-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Service Account Key TTL value missing when read from roleset config #74
Comments
Like #54? That should be available and released in recent Vault versions. |
Oh nice, I must have missed it in the changelog. Just tested it, and it looks like it's working. Keyfile from the Couple of noteworthy comments on usability though, if I may:
Example: Creating the Roleset
Reading the Roleset
I'd expect the TTL to be defined when read, so it can be in parity with the source file that would create the role. Looks like this bit of source is probably were it'd be added?
|
Sure - PRs welcome. The reason it's not reported on out is that it's difficult to get that value if it's not set (it's inherited from a bunch of possible locations in Vault) |
Updated the title of the issue to reflect the missing TTL value in the roleset config |
Also Updated api docs |
@sethvargo When I tried specifying service account key TTL in a roleset it doesn't seem to reflect in lease_duration. Am I missing something? I would expect
|
This issue is to request functionality for setting a TTL on a single roleset on the GCP Secrets Backend, and not against the entire mount itself.
While rolesets with the
access_token
type provide credentials with a fixed interval of 1 hour, rolesets of typeservice_account_key
create keypairs and have a variable TTL that can be set. However, this TTL must be set against the entire backend (either in the config or by tuning the mount point).Ideally in the majority of cases, we set TTLs for these keys to be sufficiently short (ie - TTL of minutes), as they're used primarily for discrete operations like provisioning (say via TF), deployment (via CD services), init (cloud init, cronjobs, or analogous), etc. That said, we have seen quite a few one-off usecases where these discrete operations tend to be longer lived than the short TTL intervals that the majority of other deploy-time operations require, and even longer than the 1-hour interval that access_tokens are set to. In this way, we'd like individual rolesets for GCP SAs to have their own TTLs, so that we don't need to increase the lifetime of all GCP SA keys provisioned by this backend simply to support these usecases.
This would be a much better operational, management, and GitOps experience than creating N number of GCP Backends to support these usecases; we should basically only ever need 1 backend per GCP domain/org.
The text was updated successfully, but these errors were encountered: