-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request > Ability to use GCP OAuth2 token as credentials #2725
Comments
As the person who wrote the Vault secrets GCP engine, thanks for using it! I'm looking into this issue. It seems feasible but there are a couple of points I'd want to get your feedback on.
As a side note, if you're blocked on this, you could always create another roleset with the same set of permissions in Vault and just use a service account key still. |
@emilymye Thanks for all your work on this secret engine, we found it to be useful for our GCP rollout, and also thanks for answering all my silly questions on the secret engine issues page. In regards to these questions:
We're not blocked yet, however, it might start to become a problem during our rollout, as we increase the number of projects on the platform. But I can think of some temporary ways to increase the amount of CI and CD service accounts we use. Thanks again! |
Added! Use |
@emilymye Wow! That was quick 😁. I'll try it out tomorrow. Thanks a lot! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Community Note
Description
We use the Vault GCP secret engine to handle Terraform access, currently we're using the service account key, but this has a limit of 10 keys to be active at a time per roleset. According to the Vault GCP secret engine documentation, it is recommended to just use the OAuth2 token method of authentication for our use case.
https://www.vaultproject.io/docs/secrets/gcp/index.html#access-tokens
https://www.vaultproject.io/docs/secrets/gcp/index.html#access-tokens-vs-service-account-keys
New or Affected Resource(s)
google
providergoogle-beta
providerPotential Terraform Configuration
Also would be great if the token can be specified as a default environment variable.
References
The text was updated successfully, but these errors were encountered: