-
Notifications
You must be signed in to change notification settings - Fork 377
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updating GCP Dynamic Secrets Backend #755
Comments
Also, with the release of static-accounts need to add way to read secrets from pathway
For now I've used a workaround:
|
I would also keen to see this update. On the other hand, while trying the workaround, it works running it for static account, but it doesn't work running it for roleset. Have you facing this issue too? @tdgeery
|
@JKCai this worked for me: key_response = client.secrets.kv.v1.read_secret(
path=f'roleset/{gcp_roleset}/key',
mount_point='gcp',
) that looks the same, but there might be something wrong with your Policy permissions for |
Thanks for getting back to me. Good to know the code is alright and pointing me to the direction. @tdgeery |
With Vault Release v.1.8.x
The deprecations for the
gcp/<key/token>/<role>
will change to:gcp/roleset/<role>/<key/token>
With Deprecations
I've noticed on the HVAC docs that there's no way to override which pathway to use:
The text was updated successfully, but these errors were encountered: