/terraform-vault-github-oidc

Terraform module to configure Vault for GitHub OIDC authentication from Action runners.

Primary LanguageHCLApache License 2.0Apache-2.0

Terraform Module: Hashicorp Vault GitHub OIDC

GitHub release (latest SemVer) GitHub GitHub contributors GitHub last commit

Terraform module to configure Vault for GitHub OIDC authentication from Action runners.

OIDC authentication allows us to bind GitHub repositories (and subcomponents of a repository, such as a branch, ref, or environment) to a Vault role without needing to manage actual credentials that require a lifecycle system, integration into repo-level GitHub Secrets, or other organizational glue.

Reference documents that help with understanding the process:

Once OIDC authentication is configured on a Vault server via this module, a GitHub repository can leverage hashicorp/vault-action to retrieve secrets from Vault with GitHub OIDC authentication. No credential management needed!

- name: Import Secrets
  uses: hashicorp/vault-action@v2.4.0
  id: secrets
  with:
    exportEnv: false
    url: https://<your-vault-URL>
    path: github-actions
    method: jwt
    role: <vault_role_name>
    secrets: |
      secret/data/foo/bar fi | MY_SECRET

- name: Access secret
  run: echo '${{steps.secrets.outputs.MY_SECRET }}' | my_command

Usage

This module simplifies the creation of the JWT auth backend on Vault for this GitHub Action OIDC use case. The module requires you to configure what repositories to bind to Vault roles and policies, and under what conditions the respective repository should be granted access. This is encapsulated by the oidc_bindings variable.

❗ Note: This module uses the experimental Terraform feature module_variable_optional_attrs.

You will need to opt-in to this experiment in your terraform block:

terraform {
  experiments = [module_variable_optional_attrs]
}

Examples

Tutorial/example repo: https://github.com/artis3n/github-oidc-vault-example.

You can find several examples leveraging this module under examples/:

There is another example run in the CI suite at test/configure-oidc/main.tf.

Basic example - one repo, separating secrets access by nonprod and prod pipelines:

module "github-vault-oidc" {
  source = "digitalocean/github-oidc/vault"
  version = "~> 1.0.2"

  oidc_bindings = [
    {
      audience : "https://github.com/artis3n",
      vault_role_name : "oidc-test",
      bound_subject : "repo:artis3n/github-oidc-vault-example:environment:nonprod",
      vault_policies : [
        vault_policy.example.name,
      ],
    },
    {
      audience : "https://github.com/artis3n",
      vault_role_name : "oidc-prod-test",
      bound_subject : "repo:artis3n/github-oidc-vault-example:ref:refs/heads/main",
      vault_policies : [
        vault_policy.example.name,
      ],
    },
  ]
}

resource "vault_policy" "example" {
  name   = "oidc-example"
  policy = data.vault_policy_document.example.hcl
}

data "vault_policy_document" "example" {
  rule {
    path         = "secret/data/foo/bar"
    capabilities = ["list", "read"]
  }
}

Variables

oidc_bindings

This input variable must be a list of objects containing the following structure:

oidc_bindings = [
  {
    audience: '',
    vault_role_name: '',
    bound_subject: '',
    vault_policies: [''],
  }
]

There are additional, optional values you can include as well:

oidc_bindings = [
  {
    audience: '',
    vault_role_name: '',
    bound_subject: '',
    vault_policies: [''],
    user_claim: '',
    additional_claims: [
      {
        x: '',
      }
    ],
    ttl: 0,
  }
]

Descriptions for each parameter are below:

oidc_bindings.audience

By default, the audience must be the URL of the repository owner (e.g. https://github.com/digitalocean).

The audience can be customized by configuring whatever you'd like and using the jwtGithubAudience parameter in hashicorp/vault-action. For example, from an organizational or audit perspective, you may desire to establish a naming scheme such as audience: "<company>:<org-unit>:<team-name>", e.g. digitalocean:security:product-security.

oidc_bindings.vault_role_name

The vault_role_name must be the name of the Vault role you wish to create on the JWT auth backend. Each Vault role should be configured for one repo subject - using the same Vault role with different configurations in the rest of the parameters will cause this module to fail. This is because you would otherwise silently overwrite the role configuration.

You may want to create multiple Vault roles for a single GitHub repository, e.g. a nonprod CI workflow that needs access to CI secrets, and a deployment workflow that publishes a release that needs production secrets.

oidc_bindings.bound_subject

The bound_subject must be the sub field from GitHub's OIDC token. The bound subject can be constructed from various filters, such as a branch, tag, or specific environment. See GitHub's documentation for examples.

oidc_bindings.vault_policies

vault_policies must be a list of Vault policy strings to grant to the vault_role_name Vault role being configured. This can also come from a vault_policy resource.

oidc_bindings.user_claim

Optional

The user_claim is how you want Vault to uniquely identify this client. This will be used as the name for the Identity entity alias created due to a successful login. This must be a field present in the GitHub JWT token. Defaults to the value of the default_user_claim variable if not provided.

oidc_bindings.additional_claims

Optional

additional_claims must be a list of any additional claims you would like to enforce in the Vault role binding. Each key must be a field present in the GitHub JWT token.

For example, to leverage reusable workflows with OIDC, you may wish to set your bound_subject to repo:ORG_NAME/* and add an additional claim of job_workflow_ref:ORG_NAME/REPO_NAME.

e.g.

oidc_bindings = [
  {
    audience: '...',
    vault_role_name: '...',
    bound_subject: "repo:digitalocean/*",
    vault_policies: ['...'],
    user_claim: '...',
    additional_claims: [
      {
        job_workflow_ref: 'digitalocean/oidc-example/.github/workflows/deployment.yml@v1',
      }
    ],
  },
]

oidc_bindings.ttl

You can also specify a custom ttl per role binding if you wish to customize beyond the default_ttl variable. This must be a number of seconds.

default_ttl

Optional

The default incremental time-to-live for generated tokens, in seconds. Since most uses of hashicorp/vault-action authenticate & retrieve secrets in one step during a CI pipeline, the default for this variable is set to 60 seconds. If you wish to customize the TTL for all roles, modify this variable. You can also specify individual TTL requirements on individual role bindings. See oidc_bindings.ttl.

oidc_auth_backend_path

Optional

By default, this role will generate a JWT auth backend on Vault at the path /github-actions. If you wish to customize the path created by this module, modify this variable. Do not include a leading / in the variable content.

At this time, this module expects to create and manage the JWT backend leveraged for GitHub OIDC auth. You cannot pass in a Terraform reference to an existing backend.

Requirements

Name Version
terraform >= 1.1.0
vault >= 3.4.1

Providers

Name Version
vault 3.5.0

Modules

No modules.

Resources

Name Type
vault_jwt_auth_backend.github_oidc resource
vault_jwt_auth_backend_role.github_oidc_role resource

Inputs

Name Description Type Default Required
oidc_bindings A list of OIDC JWT bindings between GitHub repos and Vault roles. For each entry, you must include:

audience: By default, this must be the URL of the repository owner (e.g. https://github.com/digitalocean). This can be customized with the jwtGithubAudience parameter in hashicorp/vault-action . This is the bound audience (aud) field from GitHub's OIDC token .

vault_role_name: The name of the Vault role to generate under the OIDC auth backend.

bound_subject: This is what is set in the sub field from GitHub's OIDC token . The bound subject can be constructed from various filters, such as a branch, tag, or specific environment . See GitHub's documentation for examples.

vault_policies: A list of Vault policies you wish to grant to the generated token.

user_claim: Optional. This is how you want Vault to uniquely identify this client. This will be used as the name for the Identity entity alias created due to a successful login. This must be a field present in the GitHub JWT token . Defaults to the default_user_claim variable if not provided. Consider the impact on reusable workflows if you are thinking of changing this value from the default.

additional_claims: Optional. Any additional bound_claims to configure for this role. Claim keys must match a value in GitHub's OIDC token . Do not use this field for the sub claim. Use the bound_subject parameter instead.

ttl: Optional. The default incremental time-to-live for the generated token, in seconds. Defaults to the default_ttl value but can be individually specified per binding with this value.
list(object({
audience = string,
vault_role_name = string,
bound_subject = string,
vault_policies = set(string),
user_claim = optional(string),
additional_claims = optional(map(string)),
ttl = optional(number),
}))
n/a yes
default_ttl The default incremental time-to-live for generated tokens, in seconds. number 60 no
default_user_claim This is how you want Vault to uniquely identify this client. This will be used as the name for the Identity entity alias created due to a successful login. This must be a field present in the GitHub OIDC token . Consider the impact on reusable workflows if you are thinking of changing this value from the default. string "job_workflow_ref" no
oidc_auth_backend_path The path to mount the OIDC auth backend. string "github-actions" no

Outputs

Name Description
auth_backend_path The path of the generated auth method. Use with a vault_auth_backend data source to retrieve any needed attributes from this resource.
oidc_bindings_names The Vault role names generated for each OIDC binding provided. This is a reflection of the vault_role_name value of each item in oidc-bindings.

Authors

This module is maintained by Ari Kalfus with help from these excellent contributors.

License

Licensed under Apache 2.0. See LICENSE for full details.