This repository has been archived by the owner on Jun 2, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 155
/
secrets.sh
executable file
·534 lines (449 loc) · 12.1 KB
/
secrets.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
#!/usr/bin/env bash
# The suffix to use for decrypted files. The default can be overridden using
# the HELM_SECRETS_DEC_SUFFIX environment variable.
DEC_SUFFIX="${HELM_SECRETS_DEC_SUFFIX:-.yaml.dec}"
# Make sure HELM_BIN is set (normally by the helm command)
HELM_BIN="${HELM_BIN:-helm}"
getopt --test > /dev/null
if [[ $? -ne 4 ]]
then
# Check if gnu-getopt is installed
if [ -x /usr/local/opt/gnu-getopt/bin/getopt ]
then
/usr/local/opt/gnu-getopt/bin/getopt --test > /dev/null
if [[ $? -ne 4 ]]
then
GNU_GETOPT=0
else
GNU_GETOPT=1
export PATH="/usr/local/opt/gnu-getopt/bin:$PATH"
fi
else
GNU_GETOPT=0
fi
if [ "${GNU_GETOPT}" -ne 1 ]; then
cat <<EOF
I’m sorry, "getopt --test" failed in this environment.
You may need to install enhanced getopt, e.g. on OSX using
"brew install gnu-getopt".
EOF
exit 1
fi
fi
set -ueo pipefail
usage() {
cat <<EOF
GnuPG secrets encryption in Helm Charts
This plugin provides ability to encrypt/decrypt secrets files
to store in less secure places, before they are installed using
Helm.
To decrypt/encrypt/edit you need to initialize/first encrypt secrets with
sops - https://github.com/mozilla/sops
Available Commands:
enc Encrypt secrets file
dec Decrypt secrets file
view Print secrets decrypted
edit Edit secrets file and encrypt afterwards
clean Remove all decrypted files in specified directory (recursively)
install wrapper that decrypts secrets[.*].yaml files before running helm install
template wrapper that decrypts secrets[.*].yaml files before running helm template
upgrade wrapper that decrypts secrets[.*].yaml files before running helm upgrade
lint wrapper that decrypts secrets[.*].yaml files before running helm lint
diff wrapper that decrypts secrets[.*].yaml files before running helm diff
(diff is a helm plugin)
EOF
}
enc_usage() {
cat <<EOF
Encrypt secrets
It uses your gpg credentials to encrypt .yaml file. If the file is already
encrypted, look for a decrypted ${DEC_SUFFIX} file and encrypt that to .yaml.
This allows you to first decrypt the file, edit it, then encrypt it again.
You can use plain sops to encrypt - https://github.com/mozilla/sops
Example:
$ ${HELM_BIN} secrets enc <SECRET_FILE_PATH>
$ git add <SECRET_FILE_PATH>
$ git commit
$ git push
EOF
}
dec_usage() {
cat <<EOF
Decrypt secrets
It uses your gpg credentials to decrypt previously encrypted .yaml file.
Produces ${DEC_SUFFIX} file.
You can use plain sops to decrypt specific files - https://github.com/mozilla/sops
Example:
$ ${HELM_BIN} secrets dec <SECRET_FILE_PATH>
Typical usage:
$ ${HELM_BIN} secrets dec secrets/myproject/secrets.yaml
$ vim secrets/myproject/secrets.yaml.dec
EOF
}
view_usage() {
cat <<EOF
View specified secrets[.*].yaml file
Example:
$ ${HELM_BIN} secrets view <SECRET_FILE_PATH>
Typical usage:
$ ${HELM_BIN} secrets view secrets/myproject/nginx/secrets.yaml | grep basic_auth
EOF
}
edit_usage() {
cat <<EOF
Edit encrypted secrets
Decrypt encrypted file, edit and then encrypt
You can use plain sops to edit - https://github.com/mozilla/sops
Example:
$ ${HELM_BIN} secrets edit <SECRET_FILE_PATH>
or $ sops <SECRET_FILE_PATH>
$ git add <SECRET_FILE_PATH>
$ git commit
$ git push
EOF
}
clean_usage() {
cat <<EOF
Clean all decrypted files if any exist
It removes all decrypted ${DEC_SUFFIX} files in the specified directory
(recursively) if they exist.
Example:
$ ${HELM_BIN} secrets clean <dir with secrets>
EOF
}
install_usage() {
cat <<EOF
Install a chart
This is a wrapper for the "helm install" command. It will detect -f and
--values options, and decrypt any secrets.*.yaml files before running "helm
install".
Example:
$ ${HELM_BIN} secrets install <HELM INSTALL OPTIONS>
Typical usage:
$ ${HELM_BIN} secrets install -n i1 stable/nginx-ingress -f values.test.yaml -f secrets.test.yaml
EOF
}
template_usage() {
cat <<EOF
Install a chart
This is a wrapper for the "helm template" command. It will detect -f and
--values options, and decrypt any secrets.*.yaml files before running "helm
template".
Example:
$ ${HELM_BIN} secrets template <HELM INSTALL OPTIONS>
Typical usage:
$ ${HELM_BIN} secrets template -n i1 stable/nginx-ingress -f values.test.yaml -f secrets.test.yaml
EOF
}
upgrade_usage() {
cat <<EOF
Upgrade a deployed release
This is a wrapper for the "helm upgrade" command. It will detect -f and
--values options, and decrypt any secrets.*.yaml files before running "helm
upgrade".
Example:
$ ${HELM_BIN} secrets upgrade <HELM UPGRADE OPTIONS>
Typical usage:
$ ${HELM_BIN} secrets upgrade i1 stable/nginx-ingress -f values.test.yaml -f secrets.test.yaml
EOF
}
lint_usage() {
cat <<EOF
Run helm lint on a chart
This is a wrapper for the "helm lint" command. It will detect -f and
--values options, and decrypt any secrets.*.yaml files before running "helm
lint".
Example:
$ ${HELM_BIN} secrets lint <HELM LINT OPTIONS>
Typical usage:
$ ${HELM_BIN} secrets lint ./my-chart -f values.test.yaml -f secrets.test.yaml
EOF
}
diff_usage() {
cat <<EOF
Run helm diff on a chart
"diff" is a helm plugin. This is a wrapper for the "helm diff" command. It
will detect -f and --values options, and decrypt any secrets.*.yaml files
before running "helm diff".
Example:
$ ${HELM_BIN} secrets diff <HELM DIFF OPTIONS>
Typical usage:
$ ${HELM_BIN} secrets diff upgrade i1 stable/nginx-ingress -f values.test.yaml -f secrets.test.yaml
EOF
}
is_help() {
case "$1" in
-h|--help|help)
return 0
;;
*)
return 1
;;
esac
}
encrypt_helper() {
local yml=$1
[[ -e "$yml" ]] || { echo "File does not exist: $yml"; exit 1; }
local ymldec=$(sed -e "s/\\.yaml$/${DEC_SUFFIX}/" <<<"$yml")
[[ -e $ymldec ]] || ymldec="$yml"
if [[ $(grep -C10000 'sops:' "$ymldec" | grep -c 'version:') -gt 0 ]]
then
echo "Already encrypted: $ymldec"
return
fi
if [[ $yml == $ymldec ]]
then
sops --encrypt --input-type yaml --output-type yaml --in-place "$yml"
echo "Encrypted $yml"
else
sops --encrypt --input-type yaml --output-type yaml "$ymldec" > "$yml"
echo "Encrypted $ymldec to $yml"
fi
}
enc() {
if is_help "$1"
then
enc_usage
return
fi
yml="$1"
if [[ ! -f "$yml" ]]
then
echo "$yml doesn't exist."
else
echo "Encrypting $yml"
encrypt_helper "$yml"
fi
}
# Name references ("declare -n" and "local -n") are a Bash 4.3+ feature.
# For previous versions, work around using eval.
decrypt_helper() {
local yml="$1" __ymldec __dec
if [[ ${BASH_VERSINFO[0]} -lt 4 || ${BASH_VERSINFO[0]} -eq 4 && ${BASH_VERSINFO[1]} -lt 3 ]]
then
local __ymldec_var='' __dec_var=''
[[ $# -ge 2 ]] && __ymldec_var=$2
[[ $# -ge 3 ]] && __dec_var=$3
[[ $__dec_var ]] && eval $__dec_var=0
else
[[ $# -ge 2 ]] && local -n __ymldec=$2
[[ $# -ge 3 ]] && local -n __dec=$3
fi
__dec=0
[[ -e "$yml" ]] || { echo "File does not exist: $yml"; exit 1; }
if [[ $(grep -C10000 'sops:' "$yml" | grep -c 'version:') -eq 0 ]]
then
echo "Not encrypted: $yml"
__ymldec="$yml"
else
__ymldec=$(sed -e "s/\\.yaml$/${DEC_SUFFIX}/" <<<"$yml")
if [[ -e $__ymldec && $__ymldec -nt $yml ]]
then
echo "$__ymldec is newer than $yml"
else
sops --decrypt --input-type yaml --output-type yaml "$yml" > "$__ymldec" || { rm "$__ymldec"; exit 1; }
__dec=1
fi
fi
if [[ ${BASH_VERSINFO[0]} -lt 4 || ${BASH_VERSINFO[0]} -eq 4 && ${BASH_VERSINFO[1]} -lt 3 ]]
then
[[ $__ymldec_var ]] && eval $__ymldec_var="'$__ymldec'"
[[ $__dec_var ]] && eval $__dec_var="'$__dec'"
fi
true # just so that decrypt_helper will exit with a true status on no error
}
dec() {
if is_help "$1"
then
dec_usage
return
fi
yml="$1"
if [[ ! -f "$yml" ]]
then
echo "$yml doesn't exist."
