Azure key Vault value integration inside a JSON of an application

574 Views Asked by At

I have Mesosphere DC/OS installed on Azure cluster, running tomcat apps as services, those services are configured using JSON files holding the ports and passwords of the apps. My Manager wants to use Azure Key Vault to store the passwords and secrets of the apps, i created the vault and stored in it the secrets i need.

This is a part of my JSON values which i need to replace: (i cut only the fields with the values i want to replace from the Vault)

    "APP_ACCESS_SERVICE_PASSWORD": "AppPW",
    "CASSANDRA_DB_PASSWORD": "App_uat_PW",
    "UAMS_ORACLE_PASSWORD": "App_uat_PW",
    "PUBLISH_DB_PASSWORD": "ogw",
    "App-PUBLISH_DB_PASSWORD": "App_uat1",
    "EMP_DB_PASSWORD": "App_uat1",

How can i replace the passwords in my JSON with the values in the key vault ? i mean putting a URL to the password instead of the password is not an option, any Idea how can i input the values in the key vault into the JSON instead of the static values ? From Azure documentation i see that i can access the values using URL, for example: https://Contoso-Vault2.vault.azure.net/secrets/ExamplePassword but using URL instead of the value is not an option. (it won't work)

1

There are 1 best solutions below

0
DevOps TH On BEST ANSWER

I assume you have a pipeline but here's how you could do it.

First create your secrets in your desired key vault. I have created an app using Python and the Azure sdk which lets you create multiple secrets in a key vault very easily - https://github.com/TechyTish/AzurePy/blob/main/create-azure-secrets-README.md

lets say your secrets are stored as (secretName: secretValue):

  • appAccessService: 1234
  • cassandraDB: hello567

... etc

#filename: example.json

    "APP_ACCESS_SERVICE_PASSWORD": "{#appAccessServicePW#}",
    "CASSANDRA_DB_PASSWORD": "{#cassandraDB#}",
    "UAMS_ORACLE_PASSWORD": "{#uamsOraclePW#}",
    "PUBLISH_DB_PASSWORD": "{#publishDBPW#}",
    "App-PUBLISH_DB_PASSWORD": "{#appPublishPW#}",
    "EMP_DB_PASSWORD": "{#empDBPW#}",

Create a YAML pipeline which will have 2 tasks:

  1. Extract keyvault secrets
  2. Replace the .json key values with the secrets
#filename: azure-pipeline.yml

# Azure Key Vault
# Download Azure Key Vault secrets
- task: AzureKeyVault@2
  inputs:
    connectedServiceName: # Azure subscription - you will need to create an service connection in the repo which has access policies to the keyvault
    keyVaultName: # Name of existing key vault
    secretsFilter: '*' # Downloads all secrets for the key vault
    runAsPreJob: true # Runs before the job starts

Underneath the previous task add another one. This looks for any key value with the {# pre-fix and #} suffix in the .json file and the variables (below) after this task will replace the value in the .json file with the value of the secrets you assigned it.

#filename: azure-pipeline.yml

- task: qetza.replacetokens.replacetokens-task.replacetokens@3
  inputs:
    targetFiles: "$(Pipeline.Workspace)/codepath/jsonFileName.json"
    encoding: "auto"
        writeBOM: true
        verbosity: "detailed"
        actionOnMissing: "warn"
        keepToken: false
        tokenPrefix: "{#"
        tokenSuffix: "#}"
      displayName: Perform variable substitution in json file
- script: echo "$(<folderName/example.json)" #open json file in the terminal to show the changes

#.json value: point to secret name
variables:
  appAccessServicePW: $(appAccessService)
  cassandraDB: $(cassandraDB)
#....
#etc

Run the pipeline (tick the box for debugging) and your output of .json file should be:

#filename: appsettings.json

    "APP_ACCESS_SERVICE_PASSWORD": "1234",
    "CASSANDRA_DB_PASSWORD": "hello567"
#....
#etc

This way the only time your secrets are revealed is when the pipeline is run on whichever host agent (virtual machine) you use.