Merge branch 'main' into maa/lint-version
						commit
						264809fe0f
					
				@ -0,0 +1,5 @@
 | 
				
			|||||||
 | 
					email=${ARTIFACTORY_EMAIL}
 | 
				
			||||||
 | 
					%{ for REPO in REPOS ~}
 | 
				
			||||||
 | 
					${REPO.SCOPE}registry=${JFROG_URL}/artifactory/api/npm/${REPO.NAME}
 | 
				
			||||||
 | 
					//${JFROG_HOST}/artifactory/api/npm/${REPO.NAME}/:_authToken=${ARTIFACTORY_ACCESS_TOKEN}
 | 
				
			||||||
 | 
					%{ endfor ~}
 | 
				
			||||||
@ -1,19 +1,129 @@
 | 
				
			|||||||
import { serve } from "bun";
 | 
					import { describe, expect, it } from "bun:test";
 | 
				
			||||||
import { describe } from "bun:test";
 | 
					 | 
				
			||||||
import {
 | 
					import {
 | 
				
			||||||
  createJSONResponse,
 | 
					  findResourceInstance,
 | 
				
			||||||
  runTerraformInit,
 | 
					  runTerraformInit,
 | 
				
			||||||
 | 
					  runTerraformApply,
 | 
				
			||||||
  testRequiredVariables,
 | 
					  testRequiredVariables,
 | 
				
			||||||
} from "../test";
 | 
					} from "../test";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
describe("jfrog-oauth", async () => {
 | 
					describe("jfrog-oauth", async () => {
 | 
				
			||||||
 | 
					  type TestVariables = {
 | 
				
			||||||
 | 
					    agent_id: string;
 | 
				
			||||||
 | 
					    jfrog_url: string;
 | 
				
			||||||
 | 
					    package_managers: string;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    username_field?: string;
 | 
				
			||||||
 | 
					    jfrog_server_id?: string;
 | 
				
			||||||
 | 
					    external_auth_id?: string;
 | 
				
			||||||
 | 
					    configure_code_server?: boolean;
 | 
				
			||||||
 | 
					  };
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  await runTerraformInit(import.meta.dir);
 | 
					  await runTerraformInit(import.meta.dir);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  testRequiredVariables(import.meta.dir, {
 | 
					  const fakeFrogApi = "localhost:8081/artifactory/api";
 | 
				
			||||||
 | 
					  const fakeFrogUrl = "http://localhost:8081";
 | 
				
			||||||
 | 
					  const user = "default";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  it("can run apply with required variables", async () => {
 | 
				
			||||||
 | 
					    testRequiredVariables<TestVariables>(import.meta.dir, {
 | 
				
			||||||
      agent_id: "some-agent-id",
 | 
					      agent_id: "some-agent-id",
 | 
				
			||||||
    jfrog_url: "http://localhost:8081",
 | 
					      jfrog_url: fakeFrogUrl,
 | 
				
			||||||
      package_managers: "{}",
 | 
					      package_managers: "{}",
 | 
				
			||||||
    });
 | 
					    });
 | 
				
			||||||
  });
 | 
					  });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
//TODO add more tests
 | 
					  it("generates an npmrc with scoped repos", async () => {
 | 
				
			||||||
 | 
					    const state = await runTerraformApply<TestVariables>(import.meta.dir, {
 | 
				
			||||||
 | 
					      agent_id: "some-agent-id",
 | 
				
			||||||
 | 
					      jfrog_url: fakeFrogUrl,
 | 
				
			||||||
 | 
					      package_managers: JSON.stringify({
 | 
				
			||||||
 | 
					        npm: ["global", "@foo:foo", "@bar:bar"],
 | 
				
			||||||
 | 
					      }),
 | 
				
			||||||
 | 
					    });
 | 
				
			||||||
 | 
					    const coderScript = findResourceInstance(state, "coder_script");
 | 
				
			||||||
 | 
					    const npmrcStanza = `cat << EOF > ~/.npmrc
 | 
				
			||||||
 | 
					email=${user}@example.com
 | 
				
			||||||
 | 
					registry=http://${fakeFrogApi}/npm/global
 | 
				
			||||||
 | 
					//${fakeFrogApi}/npm/global/:_authToken=
 | 
				
			||||||
 | 
					@foo:registry=http://${fakeFrogApi}/npm/foo
 | 
				
			||||||
 | 
					//${fakeFrogApi}/npm/foo/:_authToken=
 | 
				
			||||||
 | 
					@bar:registry=http://${fakeFrogApi}/npm/bar
 | 
				
			||||||
 | 
					//${fakeFrogApi}/npm/bar/:_authToken=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					EOF`;
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(npmrcStanza);
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(
 | 
				
			||||||
 | 
					      'jf npmc --global --repo-resolve "global"',
 | 
				
			||||||
 | 
					    );
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(
 | 
				
			||||||
 | 
					      'if [ -z "YES" ]; then\n  not_configured npm',
 | 
				
			||||||
 | 
					    );
 | 
				
			||||||
 | 
					  });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  it("generates a pip config with extra-indexes", async () => {
 | 
				
			||||||
 | 
					    const state = await runTerraformApply<TestVariables>(import.meta.dir, {
 | 
				
			||||||
 | 
					      agent_id: "some-agent-id",
 | 
				
			||||||
 | 
					      jfrog_url: fakeFrogUrl,
 | 
				
			||||||
 | 
					      package_managers: JSON.stringify({
 | 
				
			||||||
 | 
					        pypi: ["global", "foo", "bar"],
 | 
				
			||||||
 | 
					      }),
 | 
				
			||||||
 | 
					    });
 | 
				
			||||||
 | 
					    const coderScript = findResourceInstance(state, "coder_script");
 | 
				
			||||||
 | 
					    const pipStanza = `cat << EOF > ~/.pip/pip.conf
 | 
				
			||||||
 | 
					[global]
 | 
				
			||||||
 | 
					index-url = https://${user}:@${fakeFrogApi}/pypi/global/simple
 | 
				
			||||||
 | 
					extra-index-url =
 | 
				
			||||||
 | 
					    https://${user}:@${fakeFrogApi}/pypi/foo/simple
 | 
				
			||||||
 | 
					    https://${user}:@${fakeFrogApi}/pypi/bar/simple
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					EOF`;
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(pipStanza);
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(
 | 
				
			||||||
 | 
					      'jf pipc --global --repo-resolve "global"',
 | 
				
			||||||
 | 
					    );
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(
 | 
				
			||||||
 | 
					      'if [ -z "YES" ]; then\n  not_configured pypi',
 | 
				
			||||||
 | 
					    );
 | 
				
			||||||
 | 
					  });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  it("registers multiple docker repos", async () => {
 | 
				
			||||||
 | 
					    const state = await runTerraformApply<TestVariables>(import.meta.dir, {
 | 
				
			||||||
 | 
					      agent_id: "some-agent-id",
 | 
				
			||||||
 | 
					      jfrog_url: fakeFrogUrl,
 | 
				
			||||||
 | 
					      package_managers: JSON.stringify({
 | 
				
			||||||
 | 
					        docker: ["foo.jfrog.io", "bar.jfrog.io", "baz.jfrog.io"],
 | 
				
			||||||
 | 
					      }),
 | 
				
			||||||
 | 
					    });
 | 
				
			||||||
 | 
					    const coderScript = findResourceInstance(state, "coder_script");
 | 
				
			||||||
 | 
					    const dockerStanza = ["foo", "bar", "baz"]
 | 
				
			||||||
 | 
					      .map((r) => `register_docker "${r}.jfrog.io"`)
 | 
				
			||||||
 | 
					      .join("\n");
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(dockerStanza);
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(
 | 
				
			||||||
 | 
					      'if [ -z "YES" ]; then\n  not_configured docker',
 | 
				
			||||||
 | 
					    );
 | 
				
			||||||
 | 
					  });
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  it("sets goproxy with multiple repos", async () => {
 | 
				
			||||||
 | 
					    const state = await runTerraformApply<TestVariables>(import.meta.dir, {
 | 
				
			||||||
 | 
					      agent_id: "some-agent-id",
 | 
				
			||||||
 | 
					      jfrog_url: fakeFrogUrl,
 | 
				
			||||||
 | 
					      package_managers: JSON.stringify({
 | 
				
			||||||
 | 
					        go: ["foo", "bar", "baz"],
 | 
				
			||||||
 | 
					      }),
 | 
				
			||||||
 | 
					    });
 | 
				
			||||||
 | 
					    const proxyEnv = findResourceInstance(state, "coder_env", "goproxy");
 | 
				
			||||||
 | 
					    const proxies = ["foo", "bar", "baz"]
 | 
				
			||||||
 | 
					      .map((r) => `https://${user}:@${fakeFrogApi}/go/${r}`)
 | 
				
			||||||
 | 
					      .join(",");
 | 
				
			||||||
 | 
					    expect(proxyEnv["value"]).toEqual(proxies);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    const coderScript = findResourceInstance(state, "coder_script");
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(
 | 
				
			||||||
 | 
					      'jf goc --global --repo-resolve "foo"',
 | 
				
			||||||
 | 
					    );
 | 
				
			||||||
 | 
					    expect(coderScript.script).toContain(
 | 
				
			||||||
 | 
					      'if [ -z "YES" ]; then\n  not_configured go',
 | 
				
			||||||
 | 
					    );
 | 
				
			||||||
 | 
					  });
 | 
				
			||||||
 | 
					});
 | 
				
			||||||
 | 
				
			|||||||
@ -0,0 +1,6 @@
 | 
				
			|||||||
 | 
					[global]
 | 
				
			||||||
 | 
					index-url = https://${ARTIFACTORY_USERNAME}:${ARTIFACTORY_ACCESS_TOKEN}@${JFROG_HOST}/artifactory/api/pypi/${try(element(REPOS, 0), "")}/simple
 | 
				
			||||||
 | 
					extra-index-url =
 | 
				
			||||||
 | 
					%{ for REPO in try(slice(REPOS, 1, length(REPOS)), []) ~}
 | 
				
			||||||
 | 
					    https://${ARTIFACTORY_USERNAME}:${ARTIFACTORY_ACCESS_TOKEN}@${JFROG_HOST}/artifactory/api/pypi/${REPO}/simple
 | 
				
			||||||
 | 
					%{ endfor ~}
 | 
				
			||||||
@ -0,0 +1,5 @@
 | 
				
			|||||||
 | 
					email=${ARTIFACTORY_EMAIL}
 | 
				
			||||||
 | 
					%{ for REPO in REPOS ~}
 | 
				
			||||||
 | 
					${REPO.SCOPE}registry=${JFROG_URL}/artifactory/api/npm/${REPO.NAME}
 | 
				
			||||||
 | 
					//${JFROG_HOST}/artifactory/api/npm/${REPO.NAME}/:_authToken=${ARTIFACTORY_ACCESS_TOKEN}
 | 
				
			||||||
 | 
					%{ endfor ~}
 | 
				
			||||||
@ -0,0 +1,6 @@
 | 
				
			|||||||
 | 
					[global]
 | 
				
			||||||
 | 
					index-url = https://${ARTIFACTORY_USERNAME}:${ARTIFACTORY_ACCESS_TOKEN}@${JFROG_HOST}/artifactory/api/pypi/${try(element(REPOS, 0), "")}/simple
 | 
				
			||||||
 | 
					extra-index-url =
 | 
				
			||||||
 | 
					%{ for REPO in try(slice(REPOS, 1, length(REPOS)), []) ~}
 | 
				
			||||||
 | 
					    https://${ARTIFACTORY_USERNAME}:${ARTIFACTORY_ACCESS_TOKEN}@${JFROG_HOST}/artifactory/api/pypi/${REPO}/simple
 | 
				
			||||||
 | 
					%{ endfor ~}
 | 
				
			||||||
@ -0,0 +1,77 @@
 | 
				
			|||||||
 | 
					---
 | 
				
			||||||
 | 
					display_name: Hashicorp Vault Integration (JWT)
 | 
				
			||||||
 | 
					description: Authenticates with Vault using a JWT from Coder's OIDC provider
 | 
				
			||||||
 | 
					icon: ../.icons/vault.svg
 | 
				
			||||||
 | 
					maintainer_github: coder
 | 
				
			||||||
 | 
					partner_github: hashicorp
 | 
				
			||||||
 | 
					verified: true
 | 
				
			||||||
 | 
					tags: [helper, integration, vault, jwt, oidc]
 | 
				
			||||||
 | 
					---
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Hashicorp Vault Integration (JWT)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This module lets you authenticate with [Hashicorp Vault](https://www.vaultproject.io/) in your Coder workspaces by reusing the [OIDC](https://coder.com/docs/admin/auth#openid-connect) access token from Coder's OIDC authentication method. This requires configuring the Vault [JWT/OIDC](https://developer.hashicorp.com/vault/docs/auth/jwt#configuration) auth method.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```tf
 | 
				
			||||||
 | 
					module "vault" {
 | 
				
			||||||
 | 
					  source         = "registry.coder.com/modules/vault-jwt/coder"
 | 
				
			||||||
 | 
					  version        = "1.0.19"
 | 
				
			||||||
 | 
					  agent_id       = coder_agent.example.id
 | 
				
			||||||
 | 
					  vault_addr     = "https://vault.example.com"
 | 
				
			||||||
 | 
					  vault_jwt_role = "coder" # The Vault role to use for authentication
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Then you can use the Vault CLI in your workspaces to fetch secrets from Vault:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```shell
 | 
				
			||||||
 | 
					vault kv get -namespace=coder -mount=secrets coder
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					or using the Vault API:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```shell
 | 
				
			||||||
 | 
					curl -H "X-Vault-Token: ${VAULT_TOKEN}" -X GET "${VAULT_ADDR}/v1/coder/secrets/data/coder"
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Examples
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					### Configure Vault integration with a non standard auth path (default is "jwt")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```tf
 | 
				
			||||||
 | 
					module "vault" {
 | 
				
			||||||
 | 
					  source              = "registry.coder.com/modules/vault-jwt/coder"
 | 
				
			||||||
 | 
					  version             = "1.0.19"
 | 
				
			||||||
 | 
					  agent_id            = coder_agent.example.id
 | 
				
			||||||
 | 
					  vault_addr          = "https://vault.example.com"
 | 
				
			||||||
 | 
					  vault_jwt_auth_path = "oidc"
 | 
				
			||||||
 | 
					  vault_jwt_role      = "coder" # The Vault role to use for authentication
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					### Map workspace owner's group to a Vault role
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```tf
 | 
				
			||||||
 | 
					data "coder_workspace_owner" "me" {}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					module "vault" {
 | 
				
			||||||
 | 
					  source         = "registry.coder.com/modules/vault-jwt/coder"
 | 
				
			||||||
 | 
					  version        = "1.0.19"
 | 
				
			||||||
 | 
					  agent_id       = coder_agent.example.id
 | 
				
			||||||
 | 
					  vault_addr     = "https://vault.example.com"
 | 
				
			||||||
 | 
					  vault_jwt_role = data.coder_workspace_owner.me.groups[0]
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					### Install a specific version of the Vault CLI
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```tf
 | 
				
			||||||
 | 
					module "vault" {
 | 
				
			||||||
 | 
					  source            = "registry.coder.com/modules/vault-jwt/coder"
 | 
				
			||||||
 | 
					  version           = "1.0.19"
 | 
				
			||||||
 | 
					  agent_id          = coder_agent.example.id
 | 
				
			||||||
 | 
					  vault_addr        = "https://vault.example.com"
 | 
				
			||||||
 | 
					  vault_jwt_role    = "coder" # The Vault role to use for authentication
 | 
				
			||||||
 | 
					  vault_cli_version = "1.17.5"
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
@ -0,0 +1,12 @@
 | 
				
			|||||||
 | 
					import { describe } from "bun:test";
 | 
				
			||||||
 | 
					import { runTerraformInit, testRequiredVariables } from "../test";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					describe("vault-jwt", async () => {
 | 
				
			||||||
 | 
					  await runTerraformInit(import.meta.dir);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  testRequiredVariables(import.meta.dir, {
 | 
				
			||||||
 | 
					    agent_id: "foo",
 | 
				
			||||||
 | 
					    vault_addr: "foo",
 | 
				
			||||||
 | 
					    vault_jwt_role: "foo",
 | 
				
			||||||
 | 
					  });
 | 
				
			||||||
 | 
					});
 | 
				
			||||||
@ -0,0 +1,64 @@
 | 
				
			|||||||
 | 
					terraform {
 | 
				
			||||||
 | 
					  required_version = ">= 1.0"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  required_providers {
 | 
				
			||||||
 | 
					    coder = {
 | 
				
			||||||
 | 
					      source  = "coder/coder"
 | 
				
			||||||
 | 
					      version = ">= 0.12.4"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Add required variables for your modules and remove any unneeded variables
 | 
				
			||||||
 | 
					variable "agent_id" {
 | 
				
			||||||
 | 
					  type        = string
 | 
				
			||||||
 | 
					  description = "The ID of a Coder agent."
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					variable "vault_addr" {
 | 
				
			||||||
 | 
					  type        = string
 | 
				
			||||||
 | 
					  description = "The address of the Vault server."
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					variable "vault_jwt_auth_path" {
 | 
				
			||||||
 | 
					  type        = string
 | 
				
			||||||
 | 
					  description = "The path to the Vault JWT auth method."
 | 
				
			||||||
 | 
					  default     = "jwt"
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					variable "vault_jwt_role" {
 | 
				
			||||||
 | 
					  type        = string
 | 
				
			||||||
 | 
					  description = "The name of the Vault role to use for authentication."
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					variable "vault_cli_version" {
 | 
				
			||||||
 | 
					  type        = string
 | 
				
			||||||
 | 
					  description = "The version of Vault to install."
 | 
				
			||||||
 | 
					  default     = "latest"
 | 
				
			||||||
 | 
					  validation {
 | 
				
			||||||
 | 
					    condition     = can(regex("^(latest|[0-9]+\\.[0-9]+\\.[0-9]+)$", var.vault_cli_version))
 | 
				
			||||||
 | 
					    error_message = "Vault version must be in the format 0.0.0 or latest"
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					resource "coder_script" "vault" {
 | 
				
			||||||
 | 
					  agent_id     = var.agent_id
 | 
				
			||||||
 | 
					  display_name = "Vault (GitHub)"
 | 
				
			||||||
 | 
					  icon         = "/icon/vault.svg"
 | 
				
			||||||
 | 
					  script = templatefile("${path.module}/run.sh", {
 | 
				
			||||||
 | 
					    CODER_OIDC_ACCESS_TOKEN : data.coder_workspace_owner.me.oidc_access_token,
 | 
				
			||||||
 | 
					    VAULT_JWT_AUTH_PATH : var.vault_jwt_auth_path,
 | 
				
			||||||
 | 
					    VAULT_JWT_ROLE : var.vault_jwt_role,
 | 
				
			||||||
 | 
					    VAULT_CLI_VERSION : var.vault_cli_version,
 | 
				
			||||||
 | 
					  })
 | 
				
			||||||
 | 
					  run_on_start       = true
 | 
				
			||||||
 | 
					  start_blocks_login = true
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					resource "coder_env" "vault_addr" {
 | 
				
			||||||
 | 
					  agent_id = var.agent_id
 | 
				
			||||||
 | 
					  name     = "VAULT_ADDR"
 | 
				
			||||||
 | 
					  value    = var.vault_addr
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					data "coder_workspace_owner" "me" {}
 | 
				
			||||||
@ -0,0 +1,112 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Convert all templated variables to shell variables
 | 
				
			||||||
 | 
					VAULT_CLI_VERSION=${VAULT_CLI_VERSION}
 | 
				
			||||||
 | 
					VAULT_JWT_AUTH_PATH=${VAULT_JWT_AUTH_PATH}
 | 
				
			||||||
 | 
					VAULT_JWT_ROLE=${VAULT_JWT_ROLE}
 | 
				
			||||||
 | 
					CODER_OIDC_ACCESS_TOKEN=${CODER_OIDC_ACCESS_TOKEN}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					fetch() {
 | 
				
			||||||
 | 
					  dest="$1"
 | 
				
			||||||
 | 
					  url="$2"
 | 
				
			||||||
 | 
					  if command -v curl > /dev/null 2>&1; then
 | 
				
			||||||
 | 
					    curl -sSL --fail "$${url}" -o "$${dest}"
 | 
				
			||||||
 | 
					  elif command -v wget > /dev/null 2>&1; then
 | 
				
			||||||
 | 
					    wget -O "$${dest}" "$${url}"
 | 
				
			||||||
 | 
					  elif command -v busybox > /dev/null 2>&1; then
 | 
				
			||||||
 | 
					    busybox wget -O "$${dest}" "$${url}"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    printf "curl, wget, or busybox is not installed. Please install curl or wget in your image.\n"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					unzip_safe() {
 | 
				
			||||||
 | 
					  if command -v unzip > /dev/null 2>&1; then
 | 
				
			||||||
 | 
					    command unzip "$@"
 | 
				
			||||||
 | 
					  elif command -v busybox > /dev/null 2>&1; then
 | 
				
			||||||
 | 
					    busybox unzip "$@"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    printf "unzip or busybox is not installed. Please install unzip in your image.\n"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					install() {
 | 
				
			||||||
 | 
					  # Get the architecture of the system
 | 
				
			||||||
 | 
					  ARCH=$(uname -m)
 | 
				
			||||||
 | 
					  if [ "$${ARCH}" = "x86_64" ]; then
 | 
				
			||||||
 | 
					    ARCH="amd64"
 | 
				
			||||||
 | 
					  elif [ "$${ARCH}" = "aarch64" ]; then
 | 
				
			||||||
 | 
					    ARCH="arm64"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    printf "Unsupported architecture: $${ARCH}\n"
 | 
				
			||||||
 | 
					    return 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  # Fetch the latest version of Vault if VAULT_CLI_VERSION is 'latest'
 | 
				
			||||||
 | 
					  if [ "$${VAULT_CLI_VERSION}" = "latest" ]; then
 | 
				
			||||||
 | 
					    LATEST_VERSION=$(curl -s https://releases.hashicorp.com/vault/ | grep -v 'rc' | grep -oE 'vault/[0-9]+\.[0-9]+\.[0-9]+' | sed 's/vault\///' | sort -V | tail -n 1)
 | 
				
			||||||
 | 
					    printf "Latest version of Vault is %s.\n\n" "$${LATEST_VERSION}"
 | 
				
			||||||
 | 
					    if [ -z "$${LATEST_VERSION}" ]; then
 | 
				
			||||||
 | 
					      printf "Failed to determine the latest Vault version.\n"
 | 
				