else
echo "Decrypting $yml"
decrypt_helper "$yml"
fi
}
view_helper() {
local yml="$1"
[[ -e "$yml" ]] || { echo "File does not exist: $yml"; exit 1; }
sops --decrypt --input-type yaml --output-type yaml "$yml"
}
view() {
if is_help "$1"
then
view_usage
return
fi
local yml="$1"
view_helper "$yml"
}
edit_helper() {
local yml="$1"
[[ -e "$yml" ]] || { echo "File does not exist: $yml"; exit 1; }
exec sops --input-type yaml --output-type yaml "$yml" < /dev/tty
}
edit() {
local yml="$1"
edit_helper "$yml"
}
clean() {
if is_help "$1"
then
clean_usage
return
fi
local basedir="$1"
find "$basedir" -type f -name "secrets*${DEC_SUFFIX}" -exec rm -v {} \;
}
helm_wrapper() {
local cmd="$1" subcmd='' cmd_version=''
shift
if [[ $cmd == diff ]]
then
subcmd="$1"
shift
cmd_version=$(${HELM_BIN} diff version)
fi
# cache options for the helm command in a file so we don't need to parse the help each time
local helm_version=$(${HELM_BIN} version --client --short)
local cur_options_version="${helm_version}${cmd_version:+ ${cmd}: ${cmd_version}}"
local optfile="$HELM_PLUGIN_DIR/helm.${cmd}${subcmd:+.$subcmd}.options" options_version='' options='' longoptions=''
[[ -f $optfile ]] && . "$optfile"
if [[ $cur_options_version != $options_version ]]
then
local re='(-([a-zA-Z0-9]), )?--([-_a-zA-Z0-9]+)( ([a-zA-Z0-9]+))?' line
options='' longoptions=''
# parse the helm command options and option args from the help output
while read line
do
if [[ $line =~ $re ]]
then
local opt="${BASH_REMATCH[2]}" lopt="${BASH_REMATCH[3]}" optarg="${BASH_REMATCH[5]:+:}"
[[ $opt ]] && options+="${opt}${optarg}"
[[ $lopt ]] && longoptions+="${longoptions:+,}${lopt}${optarg}"
fi
done <<<"$(${HELM_BIN} "$cmd" $subcmd --help | sed -e '1,/^Flags:/d' -e '/^Global Flags:/,$d' )"
cat >"$optfile" <<EOF
options_version='$cur_options_version'
options='$options'
longoptions='$longoptions'
EOF
fi
# parse command line
local parsed # separate line, otherwise the return value of getopt is ignored
# if parsing fails, getopt returns non-0, and the shell exits due to "set -e"
parsed=$(getopt --options="$options" --longoptions="$longoptions" --name="${HELM_BIN} $cmd${subcmd:+ ${subcmd}}" -- "$@")
# collect cmd options with optional option arguments
local -a cmdopts=() decfiles=()
local yml ymldec decrypted
eval set -- "$parsed"
while [[ $# -gt 0 ]]
do
case "$1" in
--)
# skip --, and what remains are the cmd args
shift
break
;;
-f|--values)
cmdopts+=("$1")
yml="$2"
# increase support for -f=myfile.yaml or -f=myfile (helm support both spaces and equal sign)
if [[ $yml =~ ^=.*$ ]]; then
yml="${yml/=/}"
fi
if [[ $yml =~ ^(.*/)?secrets(\.[^.]+)*\.yaml$ ]]
then
decrypt_helper $yml ymldec decrypted
cmdopts+=("$ymldec")
[[ $decrypted -eq 1 ]] && decfiles+=("$ymldec")
else
cmdopts+=("$yml")
fi
shift # to also skip option arg
;;
*)
cmdopts+=("$1")
;;
esac
shift
done
# run helm command with args and opts in correct order
set +e # ignore errors
${HELM_BIN} ${TILLER_HOST:+--host "$TILLER_HOST" }"$cmd" $subcmd "$@" "${cmdopts[@]}"
helm_exit_code=$?
# cleanup on-the-fly decrypted files
[[ ${#decfiles[@]} -gt 0 ]] && rm -v "${decfiles[@]}"
}
helm_command() {
if [[ $# -lt 2 ]] || is_help "$2"
then
"${1}_usage"
return
fi
helm_wrapper "$@"
}
case "${1:-help}" in
enc)
if [[ $# -lt 2 ]]
then
enc_usage
echo "Error: secrets file required."
exit 1
fi
enc "$2"
shift
;;
dec)
if [[ $# -lt 2 ]]
then
dec_usage
echo "Error: secrets file required."
exit 1
fi
dec "$2"
;;
view)
if [[ $# -lt 2 ]]
then
view_usage
echo "Error: secrets file required."
exit 1
fi
view "$2"
;;
edit)
if [[ $# -lt 2 ]]
then
edit_usage
echo "Error: secrets file required."
exit 1
fi
edit "$2"
shift
;;
clean)
if [[ $# -lt 2 ]]
then
clean_usage
echo "Error: Chart package required."
exit 1
fi
clean "$2"
;;
install|template|upgrade|lint|diff)
helm_command "$@"
;;
--help|-h|help)
usage
;;
*)
usage
exit 1
;;
esac
exit ${helm_exit_code:-0}