|
| 1 | +#!/usr/bin/env bash |
| 2 | + |
| 3 | +# Convert all templated variables to shell variables |
| 4 | +VAULT_CLI_VERSION=${VAULT_CLI_VERSION} |
| 5 | +VAULT_JWT_AUTH_PATH=${VAULT_JWT_AUTH_PATH} |
| 6 | +VAULT_JWT_ROLE=${VAULT_JWT_ROLE} |
| 7 | +CODER_OIDC_ACCESS_TOKEN=${CODER_OIDC_ACCESS_TOKEN} |
| 8 | + |
| 9 | +fetch() { |
| 10 | + dest="$1" |
| 11 | + url="$2" |
| 12 | + if command -v curl > /dev/null 2>&1; then |
| 13 | + curl -sSL --fail "$${url}" -o "$${dest}" |
| 14 | + elif command -v wget > /dev/null 2>&1; then |
| 15 | + wget -O "$${dest}" "$${url}" |
| 16 | + elif command -v busybox > /dev/null 2>&1; then |
| 17 | + busybox wget -O "$${dest}" "$${url}" |
| 18 | + else |
| 19 | + printf "curl, wget, or busybox is not installed. Please install curl or wget in your image.\n" |
| 20 | + exit 1 |
| 21 | + fi |
| 22 | +} |
| 23 | + |
| 24 | +unzip_safe() { |
| 25 | + if command -v unzip > /dev/null 2>&1; then |
| 26 | + command unzip "$@" |
| 27 | + elif command -v busybox > /dev/null 2>&1; then |
| 28 | + busybox unzip "$@" |
| 29 | + else |
| 30 | + printf "unzip or busybox is not installed. Please install unzip in your image.\n" |
| 31 | + exit 1 |
| 32 | + fi |
| 33 | +} |
| 34 | + |
| 35 | +install() { |
| 36 | + # Get the architecture of the system |
| 37 | + ARCH=$(uname -m) |
| 38 | + if [ "$${ARCH}" = "x86_64" ]; then |
| 39 | + ARCH="amd64" |
| 40 | + elif [ "$${ARCH}" = "aarch64" ]; then |
| 41 | + ARCH="arm64" |
| 42 | + else |
| 43 | + printf "Unsupported architecture: $${ARCH}\n" |
| 44 | + return 1 |
| 45 | + fi |
| 46 | + # Fetch the latest version of Vault if VAULT_CLI_VERSION is 'latest' |
| 47 | + if [ "$${VAULT_CLI_VERSION}" = "latest" ]; then |
| 48 | + LATEST_VERSION=$(curl -s https://releases.hashicorp.com/vault/ | grep -v 'rc' | grep -oE 'vault/[0-9]+\.[0-9]+\.[0-9]+' | sed 's/vault\///' | sort -V | tail -n 1) |
| 49 | + printf "Latest version of Vault is %s.\n\n" "$${LATEST_VERSION}" |
| 50 | + if [ -z "$${LATEST_VERSION}" ]; then |
| 51 | + printf "Failed to determine the latest Vault version.\n" |
| 52 | + return 1 |
| 53 | + fi |
| 54 | + VAULT_CLI_VERSION=$${VAULT_CLI_VERSION} |
| 55 | + fi |
| 56 | + |
| 57 | + # Check if the vault CLI is installed and has the correct version |
| 58 | + installation_needed=1 |
| 59 | + if command -v vault > /dev/null 2>&1; then |
| 60 | + CURRENT_VERSION=$(vault version | grep -oE '[0-9]+\.[0-9]+\.[0-9]+') |
| 61 | + if [ "$${CURRENT_VERSION}" = "$${VAULT_CLI_VERSION}" ]; then |
| 62 | + printf "Vault version %s is already installed and up-to-date.\n\n" "$${CURRENT_VERSION}" |
| 63 | + installation_needed=0 |
| 64 | + fi |
| 65 | + fi |
| 66 | + |
| 67 | + if [ $${installation_needed} -eq 1 ]; then |
| 68 | + # Download and install Vault |
| 69 | + if [ -z "$${CURRENT_VERSION}" ]; then |
| 70 | + printf "Installing Vault CLI ...\n\n" |
| 71 | + else |
| 72 | + printf "Upgrading Vault CLI from version %s to %s ...\n\n" "$${CURRENT_VERSION}" "${VAULT_CLI_VERSION}" |
| 73 | + fi |
| 74 | + fetch vault.zip "https://releases.hashicorp.com/vault/$${VAULT_CLI_VERSION}/vault_$${VAULT_CLI_VERSION}_linux_$${ARCH}.zip" |
| 75 | + if [ $? -ne 0 ]; then |
| 76 | + printf "Failed to download Vault.\n" |
| 77 | + return 1 |
| 78 | + fi |
| 79 | + if ! unzip_safe vault.zip; then |
| 80 | + printf "Failed to unzip Vault.\n" |
| 81 | + return 1 |
| 82 | + fi |
| 83 | + rm vault.zip |
| 84 | + if sudo mv vault /usr/local/bin/vault 2> /dev/null; then |
| 85 | + printf "Vault installed successfully!\n\n" |
| 86 | + else |
| 87 | + mkdir -p ~/.local/bin |
| 88 | + if ! mv vault ~/.local/bin/vault; then |
| 89 | + printf "Failed to move Vault to local bin.\n" |
| 90 | + return 1 |
| 91 | + fi |
| 92 | + printf "Please add ~/.local/bin to your PATH to use vault CLI.\n" |
| 93 | + fi |
| 94 | + fi |
| 95 | + return 0 |
| 96 | +} |
| 97 | + |
| 98 | +TMP=$(mktemp -d) |
| 99 | +if ! ( |
| 100 | + cd "$TMP" |
| 101 | + install |
| 102 | +); then |
| 103 | + echo "Failed to install Vault CLI." |
| 104 | + exit 1 |
| 105 | +fi |
| 106 | +rm -rf "$TMP" |
| 107 | + |
| 108 | +# Authenticate with Vault |
| 109 | +printf "🔑 Authenticating with Vault ...\n\n" |
| 110 | +echo "$${CODER_OIDC_ACCESS_TOKEN}" | vault write auth/"$${VAULT_JWT_AUTH_PATH}"/login role="$${VAULT_JWT_ROLE}" jwt=- |
| 111 | +printf "🥳 Vault authentication complete!\n\n" |
| 112 | +printf "You can now use Vault CLI to access secrets.\n" |
0 commit comments