-
Notifications
You must be signed in to change notification settings - Fork 484
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Secure Consul Ph. 2] Implement create/update policies and roles in Consul bootstrapper #3254
Comments
jim-wang-intel
added
enhancement
New feature or request
security-services
ireland
labels
Mar 15, 2021
jim-wang-intel
changed the title
[Secure Consul Ph. 2] Implement create/update roles in Consul bootstrapper
[Secure Consul Ph. 2] Implement create/update policies and roles in Consul bootstrapper
Mar 15, 2021
jim-wang-intel
added a commit
to jim-wang-intel/edgex-go
that referenced
this issue
Mar 18, 2021
New addition for implementing for Consul's ACL policies creation and roles for Consul tokens generated later on - Add logic to check whehter the ACL policy is already pre-existing before creation of new policy - Add implementation to create a new ACL policy - Add implementation to create a role for EdgeX's services via Vault's /consul/roles/* APIs: this sets the stage for creating role-based Consul tokens used by EdgeX services - Add logic for creating token roles based on EdgeX service keys from configuration file - Add implementation to create registry management token and store it into a file - Update token-file-provider on edgex's default policy to add the permission for calling /consul/creds/"service-key" endpoint Closes: edgexfoundry#3158, edgexfoundry#3254, edgexfoundry#3160 Signed-off-by: Jim Wang <[email protected]>
jim-wang-intel
added a commit
to jim-wang-intel/edgex-go
that referenced
this issue
Mar 18, 2021
New addition for implementing for Consul's ACL policies creation and roles for Consul tokens generated later on via `go-mod-secret` - Add logic to check whether the ACL policy is already per-existing before creation of new policy - Add implementation to create a new ACL policy - Add implementation to create a role for EdgeX's services via Vault's /consul/roles/* APIs: this sets the stage for creating role-based Consul tokens used by EdgeX services - Add logic for creating token roles based on EdgeX service keys from configuration file - Add implementation to create registry management token and store it into a file - Update token-file-provider on edgex's default policy to add the permission for calling /consul/creds/"service-key" endpoint Closes: edgexfoundry#3158, edgexfoundry#3254, edgexfoundry#3160 Signed-off-by: Jim Wang <[email protected]>
3 tasks
jim-wang-intel
added a commit
to jim-wang-intel/edgex-go
that referenced
this issue
Mar 19, 2021
New addition for implementing for Consul's ACL policies creation and roles for Consul tokens generated later on via `go-mod-secret` - Add logic to check whether the ACL policy is already per-existing before creation of new policy - Add implementation to create a new ACL policy - Add implementation to create a role for EdgeX's services via Vault's /consul/roles/* APIs: this sets the stage for creating role-based Consul tokens used by EdgeX services - Add logic for creating token roles based on EdgeX service keys from configuration file - Add implementation to create registry management token and store it into a file - Update token-file-provider on edgex's default policy to add the permission for calling /consul/creds/"service-key" endpoint Closes: edgexfoundry#3158, edgexfoundry#3254, edgexfoundry#3160 Signed-off-by: Jim Wang <[email protected]>
3 tasks
jim-wang-intel
added a commit
to jim-wang-intel/edgex-go
that referenced
this issue
Mar 19, 2021
New addition for implementing for Consul's ACL policies creation and roles for Consul tokens generated later on via `go-mod-secret` - Add logic to check whether the ACL policy is already per-existing before creation of new policy - Add implementation to create a new ACL policy - Add implementation to create a role for EdgeX's services via Vault's /consul/roles/* APIs: this sets the stage for creating role-based Consul tokens used by EdgeX services - Add logic for creating token roles based on EdgeX service keys from configuration file - Add implementation to create registry management token and store it into a file - Update token-file-provider on edgex's default policy to add the permission for calling /consul/creds/"service-key" endpoint Closes: edgexfoundry#3158, edgexfoundry#3254, edgexfoundry#3160 Signed-off-by: Jim Wang <[email protected]>
jim-wang-intel
added a commit
to jim-wang-intel/edgex-go
that referenced
this issue
Mar 22, 2021
New addition for implementing for Consul's ACL policies creation and roles for Consul tokens generated later on via go-mod-secret - Add logic to check whether the ACL policy is already per-existing before creation of new policy - Add implementation to create a new ACL policy - Add implementation to create a role for EdgeX's services via Vault's /consul/roles/* APIs: this sets the stage for creating role-based Consul tokens used by EdgeX services - Add logic for creating token roles based on EdgeX service keys from configuration file - Update token-file-provider on edgex's default policy to add the permission for calling /consul/creds/"service-key" endpoint Closes: edgexfoundry#3254, edgexfoundry#3160 Signed-off-by: Jim Wang <[email protected]>
jim-wang-intel
added a commit
that referenced
this issue
Mar 22, 2021
New addition for implementing for Consul's ACL policies creation and roles for Consul tokens generated later on via go-mod-secret - Add logic to check whether the ACL policy is already per-existing before creation of new policy - Add implementation to create a new ACL policy - Add implementation to create a role for EdgeX's services via Vault's /consul/roles/* APIs: this sets the stage for creating role-based Consul tokens used by EdgeX services - Add logic for creating token roles based on EdgeX service keys from configuration file - Update token-file-provider on edgex's default policy to add the permission for calling /consul/creds/"service-key" endpoint Closes: #3254, #3160 Signed-off-by: Jim Wang <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
🚀 Feature Request
Relevant Package
This feature request is for
Consul bootstrapper
Description
Based on ADR: Consul bootstrapper will install a role in Vault that creates global-management tokens in Consul with no TTL.
This will require to create a step or implementation for setupRegistryACL to install a role to Vault's consul secret engine.
Describe the solution you'd like
/consul/role/<name>
details please see https://www.vaultproject.io/api/secret/consul#create-update-roleDescribe alternatives you've considered
Have you considered any alternative solutions or workarounds?The text was updated successfully, but these errors were encountered: