Chef Vault in Test Kitchen, ensure that the
chef-vaultrecipe is in your
run_list, and then add the following to your suite in
data_bags_path: 'path/to/data_bags' attributes: chef_vault: databags_fallback: true
You can then use the
chef_vault_itemhelper in the aforementioned chef-vault cookbook.
To stub vault items in ChefSpec, use the chef-vault-testfixtures gem.
For information on contributing to this project see https://github.com/chef/chef/blob/master/CONTRIBUTING.md
Author:: Kevin Moser - @moserke
Author:: Eli Klein - @eliklein
Author:: Joey Geiger - @jgeiger
Author:: Joshua Timberman - @jtimberman
Author:: James FitzGibbon - @jf647
Author:: Thom May - @thommay
Contributor:: Matt Brimstone - @brimstone
Contributor:: Thomas Gschwind - @thg65
Contributor:: Reto Hermann
Copyright:: Copyright (c) 2013-15 Nordstrom, Inc.
Copyright:: Copyright (c) 2016 Chef Software, Inc.
License:: Apache License, Version 2.0
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.