HashiCorp Vault
Detailed information on the HashiCorp Vault secret store component
Create the Vault component
To setup HashiCorp Vault secret store create a component of type secretstores.hashicorp.vault
. See this guide on how to create and apply a secretstore configuration. See this guide on referencing secrets to retrieve and use the secret with Dapr components.
apiVersion: dapr.io/v1alpha1
kind: Component
metadata:
name: vault
spec:
type: secretstores.hashicorp.vault
version: v1
metadata:
- name: vaultAddr
value: [vault_address] # Optional. Default: "https://127.0.0.1:8200"
- name: caCert # Optional. This or caPath or caPem
value: "[ca_cert]"
- name: caPath # Optional. This or CaCert or caPem
value: "[path_to_ca_cert_file]"
- name: caPem # Optional. This or CaCert or CaPath
value : "[encoded_ca_cert_pem]"
- name: skipVerify # Optional. Default: false
value : "[skip_tls_verification]"
- name: tlsServerName # Optional.
value : "[tls_config_server_name]"
- name: vaultTokenMountPath # Required if vaultToken not provided. Path to token file.
value : "[path_to_file_containing_token]"
- name: vaultToken # Required if vaultTokenMountPath not provided. Token value.
value : "[path_to_file_containing_token]"
- name: vaultKVPrefix # Optional. Default: "dapr"
value : "[vault_prefix]"
- name: vaultKVUsePrefix # Optional. default: "true"
value: "[true/false]"
- name: enginePath # Optional. default: "secret"
value: "secret"
- name: vaultValueType # Optional. default: "map"
value: "map"
Warning
The above example uses secrets as plain strings. It is recommended to use a local secret store such as Kubernetes secret store or a local file to bootstrap secure key storage.
Spec metadata fields
Field | Required | Details | Example |
---|---|---|---|
vaultAddr | N | The address of the Vault server. Defaults to “https://127.0.0.1:8200“ | “https://127.0.0.1:8200“ |
caPem | N | The inlined contents of the CA certificate to use, in PEM format. If defined, takes precedence over caPath and caCert . | See below |
caPath | N | The path to a folder holding the CA certificate file to use, in PEM format. If the folder contains multiple files, only the first file found will be used. If defined, takes precedence over caCert . | “path/to/cacert/holding/folder” |
caCert | N | The path to the CA certificate to use, in PEM format. | “”path/to/cacert.pem” |
skipVerify | N | Skip TLS verification. Defaults to “false” | “true” , “false” |
tlsServerName | N | The name of the server requested during TLS handshake in order to support virtual hosting. This value is also used to verify the TLS certificate presented by Vault server. | “tls-server” |
vaultTokenMountPath | Y | Path to file containing token | “path/to/file” |
vaultToken | Y | Token for authentication within Vault. | “tokenValue” |
vaultKVPrefix | N | The prefix in vault. Defaults to “dapr” | “dapr” , “myprefix” |
vaultKVUsePrefix | N | If false, vaultKVPrefix is forced to be empty. If the value is not given or set to true, vaultKVPrefix is used when accessing the vault. Setting it to false is needed to be able to use the BulkGetSecret method of the store. | “true” , “false” |
enginePath | N | The engine path in vault. Defaults to “secret” | “kv” , “any” |
vaultValueType | N | Vault value type. map means to parse the value into map[string]string , text means to use the value as a string. ‘map’ sets the multipleKeyValuesPerSecret behavior. text makes Vault behave as a secret store with name/value semantics. Defaults to “map” | “map” , “text” |
Optional per-request metadata properties
The following optional query parameters can be provided to Hashicorp Vault secret store component:
Query Parameter | Description |
---|---|
metadata.version_id | Version for the given secret key. |
Setup Hashicorp Vault instance
Setup Hashicorp Vault using the Vault documentation: https://www.vaultproject.io/docs/install/index.html.
For Kubernetes, you can use the Helm Chart: https://github.com/hashicorp/vault-helm.
Multiple key-values per secret
HashiCorp Vault supports multiple key-values in a secret. While this behavior is ultimately dependent on the underlying secret engine configured by enginePath
, it may change the way you store and retrieve keys from Vault. For instance, multiple key-values in a secret is the behavior exposed in the secret
engine, the default engine configured by the enginePath
field.
When retrieving secrets, a JSON payload is returned with the key names as fields and their respective values.
Suppose you add a secret to your Vault setup as follows:
vault kv put secret/dapr/mysecret firstKey=aValue secondKey=anotherValue thirdKey=yetAnotherDistinctValue
In the example above, the secret is named mysecret
and it has 3 key-values under it. Observe that the secret is created under a dapr
prefix, as this is the default value for the vaultKVPrefix
flag. Retrieving it from Dapr would result in the following output:
$ curl http://localhost:3501/v1.0/secrets/my-hashicorp-vault/mysecret
{
"firstKey": "aValue",
"secondKey": "anotherValue",
"thirdKey": "yetAnotherDistinctValue"
}
Notice that the name of the secret (mysecret
) is not repeated in the result.
TLS Server verification
The fields skipVerify
, tlsServerName
, caCert
, caPath
, and caPem
control if and how Dapr verifies the vault server’s certificate while connecting using TLS/HTTPS.
Inline CA PEM caPem
The caPem
field value should be the contents of the PEM CA certificate you want to use. Given PEM certificates are made of multiple lines, defining that value might seem challenging at first. YAML allows for a few ways of defining a multiline values.
Below is one way to define a caPem
field.
apiVersion: dapr.io/v1alpha1
kind: Component
metadata:
name: vault
spec:
type: secretstores.hashicorp.vault
version: v1
metadata:
- name: vaultAddr
value: https://127.0.0.1:8200
- name: caPem
value: |-
-----BEGIN CERTIFICATE-----
<< the rest of your PEM file content's here, indented appropriately. >>
-----END CERTIFICATE-----