Fill out this questionnaire so we can learn more about your use case.
The SPIFFE Helper is a simple utility for fetching X.509 SVID certificates from the SPIFFE Workload API, launch a process that makes use of the certificates and continuously get new certificates before they expire. The launched process is signaled to reload the certificates when is needed.
$ spiffe-helper -config <config_file>
<config_file>
: file path to the configuration file.
If -config
is not specified, the default value helper.conf
is assumed.
CLI options:
Flag name | Description |
---|---|
-config |
Path to the configuration file |
-help |
Print interactive help |
-daemon-mode={true|false} |
Boolean true or false. Overrides daemon_mode in the config file. |
The configuration file is an HCL formatted file that defines the following configurations:
Configuration | Description | Example Value |
---|---|---|
agent_address |
Socket address of SPIRE Agent. | "/tmp/agent.sock" |
cmd |
The path to the process to launch and monitor and signal for certificate renewals. Ignored if daemon_mode=false |
"ghostunnel" |
cmd_args |
The arguments of the process to launch. Split by spaces into an argument vector. | "server --listen localhost:8002 --target localhost:8001--keystore certs/svid_key.pem --cacert certs/svid_bundle.pem --allow-uri-san spiffe://example.org/Database" |
pid_file_name |
Path to a file containing a process ID to signal when certificates are renewed. Not required when using 'cmd'. | "/var/run/ghostunnel.pid" |
cert_dir |
Directory name to store the fetched certificates. This directory must be created previously. | "certs" |
daemon_mode |
Toggle running as a daemon, keeping X.509 and JWT up to date; or just fetch X.509 and JWT and exit 0. Does not background itself. | true |
add_intermediates_to_bundle |
Add intermediate certificates into Bundle file instead of SVID file. | true |
renew_signal |
The signal that the process to be launched expects to reload the certificates. It is not supported on Windows. | "SIGUSR1" |
svid_file_name |
File name to be used to store the X.509 SVID public certificate in PEM format. | "svid.pem" |
svid_key_file_name |
File name to be used to store the X.509 SVID private key and public certificate in PEM format. | "svid_key.pem" |
svid_bundle_file_name |
File name to be used to store the X.509 SVID Bundle in PEM format. | "svid_bundle.pem" |
jwt_svids |
An array with the audience, optional extra audiences array, and file name to store the JWT SVIDs. File is Base64-encoded string). | [{jwt_audience="your-audience", jwt_extra_audiences=["your-extra-audience-1", "your-extra-audience-2"], jwt_svid_file_name="jwt_svid.token"}] |
jwt_bundle_file_name |
File name to be used to store JWT Bundle in JSON format. | "jwt_bundle.json" |
include_federated_domains |
Include trust domains from federated servers in the CA bundle. | true |
cert_file_mode |
The octal file mode to use when saving the X.509 public certificate file. | 0644 |
key_file_mode |
The octal file mode to use when saving the X.509 private key file. | 0600 |
jwt_bundle_file_mode |
The octal file mode to use when saving a JWT Bundle file. | 0600 |
jwt_svid_file_mode |
The octal file mode to use when saving a JWT SVID file. | 0600 |
hint |
Hint to use to pick the SPIFFE ID. | `` |
Notes:
- If
cmd
is specified, spiffe-helper will connect itsstdin
,stdout
andstderr
to that of the command it invokes. If this is not desired, close these file descriptors before invoking spiffe-helper.
SPIFFE Helper can expose and endpoint that can be used for health checking
Configuration | Description | Example Value |
---|---|---|
health_checks.listener_enabled |
Whether to start an HTTP server at the configured endpoint for the daemon health. Doesn't apply for non-daemon mode. | false |
health_checks.bind_port |
The port to run the HTTP health server. | 8081 |
health_checks.liveness_path |
The URL path for the liveness health check | /live |
health_checks.readiness_path |
The URL path for the readiness health check | /readu |
spiffe-helper has two primary operating modes - "daemon mode" (the default), where it runs continuously and manages the certificates, and "non-daemon mode", where it fetches the certificates once and exits.
The helper can be used in several ways, as detailed below:
- Signal an external process when the certificates are renewed.
- Run a command that reloads an external process when the certificates are renewed.
- Run a command that uses the certificates, and signal it when they are renewed (not recommended)
- Fetch the certificates once and exit.
Note that "daemon mode" does not actually detach itself from the controlling process and background itself like a unix "daemon". It just keeps running until terminated by a signal or a fatal error.
spiffe-helper
does not have all the features of a proper process supervisor,
so it's usually best to let a dedicated process supervisor like systemd manage
the process that uses the certificates. Use spiffe-helper
to fetch and renew
the certificates and wake the external process via cmd
or pid_file_name
when the certificates are reloaded.
If the process using the certificates can watch the on-disk files for changes,
spiffe-helper can be run in daemon_mode
with no cmd
or pid_file_name
. It
will fetch and renew the certificates, overwrite them on disk, and the process
will pick up the changes.
This approach is recommended where possible.
cmd
and cmd_args
are used in daemon_mode
to run a command whenever the
certificates are renewed. This can be a long-lived process that uses the
certificates, or a short-lived command that signals a reload mechanism
for an externally-managed process.
cmd_args
will be split into individual arguments using space separation
unless the argument is enclosed in double quotes, which are consumed. Double
quotes must be backslash escaped in the hcl string. For example:
cmd_args = "\"this is one argument\""
Double quotes within the argument string must be escaped by doubling them so they are not interpreted as argument delimiters. E.g.:
cmd_args = "\"this is a single argument with ONE double-quote \"\" in it\""
Single quotes are NOT respected for argument quoting, and do not protect double quotes. For example:
cmd = "sh"
cmd_args = "-c 'echo hello world'"
will run sh
with the argument-vector ["-c", "'echo", "hello", "world'"], not
["-c", "echo hello world"], which will fail with Syntax error: Unterminated quoted string
.
cmd_args
is not subject to shell metacharacter expansion or interpretation.
If you need to use shell features, you must invoke a shell explicitly, e.g.
cmd = "/bin/sh"
and cmd_args = "-c \"echo hello\""
. Be careful with shell
invocations, as they can introduce security vulnerabilities and should be
avoided where possible.
The command's stdout and stderr will be attached to spiffe-helper's stdout and stderr. Its stdin will be closed.
The process specified by cmd
and cmd_args
will not be launched for the
first time until the certificates are fetched successfully.
spiffe-helper
continues running if the process created by cmd
exits. The
process is not re-launched immediately if it exits.
If the process is still running next time the certs are renewed,
spiffe-helper
will signal it with renew_signal
. If it has exited,
spiffe-helper
will re-launch it instead. This can be used to manage
certificate reloading in externally-managed processes that do not support
reloading certificates with a signal.
If running in daemon_mode
with pid_file_name
set, the pid in
pid_file_name
is sent the signal renew_signal
to reload the certificates
when they are renewed.
pid_file_name
is re-read every time the process is to be signaled, so it can
be updated with a new pid if the process changes.
An error will be logged if the pid file cannot be opened, read, or the value parsed, and the attempt to signal the process will be skipped. The process will still be signalled next time the certificates are renewed.
Both cmd
and pid_file_name
can be used at the same time. spiffe-helper
will
both run the specified command and signal the process in the pid file. This can be
useful to use cmd
to start the process to be managed, and pid_file_name
to signal
a reload mechanism that is not signal-based.
If daemon_mode
is false, spiffe-helper
will fetch the certificates once and
exit. This can be useful for one-shot scripts or for use in a process supervisor
that does not require a long-lived process.
cmd
and pid_file_name
are ignored in non-daemon mode. No command will be
run and no signals will be sent. They may be disallowed in future.
spiffe-helper
cannot be used as a transparent wrapper around another
command because it does not forward stdin, signals, file descriptors, exit
when the child process exits, or return the managed process's exit code as
its own exit code. Instead, consider running the other process separately,
under the control of a proper process supervisor like systemd, and signaling
it via pid_file_name
.
cmd
,
renew_signal
and pid_file_name
blank if daemon_mode
is false.
agent_address = "/tmp/spire-agent/public/api.sock"
cmd = "ghostunnel"
cmd_args = "server --listen localhost:8002 --target localhost:8001 --keystore certs/svid_key.pem --cacert certs/svid_bundle.pem --allow-uri-san spiffe://example.org/Database"
cert_dir = "certs"
renew_signal = "SIGUSR1"
svid_file_name = "svid.pem"
svid_key_file_name = "svid_key.pem"
svid_bundle_file_name = "svid_bundle.pem"
jwt_svids = [{jwt_audience="your-audience",jwt_extra_audiences=["your-extra-audience-1", "your-extra-audience-2"], jwt_svid_file_name="jwt_svid.token"}]
jwt_bundle_file_name = "bundle.json"
cert_file_mode = 0444
key_file_mode = 0444
jwt_bundle_file_mode = 0444
jwt_svid_file_mode = 0444
agent_address = "spire-agent\\public\\api"
cert_dir = "certs"
svid_file_name = "svid.pem"
svid_key_file_name = "svid_key.pem"
svid_bundle_file_name = "svid_bundle.pem"
jwt_svids = [{jwt_audience="your-audience",jwt_extra_audiences=["your-extra-audience-1", "your-extra-audience-2"], jwt_svid_file_name="jwt_svid.token"}]
jwt_bundle_file_name = "bundle.json"