Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating GCP Dynamic Secrets Backend #755

Open
tdgeery opened this issue Aug 30, 2021 · 4 comments
Open

Updating GCP Dynamic Secrets Backend #755

tdgeery opened this issue Aug 30, 2021 · 4 comments

Comments

@tdgeery
Copy link

tdgeery commented Aug 30, 2021

With Vault Release v.1.8.x

The deprecations for the gcp/<key/token>/<role> will change to: gcp/roleset/<role>/<key/token>

With Deprecations

I've noticed on the HVAC docs that there's no way to override which pathway to use:

:param method: Supported methods:
            POST: /{mount_point}/key/{roleset}. Produces: 200 application/json
            GET: /{mount_point}/key/{roleset}. Produces: 200 application/json
@tdgeery
Copy link
Author

tdgeery commented Sep 28, 2021

Also, with the release of static-accounts need to add way to read secrets from pathway

vault read gcp/static-account/{roleset}/token

For now I've used a workaround:

token_response = client.secrets.kv.v1.read_secret(
    path=f'static-account/{vault_token_roleset}/token',
    mount_point='gcp',
)

@JKCai
Copy link

JKCai commented Apr 6, 2022

I would also keen to see this update.

On the other hand, while trying the workaround, it works running it for static account, but it doesn't work running it for roleset. Have you facing this issue too? @tdgeery
Thanks in advance.

key_response = client.secrets.kv.v1.read_secret(
    path=f'roleset/{vault_roleset}/key',
    mount_point='gcp',
)

@tdgeery
Copy link
Author

tdgeery commented Apr 6, 2022

@JKCai this worked for me:

key_response = client.secrets.kv.v1.read_secret(
    path=f'roleset/{gcp_roleset}/key',
    mount_point='gcp',
)

that looks the same, but there might be something wrong with your Policy permissions for gcp/roleset

@JKCai
Copy link

JKCai commented Apr 6, 2022

Thanks for getting back to me. Good to know the code is alright and pointing me to the direction. @tdgeery

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants