Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEAT] Support for retrieving secrets with configuration options #512

Open
rhughes1 opened this issue Jan 15, 2024 · 2 comments
Open

[FEAT] Support for retrieving secrets with configuration options #512

rhughes1 opened this issue Jan 15, 2024 · 2 comments
Labels
enhancement New feature or request

Comments

@rhughes1
Copy link

Is your feature request related to a problem? Please describe.

As part of the Terraform workflow, I'd like to be able to dynamically generate credentials (Terraform Cloud, AWS/Azure/GCP, Consul, PKI, etc) so that I can generate short lived credentials for CI/CD purposes. This would be useful for Terraform module testing where you would want to actually deploy the infrastructure in question vs using mocks.

I know it's been clearly documented within the README about the action only supporting GET requests without parameters.

Describe the solution you'd like

After logging into the Vault cluster, there should be a configuration option with the action which allows you to pass in either a role field or a configuration map for the given path.

The role field would be there to resolve the Terraform Cloud, Consul, Nomad, AWS, Azure, and GCP.

The config field would be there to resolve PKI.

Describe alternatives you've considered

One solution would be to write this out in Bash as part of the pipeline. However, this feels like a dirty approach.

@rhughes1 rhughes1 added the enhancement New feature or request label Jan 15, 2024
@rhughes1 rhughes1 changed the title [FEAT] Support for retrieving cloud credentials [FEAT] Support for retrieving secrets with configuration options Jan 15, 2024
@austingebauer
Copy link
Member

Hi @rhughes1. Thanks for this request. It looks like we'd be able to support credential generation for a number of our Vault integrations today using GET requests. For example, you should be able to generate dynamic credentials using a GET for Azure, AWS, and GCP secrets engines (+ more). Note that the role parameter is often a component of the URL path and additional input can be supplied as query parameters.

I'm curious if you tried this and ran into issues with vault-action?

@melonger
Copy link

@austingebauer, what Ryan explains has been tested, but it's a poke and prod attempt with no real direction or success (other than build custom reusable actions leveraging the Vault binary).

The idea described, would have a two prong affect using dynamic secrets:

  1. is for generating dynamic credentials, to which we can use later in other actions
  2. using it as a method for auth when doing a secrets extraction (in the KV).

Then, have all tokens and creds revoked in a later custom action (as the current vault-action does not support any form of revocation of tokens or creds) using the Vault binary.

ex: The documentation README, is very limited in explanation for AWS auth or if this is even a capability in tangent. It implies using an id/key, but that's not how it would primarily be used (and would defeat the purpose of the dynamic secrets). Using the IAM Authentication method, generating all the data that the Vault binary performs (vault login -namespace= -method=aws role=) would be beneficial in the payload to be translated into the action itself.

Being able to piggy back off the same "action request" (AWS/Azure/GCP Auth), to then extract data from vault, would be highly beneficial. Rather than currently using the binary to translate the request, extracting the token, applying it to the vault-action using the token auth method and pointing to the secrets wanted to be extracted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants