Tutorial: Update HashiCorp Vault configuration to use ID Tokens
- Tier: Premium, Ultimate
- Offering: GitLab.com, GitLab Self-Managed, GitLab Dedicated
Starting in Vault 1.17, JWT auth login requires bound audiences on the role
when the JWT contains an aud claim. The aud claim can be a single string or a list of strings.
This tutorial demonstrates how to convert your existing CI/CD secrets configuration to use ID Tokens.
The CI_JOB_JWT variables are deprecated, but updating to ID tokens requires some
important configuration changes to work with Vault. If you have more than a handful of jobs,
converting everything at once is a daunting task.
There isn’t one standard method to migrate to ID tokens, so this tutorial includes two variations for how to convert your existing CI/CD secrets. Choose the method that is most appropriate for your use case:
- Update your Vault configuration:
- Method A: Migrate JWT roles to the new Vault auth method
- Method B: Move
issclaim to roles for the migration window
- Update your CI/CD Jobs
Prerequisites
This tutorial assumes you are familiar with GitLab CI/CD and Vault.
To follow along, you must have:
- An instance running GitLab 16.0 or later, or be on GitLab.com.
- A Vault server that you are already using.
- CI/CD jobs retrieving secrets from Vault with
CI_JOB_JWT.
In the following examples, replace:
vault.example.comwith the URL of your Vault server.gitlab.example.comwith the URL of your GitLab instance.jwtorjwt_v2with your auth method names.
Method A: Migrate JWT roles to the new Vault auth method
This method creates a second JWT auth method in parallel to the existing one in use. Afterwards all Vault roles used for the GitLab integration are recreated in this new auth method.
Create a second JWT authentication path in Vault
As part of the transition from CI_JOB_JWT to ID tokens, you must update the bound_issuer in Vault to include https://:
$ vault write auth/jwt/config \
oidc_discovery_url="https://gitlab.example.com" \
bound_issuer="https://gitlab.example.com"After you make this change, jobs that use CI_JOB_JWT start to fail.
You can create multiple authentication paths in Vault, which enable you to transition to ID Tokens on a project by job basis without disruption.
Configure a new authentication path with the name
jwt_v2, run:vault auth enable -path jwt_v2 jwtYou can choose a different name, but the rest of these examples assume you used
jwt_v2, so update the examples as needed.Configure the new authentication path for your instance:
$ vault write auth/jwt_v2/config \ oidc_discovery_url="https://gitlab.example.com" \ bound_issuer="https://gitlab.example.com"
Recreate roles to use the new authentication path
Roles are bound to a specific authentication path so you need to add new roles for each job.
The bound_audiences parameter for the role is mandatory if the JWT contains an
audience and must match at least one of the associated aud claims of the JWT.
Recreate the role for staging named
myproject-staging:$ vault write auth/jwt_v2/role/myproject-staging - <<EOF { "role_type": "jwt", "policies": ["myproject-staging"], "token_explicit_max_ttl": 60, "user_claim": "user_email", "bound_audiences": ["https://vault.example.com"], "bound_claims": { "project_id": "22", "ref": "master", "ref_type": "branch" } } EOFRecreate the role for production named
myproject-production:$ vault write auth/jwt_v2/role/myproject-production - <<EOF { "role_type": "jwt", "policies": ["myproject-production"], "token_explicit_max_ttl": 60, "user_claim": "user_email", "bound_audiences": ["https://vault.example.com"], "bound_claims_type": "glob", "bound_claims": { "project_id": "22", "ref_protected": "true", "ref_type": "branch", "ref": "auto-deploy-*" } } EOF
You only need to update jwt to jwt_v2 in the vault command, do not change the role_type inside the role.
Method B: Move iss claim to roles for migration window
This method doesn’t require Vault administrators to create a second JWT auth method and recreate all GitLab related roles.
Add bound_issuers claim map to each role
Vault doesn’t allow multiple iss claims on the JWT auth method level, as the bound_issuer
directive on this level only accepts a single value. However, multiple claims can be configured
on the role level by using the bound_claims
map configuration directive.
With this method you can provide Vault with multiple options for the iss claim validation. This supports the https:// prefixed GitLab instance hostname claim that comes with the id_tokens, as well as the old non-prefixed claim.
To add the bound_claims configuration to the required roles, run:
$ vault write auth/jwt/role/myproject-staging - <<EOF
{
"role_type": "jwt",
"policies": ["myproject-staging"],
"token_explicit_max_ttl": 60,
"user_claim": "user_email",
"bound_audiences": ["https://vault.example.com"],
"bound_claims": {
"iss": [
"https://gitlab.example.com",
"gitlab.example.com"
],
"project_id": "22",
"ref": "master",
"ref_type": "branch"
}
}
EOFYou do not need to alter any existing role configurations except for the bound_claims section.
Make sure to add the iss configuration as shown previously, to ensure Vault accepts
the prefixed and non-prefixed iss claim for this role.
You must apply this change to all JWT roles used for the GitLab integration before moving on to the next step.
You can revert the migration of the iss claim validation from the auth method to the roles if desired,
after all projects have been migrated and you no longer need parallel support for CI_JOB_JWT and ID tokens.
Remove bound_issuers claim from auth method
After all roles have been updated with the bound_claims.iss claims, you can remove the auth method level configuration for this validation:
$ vault write auth/jwt/config \
oidc_discovery_url="https://gitlab.example.com" \
bound_issuer=""Setting the bound_issuer directive to an empty string removes the issuer validation on the auth method level.
However, as we have moved this validation to the role level, this configuration is still secure.
Update your CI/CD Jobs
Vault has two different KV Secrets Engines and the version you are using impacts how you define secrets in CI/CD.
Check the Which Version is my Vault KV Mount? article on HashiCorp’s support portal to check your Vault server.
Also, if needed you can review the CI/CD documentation for:
The following examples show how to obtain the staging database password written to the password field in secret/myproject/staging/db.
The value for the VAULT_AUTH_PATH variable depends on the migration method you used:
- Method A (Migrate JWT roles to the new Vault auth method): Use
jwt_v2. - Method B (Move
issclaim to roles for migration window): Usejwt.
KV Secrets Engine v1
The secrets:vault keyword defaults to v2 of the KV Mount, so you need to explicitly configure the job to use the v1 engine:
job:
variables:
VAULT_SERVER_URL: https://vault.example.com
VAULT_AUTH_PATH: jwt_v2 # or "jwt" if you used method B
VAULT_AUTH_ROLE: myproject-staging
id_tokens:
VAULT_ID_TOKEN:
aud: https://vault.example.com
secrets:
PASSWORD:
vault:
engine:
name: kv-v1
path: secret
field: password
path: myproject/staging/db
file: falseBoth VAULT_SERVER_URL and VAULT_AUTH_PATH can be defined as project or group CI/CD variables,
if preferred.
We use secrets:file:false because ID tokens place secrets in a file by default, but we need it to work as a regular variable to match the old behavior.
KV Secrets Engine v2
There are two formats you can use for the v2 engine.
Long format:
job:
variables:
VAULT_SERVER_URL: https://vault.example.com
VAULT_AUTH_PATH: jwt_v2 # or "jwt" if you used method B
VAULT_AUTH_ROLE: myproject-staging
id_tokens:
VAULT_ID_TOKEN:
aud: https://vault.example.com
secrets:
PASSWORD:
vault:
engine:
name: kv-v2
path: secret
field: password
path: myproject/staging/db
file: falseThis is the same as the example for the v1 engine but secrets:vault:engine:name: is set to kv-v2 to match the engine.
You can also use a short format:
job:
variables:
VAULT_SERVER_URL: https://vault.example.com
VAULT_AUTH_PATH: jwt_v2 # or "jwt" if you used method B
VAULT_AUTH_ROLE: myproject-staging
id_tokens:
VAULT_ID_TOKEN:
aud: https://vault.example.com
secrets:
PASSWORD:
vault: myproject/staging/db/password@secret
file: falseAfter you commit the updated CI/CD configuration, your jobs will be fetching secrets with ID Tokens, congratulations!
If you have migrated all projects to fetch secrets with ID Tokens and used method B for the migration, it is now possible to move the iss claim validation back to the auth method configuration if you desire.