Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[gcp][cross-project] Vault doesn't set permissions for roleset ServiceAccount #140

Open
swapzero opened this issue May 25, 2022 · 1 comment

Comments

@swapzero
Copy link

swapzero commented May 25, 2022

Doesn't work

Project A:

  • Vault is running in GKE (workload identity setup)
  • Vault ServiceAccount has roles/owner permissions in Project B
  • terraform is used to setup
    • vault_gcp_secret_backend (no credentials specified, relying on workload identity)
    • vault_gcp_secret_roleset in Project B

Result:

  • the ServiceAccount for the roleset is created in Project B
  • the ServiceAccount key for the above is created in Project B
  • ❗ the pemission specified in bindings is not granted to the roleset ServiceAccount

Works

Same as above except:

  • a ServiceAccount is created in Project B (roles/owner)
  • a ServiceAccount Key is created for the above
  • vault_gcp_secret_backend (terraform) is created using credentials set to the above SA key
  • vault_gcp_secret_roleset created just like in the first scenario

Result:

  • the role specified in the roleset bindings is now added to the roleset SA

We checked GCP logs and we figured out that in the scenario that doesn't work, there is no attempt to call SetIamPolicy like in the scenario that works.

Any help with this is appreciated :).

Thanks!

LE: Vault is 1.9.3

@fairclothjm
Copy link
Contributor

Hello! Is there any recent update on this issue? Are you still experiencing this issue?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants