This is a backend plugin to be used with Hashicorp Vault. This plugin generates unique, ephemeral user API keys and STS AssumeRole credentials.
Please note: We take Vault's security and our users' trust very seriously. If you believe you have found a security issue in Vault or with this plugin, please responsibly disclose by contacting us at [email protected].
This is a Vault plugin and is meant to work with Vault. This guide assumes you have already installed Vault and have a basic understanding of how Vault works. Otherwise, first read this guide on how to get started with Vault.
If you are using Vault 11.0.1 or above, this plugin is packaged with Vault and by default can be enabled by running:
$ vault secrets enable tencentcloud
Success! Enabled the tencentcloud secrets engine at: tencentcloud/
If you are testing this plugin in an earlier version of Vault or want to develop, see the next section.
If you wish to work on this plugin, you'll first need Go installed on your machine (whichever version is required by Vault).
Make sure Go is properly installed, including setting up a GOPATH.
Clone this repository:
mkdir $GOPATH/src/github.com/hashicorp/vault-plugin-secrets-tencentcloud`
cd $GOPATH/src/github.com/hashicorp/
git clone https://github.com/hashicorp/vault-plugin-secrets-tencentcloud.git
(or use go get github.com/hashicorp/vault-plugin-secrets-tencentcloud
).
You can then download any required build tools by bootstrapping your environment:
$ make bootstrap
To compile a development version of this plugin, run make
or make dev
.
This will put the plugin binary in the bin
and $GOPATH/bin
folders. dev
mode will only generate the binary for your platform and is faster:
$ make
$ make dev
Put the plugin binary into a location of your choice. This directory
will be specified as the plugin_directory
in the Vault config used to start the server.
plugin_directory = "path/to/plugin/directory"
Start a Vault server with this config file:
$ vault server -config=path/to/config.json ...
Once the server is started, register the plugin in the Vault server's plugin catalog:
$ vault write sys/plugins/catalog/tencentcloudsecrets \
sha_256="$(shasum -a 256 path/to/plugin/directory/vault-plugin-secrets-tencentcloud | cut -d " " -f1)" \
command="vault-plugin-secrets-tencentcloud"
Any name can be substituted for the plugin name "tencentcloudsecrets". This name will be referenced in the next step, where we enable the secrets plugin backend using the tencentcloud secrets plugin:
$ vault secrets enable --plugin-name='tencentcloudsecrets' --path="tencentcloud" plugin
This plugin has integration tests and acceptance tests.
The integration tests only test offline without real network API request.
The acceptance tests will send real API requests to TencentCloud.
$ make test
- provide your credentials via
TENCENTCLOUD_SECRET_ID
andTENCENTCLOUD_SECRET_KEY
environment variables and set your CAM role arn viaTENCENTCLOUD_ARN
environment variables
export TENCENTCLOUD_SECRET_ID=AKID12l4j5ljqatgaljgalg
export TENCENTCLOUD_SECRET_KEY=alkfj23lkraljq5lj532lr32l4
export TENCENTCLOUD_ARN=qcs::cam::uin/12345678:roleName/test
- Run acceptance tests
make test-acc