			||||||
 | 
					      return 1
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    VAULT_CLI_VERSION=$${VAULT_CLI_VERSION}
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Check if the vault CLI is installed and has the correct version
 | 
				
			||||||
 | 
					  installation_needed=1
 | 
				
			||||||
 | 
					  if command -v vault > /dev/null 2>&1; then
 | 
				
			||||||
 | 
					    CURRENT_VERSION=$(vault version | grep -oE '[0-9]+\.[0-9]+\.[0-9]+')
 | 
				
			||||||
 | 
					    if [ "$${CURRENT_VERSION}" = "$${VAULT_CLI_VERSION}" ]; then
 | 
				
			||||||
 | 
					      printf "Vault version %s is already installed and up-to-date.\n\n" "$${CURRENT_VERSION}"
 | 
				
			||||||
 | 
					      installation_needed=0
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  if [ $${installation_needed} -eq 1 ]; then
 | 
				
			||||||
 | 
					    # Download and install Vault
 | 
				
			||||||
 | 
					    if [ -z "$${CURRENT_VERSION}" ]; then
 | 
				
			||||||
 | 
					      printf "Installing Vault CLI ...\n\n"
 | 
				
			||||||
 | 
					    else
 | 
				
			||||||
 | 
					      printf "Upgrading Vault CLI from version %s to %s ...\n\n" "$${CURRENT_VERSION}" "${VAULT_CLI_VERSION}"
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    fetch vault.zip "https://releases.hashicorp.com/vault/$${VAULT_CLI_VERSION}/vault_$${VAULT_CLI_VERSION}_linux_$${ARCH}.zip"
 | 
				
			||||||
 | 
					    if [ $? -ne 0 ]; then
 | 
				
			||||||
 | 
					      printf "Failed to download Vault.\n"
 | 
				
			||||||
 | 
					      return 1
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    if ! unzip_safe vault.zip; then
 | 
				
			||||||
 | 
					      printf "Failed to unzip Vault.\n"
 | 
				
			||||||
 | 
					      return 1
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    rm vault.zip
 | 
				
			||||||
 | 
					    if sudo mv vault /usr/local/bin/vault 2> /dev/null; then
 | 
				
			||||||
 | 
					      printf "Vault installed successfully!\n\n"
 | 
				
			||||||
 | 
					    else
 | 
				
			||||||
 | 
					      mkdir -p ~/.local/bin
 | 
				
			||||||
 | 
					      if ! mv vault ~/.local/bin/vault; then
 | 
				
			||||||
 | 
					        printf "Failed to move Vault to local bin.\n"
 | 
				
			||||||
 | 
					        return 1
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					      printf "Please add ~/.local/bin to your PATH to use vault CLI.\n"
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  return 0
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					TMP=$(mktemp -d)
 | 
				
			||||||
 | 
					if ! (
 | 
				
			||||||
 | 
					  cd "$TMP"
 | 
				
			||||||
 | 
					  install
 | 
				
			||||||
 | 
					); then
 | 
				
			||||||
 | 
					  echo "Failed to install Vault CLI."
 | 
				
			||||||
 | 
					  exit 1
 | 
				
			||||||
 | 
					fi
 | 
				
			||||||
 | 
					rm -rf "$TMP"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Authenticate with Vault
 | 
				
			||||||
 | 
					printf "🔑 Authenticating with Vault ...\n\n"
 | 
				
			||||||
 | 
					echo "$${CODER_OIDC_ACCESS_TOKEN}" | vault write auth/"$${VAULT_JWT_AUTH_PATH}"/login role="$${VAULT_JWT_ROLE}" jwt=-
 | 
				
			||||||
 | 
					printf "🥳 Vault authentication complete!\n\n"
 | 
				
			||||||
 | 
					printf "You can now use Vault CLI to access secrets.\n"
 | 
				
			||||||
					Loading…
					
					
				
		Reference in New Issue