set fallback := true export K8S_VAULT_NAMESPACE := env("K8S_VAULT_NAMESPACE", "vault") export VAULT_CHART_VERSION := env("VAULT_CHART_VERSION", "0.29.1") export VAULT_HOST := env("VAULT_HOST", "") export VAULT_ADDR := "https://" + VAULT_HOST export VAULT_DEBUG := env("VAULT_DEBUG", "false") SECRET_PATH := "secret" # Vault environment setup scripts [private] _vault_root_env_setup := ''' if [ -z "${VAULT_TOKEN:-}" ]; then echo "" >&2 echo "💡 To avoid entering Vault root token repeatedly:" >&2 echo " • Set environment variable: export VAULT_TOKEN=your_root_token" >&2 echo " • or write it in .env.local file: VAULT_TOKEN=your_root_token" >&2 echo " • Use 1Password reference: VAULT_TOKEN=op://vault/root/token" >&2 echo "" >&2 VAULT_TOKEN=$(gum input --prompt="Vault root token: " --password --width=100) elif [[ "${VAULT_TOKEN}" == op://* ]]; then if ! command -v op &>/dev/null; then echo "Error: 1Password CLI (op) is not installed." >&2 echo "" >&2 echo "To use 1Password secret references (op://...), please install the 1Password CLI:" >&2 echo " https://developer.1password.com/docs/cli/get-started/" >&2 exit 1 fi VAULT_TOKEN=$(op read "${VAULT_TOKEN}") fi export VAULT_TOKEN ''' [private] _vault_oidc_env_setup := ''' if [ -z "${VAULT_TOKEN:-}" ]; then if [ "${VAULT_DEBUG}" = "true" ]; then echo "" >&2 echo "💡 Authenticating with OIDC..." >&2 echo " • Browser will open for authentication" >&2 echo " • After login, token will be automatically set" >&2 echo "" >&2 fi vault login -method=oidc &>/dev/null VAULT_TOKEN=$(vault print token) fi export VAULT_TOKEN ''' [private] default: @just --list --unsorted --list-submodules # Add Helm repository add-helm-repo: helm repo add hashicorp https://helm.releases.hashicorp.com helm repo update # Remove Helm repository remove-helm-repo: helm repo remove hashicorp # Create Keycloak namespace create-namespace: @kubectl get namespace ${K8S_VAULT_NAMESPACE} &>/dev/null || \ kubectl create namespace ${K8S_VAULT_NAMESPACE} # Delete Keycloak namespace delete-namespace: @kubectl delete namespace ${K8S_VAULT_NAMESPACE} --ignore-not-found # Install Vault install: check-env #!/bin/bash set -euo pipefail just create-namespace just add-helm-repo gomplate -f vault-values.gomplate.yaml -o vault-values.yaml helm upgrade --cleanup-on-fail --install vault hashicorp/vault \ --version ${VAULT_CHART_VERSION} -n ${K8S_VAULT_NAMESPACE} --wait -f vault-values.yaml # Wait for the primary vault pod to complete init containers and be ready to accept commands kubectl wait pod --for=condition=PodReadyToStartContainers \ -n ${K8S_VAULT_NAMESPACE} vault-0 --timeout=5m init_output=$(kubectl exec -n ${K8S_VAULT_NAMESPACE} vault-0 -- \ vault operator init -key-shares=1 -key-threshold=1 -format=json || true) root_token="" if echo "${init_output}" | grep -q "Vault is already initialized"; then echo "Vault is already initialized" while [ -z "${root_token}" ]; do root_token=$(gum input --prompt="Vault root token: " --password --width=100) done else unseal_key=$(echo "${init_output}" | jq -r '.unseal_keys_b64[0]') root_token=$(echo "${init_output}" | jq -r '.root_token') kubectl exec -n ${K8S_VAULT_NAMESPACE} vault-0 -- \ vault operator unseal "${unseal_key}" echo "Vault initialized and unsealed successfully" echo "Root Token: ${root_token}" echo "Unseal Key: ${unseal_key}" echo "Please save these credentials securely!" fi # Wait for all vault instances to pass readiness checks and be ready to serve requests kubectl wait pod --for=condition=ready -n ${K8S_VAULT_NAMESPACE} \ -l app.kubernetes.io/name=vault --timeout=5m just setup-kubernetes-auth "${root_token}" just create-secrets-engine {{ SECRET_PATH }} "${root_token}" # Uninstall Vault uninstall delete-ns='false': #!/bin/bash set -euo pipefail helm uninstall vault -n ${K8S_VAULT_NAMESPACE} --ignore-not-found --wait just delete-namespace # Create admin token create-admin-token root_token='': check-env #!/bin/bash set -euo pipefail export VAULT_TOKEN="{{ root_token }}" while [ -z "${VAULT_TOKEN}" ]; do VAULT_TOKEN=$(gum input --prompt="Vault root token: " --password --width=100) done vault policy write admin - </dev/null 2>&1 || \ vault auth enable kubernetes vault write auth/kubernetes/config \ token_reviewer_jwt="${SA_JWT}" \ kubernetes_host="https://kubernetes.default.svc" \ kubernetes_ca_cert="${SA_CA}" # Setup OIDC authentication with Keycloak setup-oidc-auth: #!/bin/bash set -euo pipefail {{ _vault_root_env_setup }} echo "Creating Keycloak client for Vault..." just keycloak::delete-client "${KEYCLOAK_REALM}" "vault" || true oidc_client_secret=$(just utils::random-password) redirect_urls="https://${VAULT_HOST}/ui/vault/auth/oidc/oidc/callback,http://localhost:8250/oidc/callback,http://localhost:8200/ui/vault/auth/oidc/oidc/callback" just keycloak::create-client "${KEYCLOAK_REALM}" "vault" "${redirect_urls}" "${oidc_client_secret}" echo "Using client secret: ${oidc_client_secret}" just keycloak::add-audience-mapper "vault" just keycloak::add-groups-mapper "vault" echo "✓ Keycloak client 'vault' created" echo "Configuring Vault OIDC authentication..." # Enable OIDC auth method vault auth list -format=json | jq -e '.["oidc/"]' >/dev/null 2>&1 || \ vault auth enable oidc # Configure OIDC with Keycloak vault write auth/oidc/config \ oidc_discovery_url="https://${KEYCLOAK_HOST}/realms/${KEYCLOAK_REALM}" \ oidc_client_id="vault" \ oidc_client_secret="${oidc_client_secret}" \ default_role="default" # Create default policy for secret access vault policy write default - </dev/null # Check the environment [private] check-env: #!/bin/bash set -euo pipefail if [ -z "${VAULT_HOST}" ]; then while [ -z "${VAULT_HOST}" ]; do VAULT_HOST=$( gum input --prompt="Vault host: " --width=100 --placeholder="vault.example.com" ) done just env::set VAULT_HOST "${VAULT_HOST}" fi # Setup vault environment with root token (for initial configuration) setup-root-token: #!/bin/bash set -euo pipefail {{ _vault_root_env_setup }} # Setup vault environment with OIDC token (for regular usage) setup-token: #!/bin/bash set -euo pipefail {{ _vault_oidc_env_setup }}