A set of agent hooks that expose secrets to build steps via Amazon S3 (encrypted-at-rest). Used in the Elastic CI Stack for AWS.
Different types of secrets are supported and exposed to your builds in appropriate ways:
ssh-agent
for SSH Private Keys- Environment Variables for strings
git-credential
via git's credential.helper
The hooks needs to be installed directly in the agent so that secrets can be downloaded before jobs attempt checking out your repository. We are going to assume that buildkite has been installed at /buildkite
, but this will vary depending on your operating system. Change the instructions accordingly.
The core of the hook is an s3secrets-helper
binary. This can be built using
go build
in the s3secrets-helper/
directory in this
repository, or downloaded from the assets attached to a GitHub Release.
It must be placed in $PATH
to be found by the hooks/environment
wrapper script.
# clone to a path your buildkite-agent can access
git clone https://github.com/buildkite-plugins/s3-secrets-buildkite-plugin.git /buildkite/s3_secrets
(cd /buildkite/s3_secrets/s3secrets-helper && go build -o /usr/local/bin/s3secrets-helper)
Modify your agent's hooks (see Hook Locations):
if [[ "${SECRETS_PLUGIN_ENABLED:-1}" == "1" ]] ; then
export BUILDKITE_PLUGIN_S3_SECRETS_BUCKET="my-s3-secrets-bucket"
source /buildkite/s3_secrets/hooks/environment
fi
if [[ "${SECRETS_PLUGIN_ENABLED:-1}" == "1" ]] ; then
export BUILDKITE_PLUGIN_S3_SECRETS_BUCKET="my-s3-secrets-bucket"
source /buildkite/s3_secrets/hooks/pre-exit
fi
When run via the agent environment and pre-exit hook, your builds will check in the s3 secrets bucket you created for secrets files in the following formats:
s3://{bucket_name}/{pipeline}/private_ssh_key
s3://{bucket_name}/{pipeline}/environment
ors3://{bucket_name}/{pipeline}/env
s3://{bucket_name}/{pipeline}/git-credentials
s3://{bucket_name}/private_ssh_key
s3://{bucket_name}/environment
ors3://{bucket_name}/env
s3://{bucket_name}/git-credentials
The private key is exposed to both the checkout and the command as an ssh-agent instance.
The secrets in the env file are exposed as environment variables.
The locations of git-credentials are passed via GIT_CONFIG_PARAMETERS
environment to git.
This example uploads an ssh key and an environment file to the root of the bucket, which means it matches all pipelines that use it. You use per-pipeline overrides by adding a path prefix of /my-pipeline/
.
# generate a deploy key for your project
ssh-keygen -t rsa -b 4096 -f id_rsa_buildkite
pbcopy < id_rsa_buildkite.pub # paste this into your github deploy key
export secrets_bucket=my-buildkite-secrets
aws s3 cp --acl private --sse aws:kms id_rsa_buildkite "s3://${secrets_bucket}/private_ssh_key"
Note the -sse aws:kms
, as without this your secrets will fail to download.
For git over https, you can use a git-credentials
file with credential urls in the format of:
https://user:password@host/path/to/repo
aws s3 cp --acl private --sse aws:kms <(echo "https://user:password@host/path/to/repo") "s3://${secrets_bucket}/git-credentials"
These are then exposed via a gitcredential helper which will download the credentials as needed.
Key values pairs can also be uploaded.
aws s3 cp --acl private --sse aws:kms <(echo "MY_SECRET=blah") "s3://${secrets_bucket}/environment"
An s3 bucket to look for secrets in.
MIT (see LICENSE)