Terraform module to configure Vault for GitHub OIDC authentication from Action runners.
OIDC authentication allows us to bind GitHub repositories (and subcomponents of a repository, such as a branch, ref, or environment) to a Vault role without needing to manage actual credentials that require a lifecycle system, integration into repo-level GitHub Secrets, or other organizational glue.
Reference documents that help with understanding the process:
- https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-hashicorp-vault
- https://medium.com/hashicorp-engineering/push-button-security-for-your-github-actions-d4fffde1df20
Once OIDC authentication is configured on a Vault server via this module, a GitHub repository can leverage hashicorp/vault-action to retrieve secrets from Vault with GitHub OIDC authentication. No credential management needed!
- name: Import Secrets
uses: hashicorp/vault-action@v2.4.0
id: secrets
with:
exportEnv: false
url: https://<your-vault-URL>
path: github-actions
method: jwt
role: <vault_role_name>
secrets: |
secret/data/foo/bar fi | MY_SECRET
- name: Access secret
run: echo '${{steps.secrets.outputs.MY_SECRET }}' | my_command
This module simplifies the creation of the JWT auth backend on Vault for this GitHub Action OIDC use case.
The module requires you to configure what repositories to bind to Vault roles and policies, and under what
conditions the respective repository should be granted access.
This is encapsulated by the oidc_bindings
variable.
❗ Note: This module uses the experimental Terraform feature module_variable_optional_attrs . |
---|
You will need to opt-in to this experiment in your terraform
block:
terraform {
experiments = [module_variable_optional_attrs]
}
Tutorial/example repo: https://github.com/artis3n/github-oidc-vault-example.
You can find several examples leveraging this module under examples/
:
- Basic usage
- Leveraging JSON files for distributed organization of repo bindings
- Adding custom additional claims per OIDC binding
There is another example run in the CI suite at test/configure-oidc/main.tf
.
Basic example - one repo, separating secrets access by nonprod and prod pipelines:
module "github-vault-oidc" {
source = "digitalocean/github-oidc/vault"
version = "~> 1.0.2"
oidc_bindings = [
{
audience : "https://github.com/artis3n",
vault_role_name : "oidc-test",
bound_subject : "repo:artis3n/github-oidc-vault-example:environment:nonprod",
vault_policies : [
vault_policy.example.name,
],
},
{
audience : "https://github.com/artis3n",
vault_role_name : "oidc-prod-test",
bound_subject : "repo:artis3n/github-oidc-vault-example:ref:refs/heads/main",
vault_policies : [
vault_policy.example.name,
],
},
]
}
resource "vault_policy" "example" {
name = "oidc-example"
policy = data.vault_policy_document.example.hcl
}
data "vault_policy_document" "example" {
rule {
path = "secret/data/foo/bar"
capabilities = ["list", "read"]
}
}
This input variable must be a list of objects containing the following structure:
oidc_bindings = [
{
audience: '',
vault_role_name: '',
bound_subject: '',
vault_policies: [''],
}
]
There are additional, optional values you can include as well:
oidc_bindings = [
{
audience: '',
vault_role_name: '',
bound_subject: '',
vault_policies: [''],
user_claim: '',
additional_claims: [
{
x: '',
}
],
ttl: 0,
}
]
Descriptions for each parameter are below:
By default, the audience
must be the URL of the repository owner (e.g. https://github.com/digitalocean
).
The audience
can be customized by configuring whatever you'd like and using the jwtGithubAudience
parameter in
hashicorp/vault-action.
For example, from an organizational or audit perspective, you may desire to establish a naming scheme such as audience: "<company>:<org-unit>:<team-name>"
, e.g. digitalocean:security:product-security
.
The vault_role_name
must be the name of the Vault role you wish to create on the JWT auth backend.
Each Vault role should be configured for one repo subject - using the same Vault role with different configurations in the rest of
the parameters will cause this module to fail.
This is because you would otherwise silently overwrite the role configuration.
You may want to create multiple Vault roles for a single GitHub repository, e.g. a nonprod CI workflow that needs access to CI secrets, and a deployment workflow that publishes a release that needs production secrets.
The bound_subject
must be the sub
field from GitHub's OIDC token.
The bound subject can be constructed from various filters, such as a branch, tag, or specific environment.
See GitHub's documentation for examples.
vault_policies
must be a list of Vault policy strings to grant to the vault_role_name
Vault role being configured.
This can also come from a vault_policy
resource.
Optional
The user_claim
is how you want Vault to uniquely identify this client.
This will be used as the name for the Identity entity alias created due to a successful login.
This must be a field present in the GitHub JWT token.
Defaults to the value of the default_user_claim
variable if not provided.
Optional
additional_claims
must be a list of any additional claims you would like to enforce in the Vault role binding.
Each key
must be a field present in the GitHub JWT token.
For example, to leverage reusable workflows
with OIDC, you may wish to set your bound_subject
to repo:ORG_NAME/*
and add an additional claim of job_workflow_ref:ORG_NAME/REPO_NAME
.
e.g.
oidc_bindings = [
{
audience: '...',
vault_role_name: '...',
bound_subject: "repo:digitalocean/*",
vault_policies: ['...'],
user_claim: '...',
additional_claims: [
{
job_workflow_ref: 'digitalocean/oidc-example/.github/workflows/deployment.yml@v1',
}
],
},
]
You can also specify a custom ttl
per role binding if you wish to customize beyond the default_ttl
variable.
This must be a number of seconds.
Optional
The default incremental time-to-live for generated tokens, in seconds.
Since most uses of hashicorp/vault-action
authenticate & retrieve secrets
in one step during a CI pipeline, the default for this variable is set to 60 seconds.
If you wish to customize the TTL for all roles, modify this variable.
You can also specify individual TTL requirements on individual role bindings.
See oidc_bindings.ttl
.
Optional
By default, this role will generate a JWT auth backend on Vault at the path /github-actions
.
If you wish to customize the path created by this module, modify this variable.
Do not include a leading /
in the variable content.
At this time, this module expects to create and manage the JWT backend leveraged for GitHub OIDC auth. You cannot pass in a Terraform reference to an existing backend.
Name | Version |
---|---|
terraform | >= 1.1.0 |
vault | >= 3.4.1 |
Name | Version |
---|---|
vault | 3.5.0 |
No modules.
Name | Type |
---|---|
vault_jwt_auth_backend.github_oidc | resource |
vault_jwt_auth_backend_role.github_oidc_role | resource |
Name | Description | Type | Default | Required |
---|---|---|---|---|
oidc_bindings | A list of OIDC JWT bindings between GitHub repos and Vault roles. For each entry, you must include:audience : By default, this must be the URL of the repository owner (e.g. https://github.com/digitalocean ). This can be customized with the jwtGithubAudience parameter in hashicorp/vault-action . This is the bound audience (aud ) field from GitHub's OIDC token .vault_role_name : The name of the Vault role to generate under the OIDC auth backend.bound_subject : This is what is set in the sub field from GitHub's OIDC token . The bound subject can be constructed from various filters, such as a branch, tag, or specific environment . See GitHub's documentation for examples.vault_policies : A list of Vault policies you wish to grant to the generated token.user_claim : Optional. This is how you want Vault to uniquely identify this client. This will be used as the name for the Identity entity alias created due to a successful login. This must be a field present in the GitHub JWT token . Defaults to the default_user_claim variable if not provided. Consider the impact on reusable workflows if you are thinking of changing this value from the default.additional_claims : Optional. Any additional bound_claims to configure for this role. Claim keys must match a value in GitHub's OIDC token . Do not use this field for the sub claim. Use the bound_subject parameter instead.ttl : Optional. The default incremental time-to-live for the generated token, in seconds. Defaults to the default_ttl value but can be individually specified per binding with this value. |
list(object({ |
n/a | yes |
default_ttl | The default incremental time-to-live for generated tokens, in seconds. | number |
60 |
no |
default_user_claim | This is how you want Vault to uniquely identify this client. This will be used as the name for the Identity entity alias created due to a successful login. This must be a field present in the GitHub OIDC token . Consider the impact on reusable workflows if you are thinking of changing this value from the default. | string |
"job_workflow_ref" |
no |
oidc_auth_backend_path | The path to mount the OIDC auth backend. | string |
"github-actions" |
no |
Name | Description |
---|---|
auth_backend_path | The path of the generated auth method. Use with a vault_auth_backend data source to retrieve any needed attributes from this resource. |
oidc_bindings_names | The Vault role names generated for each OIDC binding provided. This is a reflection of the vault_role_name value of each item in oidc-bindings . |
This module is maintained by Ari Kalfus with help from these excellent contributors.
Licensed under Apache 2.0. See LICENSE for full details.